306 8 43MB
English Pages XXXVI, 791 [815] Year 2021
Advances in Intelligent Systems and Computing 1233
Vijayan Sugumaran Zheng Xu Huiyu Zhou Editors
Application of Intelligent Systems in Multi-modal Information Analytics Proceedings of the 2020 International Conference on Multi-model Information Analytics (MMIA2020), Volume 1
Advances in Intelligent Systems and Computing Volume 1233
Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen , Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
More information about this series at http://www.springer.com/series/11156
Vijayan Sugumaran Zheng Xu Huiyu Zhou •
•
Editors
Application of Intelligent Systems in Multi-modal Information Analytics Proceedings of the 2020 International Conference on Multi-model Information Analytics (MMIA2020), Volume 1
123
Editors Vijayan Sugumaran Department of Decision and Information Sciences, and Center for Data Science and Big Data Analytics Oakland University, School of Business Administration Rochester, MI, USA
Zheng Xu Shanghai University of Medicine and Health Sciences Shanghai, China
Huiyu Zhou Department of Informatics University of Leicester Leicester, UK
ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-3-030-51430-3 ISBN 978-3-030-51431-0 (eBook) https://doi.org/10.1007/978-3-030-51431-0 © Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Foreword
We are living in the era of data deluge. The world of big data exhibits a rich and complex set of cross-media contents, such as text, image, video, audio, and graphics. So far, great research efforts have been dedicated separately to big data processing and cross-media mining, with well-grounded theoretical underpinnings and great practical success. However, studies jointly considering cross-media big data analytics are relatively sparse. This research gap needs our further attention, since it will benefit a variety of real-world applications. Despite its significance and value, it is non-trivial to analyze cross-media big data due to their heterogeneity, large-scale volume, increasing size, unstructured nature, correlations, and noise. Multi-modal information systems, which can be treated as the most significant breakthrough in the past 10 years, have greatly impacted the methodologies utilized in computer vision and achieved terrific progress in both academia and industry. The 2020 International Conference on Multi-modal Information Analytics (MMIA), building on the previous successes in Shenyang, China (2019), is proud to be in the 2nd consecutive conference year. The conference would not have been possible without the contributions of the authors. We sincerely thank all the authors for their valuable contributions. We would like to express our thanks to Professor Vijayan Sugumaran, Oakland University; Professor Xiao Wei, Shanghai University; and Shunxiang Zhang, Anhui University of Science and Technology, for being the keynote speakers at the conference. We thank the Steering Committee, General Chairs, Program Committee Chairs, Organizing Chairs, and Workshop Chairs for their hard work. The local organizers’ and the students’ help are also highly appreciated. Our special thanks are due also to Editor Dr. Thomas Ditzinger for publishing the proceedings in Advances in Intelligent Systems and Computing of Springer.
v
Organization
General Chairs Tharam Dillon
La Trobe University, Australia
Program Chairs Huiyu Zhou Vijayan Sugumaran Zheng Xu
Queen’s University Belfast, UK Oakland University, USA Shanghai University, China
Publication Chairs Juan Du Junyu Xuan
Shanghai University, China University of Technology Sydney, Australia
Publicity Chairs Shunxiang Zhang Neil. Y. Yen
Anhui University of Science and Technology, China University of Aizu, Japan
Local Organizing Chairs Daxu Wang Ruifu Zhang
Changzhou Institute of Mechatronic Technology, China Changzhou Institute of Mechatronic Technology, China
vii
viii
Organization
Program Committee Members William Bradley Glisson George Grispos Abdullah Azfar Aniello Castiglione Florin Pop Ben Martini Wei Wang Neil Yen Meng Yu Shunxiang Zhang Guangli Zhu Tao Liao Xiaobo Yin Xiangfeng Luo Xiao Wei Huan Du Zhiguo Yan Rick Church Tom Cova Susan Cutter Zhiming Ding Yong Ge T. V. Geetha Danhuai Guo Jeng-Neng Hwang Jianping Fang Jianhui Li Yi Liu Foluso Ladeinde Kuien Liu Feng Lu
Ricardo J. Soares Magalhaes D. Manjula Alan Murray
University of South Alabama, USA University of Limerick, Ireland KPMG Sydney, Australia Università di Salerno, Italy University POLITEHNICA of Bucharest, Romania University of South Australia, Australia The University of Texas at San Antonio, USA University of Aizu, Japan The University of Texas at San Antonio, USA Anhui University of Science & Technology, China Anhui University of Science & Technology, China Anhui University of Science & Technology, China Anhui University of Science & Technology, China Shanghai University, China Shainghai University, China Shanghai University, China Fudan University, China UC Santa Barbara, USA University of Utah, USA University of South Carolina, USA Beijing University of Technology, China University of North Carolina at Charlotte, USA Anna University, India Computer Network Information Center, Chinese Academy of Sciences, China University of Washington, USA University of North Carolina at Charlotte, USA Computer Network Information Center, Chinese Academy of Sciences, China Tsinghua University, China SUNY Korea, Incheon, South Korea Pivotal Inc, USA Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences, China University of Queensland, Australia Anna University, India Drexel University, USA
Organization
S. Murugan Yasuhide Okuyama S. Padmavathi Latha Parameswaran S. Suresh Wei Xu Chaowei Phil Yang Enwu Yin Hengshu Zhu Morshed Chowdhury Min Hu Gang Luo Juan Chen Qigang Liu
ix
Sathyabama Institute of Science and Technology, India University of Kitakyushu, Japan Amrita University, India Amrita University, India SRM University, India Renmin University of China, China George Mason University, USA China CDC, USA Baidu Inc., China Deakin University, Australia Shanghai University, China Shanghai University, China Shanghai University, China Shanghai University, China
Welcome Message
We are living in the era of data deluge. The world of big data exhibits a rich and complex set of cross-media contents, such as text, image, video, audio, and graphics. So far, great research efforts have been dedicated separately to big data processing and cross-media mining, with well-grounded theoretical underpinnings and great practical success. However, studies jointly considering cross-media big data analytics are relatively sparse. This research gap needs our further attention, since it will benefit a variety of real-world applications. Despite its significance and value, it is non-trivial to analyze cross-media big data due to their heterogeneity, large-scale volume, increasing size, unstructured nature, correlations, and noise. Multi-modal information systems, which can be treated as the most significant breakthrough in the past 10 years, have greatly impacted the methodologies utilized in computer vision and achieved terrific progress in both academia and industry. The 2020 International Conference on Multi-modal Information Analytics (MMIA), building on the previous successes in Shenyang, China (2019), is proud to be in the 2nd consecutive conference year. We are organizing the 2020 MMIA Conference at Changzhou organized by Changzhou Institute of Mechatronic Technology, China. It will feature a technical program of refereed papers selected by the International Program Committee, keynote address.
xi
Conference Venue Shangri-La Hotel, Changzhou
Shangri-La Hotel, Changzhou, is located in the Changzhou Wujin High-Tech Industrial Development Zone, adjacent to the Yanjiang Expressway exit, close to the flooded city of Spring Park and Yancheng Soo. Joyland is only 20 minutes away, and the China Dinosaurs Park is only 25 minutes away. The hotel has some of Changzhou’s restaurants, for example: Shang Palace, Café long, Lobby Lounge, WJ Bar, and Nishimura. The journey from Changzhou International Airport to Shangri-La Hotel, Changzhou, takes approximately 45 minutes. The hotel is accessible from the airport by taxi and limousine. Taxis are metered. Starting fares are at RMB 9 for the first 3 kilometers, and RMB 1.8 per kilometer thereafter. Taxis can be hired for a day, and the fare is negotiable. A surcharge applies after 11 pm, making the rate approximately 40% higher. The hotel can be booked at https://www.shangri-la.com/changzhou/shangrila/ Address: 2 Xihu Road, Wujin Hi-Tech Industrial Park, Changzhou, 213164, China Phone: (86 519) 6889 8888 E-mail: [email protected]
xiii
xiv
Conference Venue
https://cn.bing.com/maps?FORM=Z9LH4
Conference Program at a Glance
Wednesday, June 17, 2020, Shangri-La Hotel, Changzhou 14:00-22:00 Registration Thursday, June 18, 2020 9:00-10:00 Opening ceremony 10:00-10:40 Keynote 1: Vijayan Sugumaran 10:40-11:00 Coffee break 11:00-11:40 Keynote 2: Xiao Wei 12:00-14:20 Lunch time & break 14:20-15:00 Keynote 3: Shunxiang Zhang 15:00-15:20 Coffee break 16:00-17:30 Short paper posters 19:00 Banquet/awards Friday, June 19, 2020 8:20-12:20 Session 1 Session 2 Session 3 12:40-14:00 Lunch time & break 14:20-18:20 Session 4 Session 5 Session 6 Session 7 19:00 Closing
1st floor lobby Tianmu Lake, 3rd floor Tianmu Lake, 3rd floor Tianmu Lake, 3rd floor Buffet, 1st floor Tianmu Lake, 3rd floor Baiheting, 3rd floor Tianmu, Lake 3rd floor Yizhouge, 3rd floor Hongmei, 3rd floor Zijing, 3rd floor Buffet, 1st floor Yizhouge, 3rd floor Hongmei, 3rd floor Zijing, 3rd floor Jurentang, 3rd floor
xv
MMIA 2020 Keynotes
Understanding Differentiated Internet Use in Older Adults Vijayan Sugumaran Professor of Management Information Systems and Chair of the Department of Decision and Information Sciences at Oakland University, Rochester, Michigan, USA.
Vijayan Sugumaran is Professor of Management Information Systems and Chair of the Department of Decision and Information Sciences at Oakland University, Rochester, Michigan, USA. He is also Co-Director of the Center for Data Science and Big Data Analytics at Oakland University. He received his Ph.D. in information technology from George Mason University, Fairfax, Virginia, USA. His research interests are in the areas of big data management and analytics, ontologies and semantic web, and intelligent agent and multi-agent systems. He has published over 200 peer-reviewed articles in journals, conferences, and books. He has edited twelve books and serves on the Editorial Board of eight journals. He has published in top-tier journals such as Information Systems Research, ACM Transactions on Database Systems, Communications of the ACM, IEEE Transactions on Big Data, IEEE Transactions on Engineering Management, IEEE Transactions on Education, and IEEE Software. He is Editor in Chief of the International Journal of Intelligent Information Technologies. He is Chair of the Intelligent Agent and Multi-Agent Systems mini-track for Americas Conference on Information Systems (AMCIS 1999–2020). He has served as Program Chair for the 14th Workshop on E-Business (WeB2015), the International Conference on Applications of Natural Language to Information Systems (NLDB 2008, NLDB 2013, NLDB 2016, and NLDB 2019),
xix
xx
V. Sugumaran
the 29th Australasian Conference on Information Systems (ACIS 2018), the 14th Annual Conference of Midwest Association for Information Systems, 2019, and the 5th IEEE International Conference on Big Data Service and Applications, 2019. He also regularly serves as Program Committee Member for numerous national and international conferences.
Concept Evolution Analysis Based on the Dissipative Structure of Concept Semantic Space Professor Xiao Wei Shanghai University, China
Xiao Wei received his BS degree in computer application technology from Shandong University, China. Now, he is Professor at Shanghai University, China. Concurrently, he is a visiting scholar at City University of Hong Kong. His main research interests include web mining, semantic search, and e-learning.
xxi
Micro-blog Topic Recommendation Based on Knowledge Flow and User Selection Professor Shunxiang Zhang Anhui University of Science and Technology, China
Shunxiang Zhang received his Ph.D. degree from the School of Computing Engineering and Science, Shanghai University, Shanghai, in 2012. He is Professor at Anhui University of Science and Technology, China. His current research interests include web mining, semantic search, and complex network.
Oral Presentation Instruction 1 Timing: a maximum of 10 minutes total, including speaking time and discussion. Please make sure your presentation is well timed. Please keep in mind that the program is full and that the speaker after you would like their allocated time available to them. 2 You can use CD or USB flash drive (memory stick), and make sure you scanned viruses in your own computer. Each speaker is required to meet her/his session chair in the corresponding session rooms 10 minutes before the session starts and copy the slide file (PPT or PDF) to the computer. 3 It is suggested that you e-mail a copy of your presentation to your personal inbox as a backup. If for some reason the files cannot be accessed from your flash drive, you will be able to download them to the computer from your e-mail. 4 Please note that each session room will be equipped with a LCD projector, screen, point device, microphone, and a laptop with general presentation software such as
xxiii
xxiv
S. Zhang
Microsoft PowerPoint and Adobe Reader. Please make sure that your files are compatible and readable with our operation system by using commonly used fonts and symbols. If you plan to use your own computer, please try the connection and make sure it works before your presentation. 5 Movies: If your PowerPoint files contain movies, please make sure that they are well formatted and connected to the main files.
Short Paper Presentation Instruction 1. Maximum poster size is 0.8 meter wide by 1 meter high. 2. Posters are required to be condensed and attractive. The characters should be large enough so that they are visible from 1 meter apart. 3. Please note that during your short paper session, the author should stay by your short paper to explain and discuss your paper with visiting delegates.
Registration For the registration information, each regular paper author needs to pay 1500 RMB including one banquet and 2 lunch buffets in the hotel. For the short paper (paper length is lower than 6 pages), authors need to pay 750 RMB (no banquet and buffet). The account information is as follows. Please add your paper ID with your transaction. 开户单位:常州机电职业技术学院 银行账号:10605701040004030 开 户 行:农行邱墅支行 电 话:0519-86331888 纳税人识别号:123200004660069658 地址:武进鸣新中路26号
About Changzhou Vocational Institute of Mechatronic Technology
Changzhou Vocational Institute of Mechatronic Technology is a provincial public full-time higher vocational college. Founded in 1963, it was formerly known as Changzhou Mechanical Vocational School. In 2002, the school was independently upgraded to a higher vocational college and is affiliated to the Education Department of Jiangsu Province. In 2010, the school became a national model (backbone) vocational college; in 2018, the school became a high-level vocational college construction unit in Jiangsu Province. The school covers an area of 942 acres and a building area of over 300,000 square meters. There are more than 11,000 full-time students (nearly 400 international students) and more than 700 teaching and administrative staff.
xxv
xxvi
About Changzhou Vocational Institute of Mechatronic Technology
Changzhou Vocational Institute of Mechatronic Technology is rooted in the industry and serves the locality. It has formed a professional structure with “equipment manufacturing industry as the core and manufacturing service specialty as the support”, and has opened more than 40 majors. The school has 9 secondary schools (School of Mechanical Engineering, School of Electrical Engineering, School of Mold Technology, School of Vehicle Engineering, School of Rail Transit, School of Information Engineering, School of Economics and Management, School of Creative Design, School of International Education), 3 Departments ( The Ministry of Culture, the Ministry of Professional Foundations, the Ministry of Physical Education) and 14 teaching departments including the Marxist College and the College of Continuing Education.
Contents
Part I: Multi-modal Informatics for Business and Management Applications Spectrum Sensing Method in Multi-primary Users Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhijun Gao, Li Dai, Xin Wang, Languang Zhao, and Jianshun Liu
3
ICT-Based Information Platform Architecture of Maritime Cargo Transportation Supply Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . Yue Zhao, Changfu Yuan, Jiabao Du, and Yi Wang
9
Under the Background of Digital College Financial Problems Existing in the Informatization Construction and Solving Suggestion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hongxu Gao Collaborative Workflow-Based Enterprise Information System . . . . . . . Bin Huang, Qilong Teng, and You Tang
16 22
E-Commerce Profit Evaluation of Agricultural Products Based on Grey Prediction Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . Shuangying Liu
28
Customer Segmentation and Management of Online Shops Based on RFM Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yulu He and Yanxia Cheng
34
Digital Service Evaluation System Based on Enterprise Operation Management Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chaohu He, Xiong Qi, and Li An
42
Information Disclosure Violation of Small and Medium-Sized Listed Companies Based on Strauss’ Grounded Theory . . . . . . . . . . . . . Ronghui Xu
47
xxvii
xxviii
Contents
Evaluation Modeling Establishment for the Risk Degree of Ship Collision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hongdan Liu, Yue Sun, and Bing Li
54
Choice of Profit Models for the Transformation and Development of Traditional Industrial Enterprises in the Internet Industry . . . . . . . . Shanshan Wu, Xingpei Ji, and Rui Tang
64
Influence of Internet Finance on Commercial Bank Financial Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zi Wang
70
Evaluation of Mixed Ownership Reform Based on Fuzzy Logic . . . . . . Hualei Zhang, Jian Zhao, Liling Huang, and Jing Wang
76
Development of Cross-Border E-commerce Based on Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Huanhuan Ma
84
Methods of Making Courseware for College English Teaching in the Information Age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lin Zhang and Jianli Guo
90
Performance Evaluation of Guangdong Province Technology Finance Based on DEA Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Junfeng Zhao, Xue Deng, Lu Shen, Cuirong Huang, and Chuangjie Chen
96
Traceability System Construction of Agricultural Products Cross-Border E-commerce Logistics from the Perspective of Blockchain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Yulin Luo and Chao Xie Express Delivery Services Customer Satisfaction Based on PLS_SEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Huali Cai, Xuemei Wei, Fang Wu, Yanjun Gu, and Ning Zhang Expectation to the Accounting Personnel Under the Information Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Xiuqing Wang Brand Strategy Management of Agricultural Products Based on Information Age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Chunming Liu A Brief Analysis of the Innovation of International Trade Methods Based on Network Economy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Yushu Ding
Contents
xxix
Financial Management Teaching Mode Based on MOOC Under the Background of Informatization . . . . . . . . . . . . . . . . . . . . . . . 137 Zhe Wang Supply Chain Financing Strategy in Sports Industry Based on Game Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Shujuan Li Risk Evaluation of Project Bidding Based on TOPSIS Model . . . . . . . . 150 Wanfeng Liu, Yiqiong Gao, Tiecheng Yan, and Lixiang Cao The Chain Operation Model of Private Kindergartens in Shanxi Based on Optimal Dynamic Programming . . . . . . . . . . . . . . . . . . . . . . . 158 Zhaojun Pang Internal Control of Enterprise Finance Based on SQL Database and Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Bingxiang Li, Rui Tao, and Meng Li Financial Sustainable Growth of SUNING Based on the Network Economy Service Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Yige Ma Logistics Transfer Center Planning Based on Internet of Things Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Hongzhen Zhang, Guibin Zhang, and Xiaohua Cai Consumers’ Purchasing Intention of Regional Brand on E-commerce Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Jing Xu and Zhiling Tian Review of Studies on the Public-Private Partnership (PPP) for Urban Infrastructure Projects in China . . . . . . . . . . . . . . . . . . . . . . 190 Justin Wouagabe and Du Juan Part II: Mobile and Cloud Technologies and Multi-modal Systems Interaction Mode of “Digital Museum” on the Terminal of Digital Mobile Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Hongjiang Liu English Teaching at College in Virtual Environment Based on Visualization Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Lijun Deng and Tao Wang Network-Based College English Multimedia Teaching Model . . . . . . . . 217 Qian Yang Visual Module R&D of the Intelligent Grabbing System of WIFI Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Shufang Ma, Jiang Wu, Shuangben Jiao, and Bin Xue
xxx
Contents
The Design of Modern Shouzhou Kiln Porcelain from the Perspective of Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Gang Liu and Wei Jiang Teaching Activity Design Based on the Discipline Key Competence of IT in Secondary Vocational School . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Penglong Zhang, Yongsheng Zhang, Lining Liu, and Wenqian Sun The Local University Based on Web Service Technology Finance Internal Control System Optimization Research . . . . . . . . . . . . . . . . . . 246 Caiping Qin Teaching Activity Model of “PHP Website Development Technology” Course Reform Under the Background of Wisdom Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Rongxia Wang and Baiqiang Gan The Application of Computer Network Technology in the Sharing of Enterprise Financial Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 Lingjun Zhu Analysis of Influencing Factors and Countermeasures of Computer Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 Yanli Liu and Meng Cui Computer Network Technology-Based College English Oral Course Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Jie Huang and Juan Yi Functional Requirements of FPS Mobile Games Users Based on KANO Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Xiyuan Wang, Danping Chen, and Ting Fu Assumption of Load Balancing and Multithreading Algorithm in Cloud Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 Zhuo Li, Lili Ma, and You Tang Research and Design of School’s SOA Architecture Based on UDDI . . . 291 Yong Chen and Yue Yang Application of Mixed Teaching Mode Under “Rain Classroom” Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Jun Luo and Yulan Yu Design and Development of Self Built Database of University Library Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Ziqi Jia Exploration and Reflection on the Construction of University Archives Management System Under the Background of Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Yan Sun
Contents
xxxi
Cloud Computing with Heavy CNC Machine Tools . . . . . . . . . . . . . . . . 319 Juan Shao Application of Modern Information Technology in Course Teaching in Universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 Ying Li and Jinliang Wang Measurement of the Relevance of Energy Internet Industry Based on Co-integration Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Shanshan Wu and Rui Tang The Application of FIRD Book Positioning Technology in Intelligent Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Yu Zhao Blended Teaching Mode of Intermediate Financial Accounting Course Under the Background of “Internet +” . . . . . . . . . . . . . . . . . . . 347 Libin Xie Migration and Integration Strategy of Virtual Machines in Cloud Data Center Based on HPGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Zhenxiang He Analysis and Comparison of Routing Protocols in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Binbin Yu Analysis of Cross-Cultural Communication from the Angle of Ecological Information Construction . . . . . . . . . . . . . . . . . . . . . . . . . 368 Rui Dai Shoot Rate in Basketball Game Based on Metal Sensor . . . . . . . . . . . . . 374 Xi Li College English Teaching System Based on Resource Library and Network Support Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Shasha Zeng Communication Network Transmission Optimization Algorithm . . . . . . 391 Hongchang Liu, Yizhao Liu, Chi Zhang, and Yang Zheng Distribution Network Planning and Design Supported by PSO-AFSA Hybrid Optimization Algorithm . . . . . . . . . . . . . . . . . . . 400 Chao Xun, Jieyun Zheng, Keyao Lin, Tingting Lin, and Fen Xiao Security and Privacy of 5G Intelligent Subway Network . . . . . . . . . . . . 408 Zheng Zhang Research of College Online Teaching System Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Chang Liu and Xiaoyu Ge
xxxii
Contents
Part III: AI, VR, Blockchain Applications and Innovations Application Research of the New Mode of “Blockchain + Higher Education” . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Zhenxing Ge and Ying Hu Design and Implementation of Online Art Education Software Under the Background of Education Informationization 2.0 . . . . . . . . . 431 Changcheng Cui Exploration of Interactive Urban Sculpture Based on Augmented Reality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 Shukui Song and Yushan Zhong A Mean-Continuous Fuzzy Random Entropy Portfolio Model with Fuzzy Random Returns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 Quande Sun, Junfeng Zhao, Xue Deng, and Yingxian Lin Restructure of Data Mining Based Delicacy Management Platform for College Students . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451 Weihong Chen Application and Development of Music Production Technology in the New Media Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 Wei Wang Clothing Display Method Based on VR Technology . . . . . . . . . . . . . . . . 461 HuiJuan Lai and Sungwon Lee Text Classification Model for Public Opinion Management in Colleges and Universities Based on Improved CNN . . . . . . . . . . . . . . 467 Wenliang Luo and Jiaqiong Gao Comprehensive Teaching Mode Based on Blockchain . . . . . . . . . . . . . . 473 Qiang Huang, Xingjing Mao, Mantao Wang, and Xinhui Feng Evaluation Strategy of Teacher Professional Development in Applied Universities Based on BP Neural Network . . . . . . . . . . . . . . 479 Guohua Fu Augmented Reality Technology Key Technologies Research . . . . . . . . . 487 Hejia Li, Xilong Chen, Fushan Yao, Fei Gao, Jiuchao Li, Kai Yang, and Zhao Jin Application Research of Virtual Reality and Augmented Reality . . . . . . 494 Hejia Li, Yao Zhao, Fei Gao, Yun Li, Chao Tu, Kai Yang, Zhao Jin, and Xinchun Huang Word Frequency Analysis and Intelligent Word Recognition in Chinese Literature Based on Neighborhood Analysis . . . . . . . . . . . . . 500 Chunhua Liu
Contents
xxxiii
A New Representation of Plane Composition in Computer Graphics Software Aided Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507 Dongmei Zhang Optimization of Maintenance Strategy for Deteriorated Parts Based on Markov Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Li Jiuchao, Liang Zhou, and Qi Ou Digital Technology-Based Pedagogy for Interpreting . . . . . . . . . . . . . . . 521 Hui Ye The Virtual Restoration of Worship Scene on Circular Mound Altar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528 LeiFang Chu Problems and Strategies of Financial Accounting Informationization of Small and Medium-Sized Enterprises Based on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535 Xingdong Zhang and Hua Cai Deep Integration of Mixed Teaching and Interactive Media Under Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541 Caihong Chen Influence of “Corpus Data Driven Learning + Learning Driven Data” Mode on ESP Writing Under the Background of Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 Zheqian Su, Miao Liu, Man Jiang, and Yongwei Shang The Applied Research of Teaching Reform of Computer Major Using Virtual Reality Technology to Promote . . . . . . . . . . . . . . . . . . . . 553 Wei Sai Application and Development Trend of Blockchain in the Financial Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558 Danni Zhao Ideological Education Under the 3D Virtual Scene Applied Research in Organizational Behavior Course . . . . . . . . . . . . . . . . . . . . . 565 He Yu and Qinglan Luo Virtual Reality Real-Time Communication System . . . . . . . . . . . . . . . . 572 Jia Fu Prediction Method of Basketball Players’ Shooting Rate Based on Quantum Search Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583 Zheng Yang Algorithm of Ground Stability Correction for High Difficulty Movements of Competitive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593 Mingming Gong
xxxiv
Contents
Application Research and Analysis of College Pole Dance Teaching Based on Virtual Reality Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . 602 Hongbo Yu Dual Discriminator Generative Adversarial Networks and Their Application in Detecting Nests Built in Catenary . . . . . . . . . . 611 Zeyu Lian Professional Development of College Teachers in the Era of Artificial Intelligence: Role Rebuilding and Development Path . . . . . 618 Yinjia Miao and Yi Yao Supplier Evaluation and Selection Based on BP Neural Network . . . . . 627 Jinting Wang Study on Water Quality Prediction of Fuxian Lake Based on Elman Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635 Shengping Zhao, Quan Wang, and Jingrui Li Part IV: Multi-modal Informatics and Big Data Adaptive Online Learning Model Based on Big Data . . . . . . . . . . . . . . . 643 Guoping Lei, Xiuying Luo, Sen Yang, and Ke Xiao TCM Prescription Compatibility Based on Improved Association Rules Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650 Mengnan Li and Xiaoqiang Ren Feature Analysis of Chinese Drama Based on Big Data Analysis . . . . . . 657 Chunhua Liu Voltage Unbalance Factors of Doubly-Fed Wind Generator Based on Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664 Na Wang and Lei Wang Cultural and Creative Design Service of Faw Red Flag Car Based on Big Data Analysis Is Integrated with Automobile Industry . . . 670 Jingyi Chen The C-E Translation of Passive Structure in Tourist Texts Based on Corpus Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 Dan Shen and Huifang Liu The Influence of Chinese Traditional Culture in the Process of Teaching and Education Based on Big Data Analysis . . . . . . . . . . . . 683 Jianqiang Li The Problems and Countermeasures of University Financial-Management in the Era of Big-Data . . . . . . . . . . . . . . . . . . . . 689 Xiaoyan Ma
Contents
xxxv
Construction of Churn Customer Analysis System for Telecom Companies Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695 Li Wei and Hui Xie Application of Big Data Technology in National Emergency Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702 Yongmei Tao Vehicle Refueling Behavior Model Based on Spatio-Temporal Big Data Monitoring Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708 Wenbin Wang Construction of Information Auditing Curriculum for Auditing Major in Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714 Renzao Lin Big Data Technology in Construction Management Informationization in Complex Environment . . . . . . . . . . . . . . . . . . . . . 720 Ping Liu Higher Vocational Teaching Management System Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725 Shuyu Shi Influencing Factors of College Students’ Entrepreneurship Based on Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731 Heng Zhang Discussion on the Application of Computer Technology in the New Media Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737 Xiaona Li Evaluation of Scientific and Technological Innovation Capability in Guangzhou Based on Cross-Efficiency DEA . . . . . . . . . . . . . . . . . . . . 743 Xue Deng, Ying Liang, Luyao Feng, Chuangjie Chen, and Junfeng Zhao Computer Security Vulnerabilities and Preventive Measures . . . . . . . . . 752 Binbin Jiang Tolerance of the General Public to Homosexuality Based on Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760 Pengnian Jin and Xiao Wan Heterogeneous Network Security Monitoring and Association Algorithm for Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767 Zhenqi Liu, Yangchun Gao, and Deqiang Shao Commodity Trading Platform Based on Big Data Analysis . . . . . . . . . . 773 Zhiqiang Cai and Jiaai Zhang
xxxvi
Contents
Transformation and Upgrading of Fresh E-Commerce Mode Based on Big Data Conception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781 Ping Yang, Jing Wang, and Liqin Hu Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789
Part I: Multi-modal Informatics for Business and Management Applications
Spectrum Sensing Method in Multi-primary Users Environment Zhijun Gao, Li Dai, Xin Wang(&), Languang Zhao, and Jianshun Liu Information and Control Engineering Faculty, Shenyang Jianzhu University, Shenyang, People’s Republic of China {gzj,wangx7988}@sjzu.edu.cn, [email protected], [email protected], [email protected]
Abstract. Aiming at the problem of time-varying channel and perceptual delay in multi-primary users environment, a spectrum sensing method in multiprimary users environment is proposed. The method combines the primary user state, fading channel gain and unknown perceptual delay, estimates the fading channel gain by the maximum a posteriori probability criterion, and introduces it into the perceptual delay particle filter estimation process, and estimates the primary user state. The result is corrected to give a final estimate. The simulation results show that the proposed method eliminates the uncertainty of the received signal information and improves the correct detection probability of the method to a certain extent in multi-primary users environment. Keywords: Multi-primary users Spectrum sensing Channel gain Perceived delay Single point detection
1 Introduction As the demand for wireless communication users increases, the problem of low spectrum utilization becomes more and more prominent [1], cognitive radio technology can better solve this problem [2] and spectrum sensing is the focus of development of cognitive radio technology [3]. In practice, most of the existing multi-primary users perception methods have certain information uncertainty, which leads to a decrease in perceptual accuracy in the actual estimation process. In [4], which adopts the channel fading factor. Modeling is performed to describe the characteristics of primary user (PU) states and channel fading factor migration over time. In [5] proposes a joint estimation method based on Kalman filter for carrier frequency offset and channel fading information. In [6] introduces the estimation of channel delay based on the literature [5]. This method can improve the accuracy of statistical characteristics to a certain extent, but does not give an effective time delay estimation method and lacks dynamic adaptability. This paper proposes a spectrum sensing method in a multi-primary users environment for the above problems. By estimating the fading channel gain, it is introduced into the perceptual delay estimation, and then the primary user state estimation is obtained. This method makes full use of prior information and improves the accuracy of spectrum sensing. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 3–8, 2021. https://doi.org/10.1007/978-3-030-51431-0_1
4
Z. Gao et al.
2 System Model Defining the state of PUj in the target spectrum at slot n as xj;n 2 f0; 1g, let xj;n ¼ 0 denotes the PUj is inactive state at slot n, xj;n ¼ 1 denotes the PUj at slot n is active state. Set up two PUs in our sensing model, there are three states in this situation: H0 indicates that both PUs are inactive; H1 indicates that PU1 is active and PU2 is inactive; H2 indicates that PU1 is inactive and PU2 is active [7]. Defining the perceived delay as tn , we sample M times during the sensing period, that is tn 2 ½0; M. In one sensing period, the front tn samples contain only the noise signal, the latter M tn samples contain both the PU signal and the noise signal [8]. The observed signal of SU is defined as the sum of the energy of the M sampled signals in a sensing period, and the channel noise z obeys Gaussian white noise with mean 0 and variance r2 . 8 M P > > ðz1;n;m þ z2;n;m Þ2 H0 > > > m¼1 > > < P tn M P z21;n;m þ ða1;n x1;n þ z1;n;m Þ2 yn ¼ > m¼1 m¼tn þ 1 > > > tn M > P P > 2 > z2;n;m þ ða2;n x2;n þ z2;n;m Þ2 : m¼1
m¼tn þ 1
H1
ð1Þ
H2
3 Multi-primary Users Estimation Algorithm 3.1
Estimation of Channel Gain
We first make a pre-estimation. It is assumed that the received signal is generated by the minimum gain and the signal is sampled [9]. Then, according to the sampling signal energy and the minimum gain of the fading channel, a threshold is set. If the signal energy is above the threshold, it is determined that the frequency band is occupied, otherwise, it is inactive. There are multiple slots in the coherence time, which can be divided into the first slot and the non-first slot and can be distinguished by a residual function. According to the above two steps, four situations can be obtained. When x ¼ 0 and the first slot, the gain can be calculated by Markov chain transition probability; When x ¼ 0 and the non-first slot, the state of the previous time slot can be used to indicate the current slot; When x ¼ 1 and the first slot, the estimation of the gain in current slot can be achieved by the MAP criterion [10]; When x ¼ 1 and the non-first slot, the gain can be estimated from cumulative observations over coherent time.
Spectrum Sensing Method in Multi-primary Users Environment
3.2
5
Joint Estimation Algorithm
1) Prediction Defining PU active at both slot n and n + 1 is survival probability, PU inactive at slot n but active at slot n + 1 is birth probability. The PU active probability is expressed as qj;njn1 ¼ pb;j;n ð1 qj;n1jn1 Þ þ ps;j;n qj;n1jn1
ð2Þ
Where pb;j;n and ps;j;n respectively represent the dynamic birth probability and dynamic survival probability of the primary user at slot n [11]. ps;1;n ¼ pH1 !H1 q1;n1jn1 ð1 q2;n1jn1 Þ
ð3Þ
ps;2;n ¼ pH2 !H2 ð1 q1;n1jn1 Þ q2;n1jn1
ð4Þ
pb;1;n ¼ pH0 !H1 ð1 q1;n1jn1 Þð1 q2;n1jn1 Þ þ pH2 !H1 ð1 q1;n1jn1 Þq2;n1jn1
ð5Þ
pb;2;n ¼ pH0 !H2 ð1 q1;n1jn1 Þð1 q2;n1jn1 Þ þ pH1 !H2 q1;n1jn1 ð1 q2;n1jn1 Þ
ð6Þ ðiÞ
Suppose the state of particle i at slot n-1 is expressed as tj;n1jn1 . The survival particle and the birth particle weight prediction expressions are respectively as ðiÞ
ps;j;n qj;n1jn1 ðiÞ ej;n1 ; i ¼ 1; 2; ; N qj;njn1
ð7Þ
pb;j;n ð1 qj;n1jn1 Þ 1 ; i ¼ 1; 2; ; N þ B qj;njn1 B
ð8Þ
ej;njn1 ¼ ðiÞ
ej;njn1 ¼
2) Update It can be approximated that the likelihood function obeys a normal distribution. When both PU1 and PU2 inactive, the mean and variance of likelihood function p yn jxj;n ¼ 0 is l0 ¼ Mr2 and r20 ¼ 2Mr4 ; when PU1 or PU2 active, the parameter of ðiÞ a2j;n and r2j ¼ 2Mr4 þ likelihood function p yn jxj;n ¼ 1 is lj ¼ Mr2 þ ðM tj;njn1 Þ^ ðiÞ
4ðM tj;njn1 Þ^a2j;n r2 . Then we can obtain the likelihood probability by the likelihood NP þ B p y jx ¼0 ð n j;n Þ ðiÞ function and particle weights as Ij;n ¼ p y jx ¼1 ej;njn1 . i¼1 ð n j;n Þ
6
Z. Gao et al.
Use the above formula to update the PU active probability and the particle weights qj;njn ¼
Ij;n qj;njn1 1 qj;njn1 þ Ij;n qj;njn1
ð9Þ
ðiÞ 0ðiÞ ej;njn ¼ p yn jxj;n ¼ 1 ej;njn1
ð10Þ ðiÞ
ðiÞ
After normalization and resampling, we can obtain that tj;njn , ej;njn , i ¼ 1; 2; N. 3) Estimation The primary user active probability is compared with the decision threshold k. If qj;njn \k, the PU is judged to inactive; if qj;njn k, the PU is judged to active. When both PUs active, the judgment result is corrected by comparing the magnitudes of q1;njn and q2;njn . If q1;njn [ q2;njn , PU1 is considered as active and PU2 is considered as inactive, otherwise, the same is true.
4 Simulation The spectrum sensing performance is mainly measured by the false alarm probability and the missed detection probability. In this simulation, we consider the effect of the maximum Doppler shift on the sensing performance of the fading channel. Sampling 100 times in the sensing period and the maximum Doppler frequency shift is set to 0.02, 0.05, and 0.1. The result of spectrum sensing is shown in Fig. 1, which shows that the correct detection probability increases with the increase of SNR. At the same time, as the maximum Doppler shift increases, the channel variation accelerates and the corresponding detection performance also decreases. We also consider the impact of perceived delay range on detection performance. Sampling 100 times in the sensing period and the range of perceived delay Rt is set to 20, 50, and 80 respectively. The result of spectrum sensing on the target spectrum is shown in Fig. 2, since the sampling signal contains both noise signal and primary user signal, the smaller delay range, the more information is obtained (Fig. 3).
Spectrum Sensing Method in Multi-primary Users Environment
7
Fig. 1. Detection performance under different maximum Doppler shifts
Fig. 2. Detection performance under different perceptual delay ranges
Fig. 3. Comparison of detection performance between different algorithms
Finally, compare the detection performance of this algorithm with other existing algorithms. The algorithm considers the relationship between gain and delay, which greatly eliminates the information uncertainty of the sampled signal. Therefore, the proposed algorithm is better than its comparison algorithm.
8
Z. Gao et al.
5 Conclusions This paper proposes a spectrum sensing method in a multi-primary users environment. The primary user state estimate is obtained by estimating the fading channel gain and the unknown perceived delay. By analyzing the correct detection probability under different channel states and different perceptual delays, the validity and accuracy of the spectrum sensing in the multi-primary user environment are verified. The simulation results show that the proposed method improves the spectrum sensing performance of multi-primary users while ensuring real-time performance. Acknowledgment. This work was supported by National Natural Science Fund (Grant No. 61473066), Liaoning Province Natural Science Fund (Grant No. 20170540752), Liaoning Province Doctor Startup Fund (Grant No. 20170520444) and the Support Foundation of Shenyang Jianzhu University (Grant No. 2017034) respectively.
References 1. Zhang, Z., Zhang, W., Zeadally, S.: Cognitive radio spectrum sensing framework based on multi agent architecture for 5G networks. IEEE Wirel. Commun. 22(6), 34–39 (2015) 2. Budaraju, S., Bhagyaveni, M.: A novel energy detection scheme based on channel state estimation for cooperative spectrum sensing. Comput. Electr. Eng. 57, 176–185 (2017) 3. Liu, Y., Liang, J., Xiao, N.: Spectrum sensing method based on past channel sensing information. J. Commun. 38(8), 118–130 (2017) 4. Li, B., Zhao, C., Sun, M.: Spectrum sensing for cognitive radios in time-variant flat-fading channels: a joint estimation approach. IEEE Trans. Commun. 62(8), 2665–2680 (2014) 5. Simon, E., Ros, L., Hijazi, H.: Joint carrier frequency offset and fast time-varying channel estimation for MIMO-OFDM systems. IEEE Trans. Veh. Technol. 60(3), 955–965 (2011) 6. Dong, Z., Xu, Z., Zhang, S.: Carrier frequency offset and channel joint estimating algorithm for OFDM system base on PF. J. Beijing Univ. Posts Telecommun. 37(22), 48–51 (2014) 7. Sun, D., Xu, R.: Research of two kinds of rayleigh fading channel model. Electron. Measur. Technol. 40(8), 23–26 (2018) 8. Solé-Ribalta, A., De Domenico, M., Gómez, S., Arenas, A.: Random walk centrality in interconnected multilayer networks. Phys. D: Nonlinear Phenom. 323–324(1), 73–79 (2016) 9. Huang, H., Yuan, C.: Cooperative spectrum sensing over generalized fading channels based on energy detection. China Commun. 15(5), 128–137 (2018) 10. Repetti, A., Pereyra, M., Wiaux, Y.: Scalable Bayesian uncertainty quantification in imaging inverse problems via convex optimization. SIAM J. Imaging Sci. 12(1), 87–118 (2019) 11. Saha, S., Özkan, E., Gustafsson, F.: Marginalized particle filters for Bayesian estimation of Gaussian noise parameters. In: 2010 13th International Conference on Information Fusion, pp. 1–8 (2010)
ICT-Based Information Platform Architecture of Maritime Cargo Transportation Supply Chain Yue Zhao(&), Changfu Yuan, Jiabao Du, and Yi Wang Jiangsu Maritime Institute, Nanjing, China [email protected]
Abstract. With the continuous development of network economy, information technology has promoted the development of related enterprises, especially in the transport of maritime cargo has undergone a great change. In the transportation of goods by sea, the traditional supply chain has been unable to adapt to the rapid development of the information economy and has been gradually eliminated. The ict-based maritime cargo transport supply chain emerges as The Times require, greatly enhancing the long-term benefits of the transport industry. At present, ICT technology has become the main technical support of modern maritime cargo transportation supply chain and the core factor of the whole supply chain operation. However, there are still a series of problems in the ictbased maritime cargo transport supply chain, the most important of which is the problem of information exchange in the supply chain. The purpose of this paper is to study the ict-based information platform architecture of maritime cargo transportation supply chain. This article first to the ICT technology and the related concepts of the supply chain of carriage of goods by sea are reviewed, and on the basis of factor analysis algorithm for functional analysis of supply chain information platform for experiment of carriage of goods by sea, on the basis of the information platform for design, finally testing platform operation, proves the scientific nature and reliability of the platform. Keywords: ICT technology Transport supply chain Information platform Factor analysis
1 Introduction With the continuous development of the current economy, the logistics industry is rising rapidly. Marine transportation has the main characteristics of large volume of transportation and low transportation cost, so it has become the first choice for product transportation of most enterprises. The supply chain of maritime cargo transportation is closely related to the efficiency and safety of maritime transportation and the development of maritime transportation. Traditional maritime supply chain has been difficult to adapt to the development of maritime transport, in the process of application there are a series of problems. The ict-based maritime cargo transport supply chain emerges as The Times require, greatly enhancing the long-term benefits of the transport industry. The ict-based maritime cargo transportation supply chain caters to the current © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 9–15, 2021. https://doi.org/10.1007/978-3-030-51431-0_2
10
Y. Zhao et al.
development trend of transportation informatization, and can realize the integration, transmission and sharing of relevant information of maritime cargo transportation, promoting the close connection between transportation links. With the continuous maturity of ICT technology, its application in the transportation industry is also gradually deepened. At present, scholars at home and abroad have conducted a series of studies on the transport supply chain, which mainly focus on specific information service platforms, application and construction of information platforms, but the construction of these information platforms does not take into account the problem of comprehensive coordination among various links [1, 2]. Generally speaking, this research field is mainly divided into two parts. The first part is the research on the integration of ICT and supply chain collaborative management; the second part is the research on supply chain collaborative technology based on ICT [3, 4]. At home and abroad, the researches on the information platform of supply chain of maritime cargo transport mainly focus on one part and fail to consider the overall problem of supply chain. In terms of ICT technology, the research on the framework of information platform of supply chain of maritime cargo transportation is even less. From this perspective, there is still a large room for improvement in this aspect of research [5, 6]. At the same time, we must realize that there are still a series of problems in the current ict-based maritime cargo transportation supply chain establishment process, the most important of which is the problem of information exchange between various links of the supply chain. Therefore, it is particularly important to study the information platform architecture of maritime cargo transportation supply chain. Blank in order to make up for this theory, based on the research focus on the whole process of the supply chain development, first of all, ICT technology and the related concepts of the supply chain of carriage of goods by sea are reviewed, and the factor analysis algorithm is conducted on the basis of function analysis of supply chain information platform for experiment of carriage of goods by sea, on the basis of the information platform for design, finally, the platform run test, proves the scientific nature and reliability of the platform [7, 8]. On the one hand, it promotes the scientific framework of information platform of maritime cargo transportation supply chain; On the other hand, it provides a certain theoretical basis for future relevant studies [9].
2 Overview of Key Technologies of Information Platform Architecture of Maritime Cargo Transportation Supply Chain 2.1
Overview of ICT Technology and Maritime Cargo Transport Supply Chain
ICT technology is information exchange technology, which is relatively complex and mainly used in the processing of various information technologies. Led by network information technology, ICT is an information communication technology system composed of barcode information technology, GIS, RFID, computer technology and distributed processing technology [10, 11]. Bar code technology can convert
ICT-Based Information Platform Architecture
11
information into coherent characters or Numbers and other forms, in essence, is a bar code symbol recognition system. GIS technology can process and analyze spatial data by virtue of network information, so as to establish a geospatial database and accurately track and monitor the routes of maritime cargo transportation [12, 13]. PFID technology is an automatic identification technology, which can automatically identify the transported goods, transport personnel and related transport equipment in different states for a long distance [14]. Computer technology provides ICT system with the support of software system and server, realizes the effective integration of information resources, and enables the effective connection between information to form a complete information network. The distributed processing technology can optimize and upgrade the computing resources, which can greatly improve the efficiency of the system. The most critical is that ICT technology can guarantee the security of information data to the maximum extent [15]. In general, ICT technology makes information data effectively connected, makes data processing convenient and flexible, and realizes effective data mining. The supply chain of maritime cargo transportation is the result of the rapid development of modern transportation mode. The supply chain takes ship as the main carrier of cargo transportation. Through the way of information exchange, the comprehensive penetration of the transportation process is realized. The establishment of this supply chain realizes the organic connection among suppliers, shipping enterprises and end customers, realizes the whole process management of cargo transportation, and penetrates into every link of maritime transportation. 2.2
Factor Analysis Algorithm
Factor analysis is to find out a few random variables that can contain all other variables by studying the relationship existing in the relationship between a number of variables. We call these variables factors. The starting point of factor analysis is to replace most information of the original variables with less independent factor variables. The specific formula is as follows: X1 ¼ a11 F1 þ a12 F2 þ . . . þ a1m Fm X2 ¼ a21 F1 þ a22 F2 þ . . . þ a2m Fm ... Xp ¼ ap1 F1 þ ap2 F2 þ . . . þ apm Fm
ð1Þ
The purpose of factor analysis is to describe the covariance relationship of multiple variables reflecting things with several potential random variables that cannot be directly observed. Since there is a certain correlation between each variable, the measured variable can be converted into a few unrelated comprehensive indicators to reflect various information in the comprehensive variable. Factor analysis is used to analyze the architecture of the information platform, that is, among many variables required by the platform architecture, comprehensive variables are found as the final factor by means of operation.
12
Y. Zhao et al.
The calculation step of factor analysis method is to obtain N samples by means of data collection, and there are A total of p indicators reflecting the characteristics of each sample. The collected data can be represented by matrix A, where the specific calculation formula of A is as follows: n P ay 1p ay i¼1 A ¼ sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi n n P P 1 1 ða ay Þ2 y p p i¼1
ð2Þ
i¼1
3 Function Analysis Experiment of Information Platform of Maritime Cargo Transportation Supply Chain To realize the information platform of supply chain of maritime cargo transportation, the related functions of the platform must be deeply analyzed. On the basis of referring to a large number of data, this paper analyzes and experiments the main functions of the information platform of the supply chain of maritime cargo transportation by means of the factor analysis algorithm, which mainly includes the analysis of business function demand, the analysis of platform function demand and the analysis of non-function demand. The business function is related to the production and operation of the Marine transportation industry, and is the core of the whole platform function. The business function analysis mainly includes the operation management function, the information service function and the information collection function. The analysis of platform functional requirements mainly includes a series of functional requirements such as directory management, metadata management, monitoring and security. Nonfunctional analysis includes performance, extensibility, concurrency, flexibility, and reliability analysis. This paper analyzes the functions of the information platform from the process of the maritime cargo supply chain. Compared with other studies that only focus on the needs of a certain link of the supply chain, this paper considers the functional requirements of the whole supply chain process.
4 Discuss 4.1
Design of Information Platform for Supply Chain of Maritime Cargo Transportation
(1) Overall structure Based on the above functional analysis experiments on the information platform of the maritime cargo transport supply chain, the overall framework of the information platform is divided into the following aspects. Through data processing to grasp the needs of different users, to achieve good services for users; The second part is the customer management part, which is mainly used to deal with the basic information of
ICT-Based Information Platform Architecture
13
users of the platform and realize the maintenance and management of user information. The third part is information service, whose main function is to provide platform users with information inquiry, information consultation and other services; The fourth part is the maritime transport management part, the function of this part is to track the whole process of maritime logistics management, to ensure the safety of cargo transport; The fifth is the logistics product management part, the main function of this part is the design of transportation software products. In addition, it also includes value-added service management, support service management and other additional aspects, which shall not be repeated here. (2) Logical architecture As mentioned above, the supply chain information platform is based on network information technology and constructed by cloud computing. Therefore, based on the three-tier service architecture model of cloud computing, this paper proposes the logical structure of the information platform of maritime cargo transportation supply chain, which mainly includes the following aspects: infrastructure layer, virtual resource layer, cloud platform service layer and software service layer. The infrastructure layer is mainly used for the management of maritime transport facilities to ensure the normal operation of facilities; The virtual resource layer USES cloud computing as the main means to realize the effective storage and management of data. The platform service layer covers a wide range of contents, including not only the bottom service resources but also the upper application software services. The logical framework ensures the sharing and exchange of information in the transport of goods by sea. (3) Technical architecture On the basis of cloud computing, the technical framework of the information platform of maritime cargo transport supply chain is divided into the following four parts: cloud service management, service, security management and resource technology. Cloud service management technology can realize the scheduling and combination of service resources. Cloud security management includes security authentication, login, desktop and access management, which can realize the security protection of data. 4.2
Operation Test of Information Platform of Maritime Cargo Transportation Supply Chain
After the platform design is completed, in order to ensure the smooth operation of the platform, the platform must be tested. Through the running test of the platform, various problems existing in the actual operation of the platform can be found out. The test content mainly includes two important parts: module test and integration test. The specific test results are shown in Fig. 1 and Table 1.
14
Y. Zhao et al.
14000
12000 11921
12000
99.34%
10000
8000 7899
8000
6000 5925
6000
98.75%
4000
98.74%
2000 0
Out of bounds status test
Attendance positioning test
99.40% 99.30% 99.20% 99.10% 99.00% 98.90% 98.80% 98.70% 98.60% 98.50% 98.40%
Broadcast reminder test
Total number of tests (times) Number of successes (times) Fig. 1. Information platform integration test data
Table 1. Test data of information platform module Test content System to enter Function module Integration testing System to enter Function module Integration testing
Total number of tests (times) 8000 15000
Number of successes (times) 7967 14837
Success rate (%) 99.59 98.91
5000
4932
98.64
8000 15000
7916 14891
98.95 99.27
5000
4889
97.78
From the data in Table 1 and Fig. 1, it can be found that the information platform of maritime cargo transportation supply chain has achieved a good effect in the operation process, especially in the core data of the system, the success rate is as high as 99.59%, close to 100%. This shows that the information platform of maritime cargo transport supply chain runs smoothly and is a system that can stand the test.
ICT-Based Information Platform Architecture
15
5 Conclusion The construction of information platform of supply chain of maritime cargo transport is related to the future development of maritime cargo transport. The construction of information platform can manage and exchange various transport information, which is an effective way to realize transport management and improve the efficiency of maritime transportation. At present, the application of ICT technology in the construction of supply chain platform of maritime transport is becoming more and more mature, but at the same time, a series of problems also appear, which must cause us to pay enough attention and realize the scientific framework of supply chain information platform on the basis of solving problems.
References 1. Yeo, C.A.: Land and sea transportation in imperial Italy. Trans. Proc. Am. Philol. Assoc. 77 (13), 221–244 (2017) 2. Laine, J.T., Vepslinen, A.P.J.: Economies of speed in sea transportation. Int. J. Phys. Distrib. & Logist. Manag. 24(8), 33–41 (2017) 3. Endresen, Y.: Emission from international sea transportation and environmental impact. J. Geophys. Res. 108(17), 4560 (2017) 4. Nishibe, T.: Progress of the industry and occupational health: sea transportation. Sangyō Igaku Jpn. J. Ind. Health 21(8), 110–114 (2018) 5. Weintrit, A.: TransNav: international journal on marine navigation and safety of sea transportation. Maritime Saf. 22(15), 117 (2017) 6. Dalsøren, S.B., Endresen, Ã., Isaksen, I.S.A.: Environmental impacts of the expected increase in sea transportation, with a particular focus on oil and gas scenarios for Norway and northwest Russia. J. Geophys. Res. Atmos. 112(32), 125–127 (2017) 7. Nslund, B.: Combined sea and land transportation. J. Oper. Res. Soc. 21(1), 47–59 (2017) 8. Brokking, P., Crona, J.S., Eriksson, I.-M.: SEA in Swedish transportation policy-making and planning - Political ambitions and practice. Environ. Policy & Governance 14(2), 94–104 (2018) 9. Faturachman, D., Mustafa, S.: Performance of safety sea transportation. Procedia - Soc. Behav. Sci. 57(16), 368–372 (2017) 10. Searcy, T.: Bridging islands and calming seas: a material flow management approach to sustainable sea transportation for Fiji”s lower southern Lau islands. Mar. Policy 83(5), 221– 229 (2017) 11. Roth, A.E.: Shaping the economic future sea transportation. Proc. Acad. Polit. Sci. 21(2), 4– 16 (2017) 12. Wisnu, W., Setyo, H.Y., Faisal, S.: Strength analysis and sea-fastening design of container crane structure for heavy lifting sea transportation. Appl. Mech. Mater. 74(15), 147–154 (2017) 13. Br barus, M.d., Asyrafy, H., Nababan, E.: Routing and scheduling optimization model of sea transportation. IOP Conf. Ser.: Mater. Sci. Eng. 30(5):121 (2017) 14. Xie, X.: An integrated sea–land transportation system model and its theory. Transp. Res. Part C Emerg. Technol. 17(4), 394–411 (2019) 15. Ning, R., Xiang, L.I., Zhi-xue, L.I.U.: Optimization model of dry bulk feright in Yangtze River based on river-sea transportation mode and investment constraint. J. Traffic & Transp. Eng. 17(5), 124–129 (2017)
Under the Background of Digital College Financial Problems Existing in the Informatization Construction and Solving Suggestion Hongxu Gao(&) Southwest Minzu University, Chengdu, Sichuan, China [email protected] Abstract. The final development of universities will inevitably move towards the stage of digital management. As an important part of the university construction, the result of the university financial information (FI) construction will directly affect the overall construction of the university digital campus. Under the current background of digitization, the construction of financial informatization in colleges and universities (CAU) is faced with a series of difficulties and challenges, such as many financial work data, difficulties in FI processing and low working efficiency of financial personnel. Based on the brief analysis of the concept of the digital and financial informatization construction, on the basis of using the algorithm for the current problems of the construction of the college finance informationization carried on the thorough analysis, and combined with the actual situation of financial informatization, puts forward the relevant solution, can promote the rapid implementation of college finance informationization, for future related research provides a theoretical basis. Keywords: Digital background Financial informatization construction FI construction algorithm
University
1 Introduction With the progress of network technology and scientific level, China has entered the digital information era is an inevitable result of the construction of CAU [1]. Under the background of digitization, higher requirements are put forward for the construction of CAU. FI construction in CAU is the premise and foundation of realizing modernization and information management in CAU [2, 3]. It is of great significance to strive to realize the construction of financial informatization in CAU, which is embodied in various aspects. In particular, it improves the use efficiency of funds in CAU to the greatest extent, and shows a important role in promoting the development of college education [4, 5]. However, the management of financial department has been unable to Funded Project of Fundamental Research Funds for Central Universities of Southwest Minzu University. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 16–21, 2021. https://doi.org/10.1007/978-3-030-51431-0_3
Under the Background of Digital College Financial Problems
17
keep up with the pace of information development. At present, there are still many problems that cannot be ignored in the construction of financial informatization in CAU in China, which hinder the construction progress of digital campus. Therefore, it is necessary to speed up the solution [6]. Realizing the construction of financial informatization in CAU is an important guarantee for improving the efficiency of financial work in CAU, realizing the reasonable allocation of resources in CAU, and realizing the modernization of financial management as soon as possible [7, 8]. Domestic and foreign scholars have also conducted many studies on the informatization construction of CAU, some of which are based on the construction of accounting informatization, and some of which also put forward methods and strategies to build a financial informatization platform according to relevant actual conditions. These studies also play a significant role in promoting the construction of financial informatization [9, 10]. In order to fill this theoretical gap, based on a brief analysis of the concepts of digitization and FI construction, this paper makes an in-depth analysis of the current problems of FI construction in CAU with the help of relevant algorithms, and proposes relevant solutions based on the actual situation of FI construction.
2 Method 2.1
Digitalization Concept
Digital is by means of the relevant network information technology, and through setting up special program management, on the basis of the data as a whole to realize the management, to information construction of CAU financial offers a variety of ways, for the construction of university financial platform to provide more advanced intelligent means, made more scientific and accurate FI construction in universities. Digitalization has a very large application space. 2.2
FI Construction Algorithm
The construction algorithm of FI refers to the specific classification results of FI of CAU after centralized correlation, classification and processing of relevant financial data. In order to realize the construction of FI, correlation of financial data is the most important prerequisite. Among them, the lowest financial gap value is represented by target data, and set as, the specific calculation formula is as follows: d2 ðkÞ = ½z ^zðk þ 1=kÞS1 ðk + 1Þ½z ^zðk + 1=kÞ
ð1Þ
Where, z represents the maximum gap of financial data, and S represents the overall set of financial data. Then, the terminal feedback of FI is carried out with the help of kalman filter algorithm, and the standard FI value is compared with the feedback, so that the financial state variable can be updated constantly. This algorithm can quickly process and calculate the financial state variables of complex financial data. The specific formula is as follows:
18
H. Gao
Xk = Fk=k1 Xk1 + Tk1 Uk1
ð2Þ
Where, Xk/k−1 represents the state vector and detection vector under the k data set; Fk/k−1 is the state transition matrix. Uk is the interference data at the moment k; Tk is the control moment of the system.
3 Experiment In order to test the accuracy of FI construction algorithm, three different groups of university financial data are selected for relevant simulation experiments. At the same time with the help of MATLAB software to obtain financial target data, to achieve the in-depth analysis of the target financial data. The first step is to associate and centralize the data. Accurate centralization and correlation of financial data of CAU is an important prerequisite for constructing financial informatization, and effective centralization and feedback of financial informatization data are provided. Then the data information with the smallest difference in FI is the required target information, namely d2(k), whose function is to realize the synchronous update of target information. The second step is to make a detailed selection and classification of financial data. With the help of formula (2), the terminal financial feedback information is screened and classified, the standard FI value and the feedback FI value are comprehensively compared and analyzed, the state variable of FI is calculated synchronously, and the estimated value of the required financial data is calculated. The third step is to track the financial target data. Main detection index is the FI of the target data information, can use the terminal feedback information FI database of relevant FI, in the case of known financial regional data, the characteristics of FI platform by searching for FI matching, the needed information extraction and audit.
4 Discuss 4.1
Experimental Results
Through the above experiments and relevant calculations, we can draw the conclusion that at present, the financial informatization construction of CAU in China has not achieved the ideal effect and needs to be further improved. This conclusion comes from the analysis of specific experimental data. Specific experimental data are shown in Table 1 and Fig. 1. The data in the chart is the result of the author’s experiment. 4.2
Problems Existing in Financial Informatization Construction of CAU
From the data in Fig. 1, we can see that compared with the traditional financial construction, the financial informatization construction has greatly improved the accuracy of financial calculation and work efficiency, but it has not reached the ideal effect, which is caused by various problems existing in the current financial informatization
Under the Background of Digital College Financial Problems
19
Table 1. Key factor data of financial construction Traditional
Real information construction 71.62% 42.68%
Ideal information construction 91.87% 86.54%
Data security 54.16% Proportion of high-quality 21.78% personnel Financial data connection 17.67% 52.17% 89.69% *Data came from the in-depth analysis of financial data in the experiment
100.00% 80.00% 60.00% 40.00% 20.00% 0.00%
86.85%
71.54%
65.20%
65.17%
42.39% 25.87%
Traditional Financial Platform
Real Information Financial Platform
Efficiency
Ideal Financial Information Platform
Accuracy Rate
Fig. 1. Comparison of financial work under different financial platforms
construction of CAU in China. Through the analysis of Table 1, we find that the current problems of FI construction in CAU are mainly manifested in three aspects: data security, high-quality professionals and the connectivity of financial data. First of all, the level of informatization of financial staff in CAU in China is relatively low, and they are not proficient in the operation of informatization, which greatly hinders the construction of financial informatization. Secondly, the data security of financial informatization is low and needs to be further improved. At present, China’s network information operation environment still has a great threat, a variety of computer viruses will affect the security of financial data; Finally, at present, the connection between FI and data is not close enough and there is no unified sharing platform. 4.3
Suggestions and Strategies for Financial Informatization Construction in CAU
(1) Further improve the FI management mechanism With the rapid change of digital background, there is a great incompatibility between the former FI management mechanism and the current FI construction. Therefore, must carry on the thorough consummation to the FI management mechanism. FI management mechanism should be consistent with the development trend of the current digital
20
H. Gao
background and have strong operability. Therefore, the new management mechanism can be combined with the effective classification and arrangement of financial files, so that financial data can be effectively used. When perfecting the FI management mechanism, we must pay attention to the scientific nature of methods. (2) Improve the comprehensive quality of financial staff in CAU The construction of financial informatization in CAU has put forward higher requirements for relevant financial staff. The quality of financial staff must be able to keep up with the pace of financial informatization construction. This requires the relevant financial personnel not only to have profound financial theoretical knowledge, but also to be able to operate and apply information technology skillfully, and to be particularly familiar with the operation of relevant financial software, to the maximum extent to adapt to the needs of information construction. For this reason, CAU should conduct irregular professional training and assessment for financial staff, urge financial staff to focus on learning, and apply the theoretical knowledge learned in practical financial work as soon as possible. And reference to the opinions of financial personnel on FI construction for a reasonable adjustment.
5 Conclusion Under the background of digitization, the construction of Fiization in CAU needs longterm efforts and has extremely high complexity. Therefore must be carried out on the problems existing in the current FI construction in-depth analysis, and with the current effective combination of the actual development of the FI construction, on the basis of reasonable solution Suggestions, making financial construction of CAU on the maximum achieve a scientific and accurate, only then can achieve faster college financial informatization construction. Acknowledgements. Project No.: 82003031.
References 1. Jin, F., Yan-yong, S.: Brief introduction of financial informatization construction for enterprise group. Comput. Netw. 33(17), 562–567 (2017) 2. Yong, Z., Shan, L.: Business school, financial development, technical innovation and the construction of smart cities: an informatization development perspective. J. Financ. Econ. 12 (5): 343–347 (2017) 3. Bao-lin, L., Tong-jian, Z.: The research of green financial construction and industrial structure adjustment in Hebei province. J. Guizhou Commer. Coll. 19(11), 279–282 (2017) 4. Hu, Q., Du, J., Li, R.: Study on the model of financial centralized management in the largescale construction enterprises. IOP Conf. Ser. Mater. Sci. Eng. 31(15), 439 (2018) 5. Olubimbola, O., Aina, O.: Financial performance of locally-owned construction firms in south-western Nigeria. J. Financ. Manag. Prop. Constr. 23(1), 100–104 (2018) 6. Halawa, W.S., Abdelalim, A.M.K., Elrashed, I.A.: . Financial evaluation program for construction projects at the pre-investment phase in developing countries: a case study. Int. J. Proj. Manag. 31(6): 912–923 (2017)
Under the Background of Digital College Financial Problems
21
7. Xin, S., Pei-xin, W.: Relationship between environmental performance and financial performance of China listed construction company. J. Eng. Manag. 19(8), 551–556 (2017) 8. Wu, S.Z.: Based on computer network security in fiization construction of colleges and universities. Adv. Mater. Res. 24(3), 989–994 (2017) 9. Yan, Q.: Studies on regional green credit financial ecological environment construction. J. Jilin Financ. Res. 8(1), 154–155 (2017) 10. Chen, J.-H.: Developing SFNN models to predict financial distress of construction companies. Expert Syst. Appl. 39(1), 823–827 (2017)
Collaborative Workflow-Based Enterprise Information System Bin Huang1,2, Qilong Teng3, and You Tang1,2(&) 1
Electrical and Information Engineering College, JiLin Agricultural Science and Technology University, Jilin 132101, China [email protected] 2 Smart Agricultural Engineering Research Center of Jilin Province, Jilin 132101, China 3 Electronic Information Engineering, Jilin Petrochemical Engineering Efficiency, Jilin, China
Abstract. Based on the study of collaborative workflow technology, this paper analyzes the characteristics of enterprise supply chain management system, studies its requirements for workflow management system, and designs a workflow management system for enterprise supply chain management system integration platform. Keywords: Collaboration Design
Workflow Enterprise information system
1 Workflow Organization Model in Collaborative Work Environment Workflow management system is based on workflow model, which contains all the information of workflow system execution and is the computerized representation of business process [1]. A good workflow model should not only have strong description ability, but also have the property of loose coupling, that is, keep a loose coupling relationship with other systems [2]. The organizational model is responsible for defining the organizational form of people in the enterprise, which provides a flexible structure that ADAPTS to different enterprises and different organizational structures within the enterprise. Among various modeling methods, the application of organization-driven modeling method is relatively mature [3]. It refers to the existing organizational model in the enterprise, and the organizational entity needed in workflow management system needs to refer to the entity of the organizational model in the enterprise. The application of organization-driven modeling can be independent of external constraints and can meet various application requirements of enterprises, effectively realize the separation of workflow model and organization model, so as to improve the adaptability of the system [4]. This paper adopts the organization-driven modeling method. The organization model class diagram is shown in Fig. 1.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 22–27, 2021. https://doi.org/10.1007/978-3-030-51431-0_4
Collaborative Workflow-Based Enterprise Information System
23
Fig. 1. Organize the model class diagram.
2 Supply Chain Collaborative Workflow Management System 2.1
System Logic Structure
The logical structure of the supply chain collaborative workflow management system is shown in Fig. 2. The main functions of workflow management system include: 1) Workflow definition tool. Provide users with a means to analyze and model the actual business process, form a formal description of the business process that can be processed by computer, and start the functional development stage of workflow [5]. 2) Workflow execution service. Execution service is the core part of workflow, which is logically divided into five interfaces: Workflow client module interface, process definition module interface, callable function service interface, monitor and manage workflow tool interface, and interface to connect with other workflow systems. 3) Application. Each application needs to be responsible for the execution of a subprocess of the workflow, or for the completion of a task. Depending on the workflow state, the workflow engine invokes an application to execute the workflow [6]. In this system, an application is provided to an activity after completing registry registration as a resource. 4) Workflow client application. The worklist library is accessed based on the worklist access interface, and the workflow engine is able to assign work to the worklist library, which is then accessed by the user [7]. 5) Process and task monitoring tools. Monitor and manage the status of process instances in the workflow management system, and collect and record information about what happened during process execution [8].
24
B. Huang et al.
Fig. 2. Logical structure of supply chain collaborative workflow management system
6) Workflow executes the internal logical structure of the service [9]. Organization management implements the maintenance and management of organizational model data such as organization and staff setting in the supply chain system, and provides task assignment information to the process. 2.2
System Function Description
Workflow management system based on collaborative workflow, its main function is to realize the office automation of material supply, better meet the requirements of automation and information office between various departments, and complete some daily administrative affairs. Specific functions include: 1) Data communication mainly refers to the normal circulation of office documents and the mail transmission of office staff. 2) Information sharing, maintenance, management and query of department data with main indicators. 3) Daily management, mainly referring to the management of personal affairs, administrative affairs, archives, and organizational personnel. 4) Workflow automation, complete the perfect connection of a specific business. According to the actual characteristics of collaborative workflow of supply chain of a group, the system divides modules according to functions. The system can be divided into 8 main functional modules, including: inventory management, coding
Collaborative Workflow-Based Enterprise Information System
25
management, inbound and outbound management, red flush return management, plan management, cost adjustment, statistical report and system management. The system function structure is shown in Fig. 3.
Fig. 3. System function structure diagram.
2.3
System Relational Database Model
The storage of business process instances is done through the process table and the process ID table. Process table is responsible for the business process instance of the main information storage, is the main table; The process ID table is the process ID of the business process instance stored from the table. The process table and the process ID table are associated by the field FGUID in the process table and the field FFLOWGUID in the process ID table. 2.4
Realization of Functional Modules
Create the business database in the sales module, design the structure of three database relational tables to meet the needs of sales reports. The three relationship tables are: external customer information table, external sales secondary table and external sales master table. Among them, the external sales slave table and the external sales master table construct the relationship between the master and slave tables by using the sequence number attribute of sales receipts. The header information is stored in the master table, while the detailed information of receipts is stored in the latter table. In addition, the relationship between the external customer information table and the external sales master table is constructed according to the encoding attribute of the external customer to store the external customer information. The specific implementation process is as follows: 1) First create the database needed to store, and then add Dataset to the database. This dataset is a database table component provided by the development system, in which field properties are explicitly displayed, such as lookup computed fields or expression fields. Finally, the input form interface was designed.
26
B. Huang et al.
2) Complete the design of functional form, which can be implemented through DatasetBroker, FuncBroker and other data set agent components, and then reference and design the data set and form. 3) Design of external sales audit form. At this time, define the audit process according to the application data set agent component. When the auditor receives the task information, he/she will open the function module form, check the form submitted by the operator last time, and then review the form information. If the audit is passed, he/she will submit the order, and the data of the database will be updated automatically.
3 Conclusion With the rapid development of modern science and technology, the fierce competition between enterprises began to gradually change to win-win cooperation [10]. In this paper, the design of information system based on workflow system, is to use the analysis of synergy mode, the research work under the environment of workflow management system, able to provide enterprises with more than one user to coexist, distributed collaborative work system, so as to shorten product development cycle, improve production efficiency, improve the management level of enterprise’s comprehensive strength and modernization. Acknowledgements. This work is supported in part by the PhD startup Foundation Project of JiLin Agricultural Science and Technology University on 2018 and the Digital Agriculture key discipline of JiLin province Foundation.
References 1. Qu, Y.: An integrated framework of enterprise information systems in smart manufacturing system via business process reengineering. ProQuest 233, 2210–2224 (2019) 2. Zacharewicz, G., Diallo, S., Ducq, Y., Agostinho, C., Jardim-Goncalves, R., Bazoun, H., Wang, Z., Doumeingts, G.: Model-based approaches for interoperability of next generation enterprise information systems: state of the art and future challenges. IseB 15, 229–256 (2017) 3. Ma, X.: Practice exploration on informatization construction and system planning of large state-owned enterprises. China Informatization, 55–58 (2019) 4. Arunachalan, B., Diamond, S., Szigeti, S., Chevalier, F., Stevens, A., Ghaden, M., Talaie, B., Reffly, D.: Designing portable solutions to support collaborative workflow in long-term care: A five point strategy. Computer Supported Cooperative Work in Design (CSCWD). Proceedings of the 2014 IEEE 18th International Conference on (2013) 5. Gu, Y., Chen, S.: Innovation of government governance mode based on e-government – analysis of collaborative governance mechanism. The 2010 annual meeting of Chinese society of administrative management and the seminar on “innovation in government management”, pp. 1209–1224 (2010)
Collaborative Workflow-Based Enterprise Information System
27
6. Gorg, S., Bergmann, R., Gessinger, S.: Real-time collaboration and experience reuse for cloud-based workflow management systems. IEEE (2013) https://doi.org/10.1109/CBI.2013. 63 7. Knuplesch, D., Reichert, M., Pryss, R., Fdhila, W., Rinderle-Ma, S.: Ensuring compliance of distributed and collaborative workflows. IEEE (2013) 8. Harianja, K., Anwar, R.: Successful information communication technology system on enterprise resources planning implementation: A case study of metal-work industries in Indonesia. Proceedings of the 2019 International Conference on Organizational Innovation (ICOI 2019) (2019). https://doi.org/10.2991/icoi-19.2019.82 9. Yan, X.: Design and implementation of information database management system for Coal Machinery Enterprise. Proceedings of the 2018 3rd International Workshop on Materials Engineering and Computer Sciences (IWMECS 2018) (2018). https://doi.org/10.2991/ iwmecs-18.2018.122 10. Gvozdev, V., Kirillov, K.: Information support for the management of the efficiency of enterprise information service systems. Proceedings of the 7th Scientific Conference on Information Technologies for Intelligent Decision Making Support (ITIDS 2019) (2019). https://doi.org/10.2991/itids-19.2019.5
E-Commerce Profit Evaluation of Agricultural Products Based on Grey Prediction Algorithm Shuangying Liu(&) Jilin Engineering Normal University, Changchun 130052, China [email protected]
Abstract. In the present society, we have gradually begun to use computer technology for the study of the development of agriculture and research. We also began to use computers for research on the computational studies of ecommerce profitability evaluation for agricultural products. Through computer computing research, it will be more convenient and fast to analyze and research the profitability of agricultural products in e-commerce. This paper uses the grey forecasting algorithm to evaluate the profitability of e-commerce in agricultural products. It is one of the directions for the above problems, and it has gradually achieved good results. Through our testing of the algorithm, we find that the algorithm is highly reliable in the calculation and use of this paper. Keywords: Grey prediction algorithm Profitability evaluation
Agricultural products E-commerce
1 Introduction With the advent of our current social information age, all walks of life are moving their work closer to the information age. Computer technology has become an indispensable tool for work research in all fields at this stage. Computer algorithms have also been gradually used by us for their powerful computational analysis capabilities (Zeng et al. 2017) [1]. In addition, the e-commerce of agricultural products is gradually developing. However, our research on e-commerce profitability evaluation of agricultural products is relatively backward. At present, there is not a good calculation tool for this aspect, which leads to our profitability of agricultural products in e-commerce. The lack of analysis and research data for the situation makes it difficult to make a correct judgment on our next development strategy (Liu et al. 2016) [2]. This has greatly increased the difficulty of our work and has also hindered the development and progress of ecommerce in agricultural products (Vani et al. 2016) [3]. In this paper, the research on the calculation of grey forecasting algorithm is firstly based on the analysis of the calculation form of the algorithm. Through the understanding of the calculation form of the grey forecasting algorithm, the calculation entry point for using the algorithm in e-commerce profit evaluation of agricultural products can be founded (Lim et al. 2016) [4]. Then we have to analyze the calculation steps of the algorithm and prepare for the establishment of our next calculation model. Then, we can optimize the calculation formula of the algorithm and the calculation formula of the gray prediction algorithm, and then we begin to build the calculation model of our © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 28–33, 2021. https://doi.org/10.1007/978-3-030-51431-0_5
E-Commerce Profit Evaluation of Agricultural Products
29
calculation. Finally, we need to test and study the algorithm. We test the algorithm to prove the feasibility of our optimized algorithm (Li et al. 2016) [5]. Through our calculation of the grey prediction algorithm, we have helped our analysis of ecommerce profit evaluation (Barion et al. 2016) [6].
2 Related Work The computational research of the grey prediction algorithm is a modern computer computing theory proposed by American scholars in the last century (Liu et al. 2017) [7]. For the computational research of the algorithm, we have just begun to mainly use the gray prediction algorithm for the study of some models and computational predictions. Gradually we began to expand the calculation range and the computational field of the algorithm. Western scholars have extended the computational research of grey prediction algorithms to computational evaluations in the current stage of work with their powerful computer technology and scientific calculation concepts. Of course, the main computational function of the algorithm is also the prediction function. In fact, this evaluation function is only an extension of the prediction function. Research in this area has been thoroughly studied by foreign scholars (Sun et al. 2016) [8]. Domestic research on grey forecasting algorithms began in the 1990s. The economic exchanges and academic exchanges between China and other countries in the world have become increasingly close (Wang et al 2016) [9]. The research on the calculation of the grey prediction algorithm was introduced into our country from the beginning and the end of the era, and gradually carried forward. The grey prediction algorithm is widely used in medical agriculture in China, etc. (Trinh et al 2017) [10]. At the same time, our country’s calculation of the grey prediction algorithm is not weaker than that of foreign studies. We have also developed a set of our own computational analysis theory for our domestic calculations. This paper’s computational research is based on this research.
3 Methodology 3.1
Basic Calculation Theory of Grey Prediction Algorithm
The two tests are not consistent. Normally, we use the Push method for the first test. For the second test we usually use Pull. In this case, if we pass our second test and find that the failure of the first test is successful in the second test, we also say that this message is valid. This detection process we can use a map to display. The simple execution process of the detection process is shown in Fig. 1. 3.2
Research on Calculation Formula and Mathematical Model of Grey Prediction Algorithm
The above studies have improved the GM(1,1) model from different perspectives and achieved good results in practical applications. However, from the previous literature,
30
S. Liu
Fig. 1. Detection process simple implementation process
there are very few literatures on the grey action in the optimization model. The gray action is also an important factor affecting the prediction accuracy of the model. It reflects the relationship between data changes. In the traditional GM (1,1) model, the gray action is a constant constant. With the change of time and space, the gray action will change instead of static, so the prediction accuracy of the model will be certain influenced. In addition, the disturbance of the external impact disturbance is also a key factor affecting the accuracy of the GM (1,1) model. In the late 1980s, Professor Liu Sifeng proposed a very effective data processing method for the problem of model failure that often occurs in the prediction process, that is sequence operator. It can be used to sort the original data subjected to impact perturbation by using buffer operators, and then seek its own internal change law, so as to make it possible to avoid randomness in stability and eliminate the interference of impact disturbance items. Therefore, how to construct an effective buffer operator is of great significance to improve the accuracy of the GM(1,1) model. For the calculation accuracy of the model we have divided into four levels, the main level of division we use the following Table 1 to display. Table 1. Model accuracy Model accuracy grade Level 1 (good) Level 2 (qualified) Level 3 (barely) Level 4 (failed)
Post test difference 0.95 < p 0.8 < p < 0.95 0.70 < p < 0.80 p < 0.7
Probability of small errors C < 0.35 0.35 < C < 0.5 0.5 < C < 0.65 0.65 < C
Then according to our machine selection needs, we also need to use the computer model to calculate and study the mathematical calculation model we established above. Figure 2 below shows the computational process diagram of the computer model we established.
E-Commerce Profit Evaluation of Agricultural Products
31
Fig. 2. We set up the computer model calculation process
4 Result Analysis and Discussion The average value of the final error is even more obvious. The average error of the optimized algorithm has reached 1.73%. However, the calculation error of our optimized grey prediction algorithm is only 0.55%. This greatly improves the computational accuracy of our algorithm. In addition, we have also tested the entire calculation accuracy of the algorithm and displayed our test results in the form of pictures. The comparison of the accuracy of the test results is shown in Fig. 3 below.
Fig. 3. Comparison of the test results of the entire calculation accuracy
By comparing the data in the above figure, we can know that we passed a set of experiments and gradually increased the amount of calculation of the algorithm to simulate the calculation accuracy of the algorithm. Then, through the computer’s collection of data, it shows the accuracy of the two algorithms as the amount of computation increases. For data analysis, it can be seen that the accuracy of traditional
32
S. Liu
algorithms decreases as our calculation projects increase. From the beginning of 100%, when the calculation item reaches 10,000, the accuracy of calculation is reduced to less than 60%, which completely does not meet our calculation requirements. However, for our optimized algorithm, the accuracy of our algorithm has been stable at about 95% before 10,000 calculation items. However, when the calculation of our entire algorithm exceeds 10,000, the accuracy of the calculation has decreased significantly. This shows that our optimized grey prediction algorithm is in line with our calculation requirements. Therefore, the computational accuracy requirements of our optimized algorithm have been satisfied. The calculation accuracy and calculation time also need to be tested.
5 Conclusion With the continuous development of science and technology, the application of information technology has become the primary goal of our current industry transformation. The same is true for agriculture. This paper uses the grey forecasting algorithm to analyze and calculate the profitability of agricultural products e-commerce is a transformation direction. The use of advanced computer algorithms and computer technology for computational analysis not only greatly saves time but also greatly increases the accuracy of calculations. Through testing the grey prediction algorithm, we find that the calculation accuracy after the optimization of the algorithm is extremely high, and the calculation accuracy under 10000 calculation items can be stable at more than 95%, but the calculation accuracy of the traditional algorithm has dropped below 60%. In addition, we have also shortened the calculation time of the algorithm to half of the traditional algorithm and it reached our optimization goal. This makes it a computer algorithm suitable for e-commerce profit evaluation of agricultural products. Acknowledgements. Jilin provincial department of education “13th five-year” social science project “research on cross-border e-commerce development strategy of jilin province agricultural products export from the perspective of ‘One Belt And One Road’ (JJKH20190777SK)”; Research project of jilin normal university of engineering and technology “research on restricting factors and coping strategies of rural e-commerce development in jilin province (XYB201831)”.
References 1. Zeng, B., Liu, S.: A self-adaptive intelligence gray prediction model with the optimal fractional order accumulating operator and its application. Math. Methods Appl. Sci. 40, 7843–7857 (2017) 2. Liu, X., Fine, J.P., Chen, Z., et al.: Prediction of the 20-year incidence of diabetes in older Chinese: application of the competing risk method in a longitudinal study. Medicine 95(40), 5057 (2016) 3. Vani, R., Sangeetha, M.: A new hybrid search algorithm with novel cross-diagonal-hexagon search video coding algorithm for block motion estimation. Wirel. Pers. Commun. 88(2), 211–222 (2016)
E-Commerce Profit Evaluation of Agricultural Products
33
4. Lim, H., Gray, P., Xie, L., et al.: Improved genome-scale multi-target virtual screening via a novel collaborative filtering approach to cold-start problem. Sci. Rep. 6, 38860 (2016) 5. Li, W., Lu, C., Liu, S.: The research on electric load forecasting based on nonlinear gray bernoulli model optimized by cosine operator and particle swarm optimization. J. Intell. Fuzzy Syst. 30(6), 3665–3673 (2016) 6. Barion, G., Mosca, G., Vamerali, T.: Estimation of cotyledon isoflavone abundance by a gray luminance-based model in variously hilum-colored soybean varieties. J. Sci. Food Agric. 96(12), 4126–4134 (2016) 7. Liu, H.F., Ren, C., Zheng, Z.T., et al.: Study of a gray genetic BP neural network model in fault monitoring and a diagnosis system for dam safety. Int. J. Geo-Inf. 7(1), 4 (2017) 8. Sun, X., Sun, W., Wang, J., et al.: Using a Grey–Markov model optimized by Cuckoo search algorithm to forecast the annual foreign tourist arrivals to China. Tour. Manag. 52, 369–379 (2016) 9. Wang, H.T., Wang, T.C.: Application of the grey Lotka-Volterra model to forecast the diffusion and competition analysis of the TV and smartphone industries. Technol. Forecast. Soc. Chang. 106, 37–44 (2016) 10. Trinh, H.X.P., Tran, T.T.: An analyzing case: numbers of Taiwanese students and their expenditures by using grey system theory to forecast. Int. J. Adv. Appl. Sci. 4(9), 35–45 (2017)
Customer Segmentation and Management of Online Shops Based on RFM Model Yulu He and Yanxia Cheng(&) School of management, Wuhan University of Technology, Wuhan, China [email protected]
Abstract. Based on the RFM model, this study adopts k-means clustering method to cluster users with similar purchasing behaviors. Then according to the differences in the buying behavior of each group of customers, customers are divided into different types. Then, this study innovatively adopts a special objective customer value weight calculation method to obtain the customer value calculation weight that matches the specific enterprise. Finally, the customer value of each group was calculated, and corresponding customer relationship management recommendations were given. Keywords: Customer segmentation
Customer value RFM model
1 Introduction For the enterprise, the customer is always the core resource of the enterprise. The most important thing in customer relationship management is to classify customers. Enterprises need to tailor services to different customers based on the value of different types of customers for precision marketing. If the company wants to have a better development, it must break the traditional business methods and analyze customer data. Enterprises need to extract hidden, previously unknown, but potentially important information from a large amount of noisy, fuzzy, and random data, so as to effectively and timely segment and identify customers. In the era of big data, especially e-commerce companies facing hundreds of millions of customer groups, they need to effectively manage their customers. Use cluster analysis technology in customer segmentation to analyze and mine the value hidden in customer information. Divide customers into similar customer groups and evaluate customer value to achieve efficient and differentiated customer relationship management and precision marketing. A large number of scholars have done a lot of research on enterprise customer segmentation and management. Based on previous studies, this study uses a Taobao store as an example to segment specific customers and use specific weight calculation methods to calculate customer values, which provides a reference for other companies to conduct customer management.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 34–41, 2021. https://doi.org/10.1007/978-3-030-51431-0_6
Customer Segmentation and Management of Online
35
2 Literature Review From the perspective of customers, Zeithaml (1988) believes that customer value is the difference between the price paid by customers and the perceived value [1]; Porter (1997) believes that customer value is the price that customers are willing to pay for the company’s products or services [2]. From a corporate perspective, Philip Kotler (1973) believes that customer value is the profit that customers can bring to the enterprise [3]; Walter (2001) believes that the research focus of customer value is its non-monetary value [4]. The customer value of this study refers to the customer value from the perspective of the enterprise. Customer segmentation was first proposed by American scholar Wendell (1956) in the 1950s under the background of different customer needs and limited enterprise resources [5]. Subsequently, Frank (1973) found that different customer segmentation measures could bring higher profits to enterprises according to different markets and different customers [6]. Gelin Chu (2014) believes that customer segmentation is to classify customers with different values for each type of customer based on customer value [7]. The RFM model proposed by the American Database Marketing Institute is the most classic model for customer value calculation and customer segmentation, including three variables of R(Recency), F(Frequency) and M(Monetary). The values of R, F and M can be easily extracted from the transaction data between customers and enterprises. The RFM model customer classification is shown in Table 1. This paper intends to use the RFM model to segment customers and then calculate customer value. Table 1. RFM model customer classification table The customer type R F Important value customers " " Important recall customers # " Important development customers " # Important retention customers # # Potential customers " " New customers " # General maintenance customers # " Lost customers # # Note: " :above average # :below average
M " " " " # # # #
3 Data Collection and Preprocessing 3.1
Data Collection
Through the taobao seller center, this study obtained 2857 order data from an online store from October 2017 to April 2018. The order data is simply processed, including deleting irrelevant information, deleting exception information, coding the customer,
36
Y. He and Y. Cheng
and calculating the RFM value. After processing, 1165 pieces of customer data are obtained. The data example is shown in Table 2. Table 2. Customer data example Customer code R F M C0001 8 15 2402.4
3.2
Data Preprocessing
Data normalization is a basic work of data mining [8]. Different indicators often have different dimensions, and the differences between the values may be significant. Failure to process may affect the results of data analysis. In order to eliminate the impact of the differences in the dimensions and ranges of the indicators, the data needs to be standardized. The data index is scaled according to the ratio, so that it falls into a specific area for the comprehensive analysis. In this study, the minimum-maximum normalization method was adopted to process the data [8]. Perform a linear transformation of the original data to map the data to the interval [0, 1]. The conversion formula is as follows: X0 ¼
XMAX X XMAX XMIN
ð1Þ
XMAX is the maximum value of sample data. XMIN is the minimum value of sample data. XMAX XMIN is the range. Deviation normalization preserves the relationship existing in the original sample data and is a simple method to eliminate the dimension and data value range. Applied to the RFM model is: R0 ¼
RMAX R RMAX RMIN
ð2Þ
F FMAX
ð3Þ
M MMIN MMAX MMIN
ð4Þ
F0 ¼ M0 ¼
The normalized customer data example is shown in Table 3.
Table 3. Customer standardized data example Customer code R′ F′ M′ C0001 0.9591 1.0000 0.6769
Customer Segmentation and Management of Online
37
4 Data Analysis and Results 4.1
K-means Cluster Analysis
K-means algorithm is a simple and easy cluster analysis algorithm. In this study, kmeans clustering algorithm was used to group customers with similar purchasing behaviors into a group. The number of clusters K = 12 was selected to analyze customer data. Divide customer data into 12 groups. Then calculate the average of the R, F, and M values for each group of customers, and compare them with the total R, F, and M averages to define each type of customer. The results are shown in Table 4. Table 4. Customer classification type Customer group number 1 2 3 4 5 6 7 8 9 10 11 12
R
F
M
Comparing results R"F"M" R#F"M" R#F#M# R"F"M" R"F"M" R#F#M# R#F"M" R"F#M# R#F"M" R"F"M" R"F"M" R#F#M#
0.9591 1.0000 0.6769 0.6199 0.8667 0.9118 0.1750 0.0667 0.0371 0.9070 0.2252 0.1239 0.9181 0.6000 0.9901 0.4151 0.0753 0.0378 0.6211 0.1833 0.1346 0.9044 0.0809 0.0366 0.5380 0.6000 0.5431 0.9393 0.5750 0.4854 0.9074 0.3569 0.2327 0.6464 0.0704 0.0140 ¼ 0:6982 F ¼ 0:1035 M ¼ 0:0472 Note: The total average: R
4.2
The number of customers 1 1 25 82 2 93 52 239 1 8 34 627
Customer Value Analysis
4.2.1 Weight Determination According to the RFM model, the customer value calculation formula used in this study is: CLV ¼ iR þ jF þ kM i þ j þ k ¼ 1
ð5Þ
In the original RFM model, R, F, and M were equally important to customer value, so they were given the same weight. Miglautsch (2000) thinks that the indexes R, F, and M should be assigned different weights [9]. Tsai and Chiu (2004) believe that the sum of the weights of the three variables R, F, and M should be equal to 1 [10]. In subsequent studies, more scholars choose to use the analytic hierarchy process to determine the weights of R, F, and M [11, 12]. This study proposes an easy-to-use weight determination method that matches the specific enterprise. The sum of the weights of R, F and M is 1. Assume that the weights i, j, and k all retain one decimal
38
Y. He and Y. Cheng
place. Then there are 36 possibilities for the values of i, j and k according to the exhaustive method. The data of March, February and January were selected as the validation set, and the data of the remaining months were used as the test set. Test the possible weights in order, calculate the customer value of the test set according to the customer value calculation formula (5) and arrange them in descending order to divide the customers into 8 categories. The first 1/8 is the first type, the second 1/8 is the second type, and so on, the first type of customers are the highest value customers, and the number of customers is n. For the validation set samples, they are sorted in descending order according to their total amount M, and customers are also divided into 8 categories. The first 1/8 is the first category, the second 1/8 is the second category, and so on. The first category of customers is the customer with the highest purchase amount. Compare the first type test set customers with the first type verification set customers, and observe that there are m first type test set customers that belong to the first type verification set customers. m/n is the ratio of high-value customers to high-purchase customers. For merchants, the most valuable customers they want are those that generate higher volumes of purchases. Therefore, the weights determined in this study should make m/n as large as possible. Add the test results of the three groups, and the results are shown in Table 5. Finally, I = 0.2, j = 0.3 and k = 0.5. Table 5. Verification set result Number 1 2 3 4 5 6 7 8 9
m/n 0.4719 0.3799 0.4308 0.4553 0.3995 0.4636 0.3799 0.3930 0.3930
Number 10 11 12 13 14 15 16 17 18
m/n 0.4471 0.3995 0.4833 0.3716 0.4209 0.4028 0.3995 0.3995 0.4177
Number 19 20 21 22 23 24 25 26 27
m/n 0.3929 0.4011 0.4783 0.4783 0.3799 0.4111 0.5029 0.3897 0.4931
Number 28 29 30 31 32 33 34 35 36
m/n 0.3799 0.4307 0.4307 0.4223 0.4094 0.3929 0.4357 0.3799 0.4011
4.2.2 Customer Value Calculation In this study, customers of a taobao store were divided into 12 categories through kmeans clustering. These 12 types of customers are calculated through formula (5) to calculate the CLV value, as shown in Table 6. The value score of important value customers and important recalled customers is higher, while the value score of new customers and lost customers is lower, which is consistent with the actual situation.
Customer Segmentation and Management of Online
39
Table 6. Classified customer value The customer type Important value customers R"F"M" Important recall customers R#F"M" New customers R"F#M# Lost customers R#F#M#
4.3
Customer group number 5 1 10 11 4 2 9 7 8
12 6 3
R
F
M
CLV
0.9181 0.9591 0.9393 0.9074 0.9070 0.6199 0.5380 0.6211
0.6000 1.0000 0.5750 0.3569 0.2252 0.8667 0.6000 0.1833
0.9901 0.6769 0.4854 0.2327 0.1239 0.9118 0.5431 0.1346
0.8587 0.8303 0.6031 0.4049 0.3109 0.8399 0.5592 0.2465
0.9044 0.0809 0.0366 0.2235
Value Number of ranking customers per group 1 2 3 1 4 8 6 34 7 82 2 1 5 1 8 52
Number of customers per type 127
54
9
239
239
0.6464 0.0704 0.0140 0.1574 10 0.4151 0.0753 0.0378 0.1245 11 0.1750 0.0667 0.0371 0.0736 12
627 93 25
745
Customer Classification Results
Important value customer type, including 5 groups of customers, a total of 127 customers, accounting for 10.9% of the total number of customers. This kind of customers buy more recently, buy more frequently and consume more. Important recall customers types, including 3 groups of customers, a total of 54 customers, accounting for 4.7% of the total number of customers. This kind of customer purchase time is far away, purchase frequency is high, consumption amount is big. New customers type, including 1 group of customers, a total of 239 customers, accounting for 20.5% of the total number of customers. This kind of customers buy more recently, buy less frequently and consume less. Lost customers type, including 3 groups of customers, with a total of 745 customers, accounting for 63.9% of the total number of customers. This kind of customers buy more recently, buy less frequently and consume less.
5 Customer Management Advice Through the previous analysis, the customers of a taobao store are divided into four categories: important value customers, important recall customers, new customers and lost customers. Each type of customer is composed of multiple groups of customers. There are also value differences between groups. Management priorities can be made for each group of customer value. Important value customers is the customer with the highest value to the enterprise. They are the main source of corporate profits and have high customer loyalty. In dealing with such customers, enterprises should pay attention to maintaining and
40
Y. He and Y. Cheng
maintaining the relationship with their customers. Communicate effectively with them to understand customer needs. Prioritize delivery for them. Provide them with customized products and services. Arrange the best staff. Offer them flexible payment terms. Important recall customers value of the enterprise is relatively high. Such customers may well have been important value customers for the enterprise. Because the enterprise customer relationship management is not appropriate, resulting in the customer for a long time not to patronize the enterprise. The enterprise should try its best to win back such customers, and cannot let such customers flow into the hands of competing enterprises. To redeem and retain this class of customers by providing them with a product or service that delivers more value than expected. New customers have done business with the enterprise in the near future, but the frequency and total amount of purchase are low. Their relationship with the enterprise is in the period of investigation or formation. They have great development potential. Companies can attract customers to stay by offering them high-quality products, valuable information, coupons and quality services. Keep customers happy, keep them buying, make them more valuable customers. Lost customers is the least valuable for the enterprise. Most of them just bought a cheap product from a company a long time ago. Companies don’t need to spend too much time and energy with these types of customers. According to the actual situation, the enterprise can selectively redeem customers. Acknowledgements. This work was supported National Social Science Fund: Research on Repetitive Purchase User Identification Based on Light Review and RFM Dual Perspectives (No. 20162s0079); Independent Innovation Project: Emotional Quantitative Research on Light Reviews of Online Users (No. 2017VI016).
References 1. Zeithaml, V.A.: Consumer perceptions of price, quality, and value: a means-end model and synthesis of evidence. J. Mark. 52(3), 2–22 (1988) 2. Porter, M.E.: Competitive advantage. J. Bus. Ind. Mark. 25(4), 88–102 (1997) 3. Kotler, P.: Marketing management: analysis, planning and control. J. Mark. 37(1), 5–8 (1973) 4. Walter, A., Ritter, T., Gemünden, H.G.: Value creation in buyer-seller relationships: theoretical considerations and empirical results from a supplier’s perspective. Ind. Mark. Manag. 30(4), 365–377 (2001) 5. Smith, W.R.: Product Differentiation and market segmentation as alternative marketing strategies. J. Mark. 11(7), 3–8 (1956) 6. Frank, R.D., Alpert, M.I., Massy, W.F.: Market segmentation. J. Mark. 37(2), 119 (1973) 7. Chu, G.: Research on telecom customer segmentation based on clustering model. Stat. Decis. (8), 176–179 (2014). (in Chinese) 8. Torgo, L., Li, H., Chen, D., Wu, L.: Data mining and R language. Comput. Educ. (9), 102 (2013). (in Chinese) 9. Miglautsch, J.R.: Thoughts on RFM scoring. J. Database Mark. Customer Strategy Manag. 8 (1), 67–72 (2000)
Customer Segmentation and Management of Online
41
10. Tsai, C.Y., Chiu, C.C.: A purchase-based market segmentation methodology. Expert Syst. Appl. 27(2), 265–276 (2004) 11. Lin, S., Xiao, X.: RFM-based telecommunication customer market segmentation method closure. J. Harbin Inst. Technol. 3(5), 758–760 (2005). (in Chinese) 12. Bao, Z., Zhao, Y., Zhao, Y., Hu, X., Gao, F.: Baidu takeaway customer segmentation based on RFA model and cluster analysis. Comput. Sci. 45(S2), 436–438 (2018). (in Chinese)
Digital Service Evaluation System Based on Enterprise Operation Management Mode Chaohu He, Xiong Qi(&), and Li An School of Economics and Management, Yunnan Technology and Business University, Kunming, Yunnan, China [email protected]
Abstract. Traditional enterprise service evaluation is a complete and logical system, and the feedback on enterprise service evaluation is not deep enough, so it has a very adverse impact on enterprise operation management and enterprise development. The purpose of this paper is to establish a digital service evaluation system which is beneficial to the development of enterprises on the basis of enterprise operation and management mode and combined with digital background. This paper firstly gives an overview of enterprise operation management and digital service evaluation, and determines the main index system of digital service evaluation system by means of data fusion algorithm. On this basis, the construction of digital service evaluation system is realized, and the reliability of the system is tested. The experimental results of this paper show that the establishment of digital service evaluation system based on enterprise operation management mode is beneficial to the further development of enterprises, and the operation of the system is completely reliable. Keywords: Enterprise operation Management mode services Digital fusion algorithm
Evaluation of digital
1 Introduction Service evaluation is a reflection of customers’ satisfaction with the enterprise, a key link of enterprise management and operation, and related to the survival and development of the enterprise. In order to ensure the further development of the enterprise, it is necessary to attach importance to the enterprise service evaluation to continuously improve the enterprise competitiveness. Under the current digital background, the service evaluation of enterprises is faced with a series of problems, among which the most important one is the data processing of service evaluation. Therefore, it is particularly important to establish a scientific digital service evaluation system based on the characteristics of enterprise operation and management mode and combining with the digital background. Enterprise service is an important component of enterprise management, providing satisfactory services to enterprise customers, constantly improving the quality of scientific evaluation services, so as to realize the improvement of enterprise service, which plays a key role in the normal operation of enterprises [1, 2]. Through consulting a large number of research materials, we found that these studies are mainly focused on © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 42–46, 2021. https://doi.org/10.1007/978-3-030-51431-0_7
Digital Service Evaluation System Based on Enterprise Operation Management Mode
43
one aspect of service evaluation, and have not yet formed a comprehensive and complete analysis of service evaluation, nor built a complete system of enterprise service evaluation [3, 4]. Moreover, the combination of these studies and digital background is rare, so the research on digital service evaluation system needs to be further enhanced. From this point of view, the research on digital service evaluation system based on enterprise operation and management mode still has a great room for improvement [5, 6]. In order to promote the deepening of the study, improve the relevant theory research, this paper firstly, to assess the enterprise operation and management and digital service related overview, and with the help of the data fusion algorithm, the main index system to determine the evaluation system of digital services, on the basis of the implementation of the building, the evaluation system of digital services and has carried on the experiment to the operation of the system reliability testing [7, 8]. This paper aims to establish a digital service evaluation system through relevant studies, realize the scientific operation management of enterprises, and further promote the continuous development of enterprises and the improvement of competitiveness [9]. The experimental results of this paper show that the establishment of digital service evaluation system based on enterprise operation management mode is beneficial to the further development of enterprises, and the operation of the system is completely reliable. This study not only promotes the scientific construction of the digital evaluation system, but also lays a certain theoretical foundation for future related researches [10].
2 Method 2.1
Overview of Enterprise Operation Management and Digital Service Evaluation
The good application of management is closely related to the development and survival of the enterprise, and is closely related to the market operation of the enterprise [11]. Enterprise operation and management mode refers to the enterprise management method system established by enterprises according to their own characteristics and market conditions. There are huge differences in the operation and management mode among different enterprises. Scientific enterprise operation mode can create huge economic benefits for enterprises and promote the further improvement of enterprise development level. 2.2
Digital Fusion Algorithm
If the number of digital nodes participating in the fusion increases, the accuracy of the final fusion result will be higher. In the process of digital fusion, data loss will occur, which will affect the calculation results. The specific calculation formula of data loss rate is as follows:
44
C. He et al.
k¼
1 n2 n1
ð1Þ
Where, k represents the probability of data loss, and n1 represents the number of data output by the digital node. N2 represents the amount of data actually received by the digital node. In data transmission, the data loss rate is inversely proportional to the accuracy of the calculation results. The specific calculation formula is as follows: q¼
n m
k ð1 kÞ 1
ð2Þ
Where, q represents the expected value of accurate results in numerical analysis, lambda represents the fusion factor, k represents the probability of data loss, and n and m represent the actual amount of data received and the amount of data received by the network in an ideal state.
3 Test Experiment of Digital Service Evaluation System The first step is to determine the test method. Use Load Runner, Nomon and other tools to detect and monitor the corresponding practice of digital service evaluation system and the use of resources. In the process of testing, the performance test program should be independently compiled to ensure that the test program can adapt to a large number of numerical analysis; After the completion of the test, the different system performance of the production environment and the test environment were compared to draw a more accurate conclusion. The second step is to determine the test tool; The test tool must be able to realize the comprehensive detection of system performance, and be able to directly generate the experimental test data chart after the completion of detection, providing convenience for the result analysis. After a comprehensive comparison of several test tools, this paper selected Mercury Load Runner 9.5 as the test tool for system test experiment. The third step is the preparation of test report. After the completion of the test, I wrote the test report by analyzing the experimental results, which mainly included the test purpose, test method, test process, expected results and actual test results. The test report is a summary of the test experiment of digital service evaluation system.
4 Discuss 4.1
Architecture and Implementation of Digital Service Evaluation System
(1) The overall architecture of the digital service evaluation system The digital evaluation service system consists of different parts, mainly including the following parts: the object of service evaluation, the specific index of service
Digital Service Evaluation System Based on Enterprise Operation Management Mode
45
evaluation, the specific analysis of service evaluation and the relevant service interface, and also includes some related functional design. The functional design of the system is to comprehensively describe the operation and management process of the enterprise from the perspectives of business functions, processes and participants. System function design includes several modules, the most important of which are the following modules, which are object management function module, index repair function module, plan making function module, evaluation program execution function module and service evaluation function module. (2) Database design The database is the core of the digital service evaluation system. The data volume of service evaluation is huge and the data types are diverse, including index information, plan information, user information, score information and evaluation result information. In order to realize the rapid processing of various and complex data, it is necessary to establish the special database of the evaluation system. Finally, oracle LLG database system is selected as the database of digital service evaluation system. 4.2
Testing of Digital Service Evaluation System
In order to ensure the stability of the system in practice, the digital service evaluation system must be tested in all aspects, and the response time, resource occupancy and other performance indicators of the system should be tested. Through the experimental test, it can be found that the digital service evaluation system has good performance in all aspects and can maintain the stability of the system in practical application. The specific experimental data are shown in Table 1 and Fig. 1. The data in the chart are the results of the author’s experimental arrangement.
Table 1. Test results of digital service evaluation system Service evaluation scheme 90% Max Mean Minimum Concurrent response response response response time number of time(s) time(s) time(s) (s) users 20 0.322 0.432 0.794 0.572 40 0.322 0.476 1.212 0.71 * Data came from the in-depth analysis of financial data in the experiment
CPU (100%) 3.2% 6.1%
From the data in Table 1, we can find that the digital service evaluation system has achieved a good effect in the operation process, which indicates that the information platform of maritime cargo transportation supply chain runs smoothly and can stand the test. However, from the data in Fig. 1, we can find that the operation effect of the digital service evaluation system is still some distance from the ideal effect, and it needs to constantly improve the system performance.
46
C. He et al.
80.00%
64.21%
57.34%
60.00%
35.79%
34.57%
40.00% 20.00% 0.00%
Development Speed Real Effect
Development Effect Ideal Effect
Fig. 1. Development of digital service evaluation system
5 Conclusion As the service evaluation management to improve the status in the enterprise operation management and the development of digital enterprise service evaluation has gradually from artificial record to digital networks, however, the current building evaluation system of digital services also faces a series of problems, to the enterprise operation management and development caused the adverse impact, so how to establish scientific evaluation system of digital services, has become a significant research subject.
References 1. Lixin, X., Danxia, S., Zhongyi, W.: Evaluation index system of consumer satisfaction for digital library knowledge service in the network environment. Libr. J. 34(3), 117 (2018) 2. Yingying, L., Juan, W., Chunhou, Z.: The construction of digital resources service evaluation index system in university libraries. J. Intell. 12(5), 167–172 (2017) 3. Chen, J., Shi, Y., Shi, S.: Noise analysis of digital ultrasonic nondestructive evaluation system. Int. J. Press. Vessel. Pip. 76(9), 619–630 (2017) 4. Xie, B.Y., Zhao, D.C.: Study online course evaluation system. Appl. Mech. Mater. 35(2), 2187–2190 (2017) 5. Vance, W.M.: Real-time digital signal processing evaluation system. J. Acoust. Soc. Am. 8 (1), 79 (2017) 6. Arnold, B., Eisenberg, H., Borger, D.: Digital video angiography system evaluation. Appl Radiol 10(6), 81–90 (2017) 7. Chu, Y.: Implementation of the university e-service platform based on user satisfaction of digital service evaluation system. Comput. Telecommun. 15(9), 142–145 (2017) 8. Liuying, Y., Xiaoling, H.: Dynamic joint management of enterprise operation: establishment of theoretic framework. Manag. Rev. 32(15), 541 (2018) 9. Li, G.R., Wang, Z.L., Wang, Y.X.: Production operation management research of mixed private cloud enterprise. Appl. Mech. Mater. 19(10), 635–637 (2017) 10. Gou, H., Huang, B., Liu, W.: A framework for virtual enterprise operation management. Comput. Ind. 50(3), 333–352 (2017) 11. Peng, Z., Yingying, H.: Analysis of competitive intelligence operation mechanism for enterprise management innovation. Inf. Doc. Serv. 33(5), 13–18 (2017)
Information Disclosure Violation of Small and Medium-Sized Listed Companies Based on Strauss’ Grounded Theory Ronghui Xu(&) Wuhan University of Technology, Wuhan 430070, Hubei, China [email protected]
Abstract. In the security market of our country, the event of the illegal disclosure of accounting information happens from time to time. These illegal disclosures not only hurt the interests of investors, make investors lose confidence in the securities market, and are not conducive to building a good image of listed companies in our country. It is a serious obstacle to the healthy and sustainable developed China’s stock market. How to ensure the standardization of accounting information announce of public companies and resolve the quantity problems of accounting information announce will be of great significance to important stakeholders. This article carries on the statistical analysis to the administrative punishment decision written by the China Securities Regulatory Commission from 2018 to September 2019, selects certain sample, carries on the classified statistical analysis to the information illegal disclosure behavior of the small and medium-sized board public company, based on analysis of data obtained from the investigation and puts forward corresponding governance policies, which is conducive to perfecting the information disclosure system in our country. To ensure that small and medium-sized public companies disclose accurate and complete information, curb the frequent occurrence of related irregularities [1–3]. Keywords: Small and Medium-Sized enterprises Strauss grounded theory
Disclosure information
1 Introduction At present, China’s economic development has entered the “middle-income trap”, and SMEs, as the source of innovation and development, are the key factor to break the trap. Your country to resolve the financial problems of small and medium-sized enterprises, financing problems, introduced the plate of the stock market, launched in Shenzhen stock exchange from 2004 to 2019, the number of public companies has reached 940, small and medium-sized plate of start not only benefit from the vast number of enterprises, and the internal management and development of small and medium-sized enterprises (SMEs) innovation specification model. However, China’s listed SMEs have serious information disclosure problems, so we should find out the problems and overcome the existing problems. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 47–53, 2021. https://doi.org/10.1007/978-3-030-51431-0_8
48
R. Xu
For information disclosure research, foreign scholars in recent years, mainly from the industrial point of view of information disclosing and relationship between the upstream and downstream to small and medium-sized enterprises, the main representative is Stekelorum, R. (2018) points out that the enterprises, such as financial data on corporate social responsibility disclosure more can accelerate the construction of SMEs ability, the resulting impact on upstream and downstream benign. Domestic scholars mainly embarks from the two factors both inside and outside the SMEs financial disclosure of related issues, with a river (2017) for SMEs financial report information disclosure of profound and comprehensive discussion from the perspective of internal and external two tells the story of our country SMEs to disclose the problem, the main internal false problem is outstanding, the exterior was realized for the regulatory system is imperfect and the caliber inconsistent use main body caused by the disclosure of error is not comprehensive and disclosure. Although the research on SMEs’ information disclosure is gradually deepened, the existing problems are generally analyzed from a quantitative perspective, and few are considered from a qualitative perspective [3, 4]. From the perspective of grounded theory, this paper explores the problems existing in the disclosing information of public SMEs in China and puts forward corresponding solutions to make up for quantitative deficiencies.
2 Technical Route This paper adopts grounded Theory Research Paradigm and follows Strauss’ analysis path, and adopts the following research route: (1) Through the official website of China Securities Regulatory Commission to obtain information, and collect information about China’s SMEs that are listed on the illegal disclosing (conceptualization process); (2) Following Strauss’ approach to the acquisition of new conceptual categories, analyzing the conceptualized data, from the analysis, the specific categories and their respective proportions of the illegal disclosure of SMEs that are listed (open decoding process) are extracted; (3) Sum up the different small category again, extract the large category category and the proportion of each category on the macro level of the illegal disclosure behavior of SMEs that are listed in our country (the main axis decoding process); (4) Remove the secondary category and retain the “core” category (selective decoding process); (5) Taking each category as the influence factor of the illegal disclosure behavior of SMEs that are listed in our country, we can get the category, weight and order of each influence factor on different levels. To construct the system of influencing factors of illegal disclosing of public companies (grounded theory); (6) Apply the obtained theory to explain and understand the illegal disclosure behavior of SMEs [3].
Information Disclosure Violation of Small and Medium-Sized
49
3 Data Acquisition The sample of this study is from 154 administrative punishment books published on the official website of China Securities Regulatory Commission from 2018 to September 2019. This article has eliminated penalties that do not fall under the category of illegal disclosure of information, as well as penalties for executives of a range of intermediaries and listed companies, including Accounting networks and associations, law firms, securities firms, asset appraisal firms, and media organizations Finally, 124 small and medium-sized public companies were selected as the data sample. Here’s how it works: 1. On the official website of the China Securities Regulatory Commission, focus on the module of administrative punishment letters, targeting the source: SMEs that have engaged in illegal disclosure. 2. The study is aimed at the study of the illegal disclosure behavior of SMEs that are listed, so manual screening of the punishment that does not belong to the illegal disclosure behavior. In addition, sanctions against Accounting networks and associations, law firms, securities firms and other intermediaries have also been screened. 3. To ensure the correctness of the search results, this study also manually eliminated the punishment for the senior management of SMEs that are listed.
4 Data Categorization 4.1
Preliminary Categorization
The initial categorization process is shown in Table 1 (left-to-right), including the open decoding process and the spindle decoding process. Based on the basic data, the open decoding process simply classifies the similar sentences in 124 SMEs that are listed, which reflects the specific concept categories of information disclosure violations of small and medium-sized board-listed companies in China. The results of open decoding show that the problems of information disclosure of SMEs that are listed are relatively concentrated. According to this, the process of spindle decoding is classified into two steps: First, the spindle decoding result 1 is obtained by the low microscopic categorization on the basis of open decoding, and then the spindle decoding result 1 is reintegrated. At a higher macroscopic level, the main axis decoding result 2 is obtained. After decoding the principal axis, the illegal information disclosure of SMEs that are listed in our country can be summarized into 7 small categories at the micro level, and 3 large categories at the macro level. The category names, the specific conceptualization of the subcategories, the relation of the subcategories to the subcategories, and the proportion of sentences in each category are shown in Table 1 [5–8].
50
R. Xu
Table 1. The preliminary categorical results of information disclosing violation behavior of SMEs that are listed Open decoding results
Spindle decoding result 1
Failure to disclose shareholders’ shareholding, share transfer, entrustment, over-proportion reduction, to limit the transfer period, etc. Failure to disclose external guarantee, major debt transfer, major investment, huge loan and bank deposit pledge, etc. Open decoding results
Change in shareholding 16.75%
Failure to disclose the initial public offering prospectus, the fund flow part in the periodic report, the asset purchase and disposal matters, etc. Failure to disclose related party transactions, major lawsuits, major contracts, agreements, major changes in the progress of major matters, major policy changes, etc. Disclosure of false assets, profits, costs, revenues, costs, expenses, etc. Disclosure of false correlation information, interim report, actual controller, research and development, etc. Failure to disclose the cooperation agreement, transfer of funds, equity transfer, guarantee and major investment in time, etc. Insider trading, short-term trading, etc.
4.2
Foreign guarantee, investment and loan 10.99% Spindle decoding result 1
The investment, occupation and use of funds 7.85%
Spindle decoding result 2 Incomplete disclosure 38.74% Incomplete disclosure 38.74% Spindle decoding result 2 Incomplete disclosure 38.74%
Other questions 3.14%
Financial data 19.90% Other questions 8.90%
Major items 23.56%
Other questions 8.90%
Untrue disclosure 28.80%
Unseasonal disclosure 23.56% Other questions 8.90%
Late Categorization
Later categorization is a selective decoding process in which the secondary category is eliminated and the core category is retained. If we eliminate the “other problems” at the micro level in Table 1 and the “other categories” at the macro level, then the illegal disclosure of information in our country will be concentrated into five small categories at the micro level At the macro level, it focuses on three categories and five subcategories, which reserve 79.06% of all the problems of information disclosure, and the three sub-categories cover 91.10% of the total sample size.
Information Disclosure Violation of Small and Medium-Sized
51
5 Construct an Impact Factor System See Table 2. Table 2. The factors affecting information disclosure of public companies in China Research problems
SMEs board listed companies information disclosure behavior
Factors and their weights at them acro level
At the micro level Small factors
P1: Incomplete disclosure
X1: Change in shareholding X2: Foreign guarantee, investment and loan X3: The investment, occupation and use of funds X4: Financial data
P2: Untrue disclosure P3: Unseasonal disclosure
X5: Major items
The weights (%) 16.75
Rank
10.99
4
7.85
5
19.90
2
23.56
1
3
6 Conclusion Applying grounded theory, the results show that: 1. The frequency of incomplete information disclosure in illegal disclosure is 38.74%, which accounts for the largest proportion in the macro-level, indicating that the frequency of incomplete disclosure behavior of SMEs that are listed is the highest. And unreasonable reduction, increase and guarantee behavior accounted for 90% of them. It shows that the disclosure of related party transactions, which can affect financial results and operating conditions, is not comprehensive and complete. The reason is likely to be disclosure of the integrity of the information is more difficult to verify, the company used this way is not easy to be found. 2. The mainly mislead investors’ judgment and decision-making by falsifying financial data and disclosing accounting information, especially false profits. Adopt all kinds of non-conforming accounting treatment methods and policies to achieve asset inflation, debt reduction, income overstatement, cost reduction, and ultimately achieve the purpose of overstatement profit. Listed companies may also disclose some other false information, such as false actual controller, false agreement and so on to mislead investors, which will eventually damage the interests of investors. About 80% of SMEs fail to disclose relevant agreements and matters in time, and nearly one quarter fail to disclose relevant agreements and matters in time. The failure to disclose the guarantee matters in time accounts for 60% of the total, which shows that the
52
R. Xu
financing guarantee of SMEs is a serious problem, the formal guarantee procedures are complicated, the liquidity is weak, and the informal guarantee is expensive, but it has a stronger Operability than time cost or liquidity. Short-term trading accounts for 90% of the total in other categories. Short-term trading not only makes the company’s production and operation more volatile, but also misleads investors’ judgment. For outside the company does not understand the high-level decision-making information of investors with great unfairness. And although the legal requirements of short-term trading is more stringent, but the higher profits in the case of high-level officials will be to play a marginal way to bear a higher risk, so the legal requirements of short-term trading need to be further improved.
7 Relevant Suggestions and Measures 7.1
Raising the Cost of Breaking the Law
One of the important reasons is that the illegal cost is too low. When the illegal cost is more than the illegal benefit, the illegal information disclosure can be effectively restrained. The CSRC should strengthen the punishment of listed companies in violation of regulations from the aspects of law, administration and public opinion, and increase the cost of violation. From the legal point of view, at present, most of the penalties for listed companies’ information disclosure violations are administrative penalties, rarely involving criminal penalties and civil penalties, and the amount of penalties is relatively small, not a deterrent. Relevant departments should increase the amount of penalties, extend the market entry period, and strengthen the penalties. In addition, we should constantly improve and add a wealth of punishment measures. For example, we can set up special securities court and Securities Arbitration institution, enlarge the limit of criminal punishment and raise the legal term of freedom penalty, perfect the civil compensation liability, and establish the relevant clear stipulation of civil liability in the securities law. From the aspect of public opinion, the illegal disclosure of information for SMEs, the adverse social impact is not enough, not enough to curb violations, resulting in some companies repeatedly in violation of the law. Relevant departments can use the power of public opinion to curb violations. For example, create a credit record of all listed companies and their directors, senior managers and intermediaries. For the small and medium-sized listed companies that have violated the rules and regulations, they can restrict their market rights and relax their market rights for the companies with good reputation. And the integrity of the public records, so that it from the company’s individual behavior to expand market behavior, so that the impact of illegal behavior to expand financing, sales and other links. 7.2
Raising the Level of Regulation of External Institutions
1. Improve government regulation First, the CSRC should constantly monitor the market environment to improve the information disclosure system and standards. Second, law enforcement personnel need
Information Disclosure Violation of Small and Medium-Sized
53
to analyze specific issues to improve their ability that can understand and apply laws and regulations Flexible application of laws and regulations in handling relevant cases. Third, the law enforcement process open to the public, facilitate public supervision, improve the rationality of case handling. 2. Raise the level of Certified Public Accountant and enforce discipline First, we should strengthen the assessment of the professional competence of the Certified Public Accountant, especially for the emerging industries, we should strengthen the professional training of the Certified Public Accountant. Second, the Certified Public Accountant’s work ethic should be improved, and penalties for Certified Public Accountant violations should be increased. In this way, we can ensure the independence of their practice and the standardization [9, 10]. Acknowledgements. This work was supported by 20172s0054 and 195203003.
References 1. Corbin, J.: Grounded theory. J. Positive Psychol. 12(3), 301–302 (2017) 2. Wiesche, M., Jurisch, M.C., Yetton, P.W., Krcmar, H.: Grounded theory methodology in information systems research. MIS Q. 41(3), 687–695 (2017) 3. Kim, J.E.: Changes in Strauss & Corbin’s grounded theory. J. Korean Acad. Nursing. 49(5), 505–514 (2019) 4. Stekelorum, R., Laguir, I., Elbaz, J.: CSR disclosure and sustainable supplier management: a small to medium-sized enterprises perspective. Appl. Econ. 50(46), 5017–5030 (2018) 5. Sadeh, F., Kacker, M.: Quality signaling through ex-ante voluntary information disclosure in entrepreneurial networks: evidence from franchising. Small Bus. Econ. 50(4), 729–748 (2018) 6. Zhao, M., Dong, C.: Quality disclosure strategies for small business enterprises in a competitive marketplace. Eur. J. Oper. Res. 270(1), 218–229 (2018) 7. Li, H., Shi, X.W.: Discriminatory information disclosure. Am. Econ. Rev. 107(11), 3373– 3379 (2017) 8. Dutta, S., Nezlobin, A.: Information disclosure, firm growth, and the cost of capital. J. Finan. Econ. 123(2), 420–426 (2017) 9. Cheung, A., Hu, W.: Information disclosure guality: correlation versus precision. Account. Finance 59(2), 1050–1051 (2019) 10. Kaymak, T., Bektas, E.: Corporate social responsibility and governance: information disclosure in multinational corporations. Corp. Soc. Responsib. Environ. Manag. 24(6), 562–565 (2017)
Evaluation Modeling Establishment for the Risk Degree of Ship Collision Hongdan Liu, Yue Sun(&), and Bing Li College of Automation, Harbin Engineering University, Harbin, Heilongjiang, China [email protected], {576194000,libing}@hrbeu.edu.cn
Abstract. Aim to solve the problem that the qualitative and quantitative the influencing factors of ship navigation safety is to be difficult to merger analysis, due to the large amount of calculation and complicated realization process of ship collision risk model, the strategy of risk degree of ship collision evaluation based on the cloud model theory is introduced, the data of cloud model of DCPA (Distance to closed point of approach), TCPA (Time to closest point of approach) and CRI (Collision Risk Level) is formed to reasoning risk degree of ship collision based on double conditional single rule generator. According to the different ship encounter situation, the order is sorted on the collision risk degree between own and target ship by the cloud modeling inference mechanism. Thus, the availability and feasibility of this algorithm are verified in ship collision risk modeling. The establishment of this model enables the crew members to determine the key collision avoidance objects in time, to reduce or avoid the occurrence of collision accidents at the source. Keywords: Risk degree of ship collision Distance to closed point of approach Time to closest point of approach Cloud model theory Double condition single rule generator
1 Introduction Maritime navigation urgently needs to improve the automatic collision avoidance decision-making system of maritime navigation, and the core part of navigation system is to study the degree of collision risk of ships, which can reduce the collision of ships, is important for the safety of maritime navigation [1]. For ship collision preventation, many complex problems are required to take into overall consideration. The existing methods for ship collision risk evaluation, including process failure mode and effects analysis (PFMEA), gray relational decision-making, fuzzy theory and fuzzy comprehensive assessment etc. [2–5], don’t have ability to merger analysis of the qualitative and quantitative the influencing factors of ship navigation safety. Which leads to the large amount of calculation, complicated realization and the accuracy of the evaluation results decreased. A new decision-making method named as cloud model theory was first proposed by Academician Li Deyi [6, 7]. The cloud model theory is suitable to solve the problem © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 54–63, 2021. https://doi.org/10.1007/978-3-030-51431-0_9
Evaluation Modeling Establishment
55
of ship collision risk evaluation due to takes both consideration to the fuzziness and randomness at the same time, and realizes the combination and transition of qualitative and quantitative descriptions. Based on “DCPA” and “TCPA” [8], ship collision risk degree model with two-dimensional multi-rule cloud model is proposed, in order to increase the accuracy and effectiveness of the collision risk degree modeling.
2 Conditional Single Rule Cloud Generator and Its Algorithmic Implementation Cloud generator is an crucial junction for inference of cloud model, and also a model that can realize the inter-conversion between quantitative and qualitative concepts. Cloud generator can be divided into three types: forward cloud generator, backward cloud generator and conditional cloud generator, and conditional cloud generator can be divided into two types: X conditional cloud generator and Y conditional cloud generator. The mufti-condition single rule generator is consist of many antecedent cloud generators and one consequent cloud generator, which are expressed as “If A1, A2, … An, then B”. According to the design needs, the two-condition single rule generator is introduced here because two influencing factors are needed to reason the model. As shown in Fig. 1.
Fig. 1. Double condition single rule generator
The structure chart of the double condition single rule generator is constituted by two antecedent cloud generators and one consequent cloud generator, which is expressed as “If A1 and A2, then B”. Where, ðExA1 ; EnA1 ; HeA1 ; ExA2 ; EnA2 ; HeA2 Þ represent the membership cloud characteristic value of two-dimensional qualitative concept A1 and A2, ðExB ; EnB ; HeB Þ is the subordinate cloud eigenvalue of the consequent qualitative concept B, CGA is the X conditional cloud generator and CGB is the Y conditional cloud generator. If input xA1 and xA2 stimulation qualitative regulation antecedent cloud generator CGA, then CGA can be random output ðxA1 ; xA2 ; lÞ, and it will be the input of CGB, and then CGB will output random cloud drop dropðxB ; lÞ. The implementation procedure is input: membership cloud eigenvalues ðExA1 ; ExA2 ; EnA1 ; EnA2 ; HeA1 ; HeA2 Þ and quantitative values ðxA1 ; xA2 Þ of the two-
56
H. Liu et al.
dimensional qualitative concepts A1 and A2. The membership cloud characteristic value of the consequent qualitative concept B is ðExB ; EnB ; HeB Þ; Output: the quantitative value of consequent qualitative concept xB is that met with the certainty degree l. (1) According to the input cloud drop characteristic value, En is expectation, He is standard deviation, and En0i is generated as the random number: En0A1 ¼ normðEnA1 ; HeA1 Þ
ð1Þ
(2) According to the input cloud drop characteristic value, EnA2 is expectation, HeA2 is standard deviation and En0A2 is generated as the random number: En0A2 ¼ normðEnA2 ; HeA2 Þ
ð2Þ
(3) Calculated certainty degree l: l¼e
ðxA1 ExA1 Þ2 ðxA2 ExA2 Þ2 2ðEn0 Þ2 2ðEn0 Þ2 A1 A2
ð3Þ
(4) According to the input cloud drop characteristic value, EnB is expectation, HeB is standard deviation, En0B is generated as the random number: En0B ¼ normðEnB ; HeB Þ
ð4Þ
(5) If xA1 and xA2 activate the rising edges of their cloud models, respectively, then the input value xB also activates the rising edges of cloud model of B, the formula is expressed as following: If xA1 ExA1 ; xA2 ExA2 ; then xB ¼ ExB En0B
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 ln l;
(6) If xA1 and xA2 activate the rising edges of their cloud models, respectively, then the input value xB also activates the rising edges of cloud model of B, the formula is expressed as following: If xA1 [ ExA1 ; xA2 [ ExA2 ; then xB ¼ ExB þ En0B
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 ln l;
Evaluation Modeling Establishment
57
(7) If xA1 activates cloud model rising edge of A1 , then l1 is generated as the certainty degree. If xA2 activates cloud model decreasing edge of A2 , l2 is generated as certainty degree. The input value xB is relation with l1 and l2 . The formula is expressed as following:
If xA1 ExA1 ; xA2 [ ExA2 ; then l1 ¼ e l2 ¼ e
ðxA2 ExA2 Þ2
ð
2 En0 A2
Þ ; x ¼ Ex þ En0 B2 B B 2
ðxA1 ExA1 Þ2
ð
2 En0 A1
Þ ; x ¼ Ex En0 B1 B B 2
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 ln l1 ;
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 ln l2 ; xB ¼ ðxB1 l1 þ xB2 l2 Þ=ðl1 þ l2 Þ;
(8) If xA1 activates cloud model rising edge of A1 , then l1 is generated as the certainty degree. If xA2 activates cloud model decreasing edge of A2 , l2 is generated as certainty degree. The input value xB is relation with l1 and l2 . The formula is expressed as following:
If xA1 [ ExA1 ; xA2 ExA2 ; then l1 ¼ e l2 ¼ e
ðxA2 ExA2 Þ2
ð
2 En0 A2
Þ ; x ¼ Ex En0 B2 B B 2
ðxA1 ExA1 Þ2
ð
2 En0 A1
Þ ; x ¼ Ex þ En0 B1 B B 2
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 ln l1 ;
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 ln l2 ; xB ¼ ðxB1 l1 þ xB2 l2 Þ=ðl1 þ l2 Þ:
3 Cloud Model Ship Collision Risk Degree Modeling Qualitative language variables described in ship collision risk degree can be transformed the qualitative concept of cloud object expression by cloud model inference mechanism. The specific expression can be achieved by the multi-rule cloud generator map constructed. In the view of this paper, there are 2 variables input in the ship collision risk degree constructed. There are different permutation and combination with different ship collision risk degree between 2 variables input. Combining with the theory of the double condition multi-rule cloud generator, the inference mechanism of ship collision risk degree cloud model is shown in Fig. 2. Among of them, “DCPA” is expressed as M, “TCPA” is expressed as N, “ship collision risk degree CRI” is expressed as Q, CG-A represents the two-dimension X condition cloud generator between “DCPA” and “TCPA”, which the characteristic value of membership cloud is ðExM ; EnM ; HeM ; ExN ; EnN ; HeN Þ, and CG-B represents the one dimension Y cloud generator of “ship collision risk degree”, which the characteristic value of membership cloud is ðExQ ; EnQ ; HeQ Þ. The input variables of ship collision risk degree cloud model are shortest encounter distance M and shortest encounter time N, output variables are the ship collision risk degree Q. According to the research on the “Rule”, the thinking ways of mate of the
58
H. Liu et al.
Fig. 2. Ship collision risk degree cloud model theory inference
deck, that is to say, the concepts of nature language is divided based on the cloud model by sea density, coastal and open water. Thus, the 3 numeral characteristics of cloud model input and output variables are decided; the concepts of output and input variables in CRI cloud model are divided, the m inference rules are built in CRI cloud model, and uncertain inference rule base is generated. The inference mechanism of CRI cloud model collision risk degree is: UðM; N Þ ! Q Among of them, U represents the inference mechanism of cloud model, M and N are input variables, and Q is output variables. If a group of specific Min. encounter distance and Min. encounter time is input, that is, ðM; N Þ, the anteater generator will be stimulated separately by different rules, certainty degree li value is generated randomly, these values will reflect the degree of activation the relevant qualitative rules. li will stimulate CG-B to generate a random group of cloud drop dropðQi ; li Þ, which reflect that when the certainty degree is li , the ship collision risk degree is Qi . Finally, these cloud drops are fused into one cloud drop through geometric operation, that is, the corresponding output of the group ðM; N Þ is Q. The establishment of model shows the relationship between the ship collision risk degree and the Min. encounter distance and the Min. encounter time. The establishment of model shows the relationship between the ship collision risk degree with the DCPA and TCPA, which can show the uncertainty of the ship collision risk degree in the process of ship sailing. Therefore, in different encounter work conditions, only by changing input the course parameter value of our ship and target ship, the change of ship collision risk degree can be reflected. The whole mechanism explains the process that uncertainty is transformed from the input variables to output variables. Therefore, the modeling of ship collision risk degree is realization based on uncertainty and fuzziness of cloud model theory.
Evaluation Modeling Establishment
59
Based on the inference mechanism established by cloud model and the concepts of DCPA, TCPA and CRI, qualitative concepts are obtained from the constructed ship collision risk database. The constructed rule generator is on the basis of X condition cloud generator and Y condition cloud generator, and the inference database generated by the qualitative inference rule is realization. When inputting a particular group of value, based on the transmission of cloud model inference mechanism, the uncertainty and fuzziness of input variables can be transformed to the output variables well. The inference block diagram of ship collision risk degree based on cloud model is seen as Fig. 3.
Activate the cloud with largest certainty degree
Input DCPA
Input TCPA
DCPA cloud model
TCPA cloud model
Activate the cloud with second largest certainty degree
Activate the cloud with largest certainty degree
Activate the cloud with second largest certainty degree
Calculate joint certainty degree
Largest certainty degree
Second largest certainty degree
Two Rules for the Activation of Maximum and Sub-Maximum Degrees of Certainty
Access rule base
Activate the concept of ship collision risk degree
Four cloud drop are produced
The expectation and entropy of virtual cloud are calculated by the outermost cloud drop
The expectation of virtual cloud regard as the output of ship collision risk degree
Fig. 3. Inference gram of cloud model
Due to the uncertainty involved in the inference process, it can be described as that when the same group of data is multiple input, the output results are also not fixed. As seen in Fig. 4, when the given Min. encounter distance and Min. encounter time is a group of precise input value ðM; N Þ, each qualitative concepts of the cloud rule antecedent will be activated by that input value, respectively. The activation degree of li corresponds to the largest and second largest certainty clouds, respectively. Due to 2
60
H. Liu et al.
Fig. 4. Curve chart of ship collision risk degree change with the distance on encounter
input variables will generate 4 clouds, the calculation is carried out by these 4 clouds together with degree of certainty and the maximum joint certainty degree and second joint certainty degree ðl1 ; l2 Þ will be taken. The 2 qualitative rules are corresponding activation. The cloud drop ðQ1 ; l1 Þ and ðQ2 ; l2 Þ in the outermost will be taken. The, the ship collision risk degree Q is calculation by geometric method. The output result Q is expressed by Eq. (5): Q¼
Q1
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 lnðl2 Þ þ Q2 2 lnðl1 Þ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 lnðl1 Þ þ 2 lnðl2 Þ
ð5Þ
Since the above counting process is only the result of one operation, based on the inference procedure of cloud model, it is involved into the generation of multiple random process. For the same input, some differences are existed in the inference operation results in every time, and it is the feature of cloud model uncertainty. In actual application, in order to solve this issue, the inference process carry out circular process with the limited time. Then, the output results generated by limited time calculation carry out average value operation to be the final CRI output of ship collision risk degree.
4 Cloud Model Ship Collision Risk Degree Simulated Analysis The situation of ship encounter is divided by angel. According to the “Rule” there are 3 situations of ship encounter: meeting, cross and overtaking [9, 10]. The discussion and analysis is done in difference encounter situations. Under the condition of unchanged the other navigation parameters, simulation test is carried out in the condition of encounter between the own ship and target ship, only by changing the ship azimuth angle. According to the process output result, the change of risk degree is observation. The relevant navigation parameters of our ship and target ship are input, as following: let, our ship speed is 14 kn, ship 1 speed is 7 kn, ship 2 speed is 14 kn, ship 3 speed is 21 kn and ship 4 speed is 28 kn. Under the difference encounter situation, the
Evaluation Modeling Establishment
61
relationship that the ship collision risk degree changes with the distance is shown, as following: (1) On encounter, the relationship that ship collision risk degree change with distance is shown in Table 1.
Table 1. On encounter, ship collision risk degree value table Distance D Ship 1 Ship 2 Ship 3 Ship 4 0 1.0000 1.0000 1.0000 1.0000 2 0.7646 0.7923 0.8689 0.9121 4 0.5523 0.6008 0.6887 0.7356 6 0.4688 0.5133 0.5621 0.6093 8 0.4265 0.4803 0.5136 0.5637
According to the data in Table 1, on encounter, relative distance D of two ships is abscissa and the collision risk degree CRI is ordinate, the curve that on encounter, ship collision risk degree changes with distance is drawn, as shown in Fig. 4. (2) If the orientation is 30°, the relation of ship collision risk degree change with distance, as seen in Table 2. Table 2. If the orientation is 30°, the value table of ship collision risk degree Distance D Ship 1 Ship 2 Ship 3 Ship 4 0 1.0000 1.0000 1.0000 1.0000 2 0.7646 0.7923 0.8689 0.9121 4 0.5523 0.6008 0.6887 0.7356 6 0.4688 0.5133 0.5621 0.6093 8 0.4265 0.4803 0.5136 0.5637
According to the data in Table 2, abscissa is the relative distance D between 2 ships, and longitudinal coordinate is the ship collision risk degree CRI. When draw orientation is 30°, curve chart of ship collision risk degree change with distance, as seen in Fig. 5.
62
H. Liu et al.
Fig. 5. If the orientation is 30°, curve chart of ship collision risk degree change with distance
5 Conclusion This paper constitutes the ship collision risk degree model based on cloud model theory by combination the fuzziness with uncertainty of cloud model, which realizes the rank of ship collision risk under multi-ship encounter work conditions, the time is reduces that decide the key collision preventation objects and sequence decision-making in the process of ship collision prevention. It is beneficial to make the right judgment timely for mate of the deck. The accident can be reduced or avoided from the source. This design proposed in this paper will be effectively to perfect the ship collision avoidance system, decrease the number of ship collision accident caused by the human factors, and further accelerate the development of ship collision prevention system with smarter and more automate. Acknowledgment. It is appreciated that this research is supported by Fundamental Research Funds for the Central Universities 3072019CF0406, 3072019CF0407.
References 1. Zareei, M.R., Iranmanesh, M.: Optimal risk-based maintenance planning of ship hull structure. J. Mar. Sci. Appl. 17(4), 603–624 (2018) 2. Kim, K.I., Lee, K.M.: Ship encounter risk evaluation for coastal areas with holistic maritime traffic data analysis. 2nd Int. Conf. Adv. Sci. Inf. Technol. 23, 9565–9569 (2017) 3. Stavrou, D.I., Ventikos, N.P.: A novel approach in risk evaluation for ship-to-ship (STS) transfer of cargo using process failure mode and effects analysis (PFMEA). J. Risk Res. 19(7), 1–21 (2016) 4. LiuSheng, L.: Application of grey relational decision-making on determination of ship collision risk degree. Revista Tecnica de la Facultad de Ingenierria University Del Zulia 39 (3), 359–365 (2016) 5. Wen, X.U., Jiang-qiang, H.U., Jian-chuan, Y.I.N., Ke, L.I.: Composite evaluation of ship collision resk index based on fuzzy theory. Ship Sci. Technol. 39(7), 78–84 (2017) 6. Omotosho, T.V., et al.: Performance and evaluation of eight cloud models on earth—space path for a tropical station. In: Space Science and Communication for Sustainability, pp. 23– 35. Springer, Singapore (2018)
Evaluation Modeling Establishment
63
7. Deyi, L., Haijun, M., Xuemei, S.: Membership clouds and membership cloud generators. J. Comput. Res. Dev. 6, 15–20 (1995) 8. Szlapczynski, R., Szlapczynska, J.: An analysis of domain-based ship collision risk parameters. Ocean Eng. 126(11), 47–56 (2016) 9. Liu, H., Liu, S., Zhang, L.: Study and simulation on intelligent multi-ship collision avoidance strategy. J. Comput. Theor. Nanosci. 13, 194–210 (2016) 10. Liu, H., Deng, R., Zhang, L.: The application research for ship collision avoidance with hybrid optimization algorithm. IEEE Int. Conf. Inf. Autom. 8, 760–767 (2017)
Choice of Profit Models for the Transformation and Development of Traditional Industrial Enterprises in the Internet Industry Shanshan Wu1(&), Xingpei Ji1, and Rui Tang2 1
State Grid Energy Research Institute Co., Ltd., Beijing, China [email protected] 2 Harbin University of Commerce, Harbin, China
Abstract. This article sorts out the profit model set by combing the profit models of the main industry fields and their specific content, and provides specific case analysis. It mainly focuses on three types of “Internet plus” emerging industries, namely cloud computing services, industrial smart manufacturing services and new retail, and proposes profit model selection and related scenario analysis suitable for the transformation and upgrading of traditional industrial enterprises and innovative business models. Keywords: Profit models Scenario analysis
Traditional industrial enterprises Internet plus
1 Introduction The profit model is a business structure and operation structure for the purpose of profit established by the company in the business process [1]. The business structure mainly refers to the business content and its space-time structure such as the transaction object, transaction content, transaction scale, transaction method, and transaction channel selected by the outside. The operation structure refers to the R&D, procurement, production, marketing, management and other business content and its space-time structure within the enterprise in order to meet the needs of the business structure [2]. The former directly reflects the efficiency of enterprise resource allocation, while the latter reflects the efficiency of enterprise resource allocation. The purpose of this article is to sort out the profit models and their specific content in the main industry fields, extract the profit model sets, and provide specific case studies for the reference. The profit model of the e-commerce industry includes sales model, application sharing model, function subscription model, consulting service model, cooperative business model, advertising model, search bidding model, membership model, financial services, and online and offline integration model. The sales model includes the B2C, B2B, and C2C models, which mainly refer to the model in which companies obtain profits by selling tangible and intangible goods. Application sharing model refers to helping customers complete transactions or achieve a certain purpose, and then collect commissions or divide customers’ income according to a certain percentage. Functional subscriptions include platform subscriptions, software subscriptions and information © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 64–69, 2021. https://doi.org/10.1007/978-3-030-51431-0_10
Choice of Profit Models for the Transformation
65
subscriptions, and refer to profit models in which companies provide users with information, resources, and services and charge a certain fee [3]. Consulting services refer to the provision of analytical guidance services and fees to customers based on their resources. Cooperative operation refers to a profit model in which enterprises reduce costs and obtain greater profits by joining together. The advertising model is a profit model common to all e-commerce platforms, that is, to obtain profits by selling advertising spaces through advertising agencies or self-sale [4]. The search auction mode refers to a customer purchasing a keyword through the auction mode and obtaining a fixed ranking of the search results for that keyword within a certain period of time. Membership mode means that after paying a specified amount of membership fees, consumers can enjoy the information content, download services, and ad-free services provided on the website. Financial services refer to the financing of loans, payment and repayment of services based on the platform to obtain profits. The onlineoffline integration mode refers to a model in which enterprises organically combine offline physical stores with online stores to achieve resource communication and information interconnection to improve corporate performance [5]. The profit model based on the industrial Internet platform includes resource sharing model, professional service model, consulting service model, function subscription model, application sharing model, financial service model, sales model [6], etc. Due to the professionalism and complexity of the industrial Internet platform, the current industrial model still focuses on traditional industrial methods and enterprise users, and more emphasis on personalized services for specific scenarios [7]. Therefore, profit models such as professional services, consulting services, and feature subscriptions are mainly used. Other models are also actively being explored. Among them, the resource sharing mode includes the informatization of production management, and the electronic informatization of procurement planning, production planning, sales resources and logistics resources. The infrastructure is shared with other enterprises in the form of lease, which reduces the production cost of the enterprise and increases profits. Professional services refer to platform-based system integration services and are the most important profit means for current industrial Internet platform companies. Consulting services refer to the analysis of data gathered on its platform to provide clients with analytical services to guide business development. Functional subscriptions include subscriptions to IT resources, industrial software services, functional component, industrial SaaS and hosted services in the field of asset operation and maintenance or energy consumption optimization. Application sharing refers to the fee-sharing model of service applications provided by application development stores. Due to the small scale of the current application store, this model has just begun. But as the market matures, it may also become a new platform for profit in the future. A sales model is a model that earns profits by trading products, capabilities or knowledge. In terms of industrial product transactions, some industrial Internet platforms rely on their agglomeration of industrial chain resources to provide industrial product transaction services. Such services are similar to commodity transactions on e-commerce platforms, and are currently more common. Financial services mainly use the data collected by the platform to portray corporate portraits and provide profitable models of financial services for enterprises, which mainly includes data plus insurance, data plus credit, and data plus leasing.
66
S. Wu et al.
This article focuses on the three types of “Internet plus” emerging industries: cloud computing services, industrial smart manufacturing services and new retail. It proposes profit model selection and related scenario analysis suitable for the transformation and upgrading of traditional industrial enterprises and innovative business models.
2 Cloud Computing Service Traditional enterprises can rely on their own advantages to make full use of hardware resources such as infrastructure to expand the cloud computing service industry. The profit model can adopt the existing mainstream cloud service provider profit model: IaaS model (infrastructure service model), PaaS model (platform service model), SaaS model (software service model). It can also rely on the advantages of enterprises in micro data, and adopt the DaaS (data service) profit model. Among them: IaaS model: Provide customers with services such as virtualized elastic computing resources, storage resources, and network resource security protection [8]. By charging fees based on time, demand and traffic, IaaS is the most basic profit model of the cloud computing industry and is the main source of profit for cloud computing. PaaS model: Provide users with services for application software development, testing, deployment and operation environment. Because the company has weak technology and personnel accumulation in this field, it needs joint development with external companies, and the profit margin is average. SaaS model: The software service model is a profit model that uses the Internet as a carrier and a browser as an interactive method to transfer server-side program software to remote users to provide software services [9]. It mainly relies on earning software spreads as a source of profit and has a large profit margin. DaaS model: Based on the company’s power data resources, it provides customers with decision-making consulting services such as power data credit, power meteorological services and macroeconomic situation research by providing management consulting and technical services to customers [10]. Scenario 1: Office on the cloud Use company’s original plant or production site to build an edge computing center, cooperate with cloud computing center to form a cloud-side collaborative architecture. Through enterprises and office on the cloud, customers can accelerate the realization of digital, network and intelligent transformation, reduce the cost of information development and construction, facilitate access to the office anytime, anywhere. Scenario 2: Computing resource lease The company can provide flexible computing services to meet the computing needs of customers such as startups and small and micro enterprises. Customers can expand or reduce computing resources in real time, reduce software and hardware procurement costs, and simplify IT operations and maintenance (Fig. 1).
Choice of Profit Models for the Transformation
67
Fig. 1. Computing resource leasing scenario
3 Industrial Intelligent Manufacturing Services Traditional large enterprises developing industrial intelligent manufacturing industries can rely on the experience and advantages in equipment manufacturing, informatization, and the Internet to help other enterprises achieve transformation and upgrading. It can also learn from profit model of existing industrial Internet companies, develop applications for users, tap data value. Internet of things access mode: Utilize the company’s construction experience and technology in the ubiquitous electric power IoT to provide manufacturing enterprise customers with hardware and software services such as equipment IoT access, and obtain profits by charging service fees. Feature subscription mode: Based on the industrial Internet platform, it provides customers with subscriptions to application software, and charges fees based on application modules and traffic, such as general functional components: big data analysis and machine learning. The profit model has the characteristics of one-time development and reusability, and has a large profit margin. Personalized customization mode: Because manufacturing enterprises have very different application scenarios, companies can rely on industrial units to obtain profits through customized delivery or introduce external companies and charge fees through cooperative operations. Transaction sharing mode: Through convergence of the platform, business information is pushed to the companies on both sides of supply and demand to realize connection between enterprises, users and enterprises. The company can obtain profits by charging transaction service fees. Scenario 1: Production energy consumption optimization In actual production, the enterprise can install intelligent sensing terminals for other manufacturing enterprises, analyze the operating conditions of the equipment and production efficiency by monitoring the energy consumption of each piece of equipment. For the production link with high energy consumption, a corresponding system solution is proposed to save the production energy cost of the enterprise. Scenario 2: Device health diagnosis By adding intelligent sensors to production equipment, real-time collection and analysis of equipment operating data, status data, and vibration data, build equipment health diagnostic models, and send them to the cloud / edge computing center for comprehensive diagnosis. This can effectively reduce the frequency of invalid repairs, reduce labor and material costs, and save business operating costs (Fig. 2).
68
S. Wu et al.
Fig. 2. Equipment health diagnosis scenario
4 New Retail Services According to the above, the new retail has more profit models to choose, but this article mainly discusses the transformation and upgrading of traditional industrial enterprises and the expansion of new retail. Therefore, it has the following three characteristics compared to ordinary retail: First, rely on existing hardware or software to support other businesses in retail business; Second, rely on the advantages of the main business to provide retail for related goods and services; the third is to focus on the new retail model, innovate “online plus offline” product services, and change from a product supplier to an integrated service provider. Combining these characteristics, the profit models of traditional industrial enterprises for developing new retail mainly include channel leasing, earning spreads, and O2O. Among them: Channel lease model: Assessing the operating rights of offline resources such as factories and warehouses, and conducting external leasing or establishing joint ventures with external companies as equity investments, can carry out related businesses without investment, but value-added space is limited. Earn spread model: Provide relevant products for the company’s offline resource radiant population. According to the nature of different products, clarify the scope of radiation and customer positioning, and mainly rely on earning commodity price differences as a source of profit. Under this model, a large amount of investment is not required, but a more detailed market survey is required to determine a specific investment plan. O2O model: Relying on the existing platform and customer service team of the enterprise, through big data analysis, it provides customers with “online plus offline” products and services, and opens “last mile” of services. This can also help the retail to transform and upgrade, and create a new retail format that demands lead to supply. The model doesn’t need a lot of investment, but personnel responsibilities are faced with major adjustments and large profit margins. Scenario 1: “Online plus Offline” retail A power grid company relies on its existing platform to provide users with pre-sale consultation on power equipment based on data such as electricity consumption behaviors and equipment energy operation. And combined with e-commerce platform channel resources and localized service teams, it provides online users with on-site
Choice of Profit Models for the Transformation
69
installation or maintenance services, and realizes one-stop services such as consulting, procurement, and installation of electrical equipment. Scenario 2: Power station retail Relying on the channel advantages of electric vehicle charging and replacing stations, a charging operator provides customers with food and entertainment, travel information, electric vehicle maintenance, car washing and beauty products and services, and builds an electric vehicle charging and replacement ecosystem, using the unique attributes of longer charging and replacing time, according to customer needs, site locations, and space resources, etc. Acknowledgements. This article is supported by 2018 Science and Technology Project of State Grid Corporation of China (Research and Application of Quantitative Evolution Model of New Energy Industry Format Development Based on New Consumption Pattern, No. SGHE0000KXJS1800549).
References 1. Juejin, Z.: Analysis and innovation of China construction machinery agent profit model. Today’s Constr. Mach. (08), 90–93 (2009) 2. Yuanyuan, C.: Analysis of profit model and its application in aircraft subcontracting projects. Decis. Inf. (Mid-Term) (2) (2015) 3. Juxiang, H., Yihong, M.: Survey and analysis of profit model of domestic mobile phone reading service. Libr. Inf. Serv. 56(06), 140–144+148 (2012) 4. He, L., Fuyi, F.: Analysis of E-commerce profit model. Chin. Manag. Inf. 18(20), 137–138 (2015) 5. Liang, W., Hongyan, Y.: Interactive integration of online and offline enterprises in the “Internet plus” background: motivations, models and development trends. Enterp. Econ. (2), 138–144 6. Industrial Internet Industry Alliance: Industrial Internet platform white paper. http://www. miit.gov.cn/n973401/n5993937/n5993968/c6002326/content.html (2017). 1 Apr 2018 7. Yan, L.: Constraints and promotion strategies for the development of the industrial Internet platform. Reform (10), 35–44 (2019) 8. Ruyi, X.: Design and implementation of virtual computing resource management framework in IaaS cloud platform. Dissertation, Beijing University of Posts and Telecommunications (2015) 9. Espadas, J., Molina, A., Jiménez, G., et al.: A tenant-based resource allocation model for scaling software-as-a-service applications over cloud computing infrastructures. Futur. Gener. Comput. Syst. 29(1) (2013) 10. Baolong, Y.: Research on software service model based on cloud computing. Dissertation, Beijing Jiaotong University (2012)
Influence of Internet Finance on Commercial Bank Financial Services Zi Wang(&) Department of Economics and Management, Zhixing College of Hubei University, Wuhan, China [email protected] Abstract. At the background of the current concept “Internet+”, the development of Internet financial products, such as Yu’E Bao, has profoundly affected people’s behavior and also affected the traditional commercial bank financial management business. On the one hand, Internet financial products have diverted the customers of commercial banks with their advantages such as low purchase thresholds, high returns, and high liquidity. On the other hand, they have encouraged commercial banks to change their operating concepts and innovate their products. This paper combines empirical analysis to find that Internet finance and traditional financial services have developed in a balanced manner in the long run, and the positive influence plays a dominant role. Finally, based on this empirical conclusion, we recommend commercial banks build a customercentric business model, diversify their financial products and service functions, pay attention to big data and cooperate with Internet financial companies. Keywords: Internet finance
Commercial bank “Internet+” Yu’E Bao
1 Introduction As vigorous development of Internet economy, the internet already has a profound impact on the behavior of people in China. After 2010, some internet companies brought big data, cloud computing and other internet technologies into the financial industry, and then continuously produced new internet financial products which breaking the traditional monopoly of commercial banks on financial products. With the advancement of financial business online, Internet finance has become an important trend for future financial development. Internet finance products also emerge in an endless stream, mainly including three major types of products: Yu’e Bao internet financial services, P2P internet financial products, and insurance internet financial products. In 2013, Alipay Co., Ltd. Tianhong Fund launched Chinese first direct sales Internet fund which named Yu’e Bao. Yu’e Bao has innovated in many ways, so the funds transferred by customers to Yu’ebao exceeded 10 billion yuan during the short launch period which aroused the attention of the financial sector and society. At present, Internet Finance has already become a “double-edged sword” with the background of “Internet + Finance”. It brings convenient capital management and operation methods to investors, it also has the superiority of low purchase threshold, high yield and high liquidity at the same time, which has impacted the traditional financial services. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 70–75, 2021. https://doi.org/10.1007/978-3-030-51431-0_11
Influence of Internet Finance on Commercial Bank
71
Based on the background analysis and business processes above, this paper try to conduct a comprehensive review of Yu’e Bao’s influence on traditional finance, and give advices about strengthen the core competitiveness of banks’ e-commerce, implement big data measures for commercial banks.
2 Literature Review There are two types of literature studies this issue: literature on internet finance and commercial banks financial services. Lin L. et al. [5] claimed internet finance has made the boundaries among financial institutions unclear, thereby competition increased which accelerated the progress of financial industry. John Hawkins and Setsuya Sato [9] believed continuous integration of internet technology apply on the financial field contributed to internet finance. Franklin A. [2] insisted Internet finance make traditional financial institutions nonintermediary. Domestic research on Internet finance started later compared with foreign studies. Sun Ran [8] believes internet financial product is a new type of service combining internet technology and traditional financial services together. Tony Cherin [10] maintains that personal financial service is a commercial bank systematically evaluate investors’ personal financial status and other indicators in order to conduct financial planning activities. Most foreign scholars [7] have suggested commercial banks should improve the quality of their services, focus on customers’ demand. Haitao Z. and Zhiming H. [4] proposed that traditional commercial banks should attach importance to the structure and type of their financial products. Hanno Beck [3] believes that Internet finance has both negative and positive effects on traditional finance such as commercial banks service, but negative effects are greater than positive effects Manuchehr Shahrokhi [6] believes that Internet finance has a positive impact on commercial banks. Chen L. [1] also believes that commercial banks should make full use of Internet information technologies. Qicong Z. (2018) holds the view that Internet finance and traditional financial institutions will become rival, and their cooperation will outweigh competition. This paper try to focus on the competition and cooperation between commercial banks and Internet finance, discuss how traditional banks should learn advantages.
3 Development Status 3.1
Development Status of Yu’E Bao
Yu’E Bao is the first large-scale and representative Internet financial product, Therefore, it is selected as the representative. It has won people’s favor because of its simplicity, convenience, low investment threshold, and high returns. In the first quarter report released by Tianhong Fund in 2017, the net asset value of its balance had reached 11432 trillion yuan, and the operating profit i was as high as 8.7 billion yuan. According to Tianhong Fund report, retail deposits and settlement reserves are the most considerable part of Yu’E Bao, accounting for 64.33% of the fund’s total assets.
72
Z. Wang
3.2
Development Status of Traditional Bank Property Management Product Business
Commercial banks have also made many adjustments to the threat posed by Yu’E Bao, established many new wealth management products with higher returns, and the number of bank wealth management products has been increasing. From the launch of Yu’E Bao in 2013–2019, overall scale of bank wealth management has shown an upward trend (Table 1). Table 1. Total remaining balance of commercial bank financial products (trillion yuan) Year
2014 2015 2016 2017 2018 2019
Total balance amount 15.02 23.5 29.05 29.54 22.04 22.18
Stateowned bank 6.47 8.67 9.43 9.97 8.51 8.13
Jointstock bank 5.67 9.91 12.25 11.95 8.8 9.08
City commercial bank 1.7 3.07 4.4 4.72 3.64 3.85
Foreign capital bank 0.39 0.29 0.33 0.37 0.1 0.09
Rural financial institution 0.46 0.91 1.64 1.57 0.95 0.99
4 Mechanism Internet financial products has two effects on traditional banks financial services. One side, it weakened the intermediary function and shunted off the financial business of some traditional banks. On the other side, it also stimulated commercial banks to change their business ideas and innovate the new financial service model. Affected by Internet information technology, commercial banks’ financial business has weaken their dependence on outlets, thereby reducing their operating costs and labor costs, and the integration of information technology such as big data has also improved the efficiency of commercial banks’ business processing. According to negative influence, after the appearance of Internet financial products, traditional banks’ monopoly position has been weakened. The operation pattern of third-party financial management platforms is simple and convenient, with low purchase thresholds and high flexibility, which not only meets the customer’s income needs, but also meets their financial management needs. Therefore, customers will turn to third-party payment platforms to purchase wealth management products.
5 Theoretical Model From the above theoretical analysis, it is concluded that Internet financial products have brought both positive and negative effects to the financial service of commercial banks. Internet financial products have made fierce competition among personal wealth management products of banks, the loss of customers in the bank deposit business and financial service which changed the operating model of commercial banks financial
Influence of Internet Finance on Commercial Bank
73
service, such as promoting the emergence and development of direct banking. Besides, the rapid development of Internet wealth management products has prompted commercial banks to vigorously innovate financial service; it has also caused commercial banks to shift some of their work to larger long-tail customers, thereby creating greater profits. We select appropriate data indicators for empirical analysis, and verify the specific impact of Internet financial products on commercial banks financial service through a combination of the previous theoretical basis and empirical analysis. 5.1
Model Indicators
The first thing we’re going to analyze is internet financial service product indicators. Since the empirical analysis in this article is from a limited viewpoint, and Yu’e Bao occupies a tremendous proportion in Internet financing in a narrow sense, we choose the balance of Alibaba, which has the first significance in China and has the largest market share in Internet finance business Bao’s fund size represents the proxy variable for empirical analysis of narrow Internet financial products (IFS). This paper uses the remaining balance (BFS) of wealth management products of banking financial institutions in the annual reports of China’s banking wealth management outlet as proxy indicator of the wealth management service of commercial banks. 5.2
Model LNBFS = aLNIFS þ b
ð5:1Þ
We use Yu’E Bao Net asset data represents the scale of funds for narrow Internet wealth management products. The data comes from fund supermarkets, while the data on commercial banks’ financial service comes from the annual report of China’s banking industry wealth management market. For the time interval, quarterly data from 2014 to 2019 after the establishment of Yu’E Bao was selected. In this paper, during the empirical inspection process, natural logarithmic processing is performed on the relevant data of traditional banks and Yu’E Bao, which are represented by LNIFS and LNBFS, respectively, and data are processed using Stata software.
6 Conclusion and Suggestion 6.1
Empirical Result
Based on the above-mentioned multi-step empirical processes, in the long run, it shows a equilibrium relationship between Yu’E Bao wealth management products and Table 2. Empirical result of model 5.1 LNBFS Coef. Std. Err. t P > |t| LNIFS .4554763 .1261155 3.61 0.002 _cons 3.110977 .0499104 62.33 0.000
74
Z. Wang
commercial bank financial service. According to Table 2, P valued 0 means the positive impact is the main influence. This empirical test result is consistent with the theoretical impact described above. On the one hand, newly-developing internet financial service has shunted and took the preemption point of commercial banks’ market using their unique advantages such as low purchase thresholds, high returns, and high liquidity. On the other hand, it also have a certain positive influence on the growth and development of traditional financial products, and prompt traditional commercial banks to take advantage of Internet information skill. 6.2
Coping Strategies of Commercial Banks
(1) Create a customer-centric business model Personal deposits service of ordinary users were transferred from traditional banks to internet finance. Therefore, the first step of commercial bank is to change its mindset, paying particular attention to ordinary individual users, vigorously improving service levels. (2) Diversification of financial product and service functions Save money and services by summarizing existing benefits, create multi-functional and multi-directional fund supervision services for customers and personal repositories, make use of rich cooperative trade relationships and strong information technology processing capabilities to live for more depositors. Provide economical, practical and personalized financial solutions and services to enhance customer loyalty. (3) Pay attention to big data Traditional banks should use experience about data mining and applications of Internet finance companies in to promote the integration of existing data systems, improve the comprehensive processing capabilities of multiple types of information, and make full use of their unique advantages. (4) Cooperation with Internet financial enterprises Commercial banks and Internet finance have their own merits, their business models are worth learning from each other. The loss of existing customers will affect the Internet financing of commercial banks, but in the future, they will be able to establish win-win cooperation with Internet financial companies, change the past competition and respond to the situation.
References 1. Chen, L.: From Fintech to Finlife: the case of Fintech development in China. China Econ. J. 9(3), 225–239 (2016) 2. Franklin, A., James, M., Philip, S.: E-Finance: an introduction. Financ. Serv. Res. 25, 5−27 (2002) 3. Hanno, B.: Banking is essential, banks are not. The future of financial intermediation in the age of the Internet. Netnomics 3, 7−22 (2001) 4. Zhiming, H., Haitao, Z.: Research on the personal financial product innovation of Chinese commercial banks. China Manag. Informationization 2, 88–89 (2018)
Influence of Internet Finance on Commercial Bank
75
5. Lin, L., Geng, X., Whinston, A.: A new perspective to finance and competition and challenges for financial institutions in the internet area. Electron. Financ.: New Perspect. Challs. 13−25 (2001) 6. Manuchehr, S.: E-Finance: status, innovations, resources, and future challenges. Manag. Financ. 34(6), 365–398 (2008) 7. Nasri, W., Charfeddine, L.: Factors affecting the adoption of internet banking in Tunisia: an integration theory of acceptance model and theory of planned behavior. J. High Technol. Manag. Res. 23(2), 1–14 (2012) 8. Sun, R.: Opportunities and challenges of commercial banks’ Internet finance management. New Financ. 8, 36–42 (2015) 9. Setsuya, S., John, H.: Electronic finance: An overview of the issues. Electron. Financ. New Perspect. Challs. 11(7), 1−12 (2001) 10. Tony, C.: Personal financial planning: Theory and practices. J. Econ. Perspect. 9 (2006)
Evaluation of Mixed Ownership Reform Based on Fuzzy Logic Hualei Zhang1, Jian Zhao1, Liling Huang2(&), and Jing Wang2 1
2
State Grid Energy Research Institute Company Limited, Changping, Beijing 102209, China North China Electric Power University, Changping, Beijing 102206, China [email protected]
Abstract. With the rapid development of the information age, information technology has been widely practiced in various industries. Mixed ownership reform (MOR) is an important breakthrough in the state-owned enterprises (SOE) reform. Driven by the survival needs of enterprises, the effect evaluation of SOE reform has become an important topic in the field of MOR. Based on the characteristics and case analysis of MOR of SOEs, this paper constructs a comprehensive evaluation index system for the effectiveness of MOR of stateowned enterprises. Then the index weight is calculated through the analytic hierarchy process (AHP). Finally, the effectiveness of the MOR is evaluated in combination with the fuzzy comprehensive evaluation method (FCE). The results show that the MOR of the enterprise has a good effect. Keywords: Mixed-ownership reform system
Effectiveness evaluation Indicator
1 Introduction Information technology has penetrated into various industries, and with its obvious advantages such as fast, efficient, and convenient, it has brought new opportunities for the development of industries. The guidelines on deepening the reform of state-owned enterprises (SOEs) (NO. 22 [2015]) put forward clear opinions on promoting the SOEs reform by category and developing a mixed ownership economy. Since then, other related policy documents were issued, which put forward more ways to promote the SOEs reform from the perspective of policies. However, due to the wide scope and intensive reforms and the lack of actual mixed reform experience of large enterprises, it is difficult to advance the reform process. The evaluation of the mixed ownership reform (MOR) of SOEs is of great significance in clarifying the MOR process of SOEs and grasping the direction of MOR. As for the MOR of SOEs, existing researches mainly focus on the ownership structure [1–4]. In terms of effectiveness evaluation, there are few studies on effectiveness evaluation of MOR, and most of them evaluate MOR from the perspective of performance [5–9]. The effectiveness evaluation of MOR has not yet formed a system. Khan et al. [9] studied how the reduction of state-owned shares affected the social responsibility performance of listed companies. Under the background of increasingly © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 76–83, 2021. https://doi.org/10.1007/978-3-030-51431-0_12
Evaluation of Mixed Ownership Reform Based on Fuzzy Logic
77
mature information technology, Taishan lee et al. [10]. constructed a fuzzy evaluation model of enhanced network learning system by means of fuzzy membership function. How to evaluate the effect of MOR of SOEs accurately and comprehensively is a key problem to be studied at present stage. In response to the above problems, how to establish a scientific and feasible evaluation index system for the effectiveness of MOR, evaluate the effectiveness of the implementation of the MOR, find out problems in the reform process, and provide an important basis for judging the SOE MOR process. Therefore, this paper puts forward the AHP-FCE evaluation method based on fuzzy logic, and evaluates the effect of MOR of a certain enterprise with the help of expert scoring.
2 Evaluation Index System Construction There exist many influencing factors in the process of MOR, and a scientific evaluation of its reform effectiveness requires the establishment of a comprehensive index system. Therefore, to reasonably evaluate the effectiveness of MOR, the establishment of an evaluation index system must consider both the motivation and possible effects of MOR, and the main factors that affect the effectiveness of MOR. The establishment of an enterprise performance evaluation index system for the reform of mixed ownership should fully consider the improvement of social responsibility, business performance, vitality of the operating mechanism, and governance structure after the reform. Follow the principle of index selection, this paper reference relevant literature, and through the analysis of the typical case of MOR. From the four dimensions of corporate social responsibility, corporate operating performance, corporate operating mechanism vitality, and corporate governance structure, 63 indicators including the first, second and third levels are set up to construct an indicator system to evaluate the effect of promoting MOR. The specific indicators are as follows: (1) Social responsibility refers to the obligations undertaken by enterprises to solve social needs and other problems in order to safeguard the interests of the country and the people while seeking development through reform. As a SOE, in the process of implementing the MOR, in addition to stimulating the creativity of SOEs, improving market competitiveness, and promoting enterprises to become stronger, better and bigger, they also shoulder the social responsibility of SOEs. The fulfillment of corporate responsibility is an important dimension to evaluate the effect of MOR. This dimension is divided into economic responsibility and other responsibilities. Six third-level indicators are set. (2) SOEs carry out MOR, cross-shareholding and mutual integration with other ownership economies, injecting fresh blood into SOEs, introducing market mechanisms, and thereby improving the overall efficiency of SOEs. Operating performance is the way of survival and development of an enterprise. The purpose of reform is to seek better development. Therefore, this article considers the company’s operating performance when evaluating the effectiveness of the company’s MOR business, including 4 second-level indicators and 14 third-level indicators. (3) Stimulating the vitality of SOEs is an important goal of the MOR. Through the involvement of other capital and the “catfish effect” of the capital market, the vitality of SOEs can be effectively stimulated. Whether the MOR is effective is
78
H. Zhang et al.
also reflected in whether it stimulates the vitality of SOEs. This paper considers the vitality of enterprise management mechanism, including decision-making mechanism, investment mechanism, incentive mechanism, evaluation mechanism four aspects. And there are 9 third-level indicators. (4) Further improvement of the governance structure is an inevitable requirement for deepening the reform of SOEs. SOEs need to establish a corporate governance structure with clear rights and responsibilities, and realize the transformation from corporate governance mode to company governance mode. Corporate governance capacity needs to be further improved. Therefore, this paper takes corporate governance structure as another dimension to evaluate the effectiveness of MOR. The connotation of corporate governance includes two levels: corporate governance structure and corporate governance mechanism. To measure the effectiveness of MOR at the corporate governance level, we set six second-level indicators and 14 third-level indicators in this dimension (Table 1). Table 1. The evaluation index system for enterprises to promote MOR First-level indicators (weights)
Second-level indicators (weights)
A1 Corporate social responsibility (0.3849)
B1 Economic C1 Rate of preservation and responsibility (0.8333) appreciation of state-owned assets (0.4286) C2 Rate of return on investment of state-owned capital (0.4286) C3 Rate of tax on assets (0.1429) B2 Other C4 Proportion of environmental responsibilities investment (0.6376) (0.1667) C5 Contribution rate of employment (0.2578) C6 Ratio of public welfare contributions (0.1046) B3 Debt repayment C7 Asset-liability ratio (0.7509) ability (0.1292) C8 Current ratio (0.2491) B4 Profitability C9 Profit rate of main business (0.3893) (0.2491) C10 Return ratio on assets (0.7509) B5 Operating ability C11 Turnover ratio of current assets (0.3034) (0.0779) C12 Capital turnover efficiency (0.1996) C13 Cost growth (0.5229) C14 Efficiency of asset allocation (0.1996) B6 Development C15 Net profit growth rate (0.3344) ability (0.1782) C16 Growth rate of net assets (0.1508) C17 EVA (0.3344) C18 The enterprise scale (0.0601) C19 Business diversification (0.0601) C20 Market expansion ability (0.0601)
A2 Corporate operating performance (0.3849)
Third-level indicators (weights)
Combined weights 0.1375
0.1375 0.0458 0.0409 0.0165 0.0067 0.0373 0.0124 0.0373 0.1125 0.0091 0.0233 0.0611 0.0233 0.0229 0.0103 0.0229 0.0041 0.0041 0.0041
(continued)
Evaluation of Mixed Ownership Reform Based on Fuzzy Logic
79
Table 1. (continued) First-level indicators (weights)
Second-level indicators (weights)
A3 Vitality of corporate operating mechanism (0.1428)
B7 Decision-making mechanism (0.2239)
A4 Corporate governance structure (0.0876)
Third-level indicators (weights)
C21 Efficiency of administrative decision-making (0.7509) C22 Scientific and democratic decision-making (0.2491) B8 Investment C23 Technology research and mechanism (0.2239) development investment proportion (0.7509) C24 Diversified investment subject (0.2491) B9 Incentive C25 Equity incentive (0.1996) mechanism (0.4670) C26 Employee shareholding (0.1996) C27 Performance pay (0.6008) B10 Evaluation C28 Market-oriented salary mechanism (0.0852) distribution (0.2491) C29 Perfection of reward and punishment mechanism (0.7509) B11 Legal governance C30 Proportion of outside directors structure (0.2346) (0.3755) C31 Ratio of external supervisors (0.1245) C32 Ratio of professional managers (0.3755) C33 General meeting of shareholders (0.1245) B12 Equity mixing C34 Shareholding ratio of non-state degree (0.4547) capital (0.5000) C35 Shareholding ratio of state capital (0.5000) B13 Strategy control C36 Strategic compatibility (1.0000) (0.1127) B14 Risk control C37 Market risk (0.2491) (0.1127) C38 Credit risk (0.7509) B15 Internal C39 Internal checks and balances supervision (0.6376) mechanism (0.0529) C40 Management supervisionn (0.2578) C41 Democratic supervision (0.1046) B16 Information C42 Major information disclosure disclosure (0.0324) (0.7509) C43 Social supervision (0.2491)
Combined weights 0.024 0.008 0.024
0.008 0.0133 0.0133 0.0401 0.003 0.0091 0.0077 0.0026 0.0077 0.0026 0.0199 0.0199 0.0099 0.0025 0.0074 0.003 0.0012 0.0005 0.0021 0.0007
80
H. Zhang et al.
3 Effectiveness Evaluation Model of MOR Based on AHPFCE 3.1
Index Weight Determination Method
The effectiveness evaluation of MOR is a target evaluation that is influenced by many factors, and the weights of various indicators need to be determined. In this paper, AHP is applied to determine the indicator weights. Firstly, we establish a hierarchical structure model, then use a 1–9 reciprocity scale to indicate the comparison of the importance of the indicators to build a judgment matrix, and finally check the consistency of the judgment matrix and obtain the index weight. The calculation of index weight and consistency test are shown in Eqs. 1–6. The 0 square root method is applied to calculate the geometric mean line by line Wi : 0
Wi ¼
p ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi n ai1 ai2 ain
ð1Þ
0
W Wi ¼ n i P 0 Wi
ð2Þ
i¼1
n P
ki ¼ i¼1
aij Wj ð3Þ
Wi n P
ki
kmax ¼ i¼1 n CI ¼
ð4Þ
kmax n n1
ð5Þ
CI RI
ð6Þ
CR ¼
RI can be find in other literature. If CR < 0.1, the judgment matrix passed the consistency check. If it fails, the judgment matrix score needs to be adjusted until it is able to pass the consistency check. The judgment matrices of order 1 and order 2 automatically satisfy the consistency, so there is no need to check their consistency. 3.2
Evaluation Model Based on FCE
(1) Determination of evaluation index set and grade set Suppose there are n evaluation indexes and m reviews, The evaluation index set is Xj ¼ fX1 ; X2 ; ; Xn g, evaluation level set is Yk ¼ fY1 ; Y2 ; ; Ym g. (2) Construction of membership matrix
Evaluation of Mixed Ownership Reform Based on Fuzzy Logic
81
Any evaluation index Xj constructs a membership vector Zj ðj ¼ 1; 2; ; nÞ for it. Assuming zjk is the membership of Xj under Yk , then Zj ¼ ðzj1 ; zj2 ; ; zjm Þ. Therefore, a membership matrix composed of all the evaluation indexes shown below can be obtained. 2
m P
z11 6 z21 6 Z ¼ Z1 Z2 ; ; Zn ÞT ¼ 6 .. 4 .
z12 z22 .. .
zn1
zn2
3 z1m z2m 7 7 .. 7 .. . 5 . znm
ð7Þ
Where zjk represents the probability of Xj under Yk . So there is 0 zjk 1 and zjk ¼ 1 ðj ¼ 1; 2; ; nÞ.
k¼1
(3) Final evaluation model 2
z11 6 z21 6 E¼W Z ¼ ðW1 ; W2 ; ; Wn Þ 6 .. 4 .
z12 z22 .. .
zn1
zn2
.. .
3 z1m z2m 7 7 .. 7 ¼ ðe1 ; e2 ; ; em Þ . 5 znm ð8Þ
In general,
m P
ek ¼1. Otherwise, the final evaluation results should be normalized to
k¼1
meet this condition. The final evaluation result is the evaluation grade Yk corresponding to the maximum value in all ek .
4 Empirical Analysis 4.1
Determine Indicator Weights
Combined with the expert opinions, the judgment matrix was constructed from the arithmetic mean value of the expert scores in the questionnaire, and the feature vector was calculated, that is, the weight of the influencing factor evaluation index. Then each judgment matrix is checked for consistency (Table 2). After the consistency test, the consistency ratio of this judgment matrix is 0.0076 < 0.1. Similarly, the judgment matrix and feature vector of criterion layer and factor layer can be calculated according to the above formula, and the final weight of each index can be obtained. Finally, the combined weights are calculated, and the final results can be seen in Table 1.
82
H. Zhang et al. Table 2. The judgment matrix of target layer Index A1 Corporate social responsibility A2 Corporate operating performance A3 Vitality of corporate operating mechanism A4 Corporate governance structure
4.2
A1 1 1 1/3 1/4
A2 1 1 1/3 1/4
A3 3 3 1 1/2
A4 4 4 2 1
The feature vector 0.3849 0.3849 0.1428 0.0876
Evaluation Results
On the basis of the previous section, the effectiveness of the MOR of an enterprise is evaluated. The evaluation level set is = {excellent(E), good(G), medium(M), poor(P), terrible(T)}, and the membership matrix of the evaluated enterprise is obtained based on the survey. Due to the large number of indicators, in order to be more intuitive and convenient, this paper uses a table to represent the obtained membership matrix (Table 3).
Table 3. Membership matrix value Level C1 C2 C3 C4 C5 C6 C7 C8 C9 C10 C11 C12 C13 C14 C15
E 0.2 0.2 0 0 0.6 0 0 0 0 0 0.1 0.2 0.3 0.1 0
G 0.4 0.4 0.3 0.4 0.3 0.4 0.8 0 0 0.6 0.6 0.8 0.5 0.5 0
M 0.4 0.3 0.5 0.3 0.1 0.4 0.2 0.2 0.7 0.4 0.2 0 0.2 0.4 0.2
P 0 0.1 0.2 0.2 0 0.2 0 0.5 0.3 0 0.1 0 0 0 0.5
T 0 0 0 0.1 0 0 0 0.3 0 0 0 0 0 0 0.3
C16 C17 C18 C19 C20 C21 C22 C23 C24 C25 C26 C27 C28 C29 C30
E 0.5 0.1 0 1 0.2 0 0 0.2 0.3 0 0 0.1 0.2 0.1 0.2
G 0.3 0.4 0.8 0 0.5 0 0 0.4 0.4 0 0 0.5 0.5 0.3 0.4
M 0.2 0.4 0.2 0 0.3 0.4 0.5 0.4 0.3 0.4 0.3 0.4 0.2 0.5 0.4
P 0 0.1 0 0 0 0.3 0.2 0 0 0.6 0.7 0 0.1 0.1 0
T 0 0 0 0 0 0.3 0.3 0 0 0 0 0 0 0 0
C31 C32 C33 C34 C35 C36 C37 C38 C39 C40 C41 C42 C43 C42 C43
E 0.1 0 0.2 0 0 0.1 0 0.4 0 0 0 0.1 0.1 0.1 0
G 0.3 0 0.1 0.2 0.3 0.2 0 0.3 0 0 0.2 0.2 0.2 0.3 0
M 0.3 0.4 0.5 0.7 0.6 0.6 0.6 0.3 0.5 0.4 0.5 0.6 0.5 0.3 0.4
P 0.2 0.4 0.2 0.1 0.1 0.1 0.2 0 0.4 0.4 0.3 0.1 0.2 0.2 0.4
T 0.1 0.2 0 0 0 0 0.2 0 0.1 0.2 0 0 0 0.1 0.2
From formula (8), we can obtain E ¼ W Z ¼ ð0:123; 0:385; 0:362; 0:104; 0:027Þ. As shown in the calculation results, the maximum membership degree is 0.385, and the corresponding evaluation level is “good”. Therefore, the MOR of the enterprise has achieved good results.
Evaluation of Mixed Ownership Reform Based on Fuzzy Logic
83
5 Conclusions On the basis of the literature review and case analysis, we combines the objectives of MOR to build an index system for evaluating the effectiveness of MOR, and finally uses AHP to obtain the indicators’ weight. The calculation results show that among the four first-level indicators, corporate social responsibility and business performance have a greater weight, which is consistent with the goal of SOE reform. Finally, this paper combined fuzzy comprehensive evaluation method to do the evaluation of the effectiveness of the MOR, and the results show that the MOR of the enterprise has a good effect. Although the principle of index selection was followed in the selection of indicators, because the effectiveness evaluation of MOR in SOEs is a complex systematic project, the evaluation index system constructed in this paper is difficult to achieve perfection, and it is still a preliminary exploration of the evaluation of the effectiveness of MOR. In the future, in the process of implementing MOR, we need to continuously improve based on actual conditions. Acknowledgements. This work was supported by the State Grid Corporation of China science and technology project “Research on the company’s mixed ownership reform method, scheme and effectiveness evaluation”.
References 1. Lai, L., Tam, H.: Corporate governance, ownership structure and managing earnings to meet critical thresholds among Chinese listed firms. Rev. Quant. Financ. Acc. 48(3), 789–818 (2017) 2. Abramov, A., Radygin, A., Chemova, M.: State-owned enterprises in the Russian market: Ownership structure and their role in the economy. Russ. Joumal Econ. 3(1), 1–23 (2017) 3. Kouame, W., Tapsoba, S.: Structural reforms and firms’ productivity. Evidence from developing countries. World Dev. 113, 157–171 (2019) 4. Lin, L.W.: Reforming China’s state-owned enterprises: from structure to people. China Q. 229, 107–129 (2017) 5. Sharma, A., Jadi, D.M., Ward, D.: Evaluating financial performance of insurance companies using rating transition matrices. J. Econ. Asymmetries 18, e00102 (2018) 6. Li, L., McMurray, A., Sy, M., et al.: Corporate ownership, efficiency and performance under state capitalism: Evidence from China. J. Policy Model. 40(4), 747–766 (2018) 7. Ma, S., Li, W., Yan, S.: The Impact of Mixed Ownership Reform on Enterprise Performance–An Empirical Study Based on A-Share Listing Corporation in China. International Conference on Management Science and Engineering Management. Springer, Cham, 2017: 670–679 8. Zhou, B., Peng, M., Tan, Y., et al.: Dynamic panel threshold model-based analysis on equity restriction and enterprise performance in China. Sustainability 11(22), 6489 (2019) 9. Khan, F.U., Zhang, J., Usman, M., et al.: Ownership Reduction in state-owned enterprises and corporate social responsibility: Perspective from secondary privatization in China. Sustainability 11(4), 1008 (2019) 10. Lee, T.S., Wang, C.H., Yu, C.M.: Fuzzy evaluation model for enhancing E-learning systems. Mathematics 7(10), 918 (2019)
Development of Cross-Border E-commerce Based on Big Data Analysis Huanhuan Ma(&) Department of Economics and Management, ZhiXing College of Hubei University, Hubei 430080, China [email protected]
Abstract. With deepening of economic globalization process, the increasing trade between countries, the development of cross-border e-business has been widely concerned. Hubei Province’s cross-border e-business has also integrated into the rapid development process, but there are still some problems. To explore the e-commerce in Hubei Province, here applies big-data method to massive cross-border e-business data. Through the comprehensive evaluation of six sub industries of cross-border e-commerce, the results show that the scores of sellers and cross-border payment are 85 and 80 respectively, which are at a high level, while the comprehensive scores of international logistics are the lowest. The transportation speed, security and service attitude of international logistics affect consumers’ consumption mentality. Finally, the corresponding solutions are given. Keywords: Cross-border e-commerce evaluation International logistics
Big-data analysis Industrial
1 Introduction Under the further globalization of economic, the degree of integration of the global economy is increasing. China’s implementation of the “one belt and one way” strategy and the social and economic activities of other countries have been increasing, coupled with the rapid development of the Internet at present [1]. These have elevated the development of e-commerce across the border. However, with the quick growth of e-business across the border, there are also a lot of questions to be solved [2]. As a big economic province, it is of great significance to study the growth of e-business across the border in Hubei Province. At the field of e-business across the border, a lot of specialists have done research and got great results. In [3], to upgrade business activities e-business across the border, the author uses Kansei Engineering to satisfy customers’ emotional and emotional perception of services and products, and analyzes online content through text mining technology. In [4], the author uses social-network method to probe the features of 59 ebusiness guidelines issued by the government from January in 2013 to July in 2018. The sustainable guideline framework of cross e-business is put forward from policy service content, regulatory objectives and measures. In [5], above the grey-analytichierarchy process, the author analyzes the pros and cons of the present cross e-business © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 84–89, 2021. https://doi.org/10.1007/978-3-030-51431-0_13
Development of Cross-Border E-commerce Based on Big Data Analysis
85
logistics-mode, and points out the factors that affect the selection of its logistics mode. In [6], considering that there are great differences between overseas sales and domestic sales, the adjustment of strategy has been bothering managers. The author analyzes the launching tactics of cross-border e-business market through the subject modeling of consumer comments. The above research shows that the growth of e-commerce across the border involves many aspects, including logistics, after-sales and other links. In different periods and locations, the growth of e-business across the border is different. This is also the problem of poor general applicability of the above research. During the operation procedure, e-business across the border will generate so many transactions and other data. If we can use data analysis technology to study the growth of e-business across the border in Hubei Province, we will expect to achieve better results. Big data analysis technology has the ability to handle with massive-data, and this method is also used in many fields. In [7], writers take advantage of big-data analysis technology to evaluate the operation state of distribution transformer, and realizes the organic combination of various methods for the overall operation state of transformer by using multi-source data. In [8], the writer combines big-data analysis technology with fog-computing to sustain the overall of a lot of base station and services in the future-smart city. In [9], the writer used big-data analysis technology in the diagnosis of nervous system diseases, which improved the consistency of diagnosis, increased the success rate of treatment, saved lives, and reduced the cost and time. In [10], the writer used big-data analysis to assess the risk of railway failure, effectively alleviated the risk of train delay and reduced the maintenance cost. In conclusion, bigdata method has got remarkable results during massive data processing, so it can be used in the research of cross-border e-commerce development in Hubei Province. In view of the development bottleneck of e-business across the border, here puts forward a research on the development of e-business across the border in Hubei Province based on big data analysis. Through the procedure and analysis of massive-data, we can understand the development of e-commerce in the whole region, to supply consult for the growth of related e-business.
2 Method 2.1
Overview the E-Business Across the Border in Hubei Province
In recent years, the development momentum of e-business in Hubei Province has improved significantly. On the basis of the report of China’s e-business growth index, the comprehensive index of e-business growth in Hubei Province has risen from 14.16 in 2014 to 24.64 in 2018, ranking 11 in all, up 4 places. It is the mainstay province of ecommerce development in China. Hubei Province has obvious transportation advantages and is in the position of commercial logistics center in China. Take Optics Valley of Wuhan as an example. This core area has a high degree of completeness in the ecommerce system, such as talents, comprehensive bonded area, R&D, etc. In terms of its application, some companies set up e-commerce companies through internal forces and rely on e-commerce platform to open up foreign markets. Of course, there are still some enterprises, taking into account the company’s development and financial factors,
86
H. Ma
under the assist of Alibaba Group’s e-business terrace to actively expand overseas potential markets. 2.2
Data Preprocessing
The growth of e-business data is massive. Before big-data analysis, it has to preprocess e-commerce data to facilitate the subsequent analysis. So data preprocessing is needed. There are many problems to be solved in data preprocessing, such as processing abnormal data, changing data attributes, processing missing data, data discretization, etc. The processing of missing data can be divided into two types. When the distance between sample attributes is measurable, the average value of attributes is used for interpolation; when the distance between sample attributes is not measurable, the mode of effective value of attributes is used for interpolation. Data standardization operation is also indispensable, which can avoid the influence of different attributes of samples with different magnitude. 2.3
E-commerce Development Analysis Method on the Basis of Big-Data Analysis
First of all, build the evaluation system of e-business across the border industry competitiveness. The first level indicators include production factors, market demand, supporting industries, industry competition and cooperation. Production factors include labor force (cross-border e-commerce labor population/total labor population), capital (cross-border e-commerce project financing amount), technology development (R & D investment, number of effective patents). Market demand factors include total import and export trade, total online retail, per capita online consumption, etc. Supporting industries include logistics, cross-border third-party payment-platform, ebusiness scale, etc. Industry competition and cooperation include the number of crosscommerce enterprises, the number of industrial parks, etc. The score coefficient matrix of common factors is calculated by SPSS, and the score expression of each factor after rotation is obtained Fj ¼
i X
Xn kjn
ð1Þ
n¼1
In the above formula, Fj is score of the j-th factor, Xn is the standardized value of the n-th variable, and kjn is score coefficient of the j-th factor in the n-th variable. According to the scores of each factor, further calculate the comprehensive scores of cross-border e-commerce industry competitiveness, as follows: F ¼ F1 w1 þ F2 w2 þ F3 w3
ð2Þ
In the above formula, F is the comprehensive score, w is the respective weight, i.e. the variance contribution rate of each factor.
Development of Cross-Border E-commerce Based on Big Data Analysis
87
3 Experiment The data source of here comes from the report of China’s e-business development index and relevant-data of the National Bureau of statistics. Firstly, preprocess the cross border e-business data of Hubei Province, filter out the unreasonable data and fill in the missing data, so as to avoid the influence of the unreasonable data on the final analysis results. Then through SPSS and other statistical software data analysis, get the experimental results of the growth of e-business across the border in Hubei Province, and visual display. Based on the visualization results, combined with the expert opinions among the field of e-business, the corresponding suggestions are given.
4 Results Result 1: Industrial development E-business across the border is not just about selling commodity. E-business across the border relate to a lot of aspects, including sellers, intellectual property rights, logistics, cross-border payment, cross-border service software, e-commerce training, etc. This thesis applies the method to compute the comprehensive scores of various industries in e-business across the border in Hubei Province to measure the level of industrial growth. The comprehensive scores of related industries are shown in Fig. 1.
Fig. 1. Comprehensive scores of e-commerce related industries
From Fig. 1, the scores of e-business across the border related industries in Hubei Province are different. The scores of sellers and cross-border payment are 85 and 80, respectively, at a high level. But the scores of intellectual property and logistics industry are only 62.3 and 60.1 respectively. High quality goods and convenient payment methods have effectively helped the development of cross-commerce in Hubei
88
H. Ma
Province. However, intellectual property is a weak link in cross-commerce in Hubei Province. In global trade, we must take care of the issue of intellectual property, otherwise it is likely to be severely punished for infringement and other issues, and the consequences will be unimaginable. The lowest score of logistics industry is. Result 2: Factors influencing consumers’ Evaluation on international logistics of ebusiness across the border To further analyze the reasons for the lowest score of the logistics industry, this paper investigates the evaluation of visiting consumers on international logistics providers to explore the shortcomings of international logistics in e-commerce. The main factors that affect consumers’ evaluation of logistics include logistics speed, logistics service attitude, price, safety, packaging integrity, etc. In the data investigated, the proportion of each factor is shown in Fig. 2.
Fig. 2. Proportion of factors influencing consumers’ evaluation of e-commerce international logistics
International logistics is a considerable part of e-business across the border. In the survey of consumers in Hubei Province, it is found that the top three factors influencing the evaluation of logistics are transportation speed, safety and service attitude, accounting for 39.05%, 26.67% and 16.19% respectively. Combined with result 1, the comprehensive score of logistics industry is the lowest. It is found that due to the improvement of living standards and the good economic foundation, the current stage of e-business across the border consumer explosive growth. Nevertheless, the corresponding cross border logistics transportation system is not perfect, and the transportation time is relatively long. In terms of security, as express delivery needs to be circulated for many times, cross-border express delivery loss incidents occur from time to time. Service attitude should also be paid attention to in the logistics industry. If the experience of express delivery is poor, consumers may reduce the consumption of ebusiness across the border. Therefore, we should pay attention to the experience of
Development of Cross-Border E-commerce Based on Big Data Analysis
89
international logistics in the hearts of users, so as to play a fundamental role in the growth of e-business across the border.
5 Conclusions This thesis analyzes the questions of e-business across the border in Hubei Province through big data analysis method, and gives corresponding suggestions. The growth of e-business across the border is supposed to be combined with its own needs to build a macro development strategy and cultivate core competitiveness. Simultaneously, we should take the advantages of international logistics to elevate the growth of e-business across the border in Hubei Province.
References 1. Liu, W.: “Belt and Road”: Leading inclusive globalization. Proc. Chin. Acad. Sci. 32(4), 331–339 (2017) 2. Chao, W., Xianyu, B., Jun, X., Fei, W.: Research on cross-border e-commerce trade chain and alliance chain based on blockchain technology. Mod. Electron. Technol. 41(21), 169– 172 (2018) 3. Hsiao, Y.H., Chen, M.C., Liao, W.C.: Logistics service design for cross-border e-commerce using Kansei engineering with text-mining-based online content analysis. Telematics Inform. 34(4), 284–302 (2017) 4. Su, W., Wang, Y., Qian, L., Zeng, S., Baležentis, T., Streimikiene, D.: Creating a sustainable policy framework for cross-border e-commerce in China. Sustainability 11(4), 943 (2019) 5. Su, L., Xu, N.: Research on logistics mode selection under the background of cross-border ecommerce based on grey analytic hierarchy process. Int. J. u- e-Serv. Sci. Technol. 9(12), 387–396 (2016) 6. Wang, F., Yang, Y., Tso, G.K., Li, Y.: Analysis of launch strategy in cross-border ecommerce market via topic modeling of consumer reviews. Electron. Commer. Res. 19(4), 863–884 (2019) 7. Youqiang, Z., Lingfeng, K., Wanxing, S., Jinli, W., Ying, L., Qipeng, S.: Big data analysis method for operation status evaluation of distribution transformers. Power Syst. Technol. 40 (3), 768–773 (2016) 8. Tang, B., Chen, Z., Hefferman, G., Pei, S., Wei, T., He, H., Yang, Q.: Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Trans. Ind. Inform. 13(5), 2140–2150 (2017) 9. Siuly, S., Zhang, Y.: Medical big data: neurological diseases diagnosis through medical data analysis. Data Sci. Eng. 1(2), 54–64 (2016) 10. Jamshidi, A., Faghih-Roohi, S., Hajizadeh, S., Núñez, A., Babuska, R., Dollevoet, R., De Schutter, B.: A big data analysis approach for rail failure risk assessment. Risk Anal. 37 (8), 1495–1507 (2017)
Methods of Making Courseware for College English Teaching in the Information Age Lin Zhang and Jianli Guo(&) Department of Foreign Language Teaching, Changchun University of Chinese Medicine, Changchun 130117, Jilin, China [email protected], [email protected]
Abstract. Today’s era has entered the information age, this is a new stage in the development of human society. Information technology is based on computer technology, electronic digital technology and other advanced technology. In the information society, people are more and more closely connected, and their own knowledge reserve has become the subject of interpersonal competition. Compared with the previous material and monetary resources, knowledge resources are becoming more and more important. The purpose of this study is to put forward some basic views on the reform of college English teaching methods in the information age and to explore the feasibility and problems to be solved in the application of three-screen courseware in English teaching. The main research methods of this paper are: literature research, investigation and comparative research. The research results show that the three-screen courseware is more suitable for classroom teaching and more acceptable to students than the traditional courseware. In college English teaching, we can make more use of the three-screen courseware technology, innovate classroom education means, better serve students and improve teaching quality. Keywords: Information age Three-screen courseware Application strategy Courseware making
1 Introduction In the information age, the channels for students to obtain information and knowledge have been greatly expanded. They can not only obtain knowledge through teachers’ traditional resources such as blackboards, textbooks, books, newspapers and publications. In addition, relevant knowledge can be acquired through new methods, such as computers and other electronic products and networks. So. In the past, the limitations of the traditional teaching model, which relies on blackboard and blackboard writing, teacher lectures and student memoirs, have been highlighted. Based on the above background, this paper first elaborated and analyzed the research status of “three-screen” courseware in various fields [1]. Secondly, by comparing with other auxiliary teaching technology, “three screens” courseware in teaching is particularly important, especially for the feasibility of college English teaching were studied, after determine the teaching application value, combined with college English teaching scenario, the “three screens” courseware, and will complete the “three © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 90–95, 2021. https://doi.org/10.1007/978-3-030-51431-0_14
Methods of Making Courseware for College
91
screens” courseware applied in the high school English teaching activity, further discusses the advantages and disadvantages of the “three screens” courseware and practical prospects [2–4]. Through theoretical research, courseware making, teaching design discussion, teaching practice feasibility analysis and teaching application strategy research, this paper innovatively verified the excellent performance and powerful potential of “threescreen” courseware in college English teaching [5, 6]. The “three-screen” courseware can significantly improve students’ autonomous learning ability to be applied in college English teaching, make college English teaching more modern and informationized, improve teachers’ level of informationized teaching, reduce education costs, optimize education structure to meet the requirements and the development trend of new curriculum reform [7, 8]. Therefore, teachers should not be limited to textbooks and courseware, but should be expanded to transfer relevant background knowledge and relevant information from Internet, newspapers and other resources to students [9]. For some teaching contents, relevant pictures and audio-visual materials can be added in the courseware to improve students’ interest in learning [10]. There is no doubt that this lively teaching method can arouse students’ learning enthusiasm more obviously than the traditional boring teaching method [11].
2 Method 2.1
Three-Screen Courseware
In the process of education and teaching, the use of multimedia courseware not only improves the teaching efficiency, but also profoundly affects the teaching philosophy of the majority of educators and promotes the smooth implementation of the new curriculum reform. Under the background of English teaching informationization, it is an inevitable trend of The Times to combine multimedia computer-aided teaching technology to further explore more effective teaching methods. As a new auxiliary teaching technology, “three screens” has attracted more and more attention in the field of education because of its simplicity and convenience [12]. The biggest advantage of three-screen courseware is high sharing degree and convenient scene reproduction. How to share the three-screen courseware to those who need it is the premise for teachers to improve the content and teaching methods of the three-screen courseware. There are many effective ways to create three-screen courseware. One is to set up a server to upload the completed courseware to the server for others to download. The server takes the subject as the unit, sets different levels of folders, and stores three screens of courseware properly. In addition, a cloud platform can be built to upload the three-screen courseware to the cloud platform for others to download and learn. 2.2
Research Methods
This paper USES the literature research method to retrieve the academic papers on “three screen courseware” of cnki. Then compare the search results and analyze the
92
L. Zhang and J. Guo
application of three-screen courseware in English teaching at home and abroad. The subjects of the questionnaire were students in grades 1–3 of a university. The design of the questionnaire includes three aspects: the questionnaire for college English teachers, the questionnaire for students in grades 1–3, and the questionnaire for college English three-screen courseware. It mainly relies on online questionnaires to collect data. Through different teaching objects and teaching time, this paper compares the application limitation factors and application effect of “three screens” courseware, and studies the influence of the above factors on the teaching effect of “three screens” courseware.
3 Experiment Firstly, this paper expounds and analyzes the research status of “three screens” courseware in various fields. Secondly, through the comparison with other auxiliary teaching technologies, the feasibility of “three-screen” courseware in the field of teaching, especially in the field of college English teaching is studied. After determining its teaching application value, combined with the actual situation of high school English teaching, the “three screen” courseware was made and applied to college English teaching activities. The advantages and disadvantages of “three screens” courseware are further discussed, and its actual development prospect is prospected. At the same time, through the assessment and analysis of students’ classroom situation and teaching effect, this paper gradually discusses the application strategy of “three screens” courseware as an auxiliary teaching tool in college English teaching.
4 Discussion 4.1
Experimental Investigation Results
In this survey, 867 questionnaires were issued and 842 were recovered, among which 783 were valid. In the questionnaires that we collected. 85% are very interested in the “interested in English subjects” option, 10% are generally interested, and 5% are not interested. The specific interest in learning English subjects is shown in Fig. 1 below. According to the questionnaire study, we found that students are more likely to ask teachers to change the way of teaching and apply new science and technology in class teaching. The specific survey results are shown in Table 1 below. 4.2
Application Strategies of Three-Screen Courseware in High School English Teaching
1. Strengthening communication and information technology In learning activities, students can freely choose and obtain knowledge contents through a variety of channels. Within the prescribed time, students are completely immersed in the sea of knowledge and information and meet the learning requirements according to the predetermined teaching objectives. This inevitably requires English
Methods of Making Courseware for College
93
Results of a survey on students' interest in English 5% 10%
85% Strong interest in
Interest in general
Disinterest
Fig. 1. Survey results of students’ interest in English subjects Table 1. Survey results of support for classroom reform Questionnaire categories
Total number of issued
The teacher questionnaire Questionnaire categories
50
The student questionnaire
630
Total number of issued
The total number of recycling 50
Recovery
Effective rate
Support rate
100%
98%
96.37%
The total number of recycling 620
Recovery
Effective rate
Support rate
98.40%
97.60%
94.73%
teachers to communicate with more people, improve their information technology ability, in order to more convenient contact and use multimedia for English teaching. By strengthening English teachers’ understanding of information technology and related products, the application efficiency and quality of English three-screen courseware can be improved, which is the technical guarantee for making English three-screen courseware suitable for teaching. Concentrate the content of the textbook and teach students according to their aptitude. When English teachers use the threescreen courseware, if the courseware is made, the teaching is half done. Therefore, attention should be paid to compress the content of the textbook and make the appropriate three-screen courseware. At the same time, it should be easy for students to accept. 2. Courseware content is closely related to teaching content Attention should be paid to the four requirements of “listening, speaking, reading and writing” in English. Close contact with the text, the students’ thoughts guide to the classroom, the teacher to students arrange extracurricular teaching tasks, to adapt to the
94
L. Zhang and J. Guo
acceptance of middle school students. Not too professional, too complicated, too deep. At the beginning, the more concise the extracurricular tasks, the better, so that students can easily complete, so as to stimulate students’ interest in learning, improve the enthusiasm of learning; After learning for a while, you can add relevant tasks appropriately. Encourage students to study independently and think positively.
5 Conclusion Knowledge display courseware display should not be separated from the classroom teaching content, and each student’s learning ability and understanding ability should be fully considered; An effective feedback check and encouragement strategy should be established to improve the efficiency of display courseware teaching. It is embodied in mobilizing students’ enthusiasm for learning, enabling students to learn independently and improving students’ self-learning ability. Therefore, teachers should not be limited to textbooks and courseware. It should expand the form and content of the Internet, newspapers and other resources related background knowledge and relevant information to students. For some teaching contents, relevant pictures and audio-visual materials can be added in the courseware to improve students’ interest in learning. There is no doubt that this lively teaching method can arouse students’ learning enthusiasm more obviously than the traditional boring teaching method.
References 1. Mishra, A.R., Kumari, R., Sharma, D.K.: Intuitionistic fuzzy divergence measure-based multi-criteria decision-making method. Neural Comput. & Appl. 5(1), 1–16 (2017) 2. Peng, H-G., Wang, J-Q.: A multicriteria group decision-making method based on the normal cloud model with Zadeh’s z-numbers. IEEE Trans. Fuzzy Syst. 346(139), 41–42 (2018) 3. Zhou, S., Xuanhua, X., Zhou, Y.: A large group decision-making method based on fuzzy preference relation. Int. J. Inf. Technol. & Decis. Mak. 4(16), 3–4 (2017) 4. Liu, P., Khan, Q., Ye, J.: Group decision-making method under hesitant interval neutrosophic uncertain Linguistic environment. Int. J. Fuzzy Syst. 20(3), 1–17 (2018) 5. Chang, W., Yuan, X., Yalong, W.: Decision-making method based on mixed integer linear programming and rough set: A case study of diesel engine quality and assembly clearance data. Sustain. 11(35), 90–91 (2019) 6. Liu, Y.: Teaching method of visual C++ programming course based on professional background. J. Geomat.S 42(5), 122–126 (2017) 7. Wang, C.-Y., Chen, S.-M.: A new multiple attribute decision making method based on linear programming methodology and novel score function and novel accuracy function of interval-valued intuitionistic fuzzy values. Inf. Sci. 893(452), 9024–9031 (2018) 8. Lepore, A., Palumbo, B., Castagliola, P.: A note on Decision making method for product acceptance based on process capability indices Cpk and Cpmk. Eur. J. Oper. Res. 267(1), 19–21 (2017) 9. Nava, M.B., Catanuto, G. Rocco, N.: A decision-making method for breast augmentation based on 25 years of practice. Arch. Plast. Surg. 45(2), 32–33 (2018)
Methods of Making Courseware for College
95
10. Ibrahim, M., Mustafa, I, Sadiq, M.: A group decision-making method for selecting cloud computing service model. Int. J. Adv. Comput. Sci. & Appl. 9(1), 449–456 (2018) 11. Lin, M., Wang, H., Zeshui, X.: TODIM-based multi-criteria decision-making method with hesitant fuzzy linguistic term sets. Artif. Intell. Rev. 5(4), 4–6 (2019) 12. Yang, W., Pang, Y., Shi, J.: Linguistic hesitant intuitionistic fuzzy decision-making method based on VIKOR. Neural Comput. Appl. 29(12), 613–626 (2018)
Performance Evaluation of Guangdong Province Technology Finance Based on DEA Model Junfeng Zhao1(&), Xue Deng2, Lu Shen3, Cuirong Huang2, and Chuangjie Chen2 1
School of Mechanical and Electrical Engineering, Guangdong Polytechnic of Industry and Commerce, Guangzhou 510510, Guangdong, China [email protected] 2 School of Mathematics, South China University of Technology, Guangzhou 510640, Guangdong, China 3 Business School, The Chinese University of Hong Kong, Hong Kong 999077, China
Abstract. Finance is the lifeblood of economy. The progress of technology promotes vigorous development of economy, while the growth of technology industry depends on advancement of finance. Based on several principles of index selection, this paper reasonably selects indexes and conducts factor analysis to meet the input-output index requirements of DEA model. The CCRDEA model and BCC-DEA model are constructed to analyze the combined efficiency of technology and finance in Guangdong Province and all prefecturelevel cities in Guangdong Province. This paper puts forward relevant policy suggestions to promote the development of technology and finance and scientific and technological innovation in Guangdong Province. It also suggests that Guangdong Province formulate its own development strategy for technology and finance with Guangdong characteristics, broaden financing channels and strengthen audit supervision over the use of scientific and technological funds. Keywords: Technology finance
Index system Factor analysis DEA
1 Introduction Science and technology can not only greatly promote social change and economic progress, but also lead to social and economic stagnation. This paper takes Guangdong Province as instance, uses DEA method to measure the combination efficiency of input and output of technology finance. We establish evaluation index system, which is targeted at Guangdong Province, and prefecture-level cities in Guangdong Province. DEA model was proposed by Charnes et al. [1]. In 1978, after that, DEA model gradually entered the field of vision of researchers. Du et al. [2] measure the inputoutput efficiency of provinces and cities in China accurately, which was analyzed the BCC model in the Three-stage DEA model. Jiang et al. [3] used DEA model made a deep analysis in Guangdong Province. Zhu et al. [4], took Anhui Province as an example, used DEA model and cluster analysis method to make empirical analysis on © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 96–104, 2021. https://doi.org/10.1007/978-3-030-51431-0_15
Performance Evaluation of Guangdong Province Technology Finance
97
the city appearance and environmental sanitation. Cong et al. [5] analyzed the efficiency of comprehensive environmental protection input-output in Heilongjiang Province. Han [6] by using DEA model, based on the statistics of Qingdao and China main cities. Saeed [7] estimate pure technical and scale efficiency for Gulf Cooperation Council banks. Super efficiency DEA model is a new model proposed by Anderson and Peterson [8]. Xu et al. [9] establish the input-output evaluation index system of agricultural informatization. Zhang [10] analyzed 30 provinces, autonomous regions and municipalities, with the foundation of super efficiency DEA model.
2 Index Selection This paper selects indicators and studies them from two dimensions. The indicator systems are as follows (Tables 1 and 2): Table 1. Technology finance performance indicator system of Guangdong province Input
Financial investment Personnel input
Output
Patent output High-tech product Technological achievements
Local financial technology appropriation, R&D development funds, R&D development funds accounted for the province’s GDP Number of people engaged in R&D activities per 10,000 population, R&D personnel full-time equivalent Patent applications, patent grants Output of high-tech products, and its corresponding export value The number of national technological progress awards, the provincial technological awards, the number of technological papers in our province collected by major foreign search tools, and the number of papers published in domestic technological journals
Table 2. Technology finance performance indicator system of prefecture-level cities in Guangdong province Input
Output
Financial investment Personnel input Patent output
Technology market output
Local financial technology appropriation, and its proportion in total local fiscal expenditure, R&D development expenditure, and its proportion in the province’s GDP R&D personnel full-time equivalent Patent application acceptance, invention patent acceptance, patent application authorization, invention patent application authorization Number of contracts concluded, contract amount
98
J. Zhao et al.
At present, a large number of indicators have been selected. Final index system must be satisfied the requirements of DEA model, thus, in this paper, factor analysis is used to reduce the dimension of the selected index.
3 Construction of CCR-DEA and BCC-DEA Models 3.1
CCR Model
Assume that among n DMUs, any DMU has m different inputs and s different outputs. For each DMUj , it is possible to generate a set based on the axiomatic assumptions of invalidity, convexity, taper and minimality: T ¼ fðX; YÞj
n X
Xj kj Xi
j¼1
n X
Yj kj 0; j ¼ 1; 2; . . .; ng
ð1Þ
j¼1
The CCR model as shown below: 8 m s X X > > min½h eð s þ srþ Þ > i > > > i¼1 r¼1 > > > n > X > > < s:t: xij kj þ s i ¼ hxij0 ; i 2 ð1; 2; . . .; mÞ > > > > > > > > > > > > :
j¼1 n X
ð2Þ
Yrj kj srþ ¼ hyrj0 ; r 2 ð1; 2; . . .; sÞ
j¼1 þ h; kj ; s i sr [ 0; j ¼ 1; 2; . . .; n
þ Among them, s i ; si are relaxation variables, xij0 is i-th input of the j0 -th DMU, and yrj0 is the r-th output of the j0 -th DMU.
3.2
BCC Model
The emergence of imperfect competition and changes in relevant national policies will make it difficult for enterprises to operate at the optimal scale, BCC model is one of the DEA model with variable returns to scale is generated.
Performance Evaluation of Guangdong Province Technology Finance
8 m s X X > > min½h eð s þ srþ Þ > i > > > i¼1 r¼1 > > > n > X > > > s:t: xij kj þ s > i ¼ hxij0 ; i 2 ð1; 2; . . .; mÞ > < j¼1 n X > > > Yrj kj srþ ¼ hyrj0 ; r 2 ð1; 2; . . .; sÞ > > > > j¼1 > > > > n X > > þ > kj ¼ 1; h; kj ; s > i sr [ 0; j ¼ 1; 2; . . .; n :
99
ð3Þ
j¼1
4 Empirical Analysis 4.1
Data Selection
For Guangdong Province’s own statistical data is mainly based on the Guangdong Science and Technology Statistics Yearbook from 2001 to 2018, and for the provinciallevel cities in Guangdong Province, the data is mainly based on Guangdong Science and Technology Statistics Network. This paper preprocesses all indicator data. Considering that in the data envelope analysis model, performing the same four operations on the same index at the same time does not affect the effectiveness of the decision unit. This paper uses the following formula for regularization: new data value ¼ old data value þ ½jminimum data valuej þ 1
4.2
ð4Þ
Model Analysis
The results are solved by DEAP 2.1 software. Now we make some denotes:mark effective as eff; ineffective as ineff; relative efficiency as re-eff; invariant as inv; increasing as inc; decreasing as dec. The markings are also applied to Tables 3–4. 1. Analysis of CCR Model Results From Fig. 1, the overall efficiency of Guangdong Province in 2000 and 2005–2007 was 1, indicating that the combination performance of technology finance is excellent, the combination efficiency is in a valid state of DEA, and quantitative financial inputs can obtain corresponding technological output; The overall efficiency of 2004, 2008, and 2010 shows that DEA is relatively effective. It requires a bit of financial input and technological output to achieve DEA effectiveness. From 2001 to 2003, 2009, and 2011 to 2017, the overall efficiency was in the DEA inactive state, and minor adjustments could not change this invalid state.
100
J. Zhao et al. Table 3. Analysis of the efficiency of technology finance in Guangdong province
Year
Overall efficiency
Technical efficiency
Scale efficiency
Technical effectiveness
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 Average value
1.000 0.796 0.809 0.880 0.985 1.000 1.000 1.000 0.963 0.896 0.953 0.836 0.808 0.853 0.817 0.770 0.784 0.784 0.885
1.000 0.989 0.982 1.000 1.000 1.000 1.000 1.000 1.000 0.946 1.000 0.967 1.000 1.000 1.000 0.936 0.977 1.000 0.989
1.000 0.805 0.823 0.880 0.985 1.000 1.000 1.000 0.963 0.948 0.953 0.865 0.808 0.853 0.817 0.823 0.803 0.784 0.895
eff re-eff re-eff eff eff eff eff eff eff re-eff eff re-eff eff eff eff re-eff re-eff eff ___
Scale effectiveness eff ineff ineff ineff re-eff eff eff eff re-eff re-eff re-eff ineff ineff ineff ineff ineff ineff ineff ___
Scale reward inv inc inc inc inc inv inv inv dec dec dec dec dec dec dec dec dec dec ___
2. Analysis of BCC Model Results As shown in Fig. 2, in 2000, 2003–2008, 2010, 2012–2014, and 2017, efficiency of pure technical in Guangdong Province was 1. In 2009, 2011, 2015, and 2016, the efficiency of pure technical in Guangdong Province was relatively effective, which means performance was somewhat poor. 1. Analysis of CCR Model Results From Fig. 3, it can be observed that the quantitative financial investment can obtain the corresponding technological output, which means that the combination of technology and finance is in good condition. The overall efficiency of Shaoguan, Jiangmen, Maoming, Zhaoqing, Huizhou, Meizhou, Qingyuan, and Zhongshan is less than 0.9; the overall efficiency of Jieyang and Yunfu is between 0.9 and 1. 2. Analysis of BCC Model Results From Fig. 4, pure technical efficiency of 11 cities was 1, including Guangzhou, Shenzhen, Zhuhai, Shantou, Foshan, Zhanjiang, Shanwei, Heyuan, Yangjiang, Dongguan, and Chaozhou. Moreover, there are 18 prefecture-level cities are effective, accounting for 85.71%.
Performance Evaluation of Guangdong Province Technology Finance
101
Table 4. Analysis of the efficiency of technology finance in prefecture-level cities in Guangdong province Comprehensive Pure technical efficiency technical efficiency Guangzhou 1.000 1.000 Shaoguan 0.458 0.562 Shenzhen 1.000 1.000 Zhuhai 1.000 1.000 Shantou 1.000 1.000 Foshan 1.000 1.000 Jiangmen 0.797 0.821 Zhanjiang 1.000 1.000 Maoming 0.934 1.000 Zhaoqing 0.420 0.564 Huizhou 0.927 1.000 Meizhou 0.889 1.000 Shanwei 1.000 1.000 Heyuan 1.000 1.000 Yangjiang 1.000 1.000 Qingyuan 0.923 1.000 Dongguan 1.000 1.000 Zhongshan 0.952 1.000 Chaozhou 1.000 1.000 Jieyang 0.905 1.000 Yunfu 0.954 1.000 Average 0.912 0.950 value
1.05 1 0.95 0.9 0.85 0.8 0.75
Scale Technical Scale efficiency effectiveness effectiveness 1.000 eff eff 0.815 ineff ineff 1.000 eff eff 1.000 eff eff 1.000 eff eff 1.000 eff eff 0.970 ineff re-eff 1.000 eff eff 0.934 eff re-eff 0.745 ineff ineff 0.927 eff re-eff 0.889 eff ineff 1.000 eff eff 1.000 eff eff 1.000 eff eff 0.923 eff re-eff 1.000 eff eff 0.952 eff re-eff 1.000 eff eff 0.905 eff re-eff 0.954 eff re-eff 0.953 ___ ___
Scale reward inv inc inv inv inv inv inc inv inc inc dec inc inv inv inv dec inv dec inv inc inc ___
Overall efficiency average value
Year
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
Overall efficiency
Area
Fig. 1. Overall efficiency and trends in Guangdong province from 2000 to 2017
J. Zhao et al.
1.02 1 0.98 0.96 0.94 0.92 0.9
Technical efficiency average value
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
Technical efficiency
102
Year
Comprehensive technical efficiency
Fig. 2. Technical efficiency and trend of Guangdong province from 2000 to 2017
1.1 1 0.9 0.8 0.7 0.6 0.5 0.4
Comprehensive technical efficiency average value
Area
Pure Technical Efficiency
Fig. 3. Comprehensive technical efficiency of prefecture-level cities in Guangdong province
1.1 1 0.9 0.8 0.7 0.6 0.5
Pure Technical Efficiency average value
Area
Fig. 4. Pure technical efficiency of prefecture-level cities in Guangdong province
Performance Evaluation of Guangdong Province Technology Finance
103
5 Policy Recommendations According to the analysis and comparison mentioned above, it has been pointed out that Guangdong Province has certain deficiencies in the development of technology finance and technology innovation. According to historical data, scale efficiency has remained unchanged for 4 years in 18 years, indicating that the input of the same proportion cannot get the optimal output. For the future economic development, Guangdong Province needs to combine national policies and according to its own conditions to formulate strategies for technology, finance and technology with its own characteristics. In terms of financial investment, we must not only provide an economic foundation for technological research and development, but also expand financing channels, mobilize enterprises, society, and the private sector to pay attention to invest in technological innovation activities. In this way, technology and finance can be efficiently integrated, and the level of technological and financial efficiency and the rate of technological innovation conversion can be improved. Acknowledgements. This research was supported by the “Humanities and Social Sciences Research and Planning Fund of the Ministry of Education of China, No. x2lxY9180090”, “Natural Science Foundation of Guangdong Province, No. 2019A1515011038”, “Soft Science of Guangdong Province, and No. 2018A070712002, 2019A101002118”, “Guangdong Polytechnic of Industry and Commerce Key Special Research, No. GDGM2016-CQ-02”, and “Fundamental Research Funds for the Central Universities of China, No. x2lxC2180170”. The authors are highly grateful to the referees and editor in-chief for their very helpful comments.
References 1. Charnes, A., Cooper, W.W., Rhodes, E.: Measuring the efficiency of decision making units. Eur. J. Oper. Res. 2(6), 429–444 (1978) 2. Du, J.M., Liang, L., Lu, H.: Research on the efficiency of regional science and technology finance in China based on three-stage DEA model. Financ. Econ. Res. 06, 84–93 (2016) 3. Yong, J., Xiaoxu, Y., Zuojing, L., Saihua, D.: Analysis of the relative efficiency of inputoutput of science and technology finance based on DEA Model—Taking Guangdong Province as an example. Sci. Technol. Manag. Res. 3, 69–74 (2017) 4. Zhu, J.M., Guo, J., Liu, C.: Evaluation of Anhui city appearance and environmental sanitation based on DEA and cluster analysis. J. Chang. Norm. Univ. 6, 118–123 (2019) 5. Cong, H.Y., Chen H.M.: Study on the relative efficiency of regional environmental protection investment based on DEA model—Taking Heilongjiang Province as an example. Bus. Econ. 6, 6–7 + 57 (2019) 6. Min, H., Na, W.: Research on the efficiency of the combination of technology and finance in Qingdao Based on DEA analysis. Henan Sci. 11, 226–231 (2015) 7. Saeed, A.-M.: An examination of technical, pure technical and scale efficiencies in GCC banking. Am. J Financ. & Account. 1(2), 152–166 (2018) 8. Andersen, P., Petersen, N.C.: A procedure for ranking efficient units in data envelopment analysis. Manage. Sci. 39(10), 1261–1264 (1993)
104
J. Zhao et al.
9. Xu, H., Wang, L., Wang, H., Wang, S.Q.: Efficiency evaluation of agricultural informatization based on CCR and super-efficiency DEA model. International Conference on Computer and Computing Technologies in Agriculture. CCTA, 240–246 (2014) 10. Zhang, M.L.: Efficiency evaluation of financial support for technological innovation in China based on super efficiency DEA and Malmquist index method. Financ. Dev. Res. 6, 18–25 (2015)
Traceability System Construction of Agricultural Products Cross-Border E-commerce Logistics from the Perspective of Blockchain Technology Yulin Luo1 and Chao Xie2(&) 1 2
Business School, Wuchang University of Technology, Wuhan, Hubei, China School of Management, Wuhan Donghu University, Wuhan, Hubei, China [email protected]
Abstract. In view of the traceability problem in the cross-border e-commerce logistics of agricultural products, this paper studies the blockchain technology. According to the common mode of cross-border e-commerce of agricultural products, it expounds the application of blockchain technology to each link of the cross-border logistics of agricultural products. Especially in the encryption part, using the algorithm research similar to the Byzantine general problem, fully embodies the characteristics of blockchain technology decentralization, security transparency, rules, traceability. Keywords: Blockchain Agricultural products
Traceability system Cross border e-commerce
1 Introduction In recent years, thanks to the popularity of mobile Internet and smart phones, crossborder e-commerce and express logistics are developing rapidly [1]. However, behind the great achievements of cross-border e-commerce logistics industry, there are also a series of worrying and long-term pain points, such as user information disclosure, information island, information authenticity and cross-border e-commerce settlement procedures [2]. These bottlenecks restrict the further development of cross-border ecommerce logistics, which affect the industry’s improvement of quality and efficiency, transformation and upgrading from the perspectives of consumer experience, data management, warehousing and transportation, logistics finance and other dimensions. With the rapid development of the new generation of information technology represented by blockchain, as well as the maturity of IOT, cloud computing, big data and other related technologies, e-commerce logistics is expected to reconstruct its operation mechanism under the power of science and technology, and develop towards decentralization, security transparency, traceability and expansion, so as to greatly reduce transaction costs, improve security and improve economic operation efficiency [3].
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 105–111, 2021. https://doi.org/10.1007/978-3-030-51431-0_16
106
Y. Luo and C. Xie
2 Characteristics of Blockchain in the Construction of CrossBorder E-commerce Logistics Traceability System for Agricultural Products Blockchain, as the underlying technology supporting bitcoin, uses distributed shared ledger and point-to-point transmission technology to support the flow of bitcoin digital assets in the decentralized network [4]. After years of development, blockchain has become a comprehensive system based on P2P network, asymmetric encryption, hash function, Merkle tree, chain structure, timestamp, consensus mechanism and other key technologies (as shown in Fig. 1).
Application Layer
DAPP(Logistics, E-commerce, Supply chain, Finance, Health)
Contract Layer
Contract container
Incentive Layer Common View Layer Network Layer
Issuing mechanism POW P2P network Block data
Data Layer
Hash function
Excitation mechanism
POS
DPOS
PBFT
Communication mechanism
Verification mechanism
Digital signature Asymmetric encryption
Chain structure Merkle tree
Fig. 1. Blockchain technology architecture
3 Blockchain Approach to the Construction of Cross-Border E-commerce Logistics Traceability System for Agricultural Products In a moving line of cross-border logistics of agricultural products, this paper simply divides the moving line into three parts. From agricultural suppliers to distributors, and finally consumers [5]. Due to the cross-border e-commerce of agricultural products, there are many problems, such as time and space problems, inventory piling problems. Therefore, this paper considers a common cross-border e-commerce mode of agricultural products, that is, foreign supplier a supplies to domestic distributor B through international logistics company C, while domestic agricultural product distributor B sells products to domestic consumer e through domestic logistics company D. Since agricultural product distributor B does not sell all the goods at one time after purchasing, it is usually stored in the bonded warehouse f in the customs supervision area,
Traceability System Construction of Agricultural Products
107
and the transactions between consumers and distributors usually go through e-commerce platform G. Therefore, the e-commerce mode considered in this paper is shown in Fig. 2. Bonded warehouse F Storage
Supplier A
International logistics company C Transport
DIstributor B
Domestic logistics company D Transport
Consumer E
Electronic business platform G Transaction
Fig. 2. E-commerce mode
In the module design of blockchain, the application layer can realize the interaction with users. By building the network layer of the blockchain and introducing the consensus mechanism, the transaction information in the blockchain is open and transparent, which cannot be cheated or tampered with. Within the blockchain network, all nodes are distributed [6]. In the cross-border logistics of agricultural products, the nodes controlled by agricultural suppliers, distributors, consumers and the logistics companies that are in transit are all distributed network features. In the past, after problems such as quality, safety and loss of products, it is more difficult to trace the root of the defects of products. Therefore, based on blockchain technology, this paper makes a reasonable planning for cross-border logistics moving line system [7]. 3.1
Front End of Cross-Border E-commerce Logistics Traceability System for Agricultural Products
Generally, if foreign products want to enter China, the person in charge of the goods needs to declare to the Customs within 14 days from the date of declaration of the means of transport. In order to ensure that the agricultural products entering our country are not fakes, this paper makes anti-counterfeiting records based on blockchain technology [8]. The account book of blockchain will be recorded when the certificate of agricultural products is issued. The first record will include the country of origin, place of origin, date of production, and date of delivery of the product certificate. If the domestic distributor B of agricultural products has not yet placed an order with the foreign supplier a, the warehousing information of the agricultural products stored in the foreign warehouse shall be recorded in the block. When domestic distributor B places an order, foreign supplier a also needs to record the time of product delivery in the block. In addition, all entry information from foreign agricultural product supplier a to domestic bonded warehouse f shall be filled in the blockchain account book and cannot be changed. When the products are transported to bonded warehouse F, the distributor
108
Y. Luo and C. Xie
Warehousing time, Repository information
The order has been placed
Outgoing time
+
No
ord
er
of agricultural products shall record the warehousing time and location information of agricultural products into the blockchain ledger. See Fig. 3 for details.
Country of origin, Date of manufacture, Product qualification certificate
The order has been placed
International logistics company C Distributor B Bonded warehouse F
Warehousing time, Repository information
Fig. 3. Block information record of agricultural product supplier a to distributor B
Each node of the blockchain is responsible for finding and verifying the workload of the agricultural product transaction information between each two transaction nodes, ensuring that the transaction information in the vast majority of the certification nodes remains the final consistency and reach a consensus, and after the final confirmation is correct, it is saved in the blockchain. Therefore, only when the next customer’s agricultural product order information data arrives, can the smart contract continue to unlock the blockchain for the next block ledger data recording. 3.2
Back End of Cross-Border E-commerce Logistics Traceability System for Agricultural Products
In China, consumer e purchases agricultural products from distributor B through ecommerce platform G. At this time, when the agricultural products are delivered from the bonded warehouse F, the corresponding delivery time is recorded on the block. When the domestic logistics company D is loading, the information of the logistics company and the corresponding consumer pick-up information such as address and telephone should be recorded in detail in the block. The transaction between the distributor B and the consumer e is usually conducted in the e-commerce network platform g. in order to ensure that the information of @@consumer e’s agricultural products is not recognized by outsiders and the agricultural products are lost, the corresponding asymmetric encryption algorithm technology of blockchain should be embedded in the e-commerce platform G. How to make encryption technology in the case of no trust consensus participating nodes (that is, in cross-border e-commerce logistics, there is no trust condition between the two sides of the transaction), so that more than half of the cross-border logistics nodes in the transaction can agree to the progress of the node data, and store it in each node according to the specific distributed structure of the node data [9]. The problem can be formalized into a mathematical expression similar to the Byzantine general problem: In the blockchain system, the set of all agricultural cross-border logistics nodes is represented by X; the single agricultural cross-border logistics node is represented by
Traceability System Construction of Agricultural Products
109
PX; all transaction data is represented by P; consensus agricultural cross-border logistics node set is represented by W; then the number of each agricultural crossborder logistics node is f0; 1; ; jWj 1g; single agricultural cross-border Logistics node is represented by CN; data storage logistics node set is represented by c; The cross-border logistics point of a single agricultural product is represented by DT. Each agricultural cross-border logistics node PX in X sends a transaction P, which is transmitted to the consensus node set W of agricultural cross-border logistics through P2P network. Because there is not a central logistics node (i.e. the blockchain mentioned above is not centralized) and the logistics consensus nodes do not trust each other, in order to reach a consensus, the nodes must exchange information and verify each other [10]. If the transaction data sent by consensus node CNi in the cross-border e-commerce logistics dynamic line of agricultural products to other logistics nodes is Pi , the logistics node receives the transaction vector VTðT1 ; T2 ; ; Ti Þ sent by other logistics nodes, and the module jVT j jWj 1 of the vector, our goal is to design a function f and algorithm p, so that T ¼ f ðT0 ; T1 ; Ti Þ
Store Discard
pðTÞ ¼ true pðTÞ ¼ false
ð1Þ ð2Þ
In this case, the final consensus result obtained by the function consensus node is equal to the original transaction information. If a transaction is recognized by most nodes in the cross-border logistics moving line of agricultural products, the algorithm result is true, otherwise it is false and the current transaction is abandoned. However, if the consensus node in the cross-border logistics of agricultural products has malicious nodes, deliberately tampering with the transaction data will cause the problem of “double consumption”. Therefore, this paper divides the consensus nodes in the cross-border logistics of agricultural products into three categories, namely, w1 , w2 , wev , the first two are benign nodes, the second one is malicious nodes. If the transaction vector of w1 received wev is VT2!1 and the transaction vector of wev received is VTev!1 , our function f and algorithm p must meet the following conditions:
VT2!1 ¼ f ðVT2!1 ; VTev!1 Þ Store
VTev!1 6¼ True
ð3Þ
Node CNi can identify which transactions are illegal and which transactions are legal without a central node, and store the legal transactions in the blockchain database as the execution result of the number of lines, while the illegal transactions cannot be executed at any time. Through the above algorithm, we know that the asymmetric encryption technology can make the transaction recognized by most nodes in the cross-border e-commerce logistics moving line of agricultural products and then recorded, thus ensuring the security of information transmission [11].
110
Y. Luo and C. Xie
In addition, the algorithm can also be embedded in the e-commerce platform g, through which the public key of consumer e is obtained and the express delivery information is encrypted and sent to consumer E. When the agricultural products arrive, consumer e can use the private key to unlock through the platform, thus ensuring the security of agricultural product information transmission.
4 Conclusions Blockchain technology is bringing significant innovation to all walks of life. It originates from fast virtual payment and serves for virtual transaction of network ecommerce, which is the most appropriate evaluation of blockchain. With the rapid development of cross-border e-commerce, blockchain technology will create a new ecological environment for cross-border e-commerce logistics with its characteristics. Although in the field of logistics, blockchain technology has broad prospects. However, because blockchain technology is still in the early stage of development, it is more applied in the financial field than logistics. Therefore, when logistics managers make decisions, they should carefully consider that blockchain technology is both a challenge and an opportunity. In the application of blockchain technology to the traceability of cross-border e-commerce logistics of agricultural products, this paper hopes to make a contribution with a small force. Acknowledgements. This work was supported by the grants from Hubei Provincial Collaborative Innovation Centre of Agricultural E-commerce (Wuhan Donghu University research [2019] No. 17 Document) and Youth Foundation WuHan Donghu University in 2019 “Research on Traceability System Construction of Quality and Safety of E-commerce Agricultural Products from the Perspective of Blockchain”.
References 1. Feng, X., Wang, Z.: Blockchain and e-commerce logistics reconstruction. China’s Natl. Cond. Natl. Strength 11, 9–12 (2019). (in Chinese) 2. Chen, S.: Discussion on the development path of cross-border e-commerce logistics in China from the perspective of blockchain. Financ. Econ. 16, 119–121 (2019). (in Chinese) 3. Wei, H., Chang, R., Rui, C.: The symbiotic development of rural e-commerce and logistics from the perspective of blockchain technology. Bus. Econ. Res. 6, 118–121 (2019). (in Chinese) 4. Sun, B., He, L.: Countermeasures for the development of cross-border e-commerce logistics based on blockchain technology-taking the comprehensive cross-border e-commerce pilot area of Jinpu new area in Dalian as an example. Intelligence 4, 226–228 (2019). (in Chinese) 5. Li, T., Yan, Z.: Application of blockchain technology in e-commerce logistics industry. Logist. Eng. Manag. 40(5), 73–74 (2018). (in Chinese) 6. Chen, Y., Bellavitis, C.: Blockchain disruption and decentralized finance: the rise of decentralized business models. J. Bus. Ventur. Insights 13, 15–23 (2020) 7. Venkatesh, V.G., Kang, K., Wang, B., Zhong, R.Y., Zhang, A.: System architecture for blockchain based transparency of supply Chain social sustainability. Robot. Comput.-Integr. Manuf. 63, 38–53 (2020)
Traceability System Construction of Agricultural Products
111
8. Van Cutsem, O., Ho Dac, D., Boudou, P., Kayal, M.: Cooperative energy management of a community of smart-buildings: a blockchain approach. Int. J. Electr. Power Energy Syst. 117, 108–113 (2020) 9. Cheng, Z., Liu, S.: Petri net modeling and analysis of e-commerce cold chain traceability system in blockchain. Enterp. Econ. 1, 48–55 (2020). (in Chinese) 10. Wu, J.: Research on supply chain management of autonomous fresh food e-commerce based on blockchain technology. J. Dali Univ. 5(1), 123–128 (2020). (in Chinese) 11. Xi, T.: Analysis of the third party logistics operation mode of cross-border e-commerce. Mod. Salt Chem. Ind. 47(1), 96–97 (2020). (in Chinese)
Express Delivery Services Customer Satisfaction Based on PLS_SEM Huali Cai1, Xuemei Wei2(&), Fang Wu1, Yanjun Gu1, and Ning Zhang1 1
2
Quality Research Branch, China National Institute of Standardization, Beijing, China National Science Library, Chinese Academy of Sciences, Beijing, China [email protected]
Abstract. China has grown into the fastest growing and most dynamic emerging express delivery market in the world. The paper puts forward a PLS_SEM method to calculate the customer satisfaction of the express delivery companies. Through an investigation in 50 cities, the authors conclude that company’s brand and service quality are key influence factors in consumer satisfaction. Company CC gets the best customer satisfaction, while BB and FF get the lowest result. Customers prefer the product integrity, ease of ordering, overall image and scope of delivery. They give the worst experience in the service characteristics. Keywords: Consumer satisfaction
Express delivery services PLS_SEM
1 Introduction China has grown into the fastest growing and most dynamic emerging express delivery market in the world. The volume of parcel deliveries exceeds the sum of developed countries such as the US, Japan and Europe, contributing more than 50% to the growth of the global express delivery industry. In 2019, China’s express delivery enterprises completed 63.52 billion pieces of business, up 25.3 percent year-on-year. Business revenue totaled 749.78 billion yuan, up 24.2 percent year-on-year. However, the quality of express delivery is not matched with the rapid scale growth. Therefore, this paper tries to master the service quality by the way of customer satisfaction in express delivery industry. PLS_SEM method was used to evaluate customer satisfaction. Some scholars have carried out relevant studies in the past. Li Xiao-Ping analyzed the influence of online stores on the quality of express delivery service from the aspect of customer satisfaction [1]. Kujiraoka Tokuhiro proposed a method to decompose review data and extract topics to identify delivery-related expressions [2]. Liu Shujun’s goal was to use the Kano model to find out what factors influence consumers’ satisfaction with the “last mile” service [3]. Wang Yunrui established an evaluation model of express customer satisfaction, which included 1 first grade index, 6 s grade indices, 15 third grade indices [4]. The classification algorithm based on decision tree theory and probability model were used to evaluate customer satisfaction [5]. Lucini Filipe R. used text mining to mine online customer reviews to find out the dimensions of airline © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 112–116, 2021. https://doi.org/10.1007/978-3-030-51431-0_17
Express Delivery Services Customer Satisfaction
113
customer satisfaction [6]. Leong Lai-Ying combined SERVPERF with semi-artificial neural network predictive analysis method to provide a new perspective [7]. Li Yike constructed an evaluation model of customer satisfaction and calculated customer satisfaction with questionnaire survey combined with analytic hierarchy process [8]. Liu Xiaohong proposed an e-commerce CSI model based on fuzzy technology and a method to calculate CSI [9]. Sangkon Park applied the theory of behavioral economics to evaluate aspects related to tourist satisfaction and overall city impression [10]. However, different from the above studies, this paper proposed a PLS_SEM based method to evaluate customer satisfaction service industry.
2 Customer Satisfaction Model To be first, a PLS_SEM model is built, which is show in Fig. 1.
Fig. 1. PLS_SEM conceptual model
Where, circle and rectangle represent latent variables and observation variables respectively. The arrows indicate the relationship of influence and the direction of influence. And the PLS method is shown as follows: g ¼ Bg þ Cn þ f
ð1Þ
In the model, g and n represent endogenous and exogenous latent variables respectively. B is the correlation between endogenous potential variables; C is the relationship between two kinds of latent variables; f represents the unexplained factor.
114
H. Cai et al.
Then, the following mathematical equation is obtained: X ¼ Kx n þ d
ð2Þ
Y ¼ Ky g þ e
ð3Þ
Where, X and Y are vectors composed of exogenous index and endogenous index; Kx reflects the relationship and Ky reflects the interaction between different variables. The customer satisfaction model of express delivery services was built based on the SEM, which has been proved effective (Fig. 2).
Fig. 2. Customer satisfaction model
The model consists of six structural variables, which are brand image, expected quality, perceived quality, perceived value, customer satisfaction, and customer loyalty.
3 Results We investigated 6 companies (the names were substituted for privacy by AA, BB…). We collected questionnaires from 50 cities in China, and each company got about 250 valid questionnaires. Then, the customer satisfaction model and PLS_SEM were used to calculate, and the results of the potential variables were shown in Table 1.
Express Delivery Services Customer Satisfaction
115
Table 1. The results of the 6 companies Latent variables
Overall Influence coefficient Brand image 75.75 0.70 Expected quality 76.73 0.25 Perceived quality 76.69 0.63 Perceived value 74.61 0.07 Customer Satisfaction 76.37 Customer loyalty 77.92
AA
BB
CC
DD
EE
FF
75.98 76.67 77.30 75.55 76.55 77.56
75.95 75.75 76.35 73.55 75.82 77.29
76.66 77.48 77.67 75.32 77.54 80.13
74.74 75.79 75.78 73.41 75.88 77.35
75.82 77.59 76.78 74.70 76.55 77.74
75.28 77.14 76.34 75.16 75.82 77.42
As can be seen from Table 1, brand and service quality have a significant impact on consumer satisfaction. In the six companies, the overall impact coefficient of brand image and perceived quality is 0.70 and 0.63, respectively. Expected quality and perceived value are not important to the customer, with an impact coefficient of 0.25 and 0.07, respectively. So more and more customers pay attention to brand and service quality, they pay less attention to the price. Through the calculated results, company CC gets the best customer satisfaction score, which indicates CC is the favorite express company. Company BB and FF get the lowest result, which means customer didn’t have good experience. From the Table 2, several key observable variables results are shown. Through all the variables, the product integrity, ease of ordering, overall image and scope of delivery get the higher result. However, customers don’t like the service characteristics. Maybe all the companies provide homogeneous services, which should be paid more attention. We can also see the result of each company on each variable, which can be taken as the important data for management decision support. Table 2. Several observable variables results Observable variables Overall Influence coefficient Overall image 77.20 0.37 Service characteristic 74.15 0.33 On time situation 76.46 0.08 Product integrity 77.84 0.08 Business scope 75.76 0.08 Service attitude 75.89 0.08 Distribution program 75.78 0.08 Ease of ordering 77.60 0.08 Scope of delivery 76.80 0.07
AA
BB
CC
DD
EE
FF
78.00 73.87 77.27 78.70 76.80 75.54 76.12 77.79 77.70
76.89 74.72 75.79 76.60 75.57 74.76 75.88 77.14 78.24
77.16 76.08 77.64 79.19 75.81 77.75 77.88 78.24 75.90
76.24 73.14 75.94 76.78 73.82 75.52 74.36 77.03 76.47
78.63 73.02 76.25 77.95 76.91 76.05 75.64 77.82 76.50
76.29 74.09 75.85 77.81 75.66 75.75 74.80 77.57 75.97
116
H. Cai et al.
4 Conclusion Based on PLS_SEM, we built a customer satisfaction model of express service and calculated the result of 6 companies. We found that brand and service quality are key factors in consumer satisfaction. Company CC gets the best customer satisfaction, while BB and FF get the lowest result. Customers prefer the product integrity, ease of ordering, overall image and scope of delivery. They give the worst experience in the service characteristics. All companies can taken the results as the important data for management decision support. Acknowledgments. This work is supported by the National Key Research and Development Program of China under Grants No. 2017YFF0206504, the National Social Science Fund Major Project (Research on Quality Governance System and Policy to Promote High Quality Development), No. 18ZDA079.
References 1. Xiao-Ping, L., Mei-Lu, L.: Service quality of online shops and express impact on customer satisfaction - Under E-commerce environment. In: 11th International Conference on Service Systems and Service Management, ICSSSM, 2014 2. Kujiraoka, T., Fumiaki, S., Syohei, I.: Extraction of customer satisfaction topics regarding product delivery using non-negative matrix factorization. In: IEEE International Conference on Industrial Engineering and Engineering Management, pp. 225–229 (2017) 3. Liu, S., Li, Y., Huang, J., Zhao, X.: Understanding the consumer satisfaction of the “lastmile” delivery of E-business services. FIP Adv. Inf. Commun. Technol. 546, 411–418 (2019) 4. Wang, Y.: Establish the evaluation model of express customer satisfaction. Energy Educ. Sci. Technol. Part A: Energy Sci. Res. 32(6), 6149–6156 (2014) 5. Nicolini, G., Salini, S.: Customer satisfaction in the airline industry: The case of British airways. Qual. Reliab. Eng. Int. 22(5), 581–589 (2006) 6. Lucini, F.R., Tonetto, L.M., Fogliatto, F.S., Anzanello Michel, J.: Text mining approach to explore dimensions of airline customer satisfaction using online customer reviews. J. Air Transp. Manag. 83, 1–12 (2020) 7. Leong, L.-Y., Hew, T.-S., Lee, V.-H., Ooi, K.-B.: An SEM-artificial-neural-network analysis of the relationships between SERVPERF, customer satisfaction and loyalty among low-cost and full-service airline. Expert. Syst. Appl. 42(19), 6620–6634 (2015) 8. Li, Y.-K., Xiong, Y.: The customer satisfaction assessment research of YTO Express Wuchang Branch. In: International Conference on Management and Service Science, MASS, 2011 9. Liu, X., Zeng, X., Xu, Y., Koehl, L.: A fuzzy model of customer satisfaction index in ecommerce. Math. Comput. Simul. 77(5–6), 512–521 (2008) 10. Sangkon, P., Sowon, H., Taehun, L., Minji, J.: Two factor model of consumer satisfaction: International tourism research. Tour. Manag. 67, 82–88 (2018)
Expectation to the Accounting Personnel Under the Information Background Xiuqing Wang(&) Fuzhou University of International Studies and Trade, Fuzhou, China [email protected]
Abstract. Along with rapid development of the new science and technology such as information technology, Internet of things, big data, artificial intelligence, mobile Internet, cloud computing, and the block chain, audit talents are facing the profound changes and challenges. The traditional audit talents is not capable for the Internet and large data under the current background. The supply and demand contradiction in the audit industry is increasingly outstanding. This paper is going to use the questionnaire survey, to investigate the talent demand of audit employers and the current situation of talent training in colleges and universities. It is going to set up some suggestion from the perspective of service quality gap model. Keywords: Big Data
Audit Talent Expectation 5GAP Model
1 Introduction With the integration of big data, information and other elements in audit work, the professional competence requirements of audit talents have endured great changes [1]. Information age is driving the transformation of educational form and school form [2]. At present, the main contradiction is that it is difficult for a large number of audit graduates to find a job, but the audit employers feel qualified, professional audit personnel overall supply is insufficient or the degree of specialization is not enough [3]. There is a big gap between the quality of audit talents cultivated by colleges and universities and the expectation of employers. This paper analyzes the gap 1 in the 5GAP model by means of data collation and questionnaire survey from the perspective of employers and universities, and puts forward some Suggestions to bridge the gap [4].
2 The Survey and Analysis Based on the 5GAP Model 2.1
Design of Service Quality Gap Model for Training Audit Talents in Colleges and Universities
As shown in Fig. 1, the core gap in the model is the gap between talent expectation (ES) and employee perception (PS) services in the audit industry, namely the gap 5 in the figure. To cover this gap, it is necessary to close the other four gaps: Gap 1—do not © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 117–122, 2021. https://doi.org/10.1007/978-3-030-51431-0_18
118
X. Wang
understand the expectations of the employer, that is, the information asymmetry gap; Gap 2—failure to select the right talent training program and training standards; Gap 3 —the cultivated talents fails to meet the expected standards; Gap 4—talent transfer and external commitment do not match.
Fig. 1. Service quality gap model of cultivating audit talents in colleges and universities (5GAP model)
2.2
Research Design
The paper will compare and analyze the gap between universities and employers in the expectation of audit talents through questionnaires. This questionnaire was conducted anonymously. A total of 300 questionnaires were issued by universities, and 279 valid questionnaires were recovered, which was in line with the research needs. 200 copies of questionnaires were sent to the employer, including accounting firm partners, annual audit project manager, special audit project manager, general auditors, staff of some local audit institutions and staff of some enterprise internal audit departments. A total of 154 copies of valid questionnaires were collected. 2.3 2.3.1
Gap Analysis
Gap Analysis in the Evaluation of the Importance of Profession Competence As shown in Fig. 2, both sides believe that audit professional competence is the most important and indispensable component. But combined with statistical analysis, it is found that employ company bear high importance towards the practical ability than colleges and universities, with more than 13% higher. This should be the refinement of daily audit project division and each person is responsible for the work area relatively fixed and familiar with. In daily auditing work, a lot of work is repetitive, the value evaluation tends to prefer the skilled people that have worked in specific module. They think practical operation ability is the final result of knowledge transformation [5].
Expectation to the Accounting Personnel
119
Respondents in colleges and universities have received comprehensive training in professional basic knowledge and other relevant knowledge, but lack of experience in audit practice, since they believe that relevant theoretical knowledge is the most important. This survey also reveals that college educators are separated from the actual status of audit work to some extent, and their teaching tends to be more theoretical than practical, so students tend to have high expectations and low capabilities in real work.
Fig. 2. Evaluation of the importance of professional competence
2.3.2 Difference Analysis in the Evaluation of the Information Thinking As shown in Fig. 3, the cognitive gap analysis of the importance of information-based thinking is obviously considered much more important from the perspective of the employer. The reason may be that the employer is in the front line of the market competition, and it is much more sensitive to the changes in the industry brought by big data and information in recent years. Most of the audit objects have realized ERP management [6], and it is believed that ERP management ability and big data thinking are the basic requirements and inevitable trend of development [7]. However, colleges and universities think that computer is only general knowledge, and the purpose of teaching and learning is mainly to pass the computer rank examination, and they do not pay special attention to the computer knowledge the students have mastered, and whether their capabilities can match the needs of the auditing industry and the degree of learning is enough. 2.3.3 Gap Analysis in the Evaluation of the Information Efficiency As shown in Fig. 4, about the information efficiency, many people in colleges and universities think it is not very important, while over 87% of employers consider that it is of high importance. There is a huge gap between them in this survey project. To conclude, the employer believes that information, computer-aided audit can greatly improve the efficiency of the audit [8], so that the computer is one of the necessary work ability [9]; Computer aided audit and information system audit are the inevitable trend of future audit in information society [10], those who bear this capability can take the work.
120
X. Wang
Fig. 3. Evaluation of information thinking
Fig. 4. Evaluation of information efficiency
3 Conclusion and Suggestion 3.1
Conclusion
Both sides stands close to the professional ability and the importance of development of cognitive, while they bear certain gap in the information thinking and the information efficiency of the importance of cognitive. This caused the information asymmetry in the demand for audit talents. This also directly cause of colleges and universities in cultivating talents in the practical work of audit professional competence is not enough, leading to the talent supply and demand contradiction; This kind of
Expectation to the Accounting Personnel
121
training deviation also results in some of the gaudy audit talent, lack of willingness to down-to-earth. The professional quality that needs accumulated work is also the reason that caused the asymmetry phenomenon in the graduated university. 3.2
Suggestion
3.2.1 Learning from the advanced experience of foreign audit education and international standards, combining with the employment situation of the domestic audit industry, and in the means of policy guidance, the academic research on audit education is continuously deepened, and the research results are popularized and applied to the guidance of audit practice. We should change the habit of focusing on theoretical research of audit education only and encourage the research on the system and practice of audit education. 3.2.2 Make full use of the Internet and big data information that can brought high value. Construct the audit professional human resource management platform and then apply the results of big data in demand in the formulation of strategy and scheme and through the platform, with colleges and universities, the auditees, regulators and other stakeholders of information sharing and resource sharing, targeted training audit talents. 3.2.3 Expand interdisciplinary courses and rebuild the curriculum system. Increase the proportion of class hours of strategic management, organizational behavior, innovation management and other courses and improve their assessment requirements. The courses of data structure are added to cultivate students’ knowledge of data structure and enhance their ability of data analysis. Increase the training of computer programming, data mining algorithms, financial decision-making and strategic management knowledge. In the teaching process, a variety of commercial scenes are built, a new big data + cloud computing comprehensive teaching and experimental platform is constructed, so as to improve students’ comprehensive ability, forward-looking and innovative thinking, and enhance their ability to adapt to the new technological environment and market competitiveness. 3.2.4 Highly attention paid to international perspective. In-depth understanding of the current domestic economic development direction, business model change and management model needs, this should be based on understanding the domestic needs and the international requirements. Failures to understand the international needs can not truly comprehend the domestic situation. We have to understand the international differences under the institutional background and key factors, so as to better training local talents in China.
References 1. Frey, C.B., Osborne, M.A.: The future of employment: how susceptible are jobs to computerisation? J. Technol. Forecast. Soc. Chang. 114, 254–280 (2017) 2. Richins, G., Stapleton, A., Stratopoulos, T.C., et al.: Big data analytics: opportunity or threat for the accounting profession?. J. Inf. Syst. 31(3), 63–79 (2017)
122
X. Wang
3. Dzuranin, A.C., Jones, J.R., Olvera, R.M.: Infusing data analytics into the accounting curriculum: a framework and insights from faculty. J. Account. Educ. 43, 24–39 (2018) 4. Ali, A., Md., Lee, T.H., Mohamad, R., Ojo, M.: Internship and audit expectation gap among undergraduate students in Universiti Utara Malaysia. J. Financ. Report. Account. 6(1): 55– 74 (2008) 5. Crawford, L., Helliar, C., Monk, E.A.: Generic skills in audit education. Account. Educ. 20 (2), 115–131 (2011) 6. Schwertner, K.: Cloud computing as area of modern industry. J. Mod. Account. Audit. 8 (June): 907–913 (2012) 7. McKinney Jr., E., Yoos II, C.J., Snead, K.: The need for ‘skeptical’ accountants in the era of big data. J. Account. Educ. 38, 63–80 (2017) 8. Arsenie-Samoil, M.D.: Cloud accounting. Ovidius Univ. Ann., Econ. Sci. Ser. 2, 782–787 (2011) 9. Carillo, K.D.A.: Let’s stop trying to be ‘sexy’—preparing managers for the(big) data-driven business era. Bus. Process. Manag. J. 3, 598–622 (2017) 10. Mohammadi, S., Mohammadi, A.: Effect of cloud computing in accounting and comparison with the traditional model. Res. J. Financ. Account. 23, 104–114 (2014). (in Chinese)
Brand Strategy Management of Agricultural Products Based on Information Age Chunming Liu(&) College of Business Administration, Jilin Engineering Normal University, Changchun, Jilin, People’s Republic of China [email protected]
Abstract. The industrial structure of agricultural products (AP) is not perfect. If we want to realize the sustainable development of AP, it is not enough to rely on the traditional management methods of farmers and enterprises. To establish brand strategic management for AP is the driving force for sustainable development. The purpose of this paper is to study the brand strategic management of AP based on the information age. First of all, using the theoretical products of informatization as the theoretical basis, this paper studies the general relationship between informatization and agricultural product brand, and then through the questionnaire survey and data analysis of 400 citizens, summarizes the problems existing in the construction of agricultural product brand in a university base. The experimental results show that according to the survey of consumers’ satisfaction with the price of AP in a university base, the data collection shows that 43.76% of the consumers are dissatisfied with the price of AP in the base, 32.68% are generally satisfied, 18.5% are satisfied, and only 5.1% are very satisfied. Agricultural enterprises should strengthen cooperation with universities and scientific research institutes, and actively connect with agricultural high-tech projects to accelerate the transformation of agricultural scientific. Keywords: Information theory Agricultural product brand Product quality Agricultural production modernization
1 Introduction China’s per capita national income has been increasing, and consumer demand has been upgrading, which has brought unprecedented business opportunities to the development of domestic AP brands. The level of people’s income has been continuously improved, and the consumption structure has changed significantly [1, 2]. However, there are few famous AP in the market, and the content of scientific is relatively low [3, 4]. The producers, processors and operators of AP lack the concept of agricultural product brand, and the awareness of technological innovation of agricultural product brand is weak [5, 6]. Therefore, let technological innovation enter into the brand strategy of AP, strengthen the brand strategy of AP with scientific and technological innovation, enhance the brand strategy, strengthen the brand quality of AP, and solve the contradictions in the brand strategy of AP [7, 8]. We should implement the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 123–129, 2021. https://doi.org/10.1007/978-3-030-51431-0_19
124
C. Liu
leading strategy of scientific and technological innovation, actively purchase new products, new technologies and new equipment, improve the market competitiveness of enterprises, let technological innovation support the brand building of AP, make use of technological innovation to improve the brand strategy of AP, let technological innovation strengthen the marketing of AP, and the government should strengthen the support of technological innovation in the use of AP brands, so as to make technological innovation become new brand strategy of AP plays a greater role [9, 10]. Gustavo A used evolutionary game model to analyze the cooperative behavior of processing enterprises. The results show that: (1) the cooperative behavior of processing enterprises is closely related to the conversion coefficient of cost-benefit, and the conversion coefficient is different. The cooperative behavior of processing enterprises is also closely related to the additional income of free riding behavior, if the additional income is high, It will reduce the enthusiasm of enterprises to maintain quality; 3) with the increase of quality maintenance cost, the cooperative behavior of processing enterprises will appear different evolutionary stable equilibrium. Within different allocation proportion, the behavior decision of production enterprises will often experience the opposite evolutionary game [11]. Brand building plays an increasingly important role in the marketing and competition of modern agricultural industry. WANG Qiang’s research showed that there are some problems in the brand construction of Hainan Tropical characteristic AP, such as low brand awareness, weak core competitiveness, strengthening declaration and neglecting management, and imperfect marketing system. Therefore, we should pay attention to resource integration, develop famous brand products, strengthen technological innovation, and enhance the core competitiveness of enterprises [12, 13]. The innovation of research content, for brand and brand building of AP, most of the research is based on the background of brand. The role of agricultural and forestry colleges and researchers in brand building of AP is not reflected. Based on the actual situation of a university base, relying on a large number of substantial investigation and interview data, this paper explores a new path of brand building of AP in mountainous areas of a province through the promotion of University researchers. The development level of a university base is uneven. Through contact with specific objects, field visits to more than 20 research bases and interviews with more than 150 people, empathy is used to get a lot of descriptive information in chat, which more comprehensively reflects the existing problems in brand building of AP in a university base, and is conducive to researchers to put forward corresponding improvement programs.
2 Proposed Method 2.1
Information Theory
Informatization is an ideal state of high application of information technology and high sharing of information resources, which makes people’s intellectual potential and social material resources fully developed, and rationalizes personal behavior. At the same time, informatization is also a continuous process of IT industry development and it
Brand Strategy Management of Agricultural Products
125
diffusion in all sectors of social economy. It is constantly used to transform the traditional economic and social structure into the above ideal state. 2.2
General Relationship Between Informatization and Brand of AP
Informatization and brand of AP are two concepts, but they have an inseparable important relationship. Informatization is organically integrated in the process of brand building of AP. The materiality of agricultural product brand needs the equipment media in each link of agricultural management to produce, and the materiality of informatization is embodied in these equipment media, so as to achieve the integration of informatization and agricultural product brand materiality. 2.3
Combination of Informatization and Brand of AP
In the development of modern agriculture, using modern computer information communication technology, taking the Internet as the carrier, relying on the brand information database of AP, the brand-new information management process of modern agricultural product brand business management, which combines the production and sales of AP, brand identification and brand strategy, is established. The application of technology in the construction of traditional agricultural brand and innovation can reduce the operating cost of agricultural brand development, expand the scope of sales, enhance the connotation of AP, improve the popularity of AP, and make it across the time and space constraints, combat and avoid the duplication and counterfeiting of brands, improve the quality service of brands and the awareness of consumers, and enhance the comprehensive competition of agricultural brands. Informatization promotes the development of brand, and informatization also promotes the development of AP. The effective combination of information technology and brand building of AP can make the brand AP better move to the competitive market.
3 Experiments 3.1
Selection of Respondents
Based on the current situation of brand construction of AP in a university base, this paper investigates the brand awareness, product quality and product pricing satisfaction of AP in the base. The total number of questionnaires was 400, 338 of which were valid. The effective recovery rate was 84.5%. The questionnaire was distributed to teachers and students of Agricultural University, fruit stores, fruit supermarkets, vendors of AP, relevant staff and tourists of the base, etc. The scope of the questionnaire includes two parts: inside and outside the province. In order to enhance the reliability of the sample, we take into account the different age groups and income groups in the questionnaire.
126
3.2
C. Liu
Investigation Content Design
First of all, with regard to the survey of brand awareness of AP, the core question of the questionnaire is whether you think the market share of AP of a certain brand is very high and whether it is often mentioned. Second, with regard to the survey of agricultural product quality, the main questions involved are “you think the taste and taste of brand AP are very good, and AP have obtained green certification, organic certification and pollution-free certification” Investigators can also choose from 1-3 to agree with this question. 1: Disagree, 2: basically agree, 3: totally agree. Finally, the survey on the satisfaction of pricing of AP mainly involves the following questions: “do you think the pricing of brand AP is consistent with the market pricing, and whether you are satisfied with the pricing of brand AP?” the respondents answered the four levels of this question. 1: Dissatisfied, 2: basically satisfied, 3: satisfied, 4: very satisfied.
4 Discussion 4.1
Improve the Quality of AP by Informatization
If the AP in the base can not receive the timely guidance of Agricultural University researchers in planting, fertilization, pruning and other technical aspects, some farmers will spray the AP in order to promote the sales of AP. After entering the circulation field, the quality and taste of AP will show obvious differences. Coupled with the imperfect monitoring and tracking system of enterprises, the brand image of AP is always facing challenges War. From the perspective of the respondents’ understanding of the quality of AP in the Agricultural University base, consumers have doubts about the quality of AP, and have doubts about whether the AP are certified with “three products and one standard” (green food certification, pollution-free AP certification, organic AP certification and AP geographical indication certification), and the frequency of disapproval is significantly higher than that of approval. The detailed statistical results are shown in Table 1. The brand of AP is the embodiment of green, organic and pollution-free food, which is a complex of high-quality AP. The region should establish a perfect standardized production system of AP. 4.2
Promote the Modernization of Agricultural Production with Informatization
According to the survey of consumers’ satisfaction with the price of AP in the Agricultural University base in the questionnaire, it is found that 43.76%, 32.68%, 18.5% and 5.1% of the residents are not satisfied with the price of AP in the three combined bases. On the whole, consumers think that the price of AP in Agricultural University base is on the high side, which is inconsistent with its pricing position in consumers’ mind. The specific price satisfaction of brand AP is shown in Fig. 1. In the process of sending out the questionnaire, the respondents reflected that the quality of AP in the base is indeed good, such as the crisp taste and good-looking
Brand Strategy Management of Agricultural Products
127
Table 1. Questionnaire on the quality of AP in three combined bases Problem
Option
You buy brand AP with good taste
Disagree (1) Basic approval (2) Fully agree (3) Disagree (1) Basic approval (2) Fully agree (3) Disagree (1) Basic approval (2) Fully agree (3) Disagree (1) Basic approval (2) Fully agree (3)
Your brand of AP tastes good
You buy brand AP with high nutritional value
Your purchase of brand AP has passed relevant certification
Frequency number 174 89
Frequency percentage 54.54% 27.89%
56
18.42%
128 106
40.12% 33.22%
85
26.64%
102 156
31.27% 48.90%
61
19.12%
146 109
45.76% 34.16%
64
20.06%
50.00%
43.76%
40.00%
32.68%
30.00% 18.50%
20.00% 10.00%
5.10%
0.00%
Very satisfied
General satisfaction
Basic satisfaction
Dissatisfied
Fig. 1. Respondents’ satisfaction with the price of brand AP
appearance of apples, but compared with other apples on the market, the price is more than twice as high, which is difficult for consumers to accept. There are always reasons for the price of each product. Most of the time, these reasons are not important. How to make consumers believe and accept the price is very important. Consumers’ dissatisfaction with the pricing of AP restricts the growth of the
128
C. Liu
base brand consumers of AP, and it is also a key factor that affects the transition of AP from gifts to consumer market. The relevant sales personnel of the base shall pay attention to the price fluctuation of the agricultural product market in time, instead of blindly pursuing high pricing, and formulate the price matching the product cost. The pricing strategy of Fugang brand is not completely suitable for the sales of AP in each base. Enterprises should understand that the pricing strategy of AP is directly related to the market sales of AP. If the product pricing is not reasonable, it will hinder the brand construction of AP to a large extent. Agricultural enterprises should actively connect with agricultural high-tech projects to accelerate the transformation of agricultural scientific and technological achievements, improve the internal quality of AP, and pay attention to the research and development of new products with high-tech content.
5 Conclusions Through the study of AP, this paper laid the foundation for the study of brand building of AP. Based on the theory of brand building of AP and the theory of information technology, and based on the actual situation of Agricultural University base, this paper analyzes the problems of brand building of AP and its influencing factors, and puts forward a series of suggestions to solve the problems. Adhere to the combination of theory and practice, in addition to on-the-spot interview and investigation of Agricultural University base, and the questionnaire survey and data analysis of 400 citizens, summed up the problems of Agricultural University base in brand building of AP.
References 1. Nowacki, M., Nowacka, K., Kloskowski, T.: Are agricultural and natural sources of bioproducts important for modern regenerative medicine? A review. Ann. Agric. Environ. Med. 24(2), 207–212 (2017) 2. Tang, X.-L.: Research on the personalized product strategy of N brand based on consumer survey. J. Beijing Inst. Cloth. Technol. 38(1), 60–65 (2018) 3. Vahabzadeh, A., Vatanpour, H., Dinarvand, R.: Impact of corporate reputation on brand segmentation strategy: An empirical study from Iranian pharmaceutical companies. Iran. J. Pharm. Sci. 13(1), 87–104 (2017) 4. Puente-Díaz, R.: Using international sport events as part of a brand construction strategy: The case of the destination brand Mexico. Int. J. Sport. Mark. Spons. 19(2), 00–00 (2018) 5. Huertas-García, R., Lengler, J., Consolación-Segura, C.: Co-branding strategy in causerelated advertising: the fit between brand and cause. J. Prod. & Brand. Manag. 26(2), 135– 150 (2017) 6. Ghose, S., Heiman, A., Lowengart, O.: Isolating strategy effectiveness of brands in an emerging market: A choice modeling approach. J. Brand. Manag. 24(2), 1–17 (2017) 7. Abratt, E., Mingione, M.: Corporate identity, strategy and change. J. Brand. Manag. 24(2), 1–11 (2017) 8. Ying, C.: Rewriting in English-Chinese translation of brand names. Babel 63(2), 251–270 (2017)
Brand Strategy Management of Agricultural Products
129
9. Hussein, Z., Wahid, N.A.: Game-mediated experience: Does brand exposure changing users’ attitudes? Adv. Sci. Lett. 23(1), 550–553 (2017) 10. Ming. JAC Motors Chairman An Jin: JAC aims to realize brand upgrading. China’s Foreign Trade 2, 26–28 (2017) 11. Mishra, S., Singh, S.N., Fang, X.: Impact of diversity, quality and number of brand alliance partners on the perceived quality of a new brand. J. Prod. & Brand. Manag. 26(2), 159–176 (2017) 12. María, G.A., Mazas, B., Zarza, F.J.: Animal welfare, national identity and social change: Attitudes and opinions of spanish citizens towards bullfighting. J. Agric. & Environ. Ethics 30(1), 809–826 (2017) 13. Qiang, WANG: Agricultural products processing characteristics and quality evaluation. J. Integr. Agric. 17(5), 975–976 (2018)
A Brief Analysis of the Innovation of International Trade Methods Based on Network Economy Yushu Ding(&) College of Trade and Economics, Jilin Engineering Normal University, 3050Kaixuan Street, Changchun, China [email protected]
Abstract. The impact and influence of network economy on international trade is very great, which makes it face powerful development opportunities and challenges. Because of the explosive development of e-commerce has greatly changed the circulation mode of international trade; On the other hand, the extensive resource sharing of network database breaks through the time and space limitation of international trade exchange, and the organic combination of virtual market economy and real market economy not only promotes the prosperity of international trade, but also causes many problems. The purpose of this paper is to change the mode of the world economy from the traditional form to the modern model, make international trade more convenient and quick, and promote the market economy into the tide of network economy. By analyzing the application of network in international trade communication, this paper studies its influence on the development of international trade, and puts forward Suggestions and views on optimizing network technology to promote the development of international trade. The results show that the negative impact of network economy on international economy and trade exists for a long time, which requires the Chinese government and relevant departments to conduct indepth research on this, and then take relevant measures to avoid the negative impact of network economy, and finally realize the purpose of network economy promoting the sound development of China’s market economy. Keywords: Network economy International trade International economy New network environment
Method innovation
1 Introduction Now, internet technology has been gradually applied to various fields of social production and life, bringing great opportunities for the development of e-commerce. The rapid rise of network economy has also exerted a great influence on the development of traditional international economy and trade [1, 2]. The development of network economy is based on Internet technology. Although network economy plays a positive role in promoting the development of international economy and trade, its disadvantages also bring great challenges to the development of international economy and
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 130–136, 2021. https://doi.org/10.1007/978-3-030-51431-0_20
A Brief Analysis of the Innovation of International Trade Methods
131
trade. So, how to avoid negative effects as far as possible and promote the stable development of Chinese economy [3, 4]. Under the current economic background, network economy has become an important part of China’s economic development, changing the traditional economic development mode of our country and bringing new vitality to the development of international economy and trade. However, restricted by factors such as network environment, the negative impact of network economy on the development of international economy and trade cannot be ignored [5, 6]. It can be seen from the development trend of e-commerce in recent years that China is increasingly relying on ecommerce, so we should objectively analyze and observe the influence of network economy on the development of international economy and trade [7]. First of all, the network economy provides the convenience for the international economic and trade development, saves the cost; Secondly, the hidden risks of network economy have a negative impact on the development of international economy and trade. In the network economy environment, how to avoid negative effects and promote the healthy development of China’s market economy is an urgent problem to be solved [8, 9]. On the basis of clarifying the specific performance of network economy’s influence on international economic development, this paper puts forward relevant strategic Suggestions on how to better play the role of network economy in promoting international economic development, so as to promote the sustainable, stable and healthy international economic development. As a modern economic form based on computer network platform, network economy makes full use of the characteristics of network interaction, rapid subjects and diversity, providing a smoother and richer channel for the development of economic activities among countries [10, 11]. However, the influence of network economy on international economic development is obviously two-sided. Therefore, while developing network economy, network economy should also be standardized to avoid the deep influence of unstable factors of this economic form on international economic development [12].
2 Method 2.1
Network Economy
Today, represented by modern communication technology with information technology is surprising and unpredictable to tamper with the speed of our survival and ways of life and the tamper with the deep quietly started with the idea of people, and has allowed the thought sprout into root extremely developed, nuclear power in endless seeds or roots in pregnant with new style and way of human existence and life. The traditional concept of survival and life space has changed, the information age has quietly arrived, people are unprepared. The core characteristic of the information age is to break through the limitation of time and space effectively. The traditional spatiotemporal concept in the market is greatly stimulated. Again, the nature of capital is well satisfied; The fulcrum of prosperity is getting bigger. Network economy is a new
132
Y. Ding
economic form based on computer network (especially Internet) and centered on modern information technology. It not only refers to the rise and rapid growth of information technology industry with computer as the core, but also includes the rise and rapid development of high-tech industry on the basis of modern computer technology, which is more caused by the promotion of high-tech. 2.2
The Formation of a New Environment for International Trade
With its unique advantages, the network economy creates a diversified market environment and market rules for international trade, breaks through the limitations of time and space, and realizes the modernization and new type of international trade. For example, the Internet breaks through the traditional national and regional boundaries, closely connects the world and realizes the concept of global village. The Internet has also freed itself from the shackles of time, enabling international trade to reduce the cost of time. The Internet has turned the world into a “global village”. As a result, geographic distance becomes irrelevant, and the spatial constraints of network-based economic activities are minimized, which greatly promotes the globalization of the whole economy and allocates resources more effectively on a global scale. As a result, interdependence among countries around the world has increased. With the support and promotion of network technology, a new mode of international trade has emerged: e-commerce. In the open network environment, through the Internet, online transactions among merchants, online electronic payment and various business activities, transaction activities, financial activities and related integrated service activities are a new business model.
3 Experiment This paper intends to use the social network analysis method to analyze the evolution of international fresh fruit trade pattern from 2004 to 2018, and then further explore the factors influencing fruit trade. In terms of the selection of countries in the fresh fruit trade network, this paper determined 49 countries on five continents as the target countries of the international fresh fruit trade study according to the GDP ranking of each continent in 2018. Through the United Nations commodity trade statistics database, the data of chapter 08 of the customs HS code of 49 countries from 2004 to 2018 were downloaded to construct the data matrix of 15 bilateral trade from 2004 to 2018, totaling 36,015 original trade data. Since the data value is large and the data volume is huge, the author preprocessed and assigned the data before the study, uniformly divided the original data into 10,000. According to the distribution of the processed trade data, the author assigned the data to a total of 6 intervals of 0–5, including 150 assigned value 5, 50 assigned value 4, 20 assigned value 3, 10 assigned value 2, >assigned value 1, =0 assigned value 0. In this study, the status of international fresh fruit trade network was grasped as a whole, and the development status of each node was investigated from the aspects of
A Brief Analysis of the Innovation of International Trade Methods
133
import and export, and the trade status of individual countries with significant changes and China was analyzed by combining index data. Secondly, in the form of plates, the changes of each country’s plate and each plate are analyzed. The QAP regression analysis method is adopted to analyze the factors influencing international fresh fruit trade by selecting geographical proximity, degree of fruit trade control, level of fruit trade tariff, geographical latitude zone, FTA relationship or not, and per capita GDP.
4 Analysis and Discussion 4.1
Network Density
Density is an indicator that describes the tightness of “relationships” between nodes in a social network, that is, the “actual number of relationships” divided by the “theoretical maximum number of relationships”. The whole interconnected network not only provides various social resources for individuals, but also becomes an important force restricting their development. The expression of the overall network density is: N P
Density ¼ W
i
INandOUT ðdiW Þ
ð1Þ
NðN 1Þ
Where dW i is the weighted out degree and in degree of node I, and N is the number of nodes. The density of international fresh fruit trade data from 2004 to 2018 can be calculated as shown in Table 1:
Table 1. International fresh fruit trade network density table from 2004 to 2018 Time
2004
2005
2006
2007
2008
2009
2010
2011
The density of 0.8172 0.8512 0.8946 0.9188 0.9741 0.9915 1.0021 1.0599 Time 2012 2013 2014 2015 2016 2017 2018 The density of 1.0731 1.1318 1.1688 1.1616 1.1922 1.2249 1.1824
Table 1 shows that the network graph of international fresh fruit trade in 2004 and 2018 shows that the number of connections between countries in the network graph has increased significantly compared with that in 2001, indicating that the number of trade relations among participating countries in the international fresh fruit trade network has increased significantly and the connections are more complex. The distance between relevant trading countries has been significantly shortened and the degree of aggregation between countries has been increased, indicating that the dependence between countries in the international fresh fruit trade network has become increasingly close.
134
Y. Ding
And international fresh fruit trade in 2004–2018 the overall network density increases from 0.817 to 1.182, the density value were 0.365 and 44.69%, of which 2001 international trade overall network density of fresh fruit for a minimum of 0.8172, the 2014 international fresh fruit trade as a whole network density at peak of 1.2249, the subprime crisis of 2007 and 2008 fresh fruit trade between the countries of the financial tsunami did not have much impact, during the international trade network density of fresh fruit to keep rising trend. Through the analysis of network density, it can be accurately seen that the network density of international fresh fruit trade is increasing year by year, and the trade relationship between countries is getting closer. From two perspectives, it can be concluded that the net density of international fresh fruit trade increased year by year from 2004 to 2018, and the fruit trade between participating countries became increasingly close and complicated. 4.2
Intermediate Center Degree of Fresh Fruit Trade in China from 2004 to 2018
As shown in Fig. 1, from the perspective of the value of the middle center, it decreased from 30.12 in 2004 to 27.567 in 2018, down by 2.553 and 8.48%. In 2008 and 2014, the median center value reached the highest point, respectively 36.617 and 39.338. On the whole, the value of China’s intermediate centrality has remained at a relatively stable level for 15 years. From the perspective of international ranking, China has risen from the ninth place in 2001 to the fourth place in 2015, and the overall ranking is on the rise. The best ranking in 2014 and 2017 ranked third. However, individual years, such as 2007, 2010 and 2015, fluctuate significantly. China’s ranking has improved significantly since 2010 and reached the fourth place in 2018. From the perspective of ranking, China has become one of the countries with strong influence in the international fruit trade, but its international position is not stable due to many influencing factors in the trade. From the perspective of the center degree among 2004–2018 in the United States, France, Britain, Germany, Canada, the western developed countries represented by always occupy first place in the international trade network of fresh fruit, controls the whole network, but as China, India, Indonesia, Egypt, Vietnam and other developing countries fruit trade unceasing development, the western developed countries to control the international trade in the network resources of fresh fruit degree of declining, preliminary established dominance is losing.
A Brief Analysis of the Innovation of International Trade Methods
45 40 35 30 25 20 15 10 5 0
135
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018
Year Fig. 1 The center degree of China’s fresh fruit trade and its ranking change trend from 2004 to 2018
5 Conclusion To sum up, under the background of the Internet, the emergence of the network economy, as a modern economic form based on the computer network platform, makes full use of the characteristics of network interaction, swiftness and diversity of subjects, providing a more smooth and rich channel for the development of economic activities between countries. However, the influence of network economy on international economic development is obviously two-sided. Therefore, while developing the network economy, we should regulate the network economy to avoid the deep influence of the unstable factors of the economic form on the international economic development. The rapid development of network economy has a certain impact on international economy and trade, including positive and negative impacts. To explore the influence of network economy on international economy and trade in the development process, and to adopt targeted methods to regulate the negative influence of network economy on international economy and trade, is conducive to promoting the improvement of China’s economic development level.
References 1. Zhang, J., Qu, X., Sangaiah, A.K.: A study of green development mode and total factor productivity of the food industry based on the industrial internet of things. IEEE Commun. Mag. 56(5), 72–78 (2018) 2. Jiang, X., Guan, D.: The global CO2 emissions growth after international crisis and the role of international trade. Energy Policy 109, 734–746 (2017) 3. Terai, A.: International trade as an engine for sustainable development: the ITFC experience in supporting SMEs. Glob. Policy 8(3), 392–396 (2017)
136
Y. Ding
4. Mavroidis, P.C., Janow, M.E., Molina Tejeda, M.T.: The regulation of international trade: the GATT and the WTO agreements on trade in goods, volumes 1 and 2. World Trade Rev. 16(4), 766–771 (2017) 5. Hong, S., Oh, S.H., Sim, A.-G.: Imperfect labor mobility and the trickle-down effect in international trade. J. Korea Trade 22(1), 68–83 (2018) 6. Allen, E., Noseworthy, M., Ormsby, M.: Phytosanitary measures to reduce the movement of forest pests with the international trade of wood products. Biol. Invasions 11(9), 1–12 (2017) 7. Lovrić, M., Da Re, R., Vidale, E.: Social network analysis as a tool for the analysis of international trade of wood and non-wood forest products. For. Policy & Econ. 86(4), 45–66 (2018) 8. Andersson, F.N.G.: International trade and carbon emissions: the role of Chinese institutional and policy reforms. J. Environ. Manag. 205(1), 29–39 (2018) 9. Shadikhodjaev, S.: The “regionalism vs multilateralism” issue in international trade law: revisiting the Peru-agricultural products case. Chin. J. Int. Law 16(1), 109–123 (2017) 10. Worsnop, C.Z.: Domestic politics and the WHO’s international health regulations: Explaining the use of trade and travel barriers during disease outbreaks. Rev. Int. Organ. 12(7), 1–31 (2017) 11. Atanasov, V., Nitschka, T.: Firm size, economic risks, and the cross-section of international stock returns. N. Am.n J. Econ. & Financ. 39(2), 110–126 (2017) 12. Lorenz, D.: Die Neue Weltwirtschaftsordnung aus der Sicht der Industriestaatdebatte der Jahrhundertwende (The New International Economic Order as seen by the German “Industriestaat-Debatte” of the turn of the century). Jahrbücher Für Nationalökonomie Und Statistik 192(1), 36–54 (2017)
Financial Management Teaching Mode Based on MOOC Under the Background of Informatization Zhe Wang(&) Fuzhou University of International Studies and Trade, Fuzhou 350202, China [email protected]
Abstract. With the improvement of China’s informatization infrastructure and the widespread popularity of mobile Internet, various new teaching modes such as video public courses and online courses have brought tremendous changes and far-reaching effects to China’s higher education. MOOC is a high-quality online course learning platform in China. It is one of the products of the effectiveness of teaching reform in China. As an emerging teaching method, MOOC not only improves the limitations of traditional teaching models, but also breaks through the constraints of time and space, and achieves the widespread dissemination of high-quality teaching resources to a certain extent. This paper takes the auditing specialty of Fuzhou University of International Studies and Trade as an example, it analyzes the problems related to the teaching reform of financial management courses and proposes corresponding reform ideas from the perspective of MOOC curriculum construction. Keywords: Teaching reform
Financial management Teaching mode
1 Basic Overview of MOOC Teaching Mode 1.1
Features of MOOC Teaching Mode
MOOC is an online open course learning platform that has become very popular in China’s higher education sector in recent years [1]. Its goal is to give every student the opportunity to take the best or most popular video courses in China. The evaluation criteria for whether a course is widely recognized is mainly determined by a group of students. Therefore, such courses may come from top Chinese universities, such as Tsinghua University, Peking University; they may also come from ordinary universities, or even private universities, such as the Fuzhou University of International Studies and Trade. As an emerging teaching mode, MOOC mainly has two significant characteristics. First, MOOC is a comprehensive open platform [2]. Anyone can register and study without time and space restrictions, and most courses are free. A few paid courses can be previewed first. In theory, everyone has the opportunity to receive the best teaching resources in China’s universities [3]. Second, MOOC is both timeeffective and interactive. MOOC courses have a set opening time. Students can take classes, do homework and participate in discussion issues during the study time after registration to maximize the learning effect. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 137–142, 2021. https://doi.org/10.1007/978-3-030-51431-0_21
138
1.2
Z. Wang
Advantages and Disadvantages of MOOC Teaching Mode
From the perspective of teaching reform and innovation, compared with the traditional teaching mode, MOOC has many advantages [4]. First, modular and streamlined production. Conducive to quickly complete the course design, recording and production processes. Second, the time of a single video is appropriate, which simulates traditional teaching time, and can be paused in the middle, which is conducive to improving the learning effect of students. Third, the cost of course construction is generally low, and it is possible to promote course resources with minimal investment [5]. Fourth, the shared nature makes the best courses available to people around the world. Fifth, the interactive design allows students to communicate with teachers and classmates during their studies. In addition, we also have to find some shortcomings of MOOC in practice. First, modularization leads to a single teaching mode that cannot meet students with special needs. Second, there are fewer digital resource libraries, which is not conducive to cooperation and exchange with other resource platforms. Third, there is no essential difference between the teaching organization form and the traditional teaching mode in a certain sense. They are mainly lectured by teachers, which is not conducive to the cultivation of students’ divergent thinking [6]. Fourth, the completion rate and effectiveness of the students are uneven (Table 1). Table 1. Advantages and disadvantages of MOOC teaching mode Advantages Modular, pipelined production Moderate video time Low course construction costs Shared
Disadvantages Single teaching mode Barren resource pool Old technology Low completion rate
2 Teaching Characteristics and Difficulties of Financial Management Course 2.1
Teaching Features
The financial management course is a core course for management majors such as auditing, accounting, financial management, etc. This course has strong theoretical and social practice. Therefore, it has an indispensable position in the training of professional talents [7]. This article takes the auditing major of Fuzhou University of International Studies and Trade as an example. The textbook has selected the concise version of the textbook of financial management published by Renmin University of China Press. The book is characterized by a reasonable structure and a simple explanation. Financial management course content mainly involves the goals of financial management and the realization of corporate value. The core teaching content includes: time value and risk investment return calculation, financial analysis, enterprise investment and fund management, working capital management and enterprise allocation management. The financial management course is mainly set up in the second
Financial Management Teaching Mode Based on MOOC
139
year of the auditing curriculum, with 4 credits for a total of 64 h. The teaching content includes two modules: theoretical teaching and case teaching. This course involves basic accounting, asset evaluation, advanced mathematics and other knowledge. It requires high computing ability, so students are required to learn the basic courses in advance. 2.2
Teaching Difficulties
Financial management courses are often regarded as obstacles by students because of their various formulas and complexity, and the difficulty of the exams. The reason is that it is difficult for students to understand and master the principles and application methods of financial formulas in a short period of time. It often happens that they can understand it at the ear of a class, and they will not do it after class or exam [8]. For example, in financial management courses, time value is the knowledge that students must first master. Students must grasp the difference between simple interest and compound interest, clarify the relationship between final and present values, and grasp the compound interest and annuity coefficients [9]. However, in the course of teaching, due to factors such as curriculum arrangement and teaching inertia, no matter how the teacher explains and does the questions, most students will only recite formulas to complete the learning of time value hastily. Because of its failure to understand and master the principles of time value related concepts, students will forget knowledge after a period of time, and passive learning for a long time will eventually lead students to gradually lose the fun of learning financial management.
3 Teaching Reform Ideas of Financial Management Based on MOOC 3.1
Curriculum Design and Selection of Curriculum Resources
(1) Course design This course is designed for second-year students majoring in auditing. Teachers in class can set up WeChat groups and other social methods to arrange pre-class tasks, communicate difficult points, and arrange homework assignments before the class begins. The normal sequence is: students first watch the MOOC video and learn the relevant chapter knowledge points, then the teacher answers questions during the class, and finally, arranges review tasks after class to consolidate the knowledge points. Compared with the traditional teaching model, students can exchange learning experiences and share learning experiences in social media such as WeChat groups, and teachers can also participate in discussions within the group appropriately, which indirectly enhances the emotional communication between teachers and students. There are many mathematical formulas in the course of financial management. Students learn relevant knowledge points in advance, and find the difficulties and deficiencies in order to play the best teaching effect in the classroom communication. In this process, students’ autonomy can be maximized, which fully demonstrates the advantages of MOOC.
140
Z. Wang
Whether the course design of financial management is appropriate is not only related to the effect of teaching interaction, but also whether the subsequent work can be carried out. Because of the reason, the course design is also a key step in the teaching reform of financial management (Fig. 1).
Fig. 1. The course design flowchart
(2) Course resource selection In order to ensure that the MOOC curriculum resources are basically matched with the student’s textbooks, and the textbooks are unchanged, after multiple screenings, the course resources can use the financial management courses recorded by East China Jiaotong University. The course is divided into 7 teaching modules and 1 final exam module. The details are as follows: Basic Concepts, Basic Values, Financial Analysis, Fundraising, Investment, Operation, Distribution, and Final Exam. The content of the teaching module is consistent with the content of financial management teaching materials published by Renmin University of China. In addition to the final exam, there are quizzes for each unit. In addition, each unit will have corresponding course discussion topics for students to think and communicate. The choice of curriculum resources and the content are not only related to the quality of the teaching effect, but also to the student’s satisfaction with the classroom and teaching mode. Therefore, the selection of curriculum resources is a very important link in the design of financial management courses. 3.2
Innovative Teaching Methods
Because MOOC teaching and traditional teaching mode are quite different, the combination of MOOC mode and traditional offline teaching is a mixed teaching [10]. Therefore, this model not only has the characteristics of the new teaching model, but also has the characteristics of the traditional teaching method. On the other hand, this model places higher demands on the comprehensive ability of teachers. Specifically, it can be summarized as follows: First, teachers need to update traditional teaching concepts, from the past teacher-led unilateral knowledge transfer model to a learning platform for equal communication and discussion between teachers and students. Not only can students harvest knowledge, but teachers can grow together in the process. Secondly, teachers need to make an overall plan before the lesson begins, and prepare the required teaching resources, class PPT, and issues to be discussed in the class one by one. Finally, teachers can make good use of interactive tools to complete the examination and scoring of homework and case analysis in online and offline classrooms. This method is summarized by teachers as mixed teaching. Innovative teaching methods adapt to the development trend of informatization, but it also greatly increases
Financial Management Teaching Mode Based on MOOC
141
the workload of teachers, and at the same time, the amount of learning tasks for students has increased a lot compared with traditional learning. Students must not only do a good job of pre-class review and knowledge digestion, but also do discussions of offline courses. In addition, financial formulas or related theories should be digested and practiced after each unit. These circumstances undoubtedly put forward higher requirements for students’ self-learning ability, information collection, sorting and analysis ability [11]. 3.3
Construction of the Evaluation System of Teaching Effect Based on MOOC
We can divide the evaluation of teaching effectiveness of MOOC-based financial management courses into unit evaluations and final overall evaluations. Unit evaluation refers to the scoring and evaluation of students from the content, clarity, and satisfaction of teaching results after the completion of each unit course. End-of-term overall evaluation refers to the overall satisfaction of the course at the end of the course. The unit evaluation and the overall evaluation at the end of the period are independent of each other, but are closely related. Unit evaluations can reflect students’ mastery of each unit of study. The overall evaluation can reflect the students’ learning level and teaching satisfaction with the overall knowledge of financial management courses. The two evaluation methods are summarized, sorted and feedbacked, and both can be used as important promoters for teachers to improve and perfect curriculum resources and improve teaching quality.
4 Conclusion The era of the mobile Internet has arrived, and the immutable teaching model no longer exists. The emerging teaching platform represented by MOOC has become an important experimental field for teaching reform in colleges and universities. The financial management course is one of the difficult courses in the management major because of its many mathematical formulas and complicated theories. The introduction of the MOOC platform and the reform of the financial management course teaching model will be an important experiment in the teaching reform process.
References 1. Ma, X.: Research on the innovation of MOOC educational model of humanistic quality course in higher vocational colleges. Lit. Educ. 12, 172–174 (2019). (in Chinese) 2. Jin, Z.: Construction and analysis of collaborative learning network under the background of MOOC. Sci. Technol. Innovation 35, 73–74 (2019). (in Chinese) 3. Duan, N.: On the reform of classroom teaching in colleges and universities based on the idea of MOOC. J. High. Educ. 19, 127–129 (2019). (in Chinese) 4. Yang, X., Fan, L.: Comparative study of Chinese and foreign MOOC from perspectives of internet thinking. Guide Sci. Educ. 22, 134–136 (2018). (in Chinese)
142
Z. Wang
5. Mo, Y.: Construction of MOOC resources under project-driven mode. Guide Sci. Educ. 12, 24–25 (2018). (in Chinese) 6. Chen, J.: Analysis on the construction of financial accounting course resources under the background of MOOC. Account. Learn. 24, 217–217+219 (2017). (in Chinese) 7. Li, H.: The innovation of traditional accounting classroom under the impact of MOOC. Finance Account. Int. Commer. 9, 52–59 (2019). (in Chinese) 8. Gu, B.: Research on the teaching model of “financial management course” based on MOOC. J. Liaoning Univ. Technol. (Social Science Edition) 9, 27 (2019). (in Chinese) 9. Tian, Y.: A preliminary study on the reform of the teaching model of financial management under the combination of Mu and lessons. Guangxi Qual. Supervision Guide Periodical 8, 60–61 (2019). (in Chinese) 10. Sun, Q.: Visual analysis of domestic MOOC research hotspots. Softw. Guide 18(12), 211– 214 (2019). (in Chinese) 11. Ma, Y., Wang, P., Xie, S., Hu, X., Gong, L.: Construction of teaching quality evaluation system for mobile information-based flipped classroom. Sci. Educ. Article Collects 12, 53– 54 (2019). (in Chinese)
Supply Chain Financing Strategy in Sports Industry Based on Game Theory Shujuan Li1,2(&) 1
School of Economics and Management, Wuhan Sports University, Wuhan 430079, Hubei, China [email protected] 2 Sports Social Science Research Center, Wuhan Sports University, Wuhan 430079, Hubei, China
Abstract. Supply chain financing strategies of sports industry from the perspective of game theory are quantitative analyzed. Traditional financing game model and supply chain financing game model of small and medium-sized enterprises(SMEs) of sports industry are constructed respectively. The bank lending probability and the default probability of SMEs in sports industry under mixed strategy Nash equilibrium are compared in two cases. Research shows that supply chain financing can effectively improve the bank lending probability, while reducing the moral hazard of SMEs in sports industry. Supply chain financing can not only alleviate the financing difficulties of SMEs in sports industry, but also improve the coordination of supply chain, ensure the strategic expansion of core enterprises and realize the long-term development of sports industry. Keywords: Sports industry strategy Nash equilibrium
Supply chain financing Game theory Mixed
1 Introduction Sports industry has been risen to the national strategy and become the focus of capital pursuit recently. A large amount of capital has poured into the market to compete for sports core event resources, and many enterprises are trying to build sports value chain and ecological circle [1, 2]. At present, China’s sports industry is still in its infancy. In 2015, the total scale of China’s sports industry was 1.7 trillion RMB, with an added value of 549.4 billion RMB, accounting for 0.8% of GDP, which is far below the level of 3% in the United States and the global average of 2.1% in the same period. Most sports industry enterprises in China are small in size. They are an indispensable part of sports industry supply chain and often face crises due to shortage of funds. In order to broaden the multi-financing channels, scholars have proposed a series of financing methods, such as bank loans, equity financing, bond financing, venture capital, franchise project financing etc. [3, 4]. However, in reality, most sports enterprises are difficult to achieve financing through these channels [5, 6]. The main reason is that the majority of sports industry enterprises are SMEs. It’s difficult to make a breakthrough in investigating the financing of sports industry from the perspective of © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 143–149, 2021. https://doi.org/10.1007/978-3-030-51431-0_22
144
S. Li
traditional finance. As a new financing method, supply chain financing has the characteristics of self-repayment commodity financing and is considered to be more suitable for financing needs of SMEs, and is an effective new method to solve financing difficulties of SMEs [7–9]. At present, the research on financing mode of sports industry is mostly qualitative and less quantitative, and the description of supply chain financing is limited. Therefore, this paper studies the supply chain financing strategy of sports industry from the perspective of interest game, establishes the traditional financing model and supply chain financing model of sports SMEs, compares and analyses the bank lending probability and the default probability of sports SMEs under Nash equilibrium of two modes using quantitative method, and finally gives conclusions and relevant suggestions.
2 Model Description and Hypothesis Supply chain financing has been widely used in automobile, retail and Internet industries. Core enterprises provide bank financing guarantee for SMEs in supply chain, or provide loans for them directly, and establish good strategic cooperation with them to achieve mutual benefit and prosperity of the supply chain. Typical cases are General Motors Automotive Finance Co, WAL-MART, Alibaba and so on [10]. In sports industry, Li-Ning sporting goods Co. Ltd., together with Standard Chartered and Hang Seng Bank, strive for financing and credit lines for upstream and downstream enterprises of the supply chain, and turn into practical financing. Based on this, the paper considers two financing modes to make a comparative analysis, traditional financing mode and supply chain financing mode. Under these two financing modes, after receiving the loan application, bank inspects the qualifications and operating conditions of sports SMEs, measures the repayment willingness and repayment ability of them, and also needs to evaluate the strength and transaction authenticity of core enterprises and supply chain in supply chain financing, and finally chooses to lend or not. Sports SMEs have two kinds of actions: keeping promise or breaching contract. The model assumes the following assumptions: Hypothesis 1: Sports SMEs and bank are fully rational decision-makers, and will make decisions to maximize their own interests under given conditions. Hypothesis 2: The bank’s strategy selection set is {lending, not lending}; the sports SMEs’ strategy selection set is {keeping promise, breaking contract}; the bank’s probability of lending is set to qi, and the probability of not lending is set to 1−qi; the sports SMEs’ probability of breaking contract is pi, and the probability of keeping promise is 1−pi, where i = 1, 2, subscript 1 represents the traditional financing mode of sports industry, subscript 2 represents the supply chain financing mode of sports industry. Hypothesis 3: Assume the bank loan amount is L, the loan interest rate is r0, and the return rate of sports SMEs is r. Hypothesis 4: The government gives some preferential treatment Y to those sports SMEs who keep their promise even if the bank doesn’t lend money for a long time.
Supply Chain Financing Strategy in Sports Industry Based on Game Theory
145
This preferential treatment can be shown in obtaining higher bank credit and simplifying the loan procedures, etc.
3 Construction of Traditional Financing Game Model in Sports Industry In traditional financing game model, sports SMEs apply for loans from bank. After comprehensive evaluation of their credit, qualifications and financial status, bank chooses to lend or not. If bank lends money, sports SMEs need to pay a certain deposit to the bank, which is recorded as B1 (B1 < L). The sports SMEs make the decision of keeping their promise or breaking the contract. When they keep their promise, bank will refund the deposit. When they break the contract, bank will confiscate it. If sports SMEs fail to repay bank loans on time, their reputation will be damaged. In this paper, the intangible loss is recorded as S1. The mixed strategy of bank is (q1, 1−q1) and that of sports SMEs is (p1, 1−p1). According to analysis of the game process, the income matrix of sports SMEs and bank under different strategies in traditional financing mode is shown in Table 1. This game model is a problem of two-person-two-strategy model and Nash equilibrium of mixed strategy can be solved by equivalence method. Table 1. Traditional financing game model Sports SMEs Keeping promise 1−p1 Breaking contract p1
3.1
Bank Not lending 1−q1 Lending q1 Lðr r0 Þ; Lr0 Y; 0 L þ Lr B1 S1 ; L Lr0 þ B1 0; 0
Bank Strategy Analysis
There are two strategies for bank: lending or not. When bank adopts lending strategies, the expected utility function of banks is UL ¼ ð1 p1 ÞLr0 þ p1 ðL Lr0 þ B1 Þ. When bank refuses to lend, its expected utility function is UN ¼ 0.Given the mixed strategy of sports SMEs r1 ¼ ðp1 ; 1 p1 Þ, the expected utility of bank lending is equal to that of not lending: p1 ¼
3.2
Lr0 ð0\p1 1Þ 2Lr0 þ L B1
ð1Þ
Strategic Analysis of Small and Medium-Sized Sports Enterprises
Sports SMEs have two strategies of keeping their promises and breaking their contracts. When they keep their promises, the expected utility function is Uk ¼ q1 ðLr Lr0 Þ þ ð1 q1 ÞY. When sports SMEs breaking the contracts, the expected utility function is UB ¼ q1 ðLr þ L B1 S1 Þ.
146
S. Li
Given the mixed strategy of bank r2 ¼ ðq1 ; 1 q1 Þ, the expected utility of keeping promise and breaking contract of sports SMEs is equal, it makes q1 ¼ YS1 þ LrY0 þ LB1 . Because of 0\q1 1,meet the condition of L B1 S1 þ Lr0 0.
4 Construction of Game Model of Supply Chain Financing in Sports Industry Under the mode of supply chain financing, based on real transaction background and multi-year cooperation partnership, the core enterprises of sports industry actively provide credit guarantee for sports SMEs to obtain bank financing. The deposit paid by sports SMEs to core enterprises is set as B2 (B2 B1 ), the deposit paid by sports core enterprises to banks is set as B3 (B3 \L), and the penalty for sports SMEs in breach of contract is S2 (S2 S1 ). It is beneficial both for core enterprises and sports SMEs in supply chain financing. When using supply chain financing and sports SMEs keep their contracts, no matter whether the bank lends or not, sports SMEs can get certain benefits from the good relationship of supply chain, which is recorded as X. In practice, it is a long-term partnership. Core enterprises provide stable and sustained orders or products and services for sports SMEs, and shorten the payment cycle for upstream small and mediumsized suppliers or extend the payment cycle for downstream small and medium-sized distributors, and provide price discounts for sports SMEs. Same with the traditional financing assumption, the government gives some preferential treatment to sports SMEs that have long been trustworthy even if the banks don’t lend money Y(Y X). The income matrix of sports SMEs and bank under different actions in supply chain financing mode is shown in Table 2. Table 2. Supply chain financing game Sports SMEs Keeping promise 1−p2 Breaking contract p2
4.1
Bank Not lending 1−q2 Lending q2 Lðr r0 Þ þ X; Lr0 X þ Y; 0 L þ Lr B2 S2 ; L Lr0 þ B3 0; 0
Bank Strategy Analysis
Same with traditional financing model, bank also faces two different choices: lending or not. The expected utility functions of bank when it lending or not lending are as follows respectively: UL ¼ ð1 p2 ÞLr0 þ p2 ðL Lr0 þ B3 Þ
ð2Þ
UN ¼ 0
ð3Þ
0 so p2 ¼ 2Lr0 Lr þ LB3 , meet the conditon of 0\p2 1.
Supply Chain Financing Strategy in Sports Industry Based on Game Theory
4.2
147
Strategic Analysis of Small and Medium-Sized Sports Enterprises
In supply chain financing mode, sports SMEs have cooperative relations with core enterprises. In order to ensure the normal and stable operation of the supply chain and avoid the disruption of sports industry supply chain caused by capital chain rupture of sports SMEs, core enterprises are willing to take certain risks to provide credit guarantee for sports SMEs. Sports SMEs have two kinds of decision-making, one is to keep their promise and the other is to break the contract. The expected utility functions are as follows: Uk ¼ q2 ðLr Lr0 þ X Þ þ ð1 q2 ÞðX þ Y Þ
ð4Þ
UB ¼ q2 ðLr þ L B2 S2 Þ
ð5Þ
X þY L B2 S2 þ Y þ Lr0
ð6Þ
It concludes that: q2 ¼
Because of 0\q2 1, it meets the condition of L B2 S2 þ Lr0 X 0.
5 Comparative Analysis of Two Game Models 5.1
Comparison of Default Probability
By comparing the default probability of sports SMEs under traditional financing mode and supply chain financing mode, we can get the conclusion that the default probability of sports SMEs under the traditional financing mode is higher than that under the supply chain financing mode. p1 p2 ¼
Lr0 ðB1 B3 Þ 0 ð2Lr0 þ L B1 Þð2Lr0 þ L B3 Þ
ð7Þ
In supply chain financing mode, the deposit B3 paid by sports SMEs to core enterprises is less than the deposit B1 paid by sports SMEs to bank in traditional financing mode, i.e. B3 B1 . Supply chain financing is established on the basis of real transaction. The core enterprises of sports industry have mastered the real transaction situation of sports SMEs, and have carried out strict credit rating for them. Only on this basis can they guarantee for sports SMEs. In traditional financing mode, bank has asymmetric information about the qualifications and credits of sports SMEs, which inevitably requires sports SMEs pay higher despoit to reduce potential risks, so B3 B1 . Therefore, if supply chain financing is adopted, the default rate of sports SMEs will be less than that of traditional financing, and their moral hazard will be greatly reduced. Supply chain is more effective than bank’s restriction on sports SMEs.
148
5.2
S. Li
Comparison of Bank Lending Probability
Assume X ¼ aY. Considering that the sports SMEs keep their promise, the revenue X brought by supply chain to sports SMEs is greater than or equal to the policy preference Y given by the government, so a 1. q1 q2 ¼
Y ½B1 þ S1 B2 S2 aðL B1 S1 þ Lr0 þ Y Þ ðL B1 S1 þ Lr0 þ Y ÞðLr0 þ L B2 S2 þ Y Þ
ð8Þ
It concludes that: ① When B 1 þ S1
L þ B2 þ S2 þ Lr0 þ Y ; q1 q2 ; 2
ð9Þ
② when B1 þ S1
L þ B2 þ S2 þ Lr0 þ Y B1 þ S1 B2 S2 ; and a ; q1 q2 2 L B1 S1 þ Lr0 þ Y ð10Þ
③ when B1 þ S1
L þ B2 þ S2 þ Lr0 þ Y B1 þ S 1 B2 S 2 ; and 1 a ; q1 q2 2 L B1 S1 þ Lr0 þ Y
ð11Þ When certain conditions (① or ②) are met, the probability of bank lending under supply chain financing mode is greater than that under traditional financing mode. When the probability distribution of three cases is equal, the probability of q2 q1 under the supply chain financing mode is 2/3, that is, the probability of bank lending under the supply chain financing mode being greater than or equal to the traditional financing situation is about 66.67%. Although supply chain financing can’t guarantee that the probability of bank lending is greater than that of traditional financing, the possibility of bank lending is greatly increased in supply chain financing.
6 Conclusions Supply chain financing provides a new financing channel for sports SMEs with strong operability. This study shows that compared with the traditional financing mode, the default risk of sports SMEs in supply chain financing mode decreases, and the probability of bank lending increases. Supply chain financing can not only effectively alleviate the financing difficulties of sports SMEs, but also promote the long-term
Supply Chain Financing Strategy in Sports Industry Based on Game Theory
149
strategic synergy between sports SMEs and core enterprises, enhance the overall competitiveness of the supply chain, guarantee the strategic expansion of core enterprises, and realize the value added of enterprises in supply chain. Acknowledgements. This research was financially supported by the Ministry of Education in China(MOE) Project of Humanities and Social Sciences (Project No. 15YJC890015), the Education Department of Hubei Province Project of Humanities and Social Sciences (Project No. 16Q217), and the Wuhan Sports University Foundation for Young Scholars (Project No. 2016QS04).
References 1. Caniato, F., Gelsomino, L., Perego, A., et al.: Does finance solve the supply chain financing problem? Supply Chain. Manag. 21(5), 34–549 (2016) 2. Orbian: Supply chain finance is coming of age. Glob. Financ. 29, 46–47 (2015) 3. Hofmann, E., Johnson, M.: Supply chain finance—some conceptual thoughts reloaded. Int. J. Phys. Distrib. Logist. Manag. 46(4), 1–8 (2016) 4. Wuttkea, D.A., Blome, C., Heese, H.S., et al.: Supply chain finance: optimal introduction and adoption decisions. Int. J. Prod. Econ. 178, 72–81 (2016) 5. Cao, E., Du, L., Ruan, J.: Financing preferences and performance for an emission-dependent supply chain: supplier vs. bank. Int. J. Prod. Econ. 208, 383–399 (2019) 6. Moritz, L.G.: Supply chain finance: applying finance theory to supply chain management to enhance finance in supply chains. Int. J. Logist. Res. Appl. 13, 133–142 (2010) 7. More, D., Basu, P.: Challenges of supply chain finance: a detailed study and a hierarchical model based on the experiences of an Indian firm. Bus. Process. Manag. J. 19, 624–647 (2013) 8. Xu, X., Chen, X., Fu, J., et al.: Supply chain finance: a systematic literature review and bibliometric analysis. Int. J. Prod. Econ. 204, 160–173 (2018) 9. Fritz, M., Canavari, M.: Management of perceived e-business risks in food‐supply networks: e-trust as prerequisite for supply-chain system innovation. Agribus.: Int. J. 24, 355–368 (2008) 10. Gelsomino, L., Mangiaracina, R., Perego, A., et al.: Supply chain finance: a literature review. Int. J. Phys. Distrib. Logist. Manag. 46(4), 348–366 (2016)
Risk Evaluation of Project Bidding Based on TOPSIS Model Wanfeng Liu, Yiqiong Gao(&), Tiecheng Yan, and Lixiang Cao Longdong University, Qingyang 744502, Gansu, China [email protected]
Abstract. Bidding risk refers to the uncertainty in the bidding process, the risk evaluation of the project bidding stage is an important basis for enterprises to make bidding decisions. Based on the analysis of bidding risk of projects, this paper proposes a risk evaluation model for project bidding based on TOPSIS, and uses rough sets theory to determine index weights. The TOPSIS is mainly used in multi-objective decision-making and risk evaluation. The application of this model is beneficial to the risk evaluation and ranking of bidding projects, and provides a more scientific and accurate evaluation method for the bidding decision. The validity of the model is verified by an example. The research results show that Rough-TOPSIS is practical and adaptable to the risk evaluation of bidding for various projects. Keywords: Project bidding
TOPSIS model Rough sets Risk evaluation
1 Introduction There are many problems in the bidding process. Firstly, there is a common phenomenon of information island in the tendering and bidding process. It is difficult for the tender’s needs and objectives to be fairly and effectively transmitted to the bidding units. Secondly, for the calculation of project quantity, both sides of the bidding and tendering have to calculate, which wastes lots of time and affects the speed of bidding and tendering. Moreover, deviations in project quantities and disputes over late visas will increase the risks of both parties. Finally, in the existing tendering and bidding environment, the space that the bidders can play in the construction design is limited. It is difficult to effectively display the construction level of enterprises as well as the objectives, preparation and process of the bidding projects. Through the risk evaluation results of project tendering and bidding, combined with the actual situation, it can effectively guide the high-efficiency and low-cost operation of the project and enhance its application value [1]. Thus, the author intends to pay attention to the risk evaluation of project tendering and bidding from a new perspective, so as to promote this work to achieve the expected results. Many scholars put forward different models and methods for risk evaluation of projects. Bingzhen Geng et al. [2] adopted the asymptotic behavior of tail probability conduct risk analysis on random variables. Some scholars also used analytic hierarchy process (AHP), evidence reasoning method, grey theory, entropy weight method, combination weight method, artificial neural network method to conduct quantitative © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 150–157, 2021. https://doi.org/10.1007/978-3-030-51431-0_23
Risk Evaluation of Project Bidding Based on TOPSIS Model
151
analysis of bidding risk [3]. The above models and methods need to be improved in terms of the objectivity and effectiveness of evaluation, and the amount of data obtained is large. Manindra Rajak, Krishnendu Shaw [4] proposed a new method of occupational risk evaluation. It includes the combination of fuzzy AHP and fuzzy TOPSIS based on the hypothetical risk evaluation formula. Taking aluminum profile industry as an example, it shows the applicability of this method. Lanndon A. Ocampo [5] applied fuzzy TOPSIS to risk evaluation of food industry. Based on the collection of historical data, combined with the multi-attribute decision-making of project bidding, this paper adopts the combination of rough sets theory and TOPSIS method, which uses rough sets theory to determine the objective weight of evaluation index. It combines the determined weight with TOPSIS, establishes the risk evaluation model of project tendering and bidding, and adopts RoughTOPSIS model to overcome the shortcomings of previous models such as strong subjectivity and various constraints. The application of this model is beneficial to the risk evaluation and ranking of bidding projects, and provides a more scientific and accurate evaluation method for the bidding decision.
2 Risk Analysis of Project Tendering and Bidding Bidding risk refers to the uncertainty in the bidding process, as well as the uncertainty of project cost, quality and construction period after winning the bid. There are many risk factors in the project. According to the risk, the risk categories faced by the project during the bidding process are classified as shown in Table 1 [6]. Table 1. Risk analysis table Risk categories Enterprise itself Owner Competitor External environment
Analysis of risk factors Enterprise’s own quality; bidding quality Credit rating of the owner; management system; management experience; economic strength; whether the contract is complete or not Number of competitors; strength of competitors Natural environment of the project site; sound degree of policies and regulations; domestic and foreign market economic environment; political stability
3 Determination of Index Weight and Establishment of Risk Evaluation Model for Project Bidding 3.1
Rough Sets Theory
Rough sets was born in 1982 from the paper of Z. Pawlak [7, 8], rough sets is an effective data mining tool for data reasoning and analysis of some imprecise, incomplete, inconsistent information. This paper will use rough sets theory to determine the risk weight.
152
W. Liu et al.
The relevant definitions of rough sets theory are as follows: Definition 1: A table of information and knowledge consisting of attributes in the universe of behavior is called an information system, represented by I ¼ \U; Z; V; f [ . Among them, U is a nonempty set, and the set inside is called the universe. And, suppose U has n objects, then U ¼ fx1 ; x2 ; ; xn g. Z is the set of attributes, and if Z has m attributes, then Z ¼ fz1 ; z2 ; ; zm g. V is the set of the range of attributes, so then V ¼ fV1 ; V2 ; ; Vm g. F is a function of information system, expressed as f : U Z ! V, and f xi ; Aj 2 Vj . Definition 2: For attribute subset R Z, R is equivalent on U, then A ¼ fU; Rg is called approximate interval. The indistinguishable relationship is defined as: INDðRÞ ¼ fðx; yÞ 2 U Ujr 2 R; f ðx; aÞ ¼ f ðy; aÞg. Thus, the division of R on the Universe U can be made, which is recorded as U=INDðRÞ, then, attributes can be divided and filtered. Definition 3: P and Q are assumed to be equivalent on U, and the P positive S region of Q is recorded as POSP ðQÞ, which can be defined as: POSP ðQÞ ¼ P ðXÞ. If X2U=P
POSP ðQÞ ¼ POSðprÞ ðQÞ, then Q may or may not be in P, and otherwise, r in P is necessary for Q. Definition 4: If the knowledge base is K ¼ ðU; SÞ, S is a set of equivalence relations on U, then R; Q S; When INDðRÞ INDðSÞ, it means that Q depends on R, defined as: kr ¼ kRðQÞ ¼ jPOSP ðQÞj POSpjrj ðQÞ=jU j
ð1Þ
Among them, kRðQÞ 2 ½0; 1, k is the degree of knowledge dependence. After deleting a subset of the condition attribute set Z, we can know the degree of influence on the decision attribute D from definition 4 that the difference between the two dependence degrees, namely the importance degree of the attribute, is used to measure. In the project risk evaluation, its knowledge expression system is a decisionfree system because the specific evaluation results are not known in advance. We can determine the index weight of the power-saving project by the importance of the attribute, then: wr ¼ kr =
n X
kr ðr ¼ 1; 2 ; nÞ
ð2Þ
r¼1
3.2
Rough TOPSIS Risk Evaluation Model
Technique for Order Preference by Similarity to Ideal Solution, referred to as TOPSIS, which is mainly used in multi-objective decision-making and risk evaluation [9]. The process of using Rough-TOPSIS model to evaluate the risk of bidding project is as follows:
Risk Evaluation of Project Bidding Based on TOPSIS Model
153
1) Determine the index system of risk evaluation According to the risk factors that affect the bid winning of the project, the index system of tendering and bidding risk evaluation is determined, with n indexes. The evaluation index set can be expressed as: C ¼ fC1 ; C2 ; ; Cn g. 2) The decision matrix Cj ðxi Þ mn is constructed according to the evaluation index system C, where Cj ðj ¼ 1; 2; nÞ and xi ði ¼ 1; 2; ; mÞ. 3) Normalization of raw data The premise of using TOPSIS to evaluate the tendering and bidding risk of projects is that the changing direction of each index should be consistent [10]. Thus, it is necessary to normalize the raw data so as to achieve the goal of low risk and high return of the project while meeting the benefits and costs. The raw data is normalized to get Zij :, where Zij : is the normalized value of the jth attribute of the ith scheme (i ¼ 1; 2; ; m; j ¼ 1; 2; ; n). qij Zij ¼ sffiffiffiffiffiffiffiffiffiffiffi ; i ¼ 1; 2; ; m; j ¼ 1; 2; ; n m P q2ij
ð3Þ
i¼1
4) Weighted normalized value of engineering project index The objective weight W and its normalized value Zij are weighted to get the weighted normalized value Pij : Pij ¼ wj Zij ; i ¼ 1; 2; ; m; j ¼ 1; 2; ; n
ð4Þ
5) Calculate its positive and negative ideal solutions Pþ ¼ P ¼
Cj ; max Zij jj ¼ 1; 2; ; n ; i
Cj ; min Zij jj ¼ 1; 2; ; n
ð5Þ
i
ð6Þ
6) The distance between positive and negative ideal solutions and evaluation schemes Diþ ¼
n X
wj d Pij ; Pj max ; i ¼ 1; 2; ; m;
ð7Þ
wj d Pij ; Pj min ; i ¼ 1; 2; ; m
ð8Þ
j¼1
D i ¼
n X j¼1
7) Use the following formula to determine the modified closeness ki : of the alternatives
154
W. Liu et al.
ki ¼
D i ði ¼ 1; 2; ; mÞ þ D i
Diþ
ð9Þ
Among them, 0\ ki \1, the closer its value is to 1, the better the scheme is; On the contrary, the closer to 0, the worse the scheme. Then, according to the calculated k value, the risk is ranked in descending order.
4 Case Analysis There are 5 bidding projects available for selection of a construction enterprise. Combined with the enterprise’s own situation and the market situation, a comprehensive analysis is conducted from the project’s technology, economy, environment and other aspects. Rough-TOPSIS model is applied to evaluate the project risk and the project with high economic benefits and low risk is selected as the target. 4.1
Establishing a Risk Index System
Because of the complexity of projects and the particularity of various tendering and bidding environments, there are many risks. Through expert analysis, 6 major risk elements are obtained, which constitute the risk index system for project tendering and bidding, represented as C ¼ fC1 ; C2 ; C3 ; C4 ; C5 ; C6 g. Namely, among them, C1 is the construction cost of the project; C2 is the amount of start-up capital; C3 is the construction technology; C4 is the perfection of the contract; C5 is the degree of competition in the market environment; C6 is the effective construction time of the year. 4.2
Determining Risk Weight
From the historical projects of the enterprise, 10 representative projects with determined risk level are selected. According to the established evaluation index, the corresponding data are collected to establish a discrete simplified table, as shown in Table 2. Through the discrete data in Table 1, according to the indiscernible relationship of rough sets, the decision-making set of project risk and the attribute of index are as follows: U/indðCÞ ¼ ff1g; f2g; f3g; f4g; f5g; f6g; f7g; f8g; f9g; f10gg; U/indðDÞ ¼ ff1; 2; 3; 4g; f5; 6; 7; 8g; f9; 10gg
POSp ðQÞ ¼ f1; 2; 3; 4; 5; 6; 7; 8; 9; 10g
Risk Evaluation of Project Bidding Based on TOPSIS Model
155
Table 2. Table of discrete historical indexes S 1 2 3 4 5 6 7 8 9 10
C1 2 1 2 1 2 1 2 1 3 3
C2 2 1 1 3 2 3 3 2 3 3
C3 2 2 2 2 1 1 1 1 2 1
C4 (6, (6, (6, (6, (6, (6, (6, (6, (3, (3,
7, 7, 7, 7, 7, 7, 7, 7, 4, 4,
8, 8, 8, 8, 8, 8, 8, 8, 6, 6,
9) 9) 9) 9) 9) 9) 9) 9) 7) 7)
C5 (1, (1, (1, (6, (1, (6, (6, (1, (6, (6,
2, 2, 2, 7, 2, 7, 7, 2, 7, 7,
3, 3, 3, 8, 3, 8, 8, 3, 8, 8,
4) 4) 4) 9) 4) 9) 9) 4) 9) 9)
C6 (6, (6, (6, (6, (6, (6, (6, (6, (6, (6,
7, 7, 7, 7, 7, 7, 7, 7, 7, 7,
8, 8, 8, 8, 8, 8, 8, 8, 8, 8,
9) 9) 9) 9) 9) 9) 9) 9) 9) 9)
D 1 1 1 1 2 2 2 2 3 3
According to the formula: Kr ¼
POSp ðQÞ POSpjrj ðQÞ jU j
;
Kr Wr ¼ P n Kr r¼1
To get the weight of each index: w1 ¼ 0:25; w2 ¼ 0:05; w3 ¼ 0:35; w4 ¼ 0:1; w5 ¼ 0:2; w6 ¼ 0:05
4.3
Project Risk Evaluation
After the quantitative weight of the index is determined, the index data are normalized according to its attribute. The index data after normalization is shown in Table 3.
Table 3. Normalized results of risk index data Scheme C1
C2
C3
C4
C5
C6
(0.012, 0.028, 0.075, 0.15)
(0.05, 0.036, 0.039, 0.044)
1
0.009 0.003 0.141 (0.158, 0.195, 0.232, 0.25)
2
0.006 0.327 0.026 (0.141, 0.168, 0.185, 0.212) (0.058, 0.008, 0.004, 0.007) (0.029, 0.037, 0.047, 0.042)
3
0.012 0.007 0.031 (0.044, 0.071, 0.106, 0.133) (0.002, 0.008, 0.015, 0.012) (0.033, 0.039, 0.044, 0.05)
4
0.032 0.091 0.201 (0.052, 0.089, 0.123, 0.14)
5
0.007 0.204 0.131 (0.071, 0.094, 0.142, 0.168) (0.008, 0.007, 0.009, 0.01)
(0.011, 0.013, 0.023, 0.038) (0.006, 0.011, 0.016, 0.022) (0.014, 0.05, 0.036, 0.061)
156
W. Liu et al.
Positive ideal vector: P þ (0.032, 0.091, 0.131, (0.052, 0.089, 0.123, 0.14), (0.071, 0.094, 0.142, 0.168), (0.033, 0.039, 0.044, 0.05)) Negative ideal vector: P (0.007, 0.204, 0.026, (0.044, 0.071, 0.106, 0.133), (0.058, 0.008, 0.004, 0.007), (0.006, 0.011, 0.016, 0.022)) Calculate the distance between the project evaluation scheme and the positive and negative ideal vectors: D þ , D . According to the modified closeness degree k of the scheme, its ideal solution is sorted, as shown in Table 4. Table 4. Distance between evaluation scheme and ideal solution Scheme 1 2 3 4 5
Dþ 0.209 0.072 0.140 0.109 0.183
D 0.033 0.167 0.087 0.177 0.092
k 0.243 0.658 0.478 0.639 0.433
Sorting 5 1 3 2 4
The research results show that the enterprise will select project 2 and 4 from the five alternatives for bidding, which will enable it to achieve the goal of low risk and high return.
5 Conclusion This study takes historical data as the research parameters and adopts rough sets theory to determine the weight of risk evaluation indexes of the project. It builds the risk model for project bidding through TOPSIS. The research results show that the RoughTOPSIS method can overcome the shortcomings of the previous models to a certain degree, and will bring practical guidance to the tendering and bidding work of similar construction enterprises. Acknowledgements. This work was supported by Ministry of Education’s Industry-University Cooperation and Education Project: Reform and Practice of “Teaching Content and Curriculum System of Electronic Bidding Training Course” Based on BIM (201802142020).
References 1. Jie, S.: Training teaching strategy of construction engineering technology based on BIM technology. W. Chin. Qual. Educ. 13, 165–166 (2019) 2. Geng, B., Ji, R., Wang, S.: Tail probability of randomly weighted sums of dependent subexponential random variables with applications to risk theory. J. Math. Anal. Appl. 480 (1), 123389 (2019)
Risk Evaluation of Project Bidding Based on TOPSIS Model
157
3. Yu, J., Hu, M., Wang, P.: Evaluation and reliability analysis of network security risk factors based on D-S evidence theory. J. Intell. Fuzzy Syst. 34(2), 861–869 (2018) 4. Rajak, M., Shaw, K.: Evaluation and selection of mobile health (mHealth) applications using AHP and fuzzy TOPSIS. Technol. Soc. 59, 101186 (2019) 5. Ocampo, L.A: Applying fuzzy AHP–TOPSIS technique in identifying the content strategy of sustainable manufacturing for food production. Environ. Dev. Sustain. 21(5), 2225–2251 (2019) 6. Bauld, S.: Unique risks presented during the bidding process. Daily Commercial News 89 (75) (2016) 7. Ma, L., Lu, H.: Six-set approximation theorem of neighborhood related rough sets. Int. J. Approximate Reasoning 115, 180–193 (2019) 8. Raza, M.S., Qamar, U.: A parallel approach to calculate lower and upper approximations in dominance based rough set theory. Appl. Soft Comput. J. 84, 105699 (2019) 9. Chen, W., Fucai, J., et al.: Pilotage environmental risk evaluation of waterways based on entropy weight TOPSIS model. J. Saf. Environ. 16(3), 33–37 (2016) 10. Ghasemi, K., Hamzenejad, M., Meshkini, A.: An analysis of the spatial distribution pattern of social-cultural services and their equitable physical organization using the TOPSIS technique: the case-study of Tehran, Iran. Sustain. Cities Soc. 51, 101708 (2019)
The Chain Operation Model of Private Kindergartens in Shanxi Based on Optimal Dynamic Programming Zhaojun Pang(&) Xi’an Fanyi University, Xi’an 710105, Shaanxi, China [email protected]
Abstract. With the improvement of people’s living standards and increasingly fierce competition for talents, people pay more and more attention to children’s preschool education, parents’ demand for kindergartens is becoming stronger and stronger, the government’s policy support and encouragement of private education is also greatly improved. The purpose of this paper is to make more and more education and training institutions join the early childhood education industry, bring new knowledge and new ideas to the education industry, and further promote the rapid development of private preschool education. This paper USES porter’s five forces model to analyze the industry environment of kindergarten, such as threats from existing competitors, potential competitors, substitutes and product suppliers, and applies SWOT analysis to the strengths, weaknesses, opportunities and threats of kindergarten. This paper analyzes the operation mode of private chain kindergarten of xi’an A group in shanxi province with examples, and draws the conclusion that the optimal operation mode of dynamic programming is the best choice under different circumstances. And put forward the kindergarten chain operation mode of the implementation of the operation mode of safeguard measures and implementation strategies, such as strengthening the construction of teachers or strengthening the daily management. Keywords: Chain operation Optimal dynamic planning kindergartens Education industry
Private
1 Introduction For a long time, preschool education in China not only insists on popularization, but also encourages the development of the private sector. Only by giving full play to the maximum role of public parks and private parks can we effectively solve the difficulties and high costs in entering kindergartens. In recent years, the development of preschool education has been very rapid, which has many reasons: first, the national investment in preschool education is gradually increasing, but it is still seriously insufficient, and a large amount of private funds are needed to carry out [1, 2]. In recent years, with the rapid development of economy, more and more non-governmental funds, more and more active forces in running schools. Second, people are attaching more and more © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 158–163, 2021. https://doi.org/10.1007/978-3-030-51431-0_24
The Chain Operation Model of Private Kindergartens
159
importance to preschool education, placing high expectations on it and demanding more and more. As a result, there is a growing demand for school choice. This laid the foundation for the further expansion of the private preschool education market. Third, the government has changed its attitude towards private education, which previously emphasized control, but now emphasizes support, which is embodied in the fact that many support the introduction of private education policies and confirm their firm status in the form of legislation [3–5]. However, with the prosperity and development of private kindergartens, many problems have arisen in some educational institutions in order to survive. First of all, educational institutions do not consider the public welfare of education, but only pursue interests and only run schools for the purpose of making profits. Secondly, due to the lack of supervision, the quality of teachers employed by kindergartens is uneven, and daily management is chaotic. In order to control the cost, many private kindergartens do not want to hire excellent teachers, but hired some unqualified talents, this kind of management chaos is bound to bring quality decline. Three, the number of children seriously overnumbered [6, 7]. In order to increase revenue, many private kindergartens are staffed beyond the scope of school buildings, leading not only to a decline in teaching quality, but also to incalculable safety risks. A large number of such problems in private kindergartens indicate that China’s preschool education market is not standardized, let alone healthy [8].
2 Method 2.1
Optimal Dynamic Programming
Optimal dynamic programming has always been the focus of operations research, optimal control, mobile robot and other disciplines and directions. In the field of kindergarten chain operation mode, optimal dynamic programming is one of the core technologies of kindergarten operation induction system, which requires the system to provide the best operation mode and the best profit mode for travelers in real time and accurately. 2.2
Concept of Private Kindergartens
This paper tries to combine the research practice of other scholars to define private kindergartens by referring to other scholars. Pre-2007 generally defined as kindergartens organized and operated by social organizations and individuals other than state institutions, mainly using non-state financial funds, including kindergartens operated by private enterprises, non-governmental organizations, individuals or other social forces [9]. Nowadays, it is widely recognized that private kindergartens refer to preschool education institutions established by social organizations or individuals or state institutions other than state institutions, and legally established by non-state financial funds to provide formal childcare and education for older children for 3–6 months. Some special training classes and nurseries are not included. In this paper, the concept
160
Z. Pang
of private kindergarten is defined as: it is undertaken by social organizations or citizens with legal person status other than state institutions, and mainly USES non-state financial education funds to recruit children to the society in accordance with relevant regulations [10].
3 Experiment 3.1
Subjects
This investigation took the private A group chain kindergarten in xi’an, shanxi province as A case. The general park is located in chang’an district, and the sub-park is located in weiyang district villa district, lintong district, gaoling district. These four parks have complete hardware facilities, high-grade decoration and reasonable layout. The indoor environment is not only safe, healthy, bright, warm and beautiful, but also embodies the characteristics of environmental education: products, flowers, grass, scenery. Each campus has five to eight classes, consisting of the bishop and the assistant and a kindergarten teacher, with a student population of 20 to 30. The bishop has more than three years of experience, the teaching assistant has more than one year, the teacher is required to be a junior college graduate, and the nurse teacher must have a high school degree or above. In addition, the company plans to build three more kindergartens, located in lianhu green community, xinxinjiayuan community and yanta juzhou community. 3.2
Experimental Methods
By taking advantage of the opportunity for all teachers in the villa garden of A group’s chain kindergarten to participate in the intensive training during the holidays, 100 questionnaires were issued, 98 were recovered, and 95 were valid. Through the questionnaire survey, the purpose is to understand teachers’ views on kindergartenbased training. The questionnaire is divided into two parts. The first part is a closed multiple-choice question, which mainly includes: (1) the motivation of teachers to participate in kindergarten-based training. (2) contents of kindergarten-based training. (3) kindergarten-based training. (4) guarantee mechanism of kindergarten-based training. (5) the effect of kindergarten-based training. (6) problems existing in kindergarten-based training according to teachers. The second part is an open question, which is “please talk about some Suggestions for your kindergarten training”.
4 Discuss 4.1
Comparison of Diversified Business Models
Diversification refers to the business strategy or growth behavior of operating multiple industries while operating the main business of an enterprise. Diversification can affect
The Chain Operation Model of Private Kindergartens
161
value at all levels of the company. From the organizational level, diversified operation can not only improve the operational efficiency of the organization, which is mainly caused by the separation of management and control rights, but also lead to more serious agency problems among various departments and levels within the enterprise. From the perspective of resources, diversification can not only improve but also reduce the efficiency of resource utilization due to internal bureaucracy and other reasons. From a cost of capital perspective, diversification not only lowers the cost of capital (mainly because diversification reduces market risk) but also increases the cost of capital, mainly because this business model increases the degree of information asymmetry. Diversification, as an important business strategy, will have a far-reaching impact on the investment and financing decisions of enterprises. Through the implementation of diversification strategy, enterprises can integrate cash flow, thereby reducing internal cash flow volatility, thus greatly reducing financial risk. With the reduction of financial risk, creditors can more accurately predict the future cash flow of enterprises, so they are more willing to provide loans, which greatly improves the debt capacity of enterprises. The disadvantages of diversification are large management workload and high dependence on external environment. Franchise mode, collective mode and diversified mode have advantages and disadvantages. 4.2
Analysis and Discussion
It can be seen from the above survey that the training content of A group chain kindergarten is quite complete, and specific training can be arranged according to the needs of different teachers. Through interviews and data collection, the author listed the above 7 specific training contents and included them in the questionnaire. After statistics, the training frequency was ranked from high to low, and the comparison of the training frequency between “the training content you have attended and the training content you most urgently need” was made. As shown in Fig. 1, the training content that is relatively balanced between the two is “practical problems”. The cumulative frequency of participating in practical problems is 62, and the teacher’s demand for them is 58. There are “professional skills and curriculum reform hot spots” that cannot meet the needs of teachers; There is a big difference between kindergarten and teachers in the recognition of “teachers’ moral education”. Teachers believe that it is not effective, while kindergartens believe that teachers’ high professional ethics must be strengthened regularly. How to make teachers willing to accept “teachers’ moral education” is a problem to be seriously considered in kindergartens.
162
Z. Pang
Fig. 1. A comparison of the contents of kindergarten-based training and the training contents most urgently needed by teachers
5 Conclusion This paper, taking xi’an group, A private chain kindergarten, for example, through the macroscopic and microscopic environment of early childhood education industry analysis, the paper analyzes the current situation of the industry, development prospects and trends, which in its product positioning, at various stages of development and strategic management to provide advice, and provide some effective Suggestions and methods, so as to make the brand stronger position in A competitive market. Acknowledgement. This work was financially supported by Xi’an Fanyi College, Research project of preschool education in Shaanxi Province: Monitoring Research on balanced development of preschool education in Shaanxi Province, item No.: YBKT1814.
References 1. Abd El-Lateef Abou-Hatab, M.F., Megali, R.M.: Teachers as partners in the diagnosis of attention deficit/hyperactivity disorder among kindergarten children. Middle East Curr. Psychiatry 23(4), 175–178 (2016) 2. Anderson, S., Phillips, D.: Is Pre-K classroom quality associated with kindergarten and middle-school academic skills? Dev. Psychol. 53(6), 1063–1078 (2017) 3. Purtle, J., Langellier, B., Lê-Scherban, F.: A case study of the philadelphia sugar-sweetened beverage tax policymaking process: implications for policy development and advocacy. J. Public Health Manage. Pract. (1), 1 (2017) 4. Rosentrater, C., Finlayson, T.L., Peddecord, K.M.: Effects of California Assembly Bill 2109 in low vaccination rate counties: are we looking at the right variables? J. Public Health Manage. Pract. 24(2) (2017)
The Chain Operation Model of Private Kindergartens
163
5. Garwood, J.D., Vernon-Feagans, L.: Classroom management affects literacy development of students with emotional and behavioral disorders. Except. Child. 83(2), 123–142 (2017) 6. Keam, G., Cook, K., Sinclair, S.: A qualitative study of the role of playgroups in building community capacity. Health Promot. J. Australia 29(1), 65–71 (2018) 7. Pope, M.: Preventing weight gain in children who are school age and African-American. Pediatr. Phys. Ther. 28(2), 1 (2016) 8. Crosnoe, R., Ansari, A., Purtell, K.M.: Latin American immigration, maternal education, and approaches to managing children’s schooling in the United States. J. Marriage Fam. 78(1), 60–74 (2016) 9. Wang, D., Mu, C.-X., Liu, D.-R.: Data-driven nonlinear near-optimal regulation based on iterative neural dynamic programming. Acta Automatica Sinica 43(3), 366–375 (2017) 10. Sari, M.R.A.: Optimal blood glucose level control using dynamic programming based on minimal Bergman model. J. Phys. Conf. 974(1), 012036 (2018)
Internal Control of Enterprise Finance Based on SQL Database and Countermeasures Bingxiang Li(&), Rui Tao, and Meng Li Xi’an University of Technology, Xi’an 710048, China [email protected]
Abstract. With the advancement of optimization and merge reform in colleges and universities, the same university often includes multiple campuses. The traditional centralized system of educational administration cannot meet the needs of use. Therefore, it is necessary to construct a university educational system based on distributed database. This paper made full use of the platform’s powerful data management capabilities through the university educational administration system, especially for multi-campus and multi-university colleges. At the same time, the optimization of the distributed database query process and the optimization algorithm of the data distribution scheme in the research process have effectively improved the efficiency and have certain theoretical value. Keywords: SQL database finance Internal control
Colleges and universities Administrative
1 Introduction The educational administration information system in colleges and universities mainly plays an important role in the management of school-related educational information and relies on the basic platform of campus network, and plays an increasing role in the teaching and management application (Jensen CS et al. 2015) [1]. The traditional educational administration information system generally adopts the client server architecture mode or the browser server architecture mode. The centralized management mode is adopted. All the information is stored in a database, and the scale of the college is larger and larger. Many colleges and universities have multiple campuses Today, this model apparently can no longer meet the requirements of improving the efficiency of educational administration (Robb SMC et al. 2015) [2]. The continuous development of information processing technology and network technology has promoted the improvement of work efficiency in various industries (Zhiguang DU. 2015) [3]. As an important part of China’s education and research industry, colleges and universities are developing rapidly in terms of informatization. Almost all colleges and universities have established a campus network system as a basic platform for other informatization application systems (Rodríguez-Muro M. 2015) [4]. Educational management information system is an important part of college information construction (Altman R et al. 2016) [5]. After years of development, the system of teaching administration in colleges and universities has become more mature and there are many © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 164–168, 2021. https://doi.org/10.1007/978-3-030-51431-0_25
Internal Control of Enterprise Finance
165
related products on the market (Libkin L et al. 2016) [6]. However, with the continuous reform of the system of higher education in our country, many originally independent colleges have been merged into comprehensive universities with large scale and complete disciplines. There are many departments, departments and professions under the system, and many campuses are geographically far apart (Papenbrock T et al. 2015) [7]. The current form poses a challenge to the construction and application of the educational system. There are many problems with the traditional educational management information system (Li H et al. 2015) [8].
2 Related Work Database technology has been used for a long time in educational information management. In the seventies of last century, the reticular database and the hierarchical database have been applied in data management. Since the 1980s, the relational database has gradually become an application (Ferretti L et al. 2015) [9]. In theoretical research, distributed databases involve many research areas (Cheng Y et al. 2015) [10]. Because of the need to consider the data distribution, query optimization, data security issues in the process of distributed database construction, different experts and scholars have conducted in-depth research in different fields and also achieved some research results. At present, distributed database technology is still under continuous development. At present, it is in a difficult and crucial stage of tackling problems, mainly in the aspects of query optimization, information security profile and transaction management issues. In fact, the distributed database for transaction management requirements are relatively high, the corresponding cost is higher. At the same time, in the aspect of security, because the location of each node is transparent, the security of information data is hidden. At the same time, the data in distributed database is transmitted between nodes. In case of virus, the spread of the data is very fast. One of the future development directions of distributed database is to combine the related knowledge in artificial intelligence field. The data objects to be processed by distributed database have increased greatly in both quantity and category. Artificial Intelligence (AI) technology can reduce the dimensionality of real data, data mining and other processing functions. By simulating human thinking, Database system processing power.
3 Methodology College Teaching Management Distributed database platform data processing technology model. The data input function is involved in many subsystems of the system. It is the realization process of the basic energy that the educational system normally uses. The main process is that the user inputs the data through the system manually, the file is read and analyzed automatically, and the Chinese database management system network download and other ways to get the data, and save it to the database. For the set, the data will be saved directly to the database table; and for distributed database systems, you also need to consider the data allocation problem. In the above, we
166
B. Li et al.
designed a data distribution algorithm based on clustering and genetic algorithm in distributed database. In this section, we discuss the implementation and application of data allocation algorithm with practical application. Theoretically, the aspects to be considered in calculating the cost after data allocation include the cost of transaction processing and the cost of data storage. However, the cost of data storage is negligible due to the low data storage cost at present, and only the cost of transaction processing is considered. In the above, we studied the problem of communication cost after clustering. In fact, the data operation needs to be considered in data distribution, including the query cost, the cost of local and remote update. The cost of a local query is calculated as the product of the average search cost within the cluster and the average number of searches for that cluster, multiplied by the data size, as shown in Eq. (1) CLRsum Tk ; Di ; Cj ¼ CLR Tk ; Di ; Cj SizeðDi Þ
ð1Þ
For the update operation, there are two types of local update and remote update. For the local update, the update cost is the product of the average update cost and the average update times of the cluster, multiplied by the size of the data, as is shown in formula (2): CLUsum Tk ; Di ; Cj ¼ CLU Tk ; Di ; Cj CountU Tk ; Di ; Cj SizeðDi Þ
ð2Þ
The remote update cost of the data is the sum of the update costs of all the clusters involved in the update. The specific calculation formula is the average local update cost of each cluster, multiplied by the average update times of the cluster, and then multiplied by the update data Fragment size, as shown in Eq. (3): p m X n X X CLUsum Tk ; Di ; Cj ¼ CLU Tk ; Di ; Cj CountU Tk ; Di ; Cj SizeðDi Þ k¼1 i¼1 j¼1
ð3Þ The cost of remote communication occupies a more important proportion of the data access cost, which is equal to the product of the ratio of data update and the number of updates, multiplied by the communication cost between different clusters, and finally multiplied by the data size, (4) below: p m X n X X CRCsum Tk ; Di ; Cj ¼ Urate Tk ; Di ; Cj CRC Tk ; Di ; Cj SizeðDi Þ k¼1 i¼1 j¼1
ð4Þ The final access to the data after the allocation of costs as is shown in Eq. (5) below:
Internal Control of Enterprise Finance
Cos Tk ; Di ; Cj ¼ CLRsum Tk ; Di ; Cj þ CLUsum Tk ; Di ; Cj þ CRUsum Tk ; Di ; Cj þ CRCsum Tk ; Di ; Cj
167
ð5Þ
The research of distributed database data allocation algorithm based on genetic algorithm is to minimize the cost of data processing. That is to say, minimizing (8) to achieve this goal, we first use the above formula for calculating the cost of communication between sites to separate different sites into a cluster. In educational administration information system, the division of clusters is relatively simple, because the geographical differences between different campuses in schools are more obvious, that is, one campus is divided into one cluster or one faculty is divided into one cluster. Then according to the steps of genetic algorithm, we use Eq. (8) as the fitness function.
4 Result Analysis and Discussion During the testing process, different numbers of data records were randomly generated through simulation software. The data were stored in a centralized database management system and a distributed database management system studied by the subject respectively. The results were compared as shown in Table 1 Shown: Table 1. Distributed database data distribution optimization algorithm contrast implementation Record the number of (million) 1 10 20
Centralized database storage asked (seconds) 0.4 8.5 38.0
Distributed database storage asked (seconds) 0.7 3.1 4.8
5 Conclusion Distributed database system used in various industries in the production and life of society, is the basis for data processing applications. In this paper, centralized management system in multi-campus university teaching system applications exist in the data redundancy, query efficiency is low and so on, the use of distributed database technology to build educational system basic data platform for the program, the use of distributed database reliable High sex, high operating efficiency and other features, to solve the multi-campus college database construction issues. In-depth study of the application of the teaching system is in colleges and universities, the use of My SQL database management system to achieve a concrete realization of a distributed database. Needs analysis is made on the function and performance of the system. The functional, logical, and physical deployment models of the school administration MIS are established, and the data architecture scheme of the system is designed. The main function blocks of the system are concretely realized in the development environment
168
B. Li et al.
by using the Java language. The emphasis is on the data through the realization of the main functions and the support functions of the system for the application of the educational system. Acknowledgement. National Natural Science Foundation of China (No. 70872092, No. 7172118); special scientific research fund for doctoral program of Higher Education (No.20136118110008); special fund construction project for key disciplines of universities in Shaanxi Province (No.107-00x902).
References 1. Jensen, C.S., Snodgrass, R.T.: Temporal data management. IEEE Trans. Knowl. Data Eng. 11(1), 36–44 (2015) 2. Robb, S.M.C., Ross, E., Alvarado, A.A.S.: SmedGD: the Schmidtea mediterranea genome database. Genesis 53(8), 535–546 (2015) 3. Zhiguang, D.U.: Agricultural products E-commerce system. Agric. Netw. Inf. 155(1), 123– 132 (2015) 4. Rodríguez-Muro, M., Rezk, M.: Efficient SPARQL-to-SQL with R2RML mappings. Web Semant. Sci. Serv. Agents World Wide Web 33(3), 141–169 (2015) 5. Altman, R., Gray, J., He, Y.H., et al.: A Calabi-Yau database: threefolds constructed from the Kreuzer-Skarkelist. J. High Energy Phys. 2015(2), 1–50 (2015) 6. Skyline, T., Skyline, T.: Skyline operator. Database 68(1), 421–430 (2016) 7. Libkin, L.: SQL’s three-valued logic and certain answers. Acm Trans. Database Syst. 41(1), 94–109 (2016) 8. Papenbrock, T., Kruse, S., Naumann, F.: Divide & conquer-based inclusion dependency discovery. Proc. VLDB Endow. 8(7), 774–785 (2015) 9. Li, H., Chan, C.Y., Maier, D.: Query from examples: an iterative, data-driven approach to query construction. Proc. VLDB Endow. 8(13), 2158–2169 (2015) 10. Ferretti, L., Pierazzi, F., Colajanni, M., et al.: Scalable architecture for multi-user encrypted SQL operations on cloud database services. IEEE Trans. Cloud Comput. 2(4), 448–458 (2015)
Financial Sustainable Growth of SUNING Based on the Network Economy Service Platform Yige Ma(&) Department of Economics, Shanghai University, Shanghai 201800, China [email protected] Abstract. Sustainable growth management has received more and more attention today as China’s rapid economic development takes off. From the point of view of the development of many enterprises, too fast or too slow growth rate will cause companies to fall into a financial dilemma. This requires that the development needs of the enterprise are matched with the balance between capital and resources. This article takes SUNING, a listed company, as a case study to study its financial sustainable growth capability in the past six years. The results show that SUNING has not achieved sustained financial growth. Therefore, this article further analyzes the various factors that affect the financial sustainable growth ability of SUNING, draws conclusions and puts forward recommendations, hoping to provide some valuable methods and countermeasures for other enterprises to achieve financial sustainable growth in the future. Keywords: Retail industry Sustainable development rate Real growth rate Driving factors
Sustainable growth
1 Introduction Nowadays, Fast growth has become the goal orientation that attracts the development of many commercial enterprises. Many managers believe that the faster an enterprise grows, the more its value will increase [1]. From a financial perspective, however, too fast growth may lead to capital chain fracture and bring financial risks, too slow growth may lead to idle capital of enterprises, which requires the development of enterprises to match and coordinate with resources [2]. This paper will combine the data of SUNING, a listed company, to analyze the company’s ability of sustainable financial growth, and discuss the countermeasures and Suggestions for improvement, hoping to provide some reference for the study on sustainable financial growth of other companies in the future.
2 Theoretical Model Financial sustainable growth means the growth rate that can adapt to the growth ratio of shareholders’ equity when increasing liabilities, and ensure that the financial structure of enterprises is not changed and the financial resources of enterprises are not consumed. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 169–174, 2021. https://doi.org/10.1007/978-3-030-51431-0_26
170
Y. Ma
Robert c. Higgins [3], a veteran American financial scientist, was the first to begin a quantitative study of sustainable growth. In 1977, for the first time, he proposed the use of sustainable growth of corporate finance from the perspective of corporate financial management, defined the meaning of sustainable growth rate (SGR), and established a sustainable growth model (SGM). Sustainable growth is the maximum rate at which a company’s sales can grow without depleting its financial resources [4], says Higgins. JamescVan Horne and JohnWatchTowers define sustainable growth as the maximum percentage annual increase in business sales that can be achieved at a given operating, debt and dividend payout ratio [5]. They argue that sustainable growth is the maximum sales growth a business can achieve at these target rates. Based on the static quantitative model, the dynamic model is established for the first time. If the actual sales growth rate is higher than the sustainable growth rate, then the operating, debt and dividend payment ratio may not be sustained, and the enterprise can only increase debt or equity to cope, which may lead to changes in the capital structure of the company, produce negative effects, and even lead to the bankruptcy of the company [6].
3 Research Methodology 3.1
Variable Definition
Since the models of both Higgins and Van Horne are built on the same assumption, their growth rates are very similar. On the basis of reading a large number of literatures and based on past practical experience and research practice, this paper decided to adopt Higgins static sustainable growth model, which is more flexible, simpler and easier to operate, making it more suitable as the theoretical model basis for subsequent data analysis.
Table 1. The variables involved in the Higgins model Variables Net profit margin Total asset turnover Retention ratio Equity Multiplier Real growth rate Sustainable growth rate
Calculate formula Net income/Net revenue Revenue/Average total asset 1 − Dividends/Net income Asset/Equity Net revenue(end)/Net revenue(beg) − 1 Net profit margin Total asset turnover Retention ratio Equity Multiplier
The variables involved in Higgins model and their calculation formulas are shown in Table 1. SGR as a measure of financial sustainable growth ability of enterprises has very important significance. The SGR described in this paper adopts the concept of Higgins model, which refers to the maximum financial growth rate of a company, provided that current operating efficiency and financial policies are maintained. It’s
Financial Sustainable Growth of SUNING Based on the Network
171
actually an equilibrium growth model [7]. When the Higgins model is used to assess the sustainable financial growth ability, the enterprise’s SGR is generally calculated according to a calculation formula in the model, and then the financial sustainable growth ability of the company is judged by comparing the size and difference of the actual growth rate and the SGR of the company. The actual growth rate (ARG) refers to the percentage increase in the company’s sales in the current year relative to the previous year’s sales revenue [8]. 3.2
Sample Selection and Database
In this paper, the following criteria are used to select the case companies: First, based on the industry classification of listed companies in China securities regulatory commission; Second, based on the assumptions of Higgins model; Third, representative in the industry. Accordingly, SUNING was selected as the case company and the period from 2013 to 2018 was taken as the investigation period. The data of the company are derived from the annual financial reports of SUNING in the past six years and financial websites such as sina and yahoo. The required financial ratios are calculated and analyzed by Excel and SPSS. 3.3
Descriptive Analysis
The calculation results of SGR and AGR of SUNING from 2013 to 2018 are shown in Table 2.
Table 2. SGR and AGR for 2013–2018 Year/indicators SGR 2018 15.44% 2017 4.20% 2016 0.09% 2015 1.39% 2014 1.68% 2013 0.01% Mean 3.8% Standard deviation 0.0590
AGR 30.35% 26.48% 9.62% 24.44% 3.45% 7.05% 16.9% 0.1149
What we can see from Table 2 is that the average AGR of SUNING is 16.9%, which is much higher than the average SGR of 3.8%, and the AGR is always higher than the SGR. In 2015 and 2017, AGR show abnormal growth compared with the previous years. Although the AGR after 2015 is similar to the trend of SGR, there are still great differences between the two. Generally speaking, if the AGR of an enterprise deviates from SGR, there are two possibilities [9]. One is that the AGR is lower than the SGR. When evaluating the sustainable financial growth, it is necessary to determine whether it is because of poor profitability and inability to obtain external financing, or because the company does not
172
Y. Ma
invest enough financial resources to choose to seize investment opportunities. Further explained, if sufficient profit growth is not achieved, the enterprise may lose the confidence of creditors, resulting in creditors no longer lend to the enterprise, and it will be more difficult for the enterprise to obtain external financial resources. At this time, the factors involved in the financial crisis may have been quietly lurking in the internal, urgent need for the enterprise to take measures to improve the status quo to change. If the above situation is not the case and the profit continues to increase, it may be because the enterprise has chosen a more prudent mode of operation and failed to make full use of the resources of the company [10]. On the other hand, the AGR has been higher than the SGR. This situation may be due to the fact that the internal resources of the enterprise are not enough to support the rapid growth of the enterprise at the present stage. In the case of increased profits, in addition to external financing, enterprises can also support the growth of excess part through increased profits [11]. However, when the growth is supported mainly by equity or debt financing, the capital is unstable and the cost is high. Such growth is not sustainable and is unreasonable. Financial sustainable growth rate usually reflects the enterprise in established financial strategy, capital structure, dividend distribution way, the inner motive power of enterprise development [12], such as the AGR and SGR is far from the situation is not reasonable, SUNING’s managers should be caused take seriously. We need to use a more scientific and convincing way to further in-depth research analysis and verification and make this goal realize. 3.4
Correlation Analysis
It is necessary to judge the SGR of SUNING from the perspective of statistics and test if there is a significant difference between the actual growth rate and the sustainable growth rate. In the case of small samples, this paper intends to use Student’s t test. This is because the t-test always suitable for the test with a small number of paired samples (n < 30). The sample size of this paper, n = 6 < 30, belongs to a small sample. After testing the data with the k-s test, the results meet the normal distribution and meet the prerequisites for the t-test of paired samples. The statistic results are shown in Table 3 below.
Table 3. K-S test N
AGR SGR 6 6 Mean 0.168983 0.038017 Normal parametera,b Standard deviation 0.1149308 0.0590051 Most extreme difference Absolute 0.244 0.307 Positive 0.237 0.307 Negative −0.244 −0.260 Statistic test 0.244 0.307 significance (double-tailed) 0.200 0.080 a verify that the distribution is normal; b Calculation based on data.
Financial Sustainable Growth of SUNING Based on the Network
173
Table 4. T-test N Correlation Sig. AGR–SGR 5 .693 .127
Table 4 shows the correlation coefficient of the paired sample T test of sustainable growth rate and actual growth rate is 0.693, P = 0.127 > 0.05, indicating that there is no correlation between the two groups of data.
Table 5. Results of significance test between AGR and SGR Paired difference Mean
Real growth rate–sustainable growth rate
Std. deviation
13.10% 8.54%
t
Df Sig.
Mean of standard error
95% confidence interval Lower Upper
3.49%
4.14% 22.06% 3.76 5
0.013
In Table 5 it has been shown that the significance level P is less than 0.05, which means correlation results was insignificant by AGR and SGR of SUNING from 2013 to 2018. SUNING has not achieved sustainable growth.
4 Conclusions and Suggestions 4.1
Conclusions
Through the comparative analysis of the AGR and the SGR, it can be seen that there is a great deviation in the trend of the two. The actual growth rate of the company is much higher than the sustainable growth rate. Facing the impact of emerging e-commerce companies such as JD, Taobao and Amazon, SUNING, as a representative of traditional retail, strives for transformation. Since 2013, it has also started radical reform, replanning its strategic layout and positioning itself as a comprehensive e-commerce enterprise, with a wide range of businesses from electrical appliances to various household articles. After offline to online and then put forward the development of the integration of online collaborative after a long journey, so lay about a speeding and radical change as a result, too quick to invest funds dispersed and into unfamiliar areas to some extent, restricted the development of main business profit fell sharply, reform the dividend is not released in time, failed to achieve sustainable growth. 4.2
Suggestions
SUNING should grasp the pace of strategic transformation and set progressive financial goals. At the beginning of the reform, suning had some radical financial strategies,
174
Y. Ma
which led to a sharp decline in the free cash flow of the enterprise. However, in order to achieve the success of the transformation, it must ensure the stable operation while investing funds. Excessive investment will disperse the resources of the enterprise and reduce the utilization efficiency of capital. SUNING should carefully consider and reasonably plan the proportion of each investment field, maintain a sound operation structure, reduce financial risks and avoid financial crisis caused by excessive investment. In recent years, the accounts receivable and inventory of SUNING increased greatly in the process of reform, which reduced the utilization efficiency of working capital and increased the company’s operating risk. SUNING needs to strengthen the control of these funds to ensure that the company can retain enough sustainable and stable cash flow for daily operations.
References 1. Mukherjee, T., Sen, S.S.: Sustainable growth rate and its determinants: A study on some selected companies in India. Glob. Multidiscip. 10 (2018) 2. Rahim, N.: Sustainable growth rate and firm performance: A case study in Malaysia. Int. J. Manag., Innov. & Entrep. Res. 3(2), 48–60 (2017) 3. Solow, R.M.: Sustainability: An economist’s perspective. In: Economics of the Environment: Selected Readings. Edward Elgar, Cheltenham (2019) 4. Arora, L., Kumar, S., Verma, P.: The Anatomy of sustainable growth rate of Indian manufacturing firms. Glob. Bus. Rev. 19(4), 1050–1071 (2018) 5. Pandit, N., Tejani, R.: Sustainable growth rate of textile and apparel segment of the Indian retail sector. Glob. J. Manag. Bus. Res. 11(6) (2011) 6. Memon, M.Z., Channar, Z.A., Obaid, S.: Dynamic relationship among sustainable growth rate, profitability and liquidity of firms: A case study from pharmaceutical sector in Pakistan. J. Bus. Adm. Manag. Sci. (JOBAMS) 1(2), 113–124 (2017) 7. Phillips, M., Anderson, S., Volker, J.: Understanding small private retail firm growth using the sustainable growth model. J. Financ. Account. 3, 1–11 (2010) 8. Radasanu, A.C.: Cash-flow sustainable growth rate models. J. Public Adm., Financ. Law 7, 62–70 (2015) 9. Chazireni, B., Kader, A.: The Impact of CSR on the sustainable growth of wholesale and retail SMEs: The case of eThekwini Municipal region. Expert. J. Bus. Manag. 7(2), 221–229 (2019) 10. Ćorić, G., Katavic, I., Kopecki, D.: Sustainable growth of SMEs in Croatia through development of entrepreneurial skills. Challenges Of Europe, p. 207, 2011 11. Javalgi, R.R.G., Radulovich, L.P., Pendleton, G., Scherer, R.F.: Sustainable competitive advantage of internet firms: a strategic framework and implications for global marketers. Int. Mark. Rev. 22(6), 658–672 (2005) 12. Constantiou, I., Eaton, B., Tuunainen, V.K.: The evolution of a sharing platform into a sustainable business. 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 1297–1306. IEEE, January 2016
Logistics Transfer Center Planning Based on Internet of Things Technology Hongzhen Zhang(&), Guibin Zhang, and Xiaohua Cai Hao Jing College of Shaanxi University of Science and Technology, Xi’an 712046, China [email protected]
Abstract. In the logistics system, logistics transshipment is the guarantee to meet the service, but it is also one of the main reasons for logistics costs. The information sharing in the modern logistics system makes it possible for the inventory to be shared and quickly flowed between the level logistics nodes, thereby improving the service level and greatly reducing the total cost of system operation. This article uses RFID radio frequency technology related to the Internet of Things and logistics transfer management system for integration and realization. Use modern logistics technology to optimize its transshipment and distribution process, realize transshipment and distribution information sharing, and improve management efficiency. This article first analyzes the application and development status of RFID technology, its advantages and disadvantages and its working principle, and introduces RFID radio frequency technology into the logistics transfer management system. Aiming at some problems in the current logistics transshipment management, this paper determines the system design goals and the software and hardware composition framework by analyzing the requirements of the implementation of RFID-based logistics logistics transshipment systems. At the same time, the in-depth analysis and research of key technologies such as the implementation process of logistics transfer management, RFID tag readers, and middleware are conducted. In order to improve the intelligent management of transshipment materials, the informatization of distribution management and the intelligent efficiency of enterprise management. Keywords: Internet of Things Transfer strategy
Logistics transfer REID technology
1 Introduction The supply chain is a model that connects suppliers, manufacturers, distributors, and retailers to the end users through information flow, logistics, and capital flow, etc. into a whole functional network chain structure [1]. Through effective management, the cost of the supply chain is likely to be reduced to about 35% of the current cost; and inventory is an important part of the supply chain, which refers to all items and resources reserved by an organization. The cost of inventory is in the logistics cost. It accounts for a very high percentage, which is the driving force behind large companies to reduce logistics costs through inventory, and the economic benefits brought by © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 175–182, 2021. https://doi.org/10.1007/978-3-030-51431-0_27
176
H. Zhang et al.
inventory reduction are also very obvious. Therefore, many enterprises want to keep the inventory level as low as possible, or even “zero inventory” in the process of production arrangement and supply chain management [2]. Management concepts such as just-in-time production and lean logistics have also attracted great attention from academic circles and corporate management, and practical applications have also achieved outstanding results [3]. However, as a complex network system, the supply chain system is in an environment where competition and cooperation coexist, and there are a lot of uncertain factors [4]. Supply chain managers have to cope with the needs of customer uncertainty. When encountering large demand fluctuations due to external or internal reasons, how to maintain a certain amount of safety stock and flexible replenishment and transfer strategies are guaranteed services Level, an important condition for reducing system operating costs [5]. Now it has entered the information age, computer technology is widely used in the field of logistics, people have realized the importance of Modern Logistics Transfer Center Planning [6]. With the gradual expansion of the enterprise scale, the increase of product types and the large amount of inventory, the transfer center of many logistics enterprises has not carried out reasonable planning and design, and the space utilization rate is low. In addition, the traditional management methods and means are relatively backward, so it is completely dependent on manual management [7]. For example, in the process of material in and out of warehouse and inventory, data collection and recording mainly adopt manual mode, resulting in low efficiency and high error rate, unable to understand the quantity of products and their distribution in the transfer center in real time, and unable to make statistics of products in real time, and data statistics and audit between transfer centers adopt manual mode, resulting in inaccurate information or false information [8, 9]. The distribution of materials can only be carried out when the stock, state and storage point of materials are accurately mastered. Therefore, the traditional management method can no longer meet the current operation demand, so it is an urgent problem to optimize the storage and distribution operation process and improve the management status [10, 11]. It is necessary to establish an effective information network and computer management information system to manage the transfer of goods, which can realize the sharing of storage and distribution information. It is an important basic management project to continuously improve the intelligence, information, networking and digitalization of the material distribution management of the transfer center, to enhance the competitiveness of enterprises, reduce costs, improve the utilization rate of resources, and promote the rapid development of enterprises [12]. In this paper, the planning system of logistics transfer center based on Internet of things technology is mainly used for the transfer and distribution of materials in logistics enterprises. In the process of material transfer, RFID technology is used to automatically identify and collect material information, which is processed by EPC and ons middleware to generate the warehousing list. The staff can query the material information in real time; in the process of material distribution, various data are used for the required material information The system can record the track, environmental information and location of materials, give out sound and light status indication to the corresponding shelf or storage location of materials, and carry out online monitoring and other related functions in the process of transportation. The system can also set up a
Logistics Transfer Center Planning
177
logistics industry platform in the form of network, which can realize the mutual visit and sharing of logistics enterprises’ transfer, vehicles, personnel and information, greatly improve the management efficiency, and realize the intellectualization, digitalization, networking and informatization of management.
2 Method 2.1
Internet of Things Technology
The technology of Internet of things is simply to realize the Internet of things. At this stage, it is agreed to understand the concept of Internet of things from two aspects. From the technical level, the Internet of things transmits the identified information to the designated information processing center through the intelligent induction identification device installed on the object, so as to realize the interaction between things and people, things and things. From the application level to understand, all objects through a network are linked together to form the Internet of things, while the perfect combination with the Internet, human beings and the physical world for interactive docking, in order to more convenient management of all aspects of life. Among the key technologies in the development of Internet of things, wireless sensor and RFID technology have complementary advantages. RFID technology mainly has advantages in object information recognition, easy to achieve target recognition management, while the key has the advantages of fast read-write speed, strong anti-interference ability and low cost. It focuses on the networking of wireless sensor networks to achieve rapid data transmission, simple installation and deployment, low cost. Powerful combination makes the Internet of things technology has great advantages. RFID and wireless sensor network can be integrated at two different levels. 2.2
RFID System
RFID (radio frequency identification) is a kind of technology that uses non-contact way to identify objects automatically. It uses the antenna to transmit radio frequency signal and electromagnetic information in the space coupling transmission mode to automatically identify the information of space static objects or moving goods. RFID RFID tags contain relevant data information. RFID tags are composed of ID card, IC card and electronic tag. RFID tag is easy to install, and its installation location can be placed in different places according to the needs, mainly for the convenience of reading and writing the data stored in the RFID tag, and completing the identification statistics of the item information. Most of the labels can be pasted on the surface of the object or on the tray, which is easy to be read and written by the reader. The core part of the Internet of things is to realize the automatic identification of goods information, information data upload server sharing and intelligent terminal control by using RFID technology, network technology and big data server. RFID tags store general format information and standard interface information, and transmit the information collected by sensors to the central information management system through wireless network to realize the identification of goods information. Through
178
H. Zhang et al.
the existing network technology, computer application technology, big data to achieve information exchange, information sharing, automatic management of items. The working process of the system includes the following three steps. (1) Firstly, electronic tags are used to identify the attributes of objects. The information stored in tags includes static and dynamic attributes. (2) The reader reads the attributes of the identification items, sends the acquired data information to the RF conversion module, modulates the data format of the information and transmits it to the network. (3) Finally, the receiving end transfers the information data containing the object to the information processing center through the network after transforming the format. In the RFID system of the Internet of things, each item has a unique RFID code corresponding to it. The detailed information and attributes corresponding to RFID code are stored in the electronic tag of the article. Among them, the property of the goods includes the name, category, date of manufacture, place of production, etc. These data information are finally summarized in the database of the Internet of things information management server. After RFID system reads the contents of electronic tags, the RFID information code read is directly sent to the Internet of things middleware; the middleware server transforms the data and transmits it to the data center through the Internet. After the data center receives the query instruction sent by the Internet of things interpretation server, it looks up the data information matching the identification code according to the rules, which is similar to the server parsing function in the Internet Yes, guide the middleware server to the Internet of things information publishing server to read the detailed information of the item; after receiving the query information of the middleware, the information publishing server will send the detailed data information of the item to the middleware, so as to send back the detailed information corresponding to the item.
3 Experiment Step 1: Firstly, it mainly analyzes the current planning situation of domestic and foreign logistics transfer center, improves the existing problems in China’s logistics transfer, puts forward the transformation scheme of logistics transfer center based on Internet of things RFID radio frequency technology, and designs the research content and organization structure of this paper. Then, the application of logistics transfer center is analyzed. According to the requirements of the system, the whole software and hardware scheme is designed. It focuses on the analysis and research of RFID transfer center process application. Step 2: Then it introduces the technology of Internet of things, the technology structure of Internet of things, the technology of perception and identification, and deeply studies RFID technology, and analyzes the system structure, working principle and application characteristics. Finally, the paper summarizes the logistics center and logistics transfer information technology, analyzes its advantages and disadvantages, and provides technical support for the better construction of RFID Logistics Transfer
Logistics Transfer Center Planning
179
Center planning. At the same time, based on RFID technology, the design of logistics transfer center system: firstly, the minimum system of single chip microcomputer is introduced, and the temperature and humidity measuring circuit, display circuit, key alarm circuit in the design are explained. At the same time, RFID system design, EPC middleware, ons middleware. Analyze and design the software flow of the logistics transfer system and the distribution management system. Step 3: Finally, this paper will discuss and compare the impact of three different strategies on the overall average expected total cost of the system: preventive transshipment, emergency full inventory sharing transshipment and control inventory transshipment. At the same time, when there are supply capacity constraints and transshipment strategy, for replenishment decision of periodic observation limited period inventory problem, we will observe whether there is a structure of interval ordering strategy. At the same time This paper studies the structural characteristics of transit decision-making.
4 Discuss 4.1
Analysis of Experimental Results
In the stage of system testing, the transit logistics center uses the key indicators of system realization to evaluate the operation performance of RFID based logistics transit system, that is, the key evaluation indicators and their effects achieved after using the system are shown in Table 1.
Table 1. Comparison of data analysis of RFID warehouse management system
Cargo transfer speed Cargo throughput Error rate Labor costs Transit Center Management Cost
Traditional management system 70T/H 800T/H 5.3% 120 thousand 50 thousand
RFID transfer management system 100T/H 1000T/H 4.5% 50 thousand 30 thousand
Using the same method to test the location label, the results are almost the same. It shows that the location of the label, the temperature and humidity environment and other factors have some influence on the data of the acquisition system. This system can basically identify and read and write pallet labels and location labels accurately, which meets the company’s functional requirements for collecting logistics and transportation information. For the order decision under the control of inventory transfer strategy, the cost of comparing the full inventory sharing strategy is shown in Fig. 1.
180
H. Zhang et al.
400 300 200 100 0 -6
-4
-2
0
Full inventory shared transfer
2
4
6
8
10
Controlling inventory transfers
Fig. 1. Comparison of the total cost of controlling inventory transfer with full inventory sharing and controlling inventory transfer strategies
Compared with the total inventory sharing strategy, the control inventory transfer strategy optimizes the cost target. However, in the first phase, the cost reduction is less, and the two ways of ordering are the same, that is to say, in the single phase or shortterm problems, the effect of the two transfer strategies is similar. In the long run, the control of inventory transfer strategy has little effect on the cost target optimization of two systems with the same cost structure, the same demand distribution and little change. 4.2
Design and Analysis of Logistics Transfer Center Planning System
The purpose of the design of the logistics transfer center system based on the Internet of things technology is to build an intelligent network logistics transfer system. This system can realize the automatic tracking and goods management of the whole process of products from warehousing to transfer, and complete the implementation of automatic data processing and updating, and ensure the accuracy of data. Therefore, to put the whole transfer under the control of the management system, the basic idea of system design is: (1) In the whole transfer operation area, the identification equipment and covered wireless network are laid, so that the logistics transfer operation data can be transmitted in time. (2) When the articles are put into storage, electronic labels shall be pasted on the whole pallet, box or large package articles which are easy to install labels. When operating in the warehouse, the operator can determine whether the operation is correct according to the information on the label, and can also provide convenience for the operator to select the driving route. It should be noted that in the design of goods label, it should be considered that the label can be reused, so that the label can also be reused after the goods are out of the warehouse. (3) Electronic labels shall also be attached to each fixed storage location in transit, which are called storage location labels. The function of this kind of label is
Logistics Transfer Center Planning
181
similar to that of goods label. On the one hand, it is convenient for operators to judge whether the warehouse operation is correct or not, on the other hand, it is convenient to find the corresponding warehouse location when the goods enter the warehouse. (4) Warehouse operation is inseparable from people and forklifts, so corresponding labels should also be set up. For operators, they can be equipped with handheld wireless data terminals, which can receive operation instructions, confirm the operation position, judge whether the operation goods are accurate and return to the actual operation. For forklift, AGV (automatic guided vehicle) can be used as the platform to install RFID reader, control equipment and wireless communication equipment. Every day, AGV car with reader installed can be used to automatically check the warehouse at the set time and transmit the check results to the system management center.
5 Conclusion The work of this paper includes: through the analysis of the current situation of domestic and foreign logistics transfer planning, according to the problems existing in China’s logistics transfer to improve, put forward the logistics transfer center transformation scheme based on the Internet of things RFID radio frequency technology. This paper introduces the technology of Internet of things, the structure of Internet of things, the technology of perception and identification, and deeply studies RFID technology, and analyzes the system structure, working principle and application characteristics. This paper summarizes the logistics center and logistics transfer information technology, analyzes its advantages and disadvantages, and provides technical support for the better construction of RFID logistics transfer planning and management. Overall analysis of the application of logistics transfer planning and management. According to the requirements of the system, the whole software and hardware scheme is designed. It focuses on the analysis and research of RFID logistics transfer process application. Acknowledgements 1) Project Category: Scientific Research Project of Shaanxi Education Department 2) Project Number: 19JK0154 3) Project Name: Planning of Logistics Transfer Center in Xi Xian New Area Free Trade Zone.
References 1. Razzaque, M.A., Milojevic-Jevric, M., Palade, A.: Middleware for Internet of things: a survey. IEEE Internet Things J. 3(1), 70–95 (2017) 2. Palade, A., Cabrera, C., Li, F.: Middleware for internet of things: an evaluation in a smallscale IoT environment. J. Reliab. Intell. Environ. 4, 1–21 (2018) 3. Cartlidge, E.: The Internet of things: from hype to reality. Opt. Photonics News 28(9), 26 (2017)
182
H. Zhang et al.
4. Perkel, J.M.: The Internet of things comes to the lab. Nature 542(7639), 125–126 (2017) 5. Akpakwu, G., Silva, B., Hancke, G.P.: A survey on 5G networks for the Internet of things: communication technologies and challenges. IEEE Access 5(12), 3619–3647 (2017) 6. Arias, O., Wurm, J., Hoang, K.: Privacy and security in Internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2017) 7. Jianbing, N., Zhang K., Lin, X.: Securing Fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. & Tutor. PP(99), 1–1 (2017) 8. Pengfei, H., Ning, H., Qiu, T.: Fog computing-based face identification and resolution scheme in Internet of things. IEEE Trans. Industr. Inf. 13(4), 1910–1920 (2017) 9. Zhang, D., Zhao, S., Yang, L.T.: Nextme: localization using cellular traces in internet of things. IEEE Trans. Industr. Inf. 11(2), 302–312 (2017) 10. Lin, X., Bergman, J., Gunnarsson, F.: Positioning for the Internet of things: a 3GPP perspective. IEEE Commun. Mag. 55(12), 179–185 (2017) 11. Yang, G., Zhang, Q., Liang, Y.-C.: Cooperative Ambient Backscatter communications for Green Internet-of-Things. IEEE Internet Things J. 5(2), 1116–1130 (2018) 12. Gomez, C., Arcia-Moret, A., Crowcroft, J.: TCP in the Internet of things: from ostracism to prominence. IEEE Internet Comput. PP(99), 1–1 2018
Consumers’ Purchasing Intention of Regional Brand on E-commerce Platform Jing Xu(&) and Zhiling Tian School of Economics, Northwest Minzu University, Lanzhou 730000, China [email protected]
Abstract. Taking the development of Liujiaxia regional brand on e-commerce platform as the breakthrough point, this paper studies the factors that may affect consumers’ willingness to purchase regional brands on e-commerce platforms, and relevant countermeasures are put forward for the development of Liujiaxia regional brand. Keywords: Green development concept in the new stage poverty alleviation Research on strategy
E-commerce
1 Introduction On October 18th, 2018, the Department of Commerce of Gansu Province and the Department of Commerce of Yongjing County hosted and released the “Liujiaxia” agricultural product public brand nationwide. This is regarded as the initial stage for the development of Liujiaxia brand. However, domestic and foreign scholars have made some research results on the regional brand and purchase intention respectively, but the literature combining the two is rare [1–5]. In this paper, Liujiaxia was taken as the research example, while the regional brand, the electronic commerce and the purchasing intention were combined with each other, so as to study the influencing factors of regional brands in the e-commerce platforms on the consumers’ purchase intention.
2 Definition of Related Concepts and Theoretical Basis 2.1
Definition of Related Concepts
Regional brand refers to the regional characteristics and the overall image of the region, which is generally expressed as the regional name and industrial name in form, and specifically as the collective trademark and geographical indication. Attitude on brand refers to the consumer’s evaluation of a certain brand. It refers to the different brands of a certain product and their inherent characteristics, and thus a series of related evaluations is formed. These evaluations will affect the consumer’s purchasing behavior or their decision-making. The popularity of the regional brand refers to the measurement over the consumers’ awareness and their understanding of the connotation value of regional brands. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 183–189, 2021. https://doi.org/10.1007/978-3-030-51431-0_28
184
J. Xu and Z. Tian
The origin of a regional brand refers to the place where the company with the brand name is located. It is implied in the origin of a well-known brand, so it is also called “the nationality of the brand”. Whether a regional brand is at a premium depends on consumers’ consumption psychology. For consumers, the more trust they have in the brand, the more willing they are to pay a higher price for that brand. The quality of the regional brand refers to the product quality of a regional brand, which mainly reflects the value of durability, reliability, accuracy and ease of operation of brand products in the region. 2.2
Relevant Theories
Consumer’s specific perception of goods depends on the consumers’ cognition degree. This specific perception of goods will have a critical impact on consumer’s purchasing intention. Purchase intention is a subjective attitude when consumers do shopping, and it is the probability that consumers will purchase specific goods on the premise that their income will not change. Consumers’ purchasing behavior is determined by their purchasing intention, while the forming of such purchasing intention will be influenced by other variables. Consumers’ Purchasing Behavior Theory is usually the behavior of individuals or units to purchase products or services in order to meet the needs of individuals, living or production, which will be affected by various factors [6–10].
3 Empirical Analysis on Consumers’ Purchasing Intention of Regional Brand on E-commerce Platforms 3.1
Descriptive Statistical Analysis
As we could see from the statistical results of the questionnaire, among 254 respondents, 44.9% of them were men, and the rest 55.1% were women; The age of the respondents was mainly between 21 and 35 years old; Among the respondents, 81.1% of them were of Bachelor’s degree, 9.4% of them were of Master’s degree or above, 3.9% of them were of junior college for professional degree, 3.1% of them were of high school degree, and the rest 2.4% were of junior high school degree or below; The proportion of consumers with monthly incomes ranging from 3,000 to 5,000 was 40.9% of all the respondents, the proportion of consumers with monthly incomes for below 3,000 was 37.4% of all the respondents, the proportion of consumers with monthly incomes ranging from 5,000 to 8,000 was 6.3% of all the respondents, the proportion of consumers with monthly incomes ranging from 8,000 to 10,000 was 1.2% of all the respondents, the proportion of consumers with monthly incomes for above 10,000 was 3.1% of all the respondents, while the rest 11% were with no incomes; And with regard to the frequency of the shopping online, the proportion of
Consumers’ Purchasing Intention of Regional Brand
185
people shopping online for at least once a week was 50.8% of all the respondents, the proportion of people shopping online for at least once a month was 40.2% of all the respondents, the proportion of people shopping online for at least once a quarter was 3.1% of all the respondents, the proportion of people shopping online for at least once in half a year was 2.4% of all the respondents, while the rest 3.5% of all the respondents were shopping online for once a year or even less. 3.2
The Influence of the Awareness on the Regional Brand on Consumers’ Purchasing Intention
Consumers’ understanding of regional brands would have different reactions to the marketing of the brands, which will affect consumers’ purchasing intention. SPSS software was adopted to carry out various analyses below, with the process table omitted. The correlation coefficient between the popularity of the regional brand and consumers’ purchasing intention was 0.722, and the concomitant probability value of statistical test was less than 0.001, which had indicated that there was a positive correlation between the popularity of the brand and the consumers’ purchasing intention. F = 273.867, and the concomitant probability value was q < 0.001, which had indicated that there was a linear regression relationship between the popularity of the regional brand and the purchasing intention, while the regression effect was very significant. t = 16.549, and the concomitant probability value was q < 0.001, which had indicated that the regression coefficient test was significant. This also proved that the popularity of the regional brand had a significant influence on the customers’ purchasing intention. 3.3
The Influence of the Origin of Regional Brand on Consumers’ Purchasing Intention
The correlation coefficient between the origin of the regional brand and consumers’ purchasing intention was 0.544, and the concomitant probability value was less than 0.001, which had indicated that there was a positive correlation between the origin of the regional brand and consumers’ purchasing intention. F = 15.921, and the concomitant probability value was q < 0.001, which had indicated that there was linear regression relationship between the origin of the regional brand and consumers’ purchasing intention, while the regression effect was very significant. t = 11.738, and the concomitant probability value was q < 0.001, which had indicated that the regression coefficient test was significant. This also proved that the origin of the regional brand had a significant influence on the customers’ purchasing intention.
186
3.4
J. Xu and Z. Tian
The Influence of Online Shopping Environment of the Regional Brand on Consumers’ Purchasing Intention
The correlation coefficient between the online shopping environment of the regional brand and consumers’ purchasing intention was 0.490, and the concomitant probability value was less than 0.001, which had indicated that there was a positive correlation between the online shopping environment of the regional brand and consumers’ purchasing intention. F = 79.717, and the concomitant probability value was q < 0.001, which had indicated that there was linear regression relationship between the online shopping environment of the regional brand and consumers’ purchasing intention, while the regression effect was very significant. t = 13.520, and the concomitant probability value was q < 0.001, which had indicated that the regression coefficient test was significant. This also proved that the online shopping environment of the regional brand had a significant influence on the customers’ purchasing intention. 3.5
The Influence of the Premium of the Regional Brand on Consumers’ Purchasing Intention
Among all the respondents, 69.3% of them agreed with the premium on the brand, and the range for accepting the premium was concentrated in 10%–20%, in other words, consumers were willing to buy regional brands within a reasonable range of the premium. The following data analysis was conducted based on a reasonable premium. The correlation coefficient between the premium on the regional brand and consumers’ purchasing intention was 0.407, and the concomitant probability value was less than 0.001, which had indicated that there was positive correlation between the premium on the regional brand and consumers’ purchasing intention. F = 37.599, and the concomitant probability value was q < 0.001, which had indicated that there was a linear regression relationship between the premium on the regional brand and consumers’ purchasing intention, while the regression effect was very significant. t = 7.933, the concomitant probability value was q < 0.001, which had indicated that the regression coefficient test was significant. This also proved that the premium on the regional brand had a significant influence on the customers’ purchasing intention. 3.6
The Influence of the Quality of the Regional Brand on Consumers’ Purchasing Intention
The correlation coefficient between the quality of the regional brand and consumers’ purchasing intention was 0.808, and the concomitant probability value was less than 0.001, which had indicated that there was positive correlation between the quality of the regional brand and consumers’ purchasing intention. F = 475.365, and the concomitant probability value was q < 0.001, which had indicated that there was a linear regression relationship between the quality of the
Consumers’ Purchasing Intention of Regional Brand
187
regional brand and consumers’ purchasing intention, while the regression effect was very significant. t = 60.088, and the concomitant probability value was q < 0.001, which had indicated that the regression coefficient test was significant. This also proved that the quality of the regional brand had a significant influence on the customers’ purchasing intention.
4 Countermeasures to Improve Consumers’ Willingness to Buy Regional Brands Products 4.1
Countermeasures for the Popularity of the Regional Brand
Firstly, the brand development of agricultural products should be strengthened. As in the construction of Liujiaxia agricultural product brand, the quality of agricultural products must be guaranteed first, and the improvement of farmers’ quality is also the key to ensure the quality of agricultural products. For governments, training courses shall be set up for farmers, the awareness of brand promotion and brand maintenance of Liujiaxia agricultural products shall be strengthened, and the capital investment in leading agricultural products enterprises shall be increased, so as to make them play a demonstration effect in the promotion of agricultural products brands. Secondly, the integrated marketing strategy should be adopted. For governments, the integrated marketing strategy shall be adopted to keep the brand information of Liujiaxia to be consistent with each other in the long term, so that all the brand information will be continuously deepened in the impression of consumers, and a brand association for consumers will be formed; Also, the integration of brand communication activities, such as advertising, promotion, packaging and after-sales service, shall be carried out, so as to make the brand-related information obtained by consumers through different channels consistent with each other, thus the consumers’ cognition on Liujiaxia brand could be strengthened. 4.2
Countermeasures for the Origin of the Regional Brand
The government should strictly control the safety for the product quality. The government must attach great importance to the quality and safety system of Liujiaxia products. Also, the product quality inspection mechanism shall be strengthened, and the corresponding quality control standards shall be implemented, so as to lay an objective foundation for the construction of a sound image for the origin of Liujiaxia brand. The tourism industry should be vigorously developed. Liujiaxia is rich in tourism resources, but its awareness for creating a famous tourism brand is far from enough. The government shall strengthen its macro-management. The preferential policies for tourism development shall be issued and published and a modern tourism development mechanism shall be established. Moreover, the overall planning, promotion and marketing supervision shall be handled in a organized manner.
188
4.3
J. Xu and Z. Tian
Countermeasures for the Purchasing Environment of the Regional Brand
Relevant laws and regulations should be improved so as to create a sound environment for online shopping. For government, various issues that may hinder the development of Liujiaxin regional brand on e-commerce platforms shall be regulated and restricted. The government and local enterprises should improve their capability in providing their vertical websites and one-stop services.Also, through the live mode, consumers interests on Liujiaxia and Liujiaxia brand products could be arouse with a more comprehensive and more truthful understanding. Thus, the transparency on the products could be improved, and the information asymmetry could be reduced, so that the consumers’ trust on Liujiaxia brand could be arouse and developed. 4.4
Countermeasures for Premium on the Regional Brand
Firstly, the quality of the products in Liujiaxia should be improved. Product quality, as a critical force to deal with all problems, is also the key to improve the premium capability of products. Secondly, the expected value of Liujiaxia products in the psychology of consumers should be enhanced. The development of Liujiaxia brand should be emphasized on the core value of the brand, the inner association and cognition of the consumers could be impressed with the unique core value of the brand, and the expected value of consumers on the brand shall be continuously improved, thus the premium capability of Liujiaxia brand could be enhanced. Thirdly, a reasonable premium scheme shall be formulated. The consumers’ acceptance of premium was centered in a certain degree. According to the results from the investigation, the reasonable premium range of Liujiaxia regional brand is currently between 10% and 20%. 4.5
Countermeasures for Quality of the Regional Brand
Firstly, the product quality supervision system shall be strengthened. The Liujiaxia regional brands are mainly concentrated on agricultural products. Advanced testing instruments, such as pesticide residue rapid tester and gas chromatograph, should be equipped for agricultural product quality testing institutions, so as to strictly control the quality of agricultural products; At the same time, industry and commerce, quality inspection and other departments shall actively carry out market inspections to rectify and regulate the market orders of the agricultural products. Secondly, the management of agricultural production areas should be strengthened. The quality of soil, water and atmospheric environment in agricultural product areas should meet the requirements for agricultural product quality and production safety. Also, the environmental safety monitoring of agricultural production areas should be established and improved, and the monitoring stations should be set up in carrying out the safety monitoring and early warning on the safety of the agricultural products.
Consumers’ Purchasing Intention of Regional Brand
189
Acknowledgments. This research was supported by the open phase of the Key Laboratory for National Information on E-commerce in Universities of Gansu Province (project number: 2018-2).
References 1. Xiuhai, W.: Research on Mechanism of Regional Brand Promoting Regional Economic Development. Lanzhou University, 2 (2007) 2. Zhaopeng, J.: Research on External Factors Affecting Online Consumers’ Purchasing Intention. Zhejiang A&F University, 2–5 (2017) 3. Zhu, G., Ling, Y.: Virtual brand community, word of mouth information and community members conduct: research based on grounded theory. Theory Pract. Finan. Econ. 31(03), 117–120 (2010) 4. Zhang, Q., Zhang, Y., Jia, J.: On the characteristic of the property right of regional band and the government’s Role. China Econ. 08, 52–53 (2003) 5. Xintian, Z.: The Impact of Cybershop Service Quality and Online Shopping Motivation on Customer Satisfaction. Southwest University, 19–41 (2013) 6. Luo, E.: Research on the Influence of Private Brand Marketing Strategy on Consumers’ Willingness to Pay Premium. Southwest University of Finance and Economy, 89–93 (2013) 7. Yin, J.: Research on the Online-Agricultural-Products-Shopping from the Perspective of Consumers’ Shopping Intention. Zhejiang University of Finance and Economics, 15–16 (2016) 8. Qin, X.: Discussion on methods of promoting brand premium. World Labor Secur. (Theor. Edn.) 08, 94 (2013) 9. Cheng, J.: Brand strategy based on electronic commerce. Enterp. Reform Manag. 11, 36–38 (2013) 10. Peng, X.: An empirical study on the influence of brand promotion on consumers’ purchase intention in the context of online shopping. Guangxi University 12, 15 (2017)
Review of Studies on the Public-Private Partnership (PPP) for Urban Infrastructure Projects in China Justin Wouagabe1,3 and Du Juan1,2(&) 1
2
SILC Business School, Shanghai University, Shanghai, China [email protected] Faculty of Engineering and IT, University of Technology Sydney, Sydney, Australia 3 SHU-SUCG Research Centre for Building Industrialization, Shanghai University, Shanghai, China
Abstract. Public Private Partnership (PPP) is an approach adopted to expand the economic value of infrastructure outputs. Many researchers have explored the application of PPP to improve the efficiency of infrastructure delivery. Although interests in reviewing general trends and diverse topics of the PPP literature have increased over the years, there is a lack of a systematic review of the PPP literature from urban infrastructure projects in China. The purpose of this study is to analyze the research status and possible future studies from the viewpoint of urban infrastructure projects in China under public private partnership. The review is conducted by searching related papers from the leading construction management journals, then classifying them into distinct type of urban infrastructure projects applied with PPP in China to facilitate further discussion on significant research topics. The findings show that education and urban development, attracting uneven attention from researchers, meanwhile transportation, water supply finding as the key factor driving the urban infrastructure projects under PPP in China. The outcomes of this study reveal Urban infrastructure under public private partnership still facing some challenges such regional corruption, risk factors and short-term uncertainty, which will be the future research trends. Keywords: Literature review CiteSpace Public Private Partnership (PPPs) China Urban infrastructure
1 Introduction PPP mode has been widely used in the fields of infrastructure and public services, such as transportation, water and sewage, energy, environment protection, public health, and others which cumulated until September 2016, China had witnessed not fewer than 10471 PPP projects. Previous scholars made some review on PPP projects, however there is few or absent paper on urban infrastructure project under PPP in China, therefore this study
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 190–197, 2021. https://doi.org/10.1007/978-3-030-51431-0_29
Review of Studies on the Public-Private Partnership (PPP)
191
aims to analyze the research status of urban infrastructure Project under PPP in China and highlighted the gap for urban infrastructure project under PPP in China. Therefore, the major objective of this paper is to review on urban infrastructure project under the Chinese PPP’s environmental and urban governance industry.
2 Methodology The study is based on lecture review in order to determine the number of publications in each journals, years, and PPP types. Figure 1 divides the research framework into a two-stage process. Literature selection, methodology and literature search of articles relevant to PPP infrastructure projects were conducted in Stage 1, CiteSpace analysis and Conclusions were conducted in Stage 2. The five research steps are as follows:
Fig. 1. Flow of overall research framework
Step 1: Literature research; used an academic database for article search and selection, in order to conduct a comprehensive review on previous researches, an academic databases also used for bibliometric techniques to find the different sources of article search, pre-search is carried out to ensure that the selected academic databases are reasonable and useful for the research. Step 2: The methodology; the acronym ‘PPP’ public private partnership, which is widely and frequently used worldwide, was mentioned in the literature in different forms as per Neto et al. [1]. Step 3: The literature selection; information used in this review of study are; the number of publication per year, publication journal title. Step 4: CiteSpace analysis; in this context some different parameters have been taken in account, such the clustering analysis, and timeline visualization the burst of
192
J. Wouagabe and D. Juan
terms and cocited documents. Keywords analysis; clusters from the CiteSpace considered as the keyword in this study, implemented as foundations for classifying research study and provided their interpretations. Step 5: Conclusions; this section displays and explains the findings.
3 Literature Selection The aim of setting a database was to collect all the papers published related to urban infrastructure projects under PPP in China. The approach preferred for this paper was to follow the experience [2] in adopting the ASCE, Emerald, Tandfonline, and Science direct as database. After the identification of all papers for the urban infrastructure project under PPP project in China, a database was created in order to catalog the paper’s information according the following criteria: date of publication, title, authors, journal of publication, research area, main findings, and research topics list of journal and number of papers see Fig. 2.
Fig. 2. The number of papers in sourcing database
Through the analysis of different papers published for the urban infrastructure projects under PPP in China, the leading areas are engineering and public administration which can be called academic research, with 48 and 12 papers, respectively. This outcome is evidence due to the multidisciplinary nature of Urban infrastructure projects under PPP research, involving typically technical contents (engineering) and public policy concerns, given that they are used to develop and manage public services (public administration), but also includes complex financing mechanisms and business models (business and economics). Based on the literature selected, just as the Fig. 3, the number of publications concerning PPP witnessed an increase from 2009 and 2017. The explosive growth of articles occurred in 2013 and peaked in 2017. The increase in the number of PPP studies is related to the increased application of PPP in urban infrastructure projects research in the recent years in China.
Review of Studies on the Public-Private Partnership (PPP)
193
Fig. 3. Number of relevant papers published yearly in the selected journals from 1988 to 2019
4 CiteSpace Analysis 4.1
Implementation Clustering Analysis
This paper mapped a document cocitation network in CiteSpace see Fig. 4. First, the bibliographic data was retrieved from WOS to CiteSpace. Second, the time span was set as 1996–2019 and the time slice length was 23 years. Third, the thresholds of three levels [citation frequency (c), cocitation frequency (cc), and coefficients (ccv)] were set in three time divisions (preceding, middle, and rear) as (2, 2, and 20); (4, 3, and 20); and (4, 3, 20). Besides, the link retaining factor (LRF) and the look back years (LBY) were left as their defaults LRF = 2, LBY = 8, e = 2.0. The network N = 96, link which is E = 216(density = 0.0474) link hybrid network of cocited references on urban infrastructure projects under PPP in China research was constructed and a total of 8 clusters were obtained automatically by spectrum clustering methods in CiteSpace, see Fig. 5.#0-#7 represent the cluster labeling, the color of a link varies depending of node size = tree ring history and toggle. The consistency of each cluster was measured by the silhouette value, which mean 0.442 represents silhouette. In general, the silhouette values of homogeneous clusters tend to be close to 1. The modularity (Q) considered here its 0.5889, measuring the quality of the overall division. And mean silhouette value (0.442), which indicates a high reliability results. Therefore, this paper studied two aspects of each cluster: (1) representative cluster view of the document cocitation network, and (2) active citing documents of each cluster as the timeline view. To comprehensively generalize the common research contents and emphasize the characteristics of each cluster, the combined labels were further summarized by referring to the automatic-generated cluster labels and reviewing representative cited documents and citing documents. Cluster 0 labeled key driver which it’s the concession period. The determination of the concession period (CP) in public-private partnership (PPP) [3]. Cluster 1, displayed that in China, infrastructure partners include both stateowned enterprises and private companies [4]. Cluster 2, labeled construction PPP project; identified the risks of construction PPP projects in China [5].Cluster 3, labeled risk factor assessment of urban infrastructure under PPP [6]. Cluster 4, labeled dynamic framework transfer model; based on the insight into the practice [7]. Cluster 5, labeled infrastructure project, Chinese urban panel data for the period of 2013–2017 [8].
194
J. Wouagabe and D. Juan
Fig. 4. Cluster view of the document cocitation network. LRF = link retaining factor; and LBY = look back years
Fig. 5. Timeline view
Cluster 6, labeled the public housing; the result shows that great potential [9] and Cluster 7, labeled the short-term uncertainty, the problem is largely caused by the uncertainties exhibited in the existing models [10]. 4.2
Timeline Visualization
To visualize the development paths of 8 clusters and the citation history of representative documents, a timeline visualization was generated in Fig. 5. Timeline view was analyzed between 2001–2018, the articles [5, 6] correspond to numbers 1 and 2, respectively, and both have a high cocitation frequency. In CiteSpace network mapping, each node size is marked by a series of tree ring history, the citation history of a document can be visualized in terms of the ring’s color and thickness, the variation of a tree ring history color corresponds to the years and author’s name when the cocitation occurred.
Review of Studies on the Public-Private Partnership (PPP)
195
The document with a citation burst indicates an increased attention to this topic. As Fig. 5 shows, the article point out some tree ring history with high were written by (Number 1–2) [5, 6] (Number 6) [10] toggle line shape linked them, which indicate that these studies received considerable attention during a specific period of time and can be considered as the popular topics of PPP research. 4.3
Keywords Analysis
Words review analysis are the clusters labeling of the timeline visualization and considered as the key words for urban infrastructure projects under PPP in China, see Fig. 5; (0) concession period; and (1) regional corruption; (2) construction PPP project; (3) risk factor; (4) dynamic framework transfer model; (5) infrastructure project; (6) public housing; (7)short-term uncertainty. These 8 clusters considered as the keywords in this study, grouped as follows, and their interpretations are illustrated in Table 1.
Table 1. Words review studied applied in the keywords for urban infrastructure Projects under PPP papers Key words 0. Concession period 1. Regional corruption 2. Construction PPP project 3. Risk factor 4. Dynamic framework transfer model 5. Infrastructure project
6. Public housing 7. Short-term uncertainty
4.4
Descriptions It the time that allowed, in order to end an argument or to make a situation less difficult financial regulation. It dishonesty and illegal behaviour by people in posi tions of authority or power in area of a country. It building project which involves a partnership be tween government and public private companies. A factor, such as a habit or an environmental condition that increases risk or susceptibility. Is a basic conceptional process of yield control of data. The basic systems and structures that a country or organization needs might carefully planned piece of work to get information about something, to build something, to improve something etc. in order to work properly, for example roads, railways, banks. Is apartments or houses that are rented to poor people, usually at a low cost, by the government. When generated by assets held for undetermined period.
Bursts of Terms and Cocited Documents
CiteSpace identifies the representative terms, such as regional corruption, and others 6 representive terms occurred in the last 23 years, which indicates that construction PPP project, regional corruption might be the current trends of PPP research.
196
4.5
J. Wouagabe and D. Juan
Future Research Trend
This study suggested the optimization of mathematical models on the urban infrastructure projects under PPP in China research, However, the analysis showed that the 60 papers can cover the whole urban infrastructure projects under PPP in China research and effectively reflect the recent research status.
5 Conclusions This paper adopted CiteSpace, studied two aspects of each cluster: (1) representative cluster view of the document cocitation network, and (2) active citing documents of each cluster as the timeline view. The time span of the database was extended to the last 23 years, through the visualization of 6492 records extracted from the WOS core collection database, the timeline view of cocitation clusters provided a distinct view to visualize the development path of each cluster and to identify the citation history of the representative documents. The timeline view analysis in the CiteSpace; regional corruption, construction PPP project and public housing considered as the clusters with high tree ring history and which received highest average citations represent the major intellectual turning points and play a bridging role in the evolution of urban infrastructure projects under PPP in China research. Acknowledgements. This study was supported by the Humanities and Social Sciences Project of Chinese Ministry of Education (Grant number: 17YJC630021) and the National Natural Science Foundation of China (Grant number: 71701121).
References 1. Cui, C., Liu, Y., Hope, A., Wang, J.: Review of studies on the public–private partnerships (PPP) for infrastructure projects. Int. J. Project Manage. (2018). https://doi.org/10.1016/j. ijproman.2018.03.004 2. Marsilio, M., Cappellaro, G., Cuccurullo, C .: The intellectual structure of research into PPPs: a bibliometric analysis. Public Manage. Rev. 13, 763–782 (2011). https://doi.org/10. 1080/14719037.2010.539112 3. Ullah, F., Thaheem, M.J., Sepasgozar, S., Forcada, N.: System dynamics model to determine concession period of PPP infrastructure projects: overarching effects of critical success factors. J. Leg. Aff. Dispute Resolut. Eng. Constr. (2018). https://doi.org/10.1061/(ASCE) LA.1943-4170.0000280 4. Wang, H., Ma, L.: Ownership, corruption, and revenue regimes for infrastructure partnerships: evidence from China. Utilities Policy 60 (2019). https://doi.org/10.1016/j. jup.2019.100942 5. Jiang, X., Lu, K., Liu, Y., Cui, C.: Identifying significant risks and analyzing risk relationship for construction PPP projects in China using integrated FISM-MICMAC approach. Sustainability 11 (2019). https://doi.org/10.3390/su11195206 6. Cui, C., Sun, C., Liu, Y., Jiang, X., Chen, Q.: Determining critical risk factors affecting public-private partnership waste-to-energy incineration projects in China. Energy Sci. Eng. (2019). https://doi.org/10.1002/ese3.577.3
Review of Studies on the Public-Private Partnership (PPP)
197
7. Bao, F., Chen, C., Chan, A., Martek, I., Shrestha, A.: Dynamic framework transfer model for public–private partnerships: lessons from a China water sector case study. Eng. Constr. Architectural Manag. (2018). https://doi.org/10.1108/ECAM-01-2018-0028 8. Wang, L., Zhou, L., Xiong, Y., Yan, D.: Effect of promotion pressure and financial burden on investment in public–private partnership infrastructure projects in China. Asian-Pac. Econ. Lit. 33 (2019). https://doi.org/10.1111/apel.12271 9. Shi, J., Duan, K., Wen, S., Zhang, R.: Investment valuation model of public rental housing PPP project for private sector: a real option perspective. Sustainability 11, 1857 (2019). https://doi.org/10.3390/su11071857 10. Liu, Q., Liao, Z., Guo, Q., Degefu, D.M., Wang, S., Jian, F.: Effects of short-term uncertainties on the revenue estimation of PPP sewage treatment projects. Water (2019). 2073-4441/11/6/1203
Part II: Mobile and Cloud Technologies and Multi-modal Systems
Interaction Mode of “Digital Museum” on the Terminal of Digital Mobile Media Hongjiang Liu(&) Shanghai University of Engineering Science, Shanghai, China [email protected]
Abstract. Digital museum uses digital virtual modeling to present an online museum. The paper studies how to realize museum visit through digital media technology. The interactive technology allows people to use VR to closely appreciate the exhibits, and also enables people to interact with the digital museum. The purpose of the digital museum production is to enable people to experience the historical charm of the exhibits without going to the real museum. In the virtual environment, the audience can interact with the exhibits. It can be obtained from the research on this novel technology that the birth of digital museum in mobile media brings benefits for people’s lives, so that people can visit museums at home to learn about relevant historical information. The significance of researching digital museum is to fully understand the benefits brought about by the rapid development of mobile media in the information age. The impact of mobile media on the society in the new era has changed people’s lifestyles. The creation of digital museums is a kind of transformation from reality to virtual environment. People can interact while watching and enjoying, which promotes people’s deep understanding of historical facts. Keywords: Digital museum media
Virtual reality Interaction design Mobile
1 Mobile Interactive Media and Digital Online Display In the era of rapid development, most countries have basically joined the Internet family. In 1994, China finally obtained permission to the Internet, and soon completed all the Chinese networking work. After some Chinese Internets have been listed and achieved great success, China’s Internet ushered in a perfect start. As is known to all, the development of society is inseparable from the progress of science which drives the special products of the times. The media is the medium for people to recognize social news and other physical objects, and the development of mobile media promotes the development of other industries including the digital museum [1–4]. 1.1
Development and Transmission of Digital Mobile Media
Nowadays, everyone likes to use WeChat and similar social software to communicate and maintain relationships with friends. People used to deliver messages to each other © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 201–207, 2021. https://doi.org/10.1007/978-3-030-51431-0_30
202
H. Liu
with letters and the like that may take many days for the other party to get the information, having low efficiency. With the rapid development of social science and technology, the transmission of the Internet has become increasingly wider. People start to use the network to transmit information to each other, from the initial mailbox to SMS, to QQ, and now to the popular WeChat, all benefiting from the development of mobile media, and people’s social habits have changed in essence. With the development of the Internet, digital information all over the country are massively shared and spread. Chinese Internet has now become the world’s largest network, with the largest number of Internet users in the world and a wide networking area. The rapid development of the network has also promoted the arrival of the digital mobile information age. People can not only access information online through computers, but also can use smart phones to access the Internet and browse the web and news anytime and anywhere. 1.2
Characteristics of Social Media and Social Relations
The main feature of digital mobile media is transmission. The advent of the information age has given everyone the right to express their opinions on the Internet, resulting in that the digital media transmitters are diversified, information are transmitted every second, content of the transmission are massive, and people can get these messages in many ways, so that the channels of transmission will become interactive. The transmission and acceptance of information has made the rhythm of this digital age more rapid, and people’s acceptance degree of new things will gradually become higher. Gradually, these forms of transmission have become personalized, and people can browse through things they are interested in by various forms, such as using a smartphone to listen to their favorite songs, watching their favorite shows and so on. A lot of things can be done with a single smartphone. It is because of the rapid development of the Internet in China that China’s digital media industry has also risen rapidly. Digital mobile media is all-inclusive, involving various walks of life. It has had a huge impact on the people born in 80 s and 90 s, prompting us to further contact with digital mobile media, to gradually make it the mainstream of the media [5–7]. The generation and development of digital mobile media have a growing influence on this society. The information age mentioned above enables people to do a lot of things on the Internet, which can be called the so-called mobile social contact. On the basis of the Internet, people use the mobile network to conduct social activities, such as information acquisition, games and entertainment, interpersonal relationship maintenance, work and learning. The maintenance of this society is now inseparable from the convenience brought by mobile media. Through the real-time transmission and spread of the media, people can get to know numerous news and interesting things happening in the society. The social order can also be maintained through the mobile media. When something that is not very good and has a social impact happens, people would pay attention to and criticize it through Internet-based mobile media, which is conducive for people to discipline themselves and abide by the law of this society, thus achieving a peaceful and harmonious society.
Interaction Mode of “Digital Museum” on the Terminal of Digital Mobile Media
203
Mobile social contact in the Internet age is one of its characteristics. Because of the vigorous development of mobility, the pace of this society is gradually accelerating. Through the generation and rapid development of this series of physical objects, people’s society has begun to move toward digitalization, and mobile media have been integrated into the life of the public as well as people’s social activities. Many social contact and entertainment projects are closely related to the rapid development of mobile media. Relying on the vast number of TV program audience, CCTV uses some new mobile media technologies, such as QR code, to enable the audience in front of the TV to interact and communicate with the programs. The audience interacts with the CCTV channel through the network and participates in its communication activities by sweeping the code. This way breaks through the one-way communication mode of traditional TV programs, greatly improving the effect of audience interacting with programs [8–10]. 1.3
Development of Virtual Reality Technology
The term, virtual reality, is not so strange to the public. It is a new technology that can be used to create a virtual world, and is a computer simulation system that allows users to experience virtual fantasy worlds. A computer is applied to generate a fictional simulation environment, and in addition to generating the image and visual perception, it also involves the sense of hearing, touch and some motion perceptions related to gravity. People feel the virtual environment through observing with eyes and raising head, and the action of the hand is input into the computer through the sensor, to touch the object in the virtual world. All these actions are processed by the computer, thereby giving sensory feedback to the user. 1.3.1 Application of Virtual Reality Technology As a product integrating modern science and technology, virtual reality has many advantages in various aspects, including medical field, entertainment projects, interior design, cultural relics, game development and so on. Virtual Reality (VR) is generated through complex and accurate calculations in the computer by comprehensively using the computer’s graphic system and different interface devices such as reality and control. It is a three-dimensional environment that can interact with people, and it provides owners with a new technology with immersive feeling. The design field of interaction design includes defining and designing artificial system, allowing two individuals or multiple individuals to communicate with each other. It is a two-way interaction mode enabling the two parties to work together to achieve the desired purpose of the designer. 1.4
Generation of Digital Museums Under Informatization
The advent of the digital information age has driven various industries in the society. People’s demands for leisure and entertainment have also increased, including the visit
204
H. Liu
to museum. After visiting various museums in reality, people may be not so interested in it, so digital museums emerge as the times require. Digital museums have been produced and known to the public with the development of mobile media. It contains a lot of technical aspects, starting with basic computer network technology, and then using 3D image technology and stereo display to restore physical objects. The restoration is inseparable from the relatively new virtual display technology, and to really display in front of people requires interaction technology and various other special effects. The real museum that people usually see is displayed in a three-dimensional form, and then it is transmitted to the Internet for people to visit, so that they can visit the museum they want to go without long-distance travel. Digital museum uses a variety of high-end technologies, such as 3D imaging, network, virtual reality and interactive links. The real museum is copied into the virtual network world in a three-dimensional way, becoming a virtual museum. The development of digital museums requires the model construction of the museum’s environment, which is called 3D modeling. It digitizes the real resources of the real museum, conducts integration, processing and production, and creates a realistic and vivid display environment with a series of multimedia technologies, and historical knowledge and rich materials are added [11, 12]. The emergence of digital museums allows audience to break through the constraints of time and space, and users can watch and experience the exhibits anytime, anywhere; it can vividly restore the colorful resources of museum; it is able to carry out longdistance teaching, appreciation and interaction, owing to the benefits brought by the rapid development of mobile media.
2 Digital Online Museum The traditional museum is moved into the virtual network from reality. Through the vast amount of data, the real exhibits have been digitized into virtual exhibits in the virtual museum, so that the digital museum still has the functions of the physical museum. Thus, the museum is advanced to a new era, the exhibits are shown in digital form, and this digital museum can also interact with the viewers, rising to the digital new era of mobile media. Besides, the public has a great interest in this new visiting mode which would be gradually popularized. The digital museum has a unique sense of novelty and technology. Now there are some famous digital virtual museums in the world, such as the Digital Palace Museum in China and the Digital British Museum in cooperation with Google. 2.1
Development of Digital Museum in China
In China, as the development of society has not yet reached the level of western developed countries, the construction of digital museum started late. It did not begin until the early 1990s, but gradually entered a stage of rapid development. With the rapid construction and development of Chinese society, the achievements in terms of digital museum are magnificent.
Interaction Mode of “Digital Museum” on the Terminal of Digital Mobile Media
205
Starting from the simple digitalization of museums, after entering the network and becoming digital, the digital museum began to take shape, and then college digital museum construction project and Chinese digital museum project started, gradually accelerating the pace of development. Many similar digital museums have begun to emerge, such as Beijing Digital Museum of Chinese Medicine, Beijing Digital Museum Platform, Chinese Digital Science Museum, and Digital Museum of Xi’an University of Architecture and Technology. These digital museums and science museums have broken through the constraints of both time and space and provided a wealth of information and resources to the public in a different and unusual way. It has gradually evolved into a new stage for the display of Chinese history and culture, also reflects the flourishing development of this field in China, and will continue to make in-depth progress in the future. 2.1.1 Digital Palace Museum Shi Danqing, a teacher at the Academy of Arts and Design, Tsinghua University and the chief designer of the Digital Museum of the Palace Museum, along with many other members have developed five programs, applied many new technologies and finally designed the “Duanmen Digital Museum” of the Palace Museum after four years of unremitting efforts. As a very successful example of the Digital Museum of China, the Digital Palace Museum brings an unprecedented experience to people. It combines digital media with ancient architecture, vividly depicting the historical changes, past and present life of the Forbidden City. The audience watches the fine projections of the Forbidden City in the central theme experience zone, to learn about different historical periods. The digital imaging and several interactive technologies are used in the collection area of the Palace Museum where viewers can interact with digital paintings. This twoway viewing interaction is more vivid than ordinary physical museums, making the audience have a different feeling toward ancient famous paintings, as if they were the authors of these paintings. It also includes the application of virtual reality technology. In the area of Tianzi Palace, the audience can enter the virtual reality theater, to feel the realistic experience brought by virtual reality technology and carefully watch the spectacular sight of the Forbidden City. Digital imaging and interactive technology make the visit of the Digital Palace Museum very interesting, and the audience and the paintings can interact intimately; and the virtual reality technology makes the audience’s personal experience more real, just like visiting the scene. The Duanmen digital museum of the Palace Museum integrates the achievements of various advanced technologies. The beauty of the Palace Museum is presented to people in digital form. The viewers can not only gain knowledge, but also have a deeper understanding of historical information for various interactions and virtual reality technologies, which is an important manifestation of the rapid development of China’s digital museum.
206
2.2
H. Liu
Google’s Virtual Museum Project
Google’s virtual museum is to use a variety of new science and technologies to present museums and art galleries in different parts of the world, including classic exhibits and artifacts. This program allows people to visit famous museums all over the world through computers at home, such as exhibits in the British Museum, or to watch and browse some ancient grottoes or relics. High-end technologies are applied to interpret world’s cultural classics and heritage, and to restore the real street scene and environment, and the digital museum combing with corresponding sound is finally presented to the viewers. Designers have designed new solutions and technologies in the Google Cultural Institute. With virtual reality, users can watch a 360° performance. Google’s virtual museum allows museums around the world to be viewed in front of a computer in a virtual form, and enables the audience has a feeling in real museum.
3 Conclusion With the rapid development of the times, people’s ability to accept and experience new things is becoming stronger. Mobile media is the mainstream of modern society, and the birth of new technologies and its integration into people’s lives is the trend of the times. Unlike traditional media, the characteristics of mobile media are clear, such as advantageous portability and mobility, and it can be conducted through mobile phones and other mobile storage devices. Although the development of digital age in China started late, its digital development is equal to the level of some developed countries, and has been integrated into everyday life of people. In the context of people’s lives being closely related to mobile media, new ways of entertainment have also emerged. Through the mutual dissemination of mobile media, people have realized many new technologies, and virtual reality is a good example. This novel immersive technique makes people feel as if they are in the real world. VR art emerges as the times of virtual reality require, and human-computer interaction is realized through VR. In the virtual environment, users interact with objects in the virtual environment through simple gestures and other operational means. The digital museum is also generated in this era of digital informationization. Compared with the traditional physical museum, it integrates various science and technologies, inherits the design concept and purposes of the physical museum and displays physical exhibits in a virtual space through scanning, integrating and processing them, which breaks through the limitations of time and space. When people are at home or other places, they can visit and browse the digital museum through the network and VR devices anytime, and they also can conduct interactive learning, thus enriching the content and activities of museum visits. And the digital museum can also satisfy people’s desire to see the world-famous museums without leaving home, giving people who don’t have time to visit various museums a chance to watch, which is undoubtedly time-saving and convenient. The birth of the digital museum is inseparable from the rapid development of mobile media. In the virtual space, people can understand history, and interact with
Interaction Mode of “Digital Museum” on the Terminal of Digital Mobile Media
207
history, and the diversity of interactions breaks through the unidirectional output of the original media, thus realizing two-way interaction between the two parties, which is the advantage that digital museums bring.
References 1. Weizhen, L., Rui, H.: Analysis on the impact of mobile media environment on social time. J. Int. Commun. 3, 84–89 (2010) 2. Dongyan, C.: Research on the social value of mobile media. Mod. Commun. 9, 163–164 (2010) 3. Guoliang, C., Yin, T., Jiang, H.: Application research of digital museum. Comput. Appl. and Softw. 21(5), 50–52 (2004) 4. Qingyi, T., Xiaoqin, Z.: Mobile Phone: Personal Mobile Multimedia. Tsinghua University Press, Beijing (2009) 5. Gang, C.: Creative Communication Management: Marketing Revolution in the Digital Age. China Machine Press, Beijing (2012) 6. Parisi, T.: Learning Virtual Reality: Immersive Experience and Application Development Guide for Desktop, Network and Mobile Devices. Science Press, China (2019) 7. Zheng, X.: Research on Digital Museum. Zhejiang University Press, Hangzhou (2016) 8. Wu, L.: Application of Network Digital Media Technology in Biodiversity Digital Museum. National Defense Industry Press (2013) 9. Decker, J., Yu, Z.: Translation. Technology and Digital Creation. Shanghai Science and Technology Education Press, Shanghai (2016) 10. Beijing Union University.: Digital Museum in the Internet Age. Electronic Industry Press, Beijing (2018) 11. Wing, S.T.: Interactive Thinking. Electronic Industry Press, Beijing (2019) 12. Talbot, K., Wu, J.: Translation. Mobile Revolution. Mechanical Industry Press, China (2017)
English Teaching at College in Virtual Environment Based on Visualization Platform Lijun Deng1(&) and Tao Wang2 1
Aviation Management Department, Xi’an Aeronautical Polytechnic Institute, Xi’an 710089, China [email protected] 2 Internet Information Center, Xi’an Aeronautical University, Xi’an 710067, China
Abstract. An important task of the new round of teaching reform is to change the relatively single teaching mode, make full use of modern information technology, especially network technology, to build a new model of college English teaching based on classroom and computer. This research, from the perspective of metrology, takes the key words of the paper as the research object, and explores the relevant research status of the new round of college English teaching reform in China through visual means, and provides reference for the deepening of college English teaching reform and the formulation of English disciplinary development planning policy. This paper mainly focuses on the visualization of college English teaching research under the network environment. All in all, the development of college English classroom teaching in a network environment not only enriches the content of classroom teaching, but also truly realizes the student teaching structure. It can also continuously enhance students’ enthusiasm for learning and promote the substantial improvement of teaching quality. Out of the role and value of teachers in teaching, but also to promote students to achieve long-term development in the future. Keywords: Visualization platform English Teaching research
Virtual environment University
1 Introduction During college teaching reform, the student-oriented slogan is more and more loud. In the process of college English teaching, the student approach requires all teaching activities to be carried out based on the actual needs of the students, to meet the students, and thus to enhance the students’ ability in all aspects. Therefore, during English teaching at college, we should improve the English basic ability, English application ability and English innovation ability of college students as the teaching purpose. In theory, formative evaluation pays more attention to process than final evaluation, so that it can be evaluated more comprehensively, scientifically, and more comprehensively. One of the reasons is that the formative evaluation subverts the score of a standard test paper in the final evaluation, which determines the evaluation mode © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 208–216, 2021. https://doi.org/10.1007/978-3-030-51431-0_31
English Teasching at College in Virtual Environment
209
of the student’s ability. Instead, it pays more attention to the student’s learning process, considering the learning motivation, learning input, learning method and learning mode, application capabilities and many other aspects. In addition, formative evaluation can also enhance students’ accumulation of English knowledge, thereby improving students’ English application ability and avoiding the excessive influence of intelligence factors in evaluation [1, 2]. The search was conducted under the keyword “network + college English + teaching”. From the CNKI, database and VIP database, 4021 articles, 2106 articles and 2029 articles were obtained. In view of the current non-standard phenomenon in the use of keywords in Chinese academic papers, before using the literature for statistical analysis, it is necessary to first standardize the keywords, including eliminating texts without analysis meaning, merging duplicate texts, filling or deleting features. Missing items, correcting text with obvious errors, etc. For example, the reform of teaching reform, teaching reform, network environment, WEB, internet will be unified into modern information technology; network-assisted college English teaching, multimedia and network-assisted teaching, multimedia-assisted foreign language teaching unified as network-assisted teaching. After processing, 4675 effective papers, 17043 keywords and 3205 unique keywords were finally obtained [3].
2 Methodology The term “visualization” is derived from the English word “Visualization”. It appeared in technical terms in February 1987. Card et al. believe that visualization is the use of computer-supported interactive visual representations to represent abstract data to enhance cognition. Knowledge Visualization is the application representation to promote the dissemination and innovation of group knowledge. The concept map is a graphic method that uses nodes to represent concepts and connect lines to represent conceptual relationships. It was first studied by Professor Joseph D. Novak of Cornell University in the 1960s when studying children’s understanding of subject knowledge. Proposed and applied to teaching, making it a teaching tool. Conceptual-based visualization is the use of visual interaction features of conceptual maps to transform abstract English reading instruction into concrete, visual knowledge modules that enhance students’ advanced thinking skills in English learning [4, 5]. The usual English reading before class is a preparation stage for the teacher. The key to the teacher is to study the teaching outline carefully, to thoroughly understand the teaching materials, and to arrange the teaching content for the students. For the students, it is a preview of the new text. The key to students’ learning is to understand the content of the new lesson to be learned, to know the new lesson, to know the difficulties and to distinguish the content that they understand and do not understand. In this way, the teacher-student interaction before class is mainly based on the used teaching. The experience of learning is an inefficient, untargeted interaction. In the interactive English subject reading teaching mode supported by the concept map, the effective use of the visual function of the concept map and the teaching task before class can promote effective and personalized teaching interaction between teachers and students. Before the class, the teacher organizes students to adopt the cooperative
210
L. Deng and T. Wang Table 1. Questionnaire results
Problem I like web-based autonomous learning mode Self-directed learning has improved my interest in English learning Self-directed learning has enhanced my confidence in learning English well Self-directed learning has cultivated my ability to analyse and solve problems Self-directed learning can improve the efficiency of English learning I would like to spend more time and energy studying English in the future
Fully endorses 60%
Endorsed
Uncertain
Oppose
25%
5%
6%
Totally opposed 4%
69%
20%
2%
5%
4%
52%
26%
7%
10%
5%
45%
20%
10%
13%
12%
53%
28%
9%
4%
6%
43%
32%
12%
9%
4%
learning mode of assigning roles to draw the concept map of the student theme. In the small class teaching, three students volunteered to form a study group and were positioned as the members of the reporter, organizer, and drafter. In this process, the students determine the reading theme according to the reading text, draw the student theme concept map using the concept map software and the Internet, and submit the student theme concept map to the teacher one week before the class. This collaborative learning process encourages students to discuss the text. The discussion process is not limited to words, but also extends to the concept, logic and understanding of the topic of the article. It also encourages students to exert subjective initiative and stimulate participation. Hunting and applying relevant cultural knowledge to create a learning environment for the subsequent development of English culture. The teacher’s feedback on the topic concept map drawn by the 10 student groups can comprehensively judge the level of understanding and difficulty of the chapter analysis of the text, and ensure that the instructional design is suitable for the actual level and needs of the class. The interactive design of the pre-class theme concept map enables the teacher to guide students to conduct purposeful cooperative learning in a visual way. At the same time, the teacher has a better understanding of the student’s situation, such as the student’s The basics of learning, the understanding of the content of the text, and the ability to accept textual logic provide more detailed and clear information for teachers to implement teaching diagnosis [6].
English Teasching at College in Virtual Environment
211
3 Results and Discussion 3.1
The Virtuality of the Teaching Platform
First of all, we must realize that the use of network technology has improved the quality and effect of teaching. Therefore, it is necessary to pay sufficient attention to network technology in teaching, and continuously apply network technology to college English classroom. In teaching, the capacity of English classroom teaching knowledge is expanded (see Table 1), the environment of teaching become better, the information density of teaching content is improved, and the students’ English level is improved from four aspects: listening, speaking, reading and writing [7]. xi ðt þ 1Þ ¼
n X
aij ðtÞðxj ðtÞ xi ðtÞÞ
ð1Þ
j¼1
In the network teaching environment, teachers mainly use multimedia teaching equipment to carry out teaching, so teachers must be able to correctly use multimedia teaching software and equipment, and use network technology to complete the preparation of lesson and classroom teaching. Secondly, the development of network technology provides an important impetus for the reform and innovation of college English classroom teaching mode. In the network environment, students can fully feel the meaning and fun of learning English, and can eliminate the students’ resistance to English learning in the past, transforming passive learning into active learning. Network technology provides a rich resource for teachers’ and student learning. To a certain extent, it even replaces the teacher’s role and becomes the primary way to answer doubts for students. The time for classroom teaching is very limited. In order to consolidate and enhance the learning effect, students can independently use network technology to learn in their spare time, and continue to develop good learning habits of personalized learning and independent learning. In the network environment, through the unique human-computer interaction and interactive learning method, teachers and students can carry out more frequent and effective classroom interaction, realize the layering of English teaching, enhance students’ comprehensive learning ability, and also help students. Mastering the use of modern advanced teaching equipment, students can better accept the test of society after they leave the school, and play a very important role in the future development of students [8].
3.2
xðtÞ ¼ AxðtÞ þ BwðtÞ
ð2Þ
zðtÞ ¼ CxðtÞ þ DwðtÞ
ð3Þ
Open Teaching Approach - Data Visualization
The platform is based on the network and is based on the computer 3D model, which can replace the traditional teaching equipment and instruments (such as teaching engine, oscilloscope, signal generator, spectrum analyser, etc.). In the traditional
212
L. Deng and T. Wang
physics experiment teaching, the teacher demonstrates through the experimental equipment. Students see that the students did not participate in the experiment, resulting in students’ poor hands-on ability, and the interest in learning is not high, and the teaching effect is not achieved. On the teaching platform, the physical experiment can be simulated through the visualization tool, and it can be virtualized. The physical model interacts and can experience the experiment in an immersive way [9, 10]. minF ð X Þ; X ¼ ðx1 ; x2 ; . . .:xn Þ
ð4Þ
ai x i bi
ð5Þ
The concept of virtual experiment was first proposed by Professor Willian Wolf of the University of Virginia in 1989. He described a computerized virtual experiment environment dedicated to building a comprehensive tool and technology. Integrated, networked integration environment. There are many different methods for building a virtual lab. The more practical method is based on the virtual reality technology. It can be developed in a pure software method and can generate real-time artificial virtual environment with three-dimensional information. Entering it, creating a realistic immersive feeling, and real-time manipulation and mutual communication with the environment as in the real world, vivid image, strong sense of reality, relatively low cost, is the development direction of online virtual experiment construction (see Fig. 1) [11, 12].
Fig. 1. Virtual test system
3.3
Further Standardize the Integration of Business Processes and Financial Accounting Processes
There is no tangible laboratory in the virtual experiment, and there is no experimental tool and experimental object in the physical form. The experimental process is mainly the operation of the virtual object. In general, under the existing conditions, there are many experiments that are impossible to do, such as nuclear reaction, and some experiments are not allowed for students to do, such as those involving radioactive
English Teasching at College in Virtual Environment
213
substances or toxic substances. Using virtual technology, the contradiction between experimental conditions and experimental results can be effectively solved. In experimental teaching, many expensive experiment cannot be popularized due to price restrictions. If virtual technology is used to build a virtual laboratory on a multimedia computer, students can walk into the virtual laboratory. The virtual instrument is operated, and the operation result can be fed back to the student through the meter to judge whether the operation is correct. This type of experiment does not consume equipment, nor is it limited by external conditions such as the site, and can be repeated until satisfactory results are obtained. One of the great advantages of the virtual laboratory is its absolute safety. It will not cause personal accidents due to operational errors. Students and teachers are free to enter the virtual laboratory to operate the instruments and conduct various experiments at any time. It not only provides conditions and technical support for the teaching reform and distance education of experimental courses, but also provides students with more, updated and better instrument virtual laboratories at any time. For example, the School of Modern Distance Education of Beijing Institute of Technology has now composed the semiconductor device, semiconductor physics foundation, PN junction, semiconductor diode, bipolar transistor, FET, basic amplifying circuit, basic amplifying circuit, working principle, and micro-variation of amplifier. All electronic experiments such as equivalent circuits were moved to the virtual laboratory (see Fig. 2) [13].
Fig. 2. CloudLink center
3.4
Auxiliary Tools for Classroom Teaching
In the classroom teaching. A teacher guides a class. It is impossible to ensure that every student can clearly understand the classroom and experimental content. Due to limited teaching time and resources, students cannot repeat the operation multiple times for an experiment. Therefore, this teaching platform can be used as a supplement to classroom teaching. In the spare time, students use the virtual objects on the teaching platform to repeatedly operate experiments to achieve the purpose of learning new things, thus deepening the understanding of knowledge points.
214
L. Deng and T. Wang
Since distance education itself is based on the Internet, the application of this teaching platform to distance education has an inherent advantage. At present, the experimental teaching link of distance education cannot be effectively implemented. This teaching platform can make use of the characteristics of data visualization to make up for this weak link in distance education. In traditional education. Students learn knowledge from books and watch the teacher experiment. However, there are still more static web pages and classroom videos in the existing teaching platforms. Students are not interested in this type of teaching. The open virtual teaching platform proposed in this paper. According to the characteristics of the relevant data, an intuitive or imaged two-dimensional graphic or three-dimensional three-dimensional model can be created. For some 3D models, students can also observe from different viewpoints and directly operate them, and the teaching platform itself can directly analyse these operations. Finally, the results of the processing are fed back to the visualization tool. Students can observe changes in the model caused by their own operations. This interesting dynamic interaction allows students to deepen their understanding of book knowledge and experience the joy of learning (see Fig. 3).
Fig. 3. Hierarchical analysis
4 Conclusion From the teaching reform of the college English audio-visual course in the experimental class of one academic year, it is found that the independent study of Guangdong Institute of Petrochemical Technology has the following problems: First, due to the limitation of hardware resources such as the school computer room, only three teachers are currently participating in the class. The proportion of reforms is still less than onetenth of the existing college English teachers, which is not conducive to the promotion of college English education reform in Guangdong Petrochemical College; second, the management of relevant departments is not in place, it is difficult to ensure the stable and efficient operation of the network learning platform. To a certain extent, it has affected the development of teaching reform. Third, students’ cognitive and emotional factors have affected the reform of college English teaching to a certain extent. For
English Teasching at College in Virtual Environment
215
example, some students do not have good online listening and speaking training on the Internet in order to pass the exam. In addition, some students have poor English foundation and lack of self-confidence. They do not practice listening and speaking in the process of self-learning, but watch movies and play games online. Fourth, teachers are not enough to supervise students’ independent learning. The results of this study initially indicate that autonomous learning based on the network environment is a practical college English teaching model. It not only stimulates students’ interest in learning, enhances students’ confidence, and develops students’ ability to analyse and solve problems, and it can improve students’ learning efficiency. Although some problems are reflected in the teaching experiments, we firmly believe that these problems can be completely solved with the improvement of school teaching conditions and the changes in teachers’ teaching concepts and students’ learning concepts. The reform of college English teaching in Guangdong Institute of Petrochemical Technology is in the stage of exploration. This experiment of this group will lay the foundation for further improving the teaching mode of college English. We will continue to make efforts to build a new contribution to the college English audio-visual teaching model for the Guangdong Institute of Petroleum and Chemical Technology.
References 1. Aleshin, A., Afanasiev, V., Brusentsev, P., et al.: Modern information technology: information visualization, virtual environment, neo-geography, tangible images. Sci. Vis. 5 (4), 56–78 (2013) 2. Edwards, T.: Using social media tools to connect teacher candidates to ELL classrooms. Aims.muohio.edu, vol. 32(9), pp. 27–16 (2013) 3. Feng, G., Huang, Z., Chen, T.: Research and implement of 3D interactive surface cutting based on the visualization toolkit. In: International Conference on Intelligent Robotics and Applications, pp. 386–391. Springer International Publishing (2014) 4. Hildebrandt, D.: Service-oriented visualization of 3D environments based on standards and images. In: Joint Workshop of the German Research Training Groups in Computer Science, Algorithmic Synthesis of Reactive and Discrete-Continuous Systems, Algosyn 2010, May 31–June, pp. 197–203. DBLP (2010) 5. Mura, F.L., Corte, F.D., Bordino, R., et al.: Collaborative virtual environments as research and teaching instruments in the field of disaster medicine: the “e-DISTRICT” Simulator. In: International Conference Information Visualization, pp. 892–898. IEEE Computer Society (2017) 6. Neo, K.S.: Web-based 3D virtual environment for information visualization. Nanyang Technol. Univ., pp. 386–391 (2014) 7. Haury, D.L., Nehm, R.H.: The global challenge of genomics education: a path to the future. In: Genomics Applications for the Developing World, pp. 311–333. Springer, New York (2012) 8. Liu, X.Q., Chen, X.: College teaching quality assessment based on group consensus. In: International Conference on Virtual Reality and Visualization, pp. 12–17. IEEE Computer Society (2014) 9. Prabhat, Jr., L.V., Forsberg, A.S., et al.: Virtual reality-based interactive scientific visualization environments. Trends Interact. Vis., pp. 225–250 (2009)
216
L. Deng and T. Wang
10. Reis, P.R.J.D., Junior, D.L.G., et al.: Visualization of power systems based on panoramic augmented environments. In: International Conference on Augmented and Virtual Reality, pp. 175–184. Springer, Cham (2014) 11. Qing, L.I., Qi, H.K., Shen, Y.C.: Research on controllable visualization of mine surface plant and development of virtual environment. J. China Univ. Min. & Technol. 9(1), 386–391 (2014) 12. Pino, A.D.: Towards portable visualization and virtual environment applications on distributed memory architectures. In: High-Performance Computing and Networking, vol. 34 (1), pp. 21–29. Springer, Berlin Heidelberg (2016) 13. Zhang, N., Luo, W.H., Liu, Y.C., et al.: Research on marine engineering English environment simulation based on virtual reality technology. Comput. Simul. 39(1), 71–77 (2015)
Network-Based College English Multimedia Teaching Model Qian Yang(&) Chongqing Nanfang Translators College of Sichuan International Studies University, Chongqing, China [email protected]
Abstract. With the rapid development of multimedia network technology, in the college English teaching, the multimedia network teaching mode has gradually replaced the traditional single teaching mode based on teacher teaching. The development of multimedia network technology brings opportunities and challenges to traditional college English teaching, and also provides a good platform for college English multimedia network teaching. Based on the obvious characteristics of virtual reality, digital teaching, distance education and other network eras, this paper proposes a comprehensive college English teaching model based on multimedia network. This attempt has certain enlightenment effect on college English teaching reform. Keywords: Network
Multimedia Teaching mode College English
1 Introduction College English is an important foundation course for higher education [1]. Whether it is to train tens of thousands of high-quality workers who are compatible with the requirements of modernization, or to train tens of thousands of specialized talents, it is inseparable from the cultivation of their foreign language, especially the ability to use English [2]. The arrival of the era of informationization, digitization, and networking has prompted the educational concept and teaching methods to be constantly updated [3]. Especially in recent years, computer networks have incomparable advantages in real-time processing, remote monitoring, resource support, multimedia integration, etc., and have gained more and more attention and recognition from foreign language teaching workers [4]. This has challenged the traditional teaching mode and means of “a chalk, a blackboard, a teacher, and a student”. As far as foreign language teaching is concerned, the overall level is not high, and there are long-term drawbacks of “dumb English”, “more time-consuming, and less effective”. Many students scored fairly well in all kinds of exams, and the scores were very high, but they could not be heard once they communicated with others [5]. This serious high score and low energy phenomenon indicates that foreign language teaching has only trained foreign language candidates for many years instead of the actual application of foreign languages [6]. The reason is that the quality of foreign language learning is not unrelated to the conditions and environment of learning. In other words, the environment of language learning plays a considerable role in the use © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 217–223, 2021. https://doi.org/10.1007/978-3-030-51431-0_32
218
Q. Yang
of foreign languages by learners [7]. Why do students learn English for more than ten years, and the phenomenon of “scorpion English” and “dumb English” is still relatively common? The reason is that it is limited by the locale. There are no or few opportunities to practice listening and speaking, and there is little or no chance of using the language you have learned. Based on the above research status and the existing research work, this paper intends to improve the disadvantages of the traditional college English teaching mode by using the unique characteristics of the multimedia network stereoscopic teaching to explore the teaching mode of college English in the network environment.
2 Research on College English Teaching Model 2.1
Theoretical and Practical Relationship Model
According to this theoretical model, linguistics, psychology, sociology, and anthropology are the real theories, while applied linguistics only plays an intermediary role between teaching and theory. Teachers are practitioners of foreign language teaching [8]. The main difference in this model is which should be the theory and the intermediary discipline, and there is still no conclusion. However, the model incorporates sociology and anthropology at the theoretical and intermediate levels, indicating the environmental factors of foreign language teaching. 2.2
Educational Linguistic Model
The educational linguistic model believes that since educational linguistics is specialized in language teaching, it should be a branch of applied linguistics. The focus of this model is to pay attention to the problems associated with second language and language teaching, which demonstrates the multidimensionality of language teaching [9]. However, this model has caused heated debate in the academic world. The focus of the debate is that since the model takes into account the influence of language use theory and learning theory on foreign language teaching theory, why should we neglect the restrictive role of social needs and the real environment of foreign language teaching. The block diagram of the educational linguistic model is shown in Fig. 1. 2.3
Language Learning, Teaching and Policy Interaction Model
The theoretical model believes that there are usually five variables in foreign language teaching, namely M means method and textbook variable; T means teacher variable or teacher’s work; I means teaching variable or student’s work; S means social cultural variable or Environmental constraints; L indicates learning variables or student behavior. In this model, there are two triangular relationships: the MIT triangle represents the taught variable; the ISL triangle represents the variable [10]. The two triangles are subject to social, political, educational and other factors, so the model has formed a multidisciplinary intersection, depicting the research field and expanding the scope of the educational environment. It can be said that this model makes up for the
Network-Based College English Multimedia Teaching Model
Linguistic theory
General Genneral linguistics linguuistics
Learning theory
Psychology
Language learning theory
Linguistic theory
219
Psycholinguology
Language use theory
Sociolinguistics Educational linguistics
Second language teaching Fig. 1. Educational linguistic model
shortcomings of the previous models, and it is a big leap in consideration of the restrictive role of political and social cultural factors in foreign language teaching [11]. The language learning, teaching and policy interaction patterns are shown in Fig. 2. Government Education policy Language policy
Society
Course s M
T
l
L
Fig. 2. Language learning, teaching and policy interaction model
2.4
Situational and Communicative Teaching Model
Since students need to carry out meaningful learning and drills, they must have the necessary social scenes so that communication can be carried out effectively and achieve the effect of language learning [12]. In view of these principles, the corresponding teaching mode is produced, as shown in Fig. 3.
220
Q. Yang
Understanding
Teaching and experience
Forming
Language skills
Usimg
Language behavior
Fig. 3. Situational and communicative teaching model
3 College English Network Teaching Conditions and Curriculum Design Realizing the comprehensive teaching of college English multimedia network in the true sense is different from the traditional English teaching. Multimedia teaching using modern network technology should have certain material conditions. At the same time, it also raises higher for teachers who are engaged in college English teaching. First of all, you should have a good network teaching environment. The comprehensive English teaching based on multimedia network is based on multimedia facilities such as multimedia network classrooms. It is a necessary condition for realizing the comprehensive teaching mode of college English. Without this basic condition, multimedia network teaching cannot be discussed. At the same time, the multimedia network classroom should have an interactive operation platform with sound and visual, and the platform should have good openness, allowing teachers to add their own multimedia software and various multimedia network resources downloaded from the Internet. Second, there should be a wealth of multimedia network resources. The most important feature of multimedia resources is interactivity. The important features are digitization and good human-computer interaction capabilities. Multimedia files should include the following: charts and images, still photos, patterns and illustrations, video animations, music and sound, and text. With the rapid development of modern networks and information technology, it not only provides people with three-dimensional space, virtual or virtual reality, but also rapidly forms a network of audio-visual, audiovisual and three-dimensional integration. The continuous multiplication of multimedia network resources provides a rich multimedia resource for the comprehensive teaching of college English multimedia network. Finally, there should be a group of English teachers with good English professional knowledge and a good command of computer and internet technology. In the process of college English teaching, teachers should keep up with the times and update concepts, and gradually master advanced multimedia teaching methods such as information technology, computers and internet. Use the multimedia technology you have mastered to produce open, practical and flexible college English courseware.
Network-Based College English Multimedia Teaching Model
221
After having the above conditions, aiming at the current college English segmentation teaching mode, the comprehensive teaching mode of college English multimedia network integrating reading, listening, speaking and writing is proposed, which is also the basic of the college English syllabus. The specific implementation process and operation mode of college English comprehensive teaching based on multimedia network are shown in Fig. 4. Teaching material knowledge Other references Internet resources Improve multimedia network courseware Students interact with online platforms and teachers
Multimedia network interactive teaching platform
Students learn through the classroom and find their own shortcomings
Teacher and student selfoperation and evaluation
Monitoring classroom teaching
Teachers use classroom teaching to timely feedback information and modify teaching methods
Teacher's teaching effect and students' knowledge output
Fig. 4. University English network teaching mode diagram
4 The Development Prospects of Online English Teaching Despite the use of multimedia network technology in college English teaching, the practice began. However, with the rapid development of information technology, computer and network technology, the application of multimedia network technology in college English teaching will be widely promoted. With the support of multimedia network technology, the comprehensive teaching mode of college English based on interactive multimedia network not only integrates reading, listening, speaking, writing and translating in college English, but also reproduces through simulation and simulation. The real English learning environment, from different perspectives to train students’ ability to read, listen, speak, write, translate and other practical language applications, this model will show its unique advantages and good development prospects.
222
Q. Yang
In the teaching method, the college English comprehensive teaching mode based on multimedia network combines the listening and speaking method, the situational method and the communicative teaching method. It constructs an interactive multimedia network platform for teachers by means of modern advanced multimedia network technology. Learning with students provides a good English learning environment. At the same time, it provides the required three-dimensional space, virtual or virtual reality for teaching methods such as listening and speaking, situational law and communicative teaching. In the visual sense, the comprehensive teaching mode of college English based on multimedia network integrates the visual, auditory, sound, image and threedimensional space, which greatly stimulates the students’ sense organs in all directions and fully mobilizes the students’ enthusiasm for learning. At the same time, through the organic combination of reading, listening, speaking, writing and translating in English learning, with the help of the open platform provided by modern multimedia network technology, students can learn English basic knowledge while actually using English communication. The ability has also been greatly improved. Using multimedia network teaching, teachers can not only pass the teaching content to the students, but also grasp the overall learning situation of the students in time, and answer questions and demonstrations. At the same time, multimedia network teaching is not only convenient for students to learn cooperatively, but also for teachers to monitor and join students’ discussion activities. This forms an interactive teaching platform and promotes the effect of teaching. In addition, with the multimedia network, teachers can conduct personalized teaching for different students, thus achieving teaching in accordance with their aptitude and improving teaching efficiency. In the college English multimedia network teaching activities, the teacher is the leader and the student is the subject. Teachers can use the multimedia teaching network to transmit information such as teaching tasks, teaching objectives, and key points and difficulties of teaching content to students in the form of words, images, audio or video, so that students can learn independently and consolidate classroom teaching effects. At the same time, through the multimedia network platform, students can actively search and utilize learning resources according to their own learning interests, basic level, personality characteristics, learning habits, etc., from passive learning recipients to active learning explorers.
5 Conclusion With the rapid development of modern network technology, computers and information technology, multimedia technology will continue to improve. The explosive infiltration and rapid spread of multimedia technology in college English teaching provides an opportunity for college English teaching and also brings challenges. The multimedia-based college English comprehensive teaching model with flexibility, openness, interactivity, mobility and practicality gives students more flexibility in learning initiative and operation. At the same time, this model integrates reading, listening, speaking, writing and translating in English learning, which combines the content and form of English teaching, English grammar learning and practical language
Network-Based College English Multimedia Teaching Model
223
application, and changes the traditional sense. The structure of college English curriculum is subjectively divided in knowledge, content and practice are out of line, and the form is too single, so that students can learn basic knowledge from practical application and integrate their understanding of English language knowledge in specific operations and practice. It can improve the ability to actually use English communication.
References 1. Xue, G., Lingling, L.: A comparative study on cooperative learning in multimedia and network environment used by English majors between China Mainland and Taiwan. Adv. Lang. & Lit. Stud. 9(1), 127 (2018) 2. Feng, S., Shaozeng, S.: Construction of multifunctional video conversion-based multimedia teaching system for college basketball. Int. J. Emerg. Technol. Learn. (iJET) 13(6), 176 (2018) 3. Xu, X., Li, D., Sun, M., et al.: Research on key technologies of smart campus teaching platform based on 5G network. IEEE Access 9(99), 1 (2019) 4. Huang, C., Zhang, Y., Zhu, C., et al.: Chinese sports basketball teaching tactics training system combined with multimedia interactive model and virtual reality technology. Multimed. Tools Appl. 9(2), 122–130 (2019) 5. Shang, J., Wang, Y., Sun, Y.: Design and implementation of wireless multimedia sensor network node based on FPGA and binocular vision. EURASIP J. Wirel. Commun. Netw. 12(1), 163 (2018) 6. Colliot, T., Jamet, É.: Understanding the effects of a teacher video on learning from a multimedia document: an eye-tracking study. Educ. Technol. Res. Dev. 66(6), 1415–1433 (2018) 7. Eva, H., Michaela, H.: Creating performance-oriented multimedia projects as part of an interdisciplinary teaching practice. IEEE Multimed. 25(2), 93–103 (2018) 8. Yang, X., Chen, P., Gao, S., et al.: CSI-based low-duty-cycle wireless multimedia sensor network for security monitoring. Electron. Lett. 54(5), 323–324 (2018) 9. Hu, H., Zhang, H., Yang, Y.: Security risk situation quantification method based on threat prediction for multimedia communication network. Multimed. Tools Appl. 77(16), 21693– 21723 (2018) 10. Zhang, L.: A web-based English teaching module on the administration of electroencephalography-based neurofeedback training for Chinese students. NeuroQuantology 16(5), 55–61 (2018) 11. Jian-Fei, C., Hai-Feng, H.: Empirical study on the factors influencing the web-based teaching effect. Eurasia J. Math., Sci. Technol. Educ. 14(5), 1635–1643 (2018) 12. Su, S.C., Liang, E.: Action research of the multiple intelligence (MI), cooperative learning, and game-based teaching into summer intensive english classes for mixed-level and mixedage students. Univers. J. Educ. Res. 5(11), 1977–1985 (2017)
Visual Module R&D of the Intelligent Grabbing System of WIFI Module Shufang Ma1,2,3, Jiang Wu2,3, Shuangben Jiao2,3, and Bin Xue1,2,3(&) 1
2
Engineering and Technology R&D Center of Mechanical and Electrical in Colleges of Shandong, Qingdao Binhai University, Qingdao 266555, Shandong, People’s Republic of China [email protected] School of Mechanical and Electrical Engineering, Qingdao Binhai University, Qingdao 266555, Shandong, People’s Republic of China 3 Qingdao Zhongzhuang Vision Automation System Control Co., Ltd., Qingdao 266555, Shandong, People’s Republic of China
Abstract. WiFi module intelligent grabbing system based on visual guidance is established by taking MV-CH120-10GM industrial camera and Siemens S7200smartPLC as the hardware basis designated to realize identification and positioning grabbing of WiFi module. Hardware selection and imaging processing is studied based on visual module, and visual identity and positioning algorithm is developed by taking VisionPro9.0 as the platform. Meanwhile, logical judgment on imaging processing result is carried out by using the software Vision Studio C#. Besides, visual windows is used for inspecting image and data display. Through experimental verification, it is ultimately indicated that the visual algorithm features higher identification and positioning accuracy and satisfies the requirements of the grabbing system. Keywords: Machine vision grabbing
Image processing Positioning Intelligent
1 Introduction Along with the arrival of strategic implementation of manufactured-in-China 2025, China’s manufacturing industry is developing at a high speed. as deemed as an important transmission medium of the internet, WiFi module, features increasing reduction in product replacement period, increasing production speed. It is necessary to design a positioning grabbing system that can satisfy the intelligent process to solve the existing problem about artificial placement of WiFi module. The accurate positioning of WiFi module is realized machine vision according to the research and development of the visual module in the paper to detect whether WiFi module barcode information exists/or not. If not, the manipulator can be used to remove WiFi module. If yes, it is necessary to read the barcode information correctly and the manipulator can be used for precise placement of WiFi module.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 224–231, 2021. https://doi.org/10.1007/978-3-030-51431-0_33
Visual Module R&D of the Intelligent Grabbing System
225
2 Overall Design of the Intelligent Grabbing System The whole WiFi inspection and positioning grabbing process is a complete system with the core of visual and control module. As regarded as the subject of inspection and positioning part, visual module mainly processes the collected information and then transmits it to the control system. Meanwhile, the control system completes the control of grabbing, feeding and removal processing according to the corresponding information. Real-time online monitoring of the machine vision can be used to guide the manipulator in accurate grabbing the target objects in malalignment and putting them to the specified location according to the designated direction. The step of reading the barcode information can be added to the grabbing and placement process of the manipulator to realize statistical analysis and storage of the important data and increase the product tracing function [1, 2]. Ultimately, the running condition of the whole system is intuitively displayed through Vision Studio 2013 C# software windows interface design. The flow chart of the system design is as shown in the Fig. 1.
3 Hardware Platform of the Visual Module Visual module is the core port of the grabbing system of WiFi positioning. Dual camera is used for dual positioning in the design. Big angle is changed into the small one through two times’ angular adjustment. The offset is reduced to nearly 0° [3]. One typical visual inspection module contains optical imaging, image acquisition & transmission and image processing and analysis. The whole module cannot be without accessories including light source, optical lens, industrial camera, image acquisition card, image processing hardware platform, image & visual information processing software. The hardware list of the visual module is as shown in the Table 1. Table 1. Hardware list of the visual module Designation Positioning camera Optics lens Surface light source Coaxial light source Light controller
Model MV-CH120-10GM, MV-CE050-30GM MVL-KF3528M-12MP, MVL-MF2520M-5MP FG-THZ220220 FG-FV100 PI48W-24-1
4 Software Development of the Visual Module The visual inspection module is developed based on VisionPro9.0 platform. As a foreign powerful image processing software, VisionPro9.0 possesses multiple development modes and dozens of image processing tools. By virtue of abundant algorithms, it is widely applied into the field of machine vision. Meanwhile, it supports C# selfprogramming and Vision Studio 2013 windows development. Many algorithms are
226
S. Ma et al.
applied into the visual inspection module, including checkboard calibration, positioning, circle center fitting and coordinate conversion algorithms. PID structural diagram of the visual algorithm is as shown in the Fig. 2.
Fig. 1. Design flow chart
Fig. 2. PID structural diagram of the visual algorithm
Visual Module R&D of the Intelligent Grabbing System
4.1
227
Calib Checkerboard
CalibCheckerboard is an important link of visual processing. The center location is extracted accurately through image fitting by taking selection characteristic point of CalibCheckerboard as the reference point. The offset resulted from the projection and removed according to the known calibration target template parameters can be used to calculate the conversion, linear or non-linear conversion between the pixel and real unit [4, 5]. The flow chart of CalibCheckerboard is as follows: (1) Input checkerboard diagram. (2) Find the corners of the checkerboard. (3) The internal parameter matrix and distortion coefficient of fisheye lens are obtained. Meanwhile, input the image to be corrected. (4) The two are corrected by the corresponding coordinates before and after lens distortion. (5) The final corrected image is obtained. 4.2
Target Positioning
To extract the edge feature of the target object through visual positioning, the feature is regarded as the benchmark to seek that is similar to it for matching [6, 7], so that the positioning function of the target object is realized. 4.3
Circle Center Fitting
One circle can be fit according to three points through circle center fitting algorithm. The distance from the center of the circle to the point on each edge remains unchanged [8]. Under the circumstance that object cannot be confirmed on the irregular object or center point, one center point can be fit according to other feature points of the object. 4.4
Coordinate Conversion
The target object can be grabbed with the manipulator through nine o’clock coordinate calibration to obtain the coordinate of 12 points by rotating certain angle in the center after reaching the location of nine o’clock along the character Tian. Each point corresponds to the coordinate of one manipulator and pixel [8, 9]. The zooming, aspect ratio, rotation, tilting and translation of the object can be corrected through conversion matrix. The coordinate of pixel can be converted into that of the manipulator. Schematic diagram of nine o’clock calibration is as shown in the Fig. 3.
228
S. Ma et al.
Fig. 3. The schematic diagram of nine o’clock calibration
5 Test Result Analysis (1) running of the visual inspection program and restart & shutting down of the windows can be controlled on windows through test in Visual Studio 2013. The image and positioning data will be displayed on the windows in real time. Besides, the parameters of the visual module can be revised on the background. The inspection result map of the windows is as shown in the Fig. 4. (2) ording to multiple patterns of WiFi module, the product model can be loaded and switched by selecting corresponding product model name in lyra menu of the model selection through offline pattern making. The schematic diagram of product conversion is as shown in the Fig. 5. (3) duct model conversion inspection will be completed after transitory visual loading. The schematic diagram of the successful effect of conversion is as shown in the Fig. 6.
Visual Module R&D of the Intelligent Grabbing System
Fig. 4. The inspection result map of the windows
Fig. 5. The schematic diagram of product conversion
229
230
S. Ma et al.
Fig. 6. The schematic diagram of the successful effect of conversion
6 Conclusions While WiFi module grabbing system based on visual guidance improves the production efficiency, enhances visual guidance positioning for the manipulator, improves grabbing accuracy, enhances the flexibility of the production line, reduces the time increased for product conversion, it is designed with feeding and removal systems. Simultaneously, the functions including code inspection and dimension measurement of parts for inspection can be provided through machine vision. Thus, artificial operation is reduced. The statistics and analysis of important information can be displayed intuitively through man-machine interface and C# logic programming.
References 1. Levine, S., Pastor, P., Krizhevsky, A., et al.: Learning hand-eye coordination for robotic grasping with large-scale data collection. Int. J. Robot. Res. (10), (2016) 2. Kumra, S., Kanan, C.: Robotic grasp detection using deep convolutional neural networks. International Conference on Intelligent Robots and Systems. IEEE (2017) 3. Golnabi, H., Asadpour, A.: Design and application of industrial machine vision systems. Robot. Comput.-Integr. Manuf. 23(6), 630–637 (2017)
Visual Module R&D of the Intelligent Grabbing System
231
4. Jiafa, L.: Research on error analysis and improvement of image measurement kinematic parameters. Computer Science and Electronic Technology International Society 4 (2016) 5. Ruifeng, G., Yanhe, L., Shihe, S., et al.: Research on trajectory planning and kinematic analysis of palletizing robot. Mach. Des. & Manuf. 1, 76–78 (2017) 6. Ulrich, M., Heider, A., Steger, C.: Hand-eye calibration of SCARA robots. Open GermanRussian Worokshop on Pattern Recognition and Image Understanding (2014) 7. Fernandez, E., Crespo, L.S., Mahtani, A., et al.: Learning ROS for robotics programming— second edition. Packt Publishing Ltd., Birmingham (2013) 8. Birdal, T., Ilic, S.: Point pair features based object detection and pose estimation revisited. International Conference on 3d Vision. IEEE, 527–535 (2015) 9. Wang, Y., Zhang, G.L., Lang, H., et al.: A modified image-based visual servo controller with hybrid camera configuration for robust robotic grasping. Robot. & Auton. Syst. 62(10), 1398– 1407 (2014)
The Design of Modern Shouzhou Kiln Porcelain from the Perspective of Internet Gang Liu and Wei Jiang(&) School of Arts, Anhui Xinhua University, Hefei 230088, Anhui, China [email protected]
Abstract. With the rapid popularization and application of the Internet, all kinds of designs are integrated with each other. The design of modern Shouzhou kiln porcelain is one of them. The design of Shouzhou kiln porcelain has obvious practical characteristics, which are mainly manifested in the rich types of implements, fully meeting the needs of daily life; reasonable shape design, highlighting the practical characteristics; thick body, heavy quality, simple, solid and durable; not paying attention to decoration, simple glaze application. The design of Shou Zhou kiln product is practical, light decoration, durable and cheap. It fully accords with the modernist design idea and design requirement, and has the advanced nature of surpassing the times. Keywords: Internet
Shouzhou kiln porcelain Modernism design
1 Introduction As a famous kiln in Tang Dynasty, Shouzhou kiln was first seen in Luyu’s tea classic [1], Since then, due to the lack of historical materials and the lack of existing artifacts, it has been in obscurity for a long time. In 1960, Shouzhou kiln site was found in Shangyao Town, tianjia’an District, Huainan City [2], Only then opened the veil of mystery that covered the millennium, and attracted the attention of scholars. Later, with the publication of archaeological discoveries, porcelain wares of Shouzhou kiln were unearthed successively in Gongyi and Anyang of Henan Province, Cixian of Hebei Province, Xiangyin of Hunan Province, Fengcheng and Fuzhou of Jiangxi Province [3]. The production time spans the Sui and Tang Dynasties and lasts for 200 years. The researchers also outlined a basic circulation route of Shouzhou kiln porcelain, along the East-West evolution of the Huaihe River and the North-South trade of the Beijing Hangzhou Grand Canal [4]. It can be seen that the value and significance of Shouzhou kilns in the Tang Dynasty can not be underestimated because of the wide marketing areas and the large number of daily services. Today, the research of Shouzhou kiln porcelain has entered a more in-depth stage, involving kiln site investigation, excavation report, porcelain research, technology testing, protection and inheritance and many other aspects. In this paper, the above issues do not make a detailed statement, from the point of view of modern design to re-examine the significance of Shouzhou kiln porcelain products of the times.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 232–237, 2021. https://doi.org/10.1007/978-3-030-51431-0_34
The Design of Modern Shouzhou Kiln Porcelain
233
2 Design Features of Shouzhou Porcelain 2.1
Rich Types of Utensils Fully Meet the Needs of Daily Life
According to the types of wares unearthed successively, there are bottles, pots, pots, pans, bowls, cups, bowls, bowls, bowls, basins, pillows, etc. (Fig. 1) in addition to a small number of water bowls as stationery, a large number of porcelain wares are to meet the actual needs of daily life. For example, a pot for wine, a pot for storing grain and salting, a plate and bowl for food and drink, a cup for drinking tea, a basin for food and noodles, and a porcelain pillow for sleeping. It basically covers the needs of ordinary people’s daily life.
Fig. 1. Common types of porcelain in Shouzhou kiln
2.2
Reasonable Shape Design and Practical Features
Shouzhou porcelain emphasizes practicability in modeling, not much attention is paid to the decorative effect of modeling. Take the “tie” on China (a button that is carried by hand with a rope on) as an example. There are different types of pots and jars, such as double system, four system and eight system. There are also utensils with no buttons on them. This kind of design is based on the volume and different uses of the objects. Double series pots and jars are generally of moderate size. When full of wine or water, they can be carried by one hand. The porcelain of the fourth series has a large volume. When full of wine and water, the weight of the porcelain can’t be borne by the double series. There is a possibility of fracture, so the design of the fourth series is for the sake of safety. The porcelain of the eighth series generally has a larger body shape, and the strength of the button part is greater. More buttons are needed To undertake, this kind of design conforms to the principle of mechanics and is scientific. Because the smaller utensils are convenient to hold, they do not need to design lifting buttons. Because the larger pots are not often moved, they are placed in a fixed place for a long time, so they do not need to design lifting buttons. (Figure 2) fully reflects the practical color of the design.
234
G. Liu and W. Jiang
Fig. 2. Design of the lifting button of Shouzhou kiln porcelain
2.3
Thick, Heavy, Simple and Durable
Due to the use of the porcelain clay without washing, Shouzhou kiln porcelain generally has rough texture and thick carcass, which is about 0.8–1 cm. Although heavy porcelain brings a little inconvenience to use, but the most advantage of this kind of porcelain is that it is solid and durable. Compared with the use of beautiful and light utensils by the ancient wealthy class, the ordinary people with poor economic conditions pay more attention to the service life of porcelain. In addition, rough processing technology also means saving the processing cost and production time of products, thus generally reducing the unit price of porcelain, which also saves the cost for ordinary people, so it will be loved by the people. According to the archaeological findings from the north and south of Shouzhou porcelain marketing canal and both sides of Huaihe River, there must be a wide range of consumers in the two hundred years of Tang Dynasty. 2.4
No Attention to Decoration, Simple Glaze Application
Shape and decoration have always been the two acme of Chinese porcelain. Sui and Tang Dynasties is the period of great development of Chinese ceramics. The south is green and the north is white, forming two traditions of Chinese porcelain. Yue Kiln is a model of traditional celadon, Xing kiln is a representative of new white porcelain. In addition to the two important glaze colors, there are black, yellow, flower and other glazes, as well as three colors and winches that decorate a new generation of fashion. The technique of underglaze painting appeared in Changsha kiln, which profoundly influenced the later change of Chinese ceramic decoration style. In this context, the development of Shouzhou kiln porcelain seems to deviate from this trend. In Sui Dynasty, due to the influence of northern celadon system, there once appeared decorative works such as Longshou Pankou pot and piled plastic pot, but the number was extremely rare. After entering the Tang Dynasty, this kind of works disappeared completely, instead of a large number of non decorative products. Even glaze application, which has both practical and decorative technology, is also done casually. In the case of not affecting the use, the glaze on the outside of the porcelain can be painted more casually, not paying attention to the full coverage, so the phenomenon of drop glaze, vertical glaze and oil drop glaze can be seen everywhere. (Figure 3) the rough carcass can be obviously exposed to the eyes of the user. This is a common
The Design of Modern Shouzhou Kiln Porcelain
235
phenomenon of Shouzhou kiln porcelain, which shows the distinctive characteristics of the products of folk kilns: rough form, mainly practical. No matter the early blue glaze, the middle yellow glaze, the late black glaze, and the sauce glaze, the color is not delicate, but gives a simple feeling.
Fig. 3. Flow glaze and drop glaze of Shouzhou porcelain
3 The Value of Porcelain Design of Modern Shouzhou Kiln from the Perspective of Internet As a product of the development of modern information technology, the Internet has changed the development of traditional industries in a short time, making people’s life style changed greatly. On the other hand, from the perspective of Internet, we can see the modern design of Shouzhou kiln porcelain. It’s hard to call Shouzhou kiln a famous kiln in Tang Dynasty. Although Lu Yu, the sage of tea, mentioned it in the book of tea, not for the purpose of praise, but as the opposite of the tea set of Yue Kiln and Xing kiln, talking about the shortcomings of making tea in Shouzhou kiln. After Lu Yu, few people seem to praise the products of Shouzhou kiln. China has always attached great importance to the rarity and rarity of porcelain, and respected its aesthetic and cultural values. Exquisite rare porcelain can be priceless, carefully preserved in the museum’s glass cabinet for the audience to admire and scholars to study. But ordinary porcelain is buried in the ground. For a long time, the fate of Shouzhou kiln is like this. Nowadays, there is no trace of Shouzhou porcelain in all kinds of textbooks that introduce the history of Chinese arts and crafts, which is really not appropriate. In fact, there are not only thousands of ancient Chinese kilns, but also trillions of ceramic products, which have played an immeasurable role in the lives of ordinary people for thousands of years. But our history has never disdained to record the life history and product manufacturing history of these ordinary people. As a result, it has been obscured. Our history of Arts and crafts is also a life history of dignitaries and elites. We only know such noble artifacts as colored pottery, jade, bronze, five famous kilns, Yuan blue and white, pink and enamel. What kind of products do ordinary people use when this kind of porcelain is famous in the world? Since the day of the birth of ceramics, ordinary people have been using the cheapest and most low-end ceramic products, which have been used in the 1980s. During this period, who cares about the daily necessities of ordinary people.
236
G. Liu and W. Jiang
Design for the masses is the common ideal of a large number of outstanding intellectuals in Europe at the beginning of the 20th century, which has opened the curtain of modern design and changed the history of the design industry serving the powerful for a long time. In his masterpiece decoration and sin, Adolf Luce, one of the pioneers of modern design, sincerely put forward a stand against decoration. He believed that simple geometric form and functional architecture should meet the needs of the masses in the 20th century, rather than advocating tedious decoration. The spirit of design should be democratic, for the masses, rather than for a few powerful people [5]. Then, driven by a large number of modernist design masters such as Gropius, Mies van der Rohe and Corbusier [6], it established the basic norms of modern design: geometric form, functionalism, less decoration, neutral color, economic and practical. And take this as the standard, lead the whole 20th century design activities, provide convenient and decent life for millions of ordinary people. In this view, the design of Shouzhou kiln products is practical, light decoration, solid and durable, and low price, which fully conforms to the design ideas and design requirements of modernism. The concept of serving the common people has indeed advanced in the era. It is a pity that the idea of valuing Tao over utensils is quite strong in ancient Chinese creation design thought [7]. The idea of utensils carrying Tao is deeply rooted, and the idea of valuing spirit over practicality, which hinders the further development of Chinese creation design. Today [8], it is of great significance to reexamine the porcelain products of Shouzhou kiln from the perspective of modern design. The broken porcelain, buried porcelain and a large number of debris piled up in the fields of farmers are probably more valuable than the porcelain displayed in the museum [9]. After all, the real value of Shouzhou porcelain is practical rather than aesthetic [10].
4 Conclusion Function and form (including aesthetics) are always important issues in design discussion. The practicability of design determines that design is not a work of art. The design of ancient Chinese artifacts should abide by this principle. For Shouzhou kiln products, we should also look at this. Therefore, the most important value of Shouzhou kiln porcelain is its practical value, not its aesthetic value. Shouzhou kiln products serve the people’s daily use, and have the significance and value beyond the times. There is no doubt that it has the thought of modern design, or it coincides with the concept of modern design. Acknowledgements. This work was supported by Anhui Province University Youth excellent talents support plan (gxyqZD2016387); Anhui Xinhua university young and middle-aged discipline leader training project (2018xk09); Anhui Xinhua University animation research institute project (yjs201708); university students innovation and entrepreneurship training project (201812216014); Anhui university student innovation and entrepreneurship training project (AH201712216054).
The Design of Modern Shouzhou Kiln Porcelain
237
References 1. In the introduction of tea bowl, it is said: “in Yuezhou, Dingzhou and Wuzhou take the second place; in Yuezhou, Shouzhou and Hongzhou take the second place.” “Yue State porcelain and Qiu porcelain are both green, and green is beneficial to tea. Tea is black and white; Xing state porcelain is white, and tea is red; Shouzhou porcelain is yellow, and tea is purple; Hongzhou porcelain is brown, and tea is black, so it’s not suitable for tea.” Cai Dexin, interpretation of tea classics, pp. 25–25. Agricultural Publishing House, Beijing (1984). (in Chinese) 2. Hu, Y.: A survey of Shouzhou porcelain kiln sites. Cult. Relics (12), 60–66 (1961). (in Chinese) 3. Exhibition picture of “Huaishang kiln fire - Shouzhou kiln porcelain exhibition”, Anhui Museum, May 8, 2019–October 7, 2019. (in Chinese) 4. For relevant documents, please refer to: Wang Y.: Early products of Shouzhou kiln unearthed in Hefei. Cult. Relics (9), 96 (1984). (in Chinese) 5. Yuan, N.: Tomb of Zhang Jing in the third year of emperor kaihuang of Sui Dynasty in Hefei. Cult. Relics (1), 85–92 (1988). (in Chinese) 6. Li, J.: The yellow glaze and mat pattern porcelain potting pot unearthed in Dongping County, Shandong Province. Cult. Relics (7), 96 (1996). (in Chinese) 7. Wang, Q.: Discovery and preliminary study of Tang Dynasty drainage ditch and other relics at Dadongmen street construction site in Yangzhou. Archaeol. Cult. Relics (5), 40–49 (1995). (in Chinese) 8. Yan, H.: Appreciation of Shouzhou kiln porcelain unearthed from the relics of the canal, Shouzhou porcelain yellow - Liuzi canal site in Huaibei. Cult. Relics Apprais. Apprec. (7), 52–55 (2015). (in Chinese) 9. Wang, S.: History of modern design in the world, p. 149. China Youth Press, Beijing (2017). (in Chinese) 10. An analysis of the influence of the pattern of southern and Northern porcelain making on Xiaoyao porcelain. Ceram. Res. (4), 53–55 (2019). (in Chinese)
Teaching Activity Design Based on the Discipline Key Competence of IT in Secondary Vocational School Penglong Zhang1,2, Yongsheng Zhang1,2(&), Lining Liu1,2, and Wenqian Sun1 1
School of Information Science and Engineering, Shandong Normal University, Shandong 250358, Jinan, China [email protected], [email protected], [email protected], [email protected] 2 Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, Shandong 250358, Jinan, China
Abstract. This paper, is based on the analysis of secondary vocational students learning of information technology, that’s what we call IT. In response to a new round of curriculum reform emphasizes the key competence, we sum high school IT discipline key competence and vocational education characteristics up to the secondary vocational discipline key competence, and design related teaching activity to change the secondary vocational school IT course “computer application foundation”. So as to improve secondary vocational students’ IT discipline key competence, and to provide the reference for school IT teaching material writing, content design and classroom teaching. Keywords: Discipline key competence IT Secondary vocational education Teaching activity design
1 Introduction The traditional IT teaching in secondary vocational schools is “general education compression” that centered on disciplines. However, with the continuous upgrading of the technical composition of the industrial economy, the requirements of industrial workers’ occupational quality are also rising, and the industrial workers with only cultural knowledge or primary operational skills is increasingly unable to be competent for vocational posts [1]. Now the teaching of IT pays attention to professional features, but it is too narrow to professional view, develop into job skills training goals and don’t attach importance to students’ long-term career development, it obviously against that secondary vocational school students adapted to China’s socialist modernization construction, comprehensive development in moral, intellectual, physical, art and has the comprehensive vocational ability, in the field of production and service of high-quality workers and skilled personnel training goal [2]. How to avoid this tendency, while teaching students knowledge and skills to cultivate their competence and ability to adapt to the information age has become the focus of secondary vocational teaching. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 238–245, 2021. https://doi.org/10.1007/978-3-030-51431-0_35
Teaching Activity Design Based on the Discipline Key
239
In field the of Basic education, after a long period of course reform, has formed the general consensus that discipline teaching to “ pursuit of discipline teaching to go beyond simply to impart the knowledge and skills, guide students to have discipline view to understand the world and the analysis question, and to form the discipline consciousness and habit of thinking” [3], ordinary high school curriculum standard compilation “list of ordinary high school discipline key competence “in 2016, promoted the implementation of this agreement. At present, “computer application foundation”, as a compulsory IT course for students in secondary vocational colleges, undertakes the task of cultivating students’ information literacy and application ability of IT in the context of the task, and plays a role in laying the foundation for students’ adaptation to the information society and the development of career informatization [4]. How to optimize the teaching of theoretical knowledge and skills in the course “computer application foundation” and cultivate secondary vocational student’s IT discipline key competence, so as to enable students to apply what they have learned to their professional development is a key issue of secondary vocational IT teaching now.
2 The Teaching Status of IT in Secondary Vocational Schools Now there are two main types of secondary IT course teaching modes, one reason is the low starting point of education in our country, education on the internal resources allocation and regional development imbalances, secondary vocational schools learned from ordinary high school then formed and long-standing traditional pattern of discipline centered (as shown in Figs. 1 and 2), some colleges and universities at present stage IT teaching is given priority to with this model.
Fig. 1. Traditional pattern of discipline centered
240
P. Zhang et al.
Fig. 2. Four-stage teaching method
The other is that in recent years, Chinese educators and scholars have actively learned from Germany, the United States and other countries with advanced vocational and technical education, introduced a series of new teaching methods such as taskdriven teaching method (as shown in Fig. 3), and made many achievements in stimulating students’ interest in learning and enhancing their practical ability.
Fig. 3. Task-driven teaching method
Traditional teaching cannot guarantee students’ discipline activity and further development in the class, while task-driven approach and other approaches are based on constructivist theories that traditional secondary vocational teachers are unfamiliar. Students in vocational colleges have strong image thinking but weak abstract thinking, the degree of abstraction of steps is very high and not delicate, so such course form is also difficult to promote in the field of vocational education [5]. As to the choice of teaching methods, there is also a long debate in China.
3 The Discipline IT Key Competence in Secondary Vocational The construction of vocational education curriculum needs to consider two factors in particular: first, the requirements and challenges of the development of informatization; second, the characteristics and rules of learning based on work [6]. Therefore, this part
Teaching Activity Design Based on the Discipline Key
241
sorted out and analyzed the content of “computer application foundation” according to the key competence standard of high school IT discipline, so as to form the discipline key competence of secondary vocational IT, overcome the limitations and contradictions of existing secondary vocational IT teaching methods, and carry out better teaching design. 3.1
The Discipline Key Competence of IT in Senior High School
The curriculum standard of IT for ordinary high schools (2017 edition) proposes that the discipline key competence of IT in senior high schools includes information awareness, computational thinking, digital learning and innovation, and information social responsibility, shifting from the focus on basic knowledge education to the cultivation of students’ key competence [7]. 3.2
The Content of “Computer Application Foundation”
“Computer application foundation” can be divided into basic computer knowledge, operating system, words, spreadsheets, presentations, multimedia and network application, each module bears the task to cultivate part of the IT discipline key competence. 3.3
The Discipline Key Competence of IT in Secondary Vocational
In the “computer application foundation” of the secondary vocational school, basic computer knowledge and operating system are responsible for cultivating information awareness, common office software is responsible for cultivating computing thinking, multimedia software and Internet applications can promote digital learning, flexible using of each part in their own life and future work can achieve innovation and assume information society responsibility.
4 Design of Teaching Activity Based on the teaching activity design of cultivating the key competence of IT in secondary vocational school, the teaching activity design refers to the complete “action” activity design sequence including “information, planning, decision-making, implementation, inspection and evaluation” and the six-step action-oriented teaching method including feedback [8]. The teaching design activity design is shown in Fig. 4.
Fig. 4. The flow chart of teaching activity design
242
P. Zhang et al.
The design of teaching activity is as follows: 4.1
Encourage Students to Think
At the beginning of the course, the teacher guides the students into the teaching situation, and then briefly introduces the application of theoretical knowledge and the course. After the introduction, objective analysis to the student of their reality, flexible selected case and motivate students way, make students realize the significance of IT discipline to profession, then according to the grouping situation before class to communicate within the group, the flexibility to choose at this time and sum up method, finally concludes that group integration scheme. 4.2
Practice and Encounter Problems
After the basis of teacher motivation, students have to work out some feasible plans for professional application of IT. After checking the rationality of these programs, teachers guide students to practice them. In the activity design of practice, it is found that the implementation of the program will require students to be proficient in or master certain aspects of IT. This is the problem that students usually or even later will encounter in their professional development. It is also one of the key qualities that should be truly taught to students in life. 4.3
Seeking Methods for Learning
In this stage, the teacher can guide the direction, students to find the details of knowledge; It is also possible to divide the work properly after group decision making, and to select the best method by consulting books, communicating and discussing, and conducting practical tests. You can even seek experience in similar situations on the Internet with the permission of your teacher to solve problems in practice. 4.4
Project Practice to Accumulate Experience
After the method is selected, the final method is tested to determine whether it can really solve the IT problems in the project as expected. To avoid wasting energy and time of team members. Each method experiment should be integrated into a project implementation book, including time consuming, consumables calculation, effect expectation and various situations encountered in the activity design of practice and countermeasures should be recorded. 4.5
Teachers’ Guidance, Summary and Promotion
At the completion of the practice, teachers observe and test the students’ projects, recognize the achievements of students’ efforts and areas to be developed, so as to have a good idea. By means of synchronous teaching, in addition to common practical operation demonstration, students can also use word or mind map to sort out the activity design, emphasize the details that need to be paid attention to, and inspire the
Teaching Activity Design Based on the Discipline Key
243
areas that need to be improved, so that students can have a comprehensive understanding of the overall practice of the classroom and distinguish the key points and difficulties, so as to grasp the general direction in the follow-up work. Students also need to evaluate their own projects on this basis and complete the next step to improve the discipline integration project plan. 4.6
Assignment of Homework, Teaching and Mutual Assistance
According to the cases proposed by the discipline teachers and the performance of students in class, teachers can assign students similar but characteristic homework. Students should concentrate on applying the knowledge and experience in class to the homework. Teachers must pay attention to the statistics of students’ homework completion effect, so as to provide a basis for judging their own teaching effect.
5 Note To complete the teaching activity design and imparting knowledge, need to teachers and students before class, class and after class are well prepared and work throughout the activity design. This section will analyze the matters needing attention in the development of teaching activity design from three perspectives: teacher preparation before class, student preparation before class and multiple evaluation of student. 5.1
Teachers’ Preparation Before Class
Teachers, students and teaching materials are the three most basic elements of teaching. Different teaching modes also reflect different combinations and applications of teachers, students and teaching materials and their relationship [9]. For the teaching activity design of discipline key competence of IT, teachers’ preparation should start from three aspects: content preparation, teaching preparation and student preparation, for ensuring implementation of teaching. 5.2
Students’ Preparation Before Class
Under the traditional teaching form, students prepare for class in the form of preview of textbooks or review of previously learned content. The single form and the traditional classroom will re-consolidate the content of students’ preview, which will inevitably ignore the preview work over time. On the one hand, the teaching design oriented to the discipline key competence of IT requires students to know and be familiar with the activity design of teachers in advance in order to avoid being at a loss in class, and on the other hand, the case form guides students to mobilize their enthusiasm and initiative.
244
5.3
P. Zhang et al.
Multiple Evaluation of Students
The completion of the course is by no means the end of education. The pure traditional examination paper examination mode is unable to meet the needs of reflecting the real ability of students [10], so it requires the introduction of a wide range of knowledge, a wide range of professional and personalized evaluation methods. At the time of design evaluation methods, on the one hand use traditional paper to examine the theory knowledge and IT to the student, on the other hand make skills assessment through student’s rating daily training record, finally conclude the comprehensive evaluation of students’ learning.
6 Conclusion and Future Development This paper was response to a new round of curriculum reform emphasizes the key competence, summed high school discipline key competence of IT and vocational education characteristics up to the secondary vocational IT discipline key competence and teaching activity design, it also analyzes the matters needing attention in the implementation activity design and provides a paradigm for specific classroom teaching. However, teaching activity design is both a theoretical and practical concept [11], which includes teaching preparation, teaching implementation, teaching effect and reflection. On the basis of teaching activity design, we should also consider other aspects of teaching, so as to provide program support for the cultivation of discipline key competence of IT in secondary vocational schools. Acknowledgements. This research was supported by the Major Science and Technology Innovation Project in Shandong Province of China under Grant No.2018CXGC0702, and supported by the Postgraduate Education Innovation Projects of Shandong Province of China under Grant No.SDYC15042. In addition, the authors would like to thank the reviewers for their valuable comments and suggestions.
References 1. Yan, Z., Wu, Q., Xu, C.: Evolution activity and development trend of vocational education curriculum model. Vocat. Educ. Forum 1, 48–55 (2019). (in Chinese) 2. Ministry of Education of The People’s Republic of China: Opinions of Ministry of Education on Deepening Vocational Education Teaching Reform and Comprehensively Improving Talent Training Quality. 2015-7-29 (in Chinese) 3. Lv, L., Han, J., Zhang, X.: Cultivation of discipline key quality: value appeal of curriculum implementation. Curriculum. Teach. Mater. 37(9), 18–23 (2017). (in Chinese) 4. Tan, S.: Secondary vocational education course computer application foundation. Teach. Methods Educ. 18, 87 (2014). (in Chinese) 5. Liu, B., Yan, Z., Wu, Q.: Origin and trend of curriculum development model in vocational education. China Vocat. Tech. Educ. 33, 5–11 (2018). (in Chinese) 6. Zhao, Z.: Development of Curriculum model of vocational education in China. Vocat. Educ. Forum 1, 52–57 (2018). (in Chinese)
Teaching Activity Design Based on the Discipline Key
245
7. Zhang, N., Xia, Y.: Connotation and training practice of key quality of IT in senior high school. China IT Educ. 5, 55–57 (2019). (in Chinese) 8. Cui, L.: Research on the teaching design of “six-step method” of vocational training course based on German action orientation. Hebei Agric. Mach. 4, 50–52 (2019). (in Chinese) 9. Hu, S.: The transformation of Teachers’ teaching methods based on students’ core literacy. Educ. Sci. Forum 20, 12–14 (2016). (in Chinese) 10. Xiao, G., Xiongying, W., Ronghuai, H.: Suggestions on the evaluation of information technology curriculum in senior high school for the core subject literacy. China Audio Vis. Educ. 1, 33–37 (2017). (in Chinese) 11. Kuanning, S.: 40 years of research on teaching design in China. Curriculum. Teach. Mater. Teach. Methods 38(11), 39–45 (2008). (in Chinese)
The Local University Based on Web Service Technology Finance Internal Control System Optimization Research Caiping Qin(&) College of Business Administration, Jilin Engineering Normal University, Changchun, Jilin Province, People’s Republic of China [email protected]
Abstract. In recent years, China has increased its investment in the information industry, and concepts such as Internet and cloud computing continue to attract widespread attention. The rapid development of computer technology resulting from this has brought convenience to management, among which the internal financial control of universities is one of the beneficiaries. In this paper, on the basis of the financial internal control work of local universities, the needs of the analysis, design and implementation of each functional module, to meet the system users of the financial internal control work of various functional requirements. The internal financial control system of local universities based on Web Service can meet the actual needs of daily financial work of universities and effectively improve the work efficiency of the financial department. Keywords: Web Service Internal financial control system analysis Relational database
Demand
1 Introduction With the development of information technology, the application of the internal control system relying on the network communication and database storage technology has gradually developed, making the internal control of transactions more standardized and efficient. China has issued the basic norms of enterprise internal control for related problems, but it does not clearly put forward the requirements of financial internal control management of colleges and universities, and relevant contents still lack some formal and targeted provisions to restrict the financial control of schools. Every enterprise and institution needs an efficient financial management system as a support, but also a more critical link in the whole operation [1], so the realization of financial management efficiency and information is particularly important [2]. The construction of the internal financial management system in colleges and universities can effectively improve the current situation of financial management in colleges and universities, strengthen the standardization of the whole business process, and realize the optimization and upgrading of the business process, which is of great significance to the construction of college informatization [3, 4].
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 246–251, 2021. https://doi.org/10.1007/978-3-030-51431-0_36
The Local University Based on Web Service Technology
247
In this paper, a local university as the research object, through the analysis of the research object of financial management, financial management division of different users in the company’s financial management in the role of the careful analysis, analysis to assume responsibilities and roles of individual users, users of the system is divided into financial management, financial management department leadership and three types of system administrator, for the three kinds of user demand analysis by means of investigation and research, including functional analysis and functional analysis. Based on the analysis of system work demand, the overall structure design of the system and the design of each functional module of the system are improved.
2 Method 2.1
Web Service
Web service are a service-oriented architecture whose core idea is to think of software as a Service [5]. The architecture of Web services is based on communication between the service provider, service requester, and service broker, where the three roles interact by publishing, discovering, and binding [6]. A Web Service provider is the equivalent of a Web Services provider, which can provide its own products, namely Services, to users. The Web Service requester is the consumer of the Service, that is, the role of the customer. It sends the request to the Web Service provider through SOAP. After receiving the request, the Web Service provider carries out the Service. The Web Service medium, or Service proxy, ACTS as a bridge between the requester and its provider, the Web Service provider, which is responsible for finding the appropriate Web Services provider for the Web Service requester. Figure 1 shows the architecture of the We Service [7–9].
L
rc
D D
e as
W
L
SD
D D
L
U
U
L
se a
le
SD
Service Requester
re
W
h
Service Registry
bind SOAP
Fig. 1. Web services architecture diagram
Service Provider
248
2.2
C. Qin
System Functional Requirements
The analysis of system functional requirements mainly includes the following points: first, user login functional requirements. Financial managers and system administrator users need to log in to use the system to complete their work. Second, system management function requirements. The job responsibilities of the system administrator are: publishing announcement, announcement management, managing system log, managing user information and information maintenance. Third, user information management module functional requirements [10]. Financial management personnel need to fill in personal information, modify and manage user information. Fourth, reimbursement and voucher management function. Fifth, the budget management function. Mainly used to provide financial management personnel with the use of financial purposes, the amount of feedback information, but also can generate a simple financial budget report. Sixth, employee salary management function. It mainly includes salary details inquiry, attendance record and personnel information inquiry.
3 Experiment 3.1
The Internal Financial Control System Architecture Design of Local Universities
The architecture design of university financial internal control system mainly includes two parts: first, system software architecture design. The financial management system based on Web Service technology can be divided into five layers: presentation layer, application layer, application support layer, data layer and infrastructure layer. The five-layer structure division is relatively too fine, so the business application of the financial management system based on Web Service can be divided into three layers from inside to outside, namely the presentation layer, the business logic layer and the data access layer. Such division is more conducive to the development, maintenance, deployment and expansion of the system. Second, system physical architecture design. The financial management system based on Web Service technology designed in this paper adopts B/S mode for development. System administrators and financial managers only need to log in the system through the network by using the browser to complete their respective functional requirements and participate in the financial management of the company. 3.2
Function Module Design of Financial Internal Control System in Local Universities
The essence of colleges and universities is a public institution, and profit is not its ultimate goal. Generally, colleges and universities have unified financial allocation, and their financial internal control involves the economic and business activities of many subordinate units. Therefore, it is necessary to clearly distinguish function modules in the development process of financial internal control system. The function module design of college financial internal control system based on Web Service mainly includes six parts, including user login module, employee salary management module,
The Local University Based on Web Service Technology
249
system management module, reimbursement and voucher management module, budget management module and user information management module.
4 Discuss 4.1
Environmental Analysis of Internal Control System in Local Universities
The computer configuration used in this paper is a common personal computer configuration, including computer hardware configuration and the corresponding software configuration of the implementation environment, generally, and the system development environment similar to the configuration, there will not be configuration dissatisfaction with the full financial internal control system operation problem. The internal financial control system of local universities based on Web Service technology has the following software environment: Microsoft Windows 7 as the operating system, SQL SERVER 2008 as the background database, IE 8 as the test browser, and Microsoft Visual Studio 2010 as the development platform. The specific hardware and software development environment of the system is shown in Table 1 below. Table 1. System development configuration A: System development hardware configuration Hardware name Model and configuration Service time Desktop Dell Whole process Internal Storage 2G Whole process Hard Disk Seagate250G Whole process Network Card 10/100 Mbps Whole process B: System development software configuration Number Software name Version 1 Microsoft Windows 7 2 SQL SERVER 2008 3 IE 8 4 Visual Studio 2010
4.2
Quantity 1 2 1 1 Purpose Operating System Database Support Software Compile
Analysis on the Function Module of Financial Internal Control System in Local Universities
The system user needs to use the corresponding account and password to log in the system, and the system administrator can set the account and password for the new user, so the new user can use the account and password for login module verification, and the verified user will enter the corresponding system interface. The system manager is the highest authority of the system. After logging into the system, the manager can carry out system maintenance, log management, user information management, add, modify or delete the manager and ordinary users. In addition, the system administrator
250
C. Qin
can also system users and business management personnel for information management. The reimbursement and voucher management module mainly deals with the addition, modification, deletion and inquiry of voucher information by the financial management personnel of the system, as well as the audit of financial reimbursement voucher by the leaders of the financial department of the university. The function modules included in the financial internal control system of colleges and universities are shown in Fig. 2.
System Management Module
User Login Module
User Information Management Module
Budget Management Module
Reimbursement and Voucher Management Module
System Function Module
Employee Salary Management Module
Fig. 2. System function module
5 Conclusion In this paper, based on the local colleges and universities financial management departments to do financial management work of the actual demand, has developed a financial management system based on Web Service technology, in order to solve local colleges and universities financial management departments leading personnel and financial management in colleges and universities financial, budget, etc. The problems existing in the management of, such as data query and analysis process of heavy and complicated, low efficiency, etc.
References 1. Signell, R.P., Camossi, E.: Technical note: harmonising metocean model data via standard web services within small research groups. Ocean Sci. 12(3), 633–645 (2016) 2. Olwal, T.O., Djouani, K., Kurien, A.M.: A survey of resource management toward 5G radio access networks. IEEE Commun. Surv. Tutorials 18(3), 1 (2016) 3. O’Connor, J., McCaughan, D., McDaid, C.: Orthotic management of instability of the knee related to neuromuscular and central nervous system disorders: systematic review, qualitative study, survey and costing analysis. Health Technol. Assess. 20(55), 1–262 (2016)
The Local University Based on Web Service Technology
251
4. Bianchini, D., De Antonellis, V., Melchiori, M.: The role of developers’ social relationships in improving service selection. Int. J. Web Inf. Syst. 12(4), 477–503 (2016) 5. Kemény, I., Simon, J., Nagy, Á.: Measuring quality perception in electronic commerce: a possible segmentation in the Hungarian market. Ind. Manag. Data Syst. 116(9), 1946–1966 (2016) 6. Baraković, S., Skorin-Kapov, L.: Survey of research on quality of experience modelling for web browsing. Qual. User Experience 2(1), 6 (2017) 7. Bognar, B., Krumes, I.: Encouraging reflection and critical friendship in pre-service teacher education. Center Educ. Policy Stud. J. 77(7(3)), 87–112 (2017) 8. Cihon, T.M., Cihon, J.H., Bedient, G.M.: Establishing a common vocabulary of key concepts for the effective implementation of applied behavior analysis. Int. Electron. J. Elementary Educ. 9(2), 337–358 (2016) 9. Sarens, G., D’Onza, G.: The perception of financial analysts on risk, risk management, and internal control disclosure: evidence from Belgium and Italy. Int. J. Discl. Gov. 14(2), 1–21 (2016) 10. Wang, C., Yang, P., Ye, C.: Voltage control strategy for three/single phase hybrid multimicrogrid. IEEE Trans. Energy Convers. 31(4), 1498–1509 (2016)
Teaching Activity Model of “PHP Website Development Technology” Course Reform Under the Background of Wisdom Education Rongxia Wang(&) and Baiqiang Gan Guangzhou Nanyang Polytechnic College, Guangzhou, China [email protected] Abstract. Wisdom classroom is a research hotspot in the context of “Internet +”. Compared with traditional classrooms, it focuses more on the guidance and creativity of teachers, and is committed to promoting students’ active learning. “PHP Website Development Techniques” is a comprehensive course. Students need to have basic knowledge of static web pages, JavaScript scripts, and SQL Server databases. In this article, through my own practice, listening to classes, and conducting research on students, I found that the effect of student learning is not good. It is mainly reflected in too many knowledge points that need to be applied to the past. The knowledge is too complicated. Students can’t start when completing small dynamic websites, Weakening students’ enthusiasm for learning. Based on literature research, questionnaire surveys, classroom observations, and semistructured interviews, this paper studies the relevant computer professional teaching models to understand the current status of teaching after the curriculum reform. Discussed the problems existing in the school’s “PHP Website Development Technology” learning. The causes of the main problems in the teaching process are analyzed and analyzed. This paper points out the problems of students’ low learning interest, unsatisfactory learning attitudes, traditional single teaching methods, and single computer teaching methods in schools in the computer major teaching. It further explains the deepening of the teaching reform of the course of “PHP Website Development Technology” in universities Feasibility and necessity. Keywords: Website development ideas Teaching reform summary
Curriculum reform Teaching reform
1 Introduction The wisdom course of PHP which develops and improves itself through the exchange of information and energy with the outside world. The changes that promote the reform of the PHP course are changes in the content, function, etc. Has a very important role [1]. In particular, school-based curriculum computer technology majors has its own unique background. In this way, we can understand why the motivation of schoolbased curriculum is conducive to improving school-based and initiative, and can effectively guide the significance of school-based curriculum practice [2].
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 252–257, 2021. https://doi.org/10.1007/978-3-030-51431-0_37
Teaching Activity Model of “PHP Website Development Technology”
253
Under the background of wisdom education, the course of “PHP Website Development Technology” is widespread in various schools according to its own unique advantages [3]. The biggest advantage of wisdom classroom teaching is that teachers and students can communicate more conveniently [4]. By drawing on the similarities, differences and advantages of self-developed and currently popular SPOC-based online open courses, which has both the characteristics of a learning platform and a knowledge popularization platform [5, 6].Enriched the information dissemination methods of online courses through virtual reality technology to enhance the learning experience. In accordance with teaching concepts such as the characteristics of the new curriculum, and the subject characteristics of the course, you can use various models and technology to improve the teaching quality [7, 8]. This article intends to explore how to deepen the teaching reform of “PHP Website Development Technology” in the new situation. By understanding the current teaching status of computer majors, the main problems and the root causes of the problems, actively explore effective measures for the reform of the course. Understand the teaching status of computer major, and point out the main problems in the course teaching of the course. It further illustrates the feasibility and necessity of deepening the course reform of “PHP Website Development Technology”.
2 Proposed Method 2.1
Wisdom Education
The early exploration of wisdom education was mainly from the perspective of philosophy. The wisdom education of philosophy is mainly focused on the development of human “wisdom” [9]. Wisdom education mainly includes three interrelated and different aspects: the education of rational wisdom, the education of value wisdom, and the education of practical wisdom [10]. 2.2
Course Features and Learning Process of “PHP Website Development Technology”
“PHP Website Development Technology” is a core course for computer network majors, and it is also the basic guarantee for cultivating students’ practical ability, independent learning and sustainable development ability. This course focuses on professionalism and practicality. Features of this course: 1. High comprehensiveness. This type of course requires students to have basic knowledge of computers, such as databases and program development. 2. Strong practicality. In the teaching process, students’ actual development and operation ability are emphasized. 3. Emphasize self-learning ability. The class emphasizes students’ self-learning ability and problem-solving ability, which fully reflects the teaching philosophy of “taking students as the main body and taking teachers as the main body”.
254
R. Wang and B. Gan
According to the time sequence of teaching, the teaching process is divided into several stages: 1. Before the course begins, you need to have a basic understanding of the students. After a preliminary understanding of these situations, it is necessary to review and summarize these knowledge while introducing new knowledge. 2. In the basic stage, when introducing dynamic website development technologies, compare various types of dynamic website development technologies focus on introducing development technologies, cooperate with cases. 3. In the comprehensive improvement stage, We can analyze a typical case in detail and introduce it in stages based on content, and finally the introduction and maintenance of the website, students can do it themselves by the analysis modes. 2.3
Extracurricular Tutoring Learning Ideas
Classroom teaching time is limited, and many problems encountered by students during the development process cannot be solved one by one. It is necessary to use teaching aids to register and create teaching resource sites for such courses through the interactive platform of the college’s outstanding courses. Through this website, you can learn about the relevant knowledge of the course, and the teacher can post the course information on the website in time, which makes the communication between teachers and students more convenient and fast. It is an important means of training high-skilled students and an important part of teaching. In summary, when studying a dynamic website development course, students can learn independently and interact with teachers through the information and materials provided on the course website. Teachers use the course website for student assignments and lessons, design scores are effectively managed. It stimulates students’ learning autonomy and innovation ability.
3 Experiments 3.1
Experimental Background
Based on the study of “PHP Website Development Technology” course reform teaching activity model under the background of wisdom education, this school-based course is designed based on the characteristics of the subject. Through comparison, we find the deficiencies of traditional teaching. Learning from each other, students can not only master the knowledge of this course, but also display it on the website through digital multimedia technology, so that in the future teaching process, they can adjust the teaching goals and teaching content, use discussion, The interactive and communication method is used to exchange information between teachers and students, improve students’ learning. Trial Course: “PHP Website Development Techniques”. Significance of the questionnaire: Through the questionnaire survey of students, learn about the effect of using this course as a course design.
Teaching Activity Model of “PHP Website Development Technology”
3.2
255
Subject of Experiment
Class observations were made randomly in 2 classes selected from 2017 classmates. They had a general understanding of the teaching status of “PHP Website Development Technology” and grasped the learning situation of computer major students to supplement information not available in questionnaires and interviews. The observation time is 3 weeks. Through classroom observation, it also increases the researchers’ perceptual knowledge, thereby ensuring more accurate data. 3.3
Experimental Collection
Questionnaire survey: A total of 140 questionnaires were issued and 128 were returned, of which 121 were valid. The questionnaire data will be mainly in the form of a fivelevel scale. Interview data: During the interview, use the recording equipment to collect the interview content. After the interview, the relevant information are keeped and analyzed to sort out valid information.
4 Discussion 4.1
Learning PHP to Stimulate Student Interest Is the First Step
If students are interested in PHP courses, they will take the initiative to learn no matter how difficult it is. Students tend to develop bad habits of learning, such as failing to develop a good habit of pre-class review, lack of initiative in learning, excessive dependence on teachers, not develop a sense of autonomous learning, fear of suffering, and so on. This shows how important it is for students to take a course well. The following are the statistical results of the questionnaires based on the students’ learning interests and attitudes shown in Table 1: Table 1. A survey of students’ interest in learning Survey item Answer options Are you interested in learning English A. interested B. Some interests C. Not interested D. Unclear
Statistical results 15% 47% 18% 20%
As can be seen from Table 1, only 15% of students are interested in programming; 18% are not interested; and 20% are not clear at all. If the student’s interest in learning is not strong, then the teacher will be tired in class, because it is well known that “interest is the best teacher. Most of the students’ learning attitude is ordinary, and attitude determines the learning behavior and effort level of the students. Students are the main body of learning plays a leading role in the learning process.
256
4.2
R. Wang and B. Gan
Strengthen Experimental Guidance
The teaching method of colleges and universities is the key factor. According to the actual situation of students, combined with the existing php textbook content, choose different topics, guide students to discuss, and attract students’ attention. At the same time, in the class, students will be shown the achievements of programming learning and opportunities for improvement, so that students’ interest can be enhanced in this way. The results of the questionnaire survey on the new curriculum reform teaching activity model are shown in Fig. 1:
Fig. 1. Analysis of PHP course development technology course reform teaching course improvement
As shown in Fig. 1, we see that 75% of students think that after this semester of study, you think that the level of study of this course has been greatly improved, 13% of students think that it is slightly improved, and 9% of students think that the improvement is not significant Only 4% of students think there is no change, which shows that the platform has played a great role in learning and improving their own learning level, but it still needs to be improved.
5 Conclusions This research finds out the problems by investigating the current situation of PHP teaching, analyzes the reasons, and puts forward corresponding suggestions and countermeasures based on the teaching. According to the design and development of the course, the digital learning platform was tried out, and the way of interviewing students and the questionnaire of students was selected to conduct a detailed analysis of the use of this platform. During the survey and analysis process Teachers and students’ feedback and suggestions are summarized in detail. First, from the questionnaire survey of students, we can see that the platform has a lot of shortcomings in the interest of curriculum resources and the development of new curriculum, but it is still very large. It is mainly to allow students to actively participate in the process of learning the
Teaching Activity Model of “PHP Website Development Technology”
257
school-based curriculum learning knowledge, which can play a significant role in designing and developing school-based curriculum in a timely manner. Acknowledgement. This is the phased research result of the “XAPI-based wisdom education cloud classroom higher vocational teaching activity model research” (Project No: NY2019CQJGYB-05), “Course Reform of ‘PHP Website Development Technology’ Based on Asynchronous Teaching Mode” (Project No: NY-2019CQJGYB-02) and “Research and practice of informatization teaching of modern apprenticeship courses based on TPACK theory” (Project No: NY-2019CQJGZD-01) from Guangzhou Nanyang Polytechnic College.
References 1. Franklin, F.C., Cheung, M.: Legacy interventions with patients with co-occurring disorders: legacy definitions, life satisfaction, and self-efficacy. Subst. Use Misuse 52(7), 1–10 (2017) 2. Wei, Z., Jiao, L., Jiao, Jiangbo, S.: Interactive visualization of big data in cloud classroom education. China Educ. Informatiz. 31(12), 1–4 (2018) 3. Toom, T.: Happiness and wisdom: Augustine’s early theology of education by Ryan Topping. Thomist Specul. Q. Rev. 79(2), 326–328 (2015) 4. HagitMeishar-Tal. Teachers’ use of Wikipedia with their students. Aust. J. Teach. Educ. 40 (12), 126–140 (2015) 5. Boedy, M.: Deep rhetoric: philosophy, reason, violence, justice, wisdom by James Crosswhite (review). Philos. Rhetor. 49(2), 174–178 (2016) 6. Quach, A., Levine, M.E., Tanaka, T.: Epigenetic clock analysis of diet, exercise, education, and lifestyle factors. Aging 9(2), 419–437 (2017) 7. Podgurski, M.J.: Theorists and techniques: connecting education theories to Lamaze teaching techniques. J. Perinat. Educ. 25(1), 9–17 (2016) 8. Li, W., Liu, Y.: Study on application of classroom teaching video case system based on activity ontology. Res. Audio-V. Educ. 13(5), 71–73 (2019) 9. Hui, Y.: Complexity exploration of classroom teaching activity system. Teach. Educ. Res. 19(1), 58–61 (2017) 10. Natasha Bank, Kanda, W.: Tenant recruitment and support processes in sustainabilityprofiled business incubators. Ind. & High. Educ. 30(4), 267–277 (2016)
The Application of Computer Network Technology in the Sharing of Enterprise Financial Files Lingjun Zhu(&) Qilu Normal University, Jinan 250013, Shandong, China [email protected]
Abstract. Financial Sharing breaks through the boundaries of time and space, and realizes the centralized management and information sharing of enterprise finance. The purpose of this paper is to study the application of computer network technology in enterprise financial file sharing. Firstly, we have a deep understanding of the definition of shared services and financial shared services. Secondly, we have discussed the characteristics of enterprise accounting electronic file management under the financial sharing mode from the aspects of convenience, real-time and efficiency. After studying the cloud computing model and data security architecture, we have established the enterprise financial file sharing information system. The experimental results show that all data blocks of the data file are assumed to be average Stored on different nodes of the same rack, when the number of nodes is 1, the construction of hierarchical hash tree can also be regarded as the file hash tree of data files that hash all data blocks of data files, which is the same as the construction of hierarchical hash tree without. When the data file is deleted, modified and inserted, the construction of hierarchical hash tree is more time-saving than that of unstructured hash tree. Keywords: Financial sharing service Enterprise accounting electronic file Data security system Management mode
1 Introduction With the rapid pace of economic globalization, the competition among enterprises is becoming increasingly fierce [1]. Enterprises urgently need to introduce more advanced management mode to expand production scale, reduce operating costs, enhance the competitiveness of enterprises, and strive for rapid development of enterprises [2]. At the same time, under the background of rapid development of information technology, the reform of enterprise management mode has a reliable technical guarantee [3, 4]. Some large multinational companies with strong strength, advanced technology and perfect management system took the lead in introducing the sharing service mode [5, 6]. The introduction of this model can help enterprises to reduce operating costs, improve work efficiency, enhance market competitiveness, and become an effective driving force for enterprise management reform and development [7, 8]. By analyzing © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 258–263, 2021. https://doi.org/10.1007/978-3-030-51431-0_38
The Application of Computer Network Technology
259
and evaluating the relevant business processes within the enterprise, the shared service centers of the professional institutions within the enterprise share the businesses that are regular, repetitive, similar in business types and can be standardized for management and control. They provide unified, standard and fast processing services, simplify business steps, optimize business processes, improve the degree of enterprise standardization, and promote the overall economic efficiency of the enterprise [9, 10]. L. Dong reported on a large company’s social software file sharing service. User created collections of files are related to the increased use of uploaded files, especially from one employee sharing files to another. Employees innovate in using the collection function as an “information administrator,” an urgent primary user role, where one employee creates a named collection of resources that describes the use of other employees. This role presents new work practices and new features [11]. This paper creatively puts forward the new requirements for the management of enterprise accounting archives, that is, to standardize the management system of enterprise accounting archives, to carry out the management of enterprise electronic accounting archives, to deeply tap the information of enterprise accounting archives, and to ensure the information security of enterprise accounting archives. This paper studies the related work of accounting archives management under the financial sharing service mode, understands a series of processes of accounting archives, such as signing in, preliminary examination, scanning quality inspection, archiving, review, and other basic services, such as the storage medium and archiving mode of accounting archives, and has a new understanding of the connotation and function of accounting archives under the financial sharing service mode.
2 Proposed Method 2.1
Shared Services and Financial Shared Services
(1) Shared services Sharing service is the innovation of business management and control activities in the context of globalization, network development and significant growth of business scale. Through analysis and evaluation of relevant business processes within the enterprise, the business with high frequency, repeatability, similarity and standardization can be managed and controlled by sharing service center of professional institutions within the enterprise for unified, standard and fast operation, It is conducive to the simplification and optimization of internal business processes, the unification of standards, and the improvement of the overall operation efficiency and efficiency of the company. (2) Financial Sharing Services Financial / accounting department is the first choice of shared service application in large enterprise groups, mainly because: first, improving the working efficiency of financial / accounting department and improving customer satisfaction are of great
260
L. Zhu
importance to improving the overall development of enterprise groups and improving operation efficiency; second, financial / accounting department is one of the functional departments with the most cost consumption of enterprises. Through the application of shared service, it can It can reduce the internal consumption cost of the Department, so as to reduce the overall operation cost of the enterprise group; 3. As one of the departments with the highest degree of standardization, the financial / accounting department is easier to share the application of service mode in the enterprise group; 4. The financial / Accounting Department is equipped with more perfect hardware and software facilities, and with the development and improvement of network information technology, it is easier to share the service in the enterprise group Technical requirements. 2.2
Characteristics of Enterprise Accounting Electronic File Management Under Financial Sharing Mode
(1) Convenience Enterprises scan the collected original accounting vouchers through the image management system and upload them to the financial sharing cloud platform. On the cloud platform, enterprises use accounting information systems such as UFIDA, Kingdee and SAP to process the original vouchers to generate electronic accounting vouchers, and then process the electronic accounting vouchers to generate various accounting statements, such as daily cash statements, general ledger, Sub Ledger and multi column Sub Ledger Finally, the balance sheet, profit statement, cash flow statement and other statements are generated. In addition, in the financial sharing mode, the connection mode between the enterprise and the bank changes. (2) Real-time performance The traditional accounting file management mode can’t realize the real-time update of data, but in the financial sharing mode, the original accounting voucher can be scanned and uploaded to the cloud platform, which can generate the accounting electronic voucher and generate various reports in the system, providing services for decisionmaking. Take the expense reimbursement process as an example. First, the expense data generated by employees’ consumption through credit card during business trip can be transferred to the enterprise cloud platform in real time. Secondly, employees select specific modules according to the reimbursement content and fill in according to the reimbursement amount and items; the financial department only needs to check the data on the cloud platform and the reimbursement items filled in by the employees, and if the information is consistent, the data can be delivered to the banking system, and the bank will complete the payment.
The Application of Computer Network Technology
261
(3) High efficiency Based on the mode of financial sharing, the management of enterprise accounting electronic archives can realize the integration of collection, processing, analysis and utilization of enterprise accounting electronic archives, and the archives management has high efficiency. However, the traditional accounting file management needs a lot of time and energy, such as printing a large number of electronic vouchers. 2.3
Cloud Computing Model and Data Security Architecture
Cloud computing data storage service cluster consists of network, hardware equipment, application software and other aspects; currently, cloud computing providers generally have their own data storage services based on cloud computing. Amazon provides cloud storage service products, common ones are elastic block storage and simple storage services; Amazon provides storage and maintenance services according to user needs, and charges according to usage. IBM’s cloud computing data storage is a typical network storage. IBM’s huge global data center provides users with thoughtful remote data storage. Google’s cloud data services include two categories: the first is to serve specific internal businesses, such as online documents, e-mail services, etc.; the second is that user (user) provides GDrive online storage services. In addition, cloud computing data storage services include azure data center of Microsoft company, Mozy online service of EMC company, global data center of IBM company, etc. Compared with traditional storage, the advantage of cloud computing data storage service is that it can support massive data management and maintenance, and provide multiple types of network online data services. However, the user of cloud computing data storage service is huge, and the service object and network environment are complex, which makes the cloud computing data storage service face many risks. At present, the cloud computing data storage security architecture adopted by the mainstream cloud computing providers only includes CDC (cloud computing data center), user (user) and network communication, and the audit supervision and data security work are completed by the enterprise itself.
3 Discussion 3.1
Time Analysis of Data File Construction
The experiment assumes that all data blocks of the data file are stored in different nodes of the same rack on average. When the number of nodes is 1, the hierarchical hash tree construction can also be regarded as the file hash tree construction of the data file by hashing all data blocks of the data file, which is the same as the file hash tree construction without hierarchical hash tree construction, as shown in Fig. 1.
262
L. Zhu
1600 1400 1200 1000 800 600 400 200 0
1
5
20
50
100
500
Number of nodes
Divided
Undivided
Fig. 1. Reconstruction time comparison under operating conditions
It can be seen from the experimental results that the hierarchical hash tree construction obviously saves time compared with the unstructured hash tree construction when the data files are deleted, modified and inserted; moreover, within a certain range of nodes, the construction time of the hierarchical hash tree will decrease with the increase of nodes. Therefore, the hierarchical hash tree construction algorithm used in this algorithm has obvious advantages over the previous scheme in time cost. Because SHA-1 is used as hash function of data block hash operation in this algorithm, the root node value of each hash tree is 160 bits, that is, 20 bytes. The size of storage space occupied by validation information of data files is determined by the number of nodes and racks distributed by data blocks. In the initialization phase, the CDC (cloud computing data center) temporarily retains the hash value of all data blocks. In the reconstruction phase of dynamic operation hash tree, CDC (cloud computing data center) also temporarily retains the hash value of all data blocks of the server node where the operation data block is located. In the generation stage of response m verification response information, CDC (cloud computing data center) also temporarily retains hash values of all data blocks that need to be verified for nodes, racks or files. All temporarily retained intermediate records will be destroyed with the reconstruction of hash tree and the generation of verification information. 3.2
Comparison Between Enterprise Financial File Sharing and Traditional Financial File Mode
Compared with the traditional financial file model, there is no change in the content, nature and method of financial accounting compared with the traditional financial management, but “the financial sharing model makes the financial management break
The Application of Computer Network Technology
263
the boundaries of time and space, realizes the concentration and sharing of the company level financial information by the enterprise organization, and establishes the organization, financial working mode, financial working standard and process There are great differences in requirements, efficiency and quality”.
4 Conclusions Driven by economic globalization and the wave of network economy, financial sharing has become an effective mode for many enterprises to improve management mode, carry out management innovation, improve management efficiency and enhance core competitiveness. This paper discusses the verifiability algorithm of data dynamic operation based on hash tree in three basic dynamic operations: file preprocessing, data file verification and data insertion, modification and deletion. Finally, the algorithm is analyzed and evaluated.
References 1. Luo, X., Ren, Y., Hu, J.: Privacy-preserving identity-based file sharing in smart city. Pers. Ubiquit. Comput. 21(5), 1–14 (2017) 2. Jin, J., Luo, J., Li, Y.: COAST: A cooperative storage framework for mobile transparent computing using device-to-device data sharing. IEEE Netw. 32(1), 133–139 (2018) 3. Chen, X., Huang, W., Jin, Y., et al.: Prescription analysis of electroacupuncture for simple obesity based on complex network technique. Chin. Acupunct. Moxibustion 38(3), 331–336 (2018) 4. Chakravarthy, R.A., Palaniswami, S., Sabitha, R.: Cluster header revolving technique to prolong network lifespan in wireless sensor network. J. Comput. Theor. Nanosci. 14(12), 5863–5871 (2017) 5. Zabri, Z., Nohuddin, P.N.E.: Analyzing network intrusion behavior of packet capture using association rules technique: an initial framework. Adv. Sci. Lett. 24(3), 1628–1632 (2018) 6. Banno, M., Tsujimoto, Y., Kataoka, Y.: Reporting quality of the Delphi technique in reporting guidelines: a protocol for a systematic analysis of the EQUATOR Network Library. BMJ Open 9(4), e024942 (2019) 7. Singh, M., Khilar, P.M.: A range free geometric technique for localization of wireless sensor network (WSN) based on controlled communication range. Wireless Pers. Commun. 94(3), 1–27 (2017) 8. Zarbakhsh, P., Addeh, A.: Breast cancer tumor type recognition using graph feature selection technique and radial basis function neural network with optimal structure. J. Cancer Res. Ther. 14(3), 625 (2018) 9. Sleeba, S.Z., Jose, J., Mini, M.G.: Energy-efficient fault tolerant technique for deflection routers in two-dimensional mesh Network-on-Chips. Iet Comput. Digit. Tech. 12(3), 69–79 (2018) 10. Long, Z.: On-line fault section location and classification technique for low voltage active distribution network. Proc. CSEE 37(9), 2525–2538 (2017) 11. Dong, L., Meng, T., Chen, N.: Optimized scheduling of AC/DC hybrid active distribution network using markov chains and multiple scenarios technique. Autom. Electr. Power Syst. 42(5), 147–153 (2018)
Analysis of Influencing Factors and Countermeasures of Computer Network Security Yanli Liu and Meng Cui(&) Network Information Center, Bin Zhou Medical University, Yantai 264003, China [email protected]
Abstract. Since the new century, with the gradual popularization of computer networks around the world, network security defense methods have become more sophisticated and comprehensive, but they are still unable to defend against increasingly sophisticated and increasingly globalized virus attacks. In the process of network use and promotion, the influence of viruses on the network and hackers’ attacks have become an important factor threatening network security. Especially when people use the Internet to pay funds, remittances and other online financial activities, network security has become a constant topic. Establishing an efficient network security incident response system is of great significance for the network to better play its role. Based on the research of network security monitoring, network attack defense, network data backup and recovery theory and technology, this paper studies the strategy model of network security incident response, and uses relevant theories and methods of software engineering, combined with programming languages, to achieve Related application modules of this model. This article implements a low-cost, high-performance multi-data backup and recovery system that works in conjunction with other security devices and systems in the network. The overall structure and workflow are analyzed and designed to achieve multi-point backup and Fast recovery, efficient synchronization strategy for remote data, etc. The experimental research found that the network security incident response system can effectively reduce the security risk of the internal network, with a security proportion of more than 92%. Keywords: Network security Attack defense
Computer security Network data backup
1 Introduction The application of information network technology represented by the Internet is becoming more and more popular and widespread. The application field has gradually expanded from traditional small business systems to large key business systems, such as party and government department information systems, financial business systems, and enterprise business systems. Network security has become an important issue affecting network efficiency. The openness, internationality and freedom of the Internet, © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 264–271, 2021. https://doi.org/10.1007/978-3-030-51431-0_39
Analysis of Influencing Factors and Countermeasures
265
while increasing the degree of freedom of applications, put forward higher requirements for security. This is mainly reflected in: the network technology is completely open, and anyone or any group can learn to master it. Therefore, the damage and attacks facing the network may be multi-faceted, such as attacks on physical transmission lines and attacks on network communication protocols and software. The attack may also be an attack on hardware. Cyber attacks not only come from users on the local network, but also from any computer on the network, which means that cyber security is facing international challenges. This also means that the network did not initially provide users with any technical restrictions. Users can freely access the network and freely use and publish various types of information. The complexity and variability of the network environment and the vulnerability of information systems determine the objective existence of network security threats. Cyber security construction is a major issue involving China’s economic development, social development and national security [1]. The security issues raised in the cyber age involve not only national economic and financial security, but also national defense security, political security, and cultural security. Therefore, it can be said that in the current society, without the guarantee of computer network security, countries and units have no security barriers [2]. At present, the more common Internet security defense measures include firewall technology, antivirus software technology, isolator, and security machine, which are characterized by simpler architecture and deployment, easy use, and do not require excessive human intervention. The virus has better defense and control capabilities. However, these measures also have certain problems. The firewall cannot defend against attacks initiated by the internal network, and various detection technologies have the problem of false negatives and false positives. Moreover, the encrypted data stream is invalid and antivirus the software does not have the ability to resist new attacks. Isolators and secrecy opportunities affect the normal communication flow of the network. The capacity of a single network security product is limited. To achieve dynamic and active protection of the network, different products need to be integrated to form a coordinated attack defense technology. This paper studies the off-site data backup and recovery technology for network data loss accidents. It is mainly to back up important data files to backup databases in different geographical locations through network transmission and network synchronization technology, and then use related monitoring technology to synchronize and compare these backup data with the original data. The system can complete data recovery in a short time. The network security incident response system used in this article has improved network security to over 92%.
2 Proposed Method 2.1
Factors Affecting Network Security
The increasingly serious network information security problem not only causes huge economic losses to enterprises, institutions and users accessing the Internet, but also seriously threatens national security and sovereignty [3]. To avoid network information
266
Y. Liu and M. Cui
security problems, we must first clearly understand the factors that cause this problem [4, 5]. In summary, there are three main aspects that pose a threat to the network [6]: (1) Virus infection From “worm” viruses to CIH and love viruses, the virus has always been the most direct threat to computer system security. The network also provides a fast path for virus transmission. The virus can be easily downloaded through software through a proxy server and received via email, enters the network, and then attacks the network, causing huge losses [7]. (2) System loopholes and “backdoors” The operating system cannot be 100% flawless. In addition, programmers leave “backdoors” in software [8, 9]. (3) Storage and transmission of privacy and confidential information Confidential information is stored in the network system. When a system is under attack, it can easily be collected. Similarly, when transmitting confidential information, it can be read on any intermediate site because it has to go through multiple external nodes and is difficult to verify [10]. 2.2
Network Security Policy
Security strategy is divided into two aspects: security management strategy and security technology implementation strategy [11]. (1) Management strategy Security systems need people to implement them. Even the best and most reliable system security measures cannot be taken entirely by computer systems. Therefore, a complete security organization and management system must be established [12]. (2) Technical strategy The technical strategy should propose specific measures for network, operating system, database and information sharing authorization. 2.3
Network Security Incident Response Strategy Model
The composition of the cyber security incident response strategy model mainly includes three parts. (1) Attack information recording system It mainly uses attack information recording technology and network security monitoring technology to detect suspicious network data flows and network links, and obtain and save relevant information about cyber attackers. This information can provide a reliable basis for attack defense systems and data backup and recovery systems. It can also play an important role in the analysis and countermeasure research of network attack behavior after the fact.
Analysis of Influencing Factors and Countermeasures
267
(2) Cooperative Attack Defense Technology Mainly based on the information about the attacker’s attack obtained in the attack information recording system, the honeypot technology and system vulnerability scanning technology are integrated into the defense system, and a three-dimensional attack defense system is established to achieve protection against network attack behaviors. And resist. (3) Network data backup and recovery system Its goal is to achieve a low-cost, high-performance multi-data backup and recovery system that works with other security devices and systems in the network.
3 Experiments 3.1
Experimental Environment
Specific deployment based on network security incident response system. Among them, a simulated attack host was established in the user group. Its operating system is Windows XP. The main attack method is vulnerability scanning. The software X-Scan and NMAP are installed. The network security incident response system is installed on the main server, and honeypot technology is deployed in the system, and its operating system is Windows 2000 Server. The hardware system tested for the data backup system includes the main database server and the backup database server, and there is also a client host. The two sets of database servers use Intel’s Zhiqiang processor, the main frequency is 2.66 GHz, the memory is two 4G DDR3 memories, and the hard disk capacity is 1 TB. The client uses a 1BM brand PC. The operating systems installed on both database servers are RedHat Enterprise Edition, the database management system installed on the primary database server is Oracle 10ɡ, and the database management system installed on the backup database server is SQL Server 2008. 3.2
Subjects
In this paper, by constructing an experimental network, using one of the computers on the internal network as the attack host, the internal network is attacked. The results of the attack are analyzed and compared by comparing the two states of the network security incident response system that is not open and the network security incident. 3.3
Experimental Steps
Specific deployment based on network security incident response system. Among them, a simulated attack host was established in the user group. Its operating system is Windows XP. The main attack method is vulnerability scanning. The software X-Scan and NMAP are installed. The network security incident response system is installed on the main server, and honeypot technology is deployed in the system, and its operating system is Windows 2000 Server.
268
Y. Liu and M. Cui
Secondly, test the data synchronization performance of the data backup system. The test method used is to update the data of any one of the data tables in the database. The updated data records are 500, 1000, 2000, 5000, and then based on the log. The analyzed data synchronization software detects the data in order to detect the response time of the backup database system. Finally, the general performance of the heterogeneous database is tested. The specific method is to update, delete, and add data in the main database system, and then check whether the relevant records in the backup database system have been accurately updated.
4 Discussion 4.1
Test of Data Backup Function
The functional test of the data backup system is mainly to test the accuracy of data synchronization between the main system and the backup system, Data synchronization performance, data synchronization between heterogeneous databases, etc. The test results are as follows: Sync accuracy test. After testing, all the data in the main database system and the backup database system were compared, and the data consistency was 100%. This test result shows that the data backup system has better data. Sync accuracy. Data synchronization performance test. Data synchronization performance test results are shown in Table 1: Table 1. Data synchronization performance test results Updated data (items) 500 1000 2000 Frequency 1 2.0 11.9 50.7 2 2.1 14.5 50.1 3 2.4 12.1 50.6
5000 312.5 327.6 301.4
As can be seen from Table 1 above, when the number of updated data records increases, the time required to synchronize the backup database will increase, and as the number of updated records increases, the required time trend curve will be the steepest, indicating the synchronization performance of the data backup system and Record updated data related. Considering the fact that large-scale data operations rarely occur during actual use, the test results show that the data backup system has better synchronization performance. Database general performance test. Tests have shown that the data operation results in the Oracle database management system in the main database system can be accurately updated to SQL Server 2008 in the backup database system. By comparing the results of the simulated data operations, the synchronization accuracy rate has
Analysis of Influencing Factors and Countermeasures
269
reached 100%, which proves that the data backup system can effectively achieve data conversion and synchronization in heterogeneous databases. 4.2
Intranet Overall Security Test
First, the overall security of the internal network is tested. The test tool used is the Green Alliance Aurora (AURORA) remote security evaluation system of the company. This system can diagnose the security flaws and hidden dangers of the internal network and give tests. Report. Without the network security incident response system turned on, the test results are shown in Fig. 1:
Fig. 1. Results graph of cyber security incident response system
As shown in Fig. 1 above, the test has tested all the effective equipment in the internal network, and the results show that the proportion of “very dangerous” and “relatively dangerous” has reached 50%, and the overall safety level is defined as very dangerous. After the network security incident response system is turned on, the test results are shown in Fig. 1: After the network security incident response system is turned on, the proportions of “very dangerous” and “more dangerous” are reduced to 6% and 3%. The rating is defined as “relatively safe.” The comparison between the two tests shows that the network security incident response system can effectively reduce the security risk of the internal network and improve the security level of the network. 4.3
Service Port Scan Test
During the test, the network security incident response system was not turned on in the first round. The TCP SYN scan was performed using NMAP software (Table 2). After starting the network security incident response strategy system, using NMAP again for TCP SYN scanning, the results obtained are shown in Table 3 below:
270
Y. Liu and M. Cui Table 2. Results of TCP SYN scan by NMAP 1
Interesting port on 199.111.111.21: Not shown:1710 closed port Port STAIE SERVIDE 80/tcp open http 139/tcp open netbios-ssn 445/tcp open micrisift-ds 3306/tcp open mtsql MAC Address:00:01:01:00:0B:A1
Table 3. Results of TCP SYN scan by NMAP 2
All 1800 scaned ports on 199.111.111.21 are filtered MAC Address:00:01:01:00:0B:A1
By comparing the above test results, it can be known that when the network security incident response strategy system is not activated, TCP SYN scanning performed by NMAP can obtain the relevant ports and service types on the main server, but NMAP cannot obtain the To the ports on the server and open services, the next attack cannot be performed.
5 Conclusions This article mainly tests the network security incident response system. It mainly tests the system’s overall protection function for the internal network, the system’s ability to detect and defend against external attackers’ malicious detection, and the function and performance of the data backup system. This paper researches the technology of network attack information recording. It mainly uses network security detection technology to detect suspicious network data flows and network links, and obtains and saves information about network attackers. This information can provide a reliable basis for the attack defense subsystem and data backup and recovery subsystem. It plays an important role in the analysis and countermeasures of network attack behaviors after the fact. This paper studies the off-site data backup and recovery technology for network data loss accidents. Its goal is to achieve a low cost, high performance, and other security in the network. The multi-data backup and recovery system where the equipment and the system work together analyzes and designs its overall structure and workflow. The distributed architecture is mainly used to implement the system architecture.
Analysis of Influencing Factors and Countermeasures
271
References 1. Wurzenberger, M., Skopik, F., Settanni, G.: Complex log file synthesis for rapid sandboxbenchmarking of security- and computer network analysis tools. Inf. Syst. 60(C), 13–33 (2016) 2. Wang, Y.: Food information management and security strategy of computer network. Adv. J. Food Sci. Technol. 11(12), 792–794 (2016) 3. Sommestad, T., Sandström, F.: An empirical test of the accuracy of an attack graph analysis tool. Inf. Comput. Secur. 23(5), 516–531 (2015) 4. Shuo, L., Chai, B., Zhang, X.: Collaborative filtering algorithm based on improved nearest neighbors. Comput. Eng. Appl. 39(1), 53–58 (2015) 5. Bisht, N., Ahmad, A., Bisht, S.: Application of feature selection methods and ensembles on network security dataset. Int. J. Comput. Appl. 135(11), 1–5 (2016) 6. Yadav, G., Dalal, S.: Improvisation of network security using encryption technique for big data technology. Int. J. Comput. Appl. 124(11), 27–30 (2015) 7. Hanamsagar, A., Borate, B., Jane, N.: Detection of firewall policy anomalies in real-time distributed network security appliances. Int. J. Comput. Appl. 116(23), 7–13 (2015) 8. Zhang, S., Shi, R., Zhao, Y.: Visual fusion and analysis for multivariate heterogeneous network security data. J. Comput. Appl. 35(5), 1379–1384 (2015) 9. Ma, D.X., Lin, Z.Q., Zhu, F.: Application of matroids on network security. J. Chin. Comput. Syst. 43(3), 292–301 (2015) 10. Parmar, H., Gosai, A.: Analysis and study of network security at transport layer. Int. J. Comput. Appl. 121(13), 35–40 (2015) 11. Liu, Y., Chen, W., Guan, Y.: Identifying high-cardinality hosts from network-wide traffic measurements. IEEE Trans. Dependable Secure Comput. 13(5), 547–558 (2016) 12. Degefa, F.B., Lee, D., Kim, J.: Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Comput. Netw. 94(C), 145–163 (2015)
Computer Network Technology-Based College English Oral Course Design Jie Huang1(&) and Juan Yi2 1
Institute of Technology, East China Jiaotong University, Jiangxi, China [email protected] 2 Department of Physical Education, Yuzhang Normal University, Jiangxi, China
Abstract. Sports English, as a branch of English for special purpose, has received more and more attention from professionals in the field of theory Based on traditional sports English teaching, this paper designs computer sports oral English course based on computer network technology, integrates computer network technology into college oral English teaching. Using CNKI, VIP, Wanfang database and other electronic resources, computer networks, spoken English teaching, and sports English as keywords to consult relevant research to understand the current status of research at home and abroad. The experimental results provide a theoretical basis. The experimental results show that the significance level of the Kolmogorov-Smirnov test for the sample report of PE English in the experimental group is 0.225, which is greater than 0.05. It can be seen that the teaching effect of college PE oral English based on computer network technology is very obvious. Keywords: Computer network Curriculum design
College sports Oral English teaching
1 Introduction Informationization of English education for sports majors needs to be analyzed from two dimensions. First, informationization of education incorporates computer networkbased knowledge into oral English teaching for sports majors, making students master relevant skills and adapt to society Informatization Second, it integrate computer technology into higher education to create a better learning conditions for students. In college oral English teaching, the auxiliary functions of computer have been widely recognized, and the continuous development of MOOC, micro-learning and multimedia teaching has also urged the reform of college oral English teaching model. How to effectively use a large number of media and network teaching methods, break through traditional teaching mode, and improve English teaching with high efficiency, quality and comprehensiveness has become an urgent problem for English teachers. Starting from the characteristics of multimedia and network teaching, Zou D explores how to effectively use multimedia and network based on the network multimedia English teaching model [1]. By providing students with instructional videos, the opportunity to discuss issues with teachers and other students before class, and the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 272–277, 2021. https://doi.org/10.1007/978-3-030-51431-0_40
Computer Network Technology
273
completion of the course, Bing W will become more diverse and useful. Assign tasks in cooperation with others to promote their learning. By solving some practical problems that need to be explored in the future, MOOC-based college English reform can be improved [2, 3]. From the perspective of constructivist theory, Guo analyzed the characteristics of multimedia and network technology and the specific application in college English teaching, and pointed out that the college English teaching model based on the network platform provided a new way for teachers and students to realize selflearning. Selective, interactive teaching, thereby improving the quality of college English teaching and enhancing students’ interest in learning English [4].
2 Proposed Method 2.1
Necessity of Oral English Course Design
The status quo of college PE English teaching in China has been seriously unbalanced for a long time with a low level of overall development in students’ ability, which is seriously out of the requirements of employers. Oral English has become the biggest weakness of Chinese English learners’ English ability and an urgent need to improve [5]. College English teachers have a high degree of consensus on the ability of freshmen who need to improve urgently, and basically all focus on oral skills, as well as communication-related skills such as free expression [6]. At the same time, survey results from employers and employees show that college students who enter the workplace after graduation also urgently need to improve their English skills. With the continuous reform of foreign language courses, oral English courses urgently need to change the traditional model and meet the needs of society. At present, there is a separation between language teaching and curriculum design. Language teaching, whether modern or traditional, is independent of curriculum design. Curriculum design has five aspects of decision-making, implementation, detection and evaluation, research and creation. On the one hand, the research can provide some reference for the development of general oral English courses. On the other hand, it can provide standards and directions for the teaching of oral English courses, counteract the teaching practice of oral English courses, promote the modernization of oral English teaching, and improve the long-term and inefficient nature of oral English courses in China. Objective reality [7, 8]. 2.2
Application of Computer Network Technology in College English Teaching
(1) Enriching teaching content and improve teaching efficiency Computers transmit information quickly with rich information resources. Taking this advantage into English learning, students can acquire knowledge in time, and be trained to think and explore with problem-solving abilities. Moreover, integrating computer networks into English teaching can enable students to conduct relaxed and open communication activities in the classroom. Students can communicate and learn with their classmates according to their English level, hobbies and habits, and make
274
J. Huang and J. Yi
common progress [9]. Teachers can also arrange learning tasks on the network. Students can learn on the corresponding website, adjust the learning speed according to their own conditions, and choose learning materials suitable for themselves. This not only enables students to learn, but also stimulates students to learn. Interests have improved their oral English communication skills [10]. (2) Promoting communication between teachers and students In university study, computer English teaching mode provides a link for better communication between teachers and students. Teacher can play English movies and other English materials as well as letting the students speak in English and exchange opinions. While in the traditional teaching, it is difficult for the teacher to set aside special time to exchange opinions with the students. Application of the computer not only saves teachers and students’ time, but also strengthens their communication, making students express their views.
3 Experiments 3.1
Research Object
In this experiment, a total of 50 students in two classes of the first grade of social sports major of Xi’an Institute of Physical Education are used as the research object. Class A uses computer network technology to teach oral English for sports, and class B serves as a reference group. Using CNKI, VIP, Wanfang database and other electronic resources, using computer networks, spoken English teaching, sports English as keywords to consult relevant research literature, to understand the current status of research at home and abroad, to carry out computing-based online sports English teaching experiments and Analysis of the experimental results provides a theoretical basis. In order to ensure the same progress in the oral English teaching of the experimental group and the control group, under the premise that the teaching teachers are unchanged, three months of experimental teaching will be conducted from September 15, 2019 to December 15, 2019. After the experiment, two groups of students were organized to take the PE English test, and SPSS 21.0 software was used to statistically analyze the experimental data.
4 Discussion 4.1
Analysis of Experimental Data
Analysis in Table 1 and Fig. 1 suggests that Kolmogorov-Smirnov test scores for the sample of the control group was 0.032, which indicates the scores of the control group sticking to normal distribution. Based on this hypothesis, the calculated probability is 0.037, indicating that this is a small probability event, so we reject the null hypothesis, and the English test scores of the control group do not obey the normal distribution. The significance level of the Kolmogorov-Smirnov test of the English test score report sample in the experimental group is 0.306, which is greater than 0.05. Therefore, we
Computer Network Technology
275
accept the null hypothesis, and the English test score of the experimental group follows a normal distribution. Two groups of independent samples, the pre-test data of the experimental group showed a normal distribution, and the pre-test data of the control group showed a non-normal distribution. Therefore, the two groups of independent samples were compared using the Mann-Whitney test. According to the analysis in Table 2, the value of the Mann-Whitney test is 1056.400, and the asymptotic significance (two-sided) is 0.621, which is greater than 0.05. It is a high probability event, so accept the null hypothesis, the English test scores of the experimental group and the control group are comparable. According to the analysis in Table 1, the significance level of the Kolmogorov-Smirnov test for the post-test PE English test in the control group was 0.012, which was less than 0.05. It was assumed that the pre-test PE English test results in the control group obeyed the normal distribution. Based on this hypothesis, the probability that this hypothesis appears is 0.012, which indicates that this is a small probability event, so the original hypothesis should be rejected. The control group of PE English posttest scores did not obey the normal distribution. The significance level of the Kolmogorov-Smirnov test for the sample report of sports English post-test in the experimental group was 0.225, which was greater than 0.05.
Table 1. One-sample tests Group Control group (before testing) Experimental group (before testing) Control group (after testing) Experimental group (after testing)
90 80 70 60 50 40 30 20 10 0
n 25 25 25 25
x s 63.51 63.34 62.86 77.91
± ± ± ±
17.62 18.68 13.17 18.67
Z 1.326 0.986 1.538 1.059
P 0.032 0.306 0.012 0.225
< > >
2 > 9 > 8 > 6 > 7 > 4 > 5 > 3 Achievement users 1 > 2 > 8 > 9 > 7 > 4 > 6 > 5 > 3 Exploratory users
Priority of nine functional requirements 1>2>9>8>6>4>7>5>3 6>3>8>4>9>2>1>5>7
According to the priority of KANO attributes (M > O > A > I > R), the functional requirements for FPS mobile game users are arranged (Table 2). The results show obvious similarities between different user types and requirements. The functional requirements of the first three types of users demonstrate convergence tendency, indicating that in the mobile game operations, the users pay more attention to the mustbe requirements of customizing the roles and figures, and getting equipment and rewards. In addition, they desire for the teamwork combat forms in mobile games. 2.3
Construction, Research Results and Design Principles of User Functional
This paper uses the hierarchical method to derive and construct the functional requirement model for the FPS mobile game users and proposes the corresponding design principles (Figs. 3 and 4).
282
X. Wang et al.
Fig. 3. Functional requirement model for FPS mobile game users
Fig. 4. Interface design principle for FPS mobile games
According to the priority and analysis of the functional requirements of the four types of users, the design principles corresponding to the visual interface, game layout, and interaction pattern are proposed (Figs. 3 and 4). The design of the visual interface should provide the users with rich role dressing and a diversely unified interface [4]. The requirements for the game layout are presented as the simplicity and controllability to the user interface [5]. FPS mobile game users expect the interactive pattern to be inclined toward cooperation and desire for convenience in communication, such as voice interaction (Fig. 5).
Functional Requirements of FPS Mobile Games Users
283
Fig. 5. CATCH mobile game interactive interface design
3 Design Practices of FPS Mobile Games Based on the research results, one “CATCH” capture mobile game is envisioned (the users capture the criminals by playing different roles). The mobile games maintain consistent visual style, game layout, and interactive pattern of the interface. For different users, the login interface is adopted for the users to select the type and match the same type of users [6−8]. Killer users: set up various capturing and captured roles. The shooting light points in the games are more authentic, providing killing rankings and MVP honors lists. Achievement users: more diverse scenario operations and laddered design of task difficulty, providing periodic exploration of different mobile games and setting of various tasks [9, 10]. Social users: “CATCH” aims to make the role play more authentic, and adopts the team communication + single-line microphone call + five-person team mode and designate the captain randomly (transferable) for combat deployment, in order to reduce the game frustration experience caused by different user opinions. Exploratory users: 7 + 8 + 9 (sea + air + land) scenario style is adopted, including seven major sea areas + eight Chinese aviation fields (southeast, northeast, southeast, southwest, northwest) + nine continental landscapes (town, warehouse, jungle, Gobi, grassland, desert, snow, glaciers, and volcanoes), thus providing the users with new scenario options and experiences.
4 Conclusion The key to the development and design process of FPS mobile game products is to correctly understand the functional requirements of users and products. Designers should not only develop products based on user requirements but understand the requirements of different types of users to facilitate the innovative design, adjustment, integration, and optimization of FPS mobile games and their functions.
284
X. Wang et al.
References 1. Lei, Y.: On the design of the role-playing mobile game interface. Mod. Commun. (08), 183– 184 (2018). (in Chinese) 2. Chen, M.: Visual expression of “self-experience” in first-person shooting games. Southwest University, 2016. (in Chinese) 3. Cao, C.: Design of role-playing mobile game interface. Comput. Prod. Circ. (02), 154 (2019) 4. Du, G.: Research on optimization of human-computer interface design in mobile games. Packag. Eng. 39(04), 245–250 (2008). (in Chinese) 5. Han, L.: Analysis of the composition of visual art elements in the UI design of mobile games. Art Educ. Res. (16), 72–73 (2018). (in Chinese) 6. Xu, Y.: User experience of interactive interface of mobile games—For female users. Des. (17), 44–46 (26 September 2019). (in Chinese) 7. Huang, M., Zheng, H.: Research on mobile game development based on UI design perspective. Art Gd. View (06), 104–105 (2019). (in Chinese) 8. Yu, S.: Research on the influence of mobile game socialization on interpersonal communication. Media Forum 2(08), 161–162 (2019). (in Chinese) 9. Zhou, L.: Socialization of mobile online games. Shandong University, 2019 10. Gao, G.: Research on the design and implementation of an interactive interface of mobile games. J. Beijing Inst. Graph. Commun. 26(09), 32–35, 53 ( 2018)
Assumption of Load Balancing and Multithreading Algorithm in Cloud Environment Zhuo Li1,2, Lili Ma3, and You Tang1,2(&) 1 Electrical and Information Engineering College, JiLin Agricultural Science and Technology University, Jilin 132101, China [email protected] 2 Smart Agricultural Engineering Research Center of Jilin Province, Jilin 132101, China 3 College of Food Science and Technology, Hebei Agricultural University, Baoding 071001, China
Abstract. In the cloud environment, the number of requests for user tasks may be large. It will inevitably cause server overload if the system is only deployed on a single server. Therefore, based on the user’s demand for different computing capabilities, the solution of elastic computing is presented in this system. Elastic computing is mainly divided into client and server, where the server is deployed in the same operating system environment as the system, and the client is deployed on any terminal. The server side function includes monitoring the load rate of the current system and the size of the current running files, intelligently analyzing the current number of servers owned, packaging the files to be calculated, sending and receiving files. The client side function includes receiving the file sent by the server, calling the local resource for calculation, and returning the result file after the calculation is completed. At the same time, if only singlethread is called on the server side to calculate, it will inevitably cause waste of server resources. The most effective method is to enable multithreading invocation at the same time under the load balance state, so as to maximize the utilization of server hardware resources. The application of elastic computing provides a cheap and effective way to expand the bandwidth of network devices and servers, increase the throughput, and strengthen the network data processing ability, which can meet the computing requirements of different users. At the same time of minimizing the cost increase, it can better play the role of cloud computing, and raise the flexibility and availability of network. Keywords: Load balancing
Cloud comput Multithreading
1 Introduction Load balancing is a kind of computer technology, which is used to distribute load across multiple computers (computer clusters), network connections, CPUs, disk drives, or other resources to optimize resource usage, maximize throughput, minimize response time and avoid overload. It uses multiple server components with load balancing to replace a single component to improve system reliability by increasing © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 285–290, 2021. https://doi.org/10.1007/978-3-030-51431-0_42
286
Z. Li et al.
redundancy. Load balancing services are usually performed by dedicated software and hardware. The main function is to distribute a large number of jobs reasonably to multiple operating units for execution, which is used to solve the problem of high concurrency and high availability in the Internet architecture [1]. Serial computing is the most simple and intuitive way to solve the computing problem. However, the CPU used in current servers or personal computers has already entered the multi-core era and is fully capable of handling multiple tasks simultaneously. At this point, the computing power of CPU cannot be fully utilized if serial computing is still used. Therefore, when dealing with more complex computing tasks, or facing large amounts of data, we should adopt parallel computing, using multiple threads or even multiple computers to complete the computing tasks together [2].
2 Load Balancing Solution In the high-performance intensive computing environment, users may perform a large number of operations on a certain file, and this kind of operation is bound to occupy a large number of server computing resources. Therefore, the system proposes the following solutions for satisfy users’ different computing power requirements. The system is divided into two parts—client and server [3]. The detailed process of the server and client is as follows. 2.1
Server Process
(1) The server initializes and begins to accept the client’s online request, and accepts the client’s load rate and computing power, and stores them. (2) The server starts to store computing resources and predicts the computing resources of the online server. (3) The user submits the calculation request to the server, which accepts the request and starts to enter the operation mode. (4) The server parses the user’s computing request, predicts the computing resources and computing time required for the current computing request, and matches the matching server. (5) If the Alibaba Cloud API is enabled, the server side will start to create a new server for computing. (6) Packaging and compressing the programs and files to be calculated by the user, increasing the load rate of the selected server in real time [4]. (7) After the client completes the computation, the result file is returned to the server, the server decompresses the result file and stores it in the memory, and simultaneously reduces the load rate of the client in real time. (8) Informing the user that the file calculation is complete. 2.2
Client Process
(1) The client initializes, tests the connectivity of the server, and performs an online request to the server, monitors the current load rate of the server and returns it to the server in real time.
Assumption of Load Balancing and Multithreading Algorithm
287
(2) The client receives the operation request from the server and accepts the compressed file transmitted by the server. (3) Decompressing the compressed file sent from the server, and starting to parse the file content and calling the multi-threaded computing module for operation according to the command. (4) After the operation is completed, the result file is packed and compressed, and returned to the server [5]. (5) If Alibaba Cloud’s API is enabled, the client will shut down the server to recycle resources and perform offline processing.
3 Multithreaded Computing Solution When the client successfully receives the operation request from the server, it will usually only open a single core for operation. However, with the current server’s computing power and core number, it is obviously a waste of server resources to open only a single core [6]. Now the server has at least two core processors, many of which may reach hundreds of cores. Therefore, this article discusses a method to open multithread, so as to maximize the server’s hardware resources [7]. It starts to open the multithreaded module for calculation. The specific multithread flowchart is shown in Fig. 1.
Fig. 1. Multithreaded flowchart
288
3.1
Z. Li et al.
Multithreaded Process
(1) The user starts the software and inputs the calculation speed. (2) The program starts executing and starts intelligent management module. (3) The intelligent management module first assigns a thread as the management thread to monitor and control the thread pool in real time. (4) Management threads start monitors at the same time (5) The management thread starts the monitoring program [8]. (6) Starting file processing module (7) The thread starts reading and preprocessing the file (8) When the thread finishes processing the file, release the thread and return to the fixed thread pool. (9) It will repeat steps 7, 8, 9 if there are still files that have not been processed and there are idle threads in the fixed thread pool. (10) The allocation thread starts to calculate the file if the management thread finds that the file has been processed and there are idle threads in the fixed thread pool. (11) Starting file calculation module. (12) Obtaining the total row number M of the current file and dividing the file into N blocks (N is the number of threads in the fixed thread pool), so that the number to be calculated for each block of each thread is H = M/N lines. Starting calculating the Nth block of the current file. (13) Obtaining the current thread number P (the Nth thread) and dividing H into two blocks. The first block calculates the 1 + (H/2)*(P − 1) line to the (H/2)*P line and the second block calculates the M − (H/2) * P + 1 line to the M − (H/2) * (P − 1) line (ensuring the same amount of computation for each thread) [9]. (14) After calculating the Nth block of the current file, repeat step 14. (15) Release thread. 3.2
Comparison of Time Dimensions Between Multithreading and Non Multithreading
According to the comparison of the above multithread model and the use of the peel correlation coefficient algorithm, it is found that the computing time is shortened rapidly after multithreaded computing. The specific shortening time is shown in the Running time comparison (Table 1). Table 1. Running time comparison Individual number SNP Thread Memory peaking (GB) Run time (min) 2504 1103800 1 10.11 852.21 2504 1103800 4 10.19 206.38 2504 1103800 8 10.21 143.32 2504 1103800 16 10.25 94.55 2504 1103800 32 10.31 57.01 2504 1103800 64 10.42 33.53 2504 1103800 128 10.51 19.72 Test file: ftp://1000genomes.ebi.ac.uk/vol1/ftp/release/20130502/ALL.chr22.phas e3_shapeit2_mvncall_integrated_v5a.20130502.genotypes.vcf.gz
Assumption of Load Balancing and Multithreading Algorithm
289
4 Conclusion At present, most of the load balancing solutions are too large, the configuration is too complicated and not humanized. However, the load balancing solution presented in this paper is simple in configuration, doesn’t need redundant and complex steps, and only needs to distribute the clients on each machine, which can intelligently solve the problem of single server stuck under high performance computing. At the same time, with the combination of the API of cloud servers such as Alibaba Cloud, it does not even need to arrange the client manually for many times, it only needs to arrange the client once and back up the system image simultaneously, so that the temporary server can be opened elastically for calculation [10]. When the operation is over, recycling the file and closing the temporary server to recycle the resource. This load balancing solution provides users with a cheap and effective way to expand the computing power of the server, and at the same time, it does not need too much human intervention in this process. It can meet the computing needs of different users, maximize the role of cloud computing while minimizing the cost increase, and improve the flexibility and availability of the computing system [11]. Acknowledgements. This work is supported in part by the PhD startup Foundation Project of JiLin Agricultural Science and Technology University on 2018 and the Digital Agriculture key discipline of JiLin province Foundation.
References 1. Singh, S.K., Kumar, P.: A load balancing virtual level routing (LBVLR) using mobile mule for large sensor networks. J. Supercomput. 75(11), 7426–7459 (2019) 2. Camacho-Vallejo, J.-F., Nucamendi-Guillén, S., González-Ramírez, R.G.: An optimization framework for the distribution process of a manufacturing company balancing deliverymen workload and customer’s waiting times. Comput. Ind. Eng. 137, 106080 (2019) 3. Vijayakumar, V., Suresh Joseph, K.: Adaptive load balancing schema for efficient data dissemination in vehicular ad-hoc network VANET. Alex. Eng. J. 58, 1157–1166 (2019) 4. Medhat, D., Yousef, A.H., Salama, C.: Cost-aware load balancing for multilingual record linkage using MapReduce. Ain Shams Eng. J. 11, 419–433 (2019) 5. Ling-Hong, H., Wes, L., Radhika, A.S., Saranya, D.A.R., Yuguang, X., Eric, S., Yee, Y.K.: Holistic optimization of an RNA-seq workflow for multi-threaded environments. Bioinformatics 35, 4173–4175 (2019) 6. Asyabi, E., Sharafzadeh, E., SanaeeKohroudi, S., Sharifi, M.: CTS: an operating system CPU scheduler to mitigate tail latency for latency-sensitive multi-threaded applications. J. Parallel Distrib. Comput. 133, 232-243 (2019) 7. Peña-Fernández, M., Serrano-Cases, A., Lindoso, A., García-Valderas, M., Entrena, L., Martínez-Álvarez, A., Cuenca-Asensi, S.: Dual-core lockstep enhanced with redundant multithread support and control-flow error detection. Microelectron. Reliab. 100, 113447 (2019) 8. Paola, B., Vedova Gianluca, D., Yuri, P., Marco, P., Raffaella, R.: Multithread multistring Burrows-Wheeler transform and longest common prefix Array. J. Comput. Biol.: J. Comput. Mol. Cell Biol. 26(9), 948–961 (2019)
290
Z. Li et al.
9. Kim, T.H., Schaarschmidt, T., Yang, H.J., Kim, Y.K., Chun, K.J., Choi, Y., Chung, H.-T.: Development of an IAEA phase-space dataset for the Leksell Gamma Knife ® Perfexion™ using multi-threaded Geant4 simulations. Phys. Med. 64, 222–229 (2019) 10. Nada Radwan, M.B., Abdelhalim, Ashraf AbdelRaouf.: Implement 3D video call using cloud computing infrastructure. Ain Shams Eng. J. (2019) 11. Wu, X., Wang, H., Wei, D., Shi, M.: ANFIS with natural language processing and grey relational analysis based cloud computing framework for real time energy efficient resource allocation. Comput. Commun. (2019)
Research and Design of School’s SOA Architecture Based on UDDI Yong Chen1(&) and Yue Yang2 1
Human Resources Department, Shenyang Institute of Technology, Shenyang, Liaoning, China [email protected] 2 School of Information and Control, Shenyang Institute of Technology, Shenyang, Liaoning, China [email protected]
Abstract. In order to realize the digital school, the school’s network is realized information sharing and service sharing by SOA Architecture and WEB Service, and is realized the interface in every department system using UDDI technology. In the paper, the logic architecture of digital school is presented, including the user interface layer, the service control layer, the department service layer, the business logic layer and the data persistence layer. And the UDDI system of school’s network is designed of data management module, user management module, system log, UDDI server, Web manager and UDDI client. In the paper, the process of WEB Service’s publishing and management is analyzed by the sequence program. Keywords: SOA
UDDI School’s network WEB service
1 Introduction Polytechnic school of Shenyang Institute of Technology has turned out to a full-time independent school after gaining the authorization from China’s Ministry of Education in 2004. Now, the school has Machinery and Vehicle College, Economics and Management College, Information and Control College, Art and Communication College, Energy Engineering, as well as many departments of Party Office, Academic Affairs, Student Office, Recruitment and Employment Office, and so on. At present, many schools have several colleges and departments [1], and they have some software in school, in order to convenient the office staff of the digital office. Now, there are many problems, including the different system platform, the different development tools and the different languages. And these systems are designed and developed by the core of departments’ businesses. Because of this, which these systems have perfect functions, these formed one “Information Isolated Island”, unable to effectively realize the sharing of information, and have more difficult to realize the sharing of services [2]. Because of these problems, the implementation of digital campus is very difficult. SOA is the best way to solve these complex problems.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 291–297, 2021. https://doi.org/10.1007/978-3-030-51431-0_43
292
Y. Chen and Y. Yang
2 Technology and Knowledge 2.1
Service-Oriented Architecture
Service-Oriented Architecture (SOA) is a component module. It will communicate with the different functional units (called services) of the application through the well defined interfaces and contracts [3]. The interface is defined in a neutral manner, and it should be independent of hardware platform, operating system and programming language of implementation services. This could allow to communicate with various these systems’ services by a uniform and universal way. The concrete realization of the application based on SOA has no fixed mode [4], but the core technique is the Web Service to realize the SOA [5]. Therefore, the typical structure diagram of application system of SOA is used Web Service [6], as shown in Fig. 1.
Service Publication WSDL
Service Description
SOAP
XML-Based Message
HTTP,SMTP
Quality of Service
Service Discovery Management
UDDI
Service Flow
Security
WSFL
Network Protocol
Fig. 1. The typical system structure of SOA
2.2
The Standard of UDDI
On the surface, Web Service is an application, it exposed one or more API [7] by Web accessing to the outside world, and it realized different system platforms, different developed languages, and different developed technologies to communicate between the individual software. Look from the deep level, Web Service is a new Web application branch, it is the application of self-contained, self-described and modular, and it could be described, discovered and invocation in the network. UDDI is one specific way of the currently most popular Web Service registry. UDDI is a broad and open industry standard, and it provided an independent platform method of description, discovery and integration Web Service through the Internet.
Research and Design of School’s SOA Architecture Based on UDDI
293
3 The Design of School’s SOA Architecture Based on UDDI 3.1
The Logical Design of SOA
The school’s information system of Polytechnic school of Shenyang Institute of Technology basic implemented by department. But these systems are established as the core of the department’s businesses and relatively independent. Moreover, the implementation platform and language of each system are different. Therefore, interoperability problems have inevitable existence. If systems are called by each other, one way is that the service’s provider the needed data to other users on the persistence layer. However, this may cause the reducing of system’s security. The other way is designed system’s interface to each specific situation. This could guarantee the system’s security, but may separated design interface according to each application. Every interface must be separately maintenance and very cumbersome. Moreover, with the increasing of interfaces’ numbers, the whole system will be more and more complex. It is very confused. However, if the SOA idea is adopted to establish the information system, its architecture is much clearer. Every application system provides Web Service, and Web Service is independent of platform and language. Every system provides or uses services by the Enterprise Service Bus(ESB). In this way, the architecture of the whole system is simple, and maintenance is easy. As the Fig. 1 shows the kind of confusion, the situation became much clear as shown in Fig. 2. Thus, in Polytechnic school of Shenyang Institute of Technology, the idea of SOA could greatly reduce the system’s complexity.
Fig. 2. The new relationship of application systems
The technology of SOA based on component of Web Service, and its built the whole system flexible and efficient. Based on the provided standard Web Service of every department, the whole school information system integrated and shared services between systems, that could be easy to realize in the SOA framework. The realization of the whole system changed from programming as the core to configuration as the core. The design idea of SOA on digital school in Polytechnic school of Shenyang Institute of Technology is that: Defining a university data called structure of school
294
Y. Chen and Y. Yang
information system, that accords with the characteristics of school. Every system will provide the function to others as Web Service, and these Web Services registered in the UDDI system of Polytechnic school of Shenyang Institute of Technology. The users queried the needed Web Service in the UDDI system of Polytechnic school of Shenyang Institute of Technology, required many information of the description of function, the calling location and the calling parameters, and could take these Web Services to apply to the own system. According to the SOA idea, the logic hierarchical architecture on digital school in Polytechnic school of Shenyang Institute of Technology is designed as shown in Fig. 3:
The User Interface Layer The Service Control Layer The Department Service Layer The Business Logic Layer The Data Persistence Layer
Fig. 3. The logic hierarchical architecture on digital school system
The User Interface Layer is the directly communicated local between the application system and system users. The user interface adopted the module design, maybe the application of single version, also maybe the application of Web application based on the browser, or even be the application of mobile terminal program. However, they have a common characteristic that is using Web Service to access the cross system. The purpose of this is to reuse a configurable component and adjustable mode, in order to reduce the building of application system and the complexity of using the user interface. The Service Control Layer is used to process the logic relations of Web Services, including the publication and searching of Web Service, the routing and updating of Web Service, and so on. The Department Service Layer is called to the internal service. The department service is that one application system provides the Web Service to use by other systems. Because, in Polytechnic school of Shenyang Institute of Technology, every application system built by the department as unit. So every system provided the services to be called the department service. The Business Logic Layer is a set of internal data and functions of service’s provider, and it can also be a modular unit, but these modular units can be combined to form a complete function. The services are the business logic extensions. For services’ users, the business logic layer is the actual using place of the outside service, that is to say, calling other service is to complete their functions in the layer.
Research and Design of School’s SOA Architecture Based on UDDI
295
The Data Persistence Layer is a place of saving application system’s data. The requirement of system architecture of SOA is cross-platform and cross-application system. For the data of depositing in different position, the data must be like storing in a single database, according to access by certain rights. Originally the distributed backstage data of every application system logically formed a unified data persistence layer. We can call it as “Distributed Data Persistence Layer”. 3.2
The Design of UDDI System
As an important part of SOA architecture, UDDI loaded the main “spine” task of the whole system. Therefore, in the construction of digital school of Polytechnic school of Shenyang Institute of Technology, the realization of UDDI is an important ring. In Polytechnic school of Shenyang Institute of Technology, the register center of UDDI service is based on UDDI v3.0.2. It provides the interface of Web and API. Its core function is definition of data structure, querying and publishing based on the data structure, and many API definitions. The UDDI system of Polytechnic school of Shenyang Institute of Technology includes the following modules, such as Data Management Module, User Management Module, System Log, UDDI Server, Web Manager and UDDI Client. 3.3
The Business Logical Design
In system, the process of the Web Service’s publication and management is as follows: First, the system could judge whether the user is logged in or not. If the user does not login, the user could send the user’s information to the application server by the client of Web Server’s provider. If the system connection fails, the system directly returns, gives the connection failure information and calls to the end. The application server sends the user’s information to the UDDI server [8], UDDI server queries the user and checks the password in the background data source. According to the queried results, the system returns the information, right or wrong. The UDDI server returns the results to the application server. The client of Web Service provider receives the results by the application server. If the validation is passed, the system could land successfully [9]. If the validation has errors [10], the system could login failed and call to the end. When the validation is successful, at the same time, the background data source could return the Web Service list of the user corresponding to the UDDI server. The UDDI server could return the service list to the application server. The application server could return the Web Service list in the form of SOAP messages to the client of Web Service’s provider. According to the returned service list, the Web Service’s provider decides the next step operation (modify and delete service, or create new services), and these operations send to the application server by the SOAP message. According to the received operation, the application server could call the corresponding API to the UDDI server. According to the specific calling situation, the UDDI server accesses the background data source. The background data source returns the operation’s results to the UDDI server. The UDDI server returns the results to the application server. The application server
296
Y. Chen and Y. Yang
returns the results by the SOAP message to the client of Web Service’s provider. The sequence diagram of the process of Web Service publication and management is described as shown in Fig. 4.
Fig. 4. The sequence diagram of the process of Web service publication and management
4 Conclusions In order to realize the digital school, the school’s network is realized by SOA Architecture and WEB Service, and is realized the interface in every department system using UDDI technology. Based on the SOA architecture, the logic architecture of digital school is presented, including the user interface layer, the service control layer, the department service layer, the business logic layer and the data persistence layer. Because the UDDI played a decisive role in the digital school system, the UDDI system is designed according to the UDDI version. In the system, the process of WEB Service’s publishing and management is analyzed by the sequence program of UML. By the design could realize the effective sharing of information and service. In Polytechnic school of Shenyang Institute of Technology, every department and college own their software system. While each system has perfect function, every system formed one “Information Isolated Island”. The digital school system adopts SOA architecture, provides the logic module of digital school system based on SOA, including the user interface layer, the service control layer, the department service layer, the business logic layer and the data persistence layer. Because the UDDI played a decisive role in the digital school system, the UDDI system is designed according to the UDDI v3. The aim of digital school system is to realize the effective sharing of information and service.
Research and Design of School’s SOA Architecture Based on UDDI
297
Acknowledgment. Fund Project: Research on Key Technologies of Intelligent Logistics System Based on Multi-Agent (SIT-i5201801).
References 1. IBM. What is Service-Oriented Architecture (SOA). http://www-128.ibm.com/ developerworks/webservices/newto/#1 2. Anand, S., Padmanabhuni, S., Ganesh, J.: Perspectives on service oriented architecture. In: Proceedings of the 2005 IEEE International Conference on Services Computing (2005) 3. Dang, G., Cheng, Z., Setal, J.: A service-oriented architecture for tele-immersion. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, Hong Kong, China, pp. 649–649 (2005) 4. Gartner Market Investigation. http://www.gartner.com/resources/125800/125868/gartnerspo siti.pdf 5. Gartner SOA Definition. http://www.gartner.com/DisplayDocument?doc_cd=114358 6. Fang, J., Wang, T., Shi, Z., Xie, J.: UML-based workflow modeling. Comput. Eng. Des. 25 (9), 1572–1575 (2004) 7. Zhang, L., Zhao, H.: Research on workflow modeling based on UML activity diagram. Comput. Appl. 23(5), 28–31 (2003) 8. Zhao, H.-J., Sun, Z., Zhang, L.: The method for modeling workflow of UML-based activity diagram. Yantai Norm. Univ. J. (Nat. Sci.) 18(4), 241–246 (2002) 9. Ouyang, Y., Xiong, Z., Hou, Y.: Application research of UML activity diagram in workflow process modeling. Comput. Eng. Des. 25(9), 1479–1481 (2004) 10. Qiu, Z.: UML and Rational Rose 2002 from Introduction to Mastery. Publishing House Electronics Industry, Beijing (2002)
Application of Mixed Teaching Mode Under “Rain Classroom” Information Technology Jun Luo1 and Yulan Yu2(&) 1
School of Management, Guangdong University of Science and Technology, Dongguan 523083, China 2 Department of Psychology, Guangdong Medical University, Dongguan 523808, China [email protected]
Abstract. After the wave of educational reform of flipping classroom and online learning platform, the educational information technology revolution based on hybrid teaching mode is in full swing. “Rain Classroom” integrates PPT multimedia education technology, MOOC Internet resources and mobile phone Wechat to bring convenience, practicability and operability for teachers and students to carry out teaching reform. At the same time, teaching resources such as MOOC video, PPT courseware, exercises and cases can be shared between teachers and students. Students can study independently, collaboratively and discussively at any time and anywhere before class. Real-time answers in class, interaction between bullet and screen, labeling without understanding and data analysis can effectively digitize face-to-face traditional teaching. Network teaching is a perfect mix. The mixed teaching mode based on “rain classroom” information technology runs through all the teaching links before, during and after class, and embodies “learning-oriented”, which helps to realize self-learning and mutual learning, understanding and internalization of knowledge, practice of knowledge to the application of knowledge. Keywords: Rain classroom Teaching mode
Mixed teaching Information technology
1 Introduction With the reform and research of higher education informationization, online learning platform represented by MOOC has unique advantages such as high-quality “famous school + famous teacher + famous course” resource curriculum, convenient collaborative communication and interaction, but it can never replace classroom teaching which directly communicates with teachers face to face. Under the background of “Internet +”, mixed teaching which combines MOOC, flip class and traditional teaching has become the main teaching mode at present. Mixed teaching mode not only requires teachers to play a leading role in guiding, inspiring, monitoring and controlling in the whole teaching process, but also requires students to have initiative, enthusiasm and creativity in learning. The smooth development and effective implementation of the educational information technology revolution based on the hybrid teaching model has © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 298–304, 2021. https://doi.org/10.1007/978-3-030-51431-0_44
Application of Mixed Teaching Mode
299
led to a new round of educational and teaching reform [1]. Recently, educational information technology platforms such as “Rain Classroom” led by Tsinghua University, “Classroom School” developed by Peking University and “Cloud Classroom” developed by Netease Company have emerged in China.
2 Discussion on the Direction of Information Technology Reform in Education and Teaching Based on “Rain Classroom” 2.1
Educational Information Technology Platform for Facilitating Teachers’ Teaching and Students’ Learning
For teachers’ teaching and students’ learning, convenience, practicability and operability are the fundamentals of measuring whether educational and teaching information technology platform can be successfully promoted and applied. The “Rain Classroom” led by Tsinghua University is free to use. It integrates PPT multimedia education technology, MOOC Internet resources and mobile phone Wechat to bring convenience for teachers, students and social educators to carry out teaching reform. Secondly, the page design of “Rain Classroom” conforms to the familiar operation menu of modern people, and provides video resources of famous schools at any time. It realizes zero cost of teaching and learning, and has strong practicability [2]. At the same time, teachers can push teaching resources such as courseware, video and exercises to “rain classroom” at any time, while students can learn independently anytime and anywhere through mobile phones, which provides convenience and operability. 2.2
Educational Information Technology Platform to Promote Easy Interaction Between Teachers and Students
Rain Classroom establishes a bridge of communication and interaction between preclass preparation and in-class teaching. First of all, real-time interactive communication between teachers and students can be carried out through the settings of “Rain Classroom” bullet curtain and misunderstanding. In addition, “Rain Classroom” can provide comprehensive and multi-dimensional data interaction support [3]. Individualized reports of students’ learning progress and learning situation, such as courseware preview, homework completion and test completion, are helpful for teachers to quantitatively understand and objectively evaluate students’ learning effect, grasp students’ learning situation, and carry out targeted teaching design and implementation. 2.3
Educational Information Technology Platform for Promoting Students’ Learning Autonomy and Its Effect Evaluation and Feedback
Educational information technology platform needs to strengthen students’ active participation in learning in class and after class, so that students can play the
300
J. Luo and Y. Yu
consciousness of subject and master in learning. Teachers’ courseware, videos, cases and other teaching information and information are shared in students’ mobile phones at “Rain Classroom” educational information technology platform, and students’ individual views and doubts also can be shared in real-time in “Rain Classroom”. It is easy to promote students’ autonomy in learning. Under the background of rain classroom, classroom roles can change from one to another at any time and it is convenient to adjust the classroom atmosphere, and arouse the autonomy and interest of learning in students [4, 6]. Of course, teachers can push knowledge quizzes, timely adjust the teaching progress according to the results of the tests, and open the voting function of “rain classroom” to understand students’ evaluation of the teaching effect.
3 Research on the Application of Mixed Teaching Model Under “Rain Classroom” Information Technology in Higher Education 3.1
Design of a Mixed Teaching Model Based on “Rain Classroom” Preclass Preview Stage
3.1.1 Analysis of Learning Situation The purpose of requiring students to preview is to prepare for better learning in class. It is an effective way to cultivate students’ self-study ability and independent thinking. However, for some college students in modern, especially for Application-oriented Universities and vocational colleges, learning objectives are not clear, learning motivation and motivation are not strong, autonomous learning initiative is not ideal, and the probability of requiring them to take textbooks for pre-class preview is almost lower. 3.1.2 The Design of Hybrid Teaching Model in Pre-class Preview Stage Based on “Rain Classroom” Tools for preview: The mobile phone with the public number of Rain Classroom has been installed. Students can make rational use of their time to carry out preview before class at any time and anywhere [7, 9]. Preview platform: Class Wechat Group under the Public Number of “Rain Classroom” build collaborative learning, discussion learning and teacher-student instant messaging exchange and transmission learning in classmates before class. How to preview: Watch the video released by Rain Classroom. Preview of reading style can not guarantee the continuity and time for modern college students. Therefore, it is better to use video preview. Teachers need to download the corresponding excellent teaching video resources in advance on the Internet, micro-lessons or MOOC platforms. Of course, teachers can also choose to record a short video explaining knowledge points for students to preview. Mixed teaching methods in pre-class preview stage: firstly, knowledge points are taught by video preview; secondly, for the important knowledge points in the video, embedded selection questions are used to strengthen students’ mastery of the knowledge, so as to enter the next knowledge point of video preview; thirdly, Wechat group
Application of Mixed Teaching Mode
301
issues exercises after preview to activate classroom discussion in the “rain classroom” class. Finally, class members spontaneously organize collaborative and discussionbased teaching in Wechat group, and teachers can also participate in learning exchanges between teachers and students after preview if convenient [10]. 3.2
Control of the Mixed Teaching Model in the Teaching Stage of “Rain Classroom”
3.2.1 Analysis and Control of Learning Situation Firstly, when there is no suitable teaching video or the teacher does not produce teaching video in the preview stage of this lesson, it is necessary to produce PPT to teach knowledge points in the lesson. Secondly, the teacher makes statistics and analysis of the relevant data of preview before the lesson, determines the difficulties of teaching in the lesson, optimizes and designs the teaching contents and methods in the lesson. Aimed at the design of the mixed teaching mode, such as understanding the difficulties and internalization of intensive training. 3.2.2 Control of the Mixed Teaching Mode in the Lecture Stage First of all, the mixed teaching of teaching means. With the help of teachers’ charming oral and body language, blackboard books, reference books, textbooks, electronic audio-visual equipment and multimedia network technology (micro-lessons, mulessons), the selection, combination and control of teaching means are carried out. Secondly, the mixed teaching of teaching methods. PPT courseware will be shared under the “rain classroom” to carry out the selection, combination and control of teaching methods such as lecture method, competition teaching method, case discussion method, task-driven method, role-playing method, game participation method and simulation training method. Finally, it is the mixed teaching of teaching technology. Courseware can easily insert video, audio, text, graphics, animation and so on to realize real-time sharing with students’ mobile phone clients under “Rain Classroom”. At the same time, students can not only play curtain or do not understand to tell the teacher, but also read and study independently on the mobile phone directly in the process of teacher’s explanation. They can also flexibly look back at the knowledge points explained by the teacher in front of the PPT courseware on their own mobile phone or combine the knowledge points in the book to deepen their knowledge acquisition. 3.3
Construction of a Hybrid Teaching Model Based on the Discussion and Interaction Phase in Rain Classroom
3.3.1 Analysis of Learning Situation At present, students have become accustomed to passive listening in College classes, and their enthusiasm to participate in discussion and interaction is not high. At this stage, how to arouse students’ interest or enthusiasm in participation is the key to the success of the hybrid teaching model.
302
J. Luo and Y. Yu
3.3.2 Construction of the Mixed Teaching Mode in the Stage of Discussion and Interaction in Class PPT courseware sharing on students’ mobile phone with the help of “Rain Classroom” is the basis of the hybrid teaching mode of discussion and interaction stage in class. Firstly, with the help of the bullet-screen interaction function of “Rain Classroom” and “Understanding” button, teachers can grasp the students’ learning situation or effect at any time, and organize and explain a certain knowledge point according to the statistical situation. Secondly, after the teacher teaches an important knowledge point, he can set questions for students to answer on the spot. With the help of the mixture of the real-time answers of “Rain Classroom” and the welfare activities of the red envelope, the students can get the encouragement of the red packets quickly and accurately. They can also mix the real-time answers with the competition scores. That is to say, the winning results of each competition can be awarded 5 points to 1 points in the usual scores. The results of students’ participation in real-time questions are immediately collected on teachers’ mobile phones to form statistical data. If the students’ wrong answers are high, teachers will adjust the teaching progress in time, retell and strengthen understanding. The combination of real-time answers and incentives can enhance students’ interest and enthusiasm in learning. Finally, classroom discussion, interaction or answering questions are combined with random roll-call of “Rain Classroom”. Students concentrate on rolling class lists with photos and expect the appearance of lucky stars. This effectively mobilizes students’ classroom attention and joins in class learning, interaction and discussion. 3.4
Construction of Hybrid Teaching Model Based on Knowledge Understanding and Internalization in Rain Classroom
3.4.1 Analysis of Learning Situation The knowledge points learnt by students in school can be regarded as “knowing but not knowing why”. That is to say, the knowledge points learnt are not deep enough to understand and internalize, but can not be derived from the brain when they meet the appropriate application occasions, and can be flexibly applied to the actual needs of society. 3.4.2 The Construction of the Hybrid Teaching Model in the Stage of Knowledge Understanding and Internalization To strengthen the understanding and internalization of the knowledge learnt by students, on the one hand, we should pay attention to students’ independence and subjective consciousness, and strengthen students’ experience and perception. On the other hand, we need to carry out a wide range of heuristic, discussion and participatory mixed teaching mode. Therefore, Mixed participation and experiential teaching methods are necessary, such as appropriate real case scenarios, role-playing and game experience in the PPT courseware of “Rain Classroom”. Students can not only use mobile phone to read and understand, but also flexibly go back and look at the knowledge points explained by teachers in PPT or combine with the knowledge points in textbooks, and gradually establish the relationship between theory and practice in their minds. For some knowledge points, teachers can use the voting link of “Rain
Application of Mixed Teaching Mode
303
Classroom” to enhance the interaction of classroom teaching and promote the understanding and internalization of knowledge. 3.5
Shaping of the Hybrid Teaching Model Based on “Rain Classroom” After-Class Exercise and Application Stage
3.5.1 Analysis of Learning Situation Students are basically a two-point life between home and university. After all, they have relatively little contact with the society and less access to professional knowledge points in the social application. 3.5.2 Shaping the Mixed Teaching Model of Exercise and Application After Class Students’ autonomy should be taken into account in the practice and application after class. There is no uniform and standard answer in the design of exercises or applications arranged by teachers after class. Students are required to complete the exercises independently, thoughtfully and creatively according to the knowledge points they need to master. Secondly, using “rain classroom” to build a display platform for students’ application results, teachers and students can comment under the “rain classroom”, which facilitates timely reflection and error correction, and further promotes knowledge internalization and application transfer. At the same time, it can stimulate students’ learning motivation and further enhance their interest in learning.
4 Conclusion “Rain Classroom” integrates PPT, MOOC and Wechat. Teachers can conveniently push MOOC videos, cases and thinking exercises to students’ Wechat before class, so that students can carry out independent preview, collaborative and discussion-based learning at any time and anywhere, and realize the mixed teaching in the pre-class preview stage. In the course, PPT courseware, videos and cases are shared in multimedia and Wechat mobile terminals. Real-time answers, bullet-curtain interaction, ignorance of identification and data analysis are realized for knowledge points. It effectively mixes face-to-face traditional teaching with digital network teaching. The mixed teaching mode based on “rain classroom” information technology ultimately realizes autonomous learning and mutual learning, knowledge internalization, knowledge practice to knowledge application. The success of the application and practice of the hybrid teaching mode based on “rain classroom” information technology depends on the teachers’ daring to face new challenges firstly and attracting students’ active learning and participation from the level of teaching design. Secondly, students are required to attach importance to and be willing to take the initiative to learn. In short, “Rain Classroom” information technology runs through all the teaching links before, during and after class. It is convenient, practical and operable for teachers and students, and is conducive to the smooth development of mixed teaching mode.
304
J. Luo and Y. Yu
Acknowledgements. The 13th Five-Year Plan of Education Science in Guangdong Province in 2018(2018GXJK060). Educational and Teaching Research Topics of Guangdong Medical University in 2017. “Quality Project” of Guangdong University of Science and Technology in 2019: Research on the Application of Mixed Teaching Mode Based on “Rain Classroom” in Higher Education (CQ2019074).
References 1. Min, D.: Research on the application of “rain classroom” mixed teaching model under the background of “Internet +”. J. Higher Educ. 9, 100–102 (2019). (in Chinese) 2. Xinhui, P. Na, Z., Xue, Y. et al.: Teaching practice of “rain classroom” under the background of mixed teaching. Health Vocat. Educ. 36(14), 69–70 (2018). (in Chinese) 3. Fangzheng, G.: Research on the teaching classroom model in colleges and universities based on Mooc and “rain classroom” under the “Internet +”. J. Anyang Norm. Univ. 5, 126–128 (2018). (in Chinese) 4. Liang, D.: The design and practice of the mixed teaching mode based on “rainy classroom”. J. People’s Public Secur. Univ. China (Natural Science Edition) 2, 105–108. (in Chinese) 5. Yanfang, F., Hao, Y.: The mixed teaching practice and effect analysis of Putonghua phonetics training based on “rain classroom”. China Educ. Informatiz. 19, 68–73 (2018). (in Chinese) 6. Hongxia, W.: Practice of mixed teaching model of “program design basics” based on rain classroom. J. Zhejiang Inst. Water Resour. Hydropower 30(3), 86–90 (2018). (in Chinese) 7. Liping, Z.: Research on mixed teaching mode based on rain classroom. J. Higher Educ. 5, 115–117 (2019). (in Chinese) 8. Jie, Y., Weili, W.: Empirical research on the application of WeChat rain classroom blended learning model in college teaching. High. Educ. Explor. 9, 50–54 (2017). (in Chinese) 9. Hongye, L.: Research on mixed teaching model of university computer course based on micro-class and rain classroom. China Manag. Inf.Ization 22(14), 195–196 (2019). (in Chinese) 10. Rong, L., Jin, Z.: Practice of flipping classroom teaching model based on “rain classroom”. Educ. Teach. Forum 34, 155–156 (2019). (in Chinese)
Design and Development of Self Built Database of University Library Based on Cloud Computing Ziqi Jia(&) Sichuan Vocational and Technical College, Suining, Sichuan, China [email protected]
Abstract. Cloud computing technology is a series of fusion products of computer technology development to a certain stage, which will bring revolutionary and far-reaching influence to various fields including digital library. The purpose of this paper is to study the design and development of self built database of University Library Based on cloud computing. Firstly, this paper summarizes the concept of the impact of digital resource integration in detail, focusing on the analysis of the technical characteristics and basic structure of cloud computing technology. This paper puts forward the structure of database model, and analyzes the design of self built database system of personalized University Library Based on the demand of users and system performance. According to the requirements of the project development, the experimental results show that in the data integration module, column storage stores and queries the data in columns. Each table consists of a set of page chains, each page chain corresponds to a storage column in the table, and each page chain stores one or more values of the column. HNG index is a combination of b-tree index and bitmap index in the storage. The data is stored in bit mode and sliced vertically according to bit. A large part of data storage can be compressed due to sparsity, and I0 can be reduced. It is suitable for parallel calculation of total and average values. Keywords: University library computing technology
Database design Data integration Cloud
1 Introduction Cloud computing is an important innovation of computer resource disclosure under the business model [1, 2]. Through cloud computing, users will be liberated from the heavy, complex and error prone computer resource management, only paying attention to the business logic [3, 4]. The separation of business logic and computing resources will greatly reduce the complexity of enterprise informatization [5, 6]. More importantly, the service integration and on-demand supply brought by cloud computing will greatly improve the utilization of current computing resources, reduce the energy consumption of services, and effectively solve the problem of computing resources errors. The emergence of electronic database resources has changed the way in which library users obtain information mainly from paper resources. Digital resources, with its © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 305–311, 2021. https://doi.org/10.1007/978-3-030-51431-0_45
306
Z. Jia
unique advantages, are more and more favored by library users. Colleges and universities also began to attach importance to the creation and development of characteristic databases. Although some achievements have been made, there are still many deficiencies. Even some universities are still creating characteristic databases, but they are in a blank stage [7, 8]. Therefore, our university library must further strengthen the construction of characteristic database, which is not only the need to improve the development level of university library, but also the need to enhance the comprehensive strength of University. The combination of university library database and cloud computing is of great practical significance [9, 10]. Ron Babin discusses Google’s and Microsoft’s cloud services for educational institutions, and compares the implementation experience of six Canadian universities. However, while acquisition costs are minimal or nonexistent, faculty, students, and management academics are often reluctant to delegate all their emails, documents, and schedules to a complex, global, for-profit third party. The most important thing for cash strapped university managers is to adopt third-party cloud services and use other internal services carefully to manage privacy issues. Finally, from the internal to the cloud service, the university needs to shift to the cloud aware governance mode sensitive to information privacy and security issues. The results of this study may contribute to a better understanding of the benefits, advantages, risks and challenges of the University’s cloud computing program and serve as an objective source of information for other public sector institutions considering implementing cloud services [11]. Magdalena Jara, taking the Undergraduate Library of a university in Chile as an example, discusses the use mode of print and digital resources from two aspects of discipline and study years. In order to explore this point, we carried out quantitative analysis, including descriptive analysis of contingency table, chi square test, t test and multiple linear regression. The results show that the use of library by college students does not follow a common pattern, but is different in different subjects. The paper also shows that access to digital resources can not replace the use of printing materials [12]. The innovation of this paper lies in the combination of cloud computing, library and public media. As the main source and integration body of resources, the library uses cloud computing theory and technology to integrate various types of mass data on the public media platform, so as to build a public media database and make up for the gap of public media data resources in the collection resources of university library. In the cloud computing environment, the process of resource integration is more complex. It is not only how to store the type and quantity of data, but also how to quickly find the target data in many data.
2 Proposed Method 2.1
Impact of Cloud Computing on Digital Resource Integration
At present, the digital resources of domestic digital libraries are relatively independent and the rate of repeated construction is too high. How to store the digital information resources to realize the real sense of sharing is an urgent problem for experts in the industry to think about. The emergence of cloud computing will change this situation.
Design and Development of Self Built Database of University Library
307
The development of cloud computing is conducive to information sharing. Its fundamental starting point is information fusion, storage and sharing through network services. In the era of cloud computing, the information resources in domestic digital libraries will be aggregated into the “cloud” storage server to realize the comprehensive sharing of various information resources, and then improve the utilization rate of digital libraries. At this time, librarians only need to manage and plan digital resources. With the rapid development of computer network technology, users can get the information resources they want at any time and any place through mobile terminal equipment. 2.2
Database
Database is a collection of information organized in a certain structure on a computerreadable medium. It is the most common form of developing and utilizing information resources. Strictly speaking, it is a collection of interrelated data and storage in a certain way. Database is the oldest form in history. Generally speaking, the electronic resources of library collection are mainly the network CD-ROM ordered or rented by the library and the database purchased and built by the library itself. 2.3
System Requirements Analysis
(1) User demand analysis There are three main objects that the library management system faces: the first kind of system manager, the second kind of library manager and the third kind of reader. Relative to the readers, the most concerned problem is how to find out the books they borrowed more easily. You can check the number of books that have been borrowed, whether there are overdue books, and whether there are books you need in the new book recommendation. As a librarian, the primary need is to understand the collection of books, query the information of readers, the classification of books, and change the information and types of readers. Finally, the system management staff is responsible for the overall statistics and maintenance of all kinds of data, as well as data backup. This operation can ensure the security of all kinds of data. At the same time, it is also necessary to configure the operation environment of the system and set the permissions of different users. (2) Requirement analysis of system performance The development and design of the library management system is to implement the unified management in many aspects, including the realization of reader management, book management, loan management, data maintenance, etc. only to meet the needs of all kinds of users, can it be regarded as a qualified system, and it also requires that the system operation is simple and convenient, easy to learn, and the system performance is good. Therefore, when developing the system, we must first consider the overall performance of the system, which has three aspects: 1) The whole interface is friendly, simple and clear. It can adopt different management forms for different users, human-computer interaction, the simpler the
308
Z. Jia
interface of the operating system, the better. It can be easily completed only with mouse and barcode scanner. 2) The system runs faster. For the operation of users with different requirements, the system can make fast and accurate response in the shortest time, and has strong data processing ability to avoid the generation of random code. 3) Excellent data security performance. In case of wrong information data, corresponding processing can be made in time, and real-time inspection can be carried out for the user’s operation to display and store the user’s name and operation time. In case of wrong operation mode, the system will not respond. Set the corresponding permissions for each user, which can make the data more confidential and secure.
3 Experiments 3.1
Development Objectives
(1) Digital resource collection and resource integration Through a set of data standards and data exchange standards, the system uses data conversion and integration functions to integrate the “information island” scattered in different regions, different carriers and different formats into a unified subject for unified management. At the same time, through digital resource collection and customization, the system integrates the collected resources and catalogues them uniformly and normatively. The system also provides unified format conversion and index tools, with basic functions such as data upload, category setting, classification and sorting, automatic data verification, directory generation, data statistics, etc., and can add subject words (or keywords) and categories according to the needs of user index functions; users can set entity classification schemes according to actual needs. (2) Digital resources display The all-round display of digital resources is the basic function of digital resources platform. The system provides rich metadata and digital content display of digital resources, realizes the original display and browsing of electronic documents such as e-books and periodicals, as well as the display and playing of multimedia resources such as videos and pictures, and provides good visual access for readers. 3.2
Development Environment
In order to meet the above basic development objectives, this paper chooses the following development environment to complete the system development. 1) 2) 3) 4)
Development language: Java Background development framework: SSH Foreground development framework: jquery Relational database: MySQL
Design and Development of Self Built Database of University Library
5) 6) 7) 8) 9)
309
Content warehouse: jackrabbit Distributed storage component: fashdfs Video server: red5 Full text search component: Lucene Hardware environment: Lenovo sl410
4 Discussion 4.1
System Logic Structure Design
The main task of logical structure design is to transform conceptual structure model into logical data model, and at the same time, it needs to be optimized. According to the results of system analysis and the characteristics of relational database SQL Server 2019, this system designs six database tables. They are information table, reader information table, book classification table, book borrowing information table, operator information table and inventory information table. Book information table: used to record the details of a book, as shown in Table 1. Table 1 Book information Field meaning Books Book category Title Author Translator Press Publication date Price
Field name ISBN TypeID Bookname Writer Translator Publisher Date Price
Type Varchar Int Varchar Varchar Varchar Varchar Date time Money
Length Is the primary key? Is it not empty? 50 Yes Yes Yes 50 50 50 50 10
Circulation function is the most basic function of the library, among which the operation of borrowing and returning books is the most basic and important. Considering the actual operation of the library, and for the convenience of management and security, the design adopts the method of independent login of sub modules. A separate authentication is required to enter the next sub module. When the user logs in for the first time, he/she needs to fill in the user name and the initial password provided by the system administrator. After entering the system successfully, he/she can change the password, and then he/she can log in according to his/her modified password. Enter the system and enter the user name and password. If it is not entered correctly, a prompt message will be given and it can be rewritten.
310
4.2
Z. Jia
Data Integration Module
After the data filtering, we need to orderly the simplified data according to the classification method. The classification method is to classify readers or users according to their own interests, and then associate them among many interests. For example, readers who are interested in archaeological documents are often interested in history and politics. According to this classification, this kind of subtle connection can be dayized and the viscosity of users can be increased. We need total amount and average value of user behavior data, so columnar storage is more suitable for this kind of data storage. HBase database is a typical columnar database. Column storage stores and queries data in columns. Each table consists of a set of page chains. Each page chain corresponds to a storage column in the table, and each page in the page chain stores one or more values of the column. HNG index is a combination of b-tree index and bitmap index in the storage. The data is stored in bit mode and sliced vertically according to bit. A large part of data storage can be compressed due to sparsity, and I0 can be reduced. It is suitable for parallel calculation of total and average values (Fig. 1).
1.2 1 0.8 0.6 0.4
0.2 0 16bit
8bit
Seven
4bit
Fifteen
2bit
Twenty
1bit
Twenty-six
Fig. 1. Schematic diagram of HNG index principle
5 Conclusions This paper analyzes the research results of cloud computing technology in the current industry, introduces the origin of cloud computing, summarizes the concept and definition of cloud computing, more comprehensively introduces the technical principle and basic structure of cloud computing, analyzes the realization form of database and the realization method of self built database, discusses the user demand analysis of system demand analysis and the demand analysis of system performance The design of
Design and Development of Self Built Database of University Library
311
university library is more systematic and theoretical, which provides a certain reference for the theoretical and industrial circles to understand the development of University Library Based on cloud computing.
References 1. Li, M., Dong, X., Liang, H.: A phenome database (NEAUHLFPD) designed and constructed for broiler lines divergently selected for abdominal fat content. Hereditas 39(5), 430–437 (2017) 2. Kleiber, E., Berezkroeker, A.L., Chopey, M., et al.: Making pacific languages discoverable: A project to catalog the University of Hawai’i at Mānoa library pacific collection by indigenous languages. Contem. Pac. 30(1), 110–122 (2018) 3. Filiz, B., Kocyigit, S.L.: Two research on the effect of interior acoustics on the number of user in library architecture: Metu and Atilim University libraries. J. Acoust. Soc. Am. 141 (5), 3778–3778 (2017) 4. Almeida, N., Pollack, J.: In bed with the library: A critical exploration of embedded librarianship at the city university of New York. Commun. Inf. Lit. 11(1), 122–146 (2017) 5. Kong, R., Marek, K.: Case study: Dominican university school of information studies and Skokie public library internship partnership. Libr. Trends 66(1), 23–36 (2017) 6. Ihekwoaba, E.C., Okwor, R.N., Mole, A.J.C.: Access provision for Sight Impaired Students (SISs) in Nigerian University Libraries. Libr. Trends 67(3), 516–525 (2019) 7. Swanberg, S.M.: Inter-University Consortium for Political and Social Research (ICPSR). J. Med. Libr. Assoc. Jmla 105(1), 106–107 (2017) 8. Liao, X., Tao, H., Xuegang, G.: Exploring the database of a soil environmental survey using a geo-self-organizing map: A pilot study. J. Geogr. Sci. 29(10), 1610–1624 (2019) 9. Ingegnoli, F., Carmona, L., Castrejon, I.: Systematic review of systemic sclerosis-specific instruments for the EULAR outcome measures library: An evolutional database model of validated patient-reported outcomes. Semin. Arthritis Rheum. 46(5), 609 (2017) 10. Xuguang, Z., Lu, Y., Hualong, Y.: Scene-library-based video coding scheme exploiting long-term temporal correlation. J. Electron. Imaging 26(4), 1 (2017) 11. Babin, R.: Cloud computing e-communication services in the university environment. Inf. Syst. Educ. J. 15(1), 55–67 (2017) 12. Jara, M., Clasing, P., González, C.: Patterns of library use by undergraduate students in a Chilean university. Portal Libr. Acad. 17(3), 595–615 (2017)
Exploration and Reflection on the Construction of University Archives Management System Under the Background of Information Technology Yan Sun(&) Jilin Engineering Normal University, Changchun, China [email protected]
Abstract. Archives management in colleges and universities is closely related to the normal operation of colleges and universities, including many important functions; Not only that, the university archives road involves many aspects, such as teaching, logistics management, scientific research and so on. Generally speaking, the management data of colleges and universities are large and complicated, and the work complexity is relatively high. With the continuous development of information technology, the informatization construction of university archives management is an inevitable trend, which can maximize the comprehensive efficiency of university archives management. On this basis, the construction of university archives management system has become an important part of information construction. The purpose of this paper is to improve the efficiency of management through the in-depth study of university archives management, to build an informationized university archives management system. This paper firstly analyzes the main problems existing in the archives management of colleges and universities under the background of informatization, and then puts forward the specific construction scheme of the archives management system. Finally, it tests the scientificity and feasibility of the system by means of clustering analysis algorithm. The experiments in this paper show that the establishment of the university archives management system under the background of information greatly improves the efficiency of archives management and provides great convenience for the management work. Keywords: Information technology construction Clustering analysis
Archives management System
1 Introduction The information technology and the computer have promoted the profound change of the society and had an important impact on People’s Daily life and work. China has entered the era of information technology rapidly. With the expansion of the scope of influence of information technology, archives management in colleges and universities is also affected. With the help of information technology, it has become an inevitable trend to promote the informatization of archives management in colleges and universities. Archives management plays an important role in the work of colleges and © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 312–318, 2021. https://doi.org/10.1007/978-3-030-51431-0_46
Exploration and Reflection on the Construction
313
universities, and is also an important standard to measure the overall management level of colleges and universities. The university archives management work involves all aspects of the content, and involves the various periods of archives storage, not only the quantity is large but also the work is difficult, the traditional archives management has been unable to adapt to the complex work needs, therefore in the background of information construction university archives management system has great significance. At present, China has also made some attempts in the construction of university archives management system, but due to lack of experience and other reasons, there are still many problems in the construction of this system [1]. Based on this, people pay more and more attention to the information construction of university archives, how to combine modern information technology and university archives management has become the focus of current research. Through consulting a large number of research materials, it can be found that domestic and foreign scholars have carried out a series of studies in this field. Among them, the information construction of archives management in foreign countries started earlier, most of which are combined with the domestic practice activities to carry out relevant research. In the 1980s, the United States had already started the construction of an information file management system [2, 3]. Compared with foreign countries, the construction of archives management informatization in China started relatively late. At present, the researches in this field mainly focus on the application of digital resources, the integration of information technology and archives management. However, domestic and foreign researches are scattered, and a complete file management system supported by information technology has not been established. Therefore, from this perspective, there is still a huge theoretical gap in the research of this aspect, which requires further research [4, 5]. In order to promote information technology as the support of the rapid construction of university archives system, file management information, improve the efficiency of management, the article first to the main problems of college archives management under the background of informatization are analyzed, and based on this, advances the concrete construction plan of archives management system, and finally with the cluster analysis algorithm to the scientific nature and feasibility of the system test [6, 7]. The testing experiments in this paper show that the system construction scheme proposed by the author is completely feasible, which promotes the comprehensive efficiency of archives management. It not only promotes the scientific development of university management, but also lays a certain theoretical foundation for future related researches [8].
2 Method 2.1
Problems Existing in Archives Management in Colleges and Universities Under the Background of Informatization
The problems in the information management of archives in colleges and universities in China are mainly manifested in the following four aspects: the first is the backward management consciousness and management concept. Advanced management
314
Y. Sun
awareness adapting to the information background is an important factor to promote the construction of archives management system in colleges and universities, and advanced information archives management awareness plays a facilitating role [9, 10]. However, nowadays, the person in charge of archives management in colleges and universities lacks or even rejects information construction, so the consciousness of information management is relatively indifferent. In addition, most managers lack a correct understanding of the role of management system construction, which hinders the construction of the management system [11]. Second, less capital investment, the system’s related facilities are backward; The construction of university archives management system needs the support of related software and hardware, which needs a lot of funds. However, due to the shortage of funds in many universities, there are even less funds for this aspect, which hinders the process of system construction. Third, there are more cyber threats. Due to the openness of the network itself, it will result in the leakage of archival information, the violation of personal privacy and the confidentiality of the school, which will pose a major threat to the development of the school. Fourth, the workload of archives management, work efficiency is low. As mentioned above, archives management in colleges and universities involves a wide range of work and has a large time span for archives storage. Many of the archives are saved in the form of paper files, which is time-consuming and laborious and difficult to manage [12, 13]. 2.2
Clustering Analysis Algorithm
Cluster analysis algorithm is one of the commonly used algorithms in mass data analysis, which can quickly realize in-depth analysis and classification of required data. This data analysis method is consistent with the complexity of university archives management. Clustering analysis algorithm to breakdown processing, the huge amounts of data on the basis of the data, so as to establish the logical relationship between different file data, archives in colleges and universities in various types of initial data automatically analysis processing, at the same time to the underlying value of the initial data mining effectively, realizing the effective classification of the archives management, thus greatly reduce the difficulty and complexity of university archives management work. The process of university archives management under the clustering analysis algorithm mainly includes the following three aspects: data preparation, clustering and evaluation of archives management results. In essence, the data clustering of university archives management belongs to the grouping expression of similar data. Suppose the rough attribute set is represented by P, and there are m elements in this set, then the final clustering result is 2m−1. P represents a single clustering result, and its attribute set is represented by Si. The specific calculation formula is as follows: Si ¼ SP ðPÞ SPPi ðPÞ
ð1Þ
Where, SP(P) represents the importance determination function of cluster analysis, and Pi represents the set of attribute sets. When SP(P) = 1, the specific calculation formula of Sp−pi (P) is as follows:
Exploration and Reflection on the Construction
SPPi ðPÞ ¼
cardPOSSP ðPÞ cardU Si
315
ð2Þ
In the above formula, the Si value is directly proportional to the importance of the Pi attribute set. The greater the importance of the attribute set, the greater the impact on the result of the data sample.
3 University Archives Management System Testing Experiment Before the system is officially put into use, the system must be tested. The purpose of this paper is to find and improve the problems and deficiencies in the actual operation of the archives management system, so as to ensure the stability of the system and ensure that the system can achieve the original design goal. In this paper, the experimental object is the archives management system of colleges and universities. Three experimental methods, white box test, black box test and unit test, are selected. The test contents of this paper mainly include the following aspects: overall system function, data change, specific workflow and business rules; In addition, in order to further test the efficiency of the system, this paper compares the information system with the traditional way of file management. After all aspects of the system are tested, data charts are drawn with the help of excel and other drawing tools, so that the test results can be intuitively reflected.
4 Discuss 4.1
Specific Construction of University Archives Management System
(1) Design of system function modules Because of the wide range of file management and the complexity of the management process, the system contains a number of functional modules. According to the overall function of the system, the function modules of the file management system are divided into the following three modules: input module, output module and management module. The main function of the input module is to input the stored information of the files and classify the files according to the information. Output module is mainly the automatic output of the file statistics, such as the number of files, lending situation, and the module also has to urge the file, query the file and copy the file function. Management module involves different extremes of file management and backup, as well as the system administrator and access to the user’s application permissions and other aspects, can achieve a full range of management of files. In addition to these three main modules, the system also has a maintenance module and a help module. (2) Design of system database The database of the archives management system is composed of nine different types of database tables. The second is the archival borrowing record table, the database table is mainly used for the preservation of archival borrowing information; The
316
Y. Sun
third is the menu information table, which stores and manages the menu number, menu name, superior menu number, link and sequence number. The fourth is the user information table, the table to log in the file system user information storage, to ensure the security of the file. These four kinds of data information tables occupy the main position in the database construction of the system, and the other five kinds of information tables are department information table, audit information table, document information table, document version information table and folder information table, which will not be repeated here. 4.2
System Test Results and Analysis
Through the above system test experiments, and by using the clustering analysis algorithm to calculate the relevant test data, the test results of the system are obtained. The specific test results are shown in Table 1 and Fig. 1. The data in the chart is the results of the author’s experimental arrangement. Table 1. System module test table Name Actual effect Rational effect Composite scores Functions of the system 89.17% 87.99% 96.41 The working process 84.31% 83.32% Data changes 85.19% 84.92% Business rules 84.31% 80.13% Data came from the in-depth analysis of financial data in the experiment
150.00%
100.00% 50.00%
89.73%
87.21%
51.47% 10.54%
0.00% Efficiency Traditional Way
Error
Accuracy
Information System
Fig. 1. Comparison between traditional management mode and information management system
We can see from Table 1 that the actual operation effect of the university archives management system designed in this paper in each functional module exceeds the expected level; According to Fig. 1, we can find that the university archives management system designed based on information technology in this paper has obvious
Exploration and Reflection on the Construction
317
advantages over the traditional management mode in terms of efficiency and accuracy. On this basis, we can draw a conclusion: the file management system proposed in this paper has achieved the expected objectives of the design in terms of functions, workflow, data changes and application of business rules, and has reliability.
5 Conclusion It is an inevitable requirement of social development to build a university archives management system with complete functions. Information technology provides important technical support for the construction of university archives management system. University archives are the key source of information for the operation of all kinds of work, so university archives management has an important position. In this paper, the construction of university archives management system has realized the rapid sorting of university archives and realized the socialized development of university archives. However, the establishment of the system is a long-term project, which needs to be adjusted according to the development of The Times and the change of technology. Acknowledgements. This work was supported by the conclusion of the 2018 project “Research on the management of students’ Archives in the context of the transformation and development of local universities” of Jilin province’s education science “13th five year plan”, subject number GH180631.
References 1. Guan, Z.: Some problems and countermeasures of electronic file archiving in colleges and universities under the background of informatization. J. Xuzhou Inst. Educ. 23(1), 52–53 (2018) 2. Yang, J.: Analysis on the optimal management strategy of university archives information under the background of digital campus construction. Sci. Technol. Intell. Dev. Econ. 21 (27), 85–86 (2018) 3. Li, L., Zhou, D.: Reflections on archives management in colleges and universities under the background of informatization. Exam. Wkly. 12(32), 16–18 (2019) 4. Zhu, Y.: Investigation and research on archives management of scientific research documents in universities in Beijing. Arch. Res. 3(2), 171 (2019) 5. Chen, M.: On informatization construction of personnel archives management in universities. Shanxi Arch. 13(1), 141–143 (2017) 6. Jing, Z., Ye, L.: On the purpose of constructing scientific research archives management norms—based on the analysis of three existing norms. Arch. Sci. Commun. 14(4), 192–195 (2017) 7. Cao, Z.: Application of information management in college personnel file management. Shanxi Arch. 15(6), 236–238 (2017) 8. Niu, J.: The qualities of archivists under the informatization of archives management. Mod. Distance Educ. Chin. Med. 31(12), 417–419 (2017) 9. Yang, W.: Discussion on the informatization construction of university archives. J. Shaoguan Univ. 33(3), 182 (2017)
318
Y. Sun
10. Xu, C., Li, H.-P., Luo, X.-X.: Problems and countermeasures in the management of teaching archives in colleges and universities under the background of informatization. China Extern. Educ. 13(12), 11 (2017) 11. Li, T.: Countermeasures of university financial archives management under the background of informatization. China Manag. Informatiz. 14(6), 25–26 (2017) 12. Jie, Y.: Research on the construction of university archives informatization management in the era of education informatization. Knowl. Econ. 13(4), 154–155 (2017) 13. Saffady, W.: A university archives and records management program: some operational guidelines. Coll. & Res. Libr. 35(3), 204–210 (2017)
Cloud Computing with Heavy CNC Machine Tools Juan Shao(&) Liaoning Jianzhu Vocational College Liaoyang, No. 24, Qingnian Street, Liaoyang 111000, Liaoning, China [email protected]
Abstract. Numerical control technology is the foundation of manufacturing modernization. However, due to the limitation of software and hardware resources, mainstream numerical control systems are increasingly unable to meet users’ increasing demands for intelligent and open functions. In terms of basic theoretical research, cloud computing is mainly based on universities and research institutes. It has made great contributions to the theoretical innovation of cloud computing. The cloud computing industry has a bright future, but compared with developed countries, the scale of China’s cloud computing market still needs to be improved, and it will still need to strive to catch up in the future. Based on the above background, the research content of this article is a heavy-duty CNC machine tool based on cloud computing. This paper first introduces a cloud computing scheduling algorithm based on dynamic substantial path driving and applies it to a CNC machine tool system. The combination of next-generation information technology such as big data is the starting point. Based on the analysis of the mainstream NC system structure at home and abroad, a cloud-based NC system architecture is proposed. Users can access the cloud application center through the CNC system to obtain services. The application center provides general software for the CNC industry. Users can also add their own customized software in the application center. Finally, through experimental simulation, the results prove that the Bayes reliability evaluation method based on the proposed heavy-duty CNC machine tool considering the degree of maintenance is more in line with reality. In addition, it can be seen from the Speedup average analysis that the performance of the proposed algorithm is surpass the algorithms HEFT, HEFT-Lookahead, and CEFT, which is 17.9% better than the algorithm HEFT, 14.5% better than the algorithm HEFT-Lookahead, and 10.2% better than the algorithm CEFT. Keywords: Cloud computing Teliability evaluation
CNC system Heavy machine tools
1 Introduction Although the domestic heavy machine tool industry has made great progress in recent years, it still relies on imports for high-end heavy-duty CNC machine tools. Compared with foreign products, the differences between domestic machine tools in the structure and the use of new technologies are not large. The main gap is reflected in the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 319–325, 2021. https://doi.org/10.1007/978-3-030-51431-0_47
320
J. Shao
application of advanced technology and the level of manufacturing processes. The CNC system is the “brain” of numerically-controlled machine tool and one of the important components of CNC machine tools, which determines the function and performance, reliability and cost of numerical control machine tool. Cloud computing is a new service model, which is developed on the basis of dispersed calculate, reseau computing and point to point computing [1]. It can effectively integration various mutually connected memory, calculate, mesh and other resources, and users can acquire it at in season and out of season through the network, use it as needed, and enlarge the serve in the resource pood at in season and out of season [2, 3]. It provides users with the ability to obtain cloud calculate resources on demand like traditional water, electricity, and gas. Cloud computing is a facility, ebusiness on demand, pay according to the times used [4, 5]. Through the network to quickly access to a Shared pool of resources, and only a small amount of management work or little interaction with service providers is required [6, 7]. To provide high reliability (Hi-Rel), high availability (HA), and elastic personalized services at low cost [8, 9]. Its target is to avert users from the intricate potential hardware logic, network protocols, and software architecture, and to use services according to their own needs at any time and any place to solve their own problems [10]. By incorporating cloud calculate into the RAN, C-RAN is considered a promising 5G wireless system architecture. Due to the innovative measures to migrate base band dispose functions to a concentrated cloud base band unit pood, it is expected that CRAN will significantly reduce energy consumption and become a greenness RAN. In addition, with the cloud-based framework, many fresh functions and RAN designs are all set to be merge, which reassignment RAN as a agile RAN. Tang uses cloud computing to form a green and agile C-RAN from two cloud-based attributes: centralize dispose and software definition surroundings. For centralized processing characteristics, Tang includes coordinated multipoint and limited future capacity, multicast, and CSI issues in C-RAN. For a better understanding, through appropriate instance introduces the framework of architectural details. This work is significant for deploy cloud-based cooperation learning solutions in educational institutions. An organization’s decision to removal message technology to cloud computing includes a variety of decisions that must be made to minimize risk and make a slippy and precise interim to cloud computing. The research content of this paper is based on cloud computing of heavy-duty CNC machine tools. It studies the problems existing in single-target scheduling of current workflow tasks. Most current workflow task scheduling models are based on the parallel computing DAG task scheduling model, but in the past, workflow scheduling algorithms used to confirm the scheduling order of workflow tasks before scheduling, which did not reflect the actual scheduling time and execution of workflow tasks during the scheduling process. The impact of the server on the scheduling sequence of subsequent workflow tasks. Based on the research and analysis of the classification, attributes, and feature of machinery instrument equipment resources in the cloud manufacturing industry environment, the needs for modeling and description of machine instrument equipment resources in the cloud manufacturing surroundings are analyzed and summarized.
Cloud Computing with Heavy CNC Machine Tools
321
2 Proposed Method A cloud calculate system is a computer mesh that obtains required resources and services from user application requests, network environments, and on-demand, easily scalable scheduling methods. The problem of workflow task resource distribution in cloud calculate is the core problem of cloud computing systems. In order to solve the workflow task and resource distribution problems in cloud calculate, we start with the establishment of a scheduling model and transform the cloud calculate system scheduling issue into a DAG model scheduling issue. G = (Q,E,S), the workflow task node set table in which the user’s application request node is adopted Q = {Q1,Q2,…, Qn}, the device resources in the network correspond to the workflow task nodes in the DAG graph The execution server set representative S = {S1,S2,…,Sk}, the set of network communication costs between all workflow task nodes uses E = {eij}(i,j2V),and eij represents the workflow task nodes There is a communication or dependency relationship between i and j. The workflow task node i is the father node of j. All the precursor sets are represented as Pre(i)2V. The workflow task node j is the son node of i and all successors of i are the set of nodes is represented as Succ(i). The accomplish time of the workflow mission node is defined as: EFTðQi ; Sn Þ ¼ ESTðQi ; Sn Þ þ tin
ð1Þ
Other workflow task nodes completed in: EFTðQi ; Sm Þ ¼ ESTðQi ; Sm Þ þ tim
ð2Þ
So the completion time objective equation of all workflow task nodes in the DAG figure is: Makespan ¼ maxðEFTðQexit ; Sm ÞÞ
ð3Þ
Qexit is a odd workflow task node, and the final goal of the dispatch algorithm is to reduce Makespan, which is min(Makespan). The purpose of the scheduling algorithm is to reduce the completion time of the entire workflow task or the execution cost of the entire workflow task. The factors affecting the completion time of the entire workflow are the start time and completion time of the workflow task node, and these two factors are related to each job. The execution time of a workflow task node is related to the communication time between different workflow task nodes. An vital reason that affects the original time and completion time of a workflow task node is the sequencing of the workflow task nodes. This paper proposes the sequencing of the workflow task nodes. Preceding task layer priority tactics and roving substantial route strategy, according to the order of workflow task nodes, choose to make the workflow task node has the earlier start time and completion time of the server as a workflow task node resource server.
322
J. Shao
3 Experiments The cloud structure CNC system prototype system is based on 8 CNC machine tools in a comprehensive laboratory workshop of a school of mechanical science and engineering, and 4 servers are used as examples to deploy the cloud CNC system. The server configuration is shown in Table 1. Table 1. Control node configuration Hardware Server host CPU RAM Hard disk Network card Operating system
Model parameters Dell R720 Intel(R) Xeon(R) CPU E5-2650 128 GB SAS 2T*2 Four gigabit network card interfaces CentOS 6.4
As shown in Table 1, the control node configuration server host selects Dell R720; the CPU selects Intel (R) Xeon (R) CPU E5-2650; the storage selects 128 GB capacity; the hard disk is SAS 2T*2; the network card has 4 gigabit network card interfaces; The operating system is CentOS 6.4. Multi-node deployment to the OpenStack cloud computing platform. After the deployment is complete, the custom-designed Windows 7 system image is registered in Glance, and the CentOS system virtual machine is integrated with a data storage and analysis platform. A corresponding virtual machine can then be created for the CNC. The third-party commercial software Cimatron software is used to model the “toy car” mold. Using this software, you can also generate the corresponding G-code file from the built model. Then use CGTECH VERICUT software to simulate the G code after the post. After the simulation is completed, the G code that meets the requirements can be sent to the local CNC system for processing. At this time, the cloud virtual machine can be regarded as an extension of the function of the local CNC system.. You can also start the upper-level cloud processing directly in the cloud virtual machine.
4 Discussion 4.1
Analysis of Reliability Evaluation Results
Table 2 shows the posterior feature quantities of the mean, variance, and posterior confidence interval of each model parameter.
Cloud Computing with Heavy CNC Machine Tools
323
Table 2. Model and model parameter estimation results Model Mean parameters a 964.4
variance Posterior confidence interval 5% 99.2 754.4
b
1.597
0.1993
1.237
ηNH
976.8
748.4
109.3
bNH
1.762
1.347
0.4411
P(M = 1) P(M = 2)
0.4255 0.2793 0.5744 0.2795
0.01875 0.04317
Posterior confidence Model prior interval 95% distribution 1120.3 dweib (967.14, 9.04) 1.95 dweib (1.6914, 8.0276) 3200.1 Uniform (0, 5000) 6.545 Uniform (0, 10) 0.9569 1/2 0.9816 1/2
As shown in Table 2, combined with the expression of the reliability feature quantity under the mixed model in the Bayes model averaging method, the target machine tool reliability index considering the degree of maintenance can be obtained. At this time, the reliability index MTBFF is generally called the instantaneous average. Time between failures. When the working time is less than 2000 h, the instantaneous MTBF is maintained at about 900h. After the working time is greater than 6000 h, the instantaneous MTBF is maintained at about 730h. At the same time, in the working time interval (1000, 6000), the instantaneous MTBF decreases. The fastest, after more than 8000 h, the instantaneous MTBF decreases slowly and stabilizes. Further analysis, in theory, when the fault is considered to have reached a completely new state when it was put into the test after repair, the reliability index calculated at this time, that is, the evaluation index under the assumption of complete repair is definitely more than the theoretical real result On the high side. According to the proposed responsibility appraise method of heavy-duty CNC machine tools considering the degree of maintenance, the evaluation results obtained are lower in the stable period than those under full maintenance, plus the detailed demonstration of the credibility of the hybrid model in the previous period. The final conclusion is that the Bayes reliability evaluation method for heavy-duty CNC machine tools on account of the proposed maintenance degree is more in line with reality. 4.2
Algorithm Performance
In order to evaluate the performance of this algorithm, commonly used performance indicators: SLR and Speedup. SLR is a main parameter to measurement the performance of the algorithm. SLR is the proportion of the total processing time Makespan to the critical path length. The value of SLR is greater than 1, the lower the SLR, the better the algorithm performance, but the poorer the algorithm performance. The mean SLR and Speedup of the task graphs of different numbers and sizes are shown in Fig. 1. As shown in Table 1, Speedup is the ratio of the sequential execution time of all workflow assignment nodes to the total execution time.
324
J. Shao
7 6 5 4 3 2 1 0 100
200
300
400 DDEP
500 CEFT
600 700 800 900 HEFT-Lookahead HEFT
1000
Fig. 1. Relative to the size of the DAG graphics average SLR and average speed
The order perform time is equal to the entire execution time processed by all workflow task nodes on the same processor. Makspan is the task completion time. The smaller the Speedup value, the worse the performance of the algorithm. On the contrary, the better the performance of the algorithm. Scheduling on the same number of resource servers to compare the performance of the algorithm in this chapter. The amount of assignment graph nodes is {100, 200, 300, 400, 500, 600, 700, 800, 900, 1000}, the number of resource service is 5, [10, 20] is the randomly generated interval of the workflow task node execution time, and [10, 20] is the workflow task node communication time stochastic generated intermittent, [1, 10] is the randomly generated interval of workflow task node out-degree value and in-degree value. The random generator generates DAG graphs and resource servers that meet the requirements of the above parameters according to the input values of the above parameters, in order to check the impact of the size of the task graph on the scheduling algorithm. The DAG graph of the same number of levels is run 100 times, and the average total scheduling time, average vital route length of each task figure, and the average sequential execution time of each task graph on different resource servers are calculated. Then according to formula (4), (5) Calculate the average SLR and Speedup for the randomly generated task graph. It can be seen from the SLR average analysis graph that the algorithm proposed in this paper is superior to the algorithms HEFT, HEFTLookahead, and CEFT, and 25.5% superior to the algorithm HEFT. It is 11.3% exceed the algorithm HEFT-Lookahead and 16.4% better than the algorithm CEFT. It can be seen from the Speedup average analysis graph that the performance of the proposed algorithm is exceed the algorithms HEFT, HEFT-Lookahead, and CEFT, which is 17.9% exceed the algorithm HEFT, 14.5% better than the algorithm HEFT-Lookahead, and 10.2% better than the algorithm CEFT.
Cloud Computing with Heavy CNC Machine Tools
325
5 Conclusions The workflow task scheduling question in the cloud calculate environment is a matching problem between the workflow task and the cloud resource server in the cloud calculate environment. In recent years, related scholars have proposed many effective and feasible scheduling algorithms for such scheduling problems, but these algorithms determine the scheduling plan of workflow tasks before task scheduling, and ignore the changes in the scheduling environment in the actual scheduling process. The latest technologies such as cloud calculate, industrial Internet, and big data are deeply integrated with the CNC system, and a cloud-based CNC system architecture is proposed. Based on this, the non-strong real-time tasks of the CNC system are moved to the cloud virtual machine to reduce the overhead of the local hardware of the CNC system.
References 1. Wang, Y., Li, J., Wang, H.H.: Cluster and cloud computing framework for scientific metrology in flow control. Clust. Comput. 22(1), 1–10 (2019) 2. Chen, J., Li, K., et al.: A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans. Parallel Distrib. Syst. 28(4), 919–933 (2017) 3. Cao, Z., Lin, J., Wan, C., et al.: Optimal cloud computing resource allocation for demand side management in smart grid. IEEE Trans. Smart Grid 8(4), 1943–1955 (2017) 4. Packer, R.G.: The ethics of cloud computing. Sci. Eng. Ethics 23(1), 21–39 (2017) 5. Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912–925 (2018) 6. Cai, H., Xu, B., Jiang, L., et al.: IoT-based big data storage systems in cloud computing: Perspectives and challenges. IEEE Internet Things J. 4(1), 75–87 (2017) 7. Soofi, A.A., Khan, M.I.: A review on data security in cloud computing. Int. J. Comput. Appl. 96(2), 95–96 (2017) 8. Hashimoto, K., Masuyama, H., Kasahara, S., et al.: Performance analysis of backup-task scheduling with deadline time in cloud computing. J. Ind. Manag. Optim. (JIMO) 11(3), 867–886 (2017) 9. Chase, J., Niyato, D.: Joint optimization of resource provisioning in cloud computing. IEEE Trans. Serv. Comput. 10(3), 396–409 (2017) 10. Quirita, V.A.A., Happ, P.N., Feitosa, R.Q., et al.: A new cloud computing architecture for the classification of remote sensing data. IEEE J. Sel. Top. Appl. Earth Obs. & Remote. Sens. 10(2), 409–416 (2017)
Application of Modern Information Technology in Course Teaching in Universities Ying Li(&) and Jinliang Wang Guangdong University of Science and Technology, Dongguan 523083, Guangdong, China [email protected]
Abstract. Integrating information technology and teaching means is a hot issue in the popularization of information technology. The application of information technology in teaching enriches teaching resources and expands teaching methods, thus making modern education more efficient [1]. As Rain Classroom, Ketangpai, Cloud Space, and other information technologies are used in classroom teaching, a variety of flipped classroom and new teaching modes are springing up constantly, enabling the space of course teaching greatly extended. As for the practical courses, information technology tools can effectively link up and extend the links before, during and after class. However, some problems still need to be explored and improved in practical applications. Keywords: Information technology
Practical courses Applied research
1 Introduction The development of modern information technology has boosted the progress of higher education [2], and has also promoted the reform and innovation of classroom teaching means and methods. In today’s informatization society, information technology is a great learning tool that can help students to carry out learning cognition, acquire learning resources, and collaborate, explore and communicate. Therefore, how to use modern information technology to elevate the quality of teaching and improve the effect of classroom teaching has always been a concern of many teaching workers. If teachers can make good use of the information technology, they can get the utmost out of it as a teaching tool to train students’ advanced thinking and improve students’ practical abilities, so as to enhance the teaching effect and improve the quality of talent cultivation. Practice teaching is an effective way to consolidate and deepen students’ theoretical cognition in colleges and universities, as well as an important platform to cultivate high-quality skilled talents. In this case, how to effectively apply information technology for practical course teaching to improve the quality of classroom teaching to create a high-level “golden course”, which is worth pondering by teachers in colleges and universities.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 326–331, 2021. https://doi.org/10.1007/978-3-030-51431-0_48
Application of Modern Information Technology
327
2 Analysis of Teaching Characteristics of Practical Courses in Colleges and Universities Compared with the conventional theoretical course teaching, the practical course teaching has the following characteristics: Firstly, the class schedule is more concentrated. The class hours of theoretical courses are distributed throughout the whole semester, usually about 45–72 h. However, practical courses are arranged in a more concentrated manner, usually requiring 20–40 class hours to be completed within 1–2 weeks by adopting the teaching method of the whole-week practical training. Secondly, the learning intensity is greater and the teaching environment is more demanding. Compared with the theoretical courses, the learning tasks of the practical courses are much more difficult, and students are required to have a high degree of participation, and the tasks are usually done in small groups. In addition, the teaching environment of practical courses is quite different from that of theoretical courses. Practical courses on campus are usually arranged in computer room laboratories or functional laboratories. Thirdly, there are higher requirements for teachers. Teachers are required to get students interested in the courses in a short period of time and maintain a high enthusiasm for learning. At the same time, teachers also need to be able to make good use of information teaching tools to assist teaching, otherwise it will be difficult to obtain better teaching effect or guarantee teaching quality within the prescribed time.
3 Analysis on the Application Status of Modern Information Technology in Practical Courses 3.1
Main Information Technologies Applied in Practical Course Teaching
Integrating information technology and teaching means is a hot issue in the popularization of information technology. The wide application of computer and network technology in teaching undoubtedly gives a pair of powerful wings to the education of various schools [3] and becomes an important means for teachers to carry out the reform of the teaching mode. In today’s practical course teaching in colleges and universities, the main information technologies applied include multimedia technology, simulation software teaching technology, interactive classroom management tools (such as Ketangpai, Rain Classroom, and Cloud Class), Internet resources platforms (such as Cloud Space of World University City, and MOOC), and information and communication tools (such as WeChat, QQ, and email). 3.2
Main Application Scenarios of Information Technology in Practical Course Teaching
In the teaching process of practical courses, task-driven and project-based teaching methods are mainly adopted, which basically follow the design ideas of task setting and
328
Y. Li and J. Wang
arrangement, and achievement reporting and acceptance. Therefore, in the actual teaching, the main scenarios using information technology include: (1) Arrangement of classroom tasks. Teachers mainly use multimedia technology to explain knowledge and arrange tasks [4–6]. The application of multimedia technology enables knowledge to be expressed in a single form such as text, image, animation, sound, and video, or a combination of several forms, thereby enriching the content of knowledge to stimulate students’ multisensory organs, which is conducive to students’ memory and enhances students’ clues for association, thus improving the effectiveness of classroom teaching. (2) Classroom attendance and classroom testing. In practical course teaching, teachers mainly adopt the interactive management tools, such as Ketangpai, Rain Classroom, and Cloud Class, to check students’ attendance, conduct interactive test of knowledge points in class and complete courses’ online exams [7–9]. As most of the practical courses are conducted in the laboratories, teachers can accomplish smoothly classroom sessions such as attendance and testing with the help of computers and mobile phones. (3) Teacher-student interaction and Q & A after class. In the course of practical teaching, teachers will upload course resources to network technology platforms such as Cloud Space and MOOC space for resource sharing and information exchange. These network platform technologies can not only realize the sharing and timely updating of excellent teaching resources, but also realize the communication between teachers and students. Teachers can make the best of WeChat, QQ, e-mail and other information tools to communicate with students before and after class and answer their questions, which dramatically extends the classroom space. Because practical courses are mainly concentrated in 1–2 weeks, teachers will have less chance to meet with students after the end of courses, so these information technology tools really do well in helping teachers to tutor students after class [10]. (4) Display of student learning outcomes and field practice. In practical courses, students are often required to complete a design or plan according to the task requirements, and produce a PPT to present on the stage. The multimedia technology can help students demonstrate their practical training works, and at the same time can train students to use multimedia related skills. In addition, for some highly operational courses, the corresponding teaching software platforms are required to carry out simulated operations to further improve students’ practical skills. 3.3
Analysis of the Main Problems and Reasons of Applying Information Technology in Practical Course Teaching
In the process of practical course teaching, all teachers adopt information technology to carry out teaching activities to varying degrees, and the classroom effect has been greatly improved. After the application of information technology, although there have been significant reforms and innovations in classroom form, teaching means and
Application of Modern Information Technology
329
classroom flexibility, there are still some problems that need to be further improved and perfected. The main problems are as follows: Firstly, some teachers do not pay attention to the study of the nature of courses, and mistakenly believe that the time of practical courses is short, so they completely rely on some modern classroom interaction management tools for class attendance to save time. This attendance system, which fully relies on information technology, can easily result in the indifference of teacher-student relationship, thus affecting the teaching effect and quality of the courses. Once students think that if teachers do not call the roll, it will be difficult to know who they are, so there may be arbitrary absenteeism and other phenomena. Instead, if teachers can properly call the roll for a few times, students will feel warm, but also afraid. After all, with a certain emotional basis and communication, students are more likely to accept what teachers teach. Secondly, some teachers rely too much on teaching software and other teaching tools, and ignore the actual situation of students and carry out one-size-fits-all teaching. Some courses with strong practicality need to use corresponding teaching software for practical teaching and training in the practical training. For example, both e-commerce and marketing majors have opened the course Online Store Opening and Operation Practice, for which most schools have also purchased corresponding teaching software. Therefore, some teachers teach according to the experimental manual of the software, ignoring the actual situation of different majors and different students. When the same course is faced with students from different majors, it should have different emphasis, otherwise it will be difficult to achieve the teaching objectives of student-centered, and student-development-centered, and also difficult to achieve better classroom effect. Thirdly, part of the teaching software loses touch with practice. However, teachers have not adjusted and upgraded the teaching content and tasks accordingly. In the application of teaching software for course teaching, some practical teaching software is purchased earlier or changes too fast in reality, which will lead to the disconnection of software teaching content with reality, and further result in the poor teaching effect.
4 Suggestions on Improving Teaching Quality of Practical Courses by Applying Information Technology 4.1
Pay Attention to the Research on the Nature and Teaching Characteristics of Practical Courses, and Flexibly Apply Information Technology to Carry Out Teaching
In the actual teaching, teachers should carry on sufficient research on the practical courses which undertake, discuss and analyze the nature and teaching characteristics of the practical courses, and then choose the appropriate information technology tool to assist the teaching on this basis. For example, at the beginning of the course, communication tools such as WeChat or QQ are used to establish course communication with students. Secondly, answering questions for students can effectively extend the classroom space. In the course, the network platforms can be used to upload course materials to share with students to facilitate students’ after-class study and homework submission. In addition, some classroom interaction management tools can also be used
330
Y. Li and J. Wang
to assist attendance and classroom interaction, so as to improve the quality and efficiency of classroom teaching. 4.2
Keep Pace with the Times and Pay Attention to Improve and Integrate the Teaching Content
In the practical courses for liberal arts majors, if there are no teaching materials or fixed teaching materials for a course, the teaching team of the course is required to design practical training projects according to the characteristics and dynamics of the industry’s demand for talents. For some courses that need to rely on teaching software, teachers are required to make corresponding adjustment and improvement according to the industry dynamics, so as to ensure the effectiveness of the teaching content of practical courses and the development of students. 4.3
Focus on Demonstration and Practice, Fully Reflecting the Ownership Status of Students
The practical courses are set to help students consolidate and deepen their cognition and understanding of theoretical knowledge, and on which basis enhance their professional skills and practical abilities. Therefore, teachers should leave more time for students to practice to understand the knowledge in textbooks and explore knowledge that is not available in textbooks. Most practical courses are opened in the laboratories, which will have corresponding software and hardware available to students, so in the teaching process, students should be encouraged to make full use of existing information technology means and platforms to independently explore and learn, thus allowing them improve their abilities through constant exploration and learning. 4.4
Focus on Feedback and Evaluation
After students complete their tasks, teachers should evaluate their works timely, and evaluate their learning effect by combining teaching content and scoring standard. Students’ questions in class should also be given timely feedback. For questions after class, teachers should make full use of existing network resources and various platforms to answer.
5 Conclusion Integrating modern information technology and teaching methods is currently a hot topic, and it will be a topic worthy of discussion and research by various universities for a long time in the future. In order to improve the course effect and give play to the role of practical courses in talent training, teaching tools and teaching methods of practical courses also need to be constantly reformed and innovated with the change of information technology.
Application of Modern Information Technology
331
Acknowledgements. “Quality Project” of Guangdong University of Science and Technology in 2018(NO: CQ2018022)
References 1. Qian, G.: Causes of instrumentalization of information technology education and its application in teaching. China Manag. Inf. Ization 17, 213–214 (2019). (in Chinese) 2. Li, L.: Research on the integration mechanism of modern information technology and higher education. Educ. Mod. 6(71), 189–190 (2019). (in Chinese) 3. Yushi, J.: Exploration on the application of computer network technology in education and teaching. Orient. Enterp. Cult. 5, 88 (2010). (in Chinese) 4. Yan, Y.: Reform and practice of effective teaching mode of computer courses based on modern information technology in higher vocational education. Educ. Mod. 6(71), 105–107 (2019). (in Chinese) 5. Junjie, Z.: Analysis on the application of modern network information technology in college physical education. Inf. Rec. Mater. 20(10), 73–74 (2019). (in Chinese) 6. Jing, Y.: Application of modern information technology in harmony course teaching in colleges and universities. China Natl. Exhib. 5, 28–29 (2019). (in Chinese) 7. Hui, Z.: Research on the application of modern information technology in teaching. Mod. Inf. Technol. 3(18), 98–99 (2019). (in Chinese) 8. Hongmei, Y., Chunlei, H.: Optimization analysis of higher vocational mathematics informationization teaching based on modern information technology. Educ. Mod. 6(73), 275–276 (2019). (in Chinese) 9. Changda, W.: Influence of modern information technology on teaching. Guizhou Ethnic News, 2019-12-11 (B03). (in Chinese) 10. Songtao, W.: Application of information technology in project-based teaching. Appl. IC 36 (12), 50–51 (2019). (in Chinese)
Measurement of the Relevance of Energy Internet Industry Based on Co-integration Model Shanshan Wu1 and Rui Tang2(&) 1
State Grid Energy Research Institute Co., Ltd., Beijing, China 2 Harbin University of Commerce, Harbin, China [email protected]
Abstract. The Internet of Energy is an important starting point for a new round of energy revolution. It will promote the high-quality and sustainable development of various industries. Starting from the five major energy Internet industries, this article explores the impact of five industries: integrated energy services, industrial smart manufacturing services, cloud computing services, smart home services, and new retail services on other industries. Then, the cointegration model is used to quantify the relevance between these five industries and other related industries. In the end, it is found that the integrated energy service industry, new retail service industry, and industrial intelligent manufacturing industry have obvious driving effects on other industries, and range of industries affected by integrated energy service is relatively wide. Keywords: Energy Internet industry relevance
Co-integration model Industrial
1 Introduction The degree of industrial relevance refers to the mutual relationship between industries through the supply and demand of products, which is a prerequisite for the existence of each other [1]. This connection is mainly manifested in two aspects: in terms of product supply and demand, the production of any industry and any product will be used for other products or production in other industries as input factors for its production (except the final consumer goods). In terms of industrial technology, the production of one industry requires other industries to provide them with production methods of equivalent technological level [2]. Simultaneously, its development also promotes technological progress of other interconnected industries, pushing the technological level of entire industry to a higher level [3]. This article focuses on the impact of five major energy Internet industries. The co-integration model is used to quantify relevance between the five industries and other industries. The integrated energy service industry mainly uses infrastructure and technologies to provide industrial enterprises, park buildings and individuals with multi-energy coordination, energy efficiency management, vehicle networks and distributed energy and energy storage services [4]. The cloud computing service industry provides high© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 332–338, 2021. https://doi.org/10.1007/978-3-030-51431-0_49
Measurement of the Relevance of Energy Internet
333
performance, low-cost, low-power computing and data services based on resource aggregation and virtualization, application services and specialization, on-demand supply and convenient use of service models, and provides other enterprises with basic resources sharing, platform services, software services and consulting services [5]. The industrial intelligent manufacturing service industry mainly uses company sensors, smart terminals and other equipment to collect company equipment, products, personnel, raw materials and other data information, and sends it to the company’s edge computing center and cloud computing data center. Provide manufacturing with product quality management, production process optimization, smart supply chain and product customization services. The smart home service industry mainly relies on smart sensing devices, smart power equipment, smart communication devices, professional maintenance teams and account managers and technologies such as “Big Data, Cloud Computing, IoT, Mobile Internet” to connect various household equipment for residents to provide smart life, home energy service, repair and upgrade services [6–8]. Relying on the Internet, the new retail service industry uses advanced technologies to upgrade the production, distribution, and sales processes of goods, thereby reshaping the format structure and ecosystem [9]. And it integrates online services, offline experiences and modern logistics [10]. The calculation of industrial relevance mainly uses econometric methods and R software. First, determine the causal relationship between each industry and the five pillar industries of the energy Internet, filter out the industry with causal relationship, then a co-integration model was constructed to test the quantitative characteristics of causality, and industries with long-term co-integration relationships were found.
2 Model Construction and Analysis In addition to the new retail service industry, the five industries are all industries with relatively short development time. The time range is short, which will have a greater impact on subsequent research. The data is adjusted before the model is constructed. The adjustment method is based on the three industry categories to which each industry belongs, using the quarterly proportion of the corresponding industry to convert it into quarterly data. Due to obvious seasonal factors in the quarterly data, seasonal adjustments are made before the unit root test. First use ADF method to perform unit root test and make a difference until the data is stable to eliminate the instability of the time series. It can be known that a few industries are stable sequences in themselves based on the test results. All industries are stable under the first-order difference. Then the Granger causality test is performed on the smoothly processed data to test the causality between the five industries and other industries. Because this article only focuses on the impact of the five industries on other industries. Therefore, the Granger causality test only needs to pay attention to which industries are the cause of these five industries. Since the variables in the Granger causality test are required to be homogeneous in the same order, each variable is selected to be tested with a lag period. The test results are shown in Table 1.
334
S. Wu and R. Tang Table 1. Granger causality test results
Industry
Integrated energy 7.942***(L1)
New retail
Industrial intelligent
Agriculture, Forestry, Animal Husbandry 3.431*(L1) and Fishery (Agriculture for short) Extractive Industry 7.893***(L3) Food Industry 7.258***(L3) Manufacture of Textile 6.855***(L3) 3.552*(L2) Apparel Manufacturing Industry 6.786***(L3) 5.857**(L1) Manufacture of Woodworking and product 7.972***(L3) and furniture (Wood Industry for short) Manufacture of Paper Printing, Culture, 8.009***(L3) Education, Sports Goods Petroleum Processing Industries 5.664***(L3) 5.578**(L2) Chemical Industry 6.358***(L3) Pharmaceutical Manufacturing 7.499***(L3) Chemical fiber manufacturing 5.201***(L3) 3.658*(L2) Rubber and Plastics Products Industry 6.865***(L3) Non-metallic Mineral Products Industry 2.966**(L3) 3.152*(L2) Ferrous metal smelting and rolling 4.751**(L3) Non-ferrous metal smelting and rolling 4.319**(L3) 2.657*(L2) Metal Products Industry 8.200***(L3) General and Special Equipment 6.738***(L3) 7.997***(L1) Manufacturing Transportation, electrical and electronic 6.738***(L3) equipment Other industries 6.396***(L3) 3.799*(L1) 8.721***(L2) Production and Supply of Electricity, Gas 5.995***(L3) 5.205**(L1) and Water Construction 7.853***(L3) Wholesale and New Retail Trades 5.306***(L3) —— Transport, Storage and Post 9.172***(L2) 6.796**(L1) Hotels and Catering Services 10.778***(L2) 3.812*(L1) 2.839*(L2) Financial Intermediation 5.437**(L2) Real Estate 11.425***(L2) Other 7.552***(L2) Note: *, **, *** represent significant levels of 10%, 5%, and 1%. L1, L2, and L3 indicate that the first-stage, second-stage and third-stage lag value are significant.
After conducting Granger causality tests, it was found that the smart home industry and cloud computing industry did not find industries with significant Granger results relationships. Considering that the smart home and cloud computing industries are still in their infancy, and the available data is only 4 years, which shows that their development has not yet had a significant impact on other industries. As the scale of
Measurement of the Relevance of Energy Internet
335
industries continues to expand, smart home and cloud computing industries may gradually show certain characteristics. From above statistical results, the Granger result of the integrated energy service industry includes all industries, that is, all industries will change due to energy-saving industries change. For industry lag distribution, the first lag is significant in the Agriculture. The second-phase lag is remarkable for Transportation Services, Accommodation and Catering, Finance, Real Estate and other industries. The threephase lag is remarkable for all industries belonging to the secondary industry. New Retail Trades is the Granger Reason for Nine Industries. These nine industries are Agriculture, Manufacture of Clothing and related products, Non-metallic Mineral Products Industry, Non-ferrous metal smelting and rolling processing Industry, General and Special Equipment Manufacturing, Other industries, Production and Supply of Electricity, Transport, Storage and Post and Hotels and Catering Services. Industrial manufacturing is the Granger reason for the five industries. The five industries are Manufacture of Textile, Petroleum Processing Industry, Pharmaceutical Manufacturing, Other industries, and Hotels and Catering Services.
3 Co-integration Model Construction and Analysis The EG-ADF method is used to build a co-integration model. To examine the cointegration relationship between the integrated energy service industry and other industries, model1 is constructed; Model2 is constructed to examine the co-integration between New Retail Trades and other industries; Model3 is constructed to test the cointegration relationship between the industrial intelligent manufacturing industry and other industries. After the unit root test, the lnSUM1, lnSUM2, lnSUM3, lnSE, lnSA, and lnIN are all integrated of order one. The co-integration equation is: d:lnSUM1 ¼ b01 þ b11 d:lnSE þ e þ l
ð1Þ
d:lnSUM2 ¼ b02 þ b12 d:lnSA þ e þ l
ð2Þ
d:lnSUM3 ¼ b03 þ b13 d:lnIN þ e þ l
ð3Þ
Among them, d. means the first order difference. lnSE, lnSA and lnIN indicate integrated energy services, new retail services, and industrial intelligence. lnSUM1, lnSUM2 and lnSUM3 are the sum of the output values of the relevant industries of the above three industries, respectively. e is residual term. From the estimation results, it is known that parameter estimation and overall test of three models are significant. The change of the integrated energy service by 1 unit can drive the backward related industries by 0.81649 unit output values; New Retail Trades changes 1 unit, which can drive backward related industries to change 0.9369 unit; The change of 1 unit of the industrial intelligent manufacturing industry can drive the backward related industries to change 0.9369 unit output values.
336
S. Wu and R. Tang
4 Relevance Analysis by Industry The above calculations are the overall relevance of the three industries to all of their backward related industries. The following uses the same method to measure the specific relevance of the backward related industries of these three industries (Table 2). Table 2. Relevance of backward related industries Industry Agriculture Extractive industry Food industry Manufacture of Textile Apparel Manufacturing Industry Wood Industry Paper and Printing Industry Petroleum Processing Industry Chemical Industry Pharmaceutical Manufacturing Chemical fiber manufacturing Rubber and Plastics Products Industry Non-metallic Mineral Products Industry Ferrous metal smelting and rolling processing Industry Non-ferrous metal smelting and rolling processing Industry Metal Products Industry General and Special Equipment Manufacturing Manufacture of Transportation, electrical and electronic equipment Other industries Production and Supply of Electricity, Gas and Water Construction Wholesale and New Retail Trades Transport, Storage and Post Hotels and Catering Services Real Estate
Integrated energy 3.424*** 1.010*** 0.960*** 0.966*** 0.977*** 0.930*** 0.945*** 1.007*** 0.933*** 0.879*** 0.936*** 0.928*** 1.012*** 1.033***
New retail 1.139***
Industrial intelligence
0.597*** 0.975***
0.529*** 0.683***
0.520***
0.914***
0.526***
0.896*** 0.940***
1.061***
0.906*** 0.859*** 1.017*** 0.955*** 0.891*** 0.087*** 0.113*** 0.154***
0.650*** 1.069***
1.067*** 1.000***
0.959***
0.641***
Backward-related industries refer to industries that have a significant driving effect on other industries due to significant changes in the output value of industries. The Granger causality test shows that the backward related industries of the integrated
Measurement of the Relevance of Energy Internet
337
energy service industry include almost all industries. Actually, backward related industries are suppliers of raw materials or equipment for integrated energy service industry. As the increase in demand of integrated energy service industry, the demand of its suppliers increases. From the relevance of the backward related industries, the Integrated energy service industry has the strongest exposure to Agriculture. The relevance to industries in the secondary industry is around 1, and the driving force to industries in the tertiary industry is weak. And there are individual industries that have no obvious relationship, such as Financial Intermediation. The backward related industries of the new retail service industry include Agriculture, Apparel Manufacturing Industry, Non-metallic Mineral Products Industry, Non-ferrous metal smelting and rolling processing Industry, General and Special Equipment Manufacturing, Other industries and so on. The industrial intelligent manufacturing industry later related industries include Manufacture of Textile, Petroleum Processing Industry, Pharmaceutical Manufacturing, other industries and Hotels and Catering Services.
5 Conclusions In short, according to Granger’s causality test and analysis of the co-integration model, it can be seen that the integrated energy service industry, new retail service industry, and industrial intelligent manufacturing industry have obvious driving effects on other industries; the range of industries affected by the integrated energy services industry is also relatively wide. However, the Granger causality test of related industries is unsatisfactory in the sense of economic practice. Possibly because the industry being studied has not yet reached a stage where it has a sufficient impact. Subsequent research should focus on improving this aspect and making the results more realistic. Acknowledgements. This article is supported by 2018 Science and Technology Project of State Grid Corporation of China (Research and Application of Quantitative Evolution Model of New Energy Industry Format Development Based on New Consumption Pattern, No. SGHE0000KXJS1800549).
References 1. Li, C.: Research on the input-output correlation measurement and application of China’s industrial structure. J. Shanxi Univ. Financ. Econ. 31(1), 43–48 (2009) 2. Chen, J.: Research category of industrial relevance theory. Invest. Entrep. (1), 138 3. Li, X.: Research on the relevance of pillar industries based on co-integration model-take Heyuan electrical machinery and computer communication manufacturing industry as an example. Beijing Vocat. Coll.E Financ. J. 35 (2), 26–30 + 25 (2019) 4. Wu, Z., Zheng, Y., Yang Z.: Research on the development of comprehensive energy service business. Shanxi Electr. Power (2), 58–61 (2018) 5. Cloud Computing Industry. Data Commun. (5), 52–54 (2012) 6. Chen, G., Wang, T., Lu, C., Wang, Y., Chen, L.: Research on the development of smart home industry in the age of artificial intelligence. Coop. Econ. Sci. Technol. 9, 13–15 (2018)
338
S. Wu and R. Tang
7. Yan, Y.: The development status and prospects of smart home driven by Internet of Things. Commun. World 26(2), 216–217 (2019) 8. Guo, G.: On the development of smart home industry in the development process of Internet of Things. Sci-Tech Inf. (23), 484 (2010) 9. Zhao, S., Xu, X.: The meaning, mode and development path of “new retail”. China Circ. Econ. 31(5), 12–20 (2017) 10. Du, R., Jiang, J.: New retail: connotation, development motivation and key issues. Price Theory Pract. 2, 139–141 (2017)
The Application of FIRD Book Positioning Technology in Intelligent Library Yu Zhao(&) Jilin Engineering Normal University, Changchun 130052, Jilin, China [email protected]
Abstract. With the rapid development of wireless technology in our country, many colleges and universities vigorously build digital intelligent campus, and many advanced science and technology are widely used in digital library. The development of 4G network and wireless technology has changed the behavior and demand of readers. It can not only make full use of mobile information technology, but also improve the efficiency of library operation and promote the development of library modernization. With the great development of economic material, the cultural demand has been greatly enhanced. With the application of Internet and big data, the amount of information has exploded exponentially, which requires the modern library to move towards the intelligent step faster and faster. The use of library should be more people-oriented and enhance personalized service. The technology of FIRD positioning is the basic technology for library to realize automation and improve efficiency. It is an important part of library collection service and Book Circulation application. The purpose of this paper is to explore the research on the application of FIRD book positioning technology in the intelligent library, so as to update the existing model of the library with the application of Internet of things. In this paper, we will use the research method of specific analysis to compare the data and come to a conclusion. The results of this study show that the development and upgrading of intelligent library, integration of human and resource matching, improve the efficiency of library operation, reduce costs. It is urgent to construct a new ecology and scene of Intelligent Library Based on the current development of intelligent library. Keywords: FIRD technology Intelligent library
Library management Information service
1 Introduction The development of modern information technology drives the development of library in the direction of automation, networking and modern information technology [1]. But the collected documents, especially the traditional paper documents, are still the most important way and content of the basic resource system and service of the library. In order to realize the path of library to intelligence, it is essential to actively develop book positioning technology and artificial intelligence application [2, 3]. The application of FIRD book location technology in libraries is an important direction for the development of intelligent books [4]. The book positioning technology has the characteristics © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 339–346, 2021. https://doi.org/10.1007/978-3-030-51431-0_50
340
Y. Zhao
of strong anti-interference, high durability and little influence from the surrounding environment, which is worth studying and putting into use [5]. Compared with the traditional barcode technology, FIRD has the advantages of convenience, rapidity, saving labor cost and low error rate, which provides the conditions for libraries to introduce this technology [6]. The university library is rich in collection resources. As the document resource guarantee and service institution of the university, it has always listed the improvement of management level and service quality as the strategic focus of development [7]. University library application FIRD can make the reader service and library management business process become scientific, efficient and intelligent, improve the management level and service level of library collection entity, mining FIRD technology potential, and to analyze the business data, can realize the library management and service of intelligent and humanization [8, 9]. “Smart library” is the development direction of libraries, and university libraries should aim to speed up the establishment of smart libraries that can provide first-class services [10]. From the perspective of perceptual computing, smart library = library + Internet of things + cloud computing + smart devices. FIRD is an important Internet of things perception technology, which can realize the function of tracking, locating and information sharing of target objects by combining with Internet and information communication technology [11, 12]. When FIRD is applied to information services such as libraries, it can reduce the cost of operation and maintenance of libraries, improve management efficiency and service level, and become the cornerstone of moving towards smart libraries [13]. In general, FIRD technology shows a rapid development trend in China, and relevant technical theories have been initially studied. Relevant researches abroad are relatively early, and have been put into library practice in many European and American countries [14]. The application of FIRD technology in libraries usually requires a relatively large investment, but systematic studies on the cost-effectiveness of application are scarce, which to some extent restricts the application and promotion of this technology [15]. For FIRD technology in this paper, with the rapid development of university library’s aims to FIRD actual scenario and the characteristics of application in the library, the relationship between the cost and efficiency of input-output analysis, reasonable judgment and analysis to help decision makers, and realize the efficient utilization of FIRD library whole resource structure optimization, make the university library in the application can be based on cost benefit situation in a timely manner after the corresponding adjustment, achieve the desired effect and good customer satisfaction, promote the university library to realize intelligent management and service goals.
2 Method 2.1
Core Concepts
(1) FIRD technology The technology of FIRD, which was developed at the end of last century, is a kind of technology that can automatically identify the target object and capture the relevant information through the radio frequency signal. The FIRD system consists of three
The Application of FIRD Book
341
parts: electronic tag, reader and application system. According to the power supply mode, there are two types of FIRD Tags: passive tag and the energy is converted from the radio wave provided by the reader. Active electronic tag, built-in battery, the sensing distance is greater than the passive tag, but the service life is shorter, depending on the life of the built-in battery. FIRD electronic tag itself provides limited information, but when it is connected to the rich collection and users that the library has, it will become an intelligent object, acting as a mobile connector of information utilization and information behavior world. The working principle of FIRD technology is realized by electronic tag, reader and system. The books in the library are labeled, and the reader sends a certain frequency of RF signal through the antenna, which is received remotely through the infrared ray, and then sent to the reader by the antenna regulator for reading. The internal system makes a logical judgment on the validity of the label, so that we can understand the readers’ use of the book and their use tendency, and then through the background database system, we can collect, process and remotely transmit the information of the target object. (2) Smart library Intelligent library is a kind of intelligent building formed by the application of intelligent technology in the construction of library. It is the organic combination and innovation of intelligent building and highly automatic digital library. The intelligent library has completely abandoned the operation mode of the traditional library. Get rid of the space and time limit, improve the use efficiency. This is the extension of Internet of things technology in the cultural field. Through cloud computing and artificial intelligence, the library’s intelligent management can be upgraded to better serve readers and reduce the burden of staff. The important significance of intelligent library is that it combines the advantages of Digital Library and the carrier of physical library, promotes it into an invisible existence, breaks people’s understanding of Library solidification, penetrates into the continuous information flow of users and Zhouyuan, and becomes a habit for readers and users to study and research. The construction and use of the library of wisdom pavilion has narrowed the distance between the library and the readers. It doesn’t need any physical devices, but it always exists objectively. For readers and users, in the future, among the numerous information flows, the information provided by the library will be the most authoritative and become the most stable provider of information resources for readers and users. 2.2
Research Methods
First of all, carry out on-the-spot investigation and interview methods, and carry out onthe-spot investigation for domestic enterprises with relatively successful technology, as well as academic exchanges and discussions with relevant experts in this field, so as to fully understand the development trend and market demand of book management technology. Secondly, literature research methods, through a large number of domestic and foreign literature on the book positioning system, analysis and research, real-time tracking of new information, trying to fully grasp the development trend and dynamics of the field of book management technology, on this basis, analysis and evaluation of the future development prospects of the technology-based book positioning system.
342
Y. Zhao
The third comparative research method, through the comparative study of various library management technologies, analyzes the feasibility of the implementation and development of the technology-based Book positioning system. On the basis of the existing theoretical research, this paper analyzes the cost-benefit of the application of word in university library. In order to understand and analyze the cost-benefit and other index factors in a more intuitive, specific and structured way, the method of building cost-benefit analysis model is used to study. The LANDMARC system is a classic indoor positioning system based on. Based on the distance measurement algorithm, the distance is calculated by the propagation model of received signal strength and path loss: PðdÞ ¼ Pr ðd0 Þ þ 10np log
d d0
ð1Þ
Among them, P (d) is the received signal strength value when the distance between the card reader of the signal receiving point and the transmitting point is D, and the unit is dB/MW, Pr ðd0 Þ is the received signal strength value at the reference distance; it is the path attenuation factor, and the range is generally between 2-4. qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi e ¼ ðx x0 Þ2 þ ðy yo Þ2
ð2Þ
Where ðx0 ; y0 Þ represents the actual location of the label to be located, and (x, y) represents the coordinate location of the label to be located obtained by the algorithm.
3 Experiment 3.1
Experimental Data Source
In this study, 60 libraries are randomly selected for investigation. These libraries are located in different regions, different universities and different levels of libraries. The selection of these research objects is mainly based on the factors of urban development level, combination of technology application, cooperation at home and abroad, and economic factors. At the same time, a questionnaire survey is conducted among readers of all ages and library staff. The comprehensive consideration of these factors is conducive to the representativeness and typicality of experimental data. 3.2
Experiment Implementation
Through the description of sample characteristics, it can be found that the gender of library staff is basically the same, and the age of readers is mostly under 40 years old. In the process of investigation, it is found that the older staff in the library is basically the reputation staff or the legacy staff in the development process of traditional library, which is very valuable for the development process and suggestions of the library. The education level is roughly evenly distributed among the majority of undergraduate and above types of work, which ensures the average coverage of the sample area, thus
The Application of FIRD Book
343
ensuring the comprehensiveness and accuracy of the following research questions for different types of work. In the transformation stage from traditional library to intelligent library, intelligent equipment will become the key element to reflect the intelligence degree of library. However, there are many problems in the current situation of the use of library intelligent equipment. If we can not improve these problems actively, we will not be able to provide strong technical support for the transformation of university library to intelligent library. This paper analyzes the basic situation of the current library scene, and then according to the five forces theory of the scene, it constructs and analyzes the scene space of the intelligent library from the five elements of wearable mobile devices, positioning system, big data and big data computing, sensors, social networks, and finally constructs the scene model of the intelligent library.
4 Discussion 4.1
Data Visualization
In the questionnaire survey, a total of 100 questionnaires were sent out, 85 of which were recovered, 80 of which were valid, the effective recovery rate was 82%, and the experimental results were valid. The basic information of the respondents is shown in Table 1. Table 1. Distribution of sample characteristics Sample variables Features Frequency Gender Male 42 Female 38 Age 18–28 25 29–50 40 Over 50 years old 15 Education Graduate student 20 Undergraduate 41 Junior college and below 19 Type of work Readers 45 Personnel 35
4.2
Percentage 52.5% 47.5% 31.3% 50% 18.8% 25% 51.3% 23.8% 56.3% 43.8%
Analysis and Discussion
With the advent of 4G era, more and more attention has been paid to personalized use. Without tedious artificial labor, the integration of artificial intelligence can complete all the work. Readers can quickly find the content they need by using book positioning technology, and borrow it by scanning electronic labels. The library uses infrared remote recognition to monitor the lending status of books. When readers return books, they can use the intelligent bookcase identification to return them quickly. This kind of intelligent library can handle many kinds of manual work at the same time, which
344
Y. Zhao
greatly improves the efficiency of work. In the modern library, many libraries have also built the WeChat public number, pushing the library activities in a timely manner, so that readers can enjoy services without leaving home. However, although the current intelligent library basically meets the requirements in hardware equipment, it cannot use such infrastructure to realize the advanced intelligent application of the intelligent library. The initiative and interaction of digital library need to be improved. As shown in Fig. 1, there are more or less problems in the sample library. Some libraries in the process of upgrading do not track and record the users’ whereabouts and behaviors according to the existing positioning equipment after users enter the library and conduct accurate identification. It is mainly manifested in personnel technology, resources, scenarios and services. At the personnel level, the results of the questionnaire reflect that the comprehensive quality of the librarians needs to be improved, and at the same time, the passive service thinking in the past should be changed, and the user-centered active service thinking should be established; at the technical equipment level, the results of the questionnaire reflect that the equipment of the intelligent library should be updated with the times, the connectivity should be strengthened, the hardware development should keep up with the trend, and the development of the software should be convenient and humanized 。 In terms of resources, users’ demand is the manifestation of rich resources, and even can introduce high-tech such as virtual reality.
70% 60% 50% 40%
Satisfied
30%
Commonly
20%
Dissatisfied
10% 0% Network speed
Find convenience
Self service facilities
Fig. 1. Survey of Readers’ satisfaction with information technology in the library.
5 Conclusion As an important step in the construction of intelligent library, the technology of FIRD recognition has changed the original management mode, and is an important part of library collection service and Book Circulation application. In recent years, with the indepth development of Internet of things technology, while strengthening the
The Application of FIRD Book
345
construction of literature resources, the library is also focusing on the construction of digital library, striving to form a collection pattern of paper documents and electronic documents. In recent years, the amount of data that needs to be stored in the library is increasing, the types and forms of information are becoming more and more diverse, and users have higher personalized needs. The technology of FIRD recognition is also used in many other fields. This technology can be effectively applied to stock verification, generating user statistical data, journal control and other fields. The biggest advantage is to reduce Book loss At present, with the popularization of FIRD technology, FIRD system is used in library to replace the traditional management and antitheft system based on bar code technology. It has become an inevitable trend to build a new management mode of automation and intelligence. The application of FIRD optical bar code recognition technology in Library and its application in specific library should be planned and considered properly. As 5G technology is put into use rapidly, the development prospect has certain significance for the intelligent construction and development of intelligent library.
References 1. Lu, C., Wang, Y.: Positioning variation analysis for the sheet metal workpiece with N-2-1 locating scheme. Int. J. Adv. Manuf. Technol. 89(9–12), 1–15 (2017) 2. Krenz, R.: 5G mobile and wireless communications technology (Osseiran, A. et al; 2016) [book reviews. IEEE Commun. Mag. 55(5), 18–18 (2017) 3. Gloy, Y.-S., Cloppenburg, F., Gries, T.: Integration of the vertical warp stop motion positioning in the model-based self-optimization of the weaving process. Int. J. Adv. Manuf. Technol. 90(9–12), 1–14 (2017) 4. Daza, L., Misra, S.: Beyond the internet of things: everything interconnected: technology, communications and computing [book review]. IEEE Wirel. Commun. 24(6), 10–11 (2018) 5. Bil, J., Grundeken, M.J., Pawłowski, T.: Self-positioning properties of dedicated bifurcation coronary stent BiOSS LIM® in the eye of 3D optical coherence tomography. Minerva Cardioangiol. 65(2), 193–196 (2017) 6. Duvedi, R.K., Bedi, S., Mann, S.: An efficient multipoint 5-axis tool positioning method for tensor product surfaces. Int. J. Adv. Manuf. Technol. 97(5), 1–17 (2018) 7. Hsu, K.-Y., DeLaurentis, P., Bitan, Y.: Unintended patient safety risks due to wireless smart infusion pump library update delays. J. Patient Saf. 15(1), 1 (2018) 8. Hodo, E., Bellekens, X., Hamilton, A.: Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System. Tetrahedron Lett. 42(39), 6865–6867 (2017) 9. Twiss-Brooks, A.B., Andrade, R., Bass, M.B.: A day in the life of third-year medical students: Using an ethnographic method to understand information seeking and use. J. Med. Libr. Assoc. 105(1), 12–19 (2017) 10. Sawant, S.: Free but authentic mobile dictionaries: pros and cons. Libr. Hi Tech News 34(2), 9–10 (2017) 11. Hoy, M.B.: An introduction to the blockchain and its implications for libraries and medicine. Med. Ref. Serv. Q. 36(3), 273–279 (2017) 12. Wilkes, S.E., Miodownik, M.A.: Materials library collections as tools for interdisciplinary research. Interdiscip. Sci. Rev. 43(1), 3–23 (2018)
346
Y. Zhao
13. Cunha, S.S., Gomes, G.F., Díaz Mendéz, Y.A.: Materials library collections as tools for interdisciplinary research. Interdiscip. Sci. Rev. 43(1), 3–23 (2018) 14. Belafi, Z., Hong, T., Reith, A.: A library of building occupant behaviour models represented in a standardised Schema. Energy Effic. 6(2), 1–15 (2018) 15. Yu, Z., Zhi-Tong, C., Yun, Z.: Tool positioning method for achieving double-point contact in flank milling of a concave surface with a barrel cutter. Int. J. Adv. Manuf. Technol. 93(5– 8), 1791–1807 (2017)
Blended Teaching Mode of Intermediate Financial Accounting Course Under the Background of “Internet +” Libin Xie(&) Fuzhou University of International Studies and Trade, Fuzhou 350202, China [email protected]
Abstract. The demand for accounting talents arising from the Internet era has put forward new requirements for the teaching of “Intermediate Financial Accounting” in schools. This paper first elaborates the teaching status of: oldfashioned teaching model, one-sided teaching assessment, thin teaching resources, etc. Therefore, colleges should update the teaching mode of this course. The “Intermediate Financial Accounting” flip classroom based on blended learning is a student-based, task-based learning mode [1]. Teachers can achieve good teaching results by carefully setting questions pre-class, organizing discussions in lessons, and summarizing reflection after school. In the implementation process, the Blended Teaching Mode will still face difficulties, and the corresponding solutions are put forward at the end of the article. Keywords: Intermediate financial accounting classroom
Blended learning Flipped
1 Introduction With the rapid development of Internet technology and the vigorous promotion of the national Internet + strategy, society has put forward new requirements for the quality of financial personnel. “Intermediate Financial Accounting” is a core course for financial related majors such as financial management, accounting, auditing, etc. It is also a necessary foundation for students to further study courses such as cost accounting and advanced financial accounting. Therefore, how to effectively meet the social needs of financial personnel has become an important task in the teaching of “Intermediate Financial Accounting” in colleges. It is of great significance to study the construction of the teaching system of “Intermediate Financial Accounting” in colleges, and to innovate the teaching model of this course.
2 Current Situation “Intermediate Financial Accounting” is a typical comprehensive and practical course. The teaching of this course not only allows students to systematically master theoretical knowledge, but also emphasizes the cultivation of students’ practical skills and makes © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 347–352, 2021. https://doi.org/10.1007/978-3-030-51431-0_51
348
L. Xie
them independent. Ability to solve problems properly in practice. There are some problems in this course. 2.1
Obsolete Teaching Model
The course of “Intermediate Financial Accounting” has a long history, but the teaching mode has not changed much. Most of them are mainly theoretical lectures, students spend most of their time passively receiving. The boring theoretical knowledge leads to the lack of interest in the course. Because of the limited schedule, students can only access fragmented theoretical knowledge, and the teaching effect is not ideal. 2.2
One-Sided Assessment Method
Most teachers evaluate the curriculum mainly from two aspects: the final theoretical examination and the time-based assessment. The final theoretical examination results account for a large proportion. The biggest drawback of this theoretical examinationoriented assessment method is that it makes students recite theoretical knowledge too much and neglects manual operation. Eventually, high test scores and weak practical ability appear, which further deviates from the teaching goals. 2.3
Lack of Teaching Resources
Some teachers only use one textbook when teaching, and they do not provide students with other auxiliary reading books, network resources, etc., which affects the quality of student learning. “Intermediate Financial Accounting” is a highly time-effective course. The accounting standards have changed significantly in recent years. The learning content of the “Intermediate Financial Accounting” course should also keep pace with the times. While there is often a certain time difference between the publication and distribution of teaching material, so other teaching resources with more timeliness are needed.
3 Design of the Teaching Activities The flip-based classroom based on blended learning is a student-based, question-based and task-based learning mode [2]. Teachers carefully set questions before class, organize classroom reviews and discussions, and summarize and reflect after class to achieve good teaching results. “Intermediate Financial Accounting” based on blended learning flips the classroom teaching model, as shown in the following Fig. 1.
Blended Teaching Mode of Intermediate Financial Accounting
349
Fig. 1. Flipped classroom teaching mode of Intermediate Financial Accounting based on blended learning
3.1
Pre-class
In the flipped classroom teaching model, the initial acquisition of students’ theoretical knowledge mainly depends on self-study [3]. Therefore, the instructor should prepare and collect relevant learning materials according to the lesson objectives and content of the lesson before the lesson, and preset related questions to arrange the course tasks. Students use extra-curricular time to complete the study of related theoretical knowledge through learning platforms and micro-lecture videos, and initially answer preset questions [4]. According to the characteristics of the students, a study group can be formed on a scale of 3–5 people, so that the learning members can supervise each other and ensure the effect of pre-class learning. 3.2
Lesson
3.2.1 Class Guidance Based on the online learning records of the students on the online platform, the teacher judges in advance the student’s learning tasks to complete the task before class [5]. First of all, teachers should extract representative, teaching-worthy questions. For example, when teaching knowledge points such as “accelerated depreciation of fixed assets”, teachers can ask “What are the cases of accelerated depreciation in real life?” Through the questions in the tutorial, the students’ enthusiasm can be mobilized. Then, enter the Q&A phase. Teachers answer students’ representative questions in the selfstudy session.
350
L. Xie
3.2.2 Advanced Tasks The primary learning tasks arranged before the lesson are relatively simple and can usually be completed by self-study. After the teacher answers questions in the class, the students have a better understanding of the knowledge and have a deeper basic knowledge, so the teacher can arrange more advanced and more complex learning tasks, and ask the students to complete the tasks in the class. The whole process requires the participation of all members of the group, active discussions, and on-site Q&A guidance to assist students in completing tasks. 3.2.3 Course Evaluation Each study group will show or explain to the class on the spot after completing the advanced tasks at the prescribed time. Other groups can ask questions or express their opinions. For the theoretical teaching part, the teacher can evaluate by asking questions, while for the case practice teaching part, teachers’ evaluation and the group members’ mutual evaluation can be used to conduct the overall evaluation and propose corresponding amendments. 3.3
After School
3.3.1 Comprehensive Assessment The determination of the assessment method plays a strong role in guiding students’ behavior [6]. For “Intermediate Financial Accounting”, both the final exam and the procedural evaluation are required. The procedural evaluation should also include a comprehensive assessment of students’ online and offline learning. Among them, the procedural assessment part consists of online assessment and offline assessment. The online assessment part needs to comprehensively evaluate students’ online learning, online testing, and online assignment completion. The offline assessment section can comprehensively assess students’ attendance, classroom evaluation, mid-term testing, and so on. 3.3.2 Teaching Reflection Teachers must reflect on the teaching process in a timely manner after completing each course: whether the pre-class teaching resources meet the needs of students’ selflearning, whether the group is reasonable, whether the pre-class tasks are arranged appropriately, whether the answers to the questions in the class have the desired effect, whether the arrangement of advanced tasks can effectively achieve knowledge deepening.
4 Dilemmas and Suggestions for Improvement 4.1
Dilemmas
4.1.1 Require Teachers with Strong Comprehensive Ability Teachers are the designers and controllers of the entire class. Teachers’ understanding of the curriculum plays a vital role in the design and implementation of the curriculum [7]. Blended teaching places higher requirements on the quality of teachers. First,
Blended Teaching Mode of Intermediate Financial Accounting
351
teachers are required to have a solid theoretical foundation. “Intermediate Financial Accounting” is a wide-ranging course that requires teachers to be familiar with the knowledge of tax law, financial management, cost accounting and other related courses. In addition, in recent years, accounting standards have been frequently updated, which requires teachers to keep pace with the times and have a solid theoretical foundation. Second, this is a very practical course, and teachers need to have considerable practical experience, so as not to cause a disconnect between theory and practice when teaching. At present, many college teachers have just graduated from college and taught in college. They have not had much practical experience, which directly affects the teaching effect of experimental teaching. Third, blended teaching requires teachers to have a strong ability to operate computers and network platforms. Some old teachers follow the rules of the old, and have a certain resistance to fresh things. 4.1.2 Require Students to Have Strong Learning Autonomy A very important part of the blended teaching mode is to require students to complete the learning of micro-video independently before class [8]. Online teaching is different from traditional classroom teaching. When students do not communicate face-to-face with the teacher before the lesson, learning has already begun. Require students to learn autonomously before class, which requires students to learn autonomously. 4.2
Suggestions for Improvement
4.2.1 Strengthen the Teaching Staff Colleges should formulate various effective mechanisms to strengthen the training of teachers’ comprehensive ability [9]. First, develop regular and irregular training mechanisms. colleges encourage teachers to improve their knowledge through continuing education or pursuing higher education degrees. The school may regularly invite famous teaching teachers and industry experts to carry out lecture training for the teachers in the school to improve the professional ability of the teachers. You can also broaden teachers’ horizons by sending related teachers to visit schools, attend academic conferences, or receive relevant training, so that teachers can master the most advanced academic knowledge. In addition, teachers can improve their practical ability by conducting horizontal topic research with enterprises and internship internships [10]. Finally, colleges can also regularly hold competitions such as lectures and observations to encourage teachers to communicate and learn. 4.2.2 Develop Students’ Autonomy in Learning No matter how good the course design is, if it is not implemented in place, it will only be an argument. If the teacher is the necessary foundation for a good lesson, then the active participation of the students is the highlight of the lesson. Teachers should make full use of the platform’s recording function to supervise students’ online learning time, online assignments, and test completion, and make announcements at intervals. In order to urge students to complete the actual watching of micro-videos as required, some relevant questions can be interspersed in the video playback, and students are required to answer before they can watch the video further, thereby supervising the
352
L. Xie
students’ online pre-class learning. When students complete the online learning perfectly, they will be rewarded in time to strive for the internalization of learning behavior into autonomous behavior.
5 Conclusion The practice of this paper proves that the flipped classroom teaching based on blended learning has higher feasibility and good teaching effect in teaching, but there are also some problems. In the course of teaching practice, teachers should continuously reflect on teaching and optimize the design of flipped classroom teaching, so that the flipped classroom teaching mode receives better teaching effects in teaching practice [11].
References 1. Koo, C.L., Demps, E.L., Farris, C., et al.: Impact of flipped classroom design on student performance and perceptions in a pharmacotherapy course. Am. J. Pharm. Educ. 80(2), 33– 39 (2016) 2. Porcaro, P.A., Jackson, D.E., Mclaughlin, P.M., et al.: Curriculum design of a flipped classroom to enhance haematology learning. J. Sci. Educ. Technol. 25(3), 345–357 (2016) 3. Wei, W., Tong, Z., Shaochun, Z.: Design and case study on e-learning space based on flipped classroom. J. Distance Educ. 03, 71–77 (2014). (in Chinese) 4. Hu, X., Zhang, H., Song, Y., et al.: Implementation of flipped classroom combined with problem-based learning: an approach to promote learning about hyperthyroidism in the endocrinology internship. BMC Med. Educ. 19(1) (2019). (in Chinese) 5. Handayani, D.P., Sutarno, H., Wihardi, Y.: Design e-learning with flipped learning model to improve layout understanding the concepts basic of the loop control structure. J. Phys: Conf. Ser. 1013(1), 012100 (2018) 6. Lina, W.: Teaching design of “access database technology and application” based on flipped classroom. In: 2018 2nd International Conference on Data Science and Business Analytics (ICDSBA). IEEE Computer Society, 2018. (in Chinese) 7. Slomanson, W.R.: Blended learning: a flipped classroom experiment. J. Legal Educ. 64(1), 93–102 (2014) 8. Zhang, H., Meng, L., Han, X., et al.: Exploration and practice of blended learning in HVAC course based on flipped classroom. In: International Symposium on Educational Technology. IEEE, 2016. (in Chinese) 9. Sirakaya, A.: The effect of a flipped classroom model on academic achievement, selfdirected learning readiness, motivation and retention. Malays. Online J. Educ. Technol. 6, 76–91 (2018) 10. Andrade, M., Coutinho, C.: Implementing flipped classroom in blended learning environments: a proposal based on the cognitive flexibility theory. J. Interact. Learn. Res. 28(2), 109–126 (2017) 11. Liu, H., Huang, Q.: Research on the design of undergraduate teaching process of accounting major based on the overturned classroom—taking “intermediate financial accounting” course teaching as an example. China Univ. Teach. 8 (2015). (in Chinese)
Migration and Integration Strategy of Virtual Machines in Cloud Data Center Based on HPGA Zhenxiang He(&) College of Cyberspace Security, Gansu University of Political Science and Law, Lanzhou, China [email protected]
Abstract. [Purpose] Server virtualization technology is the basic form for the cloud data center to serve customers. While the cloud data center reduces the SLA violations in the early stage, the increase in the utilization of resources such as virtual machine servers and network equipment and decrease in energy consumption have become an important issue for reduction of operating costs. Therefore, on the background of the cloud data center network based on SDN technology, this paper studies a cloud data center resource utilization and energy consumption optimization strategy through virtual machine migration and integration. [Method] The technology based on SDN is firstly introduced, the approximate optimal solution FFD algorithm for the multidimensional vector bin packing problem is then presented, the Partheno-Genetic Algorithm (PGA) is then recommended, finally a Hybrid Partheno genetic Algorithm (HPGA) based on the both is established and a mathematic model is created. [Results] By combining the advantages of FFD and PGA, this paper improves the utilization of the resources of the entire cloud data center, reduces energy consumption, and prevents the occurrence of computing “hot spots”. [Conclusion] Experiments in CloudSim prove the effectiveness of the algorithm. Compared with FFD and PGA algorithms, it is able to enhance the efficiency of the Data Center effectively, and obtain the optimal solution more quickly, thereby balancing the physical resources of the server.
1 Introduction With the popularity of the Internet and the sharp increase in data, enterprises need to quickly process large-scale data to meet the ever-increasing various forms of user needs [1]. Driven by this demand, the scale of cloud data processing center services is expanding, and the growing size of servers and business has led to a series of new challenges. Despite of the Data Center established by investment of huge financial and material resources, shortage of effective management of server resources has not only reduced the utilization of cloud data center resources, but also caused the increasing equipment energy consumption. As one of the most important technologies in cloud computing, by using the server virtualization technology, server virtualization abstracts server physical resources into a huge resource pool, and realizes the on-demand allocation of resources, thus effectively © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 353–360, 2021. https://doi.org/10.1007/978-3-030-51431-0_52
354
Z. He
reducing its energy consumption and saving its operating expenses obviously. With regard to effective improvement of the resource utilization of the Cloud Data Center and reduction of the energy consumption, energy consumption cannot be reduced effectively by shutting down the ports that do not transmit information in the short-term range. However, after management through SDN technology, opening and closing related equipment within the first time can greatly reduce energy consumption by up to 50%. In addition, during the operation of the cloud computing data center, the virtual machine generation and destruction, as well as changing virtual machine load often cause the allocation sparsity of virtual machines and unbalanced use of server resources.
2 SDN and Energy Consumption Optimization 2.1
SDN Network
The structure of the traditional Internet deploys data forwarding and control logic in network devices, and as a result, some new methods cannot be used in time and effectively and cannot be expanded in time. As a new network architecture [2], SDN adopts the structure where network control is separated from data forwarding logic and by deploying special control decisions at the high-level of the network, guides the lower layer of the network to implement data forwarding, effectively making up for the deficiency of the traditional network structure. With good programming ability, this structure is an important technology in the cloud computing environment and makes the Internet intelligent and informationized control become a reality. The application based on it has obtained a lot of achievements. At present, four major SDN genres represented by OpenFlow, Overlay, I2RS, and NFV have occurred in the industry, each of which has its own characteristics, and there are certain differences in their applicability and maturity [3]. In 2009, MIT highly recognized OpenFlow-based SDN technology and promoted the rapid development of SDN and OpenFlow. Therefore, this paper conducts the study using the network structure of OpenFlow-based SDN technology. Facilities in the Data Center are distributed very intensively, leading to more difficulty in its deployment. Cui et al. improved the efficiency of data migration in the Data Center using SDN to monitor the cache information of each device throughout the network [4]. Each device in the Data Center, including the server and the router, can cache information. When the two servers exchange data for the first time, the relevant router will save the information. When the server exchanges data again, the SDN can select the most efficient configuration method according to the saved information, improving the efficiency of data migration [5]. 2.2
Energy Consumption Optimization
There are mainly three parts in Cloud Data Center energy consumption: the energy consumption of network equipment, cooling equipment and servers equipment, as showed in Fig. 1.
Migration and Integration Strategy of Virtual Machines in Cloud Data Center
355
Fig. 1. Energy consumption of Cloud Data Center
3 Optimal Solution for MDVPP 3.1
MDVPP
Each virtual machine in the Cloud Data Center requires multiple physical resources, such as CPU, disk, and network bandwidth. The virtual machine integration problem can be modeled as Multidimensional Vector Bin Packing Problem (MDVPP) [6]. Up to now, scholars have proposed a series of algorithms for calculating approximate optimal solutions, of which the more representative technologies include: heuristic algorithm of First Fit algorithm (FF) or First Fit Decreasing algorithm (FFD) [7], genetic algorithm and other intelligent algorithms. 3.2
Multi-objective Optimization Model
In the optimization process of virtual machine migration, the objective is diversity [8]. Firstly, under the condition of satisfying business requirements, the number of physical machines in operation should be as small as possible. Secondly, due to the standby power consumption, the CPU load of the running physical machine should be as high as possible. Finally, the degradation time of service quality and the occupancy rate of network bandwidth should be as low as possible in the migration process. All of these are related to a core feature, the number of virtual machine migrations, so models can be built around reducing the number of migrations. 3.3
FFD Algorithm
• Input: the volume of n items S1, S2, S3,…, Sn, 0 < Si < 1. • Output: The total number of used boxes m and the corresponding packing scheme index(i). • Step1: Set i = 1, m = 1, and arrange the volume of n items in descending order. • Step2: If i = n+1, go to Step5, otherwise K = 1; • Step3: Put the ith item ai into the Kth box BK. If the total items in the box satisfy, then index(i) = k, m = max{m, k}, and go to Step2; • Step4: k = k+1 to Step3; • Step5: Output the packing number m and packing scheme index(i).
356
Z. He
4 Partheno-Genetic Algorithm PGA 4.1
Genetic Algorithm
Genetic Algorithm is an adaptive global optimization probabilistic search algorithm constructed by simulating the genetic and evolutionary processes of organisms [9]. It was a technology expounded by Holland in the research process and was earliest used for analysis of issues related to the adaptive system. GA is generally divided into several manipulations such as population coding and generation, selection and mutation [10]. The general workflow is shown in Fig. 2.
Fig. 2. Workflow of genetic algorithms
4.2
Partheno-Genetic Algorithm
Aiming at the blindness and inefficiency of traditional genetic algorithm in solving grouping problems, Falkenauer et al. proposed Grouping Genetic Algorithm (GGA), and through targeted coding and crossover and mutation operator design, improved the efficiency of the genetic algorithm greatly. However, the grouping genetic algorithm does not fully take into account the number of “boxes” and other related aspects, and can not fully meet the needs of migration and integration of virtual machines in cloud data centers. Li Mao Jun et al. proposed a new method, the Partheno-Genetic Algorithm (PGA), which improved the problem of “premature convergence” of genetic algorithms by gene transposition and inversion [11]. 4.3
Hybrid Partheno-Genetic Algorithm (HPGA)
This paper synthesizes the two ideas of PGA and FFD algorithm, and replaces the selection and mutation operators of genetic algorithm with PGA operator and FFD mutation operator. The concrete steps are shown in Fig. 3.
Migration and Integration Strategy of Virtual Machines in Cloud Data Center
357
Fig. 3. Flowchart Hybrid Partheno-Genetic Algorithm (HPGA)
1. Coding. Genetic algorithm is used for solving the bin packing problem, and the symbolic coding method is often used. A chromosome X is used to represents a bin packing plan. 2. Fitness function. In the genetic algorithm, fitness is an index to analyze and judge the superiority of each individual in the population. In each iteration, individuals with relatively high values of this index are more likely to inherit to the next generation, while individuals with relatively low values are less likely to inherit to the next generation. 3. Generation of initial population. Traditional genetic algorithms usually generate initial population in a random way, but it is difficult to generate feasible solutions satisfying host capacity constraints in the migration and integration of virtual machines. Therefore, in the integration of virtual machine migration, this paper takes the current location of virtual machine as the starting point of iterative optimization. To ensure the diversity of the initial population, FFD mutation operator is used to preprocess the location of the current virtual machine, and N virtual machine allocation schemes are formed, which are regarded as the initial population. 4. Partheno genetic operator. In general, traditional genetic algorithms often use crossover and mutation operators to form new individuals. However, as far as the bin packing problem is concerned, the probability that the traditional genetic algorithm forms an invalid solution is very high, and it is often difficult to obtain an optimal solution. Therefore, in this paper, the Partheno-Genetic Algorithm (PGA) operator is mainly used to replace the crossover and mutation operator to generate new individuals. Specifically, it involves operators such as gene transposition, shifting and inversion. Gene transposition refers to the location of one or more pairs of genes on
358
Z. He
the exchange chromosome. Gene shifting is the sequential forward or backward cyclic shifting of one or more random length segments on a chromosome. Gene inversion is the sequential inversion of genes in some segments of chromosome. Literature conducted a detailed and in-depth discussion on this subject, and proved that the three operators are equivalent to each other, that is, their genetic manipulation functions are consistent [11]. However, the degree of damage to chromosomes caused by them is different, and there are certain differences. Moreover, there is a certain relationship between this difference and the actual problem to be dealt with. The selection of the PGA operator largely determines the performance of this aspect and the level of search capabilities it has. In general, the higher the damage to chromosomes, the stronger the search ability, but the corresponding convergence speed becomes slower. In view of the above reasons, the transposition operator is selected in the study for solving. 5. FFD mutation operator. Check chromosomes to determine whether there are hosts that do not meet the relevant restrictions. If so, set the number of hosts mapped by their virtual machines to 0. If not, choose a physical host according to probability p and set the number of hosts mapped by their virtual machines to 0. Queuing all virtual machines with mapped hosts numbered 0 forms a queue according to the order of resource requirements from high to low. Map the queue to a physical host (not empty and with the smallest number) that meets its resource requirements. If there is no qualified physical host, map the queue to an idle physical host.
5 Partheno-Genetic Algorithm PGA In this paper, we simulate a cloud data center on CouldSim platform. The number of physical servers in the center is PM, and the configuration of these servers is the same. The number of virtual machines configured on these servers is VM. These virtual servers migrate on physical servers according to different migration algorithms. In order to compare the performance of different algorithms, we have tested genetic algorithm (GA), FFD algorithm and the proposed algorithm (HPGA) under the same configuration. In the experiment, the resource requirement of virtual machine only considers CPU and memory, and the CPU and memory resources that physical hosts can provide are set at 1. The CPU and memory requirements of virtual machines are randomly assigned to random physical hosts in the range of [0,0.2]. On the Relevant Parameters of Genetic Algorithms, scale factor t is 0.6, gap of generation is 0.8, and the size of population is 20. All the performance of HPGA algorithm and the FFD algorithm under three different sets of problem scales are compared, as shown in Figs. 4, 5, and 6.
Migration and Integration Strategy of Virtual Machines in Cloud Data Center
359
Fig. 4. Performance comparison of VM 50 and PM 16
Fig. 5. Performance comparison of VM 200 and PM 64
Fig. 6. Performance comparison of VM 500 and PM 256
As shown in Figs. 4, 5, and 6, with the increasing number of physical and virtual machines, HPGA can find an optimum solution, with faster solving speed, obviously reduced number of migrations and significantly reduced number of iterations. As a
360
Z. He
whole, the HPGA algorithm is better than the FFD heuristic algorithm and the GA algorithm in performance, and can effectively improve the virtual machine migration and integration performance.
6 Conclusion In the process of building cloud computing center, reasonable virtual migration strategy can effectively reduce the overall energy consumption. This paper constructs a multiobjective optimization model of virtual migration based on hybrid parthenogenetic algorithm (HPGA). The goal of optimization is to reduce the number of virtual migration in general on the premise of ensuring business operation and reducing energy consumption as much as possible. The simulation experiment results show that the proposed method HPGA has better performance than FFD in virtual machine integration migration. Acknowledgements. This work is supported by the National Natural Science Foundation of China (No. 61562002).
References 1. Yuan, H., Bi, J., Li, B.: Workload-aware request routing in cloud data center using softwaredefined networking. J. Syst. Eng. Electron. 26(1), 151–160 (2015) 2. Li, D., Shang, Y., Chen, C.: Software defined green data center network with exclusive routing. In: IEEE INFOCOM (2014) 3. Teixeira, J., Antichi, G., Adami, D., et al.: Datacenter in a box: test your SDN clouddatacenter controller at home. In: Second European Workshop on Software Defined Networks. IEEE Computer Society (2013) 4. Cui, W., Qian, C.: Dual-structure data center multicast using software defined networking. Eprint Arxiv (2014) 5. Banikazemi, M., Olshefski, D., Shaikh, A., et al.: Meridian: an SDN platform for cloud network services. IEEE Commun. Mag. 51(2), 120–127 (2013) 6. Greenberg, A.G., Hamilton, J.R., Maltz, D.A., et al.: The cost of a cloud: research problems in data center networks. ACM SIGCOMM Comput. Commun. Rev. 39(1), 68–73 (2009) 7. Nicholson, M.: Genetic algorithms and grouping problems. Softw. Pract. Exp. 28(10), 1137– 1138 (2015) 8. Shujun, P., Ximin Z., Daming, H., et al.: Optimization and research of Hadoop platform based on FIFO scheduler. In: International Conference on Measuring Technology & Mechatronics Automation. IEEE (2015) 9. Lei, W., Li, M., Cai, J., Liu, Z.: Research on mobile robot path planning by using improved genetic algorithm. Mech. Sci. Technol. Aerosp. Eng. 28(4), 193–195 (2017) 10. Zhao-min, Z.: Cloud computing load balancing based on improved genetic algorithm. Electron. Des. Eng. 25(4), 42–45 (2017) 11. Chenxi, Z.: Study of optimal sensor placement in bridge monitoring based on improved Partheno-genetic algorithm. Zhejiang university (2015)
Analysis and Comparison of Routing Protocols in Wireless Sensor Networks Binbin Yu1,2,3(&) 1
3
College of Computer Science and Technology, Jilin University, Changchun 130012, China [email protected] 2 College of Computer Science and Technology, Beihua University, Jilin 132013, China Jilin Provincial Department of Education, Key Laboratory of Intelligent Data Analysis and Processing, Jilin 132013, China
Abstract. With the continuous development of wireless sensor technology, wireless network, big data, cloud computing and other new generation of information technology, wireless sensor networks has become a research hotspot in the field of information security and an indispensable part of people’s lives. Wireless sensor networks are extensive applied into agriculture, forestry, military, medical health, urban rail transit and other fields. Energy saving and power consumption reduction are the key technologies to be solved in wireless sensor networks. Wireless Sensor Networks take common perception and acquisition of the information of the objects to be perceived as the main purpose. In the article, firstly, the classical routing protocols for wireless sensor networks are introduced. Secondly, the relevant effective energy-saving routing protocols are analyzed and compared. Finally, the future development trend of this research is prospected. Keywords: Wireless sensor networks protocol
Energy consumption Routing
1 Introduction Due to each node of wireless sensor networks has strong ability of collecting information and wireless communication, it has a wide application prospect. Wireless sensor networks have broad application prospects, such as in the forestry, agriculture, military, medical health, smart home, environmental monitoring geology, space exploration and other fields. It makes the outside world more easily perceived and more convenient for our life. Wireless sensor network [1] are composed of many sensor nodes mapped out in the monitoring area. The main purpose is to sense and collect data information of monitoring objects. It can realize data acquisition, quantification, perception fusion, wireless communication [2]. It transmits information to observers through base stations or satellites. As is shown in Fig. 1, wireless sensor networks architecture. Wireless sensor networks [3] are extensive applied into different and more complex domain environments, such as deploying sensor nodes in a laboratory, where each © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 361–367, 2021. https://doi.org/10.1007/978-3-030-51431-0_53
362
B. Yu
Internet Base station
Nodes
Sink nodes
Manager node
Fig. 1. Wireless sensor networks architecture
sensor node works together. In this particular monitoring area, data information such as temperature, humidity, graphics, images, audio and video are sensed, collected and transmitted by sensor nodes. Data information is transmitted and processed through wireless communication to base stations, networks and so on, thus forming a selforganizing and self-adaptive system. For example, in smart home, wireless sensor network is applied. In the residential monitoring area, many sensor nodes are deployed to constitute the smart home network system, so as to enhance the safety, comfort and convenience of the home. After wireless sensor network is deployed in the smart home [4], the control of smart home appliances, electric curtains, fire prevention and theft alarm are provided to users. The smart home network can be remotely controlled when the user is not at home. Before users go home, they turn on air-conditioning, TV and so on. According to their own preferences and characteristics, they choose the appropriate air-conditioning temperature and favorite TV programs. Smart home brings us a lot of convenience in our life. One of the characteristics of wireless sensor networks is large-scale network. Wireless sensor networks possess the characteristics of large scale and self-organizing networks. It has the characteristics of a great quantity nodes and high density. The number of nodes is very large, probably tens of thousands or more. Because of the large-scale distinguishing feature of wireless sensor networks, it requires that the software and hardware should be open and fault-tolerant to a certain extent. When wireless sensor networks are relatively open in space, there may be some network security problems. Every node senses and collects data and information, which is easy to be stolen, so as to determine whether there are security problems in wireless sensor networks [5]. In the process, the energy and computing power of each node in wireless sensor networks are limited to some extent. Owing to the energy of each node in the networks is limited, we need to take into consideration the energy consumption and energy balance of each node in the networks. One of the characteristics of wireless sensor networks is that data information is the center and is closely related to various applications. In the meantime, the routing protocol of the networks is data-centric. To a certain extent, according to the demand for data acquisition, data communication mode and so on, it accurately extracts
Analysis and Comparison of Routing Protocols
363
the value of an index in a monitoring area. In this process, it does not pay special attention to the data perceived and collected by a node. Wireless sensor networks can be used in environmental monitoring, medical health, smart home, geospatial and other fields. Application environments are very different, so it is necessary to design application-related and environment-compatible routing protocols for different specific environments and special requirements [6].
2 Classical Routing Protocols for Wireless Sensor Networks 2.1
Low Energy Adaptive Clustering Hierarchy Protocol (LEACH)
LEACH [7] is a classical hierarchical routing protocol, which is the solid foundation for the improvement and development of many hierarchical routing protocols. The networks are separated into several clusters by the algorithm and each cluster has many cluster nodes and one cluster head node. Each cluster is a management unit. Cluster head node is the central backbone node in a certain area, while other common nodes are general sensor nodes. By choosing cluster heads randomly, the energy consumption of each node can be balanced, thus prolonging the life cycle of the networks to a certain extent. Cluster head nodes distribute information to each cluster node. These nodes periodically select clusters on the basis of the published information. The cluster node notifies the cluster head node of the perceived data information. Cluster head node fuses perceived data information. To a certain extent, cluster-head nodes can be selected periodically, randomly and adaptively, so that the energy distribution of the networks is more appropriate and uniform. And the energy consumption of the fixed cluster head nodes is further reduced [8]. LEACH protocol uses information fusion technology to reduce traffic. This can ensure effective data transmission to a certain extent. 2.2
Gossiping Protocol
Gossiping protocol [9] is developed on the basis of flooding protocol. Flooding is a traditional flooding routing protocol, which collects and senses data from each node in wireless sensor networks and transfers it to neighboring nodes. Receiving and transmitting cycles go back and forth until the data packet reaches the destination or expires. The flooding protocol has some drawbacks. Nodes in wireless sensor networks obtain many identical data from adjacent nodes at the same time, which results in overlap. The topology of the network does not need to be maintained by the protocol, so it avoids the waste of computing resources. However, overlapping and blind use of information resources may lead to information explosion. Gossiping protocol [10] is an improvement based on Flooding protocol to prevent a node from receiving multiple identical messages from adjacent nodes at the same time. When transmitting information, a node randomly selects an adjacent node. This can avoid overlapping phenomenon to a certain extent and prevent the implosion of information transmission.
364
2.3
B. Yu
Geographic and Energy-Aware Routing (GEAR)
GEAR protocol [11] is a routing protocol based on energy efficiency and geospatial location, it uses heuristic data transmission mode to transmit data information to the target area of the networks. Data information includes location attributes and other information, so data information spread throughout the networks can be transmitted to the appropriate area. In GEAR protocol [12], for instance, the factors consist of the residual energy of each node in the networks and the distance from the destination node are fully taken into account. In data transmission in target domain, when a node receives a data packet, it is first necessary to check whether or not there are adjacent nodes nearer the target area than it. If so, the closest node to the destination area is chosen as the next hop routing node for data transmission. If all the adjacent nodes are farther away from the target area than the node, the node will be void. If the data packet has arrived at the target area, the data information can be transmitted by recursive geographic transmission and restricted flooding [13]. This compares several classical wireless sensor routing protocols. Although LEACH protocol has good scalability, it is not suitable for deploying large area networks. Its scalability and mobility are good. Gossiping protocol [14] can avoid the problem of data information implosion, but there is little or no structure for operation to solve a series of problems such as blind use of resources. To a certain extent, GEAR can balance the energy consumption and prolong the life cycle of the networks. It can exchange periodic tables. Its scalability and mobility are poor and its cost is high [15].
3 Efficient Energy-Saving Routing Protocol for Wireless Sensor Networks 3.1
An Energy Saving Routing Protocol
LEACH protocol has the characteristics of self-adaptation and low energy consumption. It is a classical hierarchical protocol. LEACH avoids the problem of increasing energy consumption in planar wireless sensor networks due to frequent routing exchanges between adjacent nodes. In LEACH, the cluster head node is chosen adaptively and randomly. It broadcasts messages to other neighboring nodes. The other nodes choose which cluster they will join according to the strength of the data information transferred from the cluster head node. LEACH can solve the problem of energy loss in wireless sensor networks to a certain extent and prolong the network lifetime. However, LEACH protocol randomly chooses cluster head nodes, which can easily increase energy consumption and shorten life span of the networks. In [16], the authors improve the LEACH protocol and optimize the location and the quantity of LEACH cluster head nodes to decrease the energy waste and increase the life cycle of the networks. Authors mainly analyze each cluster formed by each virtual network, and use cluster head node to find routing and transmit data information. In this paper, the network is used to distinguish the network, which enables each ordinary node to calculate its own network number according to the data information transmitted
Analysis and Comparison of Routing Protocols
365
by the cluster head node and its location information, which is conducive to the clustering process. 3.2
Proposed Non Uniform Clustering Algorithm of Dual Cluster Head (PUDCH)
The key problems to be solved are energy waste and networks lifetime. Cluster head nodes are always working in the wireless sensor. Too many operations such as data compression, information fusion and publishing data and information can cause large energy consumption and reduce network lifetime. According to the above problems, in [17], the authors propose a non-uniform clustering dual-cluster head algorithmPUDCH. It avoids the phenomenon that the excessive work of cluster head nodes leads to the excessive energy consumption and the reduction of the networks lifetime. When choosing cluster head node, the data processing ability and positional information of other nodes need to be fully considered. The network is divided into non-uniform clusters. The secondary cluster head node is determined on the basis of the energy of the cluster node. It takes full account of the each cluster head node, secondary cluster head node and surplus energy of each cluster node, as well as the range from each cluster head node to the manager node, base station and other places. The energy of the secondary cluster head node is lower than that of the primary cluster head node. They complement each other and work together. The primary cluster head node mainly assume responsibility for the data information sensing and acquisition, while the secondary cluster head node is mainly responsible for data information fusion processing and transmission. In this way, the energy waste is reduced and the life span of the networks is extended to a certain extent. Simultaneously, it also reduces the occurrence of data information crashes and other phenomena, and reduces the occurrence of network energy loss to a certain extent. 3.3
An Energy Efficient Clustering Routing Protocol (BCCP)
In BCCP protocol [18], energy balance clustering algorithm makes full use of location information and residual energy of nodes to reduce energy waste. By decreasing energy cost clustering algorithm, the energy cost of intra-cluster and inter-cluster communication can be reduced by using the similarity of sensing data information and sensing types between sensor nodes and adjacent nodes, so as to reduce network energy consumption. BCCP is improved on the basis of LEACH and other protocols. LEACH protocol [19] mainly uses the clustering idea. Each cluster constitutes a local management unit. The cluster head node communicates directly with each cluster node, and the cluster head node controls the activities of the cluster node. Therefore, the network has better adaptability and extensibility. However, LEACH algorithm has many shortcomings, such as when cluster nodes choose to join the cluster, they only judge on the basis of the strength of the received signal. The correlation between nodes is not taken into account in this process. BCCP protocol is divided into energy balance clustering algorithm BCCP-BA and energy reduction clustering algorithm BCCP-ESA. In energy-balanced clustering algorithm BCCP-BA, cluster head nodes are determined in the light of the information
366
B. Yu
of energy consumption and location of nodes, so that the time to determine cluster head nodes is short and energy consumption is low. In BCCP-ESA, the algorithm takes full account of the location correlation between nodes, energy consumption of nodes, similarity of data information and other factors, therefore the network energy waste is more balanced and the network lifetime is longer. In energy saving routing protocol, the location and number of LEACH cluster head nodes are optimized, which can effectively decrease network energy waste and extend the life span of the networks. To a certain extent, the PUDCH protocol avoids the phenomena of excessive energy waste and shorter network life caused by overwork of cluster-head nodes. The BCCP protocol decreases the energy cost and extends the life span of the networks by reducing the energy consumption of clustering algorithm and making full use of the similarity of sensor data information and types among sensor nodes.
4 Conclusion With the continuous development of the Internet of Things technology, wireless sensor networks are more closely related to our lives. It is widely used in a variety of complex environments, such as military, agriculture, forestry, intelligent transportation, intelligent logistics, geographic information, medical health, smart home, driverless and other fields. Wireless sensor networks senses and collects the monitoring target data information through a lot of sensor nodes, and calculates and processes the data information through wireless communication, and finally transmits it to users. This paper compares and analyses the classical and low-energy routing protocols, and summarizes the characteristics of these routing protocols. With the continuous development of wireless sensor networks, the wireless sensor networks has a wide range of applications, it is affected by more complex environment and other factors, there are still some problems to be further studied in the future. Effective perception of data information, improving the quality of data information collection, using less energy consumption and less computation to complete data encryption to ensure high reliability of data information transmission, reducing network energy consumption during the transmission process, prolonging the network life cycle and so on, these are the problems that need to be solved. Acknowledgments. This research was supported by the Education and Science Planning Project of Jilin Province (Grant ZD18019).
References 1. Li, P., Dai, J.: A novel energy-saving routing algorithm in WSN. Comput. Eng. Sci. 36(07), 1275–1278 (2014). (in Chinese) 2. Su, S., Zhao, S.: Wireless sensor routing algorithm based on energy balance. Comput. Sci. 45(10), 111–114 (2018). (in Chinese)
Analysis and Comparison of Routing Protocols
367
3. Ran, Y., Li, F.: Mobile wireless sensor network routing protocol based on active region. Appl. Res. Comput. 36(11), 1–5 (2019). (in Chinese) 4. Xing, G., Neng, H.: Optimization of smart home system based on wireless sensor network. 3rd International Conference on Human Centered Computing 10745, pp. 265–273 (2018) 5. Li, Z.: Secure Routing for wireless sensor networks research. Comput. Secur. 01, 52–56 (2012). (in Chinese) 6. Li, Z., Jinbao, L.: Multi-path based reliable routing in wireless sensor network. J. Comput. Res. Dev. 48, 171–175 (2011). (in Chinese) 7. Zhao, L., Jiang, Y., Xu, M.: Analysis and comparison of routing protocols for wireless sensor networks. Comput. Sci. 36(2), 35–41 (2009). (in Chinese) 8. Xingguo, L., Junfeng, W., Linlin, B.: LEACH protocol and its improved algorithm in wireless sensor network. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 418–422 (2016) 9. Liu, J., Mou S., Morse, A.S., Anderson, B., Yu, C.: Request-based gossiping without deadlocks. Automatica 93, 454–461 (2018) 10. Dimakis, A.G., Kar, S., Moura, J.M.F., Rabbat, M.G., Scaglione, A.: Gossip algorithms for distributed signal processing. Proc. IEEE 98, 1847–1864 (2010) 11. Zeng, K., Ren, K., Lou, W., Moran, P.J.: Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply. Wireless Netw. 15, 39–51 (2009) 12. Li, X., Zhang, L.: Research on GEAR with network coding. International Conference on Communication and Information Systems ICCIS, pp. 208–211 (2018) 13. Maarouf, I.K., Sheltami, T.R.: Simulation-based analysis for GEAR performance optimization. 22nd International Conference on Advanced Information Networking and Applications Workshops AINA, pp. 910–915 (2008) 14. Patra, C., Botezatu, N.: Effect of gossiping on some basic wireless sensor network protocols. 21st International Conference on System Theory ICSTCC, pp. 309–314 (2017) 15. Pantazis, N.A., Nikolidakis, S.A., Vergados, D.D.: Energy-efficient routing protocols in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorrials 15(2), 551–591 (2013) 16. Ye, M.: Research on energy saving routing protocol in wireless sensor networks. Microcomput. Appl. 34(11), 92–94 (2018). (in Chinese) 17. Dai, Z., Yan, C., Wu, Z.: New uneven double cluster head clustering algorithm for WSNPUDCH algorithm. Chin. J. Sens. Actuators 29(12), 1912–1918 (2016) (in Chinese) 18. Wei, L., Jiahong, D., Suling, J., Juhua, P.: Energy efficient clustering routing protocol for wireless sensor networks. J. Beijing Univ. Aeronaut. Astronaut. 45(1), 50–56 (2019). (in Chinese) 19. Singh, S.K., Kumar, P., Singh, J.P.: A survey on successors of LEACH protocol. IEEE Access 5, 4298–4328 (2017)
Analysis of Cross-Cultural Communication from the Angle of Ecological Information Construction Rui Dai Anhui Sanlian University, Hefei 230601, China [email protected] Abstract. This paper attempts to analyze and explore the contradictions and conflicts between a culture and a social system in cross-culture communication by applying fundamentals and knowledge of communication ecology. It sorts out and sums up ecological laws in cross-culture communication with interpretation function and thereby proposes the target of building an ecological view in crossculture communication. To explore and analyze cross-culture communication from the perspective of ecology is to study the relation between cross-culture communication activities and social environment at home and abroad by virtue of relevant theories concerning ecology. To cut in the angle of ecology is firstly a new perspective and a consideration to the process and relation of cross-culture communication media, information and cross-culture activities proceeding from the hypothesis of life organism. In mass communication ecology, communication ecology is a cross realm to conduct a comprehensive study of communication together with ecology, economics, sociology and other relevant subjects. Meanwhile, it has shown its unique value on the stage of world culture and formed a new order of open, free, balanced and multiple culture communication. Keywords: Ecology Cultural ecology Cross-culture communication Ecological information construction Cross-culture communication Ecological law
1 Introduction By examining the objective of cross-culture communication, cross-culture communication is an inevitable way of globalization; or rather that globalization is an internal dynamic of cross-culture communication [1]. Such a relation cannot be briefly normalized and summarized with verbal logic. However, one thing is clear that the globalization of cross-culture communication is obviously not an ultimate goal [2]. The sustainable existence and sound development are the target [3]. To this end, we shall, from the angle of human’s existence, pay attention if the result of cross-culture communication is to achieve the homogenization of global cultures or maintain the diversity of cultures for different nations on earth [4]. In the natural ecosystem, to meet their needs human constantly transforms environment; environment in turn affects human life [5]. With the enlargement and diversification of the scope of human activities the problem of the relationship between the human and the environment is more and more prominent so the range of modern © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 368–373, 2021. https://doi.org/10.1007/978-3-030-51431-0_54
Analysis of Cross-Cultural Communication
369
ecology, has expanded to various kinds of compound ecosystem system including the human society [6, 7]. The population, resources, environment and so on are within ecology research content. So far in the society all kinds of organizations and their living conditions about the human including mass communication activities and mass media management in various phenomena can be studied from ecology view perspective [8]. Especially in the era of information explosion in the 20th century information has become the favorite of the times and it is of great significance to create the ecology of communication in the context of cross-cultural communication and globalization. Rapid changes and wave of propagation environment form the new ring stirring pressure [9]. When pressure is added to the department in the ecosystem level detection, the health of the entire transmission system has appeared dangerous. Reflecting the misconduct is more likely to lead to adverse consequences. The cross-cultural communication should not only study levels of interpersonal communication of different cultural backgrounds and it should be expanded to mass communication level and avoid the study of face-to-face interpersonal cultural factors to promote the dialogue of different cultures between civilizations and decision-making groups and the maintenance of world peace and the harmonious development of the global cultural ecology from the interdisciplinary perspective. Since most of the world’s ecosystems are affected by human activities, the social and economic production systems and ecosystems are interwoven, which actually forms a huge complex system. With the rapid development of social economy and modern industrialization, the problems of natural resources, population, food and environment have become increasingly prominent. The “cultural shift” of ecology has changed many traditional ideas of man and nature. For example, it is recognized that there are natural phenomena in human society such as food chain ecological balance. In the early 1970s the rise of the western ecological movement makes people further realize that all things are contacted so people should keep a harmony with the environment rather than alienation. Therefore ecology is not only academic field of vision ecology is not only an intellectual stupor but in a sense it is also a cosmology, life view, ethics and aesthetics. In general the contemporary communication focuses on the relationship of microscopic process and its spread to working and don’t pay attention to the ecological relationship of the mass communication among the micro, meson and macro system and between the various components of them, no more actively explore the ecological law of interaction between them which leads to the spread of a series of ecological problems: the information explosion, the lack of information, knowledge, aggression, spiritual pollution, ideological crisis, disease information, etc.
2 How Can Cross-Culture Communication Be Explored and Analyzed with an Ecological Vision 2.1
Definition of Ecology Construction for Cross-Culture Communication
Generally speaking, cross-culture communication ecology is numerous connections related to cross-culture information communication and integral cultural environment
370
R. Dai
and atmosphere made up by connections. “If we compare communication as a river way, the ecology of communication can be seen as water and the information of communication as fishes. Fishes are swimming in the water which is flowing in the river way. Without river way, no water can stay and no fishes can survive; without water, no fished can survive and no river way can be it; without fishes, water will flow in vain and the river way will be nominal. Therefore, communication is not a dominator of information but a dominator of relation on information. In fact, the ecology of communication is heterogeneous and isomorphic with natural ecology human lives by, so it can be used for reference.” The ecology construction of cross-culture communication has provided a perspective of overall thinking for people to reflect on cultural crisis around the world and offered a new angle and reference for maintaining the existence of cultural ecology and stretching fundamental rule. The ecological outlook of cross-culture communication shall show up the outlook on cultural system of harmony, balance and stability and keep a foothold in traits on environmental system interpreted in ecology. The so-called “cultural ecology” refers to the numerous internal and external elements of the entire global cultural system and an ecological relation resulting from their interaction.” 2.2
Embodiment of Ecological View in Cross-Culture Communication
We compare the global media society to an information jungle. As a matter of fact, the effect of natural law of jungle is really a mixture of natural law and human factors. In the media society, human’s capacity in information has been continuously evolving, but the earth is becoming smaller and smaller and more tribalized once again. The conflict between human’s expansion and environment’s restriction will be inevitable. Such a conflict will be internalized into contradiction and struggle between countries, cultures and organizations, thereby presenting a variety of complicated situations. International relation is an important environmental variable for survival of mass communication media of present age. It is not only a condition and result of international communication, but also a key support for transnational media food chain and food network to spread around the world. As for cultural communication mode in China, what we need to do is to explore and expand the channels of mutual communication and amalgamation, promote the exchange of culture between China and other countries and achieve the harmony but difference in wider fields. To this end, it is of great importance to enhance learning, transform the old mindset, endeavor to improve the communication technology and strengthen the communication result. All our efforts are based on the best communication result as a starting point, which is also an important standard to verify the performance of all our communication efforts. To ensure a good result for our communication, while we are facing the audience of western countries, we need to pay attention to their habits of mind and thereby changing our way of expression. We shall try to adapt to the westerners’ way of expressions which is usually straightforward and self-disclosed rather than simply inferring their arrogance. Naturally, the westerners shall also have a better understanding of the easterners who usually exchange their opinions in an implicit way, adapt to their warm-up process during the exchange, wait in patience till the counterparts integrate themselves into the exchange realm,
Analysis of Cross-Cultural Communication
371
The cultural exchange between the east and the west cannot be simply deemed as a verbal and literal interconnection in language and script, which is only introduced in a form of culture. Instead, both sides shall try to explore the cultural deposits, historical settings, mindsets and customs etc. behind the form. It is a long-term running-in process and also a course of mutual reference and learning. From the perspective of space dimension, due to historic reason and limitation of communication, difference and estrangement have arisen in mutual understanding of cultures. Thus, it will be a long-term and an arduous task to strengthen the bilateral and multilateral information dissemination of cross-culture communication. To keep a low profile, devote ourselves in our work, get along with others in a kind and reasonable manner shall be basic principles we shall adhere to during the cultural exchange with other countries in the world. In the course of intercourse with other cultures in the world, particularly western culture, we shall not accept their slander due to difference in interests and values. It is indispensable to fight in a reasonable, beneficial and restrained manner. Modern media are a powerful tool for promoting the globalization of the modernization process. However, due to historic reason, the singular trend that modernization is equal to western culture has prevailed. In the cross-culture communication, for the purpose to prevent modern media from spreading singular modernization and westernization, it is required to encourage diversity of cultures in different nations of the world, realize coexistence and exchange of multiple cultural system and achieve a coordinated and healthy development of the whole culture ecosystem in the interaction. In the history, no great culture has formed spontaneously under a close condition but developed amid the exchange and impact of multiple cultures. For instance, the western culture was mainly affected by Hellenism and Judaism while Hellenism largely benefited from Egyptians, Therefore, culture diversity must be upheld for keeping a balanced cultural ecosystem and developing the subsystems under the large cultural system. In the world today, besides western culture, there are still a lot of cultures such as Islamic culture, Chinese culture with Confucianism as the core and East Asian cultures in which exuberant vitality is still maintained. Under the trend of modernization, how to keep its original culture and make the original culture adapt to the ecosystem of global cultures on the whole is a challenging issue before us.
3 Building of International Communication Ecology and Its Goals Communication media are indispensable essential elements of modern people and have become the second-layer skin of people. We perceive the public opinion climate of the society and also build the cognitions to reality. A sound media ecology can guide a benign interaction between society and culture. The target for building a cross-culture communication ecology is to establish and improve a cross-culture communication ecology and achieve a balanced cross-culture communication ecology. In the ecology, ecological balance refers to the status of an ecosystem within specific period. Under such a status, the structure and function are relatively stable. The input and output of
372
R. Dai
material and energy are close to a balance. To be interfered externally, initial stable status can be restored through natural regulation. Similarly, diversity in information, operation and resource is also a key mark of modern cross-cultural communication. Only in this way can enable people coexisting in the same cultural context to better achieve meaningful share in order to share a culture. At the same time, it can also achieve a meaningful share under the crosscultural context in the interaction between historic development of culture and multiple cultures. The monopoly of both political and economic powers is not a sound crosscultural media ecology, so, it is not helpful to confession of news and development and continuation of world cultures. Advocate the establishment of cultural exchange, present a pluralistic value system of culture and thereby reveal the basic direction of human culture development. The ultimate goal to look at culture communication in an ecological vision is to achieve mutual benefit of culture around the world, enable culture communication to break through the limitations imposed by history. Meanwhile, it has shown its unique value on the stage of world culture and formed a new order of open, free, balanced and diverse culture communication.
4 Conclusion The entire world in which human being are living is a cultural system with multiple cultures coexisting. Each culture has its own unique motive and process of origin, maturity and decline. Besides, any one of cultures has a function of preventing it from be replaced by another culture. The cultures of different countries, nations or groups have different essential features and value orientations and formed a cultural difference with variety and diversity as manifestations. The unbalanced and unequal cultural circulation arisen from cultural difference has integrated the coordination and development between different value systems and life styles and also promoted the transition of different cultures towards homogenization. To a certain extent, the communication globalization brought by cross-culture communication will push forward the mutual recognition and amalgamation of global cultures and be conducive to eliminating the estrangement among human’s cultures and even misunderstanding and hostility. However, in this sense, the decrease and fuzziness in cultural difference are not helpful to the abundance of world culture. Only the vitality of diverse and multiple development of cultures can human continue its everlasting history. Human also needs to achieve a deep recognition to the inevitability and occasionality of cross-culture communication ecology, keep a reverent mindset to nature from spontaneity to consciousness, from international community to nation, from media organizations to individuals, cease or slow down the blind expansion and excessive development and make a plan and effort for gradually improving the crossculture communication ecology. Acknowledgements. Fund Program: The paper is one of the results of the Anhui Provincial Quality Project; Code: 2016MOOC152 and this research is supported by Teaching Quality Project of Anhui Provincial Department Education (project number: 2018MOOC097).
Analysis of Cross-Cultural Communication
373
References 1. Alrheide, D.L.: An Ecology of Communication: Cultural Formats of Control. Aldine De Grllyler, New York (1995) 2. Dozio, E., Feldman, M., Moro, M.-R.: Transmission du traumatisme mère–bébé dans les interactions précoces. Pratiques Psychol. 22(2), 87–103 (2016) 3. Thompson, J.B.: Mass communication and modern culture: contribution to a critical theory of ideology. Sociology 22(3), 359–383 (1988) 4. Liska, J.R., Cronkhile, G.: An Ecological Perspective on Human Communication Theory. Wadsworth Publishing, Belmont (1994) 5. Lum, C.M.: Introduction: the intellectual roots of media ecology. N. J. J. Commun. 8(1), 1– 103 (2000) 6. Yarrow, M.M., Salthe, S.N.: Ecological boundaries in the context of hierarchy theory. BioSystems 92(3), 233–244 (2008) 7. Flinn, M.V.: Culture and the evolution of social learning. Evol. Hum. Behav. 18(1), 23–67 (1997) 8. Norton, W.: Cultural Geography. Oxford University Press, Oxford, New York (2000) 9. Prokop, P., Usak, M., Fančovičová, J.: Risk of parasite transmission influences perceived vulnerability to disease and perceived danger of disease-relevant animals. Behav. Proc. 85(1), 52–57 (2010)
Shoot Rate in Basketball Game Based on Metal Sensor Xi Li(&) Physical Education Teaching Department, Wuxi Taihu University, Wuxi 214000, Jiangsu, China [email protected]
Abstract. In basketball games, the basketball shooting ratio changes with the position of athletes in basketball court, so knowing the best position in basketball court plays a decisive role for the win and loss. This paper mainly researches and designs the basketball shooting ratio at different space points. First, it proposes a radio frequency identification (RFID) spatial location technology based on carrier phase, and designs a RFID reader with the positioning function according to the signal strength of the target label carried by the athletes and the effect on the surrounding label to obtain the real-time position information of the athletes. And then count the shooting ratio of different athletes at different positions in the court. Finally, carry out second processing for these data by MATLAB, and analyze to obtain the best position of the shooting in the court. The result shows that the closer the athletes are from the basket, the greater the shooting ratio. Keywords: Basketball shooting ratio Radio frequency identification Spatial orientation Best shooting speed Best shooting angle Best position point
1 Introduction Basketball originated in the United States, which is the core game project of Olympic Games [1]. In the game, the athletes have to consider the shooting ratio of various position points in the court so as to get the chance to get scores as much as possible into the other basket [2]. As athletes move constantly in whole game, so how to get athletes’ real-time space position changes is an urgent problem to be solved. As buildings separate the spread of GPS satellite signals, indoor positioning technology is not perfect [3]. The positioning technologies which are used indoor commonly include ultrasonic positioning technology, infrared positioning technology, Bluetooth positioning technology, wireless LAN positioning technology and radio frequency identification positioning technology [4]. Radio frequency identification technology is widely used due to low cost and high communication efficiency [5]. At present, the researches on radio frequency identification technology at home and abroad mainly focus on the position information obtained from the target label got by using reader to the signal strength of the reference label [6]. In view of the current research situation, this paper proposes a RFID positioning technology based on carrier
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 374–382, 2021. https://doi.org/10.1007/978-3-030-51431-0_55
Shoot Rate in Basketball Game Based on Metal Sensor
375
phase change [7], designs and produces RFID reader to study the real-time position of the athletes in the game, so as to analyze and find out the best position in the court.
2 Design of RFID Positioning Reader 2.1
RFID System Composition and Working Mode
RFID is a class of automatic identification technology, which is achieved through radio frequency. Reader and label are two most important parts of an RFID system [8]. The label is attached to the target object and its inside contains a unique code that can be used to identify the object. And its information is read through the reader, and can be modified and written at the same time. Figure 1 is the structure of a standard RFID system.
Data reader
Reader antenna Air interface f RFID label
Computer application system
Fig. 1. Basic structure of RFID system
The basic working mechanism of the RFID system is 1. When the electronic label is in the operating range of the transmitting antenna, it will receive the signal which has a certain frequency and is sent by the reader antenna, then the label is activated; 2. The forward signal which is sent by the reader antenna will be reflected back by the label and the reflected signal will contain the ID information of the label; 3. The reflected signal will be sent to the application system processor after receiving, demodulating and decoding by the reader antenna, and the processor will receive the code and other information to determine the implementation of the instruction [9]. 2.2
RFID Positioning Technology Based on Carrier Phase
Similar to the classical wireless positioning technique, the position of target label in the RFID positioning technique can be determined by measuring the signal’s strength, phase, and propagation time. In this paper, the carrier phase method based on the carrier phase delay is used to calculate the target position, that is, by comparing the
376
X. Li
phase change of the received signal and the transmission signal, the reader positions the target. 2.2.1 Parameters Need to Be Measured by the RFID Position Technology Based on Carrier Phase The measurement parameters of this method include: 1. Signal strength (RSS), the reflection of other objects in the environment to the forward signal sent by the reader antenna will cause a great interference to the RSS which is received finally; 2. arrival time (TOA)/arrival time difference (TDOA), the distance from the label to the reader is proportional to the propagation time of the signal in the air, so the distance from the label to the reader can be calculated by using the triangulation method; 3. arrival phase (POA)/arrival phase difference (PDOA), the signal phase is proportional to its propagation distance, but because the signal itself changes periodically, so the signal propagation distance cannot be directly calculated by using the phase, it should be calculated by using the phase difference. 2.2.2 Measure the Label Reflection Signal Phase The typical UHF RFID system is shown in Fig. 2. It includes the reader and the label. The reader is composed of an oscillator, a transmitter, a circulator and a receiver. The information of the identification object is stored in the chip which is in the label. The reflected signal is modulated by the label chip by changing its own impedance.
Fig. 2. The typical UHF RFID system
Through the phasor space, the phase of the label signal can be calculated, the calculation process is shown in Fig. 3. The transpose power dividers divide the local oscillator signal LO into two orthogonal parts. After the frequency mixing of the two orthogonal signals and the baseband signal, they are filtered by a low pass filter. Thus the two orthogonal signals I (t) and Q (t) form the baseband signal. The state 1 and state 2 of the label impedance correspond to the two points on the IQ plane, that is the phase change is the connection angle of the two points on the IQ plane [10]. That is, W is the
Shoot Rate in Basketball Game Based on Metal Sensor
377
angle which is changed from comparing the signal reflected by the label with the reader’s local oscillator LO. u ¼ uM uS ¼ tan1
Q1 Q2 I1 I2
ð1Þ
Fig. 3. Demodulation process of Zero-IF receiver
2.2.3 Determine the Spatial Location of the Target Label Firstly, this paper uses the obtained local oscillator phase change reflected by the target label to list the position equation of the target label from the reader antenna, finally, the position of the target label is calculated from the three interceptors of many antennas (Shown as Fig. 4) [11].
Fig. 4. The method of determining the spatial position of the target label
378
2.3
X. Li
Design of the Reader Positioning Prototype
On basis of the above theory, this paper bases on the commercial RF chip to build a programmable RF module’s RFID reader, that is phase measurement system prototype, and the forward signal is generated by RF up converter, is received by RF down converter and is modulated and reflected by label according to the degree of phase change and the obtained distance from the target label to the position of the antenna, and then convert it to IF. The conversion from IF signal to baseband signal is responsible by the FPGA-based IF transceiver. The prototype of RFID reader is shown as Fig. 5.
Fig. 5. The prototype of RFID reader
3 Design of the Experiment 3.1
Experimental Target
The purpose of this article is to calculate the basketball shooting ratio of the basketball players in different spatial positions, through the RFID positioning technology, we can real-time understand the athletes’ position in the court. Therefore, it only needs to count the shooting ratio of the athletes who wear RF labels at different positions as much as possible, then we can get the best position in the basketball court, to provide a reference for the score of the game. However, the factors that affect the basketball shooting ratio, in addition to the position of the athletes, but also relates to the athletes’ initial shooting speed, initial shooting angle and even the psychological state of the athletes and so on. Therefore, in order to get the conclusion of this paper, this paper first uses the Monte Carlo method to find the best shooting angle and velocity at the fixed point, and then finds out the optimal position for the variable (Fig. 6).
Shoot Rate in Basketball Game Based on Metal Sensor
379
Fig. 6. Basketball shooting model
3.2
Ideal Shooting Model
Regardless of air resistance, the ideal two-dimensional shooting model shown in Fig. 5 [12]. In accordance with the rules of the basketball game, in the standard court, the height of the basket to the ground is 3.05 meters, the diameter is 0.45 meters, the standard basketball diameter is 0.246 meters. Establish space Cartesian coordinate system, the origin of the coordinates is the basketball centre of mass. Z-axis positive direction perpendiculars to the ground up, Y-axis positive parallels to the paper to the right, X-axis positive direction perpendiculars to the paper outwards. The direction of shooting is (a, b), where a is the intersection angle between the direction of the shooting speed and the positive direction of the Z-axis, and b is the intersection angle between the projection of the XOY plane and the positive direction of the X-axis. Therefore, according to the kinematics equation, the kinematic equation of basketball centre of mass in space is shown below.
3.3
x ¼ V0 t sin a cos b
ð2Þ
y ¼ V0 t sin a sin b
ð3Þ
1 z ¼ V0 t cos a gt2 2
ð4Þ
Basketball Shooting Ratio Calculation
Basketball shooting ratio can be calculated by MATLAB simulation, that is, first randomly generate a set of 1 107 two-dimensional array (a, b), this group of data represents the basketball athlete’s random shooting times in a point to all directions in the court, and assuming that the initial shooting speed of this athlete is V0. And then use MATLAB to calculate the probability of basketball into the basket, so that you can get the best shooting point at different positions and initial shooting speed, but also get the point in which the basketball shooting ratio is larger.
380
X. Li
4 Experiment Result Analysis 4.1
The Best Shooting Speed and Shooting Angle at the Given Point
In order to reduce the system error, this paper uses MATLAB to randomly generate a set of two-dimensional data of 5 107. In order to make the results representative, we should select a typical value, that is, the height of shooting point is 2 meters, which is 6.25 meters from the basket (that is, the distance of international standard three-point line). The result is shown in Fig. 7.
Probability /0.1
2.5
2.0 1.5
1.0 0.5 0.0 8.0
8.2
8.4 8.6 Shooting speed m/s
8.8
9.0
9.2
Fig. 7. The shooting ratio at different speed
It can be seen from Fig. 7, when shooting speed is 8.25 m/s, the maximal basketball shooting ratio is 2.03 104, at this time the range of the corresponding a angle is 35.38°–44.45°. Since the allowable error of shooting is greatest when the shooting angle is in the middle of the above range, it is known that the best shooting angle is approximately 39.56°. And from the figure, it can be known that when the shooting speed is too small (15 m/s), it cannot effectively shoot into the basket. 4.2
The Best Position Point in the Court
In this paper, through the RFID space positioning technology, the shooting ratio of the athletes at the best shooting angle and shooting speed at different points can be obtained. Assuming that the athletes shoot at the best speed and the best angle at different points in the court, the shooting ratio is shown in Fig. 8. From Fig. 8, it can be seen the farther the athletes from the basketball basket, the smaller the shooting ratio is, and the athletes who have the same distance from the basket have the similar basketball shooting ratio. The results of the experiment are in line with our life experience, which also explains the score setting origin of three-pointers, two-pointers and one-pointer, that is the closer the distance is, the smaller the difficulty of basketball into the basket, the lower the score is.
Shoot Rate in Basketball Game Based on Metal Sensor
381
Fig. 8. The probability distribution map of shooting ratio at different shooting distance
5 Conclusion Based on carrier change’s RFID spatial location technology, using the principle of triangulation, according to the signal phase change reflected by the target label, and based on the commercial RF chip, this paper builds a RFID positioning reader prototype. So as to get the real-time position information of the athletes who change their position constantly in the basketball game. And based on the MATLAB simulation, this paper finds the best shooting angle and initial velocity of the athletes at the fixed point, and finally obtains the shooting ratio at different points in the court when the athletes are in the best state. That is, the closer the distance, the greater the shooting ratio is, but at the same time, it needs to pay attention to the closer, the basket into the basket score is also lower.
References 1. Yunting, L.: The significance of human upper limb: the communication interpretation of basketball in China. J. Sports Sci. 03, 1004–4590 (2014) 2. Shuangwen, W.: Influences of basketball rule transformations on technique and tactics. J. Wuhan Inst. Phys. Educ. 01, 1000–520X (2011) 3. Yi, H., Shanyue, H., Qian, H., Tao, W. et al.: Localization of GPS mobile communication equipment based on Android platform. Laser J. 03, 0253–2743 (2014) 4. Rui, Z., Bang, Z., Zuli, Z., Le, Ma., Jinfei, Y., et al.: Overview of indoor localization techniques and applications. Electron. Sci. Technol. 03, 1007–7820 (2014) 5. Qiang, Ma.: Application of RFID in automatic positioning in logistics warehouses. Logistics Technol. 01, 1005–152X (2013) 6. Liu Peng, L., Tancheng, G.X., et al.: A review of radio frequency identification based indoor localization technology. J. Terahertz Sci. Electron. Inf. Technol. 02, 2095–4980 (2014) 7. Yan, Q.: Research on mine personnel location system based on low frequency radio frequency identification technology. Netw. Secur. Technol. Appl. 05, 1009–6833 (2014) 8. Xiaohong, C., Fuqiang, W., et al.: Study on the influencing factors of radio frequency identification technology adoption in Chinese enterprises. Sci. Res. Manage. 02, 1000–2995 (2013)
382
X. Li
9. Yuanzhe, W., Luhong, M., Hui, L., Jigao, X., et al.: Research and application of RFID location algorithm based on reference tags. J. Commun. 02, 1000–436X (2010) 10. Panpan, Z., Jingbo, S., et al.: Design and implementation of a general Zero-IF RF front-end. Chin. J. Electron 01, 1005–9480 (2016) 11. Huajin, H., Jianxi, Q.: WiFi indoor positioning system design based on the Triangle position algorithm. J. Guangxi Acad. Sci. 01, 1002–7378 (2016) 12. Hongqiang, L.: Analysis of the main influencing factors of basketball shooting ratio. Sci. Technol. Inf. 29, 1001–9960 (2012)
College English Teaching System Based on Resource Library and Network Support Platform Shasha Zeng(&) Chongqing Nanfang Translators College of Sichuan International Studies University, Chongqing, China [email protected]
Abstract. The current situation of university English teaching in the modern internet technology environment, the college English teaching environment featuring personalized and interactive learning and active learning. University English teaching is to help students lay a solid language foundation and improve their language use ability, innovation ability, collaboration ability, independence ability, English communication ability, open thinking ability and quality shared with others, so that students can better adapt to society and serve the society. The online teaching platform provides a wide range of learning resources, convenient learning tools and flexible learning strategies for the teaching of college English teachers, and supports teachers’ tutoring and assistance to students. This paper analyzes the current situation of university English teaching mode and related problems, and proposes a strategy based on English education resources library and internet platform to implement English teaching reform practice. Keywords: Teaching resource library English teaching system
Network support platform College
1 Introduction The wide application of information technology has promoted the modernization of the university English education system and also raised new challenges [1]. The content and mode of university English education are also constantly improving. The instrumental and applied characteristics of English language are increasingly prominent [2]. The single English talent is no longer suitable for the needs of contemporary social career development. Applying internet technology to English teaching, constructing a student-centered university English online education terrace, and strengthening the cultivation of students’ independent learning mode and independent learning ability have become the key to the reform of university English education [3]. At the same time, it closely combines the characteristics of English majors and gives full play to the unique advantages of English teaching. It plays a greater role and influence in broadening students’ horizons and assisting students in improving their overall quality. Rather than separating English teaching from the profession, it is a “sub-class”, which is a proposition that every college English teaching worker must seriously consider [4]. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 383–390, 2021. https://doi.org/10.1007/978-3-030-51431-0_56
384
S. Zeng
A new English teaching system based on education resource library and internet support terrace was constructed to meet the needs of modern English teaching to adapt to international development.
2 Overview of Network Teaching Platform and Theory 2.1
The Basic Concepts and Contents of Teaching Resource Library Teaching
The English education resource library is oriented to the needs of the education industry. On the basis of full investigation, the joint enterprise and industry experts analyze the main English jobs and typical work tasks, and sort out the basic English knowledge, skills and literacy that should be mastered by the position talents. Professional English education standards with educational characteristics [5]. On the basis of university English education and curriculum reform, the teaching standards of college English are used as guidance to strengthen the characteristics of network “teaching”, and the innovative teaching methods with clear structure, close logic and complete system, and highlighting the characteristics of English teaching are integrated into the college English teaching curriculum. In the system [6]. The resource library includes four modules: teacher teaching and research library, student self-learning library, university English interactive terrace and related link library. The teacher teaching resource library consists of a teaching material library, a courseware library and a teacher teaching and research forum [7]. The purpose of the library is to provide teachers with rich teaching materials, which are convenient for teachers to carefully edit teaching software suitable for personalized teaching; university English teachers share and exchange various teaching resources and viewpoints to help teachers continuously improve their own business level. Student self-learning library, which makes full use of multimedia advanced technology to design four parts: college English learning strategy guidance library, special purpose English learning library, movie audiovisual resource library and student online self-learning platform [8]. Teacher-student interactive platform library, which includes university English online chat room, text-based topic discussion platform, bulletin board and college English online guidance terrace. 2.2
The Necessity of Internet Teaching Platform to Assist Classroom Teaching
The internet teaching platform is a good supporting software to assist teachers and students to conduct online interactive teaching activities, expand teaching space, expand the horizons of teachers and students, and realize distance learning. Using the network teaching platform, the teaching content can be expressed in rich forms such as pictures, texts, audio and video, and a large amount of network resources also provide sufficient reserves for the source and update of teaching content. Teaching activities can be conducted at any time and place, and students can flexibly determine the time, content and progress of the study according to their actual situation [9]. Students and
College English Teaching System Based on Resource Library
385
teachers can also interact in real time through the online platform, which not only solves problems in a timely manner, but also reduces the distance between teachers and students and enhances the feelings of teachers and students. These advantages of the internet teaching make up for the shortcomings such as monotonous content, lack of academic time and neglect of the subjective status of students caused by the traditional teaching mode in college English teaching. In view of this, the application of the network teaching platform is very necessary in college English teaching, and how to combine the network teaching platform with the traditional teaching mode to strengthen the students’ comprehensive ability to use knowledge and innovation in the course of studying college English, become a university The direction of English teaching reform research. Aiming at the characteristics of university English teaching informatization, we will directly build an integrated digital teaching support environment based on the existing educational management system, and establish a internet platform for students and interface interaction (see Table 1), stimulating the interactive design of students and goals, and trigger students. Resource development that interacts with content, promotes the transfer of teaching and student interaction, and guides students and timeinteractive learning management. Table 1. Network teaching support platform system architecture Aims Crosscampus integrated network supports college English teaching system
Implementation characteristics Distinctive professional features
Project support Design method Regular Professional training, curriculum echelon construction construction platform Docking Online teaching General management courseware Educational Administration system Platform Teacher-student Interactive Multimedia collaboration platform teaching standard Safe and stable operation efficiency
2.3
Precision Course Supervision and Audit Platform
Supervise regulatory data feedback
Build content Literature database
System module Management system module
Real-time module custom design Quality teaching resource orientation Independent course public display
Learning tool module
Remote collaboration platform module Hypermedia repository system
The Theoretical Basis for the Establishment of the Resource Pool
Humanistic education is an important educational trend in the modern West. It combines with humanistic psychology to develop a student-centered, humanistic education concept that aims to develop students’ self-potentials and values. The self-learning
386
S. Zeng
platform in the university English resource library includes a navigation library, an online learning method, and a learning strategy for students’ reference. In addition, the platform also arranges and edits different levels of learning materials for students of different levels according to the needs of students with different English levels and according to the requirements of the syllabus. Students can choose the materials that suit their level according to their actual level for practice and activities. Based on the advantages of the computer, these materials are set to pass the test. Only after passing the test at this level can you enter the next level of study. Cultivating students’ interest in independent learning helps to realize personalized teaching and student self-learning in the true sense.
3 The Analysis of the Present Situation of College English Teaching at the Present Stage 3.1
Monotonous Teaching Methods, Lack of Professional Quality Teachers
The outdated and monotonous teaching methods are common problems in English teaching in China. Under the traditional “cramming” teaching method—the teacher taught, the impact of the students listening to the lectures, many college English teachers in the English teaching, self-study on the above, regardless of whether the students have mastered, completely ignored the students in the classroom teaching the subject position in the middle [10]. They think that as long as they master the teaching materials and related teaching content, they will know nothing about the newer professional knowledge, professional development and teaching methods. What makes teachers can be limited in the classroom, and the teaching methods that can be adopted are also very simple, which leads to lower teaching efficiency. 3.2
Linear Thinking Mode in College English Teaching
Nowadays, linear thinking mode is adopted in university English teaching. The socalled linear thinking mode is a straight, one-way, one-dimensional, lack of change in thinking. Linear thinking patterns, such as writing and reading training in traditional university English teaching, are influenced by the space of manuscript paper and text, and must be performed in time and space and logical order [11]. This model is based on text mode and university English teacher-led teaching mode. college English teachers rely on text to convey “institutionalized English knowledge” to students one-sidedly. At the same time, university English teachers play an authority and leadership role, students respond and obey, and passively accept English knowledge. In many colleges and universities, this kind of theory, light practice, transferability, or “full house” or “cramming” college English teaching methods still dominates. The result is that students lack the motivation for English learning and lack the ability to learn independently.
College English Teaching System Based on Resource Library
387
4 Analysis of the Relationship Between Network Teaching Platform and College English Teaching The network teaching platform has realized a rich and vivid network language environment for college English teaching. Students learn independently through the teaching network platform, enhance their interest in English and realize interesting learning. According to the analysis of educators, human beings learn a language and learn its grammar and words. It is only a relatively primitive stage. Only by understanding its cultural content is the best way to learn language (see Fig. 1). In the new English learning mode built under the network teaching platform, students can explain the content of English learning through animation, film, music and other parties, which not only helps to understand the knowledge points in the classroom, but also effectively improves students’ English. Interest, master other English knowledge outside the classroom, and expand the knowledge of students [12]. University English teachers should use the characteristics of information technology to actively guide students to use the network support platform for independent English learning, encourage students to participate in English teaching through mutual communication and mutual cooperation, and comprehensively improve their English proficiency. Students interested in the content to create a simulated real-life situation, by allowing students to participate, let students write the form of the scenario script, and play the initiative of the students’ self-learning. In English classroom teaching, teachers should follow the students’ ideas and prepare students for divergent teaching through pre-class materials. Sometimes teachers will introduce some knowledge that is not available in college English textbooks. To cultivate students’ interest can better serve the teaching.
Fig. 1. The relationship between resource library and teaching system
388
S. Zeng
5 Countermeasures and Measures to Improve the Effectiveness of Network Teaching Platform for College English Learning 5.1
Establishing a Simulation Course for College English Teaching Practice Based on the Network Teaching Platform
The university English practice course is based on the theory of constructivism, and aims to cultivate college students’ English practical ability. The campus life and social life closely related to students are used as the practice simulation theme, and the student-centered situational blending practice activities are carried out. The university English practice teaching simulation course is designed to enable students to gain language practice opportunities in the higher education stage, to achieve the true purpose of language teaching, to enable students to translate language knowledge into language application skills, to help students communicate information in English, and to improve their cultural quality. To meet the needs of the talent market. Teachers make full use of language labs and online platforms to enable students to easily learn English in a simulated practice teaching environment and apply them flexibly. In the teaching of English listening courses, teachers rely on high-quality teaching software to fully interact with students, and transform the traditional college English listening course into a vivid English audio-visual class. If the school conditions permit, the language practice simulation course can be carried out in the language training room. It is fully equipped and the seating arrangement can be adjusted. It is very suitable for group discussion and simulation of real scenes, which helps students to quickly enter the simulated practice class atmosphere and improve the efficiency of student learning. Teachers can arrange the time and length of the practice class independently according to the progress of the regular class. Students dress up before class according to their roles, prepare their own simple props, or use multimedia equipment. Teachers require participants to be generous, natural, and injecting, and language expressions must be blended. Teachers can also set up extracurricular practice teaching sessions to provide students with more opportunities to learn English. The establishment of the university English practice simulation course has established an operational practice platform for students’ language use. Students have a strong interest in learning languages while consolidating and improving the basic knowledge of language. 5.2
Cultivate Students’ Network Self-learning Cognitive Strategy and Realize College English Teaching Reform
University English teachers implement the teaching-related links, realize the new teaching concept centered on students, select the best learning resources from a large number of internet resources, and organize and edit the database. Combine with classroom teaching to implement mixed teaching, and develop students’ basic English listening, speaking, reading and writing skills. Elective courses can provide courses covering general English and special purpose English according to students’ needs, to meet the personality development requirements of students’ extracurricular auxiliary learning. Teachers rely on resources to update teaching concepts in real time, but the
College English Teaching System Based on Resource Library
389
traditional teaching behavior, the concept and education methods are inconsistent, which greatly hinders the development of the mixed learning model and affects the teaching effect. Teachers can build a network social platform learning environment based on their cognitive habits, abilities and interests, and independently design and produce online English learning resources to ensure that students learn the latest and most useful materials. Teachers should give students guidance in a targeted manner, aim to improve the education effect, and at the same time reflect and evaluate the education activities, and find problems and solve them in time. Teachers also need to recognize their important role in online teaching, rather than simply throwing tasks to students to respond to students’ questions in a timely manner, helping students clear learning disabilities. Students learn English on the online platform, which is not only convenient for self-learning, but also for cooperative learning and communication between teachers and students. The internet education platform has become an important way to realize the reform of university English teaching.
6 Conclusion In general, the university English internet education resource terrace is built with rich teaching resources and distinctive curriculum features. Students and teachers can log in to the website. Teachers can conduct online tutoring and on-site guidance for students. Students can use the education resources of the website to learn independently, and realize online learning, online practice, online communication and online testing. Although the resources of the university English online courses are basically complete, they are still not perfect and video courseware and classroom videos need to be further improved. Of course, the university English online teaching terrace can not completely replace the traditional classroom teaching, so it should complement the traditional classroom teaching, combine the characteristics of the two education modes to form a hybrid teaching mode, and break through the traditional single classroom education mode. The university English internet education platform is the extension and expansion of classroom teaching. It is the continuation and improvement of classroom teaching. The organic integration of the two can better improve the education effect.
References 1. Mulders, M.N.: Global measles and rubella laboratory network support for elimination goals, 2010–2015. MMWR Morb. Mortal. Wkly Rep. 65(17), 438 (2016) 2. Caulfield, M.D., Zhu, D.C., Mcauley, J.D., et al.: Individual differences in resting-state functional connectivity with the executive network: Support for a cerebellar role in anxiety vulnerability. Brain Struct. & Funct. 221(6), 3081–3093 (2016) 3. Holmberg, D., Blair, K.L.: Dynamics of perceived social network support for same-sex versus mixed-sex relationships. Pers. Relationships 23(1), 62–83 (2016) 4. Aguirre, E., Lopez-Iturri, P., Azpilicueta, L., et al.: Design and implementation of context aware applications with wireless sensor network support in urban train transportation environments. IEEE Sens. J. 17(1), 169–178 (2017)
390
S. Zeng
5. Hatzipanagos, S., John, B., Chiu, Y.L.T.: The significance of kinship for medical education: Reflections on the use of a bespoke social network to support learners’ professional identities. Jmir Med. Educ. 2(1), e1 (2016) 6. Mileo, A., Merico, D., Pinardi, S., et al.: A logical approach to home healthcare with intelligent sensor-network support. Comput. J. 53(8), 1257–1276 (2018) 7. Rahmati, A., Shepard, C., Tossell, C.C., et al.: Seamless TCP migration on smartphones without network support. IEEE Trans. Mob. Comput. 13(3), 678–692 (2014) 8. Harris, A.J.L., Hahn, U., Madsen, J.K., et al.: The appeal to expert opinion: Quantitative support for a Bayesian network approach. Cogn. Sci. 40(6), 1496–1533 (2015) 9. Harks, T., Kleinert, I., Klimm, M.: Computing network tolls with support constraints. Netw. 65(3), 262–285 (2015) 10. Huang, C.Y., Ramanathan, P.: Network layer support for gigabit TCP flows in wireless mesh networks. IEEE Trans. Mob. Comput. 14(10), 2073–2085 (2015) 11. Ilie-Zudor, E., Kemény, Z., Pfeiffer, A., et al.: Decision support solutions for factory and network logistics operations. Int. J. Comput. Integr. Manuf. 30(1), 63–73 (2017) 12. Borg, S., Yi, L.: Chinese college English teachers’ research engagement. Tesol Q. 47(2), 270–299 (2013)
Communication Network Transmission Optimization Algorithm Hongchang Liu(&), Yizhao Liu, Chi Zhang, and Yang Zheng State Grid Tianjin Electric Power Company Information and Communication Company, 300010 Tianjin, China [email protected]
Abstract. To improve the transmission performance of communication networks and reduce the bit error rate, it is necessary to design the transmission channel equalization in communication networks. A link equalization algorithm based on matched filter autocorrelation detection is proposed for wireless sensor networks. According to the characteristics of inter-symbol interference (ISI) of multipath components in wireless sensor network (WSN), the channel model is constructed, and the communication signal of multipath wireless sensor network is recomposed by autocorrelation matched filter detection technology. The timefrequency flipping characteristic of the output signals of each wireless sensor network is used to suppress the inter-symbol interference, the adaptive modulation of the signal at the data receiving end of the wireless sensor network is realized, and the focusing gain of the wireless sensor network link is obtained by using the spread spectrum coding modulation method. The modulated signal is sampled at Nyquist frequency, so that the spread spectrum coding characteristic information is extended simultaneously in time domain and frequency domain, and channel equalization is realized. The simulation results show that the proposed algorithm can effectively suppress inter-symbol interference, increase signal output gain, optimize communication network transmission and reduce the bit error rate, the communication quality is improved. Keywords: Matched filtering Autocorrelation detection Network communication Channel equalization Spread spectrum technology
1 Introduction As a new communication technology, 5G mobile wireless sensor network still has some technical problems in the research of communication theory [1–3]. Because of the imbalance of the wireless sensor network link, the bad channel equalization will increase the error rate of the communication output and affect the communication quality. Therefore, the link equalization method of the wireless sensor network is studied [4–6].
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 391–399, 2021. https://doi.org/10.1007/978-3-030-51431-0_57
392
H. Liu et al.
2 Channel Model and Signal Analysis of Wireless Sensor Network Communication 2.1
Channel Model of Wireless Sensor Network Communication
In order to realize the channel equalization of 5G mobile wireless sensor network communication. According to the time and frequency expansion relationship of wireless channel, combined with the characteristics of complex envelope variation of wireless sensor network link, the impulse response characteristics of the wireless sensor network link are analyzed [7]. It may be expressed as: SðtÞ ¼ a0
N X
ai dðt si Þejwc t
ð1Þ
i¼1
N is the number of wireless sensor network link paths, si and ai are the delay and envelope amplitude of i wireless sensor network communication path, wc is the modulation weight of wireless sensor network communication. The frequency bandwidth of the channel is obtained as follows: Ts ¼ Nf Tf
ð2Þ
The carrier output of each wireless sensor network communication node is divided into Nc chips. When the symbol transmission bandwidth Rb is less than the reciprocal of the frequency domain expansion, that is Rb \1=D, the delay caused by the coherent multipath effect of the channel is extended to D, and the expansion time of the chip partition is obtained as follows: Tc ¼ entðTf =Nc Þ
ð3Þ
Because the wireless sensor network communication data transmission environment is very complex, whether the channel frequency domain distribution is linear or nonlinear, generally speaking, it is necessary to satisfy the cj Tc \Tf , 8j 2 ½0; Nf 1, wireless sensor network link is limited band wide, bandwidth constrained wireless sensor network link model can be described as: sðtÞ ¼
X i
bj
N f 1 X
pðt iTs jTf cj Tc Þ
ð4Þ
j¼0
The input signal is mixed with additive noise at the initial frequency of the symbol, the channel model is constructed and the channel equalization is designed [8].
Communication Network Transmission Optimization Algorithm
2.2
393
Autocorrelation Matched Filter Detection
On the basis of the link model of wireless sensor network, the passive time reversal mirror (PTRM) is applied to the wireless sensor network output signal transmitted in the wireless sensor network link [9] as follows: SNR ¼ SL TL ðNL þ DIÞ 10 log W
ð5Þ
Where, W for Wireless Sensor Network Communication system bandwidth (Hz). The node energy consumption factor matrix BN is constructed, and the formula is as follows: BN1 ¼ SNL TL1
ð6Þ
Suppose there are N cluster head nodes in the network, The output power consumption of the node is the optimal equilibrium configuration model of all cluster heads of p 2 ½0; p1 ; p2 ; . . .; pmax , which is described as: cth r EðpÞ ¼ ½0; 0; . . .; 0; hi ½Gðnk1Þc ; . . .; th |fflfflfflfflfflffl{zfflfflfflfflfflffl} 2
ð7Þ
i1 cth r2 T hi ½Gðnk1Þcth
Based on the game analysis of node transmit power, the optimal transmit power cth r Xi ðtÞ ¼ hi ½GðNðlÞ1Þc of each node in wireless sensor network under the environment th of Internet of things is obtained. The return value of sensor node data acquisition based in the Internet of things environment i on pi ðl þ 1Þ ¼ 0, pi ðl þ 1Þ ¼ minðpmax ; Xi ðl þ 1ÞÞ. If the link gain value hi 6¼ hmin ðlÞ and the phase offset of multipath component are added by Xi ðlÞ [ 0 the direct sequence spread spectrum method is used to carry out the equalization of communication channel [10]. The frequency response of the equalizer is expressed as follows: 2
CT 0 ð f Þ ¼
K X
ck ej2pfkT
0
ð8Þ
k¼K
The output impulse response function of the sensor data sequence collected by the data acquisition is expressed as follows: X n j2p CT 0 ð f ÞYT 0 ð f Þ ¼ CT 0 ð f Þ x f 0 e T n ¼ CT 0 ð f ÞX ð f Þ e
f n0 s0 T
ð9Þ
j2pf s0
Where, j f j 2T1 0 , it represents the best sampling symbol rate. The multipath communication signals received by each array element of the communication base
394
H. Liu et al.
station are accumulated by PTRM processing to obtain the output signal rðtÞ, in which the input detection signal is pri ðtÞ ¼ pðtÞ hi ðtÞ þ npi ðtÞ
ð10Þ
Where, hi ðtÞ represents the impulse response function of pðtÞ in the wireless sensor network link, and the signal generated by the signal source is flipped through the passive time mirror to obtain the information code modulation sequence: 0
Sri ðtÞ ¼ SðtÞ hi ðtÞ þ nsi ðtÞ
ð11Þ
0
ri ðtÞ ¼ Sri ðtÞ pri ðtÞ 0
¼ SðtÞ pðtÞ hi ðtÞ hi ðtÞ þ n1i ðtÞ
ð12Þ
The intersymbol interference item in the expression is: 0
n1i ðtÞ ¼ SðtÞ hi ðtÞ npi ðtÞ þ nsi ðtÞ pðtÞ hi ðtÞ þ nsi ðtÞ npi ðtÞ
ð13Þ
Where, ni ðtÞ ¼ n1i ðtÞ pðtÞ, after the above processing, the detection signal pðtÞ is convoluted again, and the output signal is obtained as riðtÞ, which can suppress the inter-symbol interference of the wireless sensor network link and improve the communication quality [11].
3 Channel Equalization and Optimal Realization of Network Communication Transmission 3.1
Spread Spectrum Coded Modulation
On the basis of recombining the communication signal and inter-symbol interference suppression processing of multi-path wireless sensor network using autocorrelation matched filter detection technology, the optimal design of wireless sensor network link balance is carried out in this paper [12]: r2x ¼ E x2 ðtÞ
ð14Þ
Analysis of complex envelope si ðtÞ, i ¼ 1; 2; I, of Wireless Sensor Network communication signal in i-th Channel Transmission path FSK is chosen as incoherent modulation method to detect channel fading characteristics, gain intensity of communication signal xðtÞ and carrier wave. Modulation bandwidth are defined as:
Communication Network Transmission Optimization Algorithm
pffiffi Sx ¼ E x3 ðtÞ þ sbu½sðt s0 Þ Kx ¼ E x4 ðtÞ 3E 2 x2 ðtÞ b
395
ð15Þ ð16Þ
Where, E½x3 ðtÞ is the attenuation feature in frequency domain on the minimum equalization error criterion, and b is the spatial multipath reflection gain, which is positively related to the time characteristic in the frequency domain of the channel [13]. the following results are obtained: 0
0
0
hi ðtÞ hi ðtÞ ffi hi ðtÞ hi ðtÞ ffi dðtÞ
ð17Þ
pðtÞ pðtÞ ffi dðtÞ
ð18Þ
Then rðtÞ ffi SðtÞ dðtÞ
M X
dðtÞ þ
i¼1
M X
ni ðtÞ ¼ MSðtÞ þ
i¼1
M X
ni ðtÞ
ð19Þ
i¼1
According to the expression of PTRM principle, it can be seen that the impulse response function of the channel is SðtÞ, and its autocorrelation convolution with M 0 P ^hðtÞ ¼ hi ðtÞ hi ðtÞ is equivalent to spreading spectrum once after the time-back i¼1
channel processing of the communication symbol information sequence pðtÞ, thus increasing the bandwidth of the channel. 3.2
Channel Spread Spectrum and Equalization
The spread spectrum coding modulation method is used for channel passband spread spectrum processing, and the modulated signal is sampled at Nyquist frequency [14], and the inverse impulse function is obtained as follows: HðtÞ ¼ ^hðtÞ pðtÞ pðtÞ ¼ð
M X
0
hi ðtÞ hi ðtÞÞ pðtÞ pðtÞ
ð20Þ
i¼1
Therefore, ^hðtÞ and pðtÞ pðtÞ are approximate to the spread spectrum of rðtÞ in PTRM, and SðtÞ is similar to the bit sequence waveform of transmitting signal in spread spectrum channel. By superposing the output signals of each group of wireless sensor networks at the same time and in the same phase, we can get no signal [15]: yðnÞ ¼ xðnÞ hðnÞ þ nðnÞ
ð21Þ
^xðnÞ ¼ gð~xðnÞÞ
ð22Þ
396
H. Liu et al.
By blind equalization, the noise power is reduced. Finally, after high amplifier selective amplification and mixing, the time and frequency domain characteristics of wireless sensor network link are estimated as follows: x0 ðtÞ H0 : p ffiffiffiffi ¼ wðtÞ 0tT ð23Þ H1 : E s0 ðtÞ þ wðtÞ Where x0 ðtÞ ¼ xðtÞ hw ðtÞ
ð24Þ
s0 ðtÞ ¼ sðtÞ hw ðtÞ
ð25Þ
From the above analysis, it is shown that the spread spectrum coding characteristic information of wireless sensor network link can be extended simultaneously in time domain and frequency domain by using this method. Shown in Fig. 1.
M sequence
Wireless communication signal
Direct sequence spread spectrum
BPSK modulation
Communication channel (noise, multipath)
M sequence
Sampling decision
BPSK demodulation
De spread
PTRM processing
Fig. 1. Link equalization process in wireless sensor networks
4 Simulation Experiment and Performance Analysis Aiming to test the performance of the proposed equalization algorithm in the realization of link equalization and improve the communication quality of wireless sensor network, the simulation experiment is carried out. Shown in Fig. 2. Figure 2 shows that the original signal is subject to multipath and inter-symbol interference, resulting in large channel output error and poor equalization. Taking the communication signal of Fig. 4 as the object of study, the multipath recombination and inter-symbol interference suppression are carried out by using PTRM technology. The
Communication Network Transmission Optimization Algorithm
397
6
4 2
S(t)
0 -2
-4 -6 100
0
200
300
500
400
600
700
800
900
1000
t/s
Fig. 2. Input communication signal 1.5 1 0.5
S(t)
0 -0.5 -1 -1.5 -2 -2.5 0
100
200 300
400
500 t/s
600 700
800 900 1000
Fig. 3. Output signal of communication network after channel equalization processing
baseband signal and symbol error after equalization and channel equalization are obtained as shown in Fig. 3. Figure 3 shows that the proposed method is used to deal with channel equalization, and the inter-symbol interference can be suppressed effectively. The analysis results of 0.45 0.4
Proposed method Traditonal method
0.35 0.3
BER
0.25 0.2 0.15 0.1 0.05 0 -10
-9
-8
-7
-6 -5 SNR/dB
-4
-3
-2
-1
Fig. 4. Comparison of BER results of different methods
Fig. 4 further show that the proposed method is lower than the traditional method in the link equalization processing of wireless sensor network and the output error rate is
398
H. Liu et al.
obviously lower than that of the traditional method and the performance of the proposed method is superior.
5 Conclusions In this paper, a link equalization algorithm based on matched filter autocorrelation detection is proposed for wireless sensor networks. The simulation results show that the proposed algorithm can effectively suppress inter-symbol interference, increase signal output gain, optimize communication network transmission and reduce the bit error rate, the communication quality is improved. This method has good application value in communication network transmission optimization control. Acknowledgements. State Grid Tianjin Electric Power Company Science and technology project funding - Internet of things security access system based on NB-IOT (No. KJ19-1-32).
References 1. Carbone, P., Katsifodimos, A., Ewen, S., et al.: Apache Flink: stream and batch processing in a single engine. Bull. IEEE Comput. Soc. Tech. Comm. Data Eng. 36(4), 28–38 (2015) 2. Lee, Y.Y., Wang, C.H., Huang, Y.H.: A hybrid RF/Baseband Precoding Processor based on Parallel-Index- Selection Matrix-Inversion-Bypass Simultaneous Orthogonal Matching Pursuit for Millimeter Wave MIMO Systems. IEEE Trans. Signal Process. 63(2), 305– 317 (2015) 3. Wang, S., Tu, H., Zhang, Y.: Cloud service composition method based on uncertain QoSaware Ness. J. Comput. Appl. 38(10), 2753–2758 (2018) 4. Moradi, M., Keyvanpour, M.R.: An analytical review of XML association rules mining. Artif. Intell. Rev. 43(2), 277–300 (2015) 5. Dong, G.L., Ryu, K.S., Bashir, M., et al.: Discovering medical knowledge using association rule mining in young adults with acute myocardial infarction. J. Med. Syst. 37(2), 1–10 (2013) 6. Khalili, A., Sami, A.: SysDetect:a Systematic Approach to Critical State Determination for Industrial Intrusion Detection Systems Using Apriori Algorithm. J. Process Control 2776, 154–160 (2015) 7. Ju, C.H., Zou, J.B.: An incremental classification algorithm for data stream based on information entropy diversity measure. Telecommun. Sci. 31(2), 86–96 (2015) 8. Lyu, Y.X., Wang, C.Y., Wang, C., et al.: Online classification algorithm for uncertain data stream in big data. J. Northeast. Univ. (Nat. Sci. Ed.) 37(9), 1245–1249 (2016) 9. Huang, S.C., Liu, Y.: Classification algorithm for noisy and dynamic data stream. J. Jiangsu Univ. Sci. Technol. (Nat. Sci. Ed.) 30(3), 281–285 (2016) 10. Ani, L., Xiao, Z., Boyang, Z., Chunyi, L., Xiaonan, Z.: Research on performance evaluation method of public cloud storage system. J. Comput. Appl. 37(5), 1229–1235 (2017) 11. Lin, J.M., Ban, W.J., Wang, J.Y., et al.: Query optimization for distributed database based on parallel genetic algorithm and max-min ant system. J. Comput. Appl. 36(3), 675–680 (2016) 12. Zhou, X.P., Zhang, X.F., Zhao, X.N.: Cloud storage performance evaluation research. Comput. Sci. 41(4), 190–194 (2014)
Communication Network Transmission Optimization Algorithm
399
13. He, S.M., Kang, M.N., Zhang, X., et al.: Cloud storage performance evaluation technology and method research. Comput. Mod. 12, 1–4 (2011) 14. Tang, K.Z., Li, H.Y., Li, J., et al.: Improved particle swarm optimization algorithm for solving complex optimization problems. J. Nanjing Univ. Sci. Technol. 39(4), 386–391 (2015) 15. Jia, D.Y., Zhang, F.Z.: A collaborative filtering recommendation algorithm based on double neighbor choosing strategy. J. Comput. Res. Dev. 50(5), 1076–1084 (2013)
Distribution Network Planning and Design Supported by PSO-AFSA Hybrid Optimization Algorithm Chao Xun1,3,4(&), Jieyun Zheng2,3,4, Keyao Lin1,3,4, Tingting Lin2,3,4, and Fen Xiao1,3,4 1
3
4
State Grid Fujian Electric Power Co., Ltd., Fuzhou 350003, Fujian, China [email protected] 2 Economic and Technical Research Institute, State Grid Fujian Provincial Electric Power Co., Ltd., Fuzhou 350012, Fujian, China Institute of Economics and Technology, State Grid Fujian Provincial Electric Power Co., Ltd., Fuzhou 350012, Fujian, China State Grid Fujian Nanjing County Power Supply Company, Nanjing 363600, Fujian, China
Abstract. From a scientific point of view, power grid planning is a very professional work, and subject to the impact of modern urban construction, this work is more difficult, and it has a highly constrained & discrete variable nonlinear integer programming problem. At the same time, the intelligent development of the power grid needs to continuously improve its reliable power supply and high-efficiency operation. Since the distribution network can change topology by changing the switch state, the distribution network is reconstructed to reasonably arrange the distributed grid connection to reduce the network loss. It is of great theoretical and practical significance to improve the node voltage deviation and realize the economic and safe operation of the distribution network considering DG. In this paper, the PSO-AFSA hybrid optimization algorithm model is analyzed firstly, its application in distribution network planning and design is discussed. The concrete nodes in the application of hybrid algorithm are calculated, the results show that the distribution of hybrid optimization algorithm is included in DG. The voltage deviation and active network loss of the network node are reduced, and the reliability of the power supply of the distribution network is guaranteed. Keywords: Distribution network planning PSO-AFSA hybrid optimization algorithm Particle swarm optimization algorithm
1 Introduction The power grid planning work is an important task to maintain the power grid operation, improve the level of power consumption environment, and enhance the safety of power consumption. The main principle is to control the power transmission power through the adjustment of the transmission line, and combine the load forecasting function to confirm the existence of electrical energy [1]. Conflicts, whether it is © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 400–407, 2021. https://doi.org/10.1007/978-3-030-51431-0_58
Distribution Network Planning and Design Supported by PSO-AFSA
401
possible to cover all areas of electricity use, and can lead to deficiencies in grid planning. However, due to the influence of external factors such as working principle and urban construction, the idealized power grid planning can hardly be realized smoothly. Therefore, it is necessary to combine the actual conditions and calculate through the corresponding calculation methods to obtain the optimal planning scheme under the conditions. On the basis of the above, based on the particle swarm optimization algorithm and artificial fish swarm algorithm, the PSO-AFSA hybrid optimization algorithm is proposed and the related algorithm model is established. Then the hybrid algorithm is used in the distribution network planning with a certain node system. The application was calculated and analyzed.
2 PSO-AFSA Hybrid Optimization Algorithm 2.1
PSO Optimization Algorithm
In 1995, Kennedy and Eberhart proposed an algorithm to find the foraging behavior of biota in the population closest to food. The particle swarm optimization (PSO) algorithm is a kind of swarm intelligence algorithm. The algorithm can evaluate the feasible solution with fitness. The algorithm has fewer adjustable parameters and simple search rules. The behavior of the algorithm is described as: a population consisting of N particles in an M-dimensional search space. The i-th particle in the population is Xi = (xi1, xi2, … xim), and the velocity is wi = (vi1, vi2, … vim), the optimal position searched by the objective function, that is the individual extremum is Pi, the optimal position of the entire population searched by the objective function, that is, the global extremum is pg, when the two most At the figure of merit, Particle i can transform its speed and position based on formulas (1) and (2) [2, 3]. ðt þ 1Þ
vid
ðt Þ ðtÞ ðt Þ ðtÞ ðt Þ ¼ x vid þ c1 r1 pid xid þ c2 r2 pid xid ðt þ 1Þ
xid
ðt Þ
ðt þ 1Þ
¼ xid þ vid
ð1Þ ð2Þ
Where x is the inertia weight; d = 1, 2, …, m is the spatial dimension; i = 1, 2, …, n (n is the number of particles); t is the current iteration algebra; r1 and r2 represent the random numbers in [0, 1]; c1 and c2 are learning factors when the individual extremum and the group extremum are performing search behavior respectively. 2.2
AFSA Optimization Algorithm
X is the position of the artificial fish under certain assumptions, the view radius is visible, and the long radius is the step length. By comparing the visual food concentration in the set position with that in the rest of the sample positions, the characteristics of artificial fish were improved. The results showed that the concentration of other fish samples in the field of vision was higher, and the artificial fish samples were close to
402
C. Xun et al.
the higher food concentration fish samples [4]. By continuously comparing and advancing, the place with the highest food concentration in the whole fish group is found. That is, the global optimal value. The fish swarm algorithm avoids the local optimal solution of the algorithm by comparing the food concentration in the field of view, which is beneficial to the search for the global optimal value.
Fig. 1. View and moving distance of artificial fish swarm algorithm
The position of the artificial fish in Fig. 1 is x, and the coordinate of the artificial fish in the field of vision is xv. There are n fish in this area. Its feeding behavior can be explained as follows: xvi ¼ xi þ visual r; i ¼ 1; 2; . . .; n
ð3Þ
In the formula (3), r is a random number whose absolute value is less than 1. Optimization steps of the algorithm: Step 1: Randomly generate a fish population and initialize the parameters. Step 2: Initialize the fish population (x1, x2, …, xn) within a given range. Step 3: When the food concentration at the center of the fish group at the position X1 is higher and the fish group there is not crowded, the process is called clustering behavior; otherwise, step 2 is performed. Step 4: If the artificial fish with the highest food concentration is found in position x1, the food concentration around the position is high, and the fish swarm is not crowded at this time. This process is called back-end behavior; otherwise, perform step 2. Step 5: Compare the food concentration obtained by the artificial fish behavior and back-end behavior, and continuously compare the food concentration obtained by the
Distribution Network Planning and Design Supported by PSO-AFSA
403
artificial fish clustering behavior and the rear-end behavior record on the corresponding record board. If it is satisfied, the algorithm stops, and the value on the display board is the best solution, otherwise the algorithm returns to step 2 to continue the search behavior. 2.3
3PSO-AFSA Hybrid Optimization Algorithm
In order to make particle swarm algorithm better combine with fish swarm algorithm,it is important to deeply illustrate the value of two key parameters. One is the inertia weight in the particle swarm algorithm, its value affects the degree of the particle’s dependence on the previous speed; the other is the crowding factor in the fish swarm algorithm, which determines whether the fish are easy to gather together and back-end behavior, the value of IE is beneficial to global search, while for local search, it is smaller. In step [5–7], particle swarm is optimized, which improves the efficiency of fish swarm algorithm: Step 1: Establish the initial parameters. The initial parameters include the number of fish groups, which called “m”, the visual range visual, the step size, the maximum of trials number, the congestion factor of 8, set the maximum number of calculations of the fish swarm algorithm, and limit the maximum breeding algebra of the fish swarm. Step 2: Set the maximum number of total iterations and the iteration end criteria. Step 3: Artificial fish stocks are generated and initialized. Step 4: Evaluate the fitness value of the current fish population. Step 5: Individuals in the school group begin a search iteration until the number of iterations reaches maximum genetic algebra. Step 6: Generate a new particle population based on the iterative according to the bulletin board. The bulletin board determines the initial position and speed of the new particle swarm. Step 7: Set the initial parameters of the new particle swarm, including: inertia, weight, acceleration factor, and the step size and number of the particle group are the same as the fish population. After that, the particle group began to search. Step 8: Particle swarms constantly seek and update individual extremum and group extremum. Step 9: Confirmation of the termination condition. If the corresponding conditions are met, the iteration is terminated: otherwise, it returns to step 5. As shown in Fig. 2, the calculation flow of the improved particle swarm optimization algorithm is shown in detail:
404
C. Xun et al.
Fig. 2. The PSO-AFSA hybrid optimization algorithm flow chart
Distribution Network Planning and Design Supported by PSO-AFSA
405
Table 1. The voltage values of nodes before and after reconstruction of the original distribution network NO. 1 2 3 4 5
Pre-reconstruction node voltage Post-reconstruction node voltage 1.0000 1.0000 0.9970 0.9971 0.9829 0.9868 0.9755 0.9822 0.9681 0.9777
3 Analysis of Distribution Network Reconfiguration Based on EEE-33 Node 3.1
Original Distribution Network Reconstruction Results and Analysis
Before the original distribution network is reconstructed, the system’s tie switches are located on the branches 8–21, 9–15, and 12–22, respectively. The PSO-AFSA algorithm is used to reconstruct and optimize the distribution network structure. The reconstruction results are shown in Table 1. That is, the network loss after reconstruction is significantly reduced compared with that before reconstruction. At the same time that the voltage and network loss are improved, the topology of the system also undergoes a large change after reconstruction. The structure after the change is shown in Fig. 3. Compared with the initial topology, 12 nodes in the reconstructed structure of the system are closer to the root node, and the remaining 21 nodes remain in the original state [8, 9]. This clearly shows that the distance between the load point and the power point does affect the power quality and power loss of the system to a large extent.
Fig. 3. The network topology of the transformed node system
406
C. Xun et al.
Table 2. Comparison of reconstruction results of four optimization algorithms for the original node system Algorithm Initial network PSOAFSA BPSO DPSO ICQPSO
Active loss 202.647
Network loss reduction rate 0
Number of iterations 0
Minimum node voltage 0.9133
139.637
31.09
35
0.9362
142.526 142.317 139.441
29.67 29.77 31.19
99 69 32
0.9413 0.9413 0.9413
Through the analysis of experimental data, the power loss of the optimized system is reduced by 31.1%. It plays an important role in power grid voltage quality and energy saving. In order to judge whether the proposed algorithm has better optimization performance, it can be analyzed by comparing with other similar intelligent algorithms, and the reconstruction optimization of the original distribution network system can reflect the performance of the algorithm alone, avoiding other The influence of variable coefficients, so the performance of the algorithm avoids the influence of other variable coefficients [10]. Therefore, the four algorithms PSO-AFSA, BPSO, DPSO and ICQPSO are reconstructed and analyzed for the original IEEE33 node system. The results and the convergence speed are compared. The results are shown in Table 2. The data in Table 2 shows that the PSO-AFSA algorithm achieves good results in reducing network loss, improving voltage quality and reducing the number of iterations. The PSO-AFSA algorithm is slightly inferior to ICQPSO in optimization, but it can maintain a stable the convergence speed does not waste a lot of time into the local optimum.
4 Conclusions With the speedy growth of modern society and economy and the great improvement of people’s living standards, all walks of life have higher and higher requirements for all aspects of the power system. As a research foundation for realizing power system automation, distribution network reconfiguration research has great application value for promoting the development of modern power system. This paper introduces the special algorithm which is widely used in power grid reconstruction, mainly introduces particle swarm optimization algorithm and artificial fish swarm optimization algorithm. Based on this, the PSO-AFSA hybrid optimization algorithm is proposed. The experimental results show that the active power loss of the reconstructed system is reduced by 31.1%. The PSO-AFSA algorithm achieves good results in reducing network loss, improving voltage quality and reducing the number of iterations. Therefore, the PSO-AFSA hybrid optimization algorithm is less dependent on the initial solution
Distribution Network Planning and Design Supported by PSO-AFSA
407
and has good global convergence performance, which is a good optimization iterative algorithm.
References 1. Dong, L., Bai, H.: Temporal and spatial distribution characteristics of water quality of stagnant river network in Tianjin City, China. Adv. Sci. Technol. Water Resour. 37(4), 8–13 and 18 (2017) 2. Hordri, N.F., Yuhaniz, S.S., Shamsuddin, S.M., et al.: Hybrid biogeography based optimization—multilayer perceptron for application in intelligent medical diagnosis. Adv. Sci. Lett. 23(6), 5304–5308 (2017) 3. Huang, Y., Peng, K., Yuan, M.: Path planning for mobile robots based on multi-strategy hybrid artificial fish swarm algorithm. Inf. Control 45(13), 104–106 (2017) 4. Escalona, P., Marianov, V., Ordóñez, F., et al.: On the effect of inventory policies on distribution network design with several demand classes. Transp. Res. Part E Logistics Transp. Rev. 3(111), 229–240 (2018) 5. Luo, F., Zhang, T., Wei, W., et al.: Models and methods for low‐carbon footprint analysis of grid‐connected photovoltaic generation from a distribution network planning perspective. Energy Sci. Eng. 5(5), 13–15 (2017) 6. Xie, J., Ma, H.: Application of improved APO algorithm in vulnerability assessment and reconstruction of microgrid. IOP Conf. Ser. Earth Environ. Sci. 108(5), 052109 (2018) 7. Xiong, Z., Li, X.-H., Liang, J.-C., et al.: A multi-objective hybrid algorithm for optimization of grid structures. Int. J. Appl. Mech. 10(1), 62–63 (2018) 8. Godio, A., Santilano, A.: On the optimization of electromagnetic geophysical data. Appl. PSO Algorithm 148(6), 163–174 (2018) 9. Rezaei, F., Safavi, H.R.: GuASPSO: a new approach to hold a better exploration– exploitation balance in PSO algorithm. Soft. Comput. 7(1), 81–82 (2019) 10. Ebadifard, F., Babamir, S.M.: A PSO-based task scheduling algorithm improved using a load-balancing technique for the cloud computing environment. Concurrency Comput. Pract. Exp. 30(12), 204–206 (2018)
Security and Privacy of 5G Intelligent Subway Network Zheng Zhang(&) Jiangxi Vocational and Technical College of Communication, Nanchang, China [email protected]
Abstract. While 4G network has been commercialized on a large scale, the research and development of 5G network is also in progress. At the current stage, 5G network has officially entered the commercial stage. 5G network has not only significantly improved in terms of fusion, transmission rate, network bandwidth and other aspects, but also greatly improved its security and privacy compared with 4G network with the development of its new network architecture and fusion technology. 5G network significant advantage is the high capacity, low latency, as a starting point, combined with the applicability of the rail transit subway network requirements and business scenarios, according to the 5G network and the development trend of the subway network in network compatibility, covered the key technology in the quality and safety and privacy mechanism as the research direction, to discuss how to better promote the use of 5G technology better in the construction of the subway network. According to subway locomotive fast move, jump, the characteristics of self-organization, this article studies using the method of using minimum coupling-loss, regulations and combining the relevant indicators, 5G technology in the subway network security, and put forward a certificate and a new mechanism based on the privacy solution secure communication distributed model is given, and applied in the subway network privacy protection, and guidance in practical engineering. Keywords: 5G technology Subway network analysis Distributed model
Minimum coupling loss
1 Introduction At present, China is carrying out mass construction of rail transit. Meanwhile, the business volume of mobile Internet is also developing rapidly. How to apply the modern mobile Internet technology into the subway network poses a huge challenge to the construction of LAN of modern rail transit [1, 2]. In the fully automatic driving mode, subway locomotive is accompanied by massive data transmission. Under the moving state of the locomotive, how to guarantee the reliable and safe transmission of the mobile signal is a great technical challenge in the complex communication environment such as roadbed and bridge, and also a hot spot in the research of mobile signal technology in rail transit [3, 4]. Modern subway use mobile communication technology is based on the communication more subway locomotive control © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 408–414, 2021. https://doi.org/10.1007/978-3-030-51431-0_59
Security and Privacy of 5G Intelligent Subway Network
409
technology, the wireless model is based on the reliable and efficient tunnel, as a result of the 5G technology commercial has come, and will be applied in the subway network, so the moving state of the signal of stability and reliability issues will be gradually break through, and this article research also has the significance of statistical characteristics [5, 6]. Existing research results at home and abroad show that, due to multi-path propagation in subway tunnels, the received signals are obviously weak and prone to delay, resulting in instability and insecurity of signals [7]. Studies on infinite propagation in subway tunnels mostly focus on path loss, which proves that in the frequency domain, the movement of the receiver will cause the deviation of the propagation path, and then doppler expansion effect will appear, resulting in intercarrier interference [8]. However, studies on fading characteristics such as delay extension and doppler spectrum extension are very rare, and most of the only studies focus on monitoring the communication environment of road vehicles, without giving the relationship between the moving speed of the receiver and the signal frequency [9]. When studying the delay characteristics of signals in subway tunnels in China, it is believed that the roughness of walls and the layout of pipes on the walls will directly affect the electromagnetic wave emission power of the signal propagation section, which makes the relationship between RMS delay and rf appear to be contrary to the conclusion in tunnel traffic [10, 11]. Due to the strong waveguide and multipath characteristics in the subway tunnel, the conclusion of radio wave transmission in the tunnel environment is no longer applicable to the subway tunnel environment [12]. It is noted in this paper that the application of 5G technology is rapidly developing horizontally and in depth, and the application prospect is promising. With the gradual determination of 5G transmission rate and other standards, 5G technology is bound to embrace greater development opportunities. However, the intelligent application of subway not only needs extremely high transmission efficiency, but also how to guarantee the security and privacy of signals in the application is also a thorny problem [13, 14]. In this paper, it is keenly predicted that the intelligent subway network based on 5G technology will be a new round of trend in the development of metro area networks in major cities. Every day in the future, more and more equipment will be connected to the intelligent subway network base station based on 5G technology [15].
2 Method 2.1
Minimum Coupling Loss Analysis
The minimum coupling loss analysis method was proposed by bell laboratories in Canada. It was originally applied to the design of missile control system, and has made great contributions to the random probability prediction of missile launch system in the past period of time. Later this method was quickly extended in other fields. Since the beginning of the 21st century, this method has been used in the field of electronic communication. Minimum coupling loss analysis is a method to study the direct or indirect causes of system failure and establish logical relations among these possible causes. The
410
Z. Zhang
minimum coupling loss analysis method presents a series of possible risk factors in the system in the form of data and predicts the logical relationship among them. The output event of the logic gate is the result of the input event. The input event is the cause of the output event. The event at the bottom of the risk factor is called the bottom event, and the event at the top of the risk factor is called the top event, the bottom event. The top event and the top event represent the events that the system predicts will happen and will never happen, respectively. The main purpose of the investigation of system risk factors is to find out the potential factors that may cause the failure of the system. If a base event is obtained from it, the remaining set will no longer be the cut set. Let the dangerous event corresponding to base event xi be qi(I = 1,2…,n), n is the number of base events, then the minimum and minimum coupling cut set is: PðMCSÞ ¼ Pðx1 \ x2 \ x3 \ xn Þ ¼
m Y
qi
ð1Þ
i¼1
Where, m is the minimum order of the cut set. In this paper, the probability of occurrence of a series of dangerous factors in the tunnel is analyzed by coupling loss analysis method, so as to establish a safe signal transmission model in the tunnel. Wireless statistical theory and ray tracking method are used to study the wave characteristics of the subway locomotive to be used, including the influence of RMS time delay extension and train moving speed on the signal frequency. 2.2
Security and Privacy Assessment Methods
Today’s large, complex engineering systems are generally results of multidisciplinary joint development, individual security and privacy protection is generally difficult to solve the crisis of the whole system, especially the major system deployment of many safety accidents and confidential information leakage incident, encourage people to the systemic analysis and study of the road, so as to promote the development of the security and privacy of evaluation methods and progress. If the security and privacy of the system or product can be well demonstrated, it means that the system has certain stability under given conditions. The safety evaluation method is mainly used for the analysis of the system in simple state. The common safety evaluation method is a mode in which any local systemic risk will lead to the failure of the system structure. The safety degree of the system can be expressed as follows: Rs ðtÞ ¼ R1 ðtÞ R2 ðtÞ R3 ðtÞ Rn ðtÞ
ð2Þ
Where, Rs(t) represents the security degree of the system, and Ri(t) represents the security degree of each component or subsystem. In the privacy assessment, only when systematic leakage risk occurs in all units will risk warning occur in the system structure. The calculation process of the privacy assessment value of the system is as follows:
Security and Privacy of 5G Intelligent Subway Network
Rs ðtÞ ¼ Rm ðtÞ
n X
Cni Ri ðtÞ½1 RðtÞni
411
ð3Þ
i¼r
Where, Rs(t) represents the privacy security of the system, Rm(t) represents the privacy security of the voting device, and R(t) represents the privacy security of each component or subsystem.
3 Apply Layout Arrangement In the application of 5G technology in subway traffic, it is not only necessary to maintain the characteristics of rail transit, but also to integrate the technical characteristics of 5G operators. Therefore, in order to better promote the application of 5G intelligent network in rail transit, the following projects need to be reasonably arranged in the application layout. 3.1
Frequency Selection
The high broadband of 5G technology needs the corresponding spectrum width as support. Different from the previous 3.4 Hz−3.6 Hz band, 6 Hz spectrum in 5G networking is very abundant, and it can achieve great effect with a little authorization. Therefore, the subway company needs to make plans in advance, communicate and negotiate with the national telecommunication company, and obtain the legal frequency. 3.2
Coverage Mode
In order to ensure the security and privacy of 5G signals in rail transit, it is advisable to invest in a cost-effective antenna coverage method or choose a waveguide for wireless field strength coverage. 3.3
Interface Standardization
Network element function virtualization is realized by separating the network control surface and bearing surface through SDN, which accelerates the development process of 5G prototype realization for commercial use. Based on the special application scenarios of rail transit, all kinds of service interfaces should be compatible with 5G equipment interfaces, and the problem of maintaining 5G rate of interface network transmission should also be considered.
4 Discuss 4.1
Usability Verification
(1) Security degree calculation results
412
Z. Zhang
In the test phase of 5G commercial use, the communication system of the subway adopts POI combination for operator aggregation and cable construction. Different communication modes of operators will cause certain interference between different frequency bands, which will lead to decreased safety factor. Through quantitative analysis of system risk, the bottom value of interference safety can be obtained. The calculation result of security deterioration is shown in Fig. 1 below.
8 7 6 5 4 3 2 1 0 -1
-20 -19 -18 -17 -16 -15 -14 -13 -12 -11 -10 -9 -8 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6
Loss of safety(dB)
Deterioration of network security
N1-Nb(dB)
Fig. 1. Deteriorating network security results
As can be seen from Fig. 1, when the interference power is equal to −7db, the safety deteriorates by 0.8 coefficients. Generally, we take the coefficient 0.8 as the limit safety valve value that the receiver can withstand, and the radiation signal should be less than or equal to this threshold in theory. 2. Results of privacy degree calculation In the POI composite design of subway network, it is ensured that the obstruction of the system index is not less than the signal input power of the receiver, so that the signal transmission will not be leaked and the privacy in the communication process will be guaranteed. According to the parameters set by the system and the requirements of anti-blocking indicators, and in combination with relevant international design practices, the value of signal privacy transmission safety valve for data exchange between 5G network system and other systems can be calculated. The calculation results are shown in Table 1 below. It can be seen that under the working environment of 2.6 Hz, the maximum tolerance threshold of 5G system in the environment of ordinary blocking interference and stray interference is 76 dB and 74 dB. Therefore, the design of blocking interference conforms to privacy design standards. In fact, many operators currently adopt the deployment mode of upstream and downstream cable and POI connection when co-addressing. It can be inferred from the performance of POI that its safety isolation degree can generally reach 90 dB, which
Security and Privacy of 5G Intelligent Subway Network
413
Table 1. Calculation results of safety valve value of privacy Interference type
GSM 900 Stray interference 85 Barrage jamming 45 Intermodulation 145 interference
DSC 1800 75 53 138
Mobile TD-LTE 78 36 175
Unicom WCDMA 85 68 174
Unicom LTE 82 36 192
Telecom CDMA 91 76 204
Telecom LTE 69 36 219
can completely meet the requirements of the isolation of stray interference in the subway operating environment. 4.2
Realization of Terminal Security and Intelligent Privacy
With the support of 5G technology, users will have more colorful services, and there will be more business requirements in the subway due to the sufficient time. In this environment, the business volume of 5G network will also be greatly improved, but at the same time, it will be more difficult to prevent unregistered users from using the big data and high speed of 5G network to attack users. Therefore, it is more important for the security and privacy of end users to be protected in the subway environment. In order to protect users’ information from being leaked and network equipment from being attacked, in addition to deploying necessary anti-virus tools, it is very necessary to install higher-level security tools and create a more secure 5G network environment. The user’s sensitive information, sensitive operations also rely on these shields to protect.
5 Conclusion 5G intelligent network is a fully integrated network, especially for applications in an open environment such as rail transit. Its security and privacy issues have also become security issues for connecting mobile data terminal to the cloud. At the same time, it also involves transmission security, physical security and other comprehensive security, resulting in 5G network security, intelligent terminal and other key areas of security issues. In addition to the traditional security and privacy protection mechanism, we can try to expand the new authentication mechanism technology to further enhance the security and protection capability of 5G network, so as to ensure that 5G network can bring convenience to people’s production and life in more applications.
References 1. Yongpeng, W., Khisti, A., Xiao, C.: A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 64(59), 679–695 (2018)
414
Z. Zhang
2. Ahmad, I., Kumar, T., Liyanage, M.: Overview of 5G security challenges and solutions. IEEE Commun. Stand. Mag. 2(1), 36–43 (2018) 3. Fang, D., Qian, Y., Hu, R.Q.: Security for 5G mobile wireless networks. IEEE Access 872 (42), 1–13 (2017) 4. Abdulqadder, I., Zou, D., Aziz, I.: Deployment of Robust security scheme in SDN based 5G network over NFV enabled cloud environment. IEEE Trans. Emerg. Top. Comput. 52(531), 61–78 (2018) 5. Wong, E., Grigoreva, E., Wosinska, L.: Enhancing the survivability and power savings of 5G transport networks based on DWDM rings. IEEE/OSA J. Opt. Commun. Networking 9 (9), D74 (2017) 6. Kotulski, Z., Nowak, T.W., Sepczuk, M.: Towards constructive approach to end-to-end slice isolation in 5G networks. Eurasip J. Inf. Secur. 20(1), 56–82 (2018) 7. Shahzadi, R., Niaz, A., Ali, M.: Three tier fog networks: Enabling IoT/5G for latency sensitive applications. China Communications 625(108), 535–563 (2019) 8. Al-Turjman, F., Alturjman, S.: Context-Sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Industr. Inf. 42(59), 41–67 (2018) 9. Maimo, L.F., Gomez, A.L.P., Garcia Clemente, F.J.: A self-adaptive deep learning-based system for anomaly detection in 5G networks. IEEE Access 6(99), 7700–7712 (2018) 10. Falcão, M.R.M., Balieiro, A.M., Dias, K.L.: A flexible-bandwidth model with channel reservation and channel aggregation for three-layered cognitive radio networks. Computer Networks 135, 213–225 (2018) 11. Liyanage, M., Ahmed, I., Okwuibe, J.: Enhancing security of software Defined mobile networks. IEEE Access 438(599), 9422–9438 (2017) 12. Mary Baskaran, S.B., Raja, G., Bashir, A.K.: QoS-Aware frequency-based 4G + relative authentication model for next generation LTE and its dependent public safety networks. IEEE Access 5(53), 51–65 (2017) 13. Wang, L., Liu, X.: NOTSA: Novel OBU with three-level security architecture for internet of vehicles. IEEE Internet Things J. 325(274), 15–18 (2018) 14. Skouby, K.E., Khajuria, S.: Privacy and economics in a 5G environment. Wirel. Pers. Commun. 95(1), 1–10 (2017) 15. Kim, S.: A new differential privacy preserving crowdsensing scheme based on the Owen value. EURASIP J. Wirel. Commun. Netw. 209(15), 72–94 (2019)
Research of College Online Teaching System Based on Cloud Computing Chang Liu(&) and Xiaoyu Ge Asian and African Language College, Chengdu Institute Sichuan International Studies University, Chengdu College outside Sichuan, No. 367 Golf Avenue, Daguan Town, Dujiangyan City, Chengdu City, Sichuan, China [email protected], [email protected]
Abstract. Cloud computer with its super large scale, versatility, high reliability and other technical characteristics and advantages, has opened up a broad prospect for the application of technology in the field of education, which is conducive to solving the contradiction between the construction of teaching resources and application services. Based on the service model of cloud computer and the analysis of the application demand of cloud computing, this paper systematically constructs the scientific research of Japanese teaching and so on, and then constructs an open and flexible platform of Japanese teaching resources based on cloud computing technology, which has important strategic significance for the optimization, integration, co-construction and sharing of Japanese teaching resources. Keywords: Cloud computing platform Model
Hybrid cloud Japanese teaching resource
Higher teaching education informatization level of significant progress had been r, universities, especially the characteristics of modern distance education of radio and television university, the network education institute and other institutions of higher learning, the weight of the digital instructional resource construction under network depending on the degree is increasing day by day, through the form such as a building or buying accumulated a large number of full range, rich forms, and users of digital Japanese teaching resources. However, in order to meet teachers’ teaching needs and students’ learning support services, colleges and universities often invest more and more in the form of software and hardware to build and expand the platform of Japanese teaching resources [1]. During the construction of digital campuses, “we should make full use of highquality resources and advanced technologies, innovate operating mechanisms and management models, integrate existing resources, and build Advanced, efficient and practical digital education infrastructure.” [2] This requirement puts forward the importance of teaching resource construction in colleges and universities. In order to achieve this goal, the effective integration of existing teaching resources is promoted, and the sharing of high-quality teaching resources is promoted. “Technology” is particularly important to build a unified, open and flexible teaching resource platform. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 415–421, 2021. https://doi.org/10.1007/978-3-030-51431-0_60
416
C. Liu and X. Ge
1 Cloud Computing Technology The cloud computing is a collection of network services. Google proposed the first “cloud computing” in 2006. Since the concept about Cloud Computing, people’s understanding of cloud computing has also continuously evolved and changed [3, 4]. From the perspective of the types of services provided by cloud computing, cloud computing provides three types of service methods: SaaS, PaaS, and IaaS. Among them, SaaS means that consumers can obtain services from a complete computer infrastructure through the Internet, and can provide users with software services through a Web interface. This software does not need to be installed locally, such as Google Doc. PaaS is committed to providing users with a system platform environment, such as Windows Azure, etc.; IaaS is a mode of providing software through the Internet, providing users with CPUs, storage devices and other computers Basic equipment, such as Amazon EC2. There is no strict dependency and close relationship between various services. SaaS can be built on IaaS, or a unified operating environment and data model on the PaaS platform. Built directly on the data center. From the perspective of cloud computing infrastructure types, there are three forms of cloud, including: public cloud, private cloud, and hybrid cloud (see Fig. 1).
Fig. 1. Cloud computing service form
Enterprises usually spread throughout the Internet, and can provide IT services and business applications without any number of users. Users can use these services but do not own them. Because of the huge investment, only IT giants such as Google, IBM, Amazon, Microsoft, Intel can afford it. At present, China Telecom, China Mobile, Huawei, Baidu, Alibaba and other companies have released their own unique cloud computing platforms and related products. A single enterprise or institution specially customizes and builds a cloud computing infrastructure to provide cloud services to internal users or specific external users.
Research of College Online Teaching System Based on Cloud Computing
417
An enterprise or institution integrates public and private clouds or several private clouds in some way, using both the cloud services provided by public clouds or other private clouds, and its own separate cloud computing infrastructure.
2 Construction Plan of Japanese Teaching Resource Platform Based on Cloud Computing Cloud computing technology brings technological innovation to the IT industry and attracts the attention of a large number of people engaged in education. People have realized the broad education development space and application prospects brought by the rapid development of cloud computing. Based on cloud computer technology, construction of Japanese teaching the resource platform, which resolves the contradiction between the construction of Japanese teaching resources and its application services, is of great practical significance for giving play to the effectiveness of Japanese teaching resources, improving the utilization of resources, and promoting the sharing of teaching resources.
3 Demand Analysis of Japanese Teaching Materials Platform a. Cloud computing helps improve the learning support service capabilities of Japanese teaching resource platforms Currently, providing students with learning and training methods such as online libraries, streaming video-on-demand, mobile learning, and virtual laboratories has become more and more important manifestation of the ability of universities to support learning. At the same time, in response to the party’s central government’s calls to build a learning society in which “everyone can learn, everywhere can learn,” many colleges and universities have also undertaken the heavy task of providing services to the public. In order to push these services to inestimable users, the teaching resource platform must have massive data storage and supercomputing capabilities. For most domestic colleges and universities, this is difficult to meet. If cloud computing platform is applied to the teaching resource platform and the dynamic expansion of cloud computing is used, even for large-scale applications, it is only necessary to increase the number of server clusters, and it is not necessary to change the cloud computing application architecture, which is sufficient to meet this resource demand. b. Cloud computing is conducive to promoting sharing of Japanese teaching resources As we all know, the scale and level of school running in China’s colleges and universities are very different. The investment of well-known institutions in teaching resources is far from comparable to those of small schools. This has resulted in high-quality digital Japanese teaching resources and Experimental facilities cannot play a larger role, while other institutions suffer from the constraints of funding, faculty, and development level, and it is difficult to provide highquality teaching resources and experimental guarantees. The cloud computing-
418
C. Liu and X. Ge
based Japanese teaching resource platform will provide an environment for sharing teaching resources for various colleges and universities. Through cloud computing technology, ordinary colleges and universities can share the high-quality digital teaching resources and facilities and equipment of participating colleges, so that more teachers and students can use virtual teaching resources to effectively promote the utilization of Japanese teaching resources. c. Cloud computing is good for improving the reliability and security of Japanese teaching resources Most of the resources in the traditional Japanese teaching resource platform are stored on the server or the local computer’s hard disk. If a hacker attack or a virus destroys these resources, these resources cannot be accessed and the reliability is not high. The data in the cloud is distributed storage. The teaching resources are stored in multiple nodes in the form of multiple data blocks. Due to the cloud computing copy backup mechanism, each copy of the data is stored in different nodes. Even if an error occurs in a node in the cloud, it does not affect the integrity of teaching resources at all, and has high reliability and security. 3.1
Cloud Computing-Based Japanese Teaching Resource Platform Model
a. Choice of cloud computing infrastructure type When applying cloud computing to a Japanese teaching resource platform, the first thing to face is the choice of the type of cloud computing infrastructure. You must choose one of the public cloud, private cloud, and hybrid cloud types. Public cloud is a cloud computing model provided by various service providers. Its advantages are that universities can reduce the cost of building infrastructure and pass construction risks to cloud service providers. However, the shortcomings are also obvious. To fully apply the services of the public cloud, it is necessary to completely hand over the data and calculation to the cloud service provider, which will inevitably increase the risk of accidental data leakage. If colleges and universities build their own private clouds, although colleges and universities can have infrastructure service quality, the human, material, and financial resources invested are quite large. In addition, this investment is likely to continue to increase as user needs increase. This is undoubtedly a test for institutions with limited funding. Based on this, considering the financial strength and scope of services, the advantages of both the price advantage of public clouds and the relative security of private clouds, and the more flexible and convenient hybrid cloud model is obviously more suitable for higher vocational colleges to adopt. Of course, colleges and universities can also flexibly set up a hybrid cloud that suits their needs according to the actual situation, such as a “public cloud” plus several “private clouds”; a large “private cloud” plus several small “private clouds”; or is it a combination of a “public cloud” plus a large “private cloud” plus a small “private cloud”. The content of teaching resources under the “Private Cloud” platform is only allowed to be read and written by users with the “Private Cloud” permission, while external users are restricted to read in
Research of College Online Teaching System Based on Cloud Computing
419
designated open sections. In this way, teaching resources can be shared and the information security of local teaching resources can be guaranteed. b. Construction of Japanese Teaching Resources Platform Based on Cloud Computing (1) Through the analysis of the requirements of computing-based teaching resource platforms and the characteristics of the hybrid cloud model, teaching resources are composed of teaching resources of participating colleges and universities in the “cloud”. When any user accesses resources in the cloud, he does not need Knowing which server the resource is stored on, the system can automatically analyze the visitor’s IP and determine the route. After finding the “recent” resource of the visitor. Users can only register once to access the resources on all resource servers, and truly realize the sharing of teaching resources (see Fig. 2).
Fig. 2. Logical architecture based teaching resource platform with cloud computing
In addition, thanks to the powerful computing capabilities of the cloud computing platform, the user end is no longer limited to computers, but can also be mobile devices such as mobile phones, tablet computers, and even IPTV. (2) The hardware of the cloud computing-based teaching resource platform is composed of the freely expandable infrastructure, the teaching resource platform software, and the massive teaching resources obtained through the IaaS services provided by the cloud computing data center. In a cloud computing data center, all hardware resources, After the virtualization software and a unified resource management scheduling center, it can provide users with a unified interface and form the IaaS (Infrastructure as a Service Layer) of the platform architecture, which is also the basis for building a cloud computing platform. The cloud operating system and various system management software implement the PaaS (platform as a service layer) of the platform architecture, which mainly includes software and hardware monitoring software and distributed file systems.
420
C. Liu and X. Ge
SaaS (Software as a Service Layer) is an application software service that provides various teaching resources to state households. For example, video-on-demand systems for user learning, digital libraries and online learning platforms, and virtual computing laboratories for experimental training (see Fig. 3).
Fig. 3. Architecture of cloud-based teaching resource platform
4 Conclusions With the maturity of “cloud computing” technology and application models, various “cloud services” represented by Microsoft, IBM, Amazon, Google, etc. have become an important way for the future development of the Internet. China’s education sector is taking the development of “cloud computing” and “cloud services” as an opportunity to further reform and innovate, and actively explore and promote its extensive application in the education industry. Teaching resource platform of cloud computing in the foreseeable future will play a huge role. China’s education authorities should be aware of the huge integration of “cloud computing” application model in educational resources, and consider the current technological development in China to conduct scientific research on cloud computing application demand analysis, system construction, technology development and implementation, Bring into play the technical power of software companies to strengthen the functional development of the “cloud computing” Japanese teaching resource platform in China. Acknowledgements. Research and Practice on University Japanese Talent Cultivation based on the Development of Core Quality. Key project of the 2018 Education and Teaching Reform of Chengdu College, SISU. Project NO. JG18003.
References 1. Xiangyang, Z.: Research on Architecture and Application of Teaching Resource Platform Based on “Cloud Computing” Coal Technology (1) (2012) 2. Kekang, H.: The status quo and countermeasures of the construction of digital learning resources in China. Electrification Educ. Res. (10) (2009)
Research of College Online Teaching System Based on Cloud Computing
421
3. Xiao’e, L.: Construction and application of digital learning resources. China Adult Educ. (23) (2009) 4. Yingchun, J.: Thoughts on the Construction of Network Learning Platform Based on Digital Learning Resource Center. Digit. Technol. Appl. (4) (2011)
Part III: AI, VR, Blockchain Applications and Innovations
Application Research of the New Mode of “Blockchain + Higher Education” Zhenxing Ge(&) and Ying Hu College of Technology and Art Jingdezhen Ceramic Institute, Jingdezhen, Jiangxi, China [email protected]
Abstract. As one of the subversive technologies that cause great changes in human society after information technology and Internet technology, blockchain technology has been applied in many fields, and its performance in the field of education and teaching is also expected. Against this background, this paper studies the application of the new mode of “blockchain + higher education”. Based on the analysis of the connotation and technical characteristics of “blockchain +”, it explains the various application scenarios of the new mode of “blockchain + higher education”, studies the problems existing in the application, and finally puts forward the corresponding improvement ideas, so as to provide reference for the follow-up research of higher education theory and practice based on blockchain technology. Keywords: “Blockchain +”
Higher education Application mode
1 Introduction 1.1
Research Background
At present, there are some problems in China’s higher education resources, such as unable to share effectively, unbalanced distribution, too high cost of information, too scattered student information and so on. The blockchain technology has the advantages of decentralization, non tamperability, anonymity and so on. It can effectively integrate education resources and student information, and realize the sharing of high-quality resources across borders and platforms, so that students can enjoy better education at less cost, and graduates have more fair employment opportunities. As early as 2016, the media lab of MIT had shared student academic certificates and scores on the blockchain platform, so that enterprises can access accurate and open student information if they need. However, in China, the field of “blockchain + higher education” is still blank, which is worth studying. 1.2
Literature Review
Based on the analysis of the problems existing in the digital platform of previous school, Eric F. and Jeff (2018) believed that this technology may significantly change the future of health professional education, provide qualification certification for © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 425–430, 2021. https://doi.org/10.1007/978-3-030-51431-0_61
426
Z. Ge and Y. Hu
medical professionals, and change the way of information interaction [1]. Merija J. and Janis K. (2018) thought that blockchain education technology creates a way for recording, storing and managing credentials, and provides learners with a record of achievements, and it can also benefit universities by reducing administrative costs and bureaucracy [2]. Xu Tao (2017) summarized the development of “blockchain + education” in Europe and America from three perspectives: blockchain technology teaching, campus communication and teaching platform construction, and looked forward to the application of “blockchain + education” in developing and underdeveloped countries [3]. Li Qing and Zhang Xin (2017) pointed out that blockchain has great potential in the field of education, they analyzed the advantages and potential problems around several application models [4]. Obviously, even if many experts have a more in-depth discussion on blockchain, the application of “blockchain + education” is also gradually on trial in western developed countries. There is little research on “blockchain + higher education” in China. But this article carries on the research in this aspect innovatively and pertinently, in order to draw some useful suggestions or conclusions [5, 6].
2 Application of the Mode of “Blockchain + Higher Education” Blockchain is a new model, which comes from the comprehensive application of pointto-point transmission, encryption algorithm, distributed data storage, consensus mechanism and other computer technologies [7]. “Blockchain + higher education” is a new mode that integrates the innovation achievements of blockchain with higher education through blockchain platform, using computer technology and network technology. This mode is shown in Fig. 1, which consists of four layers: Data Layer, Transaction Layer, Application Layer and System Layer.
Fig. 1. New mode of “blockchain + higher education”
Application Research of the New Mode
2.1
427
Establish Large Data of Individual Learning Information
The application of “blockchain + education” can be used to realize the distributed recording and storage of students’ information, so that any learning organization or educational institution can be allowed to record learning behavior and results across systems and platforms. These data are stored in the cloud server forever to establish large data of individual learning information, which is helpful to solve the practical problems in the current education field, such as the lack of credit system and the separation of schools from enterprises in employment. Employers can accurately evaluate the matching degree between applicants and positions by these data. In addition, large data of learning information is also an important basis for colleges and universities to carry out quality assessment of personnel training and professional assessment, which effectively promotes accurate cooperation between universities and enterprises in talent training. 2.2
Build a Trading Platform Which Is Intelligent
Blockchain technology can build a virtual economic education intelligent transaction platform by embedding intelligent education contracts and certificates. All kinds of services, such as purchasing, using and payment, are all completed automatically by the platform. This platform has unique advantages: (1) Smart contract procedures are recorded on the blockchain, which can guarantee the authenticity of transaction information and prevent fraud. (2) Transaction information can be queried at any time and stored permanently. The strong technical conditions and procedural evidence have greatly protected the rights of merchants and consumers. (3) Intelligent transactions do not need a third-party payment platform. They can use digital currency to pay for pointto-point transactions among learners, teachers and training institutions. This can not only reduce unnecessary operation and maintenance of other intermediary platforms, but also provide online learning services with quality assurance. 2.3
Develop Degree Certification System
Using the decentralized, verifiable and tamper proof storage system of blockchain to store academic certificates in blockchain data can ensure the authenticity of academic certificates and diplomas, which will become the perfect solution to diploma and certificate forgery. If all schools and training institutions apply the certification system, it will realize the transparency of academic certificates, and it will also bring convenience to employers. 2.4
Build Academic Copyright Protection System
Nowadays, with the development of network technology, cost-free replication and piracy have become the means for many Internet users to obtain knowledge and information. To construct an academic copyright maintenance system by applying blockchain technology can improve the security and reliability of students’ and teachers’ intellectual property rights or teaching resource copyright. In this system,
428
Z. Ge and Y. Hu
based on the open and transparent nature of blockchain technology, the application process of resources can be well understood and the owner of copyright information can be traced. 2.5
New Mode of Cross-Border Payment
The development of global integration has brought about an increase in the number of transnational students, so cross-border payments have become a problem that overseas scholars have to face. The cross-border payment of blockchain can reduce risks, save costs, and abandon the role of transit bank by using the decentralization feature; in the future, it can also use digital currency to realize fast and low-cost point-to-point crossborder payment. The blockchain distributed ledger will verify the digital information of users. Its network connector connects the remitting bank and the receiving bank, which can confirm the transaction information of both sides, so that the transaction must be authentic and reliable. When the identity of the payee is verified in the distributed ledger, the payment can be made successfully (shown in Fig. 2).
Fig. 2. New cross-border payment mode of blockchain technology
2.6
Build a Decentralized Higher Education System
If we develop relevant education and teaching systems by using the decentralized characteristics of blockchain technology, the monopoly of education power by schools, training institutions and other institutions will be broken, and more institutions will participate in education services, making education and teaching more open and conducive to the participation of the whole people. Blockchain technology gradually blurs the boundary between schools. When a learner want to study any course, he can use any learning method and choose any training institution independently, and then get a course certificate with the same effect to effectively prove their professional knowledge and skills in a certain field.
Application Research of the New Mode
429
3 The Way to Promote the Application of the New Mode of “Blockchain + Higher Education” At present, there are still some problems in the application of “blockchain + higher education”, such as lack of experience or policy protection, controversial data property rights, immature privacy protection technology, etc. [8]. Meanwhile, a large number of data volume of teachers and students and education management departments also brings great challenges to datastore space. Therefore, the application path of the new mode of “blockchain + higher education” should start from solving problems and meeting challenges. 3.1
Accelerate the Assumption of Relevant Laws, Regulations, Systems and Standards
At first, formulate and issue relevant laws and regulations as soon as possible, and guarantee the application of “blockchain + higher education” mode from technology implementation, operation mechanism and other aspects. In that way the legitimate rights and interests of participants can be protected effectively. Secondly, handle the distribution of interests carefully and skillfully between the traditional universities and the blockchain operation platform, in order to reduce the resistance of “blockchain + higher education” promotion. Thirdly, make full use of blockchain technology experts and education experts, learn from the advanced experience at home and abroad, and then form a unified application standard and rules [9, 10]. 3.2
Formulate the Standard System of Storage Data Attribution and the Benefit Distribution Scheme
Firstly, it needs to be clear that the blockchain virtual data belongs to data producers such as teachers and students, educational management institutions, and not to the third-party platform of the blockchain. Secondly, formulate the benefit value distribution scheme of the block chain virtual data in the process of school-enterprise cooperation or intercollegiate cooperation, and the third-party platform of the block chain will distribute the benefit value to the data producers, providers and value developers according to a certain proportion. It can be said that only when the ownership, the premise of use and the distribution of benefit value of the blockchain virtual data property right are clear, can the dispute of virtual data property right be eliminated, and the healthy development of the new mode of “blockchain + higher education” be guaranteed. 3.3
Combining Blockchain with Cloud Storage to Establish a Decentralized Database
Firstly, blockchain and cloud storage should be combined to complement each other and form a synergistic effect; at the same time, building cloud system, slicing various educational data, encrypting the sliced data, and then storing them on the specific network hard disk, so that the problems of insufficient storage space of blockchain data
430
Z. Ge and Y. Hu
can be effectively solved. Secondly, establish a decentralized database to write data information millions of times per second and store data with PB level effectively. 3.4
Strengthen the Supervision on the Application
Strengthen the authority management of all kinds of data and information, and use asymmetric encryption algorithm to encrypt these data to ensure the privacy of teachers and students is not leaked. By using security algorithms, multi department joint supervision and other ways, to prevent the relevant data information from being hacked. Using big data technology and artificial intelligence technology, we can estimate and analyze the time, space and mode of hacker attacks, and then create a defense system to protect the privacy of teachers and students with the security system of blockchain together.
References 1. Funk, E., Riddell, J., Ankel, F., Cabrera, D.: Blockchain technology: a data framework to improve validity, trust, and accountability of information exchange in health professions education. Acad. Med. 12, 1791–1794 (2018) 2. Jirgensons, M., Kapenieks, J.: Blockchain and the future of digital learning credential assessment and management. J. Teach. Educ. Sustain. 20(1), 35–38 (2018) 3. Xu, T.: Research on the development status and application value of “blockchain +” education. J. Distance Educ. 35(2), 19–28 (2017) 4. Li, Q., Xin, Z.: Blockchain: promoting the openness and public trust of education with technology. J. Distance Educ. 35(1), 36–44 (2017) 5. Underwood, S.: Blockchain beyond bitcoin. Commun. ACM 59(11), 15–17 (2016) 6. Verde, F., Stanzione, A.: Could blockchain technology empower patients, improve education, and boost research in radiology departments? An open question for future applications. J. Digit. Imaging 32(6), 1112–1115 (2019) 7. Man, F., Lin, C.: Blockchain technology: a new technology to promote education reform. China Med. Educ. Technol. 11, 613–617 (2017) 8. Li, X., Yang, X.: Application mode and practical challenges of blockchain technology in education. Mod. Distance Educ. Res. 3, 34–45 (2017) 9. Gmbh, A.: Bigchain DB: a scalable blockchain database. In: Proceedings of the Block Chain Conference. San Francisco (2016) 10. Tapscott, D., Tapscott, A.: The blockchain revolution and higher education. Educ. Rev. 2, 10–24 (2017)
Design and Implementation of Online Art Education Software Under the Background of Education Informationization 2.0 Changcheng Cui(&) Jilin Engineering Normal University, Changchun, Jilin 130052, China [email protected]
Abstract. With the continuous development of Internet technology, the degree of education informatization is getting higher. The state proposed Education Informatization 2.0, which put forward higher requirements for education informationization. Online art education is a way where teachers teach through the Internet platform and students learn through the Internet platform, which requires the support of a reasonable and scientific online art education software. online art education will also follow the tendency towards development of the times to a high standard. Based on the design and implementation of online art education software under the background of education information 2.0, this paper proposes practical strategies, hoping to promote the extensive application of online art education software. Keywords: Education Informatization 2.0 Design Implement
Online art education software
1 Introduction High technology such as digital technology and multimedia technology with the rapid development, the way of art education has also changed dramatically. With the continuous promotion of Education Informatization 2.0, online art education is changing the educational philosophy and rules of traditional art education, conforming to the development trend of the new era, and becoming a new form of education in art education. Fully utilize computer technology to design and implement online art education software to meet the construction needs of campus informatization [1]. All kinds of online art education software appear in the public. Teachers’ teaching and students’ learning forms are constantly diversified, which makes art education realize the development of “human-computer interaction”. In order to improve the quality and effect of online art education, there are higher requirements for the selection of online art education software in the field of education, which requires online art education software to reflect the characteristics of fast and convenient, strong control, diversification and high cost performance in the design and implementation, so as to adapt to the higher needs of the masses [2].
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 431–437, 2021. https://doi.org/10.1007/978-3-030-51431-0_62
432
C. Cui
2 Advantages and Dilemma of Online Art Education in the Context of Education Informatization 2.0 With the continuous development of education informationization, online art education is rapidly popularizing. The rapid development of online art education certainly has certain advantages, such as free time and place, convenient and fast, and abundant resources, which are loved by users. However, it is inevitable that various difficulties will be encountered in the development of online art education, which requires us to effectively solve these problems. 2.1
Advantages of Online Art Education in the Background of Education Informationization 2.0
Online art education has great advantages compared with traditional art education. First of all, online art education software complies with the development of information age, breaks the limitation of traditional art education which makes art education more convenient, personalized, interactive, cross-cultural and so on. Through the design of online art software, it can display watercolor, gouache, mural and other painting forms in static and dynamic Internet pictures at the same time for art education It brings great convenience [3]. Secondly, as an interest of students, art Secondly, as an interest of students, art learning can be attained by online art education, students’ learning time and place are more flexible, overcoming the stationarity of traditional art teaching, students can make fully utilize their spare time to learn art and the learning content can be freely chosen. Thirdly, offline art education is only facing an art teacher, whose teaching level is limited. Online art education can choose art teachers freely according to their own preferences and other reasons. Finally, the design of Online art education software can make full use of the effectiveness of education and fully use high-quality educational resources to improve the teaching efficiency of teachers. Meanwhile, online art teaching is “one-to-one” teaching, which breaks away from the “one-to-many” limitation in traditional art education, greatly improves the interaction between teachers and students, and is contribute to target personalized teaching [4]. 2.2
The Dilemma of Online Art Education Under the Background of Education Informatization 2.0
Although online art education has many advantages such as convenience, efficiency and freedom, compared with the traditional offline teaching, it has a very high requirement for students’ autonomy. In the face of complex school activities and network, college students lack of self-control ability and autonomous learning capacity, which greatly reduces the learning effect. Finally, because the development time of online art education is short comparatively, there are still many loopholes in the way of online education and education software which will cause certain problems to students’ learning [5].
Design and Implementation of Online Art Education Software
433
3 Design and Implementation of Online Art Education Software Under the Background of Education Informatization 2.0 Design of online art education software is a work with features of integrating technology and art. In the design process, it includes detailed design schemes in system, function, content, interactive experience and so on. In the process of design, it is necessary to link the theory of art education with the actual needs. Design provides a stable, safe, open and intelligent online art education software. After the completion of design, the corresponding implementation scheme is also needed to complete the application of the software [6]. As shown in Fig. 1.
Fig. 1. Design and implementation of online art education software
3.1
Design of Online Art Education Software
3.1.1 System Design According to the demand of the software to analysis the online art education software system includes the management end, the teacher end and the student end as well. The management end is the port that the manager of the whole software needs to enter [7]. This port mainly realizes the management function of the whole system of online art education software, including the management of user information, education content, interactive content. The teacher’s terminal is the port that online teaching teachers need to enter. Teachers can make their own teaching content, experience, methods into an introduction form and display it in the software for students’ reference. Then, they can conduct online teaching in the software and also in the software, transfer the self-made teaching videos and teaching content for students to watch. The student side is the port that students need to enter. Students can choose teachers and learning content according to their own situations and needs in the software. They can conduct online learning, communication, discussion. It can display their works in the software for teachers and other Students evaluate as shown in Fig. 2.
434
C. Cui
Fig. 2. Online art education software system design
3.1.2 Features Design During university studies, majors related to art can be divided into design and pure and other majors. There are also art education selected by amateur art enthusiasts, including oil painting enthusiasts, watercolor enthusiasts, sculpture enthusiasts. In the function design of art education software, it is necessary to meet the various needs of users. Therefore, in terms of function design, detailed research should be conducted according to the type, professional knowledge, hobbies and other aspects of the user. Not only the functions of various sections of the software be presented in front of the user in a simple and concise manner, but also the user’s visual experience and autonomous choice, communication experience, skills learning but also achieve the basic functions of management, teacher and student [8]. 3.1.3 Design of Educational Content The content of online art education software mainly includes the live teaching content of online teachers and pictures and videos made ahead of schedule. The live teaching content of online teachers is mainly based on the needs of students and the teaching content of teachers. To sum up, the live teaching content is arranged in a unified way, and students watch and learn in a limited time. Picture and video teaching content made in advance so that the teacher makes teaching content according to the various needs of students and put it in the software for students to watch and learn at any time. Due to online teaching content is diverse, in order to improve the competitiveness of online art education software content, online teachers’ teaching needs to be interesting, effective and high-quality, which means that the content of live teacher teaching is all students need “practical knowledge” and students see these learning contents are easy to accept, understand and remember [9]. 3.1.4 Cross Design The interaction design of online art education software needs to be designed according to the major of students. For the art of game animation major, it needs to pay attention to the sense of game and experience of software interaction. For the art teaching of design major, it needs to pay attention to the complexity of design. The interaction of art teaching of pure art focuses on the professionalism of their teaching. However, all of
Design and Implementation of Online Art Education Software
435
these professional and amateur teaching needs to pay attention to the interaction experience with students. During the process of design, not only need to pay attention to the interaction experience of teachers, but also the interaction experience of students, so that both sides can get a good interactive experience. During the exchange experience of pictures and videos, a comment area can be set up, in which students and teachers can exchange and interact with the teaching contents, or set up a special mailbox for teachers to send learning feedback to the special mailbox for interaction. 3.2
The Realization of Online Art Education Software Under the Background of Education Informatization 2.0
3.2.1 System Management Module In the above system design, it includes student end, teacher end and management end. The system management module of online art education software is the management process of student and teacher’s management. First of all, the student end and the teacher end need to log in to this software through identity authentication, then the software page are definitely different when students and teachers entered into.. Through the teaching and learning of the students and teachers’ end, the function of communication and interaction is finally completed. The system management module mainly completes the overall process of online teaching through the management of the student, teacher, server and database, as shown in Fig. 3.
Fig. 3. Online art education software system management module
3.2.2 Teaching Module The solution module of online art education software is to realize online teaching. There is another teaching module is picture and video teaching, which means that teachers transfer the teaching content made in advance to the software for students to learn, which involves two links: making and playing. The process of making is that the teacher integrates the courseware of video, picture, text synchronously and uses the complete picture to present the clear art knowledge. The broadcast link is to use
436
C. Cui
streaming media and other broadcast technology to broadcast the teaching content delivered by teachers to students. Similarly, these aspects are gained the support from the server.
4 Data Module The data module of online art education software is related to the realization of teaching content. First, the specific knowledge parts in the real teaching are made into data model, and then the data model is transformed into the virtual world in the machine. The data module of this software needs not only teaching materials, but also appreciation and learning materials [10]. Therefore, it is necessary to upload corresponding art works according to the needs of different students and set the way to play them according to the attributes of the works such as voice, video, picture and other ways. Each way needs to be further divided and classified and set the retrieval way of its key words. What is important is that it guarantees learning quality at the same time.
5 Communication Evaluation Module The design of mutual exchange in online art education software is mainly realized by the communication evaluation module. The interaction of live teaching is mainly completed in the live room. As for the evaluation of pictures, videos, and works, it can rely on evaluation settings in the communication evaluation module, the administrator needs to set the evaluation content including the work name, evaluation item, evaluation scope, evaluator name, job title. After the evaluation is completed, the final grade of the work can be obtained through this template and then teachers and students can give suggestions based on their own experience and opinions and make quantitative scores. After the final total scores are obtained, they are ranked intelligently, Works are saved to the database for future teaching and appreciation by teachers and students.
6 Conclusion With the rapid development of the Internet, the way of art education has also undergone revolutionary changes with the development of the times. On the basis of computer technology and traditional art teaching, online art education software combines technology with art and realizes online teaching with computer technology. In the process of design and implementation, not only we need to consider the needs of users, determine the development environment of the software, but also need to design the function, content and database of the software in detail to get the optimal design and implementation scheme. It is hoped that the continuous improvement of each link can make the online art education software function more complete and the interaction more humanized.
Design and Implementation of Online Art Education Software
437
References 1. Feifei, Z.: Research on design of online art education software. Shandong Ind. Technol. 4, 225 (2019) 2. Lijun, Z.: Reform of fine arts education under the background of informationization. Occupation 13, 126–127 (2019) 3. Zhenyun, Q.: Design and application of art design aid system based on computer technology. J. Anhui Vocat. College Electron. & Inf. Technol. 18(5): 20–22 + 5 (2019) 4. Anna.: Innovation of teaching mode and teaching method of higher vocational art education specialty based on information technology. Shaanxi Educ. (High. Educ.) 11: 50–51 (2019) 5. Wei, Z.: Design of art-assisted curriculum system based on WeChat public platform. Electron. Des. Eng. 24(20), 69–71 (2016) 6. Min, Q.: Design and implementation of student information management system of UML based art college. Electron. Des. Eng. 23(15), 62–65 (2015) 7. Fang, C.: Design of experimental report management system for art courses under Web2.0 environment. Art Educ. Res. 24: 52 (2012) 8. Qiu, Y.: Research on the cultivation of students’ ability by art education in universities. Chin. Foreign Entrep. 30, 182 (2019) 9. Xin, C.: Reflections on the teaching reform of university fine arts in the digital media era. Art Sci. Technol. 32(9), 217–242 (2019) 10. Zeng, Y.: Research on the reform and innovation of university art teaching in the information environment. Art Educ. Res. 10, 102–103 (2019)
Exploration of Interactive Urban Sculpture Based on Augmented Reality Shukui Song1(&) and Yushan Zhong2 1
School of Digital Arts and Design, Dalian Neusoft University of Information Liaoning China, Dalian, Liaoning, China [email protected] 2 Dalian Neusoft University of Information, A1, No. 8 Software Park Road, Gaoxin Park, Dalian, Liaoning, China [email protected]
Abstract. With the development of science and technology, modern interactive urban sculpture has become the latest product of integrating science and technology and art in the field of public art. The integration of high-tech elements makes the city sculpture develop from the traditional static mode to the direction of technology, intelligence and interaction,so that further strengthened the interaction between people, people and the environment, and people and sculpture, promotes the participation and creativity of the public, and enables the public to participate in the urban public art more consciously and voluntarily. This paper introduces the current situation of interactive sculpture development and existing problems of single form of interaction, through analysis the advantages and characteristics of augmented reality technology, puts forward the interactive sculpture design mode based on augmented reality technology. Keywords: Public art
Interactive sculpture Augmented reality technology
1 Introduction 1.1
The Development Trend of Interactive Sculpture
With the development of science and technology, after two stages of static sculpture and dynamic non-interactive sculpture, dynamic interactive sculpture enters urban public space in an unprecedented way by virtue of its unique interactivity, participation and intelligence [1–3]. In this field, foreign countries started relatively early,for example, Flatcut teamed up with Danish firm BIG architects to create heart-shaped interactive public art works in the heart of New York’s times square,the work uses the people, air and touch of the square to interact with the sculpture. Although Chinese urban sculpture started relatively late, with the rapid development of high-tech in China in recent years and the demand of modern urban spirit and culture, interactive sculpture in China has gradually emerged and gradually entered the public’s vision. Generally speaking, creating interactive sculpture art will become a new trend of public art development under the help of science and technology.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 438–443, 2021. https://doi.org/10.1007/978-3-030-51431-0_63
Exploration of Interactive Urban Sculpture
1.2
439
Problems in the Development of Interactive Sculpture
At present, in the interaction mode focusing on people and sculpture, urban interactive sculpture can be roughly divided into two categories according to the different use of science and technology,one is the interactive device sculpture based on electronic and mechanical technology. The sculpture is equipped with a variety of electronic and mechanical devices, and the public can interact with the sculpture through sensors and other electronic components to generate sound, light and electricity. The other one is interactive sculpture based on computing information technology, which establishes information association with the sculpture through mobile devices, thus triggering the interaction between man and sculpture. The first one has shocking effect, but the cost is high;The second one is closely related to portable mobile devices. Information interaction is mainly carried out on the computer network platform, unaffected by time and space, but the interaction effect is not very intuitive. 1.3
Augmented Reality into Interactive Sculpture
This paper introduces the augmented reality technology into the design of interactive sculpture under the consideration of various factors such as technology implementation difficulty, sculpture cost and sculpture effect.Enrich the interactive form of sculpture through the full fusion of virtual information and real information.
2 Application of Augmented Reality Technology in Interactive Sculpture 2.1
Augmented Reality Technology
Augmented reality technology is a technology that combines information in the virtual world with information in the real world to enhance people’s understanding and experience of the real environment [4]. Specifically speaking, by using multimedia, 3d modeling, real-time tracking and registration, intelligent interaction, sensing and other technical means, the virtual environment information generated by the computer can be applied to the real world, at the same time, the real environment and the virtual scene are superimposed into the same picture or exist in the same space at the same time, so that realize the digital real world. Because the connection to the real world is not cut off, the interaction is more natural. The advantages of augmented reality technology can be summarized as follows. 1. Realize the perfect combination of real world and virtual world. The audience can overlap the real world with the virtual scene generated by the computer through the corresponding external devices, so that the audience can form a complete and real scene in visual. 2. Real-time interactivity is strong. Augmented reality technology synchronizes the changes of image, sound and touch in the virtual scene to the real world with realtime interaction, immersing the audience in the virtual scene, and greatly enhancing the use of fun and product features.
440
S. Song and Y. Zhong
3. The cost of using equipment is low. A simple augmented reality product can be used with only a mobile phone, which can save a lot of money for users to buy equipment and facilitate promotion. 4. The research threshold of augmented reality technology is low. There are more and more add-ons for augmented reality technology, such as Google’s ARCore and apple’s ARKit. 2.2
The Way Augmented Reality Technology Integrated into Interactive Sculpture
According to the principle and characteristics of augmented reality technology, we take target recognition and positioning, combination of virtual and real information, and display direction of interactive forms as the key research objects to solve the integration of augmented reality technology into sculpture art. (1) Target identification and location To apply augmented reality technology to interactive sculpture, the problem of sculpture recognition and location should be solved first. Most object recognition is based on two-dimensional image information, but sculpture is three-dimensional. The foundation of three-dimensional object tracking technology is also two-dimensional image recognition, but it is much more complicated than image recognition and tracking. So here we propose two executable scenarios,one is use 3D object recognition and tracking for the sculpture,One is the location of the sculpture LBS technology positioning. Adopt 3D object recognition:Vuforia provides a way to get three-dimensional information about objects,this approach requires the Model Target feature in Vuforia [5, 6]. First, the creator needs to obtain the 3d digital sculpture Model of identifiable objects. Then, the 3d digital sculpture Model is processed by the Model Target Generator to obtain the 3d recognition information of the Model. After processing, the sculpture Model can be identified by augmented reality technology, as shown in Figs. 1 and 2.
Fig. 1. Vuforia-based 3D object recognition process
Adopt LBS technology positioning:LBS that is Location Based Service,use LBS technology, make the user uses the mobile device to obtain the exact latitude and
Exploration of Interactive Urban Sculpture
441
Fig. 2. Dalian city “Rong” sculpture of the augmented reality production effect
longitude of the interactive sculpture in the real world, then located the virtual information near this location, when users reach this location, they can obtain real interactive sculpture information and virtual additional information [7–9]. (2) Combination of virtual and real information Realistic information includes real physical interactive sculpture and surrounding real environment data. Virtual information includes virtual 3d model, animation effects, and interactive interface and so on. Import the digital model of real sculpture into Maya, 3DMax, C4D and other 3d modeling software,can be a perfect match with the virtual information fusion,so that complete the combination of virtual and real information. The virtual and real touch interaction can be designed and realized by using the touch program based on 3d game engine [10]. (3) Presentation of interactive forms Interactive sculpture representations incorporating augmented reality can have two forms. One is the mobile platform presentation, the other one is the touch-screen display, as shown in Fig. 3. Based on the mobile platform, the public should download the corresponding client or pay attention to the relevant public account, and then use mobile devices with cameras, such as phones and tablets, to scan and identify interactive sculptures, watch and interact with the virtual information related to interactive sculpture, so that participate in the art of interactive sculpture. The display mode based on touch screen requires the user to complete the interactive sculpture information query, photo taking, game and other interactive functions by operating the relevant UI interface at the designated touch screen near the interactive sculpture.
442
S. Song and Y. Zhong
Fig. 3. Interactive presentation
3 Conclusion Chinese city interactive sculpture art is undergoing a process from reference to independent innovation. In this process, the emergence of augmented reality technology has provided a strong scientific and technological support for the development of urban interactive sculpture and injected new blood into modern sculpture creation. Augmented reality technology provides a more vivid and intuitive interactive way for interactive sculpture, which integrates a large amount of online digital information with real information, enhances the participation of the public, and enhances the propaganda function of urban culture. However, at present, the application of augmented reality technology in the field of interactive sculpture art is still shallow, and continuous exploration and research are needed to better combine this high-tech technology with sculpture art. Acknowledgements. This work was supported by Liaoning province natural science foundation guidance program project Research on the application of interactive dynamic public art products based on augmented reality technology.
References 1. Jianwei, L., Qingchang, R.: Truth emerging from leading-edge art/science/technology interaction. Leonardo 52(1), 1–2 (2019) 2. Zheng, J.: Producing Chinese urban landscapes of public art: the urban sculpture scene in shanghai. China Q. 239, 775–803 (2019) 3. Song, Y.I.K.: A new vision for public art and functional landscape design. Int. J. Art & Des. Educ. 33(2), 242–255 (2014)
Exploration of Interactive Urban Sculpture
443
4. Veas, E.E., Grasset, R., Kruijff, E., Schmalstieg, D.: Extended overview techniques for outdoor augmented reality. IEEE Trans. Vis. Comput. Graph. 18(4), 565–572 (2012) 5. Sarosa, M., Chalim, A., Suhari, S., Sari, Z., Hakim, H.B.: Developing augmented reality based application for character education using unity with Vuforia SDK. J. Phys. Conf. Ser. 1375 (2019) 6. Liu, M., Yang, S., Wang, Z.: Generic precise augmented reality guiding system and its calibration method based on 3D virtual model. Opt. Express 24(11), 12026–12042 (2016) 7. Guan, W., You, S., Neumann, U.: GPS-aided recognition-based user tracking system with augmented reality in extreme large-scale areas. Proceedings of the second annual ACM conference on Multimedia systems—MMSys’ 11, 1–8 (2011) 8. Purnomo, F.A., Santosa, P.I., Hartanto, R., Pratisto, E.H., Purbayu, A.: Implementation of augmented reality technology in Sangiran Museum with Vuforia. IOP Conf. Ser. Mater. Sci. Eng. 33, 1–6 (2018) 9. Ruiz-Ruiz, A.J.: A vision-enhanced multisensor LBS suitable for augmented reality applications. J. Locat. Based Serv. 7(3), 145–164 (2013) 10. White, J., Schmidt, D.C., Golparvar-Fard, M.: Applications of augmented reality [scanning the issue]. Proc. IEEE 102(2), 120–123 (2014)
A Mean-Continuous Fuzzy Random Entropy Portfolio Model with Fuzzy Random Returns Quande Sun1, Junfeng Zhao2(&), Xue Deng3, and Yingxian Lin3 1
2
Huizhou Engineering Vocational College, Huizhou 516000, Guangdong, China Department of Mechanical Engineering, Guangdong College of Industry and Commerce, Guangzhou 510510, Guangdong, China [email protected] 3 School of Mathematics, South China University of Technology, Guangzhou 510640, Guangdong, China
Abstract. In this paper, our aim is to resolve the problem that is security returns are influence by random uncertainty and fuzzy uncertainty in portfolio selection. First, the continuous fuzzy random entropy is defined for the first time to measure the portfolio risk. Then a mean-continuous fuzzy random entropy model is proposed in a more complex market. As an ending, we use a numerical example to illustrate this approach. The results show that the obtained efficient frontier of the portfolio is effective and the continuous fuzzy random entropy can present well the security uncertainty in the more complex market environment. Keywords: Portfolio model Normal distribution
Mean Continuous fuzzy random entropy
1 Introduction Modern portfolio theory was originally proposed by American economist Markowitz [1] in 1952. Although the kind of idea that portfolio return and risk are measured by mean and variance has been widely accepted by some scholars [2, 3], with the development of the technology and the existence of more complex security market, many scholars do deeper research on return uncertainty and risk measurement. On the one hand, the security uncertainty is a hot topic in the portfolio research. In some scholars’ papers we found the security returns not only are affected by random uncertainty but also by fuzzy uncertainty, such as Li [4], Zhang [5] and Liu [6]. So in this paper we regarde the security return as a fuzzy random variable. On the other hand, the risk measurement is another hot topic in the portfolio research. For example, Shannon [7] defined the concept of “information entropy” and regarded the information entropy as the measurement of risk. We note that the entropy can be presented the uncertainty of security risk, and some scholars have done some researches about entropy. For example, some scholars regarded risk as fuzzy random entropy such as Zhou [8].
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 444–450, 2021. https://doi.org/10.1007/978-3-030-51431-0_64
A Mean-Continuous Fuzzy Random Entropy Portfolio Model
445
But in the above research, it is regretful that this kind of fuzzy random entropy is researched only with discrete situation. So in order to do deeper research on portfolio model, in this paper, the return rate is regarded as a fuzzy random variable, and the portfolio return is measured by mean, and risk is measured by the continuous fuzzy random entropy. Furthermore, we propose a mean-continuous fuzzy random entropy model. As an ending, we use a numerical example to illustrate our approach.
2 Preliminaries 2.1
Fuzzy Random Variable
Fuzzy random variables are introduced by Kwakernaak [9, 10]. Liu [6] uses the fuzzy random variable in his paper for the first time. But his variable is used in discrete environment. To solve the problems in a more complex investment environment, we use the continuous fuzzy random variable in this paper. In our research we introduce the definition from Liu [6] and Liu [6]. 2.2
Entropy
The concept of entropy was originally derived from thermo-dynamics, and later developed to the statistical mechanics and information theory and other disciplines. Entropy is a measure of uncertainty. We introduce entropy with a continuous fuzzy random variable which is used in this paper. Generally speaking, if an event exists with randomness and fuzziness, the uncertainty of this event should be increased, but the amount of information that can be provided will be reduced. On this point, in the establishment of the expression of fuzzy random entropy should be reflected. Based on this, we provide the definition of continuous fuzzy random entropy for the first time. Definition 1: A continuous fuzzy random variable g with membership function kðSðsÞ; tÞ, in which the parameters SðsÞ may be the random characteristics of g, then its entropy is defined as Z HðgÞ ¼
1
Z
1
1 Z 1 1 Z 1
kðSðsÞ; tÞqðsÞ ln qðsÞdtds
qðsÞðkðSðsÞ; tÞ ln kðSðsÞ; tÞ þ ð1 kðSðsÞ; tÞÞ lnð1 kðSðsÞ; tÞÞÞdtds Z 1 qðsÞ ln qðsÞ kðSðsÞ; tÞdt ds ¼ 1 Z 1 Z 1 1 qðsÞ ðkðSðsÞ; tÞ ln kðSðsÞ; tÞ þ ð1 kðSðsÞ; tÞÞ lnð1 kðSðsÞ; tÞÞÞdtds; Z1 1
1
1
1
ð1Þ where qðsÞ is the density function of the continuous random distribution.
446
Q. Sun et al.
Let kkðSðsÞ; tÞk ¼ m be the interval length that when kðSðsÞ; tÞ is not zero. This HðgÞ in (1) should satisfy the following requirements: (1) HðgÞ will reach its biggest value if and only if kðSðsÞ; tÞ ¼ 1 and g is uniform distribution; (2) HðgÞ will reach its smallest value 0 if and only if kðSðsÞ; tÞ ¼ 0 or kðSðsÞ; tÞ ¼ 1, qðs ¼ s1 Þ ¼ 1 and qðs ¼ s2 Þ ¼ 0 ðs1 6¼ s2 Þ; (3) When g degenerates to a continuous random variable, continuous fuzzy random entropy should R 1 be reduced to a continuous random entropy, that is, HðgÞ ¼ m 1 qðsÞ ln qðsÞds; When g degenerates to a continuous fuzzy variable, that is, SðsÞ is a constant C, so continuous fuzzy random entropy should be reduced to a continuous fuzzy entropy, that is, Z HðgÞ ¼
1 1
ðkðC; tÞ ln kðC; tÞ þ ð1 kðC; tÞÞ lnð1 kðC; tÞÞÞdt:
ð2Þ
And we suppose the entropy be satisfied a formula, the formula is: Hðb1 g1 þ b2 g2 þ þ bn gn Þ ¼
n X
bi Hðgi Þ
ð3Þ
i¼1
where bi ði ¼ 1; 2; ; nÞ is a real number.
3 Mean-Continuous Fuzzy Random Entropy Model If there are N kinds of securities that can be invested in the stock market, investors choose n ðn NÞ to invest. Ri ði ¼ 1; 2; ; nÞ expresses the return rate of the i th security; gi ði ¼ 1; 2; ; nÞ expresses the variable of the i th security; si ði ¼ 1; 2; ; nÞ expresses the proportion of the investment in the i th security; s ¼ ðs1 ; s2 ; sn ÞT expresses the investment proportion vector of the security; r2i ði ¼ 1; 2; nÞ expresses the variance of the i th security. When the expected return is achieved, we minimum the risk of the portfolio and have the single-objective programming model: 8 n P > > si H½gi min > > > i¼1 > < n P s:t: M½gi si r > i¼1 > > n > P > > si ¼ 1; si 0 ði ¼ 1; 2; ; nÞ: : i¼1
where r expresses the investor’s expected return.
ð4Þ
A Mean-Continuous Fuzzy Random Entropy Portfolio Model
447
Suppose that g is a triangular fuzzy random variable gðsÞ ¼ ðSðsÞ a; SðsÞ; SðsÞ þ bÞ , and a [ 0; b [ 0, in which the parameters SðsÞ satisfy continuous normal distribution. Let S Nðk; r2 Þ , so the membership function of g is: 8 tSðsÞ þ a ; < a kðSðsÞ; tÞ ¼ SðsÞ þ bt ; b : 0;
SðsÞ a t SðsÞ; SðsÞ t SðsÞ þ b; otherwise:
ð5Þ
As known the density function of the continuous normal distribution is: 1 ðs kÞ2 pðsÞ ¼ pffiffiffiffiffiffi expð Þ 2r2 2pr
ð6Þ
and its corresponding entropy is: Z HðgÞ ¼
1
1
qðsÞ ln qðsÞds
! 1 ðs kÞ2 1 ðs kÞ2 pffiffiffiffiffiffi expð ¼ Þ ln pffiffiffiffiffiffi expð Þ ds 2r2 2r2 2pr 1 2pr Z
1
ð7Þ
1 1 ¼ lnð2pr2 Þ þ : 2 2 So the entropy of the continuous normal fuzzy random distribution is: Z
Z 1 qðsÞ ln qðsÞ kðSðsÞ; tÞdtds 1 Z Z 1 1 1 qðsÞ ðkðSðsÞ; tÞ ln kðSðsÞ; tÞ þ ð1 kðSðsÞ; tÞÞ lnð1 kðSðsÞ; tÞÞÞdtds 1 Z 1 1 Z 1 aþb aþb qðsÞ ln qðsÞds þ qðsÞ ¼ ds 2 2 1 1 1 1 aþb aþb aþb 1 3 ¼ ð lnð2pr2 Þ þ Þ ¼ ð lnð2pr2 Þ þ Þ: 2 2 2 2 2 2 2
HðgÞ ¼
1
ð8Þ And model (4) can be translated into: 8 n P > > si ai þ2 bi ð12 lnð2pr2i Þ þ 32Þ > min > > i¼1 > < n P s:t: M½gi si r > i¼1 > > n > P > > si ¼ 1; si 0ði ¼ 1; 2; ; nÞ: : i¼1
ð9Þ
448
Q. Sun et al.
4 Numerical Example In this part we use a numerical example as a evidence to prove our work. We choose 8 securities from Shanghai 180 Index, and this sample data covers 63 days. And we assume that the returns of these securities are continuous fuzzy random variables denoted by gi ði ¼ 1; 2; ; 8Þ, and they are subject to continuous normal distribution. The codes and names are listed in Table 1. (To facilitate the calculation, we let the base of logarithm of the entropy in this paper be 10.) Table 1. Codes and names No. H1 H2 H3 H4 H5 H6 H7 H8 Code 60000 60000 60000 60006 60007 60007 60008 60068 Name SPDB NEX DFM NJHT SHML QNH TRT SHPC
We get Eðai Þ (BY EXCEL) which is the average value of the i th security in these days, then we get the values of ðEða1 Þ; Eða2 Þ; ; Eða8 ÞÞ as in Table 2. From paper [8] we can easily get the values of ða1 ; a2 ; ; a8 Þ and ðb1 ; b2 ; ; b8 Þ as in Table 2. Table 2. The expect values and left-right widths (%) No. Eðai Þ ai bi
H1 0.6972 0.1500 0.1500
H2 0.3693 0.2100 0.0900
H3 0.6161 0.0800 0.2200
H4 0.5720 0.0400 0.3600
H5 0.7828 0.2200 0.0800
H6 0.5768 0.1100 0.3900
H7 0.6911 0.1800 0.1200
H8 0.5405 0.1700 0.5300
We get the values of ðr21 ; r22 ; ; r28 Þ(BY MATLAB) as in Table 3. Table 3. The variance values (%) No. H1 H2 H3 H4 H5 H6 H7 H8 Variance 0.07 0.05 0.10 0.14 0.14 0.07 0.07 0.04
We get the means of the fuzzy random expected future return of the 8 sample securities as in Table 4. Table 4. The means values (%) No. H1 H2 H3 H4 H5 H6 H7 H8 Mean 0.6972 0.3693 0.6161 0.5720 0.7828 0.5768 0.6911 0.5405
A Mean-Continuous Fuzzy Random Entropy Portfolio Model
449
According to formula (8), we can get the continuous fuzzy random entropy risk values of the 8 securities as in Table 5. Table 5. The continuous fuzzy random entropy risk values (%) No. H1 H2 H3 H4 H5 H6 H7 H8 Risk 0.0500 0.0420 0.0587 0.0935 0.0715 0.0778 0.0492 0.0753
We get a curve of this model’s efficient frontier as in Fig. 1. -3
8
x 10
7.5 7
Expected return
6.5 6 5.5 5 4.5 4 3.5 4
4.5
5
5.5 6 6.5 Fuzzy random entropy value
7
7.5 -4
x 10
Fig. 1. The mean-continuous fuzzy random entropy efficient frontier of sample securities
From the obtained efficient frontier in Fig. 1, we can see that when the investor’s expected return increases, the corresponding risk(fuzzy random entropy value) increases too. It is consistent with the Markowitz classical model, so our definition of the continuous fuzzy random entropy is effective.
5 Conclusions In this paper we consider that the security market not only in random environment but also in fuzzy environment, so we extend the classical portfolio selection model to a new model considering this more complex environment. We define the continuous fuzzy random entropy of the security as the portfolio risk, and propose a mean-continuous fuzzy random entropy model. This model is more interactive than those before, because the continuous fuzzy random entropy is more realistic than the discrete case. So using the continuous fuzzy random entropy to measure risk can be more appropriate than we define risk just use fuzzy entropy or random entropy.
450
Q. Sun et al.
Acknowledgements. This research was supported by the “Humanities and Social Sciences Research and Planning Fund of the Ministry of Education of China, No. x2lxY9180090”, “Natural Science Foundation of Guangdong Province, No. 2019A1515011038”, “Soft Science of Guangdong Province, and No. 2018A070712002, 2019A101002118”, and “Fundamental Research Funds for the Central Universities of China, No. x2lxC2180170”. The authors are highly grateful to the referees and editor in-chief for their very helpful comments.
References 1. Markowitz, H.: Portfolio selection. J. Financ. 7(1), 77–91 (1952) 2. Zhou, X.Y., Yin, G.: Markowitz’s mean-variance portfolio selection with regime switching: A continuous-time model. Siam J. Optim. 42, 1466–1482 (2003) 3. Choi, T.-M.: Sustainable management of mining operations with accidents: a mean-variance optimization model. Resour. Policy 46, 116–122 (2015) 4. Li, X., Qin, Z.F., Kar, S.: Mean-variance-skewness model for portfolio selection with fuzzy returns. Eur. J. Oper. Res. 202, 239–247 (2010) 5. Zhang, W.G., Liu, Y.J., Xu, W.J.: A new fuzzy programming approach for multi-period portfolio optimization with return demand and risk control. Fuzzy Sets Syst. 246, 107–126 (2014) 6. Liu, B.: Uncertainty theory, 2nd ed. Springer-Verlag (2007) 7. Shannon, C.E.: A mathematical theory of communication. Reprinted with Corrections from Bell Syst. Tech. J. 27, 379–423 (1948) 8. Zhou, R.X., Zhan, Y., Cai, R., Tong, G.Q.: A mean-variance hybrid-entropy model for portfolio selection with fuzzy returns. Entropy 17, 3319–3331 (2015) 9. Kwakernaak, H.K.: Fuzzy random variables-I. Inf. Sci. 15, 1–29 (1978) 10. Kwakernaak, H.K.: Fuzzy random variables-II. Inf. Sci. 17, 153–178 (1979) 11. Liu, Y.K., Liu, B.: Expected value operator of random fuzzy variable and random fuzzy expected value models. Int. J. Uncertain., Fuzziness Knowl.-Based Syst. 11, 195–215 (2003)
Restructure of Data Mining Based Delicacy Management Platform for College Students Weihong Chen(&) General Committee Office, Guilin University of Electronic Technology, Guilin 541004, Guangxi, China [email protected]
Abstract. Through integrating campus resources and remove data barriers, we can build a unified data management platform and overall behavior management platform for college students to mine, launder and analyze data that are previously scattered in multiple individual systems via the big data platform. While combining real-time online and offline data related to those students, the platform can analyze information about the study, life and work of students in campus from multiple dimensions, sketch out a profile for students based on their current conditions, and provide real-time targeted intervention and proper assistance for students who are experiencing huge mental ups and downs and dramatic changes in daily behavior data, so as to improve the efficiency of students’ daily management, enhance the maneuver capability of solving potential risks through in-advance intervention, and achieve delicacy management. Keywords: Data mining
College students Delicacy management
1 Introduction With the popularity of the mobile internet and the development of data mining and analysis technology, using the big data technology to conduct precise analysis for students has become an effective method for universities and colleges to enhance the scientificity and effectiveness of college student management. A data mining based delicacy management and service platform for college students can give full play to existing resources and enhance the efficiency of education and management. For a long time, most student management platforms within China Education and Research Network (CERNET) feature. NET2.0 structure and mainly operate on PCs. There are only a few mobile internet management platform based on the Laravel framework that achieve delicacy management of college students. Therefore, introducing advanced system architecture can, on the one hand, provide better user experience, and on the other hand, inject new vitality into student management platforms. This enables “delicacy management” of college students through better use of the mobile internet technology.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 451–454, 2021. https://doi.org/10.1007/978-3-030-51431-0_65
452
W. Chen
2 Contents of the Platform Based on big data of colleges and universities and technologies such as data mining and data analysis and through the use of intelligent algorithms and the full coverage of the campus wireless network, students can be fully connected to the campus wireless network, thus achieving “targeted education, targeted assistance, and targeted management” [1]. 2.1
Big Data-Based “Targeted Education” System
Based on the online and offline trajectories of students’ study, living and activities on campus, we can use intelligent algorithms to build a database for each student and use multiple “labels” to draw “user profiles” for them, making every student a unique individual. Such “labels” include “straight-A student”, “sport lover”, “ethnic minority”, “student from poverty-stricken family”, “science geek”, etc. Through those “labels”, we can sketch out a personal profile for each student, based on which the school’s new media center can push targeted academic classes, information and services to students via platforms such as WeChat, QQ, E-Class, and websites. In this way, such contents can be easily accepted and promote the effectiveness of information pushing and online ideological and political education [2]. 2.2
Big Data-Based “Targeted Assistance” System
Through deep mining and analysis of big data of schools over the past 20 years, the platform can establish a student development model and evaluation system, analyze and predict all students’ development trends according to their respective unique “profiles” and then conduct prejudgment, precaution and timely intervention for students’ behaviors, thus providing “targeted assistance” in terms of academic learning and vocational development. Based on analysis of students’ family backgrounds and daily consumption behaviors, it can provide “livelihood assistance” for students from poverty-stricken families and students who fall into livelihood difficulties due to unexpected incidents. As students are connected to the campus wireless network, the platform can track online activities of every student. If they browse specific websites such as “Blue Whale Challenge” and search specific keywords like “methods of suicide” on the internet, the platform can find such behaviors in time and take immediate action to intervene by providing “psychological assistance.” 2.3
Big Data-Based “Targeted Management” System
Management of daily affairs: Based on information related to teaching affairs, book lending, class attendance, consumption records of Campus E-Card, personnel information, access control records, and internet usage logs, the platform can build a comprehensive management system for daily affairs that maximally achieves automatic management using AI algorithms and frees teachers, students and other staff from repetitive routine work and endless paperwork [3].
Restructure of Data Mining Based Delicacy Management Platform
453
Management of special groups: The platform can locate and track trajectories of historical behaviors of special groups of people, including trajectories of campus behaviors, trajectories of internet behaviors [4], consumption information of Campus E-Card and shopping behaviors on campus, so as to facilitate the management of those special groups, indentify missing students, and track their whereabouts. The platform model is shown in the below Table 1: Table 1. Data mining based delicacy management platform for college students Big data-based “targeted education” system
Big data-based “targeted assistance” system
Big data-based “targeted management” system
Labeling of students
Academic learning assistance
Management of daily affairs
Profiling of students
Targeted content push
Livelihood assistance
Psychological assistance
Management of internet access behaviors
Management of special groups
3 Core Functions of the Platform 3.1
Designing “Customized” Content of Online Ideological and Political Education for Different Student
Traditional online ideological and political education is less targeted, with the same content for various audiences [5]. With the help of the big data technology, we can capture the preference of every student and then design customized online ideological and political education content according to his or her actual conditions. In this way, each audience can access totally different content on the website, thus achieving the goal of “customized” ideological and political education. Through devising “customized” plans, we can push targeted information to specific users to influence their way of thinking and values [6]. 3.2
Using Big Data Intelligent Analysis and Feedback to Achieve “Targeted Education.”
Based on big data collecting, analysis and mining, we can establish a quantitative model for the process and results of ideological and political education at colleges and universities [7]. Using scientific data mining and processing technologies, it can build a result evaluation system for ideological and political education, so as to free staff responsible for ideological and political education at colleges and universities from daily routine work and carry out “targeted education” [8]. 3.3
Prejudging the Thoughts and Behaviors of College Students to Achieve Informatization and Scientification of the Precaution Work
The online ideological and political education big data platform can conduct real-time monitoring, collecting, analysis and study of big data related to students, acquire
454
W. Chen
real-time data such as the ideological trends of students as quickly as possible and vividly reflect such trends with charts, data curves, videos and other forms, so as to predict college students’ thoughts and behaviors, provide scientific references for decision making by faculties responsible for student affairs at colleges and universities, and achieve informatization and scientification of the precaution work [9].
4 Conclusions The data mining based delicacy management platform for college students enables a transition from “point-to-surface” to “point-to-point” in college student management. Through the use of big data and intelligent algorithms and the establishment of relevant models and evaluation systems, the platform can analyze and predict possible problems students may face and their development directions, provide solutions and suggestions, and take precaution actions to prevent such problems from happening, thus achieving precise identification, targeted education, targeted assistance, and targeted management under the principle of delicacy management [10].
References 1. Magdin, M.: Personalization of student in course management systems on the basis using method of data mining. Turk. Online J. Educ. Technol. 14, 58–67 (2015) 2. Lin, S.H.: Data mining for student retention management. J. Comput. Sci. Coll.Es 27, 92–99 (2014) 3. Natek, S., Zwilling, M.: Student data mining solution-knowledge management system related to higher education institutions. Expert. Syst. Appl. 41, 6400–6407 (2014) 4. Viloria, A., López, J.R., Payares, K., Vargas-Mercado, C., Duran, S.E., Hernández-Palma, H., David, M.A.: Determinating student interactions in a virtual learning environment using data mining. Procedia Comput. Sci. 155, 587–592 (2019) 5. Meena, K., Jain, N.: A brief on spatial data mining. Engg J.S Publ. 10, 6 (2018) 6. Adekitan, A.I., Noma-Osaghae, E.: Data mining approach to predicting the performance of first year student in a university using the admission requirements. Educ. & Inf. Technol. 24 (2), 1527–1543 (2018). https://doi.org/10.1007/s10639-018-9839-7 7. Khan, A., Ghosh, S.K.: Data mining based analysis to explore the effect of teaching on student performance. Educ. & Inf. Technol. 23(4), 1677–1697 (2018). https://doi.org/10. 1007/s10639-017-9685-z 8. Yang, F., Li, F.W.B.: Study on student performance estimation, student progress analysis, and student potential prediction based on data mining. Comput. & Educ. 123, 97–108 (2018) 9. Gajewski, Ł.G., Choloniewski, J., Holyst, J.A.: Data mining models for student careers. Acta Phys. Pol., A. 129, 1071–1076 (2016) 10. Campagni, R., Merlini, D., Sprugnoli, R., Verri, M.C.: Data mining models for student careers. Expert. Syst. Appl. 42, 5508–5521 (2015)
Application and Development of Music Production Technology in the New Media Environment Wei Wang(&) College of Music of Jiamusi University, Jiamusi 154000, Heilongjiang, China [email protected]
Abstract. With the popularization of the information age, new media technologies are widely used, and the development of music production technology keeps pace with the times. As a university music teacher, we must study the research and development of music production technology in the new media environment. How to make better use of new media to improve the level of music production technology, and what are the latest applications of music production technology in new media, are all issues that current educators need to think about. Keywords: New media Computer technology
Music production Production technology
1 Introduction Music transmission is to better convey beauty and cultivate the soul. Computer information technology in the new media environment belongs to the communication and communication technology of the new era and has the greatest advantages [1]. Music production technology can no longer run alone, it needs to be skillfully combined with computer information technology to be effectively used in depth. In this way, the advantages can be exerted to the maximum, and the artistic mood and appeal of the music can be expressed in a more detailed and complete manner, resulting in a superimposed effect. In the new media environment, most of the music we hear is binary coding and technical processing of music using computer information technology.
2 Definition of Concept 2.1
New Media
New media is a new term and belongs to the product of the information age. As of now, no clear and fairly precise definition has been given. But new is always relative to the old, and the new media today will also become tomorrow’s old media. Therefore, it is impossible to give a very accurate definition. However, under normal circumstances, © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 455–460, 2021. https://doi.org/10.1007/978-3-030-51431-0_66
456
W. Wang
we generally think that except for newspapers, radios, televisions, and large outdoor media, the rest can be new media. 2.2
MIDI Production Technology
MIDI production technology is generally a digital port for musical instruments. It is not an accurate interface, but a protocol and standard [2]. Since the 1980s, China has started to develop and develop standards for such electronic synthesizers. Under normal circumstances, we define the simplest MIDI system, including input devices and output devices. The signal we receive is sent to the input device, and after processing the MIDI, it is sent to the output device, and the output device triggers the sound. This is how it works. With the development of MIDI production technology, with the strong support of computer technology, people began to combine computer and MIDI technology, which greatly improved work efficiency and expanded MIDI functions [3]. 2.3
Connection Between New Media and Computer Music Production Technology
Music can be seen everywhere, because it is an essential element of daily life, always accompanying and regulating our lives. New media is the best means of transmitting music, but new media has certain requirements for music information. First: Audio information must be digital, otherwise it will be difficult to spread outwards. Second: the audio quality is high. Computer music technology solves technical problems well. As long as its digital audio is kept, no matter how much the information carrier is, as long as it is stored by the server, it can be started at any time, and it has quality assurance. This does not need to erase or weaken the tape. In addition, digital audio uses binary code, which is recognized by the computer, so the resulting file is compatible with smooth playback on any computer [4]. Therefore, computer music production technology is indispensable for new media. Computer music production technology is playing a huge role in the new media era.
3 Application of Music Production Technology in the New Media Environment 3.1
Application and Development of MIDI Production Technology
MIDI is a new type of music production technology developed rapidly in the new media environment. This technology has obvious advantages: first, it can effectively reduce the cost of music production; second, it can reduce the time of music production; third, it is a very convenient music production technology [5]. At the same time, MIDI production technology not only has a simple operating system, but also a highly analogue simulation system. In the process of music production and editing, it has continuously demonstrated its advantages. The producer can easily and comprehensively grasp the entire production process, from the production feeling of the music, to the control sound of the music, to the editing, modification and playback of the
Application and Development of Music Production Technology
457
music, etc., which can make the producer easily and efficiently. What’s more, this technique has effects beyond the imagination of the producer. Using MIDI production technology, the produced music can have a good mood and fully demonstrate the simulation effect. Of course, music producers can use their imagination and creativity to be creative. In addition, this technical device also has good instrument sound simulation software. For example: we are going to make a theme music for a birthday party. A violin accompaniment is needed in the background production, but the music producer does not need to actually play the violin during the production process. The violin simulation software will emit the corresponding sound, which is also exquisite and vivid. So we can be proud to say that MIDI production technology really belongs to the new era of effective music production technology [6]. It is convenient, efficient and high-quality to complete the music production process, bringing more joy and joy to our daily lives. However, we are more convinced that with the continuous development of information technology, human beings will develop more intelligent and humanized good music production technologies to meet human life needs. As long as there is a need in life, the human brain will continue to operate and develop more advanced equipment and software, and the information age is rapidly entering people’s lives. 3.2
Application and Development of Digital Audio Technology
Digital audio technology is encoding and processing technology. It uses computer information technology to perform binary encoding and processing of music. This production technology has significant advantages in music audio processing, mainly in information preservation, retrieval functions, and audio information, all playing a very important role. For example, radio programs and QQ, WeChat, Weibo and other forms that are closely related to our lives have been widely used in this technology. It can be seen that the use and development of digital audio technology is getting faster and faster, and it is continuously applied to all aspects of life, and it is playing a huge role.
4 Analysis of the Development of Music Production Technology in the New Media Environment Improving the technology of music production is one of the goals of continuous exploration and development of college music education and teaching. The development of the level of music production technology in the new era also directly shows the level of music higher education in China [7]. Then, the development of music production technology in the new media environment is mainly reflected in the following three aspects. 4.1
Development of Music Production Technology in China’s Music Education Circle
Music is an expression of culture and art. New media is the development of electronic information technology in the new era, and it is also the main medium for transmitting
458
W. Wang
information to society. Therefore, new media continue to convey various types of music information. In the new media environment, there is also a certain demand for music production technology. Audio information is generally digital information. If not, it will be difficult to achieve rapid spread through channels such as networks or satellites [8]. In addition to the traditional media field, computers and music production technology are closely integrated and have been widely used in new media fields such as digital broadcasting, mobile TV, online media, mobile media, and digital movies. Moreover, to this day, the use of Internet users in China has greatly exceeded 1.133 billion people. Such a huge use of space and quantity will definitely bring greater and better spread of music production technology. Therefore, the improvement of music production technology is very necessary and meaningful in the development of China’s music education industry. The development of music production technology in China has a considerable history. The earliest to say about the reform and opening up, that is, the early 1980s, when the college entrance examination was just resumed, only a small number of people in China were making music. At that time, everyone followed the traditional love of music and wrote every bit of daily life into songs. But soon the application and transfer of computer technology brought many music lovers into a new field. Especially with the advent of the Internet age, many young people are beginning to look for their own feelings and express their musical perceptions [9]. As a result, more music production technicians are constantly emerging. Even grass-roots musicians who don’t have much attention, they can spend less investment and use simple production techniques to spread a good and beautiful song to everyone’s life. For example, Daolang, which we are more familiar with, originally used only about 10,000 yuan to write and sing, and made his own music album, but he spread his voice to the north and south. This has won the favor of domestic netizens, and thus has obtained higher economic benefits for themselves. At the same time, because of the continuous maturity and development of this music production technology, the outstanding music producers have been presented to the entertainment industry, and even become stars in the public vision, which has also achieved the star dream of many people. 4.2
Cultivation and Education of Music Production Talents in China
With the popularization of higher education and the continuous improvement of music production technology, China attaches more importance to the education of music production talents. First of all, domestic higher education institutions, especially colleges of music schools, are constantly enrolling more musical students. In 2019, there are 8.34 million college graduates in China, and the number of music graduates has also broken a new high. The graduation of these college music production talents is of great benefit to the improvement of China’s music production technology and has also brought new achievements. Secondly, China’s realization of the Chinese dream requires continuous improvement of the level of music production. Music is the voice of a nation and a country, and it is also a true portrayal of cultural and entertainment life. With China’s continuous modernization, the national economy has steadily improved, and people’s living standards have risen sharply, putting forward better requirements for China’s music production technology. In fact, computer music
Application and Development of Music Production Technology
459
production is an important part of many fields such as film, music, and recording. The process of computer music production and recording has also experienced a fairly long development process in China. Due to the slow start of computer music technology in China, most software development is obtained from foreign music software development companies. Therefore, China’s hardware facilities are steadily progressing, and they are constantly moving to the forefront of the world. The most important thing is that China’s highly sophisticated talents in music production technology have become the biggest bottleneck in the development of music production technology. Due to special historical reasons, historical talents are out of stock, and China’s overall scientific research capacity is not strong enough. However, we believe that with the development in China today, more professionals with high professional quality, strong innovation ability and strong scientific research ability are constantly emerging. 4.3
Music Production Technology Has a Good Impact on New Media Art
New media art means that under the development of digital multimedia and the application of Internet technology, from the production to the dissemination, from appreciation to criticism, a variety of artistic behaviors have undergone tremendous changes [10]. With its unique sound and picture effects, music production technology constantly enters the public’s horizons and fills the fun of modern people’s lives. For example, in the 3D Museum of Art, the music features of living alone provide a realistic and realistic experience. This allows people to have an immersive feeling in a flat scene and truly achieve the perfect fusion of art. In the game space, the huge contrast of music production technology allows people to truly travel through ancient scenes and enhance their sense of accomplishment through the success of fighting. In short, with the continuous updating of information technology and the continuous improvement of music production technology, more and more people feel the changes in real life. In addition to the convenience of obtaining information, it is more beautiful and harmonious that computer music production technology brings to human life. We have truly discovered the many joys that music production technology brings to us. In the new media era, new media technologies continue to be applied in various fields, especially music production technology, from online and offline song singing, to mobile phone ringtone applications, to music editing and publishing, all have the function of music production technology. Music comes from life, there is music in life, and information technology is needed in life. Only when the artist constantly explores the beauty in life and composes the harmony and harmony in real life into vocal music, will we appreciate more outstanding art works. It is believed that with the joint efforts of all, this wonderful wish is being realized soon.
References 1. Wang, Y.: Significance of cultivating college students’ music literacy under the background of new media art. China New Telecommun. 21(12), 189 (2019) 2. Ning, Z.: Research on the application of computer music production technology in the new media environment. Microcontrollers Embed. Syst. 19(9), 26–29 (2019)
460
W. Wang
3. Feng, L.: Music “Landscape” in the Visual Culture Era. Nanjing University of the Arts (2019) 4. Lou, D.: Research on User’s Digital Music Information Acquisition Behavior. Huazhong Normal University (2019) 5. Zheng, Y.: Interactive Research on Virtual Technology and Art in New Media Environment. Northeast Dianli University (2019) 6. Wang, Q.: Research on Film and Television Music Transmission in New Media Environment. Hebei University (2019) 7. Li, L.: Research on Dynamic Poster Layout Design in New Media Environment. North China University of Technology (2019) 8. Cheng, H.: Research on Polymorphic Logo Design in New Media Environment. East China University of Science and Technology (2019) 9. Wu, C.: Research on Micro Video Production and Application of Ideological and Political Theory Course in Colleges and Universities. Hefei University of Technology (2019) 10. Li, J.: Research on the Theme Education Innovation of College Students in the Era of New Media. Northeast Normal University (2019)
Clothing Display Method Based on VR Technology HuiJuan Lai1,2(&) and Sungwon Lee2 1
2
School of Fashion Engineering, Jiangxi Institute of Fashion Technology, Nanchang 330000, Jiangxi, China [email protected] Department of Art & Design, Dong-Eui University, Busan 47340, Korea
Abstract. Clothing display is a kind of merchandise display. Good clothing display effect will attract customers’ interest. Traditional physical clothing display has problems such as high cost and easy damage, and once it is not handled properly, it is likely to leave a negative impact on customers. In view of the above problems, this paper proposes a research on clothing display methods based on VR technology. First create a 3D model of the clothing, then render the scene and map the stripes. In terms of model construction for clothing display, it is realized through MultiGen Creator. According to a survey of users, it is found that the scores of users in sensory experience, interactive experience, emotional experience, and cognitive experience all exceed 85 points, indicating that the method proposed in this article has significant effects. Keywords: Clothing display rendering
VR technology 3D modeling Scene
1 Introduction There is cruel competition in the field of clothing sales, and people attach great importance to clothing display design [1]. Clothing display is a creative conscious activity. A series of design elements include purposeful and organized scientific product planning, display windows, lighting, channels, models, colors, shelves, music and posters, conveying the essence and spirit of goods and brands to the audience [2]. Good clothing display methods can attract customers’ attention and let customers come to see the displayed clothing. In addition, a good display method can also highlight the advantages of the brand and increase the added value of the product [3]. Clothing display is a branch of commodity display and part of clothing display. Because of the series of benefits brought by clothing display, many people have conducted research. In [4], in order to meet the needs of personalized clothing customization, the author proposes interactive clothing design and personalized virtual display with the user’s own face. Customers can rearrange clothing style elements, choose available colors, fabrics, and come up with their own personalized suit style. In [5], the author puts forward the Unity 3D-based personalized clothing Web 3D virtual display technology to perform personalized clothing visualization operations. In [6], the author proposed a method of digitally displaying clothing, displaying it © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 461–466, 2021. https://doi.org/10.1007/978-3-030-51431-0_67
462
H. Lai and S. Lee
dynamically on clothing, and interacting with digital media to achieve the purpose of expression. Although the above studies have achieved certain results, they are still insufficient. With the improvement of living standards, people now pay more and more attention to the shopping experience. Sellers must work hard to display the best aspects of clothing to customers. In addition, if it is presented in kind, it is likely to cause damage, so it is a consensus to use a virtual method without losing actual results to display clothing. Virtual reality technology, that is, VR technology, is based on the existing computer technology to reproduce the scene in a virtualized manner. The emergence of this technology can bring close to real experience for the experiencer. VR technology has applications in many fields and has yielded fruitful results. In [7], the author applied VR technology to the cognitive training of stroke patients. With the intervention of virtual reality-based games, the memory and attention functions were improved. In [8], the author applied VR technology to surgical training simulation, and both doctors and patients can benefit from this new technology. In [9], the author applied VR technology to technical training in the mining industry and played a significant role in mine safety training. In [10], the author applied VR technology to museum exhibitions, bringing users an immersive experience. In summary, VR technology brings users an immersive feeling in the actual process, and the user experience is excellent. Therefore, consider the research on the application of VR technology to clothing display methods. Aiming at the problems of high cost and poor user experience of traditional clothing display methods, this article proposes a clothing display method based on VR technology, in order to provide a reference for related work.
2 Method 2.1
Features of Virtual Reality Technology
VR technology involves many disciplines, and it is an important reflection of interdisciplinarity. The disciplines covered include multimedia technology, graphics, electronic technology and even psychology. In the computer field, the three most typical characteristics of virtual reality currently recognized are: Immersion, Interaction, and Imagination. (1) Immersion The emergence of VR technology is to solve the shortage of people’s experience. Many times, people can’t go to a place in person or can’t touch it up close in front of an object for various reasons. At this time, the actual environment is reproduced through VR technology, so that with the help of external devices, users can experience the experience close to the real environment, including pictures, sounds, and even odors. This experience is strongly immersive. (2) Interaction At present, the created machine is unsatisfactory in terms of interactivity. The machine can only display pictures for customers to browse, but it cannot achieve the
Clothing Display Method Based on VR Technology
463
effect of man and machine communicating back and forth. The emergence of VR technology has improved the interactivity of traditional products and effectively improved the human-computer interaction. The interactivity of this technology is the bridge between its optimized device and user emotion. (3) Imagination The audience will be immersed in the virtual system, and the brain will process the information of the virtual scene and extract new knowledge, thereby improving the audience’s perception of it. Imagination can spur audiences to make new connections with products, which can then inspire and further change the way people think. 2.2
Three-Dimensional Geometric Modeling of Clothing Display
To build a 3D model of clothing, you need to extract the shape features of the clothing. The calculation formula is as follows: CðiÞ ¼
i X j¼0
pi ðjÞ ¼
i X ni j¼0
n
;
i 2 0; 1 ; ; L 1
ð1Þ
In the above formula, L represents the total length of the display area distribution outline. After obtaining the relevant features, the clothing imaging pairing is completed to show a high level of graphic effects, so as to achieve the matching of clothing style, color and graphic style, and the multi-level detail LOD of the clothing display is constructed by faceted cutting. The judgment of color matching based on the attribute value is as follows: _
f ðx; yÞ ¼
8 > < gðx; yÞ 1;
_
gðx; yÞ f Lee ðx; yÞ t _
gðx; yÞ þ 1; gðx; yÞ f Lee ðx; yÞ\t > : gðx; yÞ; else
ð2Þ
Based on the optical VR imaging rendering, Dirac decomposition (the decomposition is regular) is performed to obtain the scale information parameter N1 of the threedimensional geometric modeling of the display of the clothing display: Nl ¼
1; l ¼ 0; L 2p D2 sin g=ltriangle ;
l ¼ 1; ; L 1
ð3Þ
In the above formula, ltriangle ¼ p D=2L represents the holographic projection pixel value; in the clothing display section, the adjustment of the reconstruction error is determined by the weight coefficient, and then the view of the clothing display is reproduced.
464
2.3
H. Lai and S. Lee
VR Modeling for Clothing Display
After the three-dimensional geometric modeling of the clothing display, the visual rendering of the clothing display is performed. The process is divided into the following three phases: (1) Application stage. At this stage, the high-level professional modeling tool MultiGen Creator is used to build a solid model for home display. The color feature information and color matching information are loaded into the application layer of the VR simulation system to realize the rendering of clothing color distribution. (2) Elimination phase. In the culling stage, the unreasonable color information boundary volume and pixels in the clothing display are reasonably eliminated, the viewpoints and visual effects of the distributed scene are better, and the hierarchical structure is simplified. (3) Drawing stage. Finally, a color rendering of the 3D modeling is performed and a 3D geometric model of the home display is generated using the visual database. Establish a logical screening program and build a list of drawing priorities. Virtual environment design based on lighting effects and clothing material effects.
3 Experiment The clothing display method based on VR technology mentioned in this article is researched on 3DStudio MAX platform. By establishing a three-dimensional geometric model of clothing display and rendering the scene, and then performing texture mapping. Later, MultiGen Creator was used to build a solid model of the clothing display distribution, and the face type was selected in Face Tools. The selected materials are assigned to the model through the Insert Materials tool, and the 3D geometric modeling processing algorithm for clothing display is used to realize the display design.
4 Results Result 1: Fashion display design model based on VR technology In order to achieve the optimized effect of clothing display, VR technology is used for visual design. The clothing display design model based on VR technology is shown in Fig. 1. The clothing display design model based on VR technology proposed in this paper mainly includes color feature analysis, three-dimensional modeling, and optical information tracking. The analysis of color characteristics is mainly the analysis of the color of the wall around the clothing display site, the angle of light, and the color of the clothing itself. Light and shadow effects are mainly ray tracing, image modeling, and real-time rendering operations. It is worth mentioning that 3D modeling is based on visual analysis and image processing software, and uses software packages such as SoftImage, 3DStudio MAX, and LightWave 3D computer software. Through image
Clothing Display Method Based on VR Technology
Wall Lighting
465
SoftImage Color analysis
VR model of clothing display
3D model
Clothing
Creator LightWave3D
Light and shadow effect
Ray tracing
Graphical modeling
Real-time rendering
Fig. 1. Model of clothing display design based on VR technology
processing and computer vision simulation analysis, the clothing material effects, realistic ray tracing effects and color matching effects displayed on the clothing are reproduced. Result 2: Customer experience In order to verify the effectiveness of the VR-based clothing display method proposed in this paper, a questionnaire survey was conducted on user experience. The survey includes user sensory experience, interactive experience, emotional experience and cognitive experience. Users score from the above 4 aspects, and the maximum score for each item is 100 points. The analysis and processing of 150 recovered questionnaires shows the average score of each content shown in Fig. 2.
Fig. 2. Customer experience
As can be seen from Fig. 2, the VR-based clothing display method proposed in this article has been widely praised by users. Users scored 91, 86, 88, and 92 on sensory experience, interactive experience, emotional experience, and cognitive experience, all
466
H. Lai and S. Lee
of which scored more than 85 points. This result shows that the method proposed in this paper can help improve the user experience. Of course, not getting a higher score indicates that there is still room for improvement, which will also be the direction of efforts in subsequent work.
5 Conclusion Traditional clothing display costs are high, and it is not easy to keep it, and it will be damaged once it is not focused. VR-based clothing display methods can better circumvent these shortcomings. This article uses VR technology to realize clothing display, which can bring a new experience to the audience in sensory, interaction, emotion and cognition to the maximum. Of course, the experience in touch and other aspects needs to be further improved in subsequent work. Acknowledgements. 1. This work was supported by Research on Intelligent Clothing for Children’s Positioning and Safety GJJ191073 General Science and technology project of Jiangxi Provincials Department of Education Principal Huijuan Lai. 2. This work was supported by The practice and research of VR - based immersive teaching method - taking fashion display design course as an example JFJG-18-33 Jiangxi institute of fashion education reform project. Huijuan Lai.
References 1. Gao, G., Zhu, J., Gu, F.: Customer perception service quality evaluation system and model in clothing stores. J. Text.E Res. 38(6), 136–142 (2017) 2. Yu, Z.: The use of music in costume performing arts—concurrently discussing the costumes of 56 Chinese national songs. Dye. Finish. Technol. 40(1), 96–97 (2018) 3. Cai, J., Ma, D.: Optimization design of clothing market questionnaire based on cognitive research. Wool Text.E J. 46(8), 65–69 (2018) 4. Zhu, X.J., Lu, H., Rätsch, M.: An interactive clothing design and personalized virtual display system. Multimed. Tools Appl. 77(20), 27163–27179 (2018) 5. Zhu, X.J., Wu, X., Shi, X., Xu, B.G.: Framework of personalized clothing visualization. Int. J. Cloth. Sci. Technol. 29(3), 417–426 (2017) 6. Mackey, A., Wakkary, R., Wensveen, S., Tomico, O.: “Can I wear this?” Blending clothing and digital expression by wearing dynamic fabric. Int. J. Des. 11(3), 51 (2017) 7. Gamito, P., Oliveira, J., Coelho, C., Morais, D., Lopes, P., Pacheco, J., Barata, A.F.: Cognitive training on stroke patients via virtual reality-based serious games. Disabil. Rehabil. 39(4), 385–388 (2017) 8. Li, L., Yu, F., Shi, D., Shi, J., Tian, Z., Yang, J., Jiang, Q.: Application of virtual reality technology in clinical medicine. Am. J. Transl. Res. 9(9), 3867 (2017) 9. Zhang, H.: Head-mounted display-based intuitive virtual reality training system for the mining industry. Int. J. Min. Sci. Technol. 27(4), 717–722 (2017) 10. Lyu, P., Yang, P.F., Li, X.: Virtual museum interaction design research based on VR technology. Packag. Eng. (24), 30 (2017)
Text Classification Model for Public Opinion Management in Colleges and Universities Based on Improved CNN Wenliang Luo and Jiaqiong Gao(&) Sichuan Vocational and Technical College, SCVTC, Suining, China [email protected], [email protected]
Abstract. In recent years, the incidence of online public opinion in universities has been high. Monitoring, forecasting and responding to public opinion in colleges and universities have increasingly become the work that education management departments at all levels and universities attach great importance to. The purpose of this article is to build a network public opinion management text classification model based on a convolutional neural network, mainly by analyzing its internal mechanisms and models in an attempt to find new laws of public opinion generation and dissemination. The main methods used in this paper are three-layer Bayesian model and convolutional neural network on LDA text, and describe the text classification process. The experiments used are mainly through the existing Weibo review data in the public data set as training and verification data and the Weibo data crawled in real time in the web version of Weibo as raw data. Finally, the data is preprocessed to sort out the text review information. After analyzing the data, it is concluded that the LDA + improved TextCNN model proposed in this paper is improved overall than the original TextCNN model, and the LDA + improved TextCNN model in food has decreased compared with the TextCNN model. Keywords: University public opinion opinion management Social network
Communication model Public
1 Introduction As an important part of online public opinion, online public opinion in colleges and universities refers to the sum total of the public’s open, consistent, authoritative and tendential-based beliefs, attitudes, opinions and emotional expressions on various phenomena in the real society that can have an impact on the process through the Internet of teachers and students in colleges and universities. The rapid development of Internet technology has made social platforms such as Weibo and WeChat the main way for people to communicate. More and more accumulated text data contains a lot of important information [1, 2]. The classification and mining of this information are of great significance to search engines, automatic question answering, sentiment analysis and public opinion analysis. Text classification using traditional text classification models such as the bag of words model and vector © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 467–472, 2021. https://doi.org/10.1007/978-3-030-51431-0_68
468
W. Luo and J. Gao
space model not only loses important word order information, but also has the problems of sparse features and dimensional disasters [3, 4]. In recent years, deep learning has realized high-level semantic abstraction of features through deep neural networks, which has been outstanding in image recognition and speech recognition [5–7]. Many scholars have tried to use deep neural networks in natural language processing. The CNN-based text representation model focuses on the extraction of key information in the text by designing multiple convolution kernels of different sizes [8]. The LDA-based text representation model is a word vector model that integrates topic features. Both have their own characteristics. This article uses a combination of both. First use CNN and LDA to learn in Wikipedia to get the word vector, and then input it as a two-channel data to the convolutional neural network for text classification training. Experiments show that the method has obvious classification effect compared with traditional methods improve.
2 Method Convolutional neural networks can extract key information from text by designing convolution kernels of different sizes. The input layer is a word vector matrix of text that has been filtered by LDA and then processed by word2vec. Assuming that the length of the input sentence is n, the dimension of the word vector is d, and the size of the word vector matrix is n d. In this paper, a convolution kernel based on CNN and a matrix obtained by concatenating a topic word vector based on LDA are used as twochannel input networks [9, 10]. The convolutional layer uses several learnable convolution kernels and word vector matrices to convolve. It can design convolution kernels with the same width and word vector dimensions and height changes, and perform convolution operations in the direction of the word sequence. The general form is shown in Formula (1): X yi ¼ gð ðxi kij þ bj ÞÞ ð1Þ i2D
In the formula, yi represents the j-th feature data obtained through the convolution layer, g() is the activation function, xi represents the ith input data in the set D of input data, and kij represents the ith input in the convolution layer The feature data corresponds to the convolution kernel weight of the j-th output feature data, and b is the offset. The maximum pooling layer is the maximum sampling operation on the features output by the convolutional layer to extract the largest features. The last layer is a fully connected layer that connects all the extracted features together and outputs the probability of each category through the So ftmax function. The standard TextCNN sets the length of the filter of the one-dimensional convolution window to a fixed value during the convolution process. This will result in the inability to make adjustments to specific target text characteristics when analyzing the text. This paper proposes an algorithm for designing filters with different lengths of one-dimensional convolution windows to obtain more effective information based on
Text Classification Model for Public Opinion Management
469
the study of the characteristics of college public opinion texts. The specific algorithm is as follows: (1) Set the gradient of the length of the filter to high and low levels. Their values are: k=4 and k. Since the length must be an integer, the k=4 needs to be rounded. (2) The entire text sequence w1:n ¼ ðw1 ; w2 ; w3 ; . . .; wi ; . . .wn Þ is divided into 4 parts, which are respectively expressed as: Wn0 : Wn1 , Wn1 : Wn2 , Wn2 : Wn3 , Wn3 : Wn4 , among which n0 ¼ 0; n1 ¼ n=4; n2 ¼ 2 n=4; n3 ¼ 3 n=4; n4 ¼ n, and also n=4 needs to do the rounding operation. (3) Since the core meaning of the text is mainly concentrated in the first and last words of the text, the length of the k=4 filter is used for the divided text sequences 1,4 regions, and k is used as the filter length for the 2,3 regions. This completes the improvement of the filter window length.
3 Experiment The data sources are divided into two categories: one is the existing Weibo review data in the public data set as training and verification data; the other is the Weibo data crawled in real time from the web version of Weibo as test data. The current Weibo comment data volume is 18000, and the real-time crawled Weibo data volume is 86. Both data are stored in the Excel table in CSV format. The data preprocessing phase is divided into data cleaning and text word vectorization: Data cleaning refers to the basic processing of the original data to meet the requirements of data analysis. The data cleaning in this example includes deleting duplicate data, removing data with empty comment information, Remove the html code left by the crawler, remove the emoticons and emoticons appearing in the comment information, etc., to ensure the reliability of the text information. The LDA topic model is used to classify existing topics into potential vocabularies, and then the original text information is filtered. Then the word vectors are concatenated to obtain the text matrix. Finally, it is input to the convolutional neural network training network. The sampling is Gibbs sampling, the number of iterations is 1500, a = 0.1, b = 0.2, and the perplexity value is used to measure the training effect. The test process is similar to the training process, except that the test text is finally classified through the trained network.
4 Discussion 4.1
Experimental Evaluation Index
Common evaluation criteria for classification tasks are accuracy, recall, and Fl score. Table 1 is the classifier confusion matrix, TP indicates the number of samples that are actually positive and expected to be positive; FN indicates the number of samples that are actually positive and expected to be negative; FP indicates the number of samples that are actually negative and expected to be positive Number of samples; TN
470
W. Luo and J. Gao
represents the number of samples that are actually negative and expected to be negative. Accuracy refers to the ratio between the number of correctly classified samples and the number of all classified samples in the classification result. Table 1. Classification confusion matrix Positive prediction Counter example Actual positive example TP FN Actual counter example FP TN
4.2
Classification Experiment and Result Analysis
The classification experiments on Weibo data were performed using LDA + improved TextCNN model and TextCNN model to verify the effectiveness of the convolution operation of the input two-channel word vectors proposed in this paper. Both the LDA + improved TextCNN model and the TextCNN model use the CNN classifier for text classification, but the text representation is different. The former only enters two kinds of word vector data, and the latter enters a word vector into the network. Figure 1 is the comparison result of the microblog text classification experiment score value. From Fig. 1, it can be seen that the deep learning convolutional neural network relatively better implements text feature mining, and can show the effectiveness of the convolutional neural network in text classification Sex. Among the above seven experimental targets, most of them are LDA + improved Text CNN model, which performs better than Text CNN model. In the experimental target food, Text CNN model is relatively better than LDA + improved Text CNN model. In general, the use of the LDA + text CNN model proposed in this article is enhanced on the original basis, which shows that the word vector model combined with LDA can better represent word information from different perspectives such as semantics and topic, which is important for classification The significance is a good illustration of the effectiveness of the LDA-based text representation classification on the convolutional neural network model. The text classification model based on the improved convolutional neural network performs better in short text classification on Weibo than the original text classification model of convolutional neural networks. Based on the Text CNN convolutional neural network, it designs multiple convolution kernels of different sizes to achieve the extraction of key information in the text and the LDA-based topic vector model can be integrated into the features of the text topic. This paper proposes to input both into the convolution at the same time Neural network for learning. It can be seen from the experimental results that the model proposed in this paper performs relatively better on the short text classification problem of Weibo. However, there are some shortcomings in the method in this paper. In the data obtained at the end of the experiment, the LDA + improved TextCNN model in food is lower than the original TextCNN model.
Text Classification Model for Public Opinion Management
471
0.96 0.94 0.92 0.9 0.88 0.86 0.84 0.82 0.8 0.78
Surroundings
Physical education
Food
TextCNN
Motion
Medical
Economic
Education
LDA + Improved TextCNN
Fig. 1. Comparison of scoring values for Weibo text classification experiments
5 Conclusion Convolutional neural networks are known for their ability to fit arbitrary correspondences. Although various networks are still immature, research on network structure and performance is still ongoing. I believe that the development of deep learning in the future can solve more problems for society. complicated question. The main methods used in this paper are three-layer Bayesian model and convolutional neural network on LDA text, and describe the text classification process. The experiments used are mainly through the existing Weibo review data in the public data set as training and verification data and the Weibo data crawled in real time in the web version of Weibo as raw data. Finally, the data is preprocessed to sort out the text review information. After analyzing the data, it is concluded that the LDA + improved TextCNN model proposed in this paper is improved overall than the original TextCNN model, and the LDA + improved TextCNN model in motion is reduced compared to the TextCNN model.
References 1. Wang, Y., Zhou, T., Lu, H.: Computer aided diagnosis model for lung tumor based on ensemble convolutional neural network. Sheng wu yi xue gong cheng xue za zhi = J. Biomed. Eng. = Shengwu yixue gongchengxue zazhi 34(4), 543–551 (2017) 2. Wang, W., Zhao, M., Wang, J.: Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J. Ambient Intell. Hum. Comput. 1, 1–9 (2018) 3. Long, A., Bi, X., Zhang, S.: An arbitrage strategy model for ferrous metal futures based on LSTM neural network. J. Univ. Sci. Technol. Chin. 48(2), 125–132 (2018)
472
W. Luo and J. Gao
4. Alam, A.G., Rahman, H., Kim, J.-K.: Uncertainties in neural network model based on carbon dioxide concentration for occupancy estimation. J. Mech. Sci. Technol. 31(5), 2573– 2580 (2017) 5. Chen, X., Wang, H.H., Tian, B.: Visualization model of big data based on self-organizing feature map neural network and graphic theory for smart cities. Cluster Comput. (2), 1–13 (2018) 6. Yao, Z., Jiang, Y., Han, P.: Traffic flow prediction model based on neural network in small time granularity. J. Transp. Syst. Eng. Inf. Technol. 17(1), 67–73 (2017) 7. Lin, G., Wang, B., Peng, H.: Identification of icing thickness of transmission line based on strongly generalized convolutional neural network. Proc. CSEE 38(11), 3393–3401 (2018) 8. Yang, X., Liu, H., Peng, Y.: Enhanced perceptual psychopathology correlation mechanism model based on rough set and neural network. Cluster Comput. 1, 1–7 (2018) 9. Liu, L., Cheng, X., Lai, J.: Segmentation method for cotton canopy image based on improved fully convolutional network model. Trans. Chin. Soc. Agr. Eng. 34(12), 193–201 (2018) 10. Sun, K., Li, Q., Li, D.: Face detection algorithm based on cascaded convolutional neural network. J. Nanjing Univ. Sci. Technol. 42(1), 40–47 (2018)
Comprehensive Teaching Mode Based on Blockchain Qiang Huang, Xingjing Mao, Mantao Wang(&), and Xinhui Feng School of Information Engineering, Sichuan Agricultural University, Yaan 625000, Sichuan, China [email protected]
Abstract. This article starts from the study of traditional education models and finds that there are significant disadvantages in grade management system. In order to achieve efficient management of grade and the objectivity of performance sources, this article introduces the idea of “blockchain + education” and explores new teaching modes based on the characteristics of the blockchain. The teaching system can realize new features such as scores that cannot be tampered with, real names, and diversity, so that students’ results no longer come from a single scoring standard, and further improve the quality of education and teaching. Keywords: Multimodal informatics in education “Blockchain +” management Information security Teaching system
Grade
1 Introduction For a long time, classroom teaching has always been the most important part of students’ knowledge acquisition, and teachers are the direct source of student performance. As the center of student learning and performance, the classroom and teacher have become a default educational teaching system mechanism [1]. However, whether it is in classroom teaching or student performance and other modules, there are obviously many areas that need improvement. In the context of the new era of information technology, the change of simple teaching models does not substantially give students a better learning experience [2]. After deep analysis, we will find that today’s classroom teaching must be associated with new technologies. In terms of specific applications, most of the ideas are similar, focusing on providing authentication and learning records, and sharing teaching resources. For example, Lu Yuxuan summarized the four major aspects of the potential of blockchain in the education field, namely digital certificates, teaching platforms, educational records, and intellectual property rights [3]. It can be seen that blockchain is indeed feasible and has great advantages for education. But after the above analysis, it is not difficult to find that more or less we will ignore the student achievement module, but it is an important part of teaching. This paper studies the transformation of the teaching model in recent years and proposes a new comprehensive teaching model of “blockchain + education”, hoping to © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 473–478, 2021. https://doi.org/10.1007/978-3-030-51431-0_69
474
Q. Huang et al.
effectively solve the practical problems in classroom teaching and student achievement modules, break the traditional centralized structure, and set multiple scores According to the source and the curriculum platform, MOOC platform, and PTA, a teaching class representative team is set up to manage and score each section, and the score is finally uploaded to the blockchain.
2 Traditional Teaching Model For a long time, the overall teaching model has been centered on the teacher, and the teacher directly grades the students according to the grading standards [3]. The traditional teaching model is shown in Fig. 1.
Fig. 1. Traditional teaching model
In this teaching mode, the teacher is the absolute leader of a course. This teaching mode is simple and pure, but there are inevitably many problems. These include: the student’s performance cannot be a more comprehensive test of the student’s practical ability to practice; [4] the subject representative is only responsible for simple records, which inevitably leads to “fraud”; teachers can not take care of each classmate, and the scores tend to be one-sided.
3 “Online + Offline” Teaching Mode With the advancement of the times and technology, various technologies represented by the Internet continue to penetrate into the teaching process and education management. In recent years, various “online + offline” teaching models have been born.
Comprehensive Teaching Mode Based on Blockchain
475
“Online + Offline” teaching mode is shown in Fig. 2.
Fig. 2. Overall structure of “online + offline” teaching mode
Currently, the grade management system used by colleges and universities mostly adopts the B / S structure. Such a system has the characteristics of centralization. The management authority of the database is concentrated in the hands of a small number of administrators, while ordinary users have only access rights [5]. There may even be extreme cases. When the grades have been submitted, the students apply to the teacher to modify the grades in an improper way. This is a very unfair behavior for other students, and it will cause bad school style influences [6]. It can be seen that the disadvantages of the traditional teaching model also exist under this structure, and the objective and fairness of student performance has always been controversial.
4 New Teaching Mode Based on Blockchain Technology To solve the above problems, we should start from the source, change the teaching model, and lead the improvement of the overall education and teaching quality. With potential security threats, there are also some extreme situations. The blockchain has
476
Q. Huang et al.
the characteristics of being distributed, decentralized, and safe and reliable [7]. As a result, a new and safer teaching mode based on blockchain technology came into being. The new teaching mode based on blockchain technology is shown in Fig. 3:
Fig. 3. Comprehensive new curriculum system based on blockchain
From the figure above, the comprehensive new curriculum system based on blockchain can be divided into the following major sections. First of all, there are six major grades for each student’s grades. The source of the scores for each part is objective and well-founded. The second is the scoring module. Except for the end-ofcourse teachers, the grades are directly graded according to the answers. Each teaching class is set. Three to five class representatives, who are in charge of classroom performance, attendance, and daily tests. Section representatives are responsible for recording the real situation of small classmates and giving objective scores. At the same time, as the “online learning platform” advances, the course platform The auxiliary teaching platform for programming courses and the MOOC platform have become the scenes for students to learn and practice. Students’ learning on each platform will be recorded, and the completed curriculum tasks will be scored by machines; the third major module is based on For the blockchain’s scoring management system, all scores are first uploaded to the educational administration system for preliminary records, and then the scores are uploaded to the blockchain in the background to achieve the traceability of the scores and data encryption.
Comprehensive Teaching Mode Based on Blockchain
477
5 Advantages of the New Teaching System Based on Blockchain Technology With the new teaching system based on blockchain technology, future teaching classrooms will be supported by advanced information technology, adhere to the teaching line of educating people, fully absorb and learn from mature teaching models, continuously optimize the system structure, and incorporate both [8]. The biggest feature of the new curriculum teaching management system based on this is that it makes the source of the scores more objective and the composition of the scores more fair [9]. At the same time, it can form new characteristics such as scores that cannot be tampered with, real names, and diversity. A single scoring standard further improves the quality of education and teaching [10]. It enriches the learning resources for students, improves the learning experience, enhances the objectivity of performance, strengthens the management of teachers, enhances the efficiency, strengthens the safety of score data, and comprehensively improves the quality of education and teaching. The comparison of the three teaching modes is shown in Table 1:
Table 1. Comparison of three teaching modes Contrast indicator Scoring basis Grade management Data Security
Traditional teaching model Single Data is complex and centralized Low security
“Online + Offline” teaching mode Relatively single, more disadvantages Data management is organized Low security
New teaching mode based on blockchain technology Rich sources, objective and transparent Data is fully time-stamped Data encryption is secure
The new teaching mode is supported by the blockchain technology, with the goal of improving the overall teaching quality and achieving objective and transparent student scores [11]. With the support of emerging technologies, future teaching management can perform digital management of scores, making education The data was promoted, and “blockchain + education” was put into practice.
6 Conclusion With the continuous advancement of education and teaching, China’s road to education is constantly improving and innovating, and the demand for talents is increasing. The new teaching model based on the blockchain is based on the purpose of enhancing students’ comprehensive literacy, and seeks education and innovation for you The people of lofty ideals provide new ideas. Obviously, the new teaching model based on blockchain will play an important role in improving China’s teaching management level.
478
Q. Huang et al.
Acknowledgement. This research was supported by JG2018-348, Sichuan Province’s 2018– 2020 Higher Education Talent Cultivation Quality and Teaching Reform Project, “Construction of a Practical Teaching System for Information Technology Majors in Agricultural and Forestry Colleges Featuring Agricultural Informatization”.
References 1. Lele, M., Jing, L., Dan, Y.: Problems in the reform and development of higher education and solutions. Mod. Rural Sci. Technol. 9(1), 77–78 (2019) 2. Xiaobo, J.: Application of education and blockchain technology. Sci. Technol. Innov., 2095– 6835 (2019) 20-0142-02 3. Yuxuan, L.: Application of blockchain technology in education: review and prospect. World Educ. Inf. 475(19), 12–16 (2019) 4. Yunqiu, S., Qichun, W.: University achievement management system based on blockchain technology. J. Crypt. 5(5), 568–578 (2018) 5. Baogen, D., Shuwang, Y., Zhao, Y.: Reality, problems and suggestions of “blockchain + education” reform. Mod. Educ. Technol. 29(7), 46–52 (2019). https://doi.org/10.3969/j.issn. 1009-8097.2019.07.007. (in Chinese) 6. Boehme, R., Christin, N., Edelman, B., et al.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 2(2), 213–238 (2015) 7. Yong, Y., Feiyue, W.: Development status and prospect of blockchain technology. J. Autom. (4), 481–494 (2016). https://doi.org/10.16383/j.aas.2016.c160158 8. Qiang, S.: The impact of blockchain technology on higher education in china in the future. High. Educ. Explor. (10), 5–13 (2018). https://doi.org/10.3969/j.issn.1673-9760.2018.10. 002 9. Zhaojun, G.: “Blockchain + Higher Education”: a new perspective on the development of higher education—based on the Wolf University model of blockchain. China Adult Educ. (3), 63–66 (2019). (in Chinese) 10. Mingjie, Z.: The development of MOOCs and the reform of higher education. Jiangsu Sci. Technol. Inf. 14, 83–84 (2014). https://doi.org/10.3969/j.issn.1004-7530.2014.14.042 11. Lei, H.: Reconstruction and innovation countermeasures of the value of blockchain technology to the development of higher education. Cai Zhi (2), 86 (2019). (in Chinese)
Evaluation Strategy of Teacher Professional Development in Applied Universities Based on BP Neural Network Guohua Fu(&) Jilin Engineering Normal University, Changchun, Jilin, China [email protected] Abstract. The progress of education cannot be separated from the development of teachers, and high-quality education cannot be separated from high-quality teachers. To guide teachers to take the road of professional development is the trend and the inevitable direction of the reform and development of applicationoriented universities in China. The performance appraisal system of university teachers is an important part of the professional development of higher education teachers and the main means of evaluating teachers’ teaching and scientific research achievements. The establishment of the performance appraisal system is conducive to the development of teachers’ specialization and the improvement of teaching and scientific research level BP neural network is used to study the performance assessment of teachers in application-oriented undergraduate universities in this paper, change the evaluation methods, and guide teachers to take the road of professional development. Keywords: The development of teacher professional Evaluation system BP neural network
1 Introduction The party and the state have always attached great importance to the work of teachers. The report to the 19th national congress of the communist party of China (CPC) made it clear that it was necessary to “strengthen the construction of teachers’ ethics and styles, train high-quality teachers, and advocate the respect of teachers and the importance of education in the whole society”. In February 2018, the CPC central committee and the state council issued the “opinions on comprehensively deepening the reform of the construction of teachers in the new era” (hereinafter referred to as the “opinions”), which is the first milestone policy document specifically for the construction of teachers issued by the CPC central committee since the founding of new China. The opinions clearly stated that by 2035, teachers’ comprehensive quality, professional level and innovation ability should be greatly improved to cultivate a large number of elite teachers, and the professional growth of teachers is of great significance. With the large-scale expansion of college enrollment for several years in a row, higher education has developed rapidly and expanded rapidly in China. How to establish a high quality faculty is a problem faced by many colleges and universities, and many measures have been taken. But first, we should establish a set of standard teaching evaluation © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 479–486, 2021. https://doi.org/10.1007/978-3-030-51431-0_70
480
G. Fu
system to have a comprehensive understanding and correct evaluation of teachers. After setting the standard, teachers can adjust and control their behaviors consciously according to their own achievements and shortcomings, so as to further improve and perfect their work. At the same time, it is helpful for colleges and universities to realize the importance of improving the teaching level and quality of teachers, so that schools can strengthen the construction of teachers in a targeted way [1].
2 The Connotation of Teacher Specialization “Specialization” is a sociological concept, which refers to the process of a professional group achieving the required professional standards to become a specialized occupation and obtain the corresponding professional social status. It emphasizes the ability structure that people engaged in the occupation should have, and focuses on the process of becoming an expert from a novice. As a type of professional professionalization, “teacher professionalization” began in the 1980s, aiming at promoting the growth and progress of teachers’ professional competence. It is a process of constantly enriching connotation and joint efforts of multiple subjects, as well as the continuous development of individual teachers. “Specialization” has become the need and inevitable trend of teacher development. Application-oriented undergraduate education is an important type of education that “plays a key role in improving technical level and social productivity”, and cultivates high-quality technical talents. This determines that the professionalization of teachers in application-oriented colleges should not only have the basic connotation of the professionalization of teachers in general higher education, but also have its own unique professionalization characteristics. Therefore, the professionalization of teachers in application-oriented undergraduate universities mainly refers to the process in which teachers master and skillfully use professional knowledge and skills in their research fields, have strong practicality and applicability, and can skillfully use advanced educational technologies to carry out their own teaching and scientific research [2].
3 The Present Situation and Problems of Teacher Professional Development in Application-Oriented Universities 3.1
Teachers’ Professional Consciousness Is not Strong
In the information age, technology has changed the social distribution of information resources, resulting in multi-source, easy access and optional information. This has weakened the authority of educators to some extent and changed the relationship between teaching and learning. In this case, teachers’ concept of education must change accordingly. The information age is also an era of knowledge explosion. In this era, it is impossible for students to master the knowledge and skills they need for a lifetime in school. They must learn to learn. Under this condition, students should change from passive learning to active learning, and teachers should pay attention to the cultivation of students’ independent learning ability.
Evaluation Strategy of Teacher Professional Development
3.2
481
Teachers Are Weak in Professional Practice and Scientific Research
Teachers in application-oriented undergraduate colleges should not only have a solid foundation of professional knowledge, but also have rich professional practical ability. However, in reality, many teachers lack professional practice from school to school, so their theoretical level is high while their practical ability is relatively low. Teaching and scientific research are two inseparable aspects of higher vocational education. From the perspective of international trends, the call for teachers to become researchers is growing louder and louder. Teachers have the ability of teaching research, which is also an important symbol of teachers’ professional maturity [3]. 3.3
The Guarantee Mechanism of Teacher Specialization Needs to Be Improved
The establishment of professional development institutions for teachers conforms to the actual needs of economic and social development to ensure the quality of professional development and the stability of all work. In the process of formulating the professional development plan, we can implement various policies and systems of government departments by constructing professional institutions, correctly implement and lead the process of professional development, and take this as the carrier to strengthen the supervision of teachers in education. 3.4
The Evaluation Method of Teacher System Needs to Be Changed
The annual assessment of university teachers has become an important reference for the annual rewards and punishments of university teachers and the promotion of professional titles. Basically all the colleges and universities in the aspect of teachers’ performance is more operable in order to stipulate the quantitative indicators, the title promotion and post appointment, teachers in fixed number of year of scientific research projects, published papers of scientific research, to guide the student to obtain competition awards at or above the provincial level disciplines, teaching achievement awards, published monographs and so on all have certain quantitative index [4].
4 The Countermeasures of Teacher Professional Development in Application-Oriented Undergraduate Colleges According to the current undergraduate course colleges and universities teachers, especially teachers who instruct the practice teaching status quo, put forward to improve teachers’ teaching ability specialized Angle, based on running a school and school characteristics, from the following several aspects to put forward strategies. This study is to design the new applied undergraduate colleges and universities teachers’ professional development center operation organization as shown in Fig. 1.
482
G. Fu headed by the vice President of teaching
The development of teacher specialization
Other school support department
School policy support and financial security
Colleges and departments
Faculty development coordination
Academic committee
Teacher development unit
Teacher research group
Personal development of teachers
Fig. 1. Organizational chart of teacher professional development center in application-oriented undergraduate colleges
4.1
Set up the Teacher Specialized Development Consciousness
In the process of professional development, college teachers should first establish the consciousness of self-professional development, consciously strengthen the theoretical study of professional development, and establish the correct educational concept and professional value. Second, to strengthen professional identity and stimulate the internal motivation of professional independent development. The third is to strengthen self-reflection. Self-reflection is a process in which teachers take their own education and teaching activities as the object of thinking and examine and analyze their own behaviors in education and teaching as well as the resulting results. 4.2
Enhance Professional Practice and Scientific Research Ability
It is a complementary process to improve teachers’ professional practice ability and scientific research ability. First, university teachers need to improve the awareness of professional practice, consciously and actively participate in professional practice. Second, the school should strengthen school-enterprise cooperation and establish a training mechanism combining “production, learning and research”. Third, teachers can be arranged to go to school to learn advanced professional practice methods at home and abroad, so that they can constantly update their practical ability. Fourthly, professional practical skills can be cultivated through the campus practice base, which can make professional practical ability training normal and persist for a long time [5].
Evaluation Strategy of Teacher Professional Development
4.3
483
Improve the Teacher Professional Development System
It is necessary to establish diversified teacher training modes, increase the number of educational majors in specialized universities and comprehensive universities, and improve the professional development of teachers from the source. Secondly, it is necessary to strengthen the integrated pre-job and post-job training. The pre-job training of teachers is mainly based on academic training, while the post-job training is mainly based on the comprehensive promotion of professional teaching ability, teachers’ personal titles, professional skills and professional and technical post qualifications. The combination of pre-job education and post-job training of non-degree, to achieve before and after the echo, shorten the transition period of teachers. At the same time, through the long-term education system for teachers, teachers should be guided to set up the idea of lifelong learning and keep learning and making progress [6]. 4.4
To Construct the Evaluation Index System of Teachers’ Professional Development Ability
The indicators of teachers’ performance appraisal are the basis and basis of teachers’ performance appraisal. This paper constructs the framework of the universal teacher performance assessment index system and designs a reasonable annual performance assessment system for full-time teachers in application-oriented universities. In the construction of teacher performance assessment system, three first-level indicators are set to evaluate teachers. These three indicators are taken as first-level indicators, and then divided into eight second-level indicators to assign specific scores. The detailed rules for the evaluation of teachers’ performance are shown in Table 1.
Table 1. Detailed rules of teacher assessment indicators Level indicators Teaching
Secondary indicators The quality of teaching Teaching discipline
Student guidance Corrects students’ papers Guide student competition Instruct students to publish papers Level indicators Secondary indicators
Grading rules Leadership assessment (15 *0.15) Student assessment (30*0.3) Peer assessment (5 *0.05) Teaching accident (12 points, including 2 points for general, 5 points for serious, 12 points for major) Change of course (3 points) Two spot checks (5 marks) First prize (3 points) second prize (2 points) third prize (1 point) excellence award (0.5 points) Independent or first author (2 points), second (1 point), third or later (0.5 points) Grading rules (continued)
484
G. Fu Table 1. (continued)
Level indicators Scientific research achievements
Secondary Grading rules indicators Scientific research Independent signed papers in core journals (5 points), project in general public journals (3 points) 0.5 points for monographs, 0.3 points for translated works, 0.2 points for compiled works and 0.2 points for teaching materials (per 10,000 words) Provincial or above projects (5 points) University-level project (3 points) Teaching files Teaching files (5 points) Award Excellent teacher at the provincial level (5 points), the city level (3 points) Provincial research or teaching achievement first prize (5 points) second prize (3 points) third prize (2 points), municipal first prize (3 points) second prize (2 points) third prize (1 point)
According to the grading rules of teacher performance assessment indicators, the weights are obtained, and the teacher assessment is as follows: Y ¼ 0:5X1 þ 0:15X2 þ 0:05X3 þ 0:03X4 þ 0:02X5 þ 0:15X6 þ 0:05X7 þ 0:05X8
ð1Þ
(X1 . . . X8 : teaching quality, teaching discipline, grading homework, student competition, student papers, scientific research, teaching files, awards). 4.5
BP Neural Network Algorithm Is Used to Evaluate Teachers’ Performance
The data processing. We used 311 teacher sample data to evaluate various indicators, and the corresponding results as the output layer [7]. And it is assumed that the membership degree of qualitative indicators is standardized as: ai ¼
qi Im ax
ð2Þ
ai is the attribute membership degree of the i index, Im ax is the maximum value of membership degree (usually 100), and qi is the score value of a certain index of the i teacher. The data is normalized by this formula. Design network structure. About the design of input and output layer: this model is based on the indicators of each set of data as input, and the teacher assessment score as output point. In the BP neural network, there are eight nodes in the input layer, six
Evaluation Strategy of Teacher Professional Development
485
nodes in the hidden layer, and one node in the output layer. In choosing the number of hidden layer neurons, we mainly refer to the following empirical formula [8]: I¼
pffiffiffiffiffiffiffiffiffiffiffiffi nþmþa
ð3Þ
N is the number of neurons in the input layer, m is the number of neurons in the output layer, and a is the constant between [1, 10]. In this test, we chose the number of hidden layer neurons as six. Select excitation function. In this paper, the s-type tangent function tansig is selected as the excitation function of hidden layer neurons. Since the network output value is normalized to the range of [0,1], the output layer chooses the s-type logarithmic function purelin as the excitation function through the element [9, 10]. Finally, neural network toolbox in MATLAB was used for network training, and the error was controlled at 5% compared with the actual results of teachers, which could basically meet the accuracy requirements of teacher performance assessment.
5 Conclusion The level of teacher specialization is the core factor that affects the quality of education and the level of running schools. Based on the objective analysis of the current situation of teacher professional development in application-oriented undergraduate colleges, this paper puts forward the effective strategies to promote teacher professional development, such as the comprehensive evaluation of multiple indicators of teacher professional development by using BP neural network method, and strengthening the evaluation of teacher professional development, so as to promote better professional development of teachers.
References 1. Debroy, A.: Teachers’ perceptions on student evaluation of teaching as a tool for faculty development and quality assurance in medical education. J. Educ. Health Promot. 10, 281 (2019) 2. Rebecca, J., Collie, N., Perry, E.: Cultivating teacher thriving through social–emotional competence and its development. Aust. Educ. Res. 46(4), 699–714 (2019) 3. Lin, J.: From a lecturer to a researcher: a three-stage process of science teachers’ professional development in mainland China. Asia-Pac. Sci. Educ. 5(5), 200–219 (2019) 4. Voon, X.P., Wong, L.-H.: Principled practical knowledge in bridging practical and reflective experiential learning: case studies of teachers’ professional development. Asia Pac. Educ. Rev. 20(4), 641–656 (2019) 5. Lewitt, M.S.: Development of a pilates teaching framework from an international survey of teacher practice. J. Bodyw. Mov. Ther. 2(05), 943–949 (2019) 6. Cai, X.: Exploration on the financing risks of enterprise supply chain using back propagation neural network. J. Comput. Appl. Math. (10), 116–119 (2020) 7. Xu, Z.: BP neural networks and random forest models to detect damage by Dendrolimus punctatus Walker. J. For. Res. 31(1), 107–121 (2020)
486
G. Fu
8. Chang, Y.: Penetration quality prediction of asymmetrical fillet root welding based on optimized BP neural network. J. Manuf. Proces. 22, 247–254 (2020) 9. Wu, Y.: Prediction of coal and gas outburst: a method based on the BP neural network optimized by GASA. Process Saf. Environ. Prot. 10(02), 64–72 (2019) 10. Wang, J.: Reconstruction of missing color-channel data using a three-step back propagation neural network. Int. J. Mach. Learn. Cybern. 10(10), 2631–2642 (2019)
Augmented Reality Technology Key Technologies Research Hejia Li(&), Xilong Chen, Fushan Yao, Fei Gao, Jiuchao Li, Kai Yang, and Zhao Jin No. 1, Huayuan Road, Changchun, Jilin, China [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Human-computer interaction technology has been gradually transferred from computer-centered to user-centered and virtual and real interaction in augmented reality technology is a prominent manifestation. Augmented reality technology is a new technology developed on the basis of virtual reality technology and a new development of virtual reality technology. Augmented reality emphasizes the seamless integration of real world information and virtual world information with real-time interaction. In recent years, with the rapid development of computer graphics and computer vision technology, augmented reality based on computer vision technology has shown great advantages, not only simple equipment, low cost, and can effectively ensure the application of augmented reality real-time, accurate requirements. This paper introduces a series of methods in the interaction of augmented reality technology from four aspects: 3d registration, interactive technology, system development platform and virtual object modeling. This paper mainly introduces several common methods in visual based 3d registration technology and augmented reality interactive system, and finally introduces TARToolKit development platform. Keywords: Augmented reality (AR) registration
Human-computer interaction 3d
1 Overview of AR Technology AR technology is a branch of VR technology and an important means of realizing multimedia technology in the three-dimensional field. The so-called VR refers to the three-dimensional environment generated by the computer, in which the user can wear a helmet display or position tracker to move, and can directly participate in and explore the role and changes of the virtual object in the environment, as if he were in a virtual world [4, 5]. And augmented reality is a real scene with virtual scene fusion technology, its purpose is through the computer graphics, image processing technology to realize the real scene, and the synthesis of computer-generated virtual environment and virtual objects, at the same time, through the display devices will present a sensory real new environment to observer, so as to realize the enhancement of the reality, let the user in a fusion of environment, the user perceived is a fusion of real and virtual environment, the world. The goal of an augmented reality system is to enhance the user’s perception and interaction with the real world. Augmented reality technology is © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 487–493, 2021. https://doi.org/10.1007/978-3-030-51431-0_71
488
H. Li et al.
developed on the basis of virtual reality technology, but different from virtual reality, it is a typical interdisciplinary discipline, involving many research fields, such as computer vision, computer graphics, image processing, human-computer interaction and so on. The realization of an AR interactive system needs to solve many key technical problems, including 3d registration technology, virtual object modeling technology and human-computer interaction technology. At present, the augmented reality system should have the following three characteristics: information synthesis of real and virtual scenes; positioning and adding virtual objects in 3d scale space (i.e. 3d registration); it has real-time interaction [1]. Milgram defines a continuous interval of change from the real world to the virtual environment [2], as shown in Fig. 1. This range illustrates the connection between the real world, virtual environments and augmented reality. Real and virtual environments are at opposite ends, with mixed reality in the middle. Augmented reality technology is close to the real world, and computer-generated data can enhance the real environment and enhance users’ understanding of the environment.
Mixed reality Real environment
AR
Augmented virtuality Virtual environment
Fig. 1. Continuous interval
In the 1990s, augmented reality has a more rapid development, currently in augmented reality research, comparison of the leading countries are the United States, Germany, Japan, Britain, Canada and so on, they in engineering, medical, military and other fields related research and some successful applications are obtained [3].
2 3d Registration Technology In AR system, the premise of the interaction between virtual and real objects is that the virtual object should be displayed in the correct position of the real scene. The positioning process of the virtual object in the real scene is called the registration of the virtual object. 2.1
Computer Vision
The computer vision method, which requires no additional auxiliary tracking equipment, can complete the task of registration with only one camera, but requires a large amount of computation. In order to simplify the computation of image processing and recognition in the visual system, most foreign augmented reality systems at present adopt artificial placement of identification points and use the method of 3d-2d feature point matching to determine the user’s point of view, so as to realize the 3D tracking registration of the system.
Augmented Reality Technology Key Technologies Research
489
By calibrating and registering the camera, the internal and external parameters of the camera need to be obtained. After obtaining the internal and external parameters of the camera, the position and direction of the camera relative to the real world (world coordinate system) are calculated. The registration process of virtual object is completed by converting the virtual object coordinate system to the world coordinate system through matrix transformation. The method of camera calibration and registration does not need complicated equipment, and the efficiency of image recognition can also meet the requirements of real-time. Among the registration methods based on computer vision, the most commonly used method is video detection. 2.2
3d Registration Process
In the augmented reality system, registration technology is a key technology to limit its application. Registration technology directly affects the effect of augmented reality system. Augmented reality system requires high registration accuracy, and any slight registration error may be displayed in the registration result, affecting the final effect of the enhancement. Augmented reality system requires real-time detect the camera position and direction relative to the real scene, computer according to the information to be added by the exact position of virtual object in the projection plane, and the virtual objects in real time display in the correct position of the real scene, which is registered to complete the task of the augmented reality system. Therefore, the registration process mainly includes two aspects: camera positioning and tracking (camera calibration) and virtual object positioning in the real world. (1) camera calibration Camera calibration is a major link in to virtual object registration, 3d computer vision system should be able to get images from the camera information, calculate the three dimensional environment such as the position of the object shape geometry information, and thus identify objects in the environment and the brightness of the image on each point expresses the space surface reflected light intensity, The position of the point on the image corresponds to the geometric position of the point on the surface of the space object. The interrelationship of these positions is determined by the camera imaging geometry model. The parameters of this geometric model are called camera parameters. These parameters must be determined by experiments and calculations. The process of experiments and calculations becomes camera calibration. The camera model is a simplification of the geometric relationship of optical imaging. The simplest model is the linear model, or pinhole model [6]. In the augmented reality system, camera calibration is used to calibrate the attitude information (position and direction) of the real object and the virtual object as well as camera parameters, so as to obtain the transformation relation between the coordinate system, so that the computer-generated virtual object can be accurately registered to the corresponding position in the real scene. The process of determining the internal and external parameters of a camera is the process of camera calibration. The image information is input into the computer and converted into a digital image. Each digital image is an M N array in the computer. The value of each element (called pixel) in the image with M rows and N columns is the brightness (or gray scale) of the image.
490
H. Li et al.
In the vision-based augmented reality system, the spatial points in the real scene are usually taken as calculation points by the camera, and the above matrix transformation relation is used to formulate the equation to calculate the camera parameters, so as to achieve the camera calibration. (2) the positioning of virtual objects in the real world The positioning process of virtual objects in the real world is actually how to transform the virtual object coordinate system to the real world coordinate system through matrix transformation. We get through the camera calibration of the camera relative to the world coordinate system rotation and translation parameters, namely, know the camera coordinate system to world coordinate transformation matrix, expressed in simple matrix transformation relationship between the camera coordinate system on the point coordinate through projective transformation, projection to the image coordinates the virtual objects present in the video, the registration of virtual object. In the identify-based augmented reality system, the world coordinate system and the virtual object coordinate system coincide, so the transformation matrix from the virtual space coordinate system to the world coordinate system mentioned above does not exist in fact, just to describe the complete registration process defined by us more intuitively, as shown in Fig. 2.
Virtual space coordinate
World coordinate
Camera coordinate
Image coordinate
Fig. 2. Registration process
3 Augmented Reality Interactive Technology Augmented reality is to realize the aim of user and more natural interaction between the virtual objects in real situations, the augmented reality system by tracking device to obtain real scene data are needed to determine a user to send out the behavior instruction of virtual object in real situations, to explain, and gives the corresponding feedback as a result, the process is the interaction process of augmented reality system. There are usually two ways for users to interact with virtual objects in virtual reality: behavior-based and event-based. The behavior-based approach is to define a set of autonomous objects or agents, set a certain behavior mechanism for them, and make corresponding responses when certain sensor input events are transmitted. An eventbased approach is one in which the system’s creator defines in advance the mechanism by which a particular event will occur, perhaps from user input or other event sources. There are three common ways to interact with augmented reality systems: (1) Command interaction mode Commands in an augmented reality system are specific states composed of one or more spatial points in the real world, which correspond to corresponding known behaviors of virtual objects. Users can rotate and translate virtual objects by changing the combined state of space points. When the state of the spatial point is not consistent with the
Augmented Reality Technology Key Technologies Research
491
predefined behavior, it has no effect on the current scene. Interactive commands can also be implemented by input spatial points, such as gesture recognition through specific devices. As a form of command interaction, ordinary menu has been widely used in the augmented reality system of mobile devices. Wangenr et al. implemented the navigation system in large buildings by using handheld computers. Users can directly select the origin and destination of the menu to achieve virtual and real interaction. (2) Spatial point interaction mode Controlling virtual objects through the selection of spatial points in real scenes is the most basic interaction mode in augmented reality. By judging whether the coordinates of the space point are selected or not, the system can determine whether the virtual object is selected or not, and then it can change the state of the virtual object or specify its new position. (3) Special tool interaction mode Special tool interactions usually rely on special tracking devices or sensors for spatial point input and are combined with system software. Through the spatial input device to operate virtual objects to achieve specific interactive behavior provided by the system software, such as text prompts, buttons, options, etc. By fixing sensors on human hands and interacting directly with virtual objects on signs, some scholars also made chess charts with signs and used black gloves with reflective marks to manipulate virtual pieces on the charts [7].
4 ARToolKit Development Platform ARToolKit is a set of AR system development toolkit based on C language and OpenGL, which supports Windows, Linux, MacOS and other operating systems. At present, it has become a widely used development kit in the AR field. ARToolKit adopts the signal-based video detection method to locate the virtual reality by calculating the transformation matrix of the camera coordinate system and the marker coordinate system, realizing the virtual reality registration, and rendering virtual objects or other real scene information into the video stream by OpenGL [8]. ARToolKit is mainly composed of the following function libraries: Argsub32.lib; Arvideowin32.lib; AR32.1ib module. ARToolKit coordinate system: ARToolKit is to register virtual objects into the real scene through matrix calculation. The registration process is the matrix transformation process between the world coordinate system and the camera coordinate system. The development process of ARToolKit is as follows: (1) extract quadrilateral as candidate matching region; (2) match each candidate area with the corresponding knowledge in the template. If a match is generated, the system determines that the identification is found: (3) calculate the deformation of this area, obtain the position and attitude of the camera relative to the known mark, and finally obtain the transformation matrix, realizing the registration of virtual and real.
492
H. Li et al.
5 Virtual Environment Modeling in Augmented Reality System The modeling methods of virtual environment in augmented reality system include image based method and geometric model based method. (1) image-based modeling method Image-based virtual environment modeling refers to the 3d reconstruction based on images, which is based on the principle of computer vision and adopts computer graphics and image processing technology, such as texture projection, projection transformation, image fuzzy recognition, etc., to construct virtual 3d scenes from 2d images in the real world [3]. (2) method based on geometric model The geometric model-based method is to create a virtual environment by geometric entities, which can be independently developed and drawn by computer graphics technology, or established by existing modeling tools such as 3D MAX and AutoCAD, and then output in a unified data format and render in real time [9]. After the virtual reality model is established, the interactive operations such as rotation, translation and viewpoint transformation of virtual objects can be realized by adding event response, such as keyboard or mouse operation. In the identification-based augmented reality systems, most of them adopt the modeling method based on geometric model, in which OpenGL drawing function is used to realize the virtual object modeling. Open OpenGL graphics library is a powerful 3d graphics platform, the platform provides a software interface to the hardware of the graphics, including about 250 different functions (including core OpenGL, including about 200 functions, about 50 in OpenGL tools function library), You can operate with these functions, create interactive 3d applications.
6 Conclusions Although some achievements and progress have been made in AR interaction technology, it is difficult to conduct in-depth research in many aspects due to its wide scope and limited experimental equipment conditions. There are still many things that can be done in terms of AR interaction, as follows: the identifications based AR system has a strong dependence on the identification. Once the identification is blocked or the surrounding environment affects the display of the identification, the AR system will be affected, which requires further improvements in the production and identification of the identification. In the process of 3d registration based on computer vision, registration error is inevitable. How to further improve the registration accuracy lies in the improvement of video acquisition technology on the one hand and the improvement of 3d registration technology on the other hand. AR interaction technology based on computer vision can also realize many applications, increasing the diversity and immersion of interactive operations [10].
Augmented Reality Technology Key Technologies Research
493
References 1. Mzulna, R.T.: A survey of augmented reality. Tele-Oper. Virtual Environ. 6(4), 355–385 (1997) 2. Rohs, M.: Marker-based embodied interaction for handheld augmented reality games. J. Virtual Reality Broadcast. 4(5), 1860–2037 (2007) 3. Fuhrmann, A., Loffelmann, H., Schmalstieg, D.: Collaborative augmented reality: exploring dynamical systems. Proc. Vis. 97, 459–462 (1997) 4. Shen, K., Jiang, J., Peng, T.: Research on human-computer physical interaction simulation system based on augmented reality. Comput. Simul. 25(4), 210–213 (2008). (in Chinese) 5. Doumen, M.J.A., Kappers, A.M.L., Koenderink, J.J.: Effects of context on a 3D pointing task. Percept. 36, 75–90 (2007) 6. Jia, Y.: Machine Vision. Science Press, Beijing (2000). (in Chinese) 7. Veigl, S., Kaltenbach, A., Ledermann, F., Schmalstieg D.: Two-handed direct interaction with ARToolKit. Vienna University of Technology 15(4), 82–85. (2002) 8. Shen, K.: Research on some problems of augmented reality human-computer interaction system based on ARToolKit platform. Computer Application Technology, February 2008. (in Chinese) 9. Virtual environments over the Internet. Int. J. Comput. Integr. Manuf. 16(2), 112–127 (2003) 10. Yang, L.: Research on virtual reality interaction technology in augmented reality. Shenyang Institute of Aeronautical Technology, 2010. (in Chinese)
Application Research of Virtual Reality and Augmented Reality Hejia Li(&), Yao Zhao, Fei Gao, Yun Li, Chao Tu, Kai Yang, Zhao Jin, and Xinchun Huang No.1, Huayuan Road, Changchun, Jilin, China [email protected], [email protected], [email protected], [email protected]
Abstract. With the continuous development of information science and technology, human beings have been able to use computers to build diversified mass information space to fully express the objective world. Virtual reality technology on the basis of information modeling of the objective world, by means of human-computer interaction mechanism of multi-channel, real-time to provide realistic sensory information, help mankind to break and physical limitations of time and space, to perceive and research all kinds of complex events in the occurrence and development process of equivalent to the real environment, and human cognition of the world and to provide a new method and means. According to tend to the characteristics of different virtual reality, the virtual reality technology can be divided into the desktop virtual reality technology, the use of personal computers or desktop workstations are simulated, the virtual world of the computer screen as a participant observation window, this kind of technology in the aspect of immersive is poorer, but the cost is low, wide applicability, is the main entry point in the field of virtual reality technology into various applications. Immersive virtual reality technology: using the projection or head-mounted device build complete virtual reality environment, enables the user to fully immersed among them, the high cost of such technologies, application of pertinence, a typical system has the CAVE system based on the university of Illinois and the low stereoscopic display HMD. The augmented reality: the virtual environment of the graphic overlay on real objects, allowing the user to watch reality environment at the same time the object and the virtual environment. A more typical application is the penetration helmet-mounted display. The cost of such technologies is high, and the key technologies need to be further improved [1–2]. Keywords: Virtual reality (VR) Interaction
Augmented reality (AR) Immersion
1 Background on Virtual Reality Technology Virtual Reality, also known as VE, Virtual Environment, was first proposed by Ivan SutherLand, a scholar at Harvard University, in the 1960s. In 1993, Burdea G proposed 3 characteristics for virtual reality systems, namely Immersion, Interaction and Imagination, Virtual reality features are shown in Fig. 1. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 494–499, 2021. https://doi.org/10.1007/978-3-030-51431-0_72
Application Research of Virtual Reality and Augmented Reality
Immersion
Interacon
495
Imaginaon
Fig. 1. Virtual reality features
(1) sense of immersion In addition to visual perception, virtual reality technology should also consider providing auditory perception, force perception, touch perception, motion perception, and even taste perception and smell perception. The ideal virtual reality environment should have the perception function of all people, making it difficult for people to distinguish its authenticity. However, the current virtual reality technology is limited to vision, hearing, force perception, touch, motion perception, etc., which cannot be compared with the real world. (2) interaction The degree of manipulation of objects in the virtual environment by the user as the protagonist and the real degree of feedback from the virtual environment. For example, users can grasp objects in the virtual environment by hand and feel gravity, friction, etc. At the same time, objects will move and change with users’ actions. Ordinary virtual reality system runs in the computer, its interaction is reflected in the user’s control of different objects in the virtual environment, the integration of visual effects and physical effects. (3) imagination The entities in the virtual environment (including people and objects) should have the ability to change according to the laws or specific rules existing in the real world. For example, in the virtual environment to push an object, it can be according to the characteristics of the physical field in the corresponding motion or change.
2 Background on Augmented Reality In The biggest characteristic of augmented reality technology is to realize the virtual scene and real scene of overlay, use optical perspective type helmet mounted display, or OLED semi-permeable imaging lenses, or use ordinary camera and computer monitors, physical scene and integrating software to calculate the virtual scene, and make it display in the user’s field of view at the same time, making the user get beyond the visual perception of the real scene and information services. Augmented reality for the user to set up a more diverse and more immersive interactive information means, through the integration of software system to interact with the hardware equipment integrated control, the user can enjoy a natural interaction features of 3d real-time interactive services, such as in the field of manufacturing, will be a virtual components of the model, by adding to the real device image enables users to see early complete finished goods, in the military field, the user scene superposition with automatic computer generated virtual scene, can be efficient to show various
496
H. Li et al.
spatial information, investigation of intelligence information, etc., in the field of digital entertainment, Augmented reality allows users to overlay fictional images with real images/videos via simple image capture devices and PCS, supporting a wide variety of digital media applications to the service. Augmented reality underlying support technology is a rapid development since the 60s of the computer graphics technology, computer graphics is a 3d modeling, 3d rendering, CAD and other key technologies of virtual reality discipline foundation, it adopted based on a three-dimensional geometry, calculus, linear algebra and mathematical foundation, set up easily is described by the computer and deal with the virtual world of description and processing system. With the development of technology and industry, computer graphics, digital image processing, multimedia technology presents a trend of cross-integration, graphics, images, video and other forms of media data for effective integration, to achieve more complex virtual reality applications. Ronald Azuma of HRL LABS gives three basic features of augmented reality that are not dependent on the hardware solution: virtual reality combined; Real-time interaction; 3d registration. 3d registration is one of the basic problems in augmented reality system. Several technologies can be used to track the location of augmented reality devices and perform registration (based on visual recognition and sensor device recognition, etc.), providing different levels of accuracy, while the more specialized the level, the more expensive the hardware support. In an augmented reality system, registration errors are apparent when the physical environment and the virtual information registered in it are not properly aligned. High precision 3d registration requires some special program support, and real-time interaction has higher requirements for 3d registration.
3 The Application of Virtual Reality and Augmented Reality (1) military field Due to the depth of virtual reality and authenticity, in terms of military, people wait for the mountains and rivers landscape, Marine lakes on the map and write data through the computer, using virtual reality technology, to the original planar map into a threedimensional topographic map, by holographic technology to its projected out again, it’s more help to conduct military exercises training, improve the comprehensive national strength of our country. In addition, the current war is information-based war, and war machines are developing towards automation, and uav is the most typical product of informationbased war. Because of its automation and convenience, uav is very popular among countries. During the training of soldiers, virtual reality technology can be used to simulate the flight, shooting and other working modes of uav. During the war, soldiers can also use glasses, helmets and other machines to control drones for reconnaissance and assassination missions, reducing the rate of military casualties in the war. Since virtual reality technology can make the scene captured by uav three-dimensional, reduce the difficulty of operation and improve the efficiency of detection, the development of uav and virtual reality technology is urgent.
Application Research of Virtual Reality and Augmented Reality
497
The use of augmented reality technology to simulate tactical drills and tactical guidance, the use of head-up display or perspective helmet-mounted display to superimpose vector graphics and text symbols into the pilot’s field of vision, improve navigation and targeting information. In recent years, the research on the future combat system of individual soldier class has been rising, and the battlefield augmented reality system is becoming a hotspot. The U.S. naval research center has developed prototype BARS principles including wearable augmented reality systems and 3d interactive command environments. It integrates individual combat system, battlefield communication system, satellite positioning system, etc., and can efficiently realize multi-person distributed augmented reality system. Real-time acquisition and intelligent processing of battlefield information will give soldiers stronger individual combat capability and survivability. (2) the construction field Virtual reality technology has made a small achievement in the field of design, such as interior design. People can use virtual reality technology to express the interior structure and house appearance through virtual technology, making it visible objects and environment. At the same time, in the initial stage of design, designers can simulate their ideas through virtual reality technology, and can see the actual indoor effect in advance in the virtual environment, which not only saves time, but also reduces the cost. In the aspects of architectural planning and design, engineering implementation, technical maintenance and repair, augmented reality technology has a very wide application prospect. A complete architectural project contains a large amount of threedimensional design information and real scenes. Through the effective integration and presentation of information through augmented reality technology, it can accurately guide the engineering personnel to carry out construction, and at the same time, it can check the coincidence between the browsing planning effect and the actual building at any time. Augmented reality applications in the field of construction mainly includes enhancements to the virtual information (such as 3d real-time enhanced display for pipeline networks), the planning achievements browsing (combines 3d planning data and real scene, achieving high immersive 3d roaming), design and construction of auxiliary (combines design sketch and real scene, to provide support for design and construction work). (3) medical research Medical experts use computers to simulate human tissues and organs in the virtual space, so that students can perform simulated operations in it, and students can feel the feeling of the scalpel cutting into human muscle tissues and touching bones, so that students can grasp the operation essentials faster. In addition, the surgeon can also build a virtual model of the patient’s body before the operation and conduct a surgical rehearsal in the virtual space, which can greatly improve the success rate of the operation and allow more patients to recover. In the field of medicine, various surface sensors can collect various threedimensional data of patients in real time and draw corresponding images in real time, which can be integrated into the observation of patients. This can help to reduce the risk
498
H. Li et al.
of surgery, especially for minimally invasive surgery, the operation of doctors in the virtual three-dimensional space can be directly mapped to a variety of micro-operating surgical instruments, so as to complete the surgical treatment more accurately, which not only reduces the cost, but also reduces the trauma and pain of patients [3, 4]. (4) robot and remote control technology Intuitive and interactive virtual reality technology now make up for the deficiency of the traditional design analysis tool, for virtual assembly and virtual maintenance provides a strong support, the people are already according to the design of mechanical products, and develop all kinds of virtual environments, such as virtual fitting iyashi design environment, the virtual assembly environment, a virtual maintenance environment, virtual manufacturing environment, etc. It is a significant research direction to apply VR to specially equipped maintenance training simulation, such as the use and maintenance training of some high-tech military equipment. The overall idea is to use V and R to put the virtual prototype of products into the virtual environment for experiments. Trainees can disassemble and assemble the virtual prototype through virtual periappliances such as helmet, data gloves and 3d mouse, so as to train their maintenance skills. System simulation is a big problem in the field of automation control, if the robot remote control for raising the stability and accuracy has been a research hot spot, the complex scenario, how to choose the best control command sequence is also a very important question, using augmented reality technology to control the virtual model of the robot, can achieve high efficiency of system simulation, which greatly reduce the harm brought by wrong operation and inefficient operation, more importantly, augmented reality technology enables users to adopt more real-time and efficient way to realize the remote control of the robot, the unmanned aerial vehicle (uav) remote control in the field of military applications has made significant progress [5–7].
4 Conclusions Even though VR technology has a broad prospect, as a rapidly developing technology, its own problems gradually emerge, such as the stability of product return and user visual experience. For VR enterprises, how to break through the bottleneck of VR development and make VR technology become the mainstream is still an urgent problem to be solved. At present, most AR interaction systems are in the stage of theoretical research and laboratory development. Most AR interaction technologies applied in some professional fields require special interaction or tracking equipment, but AR technology has a broad application prospect. There are still many things that can be done in AR interaction, as follows: the identify-based AR system is simple and easy to implement, but it has a strong dependence on the identification. Once the identification is blocked or the surrounding environment affects the display of the identification, it will affect the AR system, which requires further improvement of the production and identification of the identification; In the process of 3d registration based on computer vision, registration error is inevitable. How to further improve the registration accuracy lies in the
Application Research of Virtual Reality and Augmented Reality
499
improvement of video acquisition technology on the one hand, and the improvement of 3d registration technology on the other hand; AR interaction technology based on computer vision can also realize applications in many aspects. The next step is to increase the diversity and immersion of interactive operations so that AR interaction can be applied in many aspects. Such as through the recognition of audio and virtual object interaction; The tracking and registration method based on vision in the augmented reality system will cause inaccurate calculation of camera positioning and attitude, resulting in certain errors in the synthesis of 3d virtual images and real images, which need to be further improved [8, 9].
References 1. Azuma, R.: A survey of augmented reality. Presence 6(4), 355–385 (1997) 2. Azuma, R., Balllot, Y., Behringer, R., Feiner, S., Juliet, S., MacIntyre, B.: Recent advances in augmented reality. IEEE Comput. Graph. Appl. 21(6), 34–47 (2001) 3. Zhu, M., Yuan, Y., Yunliang, J.: Augmented reality overview. Chin. J. Image Graph. 9(7), 767–774 (2004). (in Chinese) 4. Luo, Y., Dingfang, C.: Research on the modeling method of augmented reality system. J. Wuhan Univ. Sci. Technol. 12(18), 23–26 (2005). (in Chinese) 5. Chen, J., Tian, W.Y., Dayuan, Y.: Augmented reality system and its application. Comput. Eng. Appl. 15, 72–75 (2001). (in Chinese) 6. Ke, S.: Research on some problems of the augmented reality human-computer interaction system based on ARToolKit platform. Master’s thesis, Hefei University of Technology, Hefei (2007). (in Chinese) 7. Ding, H.: Development of geomagnetic head tracking system and helmet display for virtual reality. Master’s thesis, Beijing Institute of Technology, North Beijing (1997). (in Chinese) 8. Yuan, Y.: Research on application technology of augmented reality, 4 (2006). (in Chinese) 9. Tong, Y.: Nankai University, augmented reality system, 5 (2010). (in Chinese)
Word Frequency Analysis and Intelligent Word Recognition in Chinese Literature Based on Neighborhood Analysis Chunhua Liu(&) Henan Vocational College of Science and Technology, Xinxiang, Henan, China [email protected]
Abstract. The word frequency analysis method is an important research method in the field of picture situation. With the development of picture science, word frequency analysis and other philological methods are also widely spread and used in China. Nowadays, it plays a fundamental role in the same kind of research, thus supporting more complex analysis methods such as social node network, clustering and strategic coordinates. As a well-known research method in the field of picture, scholars often ignore some basic problems or pay insufficient attention to the word frequency analysis method in application. Originally, the word frequency analysis method can break the discipline limit and be widely recognized and used by the academic circle, which is indeed beneficial to the development of the word frequency analysis method itself and the picture situation discipline. However, due to too familiar with and popularization, the academic circle nowadays pays too little attention to it, and even makes mistakes in application, which is a problem that cannot be ignored nowadays. Therefore, to grasp the development process of the word frequency analysis method in the application of China, to reveal the problems in the application of the word frequency analysis method in China, can provide useful reference for the future application of the word frequency analysis method in China’s scientific research; To make it can get more attention in the field of picture situation in China, better development and dissemination in the academic circle in China, which undoubtedly has a positive significance to promote the development of picture situation discipline in China. Keywords: Neighborhood analysis Common word frequency analysis Intelligent word recognition Chinese literature
1 Introduction According to the statistical results, the hot spot and development direction of a certain research field are analyzed. Common analysis methods include word frequency analysis, literature growth rate analysis, citation analysis and other bibliometric methods [1]. In the author’s investigation, it was found that the number of research literatures that used word frequency analysis method to track the hot spots in the field was significantly higher than that of the other two methods [2]. Therefore, this study takes the review articles on hot spot analysis with the word frequency analysis method as the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 500–506, 2021. https://doi.org/10.1007/978-3-030-51431-0_73
Word Frequency Analysis and Intelligent Word Recognition
501
research object, sorts out the development history of such articles in Chinese academia in detail, and makes a relatively detailed summary and analysis on the application status of word frequency analysis method in hot spot analysis articles in China [3]. Word frequency analysis method is the result of statistical analysis of real data, which has higher accuracy and objectivity. Therefore, compared with qualitative method, it has more credibility to some extent. At the same time because of the word frequency analysis method than other intelligence analysis method is more convenient, make the word frequency analysis method in the network, combines the co-occurrence word clustering and multidimensional scaling analysis method is widely used in various disciplines after analysis of the status quo, research characteristic and development trend and research focus and topic analysis, etc., and gradually formed a more universality of such article writing rules [4, 5]. According to the literature collected by the author, it is found that although the number of such articles fluctuates slightly, the overall number rises and has a certain scale [6, 7]. This research on a certain period of a certain subject within the scope of research literature as the research object, based on word frequency analysis, supplemented by a variety of content analysis of the literature analysis method, not only are numerous, and from the article writing and its content on the analysis of the research or are easy to identify, this study will be unified this type of literature referred to as the “hot” word - articles [8, 9]. In addition to the word frequency analysis of the word selection strategy, high-frequency word value, algorithm improvement and so on the word frequency analysis of the methodology itself to discuss; In addition, it is not within the scope of this study to explore the applied research of the main idea of a work by taking a specific work as the object of analysis and word frequency analysis as the means of analysis. By summarizing the current application situation and phenomenon of word frequency analysis in China, the development trend and common problems in its application are found [10, 11]. Can provide for the word frequency analysis method is applied to the research in the future use of guidance, make future researchers have a reasonable application of word frequency analysis method to code and other research methods, reasonable moderate “hot” word - sort of research consciousness, avoid the phenomenon such as neglect, misuse, promote academic value of “hot” word - type. At the same time, it also provides support for the further effective promotion and rational use of the word frequency analysis method, and promotes the development of word frequency analysis method and the subject of graphics in China [12].
2 Method 2.1
Principle of Mutual Information
The principle of mutual information is used to calculate the degree of combination between two adjacent characters. On the contrary, the degree of binding is lower. The mutual information between xy, x and y is defined as follows:
502
C. Liu
MIðx; yÞ ¼ log2
pðx; yÞ pð xÞpð yÞ
ð1Þ
pðx; yÞ represents the co-occurrence frequency of word adjacency, pð xÞ is the probability of word occurrence alone, and pð yÞ is the probability of word occurrence alone. And we can derive the following formula. pð x Þ ¼
m ð xÞ n
ð2Þ
pð x Þ ¼
m ð xÞ n
ð3Þ
pðx; yÞ ¼
nðxyÞ n
ð4Þ
Where, nð xÞ, nð yÞ and nðxyÞ represent the occurrences of x, y and xy respectively, and n represents the total number of word frequencies. The mutual information principle can directly reflect the word credibility of a string. The judgment and analysis methods are as follows. When pðx; yÞ [ pð xÞpð yÞ; In other words, MI ðx; yÞ [ 0 represents a positive correlation between X and Y, and XY is more likely to be a word, and the greater the mutual information value MI ðx; yÞ, the stronger the correlation. When the mutual information value is greater than a set threshold, it is considered as a word. When pðx; yÞ\pð xÞpð yÞ, or MI ðx; yÞ\0, means that and are mutually exclusive, in this case, cannot be used as a word. When pðx; yÞ ¼ pð xÞpð yÞ, or MI ðx; yÞ ¼ 0, means that there is no correlation between X and Y, it is less likely to become a word. 2.2
Word Frequency Analysis Method
Given the word frequency analysis is dependent on the indexing keywords analysis result is not very reliable, the author’s understanding of the science degree will affect the author independently indexing, the result of the word frequency analysis based on these since indexing words actually equivalent to analyze the indexing is own idea, rather than the analysis of actual research work of scientists. Some people have found through experimental research; If the subjects of coword analysis were limited to headings, abstractions, and keyword fields, there would be a 21% error rate in the results of coword analysis. In view of the problems in the analysis method of cooccurrence network, such as the single node type and the difficulty in revealing the correlation or difference between concepts, the conceptual knowledge network is layered, and k-core is taken as the index to divide vocabulary into basic layer, middle layer and detail layer according to the semantic breadth expressed by vocabulary, so as to gradually materialize the semantic scope. So that each term can be used with the relationship between the upper nodes can induce the information of the research basis, through the relationship with the tree and the lower nodes to find related to their
Word Frequency Analysis and Intelligent Word Recognition
503
research, thus merge to form a new research subject, through the relationship with the lower nodes can discover their independent differentiation during the process of research and development of the new class.
3 Experiment The unknown word recognition system is the core of the work word, the word segmentation system for an application to the actual, requires not only meet the requirements of a certain on generality and practicability, but also for evaluation at each stage, and to determine its accuracy and efficiency is achieved to meet the requirements of actual information processing. Accuracy and recall rate are the main indicators to evaluate the performance of a word segmentation system, but there is a certain conflict between the two, to improve the accuracy, will generally lead to the reduction of recall rate, anyway, so some scholars put forward a value to comprehensively evaluate the performance of the two. The accuracy rate, recall rate and value are the three performance indexes to evaluate the accuracy of the word segmentation system. In order to ensure the accuracy of the experimental results, all the corpus data used in the experiment came from a forum, and the corpus size was 1 word. The training corpus was identified and marked by artificial unregistered words to compare the test results, and all the results were averaged by multiple tests. The corpus acquisition module of this paper was used to capture the web pages of tianya forum, and 242 HTML pages were captured, which took 7300 time.
4 Discuss 4.1
Experimental Results and Analysis
In this paper, Samet algorithm, Schrack algorithm and 0–1 exchange three different algorithms were used to carry out collision detection experiments between light and octree leaf nodes in different scenes. From the test statistics in Table 1, it can be seen that the efficiency of 0–1 interchange algorithm is more than ten times higher than that of Samet algorithm, and because Samet algorithm is a kind of search algorithm, its collision detection time will increase with the increase of octree nodes, while 0–1 interchange algorithm does not. As shown in Fig. 1, the 0–1 interchange algorithm does not involve complicated calculation process. Compared with the Schrack algorithm, the time consumption in the experimental scenario is the least efficient, which is 3.97 times higher and 6.12 times higher at most. In most scenarios, the efficiency is 4–5 times higher.
504
C. Liu Table 1. Efficiency comparison of different algorithms
Number of triangular faces 8284 12716 17180 39372 29964
9000 8000 7000 6000 5000 4000 3000 2000 1000 0
Samet algorithm
Schrack algorithm
543 601 694 2451 1435
263 259 235 504 321
0–1 interchange algorithm 43 47 52 127 71
The efficiency ratio of 0– 1 to the Schrack algorithm 6.12 5.51 4.52 3.97 4.52
8284
543 Number of triangular faces
Samet algorithm
263 Schrack algorithm
43
6.12
The efficiency 0-1 interchange ratio of 0-1 to algorithm the Schrack algorithm
Fig. 1. Comparison of efficiency data
4.2
Word Frequency Analysis Hotspot
This paper carefully sorts out the “word frequency-hot” articles in China, and analyzes and summarizes the current development of “word frequency-hot” articles in China. This paper analyzes and summarizes the current “word frequency - hot” class of commonly used high-frequency word definition; Taking the three main methods as examples, samples from the field of personal knowledge management were substituted for comparison verification to prove the influence of different values of high-frequency words on content analysis. Compared with other methods, the 80/20 rule is more suitable for high-frequency word selection. At the same time, it is pointed out that there are many problems in the selection of high frequency words, such as strong subjectivity, unclear method and principle, and unclear applicability of applied formulas. Secondly, taking the time sequence as the clue, this paper summarizes the changes and characteristics of the research methods used in the “word frequency-hotspot” articles in China. The current writing mode of “word frequency-hot” articles in China is basically composed of four methods: word frequency, coword, multidimensional scale and knowledge map. “Word frequency - hot” analysis of the most important means of
Word Frequency Analysis and Intelligent Word Recognition
505
analysis from the original word frequency analysis, to the main derivation method. Word frequency analysis is only used as the basic method of data processing. Chinese “word frequency - hot” articles, born in the field of medical intelligence, developed in the field of picture situation, by picture situation spread in management, agriculture, communication and many other fields. The division of disciplines is becoming more and more refined, the diffusion rate is becoming faster and faster, and the research methods are being used more and more. However, while spreading, it pays too much attention to the use of diversified methods and ignores the disclosure of content information. The simple and mechanical application of the stereotyped writing method limits the research significance and future development of such articles. In short, there is an obvious phenomenon in Chinese “word frequency-hot” articles that emphasis on the application of methods rather than the analysis and carding, which can be reflected in the three main parts of high-frequency word selection, method timing analysis and discipline diffusion analysis. At present, there are still many problems in the application of the word frequency analysis method. To promote Chinese scholars to pay more attention to the internal theoretical research and standardized use of word frequency analysis methods, and to provide useful reference for the reasonable and appropriate application of word frequency analysis methods in China’s scientific research in the future, so that it can better develop and spread in China’s academic circle.
5 Conclusion Chinese automatic word segmentation technology is the basis of Chinese information processing technology research, the Chinese automatic word segmentation as the first step in natural language processing, are faced with the bottleneck of the unknown word recognition problem, with the development of the society and the progress of technology, the number of new words from the emergence of more aggravate the burden on to identify the unknown words, how to effectively increase performance to identify the unknown words to Chinese automatic word segmentation and Chinese information processing technology. On the basis of studying the status quo of unregistered words recognition, this paper puts forward an unregistered words recognition method based on dictionary and word frequency analysis, in order to improve the recognition effect of unregistered words. The effectiveness of this method is verified by a large number of word segmentation tests.
References 1. Li, M.-F., Gao, X.-Y., Chou, T.-L.: Neighborhood frequency effect in Chinese word recognition: evidence from naming and lexical decision. J. Psycholinguist. Res. 46(1), 227– 245 (2017) 2. Zhao, Q., Zhang, H., Zhao, X.: Fuzzy clustering image segmentation based on neighborhood constrained Gaussian mixture model. Pattern Recogn. Artif. Intell. 30(3), 214–223 (2017)
506
C. Liu
3. Merino, E.R., Castrillejo, F.M., Pin, J.D.: Neighborhood-based stopping criterion for contrastive divergence. IEEE Trans. Neural Netw. Learn. Syst. 29(7), 2695–2704 (2018) 4. Nair, V.K.K., Biedermann, B., Nickels, L.: Understanding bilingual word learning: the role of phonotactic probability and phonological neighborhood density. J. Speech Lang. Hear. Res. 60(12), 1 (2017) 5. Sousa, C., Mason, W.A., Herrenkohl, T.I.: Direct and indirect effects of child abuse and environmental stress: a lifecourse perspective on adversity and depressive symptoms. American J. Orthopsychiatry 88(2), 180 (2017) 6. Rahman, M.T., Hosey, A., Guo, Z.: Systematic correlation and cell neighborhood analysis of SRAM PUF for robust and unique key generation. J. Hardware Syst. Secur. 1(2), 137–155 (2017) 7. Wang, D., Tan, X.: Bayesian neighborhood component analysis. IEEE Trans. Neural Netw. Learn. Syst. 29(7), 3140–3151 (2017) 8. Li, S., Liu, X., Chen, Y.: Measurement and performance analysis of functional neural network. Sheng wu yi xue gong cheng xue za zhi = Journal of biomedical engineering = Shengwu yixue gongchengxue zazhi 35(2), 258–265 (2018) 9. Reinhart, W.F.: Athanassios Z Panagiotopoulos Multi-atom pattern analysis for binary superlattices. Soft Matter 13(38), 6803–6809 (2017) 10. Husain, S.S., Bober, M.: Improving large-scale image retrieval through robust aggregation of local descriptors. IEEE Trans. Pattern Anal. Mach. Intell. 39(9), 1783–1796 (2017) 11. Huang, H., Shen, F., Cai, Z.-Q.: Video abstract system based on spatial-temporal neighborhood trajectory analysis algorithm. Multimed. Tools Appl. 77(99), 1–18 (2018) 12. Deng, S., Tang, L., Zhang, X.: Research of adaptive neighborhood incremental principal component analysis and locality preserving projection manifold learning algorithm. J. Shanghai Jiaotong Univ. (Sci.) 23(2), 269–275 (2018)
A New Representation of Plane Composition in Computer Graphics Software Aided Design Dongmei Zhang(&) School of Fashion Engineering, Jilin Engineering Normal University, Changchun, China [email protected]
Abstract. Plane composition is one of the basic theories of professional design. Before the development of computer technology, manual drawing was usually adopted as the main method of plane composition design, which was less efficient in the traditional way. The appearance and development of computer graphics provide efficient and convenient design methods for plane composition design. Computer graphics software not only improves the efficiency of plane composition design, but also improves the accuracy of data in the process of plane composition design. However, at present, people’s understanding of the plane composition of computer graphics software aided design is not deep enough, which affects the deep combination of the two. The purpose of this paper is to explore the new manifestation of plane composition in computer graphics software aided design and to promote the further application of computer graphics in the development of plane composition. In this paper, firstly, the definition and relationship between plane constitution and computer graphics software are summarized, and the plane extraction algorithm is used to calculate the design time of plane constitution under computer graphics software. Then, by means of the plane constitution experiment of computer graphics, the data analysis is carried out, and the new expression of plane constitution produced by computer graphics aided design is obtained. The experimental results show that the plane composition has produced many new expressions and changed the plane composition design method. Keywords: Plane composition Computer graphics Assistant design Plane extraction
1 Introduction Generally, As one of the “three components” in design, plane composition occupies an irreplaceable position in modeling design. Manual drawing is a common way of plane composition design. This traditional hand-drawing method not only takes time and effort but also cannot strictly guarantee the accuracy of design data, which leads to low efficiency of design work. With the continuous development of information technology and computer technology, manual drawing is gradually replaced by computer drawing, computer drawing software-aided design is gradually rising, the application of this technology has become the main means of plane composition design. Computer graphics is mainly by means of mathematical modeling, input planar design parameters © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 507–513, 2021. https://doi.org/10.1007/978-3-030-51431-0_74
508
D. Zhang
required in the computer, the computer in accordance with the relevant parameters for autonomic computing, and finally on the computer screen to show the final design of planar formation, designers to choose according to need and copy, and even can be like a plate of operation. This software works efficiently, and the request to the designer is relatively low, simple and easy to learn. At present, the aid design method has been gradually applied to various design fields, in the long run, will also maintain a good momentum of development. However, we must also realize that there are some problems in the design of the plane constitution aided by computer graphics software. At present, domestic and foreign scholars have made a series of researches on plane composition, computer graphics and their applications. This article refer to a large number of relevant research data sorting and research on these data, find the current studies of plane composition and computer graphics and its applications are mainly concentrated in the field of computer graphics in the design of the overall application, plane composition teaching and the manifestation in the field of plane composition in different design aspects such as [1, 2]. There are few researches on the application of cad in a specific design field, especially on the new representation of plane composition in cad. Therefore, from this point of view, there is still a large room for improvement in this research [3, 4]. In order to make up for this theoretical gap, it is necessary to explore the new performance of plane composition in computer graphics software aided design. In this paper, firstly, the definition and relationship between plane constitution and computer graphics software are summarized, and the plane extraction algorithm is used to calculate the design time of plane constitution under computer graphics software. Then, data analysis is carried out by means of the plane constitution experiment of computer graphics, and new expressions of plane constitution generated by computer graphics aided design are obtained [5, 6]. On the one hand, this study has promoted designers’ new understanding of plane composition and expression forms and promoted the deep fusion between the two. On the other hand, it also provides a certain theoretical basis for future research in related aspects [7].
2 Method 2.1
Plane Composition and Computer-Aided Design of Graphics Software
Plane structure is based on two-dimensional plane, with the help of three visual elements: point, line and surface, relevant forms are constructed according to certain combination rules. On the basis of rational design thinking and concept, an ideal plane structure design is produced. The combination of plane composition and computer graphics software-aided design is the inevitable result of social productivity and technological development, reflecting the progressive trend of The Times [8, 9]. Computer graphics software aided design has replaced the traditional hand-drawn plane composition design, which is mainly determined by its own advantages. In essence, computer drawing is a computer-aided drawing mode. The operator only needs to input parameters to the computer for automatic drawing, which has a powerful man-machine
A New Representation of Plane Composition
509
dialogue function [10, 11]. Computer graphics software aided design can not only be applied in the teaching of plane composition design, but also can be directly applied in advertising, clothing, books and other design industries. Computer graphics software is classified according to drawing methods and principles, which can be divided into image processing software and graphics processing software [12, 13]. The image processing software presents real and natural effects, among which the most representative image processing software is Adobe Photoshop; Graphics processing software USES Numbers to describe graphics objects. Although it can change the size of graphics at will, it is far less effective than image processing software in rendering effect. Intelligence is used for drawing simple patterns [14, 15]. 2.2
Plane Extraction Algorithm
Plane composition is the most common geometric structure in design. Plane extraction enables the effective extraction of plane composition data with the help of computer technology to realize the detection and application of plane composition targets. In the plane extraction algorithm, the key is to sample the smallest subset. In the iterative process of the plane extraction algorithm, a random sampling subset will be generated from the total data set of China, and then the cyclic estimation and confirmation of parameters will be realized on this basis. In the process of each cycle, a new judgment will be made on the residual set. The specific calculation formula is as follows: Ttrad ¼ wðq 3Þt1
ð1Þ
where t1 represents the time required for the distance from a point to the plane, q represents all the points included in the plane constitution, and w represents the number of times required to extract qualified points. In order to further improve the efficiency of plane extraction, the algorithm is improved in this paper. The improved algorithm requires the following time for plane extraction: Tnow ¼ wðm1 þ m2 þ m3Þt1 þ ðq 3Þt1
ð2Þ
Where m1 + m2 + m3 = q. The improved plane extraction algorithm will show greater advantages with the gradual increase of w, and The Times of plane extraction are inversely proportional to the extraction time. That is, the more times extracted, the shorter the plane extraction time. This algorithm not only shortens the operation time, but also guarantees the accuracy of the results.
3 Plane Composition Experiment with Computer Graphics Software The first step is the selection of experimental objects and the design of experimental process. In this paper, designers from a design company are taken as the main experimental objects, and a total of 62 designers participate in the experiment. Here, the
510
D. Zhang
above experimental subjects are divided into two groups: one group is hand-drawn plane composition design, the other is computer graphics aided design. The real object images of the two groups are represented by A and B respectively, where A represents computer graphics aided design for the experimental group, and B represents handdrawn plane composition design for the control group. The two groups were tested by plane composition design under different technical means. The second step is to determine the experimental research method. In this paper, the research methods, such as literature survey, interview and questionnaire survey, were mainly used to conduct the experiment. In the early stage of the experiment, in-depth research was conducted on the understanding and understanding of plane composition of the designers of the design company, and the designers’ understanding of plane composition was obtained. And with the help of the existing literature, to determine the specific experimental content. The experimental group analyzed a series of data obtained in the experiment by means of relevant mathematical statistical method theory and MATLAB software. The third step is the analysis and discussion of experimental results. With the aid of the plane extraction algorithm, the relevant conclusion is drawn on the basis of the analysis of experimental data, and the conclusion is verified, and the specific new manifestation of the composition of the lower plane is obtained.
4 Discuss 4.1
Experimental Results and Discussion
Through the plane extraction algorithm and the above experiments, we can draw the conclusion that the computer-aided design of drawing software improves the efficiency and accuracy of the design of plane composition, and thus gives rise to a new performance of plane composition. The specific experimental results are shown in Table 1 and Fig. 1. The data in the chart are the results of the author’s experimental arrangement. Table 1. MATLAB operation data of computer graphics software aided design Ajz0= 82.5 87.3 119 89 Bjz0= 69.8 71.4 116 171 Afc0= 3.6 2.5 5 3 Bfc0= 3.3 4.2 5 6 H= 0 1 0 1 *Data came from the in-depth analysis of financial data in the experiment
A New Representation of Plane Composition
511
189
200
152 150 100
83.29
88.24
50 0 Score
Time(minutes) A
B
Fig. 1. Comparison of results and completion time of design works in group A and group B
From the data analysis in Fig. 1 and Table 1, we can draw the conclusion that the score of the lower plane composition of the traditional hand-drawn group design is significantly lower than that of the computer graphics software, and the time spent on the computer-aided design of the computer graphics software is also less than that of the traditional hand-drawn group design. This indicates that the work efficiency of computer-aided design in plane composition design has been improved, and the performance effect of plane composition is far higher than that of traditional manual drawing. 4.2
New Expression of Plane Composition
(1) Repetition constitutes a new manifestation The repetition structure of computer graphics is very different from that of traditional manual graphics and presents a new form of expression. Under the traditional hand drawing method, the repeating structure of the plane structure is identical in unit shape. Repetitive construction in computer graphics mainly refers to the design picture is divided into many different small units, the same or similar unit shape together to form each small unit. In addition, there will be a few units of the graphics will change, called specific changes. Graphics within specific units are quite different, but programming and traditional duplication have similarities. (2) Divergence constitutes a new manifestation Divergent formation refers to the formation of a plane with a certain point as the core, that is, the plane is divided into many small units by means of coordinates. In the computer drawing software, since the computer drawing can establish the spatial coordinates, it can establish the coordinate value corresponding to the graph by means of coordinates. In general, the plane structure of computer software-aided design usually establishes the one-to-one correspondence between graphics and Numbers by
512
D. Zhang
means of coordinates, and then converts it into a plane structure by means of correspondence. It is difficult to establish polar coordinates in manual drawing, so it is difficult to form this kind of divergent composition in manual drawing. (3) Gradual changes constitute new performance The gradual change of the size, distance and other factors within the scope of a graphic unit is not a sudden change, but a gradual change. The division of gradient composition in traditional hand-painted planar composition design is not particularly strict, and some diverging and repeating compositions are also included in the gradient composition. In the computer aided drawing design, the drawing composed of gradient presents different forms of expression. The key point of gradient composition in computer drawing is to search for the rule of gradient. By mastering the gradient rule, different gradient composition drawing models are established and corresponding composition programs are established.
5 Conclusion Computer graphics software aided design provides a new technical means and methods for plane composition design, which not only improves the design efficiency of plane composition but also improves the accuracy of design data, and at the same time makes plane composition design have a new performance and promotes the innovation of plane composition design. However, there are still many problems in the application of computer graphics software aided design in plane composition, the most important problem is the lack of understanding of the new representation of plane composition. Deepening the understanding of the new expression of plane constitution can promote the further development of plane constitution design.
References 1. Dayananda, M.A.: Average effective interdiffusion coefficients and the Matano plane composition. Metall. & Mater. Trans. A 27(9), 2504–2509 (2017) 2. Zheng, S., Sun, L., Yin, T.: Monolayers of WxMo1 − xS2 alloy heterostructure with inplane composition variations. Appl. Phys. Lett. 106(6), 063113 (2017) 3. Liping, B.A.I.: Plane composition and figure originality—Reflection on the plane composition teaching reform from the practice of traditional Chinese figures. J. Huangshi Inst. Technol. 31(13), 117–119 (2018) 4. Wang, T.-C., Ko, T.-S., Tien-Chang, L.: Internal quantum efficiency behavior of a-plane and c-plane InGaN GaN multiple quantum well with different indium compositions. Physica Status Solidi 5(6), 247–251 (2018) 5. Müller-Buschbaum, P., Gutmann, J.S., Cubitt, R.: Probing the in-plane composition of thin polymer films with grazing-incidence small-angle neutron scattering and atomic force microscopy. Colloid Polym. Sci. 27(12), 1193–1199 (2017) 6. Laramee, R.S.: Comparing and evaluating computer graphics and visualization software. Softw. Pract. & Exp. 38(7), 735–760 (2018)
A New Representation of Plane Composition
513
7. Taylor, E.F.: Space-time software: computer graphics utilities in special relativity. Am. J. Phys. 57(6), 508 (2017) 8. Mercando, A.D.: Creating slide presentations using computer grapzhics software. Pacing & Clin. Electrophysiol. Pace 16(31), 483–487 (2017) 9. Martin, J.W.: Computer graphics software workshop report. Comput. Graph. Forum 1(1), 154 (2018) 10. Brown, S.: Exploring low-cost computer graphics software. J. Audiov. Media Med. 10(2), 52–58 (2017) 11. Warner, J.R.: Principles of device-independent computer graphics software. IEEE Comput. Graphics Appl. 1(4), 85–100 (2017) 12. Mudur, S.P., Gopalsamy, S., Shikhare, D.: Computer graphics around the world: graphics research at National Centre for Software Technology in India. Acm Siggraph Comput. Graph. 33(1), 21–25 (2018) 13. Frolov, V.A., Sanzharov, V.V.: Modern problems of software integration in computer graphics applications and ways to solve them. Program. & Comput. Softw. 44(4), 233–239 (2017) 14. Lavey, W.G.: Legal protection of computer graphics software. IEEE Comput. Graphics Appl. 3(1), 11–21 (2017) 15. Vidmar, Ž., Hladnik, A., Tomc, H.G.: Performance assessment of three rendering engines in 3D computer graphics software. Acta Graph. J. Print. Sci. & Graph. Commun. 32(16), 117– 128 (2017)
Optimization of Maintenance Strategy for Deteriorated Parts Based on Markov Chain Li Jiuchao1, Liang Zhou2, and Qi Ou1(&) 1
2
Army Academy of Amored Forces, Changchun, China [email protected] Equipment Project Management Center, Beijing, China
Abstract. Aiming at the problem of low efficiency of maintenance support of traditional deteriorated components, an optimization model of maintenance strategy based on Markov chain is proposed. According to the exponential distribution of life cycle and state transition time, the equipment degradation failure state is divided into several States, and the optimal detection cycle and maintenance threshold are determined by model analysis to minimize the overall maintenance cost of the system. Keywords: Markov chain Deterioration failure Maintenance threshold Life cycle
Detection cycle
1 Introduction At present, most of the equipment is composed of mechanical hydraulic and electronic parts, and its failure types are mainly two types: impact failure and degradation failure [1, 2]. It is difficult to predict impact failure, so post maintenance is basically adopted; the deteriorated failure parts can be detected by detection, and regular preventive maintenance and post maintenance can be adopted. With the complexity of the enhanced structure of the machine function, the loss of the system caused by the failure shutdown is more and more big [3–5]. It is difficult to meet the requirements of the system by using regular preventive maintenance or after maintenance. Scholars at home and abroad have carried out a lot of research on this problem [6–9]. Yang introduced the reliability constraints, established the maintenance cost optimization model, and obtained the best preventive maintenance strategy considering the relationship between maintenance cost and reliability [10, 11]. Zhang Zhuoqi established an analytical model of expected maintenance cost rate by updating the process theory based on the consideration of type fault correlation, and determined the optimal opportunity maintenance strategy with the lowest expected cost rate of the system as the optimization objective. By increasing the threshold of opportunity maintenance, Cheng Zhijun combines the maintenance control parameters of time and status in different measurement spaces, and proposes a kind of situation based maintenance optimization model based on opportunity strategy, which solves the comprehensive optimization problem of system level after maintenance and situation based maintenance [12, 13]. In order to minimize the overall maintenance cost and maximize the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 514–520, 2021. https://doi.org/10.1007/978-3-030-51431-0_75
Optimization of Maintenance Strategy for Deteriorated Parts Based on Markov Chain
515
effectiveness of the system, Wang Lingzhi established the optimization model of group preventive maintenance strategy for multiple components, and put forward the optimal preventive maintenance strategy for each single component of the production equipment.
2 Model Construction of Deteriorated Failure Parts 2.1
Basic Assumptions of Model Construction
(1) During equipment detection, preventive maintenance and replacement maintenance, no secondary failure will occur to the equipment, and all maintenance can make the equipment as new as ever; (2) Due to the shortage of spare parts and maintenance force, the waiting time of equipment shall be included in the preventive maintenance/replacement maintenance of equipment, and shall not be considered separately; (3) Equipment degradation is irreversible, and the improvement of working condition of components due to running in between equipment is not considered. 2.2
Model Construction Based on Markov Chain
In the process of equipment maintenance, there is such a phenomenon: when the state of the process is known, the state of the system is independent of the state of the former system. Such a process is called Markov process. The equipment degradation state is divided into N states. Assuming that the time of equipment staying in each state obeys the exponential distribution, the probability of which state the equipment is in at any time is only related to the state of the equipment in the last time. All States of the equipment constitute the equipment degradation failure state space I, according to the equipment state, detection time interval, state transition probability, maintenance decision The cost function constructs Markov five reorganization. i; ti ; Aðai Þ; pij ðAðai ; ti ÞÞ; S; i; j 2 I; ti ¼ 1; 2; 3; . . .
ð1Þ
The variables and symbols in the formula are as follows: (1) state I. I represents the state of the target component at the current time, consisting of N states. The nth state is the fault state, and the first n-1 states are the degradation state. All States of the component constitute the degradation failure state set I of the component. (2) interval variable Ti was detected. Ti represents the time interval between the next detection and the detection when the component is detected in state I. this variable is only related to the state of the current component.
516
L. Jiuchao et al.
(3) maintenance decision Represents the maintenance measures taken when the component is detected in state I, as follows: 8 >
: 2
ð2Þ
“0” means that the spare parts are in good condition and do not need to take any measures to simply maintain and continue to work; “1” means that the equipment status exceeds the preventive maintenance threshold and requires preventive maintenance; “2” means that the equipment is in fault state and needs to be stopped for replacement or restorative maintenance. (4) state transition matrix It represents the state transition matrix of preventive maintenance and fault maintenance under the condition of degradation failure. 8P 1 > pij ðtÞf ðtÞ > > > t¼0 > > >
t¼0 > > > > 1 P > > : pij ðtÞf ðtÞ
ai ¼ 0 ai ¼ 1
ð3Þ
ai ¼ 2
t¼0
Where, is the probability density distribution function of detection time, is the probability of equipment from state to state after time, and is the probability of equipment degradation failure state transfer under the condition of not considering detection, preventive maintenance and fault maintenance, which can be obtained by Kolmogorov forward/backward matrix. In the presence of preventive maintenance and fault maintenance, the degradation and failure status of equipment is as shown in the Fig. 1:
p1n p1i
p12 1
2
p11
p22
pij
p2i ...
i
pii
...
pin j
p jj
p jn ...
n
pnn
Fig. 1. Equipment degradation failure state transition diagram
Optimization of Maintenance Strategy for Deteriorated Parts Based on Markov Chain
517
In the figure, it is the states of the equipment and the state transition matrix after time. (5) cost function Under the condition of adopting maintenance strategy, the average cost of equipment in unit time from one state detection point to another state detection point consists of state detection cost, preventive maintenance cost, fault maintenance cost and downtime loss cost. 8 1 P > > ð1fin ðtÞÞÞ=t > ðCin þ Cd > > t¼1 > > > < 1 1 P P ð1 fpm ðtÞÞ þ Cpm Þ=t S ¼ ðCin þ Cd ð ð1fin ðtÞÞ þ > t¼1 t¼1 > > > > 1 > > > ðCin þ Cd ðP ð1fin ðtÞÞ þ Ccm Þ=t :
1 i\n; Aðai Þ ¼ 0 1 i\n; Aðai Þ ¼ 1 i ¼ n; Aðai Þ ¼ 2
t¼1
ð4Þ Where, is the cost of each machine detection, is the unit time downtime loss, is the probability density function of detection time, is the probability density function of preventive maintenance time, is the cost of each preventive maintenance, is the cost of fault replacement. Equipment is a long-term operation process. In order to achieve the lowest overall cost, we should build a criterion function to ensure the lowest overall cost of equipment support under the role of the criterion. V ¼ lim ð t!1
1 X
ðSÞÞ=t
ð5Þ
t¼1
3 Example Analysis Taking a component of a certain equipment as the research object, the degradation state is divided into six states, and the residence time in the first five states respectively obeys the exponential distribution with parameters of 5.0, 4.2, 3.2, 6.8 and 2.4. The sixth state is the fault state, the replacement maintenance is completed, and the fault state is eliminated. Suppose, use matlab to solve the problem iteratively. Get the relationship between the total cost and the test cycle, as shown in the Fig. 2:
518
L. Jiuchao et al.
Cost 700 600 500 (173,120)
400 300 200 100 0
30
60
90
120 150
180
210 240 Cycle
Fig. 2. Change of guarantee cost with test cycle 1
It can be seen from the figure that when preventive maintenance is carried out in the third deterioration state, when the test cycle is 173 days, the minimum guarantee cost is 120 yuan/d. with the increase of the test cycle, the guarantee cost increases slowly, but when the test cycle is less than 173 days, the guarantee cost increases sharply with the decrease of the test cycle. The curve can be changed as shown in the Fig. 3:
Cost 700 600 500 (173,250)
400
(173,200) (173,120)
300 200
C pm = 2300 ܗ C pm = 2150 ܗ C pm = 2000 ܗ
100 0
30
60
90
120 150 180 210 240
cycle
Fig. 3. Change of guarantee cost with test cycle 2
It can be seen from the figure that with the increase of preventive maintenance cost, the overall support cost also increases. With the shorter test cycle, the three curves tend to be the same. It shows that when the test cycle is shorter and shorter, the proportion of preventive maintenance cost and post maintenance cost is smaller and smaller, but the increase of preventive maintenance cost does not change the best monitoring cycle (Fig. 4).
Optimization of Maintenance Strategy for Deteriorated Parts Based on Markov Chain
519
Cost 700 600 500
Cin = 75;i = 2
400
(92,80)
300
Cin = 75;i = 4 Cin = 75;i = 3
200 100 0
30
60
90
120 150 180 210 240
Cycle
Fig. 4. Change of guarantee cost with test cycle 3
It can be seen from the figure that with the decrease of testing cost, the linear curve of support cost will be more concave, while the minimum support cost will be closer to the fault state. It shows that with the decrease of testing cost, the most effective support strategy will reduce the occurrence of preventive maintenance as much as possible through a large number of tests, so as to reduce the support cost.
4 Conclusion All the above researches are aimed at general distribution, and the effect is not ideal when the life and state transition time obey exponential distribution. In this paper, aiming at the exponential distribution of life and state transition time, a Markov chain based optimization model for opportunity maintenance of deteriorated components is constructed. The equipment is divided into N states and preventive maintenance and post maintenance are combined to minimize the overall support cost of the system.
References 1. Xu, J., Deng, Z., Gao, B., Song, Q., Tian, Z., Wang, Q., Gao, M., Niu, Z.: Popularity-driven strategy updating rule promotes cooperation in the spatial prisoner’s dilemma game. Appl. Math. Comput. 353 (2019) 2. Chan, D.W.M.: Sustainable building maintenance for safer and healthier cities: effective strategies for implementing the Mandatory Building Inspection Scheme (MBIS) in Hong Kong. J. Build. Eng. 24 (2019) 3. Dyr, T., Misiurski, P., Ziółkowska, K.: Costs and benefits of using buses fuelled by natural gas in public transport. J. Clean. Prod. 225 (2019) 4. Ghamlouch, H., Fouladirad, M., Grall, A.: The use of real option in condition-based maintenance scheduling for wind turbines with production and deterioration uncertainties. Reliab. Eng. Syst. Saf. 188 (2019) 5. Peng, R., Liu, B., Zhai, Q., Wang, W.: Optimal maintenance strategy for systems with two failure modes. Reliab. Eng. Syst. Saf. 188 (2019)
520
L. Jiuchao et al.
6. Ighravwe, D.E., Oke, S.A.: A multi-criteria decision-making framework for selecting a suitable maintenance strategy for public buildings using sustainability criteria. J. Build. Eng. 24 (2019) 7. Zhou, P., Yin, P.T.: An opportunistic condition-based maintenance strategy for offshore wind farm based on predictive analytics. Renew. Sustain. Energy Rev. 109 (2019) 8. Yu, C.H., Gall Casey, C., Ke, C., Lebovic, G., Straus, S.E.: Process evaluation of the diabetes Canada guidelines dissemination strategy using the Reach Effectiveness Adoption Implementation Maintenance (RE-AIM) Framework. Can. J. Diabetes 43(4) (2019) 9. Farquhar, I., Davies, J., Caumont, J., Keech, G., Loving, A.: Parametric modelling of EUDEMO remote maintenance strategies and concepts. Fusion Eng. Des. 145 (2019) 10. Syan, C.S., Ramsoobag, G.: Maintenance applications of multi-criteria optimization: a review. Reliab. Eng. Syst. Saf. (2019) 11. Anterrieu, O., Giroux, B., Gloaguen, E., Carde, C.: Non-destructive data assimilation as a tool to diagnose corrosion rate in reinforced concrete structures. J. Build. Eng. 23 (2019) 12. Li, C., Wang, C., Tang, H., Luo, Y.: Scalable and dynamic replica consistency maintenance for edge-cloud system. Futur. Gener. Comput. Syst. 101 (2019) 13. Autelitano, F., Rinaldi, M., Giuliani, F.: Winter highway maintenance strategies: are all the sodium chloride salts the same? Constr. Build. Mater. 226 (2019)
Digital Technology-Based Pedagogy for Interpreting Hui Ye(&) School of Foreign Languages, Hubei University of Science and Technology, Xianning, Hubei Province, China [email protected]
Abstract. In decades of interpreting training experience, some major problems were always noticed by the author: (1) Lack of made-to-measure materials; (2) fewer contact hours and insufficient practice hours; (3) lack of autonomous learning environment. In view of this, this article proposes an innovative pedagogy for interpreting training which is conducted on the basis of a digital interpreting laboratory incorporating various functions including providing made-to-measure training materials, real-world-like interpreting situations and autonomous learning environment. The design of the digital technology-based platform and application of it in interpreting training is demonstrated. Keywords: Technology Computer-assisted Pedagogy Interpreting training
1 Introduction New technology has helped updating and revolutionizing pedagogy for translation, with the wide application of a blended-learning method integrating online and offline learning in China recent years. However, application of new technologies in interpreting seems limited, except the limited use of them for getting video and audio materials online. 1.1
Problems in Interpreting Training in China
It is well recognized that interpreting is a demanding profession which needs excellent competence in multitasking. But now in china, a large gap is perceived between student interpreting competence and professional interpreting requirements. Major causes for the gap are mainly the following: 1) Lack of made-to-measure teaching materials. In China, unified curriculum and textbooks are commonly required in universities and colleges by the administration departments of higher education. It’s hard to meet the needs of various interests and levels of interpreting students. 2) Fewer contact hours. To improve the interpreting competence, the instructor and students should work together. Skill transfer requires the instruction of an expert in the classroom, as well as the deliberate and self-directed practice by students after class. This process usually takes hundreds of hours [1]. Certain hours of practice © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 521–527, 2021. https://doi.org/10.1007/978-3-030-51431-0_76
522
H. Ye
has long been advocated in interpreting training, which, however, seems not easy to be guaranteed in reality. 3) Lack of autonomous learning environment. Due to the limited hours of class contact, autonomous learning is always suggested in interpreting training. The skill of interpretation depends on the ability of the interpreter to cope with speeches with different accents and speeds [1]. How to create real-world contexts is always a headache for interpreting instructors. 1.2
Call for an Innovative Pedagogy for Interpreting Training
In face of the adoption of unified textbooks, interpreting instructors always find themselves in a dilemma of meeting the different personnel cultivation objectives and begin to realize that the most feasible way is to supplement various materials especially materials that serve the distinctive cultivation objectives of the school. For insufficient contact hours, autonomous practice is highly advocated by researchers and experts; they propose to encourage students to focus on self-study [2– 4]. The European Masters in Conference Interpreting (EMCI) program puts forward specific requirements. In one year, students need to attend 400-hours interpreting classes, and take part in team practice and self-directed practice which last for 600 h. Moser-Mercer believes that, in order to meet the professional requirements, one student need 3,000–5,000 h of deliberate practice [5]. But, sufficient hours of practice alone does not always help make professional interpreters. Professionalism is also vital for interpreter training. Trainers need to instruct in the classroom, take part in real-world interpreting, and stimulate students’ self-directed development. As Wang pointed out that, these methods can play a huge role in interpreter training, and provide students with the more authentic and realistic learning environment [1]. In view of this, this article proposes a solution of creating such real-world-like contexts by a new pedagogy which is conducted on the base of a digital interpreting laboratory incorporating various functions including providing tailored training materials, simulated real interpreting situation, and autonomous learning environment.
2 Building an Interpreting Training Platform with Unique Characteristics Hubei University of Science and Technology is a local college with an objective of cultivating practical personnel to meet mainly the local markets. Therefore, to cultivate personnel with local characteristics is distinctive from the objectives of other universities and colleges. This calls for a unique pedagogy with distinctive features in personnel cultivation. A personalized interpretation training platform based on our university’s simultaneous interpretation laboratory is designed for this purpose. The platform makes full use of up-to-date equipment, modern technologies, schoolenterprise cooperation and on-site interpretation corpora.
Digital Technology-Based Pedagogy for Interpreting
2.1
523
Creation of a Personalized Interpreting Training Platform
To optimize our pedagogy for interpreting, we made a try to build an innovative platform by integrating our device of laboratory. (1) Digital interpreting laboratory To update the teaching equipment, we set up a digital translation and interpreting laboratory in 2015. It has been equipped with up-to-date computers, CAT softwares like Trados, Déjà vu and a school-enterprise cooperation translation training system provided by Trasn Company, a famous translation company in China. Great progress has yielded from the training system in professionalism of translation competence of our students. In comparison, professionalism of interpreting becomes a concern for translation and interpreting majors. Thus, we began to seek school-enterprise cooperation in interpreting training. Yuyi interpreting training software package is obtained against such a background recently and a personalized interpretation training platform was created on the base of the software package. (2) Yuyi Interpreting Software Package With user-friendly functions combining self-study with a regular classroom curriculum, some notable interpreting software packages such as InterprIT [6], Melissi Black Box have gained good reputation in interpreting training [7]. In this project, the software package we choose is Yuyi Interpreting Software Package. It is an interpreting training software package developed jointly by Palmae Tech and Huazhong University of Science and Technology. It is a platform for interpreting teaching and learning with a large storage of video and audio interpreting materials as well as texts. It provides a training platform for real-time interpreting activities including activities of listening and interpreting, liaison interpreting, consecutive interpreting and simultaneous interpreting. It has a large pool of interpreting materials of various types and the storage can also be expended unlimitedly by adding materials to it. It can also be used for interpreting teaching and learning, tests and research. (3) Online materials The interpreting platform also allows for adding of downloaded materials or just the links of websites, which enables the creating of a blended pool of online and offline materials for interpreting classroom and autonomous practice. Instructors can add corresponding teaching materials for teaching and practice to meet the need of their teaching. (4) Self-built interpreting corpus The platform has a good compatibility by allowing the unlimited extention of material storage. To meet objectives of our personnel cultivation and course teaching, we add carefully selected materials according to teaching need. Some researchers hold the view that, the interpreting corpora can provide students with appropriate materials for exercise; information and communication technology tools give teachers an opportunity to instruct students after class [1, 8, 9].
524
2.2
H. Ye
Functions of the Platform
(1) Providing a platform for interpreting training The platform can be used for teaching activities including simultaneous interpreting, consecutive interpretation, interpreting tests and research. The teaching materials are well categorized and arranged according to our curriculum by modules like interpreting knowledge, skills, themes. A repository of recordings of real-world speeches and on-site interpretations helps instructors out of resource shortage. (2) Providing a platform for autonomous practice with simulated real-world interpreting contexts and self-monitored practice. The platform also an ideal place for students’ autonomous learning by providing rich authentic resources, role-play scenarios and self-monitoring functions. It provides a practice platform with rich corpus, multimedia technology and real-time interpreting playback and comparison. The virtual classroom means that students can work with an average multimedia computer, a set of headphones and a microphone can access the audio and video files provided by the interpreting laboratory for the virtual classroom, and practise their interpreting skills almost as easily. In the session, students can choose the practice materials and partners according their interests and willingness, thus helping increasing students’ independent practice time training effect. (3) Meeting the need of personalized personnel cultivation objectives Hubei University of Science and Technology is a local college which set its objective as serving the local personnel market need. The advantages of local city development lie in tourism with large international tourist events held every years, such as International Hot Spring Festival, International Tea Culture Festival, etc. Our school provide a large number of interpreting volunteers for such events every year. To meet the market need, we realize the necessity of setting up specific training program for personalized personnel. The feasible way is to embed real materials from such international events in the platform for teaching and practice. The corpus should be expanded to provide interpreting methods and materials with different levels, in order to meet the diversified requirements of students. The blendedlearning model which includes the peer-to-peer learning and evaluation method should also be considered to improve the learning effects.
3 Application of the Digital Technology-Based Platform The platform can be applied to interpreting classroom teaching and out-of-class autonomous practice for both consecutive interpreting and simultaneous interpreting. Inspired by what Markel stressed: We need to plan the curriculum carefully, emphasize the cohesion and coherence in assignment arrangement, monitor students’ learning progress in order to instruct them appropriately, and evaluate assignments with caution [10].
Digital Technology-Based Pedagogy for Interpreting
525
We developed a pedagogy for interpreting by fully utilizing the platform and digital technologies. The application can be simply demonstrated as below (Figs. 1, 2, 3, and 4): Step 1: Select teaching materials Step 2: Play the materials for consecutive interpeting/simultaneous interpreting practice Step 3: make recordings of students’ interpretation and monitor the process Step 4: Play students’ recordings and analyzing them Step 5: Assign autonomous learning tasks Step 6: Give feedback to the tasks
Fig. 1. Material selecting
Fig. 2. Consecutive interpreting practice
526
H. Ye
Fig. 3. Simultaneous interpreting practice
Fig. 4. Autonomous learning
4 Conclusion The 6-step pedagogy for interpreting training based on our digital laboratory offers an effective solution for major problems in our interpreting which has long been a headache for instructors. It helps our instructors out of the shortage of resources, facilitates teaching, learning and assessment and arises students’ interests and passion in autonomous learning, thus increasing our teaching effect. Acknowledgements. In this paper, the research was sponsored by Youth Project of Humanities and Social Sciences Fund of Hubei Provincial Department of Education (No. 17Q173) and Hubei University of Science and Technology Fund (NO. 2016-XB-030).
References 1. Wang, B.: Bridging the gap between interpreting classrooms and real-world interpreting. Int. J. Interpret. Educ. 7(1), 65–73 (2015) 2. Kiraly, D.: A Social Constructivist Approach to Translator Education: Empowerment from Theory to Practice. St. Jerome (2000)
Digital Technology-Based Pedagogy for Interpreting
527
3. Johnson, D.W., Johnson, R.T.: Learning Together and Alone. Prentice Hall (1991) 4. Inge, G.H., Miriam, S.: The silver lining: technology and self-study in the interpreting classroom. Interpreting 9(1), 95–118 (2007) 5. Moser-Mercer, B.: The acquisition of interpreting skills. In: Signed-Language Interpretation and Training: Theoretical and Practical Aspects, pp. 57–62. Edizioni Università di Trieste (2000) 6. Merlini, R.: InterprIT—consecutive interpretation module. Interpreters’ Newsl. 7, 31–41 (1996) 7. Sandrelli, A.: New technologies in interpreter training: CAIT. In: Textolo-gie und Translation, pp. 261–293. Gunter Narr (2003) 8. Crezee, I., Burn, J., Gailani, N.: Authentic audiovisual resources to actualise legal interpreting education. Monogr. Transl. Interpret. 7, 273–291 (2015) 9. Ritsos, P.D., Gittins, R., Braun, S., Slater, C., Roberts, J.C.: Training interpreters using virtual worlds. Trans. Comput. Sci. XVIII 7848, 21–40 (2013) 10. Markel, M.: Distance education and the myth of the new pedagogy. J. Bus. Tech. Commun. 13(2), 208–222 (1999)
The Virtual Restoration of Worship Scene on Circular Mound Altar LeiFang Chu(&) Shanghai University of Engineering Science, 333 Longteng Road, Songjiang District, Shanghai, China [email protected]
Abstract. The culture of ancient buildings is the accumulation of the history of various nationalities, bearing rich traditional culture and social history. The architectural culture of tang dynasty is the embodiment of the architectural culture of han and tang dynasties. Nowadays, only a few buildings such as the temple of heaven and zhuque gate are left over from the site of worship in tang dynasty. It is urgent to protect these ancient buildings that have disappeared and will soon disappear. Through the textual research on the temple of heaven site park in Chang’an city of Sui and Tang Dynasties, according to the spatial form and ritual order of the temple of heaven in Sui and Tang Dynasties, the paper explores its cultural heritage, combines the traditional round hill sacrificial culture with three-dimensional technology and virtual technology, displays the sacrificial culture in the form of digital multimedia, and inherits the history. Keywords: Worship on circular mound altar
Virtual reality 3D modeling
1 Introduction In recent years, virtual restore technology has shown an exponential growth. From 200000 virtual active users in 2014 to 90 million active users last year, the output value of virtual restore technology has reached 5.2 billion US dollars. As a more and more mainstream technology in recent years, there are more and more products combining traditional culture with virtual reduction technology, such as virtual restoration of Yuanmingyuan Imperial Garden in Ruins of Yuanmingyuan, which shows people the beautiful scene when Yuanmingyuan Imperial Garden is not burned. Applying virtual reduction technology to traditional culture can reproduce the scene of China in the past, make people feel the charm of Chinese traditional culture and inject new vitality into traditional culture [1–3]. As a carrier of information, the application ability of virtual reduction technology combined with traditional culture to protect and promote traditional culture should not be underestimated. Virtual reduction technology has a sense of participation and interactive ability, which can transform static Art (such as oil painting, sculpture, etc.) into dynamic, and enable people to better appreciate traditional Chinese culture. Virtual reduction technology can also improve the performance of traditional culture. Because the virtual restoration technology can reproduce the real ancient scene, and people can participate in the interaction in the virtual restoration scene, through the intuitive © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 528–534, 2021. https://doi.org/10.1007/978-3-030-51431-0_77
The Virtual Restoration of Worship Scene
529
experience to get all kinds of cultural information displayed in the ancient scene. For example, Dunhuang “nine story building” real scene and virtual three-dimensional effect. The combination of virtual reduction technology and traditional culture can reproduce all major scenes in China’s vast history, enabling people to see and experience the glory of China’s history.
2 Interpretation of Worship Scene on Circular Mound Altar From the beginning of Zhou Gong’s system of rites and music, rites and rites have long become the most important and core part of Chinese traditional culture. Among all the rites, it’s very important to show the winter solstice round hills for heaven’s gratitude and blessing in the coming year. However, since modern times, the Chinese traditional culture of worshiping the heaven has gradually lost over time, and the temple of heaven of Xi’an remains has been abandoned for a long time, so it is urgent to protect and restore it. Sacrifice is the most important national event in ancient China. In the twenty-four history, a special chapter was opened for it. The research method of literature research was used to study the worship of heaven in Tang Dynasty. Through the sorting and analysis of the materials and documents in Tang Dynasty, we can understand the relevant historical situation, restore the scene of Tang Dynasty, and look for a special chapter to explain sacrifice from various ancient books in Tang Dynasty. Including the relevant parts of the project. The main research method of this subject is to sort out these materials separately, through repeated content comparison and textual research, to obtain credible and real sacrificial information, to sort out these information, and then to carry out systematic analysis and research. A total of 20 emperors of Sui and Tang dynasties had made sacrifices to the temple of heaven. But it was abandoned after the Tang Dynasty. To this day, the temple of heaven remains. This is the earliest extant building in China where the emperor worships the heaven. Compared with the temple of heaven in the background, it is about 1000 years earlier. The temple of heaven site in Tang Dynasty is an important evidence for the study of ancient sacrificial rites, which is of great value for the study of the evolution of Chinese etiquette system [4–7]. The reconstruction of the ancient buildings that have disappeared can restore a lot of historical information, form a building database, display in the museum, provide data support for the film and television model in the film, show the brilliance and achievements of the ancient buildings of China to the audience, provide popular science education for the youth in history, and become important. Chinese cultural communication means.
3 Restoration of Worship Scene on Circular Mound Altar 3.1
Investigate and Survey
For the altar, the investigation method is used to study, and a large number of materials about the worship of heaven in Tang Dynasty are collected for analysis, synthesis,
530
L. Chu
comparison and induction. For the Tang Dynasty sacrificial ritual utensils to carry on the systematic research and the investigation, obtains the related use utensils the information. In the process of looking up ancient books and records, we found that the historiographers recorded the etiquette of Tang Dynasty, and revised the etiquette reference of Zhou Dynasty at that time. The two related books, the six ceremonies of the Tang Dynasty and the opening ceremony of the Tang Dynasty, can be seen in detail from the book about the introduction of the Tang Dynasty’s sacrifice to the heaven, from the process, to the sacrificial offerings, to the personnel, the guard of honor have a more detailed text description. In Tang Dynasty, the power of worshiping the heaven was huge, so the amount of restoration work was huge. In addition, due to the lack of matching between text and graphics, most of the information obtained is abstract. In order to make the restoration true and reliable, the research on the data is particularly important. Once the data is wrong, the restoration will not be true. In the stage of data research, find the data closest to the time point to ensure the reliability of the data. According to the description of heaven worship in the literature of Tang Dynasty, there are nine processes of heaven worship in the round hills of Tang Dynasty, specifically, offering sacrifices to sweep, to ascend the throne, to lay a memorial ceremony for jade and silk, to offer blood, to offer the first sacrifice, to offer the second sacrifice, to offer the last sacrifice, to burn and burn, to give the third sacrifice. In these processes, the most important is the making of the first sacrifice, because the first sacrifice is the process of the emperor worshiping the God of Haotian himself. Due to the large number of people involved in this process and the complexity of the process, this process will focus on production. 3.1.1 3D Reproduction Combining Maya software and V-Ray plug-in software, the content and size of the scene of ancient buildings are determined through preliminary investigation and research. After that, the data stored in Maya software will be made into a threedimensional model, combined with the previous research content, for overall adjustment, and then the production of sacrificial supplies, referring to the materials and colors of Tang Dynasty cultural relics displayed in the museum. Finally, import Maya plug-in V-Ray for batch rendering. Through three-dimensional technology, the architecture of Tang Dynasty is displayed in front of the public, and the best effect is achieved by rendering. Through the data of size, material and color, the model is built. In the rendering, adjust the light source, the treatment of reflection, the treatment of shadow, etc., take the altar of heaven sacrifice scene as the main building, and take Taiji hall and Chengtian gate, Zhuque gate, Mingde gate as the auxiliary to build the high reduction simulation building. In order to make a high-quality model and render the scene, it is necessary to analyze the changes of the shadow and the environment in combination with the characteristics of the architectural style, climate, weather, direct sunlight. In this process, we should not only reflect the architectural style of the Tang Dynasty, but also combine the cultural characteristics of the Tang Dynasty, and strive to restore the scene truly, so as to display the scene of the Tang Dynasty in front of the audience intuitively [8–10]. First of all, the site where the heaven worship was held in Tang Dynasty. According to the investigation, the site of the heaven worship in Tang Dynasty is the place built in
The Virtual Restoration of Worship Scene
531
Sui Dynasty - Huanqiu. The capital city of Sui and Tang Dynasties is Chang’an, that is, Xi’an now. By comparing the ancient Chang’an city with Xi’an now, the specific location of the temple of heaven is found. Although the temple of heaven is abandoned, it still remains. Chang’an Temple of heaven was built in the Sui Dynasty and abandoned in the late Tang Dynasty. It was called round hill in ancient times, also known as round hill, and later called the temple of heaven. It is located about 950 m east of Mingdemen site in Chang’an city of Tang Dynasty. The temple of heaven site covers an area of about 19.7 mu. It has four floors, all of which are of soil structure, with a height of eight meters. The diameter of the lowest floor is about 54 m from bottom to top, the diameter of the second floor is 40 m, the diameter of the third floor is 29 m, the diameter of the fourth floor is 20 m, and the height of each floor ranges from 1.5 m to 2.3 m (Fig. 1).
Fig. 1. Diagram of sacrificial device arrangement
Integrate the models in Maya, such as all kinds of animations, models, cameras, lights, which include all the nine processes of animation, as well as watching the whole process of animation from various angles. Export the animation of these processes in order, and the total amount of these animations is 10 min. The used renderer is the most mainstream one, vary. However, under the excellent rendering quality, there has been a criticism that the time of each frame rendering is very long, and the animation of this subject adopts the international standard of 24 frames per second, so it takes about 2 h to render each second. In this case, two methods are used to complete rendering. One is
532
L. Chu
to find as many machines as possible and start rendering at the same time. The second way is to find the online rendering workshop, but because the path of the model is too complex, there are many problems in the process of sorting out the effective path, so the second way, only part of the animation involving less models can be used. The rendering of animation takes a lot of time (Fig. 2).
Fig. 2. Virtual reduction of the tang dynasty circular mound altar
After the completion of the animation restoration, the next step is the virtual restoration of the sacrificial scene. Sort out the previously completed restoration scene in Maya separately and export an FBX file. When exporting FBX, pay attention to the retention and path of maps and other materials. The next step is to import the FBX of the whole scene into the project of making a virtual restore of unity. Because the material used in Maya is the vary material, and the vary material is a plug-in based on Max and Maya, which cannot be compatible in unity. Therefore, when FBX and map are imported into the project, one side mapping process needs to be performed again in unity to add basic materials to the model, so that we can In unity, the mapping effect of Maya is reproduced. In unit, various edits are made to the scene, mainly to pay attention to whether the map is lost. In addition, because the renderers used by unit are not the same as those used by Maya renderers, the parameters such as rendering need to be adjusted again, so as to get the best look of the scene and achieve the best restoration effect. After that is the complete virtual restore of the unit. After all the scene models are perfectly integrated into unity, use unity to adjust the detail parameters of relevant lens rendering, as well as the adjustment of light and shadow to present better light and shadow and color details. Then, use a special virtual restoration camera and connect the virtual device with unity software. However, due to the large number of details to be adjusted, the whole scene should be focused on unity. It’s a new adjustment, so it still takes a lot of time.
The Virtual Restoration of Worship Scene
533
4 Conclusion The combination of virtual restoration technology and traditional culture still has great development space. It will bring convenience to the protection and restoration of traditional culture in the future, such as the emergence of 360 degree virtual reality video. For the traditional culture communication, the combination of this technology and cultural communication can make people live in the real scene of ancient times and make the traditional culture more intuitive. This project of offering sacrifices to heaven is just an attempt in this respect. In addition to having a more real effect on scene restoration, virtual restoration technology can make the whole scene present a vertical or horizontal comparison through digital technology, and show the changes of thousands of years and different periods in front of people, which are impossible to be realized by traditional cultural protection means. In fact, many technology giants have started to encourage the development of virtual restore content in various ways; Google said in the virtual restore advertisement at the end of last year that it was willing to provide financial support for developers’ virtual restore content. Chinese traditional culture will also be an excellent direction for virtual restoration. The virtual restoration of sacrifice to heaven can make people feel the charm of traditional culture, show every detail of ancient sacrifice to heaven in front of people, spread Chinese traditional culture, show traditional culture in a new form, and inject new vitality into traditional culture. Under the situation of China’s increasing influence on the world, it not only affects the surrounding countries in the fields of economy, science and technology, but also influences the surrounding countries from the cultural field, restores the sacrificial ceremony culture in the traditional Chinese culture, and shows the world the cultural charm of China.
References 1. Xiao, Z., Deling, Y.: The “hyper-presence” of cultural heritage in shaping collective memory. Presence-Teleoperators Virtual Environ. 27, 107–135 (2019) 2. Ardizzone, E., Dindo, H., Mazzola, G.: A knowledge based architecture for the virtual restoration of ancient photos. Pattern Recogn. 74, 326–339 (2018) 3. Shang, Y., Zhang, S., Huo, Y., Wen, C.: The virtual reconstruction and interaction system of tomb of tang dynasty prince YiDe. In: 2018 8th International Conference on Virtual Reality and Visualization (ICVRV), vol. 8, pp. 146–147 (2018) 4. Gilanyi, A., Racz, A., Balint, M., Chmielewska, K.: Virtual reconstruction of historic monuments. In: 2018 9th IEEE International Conference on Cognitive Infocommunications (COGINFOCOM), vol. 9, pp. 341–345 (2018) 5. Debole, F., Hanif, M., Salerno, E., Savino, P., Tonazzini, A.: A first step towards NLP from digitized manuscripts: virtual restoration. In: 2018 IEEE 5th International Congress on Information Science and Technology (IEEE CIST’18), vol. 5, pp. 188–193 (2018) 6. Wen, C., Luo, X.: Virtual art experience on cultural heritage information with construction of evaluation criteria. In: Proceedings of the 2018 4th International Conference on Humanities and Social Science Research (ICHSSR 2018), vol. 213, pp. 447–452 (2018)
534
L. Chu
7. Koeva, M., Luleva, M., Maldjanski, P.: Integrating spherical panoramas and maps for visualization of cultural heritage objects using virtual reality technology. Sensors 17, 829 (2017) 8. Malinverni, E.S., Pierdicca, R., Colosi, F., Orazi, R.: Web tool as a virtual museum of ancient archaeological Ruins in Peru. Augment. Reality, Virtual Reality, Comput. Graph., AVR 2017, PT II 10325, 282–296 (2017) 9. Vesna, S., Budak, I., Obradovic, R., Korolija-Crkvenjakov, D., Santosi, Z.: Parametric modeling applied to the virtual reconstruction of the damaged sculpture of St John Nepomuk in Petrovaradin. ECAADE 2017: Shar. Comput. Knowledge! (Shock!) 2(35), 389–398 (2017) 10. Benamar, F.Z., Fauvet, E., Hostein, A., Laligant, O., Truchetet, F.: Toward a virtual reconstruction of an antique three-dimensional marble puzzle. J. Electron. Imaging 26, 109– 111 (2017)
Problems and Strategies of Financial Accounting Informationization of Small and Medium-Sized Enterprises Based on Artificial Intelligence Xingdong Zhang1 and Hua Cai2(&) 1
2
Business School, Tourism College of Changchun University, Changchun, Jilin, China College of Business Administration, Jilin Engineering Normal University, Changchun, Jilin, China [email protected]
Abstract. Through accurate computer calculation and data technology, it effectively strengthens accounting-related tasks and promotes the upgrading of the business content of the accounting industry. Accounting informatization is a mainstream trend in the current era, and it is also a landmark content for the construction of various industries. Any enterprise needs to do a good job of the content of accounting informatization in order to effectively deal with the increasingly complex economic structure, so as to allow enterprises to fund Maximize efficiency. Although accounting informatization has only appeared for a short period of more than ten years, it has had a certain impact on the traditional financial management of enterprises, resulting in difficulties in the development of financial management of enterprises. But after a period of running-in, the advantages that accounting informationization can bring will be more comprehensive. This article will start from the impact of accounting informatization on corporate financial management, and conduct a comprehensive study on the impact of accounting informatization on corporate financial management and its countermeasures. Keywords: Artificial intelligence Corporate financial management Financial accounting Financial informatization
1 Introduction With the rapid development of China’s economy, the number of various small and medium-sized enterprises has gradually increased. In the process of development and construction of small and medium-sized enterprises, internal financial accounting management is an important management tool. At present, there are still some problems in the financial accounting management of most small and medium-sized enterprises in China. These enterprises are mainly large and medium-sized enterprises, and there are quite a few medium-sized enterprises and many small enterprises. The level of informatization © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 535–540, 2021. https://doi.org/10.1007/978-3-030-51431-0_78
536
X. Zhang and H. Cai
remains at a low level [1, 2]. Some have not even implemented accounting informatization. The degree of implementation of accounting informationization in small and medium-sized enterprises has affected the further advancement of accounting informationization in China [3]. Theoretical and practical workers have proposed many solutions for this. A typical example is ASP (Application Service Provider). That is, the service provider puts its own application software on the server. Have responsibility for maintaining, managing software, providing technical support, etc. [4, 5]. The reason for the silence is that the conditions are immature, and the credit and security issues of service providers have restricted its development [6, 7]. Analysis, and then obtain relevant reports, to provide reference for management decisions [8, 9]. Nowadays, the development and progress of China’s accounting field are extremely obvious. The information technology has been continuously updated. The traditional artificial computing has entered the stage of proficient use of computers, especially the continuous influx of artificial intelligence concepts and the quantitative use of technology in recent years. The level of domain analysis and computing has been significantly improved, greatly saving corporate human, material and financial resources, and promoting the true use of management accounting in corporate management [10]. Based on this, in the context of artificial intelligence, this paper studies the financial accounting informationization problems and strategies of SMEs.
2 Method 2.1
Artificial Intelligence
The impact of accounting artificial intelligence on the development of the accounting industry is mostly positive and positive, including the positive impact on accounting work and the role of improving the overall quality of accounting personnel. The author believes that the positive role of accounting artificial intelligence includes the following points. (1) Improve accounting efficiency and reduce accounting labor costs and pressure At present, financial accounting, information supervision, data storage, and document management in the artificial intelligence era have been replaced by intelligent systems of network super memory and computing. In addition, under the state of artificial intelligence, the daily clearing business is not only more direct and punctual, but also can make targeted accounting treatments based on specific accounting objects and work characteristics. Improve the pertinence and convenience of accounting work. Applying artificial intelligence technology to the accounting industry to improve the effectiveness of information processing in the accounting industry [11, 12]. (2) Significantly improve the quality of accounting and auditing information The arrival of artificial intelligence will certainly break the division of labor and audit work to a large extent. After the implementation of artificial intelligence, the mechanical, single and repetitive financial problems existing in the artificial accounting environment, related manual positions can be eliminated or greatly simplified, and the
Problems and Strategies of Financial Accounting
537
streamlined financial personnel can be replaced by the accounting positions of plan operators or managers. This has broken the division of labor in the past financial situation. In addition, artificial intelligence will also have a great impact on audit work, such as breaking the division of labor model according to the type or nature of accounting business. 2.2
Enterprise Financial Management
For the definition of financial strategy, there is still no unified statement in China. In this article, this explanation is mainly carried out, that is, in a specific environment, with the help of the overall strategic goals of the enterprise, it is based on the actual situation of the enterprise, in order to To ensure its long-term sustainable development, as to the changes in its environmental factors, its requirements and impact on its financial activities are taken as the corresponding prerequisites, to further improve the effective utilization of corporate funds, and to effectively allocate resources. Develop more targeted financial solutions. From this definition, there are two important points of knowledge.
3 Experiment This article takes an enterprise as the research object. The main majors of the enterprise maintain the international advanced or domestic leading position in the fields of magnetoelectronics, microelectronics, microacoustic/inertial devices, and optoelectronics. Based on the existing specialty, it implements fusion innovation and system integration to vigorously develop microsystem Technology, in the three civil fields of communication / navigation electronics, automotive electronics, and smart electronics, the four major industries, magnetic materials and other electronic functional materials, chips and components, automotive electronics, sensors, and sensor network application services, have high competition. Power and a certain market share. As the global era of artificial intelligence is approaching, Sinochem International keeps pace with the times, and it has indeed researched and introduced robots to replace high-frequency, repetitive, long-term, and low-value-added manual operations, helping to improve the efficiency and quality of the shared center.
4 Discuss 4.1
Analysis of Enterprise Changes After the Introduction of Artificial Intelligence
(1) As shown in Table 1 and Fig. 1, a company is currently in a state of increasing debt. Bank lending is the most important source of debt funds for the company at this stage. Starting from 2015, the company is increasing its corresponding assets and liabilities year by year. Rate, but it is always controlled within the range of 50%, does not exceed the average level of the industry as a whole, and whether the average value
538
X. Zhang and H. Cai
of the quick ratio or the current ratio is maintained at a level greater than 2, which means that The company still has a strong level in debt repayment, so it does not need to pay corresponding attention to the commitment of financial risks. Table 1. Financial statements of the company Short-term loan (ten thousand yuan) Long-term loan (ten thousand yuan) Current ratio Quick ratio Asset-liability ratio (%)
12860 0.00 3.91 3.51 18.89
16900 0.00 2.49 2.32 20.96
16900 0.00 1.89 1.82 29.13
23102 0.00 2.47 2.31 41.12
50 41.12 40 29.13
30
20.96 18.89
20 10
1.2861.69 1.692.3102
3.91 2.49
1.89 2.47
3.51 2.32 1.82 2.31
0 Short-term borrowing
Current ratio
2015
Quick ratio
2016
2017
Asset-liability ratio (%)
2018
Fig. 1. Comparison of corporate financial situation
4.2
Suggestion
(1) Enterprise financial management should pay attention to the change of traditional management concepts In enterprises, traditional financial management of enterprises is completed by manpower. For enterprises, this work mode is time-consuming and labor-intensive, and there will be a lot of manpower costs. After the informatization of accounting emerged, the company discovered a brand-new financial management model for enterprises, mainly using computers to complete more operations, which greatly saved manpower. Under the current circumstances, in the enterprise financial management, the concepts that need to be changed can be divided into two contents: the first content is to fully realize the importance of data processing speed. China’s economic market has become more and more perfect. For companies, the seller’s market no longer exists, and competition among major companies has become more fierce. Which company can maximize the efficiency of capital use, which company can be at a disadvantage. Then in the enterprise financial management, the data processing needs to be completed quickly, and it is best to do it in real time to ensure that the enterprise data is ahead of the market. The second content is to fully recognize the changes in corporate financial management. In traditional enterprise financial management, it is mainly the recording of bills.
Problems and Strategies of Financial Accounting
539
(2) Enterprise financial management should focus on the strength of financial risk management The current enterprise financial management has undergone tremendous changes, and its traditional bookkeeping model is no longer suitable for enterprises. For the vast majority of enterprises, the tasks that corporate financial management needs to undertake are mainly to help enterprises reduce their financial situation as much as possible risk. Therefore, after accounting informationization is integrated into corporate financial management, it is necessary to further strengthen financial risk management content. There are two aspects to its specific strengthening. The first aspect is to strengthen the indicators for determining corporate financial risks. In traditional corporate financial management, due to the relationship between manpower, the judgment of corporate financial risk can only be judged from a single company’s remaining funds. This judgment is not comprehensive, accurate and often ineffective.
5 Conclusion Informatization of financial management for small and medium-sized enterprises cannot solve the problem with a model or a solution. The key to solving the financial management informatization of small and medium-sized enterprises is to choose the appropriate financial management informatization mode according to the types and characteristics of different enterprises, including the choice of application mode and the degree of informationization. It is necessary to carry out in-depth problem analysis in accordance with the actual situation of the enterprise, find the problem in a timely manner, properly handle it, take scientific and reasonable countermeasures, and implement it in place to ensure the long-term healthy development of SMEs.
References 1. Vanatta, S.H.: Charge account banking: a study of financial innovation in the 1950s. Enterp. & Soc. 19(2), 1–39 (2018) 2. Bekaert, G., Hodrick, R.: International financial management. Glob. Bus. 26(4), 98–127 (2018) 3. Ju, J., Li, L., Nie, G.: Nonlinear capital flow tax: capital flow management and financial crisis prevention in China. China & World Econ. 27(4), 1–28 (2019) 4. Bartfeld, J., Collins, J.M.: Food insecurity, financial shocks, and financial coping strategies among households with elementary school children in Wisconsin. J. Consum. Aff. 51(3), 519–548 (2017) 5. Leung, C.Y.W., Cheung, M.C., Charbonneau, L.F.: Financial impact of cancer drug wastage and potential cost savings from mitigation strategies. J. Oncol. Pract. 13(7) (2017): JOP.2017.022905 6. Koku, P.S., Acquaye, H.E.: Marketing dispossession: a strategy for financial services that considers customers’ mental health. Int. J. Bank Mark. 35(1), 112–127 (2017) 7. Tan, K.G., Yuan, R., Yoong, S.W.C.: Assessing development strategies of Jiangsu and Taiwan: a geweke causality analysis. Rev. Pac. Basin Financ. Mark. & Policies 20(7) (2017): 1750024
540
X. Zhang and H. Cai
8. Chiu, I.H.-Y.: A rational regulatory strategy for governing financial innovation. Soc. Sci. Electron. Publ. 8(4), 1–23 (2017) 9. de Souza, M.J.S., Ramos, D.G.F., Pena, M.G.: Examination of the profitability of technical analysis based on moving average strategies in BRICS. Financ. Innov. 4(1), 3 (2018) 10. Ismail, S., Faique, F.A., Bakri, M.H.: The role of financial self-efficacy scale in predicting financial behavior. Adv. Sci. Lett. 23(5), 4635–4639 (2017) 11. O’Neill, B., Xiao, J.J., Ensle, K.: Positive health and financial practices: does budgeting make a difference? J. Fam. & Consum. Sci. 109(2), 27–36 (2017) 12. Beaton, K., Dowling, T., Kovtun, D.: Problem loans in the Caribbean: determinants, impact and strategies for resolution. Imf Working Papers 17(230), 1 (2017)
Deep Integration of Mixed Teaching and Interactive Media Under Information Technology Caihong Chen(&) Fuzhou University of International Studies and Trade, Fuzhou 350202, China [email protected]
Abstract. Based on the modern information technology mean, the traditional teaching methods have changed, new models are emerging. Hybrid is not a new concept of teaching, and the integration of interactive media, using online online mode, the combination of online video, audio, classroom instruction, practice fusion and offline, greatly improve the effect of classroom teaching, but in the process of practical application, there are also many problems, such as for no teacher to supervise, online learning interaction and enthusiasm of the students is greatly reduced, as a result of online “half-hearted” normal operation of the classroom practice, etc., these problems need through relevant measures to improve, to give full play to its positive hybrid teaching. Keywords: Interactive media
Blended teaching Deep integration
1 Introduction The “Internet” + era has deeply integrated information technology with education and teaching, and has changed the learning model of students and the teaching methods of teachers [1]. There are many types of interactive media, such as MOOC, Love Course, Rain Class, Superstar Learning Link, Blue ink cloud and other new smart teaching tools. These platforms include WeChat platforms, web pages, and independent APP applications. These interactive media Under the mixed teaching mode, it can mainly solve the problems of low attendance, low learning interest, less interaction between teachers and students, and poor classroom teaching in the current vocational classroom teaching process [2]. The mixed teaching model can be multiple subjects and multiple courses, especially the courses that need to introduce a large number of case libraries. Take the accounting professional course “Advanced Financial Accounting” as an example. This course is known for its difficulty, problems, and levels. Because its content is esoteric, it needs a lot of cases to promote students’ grasp and understanding of theoretical knowledge. However, it takes a lot of time to simply teach the theoretical knowledge in the classroom. It is impossible to add a large number of cases under the premise of a certain class time. Therefore, in many cases, after-class exercises and cases are arranged for students to complete after class However, once you leave the classroom, it is impossible to know whether the students really did it themselves or whether they really understood. Therefore, with the help of interactive media, students can © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 541–546, 2021. https://doi.org/10.1007/978-3-030-51431-0_79
542
C. Chen
watch the teaching content of this lesson online and have a general understanding and grasp. In the classroom, teachers focus on how to combine theoretical knowledge with practice, so as to truly improve students’ ability to understand and solve problems. It is an inevitable trend to deeply integrate information technology and teaching. In the process of development, how to solve the problems existing in the online and offline teaching process in order to maximize the advantages of the integration of information technology and teaching [3].
2 Advantages of Blending Mixed Teaching with Interactive Media 2.1
Fragmentation of Online Learning Helps Students to Learn Anytime, Anywhere
The introduction of interactive media into the online teaching process provides students with a personalized learning method and more free study time. For places that they do not understand, they can repeatedly watch and figure out. At the same time, they can also ask teachers to solve problems in time In this way, the learning interest of students has been greatly improved, and the students’ ability of autonomous cooperative learning has been increased [4, 5]. One of the biggest disadvantages of the traditional classroom teaching method is that the teacher’s teaching content and method can only be displayed once in this situation and cannot be repeated. If a student fails to digest and absorb in time on a certain point, due to the progress of the progress, the teacher cannot stop to explain specifically to this student, and can only be left to make up after class. However, for this student, the failure to digest in time may affect the With the subsequent learning content, psychological stress will obviously increase. 2.2
Reduce the Workload of Teachers’ Theoretical Lectures and Shift the Direction of Counselling
One way to assess the effectiveness of teaching is to test the students’ ability to use. The important link connecting students’ theoretical learning and application ability is the teacher of the course. Blended teaching includes two new teaching modes, “online” and “offline”. “Online” teaching is an important role in the entire teaching process, not a simple auxiliary teaching. “Offline” teaching is a further supplement and improvement of students’ “online” learning [6]. In each link, teachers play a connecting role. Based on interactive media teaching tools, the workload of teachers’ theoretical teaching will be greatly reduced. Under this mode, the core of the teacher is no longer spending a lot of time in the classroom to explain the key points and difficulties. On the contrary, the key points and difficulties of a chapter can be adopted. Send online videos, courseware and other resources to realize the conditions for students to learn constantly and repeatedly. Instead, they are placed in offline classrooms, focusing on guiding students’ incomprehension, arranging classroom cases to assess students’ ability to use, and evaluating and summarizing student learning. Situation, etc.
Deep Integration of Mixed Teaching and Interactive Media
2.3
543
Real-Time Update of Online Classroom Video Resources
Under the mixed teaching mode, one of the biggest advantages is that it can realize the real-time update of online classroom teaching videos and other resources. In the past, teaching should be based on books-textbooks, but the update speed of textbooks has not matched the current social development needs. It takes at least half a year from the signing of the contract between the publisher and the author to the publication of the textbooks. In a world where planning often fails to keep up with change. In particular, accounting and taxation will be updated every year. If you just use textbooks to teach, the theoretical knowledge of textbooks will be too backward and not applicable. Aiming at the short board of teaching materials, classroom video resources can be updated in time, and some chapters can be adjusted in time to ensure the advanced nature of theoretical knowledge. 2.4
Realizing Online Teaching Resources Sharing
The Ministry of Education mentioned in the “Ten-year Development Plan for educational Informatization (2011–2020)” that it is necessary to make full use of high-quality resources and advanced technology, promote the deep integration of information technology and higher education, innovate the reform of curriculum teaching models, and build efficient Informatization. Classroom [7]. In response to national policies, the MOOC platform of Chinese universities was launched. The platform integrates 577 cooperative colleges and universities, and has more than a thousand courses including 985 colleges. Among them, the first batch of national high-quality online open courses that have been recognized. The videos included involve various majors, Field, every user who has the desire to improve can learn the courses of well-known universities in China. The platform basically realizes the sharing of online teaching resources, which greatly improves its utilization rate and saves the teachers a lot of time spent recording videos.
3 Empirical Investigation on the Use of Mixed Teaching and Interactive Media——Taking FW Colleges as an Example FW is a university undergraduate school. In this semester, it tried to use interactive media and mixed teaching in a variety of courses. It introduced an interactive teaching platform-love courses in the teaching process, and tried to integrate the mobile teaching platform before class. The combined teaching mode combining online, offline, online, during and after class, through the “deep integration” of modern information technology and traditional education mode, achieves the “online” learning of “offline” teaching, and enhances students’ learning depth [7].
544
3.1
C. Chen
Teacher Interview Analysis
Through interviews and analysis of the teachers in the accounting, financial management and auditing departments of FW College of Finance and Economics, the teaching status encountered by most teachers is shown in the following aspects: (1) Courses have fewer hours and teachers Hurry up in class and have less interaction with students. Due to the difficulty of the course and less time for classroom practice, the students’ learning enthusiasm is not high and the learning effect is not good. (2) Large class teaching makes the number of students in the class large, increasing the difficulty of teaching organization and increasing the difficulty of student management. (3) The workload of student attendance and homework correction has increased, making it difficult to grasp the learning dynamics of each student [8]. 3.2
Teacher Questionnaire Analysis
The above situation appears more in the traditional face-to-face teaching method. In addition, the college’s blended teaching is based on the MOOC platform. Therefore, in order to better review the implementation of online and offline blended teaching, the survey object is the Finance and Economics College 90 A full-time full-time teacher conducts questionnaire analysis on them. (1) About the question of “Do you know MOOC”, the specific distribution is shown in Fig. 1.
5%
85%
Yes
No
Fig. 1. Do you know MOOC
(2) Whether the mixed teaching based on MOOC has been carried out. The specific distribution is shown in Fig. 2. According to Figs. 1 and 2, of the 90 teachers surveyed, 85% of teachers understand MOOC, and 13% of them have started or started to try mixed teaching based on MOOC. From the statistical results, although most teachers understand MOOC, more than half (77%) of teachers have never conducted mixed teaching based on MOOC.
Deep Integration of Mixed Teaching and Interactive Media
545
13%
77%
Yes
No
Fig. 2. Whether to carry out mixed teaching based on MOOC
However, there are still a small number of teachers who actually carry out mixed teaching based on MOOC, SPOC, flip class or cloud class in actual teaching. (3) Regarding the question of “Whether it is in favor of the school’s comprehensive development of mixed teaching model”, 12% of the 90 teachers who participated in the survey expressed support for the school’s mixed teaching model, and 78% of teachers considered that the current conditions of students and teachers In terms of not yet, it can be seen that most teachers still have reservations about comprehensively promoting the mixed teaching model. (4) Regarding the question of “whether the teaching effect of online and offline mixed teaching based on the MOOC platform has been improved”, since there are only 13 full-time teachers for mixed teaching conducted by the Finance and Economics Institute, these teachers are the subject of investigation. Among them, 38.46% of teachers thought that the teaching effect under this mode has been greatly improved, but not only did not improve the teaching effect, but the proportion of the decline has accounted for 61.54%. Show that during the implementation process, teachers ‘teaching and students’ learning had problems. 3.3
Analysis of Student Learning Effect
Through interviews and surveys of students from various majors of financial college, two different voices can be heard. One is that the learning effect has been greatly improved. The videos can be freely watched online and anytime, and offline teachers can arrange classroom exercises, To achieve an effective combination of theory and practice; another view that the learning effect is not as good as before, without the timely supervision of the teacher, easily distracted and distracted, unable to achieve understanding and absorption, because did not understand the video content, the students are blank when they practice in the offline classroom and can’t do it at all. It can be seen that the effectiveness of students’ learning is largely determined by their own learning autonomy. Highly motivated students are more effective at learning, while students who need teachers to urge passive learning are less effective than before [9].
546
C. Chen
References 1. Zhao, Y., Liu, Y.: Exploration of mixed teaching reform of “management” course under the background of “Internet +”. The Think Tank Times (51), 157–158 (2019). (in Chinese) 2. Zheng, X.: Research and practice of hybrid teaching mode based on mobile teaching platform. J. Ningde Teach. Coll.E (Philos. Soc. Sci.) (4), 110–114 (2019). (in Chinese) 3. Liu, S., Han, F., Wang, X.: Exploration and practice of “cloud interaction” teaching mode in public english teaching. J. Hebei Inst. Softw. Technol. 21(4), 48–51 (2019). (in Chinese) 4. Wang, X., Wu, D., Qin, N., Yu, H.: Preliminary study on the mixed teaching mode of introduction to basic medicine for non-medical majors based on “rain classroom”. Educ. Forum (51), 172–174 (2019). (in Chinese) 5. Yan, Y., Yu, R., Hu, G., Weng, B., Lin, H., Liu, X.: Exploration and practice of mixed teaching of environmental chemistry course based on superstar learning link. Guangdong Chem. Ind. 46(23), 116–117 (2019). (in Chinese) 6. Jing, J.: Application analysis of mixed teaching in preschool education theory course. Educ. Teach. Forum (51), 259–260 (2019). (in Chinese) 7. Cheng, G., Liu, Y., Li, H.: Exploration on the mixed teaching mode of university mathematics courses in applied undergraduate colleges. Microcomput. Appl. 35(11), 51–53 (2019). (in Chinese) 8. Liao, A.: Blended teaching of general education in colleges and universities based on MOOC. West. Qual. Educ. 5(23), 103–104 (2019). (in Chinese) 9. Wang, L., Mei, X., Di, C.: Practice and exploration of vocational education blended learning models: taking Jiangsu agriculture and forestry vocational and technical college as an example. Anhui Agric. Sci. 47(23), 275–278 (2019). (in Chinese)
Influence of “Corpus Data Driven Learning + Learning Driven Data” Mode on ESP Writing Under the Background of Artificial Intelligence Zheqian Su1, Miao Liu1(&), Man Jiang2, and Yongwei Shang3 1
2
3
Foreign Language Department, Changchun University of Chinese Medicine, Changchun, China [email protected] Planning and Finance Division, Changchun University of Chinese Medicine, Changchun, China Health Management Department, Changchun University of Chinese Medicine, Changchun, China
Abstract. Objective: at present, in the actual process of foreign language teaching, there are still some deficiencies in the language materials and the knowledge of language analysis. The research aims to better stimulate the academic paper writing of college students of Traditional Chinese Medicine (TCM) by constructing the model of “Corpus Data Driven Learning (C-DDL) + Learning Driven Data (LDD)”. Methods: The junior students (n = 80) in one university of TCM were divided into experimental group (n = 40) and control group (n = 40). After the no difference comparison, the educational experiment was carried out 12 times in 3 months. In the experimental group, the ChineseEnglish Parallel Corpus of TCM created by Hyconc software and the artificial intelligence network evaluation system were used, while the control group was taught by traditional style. The research tool is the ESP Writing Ability Scale of TCM. Results: in the five dimensions of word accuracy, sentence structure, text structure, writing efficacy and writing motivation, the post test of the experimental group and the control group were significantly better than the pre test (p < 0.05); in the post test, the performance of the experimental group was significantly better than the control group (p < 0.01). In the two dimensions of grammatical accuracy and content innovation, the post test scores of the experimental group and the control group were significantly higher than the pre test (p < 0.05), but in the post test, there was no significant difference between the experimental group and the control group (p > 0.05). Conclusion: through the “Corpus Data Driven Learning (C-DDL) + Learning Driven Data (LDD)” mode, students gradually adapt to the beginning of independent language mining and exploration. In the process of academic language processing, construction, transformation and experiment of TCM English, it can make language knowledge more systematic and academic. Keywords: CAI
Data driven learning Learning driven data ESP TCM
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 547–552, 2021. https://doi.org/10.1007/978-3-030-51431-0_80
548
Z. Su et al.
1 Overview of Data Driven Learning An important method to apply corpus to language teaching is “Data-Driven Learning” based on corpus index, which was founded by Tim Johns. Some scholars in China have introduced this method [1, 2]. Data Driven Learning (DDL) is an approach to foreign language learning based on corpus. Its main idea is to guide students to observe and summarize the phenomena of language using based on a large number of corpus data, and to discover grammar rules, meaning expression and pragmatic features. Compared with TCM teaching, DDL on foreign language has the following characteristics: taking Students’ autonomous learning as the main process; using real language as the main language input; emphasizing the process of exploration and discovery; and advocating bottom-up, inductive learning [2]. In theory, DDL based on corpus is indeed a good method of foreign language learning. DDL is mainly based on the research and analysis of L1 corpus, which can undoubtedly improve students’ learning motivation to a certain extent, promote students’ independent exploration, and constantly build a knowledge system [3]. However, there are also many problems in the actual language teaching process of DDL. First of all, the description of L1 can’t provide some important and difficult information for some learners. Therefore, if we don’t study the interlanguage features of learners’ corpus at the same time, the description based on L1 alone will be very limited or even misleading for teaching guidance [4]. Second, it takes a lot of time to prepare materials and use induction to discover a certain language rule. Compared with the lost time, it may not be worth learning a certain language rule. Therefore, if teachers want to use this method in a limited class time, they must focus on the language projects that are difficult for students of a certain group, or the language projects that are more frequent or important in a certain field. Third, DDL advocates that its main feature is real language as the main language input. However, it can only be said that corpus is “real language” in a very limited sense. The language in the corpus is out of context, so it must be combined with context again in the teaching environment, so that it is true for Learners [3].
2 A Review of Study on Learning Driven Data In view of the shortcomings of Data-Driven Learning (DDL) based on corpus index in foreign language teaching, Barbara Seidlhofer proposed Learning-Driven Data (LDD). The basic idea of LDD is that learners who provide corpus data are also researchers who investigate the corpus. Compared with DDL, LDD has the following advantages in foreign language teaching: it is easier for learners to study their own interlanguage characteristics to improve their learning motivation; LDD research is carried out for a group of learners with more difficult language projects, so it is more “timely” and efficient; the feedback of information about learners’’ interlanguage retrieved through corpus is more accurate in English Teaching. Swain (1995) believes that output of language can promote second language acquisition(SLA) from three aspects: first, attention/trigger function: the activity of
Influence of “Corpus Data Driven Learning + Learning Driven Data”
549
target language can make learners realize their own language difficulties or problems, as well as their attention to unknown or insufficient knowledge in the target language field. Second, the function of hypothesis verification: in the process of developing interlanguage, learners often take output as a way to try new language forms or structures, and try to verify which hypotheses are appropriate and which are not, so as to achieve the purpose of communication as soon as possible. Third, metalanguage function: learners use language to think about the application of language [5]. Through the activities of thinking while speaking or writing while speaking, learners can bring the problem-solving language into the open. The metalanguage, which occurs in the context of producing meaning, can make learners further realize the interrelationship between language forms, language rules and the meaning they want to express. Swain suggested that the importance of output may lie in “compared with input of language, output requires learners to invest more brain power, so it forces them to deal with language at a deeper level.” Therefore, LDD based on learner corpus is more meaningful in English teaching than DDL based on pure native language corpus. The basic idea of learning driven data (LDD) is that learners who provide corpus data are also researchers who investigate the corpus. In this mode, learners study corpora built up by their own corpora. Therefore, students’ initiative in learning will be greatly improved. At the same time, the feedback of information about learners’ interlanguage retrieved from corpus will be more targeted and effective in English teaching. According to Yang Bei (2010), LDD is not against DDL, but its extension.
3 “Corpus Data Driven Learning + Learning Driven Data” Model Construction At present, the dominant teaching method in the field of English education is communicative teaching method, which emphasizes that communicative competence is the goal of language learning, and attaches importance to the development of communicative strategies in the process of language communication. However, as Skehan (1996) pointed out, although communicative teaching method can effectively improve the fluency of speech, it often reduces or rejects the teaching of grammatical structure [6]. According to Williams (1995), communicative approach can not only improve learners’ fluency, but also reduce the accuracy of speech, especially grammar [7]. Bastone (1995) also cautioned that this teaching method of emphasizing communication but neglecting grammar would lead to the early fossilization of learners’ language skills [8]. In order to make up for this deficiency, many applied linguists advocate the combination of grammar teaching and communicative teaching (Schmidt,1990; Hayashi,1995) [9, 10]. Another driving force for improving communicative approach comes from the study of corrective feedback in SLA. Rutherford & White (1991), Carroll & Swain (1993) all pointed out the positive effect of error recognition and correction on improving learners’ grammatical awareness [11–13]. The “Corpus Data Driven Learning + Learning Driven Data” model proposed in this study is an active attempt based on the combination of grammar teaching method and communicative language teaching method. The specific model is as follows (Fig. 1):
550
Z. Su et al.
Fig. 1. “Corpus Data Driven Learning + Learning Driven Data” model
In this model, the data-driven corpus is based on the Chinese-English parallel corpus of TCM. The corpus is generated from four versions of the “Huangdi Neijing” (The Inner Canon of Huangdi) translated by Li Zhaoguo, Wu Liansheng & Wu Qi, Zhou Chuncai and Paul Unschuld, “Nan Jing” (Classic of Difficulties) translated by Li Zhaoguo, and “Tangtou Gejue” translated by self. “Learning Driven Data” is based on the theory of language output. In teaching practice, artificial intelligence network review system is adopted to review students’ academic papers. The evaluation criteria mainly include seven dimensions: accuracy of words, accuracy of grammar, sentence structure, text structure, content innovation, writing efficacy and writing motivation.
4 The Influence of “Corpus Data Driven Learning + Learning Driven Data” Model on ESP Learning Motivation In order to verify the role of bilingual corpus in the teaching process of TCM, the college students in junior (n = 80) from a Chinese Medicine University in Jilin Province, China, was selected as the subjects and randomly divided into two groups: experimental group (n = 40) and control group (n = 40). The experimental group used the Chinese-English bilingual parallel corpus of TCM as the driving force in the process of English writing of TCM, and used the retrieval software for relevant topics. Through the analysis of vocabulary and literature, it is to find out the specific substantive words and phrases from the corpus, and how to connect the relevant topic sentences through intralingual and extralingual conjunctions. The subjects further
Influence of “Corpus Data Driven Learning + Learning Driven Data”
551
search the relevant thesis corpus through the subject words, combine the theoretical guidance of teachers, from the analysis of language level to the analysis of semantic function level of the text, then write the academic thesis, and upload it to the artificial intelligence network review system after the completion of the manuscript. Compared with the experimental group, the control group adopts the conventional writing mode, that is, the teacher first explains the TCM vocabularies that may be involved in the writing process, and then the students review and apply it in the writing. The whole experiment lasts for a semester (4 months), and the writing training is conducted once a week for two hours. The experimental group and the control group are conducted simultaneously. In the study, a self-designed “ESP Writing Ability Scale” was used to measure the writing ability of the experimental group and the control group. ESP writing ability scale was divided into seven dimensions: words accuracy, grammar accuracy, sentence structure, text structure, content innovation, writing efficacy and writing motivation including 28 items. It was adopted as Likert scale with 5 points. The Cronbach’s alpha coefficient of the whole scale was 0.762, which showed that the scale had a good reliability. Before the experiment, the experimental group and the control group were tested. The results showed that the experimental group (2.86 ± 0.78) and the control group (2.77 ± 0.64) both belonged to the lower middle level, and there was no significant difference in writing ability and sub dimensions between the two groups (p > 0.05). After 16 times (32 h) of academic writing trainings, through the paired sample t-test, it could be seen that the experimental group (4.236 ± 0.47) and the control group (3.455 ± 0.57) had significantly improved on their writing ability compared with that before the experiment (p < 0.01). In terms of the words accuracy, grammar accuracy, sentence structure, text structure, content innovation, writing efficacy, writing motivation, the post test of the experimental group and the control group were significantly improved compared with the pre-test (p < 0.01). Through the independent sample ttest, in the five dimensions of words accuracy, sentence structure, text structure, writing efficacy and writing motivation, the experimental group was significantly higher than the control group (p < 0.01), but in the two dimensions of grammar accuracy and content innovation, there was no significant difference between the experimental group and the control group (p>0.05). Therefore, it is obvious that the bilingual corpus of TCM prescription terms based on data-driven theory can improve the writing ability, especially in the five dimensions of word accuracy, sentence structure, text structure, writing efficacy and writing motivation.
5 Conclusion Through the experiment, it is obvious that under the dual function of “Data-Driven Learning+ Learning Driven Data”, the students’ academic writing ability has been significantly improved. By making use of the database and the A evaluation system, the writing of academic papers in colleges and universities of TCM has also changed from the traditional teaching mode to the multi-modal self-help mode. On the one hand, it has mobilized the students’ interest and motivation in learning, on the other hand, it has
552
Z. Su et al.
created a learning environment of “online-offline” combination for teachers and students. Through the application of words in a large number of real context, students can have observation and analysis on understand the diversity and flexibility of vocabulary more profoundly and comprehensively. Acknowledgments. This research was supported by 2019 Jilin Social Science Fund Project: Jilin Province Traditional Chinese medicine cultural identity survey and Promotion Path Research (Grant No. 2019B89), 2018 Changchun University of Chinese medicine Cultivation Fund Project (Grant No: 2018SK04), Higher Education Scientific Research Project of Jilin Province 2019: Research on the Construction of Psychological Space in the Intercultural Communication of Network Language of Undergraduates in Jilin Province (Grant: JGJX2019D146), “Apricot Woods Scholar Project” 2019—Young Scientist Project in Changchun University of Chinese Medicine.
References 1. John, T.: Virtual DDL Library. http://www.eisu.bham.ac.uk/johnstf/ddl_lib.htm 2. Fengchao, Z.: Foreign language learning with corpus data driven: ideas, methods and techniques. Foreign Lang. World (4), 19–20 (2005) 3. Yang, B.: On the development of data-driven learning. J. Guangdong Univ. Foreign Stud. (3), 36–39 (2010) 4. Granger, S.: A bird’s-eye view of learner corpus research. In: Granger, S., Hung, J., PetchTyson, S. (eds.) Computer Learner Corpora, Second Language Acquisition and Foreign Language Teaching, pp. 21–22. John Benjamins Publishing Company, Amsterdam and Philadelphia (2002) 5. Swain, M.: Three functions of output in second language learning. In: Cook, G., Seidlhofer, B. (eds.) Principle and Practice in Applied Linguistics, pp. 128–140. Oxford University Press, Oxford (1995) 6. Skehan, P.: Second language acquisition research and task-based instruction. In: Willis, J., Willis, D. (eds.) Challenge and Change in Language Teaching, pp. 17–30. Heinemann, Oxford (1996) 7. Williams, J.: Focus on form in communicative language teaching: research findings and the classroom teacher. In: Granger, S. (ed.) Learner English on Computer, p. 13. Longman, London and New York (1995) 8. Batstone, R.: Product and process: grammar in the second language classroom. In: Bygate, M., Tonkyn, A., Williams, E. (eds.) Grammar and the Language Teacher, pp. 224–236. Prentice Hall, London (1995) 9. Schmidt, R.: The role of consciousness in second language learning. In: Granger, S. (ed.) Learner English on Computer, p. 145. Longman, London and New York (1990) 10. Hayashi, K.: Form-focused instruction and second language proficiency. In: Granger, S. (ed.) Learner English on Computer, p. 112. Longman, London and New York (1995) 11. Rutherford, W.: Second language grammar: learning and teaching . In: Granger, S. (ed.) Learner English on Computer. Longman, London and New York (1987) 12. White, L.: Adverb placement in second language acquisition: some effects of positive and negative evidence in the classroom. In: Granger, S. (ed.) Learner English on Computer. Longman, London and New York (1991) 13. Carroll, S., Swain, M.: Explicit and negative feedback: an empirical study of the learning of linguistic generalizations. Stud. Second. Lang. Acquis. 15, 357–386 (1993)
The Applied Research of Teaching Reform of Computer Major Using Virtual Reality Technology to Promote Wei Sai(&) Xijing University, Xi’an 710123, Shaanxi, China [email protected]
Abstract. Virtual reality interactive teaching is a new teaching method, is an important part of the teaching reform of computer specialty. Virtual reality interactive teaching USES virtual reality technology to simulate teaching scenes that are difficult to explain, make them visible and improve the participation, which to a large extent makes up for the deficiency of traditional teaching, provides students with an approximate real training environment, and more effectively develops students’ professional skills. Keywords: Virtual reality technology Computer specialty Teaching reform
1 Introduction Virtual reality is a kind of integrated technology that integrates computer graphics, man-machine interface technology, sensing technology, psychology, ergonomics and artificial intelligence [1]. It is a more ideal man-machine interface form between computers and users. Virtual reality technology includes computer, electronic information, simulation technology in one, its basic realization way is the computer simulation virtual environment to give a person with the environment immersion. Virtual reality technology involves many subjects and is widely used in many fields such as artificial intelligence, computer graphics, dynamic interactive intelligent perception and program driver, 3d model and scene production [2]. Traditional teaching methods, on the one hand, cannot present abstract theories directly to students; on the other hand, for some difficult experimental operations or costly instrument operations, students cannot directly carry out practical operations, thus are unable to obtain real experience. In view of these problems, we need to introduce advanced science, reform and innovate teaching idea, teaching method and means.
2 The Characteristics of Virtual Reality Technology The basic features of virtual reality technology are immersion, interactivity and multiperception.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 553–557, 2021. https://doi.org/10.1007/978-3-030-51431-0_81
554
W. Sai
1. The immersion Virtual reality technology is based on human vision, hearing, touch and other physiological and psychological characteristics, effective to produce a threedimensional image, user wearing helmet mounted display and data gloves and other equipment, as if place oneself in the real world, the thinking resonance, all emotions are very realistic, have a feeling of intimacy [3]. 2. The interactive In a virtual reality system, users can use the computer keyboard, mouse to interact, you can also through the special helmet and data gloves and other equipment to interact, a computer can according to user’s each part of the whole body movement, adjust the system of graphics and sound, the user can for inspection or operation of objects in the virtual environment [4]. 3. Be perceptive For virtual reality system equipped with visual, hearing, touch, smell sensing and reaction devices, users can get more perception in the virtual environment, and finally achieve the feeling of immersive.
3 Virtual Reality Technology Classification 1. Immersive virtual reality rystem Immersive virtual system is a very complex system, which allows users to wear helmets, data gloves and other sensor tracking devices to eliminate the interference of the outside world, so that users’ vision and hearing are isolated from the outside world and completely immersed in the virtual world. But this kind of equipment is very expensive, it is difficult to use in a large scale. 2. Simple virtual reality system Simple type virtual reality system is very simple, the user through a common computer to interact with virtual environment. For example, apple’s quick virtual system, using the panoramic camera, form a lifelike virtual scene, the user can carry on the experience in the virtual scene. This system’s cost is cheap, and has been extended to more use. 3. Shared virtual reality system Shared virtual reality system is a kind of remote network. Users in different areas share a virtual space, and can observe and operate in this virtual space, finally achieve the effect of collaborative work. Such systems are already used in medicine, where doctors perform surgery on patients in a virtual way [5].
The Applied Research of Teaching Reform of Computer Major
555
4 The Advantages of Virtual Reality in Teaching 1. The realistic Virtual reality technology can form a very realistic virtual environment through software platform, which can make students feel as if they are in the scene, stimulate students’ brain cells, make the brain in a very concentrated state, and effectively improve students’ attention. Students can absorb knowledge according to their own perception and cognitive ability, broaden their thinking, and create new concepts and environments [6]. 2. Interaction Students can interact with teachers in the virtual learning environment by wearing helmets, data gloves and other sensing and tracking devices. Teachers can grasp students’ learning conditions through students’ feedback control information, and correct and supplement them. After class, teachers analyze and summarize the comprehensive effect of the whole class, improve the teaching plan, improve the classroom efficiency, and better achieve the teaching objectives. 3. Cooperation Virtual reality system can make the students in a virtual environment to learn each other to explore, cooperation and communication, and cultivate students’ ability of team work, teachers can also be intuitive to observe and understand the problems existing in the students in the process of knowledge, and student common efforts, thus effectively mobilize the enthusiasm and initiative of student learning, improve the quality of teaching [7].
5 Classroom Teaching 1. Display of three-dimensional objects Virtual reality technology plays different roles in different subjects, among which virtual three-dimensional objects are the most commonly used for teaching display. In order to make students feel 3d objects more intuitively, pictures are usually displayed through a projector [8]. However, such a display can only provide one or several perspectives of the 3d objects, so students cannot observe them in an all-round way, and students have no right to choose their own perspective. The teacher will also show things to make students feel the three-dimensional objects, which is very practical, but the problem is that students in different positions can see different perspectives, and the objects cannot be very large, so students in the back row can’t see them clearly. Computer 3d modeling and animation software can also be used to build a model that is basically the same as the real object. By rotating the model, various perspectives can be effectively displayed. This method is ideal, but because the animation needs to be set in
556
W. Sai
advance, students can only stop playing when using it, and cannot see the Angle they want to see. By virtual reality to build a same as the real 3d objects, mainly USES the 3ds Max modeling, and stored in VRML format, and then play it is used, for example, can be in computer assembly and maintenance are being used in this course, because for each student to provide computer assembling, it is not realistic, using the virtual environment, lets the student in it from different perspective to observe, computer assembly, the problem of detection, save a lot of staff costs, the use of this technology teachers can easily create more exquisite desktop virtual reality to assist in computer teaching. 2. Display of three-dimensional space Stereo space means that exist in the real world, or once existed in the history of the space, at the time of teaching, and sometimes need to show to the student the space, but because of the limitation of conditions can’t allow students to enter the space, the traditional teaching is the teacher to describe, let the students to imagine, to create a virtual space, but differ as a result the students’ ability to accept, not every student can be imagined, which requires the use of virtual reality technology, lets the student can see, hear, touch, such as professor in history class, it can be, and interpretation of history, In this way, students can experience the scene more vividly [9]. For example, when talking about the development history of computer, students can come to the scene and feel the evolution of computer in different ages. 3. Construction of virtual scene For virtual scene is refers to some scenarios that may emerge in the real life, and can be through the virtual reality in a different time or place, it is widely used in artificial intelligence teaching, the traditional creation is mainly conducted by teachers’ language learning situation, can also through the pictures or video, students just passively accept at this time, some scene is unable to truly understand, when using the method of virtual reality can let students better, deepen students’ understanding of the course [10].
6 Conclusion With the rapid development of computer technology, virtual reality technology has gradually entered into teaching and become a new educational means to promote the development of education. The use of virtual reality technology can create a vivid and realistic learning environment for students, so that students can enhance their memory through real feelings, and it is easier to stimulate students’ interest in learning and help students to learn better. But now totally immersed virtual reality system hardware facilities of the price is very expensive, thus restricting the application of virtual reality in the teaching, but the application of desktop virtual reality system for the application of teaching media open up new roads, with virtual reality system prices decline, in the near future, this kind of new teaching media will inevitably be a wide range of
The Applied Research of Teaching Reform of Computer Major
557
application, when the virtual reality in the teaching popularization, there with a lot of changes in teaching methods, teaching reform has a positive role to our country.
References 1. Zhang, X.: Design and implementation of middle school virtual experiment platform based on Flash3D. Res. Audio-visual Educ. 6(1), 23–24 (2014) 2. Yin, L.H.: Implementation scheme of network virtual chemical experiment. J. Tianjin Agric. Univ. 17(2), 29–32 (2010). (in Chinese) 3. Yang, J., Chen, J.: Research on the application of particle system in VRML in the construction of virtual chemistry laboratory. Comput. Disc Softw. Appl. 2(4), 12–14 (2012) 4. Zhou, X.: Application research of virtual 3D animation technology in the design of human computer interface. In: 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA), 2017 5. Ran, H-Z., Liu, Z-F.: Application and prospect of the virtual reality technology in college ideological education. In: 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications, 2013 6. Jiao, P.G., Shao, F.S., Qiu, H.M.: Three-dimensional virtual assembly of automatic fuel measuring device of diesel engine test bed based on VRML. In: Applied Mechanics and Materials (2011) 7. Si, H.F., Zhong Y.: Research of the application of virtual reality in green construction. In: Advanced Materials Research (2012) 8. Dong, W., Gu, W.J.: Application of virtual reality in forestry. In: Advanced Materials Research (2014) 9. Cai, Z.J.: Review on application of virtual reality in the physical simulation. In: Applied Mechanics and Materials (2014) 10. Information and Management Engineering. Springer Science and Business Media LLC, 2011
Application and Development Trend of Blockchain in the Financial Field Danni Zhao(&) Shanghai Academy, Shanghai University, Shanghai, China [email protected]
Abstract. Blockchain technology, as a new technology, is expected to play an important role in the development of the financial industry. The article first introduces the development status and existing problems of the financial industry, and then studies the sources, concepts and mechanisms of blockchain technology. Combining the problems existing in the financial industry and the blockchain, we can see that blockchain and finance have a natural adaptability. The article further summarizes the current application status of blockchain technology in the financial field, and lists related cases. Finally, according to the application of blockchain technology in finance, the future development trend of blockchain technology is proposed. It has certain reference significance for the development of blockchain and the innovation of blockchain technology in financial applications. Keywords: Blockchain trend
Digital currency Financial industry Development
1 Introduction 1.1
Development Status of the Financial Industry
The financial industry has always been considered one of the most influential industries in the world. The development of the information Internet has greatly enhanced the efficiency of information flow, and global economic cooperation is in full swing. The International Monetary Fund estimates that the global financial system transfers trillions of dollars a day, serves millions of people, and supports the global economy, which totals more than $ 100 trillion. However, there have been some problems in the financial industry for a long time. First of all, the financial industry has not been technologically updated for a long time. Network services and paper checks co-exist, transaction settlement is faster, and transaction settlement still requires a longer period. Second, monetary policy makers and market regulators generally have information asymmetry on the realities of the financial industry. The reason is that the information of many large financial institutions is not transparent, and the division of regulatory responsibilities is not very clear. In addition, finance is not universal and billions of people cannot use basic financial services; it is centralized and there is a risk of data leakage; it is monopolistic, and
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 558–564, 2021. https://doi.org/10.1007/978-3-030-51431-0_82
Application and Development Trend of Blockchain in the Financial Field
559
financial institutions are relentless in innovation… The financial industry is full of contradictions, instability and high-risk factors. We think deeply why the efficiency of the financial industry is so inefficient, in part because of monopoly. The financial industry has strong capital strength and absolute scale advantages. In order to seek benefits, the intermediary agencies that have the initiative always extract the most value, so it increases the cost of financial activities and slows down the development of the industry. 1.2
Blockchain Technology and Financial Development
In the business field, especially in the financial industry, credit is the cornerstone of all economic cooperation, so the trust mechanism is very important in economic development. The existing trust mechanism mainly includes blood relationship, intimate relationship and intermediary organization. In the process of helping the transaction to be concluded, the intermediary not only causes the transaction to be complicated, but also extracts a lot of benefits. With the emergence of blockchain technology, the intermediary agencies begin to feel crisis, and the decentralized feature will even break the existing credit mechanism. In fact, the core influence of blockchain is to rebuild the credit system and build a multi-centered trust system with everyone participation. As a low-level technology, blockchain technology has the potential to reshape various industries [1], especially in the financial industry. The blockchain is deeply impacting the current financial field through the reconstruction of credit mechanisms. Some studies even show that changing the company name to some blockchain-related companies will result in long-term substantial profits for companies [2]. It can be seen that the research of blockchain is very valuable. This article starts from the basic concepts of blockchain technology, and then analyzes the existing problems in the financial field and the adaptability of blockchain technology. By studying the application status and cases of blockchain technology in the financial field, the future innovation trends are summarized and analyzed, which has certain reference significance.
2 Blockchain Advantages and Adaptability to Its Financial Industry 2.1
The Concept and Scope of Blockchain Technology
In 2008, Satoshi Nakamoto published a paper entitled “Bitcoin: A Peer-to-Peer Electronic Cash System” [3], and the earliest appearance of blockchain is based on this. At present, there is no unified definition of blockchain in the world. Blockchain is a distributed immutable ledger of transactions organized as blocks and maintained by distributed peers [4]. In short, blockchain is an immutable, encrypted, distributed ledger technology [5]. Based on the opinions of various parties at home and abroad, this article believes that the blockchain refers to the technology of collectively generating a series of
560
D. Zhao
ordered data blocks in a decentralized and untrusted manner with the help of mathematical algorithms and forming a reliable database. The core of blockchain technology is like building a trust machine, which guarantees the transfer of value and information between points. This trust machine is based on programs and code. For the Byzantine problem, the blockchain has made a solution. The blockchain builds a number of data blocks that are interrelated and can be mutually verified. These blocks are then sorted according to the timestamp and combined with cryptography to form an effective meshed value transmission system. 2.2
The Advantages of Blockchain Technology and Its Adaptability to the Financial Industry
See Table 1. Table 1. The values of time in the mill drum first section Advantages of blockchain technology Verifiability
Status of the financial industry
Blockchain technology results in the financial industry
To obtain loans for financial services, it is generally necessary to rely on intermediaries to verify their identity and build trust. The result is often arbitration by intermediaries
Blockchain can verify identity based on transaction records, reputation scores, and other economic factors. It helps build trust and remove dependence on intermediaries in certain transactions Blockchain technology makes transactions no longer rely on the central system, but directly transfers value based on a value mechanism that does not require trust coordination. This not only saves huge server costs and maintenance costs, but also saves security maintenance costs due to its decentralized approach [6] The blockchain network reduces settlement and clearing time
Lower the cost
Both parties to the transaction need a central system to clear funds and store transaction information, which consumes huge server costs and maintenance costs
Speed up
In the banking business, the sender and the receiver are often not in the same network, and the intermediate link needs to go through multiple ledgers and intermediaries, extending the settlement time. The average settlement time for bank loan transactions is as high as 23 days, and the settlement time for remittances and stock transactions is also longer
(continued)
Application and Development Trend of Blockchain in the Financial Field
561
Table 1. (continued) Advantages of blockchain technology Advantages of blockchain technology Reduce risk
Status of the financial industry
Blockchain technology results in the financial industry
Status of the financial industry
Blockchain technology results in the financial industry
There are many forms of financial risk, such as settlement risk that the transaction will be returned due to glitches in the settlement process; counterparty risk that the counterparty defaults before the settlement of the transaction
Adaptable
The industry’s basic technology is obsolete, and the system change is difficult
Instant settlement on the blockchain can completely eliminate this risk [7]. At any time, you can check the company’s internal operations in time, check the transaction progress and network progress. The timely review and irreversibility of transactions eliminates the moral hazard of management personnel that may exist due to complicated written records and delays Blockchain technology is an open source technology that can continuously innovate, iterate and improve, and achieve backward compatibility
3 Research and Application Status of Blockchain Technology in the Financial Field Blockchain technology has huge potential. Currently, large global financial institutions are deploying blockchain. Goldman Sachs’ “SETLcoin” cryptocurrency settlement system, JPM COIN launched by J. P. Morgan Chase, and USC settlement system jointly issued by 14 financial companies led by UBS…At the same time, governments and international financial organizations are stepping up their research and testing of fiat digital currencies and blockchain finance. For example, in July 2019, the Bank for International Settlements expressed support for the central bank to issue digital currencies. The European Central Bank and the Bank of Japan jointly developed Stella. These all reflect the indispensable position of blockchain in the global financial field. Blockchain is a new type of underlying technology in the Internet era. No matter what kind of financial industry is combined with, to develop a new financial service model, the ultimate goal is to effectively integrate financial resources [8].
562
3.1
D. Zhao
Digital Currency
The development of Internet technology has promoted the electronicization of currency. The industries of electronic currency include electronic banking, Alipay, WeChat payment and so on. Blockchain technology has a disruptive innovation to the existing currency system, giving birth to digital currencies. At present, there are thousands of digital currencies on the Internet. Bitcoin is one of the typical representatives of digital currencies. In terms of digital currencies, Bitcoin and similar digital currencies have great potential and have the ability to successfully exchange other currencies [9]. 3.2
Cross-Border Payment and Settlement
Because a large number of intermediaries are involved, the cost and efficiency of information transmission is high, so cross-border payments and settlements have always been laborious and laborious. For example, Western Union, which has the world’s largest and most advanced electronic exchange financial network, has agency outlets in nearly 200 countries and regions around the world. However, the use of Western Union requires a minimum fee of US $ 15, and the fastest time is 2–3 Days, as for ordinary bank electronic remittances, it takes longer, basically 3 to 7 days of waiting time. The decentralized nature of blockchain technology can provide users with nearreal-time cross-border transaction services, enabling fast and efficient transfer of funds. For example, at the relatively mature Ripple Labs that provides blockchain payment services, in the Ripple system, regardless of the legal currency or virtual currency of each country, it can be freely converted. Therefore, in this system, currency exchange and transaction are efficient and fast, and transaction costs are almost zero. Confirmation of transactions can be completed within seconds, with no offsite or interbank charges. Ripple has built a distributed account system with broad development prospects in the future. 3.3
Customer Credit
In order to obtain authentic information, the traditional financial industry will invest a lot of manpower and time to check the authenticity of the information repeatedly. Blockchain technology has the characteristics of data that cannot be tampered with and can be traced to the source. On the one hand, it reduces human intervention and avoids information distortion caused by human error. Blockchain technology can change the existing credit reporting system. 3.4
Supply Chain Finance
Supply chain finance is the main way to solve the financing difficulties of upstream and downstream enterprises. The current supply chain financial system requires a lot of manpower to review and verify documents and so on, so the cost is high and the efficiency is low.
Application and Development Trend of Blockchain in the Financial Field
563
4 Challenges and Development Trends of Blockchain Technology Application in the Financial Field 4.1
The Concept and Scope of Blockchain Technology
Although the blockchain technology has a bright future, it also needs to pay attention to the following issues in practice. The first is the full release of the potential of the blockchain, which still has great challenges. It is still difficult for blockchain technology to meet large-scale use. The blockchain technology itself is not yet mature. In addition, The infrastructure of the digital economic system based on the blockchain is under construction and is far from perfect [10], and the blockchain is not sufficiently mobile, making it difficult for ordinary people to use. The complexity of the large-scale application environment and the amount of data to be processed in the financial industry will be much larger than Bitcoin. There is no need to look at the application of the financial industry. At present, the Bitcoin processing system has faced the problem of the transaction data storage reaching the upper limit. Second, data security needs to be improved. The global blockchain technology is not mature enough. If a hacker attack is encountered, there is no comprehensive warning mechanism and application methods [11]. Since the birth of blockchain technology, scams and crimes under the name of blockchain have been common. For example, the “Silk Road Website” has made digital currency synonymous with crime. It is foreseeable that the application of blockchain technology and the financial industry needs to be cautious. Third, financial supervision is difficult. The development of blockchain technology is restricted by the current system. Blockchain has brought an impact on the current system, and its decentralized nature plays down the concept of supervision. The decentralized nature of the blockchain makes the subject of responsibility unclear, so the supervisor’s collection of data becomes a difficult problem. At the same time, regulators need to regulate the transparency of information, which will be another problem. 4.2
Development Trend of Blockchain Technology Application in the Financial Industry
The application of blockchain in the financial industry will not overemphasize decentralization in the future, but will focus on building a strong trust system based on multiple centers. The alliance chain will be the first choice, and the nodes in the system will jointly formulate the application standards of the blockchain technology. Financial institutions will accelerate the application of blockchain technology in core business areas, and major financial institutions and regulatory authorities will also accelerate the formulation of standards to guide the healthy development of the industry. In the long run, asset securitization may be one of the best applications of blockchain. Blockchain technology is not only currency creation, but also value transmission and public accounts. Many financial institutions have actively explored the value transfer. We have reason to think that in the future, with the continuous deepening of
564
D. Zhao
blockchain technology by regulatory and market entities, the technology will continue to mature, and the application of blockchain in the financial field will become more and more profound.
References 1. de Soto, H.: A tale of two civilizations in the era of Facebook and blockchain. Small Bus. Econ. 49(4), 729–739 (2017) 2. Sharma, P., Paul, S., Sharma, S.: What’s in a name? A lot if it has “blockchain”. Econ. Lett. 186 (2020) 3. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org 4. Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366– 1385 (2018). http://dx.doi.org/10.1109/TKDE2017.2781227 5. McBee, M.P., Chad, W.: Blockchain technology: principles and applications in medical imaging. J. Digit. Imaging (2020) 6. Allen, Darcy W.E., Berg, C., Markey-Towler, B., Novak, M., Potts, J.: Blockchain and the evolution of institutional technologies: implications for innovation policy. Res. Policy 49(1), 1–8 (2020) 7. Si, H., Sun, C., Li, Y., Qiao, H., Shi, L.: IoT information sharing security mechanism based on blockchain technology. Futur. Gener. Comput. Syst. 101, 1028–1040 (2019) 8. Zhang, R.: Blockchain finance: structural analysis and prospects. South. Financ. 2, 57–63 (2017) 9. Dwyer, G.P.: The economics of Bitcoin and similar private digital currencies. J. Financ. Stab. 17, 81–91 (2015) 10. Berg, C., Davidson, S., Potts, J.: The Blockchain Economy: An Introduction to Institutional Cryptoeconomics. Edward Elgar, Cheltenham (2019) 11. Wang, S.: Analysis of the research status and innovation trend of blockchain technology in the financial field. Shanghai Financ. 2, 26–29 (2016). (in Chinese)
Ideological Education Under the 3D Virtual Scene Applied Research in Organizational Behavior Course He Yu1 and Qinglan Luo2(&) 1
2
Business School, The Tourism College of Changchun University, Changchun, Jilin, China College of Business Administration, Jilin Engineering Normal University, Changchun, Jilin, China [email protected]
Abstract. The price of computers and their ancillary equipment has decreased. Virtual realization technology and equipment have been getting rid of sky-high prices and gradually received attention in various fields, especially in the education industry is no longer an elusive thing, and the application of 3D technology in ideological and political education (IAPE) in colleges is particularly typical. As a new learning tool, 3D virtual reality technology products can not only enable learners to experience the application of IAPE in organizational behavior from realistic virtual scenes, but also enable teachers and other educators to gradually develop the way of thinking in the digital era to educate students’ behaviors and habits. How to combine the existing technology level to develop and utilize virtual reality products is a technical problem for educators. On the basis of sorting out and analyzing relevant theories and researches, this paper applies 3D virtual scenes to the practice of IAPE in organizational behavior course in colleges, analyzes the specific application results, and provides certain theoretical basis for the research in related fields. Keywords: Ideological and political education behavior Application research
3D Organizational
1 Introduction The application of 3D virtual technology in education has become a hot issue in the field of education technology at present [1]. In addition, the IAPE to cultivate the qualified builders and reliable successors of socialism with Chinese characteristics of the major mission, in the Internet new media age, how best to let all course reflect khalid ents education idea, the same as all the colleges and the ideological and political theory course to fellow, form synergies, eventually achieve full education, to educate and comprehensive education goals all the way, is every higher education workers need to think about problems [2]. Organizational behavior is public management class specialized core curriculum, in recent years, this course from teaching goal, teaching content, teaching method and so on several aspects, explore a teaching reforms, the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 565–571, 2021. https://doi.org/10.1007/978-3-030-51431-0_83
566
H. Yu and Q. Luo
whole education and all-round educational teaching reform as the goal, strive to become a new era, the IAPE under the new situation of the demonstration course [3]. The carrier innovation development of IAPE in the context of the rapid development of modern information technology is the internal requirement of social development and progress, and also a hot issue of theoretical research [4, 5]. For universities in the new era of ideological and political work in the information society research to explore the application of specific courses, help for IAPE work to provide the necessary technical support and theoretical guidance, help students more real feel the ideological education, it will also promote the faculty and students to strengthen information consciousness, as well as its application in organizational behavior course, constantly improve their information literacy, on the whole promote school ideological and political construction. In IAPE in colleges, professional courses application and 3D virtual scene technology based on the analysis of the relevant theory and research on it, together with the present situation of IAPE in colleges, constructed to carry on the IAPE of 3D virtual scene, will be applied to organizational behavior of the course, and analyses the concrete application of the study.
2 Method 2.1
Ideological and Political Work for College Students
Ideological and political work in colleges is an important part of the party’s ideological and political work. From the perspective of work objects, it should include all teachers and students in colleges, while from the perspective of tasks and objects of education, it is mainly college students [6]. Therefore, what this paper studies and discusses mainly refers to the ideological and political work of college students. University students’ ideological and political work requires educators to adhere to the correct political orientation, cultivating students’ healthy mentality of a calm, rational strengthening humanistic care and psychological counseling, and promote the healthy development of the student body and mind and personality, constantly improve the level of students’ ideological and political consciousness, moral quality, cultural quality, make students having both ability and political integrity, comprehensive development of talents. University students’ ideological and political work requires educators through the education teaching, various types of training, daily edify, social practice and campus culture, thought and theory of marxism, the core values of socialism with Chinese characteristics, ideological and moral purpose, such as publicity and education in a planned way, having a profound effect on the students, torsion and timely correcting incorrect values in the student thought, consciously guide the students to form correct values and moral quality, at the same time pay attention to the psychological development of college students dynamic, positive guidance students negative emotion, to shape healthy personality, To make the majority of college students clear the direction of their efforts, clearly understand the historical mission and responsibility on their shoulders, consciously become a person, and strive to become a qualified successor to the construction of socialism with Chinese characteristics and the cause of communism [7].
Ideological Education Under the 3D Virtual Scene Applied Research
2.2
567
3D Virtual Reality Technology
3D virtual reality technology is a kind of computer technology that can create and experience virtual world. This technology can also be called “cyberspace”, “soul technology”, “virtual environment” [8]. Common 3D technology pros include sensor helmets, smart handles and data gloves that allow users to use virtual reality devices to access virtual scenes. 3D virtualisation is a new and challenging technology that allows you to observe 3D objects in a timely manner and manipulate any model in the virtual world as needed. Core 3D virtual reality technology is computer graphics accelerators, on the one hand, the computer CPU and 3D graphics card processing speed faster, on the other hand need through many CPU and multiple blocks of 3D graphics card, the three-dimensional processing tasks assigned to different CPU and graphics card, so that we can ensure the 3D virtual reality system more smoothly, computer 3D virtual reality system is shown in Fig. 1 [9, 10].
VGA
High Performance Computer
Position Tracking
3D Graphics Acceleration Card
3D Graphics Acceleration Card
VGA to NTSC Conversion
VGA to NTSC Conversion
I/O Baseplate
3D Sound Version
HMD
Fig. 1. 3D virtual display technology system
2.3
Ideological and Political Education and Organizational Behavior in Colleges
(1) Integration of Teaching Objectives As a comprehensive and applicable discipline, organizational behavior aims at enabling students to systematically master relevant theories of individual behavior, group behavior and organizational behavior, and to make use of theoretical knowledge to analyze cases scientifically and rationally, so as to achieve a proficient grasp of theories and experience the value of practice. Teachers in teaching students from the individual, group and organization to understand and master the work organization on the three levels of all kinds of behavior and interaction in the process of basic theory, but also guide the students to adopt the method of dialectical view and solve problems, make it sets up the concept of dialectical materialism, not only to let students to understand and master the person’s psychology and behavior in organizations, and learn to take effective countermeasures, efficient and achieve organizational goals, but also help students all-round development.
568
H. Yu and Q. Luo
(2) Integration of Teaching Content First, cultural integration. Chinese culture has a long history. Teachers should take traditional culture as a starting point to guide students to understand Chinese culture and enhance their cultural confidence. For example, when teaching the theoretical origin of organizational behavior, teachers can teach students relevant theories in traditional culture, so that students can better understand professional knowledge through traditional cultural knowledge. Second, the fusion of typical cases and characters. By introducing typical cases and characters into organizational behavior, teachers can set an example for students through the deeds of characters, so that students can be inspired and encouraged by the advanced deeds of role models, enhance students’ sense of mission and practice socialist core values. On the paper to come to feel shallow, must know this matter to practice, practice is the only criterion to test the truth, only the knowledge learned in practice can realize the real value of knowledge. In the teaching process of organizational behavior, teachers should organize students to go deep into the society and carry out thematic investigation activities. In the process of investigation, teachers should understand the national conditions and people’s conditions and make students realize the importance of unity and cooperation through activities.
3 Experiment 3.1
Virtual 3D Ideological and Political Education Program Production
Nowadays virtual studio technology has been applied to the broadcasting and television industry as a relatively mature technology. It mainly USES the following technologies: camera and scene actor tracking technology, 3D background coloring technology, video image synthesis technology. The camera in the studio provides a foreground image signal, and the tracker can record the camera’s position, rotation or the camera’s push, pull, shake, shift and other parameters. The computer with the function of 3D image generation generates the background information of 3D scene or 2D image sequence, and generates the signal called “key” or “mask” with the image processing subsystem or special hardware keying equipment; Finally, the foreground image taken by the camera is keyed with chrominance keying signal, and then the foreground image (FG) generated is combined with the 3D background image (BG) generated by the computer into the final image. 3.2
Design of Graphics Processing Subsystem of 3D Virtual Scene
A typical virtual studio system consists of four subsystems: image segmentation, camera tracking, background generation and image synthesis. The design of the graphics processing subsystem in the virtual scene should consider the following points: first, the choice of language. This includes the development of graphical interfaces that interact with users, and the ease of developing reusable components (modules). Second, the programming interface question mainly concerns whether there
Ideological Education Under the 3D Virtual Scene Applied Research
569
are interfaces for the popular modeling 3D language VRML/X3D and the popular 3D software 3D MAX/Maya. Third, whether there is support for rapid software development tools. Fourth, the upgrade of the system.
4 Discuss 4.1
Analysis on the Application of Ideological and Political Education in the Course of Organizational Behavior in 3D Virtual Scene
According to the designed 3D virtual scene, we carried out a practical application in a school, and conducted a survey of usage experience. The specific objects include students, administrators, information technology professionals, full-time teachers of ideological and political courses, teachers of organizational behavior, counselors, head teachers and other aspects, so as to have a comprehensive understanding of the status quo and problems of using information technology to carry out ideological and political work in Dali university.
14%
Yes No 86%
Fig. 2. Students’ feelings about the virtual scene
College students’ learning of knowledge and understanding of various kinds of information is no longer limited to the limited content obtained in class and books. They hope to learn more extensive knowledge, more practical applications, and more examples and events close to life and themselves. Do you think that in the process of learning ideological and political theory courses and relevant current affairs and policies, you can enter into the role of the virtual textbook to personally experience, explore some of their concerns, can effectively mobilize their learning enthusiasm and initiative? As shown in Fig. 2, 85.79% of students chose yes, while 14.21% chose no. At the same time, when college students are learning ideological and political theory courses and relevant current affairs and policies, the role experience teaching of virtual textbooks is more attractive.
570
4.2
H. Yu and Q. Luo
Analysis on the Characteristics of Ideological and Political Education in the Course of Organizational Behavior in 3D Virtual Scene
In the application of college ideological education in the course of organizational behavior in 3D virtual scene, the program host (can be a teacher, a scholar or a professor) can be placed in the environment of virtual world. Compared with the traditional teaching form, the characteristics of this form are shown in Table 1. First, it can carry more knowledge content in the same time compared with traditional educational TV programs. By using the presentation of the logical structure of 3D virtual objects, TV viewers (i.e. students) can get more information. Second, the propagation speed of teaching information can be improved within the same time. The logical structure of 3D objects can be changed according to the needs of teaching content, the relationship between time and space of virtual background can be changed, and the comprehensibility of imparted content such as knowledge can be improved. Table 1. Comparison between traditional teaching methods and 3D virtual scenes Contrasting items Teacher Student Teaching concept Teaching methods Interactive object Class content
The traditional form
3D virtual scene
Dissemination of knowledge, classroom management Passive receiver Teacher centered
Classroom interaction, stimulating learning Participant, active recipient Double subjects
Cramming method
Interactive, participatory, sharing All the students
Individual students Knowledge-transference
Get involved, inquiry learning
Third, it can improve the participation of a wide range of audiences, thus expanding the scope of knowledge dissemination. As a popular mass media, television can increase the educated population when the application of technology can improve their interest in and ability to learn knowledge. Fourth, it can improve the availability of teaching resources. Repeatability can store different virtual environments in the database, extract the virtual scenes timely and quickly according to the creativity of different educational program producers and different teaching purposes, and facilitate the regeneration of teaching information dissemination resources.
5 Conclusion In the process of applying virtual reality technology to IAPE in colleges, it needs the support of educational theory. The situational learning of constructivism is the theoretical foundation of the application of virtual reality in education, and the development
Ideological Education Under the 3D Virtual Scene Applied Research
571
of virtual reality system needs to be completed under the guidance of constructivism learning theory. There are many other virtual reality technologies, such as JAVA3D and Quick Time. On the basis of sorting out and analyzing relevant theories, technologies and researches, this paper constructs a 3D virtual scene for the application of IAPE in the course of organizational behavior in colleges. The results show that compared with traditional teaching methods, the application of 3D virtual scenes is more favored by students and achieves better teaching effect, which has certain theoretical and practical significance for the research in related fields. Acknowledgment. 1) This work was supported by Higher Education Research Project from Jilin Provincial Association of Higher Education (Project Title: Ideological and political advancement, problems and countermeasures of professional curriculum in Jilin Province local colleges. Contract No. JGJX2019C48). 2) This work was supported by Vocational and Adult Education Teaching Reform Research Project from the Education Department of Jilin Province (Project Title: Research on the cultivation path of craftsman spirit of college students in private universities. Contract No. 2019ZCZ054).
References 1. Yong-an, W.: Analysis of the guidance and the status quo on discourse differences in ideological-political education of universities. J. Donghua Univ. 33(4), 682–684 (2016) 2. Hong, Z.: Significance of Chinese traditional culture education in college ideological and political work. J. Huaihai Inst. Technol. 24(1), 41–46 (2017) 3. Dixon-Román, E.J.: Inheriting possibility: social reproduction and quantification in education. Theor. Pract. 43(2), 99–101 (2017) 4. Ouyang, H., Jin, R., Pan, L.: English as a global language in China: deconstructing the ideological discourse of English in language education. London: Springer, p. 189. Hb. £90 (2015). Lang. Soc. 46(3), 444–445 (2017) 5. Wellde, P.T., Miller, L.A.: There’s an app for that!: new directions using social media in patient education and support. J Perinatol. Neonatal Nurs. 30(3), 198–203 (2016) 6. Vinod Bhatia, K., Pathak-Shelat, M.: Media literacy as a pathway to religious literacy in pluralistic democracies: designing a critical media education pedagogy for primary school children in India. Interact. Stud. Commun. Cult. 8(2), 189–209 (2017) 7. Parmar, D., Bertrand, J., Babu, S.V.: A comparative evaluation of viewing metaphors on psychophysical skills education in an interactive virtual environment. Virtual Reality 20(3), 141–157 (2016) 8. Chen, J.C.: The crossroads of English language learners, task-based instruction, and 3D multi-user virtual learning in Second life. Comput. Educ. 102, 152–171 (2016) 9. de Boer, I.R., Wesselink, P.R., Vervoorn, J.M.: Student performance and appreciation using 3D vs. 2D vision in a virtual learning environment. Eur. J. Dent. Educ. 20(3), 142–147 (2016) 10. Chen, G., Ma, F., Jiang, Y.: Virtual reality interactive teaching for Chinese traditional Tibetan clothing. Art Des. Commun. High. Educ. 17(1), 51–59 (2018)
Virtual Reality Real-Time Communication System Jia Fu(&) Shanghai University of Engineering Science, 333 Long Teng Road, Songjiang District, China [email protected]
Abstract. The design and implementation of virtual communication system has been one of the main concern in the development of Virtual Reality. The main concern in constructing a network virtual communication system network is to have an appropriate architecture and effective communication protocol design to implement, and thus a research has been carry on based on the task of presenting an effective communication protocol design and realize the data and information transmission in real-time, which sent to the virtual network communication system. Keywords: Virtual Reality
Real-time Communication
1 Introduction As a new immersive technology, virtual reality technology mainly uses computer simulation system to create a virtual world, an interactive three-dimensional dynamic vision and physical behavior composed of multi-source information fusion simulation environment, can give users a real sense of experience beyond the previous technology. To achieve the above effect, a variety of technologies are required, such as real-time 3D computer graphics technology, wide-angle (wide field of view) stereoscopic display technology, the user’s head movement, hand movement and line of sight tracking technology. As well as haptic, force-aware feedback, stereo, network transmission, voice input technology, requires a complex and flexible and clever integration etc. [1– 3]. With the continuous development of science and technology, virtual reality is now involving even more into the technical field, which included business, medicine, virtual community, interior design, real estate development, industrial simulation, cultural relics and historical sites, entertainment, military, aerospace, games, and so on. In current era, realistic has been one of the crucial requirement in presenting ideas, and thus business field preferred and invested more into the three dimensional presentation model in order to show a realistic and full range of objects. As compare with a twodimensional image, it has much more incomparable disadvantages in front of three dimensional graphics content. In the perspective of business, enterprises usually released their three-dimensional form of products into online system, to display the exact shape of a product. With the aid of interactive operation, it enabled customers to © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 572–582, 2021. https://doi.org/10.1007/978-3-030-51431-0_84
Virtual Reality Real-Time Communication System
573
enjoy the product demonstration, function and operation, which also made full use of the advantage of the high speed and wide spreading Internet to promote the company’s products. 1.1
Research Motivation
The design and implementation of virtual communication system has been one of the main concern in the development of Virtual Reality. The main concern in constructing a network virtual communication system network is to have an appropriate architecture and effective communication protocol design to implement, and thus a research has been carry on based on the task of presenting an effective communication protocol design and realize the data and information transmission in real-time, which sent to the virtual network communication system [4–6]. In the virtual communication system, there is a large amount of information interaction between the client and the server. The types of information can be varying, and the information on the network communication has different needs. As for data text information, its usual size is not a very large amount of data, so RPC protocol is applied to transmit the text data; in contrast, sending the picture data is far greater than the text, thus it will use the form of Socket to send it out. Real-time communication and transmission should be an indispensable part of the virtual reality. For instance, when a viewer browsing a virtual street, their eyes should be able to notice some subtle distinction between the real scenery with the virtual scenery after certain period. Many details such as shops name and design might change, different business might have replaced the old shop, some shops and stores might be looking for new rental, food menu might update with more delicious food, and more. All these details seem to be less important, but in fact, it might cause a great misleading information. For example, when the viewer made a visit virtual community with virtual eyeglass, each people will then immerse into a marvelous 3D simulation of virtual community, but how to update the new information or even having a communication with different users? Real-time communication can achieve an effective interpersonal communication via rapid data sharing, and thus enhance the interaction of the work, so that virtual reality can become even more diverse and interesting.
2 System and Tools 2.1
System Requirement
In order to develop and research on this project, the computer graphics cards and CPU are required to be relatively higher than usual computer when it deals with Oculus, and few tools are required to progress with the implementation (Fig. 1). First of all, the computer used to develop the system is using Intel® Core(TM) [email protected] GHz, 8 GB Ram with the operating system of Windows 10, 64 bits. Besides that, the Unity 5.2 must be installed in the computer [7–9].
574
J. Fu
Fig. 1. System requirement
From the interaction aspect, the Oculus runtime SDK 0.7.0 has been used for virtual reality experience and the Leap Motion SDK 3.1.1 applied mainly for hand gestures detection. The Kinect SDK 1.8 is sued to identify the moving skeleton. Lastly, one must make sure the oculus could be run on your computer when they want to use the virtual reality system. 2.2
Environment Implementation
To implement the project, it required the best device setting or implementation (Fig. 2). First and foremost, the Oculus camera must be facing the viewer or adjust its position to the eye-level position, to ensure the position of the virtual keyboard wouldn’t deviate from the viewer. Next, KinectV1 must also be set in front of the viewer. It will be the best experience as long Kinect can detect the human in the operating distance of at least 0.8 m distance away from the KinectV1. Unfortunately, due to the resolution and the resolution of the KinectV1 is either 640 480 or 320 240 only, the action or movement might face some difficulties in recognizing. In this case, user must readjust his or her position. Another point to beware is the crowd nearby KinectV1. Overwhelming crowd will mislead the Kinect v1 to recognize another possible user, thus please take note on this [10].
Virtual Reality Real-Time Communication System
575
Fig. 2. Environment set-up
3 Implementation and Testing The so-called virtual scene refers to the existing real life of the existence of things, environment, through the virtual technology to rebuild and display. But not by the time and place of the real scene. Therefore, its emergence gives the expression of a new way of elaboration. More plump and figurative than the output of traditional text and sound. The recipient can more intuitively understand the expression’s intentions and provide quick feedback. In practice, teaching activities may be the fastest-growing area for virtual reality. Through an immersive experience, it greatly helps students to focus. At the same time, the fun settings of games like this can undoubtedly give students a great passion for learning. The use of VR glasses and other equipment, can make the collective teaching framework, so that students have a personalized experience, and let the teacher to each student’s feedback timely follow-up. Teachers can also really do teaching. 3.1
System Structure
The Virtual Reality System literally divided into two major section, named as System Network Setting and Virtual Reality Contents System. Each of the section works with different tasks (Fig. 3).
576
J. Fu
Fig. 3. Virtual reality system for real-time communication
The first major part to introduce is the system’s network settings, which is including two contents, the client and the server. RPC Protocol Setting and Socket Data Exchange is included in the client side. The upcoming part is virtual reality contents system. Kinect motion recognition, leap motion gesture recognition, send text and image, client interface design, VR keyboard design, reduce delay feeling has been included. After explaining these two parts, a deeper understanding on the internal structure of the system will be described. The network is used to solve the connection between the client and the virtual scene server, how to set up a long distance network protocol, and how to setup the appropriate data transmission mode to carry on the research. For virtual reality contents system, Kinect motion capture function has been successfully done with an additional feature of controlling the camera movement in virtual space; while the Leap Motion recognize user’s hand movements to operate the virtual keyboard and a on or off button; and through the client interface design, it ensure users enjoy the pleasing visual experience to the most. Through the information transmission capability between the client and the server, the user manage to receive and read the information or message sent by the client, meanwhile they also can reply in real-time, which makes a better communication. The FPS value is crucial too due to the relatively high CPU performance for the virtual reality development. In order to display the designed virtual space, the numerical value of FPS must set into the ideal state and optimize the system. The developer believe that can greatly reduce the user’s dizziness.
Virtual Reality Real-Time Communication System
3.2
577
System Network Setting
The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requester, called clients (Fig. 4). Often clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server’s content or service function. Clients therefore initiate communication sessions with servers which await incoming requests. Examples of computer applications that use the client– server model are Email, network printing, and the World Wide Web.
Fig. 4. A computer network diagram of client
The client-server characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or many clients, which initiate requests for such services. In a classification approach, servers can be classified by type of service, for example, shared resources can be considered to belong to any software and electronic components of a server computer, from programs and data to processors and storage devices. The Web server provides web pages, and the file server provides services for computer files. How to distinguish between a client or a server or both depends on the nature of the application that requires service functionality. For example, a computer can run both Web server and file server software, providing different data to clients that make different requests. Client software can also communicate with server software on the
578
J. Fu
same computer. Communication between servers, such as synchronized data, is sometimes referred to as inter-server communication or between servers.
4 Virtual Reality Contents System 4.1
Kinect Motion Recognition
In order to achieve the user roaming in the virtual scene, Kinect will be placed in the VR environment. In virtual space, users can’t walk as in the real world due to the environment and the limitation of hardware equipment. Thus it needs to use a relatively small gesture to trigger the movement.
Fig. 5. Kinect motion recognition
Four body gestures has been designed to control the movement of the camera in the virtual scene, including the transformation of the forward direction as well as the start and pause. As shown in Fig. 5, the four pictures enable user to control the movement such as moving forward, left, right, start, and pause. In addition, most people are righthanded, therefore this project considered much more based on the necessary of righthanded users. 4.2
Leap Motion Gesture Recognition
This is the time the Leap Motion system is presented when there is a button-pressing operation or keyboard control in the virtual glasses. It is characterized by highprecision real-time detection to track palm, finger movement, speed and other information. Use with virtual glasses, allowing the user to manipulate objects in the virtual environment by gesture. Convenient and accurate, excellent practicality. Leap Motion system can provide an effective way to interact with virtual glasses through the detection and track the position and speed of palm and finger in details. By observing the user gesture remote manipulation of objects and the accurate detection of the hand and fingertips in virtual environment, it literally enable the virtual glasses to control a button pressing gesture and the operation of the VR keyboard, shown in Fig. 6.
Virtual Reality Real-Time Communication System
579
Fig. 6. Click VR keyboard
4.3
Send Text and Send Image to Archive
It is relative simple in sending text messages. First of all, set up a two dimensional variable for the message in the client, then use the NetworkView tool in Unity3D software to send the relative data to the receiver function, as shown in Fig. 7. Through sending the data to the server with RPC protocol, the server side will be sent from the client to the text data stored in the NetworkMessageInfo structure, as shown in Fig. 8.
Fig. 7. Send image in client
Fig. 8. Send image in client
580
J. Fu
Fig. 9. Send image in client
Fig. 10. Send image in server
C# socket communication can only transfer the byte stream. Thus, to use the socket to transfer any of the things, it must be in the form of byte transmission, the pictures with naturally transfer to byte. As shown in Fig. 9, the client first defines a byte array, fssize, that needs to be transferred; then a FileStream object, and lead to the creation of a BinaryReader object is created based on FileStream object. Next, convert the image on Disk C into byte format, and then server will receive and recover the byte format back to its original image form. Furthermore, the first step to do on the server is to set a picture transmission byte space which is not more than 1 MB, it will then receive and save the data to computer memory. After that, maintain it as JPG picture format by retrieving the data with the use of image class (note that the picture is not in Disk C). Finally, close the streaming object as shown in Fig. 10.
Fig. 11. Send image flow chat
Virtual Reality Real-Time Communication System
581
Figure 11 presents the full flow chart from client to server, in simple terms, it is sending the image in byte from disk C from the client to server. Next, the server will then receive the data byte, convert it as picture format again and save the picture to the Resources folder. After that, load the Resources.Load to call the data out with Unity 3D software. The data calling part is shown in Fig. 12.
Fig. 12. Resources.Load method
5 Conclusion The production and completion of this virtual system successfully realized the real-time communication in the virtual reality environment via networking. Through this novel interactive mode, it will no doubt increases the interesting elements in Virtual Reality future development. Our solution is different from other existing network virtual systems, since this system embedded with such unique interactive solution. Currently, the system supports text communication, image transmission and three-dimensional space. In addition, users can also enjoy the virtual environment while the delay has minimized, experience the virtual keyboard that can send information in real-time and respond by other users as soon as possible. All those improvements has been greatly enhanced the real-time interaction. Real-time virtual communication systems can be used in business, virtual streets or virtual communities in near future. In addition, the delay in virtual environment has been further optimized to reduce the sense of fatigue during interaction, and thus it has been successfully enabled users to stay longer than the usual Virtual Reality’s experience. Therefore, this study holds plenty of potentials to influence everyone’s way of life and the world can be more interesting with this new technology. Acknowledgments. The thesis was supported by the construction, exploration and practice of virtual reality with the characteristics of an interdisciplinary integration among “Engineering”, “Art” and “Literature” and the teaching theory about “Humanistic” (Project No.: 0243-A1-060119-01146).
582
J. Fu
References 1. Parisi, T.: Introduction. In: Learning Virtual Reality. Prentice Hall (2015). Accessed 22 Apr 2016 2. Tie-Tou, Z., Ying-Jun, T.: Network communication system of virtual scene based on UDP protocol. In: 2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications, pp. 626–630. IEEE (2014) 3. Lai, R., Jirachiefpattana, A.: Communication protocol. In: Communication Protocol Specification and Verification, pp. 5–25. Springer, Boston, MA (1998). Accessed 26 Apr 2016 4. Feng, X.Y., Shen, J.J., Fan, Y.: REST: an alternative to RPC for Web services architecture. In: 2009 First International Conference on Future Information Networks, pp. 7–10. IEEE (2009) 5. Law, K.L.E., Leung, R.: A design and implementation of active network socket programming. In: Eleventh International Conference on Computer Communications and Networks, pp. 78–83, Oct 2002 6. Pimentel, V., Bolivar, U.S., Nickerson, B.G.: Communicating and displaying real-time data with websocket. IEEE Internet Comput. 16(4), 45–53 (2012) 7. Elons, A.S., Ahmed, M., Shedid, H., Tolba, M.F.: Arabic sign language recognition using leap motion sensor. In: 2014 9th International Conference on Computer Engineering & Systems (ICCES), pp. 368–373. IEEE (2014) 8. Kinect V1: http://developer.microsoft.com/en-us/windows/kinect. Accessed 2 June 2016 9. Oluwatosin, H.S.: Client-server model. IOSRJ Comput. Eng. 16(1), 67–71 (2014) 10. Srivastava, S., Engineering and R&D Services, HCL Technologies Ltd., Srivastava, P.K.: Performance analysis of Sun RPC. In: 2013 National Conference on Parallel Computing Technologies (PARCOMPTECH), pp. 1–9. IEEE (2013)
Prediction Method of Basketball Players’ Shooting Rate Based on Quantum Search Algorithm Zheng Yang(&) Department of Military Sports Teaching, Inner Mongolia Technical College of Construction, Hohhot 010070, Inner Mongolia, China [email protected]
Abstract. The traditional basketball players’ shooting rate prediction algorithm adopts quantum algorithm, which is easy to cause information divergence and fall into local extremum when dealing with the statistical data of large scale basketball players’ shooting rate, the accuracy of prediction of shooting rate of basketball players is not high. An adaptive learning based quantum evolutionary search (QEP) algorithm is proposed to predict the shooting rate of basketball players. The statistical data regression model of basketball players’ shooting rate is constructed, and the statistical characteristic sequence analysis of basketball players’ shooting rate is carried out. The quantum optimization algorithm is used to compare whether the frequency fluctuation in the information flow is the same or not in the statistical regression analysis of shooting hit rate, the same one is merged, and the quantum search algorithm is designed based on the fuzzy Cmeans clustering algorithm. Based on the adaptive learning quantum evolutionary search algorithm, the statistical data of basketball players’ shooting rate are projected into the high-dimensional phase space, and the real-time prediction optimization of the basketball players’ shooting rate is carried out. The simulation results show that the algorithm has higher accuracy and less error in predicting the shooting rate of basketball players, and it has a better application value in basketball training. Keywords: Basketball player algorithm
Shooting ratio Prediction Quantum search
1 Introduction In modern basketball match, the emphasis is on high, the emphasis is on accuracy, emphasis on and emphasis on confrontation, in such a specific confrontation fighting conditions, the level of free throw hit in the game directly affects the results of the game. Free throw is the only way to score directly without interference, especially in the case of close to the level, the victory or defeat often depends on the key free throw at the critical moment. Therefore, a comprehensive discussion of the factors that affect the percentage of free throw hits in basketball matches is bound to hold the initiative of winning and losing the game in the hands of their own teams [1]. The factors © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 583–592, 2021. https://doi.org/10.1007/978-3-030-51431-0_85
584
Z. Yang
influencing the hit rate of free throw include physical, technical and psychological aspects, including the nature of the match, the time of the match, the score, the effect of the previous free throw, the situation of technical mastery, the condition of physical ability, the disturbance of the external environment, etc. In view of the above reasons, the main task of the free throw training is to train, improve the confidence of the players, help the players master the correct free throw techniques, strengthen the pregame simulation training, and carry out self-suggestion and relaxation training. In addition to the necessary physical and technical training, we should pay more attention to the psychological training of athletes. Because the selection of training methods for free throws is mainly based on the actual competition, that is to say, it is necessary to simulate the situation of the competition so as to enable the athletes to combine the actual situation of the competition and improve the ability to complete the free throws under certain psychological pressure, such free throw training has great significance to actual combat [2]. The action of single-handed shoulder shooting in situ is stipulated in the basketball physical education syllabus, and the movement structure is simple [3]. But it’s not easy to hit a high percentage. Must pass through the repeated practice, grasps the correct movement main point to be able to obtain the effect. Through observation and analysis in the teaching practice, the common mistakes in the students’ practice are as follows: not paying attention to the extended-coordination strength of the whole body’s muscles and joints, the wrong way of holding the ball, ignoring the importance of the wrist movement and the parabola of the ball running in the air. The factors influencing the hit rate of free throw include physical, technical and psychological aspects, including the nature of the match, the time of the match, the score, the effect of the previous free throw, the situation of technical mastery, the condition of physical ability, the disturbance of the external environment, etc. In view of the above reasons, the main task of the free throw training is to train, improve the confidence of the players, help the players master the correct free throw techniques, strengthen the pre-game simulation training, and carry out self-suggestion and relaxation training. In addition to the necessary physical and technical training, we should pay more attention to the psychological training of athletes. Because the choice of free throw training method is based on the actual situation of the main competition, that is to say, it is necessary to simulate the situation of the competition, so that the athletes can improve their ability to complete the free throw under certain psychological pressure combined with the actual situation of the competition [4–6]. In order to improve the shooting rate of basketball players, an adaptive learning algorithm based on quantum evolutionary search is proposed to predict the hit rate of basketball players. The statistical data regression model of basketball players’ shooting rate is constructed, and the statistical characteristic sequence analysis of basketball players’ shooting rate is carried out. The quantum optimization algorithm is used to compare whether the frequency fluctuation in the information flow is the same or not in the statistical regression analysis of shooting hit rate, the same one is merged, and the quantum search algorithm is designed based on the fuzzy C-means clustering algorithm. Based on the adaptive learning quantum evolutionary search algorithm, the statistical data of basketball players’ shooting rate are projected into the high-dimensional phase space, and the realtime prediction optimization of the basketball players’ shooting rate is carried out.
Prediction Method of Basketball Players’ Shooting Rate
585
Finally, the simulation experiments are carried out to show the superior performance of this method in improving the prediction ability of basketball players’ shooting rate.
2 Statistical Data Analysis Model of Basketball Players’ Positioning and Pitching Rate 2.1
Regression Analysis Model of Basketball Players’ Hit Rate of Localization and Pitching
Aiming to accurately predict the hit rate of basketball players, the information processing algorithm is used to analyze the sample data and rearrange the information features, and a prediction model is constructed [7]. Suppose that the priori knowledge of the time series sampling of the statistical data of the shooting rate of basketball players is expressed as that the original fxi gNi¼1 , data of the shooting rate of the basketball players have linear correlation with Gauss process [8]. According to the rank of sequence y0 ðnÞ, this paper analyzes the data arrangement, and obtains the discriminant statistics of the original sequence dxi ðjk Þ ¼ xjk xi jk 2 1; 2; ; Nb , to construct the statistical data to generate Nb dimension vector. Based on the autoregressive moving average model, the initial Xð0Þ solution of the original sequence of shooting hit rate for basketball players is divided into N parts. For Xð1Þ ; Xð2Þ ; ; XðNÞ , there is N S XðiÞ , arranges the original basketball players’ shooting rate data according to Xð0Þ ¼ i¼1
the rank of y0 ðnÞ sequence of basketball players’ positioning hit rate, and obtains the fitting model of statistical basketball players’ positioning hit rate data expressed as follows: xn ¼ u0 þ
p X
ui xni þ
i¼1
q X
hj gnj
ð1Þ
j¼0
Where, fgi g is a linear correlated Gauss random variable with a mean value of 0 and a variance of u0 ; u1 ; u2 ; up . h1 ; h2 ; hq is called the time inversion irreversible characteristic decomposition coefficient of the shooting rate of basketball players, and u0 is called the average coefficient of sliding time window [9]. The iterative formula of exponential spectrum calculation for statistical data of basketball players’ shooting rate is expressed as follows: XXXX max xa;b;d;p Vp ð2Þ xa;b;d;p
s:t:
a2A b2B d2D p2P
XXX
bw xa;b;d;p Rbw p Kb ðSÞ; b 2 B
ð3Þ
a2A d2D p2P
In the two-dimensional principal feature space of statistical basketball players’ shooting rate data distribution, feature training is carried out by means of exponential
586
Z. Yang
spectrum calculation, fuzzy neural network is used for feature training, and quantum search algorithm is used to optimize learning to improve prediction accuracy [10]. 2.2
Feature Extraction and Analysis of Shooting Percentage Data
This paper analyzes the statistical characteristic sequence of basketball players’ shooting rate, compares the frequency fluctuation in the information flow with statistical regression analysis of shooting hit rate by using quantum optimization algorithm, and merges the same one. The autoregressive moving average model was used to rearrange the prior data of basketball players’ shooting rate [11]. Assuming that the group of quantum search in the autoregressive moving average model is N, where the first quantum search is located, the length of the time series corresponding to the ðxi ; yi Þ of the basketball player’s shooting rate is f ððxi ; yi ÞÞ, and the phase randomization Fourier is the length of the time series. Transform the (RPFT) method to calculate the value of fluorescein Ti , this quantum search obtains the updated formula of information rearrangement in the same field of view as the original data: Rid ðt þ 1Þ ¼ min Rs ; max 0; Rid ðtÞ þ bðnt jNi ðtÞjÞ
ð4Þ
Ni ðtÞ ¼ j : xj ðtÞ xi ðtÞ\Rid ; li ðtÞ\lj ðtÞ
ð5Þ
Where, xj ðtÞ indicates the position of the priori data of the shooting rate of basketball players in the first quantum search of the t generation, and lj ðtÞ represents the average value of the best position of the j quantum search individual of the t generation. The adjacent quantum search updates its own speed and position, and the global optimal location distribution of the quantum search is obtained in the range of predictive field Rid : l j ðt Þ l i ðt Þ pij ðtÞ ¼ P lk ðtÞ li ðtÞ
ð6Þ
k2Ni ðtÞ
Quantum search is used in the D-dimensional space of the autoregressive moving average model to search the distribution characteristics of the shooting rate of basketball players [12]. The fluorescein value is used as the search condition, and the search formula is expressed as follows: li ðt þ 1Þ ¼ ð1 qÞli ðtÞ þ cJ ðxi ðt þ 1ÞÞ
ð7Þ
With quantum evolutionary pheromone search, the priori data rearrangement of basketball players’ shooting rate is described as follows: 1) Initialization. Assume that the maximum number of iterations for quantum search at k 1 time is fxik1 ; wik1 g. The initial inertial weight of the quantum search individual generated pðx0 Þ is calculated. All the quantum iby the adaptive function search weights of x0 ; i ¼ 1; 2; . . .. . .N are 1 / N.
Prediction Method of Basketball Players’ Shooting Rate
587
2) Regression moving average model construction and feature sampling. If the random inertia weight is small, the statistical probability density function qðxik =xik1 Þ is calculated to update the quantum search set f~xik gNi¼1 . 3) The fitness distribution weights of each quantum search individual are calculated: ~ ik1 ~ ik ¼ w w
pðzk =~xik Þpð~xik =xik1 Þ qð~xik =xik1 Þ
ð8Þ
4) Calculate normalized weights: ~~ i ¼ w ~ ik = w k
N X
wik
ð9Þ
i¼1
5) The current position xi replaces the pi, for global extremum sampling: when an N P ~~ i Þ2 , is defined to set the threshold value Nth , the effective sampling Neff 1= ðw k i¼1
fitness function of the current position xi satisfies the Neff \Nth , From the f~xik gNi¼1 ~ ~ ik resampling to obtain the set according to the global optimal solution weight w basketball player positioning hit rate of the prior data of the feature distribution set fxik gNi¼1 , redistribute weight value wik ¼ 1=N. 6) If the number of iterations reaches the preset maximum, the estimation formula of the priori data rearrangement of the shooting rate of basketball players is calculated as follows: ^xk ¼
N X
wik xik
ð10Þ
i¼1
In the update stage of quantum evolutionary pheromone, the updating of quantum evolutionary pheromone of each quantum search depends on the current fitness value of quantum search, resulting in a new inertial weight value to improve the convergence of prediction [13].
3 Prediction Algorithm Optimization 3.1
Quantum Search Algorithm
In this paper, an adaptive learning algorithm based on quantum evolutionary search is proposed to predict the shooting rate of basketball players [14]. The multiple cluster
588
Z. Yang
combination linear equations of basketball players’ shooting rate are expressed as follows:
0 0 0 ðx P1 ðtÞ; x2 ðtÞ; ; xn ðtÞÞ ¼ ðx1 ðtÞ; x2 ðtÞ; ; xn ðtÞÞD xi ðtÞ ¼ 1 1 i n PD ¼ 0 P pi ¼ 1 1 i n
ð11Þ ð12Þ
In the formula, pi is the probability of transferring the statistical characteristic sequence of hit rate of basketball player from state Mn to state Mj , assuming that there is a stable probability of n markers in the chain of information. The line vector P ¼ ðp1 ; p2 ; ; pn Þ, D is expressed as a multivariate feature, it is the transition rate matrix of the basketball player’s shooting rate. The quantum optimization algorithm is used to compare whether the frequency fluctuation in the information stream is the same or not in the statistical regression analysis of the shooting hit rate [15]. Combining the same, the quantum information chain is defined as: P ¼ D1 A
ð13Þ
The data chain in the information flow is a cluster of particles. Based on the hybrid differential evolution method, the speed and position update strategy of quantum evolution is assumed as follows: (
ðt þ 1Þ
vid
ðt þ 1Þ
xid
¼ vtid þ c1 r1 ptid xtid þ c2 r2 ptgd xtid ðt þ 1Þ
¼ xtid þ vid
ð14Þ
Where, fc1 ; c2 g is the set coefficient of quantum cluster, fr1 ; r2 g is the standard normal distribution between ½0; 1, and w is inertial coefficient. Under the condition of constant false alarm probability detection, based on the multi-marker method, the statistical data of basketball players’ hit rate are marked from two-dimensional space to multidimensional state space, and the fuzzy C-means clustering algorithm is used to design the quantum search algorithm. The adaptive learning process is shown in Fig. 1.
Prediction Method of Basketball Players’ Shooting Rate
589
Fig. 1. Quantum evolutionary search process of adaptive learning for basketball players to locate pitching hit rate
3.2
Prediction of Hit Ratio of Pitching
Based on the adaptive learning of the feature vector of the data set, the prediction of the hit rate of basketball players’ location pitching evolves into a quantum evolutionary duality problem of adaptive learning, which can be expressed as: min F ¼ R2 þ A
P i 2
ni
s:t : jj/ðxi Þ ojj R2 þ ni and ni 0; i ¼ 1; 2; . . . P PP max ai Kðxi ; xi Þ ai aj Kðxi ; xj Þ i i j P s:t : ai ¼ 1 and 0 ai A; i ¼ 1; 2; . . .
ð15Þ
ð16Þ
i
Where, ni is the global optimization coefficient of the quantum group i at the ðt þ 1Þ moment, A is the P amplitude of the shooting rate sequence, and Kðxi ; xj Þ is the fitness function. Where, ai ¼ 1, Kðxi ; xi Þ ¼ 1, as a result, the mapping strategy of weight i
coefficient for basketball players to predict the particle weight coefficient is:
w ¼ wðtÞ wstart w ¼ wðtÞ w1end
ka k\b
ð17Þ
With the above processing, the statistical data of basketball players’ shooting rate are mapped to the kernel space, and adaptive learning is used to transform the sequence of basketball players’ shooting rate to realize accurate prediction.
590
Z. Yang
4 Simulation Experiment and Result Analysis In order to test the performance of this algorithm in the accurate prediction of basketball players’ hit rate, the simulation experiment was carried out. The hardware platform of the experiment is: Windows XP system, 3.45 GHz Pentium four processors, 512 MB memory. The algorithm platform uses Matlab 7 and SQL Server 2005, to predict the shooting rate of basketball players, in order to improve the accuracy of the prediction. The evolution factor k = 0.25 Bit, quantum evolution radius of the sliding window of the statistical characteristic sequence of shooting rate of basketball players is set to R ¼ 14, mixed differential evolution weight threshold set to v ¼ 10 mean fitness error coefficient set to b = 0.001, and make individual gather. The average length of the updated period d ¼ 5, sliding window of the Td ¼ 9s, basketball players with adjusted weight of the class center and the number of quantum population iterations is N5 and 1024 respectively. According to the above simulation environment and parameter setting, the average length of the GSS, sliding window is 5 and the number of quantum population iterations is 1024. The statistical data of basketball players’ shooting rate are collected and predicted, and the statistical data are shown in Fig. 2.
1 0.9 0.8
Amplitude/dB
0.7 0.6 0.5 0.4 0.3 0.2 0.1 0
0
100
200
300
400
500
600
700
800
900
1000
Time/s
Fig. 2. Statistical data acquisition of pitching hit rate
It can be seen from the figure that the original statistical data of the shooting rate of basketball players are disturbed greatly, and the accuracy of the statistics of the shooting rate of basketball players is not good. The method of this paper is used to predict the hit rate of the basketball players. The predicted results are shown in Fig. 3.
Prediction Method of Basketball Players’ Shooting Rate
591
0
-2
lnC(r)
-4
-6
-8
-10
-12 -2.5
-2
-1.5
-1
-0.5
0
ln(r)
Fig. 3. Prediction results
Figure 3 shows that the proposed algorithm is applied to the adaptive learning quantum evolutionary search of basketball players’ shooting ratio, and the prediction results are more accurate, which improves the hit ratio of basketball players. The predictive performance of different methods for pitching hit ratio is tested, and the comparison results are shown in Fig. 4.
1 0.95 0.9
Accuracy
0.85 0.8 0.75
Proposed method Reference[4] Reference[6]
0.7 0.65
10
20
30
40
50 60 70 Iterative step number
80
90
100
Fig. 4. Comparison of predictive performance
It can be seen from the graph that the proposed algorithm is superior to the traditional one in the adaptive learning of quantum evolutionary search, and the prediction error is small.
5 Conclusions In this paper, an adaptive learning based quantum evolutionary search algorithm is proposed to predict the shooting rate of basketball players. The statistical data regression model of basketball players’ shooting rate is constructed, and the statistical characteristic sequence analysis of basketball players’ shooting rate is carried out. The
592
Z. Yang
quantum optimization algorithm is used to compare whether the frequency fluctuation in the information flow is the same or not in the statistical regression analysis of shooting hit rate, the same one is merged, and the quantum search algorithm is designed based on the fuzzy C-means clustering algorithm. Based on the adaptive learning quantum evolutionary search algorithm, the statistical data of basketball players’ shooting rate are projected into the high-dimensional phase space, and the realtime prediction optimization of the basketball players’ shooting rate is carried out. The simulation results show that the algorithm has higher accuracy and less error in predicting the shooting rate of basketball players, and it has a better application value in basketball training. This method has a good application value in the training and skill guidance of basketball players’ positioning and pitching.
References 1. Yaoyu, Z., Yangwang, F., Xianzhi, W., et al.: Evaluation method for simulation credibility based on cloud model. J. Comput. Appl. 38(6), 1535–154 (2018) 2. Xu, Y., Tong, S., Li, Y.: Prescribed performance fuzzy adaptive fault-tolerant control of nonlinear systems with actuator faults. IET Control Theory Appl. 8(6), 420–431 (2014) 3. Huang, X., Wang, Z., Li, Y., et al.: Design of fuzzy state feedback controller for robust stabilization of uncertain fractional-order chaotic systems. J. Franklin Inst. 351(12), 5480– 5493 (2015) 4. He, X., Youqiang, G., Honghao, Z., Shuo, W.: Robust nonnegative matrix factorization on manifold via projected gradient method. Inf. Control 47(2), 166–175 (2018) 5. Drakakis, K., Rickard, S., Frein, R.D., et al.: Analysis of financial data using nonnegative matrix factorization. Int. Math. Forum 3(38), 1853–1870 (2008) 6. Ju, B., Qian, Y.T., Ye, M.C.: Collaborative filtering algorithm based on structured projective nonnegative matrix factorization. J. Zhejiang Univ.: Eng. Sci. 49(7), 1319–1325 (2015) 7. Li, B.F., Tang, Y.D., Han Z.A.: Geometric structure preserving nonnegative matrix factorization for data representation. Inf. Control 46(1), 53–59, 64 (2017) 8. Wu, Y., Shen, B., Ling, H.: Visual tracking via online nonnegative matrix factorization. IEEE Trans. Circuits Syst. Video Technol. 24(3), 374–383 (2014) 9. Ye, M., Qian, Y., Zhou, J.: Multitask sparse nonnegative matrix factorization for joint spectral-spatial hyperspectral imagery denoising. IEEE Trans. Geosci. Remote Sens. 53(5), 2621–2639 (2015) 10. Hu, L.R., Wu, J.G., Wang, L.: Application and method for linear projective non-negative matrix factorization. Comput. Sci. 40(10), 269–273 (2013) 11. Xiaojing, H., Rongyi, Y., Changjie, Z.: Study on optical properties of equivalent film constructed of metal nanoparticle arrays. J. Optoelectron. Laser 24(7), 1434–1438 (2013) 12. Yuanzhuang Z., Rongyi, Y.: Study on segmented correlation in EEG based on principal component analysis. Chin. J. Biomed. Eng. 22(3), 93–97 (2013) 13. Wei, Z., Xiaojing, H., Rongyi, Y.: Removal of white noise from ECG signal based on morphological component analysis. Chin. J. Biomed. Eng. 23(1), 1–6 (2014) 14. Yuanzhuang Z., Rongyi, Y.: Wavelet variance analysis of EEG based on window function. Chin. J. Biomed. Eng. 23(2), 54–59 (2014) 15. Xinzheng, L., Hezhou L., Qizhi, W.: A new technology of pulse sorting based on paired localization. Aerosp. Electron. Warfare 33(3), 47–49 (2017)
Algorithm of Ground Stability Correction for High Difficulty Movements of Competitive Mingming Gong(&) Institute of Tourism and Sports Health, Hezhou University, Hezhou 542899, Guangxi, China [email protected]
Abstract. The stability correction analysis model of high difficulty movement in competitive Wushu after landing is studied, and the dynamic parameters such as rigid body mechanical driving moment of landing limb of high difficulty movement of competitive martial arts is solved. A stability correction analysis model based on rigid body dynamics adaptive control for competitive martial arts after landing is proposed. The mathematical model of knee movement of lower extremity after landing of high difficulty movement of competitive martial arts was constructed, and the driving force model and movement trajectory control equation after landing of martial arts movement were constructed. The 7bar driving structure is used to decompose the lower limbs of human competitive martial arts after falling to the ground, and the 3-dimensional orthogonal carrier coordinate system of rigid body is defined. The Lagrange dynamic equation is used to realize the global analysis of the landing impact parameters of the high difficulty movements of competitive martial arts. According to the continuous control method of joint value, the stability correction is realized by using the proportional and integral trajectory correction control method. The simulation results show that the stability correction model has better control performance, higher calculation accuracy and better correction performance for landing position. Keywords: Competitive martial arts Dynamic analysis Control
Difficult movements Landing
1 Introduction In the collision of Chinese and Western sports culture, competitive Wushu stood out. After twists and turns, competitive Wushu gradually matured, and became the main body of modern Wushu, and with its physical fitness, nourishing essence and spirit, it became the main body of modern Wushu. Cultivate sentiment, exercise the actual effect of will, attracted many martial arts enthusiasts. To study the present situation of the development and construction of competitive Wushu in our country, we should stand at the overall situation, grasp the key development items, realize that the present situation of the development of competitive Wushu is mainly competitive Wushu, in the longterm construction and innovation dissemination, the future of competitive Wushu in the development of Wushu in the future is evaluated by integrating the updated elements. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 593–601, 2021. https://doi.org/10.1007/978-3-030-51431-0_86
594
M. Gong
In order to improve the scientific level of physical training, realize scientific training and reduce the injury and impact on knee caused by high difficulty movement of competitive Wushu in physical training, it is necessary to study the stability correction analysis model of high difficulty movement in competitive Wushu after landing. In order to provide model and data basis for guiding scientific physical training and sports medical treatment, the dynamic parameters such as rigid body mechanical driving moment of landing limb of high difficulty movement of competitive martial arts were solved, which provided the model and data basis for guiding scientific sports training and sports medical treatment [1]. The research on the dynamic model of stability correction after landing of high difficulty movements in competitive Wushu has been paid much attention by experts in sports science, mechanics and other subjects. In order to construct the dynamic model of stability correction and analysis after landing, it is necessary to analyze the dynamics of human body’s lower extremity booster model first, and must proceed from the angle of lower limb and knee kinematic chain modeling theory [2]. This paper analyzes the geometric control and behavior control mechanism of landing limb and knee movement chain of competitive Wushu, and fully exerts the potential of human body to create a new record of human sport in competitive sports. The traditional modeling methods are mainly Lagrange dynamic model construction method, six degree of freedom spatial impact dynamic model construction method and sagittal martial arts movement landing rigid mechanics model construction method. Based on the comprehensive analysis of various modeling methods, the normal method is to obtain the joint angle space by the forward kinematics algorithm, and to realize the inverse kinematics solution of the multiple degrees of freedom by using the analytic method. For example, in reference [3], a geometric method is used to solve the inverse kinematics solution of a manipulator with 7 rotational degrees of freedom. First, the CCD algorithm is used to make the inverse motion error between the virtual pose and the current position. The circular coordinate space of lower limb and knee motion chain can be solved. In reference [4], the method of combining mechanical structure and human body structure inverse kinematics are adopted to analyze the global force on the landing limbs and knees of the high difficulty movements of competitive martial arts. In this way, it is impossible to estimate the local force mode of each joint of the limb, and cannot accurately construct the human motion model. In this paper, the lower limbs and knees are decomposed with 6 degrees of freedom, and the dynamic mathematical modeling and mechanics are carried out. The stability correction analysis model after landing of the high difficulty movement of competitive martial arts constructed by the traditional method can only solve the local knee joint force and force parameters. It is difficult to model the parameters of knee and lower extremity joint driving and the potential energy of impact motion [5]. In order to solve the above problems, this paper presents a stability correction analysis model of competitive Wushu after landing with a 7-link driven structure. Firstly, a mathematical model of knee movement of lower extremity after landing of high difficulty moves of competitive martial arts is constructed, and the relationship between the movement chain position and pose of landing impact on knee is analyzed. The 7-bar driving structure is used to decompose the lower limbs of human competitive martial arts after landing, and the center of mass of the members of the 7-bar is obtained. The global analysis of the impact parameters is realized by using the
Algorithm of Ground Stability Correction
595
Lagrange dynamic equation. The optimal solution vector is obtained. Finally, the simulation results show the accuracy and superiority of this method in mechanical analysis.
2 Mathematical Modeling of Landing Limbs and Knee Movement Chain in Competitive Martial Arts 2.1
Structure and Kinematics Vector Model of Landing Limbs and Knees in Competitive Wushu with High Difficulty
In order to realize the mechanical analysis of the impact force on the knee after the high difficulty movement of human body competitive martial arts, the first step is to analyze the structure of limb and knee and construct the kinematics vector model. When the human body falls to the ground of the high difficulty movement of competitive Wushu [6], it is necessary to carry on the structure analysis and the kinematics vector model construction of the limb and knee of the high difficulty movement. The dynamic force supporting structure mainly includes bipedal, shank, thigh, knee and upper limb, in which the impact force on knee is the most serious. The structure model of human lower extremity skeleton bearing 7 connecting rod is obtained, and the mechanical parameters of human body competitive martial arts with high difficulty movement are analyzed [7]. The parameters are assumed as follows: mi is the unit mass i ¼ 0; 1; 2; . . .; 6 of each limb unit of human competitive martial arts. li is the length of each limb in the course of motion, and the variation of the length is different from that of the human body, ai indicates the distance of the center of mass of the leg model, qi indicates the angle of the member in the vertical direction with the vector of the left leg. hi is the angle at which the leg is centered around the knee joint. It is an iterative vector of the distance between the joints of two limbs. For the pose of the joint unit I and the pose of the joint unit j, under the condition of landing of the highly difficult movements of competitive martial arts, the coordinate of the ankle mark system Oxyz of the supporting leg is ðxa ; 0Þ. The center vector of the knee is constrained by the impact force of the upper body with the change of the center of mass Gi ðxi ; zi Þ position. Thus, the decomposed expression of the kinematics vector model of the knee and each limb of the high difficulty movement of competitive martial arts is as follows: 8 > > > > > > > > > < > > > > > > > > > :
x0 ¼ xa þ a x1 ¼ xa þ a1 sin q1 x2 ¼ xa þ l1 sin q1 þ a2 sin q2 x3 ¼ xa þ l1 sin q1 þ l2 sin q2 þ a3 sin q3 x4 ¼ xa þ l1 sin q1 þ l2 sin q2 þ a4 sin q4 x5 ¼ xa þ l1 sin q1 þ l2 sin q2 þ l4 sin q4 þ a5 sin q5
ð1Þ
x6 ¼ xa þ l1 sin q1 þ l2 sin q2 þ l4 sin q4 þ l5 sin q5 þ a6 sin q6
The inverse kinematics analysis model is used, for the lower extremity vector zi of the six-degree-of-freedom high difficulty movement landing whole joint structure [8],
596
M. Gong
the landing force component of the high difficulty movement of competitive martial arts is calculated as follows: 8 > > > > > > > >
> > z ¼ l cos q1 þ l2 cos q2 þ a4 cos q4 4 1 > > > > z ¼ l cos q þ l 5 1 1 2 cos q2 þ l4 cos q4 þ a5 cos q5 > : z6 ¼ l1 cos q1 þ l2 cos q2 þ l4 cos q4 þ l5 cos q5 þ a6 cos q6
ð2Þ
With the above model design, the structure and kinematics vector model of landing limb and knee of the high difficulty movement of competitive martial arts are obtained, which provides the model technical foundation for the impact force analysis [9]. 2.2
Kinematic Chain Mathematical Modeling
On the basis of the 7 link structure model of the lower extremity skeleton force of the high difficulty movement of competitive martial arts designed above, the mathematical model of every joint of human body, especially the impact force movement chain of knee, is established after the high difficulty movement of competitive martial arts falls to the ground. In this paper, the Denavit Hartenberg (D-H) representation method of the mathematical model of landing limb and knee movement chain in high difficulty movement of competitive martial arts is presented. The D-H method is described by mathematical language [10]. A powerful tool for solving the mapping relationship between joint angle space and the Cartesian space of the end effector of the human body, the problem of mapping from Cartesian space to angle space of joints is solved effectively by inverse kinematics. The mathematical modeling method of D-H kinematic chain is described as: when coordinate system A and coordinate system B have different azimuth of origin, The coordinate system is the palm joint, and the joint of the palm is studied independently. The initial position of the knee joint unit i and the joint unit j is: hstart 2 Cfree (free C-space), and the pose of the human root joint unit is pobj . Position and pose Transformation set of wrist Local coordinates relative to Root coordinates gc , competitive Wushu landing target configuration s : ½0; 1 ! Cfree unknown the continuous path mapping of shoulder joint (shoulder is spherical joint) satisfying joint constraints: s : ½0; 1 ! Cfree , makes s½0 ¼ hstart , s½1 ¼ hgoal , ðpobj ; gc Þ ! f ðhgoal Þ. The dynamic equations of knee kinematic chain after landing of high difficulty movement of competitive martial arts can be considered as rotation joint approximately, and the equations are as follows: (1) the dynamic model of knee motion chain after landing of high difficulty movement in competitive martial arts is established: m
dV ¼ P cos a X mg sin h dt
ð3Þ
Algorithm of Ground Stability Correction
mV
dh ¼ P sin a þ Y mg cos h dt
597
ð4Þ
In the formula, m is the mass of the force unit of the human body in the high difficulty movement of competitive martial arts; P is the moment of momentum; h is the distance between the joints of the two limbs; thus, the kinetic energy of the knee force of the human body after landing in the highly difficult movement of competitive martial arts is obtained as follows: K¼
6 1X ½Ii q_ 2i þ mi ð_x2i þ z_ 2i Þ 2 i¼0
ð5Þ
Taking the upper limb mass m3 into consideration and combining the relationship between centroid distance and coordinate axis, the potential energy of movement after landing of high difficulty movements in competitive martial arts is obtained. P¼
6 X
mi gzi
ð6Þ
i¼0
Thus, the kinematic model D-H representation method of lower extremity and knee structure and lower limbs and knees and joints was obtained, and the mathematical model of human joint kinematic chain after landing of high difficulty movement of competitive martial arts was realized [11].
3 Global Optimal Solution Vector of Rigid Body Mechanics Analysis Model for Wushu Movement Landing On the basis of the above model construction and parameter design, the mechanical analysis and optimization solution of the knee impact force after the high difficulty movement of competitive Wushu fell to the ground were carried out. The stability correction analysis model after landing of the high difficulty movement of competitive martial arts constructed by traditional method can only solve the local knee joint force and force parameters [12]. It is difficult to model the parameters of knee and lower extremity joint driving and the potential energy of impact motion. In order to overcome the defects in the traditional method of solving the impact force solution vector, this paper presents a stability correction analysis model based on rigid body dynamics adaptive control for high difficulty movements of competitive martial arts after landing. Based on the adaptive control of rigid body dynamics [13], the whole model of lower limb shock and the model of left and right legs were constructed after the high difficulty movement of competitive martial arts fell to the ground, and the centroid of the members of 7 members was obtained [14]. The Lagrange dynamic equation is used to realize the global analysis of the parameters of impact force, and the optimal solution vector is obtained. The impact force moment of landing action of high difficulty movement of competitive martial arts on the left knee is assumed to be mL3 . The impact
598
M. Gong
moment acting on the right knee is mR3 . According to the above analysis, the Lagrange dynamic equation is used. d @L @L ¼ Ti ; ði ¼ 1; 2; ; 6Þ dt @ q_ i @qi
ð7Þ
The results of landing torque mR3 and moment mL3 calculation of high difficulty movements in competitive Wushu are expressed as follows: xL3 ¼ l1 sin h1 þ l2 sinðh1 h2 Þ þ a3 sinðh1 h2 þ h3 Þ a0
ð8Þ
xR3 ¼ a6 l5 sin h6 þ l4 sinðh5 h6 Þ a3 sinðh4 h5 þ h6 Þ
ð9Þ
There is a relationship between the inertia moment of the high difficulty movement of competitive Wushu and the inertia moment of landing: mL3 xR3 ¼ mR3 xL3
ð10Þ
m3 ¼ mL3 þ mR3
ð11Þ
The relationship between the joint nodes of the knee and the landing of the high difficulty movement of competitive Wushu is shown as follows: q1 ¼ h1 ; q2 ¼ h1 h2 ; q3 ¼ h1 h2 þ h 3
ð12Þ
The zero group of joints are human root joint units, and the coordinates are relatively fixed. A V-joint and a P-joint are obtained as follows: a4 ¼ rw p4 =krw p4 k; rw ¼ p lh n
ð13Þ
o4 ¼ a4 ðrs p4 Þ= ka4 ðrs p4 Þk; n4 ¼ o4 a4
ð14Þ
In this way, the model of each joint driving action and the force impact force under the landing of the high difficulty movement of competitive martial arts is constructed [15], and the expression of the global impact potential energy of knee is calculated as follows: P¼
2 X
ðmi gzi Þ þ mL3 gz3
ð15Þ
i¼0
At this time, the driving moment of the position offset correction of the high difficulty movement of competitive martial arts is expressed as follows: d @L @L ¼ s0i ; i ¼ 3; 4; 5; L ¼ K P dt @ h_ i @hi
ð16Þ
Algorithm of Ground Stability Correction
599
Where, s0i represents the driving moment of each joint respectively. From this, the rigid physical strength analysis and stability correction of martial arts movement landing after landing of high difficulty movements of competitive martial arts are realized.
4 Simulation Experiment and Performance Analysis In order to test the accuracy of the mechanical analysis model designed in this paper in the solution of rigid body mechanics of martial arts movement landing after testing the high difficulty movement of competitive martial arts, the simulation experiment was carried out. In the simulation experiment, ADAMS software is used to get the simplified simulation system of landing force of human competitive martial arts, and the DH kinematic chain modeling parameter design of human limb joint is shown in Table 1. Table 1. D-H parameter table for modeling of joint movement chain under competitive martial arts i 1 2 3 4
qi/Radian q1 q2 − p/2 q3 + p/2 q4
ai/Radian −p/2 −p/2 p/2 −p/2
ai/mm ls 0.5 0.5 0.25
di/mm 1 1 lu 0.24
Joint constraint [−p/4, p/4] [−p/2, p/4] [−2p/24, p/4] [0, p/12]
In the above simulation environment, a 7-link structure model of human lower extremity skeleton is constructed, and the mechanical parameter distribution of stability correction after landing at different heights is calculated by using Matlab mathematical programming tool, as shown in Fig. 1.
1200 Passive compliance 1000
Active+passive compliance
Contact force ef/N
800
600 400
200 0 0
0.5
1
1.5
2
2.5
3
t/s
Fig. 1. Mechanical parameters for stability correction after landing at different heights
According to the analysis results of mechanical parameters in Fig. 1, the calculated torque of ankle joint, knee joint and hip joint is substituted into the rigid body mechanics analysis model of martial arts movement landing, and the global optimal solution vector of knee joint impact is obtained. The stability control results are shown in Fig. 2.
600
M. Gong 70
60
Displacement/mm
50
40
30
20
10 4
2
0
6
t/s
Fig. 2. Track control results of landing to stability of highly difficult movements of competitive martial arts
Figure 2 shows that by using this algorithm, the simulation value of moment value analysis for offset correction of landing position is close to the theoretical value, which can be used to solve the parameters such as driving effect of each joint of knee and lower extremity and potential energy of force impact motion, etc. The result is accurate. The global convergence of different methods for floor correction is tested, and the comparison results are shown in Fig. 3. Figure 3 shows that this method has high accuracy and good performance.
A2
A3
B4 2.0
1.6
1.6
1.2
1.2
Y(m)
Y(m)
2.0
0.8
B3
0.8
0.4
0.4 A1
A4
0
B1
B2
0 0
0.4
0.8
1.2
1.6
X(m)
(a)Conventional method
2.0
0
0.4
0.8
1.2
1.6
2.0
X(m)
(b)Proposed method
Fig. 3. Performance comparison of landing position correction
5 Conclusions In this paper, stability correction analysis model based on rigid body dynamics adaptive control for competitive martial arts after landing is proposed. The mathematical model of knee movement of lower extremity after landing of high difficulty movement of competitive martial arts was constructed, and the driving force model and movement trajectory control equation after landing of martial arts movement were constructed. The 7-bar driving structure is used to decompose the lower limbs of human competitive martial arts after falling to the ground, and the 3-dimensional orthogonal carrier coordinate system of rigid body is defined. The Lagrange dynamic equation is used to realize the global analysis of the landing impact parameters of the high difficulty movements of competitive martial arts. According to the continuous control method of
Algorithm of Ground Stability Correction
601
joint value, the stability correction is realized by using the proportional and integral trajectory correction control method. The simulation results show that the stability correction model has better control performance, higher calculation accuracy and better correction performance for landing position. This model has good application value in Wushu training instruction. Acknowledgement. Guangxi Higher Education Teaching Reform Project in the New Century (No. 2014JGB240); Subject of School-level Teaching Reform in Hezhou University (No. hzxyjg201549).
References 1. Yin, W., Sun, L., Wang, M., Liu, J.: Amplitude-saturated nonlinear state feedback position control for flexible joint robots. Robot 39(4), 458–465 (2017) 2. Yu, Ma., Cai, Y.: Scheduled offline model predictive control based on multiple LPV models. Control. Decis. 31(08), 1468–1474 (2016) 3. Wan, Z., Kothare, M.V.: Efficient scheduled stabilizing output feedback model predictive control for constrained nonlinear systems. IEEE Trans Autom. Control. 49(7), 1172–1177 (2004) 4. Li, K.Y.: PID tuning for optimal closed-loop performance with specified gain and phase margins. IEEE Trans. Control Syst. Technol. 21(3), 1024–1030 (2013) 5. Shi, R., Zhang, X., Yao, Y.: A CPG-based control method for the multi-mode locomotion of a desert spider robot. Robot 40(2), 146–157 (2018) 6. Chiranjeeevi, T., Vijetha, I.V.V., Chakravarthi, B., et al.: Tuning and control of multivariable systems. Int. J. Electron. Electr. Eng. 2(4), 309–320 (2014) 7. Uijlings, J.R.R., Van de Sande, K.E.A., Gevers, T., et al.: Selective search for object recognition. Int. J. Comput. Vision 104(2), 154–171 (2013) 8. Liu, C., Yan, X., Liu, C., et al.: Dynamic path planning for mobile robot based on improved ant colony optimization algorithm. Acta Electron. Sin. 39(5), 1220–1224 (2011) 9. Liu, J.C., Chen, N., Yu, X.: Modified two-degrees-of-freedom internal model control for non-square systems with multiple time delays. J. Harbin Inst. Technol. 21(2), 122–128 (2014) 10. Jing, Q.B., Hao, F., Wang, Q.: A multivariable IMC-PID method for non-square large time delay systems using NPSO algorithm. J. Process Control 23(5), 649–663 (2014) 11. Zhang, X.L., Gu, X.X., Zhao, H.F., et al.: Design of a compliant robotic arm based on series elastic actuator. Robot 38(4), 385–394 (2016) 12. Koivumaki, J., Mattila, J.: Stability-guaranteed impedance control of hydraulic robotic manipulators. IEEE/ASME Trans. Mechatron. 22(2), 601–612 (2017) 13. Koivumaki, J., Mattila, J.: Stability-guaranteed force-sensorless contact force/motion control of heavy-duty hydraulic manipulators. IEEE Trans. Rob. 31(4), 918–935 (2015) 14. Chen, G.R., Wang, J.Z., Wang, S.K., et al.: Separate meter in and separate meter out energy saving control system using dual servo valves under complex load conditions. Trans. Beijing Inst. Technol. 36(10), 1053–1058 (2016) 15. Li, H., Hu, Z., Chen, X.: PLP-SLAM: a visual SLAM method based on point-line-plane feature fusion. Robot 39(2), 214–220 (2017)
Application Research and Analysis of College Pole Dance Teaching Based on Virtual Reality Technology Hongbo Yu(&) Physical Education Department, Heilongjiang University, Harbin 150080, Heilongjiang, China [email protected]
Abstract. With the development of computer virtual reality technology, the application of virtual reality technology in college teaching has been widely applied to simulate various practical scenes. Computer virtual reality technology provides a new teaching method for modern college teaching. For college sports dance teaching, sports dance needs student to imitate the action of teacher in order to achieve the feeling of immersive, so the teacher has a high requirement to the fit degree of student’s dance action and music in the teaching, in order to better use the dance to express feelings in music. Thus it needs synthesis optimization for teaching dance actions and music, to facilitate the teacher’s accurate guidance to the students. However, it is difficult to describe the correspondence between music and dance action by using the current action synthesis optimization method, which leads to the poor synchronization of synthesizing dance action and music changes. To this end, the applied research and analysis of computer virtual reality technology in college sports dance teaching are put forward. The sports dance learning process of this method is completed in the virtual environment. In this paper, the synthesis process of dance action and music is as follows: firstly, combined with the theory of music beat extraction, the synchronized dance action and music data are divided into several smaller fragment combinations of actions - music. The fragments of the music are made mutation point detection, and the predicted position of each obtained beat is aligned, and the correlation coefficient between the dance action and the music segment is calculated, to obtain the objective function of the dance action synthesis optimization. Combined with the ant colony theory, the objective function is optimized and solved. All the music - dance action fragments, according to the pheromone concentration adaptive, are used to adjust the pheromone volatile factor. According to the advantages and disadvantages of the solution of dance action synthesis optimization, the pheromone is dynamically updated, and the dance action synthesis optimization based on virtual reality technology is completed. The experimental results show that the proposed method can fully reflect the synchronization of music and action changes, and the improved method has a higher matching quality of synthesizing music dance, which effectively improves the quality of sports dance teaching. Keywords: Computer virtual reality technology Dance action synthesis
Sports dance teaching
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 602–610, 2021. https://doi.org/10.1007/978-3-030-51431-0_87
Application Research and Analysis of College Pole Dance Teaching
603
1 Introduction In the college sports dance teaching, we pay great attention to the expression of music, and the most common form of music is music coordinated with dance, and expresses the rhythm, melody, tone and emotion of music in different forms of dance. This form of dance action generated by music clues is called dance action synthesis [1, 2]. Teachers often have the expectation on the synthesis effect of the dance action: in the process of music playback, it is necessary to enhance the synchronization between the music changes and the dance actions and improve the synthesis quality of the music and dance actions, which is important meaning for enhancing the understanding of music and dance [3, 4]. The music - dance action matching technology in current sports dance teaching, cannot be based on changes in music to form the corresponding dance actions. In this case, how to effectively carry out the dance action synthesis optimization, has now become the urgent research issues of teaching field, and be concerned by many relevant experts and scholars [5]. At present, the students can only learn the dance actions through the sports dance teaching video in the college sports dance teaching. There are some optimization methods with strong extensibility of synthesizing the dance action in the sports dance teaching video at the present stage: In article [6], an optimization method of synthesizing dance action based on genetic theory is proposed. This method firstly extracts the music and the underlying characteristics of dance action, and make correlation analysis of the underlying characteristics to eliminate some characteristics. Then, the genetic algorithm is used to optimize the selection of corresponding relationship between the matching accuracy and the computing speed. The posture re-quantification technique is used to make align processing for the direction of the corresponding joint point of dance action. The correspondence of the method can effectively show the synchronization of music and dance action changes, but there are more cumbersome calculation process, and the production of sports dance teaching video is time-consuming. Article [7] proposed a machine learning based dance action synthesis optimization method. This method uses the machine learning theory to set up the mapping relation between the dance action and the music according to the historical sample database, to obtain the evaluation function of the degree of matching for a dance action and the music. The constraint based dynamic programming procedure is used to synthesize and input music as a sequence of matched dance actions. The method has high efficiency, but there is a problem of that the quality of music and dance action matching is low to be detrimental to sports dance teaching video learning. In article [8], a method of synthesizing dance action based on greedy theory is proposed. This method firstly adapts the pre-designed dance action to the corresponding action or the music rule. After completing the dance action and the music law matching, on this basis, the dance action clips are searched in line with music rules in the corresponding database, to select the appropriate dance action to complete the arrangement of all dance actions. The effect of dance actions and music rules matching by using this method is better, but the production of sports dance teaching video is time-consuming. In view of the above problems, this paper puts forward the applied research and analysis of computer virtual reality technology in college sports dance teaching.
604
H. Yu
The experimental results show that the proposed method can fully reflect the synchronization of music and action changes, and the improved method has a higher matching quality of synthesizing music - dance. Students can better capture the dance actions and the music beat in learning sports dance actions in a virtual environment, which is helpful to improve the quality of college sports dance teaching effectively.
2 Image Matching of Sports Dance Action Combined with Music Beat in Virtual Reality Technology In the virtual environment, in order to get the accurate matching of the sports dance action images and the music beats, in this section, we first extracts and matches the SURF features of the sports dance action images and music in the virtual reality technology. Due to the high uniqueness and robustness of the SURF feature, the SURF is made image convolution by the integral image, and the detector is established by using the measure of Hessian matrix. Assuming that the point of the sport dance action image I ð X Þ in the virtual reality is described by X ¼ ðx; yÞ, the integral image IR ð X Þ is described as: IR ð X Þ ¼
jy ix X X
I ði; jÞ
ð1Þ
i¼0 j¼0
In the process of obtaining the integral image, it only needs to traverse the source image once, the computing complexity of image and music is very low [9]. The Hessian matrix determinant of each pixel in the sports dance action image is calculated below to obtain the feature point value. The calculation efficiency and precision of Hessian matrix are high. Hessian matrix H ðx; rÞ which scale is r can be calculated by the following formula:
Lxx ðx; rÞ H ðx; rÞ ¼ Lxy ðx; rÞ
Lxy ðx; rÞ Lyy ðx; rÞ
ð2Þ
Where Lxx ðx; rÞ, Lxy ðx; rÞ and Lyy ðx; rÞ are used to describe the second derivative and the convolution of the image of the Gaussian function at X. In order to facilitate the analysis of music and dance action images, the Gaussian second derivative is instead by box filter [10], after the filter processing, it can be described as follows: 2 detðH Þ ¼ Dxx Dyy 0:9Dxy
ð3Þ
On this basis, the multi - scale image pyramid is established, and the matching feature points are found on different music scales, and the stable SURF feature points can be obtained after the accurate positioning of them [11]. SURF feature points include position, scale, main direction and eigenvector, and so on in sports dance image and music information. Through the nearest neighbor matching
Application Research and Analysis of College Pole Dance Teaching
605
method of feature vector, it can effectively obtain the matching between image and music [12]. In this section, the Euclidean distance between feature points is used to measure the similarity between images. The Euclidean distance is calculated as follows: OP ¼ sqrt ðx1 x2 Þ2 þ ðy1 y2 Þ2
ð4Þ
Choosing the corresponding SURF feature point in a source image of sports dance and music, traverse the Euclidean distance between the music and the source image feature points. Selecting the nearest two feature points, if the ratio of the two distance does not exceed the threshold, then that the two is match. After obtaining the matched feature points, the RANSAC robust method is used to filter out the mismatched points, so as to match the characteristics of the sports dance action images and the music beats [13].
3 The Application of Computer Virtual Reality Technology in Sports Dance Teaching In this paper, in the college sports dance teaching, the use of computer virtual reality technology, can achieve a better match of sports dance actions and music beat, so as to improve the quality of sports dance teaching. Therefore, it needs for optimization synthesis of sports dance action images and music. First, the sports dance action image is generated. In the process of shooting sports dance action, firstly the camera fixes one point as the center, the source image is shoot by around the origin for a circle [14]. When shooting the source image, the gray scale of the overlapping area image has difference in the adjacent overlapping area due to the shooting angle, the illumination and so on. If the adjacent image is directly spliced, the adjacent image will destroy the visual effect of the same action in the sports dance action image. In order to meet the restrictive relationship between the dance actions, the image is projected onto the side of the cylinder under the same coordinate system. After the projection image is obtained, the seamless splicing is achieved by the feature matching to obtain the visually matched sports dance image [15]. Then, the obtained sports dance image can be optimized by matching the image in the second section with the music beat. When the dance action is generated, the image is positive projected firstly. The positive projection is a process of projecting a series of single-angle images onto a side of a cylinder around a fixed space cylinder. The image generated by this process is called a spatial cylinder stereoscopic image [16]. The projection process is shown in Fig. 1.
(x,y,z) (s,t)
(a) Relationship between image and cylinder position
(b) Projection cylinder
Fig. 1. Positive projection process
(c) Panorama
606
H. Yu
The height and radius of the cylinder are calculated as follows, when all the sports dance action images to be synthesized are projected onto the cylindrical surface: Making the camera circle around the center for a circle, to obtain N ð6 N 16Þ images, the height of the image is described with height, the width is width, the height of cylinder is h, and the radius is r. Let h ¼ height, 2 p r ¼ N width, then the radius of the cylinder can be described as: r ¼ N width=ð2 pÞ
ð5Þ
The adjacent coincidence image is projected onto the cylinder by a positive projection, and the adjacent image fuses the overlapping portions. The entire dance action images are projected onto the same cylinder, and ultimately to access to a 360-degree view of panoramic sports dance action image [17]. In the virtual reality technology, it needs the splicing processing after the real image is converted into a cylindrical image by positive projection, and the core of the image splicing is image matching [18]. And then making back projection, that is, the stereoscopic image generated in the projection process is cut from a location, to be projected to a plane, as shown in Fig. 2.
Fig. 2. The imaging process from the cylinder stereoscope to the 360 degree panorama
The detailed back projection process is as follows: assuming that the number of horizontal pixels in the sports dance action image is described by Swidth, the number of vertical pixels is described by Sheight [19], the pixel ðx; y; zÞ of the stereoscopic image generated during positive projection and the corresponding coordinates in the panorama of the dance action are described by ðs; tÞ, the cylindrical radius is described by r, and the height is h [20, 21]. The spatial coordinates ðx; y; zÞ can be obtained by the following equation: 8 2ps > > x ¼ r cos > > Swidth > > > < 2ps y ¼ r sin > Swidth > > > > > ð Sheight tÞ h > : z¼ Sheight
ð6Þ
The coordinates of a pixel in the panorama of the sport dance action can be obtained by the following formula:
Application Research and Analysis of College Pole Dance Teaching
8 y Swidth > arctan
Sheight ð h zÞ : t¼ h
607
ð7Þ
Therefore, in the computer virtual environment, the image of the sports dance action is obtained, which can satisfy the restriction relation between the dance actions, and achieve the visual consistency effect of action and sports dance image. And then the match of the image and the music beat is used, to ultimately get the virtual images of sports dance teaching with better quality, so that in a virtual environment, students can be immersive, feel the learning process of sports dance, in order to lay the foundation for improving the study of sports dance.
4 Experimental Results and Analysis 4.1
Experimental Environment
In order to prove the comprehensive validity of the computer Virtual Reality Technology used in dance action synthesis optimization in the college sports dance teaching, it is necessary to carry out a simulation experiment. The experimental data are taken from the open action capture database provided by Carnegie Mellon University’s graphic lab. The music data set uses the George2002 data set, each of which is about 1.0 s in length, and each training data set contains 1,200 real-life dance training examples. 4.2
Experimental Results and Analysis
4.2.1
Comparison Experiment for the Degree of Dance Action and Music Synthesis by Different Methods In this paper, we use the proposed method, the method in article [6], and article [7] to carry out the dance action synthesis optimization experiment. The degrees of dance action and music synthesis (%) by the three methods are compared, and the comparison results are described in Fig. 3.
The percentage of movements and music/%
100 80 60 40
Paper method Reference [6] method Reference [7] method
20
0
10
20
50 60 30 40 Experimental time /s
70
80
Fig. 3. Comparison of the degree of dance action and music synthesis by different methods
608
H. Yu
Analysis of Fig. 3 shows that the synthesis degree of using the proposed method to carry out dance action is better than that of literature [6] and [7]. It is mainly because that combined with the theory of music beat extraction, the synchronized dance action and music data are divided into several smaller fragment combinations of actions— music, to calculate the correlation coefficient between the dance action and the music segment, and obtain the objective function of the dance action synthesis optimization. Combined with the ant colony theory, the objective function is optimized and solved, thus completing the dance action synthesis optimization, making the degree of dance action and music synthesis using the proposed method is better. 4.2.2
Comparison Experiment for the Matching Degree of Dance Action Synthesis by Different Methods In this paper, the proposed method, the method in article [6], and article [7] are used to carry out the dance action synthesis optimization experiment. The matching degree (%) of dance action synthesis by the three methods are compared, and the comparison results are described in Fig. 4.
The percentage of movements and music/%
100 80 60 40
Paper method Reference [6] method Reference [7] method
20
0
10
20
50 60 30 40 Experimental time /s
70
80
Fig. 4. Comparison of the matching degree of dance action synthesis by different methods
Analysis of Fig. 4 shows that the matching degree of using the proposed method to carry out dance action synthesis is better than that of literature [6] and [7]. It is mainly because that in this method the fragments of the music are made mutation point detection firstly, and the predicted position of each obtained beat is aligned, to obtain the objective function of the dance action synthesis optimization. Combined with the ant colony theory, the objective function is optimized and solved. All the music - dance action fragments, according to the pheromone concentration adaptive, are used to adjust the pheromone volatile factor. thus completing the dance action synthesis optimization, making the matching degree of dance action and music synthesis using the proposed method is better. 4.2.3
Comparison Experiment for the Synchronization of Dance Action Synthesis by Different Methods In this paper, the proposed method, the method in article [6], and article [7] are used to carry out the dance action synthesis optimization experiment. The synchronization of
Application Research and Analysis of College Pole Dance Teaching
609
dance action synthesis by the three methods are compared, and the comparison results are described in Fig. 5.
The harmony of dance movements and music/%
100 80 60 40
Paper method Reference [6] method Reference [7] method
20
0
10
20
30
40
50
60
70
80
Experimental time /s
Fig. 5. Synchronization comparison of dance action synthesis by different methods
Analysis of Fig. 5 shows that the synchronization of using the proposed method to carry out dance action synthesis is better than that of literature [6] and [7]. This is mainly because in the method of this paper, the correlation coefficient between the dance action and the music segment is calculated, to obtain the objective function of the dance action synthesis optimization. Combined with the ant colony theory, the objective function is optimized and solved. All the music - dance action fragments, according to the pheromone concentration adaptive, are used to adjust the pheromone volatile factor. According to the advantages and disadvantages of the solution of dance action synthesis optimization, the pheromone is dynamically updated, and the dance action synthesis optimization based on virtual reality technology is completed which makes the synchronization of the dance action synthesis by using the proposed method is better.
5 Conclusions It is difficult to accurately describe the correspondence between music and dance action, which leads to the poor synchronization of synthesizing dance action and music changes by using the current action synthesis optimization method in college sports dance teaching. In the course of college sports dance teaching, for the dance action learning, students cannot achieve the accurate co-production of the music and dance action, affecting the expression of the entire dance emotions. To this end, the applied research and analysis of computer virtual reality technology in college sports dance teaching are put forward. The experimental results show that the proposed method can fully reflect the synchronization of music and action changes, and the improved method has a higher matching quality of synthesizing music - dance, which effectively improves the quality of sports dance teaching.
610
H. Yu
References 1. Amado, D., Garcíacalvo, T., Marreiros, J., et al.: Analysis of students’ emotions in agreement with the dance teaching technique used. Phys. Rev. E 63(6), 138–158 (2015) 2. Carnduff, R., Tan, B., Mckay, C., et al.: Survey of sport participation and sport injury in elementary school children. Br. J. Sports Med. 48(7), 576–578 (2014) 3. Li, J., Xu, J.: Choreography of Transcriptomes and Lipidomes of Nannochloropsis reveals the mechanisms of oil synthesis in Microalgae. Plant Cell 26(4), 1645–1650 (2014) 4. Ott, M.: Cell biology: choreography of protein synthesis. Nature 533(4), 472–473 (2016) 5. Jia, Y.: Analysis on the independent extracurricular practice of students in the specialized dance sport-shenyang sport university is taken for example. Can. J. Earth Sci. 7(1), 8–17 (2016) 6. Bronner, S., Shippen, J.: Biomechanical metrics of aesthetic perception in dance. Exp. Brain Res. 233(12), 3565–3569 (2015) 7. Karahan, M., Randelli, P.: Up-to-date information is in your hands: online teaching. Knee Surg. Sports Traumatol. Arthrosc. 23(7), 1887–1888 (2015) 8. Cahalan, R., O’Sullivan, P., Purtill, H., et al.: Inability to perform because of pain/injury in elite adult Irish dance: a prospective investigation of contributing factors. Scand. J. Med. Sci. Sports 26(6), 694–702 (2015) 9. Sampaio, A.Z., Martins, O.P.: The application of virtual reality technology in the construction of bridge: the cantilever and incremental launching methods. Autom. Construction. 37(1), 58–67 (2014) 10. Zhang, P.: Design of virtual reality guide training room based on the modern education technology. Lect. Notes Electr. Engineering. 269(1), 1221–1227 (2014) 11. Zhou, H.Y., Shi, L., Guo, S., et al.: Design of broadband omnidirectional antireflection coatings using ant colony algorithm. Opt. Express 22(4), 1130–1137 (2014) 12. Beltramo, T., Ranzan, C., Hinrichs, J., et al.: Artificial neural network prediction of the biogas flow rate optimised with an ant colony algorithm. Biosys. Eng. 143(1), 68–78 (2016) 13. Sun, F., Zhang, Z., Liao, D., et al.: A lightweight and cross-platform web3D system for casting process based on virtual reality technology using webGL. Int. J. Adv. Manuf. Technology Int. J. Adv. Manuf. Technol. 80(5), 801–816 (2015) 14. Triberti, S., Villani, D., Riva, G.: Unconscious goal pursuit primes attitudes towards technology usage: a virtual reality experiment. Comput. Hum. Behav. 64(4), 163–172 (2016) 15. Gutiérrez-Maldonado, J., Rus-Calafell, M., González-Conde, J.: Creation of a new set of dynamic virtual reality faces for the assessment and training of facial emotion recognition ability. Virtual Reality 18(1), 61–71 (2014) 16. Schlette, C., Buch, A.G., Aksoy, E.E., et al.: A new benchmark for pose estimation with ground truth from virtual reality. Prod. Eng. Res. Devel. 8(6), 745–754 (2014) 17. Vaughan, N., Gabrys, B., Dubey, V.N.: An overview of self-adaptive technologies within virtual reality training. Comput. Sci. Rev. 27(8), 56–61 (2016) 18. Chung, A., To, W.M., Schultefortkamp, B.: Next generation soundscape design using virtual reality technologies. J. Acoust. Soc. Am. 140(4), 3041–3047 (2016) 19. Hou, J., Mi, W., Sun, J.: Optimal spatial allocation of water resources based on pareto ant colony algorithm. Int. J. Geogr. Inf. Sci. 28(2), 213–233 (2014) 20. Wang, J., Zhang, L., Lu, F., et al.: The segmentation of wear particles in ferrograph images based on an improved ant colony algorithm. Wear 311(1), 123–129 (2014) 21. Wang, D.H., Liu, H.Y., Wang, J.C.: Development of shearer training system based on virtual reality. Comput. Simulation. 32(6), 262–265 (2015)
Dual Discriminator Generative Adversarial Networks and Their Application in Detecting Nests Built in Catenary Zeyu Lian(&) Beijing Union University, Beijing 100101, China [email protected]
Abstract. The nest detection is a typical abnormal situation in the process of image anomaly detection, but because nest image data occupies a small proportion of catenary image data, it is a typical unbalanced data classification. Machine learning model can be used to deal with this kind of problems, and the corresponding adversarial network can be generated according to the data characteristics. In this way, rich data characteristics can be learned under the condition of semi supervision, and the acquisition ability is also affirmed. The generated adversarial network model is not ideal after capturing images directly due to its structure and principle. In this paper, the author makes an in-depth study on the generative adversarial networks and obtains an improved dual discriminator generative adversarial networks. After detecting the nest built in catenary, the ideal results are obtained. Keywords: Dual discriminator Adversarial network Nest detection in catenary Anomaly detection Unbalanced data classification
1 Introduction Railway plays a decisive role in the national economy and is a major livelihood project. Modern railway bears the heavy burden of transportation. Safety is the lifeline of railway sustainable development and the core point of railway operation. The improvement of railway speed can not be separated from the technical improvement of electrification construction and operation management mode, in which the catenary anomaly detection is a key technology, and it is an important technical way to complete the catenary anomaly detection from intelligent video analysis. In this paper, the author chooses a variety of data combined with intelligent video analysis and explores the problems [1].
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 611–617, 2021. https://doi.org/10.1007/978-3-030-51431-0_88
612
Z. Lian
2 Design Concept of Dual Discriminator Generative Adversarial Networks At present, the means of nest detection mainly rely on manual inspection, which is relatively low cost and high efficiency. It is the technical development direction of the industry to use video image for automatic inspection and replace artificial inspection with intelligent means. In the stage of abnormal video detection, there is a large gap between the normal state sample data and the abnormal state sample data. About 99% of them are normal, and only 1% are abnormal. There are serious imbalances in the data, so it is not ideal to choose the commonly used image classification methods, such as support vector machine, and convolution neural network. The problem of unbalanced data can not be solved by machine learning model, but the learning ability of data features is important in the model. Goodfellow and his team proposed a model based on deep neural network in 2014, which is named as generative adversarial networks (GANs). As a kind of unsupervised learning method, GANs can obtain the deep representation of data. It is a representation method with competitive learning ability that is implemented after the combination of back propagation algorithm and constantly updated network. The advantages and disadvantages of the current GANs are obvious. The biggest advantage is that it can generate a realistic image for retinal viewing, and the image synthesis, video prediction, even the semantic interpretation and super-resolution reconstruction of the image have relatively ideal results. The biggest disadvantage is that the training phase is not stable enough, and the part of the generated data cannot express the entire content of the real data, so that sometimes the obtained data is not highly interpretable. However, compared with the traditional model, GANs has made technological progress and is a more ideal generative model [2]. We find that there are some differences between the model of GANs and the model of generating probability compared with the traditional model. GANs can avoid the chain learning mechanism and the Markov chain to complete the sampling and inference, which can avoid the complex calculation and improve the application efficiency. Compared with the traditional model, the design framework of GANs is more flexible, more widely used and more applicable. The traditional model will appear the stage where probability density can’t be calculated. At this time, it can only rely on the nature to explain. There is an anti training mechanism inside the GANs. Even in the generation model which depends on the natural interpretation of data, the learning and application of training can be completed. The composition of GANs is a discriminator and a generator. The former is mainly capable of judging whether the input data is real or generated, and the latter is mainly capable of generating data close to the real sample. The goal of GANs is to complete the Nash equilibrium in a continuous non-convex problem with high-dimensional parameters to help the generator to get close to the real data and help the discriminator identify the failure of generating samples or real samples. The generator obtains the true sample data features, and the accuracy of sample classification after maintaining the Nash equilibrium is 50%. Therefore, the GANs model cannot solve the problem of classification. The author improves GANs model and designs dual discriminator generation adversarial networks (DDGANs) based on the strongest data expression
Dual Discriminator Generative Adversarial Networks and Their Application
613
ability and classification and identification of faults of GANs model. It has obtained ideal results after the application in network recognition of detecting nests built in catenary [3].
3 Algorithm Model 3.1
GANs
Figure 1 shows the basic structure of GANs model. The generator is Generator represented by G, and the discriminator is Discriminator regarded as D. D is a multi-layer perceptron, and the input data X * Pdata (x) is the probability function D (x) of the real data distribution, and its output value is a single scalar. Generator is a multi-layer perceptron with prior noise variables x * pz (z), and the corresponding data is mapped to the data space to generate data G (x). Dmax is used to judge the accuracy of real samples and generated samples, and train G with log [1 − D (G (z))]. The minimization and maximization equations for D and G are given in Eq. 1 below. GMin Dmax V(D, G) = Ex pdataðxÞ ½logD(x)] + Ex pzðzÞ ½log½1 D(GðzÞ Þ
ð1Þ
Fig. 1. Structure of the GANs model
By analyzing the performance of GANs, it is found that no matter whether the generated data or the real data, when GANs are optimal, D cannot judge the attribute, and the classification ability of D will not be improved due to the strengthening of training. It proves that the direct use of GANs can not achieve the effect of accurate classification, which is not satisfactory. In Figs. 2 and 3, nest detection experiment is directly carried out, as a two classifier, D is directly classified in GANs, and the effect is not stable. GANs are applied into classification problems, such as normal working condition image data and nest image data, the accuracy of the discriminator can rise to 90%, and the generator can also generate images with local features in the catenary, which directly proves the feasibility of using GANs in nest anomaly classification [4].
614
Z. Lian
Fig. 2. Comparison of generated image and real image
Fig. 3. Classification performance of real data generated by adversarial networks
3.2
DDGANs
As shown in Fig. 4, the model structure diagram of DDGANs shows its characteristics well. The discriminator is divided into D1 and D2, and the generator is still represented by G. The input noise variables z * pz (z) and the data type labels c * pc (c) are mapped into the data space by G to obtain the data x * G (z, c) with the same dimensions as x * pdata(x). After the mapping, a large number of label data can be learned to obtain the feature representation, and the corresponding data (x, c) * g (z, c) can be obtained according to the input type label, and the problem of partial missing label data in semi-supervised learning can be solved [5]. The output interval of D1 is (1, 0), and the single scalar is still taken. The probability of x * pdata(x) from real data is D1 (x); D2 is divided into labeled data and unlabeled data. The former is composed of real data and G generated data, and the latter is unlabeled data samples from real data.
Dual Discriminator Generative Adversarial Networks and Their Application
615
The cross entropy in labeled is regarded as loss function, while shannon entropy in unlabeled is regarded as loss function. The minimization and maximization of D1 and G is shown in Eq. 2, and the value function of D2 and G can be seen in Eq. 3. Finally, the objective function of DDGANs is shown in Eq. 4. Ld1 = Gmin D1Max V ðD1; G)
ð2Þ
Ld2 = GD2Max VðD2; GÞ
ð3Þ
GD2Mmin D1max VðD1; D2; GÞ = Ld1 Ld2
ð4Þ
Fig. 4. Model structure of DDGANs
According to the analysis of the above equation, the optimization objective of D1 and G is similar to that of GANs. The addition of D2 has no effect on the analysis of Nash equilibrium, but the convergence speed of DDGANs is faster than that of GANs, and the Nash equilibrium speed is faster. GANs does not have semi-supervised learning ability. After supervising with MNIST data, experiments are performed. At the same time, DDGANs is selected for experimentation, and 1000 images are collected for analysis and testing, which can be shown in Fig. 5. In addition, the comparison of the images generated by the generator is shown in Fig. 6. The handwritten digital image generated by DDGANs is clearer than GANs, and the retina can be better distinguished [6]. It is worth noting that when the convolutional neural network with a deeper depth is selected as the discriminator, the generator crashes. It may be caused by the training phase of GANs, and the convergence of D and D is significant. Because D2 does not participate in the adversarial, the parameters and structure of DDGANs will not affect the adversarial training process. Models and interpretations can be selected more freely when scheduling tasks, and generator performance is not affected [7].
616
Z. Lian
Fig. 5. Comparison of the accuracy of DDGANs and ACGAN
Fig. 6. Comparison of generated images in DDGANs and ACGAN
4 Experimental Analysis The camera is fixed in front of the cab of the train to complete the shooting. The parameters of the shooting equipment are different due to the influence of the weather, quality and exposure degree, so sobel operator is selected to complete the edge processing to remove the background light and shade and highlight the image content. In the experimental data, there are 3000 pieces of normal working conditions data (−), including 500 pieces of nest data (+), 500 pieces of - sorting data in the training set, and 2000 pieces of − setting data; and + 500 pieces of test set, and − 1000 pieces of data. The data of the test set is tested by DDGANs and the final summary is shown in Fig. 7. It can be seen that DDGANs have the highest R value in detecting nest built in the catenary, reaching 98%.
Dual Discriminator Generative Adversarial Networks and Their Application
617
Fig. 7. Test results of nest detection in the catenary
5 Conclusion Catenary condition monitoring can help reduce rail maintenance costs and ensure the operational safety of electrified rail transportation systems. Bird nest, as a common and typical method of system detection, is easy to cause faults such as tripping of the contactor or breakdown of the insulator. DDGANs are constructed to solve the problem of difficult classification based on the data feature distribution ability of GANs, and it is applied to the detection of nest anomalies in catenary to obtain relatively satisfactory results.
References 1. Su, J., Yang, L.: Super-resolution of single remote sensing image based on GANs. Comput. Eng. Appl. (12) (2019) 2. Mingming, L., Minqing, Z., Jia, L.: Carrier-free information hiding based on GANs. J. Appl. Sci. 36(2), 371–382 (2018) 3. Xia, R., Ma, H.: Communication network security technology of GANs. Mob. Commun. (8) (2019) 4. Shi, C., Pan, B., Guo, X.: Application of GANs in image completion. Comput. Sci. Exploration (8) (2019) 5. Feng, J., Ma, X., Liu, Y.: Research on GANs of named entity recognition. Minicomput. Syst. 40(6) (2019) 6. Cao, K., Wu, F., Luo, L.: A face completion algorithm based on conditional GANs. Sens. Microsyst. (6) (2019) 7. Shaofeng, Y.: Study of deep convolution network in the detection of inner and middle outer membrane boundaries of cardiovascular ultrasound images (2018)
Professional Development of College Teachers in the Era of Artificial Intelligence: Role Rebuilding and Development Path Yinjia Miao and Yi Yao(&) School of Financial Management, ChongQing College of Electronic Engineering, Chongqing 401331, China [email protected], [email protected]
Abstract. The new technological revolution such as Artificial Intelligence (AI) has brought about tremendous changes to educational ecology, and the professional development of university teachers is also facing a major impact. As a new era of college teachers how to cope with the great changes brought by artificial intelligence, how to reposition the role of teachers is an urgent need to solve major issues. Combining with the influence brought by the era of artificial intelligence, this paper holds that the teachers in the AI era should play an important role in leading the students’ character, data analysts full of data spirit, the adapters, users and leaders of artificial intelligence technology, and puts forward based on intelligent information system. The AI teachers’ professional development path system takes the implementation plan of teaching activities based on intelligent system as the core, the diversified learning community as the support, the reform of teaching modes and teaching methods as the important means, the intelligent evaluation as the main method, and the discipline and professional construction as the guarantee. Keywords: Artificial intelligence Role reconstruction research Professional development of teachers
Precise teaching and
1 Introduction In recent years, with the breakthrough and wide application of big data technology, the substantial progress of artificial intelligence has been promoted. Artificial intelligence (AI) has become a field of science and technology which is developing first at home and abroad. Artificial intelligence (AI) is changing people’s daily life and production from various aspects. Some people even put forward that the future society will become an anti-utopian world controlled by abnormal AI (Luckin et al. 2016) [1]. The meeting or encounter between AI and teachers is inevitable, which will inevitably have an important impact on the development of teachers. Based on the data system established by Osborne & Frey, the BBC has deeply analyzed the ‘elimination rate’ of 365 different industries in the future. According to its research data, it can be seen that in the future, the elimination rate of those professionals in customer service, personnel, accounting and civil service industries will exceed 89%. However, the profession of teachers can be machine-driven. The probability of complete substitution is only 0.4% [2]. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 618–626, 2021. https://doi.org/10.1007/978-3-030-51431-0_89
Professional Development of College Teachers in the Era of AI
619
This shows that in the era of artificial intelligence, teachers still have their unique value image, but at the same time they will face challenges from some functions of teachers are replaced by artificial intelligence, teaching methods change, students’ learning methods change. Therefore, in the current professional development of teachers, we need to start to pay attention to the following issues: First, how do teachers re-shape their role in the era of artificial intelligence? Secondly, how can teachers meet the relevant needs of the era of artificial intelligence and achieve professional development in the new era?
2 Reshaping the Role of College Teachers in the Era of Artificial Intelligence In the AI era, teachers are the core elements of teaching, so what role do they play in the specific teaching links? Especially with the continuous development of artificial intelligence, they gradually enter the ‘Singularity Approaching’. Will human beings also enter the ‘Singularity Era’? Will artificial intelligence replace teachers? Ren Youqun (2017) proposed that in the “AI” era, the role of teachers has gradually changed from “porter” of knowledge to “leader” of student development [3]. Professor Yu Shengquan (2018) advocated that “the impact of AI on education should not be overestimated or underestimated, but should be treated rationally” [4]. In the future, education will enter the era of co-existence of teachers and artificial intelligence. How to adapt to and meet the changes of education in the “AI” era, it is particularly important to reshape the role of teachers. 2.1
A Guide to Refinement of Students’ Character
Teaching not only needs to transfer knowledge and skills, but also needs to cultivate students’ values and outlook on life. Because AI lacks corresponding morality and creativity, it cannot have human care and emotional communication, so the development of students still needs the help and guidance of teachers who have a ‘benevolent heart’ guide (Zhang Hua 2010) [5]. With the further combination of teaching and AI, teachers can rely on AI to accurately understand and grasp the characteristics and development demands of students, timely provide meticulous care and care, and pass the temperature and kindness of educators to students in the ‘cold world’ full of programming, algorithms and codes of AI. Let students feel the temperature of human nature, the warmth of life and the power of kindness, and then learn to convey warmth and kindness to each other. It can be expected that in the near future, emotional intelligence, adaptability, aesthetics, curiosity, innovation and other related spiritual activities will become more and more important. Teachers will play a greater role in the role of “building people by virtue”. Teachers need to take on the responsibility of shaping people, life and soul in our era and become students’ ‘guide of tempering character’, thus laying the foundation for students’ future development and lifelong learning.
620
2.2
Y. Miao and Y. Yao
Data Analysts with Data Spirit
Data is an important basis for the formation and rapid development of AI. Integration of AI and classroom teaching represents the gradual introduction of big data into the classroom, covering students’ pre-class preparation, homework, review and examination papers and other related data information. Teachers are people who have something to teach students, not just assistants in the learning process. Teaching behavior must fundamentally reveal what is hidden behind students (Guilherme 2014) [6]. Big data can help teachers find these things, such as using big data to judge what content can meet students’ needs. With interest, what kind of content may be problematic, at what point of time may change, and so on? Therefore, in the era of artificial intelligence, there is a great correlation between the need for university teachers to have ‘numeral quotient’, ‘numeral quotient’ and the ‘digital competence’ advocated by people at this stage, which is embodied in the interest and sensitivity of data, and the ability to collect, process and use data, which is more embodied in the ability to produce new numbers. According to the relevant ability, and can transform the data into specific teaching purposes, content and form of ability. This will be a new basic skill for teachers in the era of artificial intelligence. The ‘teaching craftsman’ in the period of big data and the craftsman spirit it covers will be given a new meaning, that is, data spirit. Teachers need to have a strong “data processing ability”, the key is whether they have the ability of continuous learning. Never before has there been such a high expectation and requirement for teachers’ learning ability as in the era of artificial intelligence: if they do not study, they will be eliminated, if they do not continue to study, they will fall behind and disappear into the world. 2.3
Adapters, Users and Leaders of Artificial Intelligence Technology
Artificial intelligence technology has the unique core advantage of ‘comparing with human expert teachers’ (Boulay & Luckin 2015) [7], AI can provide a large number of different means to help teachers better carry out teaching activities. Artificial intelligence helps to liberate teachers from the repetitive events such as correcting homework and examination papers. It can realize adaptive problem generation, diagnosis and scoring, optimize learning path, and then regenerate questions, re-test and complete task modeling. With the deep development of artificial intelligence in education, it is bound to realize the full automation in the field of assessment. Teachers can not only provide students with corresponding knowledge, but also recommend corresponding services and interpersonal networks contained in knowledge after using artificial intelligence to create corresponding cognitive models according to the relevant data of each student’s learning, so as to better achieve the goal of different from person to person. Accurate diagnosis, intelligent recommendation and intelligent teaching. After collecting the data of teachers’ attendance, preparation, evaluation, achievement and case explanations, it gathers them into multi-dimensional data analysis carriers, deeply analyses the problems of all teachers at the technical level, teaching methods and subject knowledge, and finally concludes the corresponding knowledge of teachers. The model is expected to accurately judge the problems in specific teaching links
Professional Development of College Teachers in the Era of AI
621
through this model, such as question design, scene creation, etc. Then, on the basis of the problems found, it can accurately provide improved training courses and reference cases, so as to achieve large-scale collaboration, timely data sharing and in-depth mining of precise teaching and research.
3 Path of Professional Development of College Teachers in the Era of Artificial Intelligence “Science and technology can not completely replace teachers, but teachers who use science and technology can replace teachers who do not use science and technology” (Chen Chunmei 2011) [8]. Future education will inevitably embark on the road of “man-machine co-teaching”. Artificial intelligence will help teachers to better complete their teaching work. How to cultivate teachers in the future to help teachers affected by artificial intelligence meet the needs of the times and acquire new skills is the core of promoting the stable development of education. This paper constructs a model of teachers’ professional development in the era of AI (as shown in Fig. 1 below). It puts forward that based on the intelligent information system, with the implementation plan of teaching activities based on the intelligent system as the core, supported by the pluralistic learning community, with the reform of teaching mode and teaching mode as the important means, and with the intelligent assessment as the main method. Methods The AI teacher professional development path system is guaranteed by strengthening discipline and professional construction.
Fig. 1. Teacher Professional Development Model in AI Era
622
3.1
Y. Miao and Y. Yao
Building Intelligent Information System
The Plan of Action for Educational Informatization 2.0 has planned the development goal of “three aspects, two highs” in future education, as shown in Fig. 2. No matter in what era, what new technology appears, if we want to play a real role in education and teaching, we must provide effective support to solve the bottleneck problems in education and teaching. Intelligent information system can effectively solve the bottleneck problem of teaching and learning. It can focus on the following aspects: firstly, it can provide corresponding experience and analysis methods for knowledge understanding and grasping; secondly, it can provide different levels and levels of detection methods for knowledge grasping, and create and teach at the same time. The large database related to learning is conducive to the development of all kinds of teaching activities and learning activities. Third, providing ‘Internet +’ learning platform for learning important knowledge points, gathering the wisdom of famous teachers and the successful experience of students, helping students to learn after class; fourth, constructing teachers’ lesson preparation and teaching support. Department, reasonable and efficient use of various learning platforms to achieve the ultimate goal of accurate research and training and accurate teaching; Fifth, in the specific links of classroom teaching, teachers’ wisdom and students’ successful experience are constantly collected to promote the establishment of learning platforms.
Fig. 2. Implementing strategies of interaction between teaching and learning
3.2
Formulating the Implementation Plan of Teaching Activities Based on Intelligent Information System
If the classroom teaching process lacks teachers’ overall planning and Organizational Teaching behavior, and allows students to study freely, their teaching may not achieve the desired results, so it is necessary to implement a certain degree of planned teaching.
Professional Development of College Teachers in the Era of AI
623
However, if classroom teaching is entirely organized by teachers, although students have learning terminals, they seldom have time to practice according to the plans made by teachers. Most of the time, they are guided by the unity of teachers to implement relevant learning activities, so it is still difficult to achieve personalized learning. Goals. Therefore, it is necessary to integrate them fully and organize teaching activities reasonably. The specific situation is shown in Fig. 2. On the one hand, with the help of information technology, teachers can arrange classroom teaching activities, students’ homework and learning activities according to students’ big data, and provide effective support resources and tools; dynamically acquire the real-time situation of classroom teaching, timely control classroom teaching arrangements, so as to maximize the satisfaction of the class. The learning needs of student groups are to maximize the benefits of class teaching. In addition, personalized activities can be implemented in pre-class and after-class periods according to the specific conditions of students. In this way, students can identify with and actively find their own way on demand, get the help of the most suitable teachers and find the best partners to complete learning activities, so as to achieve the effect of intelligent learning. 3.3
Collaborate with AI to Build Diversified Learning Community
Before the AI era, most teachers could deal with the work related to teachers’ profession after completing systematic education and training. In the AI era, only by learning to learn and continuous learning can teachers effectively meet the needs of human-computer co-teaching. Therefore, we need to build a diversified learning community, learn to cooperate and develop collective wisdom. In the “AI” era, the rate of knowledge iteration renewal is increasing. In the teaching concept of teaching and educating people, the knowledge theory covered by teaching may be replaced by artificial intelligence, and the meaning and scope of knowledge will be updated rapidly. Teachers need to set up the concept of lasting learning; but the emotional transmission embodied in the word ‘educating people’ can never be achieved by AI, which highlights that AI can never do so. The unique value of the existence of teachers. If you want to be a qualified teacher in the era of AI, the emotional factors are very important. In the final analysis, it is necessary for teachers to maintain a strong sense of curiosity about new ideas, content and technology, and to maintain the corresponding motivation and enthusiasm for learning. At present, the burn-out of old teachers and the difficulty of professional promotion of young teachers are two major problems for University teachers, and the intergenerational learning community can help teachers achieve intergenerational development. Put the work center on the level of emotional encouragement, in the process of constantly stimulating the enthusiasm of older teachers, to promote young teachers to regain their enthusiasm for learning the second major. This type of learning community is often composed of trainees and mentors. The “mentor” needs to be a super-level teacher. The “trainees” are young teachers eager to break the development restrictions and achieve secondary development. All mentors are able to lead 2–3 different students through lectures, outings, expert forums, reading and communication, and teacherapprentice interaction to promote the development of students and mentors together.
624
Y. Miao and Y. Yao
In this kind of co-learning mode beyond the age limit, both students and tutors have developed and grown accordingly. 3.4
Promoting the Innovation of Teaching Methods and Forms
‘Knowledge is everywhere, and any interaction is intelligent’. The application of artificial intelligence is beneficial to realize the goal of “knowing more, mastering more, feeling more” for students. In the past, students had a lot of learning activities which need the help of teachers. Now they can solve them through machines, such as communication and cooperation. Writing, answering questions, counseling and so on, thus enabling the curriculum and organizational activities set up by the school to break through the constraints of space and time. As a digital ‘aboriginal’ student, the key to learning in school is not to memorize knowledge, but to develop their own wisdom. Therefore, in the AI era, teachers need to focus their work on promoting innovative teaching mode with the key characteristics of collaboration, autonomy and exploration, and cultivate students’ ability to actively learn, discover problems, communicate and interact, deal with difficult problems [9], as well as innovative consciousness, which other machines cannot emulate. 3.5
Implementing Intelligent Assessment to Improve Teaching Quality and Effectiveness
Learning evaluation is an essential part of every teacher’s work. Intelligent assessment refers to large-scale autonomous intelligent assessment of learners’ learning process and learning behavior data, and personalized instant feedback. Intelligent assessment can provide students with a more complete and detailed description, help them to think comprehensively and richly, reflect on what they have learned, adjust their learning methods or choose appropriate learning methods to improve their learning effect; students have the opportunity to show their knowledge and skills in assessment tests, so as to make them more personalized. Learning becomes possible, thus accelerating the transition from time-based learning to ability-based learning. Formative assessment of intelligent assessment can provide real-time reports of results, let teachers understand students’ strengths and weaknesses, and guide them to interpret the assessment data effectively and operatively, which can see, evaluate and respond to students’ learning faster than traditional assessment; it can also capture and reflect the quality of teaching (such as teamwork and teamwork). Collaboration) Video and other evidence are new ways of self-examination, peer review, feedback and superior evaluation. Assessment data can also be provided to parents, so that parents know their children better, in order to support their children’s education more actively. In summary, AI can effectively promote the evaluation from unrelated to holistic evaluation, build a learning link without any gap for teachers and students, and can more comprehensively integrate students’ classroom situation, homework completion and so on to produce holistic evaluation. Therefore, teachers need to change the evaluation methods used in the past, be good at using intelligent assessment to strengthen students’ individualized learning, and promote the continuous improvement of teaching quality.
Professional Development of College Teachers in the Era of AI
3.6
625
Strengthen Discipline and Specialty Construction
Artificial intelligence is a subject with strong cross-cutting and integrity. In the past, it mostly existed in the fields of intelligent science, computer and automation. If AI is still separated and distributed among different disciplines, it will be difficult to meet the requirements of rapid progress of the times. The New Generation of Artificial Intelligence Development Planning (hereinafter referred to as “Planning”) clearly points out the need to create AI corresponding disciplines (Promulgated by the State Council 2017) [10]. At the present stage, more than 50 undergraduate colleges and universities have opened the “Intelligent Science and Technology” specialty, and the National University of Science and Technology and other institutions of higher learning have also established the corresponding AI College. Therefore, there is an urgent need to strengthen the integration of AI with related disciplines such as economics, control, computer, mathematics and law, and to improve the basic theory of AI, computer vision and pattern recognition, data analysis and machine learning, natural language processing, knowledge engineering, intelligent systems and other related directions (Educational Technology 2018) [11].
4 Conclusion In the future, AI will continue to develop in new directions, such as in-depth observation of human expert teachers, from learning theory to deduction theory, and experience observation of AI education simulation students, which will lead people into a new development path (Olney et al. 2012) [12]. But the encounter between teachers and AI is no longer a legend. AI + education have become the inevitable trend of future education development. AI technology will deeply integrate traditional education. Teachers who are good at using and leading AI and cooperating with AI will also stand in the new era of AI. In the era of AI, university teachers should learn to use new technology and develop new methods. They also need to abide by the duty and original intention of education and always be an educator with ideal and belief, moral sentiment, solid knowledge and benevolence. However, we should pay attention to the fact that not all university teachers’ professional development can receive fair support and help from AI technology, especially in the western regions and the backward and poor areas. This may be the “technology trap” that we need to try to avoid. Acknowledgments. This research was supported by 13th five year plan of Chongqing Education Science: Research on the professional development orientation and strategy of Higher Vocational Teachers in the era of artificial intelligence (No. 2018-gx-031), and research on the future career development of teachers in Higher Vocational Colleges from the perspective of artificial intelligence (No. xjsk201901).
References 1. Luckin, R., Holmes, W., Griffiths, M., Forcier, L.B.: Intelligence Unleashed. An Argument for AI in Education. London: Pearson (2016)
626
Y. Miao and Y. Yao
2. Frey, C.B., Osborne, M.A.: The future of employment: How susceptible are jobs to computerisation? Technol. Forecast. Soc. Chang. 114 (2016) 3. Youqun, R.: How artificial intelligence drives educational change. Educator 11, 12–13 (2017) 4. Shengquan, Y.: Future role of artificial intelligence teachers. Open Educ. Res. 1, 16–28 (2018) 5. Hua, Z.: Loss and clarity of teacher’s role. J. Southwest Univ. (Social Science Edition) 2, 129–131 (2010) 6. Guilherme, A.: Reflexions on Buber’s ‘living-centre’: Conceiving of the teacher as- ‘the builder’ and teaching as a ‘situational revelation’. Stud Philos Educ. 34(3), 245–262 (2014) 7. Boulay, B., Luckin, R.: Modelling human teaching tactics and strategies for tutoring systems: 14 years on. Int. J. Artif. Intell. Educ. early view: 1–12 (2015) 8. Chunmei, C.: Professional development of college English teachers from the perspective of information technology. J. Harbin Vocat. Tech. Coll.E 4, 54–55 (2011) 9. Lingqing, S., Luo le, T.: A new way to develop the core literacy of students in the “Internet +” era. Chin. Audio-V. Educ. (1), 78–82 (2017) 10. Promulgated by the State Council 35, Circular of the State Council on Issuing a New Generation of Artificial Intelligence Development Plan (2017) 11. Educational Technology 3, Ministry of Education Circular on the Issuance of the Action Plan for Artificial Intelligence Innovation in Colleges and Universities (2018) 12. Olney, A.M., Mello, S., Person, N., Cade, W., Hays, P., Williams, C., Graesser, A.: Gur-u: A computer tutor that models expert human tutors intelligent tutoring systems. In: Pr-oceedings of the 11th International Conference. ITS 2012, Chania, Crete, Greece, 14th–18th June. Springer, Dordrecht, 127–144 (2012)
Supplier Evaluation and Selection Based on BP Neural Network Jinting Wang(&) School of Management, Dalian Polytechnic University, Dalian, China [email protected]
Abstract. Nowadays, as supply chain management becomes more and more important, many companies has realized that establishing enduring cooperation with excellent suppliers plays a great role in the supply chain operation. This paper sets up a supplier evaluation index system and applies BP neural network algorithm to establish supplier evaluation model. After learning and training, it obtains objective scientific evaluation results and determines the target supplier. The example proves that BP neural network is used for enterprise supplier evaluation and selection, and the method is feasible and has strong practicability. Keywords: Supplier evaluation and selection BP neural network MATLAB
1 Introduction With the intensification of market competition, the traditional supply relationships are not adapting to the global competition. The supplier partner’s performance has a huge impact on the result of the company in terms of quality of products, time of lead, delivery time, stock quantity, and product’s design. At present, many companies have not yet formed a more standardized supplier evaluation system. Most of the evaluation indicators are static state, the number is small and not comprehensive, mainly based on price indicators to select and evaluate suppliers [1]. Furthermore, the method of evaluation is still the old method, in the practical application it can not avoid the randomness in the evaluation process, the subjectivity of the evaluation experts and the ambiguity of the understanding. BP neural network is more intelligent than general solution model. When using earning and recognition ability of BP neural network, we can achieve good results through continuous learning of evaluation indicators and evaluation results. This paper cites the BP neural network method in order to establish supplier evaluation system under supply chain environment, Then on this basis, using MATLAB to test and train the model. Its self-learning function of the model can effectively perform supplier evaluation simulation and choose the best supplier. It can ensure the objective and fair evaluation results and enhance the accuracy of decisions.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 627–634, 2021. https://doi.org/10.1007/978-3-030-51431-0_90
628
J. Wang
2 Establishment of Supplier Evaluation Index System With the deepening of supply chain thinking, suppliers have become an indispensable part of the enterprise. A good supplier can create more value for the enterprise. Establishing an effective supplier evaluation and selection system has a long-term impact on the development of the company [2]. When evaluating and selecting suppliers, most companies still only consider indicators such as price, quality, contract performance, and delivery. The range of indicators selected is too small, the number is few, the evaluation results are inaccurate, lacking of competition and pertinence. So, based on the results of previous research, the paper proposes that evaluation index should not only reflect the technical and economic indicators E.g. product quality and product price, but also include enterprise competitiveness, technology level, inventory capacity, logistics capability and service level in the evaluation index system. 2.1
Establishment of Evaluation Index System
Given the above analysis, a comprehensive supplier index system is established, it includes 7 first-level indicators and 22 secondary-level indicators, as is shown in Table 1.
Table 1. Supplier index system Primary indicator Product quality
Secondary indicators
Rate of qualified products Quality management system Product improvement capability Purchase Purchase cost price Volume discount rate Company competitiveness Production capacity Assets and liabilities Reputation level Technique Innovation capacity level R&D investment ratio Technical support ability Inventory capacity Order lead time Order fulfillment rate Inventory turnover rate Accept emergency order ability Logistics capacity On-time delivery rate Transportation fare Transportation capacity Geographic location Primary indicator Secondary indicators Service Degree of information level Cooperation capacity After sales service
Nature of the indicator Indicator metric Quantitative Qualitative Qualitative Quantitative Quantitative Quantitative Quantitative Qualitative Quantitative Quantitative Qualitative Quantitative Quantitative Quantitative Quantitative Quantitative Quantitative Quantitative Qualitative Nature of the indicator
Data metric Scoring method Scoring method Data metric Data metric Data metric Data metric Scoring method Data metric Data metric Scoring method Data metric Data metric Data metric Data metric Data metric Data metric Data metric Scoring method Indicator metric
Qualitative Qualitative Qualitative
Scoring method Scoring method Scoring method
Supplier Evaluation and Selection Based on BP Neural Network
2.2
629
Quantitative Processing of Indicators
In the supplier index system, it not only includes qualitative indicators but also includes quantitative indicators. There are problems such as the number of scales and different orders of magnitude between the indicators. In order to cause the indicators comparable across the system, the indicators must be quantified. The evaluation indicators are generally divided into two types: Positive and negative indicators. 1. Positive indicator, The higher the indicator score, the higher the evaluation value. Calculation formula for the measurement process is as follows: yi ¼
xi minx max x minx
ðð1ÞÞ
2. Negative indicators, the smaller the indicator score, the lower the evaluation value. The calculation formula for the measurement process is as follows: yi ¼
max x xi max x minx
ðð2ÞÞ
Among them, xi indicates the secondary indicator value,max x indicates the maximum value of the secondary indicator value, minx indicates the minimum value of the secondary indicator value. Through the above calculation formula, all the quantitative index yi can be normalized.
3 BP Neural Network Evaluation Model 3.1
Basic Principles of BP Neural Networks
BP Neural Network is a parallel structure, it is a feed forward multi-layer network, which is composed of input layer, hidden layer and output layer [3]. BP neural network can store or learn a huge number of dates. There is no necessary to explain mathematical equations in advance. Its learning rule is that we use the steepest falling method to continuously regulate the thresholds and weights of the network by backpropagation. It can minimize the sum of squared errors of the network. The common structure of the model is shown in Fig. 1.
Fig. 1. BP neural network model
630
3.2
J. Wang
BP Neural Network Modeling Process
A training process of BP neural network is divided into two processes: forward propagation to obtain prediction data and back propagation update weight [4]. The general steps for modeling are: 1. Initialization. N means the nodes number of input layer, l means the nodes number of hidden layer, m means the nodes number of output layer. xij represents the weight of input layer and hidden layer, xjk represents the weight of hidden layer and output layer, aj is the offset from input layer to hidden layer, and bk is the offset from the hidden layer to the output layer. l is learning rate, g(x) is excitation function, which is taking the Sigmoid function on g(x). The form is gðxÞ ¼ 1 þ1ex : n P 2. The output of the hidden layer. Hj ¼ g xij xi þ aj 3. The output of the output layer. Ok ¼ 4. Calculation of the error. E ¼ 12
m P
l P
i¼1
Hj xjk þ bk
j¼1
ðYk Ok Þ Yk is the expected output. Let us
k¼1
m P remember Yk Ok ¼ ek , then we can express it as E ¼ 12 e2k . k¼1 8 m P < xij ¼ xij þ lHj ð1 Hj Þxi xjk ek 5. Update of weights. k¼1 : xjk ¼ xjk þ lHj ek 8 m P < xjk ek aj ¼ aj þ lHj ð1 Hj Þ 6. Update of offset. k¼1 : bk ¼ bk þ lek 7. Determine if the algorithm ends. Determine whether the target value and the actual output offset e are within the allowable range. If the training ends within the allowable range, the fixed weight and threshold are determined. If it is not within the allowable range, the update weight continues the above process until the training is ended within the allowable range.
3.3
Neuron Determination of BP Neural Network Model
This paper applies MATLAB software to construct a three-layer neural network. It include 22 neurons in the input layer, which are the 22 indicators evaluated by the above mentioned suppliers; Output layer has a neuron, indicating the supplier’s comprehensive evaluation index. Based on BP network hidden layer node design pffiffiffiffiffiffiffiffiffiffiffiffi Empirical formula is l ¼ m þ n þ a, I regulates the number of hidden layer node, m regulates the number of input layer node, n regulates the number of output layer node, and a means a number between 1–10. We can site the number of hidden layer node from 6 to 15.
Supplier Evaluation and Selection Based on BP Neural Network
631
4 Case Analysis There are 20 cooperative suppliers in a company. BP neural network algorithm is applied to establish the enterprise supplier evaluation model. After MATLAB learning and training, the evaluation results are obtained and the target suppliers are determined. 4.1
Model Structure Determination
The 20 suppliers were divided into two categories, the first 15 are training dates, the last 5 are test dates. In the model, 22 indicators and 15 supplier data matrices are input. The error distribution of the hidden layer nodes is obtained and is shown in Table 2. The learning rate error is shown in Fig. 2. Obviously, while number of hidden layer node reaches 10, training error reaches 0.003742, the result is the lowest point; When learning rate is 0.09, error reaches a minimum of 0.004766.
Table 2. Distribution error about hidden layer nodes Number of hidden layer nodes Error 6 0.009312 7 0.0229 8 0.006342 9 0.01415 10 0.003742 11 0.0383 12 0.03019 13 0.03591 14 0.03049 15 0.02493
Fig. 2. Learning rate training error map
Fig. 3. The final trained BP model
632
J. Wang
It can be determined that the model structure of the enterprise is shown in Fig. 3. There are 22 input layer nodes, 10 hidden layer nodes, 1 output layer node, learning rate is 0.09, and training times are 300 times. The learning objective consists of 0.0001 parameters. 4.2
Model Verification
Model tests were conducted. we use five last suppliers’ data of the company to verify the fit and practicability of the model. Figure 4 shows that the comparison between the actual output and the ideal output obtained after the code is run. It can be seen that the error of network model is less. That is to say, the model has strong learning ability, it can reduce errors, and provide accurate and effective basis for supplier evaluation and selection. 4.3
Analysis of Results
We use the above supplier evaluation model to evaluate suppliers of alternative suppliers. Date of the 7 suppliers selected by the company after normalized processing are shown in Table 3. After applying data into BP neural network model, we Obtain 7 supplier score sheets, as is shown in Table 4.
Fig. 4. Test error map Table 3. 7 supplier data sheets X1 X2 X3 X4 X5
S1 S2 S3 S4 S5 S6 S7 0.96 0.98 0.97 0.96 0.96 0.97 1.00 0.80 0.81 0.55 0.56 0.91 0.93 0.51 0.30 0.54 0.37 0.77 0.63 1.00 0.43 0.87 0.94 0.71 0.61 0.72 0.90 0.75 0.66 0.72 0.97 0.76 0.78 0.70 0.99 (continued)
Supplier Evaluation and Selection Based on BP Neural Network
633
Table 3. (continued) X6 X7 X8 X9 X10 X11 X12 X13 X14 X15 X16 X17 X18 X19 X20 X21 X22
S1 S2 S3 S4 S5 S6 S7 0.56 0.62 0.67 0.79 0.83 0.87 0.86 0.98 0.98 0.96 0.95 0.97 0.97 0.97 0.76 0.90 0.87 0.64 0.56 0.63 0.84 Q1 Q2 Q3 Q4 Q5 Q6 Q7 0.57 0.79 0.70 0.72 0.80 0.59 0.57 0.50 0.95 0.80 0.92 0.79 0.94 0.90 0.80 0.85 0.50 0.73 0.79 0.79 0.56 0.56 0.81 0.56 0.95 0.80 0.59 0.83 0.85 0.62 0.65 0.50 0.66 0.54 0.60 0.55 0.78 0.98 0.91 0.55 0.87 0.75 0.56 0.50 0.74 0.90 0.86 0.54 0.50 0.66 0.54 0.19 0.48 0.45 0.57 0.66 0.65 0.70 0.96 0.92 0.98 0.61 0.85 0.86 0.73 0.72 0.60 0.94 0.77 0.73 0.79 0.74 0.57 0.71 0.54 0.52 0.68 0.68 0.90 0.64 0.53 0.91 0.62 0.73 0.75 0.87 0.73 0.62 0.86 0.71 0.91 0.62 0.76 0.63 0.67 0.79 0.84 0.82
Table 4. 7 supplier score sheets Supplier S1 S2 S3 S4 S5 S6 S7
Score 0.7423 0.8157 0.7432 0.8507 0.8501 0.6875 0.7012
The results show that the scores of all seven suppliers are above 0.6, which are all qualified suppliers. Among them, S2, S4 and S5 scores greater than 0.8, which is the company’s A-level supplier. S1, S3, and S7 score between 0.7 and 0.8, which is a Class B supplier. S6 score is greater than 0.6 and less than 0.7 for C-level suppliers.
5 Conclusion This paper establishes a comprehensive and reliable supplier evaluation selection model, and uses BP neural network algorithm to conduct training and error analysis on supplier sample data. Finally, the research determines the optimal model structure of
634
J. Wang
the BP neural network, tests algorithm, verifies model, and determines the enterprise target supplier. Practice has proved that it is feasible to apply this method to supplier evaluation and selection decision, which makes the evaluation result more objective and accurate. The study will provide theoretical references and methodological guidance for supplier evaluation and selection. Acknowledgements. This work was supported by Education Department Project of Liaoning Province (J2019038)
References 1. Weiqing, Z., Qiang, H.: Supplier evaluation index system and evaluation model research. J. Quant. Econ. Technol. Econ. Res. 20, 3 (2003) 2. Shuliang, Z., Youling, C., Dou, Z.: Supplier selection decision method in supply chain. J. Comput. Appl. Res. 32(4): 1024–1027, 1031 (2015) 3. Dage, Z., Hui, S.: Principles and Practices of Artificial Neural Networks. Xi’an University of Electronic Science and Technology Press (2016) 4. Pin, Z.: MATLAB Neural Network Design and Application. Tsinghua University Press (2013) 5. Lin, N., Xie, F., Zou, J., Wang, H., Tang, B.: Application of artificial neural Network in predicting the thickness of chromizing coatings on P110 steel. J. Wuhan Univ. Technol. 28 (1), 196–201 (2013) 6. Chi, S., Suk, S.J., Kang, Y., et al.: Development of a data mining-based analysis framework for multi-attribute construction project information. Adv. Eng. Inform. 26, 574–581 (2012) 7. Martínez-Rojas, M., Marín, N., Vila, M.A.: The role of information technologies to address data handling in construction project management. J. Comput. Civ. Eng. 30(4), 04015064-120 (2016) 8. Mathew, P.A., Dunn, L.N., Sohn, M.D., et al.: Big-data for building energy performance: Lessons from assembling a very large national database of building energy use. Applied Energy 140, 85–93 (2015) 9. Dickon, G.W.: Analysis of selection systems and decision. J. Purch. 5, 5–17 (1966) 10. Weber, C.A., Current, J.R., Benton, W.C.: Vendor selection criteria and methods. Eur. J. Oper. Re-Search 50, 2–18 (1991)
Study on Water Quality Prediction of Fuxian Lake Based on Elman Network Shengping Zhao1, Quan Wang2, and Jingrui Li3(&) 1
2
College of Physics and Electronic Engineering, Yuxi Normal University, Yuxi 653100, China [email protected] College of Chemistry, Biological and Environment, Yuxi Normal University, Yuxi 653100, China [email protected] 3 Honghe University, Mengzi 661100, China [email protected]
Abstract. In this paper, a water quality prediction model based on Elman neural network is established to predict the concentration of NH3-N in Gushan monitoring station of Fuxian Lake. First, by analyzing the correlation coefficient, the input is divided into two categories: confirmation and to be verified. Secondly, the Elman model with different inputs is established, and the influence of variables on the prediction results is analyzed. Finally, the extreme value and mutation rate of prediction are improved. The results show that the meteorological factors pre, Rhu, win, SSD and time factor month can be used to predict the change of NH3-N, the MSE value of the model is less than 0.001, the RMSE value is less than 0.1, and the RMSE value of the optimized model is reduced to 0.019. Elman water quality prediction model has high prediction accuracy. Keywords: Prediction model prediction
Fuxian Lake Elman network Water quality
1 Introduction According to the monitoring data in recent years, the water quality in some areas of Fuxian Lake occasionally exceeds the first level, close to the second level threshold, and the high dimension et al. [1] summarized and analyzed the indicators of Fuxian Lake from 1980 to 2011. From the inter annual change trend of six indicators such as abun dance, each indicator has a different degree of growth trend, in which nitrogen is the main pollutant, and the prediction and analysis of water quality of Fuxian Lake has been paid more and more attention. Traditional water quality prediction and evaluation models mainly include time series model [1, 2], regression analysis model and hydrodynamic theoretical model. However, most of the researches on Fuxian lake water quality are relatively early, mainly focusing on the characteristics of water quality change, driving factors and water quality, taking into account the nonlinear, random, timing and other characteristics of water quality change comprehensively, a dynamic neural network based on feedback is proposed The prediction model of Fuxian lake © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 635–640, 2021. https://doi.org/10.1007/978-3-030-51431-0_91
636
S. Zhao et al.
water quality based on Elman network is applied to the prediction of wind turbine load and disease in the field of power grid, hydropower station and other short-term continuous data prediction, and also in the research of rainfall and water bloom prediction. Because Elman network considers the time series of data and can process the time series data well, it has a good application in data prediction.
2 Data Sources and Processing The time scale of this study is 2012–2017. The water quality monitoring data comes from the Gushan automatic monitoring station of Fuxianhu Lake published by China Environmental Monitoring Center in the “National Weekly Automatic Monitoring of Water Quality in Key Cross-Sections of Major River Basins” (http://www.cnemc.cn/ sssj/szzdjczb/). Gushan station monitors once a week, 52–53 times a year. The meteorological data is from the National Meteorological Science Data Center “China Surface Climate Data Daily Value Data Set (V3.0)”. The selected meteorological station is Hongta, and the distance to Gushan Water Quality Automatic Monitoring Station is 30 km. The change of water quality has continuity and regularity. The change of water quality assessment factors may be related to the month (season) [3]. Therefore, the annual change trend chart of water quality assessment factors pH, DO concentration, CODMn and NH3-N in 2012–2016 is drawn, as shown in Fig. 1. The analysis shows that the changes in the evaluation factors of water quality during the year are generally similar. Therefore, it is proposed that the monthly (seasonal) factor must also have a certain effect on the change of water quality, which can be used as an input variable of the model. The r(X, Y) of each input and NH3-N are shown in Table 1. Usually the definition is: r(X, Y) 0.8–1.0 extremely strong correlation; 0.6–0.8 strong correlation; 0.4–0.6 moderate correlation; 0.2–0.4 weak correlation; 0.0–0.2 weak correlation or no correlation. According to the analysis in Table 2, the correlation between the eigenvalues is not obvious, and it is not suitable to use linear and multivariate linear methods for regression analysis. In the analysis of this problem, nonlinear analysis methods such as neural networks are more suitable.
Fig. 1. Annual change trend of NH3-N in 2012–2016
Study on Water Quality Prediction of Fuxian Lake
637
Table 1. r(x, y) of each input and NH3-N Input Month pH* DO CODMn EVP GST PRE PRS PHU SSD TEM WIN r(X, Y) −0.09 −0.25 −0.26 0.07 −0.28 0.09 0.13 0.01 −0.16 0.11 −0.05 0.12
With reference to r(X, Y), pH*, DO, EVP, PRE, RHU, WIN, and SSD have a greater impact on the prediction of NH3-N. They are used as input variables. CODMn is the actual water quality data monitored by the monitoring station. Although the correlation coefficient is small, it is also used as an input variable. The correlation coefficients of Month, GST, and TEM are small, and their effects on NH3-N prediction need to be verified by model simulation. In addition, water quality changes are continuous changes in time series, so the NH3-N value of the first N weeks should also have an effect on the current NH3-N value. Table 2. Model parameter Model Elman1 Elman2 Elman3 Elman4 Elman5 Elman6 Elman7 Elman8 Elman9 Elman10 Elman11 Elman12
Model parameter Input pH*, DO, CODMn, EVP, PRE, RHU, WIN, SSD 8 inputs + TEM 8 inputs + GST 8 inputs + Month pH*, DO, CODMn, PRE, RHU, WIN, SSD 7 inputs + Month 7 inputs + GST 7 inputs + TEM 7 inputs + TEM + Month 7 inputs + Month + The first three weeks NH3-N 7 inputs + Month + The first four weeks NH3-N 7 inputs + Month + The first five weeks NH3-N
Remarks Referred to as 8 inputs
Eliminate EVP, then referred to as 7 inputs
Excluding the data of the first and second weeks in 2012 Excluding the data of the first three weeks in 2012 Excluding the data of the first four weeks in 2012
3 Results and Discussion This paper takes Fuxian Lake water quality week data and meteorological week data as inputs to predict the NH3-N concentration value, and compares the analysis and verification effects of the Elman1–Elman12 model and the effects of input variables on the prediction of NH3-N concentration. Since the MSE of all models in the three sets is below 0.001 or even smaller, it shows that the accuracy of the model has reached the
638
S. Zhao et al.
requirements, and MSE will not be considered in the process of model analysis. Table 3 shows the analysis of prediction results of each model. Table 3. Analysis of prediction results Model
Total sample MAE RMSE rRMSE (%) Elman1 0.0276 0.0533 85.61 Elman2 0.0249 0.0320 51.31 Elman3 0.0250 0.0390 62.61 Elman4 0.0230 0.0309 49.56 Elman5 0.0219 0.0349 56.07 Elman6 0.0232 0.0295 47.39 Elman7 0.0231 0.0304 48.78 Elman8 0.0240 0.0339 54.45 Elman9 0.0219 0.0311 49.98 Elman10 0.0164 0.0236 39.26 Elman11 0.0179 0.0328 54.77 Elman12 0.0142 0.0191 31.94
Training set MAE RMSE rRMSE (%) 0.0130 0.0291 48.25 0.0239 0.0307 50.91 0.0154 0.0269 44.65 0.0178 0.0246 40.76 0.0113 0.0188 31.24 0.0201 0.0253 41.98 0.0222 0.0300 49.75 0.0159 0.0233 38.70 0.0173 0.0260 43.17 0.0124 0.0185 30.75 0.0090 0.0222 36.84 0.0143 0.0191 31.72
Test set MAE RMSE rRMSE (%) 0.0582 0.0839 139.30 0.0271 0.0345 57.34 0.0450 0.0565 93.85 0.0339 0.0411 68.20 0.0441 0.0551 91.50 0.0295 0.0369 61.20 0.0250 0.0313 51.88 0.0410 0.0492 81.75 0.0317 0.0398 66.08 0.0246 0.0315 52.28 0.0362 0.0477 60.14 0.0140 0.0190 31.51
Through the analysis of elman1 model, it can be seen that the predicted value and the actual value of the model are highly consistent, with good accuracy. The model can effectively predict the NH3-N concentration, but the relative root mean square error RRMSE is large, indicating that some predicted values deviate from the actual value by a large margin. Compared with Elman1, Elman2, Elman3 and Elman4, it can be seen that the MAE, the RMSE and the rRMSE of the input variables after adding air temperature, and month, respectively, all decreased slightly. Although the RMSE in the training set increased by 0.01, it had little effect on the whole. From the change of the rRMSE, the effect of adding temperature and month is better than adding ground temperature. Analyzing the input variables, the value of the evaporation EVP is large and the change is small, so EVP is removed from the 8 inputs to get the Elman5 error data. The three errors of the Elman5 model in the three sample sets are slightly lower than those of Elman1. It is concluded that the EVP value can be eliminated to optimize the prediction result. By comparing elman2 with elman8, elman3 with elman6, elman4 and elman5, it can be seen that eliminating EVP from the input variables is beneficial to the prediction results. Comparing Elman6, Elman8, and Elman9, it can be obtained that adding the temperature and the month to the input variable is better than adding the month. Therefore, Elman10–Elman12, based on the input of 7, is used to input the actual NH3N values of the first three weeks, the first four weeks, and the first five weeks, respectively, for prediction. The training results, test results, and the fitted results of the measured and predicted values are shown in Fig. 2.
Study on Water Quality Prediction of Fuxian Lake
639
Fig. 2 Analysis of prediction results: a) Elman6, b) Elman10, c) Elman11, d) Elman12
By comparing the error situation of Elman6 and Elman10–Elman12 in the three sample sets, it can be clearly seen that the effect of the NH3-N value of N weeks before the input on the error is beneficial, especially in reducing the relative root mean square error. By observing the training results and test result graphs, after adding the NH3-N concentration values for the first N weeks, the model basically fits the training samples, and the fitting effect on extreme values and sudden changes in water quality is significantly improved when predicting the sample fit. From the fitting results and residual analysis, the input variable is the first 5 weeks (about 1 month) of the NH3-N concentration value to fit better. Comprehensive analysis model Elman1–Elman12, Elman neural network model can better predict water quality. Among the input variables in this study, pH*, DO, CODMn, PRE, RHU, WIN, SSD, Month values are higher than the other four Variables can more affect the change of NH3-N concentration in water. In summary, the best model in this study is elman12, whose input is pH*, DO, CODMn, pre, Rhu, win, SSD, Month and NH3-N value in the first five weeks. RMSE of the three sample sets is 0.019, RRMSE is 31.94%, 31.72% and 31.51% respectively, and the fitting residual of
640
S. Zhao et al.
the measured value and predicted value is within ± 0.06. Changes in water quality are affected by environmental, social, and economic factors, and it is difficult to predict. The input variables modeled in this study cannot include all the influencing factors. In addition, Fuxian Lake is a poor nutrition lake and the concentration of major pollutants is small. The input data comes from the automatic water quality detection station. The impact of equipment failure, weather and other factors on the prediction result is larger than that of eutrophic lakes, so it will bring higher rRMSE value to the model.
4 Conclusions Aiming at the non-linear, random, and time-series characteristics of water quality parameter changes, this paper proposes to use the feedback dynamic neural network Elman network to establish a water quality prediction model. Taking the poor nutritional lake Fuxian Lake as the modeling object, the water quality weekly report and corresponding meteorological data of the Fushan Lake Gushan Monitoring Station are used as inputs. By optimizing the network structure and parameter settings, the NH3-N concentration prediction of the water body near the Gushan Monitoring Station is realized Analyze and verify the feasibility and accuracy of the model. The MSE values of the models Elman1–Elman12 are all below 0.001, the RMSE values are below 0.1, and the optimal model RMSE value is reduced to 0.019. The model has high prediction accuracy for monitoring values, and can well fit and track extreme values and sudden changes in water quality. At the same time, the influencing factors affecting the prediction of NH3-N concentration were analyzed. In addition to water quality parameters, meteorological factors: PRE, RHU, WIN, SSD, and time factor Month can all be used as factors to predict NH3-N concentration. Acknowledgement. Supported by Applied Basic Research Project of Yunnan Province (Youth Project 2018FD094)
References 1. Gao, W., Chen, Y., Xu, M., Guo, H., Xie, Y.: Trend and driving factors of water quality change in Lake Fuxian (1980–2011). J. Lake Sci. 25(5), 635–642 (2013) 2. Ji, Z., Liu, S.: Phytoplankton community structure, related influencing factors and the evaluation of water quality in the Fuxian Lake. Environ. Monit. China 35(4), 67–77 (2019) 3. Dong, G., Sun, B., Li, Z., Zhang, R.: Application of time series model in prediction of chemical oxygen demand of source water. Journal of Environment and Health 35(3), 234–237 (2018)
Part IV: Multi-modal Informatics and Big Data
Adaptive Online Learning Model Based on Big Data Guoping Lei(&), Xiuying Luo, Sen Yang, and Ke Xiao College of Electronics and Information Engineering, Chongqing Three Gorges University, Wanzhou, Chongqing 404020, China [email protected]
Abstract. By analyzing the big data model, you can learn more about the learning process of the learners and summarize the learning rules, and then develop personalized learning schemes according to their needs for knowledge and existing abilities. This paper reviews the connotation of the application of big data, points out that the “big” not only means the “large capacity”, but also reflects the comprehensiveness of the collected data and the hidden “big value” brought by the analysis. The adaptive online learning analysis model is established based on the big data, which is related to the environment, stakeholders, methods and goals. Taking the learning of C Language Programming as an example, the learners’ learning process, learning process visualization and learning effects, etc. are studied. According to the research results, the collected and analyzed learning behavior and learning knowledge can not only recommend appropriate learning methods and provide reasonable learning resources for learners, but also provide timely feedback on learners’ learning effects. For example, when the learner’s attitude becomes incorrect, they provide personalized intervention services to improve learning efficiency. Keywords: Adaptive learning
Big data Learning process
1 Introduction Through educational data mining, learning analysis, and teaching & learning promotion, we can acquire the process structure and data flow of learner adaptive learning. Based on the analyzed explicit and implicit big data obtained from learners, a feature model has been successfully built. More appropriate learning path, learning resources and learning objects are offered according to such model [1]. On the basis of this feature model, teachers can easily conduct targeted learning guidance and intervention according to learners’ learning behaviors and learning needs. The drawback is that learners cannot exchange with each other and thus it’s not conducive to discovering new knowledge [2, 3]. Therefore, besides the existing technology, collaborative filtering technology should be adopted to recommend relevant information and contact information on students with similar interests to the learner, in order to enhance communication between learners [4–7]. In short, during the entire adaptive learning process, the learner can control and adjust the learning progress on his own, the teacher can provide targeted intervention and guidance to the learner, and personalized learning © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 643–649, 2021. https://doi.org/10.1007/978-3-030-51431-0_92
644
G. Lei et al.
resources will be obtained through big data analysis, which facilitates students with similar hobbies to exchange [8].
2 Conditions for Adaptive Online Learning Our college has an innovation laboratory that can be used to study the construction of autonomic learning model and demonstrate the results. College leaders also attach great importance to autonomic learning. The school has conducted autonomic learning seminars to further explore autonomic learning. As a policy that has been vigorously promoted in China in recent years, and a new type of learning, autonomic learning can not only create conditions for learners realize lifelong learning, but also achieve the goal of building a learning-type society. Autonomic learning will become a popular learning method. However, the effect of autonomic learning has not reached its expected level. Our existing study is seriously inconsistent with the future status of autonomic learning. Therefore, it is necessary for autonomic learning to construct an adaptive correction and supervision learning model. Our college has established a long-term cooperation with an online education cloud company in teaching, experimentation and resource sharing. At present, the online education cloud teaching platform has been successfully developed. However, we still have no adaptive online learning analysis model algorithm and predictive model algorithm. This adaptive online learning analysis will achieve a perfect combination of model building and practical application. Finally, the following goals can be achieved: (1) The learning model can solve the problems caused by individual differences of learners, enhance the learner’s knowledge reserve, and achieve adaptive selflearning in its true sense; (2) The learning model can achieve real-time feedback and effective supervision of the learner, correct errors during the learning process, and evaluate the learning situation; (3) Minimize the impact on external learning interference; (4) The designed model is as close as possible to the adaptive control model, so as to quantify the learning process.
3 Contents of Adaptive Learning This study mainly compares the existing learning methods with this adaptive learning method. Through comparisons, we find the advantages of adaptive learning [9]. Meanwhile, we combine adaptive control theory and big data theory with adaptive learning theory, in order to construct a theoretical model and mathematical model and overcome the shortcomings of traditional way of learning. Finally, we adopt the model in the school to test its effect and make a conclusion. The design concept and basic components of adaptive learning model correspond to each other. A framework of the adaptive autonomic learning model is shown in Fig. 1.
Adaptive Online Learning Model
645
It can be seen from Fig. 1 that the model is a control system for constructing an adaptive online learning model. With knowledge points learned as input and earning results as output, the system uses the adaptive learning evaluation mechanism as the feedback system to provide feedback on the results during the learning process. After the learning goal is reached, the deviation (if any) will be adjusted. If the goal is not met, the training will be carried out until the training is completed. The adaptive online learning analysis process is shown in Fig. 2.
Learning Target Learning Point
Learning Bias
Learning Process
Learning Result
Learning Adjustment Plan dapve Learning Evaluaon Agency
Fig. 1. Framework of the adaptive autonomic learning model
Online Learning Aanalysis
Openǃ Fragmentedǃ Heterogeneous
Data and Environment (what)
Big Data
Target (why):Monitoring ǃ Analyzing and Forecasng ǃ Interference Evaluaon ǃ Feedback adapve personalized recommendaon reflecon
Measuremen t Target
Learner Characteriscs
Method (how) : Stascsǃ Visualizaonǃ Personalized Recommendaonǃ Data MiningǃSocial Network Analysis
Design Availability
Beneficiary (who) : Learners, Teachers, Intelligent Tutors, Researchers
Performance Scalability
Ethics
Ability
Fig. 2. The adaptive online learning analysis process
3.1
Data and Environment
The generated forming data and big data provide an important basis for prediction, learning intervention, processing learning behavior, and personalized adaptive learning [10]. At the same time, it is necessary to consider the effective aggregation of open, fragmented and heterogeneous data generated in the data environment to meet the learning needs of learners. The real data environment includes adaptive learning system, social media (such as Blog, Weibo, social network, Wikipedia, Podcast, etc.), traditional learning management system (such as Blackboard, Moodle, etc.) and open learning environment (e.g., MOOC). Through direct and indirect interactions between learners and learners, learners and teachers, and learners and resources, massive data (including structured data, unstructured data, and semi-structured data) will be
646
G. Lei et al.
generated, most of which come from data on activities in adaptive learning systems such as reading, writing, evaluation, resource sharing and testing. 3.2
Stakeholders
According to different roles, stakeholders include students, teachers, smart tutors, educational institutions, researchers and system designers, etc., among which the first four have greater influence. Students should learn in a self-organizing manner, and be able to protect user information, prevent abuse of data, and pay attention to privacy and ethical issues [11]; teachers should adjust teaching strategies according to learner information and intervene in the learning; smart tutors should recommend personalized learning resources and paths based on the learner’s learning style, hobbies and level of knowledge; educational institutions should warn the students who possibly cause dangers and intervene in their learning, which can increase the student’s final exam score, usual attendance rate, and school enrollment rate, and reduce the dropout rate. 3.3
Methods
The analysis of big data learning can achieve comprehensive recording and real-time tracking of learner’s learning data through statistical method, knowledge visualization, personalized recommendation, data mining and social network analysis. By doing so, different learners’ learning characteristics will be obtained. After having a basic comprehension of the learner’s learning needs, learning foundation and learning behavior & habits, personalized learning plans can be developed for different learners. Big data learning methods are briefly introduced as follows: The statistical method mainly plays an early warning role. The autonomic learning model is constructed according to the learner’s interaction behavior and related factors affecting the score. Relevant analysis and regression analysis methods are usually used to analyze the learner’s big data. The visualization technology mainly plays a role of promoting the learner learning knowledge [12]. When the learner can actively build and migrate knowledge, it shows that the learner has a deeper grasp of knowledge. Personalized recommendation mainly suggests adaptive learning resources and paths, and can be realized through collaborative filtering technology and recommendation technology. Mining technology mainly implements teaching intervention to improve teaching, including mining of data prediction, clustering and association rules. The mining technology is used to extract more valuable information, such as collecting, processing and analyzing learner interactions, so as to grasp the learner’s mastery of knowledge and conduct intervention. Social network analysis obtains the learner’s learning big data based on the interpersonal network built by the learner. By using this method, we can find the way of supporting their own learning and getting inspiration, the questions encountered by learners and factors affecting learners’ learning progress. Using any one of these methods alone usually has little effect. Therefore, it is particularly important to combine these technologies. The personalized adaptive learning system is designed based on big data, and its availability, scalability and good system performance help enhance learners’ academic performance.
Adaptive Online Learning Model
3.4
647
Goals
There are many models of adaptive online learning, such as the autonomic learning model of human-computer interaction in foreign countries, the autonomic learning model with meaning construction as orientation, the autonomic learning model adopting classroom interaction, interactive teaching with self-monitoring skills proposed by American educational psychologists Brown and Palinça, the problem-based autonomic learning model proposed by Bartholomew and Time Len, and Bransford’s exploratory autonomic learning model. With the popularization of computers and the continuous improvement of theoretical research on adaptive learning methods, the individual characteristics of learners can be well reflected, rather than the learning process. Therefore, we propose a set of adaptive learning model considering the learning process. The design concept of this model has the following characteristics: (1) Directivity All the autonomic learnings designate the learners. There is no universal learning model. Some objects are not suitable for autonomic learning and voluntary learning. This model stipulates that the specified learner cannot start the next module before completing this module learning. (2) Adaptation This module provides an extremely important learning rating, including two functions: correction and supervision. These functions are mainly offered for the deviations between different learners in different learning knowledge points, which are beneficial for students to learn the last lessons and sum up experience to achieve efficient learning and correct learning misunderstandings. (3) Quantitative model The model is a superposition of multiple functions, so the function can be divided into multiple simple functions, and each function can be adjusted. Therefore, the system can independently control and realize the relationship between each link. (4) Stability Stability is the biggest advantage of this module. The variables of the module adaptive system input & output and parameter setting always have bounded interference to external environment. Adaptive autonomic learning keeps supervising each module. Weak signal interference ability has little impact on the system, and this fluctuation is always controllable.
4 Asymmetric Fingerprinting In order to verify the test and appraisal of autonomic learning ability for the model we are studying, we choose the students from the two classes of C Language Programming to conduct random tests. The test results are shown in Table 1.
648
G. Lei et al.
Table 1. Learning autonomy test results of experimental class and result comparison class Learning autonomy
Average score of experimental class Learning content 9.88 Learning motivation 27.02 Learning method 36.41 Learning duration 12.8 Learning process 10.19 Learning result 14.95 Learning environment 16.26 Total scores 127.65
Average score of result comparison class 9.62 26.02 36.51 12.4 15.19 14.55 16.35 127.91
Z 0.106 0.013 0.00707 0.0527 0.00796 0.154 0.0245 0.0845
After one semester of study, the scores of the final exam are tested again. The test results are shown in Table 2. Table 2. The values of time in the mill drum first section Learning autonomy Learning content Learning motivation Learning method Learning duration Learning process Learning result Learning environment Total scores
Average score of experimental class 9.88 27.02 36.41 12.8 10.19 14.95 16.26 127.65
Average score of result comparison class 15.62 36.02 66.51 32.4 25.19 24.55 26.35 194.91
Z 1.75 2.27 6.37 1.91 1.59 2.01 1.75 16.28
It can be seen from the data in Table 1 and Table 2 that the improvement effect of the poor students in the experimental group is the most obvious, and the score is improved from 127.65 (the first test) to 194.91 (the second test). In comparison, the improvement of excellent students’ academic performance is not obvious. There is no significant difference in the academic performance of the excellent students between the experimental group and the control group. Through analysis, we find that poor students learn according to the learning path recommended by the personalized adaptive system and the learning materials with appropriate difficulty. The excellent students are more independent and don’t quite believe the functions recommended by the system. They sometimes select the learning path and resources on their own. Therefore, the personalized adaptive learning analysis model of big data shows more obvious effect for poor students. The data in Tables 1 and 2 show that the students in the experimental class have less learning duration, less number of discarded questions, and less number of attempts to answer questions than the comparison class. Therefore, the students in the experimental class are more efficient in learning. Through analysis,
Adaptive Online Learning Model
649
the reason is that the system will conduct big data statistics and analysis according to the learning behavior and knowledge acquired of the students in the experimental class, so as to accurately judge the students’ cognitive ability, and then develop a unique learning style. When the difficulty of suggested questions meets the student’s knowledge level, the student can answer accurately, so there is no need to give up the question or try many times to answer the question. Obviously, the excellent students in the comparison class often want to answer the question, and usually try more times to answer the question than the poor students. Acknowledgements. In this paper, the research was sponsored by The 13th five year plan of Chongqing Education Science (2017-GX-373), Supported by Research project of higher education reform in Chongqing Three Gorges University (JGYB1802).
References 1. Qiang, J., Wei, Z., Pengjiao, W., et al.: Realization of individual adaptive online learning analysis model based big data. China Educ. Technol. 1, 95–102 (2015) 2. MengNan, W., Yan, Ma.: Research on the basic attributes of online education users based on big data analysis-taking “tencent classroom” as an example. China Inf. Technol. Educ. 295 (19), 105–107 (2018) 3. Min, L., Xiaoli, C.: Learning analysis model design of adaptive online learning platform in big data environment–taking chongqing radio and television university as an example. Sci. Technol. Inf. 507(6), 175–176, 178 (2018) 4. Birjali, M., Beni-Hssane, A., Erritali, M.: A novel adaptive e-learning model based on big data by using competence-based knowledge and social learner activities. Appl. Soft Comput. 69, 14–32 (2018) 5. Sun, H., Zheng, Q.: The technology, application and trends of educational big data. J. Distance Educ. 5, 41–49 (2016) 6. Xiaoxia, L., Yuejin, D., Feiqiang, S., et al.: Design of adaptive learning system based on big data. In: The 6th International Conference. ACM, 2017 7. Torrecilla, J.L., Romo, J.: Data learning from big data. Stat. & Probab. Lett. 4(136), 15–19 (2018) 8. Yixia, Z., Xin, W., Kun, J., et al.: Analysis on the research path and trends of learning analysis technology in domestic large data environment. Mod. Educ. Technol. 8(29), 34–40 (2019) 9. Haipeng, W., Dan, W.: Investigation on adaptive learning mechanism of big data based on knewton platform. Mod. Educ. Technol. 5(26), 5–11 (2016) 10. Halguang, F., Jinping, L., Junda, C., et al.: Research on quantified self MOOC adaptive learning system based on educational big data. E-Educ. Res. 11, 38–42, 92 (2016) 11. Xiang, C., Changzheng, C.: A scheme of online learning data analysis under the big data background. Softw. Eng. 1(23), 24–26 (2020) 12. Peng, F-x: The mechanism of action and stimulation model of online learning participation. Adult Educ. 1, 18–23 (2019)
TCM Prescription Compatibility Based on Improved Association Rules Algorithm Mengnan Li and Xiaoqiang Ren(&) Qilu University of Technology, Jinan, China [email protected]
Abstract. Objective: To analyze the traditional Chinese medicine (TCM) prescription regularity of Treatise on Febrile Diseases by using improved Apriori algorithm to obtain more efficient data mining. Methods: 113 formulae from Treatise on Febrile Diseases were collected and terms of herbs in this prescription were standardized. This paper put forward valid value index storage, and fast intersection operation to improve the efficiency of mining TCM data. The support-confidence-lift framework is adopted to evaluate the effectiveness of the rules and avoid the generation of meaningless rules. Results: 18 highfrequency herbs with occurrence of 10 times or above, including Licorice, Cassia Twig, Jujube and Ginseng, etc. Among18 high-frequency herbs, 52 combinations are obtained classical traditional herb pairs, such as LicoriceCassia Twig, Jujube-Ginger and Ginger-Licorice, etc. Conclusion: The improved Apriori algorithm can be applied in the analysis on prescription compatibility and find out high-frequency herbs and herbs combinations with low storage consumption and high efficiency. The experimental result can provide references for clinical use of herbs which reveal the compatibility rule of the classical prescription. Keywords: Association rules mining Apriori algorithm Traditional Chinese medicine Prescription compatibility
1 Introduction Association rules mining was first proposed by Agrawal to discover the interesting association between goods in supermarkets. Now, association rule mining not only play significant roles in commodity data analysis but also is commonly used in some other fields, especially in traditional Chinese medicine(TCM) which can find the relationship between symptoms and herbs and prescription compatibility rule [1]. The research applied association rule mining in TCM analysis to explore medical knowledge hidden in large-scale TCM literature and clinical data sets [2, 3]. The association rules mining based on TCM can mine the high frequency drug pairs and summarize the compatibility rules, which can provide the reference for clinical treatment and research of new prescription. Apriori algorithm is the most prevalent algorithm and easy to implement which can discover the related rules hidden in the traditional Chinese medicine datasets. However, when analyzing large-scale TCM datasets, Apriori algorithm has advantages of high memory consumption and low efficiency. In order to achieve more © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 650–656, 2021. https://doi.org/10.1007/978-3-030-51431-0_93
TCM Prescription Compatibility
651
efficient TCM data mining, it is essential to promote the performance of Apriori algorithm. This paper explored the rule of herb pair combinations in TCM classics Treatise on Febrile Diseases by using optimized Apriori algorithm.
2 Related Work Data mining is popular in traditional Chinese medicine research, which uses association rules mining to deeply understand the internal principle of TCM compatibility [4]. The association rules mining was firstly proposed by Agrawal, which aimed to find hidden relations between different items in datasets. Apriori algorithm is inefficient for dealing with massive data. Because it needs to scan the database multiple times to count the support of itemsets. Due to the limitations of Apriori algorithm, many optimization methods based on the Aprioi algorithm framework are proposed. Reference [5] proposed FP-growth algorithm which scanning the database twice, then compress datasets into a data structure like a tree, called FP-tree. The algorithm used FP-tree to generate frequent itemsets, which avoid generating candidate item sets, then the mining efficiency is improved and the occupation of memory space is reduced. Some methods improve the mining efficiency by using bit operation. Reference [6] proposed an improved algorithm by using bit set matrix to storage frequent itemsets, which only scan the database twice. Reference [7] proposed frequent item sets mining algorithm by using bit table, which itemsets are expressed with binary representation. Using effective association rule algorithm to analyze data can obtain more efficient in TCM data mining [8]. Reference [9] uses improved Apriori algorithm to analyze the medication regularity of TCM famous doctors for diabetes, which mining high frequency medicine and medical combinations with high efficiency. The result can provide reference for clinical diabetes treatment. Reference [9] explore the relationships between herbal efficacy and property in Shennong Classic of Materia Medica by using an optimized association rules. This results will be helpful for study on herbal property. Reference [10] analyze herb pairs for treatment on headache in Dictionary of Traditional Chinese Medicine Prescriptions, which mine herbs with high usage frequency included Bai-zhi, Xi-xin, Fang-feng, etc. The result can provide the basis for the treatment of headache.
3 Algorithm Optimization 3.1
Basic Concepts
let I = {i1 ,i2 ,…, im } be a set of items, called item sets where each transaction T is subset of items such that T I. Let D be a database of itemsets. An association rule is an implication of the form A => B where A and B are the item sets, A I, B I, A \ B = ∅. Each association rule uses support and confidence to determine the availability of the rule. Support (A => B) indicates the percentage of transactions that both include A and B. Confidence (A => B) represent the percentage of transactions in databases both including A and B.
652
M. Li and X. Ren
One of the most reliable ways to measure the association rules is lift. Lift indicates the ratio of the percentage of both including A and B to the percentage of including B. That is, lift (A, B). Lift (A, B) =
P(A [ BÞ P(A)P(B)
ð1Þ
If lift (A, B) > 1, indicates A and B are positive correlation. If lift (A, B) < 1, represents A and B are negative correlation. If lift (A, B) = 1, A and B are considered being uncorrelated. 3.2
Related Properties
• 1. If an itemset is frequent, then all of its subsets must also be frequent. • 2. If frequent k-itemsets can generate candidate (k + 1)-itemsets, for all items which occurred in frequent k-itemsets must be equal or greater than k. 3.3
The Improved Algorithm
The shortcoming of Apriori algorithm is inefficient, because it generates a mass of candidate itemsets and multiple scan database. Therefore, we propose the method of valid value index storage and optimized intersection operation to save consumption time in counting the support and decline the number of candidate items. (1) Valid Value Index Storage Table 1 shows database D, where TID indicate transactions and items represent a set of items in transactions. Table 1. Transaction database D TID T1 T2 T3 T4 T5 T6
Items I1; I2; I5 I4; I5 I1; I2; I3 I1; I3 I1; I2; I3; I5 I1 ; I2; I4
Some improved Apriori algorithm based on bit set utilize the advantages of fast bit set operations which map the datasets into bit set. In bit set represents, 1 indicates the existence of the corresponding item in the corresponding transaction and 0 indicates the inexistence. We call the value 1 in the bitset representation as a valid value. Sparse data sets waste a lot of space when represented by bitset storage. In order to save space and
TCM Prescription Compatibility
653
speed up operations, we use valid value index storage to compress the bitset as showed in Table 2. Table 2. Valid value index representation TID Items I1 I2 T1 0 0 T2 2 2 T3 3 4 T4 4 5 T5 5 T6
I3 I4 2 1 3 5 4 5
I5 0 1 4
(2) Iteration Operation In valid value index representation, performing an intersection on sets to calculate the frequency of candidate itemsets. Figure 1 shows improved intersection operation procedure, suppose ordered set1 and set2 is the collection containing the valid value index of items, set3 is the result of taking the intersection of set1 and set2.
Fig. 1. Intersection operation procedure
4 Experimental Results 113 prescriptions and 85 herbs are collected from Treatise on Febrile Diseases. Herbs with high frequencies are Licorice, Ginger, Cassia Twig, Jujube, Radix Paeoniae Alba, Rhubarb and Gypsum, etc. Herbs more than 10 times are shown in Fig. 2. Licorice is the most frequency herb used in Treatise on Febrile Diseases. In most formulae, the main function of Licorice is to harmonize various medicines and improve the effect of other herbs. Figure 3 shows the relationship between high frequency herbs. Licorice has strong association with other herbs, which is frequently combined with Cassis twig, Ginger and Jujube, etc.
654
M. Li and X. Ren
濙瀅濸瀄瀈濸瀁濶瀌
濉濃 濇濃 濅濃
濈濉 濆濆
濅濉 濅濇
濄濊 濄濊 濄濈 濄濈 濄濆 濄濆 濄濄 濄濄 濄濃
濃
濧瀅濴濷濼瀇濼瀂瀁濴濿澳濖濻濼瀁濸瀆濸澳瀀濸濷濼濶濼瀁濸
Fig. 2. Frequency of traditional Chinese medicine
Fig. 3. Network of traditional Chinese medicine
Set the minimum support and confidence (minsup = 5%,minconf = 80%). In order to ensure the rationality of the results, we set the minimum lift is 1 to delete some useless rules. Table 3 shows the association rules of herb pairs that most herbs have strong correlation. Such as, the rule ‘Ginseng, Jujube => Pinellia’ indicates that if Ginseng and Jujube are both applied in a prescription, Pinellia must be used. Ginseng and Jujube have the effect of dispelling the cold. The effect of Pinellia is warm t stomach and anti-nausea. The compatibility of the kinds of medicine can enhance the effect of dispelling cold. Rhizome Anemarrhenae-Licorice-Japonica Rice have the function of warming and dispelling cold and reinforcing Yang promote the flow of Qi. Ginger-Jujube-Licorice are used for warming meridians, promoting sweating and activating blood. The result conforms to the compatibility law of classical Chinese medicine which reflects the principle of TCM and give help for research of other compatibility rules.
TCM Prescription Compatibility
655
Table 3. Association rules of three and four herb pairs Rules
Sup (%) Rhizome Anemarrhenae, Licorice => Japonica Rice 6.0 Gypsum, Licorice, Japonica Rice => Rhizome Anemarrhenae 6.2 Ginseng, Jujube => Pinellia 5.3 Pinellia, Jujube => Ginger 6.1 Rhizome Anemarrhenae, Japonica Rice => Gypsum 6.2 Licorice, Japonica Rice => Gypsum 7.1 Cassia Twig, Ginger => Jujube 9.7 Ginger, Radix Paeoniae Alba => Jujube 7.1 Cassia Twig, Radix Paeoniae Alba => Jujube 6.2 Rhizome Anemarrhenae, Japonica Rice => Licorice 6.2 Ginger, Jujube => Licorice 15
Conf (%) 80 80 100 100 100 100 100 89 85 100 89
Lift 10 8.3 8.5 7.2 6.3 6.3 3.9 3.5 3.4 1.7 1.5
5 Conclusions This paper analyzes the association rules of TCM data in Treatise on Febrile Diseases by using an optimized Apriori algorithm. Optimized method can save time consumption of database scanning, decrease memory space and avoid generating redundant rules to have high performance of the association rules mining in TCM prescription data. According to the optimized support-confidence-lift framework, we obtain the association rules of TCM which reflect the compatibility law of classical prescription. Experimental result shows that the association rules of herbs obtained conform to the classic compatibility law and clinical experience. This result can provide the theoretical basis for the clinical medication and the study on Treatise on Febrile Diseases. In future work, we will focus on the optimization of algorithm performance and analyze the TCM prescription combine with symptoms and herbal property to improve the reliability of mining results.
References 1. Chen, G., Wang, Y., Qiu, J.: A research on the compatibility principles of formulas for spleen and stomach health from thousand golden prescriptions based on clustering mining and association rule mining technology. 8th International Symposium on Computational Intelligence and Design. IEEE (2015) 2. Jin, R., Zhi-jian, L., Chun-miao, X., et al: An improved association-mining research for exploring Chinese herbal property theory: based on data of the Shennong’s Classic of Materia Medica. J. Integr. Med. 11, 352–365 (2018) 3. Li, Y., et al: Herb network analysis for a famous TCM doctor’s prescriptions on treatment of rheumatoid arthritis. Evid.-Based Complement. Altern. Med. (2015) 4. Yang, M., et al: Navigating traditional Chinese medicine network pharmacology and computational tools. Evid.-Based Complement. Altern. Med. (2013)
656
M. Li and X. Ren
5. Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. ACM sigmod record 1–12 (2000) 6. Huang, Y., Lin, Q., Li, Y.: Apriori-BM algorithm for mining association rules based on bit set matrix, 2nd. IEEE. IMCEC, 2580–2584 (2018) 7. Zhao, G.-b., Liu, Y.: An efficient bittable based frequent itemsets mining algorithm. J. Shandong Univ. 23–29 (2015) 8. Liu, Y., et al: Application and improvement discussion about Apriori algorithm of association rules mining in cases mining of influenza treated by contemporary famous old Chinese medicine. IEEE International Conference on Bioinformatics and Biomedicine Workshops 316–322 (2012) 9. Wang, Q., Jin, W., Song, X.: Research on the rules of apoplexy treatment based on optimized Apriori algorithm. J. Medical Inform. 62–67 (2017) 10. Wang, Q., Jin, W., Song, X.: Analysis on formula principles for “head wind” disease based on Apriori and clustering algorithm. J. Medical Inform. 56–64 (2019)
Feature Analysis of Chinese Drama Based on Big Data Analysis Chunhua Liu(&) Henan Vocational College of Science and Technology, Henan, China [email protected] Abstract. “Big data” has become a well-deserved focus in the industry in the past year. Especially with the development of new SNS network, the surge of video traffic and the emergence of photo sharing needs, big data grows more rapidly in the fertile soil. The era of big data has come, we can use big data for all aspects of analysis, so as to provide us with more abundant information resources. This paper takes Chinese drama as the research object and analyzes the characteristics of Chinese drama with big data analysis method, so as to summarize the characteristics of Chinese drama and contribute to the development of Chinese drama. The big data analysis method adopted in this paper is to use crawler software and SPSS Modeler to conduct data mining and modeling and obtain the corresponding feature word cloud. The research of this paper shows that the unique performance style and expression technique of Chinese drama make the characteristics of drama obvious and have the characteristics of generality, freehand brushwork and theatricality. According to these characteristics, relevant laws and regulations can be issued at the national or government level to promote the development of Chinese drama and enable the broad masses of people to have a deeper understanding of Chinese drama. Keywords: Big data analysis Chinese Opera
Dramatic characteristics Data Mining
1 Introduction China is a major country of drama in the world, no matter from the aspects of its long history, rich repertoire, various types of drama, wide range of practitioners and huge number of audiences. China has a fine tradition of drama since ancient times, and up to now, there are more than 360 local operas handed down [1, 2]. The situation of hundreds of operas distributed all over the country is very complicated [3]. Some have experienced several centuries of ancient opera, such as kunqu opera; Some with modern new culture to grow up with the new types of drama, such as yue opera; Some are just appeared in recent years, such as auspicious drama; Some opera types of audience all over the country and all classes, such as Peking Opera; Some drama mainly active in some areas of the countryside, such as huaguxi; Some operas belong to the culture of aged citizens, such as huju, etc. [4, 5]. Formed by the age of the different types of time gap is large, the distribution of the area is very wide, and various performances, art style is far, some more like ancient dance, others are more like a © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 657–663, 2021. https://doi.org/10.1007/978-3-030-51431-0_94
658
C. Liu
modern light opera, some more to absorb folk songs and dances nutrients, others more absorption of western drama creation technique, is colorful, which [6]. In the 18th century, the development of drama in Europe was also very popular. Schiller and lessing of Germany; Sheridan and goldsmith of England; The Italian goldoni, etc., formed a group of clear-headed and talented writers [7]. Realistic dramas in the 19th century, such as gogol’s the king James and wilde’s the importance of seriousness, were represented by henrik Ibsen, whose plays were regarded by theater critics and literary historians as the prelude to the rise of various schools of drama in the 20th century [8]. In the early 20th century, wang guowei first used comparative literature to compare Chinese and western tragedies. Around the May 4th movement, Chen duxiu, hu shi, zhang houzai and others all published comments and articles on the comparison between Chinese and western dramas [9]. From the 1920s to the 1940s, xu deshan, yu shangyuan, zhao tai, cheng yanqiu, jiao juyin et al. gradually advanced the study of comparative drama in China [10]. In this paper, crawler software is used to crawl data from “baidu academic” and search the title “development of Chinese drama”. The data collection process is mainly divided into two steps: one is to customize the collection through octopus, set the collection website, collection cycle and collection fields, and the other is to export the collected data into XLSX format through local collection. For the sake of the continuity, integrity and security of data, this paper excluded the literature journals that are too far apart in time, because with the development of computer, the characteristics of Chinese drama have been changing, that is, the selected data range is the journals with the characteristics of drama from 2000 to 2018.
2 Method 2.1
Data Mining
Data mining is the process of carefully analyzing large amounts of data to reveal meaningful new relationships, trends, and patterns. It emerged in the late 1980s and is a new field with great application value in database research. It is an interdisciplinary discipline, integrating theories and technologies of artificial intelligence, database technology, pattern recognition, machine learning, statistics, data visualization and other fields. Data Mining is generated from applications and should be applicationoriented. Its technical route follows the general Process of Cross Industry Standard Process of Data Mining, as shown in Fig. 1 below.
Feature Analysis of Chinese Drama Based on Big Data Analysis
Business understanding
659
Data understanding Data preparation
Deployment
Data Modeling Evaluation
Fig. 1. Drisp-dm process
2.2
Data Derivation and Transformation
The research content of Chinese drama is relatively extensive. The characteristics of Chinese drama are analyzed by clustering common words, and a research direction reference model is made, mainly based on the keywords of literature, journals and authors. Because the original data is retained on the website format, especially the keyword and author two variables exist in a cell multiple data, so the need for cell sorting and other processing. Specific treatment is as follows: First, clean up null values. Delete data with keywords null, author null and journal null. Since there is a sequence of years in the crawled data, for a null value of the year, the year equivalent to the previous data is added directly. Second, keyword processing. All keywords of a paper are in a single cell, which is not convenient for keyword frequency statistics, and keyword columns are extracted separately. Third, author processing. Similarly, the author’s data also needs to be sorted, in the process of crawling the data, multiple authors will be put in a cell, and there are some symbols among the authors.
660
C. Liu
3 Experiment 3.1
Data Description
For the data crawled by us, there are three important types of data, namely title content, journal author and journal date, among which: Firstly, the title content mainly includes the title of the journal and the key words of the journal, which reflects the main research direction of each journal. Secondly, the authorship of the periodical includes the name of the issue and the author. The higher the authorship of the periodical, the more famous the author is, and the more authoritative the periodical content is in the study of Chinese drama. The core of these two variables is the title and key words of journals. Through these two variables, we can clearly see the research direction of each journal, which is helpful for data transformation and exploration and analysis in the next step. 3.2
Model Establishment and Model Evaluation
First, establish the common word matrix Before modeling, the common word matrix (0-1 matrix) was established according to the keyword table and the keyword high-frequency table. Secondly, the phase difference coefficient matrix is established It is necessary to convert the common word matrix into the correlation coefficient matrix first. Due to the excessive 0 value of the correlation coefficient matrix, it is easy to cause greater errors in statistics. In order to facilitate further processing, it is necessary to replace the correlation coefficient matrix with the different coefficient matrix.
4 Discuss 4.1
Display of Experimental Results
The results of clustering analysis in section 3.4 of chapter iii are shown in Fig. 2. There are seven types of clustering in total, and the ones with the highest occurrence probability are clustering 1 and clustering 2. Clustering 1 includes totality, freehand brushwork, theatricality, reality, stylization, virtuality and contradiction, among which the most common features are totality, freehand work and theatricality. The occurrence probability of its characteristic words is shown in Table 1. Clustering 2 includes totality, freehand writing, theatricality, expressiveness, standardization, randomness and directness of stage. Among them, totality, freehand writing and theatricality appear most frequently. The occurrence probability of its characteristic words is shown in Table 2.
Feature Analysis of Chinese Drama Based on Big Data Analysis
The size and probablity of the clusters 8 7 6 5 4 3 2 1 0
7
7 17.50% 17.50%6
20% 15%
6
15%
6
15%
5
15% 12.50% 3
10% 7.50% 5%
Cluster-1 Cluster-2 Cluster-3 Cluster-4 Cluster-5 Cluster-6 Cluster-7 Size
Probability
Fig. 2. Clustering results
Table 1. Feature words and occurrence probability in cluster 1 Characteristic Totality Freehand brushwork Theatre Realistic Stylization Virtuality Contradiction
Probability 18% 17.4% 16.9% 15% 14.9% 10% 7.8%
Table 2. Feature words and occurrence probability in cluster 1 Characteristic Totality Freehand brushwork Theatre Characterization Standard Randomness Stage immediacy
Probability 17.5% 17.4% 17.4% 15.2% 13.8% 10.7% 8%
0%
661
662
4.2
C. Liu
Discussion on Dramatic Features
(1) Theatricality Chinese drama has been communicated and integrated in the various performances of the goulan. By absorbing a variety of performing arts factors, drama art more “hybrid”. This experience also helps to reinforce the overall character of Chinese drama. Chinese drama scholars have used a variety of views to talk about the overall artistic characteristics of Chinese opera. For example, in the song of qu, written by wang jide in the Ming dynasty, drama was called “singing and dancing in harmony with bai”. Wang guowei, a close neighbor, said in the original opera test: “opera, that is to song and dance performance story.” Mei lanfang cloud today: “(drama) is not generally a combination of factors such as music, dance, art, literature forms of drama, and it is the singing, dancing, poetry, NianBai, martial arts, music accompaniment, and characters (such as look, dress, etc.), QiMo props such as closely, cleverly integrated together in a special form of drama.” (2) Freehand writing The general performance art is characterized by singing and dancing. The characteristics of Chinese drama are the subjectivity of objective real life. This makes the art of opera have the inherent characteristics of “freehand brushwork”. According to huang zuolin, this is “life writing meaning”, “action freehand”, “language freehand” and “stage beauty freehand”. The characteristic of Chinese drama freehand brushwork is formed gradually in the history, which is the accumulation of experience in the performance practice of artists in the past dynasties.
5 Conclusion Chinese drama has a long history, distinctive features and its own system. Under the background of big data era, how to better develop Chinese drama and spread Chinese drama is worth our thinking. On the one hand, it is necessary to consider the characteristics of Chinese drama itself and how to maintain and inherit these characteristics so as to make the development prospect of Chinese drama broader. On the other hand, it is necessary to combine the current background of The Times, actively innovate, and create a Chinese drama that is more in line with the interests and needs of the contemporary public, so as to make drama accessible to the public. At the same time, drama performance must be clear: to make the audience understand, arouse the audience’s strong interest, in order to achieve the purpose of entertaining. Above all, if Chinese drama is to prosper, it must be commercialized. Although the operation of commercialization may reduce its literariness and artistry to some extent, the commercialization of combining literariness and artistry is not impossible. At present, all forms of literary expression can be organically combined with commerce, and a new prosperity has emerged. Drama, of course, can also be. Like Hollywood blockbusters, a stage play with rich commercial elements is also a very unique and effective commercial carrier and advertising carrier. Under the condition of market
Feature Analysis of Chinese Drama Based on Big Data Analysis
663
economy, this kind of commercialization is a kind of inevitability, also is a kind of advanced performance. As a carrier with a wide audience, drama should adapt to the needs of business in the information age. In addition, China’s young audience is a huge group of cultural consumers, and young audiences will naturally become the mainstream of the theater audience. On Broadway in New York, you can feel the drama from the children. Therefore, Chinese drama should give full play to the agglomeration effect of young audiences, expand the receiving group and promote the development of drama culture.
References 1. Xiong, H., Payne, D.: Characteristics of Chinese rural network: Evidence from villages in Central China. Soc. Sci. Electron. Publ. 3(1), 74–97 (2017) 2. Du, X., Tang, W., Chen, X., et al.: Clinical, genetic, and immunological characteristics of 40 Chinese patients with CD40 ligand deficiency. Scand. J. Immunol. 90(97), 12798–12799 (2019) 3. Chan, S.Y., Ng, C.F., Lee, K.W., et al.: Differences in cancer characteristics of Chinese patients with prostate cancer who present with different symptoms. Hong Kong Med. J. 23(1), 45–76 (2017) 4. Ting, S., Foo, H., Chia, P.S., et al.: Dyslexic characteristics of Chinese-speaking semantic variant of primary progressive Aphasia. J. Neuropsychiatry 30(1), 34–45 (2017) 5. Zhou, Y., Wu, C., Dai, Z., et al.: Clinical, radiological, and histological characteristics of Chinese type 2 diabetic patients with diabetic scleredema: an observational study. Int. J. Diabetes Dev. Ctries. 45(65), 1–7 (2018) 6. Beleri, S., Chatzinikolaou, S., Nearchou, A., et al.: Entomological study of the mosquito fauna in the regional unit of Drama, region of East Macedonia-Thrace, Greece (2015 to 2016). Vector Borne & Zoonotic Dis. 17(9), 665–667 (2017) 7. Pesen, A., Üzüm, B.: The analysis of self efficacies of English language teachers in terms of creative drama use in education. Univers. J. Educ. Res. 5(8), 1378–1385 (2017) 8. Dillingham, W.B.: The productive tension of Hawthorne’s art by Claudia D. Johnson. South Atl. Rev. 47(4), 147–164 (2017) 9. Turatto, M., Benetti, S., Cappellaro, E., et al.: The properties of the peculiar Type Ia SN*1991bg. Analysis and discussion of two years of observations. Mon. Not. R. Astron. Soc. 283(1), 1–17 (2018) 10. Zhao, S., Zhan, X., Wang, Y., et al.: Large-scale study of clinical and biochemical characteristics of chinese patients diagnosed with Krabbe disease. Clin. Genet. 93(2), 712– 716 (2017)
Voltage Unbalance Factors of Doubly-Fed Wind Generator Based on Big Data Analysis Na Wang1(&) and Lei Wang2 1
Department of Transportation and Mechanical Engineering, Shenyang Urban Construction University, Shenyang 110167, Liaoning, China [email protected] 2 Yuanda New Energy Co. LTD, Shenyang 110000, Liaoning, China
Abstract. In view of the grid voltage unbalance, wind power generation system (PGS) in the variable speed gearbox, torque ripple of serious harm, unit monitoring data timeliness is strong, large amount of data, so in the process of analysis, also need a unified analysis was carried out on the wind field data, the effective analysis method based on big data is a necessity. In this paper, a dual current loop control strategy based on the separation of positive and negative sequence (PNS) components is proposed to suppress the electromagnetic torque ripple. Vector control is performed on the rotor-side converter, that is, the positive sequence component of the rotor current is controlled in the positive sequence rotating coordinate system (CS) to achieve independent regulation of active power. The model of doubly-fed wind PGS is modeled, and the characteristics of the system, such as instantaneous APRP (APRP), are analyzed. The experimental results show that the control strategy can effectively restrain the electromagnetic torque ripple, and it has a good guiding significance for wind farms to obtain good grid-connected power generation performance. Keywords: Doubly-fed wind generator Voltage imbalance Electromagnetic torque ripple Big data analysis Stator current
1 Introduction As the proportion of wind power generation in electric energy increases, the interaction between wind PGS and power grid cannot be ignored. When three-phase voltage imbalance caused by the failures of power grid, which can lead to highly unbalanced stator current, which make the stator winding produces heat imbalance, generator to produce torque ripple, can also cause transverse stator APRP oscillation occurs, if the wind turbine power relatively [1, 2] in the grid is enough big, the wind turbine lack this unbalanced voltage control ability will have to solve the problem from the grid. On the other hand, wind turbines are required to be able to withstand a certain degree of negative sequence current without unwinding the grid, and to be able to withstand an unbalanced voltage of up to 2% in the stable state and 4% in the transient negative sequence without unwinding the grid. At this point, the traditional control strategy can no longer meet the requirements of normal grid-connected operation of doubly-fed wind PGS under non-ideal power grid conditions, so it is necessary to seek a new © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 664–669, 2021. https://doi.org/10.1007/978-3-030-51431-0_95
Voltage Unbalance Factors of Doubly-Fed Wind Generator
665
control strategy and establish a new control model of doubly-fed wind PGS that is suitable for grid failure [3, 4]. At present, it is mainly aimed at balancing stator current and suppressing power pulsation, but the research on suppressing torque pulsation is relatively few. This paper mainly study the doubly-fed wind PGS in unbalanced power grid voltage amplitude under the condition of parallel operation and stability control, from the internal mechanism analyzed unbalanced power grid voltage electromagnetic torque of doublyfed wind PGS, put forward a new control strategy, to suppress the electromagnetic torque ripple as the goal, in order to ensure the safe and stable operation of wind PGS at the same time, for the operation of the fan in the actual wind field has a certain reference value [5].
2 Method 2.1
Predictive Control of Doubly-Fed Wind PGS Model Under Unbalanced Grid Voltage
(1) Modeling and analysis of off-machine side and network side of unbalanced power grid voltage The power on the machine side and the electromagnetic torque, the power on the network side and the voltage on the dc side will generate twice frequency oscillation. When the asymmetry degree is large, the oscillation of doubly-fed unit will be intensified, which will lead to unit unnetting. Therefore, under unbalanced network voltage, corresponding control strategies should be adopted to reduce the harm caused by imbalance [6]. Based on the mathematical model of doubly-fed wind generator under balanced grid, this section further analyzes the mathematical model of grid side and engine side of doubly-fed wind generator system under unbalanced grid, as well as the instantaneous power and electromagnetic torque.
Fig. 1. Dual synchronous coordinate system and static coordinate system (CS)
666
N. Wang and L. Wang
For the convenience of subsequent analysis, an unweighted F is introduced and its vector relationship is given in the two-phase stationary CS (coordinates), two-phase synchronous rotating positive sequence CS (dq+) and negative sequence CS (dq.). The corresponding relationship of the coordinate axes is shown in Fig. 1. þ j-1 t þ /0 þ þ Fdq eðj-1 t þ /0 Þ Fab_ ¼ Fab þ þ Fab ¼ Fdq þe
ð1Þ
Where, Fab represents the expression of the vector in the static CS, Fab þ and Fab þ respectively represent the expression of the PNS vector in the static CS, Fdq þ and Fdq respectively represent the expression of the PNS vector in the PNS synchronous rotating CS, /0 þ represents the initial phase of the positive sequence vector, and /0 represents the initial phase of the negative sequence vector. To simplify the analysis, the initial phase of the positive and negative order is denoted as 0. It should be noted that the commercial doubly-fed wind PGS is connected to the grid by three phases and three wires, and there is no zero sequence component in the case of unbalanced network voltage. Therefore, zero sequence components are not considered in the analysis of the reference vector F.
3 Experiment In order to ensure the safe and stable operation of the wind turbine under the condition of unbalanced grid voltage, and to transmit smooth and stable active power to the grid, these fluctuations must be eliminated. In this paper, electromagnetic torque pulsation suppression is taken as the target to control the rotor side excitation power supply. According to the above theoretical analysis, electromagnetic torque pulsation and reactive power pulsation can be effectively suppressed. To further verify the effectiveness of the feature extraction method in engineering practice, this study takes a large number of wind field data as an example for analysis. After the basic de-noising of the data, sample features were extracted based on Spark, and finally SVM was input for classification, and the accuracy of sample classification was recorded.
4 Analysis and Discussion 4.1
Parameters of Doubly-Fed Wind PGS
Table 1 shows the detailed parameters of the 15 kw doubly-fed wind power system.
Voltage Unbalance Factors of Doubly-Fed Wind Generator
667
Table 1. 15Kw doubly-fed wind power system parameters The parameter name The grid voltage Rated power Rated speed
The parameter value 380 V
The parameter name
15 Kw 1460 rpm
Rated frequency A logarithmic
50 Hz
Stator leakage inductance of the The leakage inductance of the rotor Dc bus voltage
Stator resistance Rotor resistance
0.7 X
3
Constant rotor mutual inductance
The grid-side converter filters the inductance Dc busbar capacitance
The parameter value 01089H 0.0021H 0.0041H 650 V 5mH 20000uF
0.59 X
In the simulation, the range of the disk-phase voltage is set as 1.2 times of the voltage of phase b and phase c, and the asymmetry of the grid voltage is about 6%. Motor speed is set as 900 rpm, and slip is 0.1. In order to verify the effectiveness of the above instructions, two sets of simulations are performed. 4.2
Experimental Analysis of Grid-Connected Power Generation of Traditional Vector Control Strategy System
Figure 2 for the doubly-fed generator under the condition of power grid voltage unbalance runtime grid current experimental waveforms, due to unbalanced power grid voltage reactive power produced twice frequency pulsation, doubly-fed generator system can’t run in the unit power factor, so the grid voltage and grid current will produce a certain phase difference, at the same time, a larger voltage imbalance will lead to serious distortion of grid current. According to the experimental waveform, under the condition of unbalanced power grid voltage, the stator current has serious distortion and rich harmonic content, which does not meet the requirements of the IEEEPl547 grid connection criterion. After that, the experimental waveforms of the electromagnetic torque, APRP of the generator (represented by the voltage value of each quantity in the figure) show that when the grid voltage is unbalanced, all three of them are shown as twice frequency pulsation. In addition, during the experiment, the larger the voltage imbalance, the larger the pulsation. The negative sequence current loop is aimed at suppressing the electromagnetic torque pulsation. Since the matrix coefficients of the electromagnetic torque pulsation and the reactive power pulsation are consistent, the control strategy can simultaneously suppress the reactive power pulsation. Under the synchronous speed of the stator active power from the side of the rotor and the sum of the fan mechanical power of the converter, although the electromagnetic torque ripple, but was unable to suppress the
668
N. Wang and L. Wang
rotor side converter provides power pulse, as a result, due to the limitations of control variable and control target, under the condition of the same control could not inhibit pulsation of the active power at the same time. Known from the figure for the doubly-fed generator in power grid voltage unbalance condition, when the proposed control strategy is adopted in experiment, the rotor voltage and current waveform, make the rotor excitation current of the torque ripple of negative sequence current obviously suppressed, thus, the rotor current waveform than the electromagnetic torque ripple obviously improved.
Fig. 2. Grid-connected current experimental waveform
5 Conclusion This paper studies the grid-connected operation of doubly-fed wind PGS under the condition of unbalanced power grid voltage.In the realization of active power, reactive power regulation and independent under the premise of maximum power tracking, suppress the electromagnetic torque ripple and reactive power pulse, based on the traditional control and double current loop control waveform of simulation and experiment comparison analysis shows that this control scheme can realize effective electromagnetic torque ripple suppression, so as to ensure the security of system change gear box and the stability of the system itself, to the actual wind farms eccn voltage unbalance situations of doubly-fed wind power for good grid power operation has certain guiding significance. Acknowledgements. This work was supported by Scientific research fund of education department of liaoning province (LJKX201906).
Voltage Unbalance Factors of Doubly-Fed Wind Generator
669
References 1. Qin, B., Sun, H., Ma, J.: Robust H∞ control of doubly fed wind generator via statedependent riccati equation technique. IEEE Trans. Power Syst. 34, 99 (2018) 2. Ouyang, J., Tang, T., Zheng, D.: Characteristics and calculation method of short-circuit current of doubly fed wind generator under lower voltage ride through. Trans. China Electrotech. Soc. 32(22), 216–224 (2017) 3. Yang, B., Zhang, X., Yu, T.: Grouped grey wolf optimizer for maximum power point tracking of doubly-fed induction generator based wind turbine. Energy Convers. & Manag. 133, 427–443 (2016) 4. Mousa, M.G., Allam, S.M., Rashad, E.M.: Maximum power extraction under different vector-control schemes and grid-synchronization strategy of a wind-driven brushless doublyfed reluctance generator. ISA Trans. 72, 287 (2018) 5. Pradhan, C., Bhende, C.N.: Enhancement in primary frequency regulation of wind generator using fuzzy-based control. Electr. Power Compon. & Syst. 44(15), 1–14 (2016) 6. Laina, R., Lamzouri, F.E.Z., Boufounas, E.M.: Intelligent control of a DFIG wind turbine using a PSO evolutionary algorithm. Procedia Comput. Sci. 127, 471–480 (2018) 7. Lo’ai, A.T., Mehmood, R., Benkhelifa, E.:. Mobile cloud computing model and big data analysis for healthcare applications. IEEE Access 4, 99:1–1 (2016) 8. Tang, B., Chen, Z., Hefferman, G.: Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Trans. Ind. Inform. 13(5), 2140–2150 (2017) 9. Chen, B.Y., Yuan, H., Li, Q.: Spatiotemporal data model for network time geographic analysis in the era of big data. Int. J. Geogr. Inf. Sci. 30(6), 1041–1071 (2016) 10. Hussaina, A., Cambriab, E.: Semi-supervised learning for big social data analysis. Neurocomputing 275 (2017)
Cultural and Creative Design Service of Faw Red Flag Car Based on Big Data Analysis Is Integrated with Automobile Industry Jingyi Chen(&) Jilin Engineering Normal University, Changchun, Jilin Province, People’s Republic of China [email protected]
Abstract. The mechanical speed of industrialization accelerating gave rise to the cultural creative design services and the fusion of traditional industries, since 2014, when prime minister li keqiang, promoting cultural creativity and design services and related industrial convergence development since this concept, the industry development of our country began to highlight the concept of culture creative services, the current this concept has gradually penetrated into all fields, most evident in the auto industry. This paper is to solve various problems in the fusion process and promote the deep integration of faw hongqi car cultural creative design service and automobile industry. This paper takes the development of faw hongqi sedan as a typical example, and analyzes the feasibility of integrating cultural creativity and design services with the automotive industry with the help of fusion algorithm. Finally, the main strategies to promote the deep integration of the two are obtained. The experimental results show that the integration of cultural and creative design services and automobile industry is conducive to promoting the transformation and upgrading of the automobile industry and realizing the sustainable development of the industry. Keywords: Big data analysis industry
Cultural creativity Design services Car
1 Introduction The traditional industrial development cannot meet the requirements of the current society, and some problems begin to appear in the industrial development [1]. In this case, the state has put forward several opinions on promoting the integrated development of cultural creativity and design services and related industries. In recent years, with the increasing efforts of the state, cultural creativity design services have gradually penetrated into various industries, and the degree of integration with different industries has been deepening. Cultural creative design services emphasize the role of knowledge, with the characteristics of low energy consumption, low pollution, can produce higher value-added benefits. It is of great significance to promote the integration of cultural and creative design services and other industries [2, 3]. It is not only beneficial to realize the transformation and development of the real economy, but also to get rid of the current situation of insufficient impetus for the development of the real economy. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 670–676, 2021. https://doi.org/10.1007/978-3-030-51431-0_96
Cultural and Creative Design Service of Faw Red Flag Car
671
Moreover, it can promote the upgrading and promote the implementation of the new-driven development strategy. Thus, the continuous development of national economy can be promoted and people’s living standards can be further improved [4, 5]. At present, cultural and creative design services have gradually infiltrated into the automobile industry, among which faw hongqi sedan is a typical representative of the fusion of the two [6]. However, we must be aware that there are many problems in the current integration of cultural and creative design services and automobile industry, such as the low degree of integration and the weak connection between the integration links [7, 8]. These problems restrict the deep integration of cultural and creative design services and automobile industry, which is not conducive to the rapid upgrading of the automobile industry. Since the state proposed the idea of integrated development, domestic and foreign scholars have paid much attention to this concept and conducted a series of studies on the mutual integration of the two [9, 10]. Its research mainly focuses on the current situation of regional industrial integration, the current situation of industrial integration and the integration of the whole real economy, with few studies specific to a certain industry [11]. From this point of view, the research still exists a certain degree of theoretical gaps. In order to improve the research theory on the integration of cultural and creative design service and automobile industry, this paper takes faw hongqi sedan as a typical model, and makes an in-depth study on the integration of cultural and creative design service and automobile industry with the help of fusion algorithm [12, 13]. This paper firstly summarizes big data analysis and cultural creativity and service design, and analyzes the feasibility of cultural creativity and design service and automobile industry integration with the help of fusion algorithm [14, 15]. Finally, the main strategies to promote the deep integration of the two are obtained. On the one hand, it promotes the integration of automobile industry, cultural creativity and service design represented by faw hongqi sedan.
2 Method 2.1
Overview of Big Data Analysis and Cultural and Creative Service Design
The main features of big-data analysis include the aspects: diverse data types, large and complicated data Numbers, and efficient data processing, etc. Big-data analysis can carry out rapid calculation and processing of massive and complex data, and realize accurate prediction of the future development trend of things. At present, Big-data analysis technology has been gradually used to various fields, and has been gradually infiltrated into cultural creative design services and automobile industry integration research. It is based on massive data, and data collection is carried out mainly by means of information technology. The final analysis results have a positive relationship with data quantity. That is, the more data are collected, the more accurate the analysis results will be.
672
J. Chen
The integration of cultural creativity and service design with related industries was proposed by premier li keqiang in 2014. Cultural creativity and service design are the main carriers of innovation and belong to the concept of cultural industry. Cultural creative design services emphasize the role of knowledge, with the characteristics of low energy consumption, low pollution, can produce higher value-added benefits. It covers a wide range of cultural software services, professional design services, advertising services and other aspects, is an important driving force to promote industrial adjustment and upgrading. 2.2
Fusion Algorithm
Fusion algorithm is one of the commonly used algorithms in big data analysis, which can achieve the fusion calculation of massive data, reduce the difficulty of calculation, and maximize the speed of operation. In this algorithm, the key is the calculation of fusion factor, which is related to the accuracy of the final result. The larger the value of fusion factor lambda, the more network data nodes participating in the fusion, the more data received by the network, and the more accurate the final fusion result. On the contrary, if the network receives less data, it means that the accuracy of the fusion results needs to be improved. In the process of data fusion, data loss will occur. The specific calculation formula of data loss rate is as follows: k¼
1 n2 n1
ð1Þ
Where, k represents the data loss rate, and n1 represents the number of data output. N2 represents the amount of data actually received by the network node. In data transmission, the data loss rate is inversely proportional to the accuracy of the calculation results. It is necessary to calculate the accuracy result expectation. q¼
n m
k ð1 kÞ 1
ð2Þ
Where, q represents the expected value of accurate results in big data analysis, lambda represents the fusion factor, k represents the data loss rate, and n and m represent the actual data received and the data received by the network under the ideal state.
3 Feasibility Analysis Experiment on the Integration of Faw Hongqi Car Cultural Creative Design Service and Automobile Industry In order to better promote the development of automobile industry and achieve the deep integration between creative design service and automobile industry, it is necessary to analyze and experiment the feasibility of the integration of the two. On the basis of existing scholars’ research theories, this paper takes faw hongqi sedan as the main research example, takes big data analysis as the main technical means, and takes
Cultural and Creative Design Service of Faw Red Flag Car
673
fusion algorithm as the main experimental algorithm to carry out feasibility analysis experiments. First of all, by referring to relevant materials, the research of other researchers on the integration of cultural and creative design services and automobile industry was sorted out and taken as an important reference for the experimental results. Secondly, the industrial data of faw hongqi automobile in recent years should be sorted out. The data must be comprehensive, involving the whole process of automobile design, production and sales. At the same time, the data should include two different types before and after fusion to facilitate data comparison. Finally, It is used to classify and process the above series of data with the help of fusion algorithm to obtain the final data and obtain the feasibility data through data analysis.
4 Discuss 4.1
Analysis of Experimental Results
Through the feasibility analysis experiment, we come to the conclusion that the integration of faw hongqi car cultural creative design service and automobile industry is highly feasible. The integration of the current automobile industry has not yet achieved Table 1. Development comparison of faw hongqi sedan under different circumstances Number of sales Development index Prospect forecast Traditional development 10.21% 5.27% Reverse Development of fusion 36.59% 29.58% Positive Feasibility index 92.54% a Data came from the in-depth analysis of financial data in the experiment
70.00% 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% 0.00%
64.21%
57.34% 35.79%
34.57%
Development Speed Real Effect
Development Effect Ideal Effect
Fig. 1. The development of automobile industry
674
J. Chen
the desired effect. The specific data are shown in Table 1 and Fig. 1 below. The data in the chart are the experimental results of the author. From Table 1 data, it can be found that the development speed and sales status of traditional automobile industry are far lower than the development status after the integration of cultural and creative design services and automobile industry, and the development prospect is not as good as the development prospect of integrated industry. The development of traditional single automobile industry is bound to be eliminated. These data show that faw red flag car cultural creative design services and the integration of the automotive industry has a high feasibility, to promote the development of the automotive industry. However, it can be seen from Fig. 1 that the current integration of cultural and creative design services and automobile industry has not yet achieved the desired effect, and greater efforts should be made to realize the deep integration. 4.2
Strategies for the Integration of Cultural and Creative Design Services and Automobile Industry
(1) All links of the automotive industry chain are permeated with high-end design creativity The automobile industry needs independent innovation. To some extent, cultural creativity and design services always exist in the automobile industry, but this does not mean that the two have achieved integration. On the one hand, independent innovation of automobile needs a long development process; On the other hand, the automobile industry chain also includes many links such as manufacturing, publicity and sales, which are important components of the development of the automobile industry. However, cultural creativity and design services have not penetrated into every link, and innovative thinking lacks the coherence of links, so there is still much room for improvement. Based on this, in order to achieve creative design services and automobile industry, high-end design and creative services must be introduced. We should not only promote the transformation of service design but also attach importance to the design research of automobile industry. In addition, cultural creativity and service design should be infiltrated into the whole process of the automobile industry to realize the all-round transformation of the development of the automobile industry. (1) Cultivating talents needed for integrated development Talent is the fundamental factor to realize the integration of cultural and creative design service and automobile industry, and always occupies the core position in the industrial reform and development. In the current integration of the auto industry, there is an uncoordinated situation between talents and development. The existing talents lack the spirit of innovation and fall far behind the needs of industrial integration. In order to solve the problem of lack of innovative talents in the process of industrial integration, it is necessary to change the original concept and the way of talent training. In the talent training will be vocational colleges and universities training together, to achieve the
Cultural and Creative Design Service of Faw Red Flag Car
675
complementary advantages between the two, strengthen the school education and enterprise practice support you. At the same time, for the talents with innovative spirit, employers and relevant departments should formulate relevant encouragement policies, and vigorously implement the talent introduction strategy, continue to introduce innovative talents.
5 Conclusion Automobile industry is an important support for China’s industrial development and plays an important role in China’s national economy. With the continuous development of the global economy, China’s automobile industry is facing a huge impact. In order to be in a favorable position in the fierce competition, we must strive to realize the integration of cultural creativity and design services with the automobile industry, promote the innovative development of the automobile industry, and constantly promote the optimization and upgrading of the automobile industry. However, due to the late start of the integration of design creativity and automobile industry in China, there are still some problems in the current industrial integration, which need to be solved urgently.
References 1. Chiou, S.C., Wang, Y.C.: The example application of genetic algorithm for the framework of cultural and creative brand design in Tamsui Historical Museum. Soft. Comput. 22(3), 1–19 (2017) 2. Lu, W.M., Kweh, Q.L., He, D.: Performance analysis of the cultural and creative industry: a network-based approach. Naval Res. Logistics 64(2), 331 (2018) 3. He, S.: The creative spatio-temporal fix: creative and cultural industries development in Shanghai, China. Geoforum 12(9), 117–123 (2017) 4. Jenny, S., Klara, T., Rindzeviciute, E.: Policy change as institutional work: introducing cultural and creative industries into cultural policy. Qual. Res. Organ. Manag. Int. J. 12(2), 54–67 (2017) 5. Luo, S.-J., Dong. Y.-N.: Classifying cultural artifacts knowledge for creative design. Zhejiang Daxue Xuebao (Gongxue Ban) J. Zhejiang Univ. Eng. Sci. Ed. 51(1), 113–123 (2017) 6. Jin, Y.-L., Pan, W.-J., Lü, J.: Study on cultural and creative product design method based on extension semantics analysis. Chin. J. Eng. Des. 18(5), 132–137 (2017) 7. Huang, G., Xiao, L.: Study on the trends and innovation path of intellectual property policies in regional cultural and creative industries. J. Intell. 18(3), 342–346 (2018) 8. Luyi, P.: Experiences and enlightenment on training talents for cultural and creative industry of American Universities. J. High. Educ. 17(13), 141 (2017) 9. Gundolf, K., Jaouen, A., Gast, J.: Motives for strategic alliances in cultural and creative industries. Creativity Innov. Manag. 32(3), 1–13 (2017) 10. Liu, J., Zhan, S.: School of management. influencing factors of the intellectual property creation capacity in cultural and creative enterprises—an empirical study on 126 listed enterprises. R&D Manag. 54(21), 179–183 (2017)
676
J. Chen
11. Purificato, E., Rinaldi, A.M.: Multimedia and geographic data integration for cultural heritage information retrieval. Multimedia Tools Appl. 77(20), 27447–27469 (2018) 12. Monastyrev, P., Mischenko, E., Kuznetsova, N.: Problems of integration of cultural heritage objects with architectural and historical environment of the city. IOP Conf. Ser. Mater. Sci. Eng. 463(5), 204–207 (2018) 13. Ye, S., Han, Y., Zou, J.: The micro measurement of total factor productivity of China’s automobile industry. South China J. Econ. 5(16), 123–127 (2014) 14. Marfels, C.: Relevant market and concentration: the case of the U.S. automobile industry. Jahrbücher Für Nationalökonomie Und Statistik 187(3), 209–217 (2017) 15. Murry, C.: Advertising in vertical relationships: an equilibrium model of the automobile industry. SSRN Electron. J. 32(41), 561–565 (2017)
The C-E Translation of Passive Structure in Tourist Texts Based on Corpus Technology Dan Shen(&) and Huifang Liu Tianhe College of Guangdong Polytechnic Normal University, 3rd Road Xintai, Baiyun District, Guangzhou 510540, Guangdong, China [email protected], [email protected]
Abstract. The translation of passive structures in Chinese tourist texts into English demonstrates various differences because both of the languages belong to different linguistic families. Based on the Parallel Corpus of GuangdongHong Kong-Macao Greater Bay Area Tourism English Translation and Corpus of Contemporary American English (COCA), this thesis explores to reveal characteristics of the translation of passive structures in tourist texts from Chinese to English by analyzing differences between the English versions and English source language from semantic prosody, agent and tense with the software AntConc. Keywords: Tourist texts
Corpus Passive structure Semantic prosody
1 Introduction The translation of tourist texts is an important measure to promote the development of region tourism, and the translation quality will directly influence the international visitors’ perception of China’s attractions. Recent years have witnessed a spurt of progress in computer technology and corpus linguistics, and also ways of analyzing the characteristics of translated texts and translation skills by taking advantage of corpus have been favored by some scholars. The famous translation theorist Mona Baker said the most important task that awaits the application of corpus techniques in translation studies, it seems to me, is the elucidation of the nature of translated text as a mediated communication [1]. In this way, corpora used in this paper were collected from some major tourist attraction materials in Guangdong-Hong Kong-Macao Greater Bay Area (hereinafter called GBA-C), whose storage capacity is up to 741,371 words, covering 496,650 characters in Chinese and 214,721 words in English so far. Likewise, the comparable corpus in this paper consists of Contemporary American English (hereinafter-called COCA) and GBA-C. They not only provides plentiful authentic tourist corpora for teachers, but also guides students to observe and conclude the usage of language phenomena, which is in line with the “Data-Driven Learning” proposed by Tim Johns and King in the early 1990s [2]. On this basis, the translation features of passive structures in tourist texts will be analyzed and the concrete translation operation of Chinese passive structure will be revealed by comparing corresponding English versions in GBA-C and English source language in COCA with the tool of AntConc. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 677–682, 2021. https://doi.org/10.1007/978-3-030-51431-0_97
678
D. Shen and H. Liu
2 Translation Characteristics of Chinese-English Passive Structures in GBA-C The parallel corpus, also known as the corresponding corpus, is a bilingual or multilingual corpus composed of the original text and its corresponding translated texts. Its alignment ways contain levels of words, sentences, and paragraphs as well as discourse. With the help of GBA-C, translators can be easier to reveal the translation features of Chinese-English passive structures. After analyzing the corpus, it’s demonstrated that marked passive structures, unmarked passive structures and Chinese non-subject sentences are often translated into passive sentences in GBA-C. 2.1
The Translation of Marked Passive Structures
The GBA-C parallel corpus is retrieved with the marked passive structure words as the search term through AntConc. The corpora in the GBA-C have all been processed in Chinese word segmentation and marked with part of speech. It can be clearly seen from the result that among all 1809 Chinese tagged passive structure words, “Wei” “Bei” appear most frequently, accounting for 53% and 23% respectively. By contrast, the proportions of “Jiao” and “Gei” are at the least level, accounting for 1.5% and 3.1% respectively. Using the File View function in AntConc, the author can observe the above-mentioned tagged passive structure words. At the same time, it can be found that the sentences containing explicit verbs are translated into passive structures after searching the translated English of these passive structural words in GBA-C. And this kind of explicit structure “object+Bei(Jiao/Rang/Gei/Wei)+verb” or inserted agent before the verb usually can be corresponded to the form of “be +past- participle +by”, in which “Bei/Jiao/Rang/Gei/Wei” are expressed in Chinese Pinyin. The translation of two Chinese sentences is very typical as following “Generally, Chinese food can be roughly divided into eight regional cuisines, which has been widely accepted around” and “Qing’ao Bay is praised as ‘Oriental Hawaii’ by tourists at home and abroad”. 2.2
The Translation of Unmarked Passive Structures
The unmarked passive structures in Chinese usually can be found according to the four common cue words, including “You” “Zao” “Ai” and the topic-oriented phrase “Shi… De” (expressed by Chinese Pinyin). Via using these four words as search terms and inputting them into the AntConc, then all the sentences of unmarked passive structure in GBA-C are presented. The search data indicates that these three characters appeare 327 times, 78 times and 11 times respectively in the corpus. In addition, the passive sentence pattern of “Shi…De” appears 211 times in the corpus after excluding the pseudo-sentences that add adjectives in the middle. The result shows that all the sentences containing the four common cue words have been translated into passive sentences after checking the English version. Moreover, the author can observe the distribution of English version of Chinese unmarked passive structures in each scenic corpus by choosing the index positioning Concordance Plot. To sum up, there are a large number of unmarked passive structures in Chinese. And translators also tend to
The C-E Translation of Passive Structure in Tourist Texts Based on Corpus Technology
679
translate them into passive voice such as the sentence “The streets are full of flowers, and the old buildings are covered in pink and beige”, in which the original Chinese phrase contains passive meaning with the active form, but it is translated into passive structure “are covered” in English version. Cause the word “be” in English is used in both static and dynamic context, while the passives sentence in Chinese appear in the latter [3]. It can be seen that there are numerous sentences that can express passive meaning with active form in Chinese while the their passive meaning can be very clearly found in English, which means there are more implicit passive structures in Chinese than in English. 2.3
Non-Subject Sentence Translation
After retrieving all the translated English passive structures in GBA-C, some pseudopassive structures like “he was interested in drawing” can be observed by pulling the scroll bar on the interface, then these pseudo-passive sentences will be excluded and all the original English versions of passive sentences will be selected. According to the result, there are 3,944 translated English passive sentences. Further observations show that the passive voice with the personal pronoun “it” as the subject accounts for the largest proportion and its frequency reaches 1,082 times. It reveals that the Chinese non-subject sentences are often translated into passive structures by retrieving its Chinese version through the parallel corpus. Furthermore, the search shows that some sentences expressing warm reminders or warning are usually translated into passive structures when the translator handles the public signs in tourist attractions. Two examples selected from corpus are presented like “It is not allowed to climb over the Nanling tower” and “No food or drink is allowed in the exhibition area”. From the above retrieval results, it is concluded that for the introduction of tourist attractions, the sentences are often translated into a passive structure when it is not necessary or difficult to specify the action agent.
3 Comparative Analysis on English Versions of Passive Structures in GBA-C and Native Expressions in COCA A comparable corpus or an analog corpus, refers to two or more corpora consisting of different variants of the same language or texts of different languages [4]. Based on the application of the comparable corpus and after analyzing the characteristics of two corpora, it is found that there are some differences between English versions and English source language in the matter of semantic prosody, agent and tense. 3.1
Semantic Prosody
Semantic prosody is a collocation phenomenon, which is the result of some semantics produced by certain words coexisting with language units with certain semantic features [5]. Stubbs, the corpus linguist, divides the semantic prosody into three categories that include positive, negative and neutral semantic prosody [6]. The positive semantic prosody means a pleasant and affirmative semantic atmosphere in the whole context,
680
D. Shen and H. Liu
which makes people feel very comfortable. In contrast, the negative semantic prosody presents a gloomy and disharmonious semantic atmosphere, which then makes the entire context fill with a strong discouraging atmosphere. The neutral semantic prosody, is also known as the intricate semantic prosody and can be used to express the positive and negative meanings. Wangli, a Chinese linguist, also had once pointed out that the passive mark in Chinese basically means “unfortunate or unpleasant things” [7]. In order to explore the features of passive structures in tourist texts, the paper concludes from the retrieval result that the negative semantic prosody accounts for 12.1%, the neural semantic prosody occupies 40.9% and the positive semantic prosody reaches 47% in the GBAC. In comparison, the negative semantic prosody in COCA takes up 14%. What’s more, the neutral and positive semantic prosody account for 50.6% and 35.4% respectively. It is not difficult to find that the proportions of the respective semantic prosody are quite equal in GBA-C and COCA. Moreover, the positive semantic prosody in GBA-C accounts for a larger proportion than in the COCA while the neutral semantic prosody in GBA-C is less than the latter. It shows that translators tend to use the neutral or positive semantic prosody when dealing with the translation of passive structures in tourist texts. The benefit is that it can not only show the beauty of tourist attractions, but also conform to the expression habits of English-speaking countries. 3.2
Difference of Agent
In Chinese, the passive sentence can be divided into long or short passive sentence according to the passive mark. However, the agent is followed by “by phrase” of “be/get+past participle” in English. Generally, the passive structure in Chinese often carries on the agent, while in English, the passive voice is often omitted. After retrieving all the passive sentences in GBA-C and excluding all the pseudopassive sentences, 3,944 passive sentences are retrieved. Among them, there are 2977 passive sentences with agent, which account for nearly 76%. By contrast, there are 32,578 passive sentences that include 9,625 passive sentences with agent in COCA, accounting for 29.5%. It can be seen from the data comparison that passive sentences in English translation are more inclined to have agents, while they are often omitted in English source language. Hu Kaibao holds that the source language is the provider of information. Therefore, in the power relationship between the source language and the target language, the source language is in the advantageous position [8]. And the faithfulness to the original text is the first principle that the translator should follow. Other scholars, such as McEnery & Xiao, believe that the effect of source language on translation is very obvious and the characteristics of translation language are different from those of target language [9]. It shows that the semantic, pragmatism and sentence patterns of translated texts are all affected by the Chinese source language in the C-E translation processing of passive sentences in tourist texts. This feature is in conformity with the rule of Source Language Shining Through [10]. Furthermore, translators are also more likely to apply the characteristics of source language to translation, which means the agent is often omitted.
The C-E Translation of Passive Structure in Tourist Texts Based on Corpus Technology
3.3
681
Difference of Tense
Verbs in Chinese do not have any changes in “time” and “form”, while in English have many forms and tenses. In the same way, a total of 32,578 passive sentences that contain the “be” and its different forms are retrieved in COCA. Comparing the retrieval statistics of the two corpora, it can be summarized that the most commonly used forms of passive voice in the GBA-C and COCA are present passive voice and past passive voice. A further comparison found that the perfect tense of passive voice in tourist texts accounts for 6.4% in GBA-C, while it just takes up 3.93% in COCA. It can be seen that translators are more likely to use the perfect passive voice than other counterparts from target language countries when they are dealing with the translation of passive structures in tourist texts. That is because the present perfect passive voice emphasizes on the continuance and repetition of verbs as well as the effects of status quo, which is more suitable for the nature of tourist texts. From the example “Baiyun Mountain Scenic Area has been deeply loved by tourists from home and abroad”, it can be easily seen that translators use the present perfect passive voice not just to convey the information that the Baiyun Mountain Scenic Area is loved by tourists at home and aboard in the past, but it will be always loved by people. Therefore, tourists may be more easily attracted by the tourist texts via using the present perfect passive voice. By and large, in the analysis of the comparable corpus of tourist translation, the translated English passive sentences of neutral and positive semantic prosody account for a relatively high proportion.
4 Conclusion In this paper, the author tries to analyze translation characteristics of Chinese-English passive structures in tourist texts based on the corpus of GBA-C and COCA. To sum up, the English versions of tourist texts are more in line with the expression habits of the target language countries. In addition, the translated English passive sentences always follow agent, which is not fit with the features in English source language. To a certain extent, it is affected by the Source Language Shining Through. However, passive sentences in tourist texts have a variety of tenses, among which the present passive voice and past passive voice are particularly typical, and the use of perfect passive voice is more frequent than the English-speaking counties. Acknowledgements. This work is supported by the project “The Study on Language Shining Through Effect Based on the Tourist Translation Corpus” from “The 13th five-year plan for the development of philosophy and social science in Guangzhou”, NO.: 2019GZGJ218, and funded by National Innovation and Entrepreneurship Training Program for College Students in 2018 (No. 201812668008).
682
D. Shen and H. Liu
References 1. Baker, M.: Corpus linguistics and translation studies: implications and applications. In: Text and Technology: In honor of John Sinclair, pp. 233–250. John Benjamin’s, Amsterdam (1993) 2. Johns, T., King, P.: Classroom concordancing. Engl. Lang. Res. J. 4, 1–16 (1991) 3. Xiao, Zhonghua, Dai, Guangrong: Using corpora in language pedagogy: a case study of passive constructions in Chinese learner English. J. Zhejiang Univ. (Hum.Ities Soc. Sci.). 40 (4), 194 (2010) 4. Dai, G.: Source Language Shining Through in English-Chinese Translation, p. 25. Shanghai Jiaotong University Press, Shanghai (2013) 5. Zhang, Ying: A corpus-based study of semantic prosody in 20 Years. Foreign Lang. Research. 6, 23–28 (2012) 6. Stubbs, M.: Text and Corpus Analysis, p. 176. Blackwell, Oxford (1996) 7. Wang, L.: Chinese Modern Grammar, pp. 87–92. The Commercial Press, Beijing (1943) 8. Zhu, Y., Hu, K.: The semantic preferences and semantic prosody of bei passives: a corpusbased contrastive study. J. Foreign Lang. 37(1), 53–64 (2014) 9. McEnery, A., Xiao, R.: Parallel and comparable corpora: what is happening? In: Rogers, M., Anderman, G. (eds.) Incorporating Corpora. The Linguist and the Translator, pp. 18–31. Multilingual Matters Press, Clevedon (2007) 10. Teich, E.: Cross-Linguistic variation in system and text: a methodology for the investigation of translations and comparable texts. Lang. Contrast, John Benjamins Publishing Company, 5, 207 (2003)
The Influence of Chinese Traditional Culture in the Process of Teaching and Education Based on Big Data Analysis Jianqiang Li(&) Sichuan Vocational and Technical College, Suining, Sichuan, China [email protected]
Abstract. The purpose of this paper is to discusses the influence of Chinese traditional culture (TC) on teaching and education based on big data. First of all, the concept and basic characteristics of big data are comprehensively combed and analyzed, and the generation and significance of big data are described, with a basic understanding and understanding of big data. Secondly, it discusses the influence of Chinese TC in the process of teaching. Through the research on the current situation of the integration of the excellent TC into the moral education in primary schools in county a, we can grasp the current situation of the integration of the excellent TC into the moral education in primary schools, find out the existing problems, and analyze the reasons from the background of the times, the education system and the values. The experimental results show that primary school students are willing and able to apply the fine moral character of excellent TC to their life. As for the question “will you apply the virtue of learned excellent TC to their life?” 34% of primary school students say they often do, 39% of primary school students say they occasionally do, 19% of primary school students say they will decide according to the specific situation, and only 8% of students say they will not Apply to life. Keywords: Excellent traditional culture Big data analysis Chinese nation Moral education
1 Introduction In its five thousand years of development, the Chinese nation has created brilliant Chinese civilization and formed an excellent traditional Chinese culture with strong vitality [1–3]. Chinese excellent TC is the root of the Chinese people, and also an important part of realizing cultural self-confidence. However, with the arrival of the era of globalization, the challenges brought by foreign culture to the TC make the Chinese people start to reflect, reposition the TC, and constantly highlight the importance of TC and education [4–6]. Big data has a profound impact on the development of all walks of life and has a certain social significance [7]. The core of big data is prediction, which is also the source of new knowledge and value for human beings [8]. The combination of TC essence and moral education can contribute to improving the quality of talent training [9]. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 683–688, 2021. https://doi.org/10.1007/978-3-030-51431-0_98
684
J. Li
It is of great significance to the value orientation and patriotism of college students. Zhao Hong analyzes the problems encountered in the study of TC education in the ideological and political education of college students, and analyzes the problems encountered from the aspects of urgency, inheritance and positive significance. It aims to provide reference for the integration of TC and ideological and political education in Colleges and universities, and better integrate Chinese TC into Ideological and political education of college students [10]. The era of big data has come to many communities, from government, e-commerce to medical institutions. Xuemei Tian aims to assess the relevance of these trends in the current business environment through evidence-based documentation of current. They used bigml to study how two social information channels (that is, social information of opinion leaders based on friends) affect consumers’ purchase decisions on social business websites [11]. (1) Topic selection innovation. At present, the practice of analyze the education of Chinese TC in China is still in the exploration stage, and there are few related research results. Through the research of this paper, the combination of teaching and education with Chinese TC, big data further analyzes the influence of Chinese TC on teaching and education. (2) We should use philosophical thinking to treat Chinese TC and teaching. (3) Perspective innovation. This paper studies from big data, starting from the whole, and comprehensively discusses the education of Chinese TC. Combined with some representative cases of primary school, it analyzes the convenience of its application to primary school management, provides a variety of learning methods for primary school students, and improves primary school cultural education.
2 Proposed Method 2.1
Big Data Technology
The definition of big data must contain a collection of data, that is, the generation and accumulation of data. This is the basis for defining big data, and it is also a necessary factor. Secondly, the definition of big data must include the data management tools for storing and processing data sets, that is, data processing system. Because if there is no advanced data processing system, which can not process data set quickly and effectively, these data will become meaningless. Finally, the definition should be based on the combination of data collection and data processing system, and the combination of the two will produce a new or more significant effect. 2.2
The Influence of Chinese Traditional Culture in the Process of Teaching
(1) It is conducive to improving the cultural subjectivity of students Students are the backbone of the inheritance and innovation of TC and bear the important responsibility of cultural rejuvenation. Only by increasing the knowledge reserve of students’ TC and enriching students’ correct cognition of TC, can schools make them consciously accept and identify excellent TC psychologically, have full
The Influence of Chinese Traditional Culture
685
confidence. Through the education of Chinese excellent TC, students can truly understand and understand the role and contemporary value of TC, rationally treat the relationship between Chinese TC and foreign culture, and take the initiative to transform and innovate aspects of TC that do not conform to reality, so that TC can actively adapt to the development of modernization, thus reflecting cultural self-examination and cultural self-improvement. (2) It helps to improve the personality of students Adhere to the principle of people-oriented, carry out excellent TC education for students, cultivate their spirit of “self-improvement, moral integrity”, “value justice over profit”, “treat others with sincerity”, “build up their own talents”, cultivate their excellent qualities of “benevolence”, “fraternity”, etc., cultivate their good habit of “three times of self-examination”, strengthen their ideals and beliefs, and encourage them to work hard It’s an important role for us to push forward and promote them to become talents. This is the main goal of TC education for students under the guidance of human studies.
3 Experiments 3.1
Investigation Object and Scope
The survey scope of this study is six primary schools in a county, including urban and rural primary schools. Four primary schools are selected in the township area, namely C primary school, D primary school, e primary school and f primary school. In consideration of the limitations of literacy level and reading comprehension of the questionnaire from the first to the second grade, the subjects of the student questionnaire are randomly selected a class from the third to the sixth grade of each primary school, and the interview method is randomly selected from the first to the second grade. 3.2
Data Collection and Processing
The total number of teachers’ questionnaires was 144, and the number of effective questionnaires was 142, with the efficiency of 98.6%. The total number of students’ questionnaires is 400, the number of valid questionnaires is 382, and the efficiency is 95.5%. The students’ questionnaire and teachers’ questionnaire include multiple topics and single choice questions. Each option in multiple topics is assigned a score, and the scores of each option are counted and analyzed according to the scores.
4 Discussion 4.1
Traditional Cultural Knowledge of Primary School Students
As one of the main contents of the four books, the University, which is the representative of TC, is still considered by the students as not belonging to TC. Therefore, the basic knowledge of TC has not been taken as an example Common sense
686
J. Li
knowledge is familiar to most primary school students. In the survey of the question “which of the following festivals do you think has nothing to do with TC?” it was found that 69.1% of the students chose the right one, and 26.3% of the students chose the Double Ninth Festival which has nothing to do with TC, indicating that a small number of students do not know Chinese traditional festivals very well. In the “which of the following items do you think does not belong to the four treasures of study?” question survey, it was found that 84.4% of the students were able to give the correct answers, 9.1% of the students chose rice paper and 6.3% of the students chose inkstone, and a few of the students still chose the wrong answers as shown in Table 1. It can be seen from this that at the stage of basic education in county a, the popularization of TC is very deficient, students’ understanding of TC is limited to textbooks and daily life, the expansion of TC knowledge is not extensive enough, the understanding of TC is only superficial, and there is a lack of specific understanding of the concept of TC. Table 1. Students’ cognition of TC Which of the following works do you think has nothing to do with TC A Analects of B three Character C University (54.8%) D Tea house Confucius (2.4%) Classic (0%) (42.8%) Which of the following festivals do you think has nothing to do with traditional festivals A New year’s Day B Mid autumn C Chongyang D Spring (69.1%) Festival (1.2%) Festival (26.3%) festival (3.4%) Which of the following items do not belong to the four treasures of study A Brush (0%) B Rice paper (9.1%) C Inkstone a (6.3%) D Pen holder (84.8%)
4.2
Guarantee Mechanism of Traditional Culture Moral Education
According to the survey, as the investigated areas are counties and rural areas, the education level of some rural farmers is generally low. In the survey on the question “what is the highest education level of one of your parents?” it is found that 12% of them have parents’ education above high school, 42% of them have primary school education and 42% of them have junior high school education 32% and 14% had never received education. However, in daily life, primary school students are willing and able to apply the excellent TC and morality to their life. As for the question, “will you apply the virtue learned from the excellent TC to their life?” 34% of primary school students say they often do, 39% of primary school students say they occasionally do, 19% of primary school students say they will decide according to the specific situation, and only 8% of students say they don’t It can be applied to life as shown in Fig. 1. It can be seen that most primary school students intend to practice the traditional virtues of the Chinese nation and make use of them.
The Influence of Chinese Traditional Culture
19%
687
34%
8% 39%
Regular meetings
Occasionally
Can't
It just depends.
Fig. 1. Application of TC in daily life of primary school students
5 Conclusions This paper focuses on the integration of TC and moral education from theoretical depth. From the theoretical depth, we think about the theoretical basis and logical connotation of the integration of Chinese TC into moral education. According to the questionnaire survey of the status of the integration of excellent TC into primary school moral education, we collate the data, analyze the data, and draw scientific and accurate conclusions. On the basis of first-hand information, this paper analyzes the current situation of the integration of excellent TC into moral education.
References 1. Forrest, J., Lean, G., Dunn, K.: Attitudes of classroom teachers to cultural diversity and multicultural education in country New South Wales, Australia. Aust. J. Teach. Educ. 42(5), 17–34 (2017) 2. Chen, G., Ma, F., Jiang, Y.: Virtual reality interactive teaching for Chinese traditional Tibetan clothing. Art Des. Commun. High. Educ. 17(1), 51–59 (2018) 3. Zhang, X.-B., Lyu, D.-M., Huang, L.-Q.: Discussion on exploitation of foreign traditional Chinese medicine resources based on “the Belt and Road”. Zhongguo Zhong yao za zhi = Zhongguo zhongyao zazhi = Chin. J. Chin. Mater. Med. 43(7), 1501–1506 (2018) 4. Vinnakota, N., Sanikommu, S., Ahmed, Z.: Is accredited social health activists’ basic oral health knowledge appropriate in educating rural Indian population? Indian J. Dent. Res. 28 (5), 503 (2017) 5. Moffic, H.S., Kendrick, E.A., Reid, K., et al.: Cultural psychiatry education during psychiatric residency. J. Psychiatr. Educ. 12(2), 90–101 (2018) 6. Master, A., Meltzoff, A.N.: Building bridges between psychological science and education: cultural stereotypes, STEM, and equity. Prospects 46(11), 1–20 (2017) 7. Bell, E.R.: “This Isn’t Underground; This Is Highlands”: Mayan-language hip hop, cultural resilience, and youth education in Guatemala. J. Folklore Res. 54(3), 167 (2017)
688
J. Li
8. Utley-Smith, Q.E.: Meeting a growing need: an online approach to cultural competence education for health professionals. Nurs. Educ. Perspect. 38(3), 159–161 (2017) 9. McElfish, P.A., Moore, R., Buron, B.: Integrating interprofessional education and cultural competency training to address health disparities. Teach. Learn. Med. 30(4), 1–10 (2017) 10. Hong, Z.: Significance of Chinese traditional culture education in college ideological and political work. J. Huaihai Inst. Technol. 24(1), 41–46 (2017) 11. Tian, X., Liu, L.: Does big data mean big knowledge? Integration of big data analysis and conceptual model for social commerce research. Electron. Commer. Res. 17(1), 169–183 (2017)
The Problems and Countermeasures of University Financial-Management in the Era of Big-Data Xiaoyan Ma(&) Shandong University of Arts, Jinan Shandong 250014, China [email protected]
Abstract. With the rapid development of Internet, the arrival of big data era has a profound impact on the financial-management of colleges and universities (CAU). The financial-management of CAU has a big influence on their own development. At present, there are still some problems in the financialmanagement of CAU, which seriously affect the long-term and healthy development of CAU. First of all, this paper analyzes the meaning of university financial-management, and points out the problems existing in the financialmanagement mode of bank universities. Then it puts forward the financialmanagement method. Through the actual implementation of the program, the results show that the program proposed has been well received by most financial talents, and optimized the financial-management process, especially in the accuracy of budget management, data completeness, staff efficiency and other aspects have obvious advantages. Keywords: University financial-management problems and countermeasures
Big data era Existing
1 Introduction CAU have seen many opportunities and challenges. Like many enterprises, CAU need self-management in their daily operation, and their financial-management is one of the daily self-management tasks [1, 2]. China’s economic system is gradually established, and the education reform in CAU continues to deepen. The financial-management of CAU is particularly important. The level of financial-management will have a direct impact on the future development of CAU [3]. In [4], the author studies the reform of public financial-management to clarify the effect of IPSAS in Latin America. In [5], considering the unstable factors in the external environment, the author realizes the financial sustainability in the organization. Based on the European method, this paper analyzes the financial leverage index. These indicators are proved to be the most important for the capital structure management of Russian production companies when the financial resources become sufficient. In [6], the author points out that the global austerity environment of public finance management forces the government to take some changes, innovations and reform measures to prevent or reduce its impact. Higher education and cultural organizations are also © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 689–694, 2021. https://doi.org/10.1007/978-3-030-51431-0_99
690
X. Ma
affected. In management and control, the introduction of performance measurement is an important step, which can help solve financial defects and scandals. All of the above studies have made some achievements in financial-management, but it may be special in CAU. In the big-data, data is the only way to solve financial-management problems. BDT (BDT) has been used in many fields and achieved fruitful results. In [7], the author used big-data to the field of health care to provide support for disease prediction and clinical decision-making, with strong accuracy and timeliness. In [8], the author uses BDT in smart grid data analysis to help the grid improve operation efficiency. In [9], the author introduces the BDT in the vehicular network. This technology shows a important role in the intelligent transportation system and the automatic driving system, and ensures the information exchange between the terminal equipment and the public network. In [10], the author used big-data technology to smart home energy management system, so as to reduce costs and meet energy demand at the same time. In conclusion, the application of BDT in many fields has achieved good results, so it is considered to combine BDT in the financial-management process of CAU. Based on the analysis of the problems existing in the current financial-management of CAU, this paper proposes to rely on BDT to improve the financial-management level of CAU, in order to provide reference for the related financial-management work.
2 The Meaning of University Financial-Management in the Era of Big Data The financial-management of CAU is to carry out relevant financial work, such as information integration, accounting and so on, on the basis of the obtained information level, through computer, network connection, cloud computing and other technologies. In our country, the development of financial-management mode in CAU has gone through many stages. The earliest period was about 30 years after the founding. At that time, the financial-management of institutions of higher learning was unified by the central government. To a certain extent, this practice hinders the efforts of CAU in various provinces and cities, thus affecting the improvement of education level. The second stage is from 1980 to 1993 before the reform and opening up. The state gradually decentralized the power of financial-management institutions, and implemented macro-control, local responsibility and hierarchical management. According to the actual situation, local CAU can adjust the charges flexibly and improve the infrastructure. However, affected by the imbalance of regional development, the overall quality of education has not been fully improved and resources cannot be fully shared. The latest stage is from 1993 to now. With the continuous improvement of various systems, the ways of obtaining educational funds in CAU are also diversified. Guiding CAU to strengthen internal financial-management, improving the utilization rate of capital level and optimization of combination efficiency endow CAU with greater autonomy in financial-management, and also bring great challenges to the financialmanagement of CAU. The times are advancing, and the interior of CAU is changing. The financialmanagement can’t slow down the reform of CAU. The financial-management of CAU should not only meet the basic economic goals, but also rely on big data information to
The Problems and Countermeasures of University
691
improve efficiency, effectively deal with various financial risks, and ensure the stable and healthy development of CAU.
3 Problems in the Current Financial-Management Mode of CAU 3.1
Unreasonable Budget Management
In financial-management, budget management is very important. The daily activities of CAU cover a wide range, and all kinds of economic activities of CAU are affected by budget management. The rationality of the budget work will have an impact on the healthy development of the school’s daily activities. At this stage, the actual situation has not been taken into account when formulating the budget plan. According to the survey, quite a number of CAU still use the traditional way of base number and growth to control the budget. This way is not conducive to unified allocation, it is difficult to establish the incentive mechanism of budget management. In the end, it is likely to reduce the use rate of funds and even cause serious consequences for the stability of the school’s financial budget. 3.2
Certain Risks of Financial-Management Information
At present,in order to have certain convenience, it is basically networked. Moreover, many computers are still win7 systems, some even Win XP systems. These systems are not safe to maintain, and they are easy to be infected by viruses, which makes them very risky. The sharing of information resources on the network also has great danger. Once the operating system of the computer breaks down or the software breaks down, information will be lost. Especially in the case of hacker intrusion, such as the background database of financial system is damaged, financial information data is difficult to recover. Information security is the weakest and most easily neglected link in the financial-management of CAU. If there is no problem in this link, the system can work normally. Once there is a problem, the consequences will be unimaginable. 3.3
Failing to Give Full Play to the Advantages of Computer Related Technologies
Computer technology and Internet technology have become an important part of financial-management in CAU. Many high-tech technologies are produced from computer technology. But many CAU do not play the advantages of computer technology, which leads to the construction of financial information system is not very perfect, the system is not standardized, the update is not timely. Lack of intelligent financial-management. In terms of the massive financial data of the school, the data of each department is not connected, forming an information island. In the aspect of data collation, most of the time, we rely on human to manage, we can’t find the laws between the data.
692
X. Ma
4 University Financial-Management Method and Implementation Effect Based on BDT 4.1
University Financial-Management Method Based on BDT
(1) Strengthen the training of financial-management personnel Analyze the financial-management cases with good results, and find the hidden information to guide the training of financial-management personnel. To a certain extent, the professional quality of financial-personnel affects the development of the financial-management level of the school to a higher level. It can help practitioners deepen their understanding of financial-management information, and point out the shortcomings of existing cases. Through the innovation of professional training form, the professional quality of personnel can be greatly improved. (2) Improved information security The information security of financial-management is very important. In the whole financial-management system, the system should be updated in time. Regularly check the network virus and upgrade the network virus database on time. The financialmanagement information system should adopt the skills of information encryption and firewall to protect the Information of each platform of the financial-management information system. If conditions permit, cloud-computing technology is adopted to implement the cloud storage of data. Do a good job in data backup. (3) Building an intelligent financial-management system from the top to achieve onestop service To build an intelligent system, top-level design is crucial. First, the business logic should be clear. Standing on the commanding point of the dual objectives of the school and finance, carefully analyze various financial formats, remove unnecessary operation links, strengthen value-added operation links such as data collection, correction, processing, etc., and shorten the life cycle of economic business operations. Secondly, we will build a one-stop service platform for online approval, online reimbursement and cashless transactions to realize air business operations. Through big data to achieve business integration of all departments in the University, and do a good job of interface to access the data of relevant national departments. 4.2
Effect of Improved Financial-Management Method
Two universities with the same level of development were investigated for up to one year. University X follows the traditional financial-management mode, while university y introduces BDT. This paper makes a statistical analysis of the financial-personnel’s views on the financial-management modes of the two universities, and the results are shown in Fig. 1. From Fig. 1, it can be seen that among the financial staff of University X who follow the traditional financial-management mode, only 52.3% of them praise the existing mode. In University Y, the high praise rate is 89.27% after using the scheme.
The Problems and Countermeasures of University
693
Fig. 1. Financial personnel’s evaluation of financial-management mode in two universities
In addition, the budget accuracy, data completeness and personnel efficiency are compared, as shown in Table 1. Table 1. Comparison of financial work under different financial-management systems Budget accuracy Data Integrity Staff efficiency University X 81.2% 86.1% Low University Y 96.1% 97.4% High
It can be seen from Table 1 that the scheme proposed has obvious advantages in budget accuracy, data completeness and personnel efficiency. It shows that the scheme is effective.
5 Conclusion The financial-management level of CAU is different, there are many problems still need to be explored according to the actual situation of CAU, but CAU are also developing. CAU should try to adapt to the trend of the times, find out the deficiencies in time and improve them, so as to contribute to healthy development of the school.
References 1. Can, U., Alatas, B.: Big social network data and sustainable economic development. Sustainability 9(11), 2027 (2017)
694
X. Ma
2. Le, H.L., Vu, K.T., Du, N.K., Tran, M.D.: Impact of working capital management on financial performance: the case of Vietnam. Inter. J. Appl. Econ. Finance Account. 3(1), 15– 20 (2018) 3. Kim, Y.H., et al.: Financial management: an introduction. J. Finance 35(4), 1067 (2017) 4. Brusca, I., Gómez-villegas, M., Montesinos, V.: Public financial-management reforms: the role of IPSAS in Latin-America. Public Adm. Dev. 36(1), 51–64 (2016) 5. Ashmarina, S., Zotova, A., Smolina, E.: Implementation of financial sustainability in organizations through valuation of financial leverage effect in Russian practice of financialmanagement. Inter. J. Environ. Sci. Educ. 11(10), 3775–3782 (2016) 6. Caperchione, E., Brusca, I., Cohen, S., Rossi, F.M.: Innovations in public sector financialmanagement. Inter. J. Public Sect. Perform. Manage. 2(4), 303–309 (2016) 7. Lee, C.H., Yoon, H.J.: Medical big data: promise and challenges. Kidney Res. Clin. Pract. 36(1), 3 (2017) 8. Wang, K., Wang, Y., Hu, X., Sun, Y., Deng, D.J., Vinel, A., Zhang, Y.: Wireless big data computing in smart grid. IEEE Wirel. Commun. 24(2), 58–64 (2017) 9. Cheng, N., Lyu, F., Chen, J., Xu, W., Zhou, H., Zhang, S., Shen, X.S.: Big data driven vehicular networks. IEEE Netw. 32(6), 160–167 (2018) 10. Al-Ali, A.R., Zualkernan, I.A., Rashid, M., Gupta, R., Alikarar, M.: A smart home energy management system using IoT and big data analytics approach. IEEE Trans. Consum. Electron. 63(4), 426–434 (2017)
Construction of Churn Customer Analysis System for Telecom Companies Based on Big Data Li Wei and Hui Xie(&) College of Software and Communication Engineering, Xiangnan University, Chenzhou 423000, Hunan, China [email protected] Abstract. Under the increasingly fierce competition in the communication market, China’s communication enterprises also confront new barriers. The loss of customers has become an important problem hindering the development of communication enterprises. In order to solve the problem of customer churn is of great significance to the development of communication enterprises. Facing the problem, we should apply new technology to find out the reason and analyze the churn, build an impeccable analysis system and formulate corresponding countermeasures to effectively avoid customer churn. This paper studies the construction of the customer analysis system on the basis of big data to solve the problem of customer churn and accelerate the sustainable development of telecom enterprises. Keywords: Big data
Communication Customer churn Analysis system
1 Introduction With the development of the times, new technologies have also developed rapidly and domestic and international market competition has become growingly fierce. With the constant deepening of internationalization, new requirements have been put forward for the development of various enterprises. In order to make profit in the fierce market competition, communication firms need to conduct deep reforms. Not only must we continue to reform and innovate in terms of price, business, and services. In the situation of lossing customer resources, enterprises must also pay enough attention on it. The operation and services of enterprises must be guided by the customer’s consumer psychology and promote the awareness so that it can attract a large number of customer resources and prevent customer churn. With the constant development of the Internet, free online video has lead to a large number of telecommunications customers getting away from it. However, in the development of the communication business, the development cost of new customers is much higher than retaining lost customers. Therefore, it is very important for telecommunications companies to analyze the lost customers and take effective measures to hold lost customers.
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 695–701, 2021. https://doi.org/10.1007/978-3-030-51431-0_100
696
L. Wei and H. Xie
2 Overview of Telecom Customer Churn 2.1
Concept Analysis of Telecom Customer Churn
Customer churn has become an important issue hinder the development of telecom enterprises. In the communication industry, the concept of customer churn is that customers no longer buy or terminate the original services for some reason or the original customers terminate the contract with the enterprise to reduce the consumption of the enterprise or turn to other companies to purchase products or services [1]. For instance, telecom customers turn to mobile companies has changed service from 300 yuan to 150 yuan monthly. Characteristics and problems of telecommunication customer churn: on the one hand, the number of telecommunication customers is huge and the business is complex. Based on this feature is prone to make big mistakes in data mining when establishing a data model. On the other hand, the amount of customer data is large, complex, and wide. If you want to find out valuable customer data, you need to analyse from various angles. There is no doubt that it takes a lot of time. On the one hand, customer analysis needs to conduct from multiple aspects. Not only it needs consider the accuracy of loss prediction, but also analysis value and cost in the retention effort. On the other hand, when analyzing the lost customers [2] it also needs to undertake the risk of samples. 2.2
Analysis of the Problem of Telecommunications Customer Churn
For telecommunications companies, they should try to retain some valuable customers, so as to enhance their competitiveness. There are many process to solve the problem of telecommunications customer churn: predicting potential customers to churn, analyzing the reasons for churn, calculating the value of retained customers, formulating effective strategies to prevent customer churn, implementation and evaluation of solutions, as shown in the Fig. 1 is shown.
Fig. 1. The process of solving the problem of telecommunications customer churn
Construction of Churn Customer Analysis
697
The first stage is to predict the loss of customers. Telecom enterprises use big data technology to build customer data and feasible models to predict the types and lists of customers that might lost. The second stage is to analyze the reasons of customer churn [3]. It needs to judge according to the type and characteristics of customers or consumption behavior. The third stage is to calculate the value of retained customers. First, we need to find out the value of customers according to the classification of customer data to retain high-value customers. The fourth stage is to build effective strategies to solve customer churn. Different reasons for the loss of different customers, telecom enterprises subdivide them and take different retention measures. The last stage is the implementation and evaluation. After complete retention measures, enterprises should formulate detailed implementation plans and effectively summarize the success and failure cases [4].
3 Construction of Telecom Churn Customer Analysis System Based on Big Data 3.1
Architecture of Telecom Churn Customer Analysis System
From the perspective of telecommunications companies, in order to manage customers’ information and data rationally for effectively improve the performance of the
Fig. 2. Telecommunication churn customer analysis system architecture
698
L. Wei and H. Xie
enterprise, it is necessary to build a telecommunications churn customer analysis system [5], as shown in Fig. 2. This system is constructed based on big data technology, which can effectively guide enterprises to formulate appropriate customer retention strategies. 3.2
Methods and Processes of Telecommunication Churn Customer Analysis Based on Big Data
According to the actual situation of telecommunications companies and the structure of the telecommunications churn customer analysis system, this paper analyzes the methods and processes of telecommunications churn customer analysis based on big data, as shown in Fig. 3.
Fig. 3. Method and process of telecommunication churn customer analysis based on big data
The method and process of customer churn analysis based on big data is that the company analyzes customer information firstly, in other words called enterprise understanding and then builds a customer churn prediction model through data analysis, preparation and customer segmentation to determine the customer churn list and develop retention measures this process is of great significance for enterprises to prevent customer churn. Enterprise understanding is to solve the problems in the analysis of telecom customer churn, and clarify which problems belong to data mining and determine the task of data mining. The personnel engaged in data work not only know data mining technology, but also know the business knowledge of the enterprise to avoid blindness in customer churn analysis. Data analysis is according to the characteristics of the data
Construction of Churn Customer Analysis
699
source to the collect of customer’s original data, the description, exploration and identification and so on, for making effective preparations for the future data prediction. The staff need to have a more comprehensive understanding of the specific details in the problem to pave the way for the formulation of business problems [6]. Data preparation is to prepare a clean, complete and detailed data through the understanding and observation of customer data in order to lay a foundation for later model establishment. The work in this stage is complex, including data mining, arrangement and selection. Customer segmentation, it adopts different treatment strategies for different customers. This requires effective segmentation of telecommunications customers to facilitate effective management of customers. Through the customer segmentation model to build a customer churn forecasting model, an evaluation model, and formulate corresponding retention measures. The customer segmentation model is built on the value of customers. It means customer value is the contribution that customers can make interests for enterprise’s profit. According to the value of customers, customers can be divided into three types of customers: One type of customers are high-value customers. These customers pay highly attention on user experience but careless price, they are gold customers of the enterprise. The second-class customers are sub-value customers. It seems customers have a high value on the surface, but the potential development value has been reduced. It takes a long time to cultivate the loyalty of such customers. The three types of customers are potential value customers. This type of customers has potential development value and requires more service from the enterprise [7]. The prediction model for customer churn is to build the prediction model of customer churn in telecommunications, which needs to be applied to decision-making tree, logistic regression classification and other algorithms, which needs the solid support of big data technology. Among them, the evaluation index of classification algorithm is only for the algorithm itself, and does not combine with its application environment. Therefore, the selection of indicators in the field of customer churn analysis is also very important.
4 Analysis of the Causes of Telecom Customer Churn and the Countermeasures 4.1
Analysis of the Reasons for the Loss of Telecommunication Customers
The reasons of themselves. There are so many reasons for the telecom enterprises themselves, such as the poor service quality service, the bad attitude towards customers and the price reason, due to the high price of the telecom communication service, some customers will choose to the low price products rather than telecom; product reason, the poor product quality lead to the loss of customers, such as enterprises cannot provide mobile phone services suitable for customers products; technical reasons, the poor technology of telecom companies leads to slow product update; convenience reasons, due to the location of telecom business and other reasons that are not convenient for customers to arrive [8]. Competitor reasons. Besides telecommunication enterprises, there are also mobile and Unicom enterprises, which are large enterprises in
700
L. Wei and H. Xie
China. Their competitiveness is imaginable. Any one of them can offer more favorable prices, convenient services and so on will attract a large number of customers. Customer’s own reasons. It mainly includes the economic reasons and geographical factors of customers. 4.2
Countermeasures to Prevent the Loss of Telecommunication Rustomers
According to the reasons of customer churn to study countermeasures to prevent customer churn, different reasons need to build different retention strategies. This paper analyzes the effective strategies from the aspects of price, service, product, technology, customer segmentation and so on. (1) In aspect of price, it provides products or services with lower price than competitors. Such as the fixed fee every month; bring down the call cost of local call, domestic long-distance call, international long-distance call and domestic roaming fee; reducing the cost of customers’ Internet access [9]. (2) In aspect of products, increase cost in product research and development to find out products suitable for people in the new era, improve competitiveness and product quality to attract customers. (3) In aspect of services, continuously improve the quality and service personnel’s attitude to avoid wastage in this area. Such as provide relevant training and guidance on telecommunications customer service calls and the number of short messages, the service attitude and experience and knowledge to improve service quality. (4) In aspect of convenience, it is necessary to increase investment in various aspects and provide customers with more convenient and efficient services to avoid loss. For example, establish multiple telecommunications service stations in large-scale urban areas for people can easily reach in various areas. (5) In aspect of customer segmentation, customer segmentation is a prerequisite to help companies formulate retention strategies. Applying data mining technology to customer segmentation is more conducive to achieving further analysis and accurate insights into customers. Due to telecom customers are more persistent than customers in other industries [10], by segmenting customers, one can understand the different customer’s consumer needs and formulate unique products and services based on customer characteristics. With the development and change of the times, the problem of customer segmentation must be reformed in time and adopt the method of data mining to achieve the segmentation of lost customers.
5 Conclusions Customer churn analysis has a positive guiding meaning for the development of telecom business at this stage. Only through various analysis ways to understand the status, causes and future development trend of customer churn, can targeted measures be taken to retain customers and gain advantages in the fierce market competition.
Construction of Churn Customer Analysis
701
Acknowledgements. Scientific Research Project of Education Department of Hunan Province in 2019, Research on Telecom Abnormal User Model Based on Big Data (No.19C1725).
References 1. Xiaojia, W., Shanlin, Y., Zhiqiang, C.: Research on intelligence analysis and mining technology in the age of big data—analysis of the loss of telecom customers. J. Chin. Soc. Inf. Technol. 32(06), 564–574 (2013) 2. Hui, L., Xiaolan, W., Xia, L.: Construction of telecom customer churn forecast model and analysis of customer churn factors. J. Inner Mongolia Agric. Univ. (Soc. Sci. Ed.). 19(03), 23–27 (2017) 3. Jinxiang, Z.: Analysis of customer churn in the telecommunications market. Cai Zhi. 2017 (14), 269–270 (2017) 4. Hui, Z., Yong, X.: Comparative analysis of SVM model and Bayesian model in data miningbased on churn analysis of telecom customers. J. Pingdingshan Univ. 31(02), 68–73 (2016) 5. Li, S., Xumei, Y., Guoqiang, S.: Research on telecommunications broadband customer churn—based on survival analysis method. J. Yanshan Univ. (Philos. Soc. Sci. Ed.). 20(03), 85–94 (2019) 6. Rongxin, Z., Juanjuan, Z., Menghua, J.: Analysis of customer churn prediction based on Bayesian network. Software 40(02), 187–190 (2019) 7. Ling, K.: Design and application of telecommunications customer churn data analysis scheme. J. Cent. S. Univ. For. Technol. 31(06), 207–211 (2011) 8. Yaq, C.: Analysis of aviation customer churn based on C5.0 algorithm. J. Xi’an Aeronaut. Inst. 36(01), 72–77 (2018) 9. Yihui, W., Hongxin, Y.: Analysis and application of telecom customer churn based on statistics. Times Finance. 2018(03), 311 (2018) 10. Sijing, D., Li, W.: Analysis and research of customer churn in telecom campus based on data warehouse. Telecommun. Power Technol. 32(05), 233–235 (2015)
Application of Big Data Technology in National Emergency Management System Yongmei Tao(&) Changchun Institute of Technology, Changchun 130021, Jilin, China [email protected]
Abstract. China’s emergency management system has been established for a short period of time, and its development is relatively slow. There are many problems, such as lack of information sharing mechanism, large deviation of emergency response and poor decision-making quality In China’s emergency management system. In the era of big data, how to use big data technology to integrate multiple resources to establish an emergency big data sharing platform is an important problem faced by emergency management. Through literature review and field research, this study summarizes the urgent problems in China’s current emergency management development, and puts forward the implementation path of applying big data technology to China’s emergency management system. Such as to set up the big data thinking, as early as possible for the relevant practitioners to carry out systematic big data knowledge training; realize the organic integration of big data technology and emergency management system. In addition, computer network security technology should be further improved, and firewall technology should be used to effectively strengthen the control of user information in network access. Keywords: Big data technology
Emergency management system Data processing
1 Introduction In recent years, the risks and challenges posed by disasters and accidents in China have been on the rise. Huang Ming, secretary of the ministry of national emergency management, pointed out at the national conference on emergency management in 2020, We should rely on the big data application platform to strengthen the monitoring and early warning of major risk sources;adhere to precise governance, strengthen the whole process of accurate prevention and control of security risks; Relying on science and technology to improve the level of scientific, specialized, intelligent and refined emergency management. With the deep integration of technology domains such as Internet of things big data cloud computing and spatial geographic information technology and business domains such as comprehensive emergency intelligence, the development of China’s emergency management system has entered a new historical stage. How to apply the big data technology to the development and construction of the emergency management system quickly and effectively, and how to make good use of information means to promote the great change of the emergency management © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 702–707, 2021. https://doi.org/10.1007/978-3-030-51431-0_101
Application of Big Data Technology in National Emergency
703
technology and management mode is a new and important task facing the development of China’s emergency management system at present.
2 The Basic Theory 2.1
The Concept of Emergency Management
Emergency management put forward for the danger problem of especially serious accident disaster. Emergency management refers to the activities of government and other public institutions in the event of emergency in advance to prevent the handling of the incident and the recovery process,through the establishment of the necessary response mechanism, the adoption of a series of necessary measures, the application of science and technology planning and management means, to protect the public health and property safety; promote harmonious and healthy development of society. Danger includes human danger, material danger and liability danger [1]. 2.2
The Development of China’s Emergency Management System
The development of China’s emergency management system can be divided into three stages. The details are shown in Table 1. Table 1. The development of China’s emergency management system Stage The first stage The second stage
Start time and events 1970s; All kinds of droughts intensified From 2003; After SARS
The third stage
From 2008; The Wenchuan earthquake
2.3
Main content and features Embryonic stage. Focuses on the research of disaster management Rapid development stage. Focuses on the research of disaster management. The practice and research of emergency management are developing and flourishing rapidly. Multiple policies introduced Quality improvement stage. Rich achievements have been made in both theoretical and practical fields. The state attaches great importance to it
The Contents of China’s Emergency Management System
China’s emergency management work is summarized as “one case, three systems”. “One case” refers to the contingency plan, which is the plan and plan formulated in advance according to the occurrence and possibility of emergencies.”Three systems” refers to the management system, operation mechanism and legal system of emergency work.
704
2.4
Y. Tao
The Concept and Application of Big Data
Big data refers to the volume, variety, velocity and the data set of low-density value characteristics. Its core lies in the aggregation of individual information and data multiscale application [2]. In the era of big data, or in today’s highly developed era of information technology, data is not only a recording function, but also a power of information mining and processing and communication technology, which is an important technical support for artificial intelligence. The core of big data is prediction, which USES mathematical theories to analyze huge amounts of data in multiple forms to predict the possibility of things happening [3]. In order to deal with major emergencies more effectively, emergency management calls for the power of big data [4].
3 Problems in China’s Emergency Management System The establishment of China’s emergency management system is relatively short, and there is still much room for improvement. The existing problems are mainly reflected in the following aspects. 3.1
Information Sharing Mechanism Is Missing and “Information Island” Phenomenon Is Serious
Public emergency management often involves many departments, and each department has its own information collection channel and transmission system, information between departments and regions can not be Shared, the formation of information sharing network emergency management system lack of effective coordination mechanism [5]. As a whole, the lack of professional and systematic information platform leads to low efficiency and waste of information transmission. 3.2
Lacking of Professional Personnel
In March 2018, the ministry of emergency management was officially established, marking a new era in China’s emergency management system. Colleges and universities are actively developing emergency management related majors, and have established emergency management schools, some in the school of management, some in the school of civil engineering and some in the school of water conservancy and environmental engineering. Cultivate talents with practical ability. China’s emergency personnel training has entered a new stage of development. However, compared with the talent demand of the whole emergency management system in China, the current lack of talent training and professional team construction seriously restricts the rapid development of China’s emergency management system. 3.3
Grassroots Emergency Plans Are a Mere Formality
Community is an important living space for the majority of residents. However, there are many problems in China’s emergency management system such as the absence of pre-plan, the non-standard preparation of pre-plan, the update of pre-plan and so on. In
Application of Big Data Technology in National Emergency
705
practice, the overall practicability of the emergency plan is not strong, most of them become decoration, generally failed to play the due treatment effect. Figure 1 reflect the formulation and revision of major emergency plans of a grassroots community in north China. (The data point is December 2019.)
Fig. 1. The development of ST community emergency plan
3.4
Failing to Make Full Use of Modern Information Means
With the rapid development of information and communication technology and the emergence of cloud computing, data in the network space has increased dramatically, and the era of big data has come. All fields at home and abroad are concerned about the emerging phenomenon of big data and have conducted in-depth research on it. In the era of big data, how to use big data technology to integrate multiple resources to establish an emergency big data sharing platform is an important problem faced by emergency management.
4 Countermeasures and Suggestions Using big Data Processing Technology to Promote the Innovation and Development of China’s Emergency Management System. Firstly, we should set up big data thinking. Big data thinking is a way of thinking about many data problems. Problems found in massive data can be thought through the thinking of the whole sample, so as to form a holistic and relevant way of thinking [7]. At the same time, big data thinking and big data technology are integrated to effectively improve the accuracy of emergency prediction. Secondly, systematic training of big data knowledge should be conducted for relevant practitioners as early as possible. With the rapid development of information and communication technology, the era of big data has come. The traditional thinking and information processing mode can not keep up with the needs of the society. The new big data technology to deal with the daily information and work is the essential quality
706
Y. Tao
of emergency management practitioners in the future. Mastering relevant technologies as soon as possible can quickly improve the overall level of China’s emergency management professionals, thus providing a guarantee for the rapid development of China’s emergency management system under the background of big data era. Thirdly, Realize the organic integration of big data technology and emergency management system [8]. Emergency management can be divided into three stages: preevent and post-event in different stages, with different main work contents and big data technologies. In the pre-preparation stage, relevant facilities should be prepared for the application of big data, and basic Settings should be optimized to ensure accurate instruments to provide real and reliable data. At the same time, it should be equipped with corresponding software preparation, including software upgrade and data integration analysis of updating data processing and analysis methods [9]. In the process, the powerful information system and decision support system formed by big data are mainly used to assist on-site command, so as to accurately deal with emergencies [10]. The main task of the ex post phase is recovery and reconstruction. With the support of rigorous authoritative science of big data, governments at all levels can timely and comprehensively grasp the situation of accidents or disasters, take timely countermeasures, and ensure the reasonable and orderly implementation of emergency management in the post-event stage through scientific organization. Finally, to further improve the computer network security technology. Use firewall technology to effectively strengthen the management and control of user information in network access, and set up network access permissions. Monitor and control the computers in the LAN, increase security measures, improve users’ awareness of prevention, and pay attention to emergency big data security and privacy protection.
5 Conclusion The arrival of the era of big data brings new challenges and opportunities to China’s emergency management. China is one of the countries with the most serious natural disasters in the world. All kinds of hidden dangers and safety risks interweave and overlap, forcing the rapid development of China’s emergency management system. Practitioners in relevant fields should fully realize the inevitable arrival of the era of big data, quickly get familiar with and master big data technology, and establish emergency big data platform, including emergency knowledge, big data, emergency equipment and materials, big data, emergency information and big data. Using big data technology to integrate multiple resources to establish emergency big data sharing platform, making big data technology really become a sharp tool to promote the rapid development of China’s emergency management system.
References 1. Senior, K.: Global hot spots for emerging infectious diseases. Newsdesk 8, 218–219 (2008) 2. Ma, J., Jiang, W.: Concept, characteristics and application of big data. J. Natl. Univ. Def. Technol. 34(2), 10–17 (2013). (in Chinese)
Application of Big Data Technology in National Emergency
707
3. Kitchin, R.: Big data and human geography: Opportunities, challenges and risks. Dialogues Hum. Geogr. 3(3), 262–267 (2013) 4. Xu, T.: Study on the current situation and improvement strategy of Chongqing municipal emergency management. Bridg. Century (4), 93–94 (2016).(in Chinese) 5. Zhang, A., Zheng, W., Wu, D.: Thoughts on establishing and improving emergency management system. China Prod. Saf. (5), 34–37 (2018). (in Chinese) 6. Lewin, M.R., Hori, S., Aikawa, N.: Emergency medical services in Japan: An opportunity for the rational development of pre-hospital care and research. J. Emerg. Med. 28(2), 237– 241 (2005) 7. Li, Y., Jia, D.: Application of big data in disaster relief. E-government (5), 110–116 (2016). (in Chinese) 8. Li, J., He, Z., Plaza, J., et al.: Social media: New perspectives to improve remote sensing for emergency response. Proc. IEEE 99, 1–13 (2017) 9. Huang, Y.: Discussion on the application of big data in emergency management. Electron. World 9, 25–26 (2017). (in Chinese) 10. Gan, T.: Application of big data in emergency management. Electron. Technol. Softw. Eng. 11, 180 (2017). (in Chinese)
Vehicle Refueling Behavior Model Based on Spatio-Temporal Big Data Monitoring Platform Wenbin Wang(&) China Automotive Technology and Research Center Co., Ltd, Tianjin, China [email protected]
Abstract. During the actual use of vehicles, a large number of irregularities such as refueling at illegal gas station or mobile gas refueling vehicles, caused the unqualified diesel to be refilled into the vehicle, affecting the normal operation of the engine aftertreatment system, the exhaust emission result not meeting the national emission standards, and causing vehicle speed limited, penalized by Ministry of Ecological Environment. Identifying the quality of the gas is a prerequisite to ensure the normal operation of the vehicle’s aftertreatment system. This paper introduces an spatio-temporal big data calculation platform based on improved data indexing algorithm, proposes two models, that is, analysis of gas position and gas station type matching, applies three analysis rules, that is, noise data removal, data frequency reduction, and category determination, performs three categories of gas stations to complete the identification and analysis of vehicle refueling behavior in real-time monitoring data. The application in the real Internet of Vehicles (IoV) monitoring platform shows that the results obtained are of great significance for determining the cause of the engine aftertreatment system problem, defining the responsibilities, and guiding the technical upgrade of the aftertreatment system. Keywords: Spatio-temporal big data aftertreatment system
Vehicle refueling Diesel engine
1 Introduction According to the data released by the China’s Mobile Source Environmental Management Annual Report 2019, diesel trucks, which account total for 7.9%, but emit 60.0% of NOx and 84.6% of PM [1]. In August 2018, China issued the GB17691– 2018 Phase VI standard, real-time and online supervision of the emissions of heavyduty vehicles, regulation becomes stricter. Therefore, the normal operation of the aftertreatment system is very important. Ensuring fuel quality is a prerequisite for normal use of aftertreatment systems [2]. In the actual use of the vehicle, in order to detect the failure of the aftertreatment system in time, it is important to collect fueling information in real time. In order to ensure the accuracy and timeliness of the data, online real-time collection based on the IoV system has is the first choice. However, the main goals of existing IoV systems are to improve vehicle use efficiency and reduce business operating costs, or provide © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 708–713, 2021. https://doi.org/10.1007/978-3-030-51431-0_102
Vehicle Refueling Behavior Model
709
functions such as gas station navigation. It is impossible to provide a basis for determining the fuel quality of the vehicle’s refueling. The real-time analysis of the fuel quality of vehicle refueling mainly faces the following problems: (1) Solve the computing capacity of trillion-level spatio-temporal data and realize high-timeliness analysis and mining; (2) Analyze the time and location of the vehicle’s suspected refueling based on the vehicle sensor data; (3) Matching calculation based on spatial position. This paper presents a large data storage and analysis model based on distributed indexes, which solves the operation efficiency problem of trillion-level data. The time and location of suspected refueling points can be achieved through data grouping and clustering, data frequency reduction, threshold adjustment, and noise data removal. Finally, real-time monitoring and analysis of vehicle fueling is achieved.
2 Storage and Calculation Models 2.1
Big Data for IoV System
Each packet of data collected by IoV system includes time and location information, and other information is mostly numerical structured data. High-frequency acquisition focuses on driving behavior. When specific events occur, trigger the collection and reporting of related data [3]. The application scenario of this article is the China VI emission standards in GB17691. The data collection frequency is 1 s, which belongs to high-frequency collection. 2.2
Storage and Calculation Models Based on Distributed Indexes
The basis of the storage and computing models used in this article is to build distributed indexes on HDFS. The spark data is also based on the same distributed index, which greatly improves the efficiency of data retrieval, grouping, statistics, and sorting calculations, and inherits spark’s analytical computing capabilities [4, 5]. In addition, the model uses Morton coding, and improves the calculation problem of GeoHash to achieve space calculation such as distance calculation and regional collision [6].
3 Vehicle Fueling Behavior Analysis As the main channels for retailing refined oil products, have various types of oil sources. According to the partners type, the gas stations are divided into three types: state-owned enterprises, foreign enterprises, and others. Through the model, the actions of refueling at the third type of gas station, illegal gas station will be identified.
710
W. Wang
The analysis model mainly includes the following steps: ① Obtain real-time running data of the vehicle The vehicle reads the CAN bus data through the T-Box, and through analysis, obtains the information such as the fuel consumption tank volume, latitude and longitude, and collection time of all online vehicles in the platform. ② Judging the location of the suspected refueling point Transfer the collected data to the suspected fuel point position analysis model, perform noise data removal, data frequency reduction, adaptive threshold adjustment, and change calculation, complete the suspected fuel point position analysis, and obtain the suspected fuel point position information. ③ Gas station type identification The position information of the latitude and longitude of the suspected gas point is transmitted to the gas station classification and matching model, and a space matching calculation is performed with the gas station database. 3.1
Suspected Refueling Point Position Analysis Model
A collection of all the vehicle’s data for the day is D ¼ f P1 ; P2 ; ; Pn g , in the collection Pn is the nth second of the day, the position of the vehicle and the fuel tank liquid level data, Pn ¼ ðlt ; wt Þ is described by two-tuple data, lt which is the fuel tank level volume at time t, and wt is the vehicle position at time t, that is (lng, lat). Considering the before and after refueling difference of the fuel tank level and time and vehicle speed. 3.1.1 Noise Data Removal In the actual use of the vehicle, road bumps will occur, causing the fuel tank liquid level to shake, and then there will be a difference in fuel tank liquid level at adjacent times. But the above is not the actual refueling behavior and needs to be eliminated in the calculation. Rule 1: Remove the data packets of the fuel tank level and speed fields that exceed the data value range; Rule 2: In the range of 10 s, the fuel tank liquid level has a single stage or there is a continuous liquid level difference; in Fig. 1, A is a single stage noise; B is a continuous noise.
Fig. 1. The noise data of a vehicle’s refueling
Vehicle Refueling Behavior Model
711
3.1.2 Data Frequency Reduction In accordance with the regulatory requirement of a data collection frequency of 1 s, the system collected the fuel tank level per second. Dimension reduction for highdimensional data sets is a prerequisite for conducting data analysis and improving computing efficiency [7]. According to the characteristics of the data set, continuous data is discretized according to the equidistance, and equal frequency cutting is used to achieve the frequency reduction of the analysis data. The cutting step length r is less than or equal to the rounded value of the minimum theoretical refueling time of different vehicle types. Usually researchers do not have prior knowledge of the parameters, They usually need to conduct actual research, and verify the data set under different parameters, and iteratively optimize the parameters through multiple calculations to find the best correspondence [8]. The data set after frequency reduction is S ¼ S1 [ S2 ; ; [ Si ,Si ¼ fpjp 2 D; j n=r ¼ ig, r is the frequency reduction threshold, which can be adjusted according to calculation, and the initial value is 5. 3.1.3 Refueling Point Identification Through operations such as noise removal and data frequency reduction, the generated data set S meets the needs of further calculations, and the secondary verification method is used to make a judgment, and the suspected fueling point is determined. The fuel tank level of i is the set to the final level of the last moment of the i data, that is li ¼ lmaxðiÞ ,vi ¼ li þ 1 li , if vi b 0, then the vehicle is suspected to be refueled between the time maxðiÞ and maxði þ 1Þ. 3.2
Gas Station Classification Matching Model
At the software level, there are two main approaches to solving the bottlenecks of big data analysis performance, one is analysis based on the data level, the other is rule analysis based on prior knowledge [9]. At the hardware level, large-scale computing clusters can be analyzed by increase computing power, but the cost increase is too high [10]. This paper proposes that the key to the analysis of spatiotemporal big data is the appropriate indexes to improve computing efficiency and achieve data analysis and mining. Set wt is the fueling position of a vehicle at t, Gt is the set of all gas stations, the center is wt , the radius r less than or equal to Rmax , the collection Gout is the data by t . Gout ¼ fgjg 2 Gt ; g ¼ ðgname; gtype; glocationÞ; r Rmax g. changing values Rmax t t Rule 3: According to the gtype value, if gtype 2 CGTS, the CGTS represents the collection of the first and second types of gas stations, indicating that the vehicle driver refuels at a regular gas station. if gtype 2 UNCGTS, the UNCGTS stands for the collection of the remaining third-type gas stations, indicating that vehicle drivers are refueling at suspected irregular gas stations, and vehicle manufacturers need to pay attention. Rule 4: if Gout ¼;, it was shown that there was no gas station nearby, and vehicle drivers have illegal refueling actions, such as fuel trucks fillling, and vehicle manufacturers need to pay close attention.
712
W. Wang
4 Experiment and Result Analysis This article selects one month of actual usage monitoring, and calculates a total of 1395 refueling behaviors. The vehicle was investigated by sampling, and the comparison and verification of online maps show the model get correct results. Figure 2 shows several typical results calculated by the model. Figure 2.A and 2.B show there are one or more gas stations at the vehicle filling position. Figure 2.C shows the vehicle is to be refueled at the third type of gas station; the gas station is not shown on the map in Fig. 2.D, indicating that the vehicle is refueling through an illegal gas station.
Fig. 2. The Map matching results
After analysis of the data, the proportion of refueling at the third type of gas stations and illegal gas stations accounted for more than 50%, and more than 30% of vehicles were refueling at illegal gas stations. In particular, nearly half of the vehicles with a refueling volume of more than 60% at the third type of gas stations and illegal gas stations, it is not temporary fuel replenishment.
5 Outlook The model is deployed in an actual monitoring platform and verified in actual use scenarios, which shows the effectiveness and correctness of the model. For vehicle manufacturers, the cause of the failure of the post-processing system can be judged by analyzing the data, and the impact of the fuel quality on the post-processing system can be obtained to help the company upgrade the technology of the post-processing system. For vehicle operating companies, analysis of the data can reveal the impact of substandard fuel on mileage, fuel consumption, etc., In summary, the model proposed in
Vehicle Refueling Behavior Model
713
this paper has good prospects in the monitoring systems of vehicle manufacturing companies and operating companies, and can also be applied to scenarios such as uremia filling.
References 1. Ministry of ecology and environment of the people’s Republic of China: China’s Mobile Source Environmental Management Annual Report (2019) (in Chinese) 2. Yinfei, G., Fang, D., et al.: Effect of various standard diesel on performance and emissions of diesel engine. J. Combust. Sci. Technol. 23(1), 81–89 (2017). (in Chinese) 3. China Society of Automotive Engineers: T/CSAE-100 IOV insurance innovation & data intelligent application related data collection (2018) 4. Chang, B.-R., Tsai, H.-F., Tsai, Y.-C., Kuo, C.-F., Chen, C.-C.: Integration and optimization of multiple big data processing platforms. Eng. Comput. 33(6), 1680–1704 (2016) 5. Wenbin, W.: Research and implementation of big data analysis model for automobile enterprises. China Computer & Communication 2019(14), 149–151 (2019). (in Chinese) 6. Tianjiao, Z., Tailai, Y., et al.: Organization and retrieval of soil spatial grid data based on Morton code. Trans. Chin. Soc. Agric. Eng. 29(S1), 235–243 (2013). (in Chinese) 7. Myat, C., Mon, O., Thandar, T.: An efficient predictive analytics system for high dimensional big data. J. King Saud Univ.-Comput. Inf. Sci. (2019) 8. Sun Hoon, K., Young Hoon, L.: Iterative optimization algorithm with parameter estimation for the ambulance location problem. Health Care Manag. Sci. 19(4), 362–382 (2016) 9. Rui, R., Jiechao, C., Xi-Wen, He., et al.: Hybrid Tune: Spatio-temporal performance data correlation for performance diagnosis of big data systems. J. Comput. Sci. Technol. 34(6), 1167–1184 (2019) 10. Galić, Z., Mešković, E., Osmanović, D.: Distributed processing of big mobility data as spatio-temporal data streams. GeoInformatica 21(2), 263–291 (2017)
Construction of Information Auditing Curriculum for Auditing Major in Big Data Era Renzao Lin(&) Fuzhou University of International Studies and Trade, Fuzhou 350202, China [email protected] Abstract. In the era of “Internet+”, the audit work is integrated with the characteristics of information, and the audit work is gradually turning to information audit. Auditing must play its due role. Advanced auditing technology is inseparable. With the advent of the “Internet+” era, Audit Means should be Informationized. Auditors need to master information technology. The training of auditors is the main purpose of Auditing major in universities, the training of auditors can not meet the needs of the information age. Universities needs to conduct research on the training of information-based auditing personnel, change the thinking of talent training, improve the teaching concept and change the teacher structure, and make professional plans to meet the challenges of the “Internet+” era. Keywords: Big data
Information audit Curriculum construction
1 Introduction Information audit refers to the full application of information technology in audit work and the deep application of information system [1]. Early computer auditing is only a tool to support audits, checking whether there are any errors and financial deficiencies in accounting. As society advances, audits are not only a simple support tool, but also have already covered the economy, efficiency and effectiveness of the review process [2]. The market competition is increasing, the enterprise market risk increases, the audit work becomes an indispensable tool, and the audit work becomes an informative audit work. The development of information audits has gradually covered different levels of state, industry, enterprise organization and auditing, as well as national auditing, social auditing, internal auditing of enterprises and information security auditing [3] (Table 1). The first introduction of the concept of “Internet+” was made by the Yiguan International Chairman CEO Yuyang, who said in November 2012, the Yiguan Fifth Mobile Internet Expo, as science and technology matured, the era of “Internet+” has come [5]. Internet+ is the fruit of the development of Internet thinking into deep development, accelerates the evolution of economic morphology, promotes the dynamic development of socioeconomic entities, and provides a broad and good network growth platform for reform, innovation and development in China. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 714–719, 2021. https://doi.org/10.1007/978-3-030-51431-0_103
Construction of Information Auditing Curriculum
715
Table 1. Connotation of information audit [4]. Audit content Audit management information
Computer audit
Audit focus Audit site management information Audit background management information Information system audit Computer-aided audit
Three-level review of electronic working papers Audit gathering, sharing of information and experience Security and reliability of financial, business and other systems Efficiency and effectiveness of audit operations
All industries in the world have been changed by the Internet. Audit serves as the supervisory department of various organizations, and performs the organizational immunization function. Audit must play its due role, and must not be able to have advanced audit techniques, as the “Internet+” era comes, and the auditors need to be information [6]. However, at present, the talents trained by auditing major in universities obviously cannot meet the needs, and there are problems in training concept, curriculum and teacher structure. Research is needed to meet the requirements of auditing information talents in the era of big data.
2 Problems of the Construction of the Information Audit Curriculum in Colleges 2.1
Curriculum Is Unreasonable
Curriculum Setting of Auditing Major is lagging behind practice and influenced by teachers and teaching materials, which leads to the introduction of auditing courses based on the accounting profession, the practice curriculum bias with computerassisted auditing, such as how to prepare a bottom-up and how to read financial data from financial software, how to use big data to conduct audits and how to conduct audits of the system are underestimated. The talent of the course is clearly not satisfied with the requirements of the Internet+ for auditors. 2.2
Classroom Teaching Methods Are not Suitable for the Training of Information Auditors
Information auditors need auditing, accounting theoretical knowledge and computerrelated technology, Internet+ to improve audit efficiency, students’ skills change in auditing, students’ learning methods change the way teachers change the teaching of classroom. But the teaching method of classroom is still very single, with theoretical teaching as the main and practical teaching as the supplement.
716
2.3
R. Lin
Lack of Innovation in the System of Auditing Practice Teaching
At present, most university auditing practice teaching mainly takes computer-assisted auditing, carries out the accounting analysis, uses the same as traditional accounting practice teaching, simulates the financial annual report data of a company audited by an accountant firm, and students can master the application of audit, while analyzes the large data analysis, but lack of knowledge of how to use the data of big data thinking and how to conduct the audit of information system audit risk analysis. 2.4
Teachers Are Weak to Meet the Need for Information Talent Training
Auditing is a very practical work, and the information auditor needs not only knowledge of auditing theory but also computer knowledge. This demands higher requirements for teachers in universities, requires teachers to have knowledge of auditing and accounting theory, auditing practice and operational ability, and information auditing knowledge. The teachers in college can only be competent to have the information audit teaching. But many college teachers have little knowledge of auditing and computer composite types, most teachers from colleges to colleges, to enterprises or accountants’ firms have little experience.
3 Strategies for Auditing Major Information to Adapt to the Requirements of Big Data Era The “Education Department’s Opinions on Overall Improvement of the Quality of Higher Education” (No. 4 [2012] of the Ministry of Education) clearly states that “innovative talent training model” should be used as an important task for improving the quality of higher education. In the context of big data, Internet+ and high speed information, how auditing specialization adapts to the demands of big data age and applied talent training needs to be carried out in order to serve local economy and to develop information auditors in the context of new technological revolution, transform talent training thinking, upgrade teaching ideas and change teacher structure, and make professional planning to cope with the challenge of “Internet+”. 3.1
Reform of the Curriculum System
Information auditing requires auditors to be familiar with the audit professional theory knowledge, have their own unique insights, and have corresponding computer knowledge. This requires that schools train personnel with the theoretical academic and computer competence, and increase the professional curriculum education of computerassisted auditing related theory. We will strive to train students interested in carrying out computer-assisted auditing professions, and improve their professional theoretical knowledge base and operational ability [7]. In order to cultivate comprehensive and compound technical personnel, we can set up computer audit technology courses to train high-end talents with both theoretical knowledge of audit specialty and relevant computer technology.
Construction of Information Auditing Curriculum
717
Taking into account the opinions of the employing units, accurately analyzing the corresponding job and job group and their related professional capacity structure, and constructing the appropriate knowledge, ability and quality structure. The new standards, ideas and requirements of the 2.0 edition of the plan of action are incorporated into the reform of the education and teaching of the undergraduate subject. To meet the requirements of the scientific and technological revolution and industrial change characterized by digitization, information and intelligence, we will open large data audit, cloud audit and cloud audit in the professional elective course module, and add cloud audit module to the Audit Comprehensive Experiment. The information course will train talents with high comprehensive quality, reasonable knowledge capacity and strong practical ability through two main lines of theoretical and practical system (see Table 2). Table 2. The main line of the information-based curriculum system Theoretical system Basic accounting-intermediate financial accounting-principles of auditing -audit practices-social audit-internal audit
3.2
Practice system Basic accounting simulation experimentcomprehensive financial accounting experiment -tax simulation experiment-audit simulation experiment-big data audit-internal audit simulation experiment-audit comprehensive experiment
Building a “Double-Qualified and Double-Capable” Teachers Team
Teachers should not only have a profound basis of subject theory knowledge, but also have the practical knowledge of the corresponding enterprises [8]. Teachers should not only have the ability of theoretical teaching, but also have the ability to observe and study, practice and operation and analyze problems more importantly. teachers engaged in practical teaching should introduce new technologies in the enterprise in time. Will understand the latest developments in the field of practice in the classroom timely explanation, and as close as possible to production, life reality, and strive to make students in the classroom and the actual production line work without significant difference. New teachers must go to the enterprise for a period of time on the job training, improve the application level of professional teachers and innovative entrepreneurship education level [9]. 3.3
Taking “Combining Teaching with Practice” as an Important Section of School Classroom Teaching
Due to the limited practice base, which gives professional cognition, practice, practice put forward a huge challenge. Schools should enhance the purpose and practicality of classroom teaching, improve students’ learning initiative, improve students’ ability to solve problems, and further develop the experimental teaching resources system of “teaching, learning and production integration”. To construct a practical teaching system of auditing, which consists of professional comprehensive practice, vocational
718
R. Lin
skills training and entrepreneurial innovation practice, the professional comprehensive practice is implemented mainly through the four step-by-step practice links of curriculum experiment, design experiment, comprehensive experiment and graduation thesis. To construct a practical teaching system of auditing, which is composed of professional comprehensive practice, vocational skills training and entrepreneurial innovation practice. In basic accounting, middle-level financial accounting, auditing, social audit, internal audit and other applied courses to strengthen the use of modern computer technology and manual simulation of experimental teaching, to train students’ handson ability and innovation ability.
4 How to Deal with Industry 4.0 and Made in China 2025 The core of German Industry 4.0 is the intersection of machines and machines, the wide and deep application of the Information Physics Fusion System (CPS) to the manufacturing industry, the construction of intelligent factories, intelligent manufacturing. Big data and network entities are the intersection of machines and machines. What challenges Industry 4.0 and China Made 2025 pose to education are currently being studied in the education sector and society [10]. Industrial 4.0” and “Made in China 2025” strategic planning in essence need to strengthen the training of all kinds of talents and the current talent skills upgrading and transformation, which not only need stakes in colleges and universities, but also can not be separated from high-level vocational education such as China’s secondary vocational schools. All kinds of education need to accept the “Industry 4.0” and “Made in China 2025” to put forward higher demands on talent son and talent, training to adapt to the development of the social environment of the composite talent [11]. The intelligent production that has already begun, while reducing and even reducing the direct involvement of personnel in production in most production areas, also brings newer innovation spaces and environments, and the skills of personnel need to be changed. In the future, people’s work content will be mainly focused on innovation and decision-making areas, in the quality improvement, efficiency and innovation play an irreplaceable role, and this intelligent machine is still no substitute for human work. This puts forward new challenges and requirements for the training specifications of industrial talents in China. People are still the core of the enterprise, human wisdom is still irreplaceable, but for all types of people’s knowledge and skills structure to put forward more “flexible and complex” requirements, that is, people can work in a variety of technical models under the working environment and technical touch. The direction and target orientation of talent straining in schools should pay more attention to the cultivation of the general knowledge and sustainable development ability of future employees.
References 1. Xueyan, Z.: Study on the problems and countermeasures in the development of audit information technology. Knowl. Econ. 13, 36–37 (2017). (in Chinese)
Construction of Information Auditing Curriculum
719
2. Jin, L., Yan, W.: On the countermeasure of the bottleneck breakthrough of audit information construction. Contemp. Econ. 18, 128–129 (2012). (in Chinese) 3. Xiaoguai, Z.: Internal audit information framework and audit data security practice. China Intern. Audit 2, 71–75 (2015). (in Chinese) 4. Lin, M., Cheng, J.: Three key issues in enterprise information construction. CSI Academic Annual Thesis Collection 2006 (above), pp. 633–635 (2006) (in Chinese) 5. Jinli, W., Pengfei, Q.: Analysis of economic, non-economic and non-economic avoidance of “internet plus”. China Manag. Inf. 2, 118–120 (2018). (in Chinese) 6. Shunping, T.: The internet + teaching: content and characteristics of colleges. Chongqing High. Educ. Study 1, 13–17 (2017). (in Chinese) 7. Xinqi, W.: Discussion on some application problems of computer auditing in China. Account. Chin. Township Enterprises 2, 129–130 (2011). (in Chinese) 8. Ling, Z.: Enlightenment of subject teaching knowledge to college English teachers’ knowledge research. J. Sci. Educ. 10, 68–69 (2014). (in Chinese) 9. Ling, L.: The study of the “talent training mode” in institutions of higher learning is discussed. J. Sichuan Norm. Univ. (Soc. Sci. Ed.) 4, 110–117 (2008). (in Chinese) 10. Zhang, M., Zhang, A.: China manufactured 2025 new requirements for higher engineering education and its response. J. Huanggang Teachers Coll. 2018(4), 49–54. (in Chinese) 11. Zhou, J.: Challenges and countermeasures of “industry 4.0” strategy to vocational education. Educ. Occup. 2017(2), 16–21. (in Chinese)
Big Data Technology in Construction Management Informationization in Complex Environment Ping Liu(&) Liaoning Jianzhu Vocational College, Liaoyang 111000, Liaoning, China [email protected]
Abstract. With the continuous expansion of the scale of construction projects in China, the innovation and development of construction technology for construction projects are also continuously improved. This article mainly conducts experiments on a subway line in city A and invites 5 experts who have studied the relevant lines to conduct a questionnaire survey, write out their own scores and summarize them, so as to obtain the original data. The data is analyzed using AHP and a multi-level fuzzy comprehensive evaluation method based on set pair analysis, and the final conclusion of the data is obtained. It was found that the probability of safety assessment of a subway line in city A was 43.25%, the safety probability was 48.32%, the critical probability was 8.43%, and the danger probability was 0%. It was concluded that the subway line could be safely constructed. Keywords: Construction technology Construction enterprises management efforts Analytic hierarchy process
Fine
1 Introduction At present, with the acceleration of China’s urbanization process, China’s land resources are becoming less and less. In order to further improve land use efficiency and increase the number of high-rise buildings, the foundation of construction work must be firmly established when constructing high-rise buildings. Before determining the determined construction technology, the construction company will conduct a detailed investigation of the geological conditions and construction environment of the construction area. During the construction, the investigation results should be analyzed in detail. Through reasonable research and selection of reasonable construction techniques, the overall quality and basic stability of the construction can meet the requirements. Algan Tezel proposes that the performance of buildings can be more effectively monitored and maintained by retrieving from captured knowledge to relevant solutions to new problems when maintaining building components [1, 2]. A J Likita proposed using genetic algorithm to implement projection tracking technology, project the multidimensional evaluation index value of the scheme into the one-dimensional projection data, and optimize the scheme according to the projection value. Engineering © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 720–724, 2021. https://doi.org/10.1007/978-3-030-51431-0_104
Big Data Technology in Construction Management Informationization
721
application examples show that the model is easy to make decisions, has strong objectivity, applicability and operability, and provides new technical tools for the selection of shaft construction schemes [3]. This article mainly conducts experiments on a subway line in city A and invites 5 experts who have studied the relevant lines to conduct a questionnaire survey, write out their own scores and summarize them, so as to obtain the original data. The data is analyzed using AHP and a multi-level fuzzy comprehensive evaluation method based on set pair analysis, and the final conclusion of the data is obtained.
2 Method 2.1
Analytic Hierarchy Process
This is a systematic analysis method that combines qualitative analysis with quantitative analysis, which was proposed by the famous American operations research scientist satty [4]. 1. Establish a hierarchical structure. First of all, we must figure out the problem to be solved, then analyze the influencing factors of the problem, decompose the complex problem into different attributes, and summarize and combine according to the interdependence relationship between the influencing factors. Factors at the same level belong to the factors at the previous level and play a leading role in the factors at the next level. These levels can be divided into three categories: highest level (target level), intermediate level (criteria level) and indicator level (programme level) [5, 6]. 2. Construct a judgment matrix. In the hierarchical structure, the judgment matrix indicates the relative importance of each index in this level relative to an index in the previous level [7]. Taking the hierarchical structure as an example, Bk in the standard layer B is related to Ck1 ; Ck2 ; . . .; Ckn in the next layer C. Then the following judgment matrix can be constructed: 2
b11 6 b21 Bk ¼ bij nn ¼ 6 4 bn1
b12 b22 bn2
3 b1n b21 7 7 5 bnn
ð1Þ
Among them, bij indicates the relative importance of the indicator Cki to Ckj when compared with the indicator Bk of the previous layer. It is easy to know that the judgment matrix Bk has the following characteristics: bij [ 0; bii ¼ 1; bij ¼ b1ji , the matrix wind is called a positive reciprocal matrix. The value of each element in the judgment matrix is generally determined using the 1–9 scale method proposed by Professor Satty [8]. 3. Find the weight vectors and arrange them in a single level. After the judgment matrix is constructed, the weight of each indicator can be calculated, and the evaluation indicators can be arranged on a level. There are four levels of analytic
722
P. Liu
hierarchy process (AHP) to solve the weight vector, which are arithmetic average method (summation method), geometric average method (square root method), feature vector method and least square method [9, 10].
3 Experiment 3.1
Geological Profile
Engineering geology and hydrogeology come from the geotechnical survey report of a subway line in city A. The remaining formations consist of loose sediments. The law of spatial phase transition has obvious regional characteristics, with typical characteristics of transition, gradual change and multiple sedimentary periods. 1. Under hydrogeological conditions, the maximum depth of the shaft is 40 m, and the groundwater level cannot be measured within the range of the measured depth. According to the survey data of the wells around the site and regional hydrogeological data, it is determined that there is a groundwater layer in this section, and the groundwater type is groundwater. The aquifer is about 25.30 m deep, and the aquifer is a pebble layer. The investigation did not see water in the upper layer, but due to atmospheric precipitation, pipeline leakage and other reasons, the proposed location did not rule out the possibility of local existence of the upper layer of water. 2. Bad geological effects and special geotechnical conditions The plate is located in a relatively stable tectonic zone, and there is no sign of new tectonic movement. The construction environment of underground projects is complicated, and there are many differences between necessary equipment and professional designers and staff. Type of interference, to achieve control or reduce risk through risk management, and to effectively reduce possible casualties during construction. Therefore, by changing the safety level of the line structure, improving the safety level cannot be ignored for all line traffic. The site stratum is river alluvial stratum, and the lithology is quaternary new cement soil and sandy soil. There are collapsible loess silt and loess silt. Therefore, the on-site geological disasters are mainly loess collapsibility.
4 Discussion 4.1
Obtaining Indicator Weights
This article relies on investigating relevant researchers to understand the parameters that specifically divide the weights, and at the same time conduct inductive research and summary of the above information to obtain the final conclusion. According to the specific situation, five experts from the subway line construction unit are invited to score. The scores of each indicator were compared using the 5–3 quantile method, and the results were collated to eliminate the highest and lowest scores. The average score
Big Data Technology in Construction Management Informationization
723
of the remaining part is calculated as the score of the final judgment matrix. The effective recovery rate was 100%. After reaching a conclusion, conduct research to obtain the final score, as shown in the following Table 1. Table 1. Table of scoring scales for expert indicators Expert Expert Expert Expert Expert
4.2
1 2 3 4 5
B1–B2 3 4 6 2 3
B1–B3 2 3 1 1/4 2
B1–B4 2 3 1/2 2 2
B2–B3 1/2 1/5 1/2 1/4 3/8
B2–B4 1/3 1/3 1/7 3 1/2
B3–B4 1 2 2 1 3
Analysis of Research Results
Through the above exploration and equations, we can understand the final conclusion of the declining risk assessment, as shown in the Fig. 1 below.
Fig. 1. Comprehensive evaluation results
According to the actual situation of the construction of the project and the regularity, possibility and randomness of risk occurrence, we need to implement risk management throughout the process on the premise of the establishment of a controllable risk management control system to minimize the risk of the construction track sinking and falling, and minimize the construction The risk of the track sinking and falling and ensuring safety during operation. Apply the fuzzy analytic hierarchy process, and verify the risk coefficient and risk reduction measures and methods, and continuously strengthen the management of on-site construction procedures, reduce the
724
P. Liu
factors that may cause deviations, gradually reduce the settlement to the standard range, and ensure the stability during the operation period.
5 Conclusion Compared with other engineering constructions, construction engineering management is a complex and systematic task, which has far-reaching significance for effectively improving economic benefits and ensuring the healthy development of enterprises. At present, to do a good job of construction, it is necessary to apply this management mode to the entire process of construction management according to the positioning of the enterprise itself, and lay the foundation for improving the quality and efficiency of construction management. In this paper, a questionnaire survey is conducted on experts who have studied a subway line in city A, and their respective scores are written and summarized to obtain the original data. Analytic hierarchy process and multi-level fuzzy comprehensive evaluation method based on set pair analysis were used to analyze the data. It was found that the safety assessment probability of a subway line in city A was 43.25%, which was 48.32%, the critical probability. It is 8.43% and the risk probability is 0%. It was concluded that the subway line could be safely constructed.
References 1. Xu, F.: Conception and exploration of using data as a service in tunnel construction with the NATM. Engineering 4(1), 123–130 (2018) 2. Tezel, A., Aziz, Z.: Visual management in highways construction and maintenance in England. Eng. Constr. & Arch. Manag. 24(3), 486–513 (2017) 3. Likita, A.J., Zainun, N.Y., Abdul Rahman, I.: An overview of total Quality management (TQM) practice in construction sector. Iop Conference, , 140(1), 012115 (2018) 4. Yao, P., Wang, H., Ji, H.: Gaussian mixture model and receding horizon control for multiple UAV search in complex environment. Nonlinear Dyn. 88(2), 1–17 (2017) 5. Parish, S.J., Nappi, R.E., Kingsberg, S.: Perspectives on counseling patients about menopausal hormone therapy: Strategies in a complex data environment. Menopause 25 (8), 1 (2018) 6. Fei, G.A.O., Fei, M.A., Xiling, L.U.O.: Hierarchical feature-based detection method for SAR targets under complex environment. Chin. J. Electron. 26(3), 647–653 (2017) 7. Hafter, E., Xia, J., Pentony, S.: Benefits of wearing hearing aids in a natural complex auditory environment. J. Acoust. Soc. Am. 141(5), 3813–3813 (2017) 8. Tangcharoensathien, V., Srisookwatana, O., Pinprateep, P.: Multisectoral actions for health: Challenges and opportunities in complex policy environments. Int. J. Health Policy & Manag. 6(7), 359–363 (2017) 9. Bacon, L., MacKinnon, L.: Supporting real-time decision-making under stress in an online training environment. IEEE Revista Iberoamericana De Tecnologias Del Aprendizaje, PP (99), 1–1 (2017) 10. Lorren, K., Haywood, G., Forsyth, G., de Lange, W.J.: Contextualising risk within enterprise risk management through the application of systems thinking. Environ. Syst. & Decis. 37(2), 1–11 (2017)
Higher Vocational Teaching Management System Based on Big Data Shuyu Shi(&) Liaoning Jianzhu Vocational College, Liaoyang 111000, Liaoning, China [email protected]
Abstract. The rapid development of information technology makes education informationization possible. A large amount of data is stored in the teaching management database. How to find the hidden information in the data, and provide decision-making support for the school’s teaching management. This article studies the vocational teaching management system. Through the data collection of big data technology in a higher vocational college, through data analysis, under the same course taught by a teacher with 20 years of teaching, the average result is 89.22, the excellent rate is 8.14%, and the link rate is 3.44%; Teachers with 14 years of schooling brought an average grade of 88.33, an excellent rate of 7.54%, and a link rate of 3.67%; teachers with 7 years of school brought an average grade of 87.99, an excellent rate of 6.99%, and a link rate of 5.66%. The teaching age affects the quality of teaching. Keywords: Big data technology management Data analysis
Vocational teaching Teaching
1 Introduction With the development of network information technology, China’s social production and life have undergone tremendous changes, big data has been introduced has promoted the revolutionary development of China’s traditional industries. In the information age, the big data model is gradually being applied to the reform of education and teaching. Higher vocational colleges are mainly established to improve the employment level of the labor force and the overall quality and skills of front-line workers. Students can choose to directly find employment after graduation, or they can choose to continue their studies at higher schools [1]. A vocational college has realized education informatization through the use of a teaching management system, but the traditional teaching management system pays more attention to the management of the teaching system and does not focus on analyzing and grasping the current status of the students. The teaching management staff cannot take effective measures in a timely manner [2, 3]. According to the teaching characteristics, a teaching management system is designed and developed, which collects and stores all the data in the teaching process, and uses the analysis results of a large amount of data to provide decision support for teaching management and build an intelligent teaching management platform [4]. At present, the research group has basically completed the overall system design and data acquisition and © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 725–730, 2021. https://doi.org/10.1007/978-3-030-51431-0_105
726
S. Shi
storage part of the system, and researched the methods of applying the stored large amount of data to provide decision support for teaching management [5, 6]. Innovations: (1) Systematic research: This research is a corresponding study that fills the gaps in vocational education informatization and vocational education modernization in China. This research to fill the gap is quite difficult, because it is necessary to understand not only informatization and education informatization, but also vocational education, and also to modernize education and teaching. (2) By analyzing the outstanding results of domestic vocational education teaching modernization exploration, based on this, practice will be upgraded to the theory and given to vocational education. Connotation of Chinese characteristics of teaching modernization.
2 Method 2.1
Data Extraction
The types of data sources involved in this study include relational database SQL Server, file types, and other manually entered data. According to this principle, in this study, teacher information, student information, course information, etc. adopt an incremental extraction strategy. Increment is extracted according to time stamp fields such as “data change date”, and the remaining data such as community information, competition information, etc. adopt a full extraction strategy [7, 8]. 2.2
Data Cleaning and Conversion
Data may have errors during the collection, transfer, and loading process, resulting in some dirty data and incomplete data. The original data needs to be processed when data is extracted. Data cleaning and transformation ensure the correctness, consistency, completeness and standardization of data. Data cleaning and transformation work mainly includes the following aspects: 1. Null value processing. According to the needs of the analysis, the null value is replaced with a specific value or directly filtered out. 2. Standardized data format. In one case, the field names of the data representing the same attribute in different data tables are different. All dates are formatted in YYYY-MM-DD format, the attribute data of the “birthplace” is uniformly expressed in the format of “XX city, XX province”, and redundant address information is deleted. 3. Data discretization. Part of the original data is a continuous measurement parameter. In order to improve the efficiency of data analysis and data mining, for discretized data that does not affect the analysis results, or in the form of discretized data, simple discretization processing is required. There is no fixed universal standard. The established conversion rule, in which the grade level “Fails” corresponds to the score “50”, is based on the average score of less than 60 points in the existing student performance data [9, 10].
Higher Vocational Teaching Management System Based on Big Data
2.3
727
Data Loading
After preprocessing the data, the data in the source database needs to be loaded into the data warehouse. Since the fact table references the primary key of the dimension table, the historical dimension table data is loaded before the historical data fact table data [11].
3 Experiment Literature Research. Based on the literature research method, through a large number of retrieval, reading and analysis of vocational education informatization, vocational education teaching discussion and Modernization. The relevant Chinese and foreign literatures have found and summarized the exploration, experience and shortcomings of modernization of vocational teaching management in China with big data technology, providing a basis for further exploration and research. Case Analysis. Select the results of informatization construction at the national level as well as multiple vocational colleges and related units as typical cases, analyze the results of their teaching modernization construction, and focus on the analysis of national vocational college informatization teaching competitions, vocational college digital campus construction. Compare Research. A comparative analysis of the development and research status of Chinese and foreign vocational education teaching modernization, including modernization of vocational education teachers, modernization of vocational education teaching resources and environment, modernization of vocational education teaching management, and modernization of vocational education teaching evaluation Explore and carry out combing, and systematically sort and refine the characteristics; compare the differences between the practices of vocational colleges, primary and secondary schools, and colleges; draw on relevant experiences; and propose strategies to optimize the modern development of vocational education. Interview. Interview with some vocational teaching managers and teachers to understand the vocational college teachers ‘understanding of the promotion of vocational education modernization, and the impact on the improvement of teachers’ modernization.
4 Discuss 4.1
Experimental Results and Analysis
The assumption that there is a correlation between teacher teaching age and performance is based on the difference in teaching methods and mentality of students facing teachers of different teaching ages, which may produce different teaching effects. The teaching age of teachers is divided into sections. “6–12 years”, “more than 12 years”. Select courses taught by teachers of different teaching ages, calculate the average
728
S. Shi
grades, excellent rates, link rates, and good rates of students taught by teachers of all ages, and draw bar charts to show the relationship between teacher teaching age and student performance. When researching the teaching age of teachers, the data in the form shown in Table 1 is obtained from the data warehouse. Among them, the temporary class is composed of students who take the same course. It is set up to manage the curriculum arrangement of some basic courses more conveniently. Often, students in a temporary class come from different administrative classes. Depending on the number of students studying, the capacity and number of temporary classes in a course will vary. For the same class or temporary class of the same course, there are two or more teachers teaching at the same time. We default that these teachers can have the same teaching records of the course. Under the same courses taught, teachers with a 20year teaching age brought an average grade of 89.22, an excellent rate of 8.14%, and a link rate of 3.44%; teachers with a 14-year teaching level brought an average grade of 88.33, an excellent rate of 7.54%, and a link rate 3.67%; the average result of a teacher who has been teaching for 7 years is 87.99, the excellent rate is 6.99%, and the rate of hanging subjects is 5.66%. This shows that the teaching age of teachers affects the quality of teaching. Table 1. Teacher teaching age data extraction table Staff number
Teaching age
Course code
202028 202038 202018
20 7 14
W9902507 W9902507 W9902507
Class code / temporary class code 16000240501 16000240502 16000240503
Average score
Excellent rate
Link rate
89.22 87.99 88.33
8.14% 6.99% 7.54%
3.44% 5.66% 3.67%
In order to avoid the impact of teachers ‘subjective improvement of students’ overall performance on evaluation when grading, these four evaluation indicators are only for teachers who teach courses with two or more temporary classes and are taught by different teachers. For the courses taught Teachers with only one temporary class or only one teacher do not make this assessment. In addition to displaying the corresponding indicator levels, the teaching effect evaluation results can also be displayed visually and in detail in combination with charts. Taking the data provided by a vocational college as an example, the evaluation result form is shown in Fig. 1. 4.2
Teaching Management Construction Strategies in Higher Vocational Colleges
At this stage, universities are paying more and more attention to the use of information technology. During the system development and installation process, it will be maintained regularly to better serve the teachers and students. In addition, we must help teachers and students make suggestions for the establishment of a new educational
Higher Vocational Teaching Management System Based on Big Data
729
35% 30% 25% 20% 15% 10% 5% 0% Excellent rate
Rate of improvement
All teachers average
Link rate
Decline rate
The teacher's corresponding value
Fig. 1. Evaluation results of teacher teaching effectiveness
management model, the effective optimization of various educational resources, and the establishment of an educational management information system for colleges and universities. In the process of building a teaching management information system, we cannot do this without the help of software and hardware. Specifically, including computers, printers and other related management software, equipment and devices. In this case, we must actively integrate teaching practices to obtain relevant facilities and equipment and hold long-term meetings to avoid unnecessary waste in installing equipment and installations.
5 Conclusion The research focus of this article is to explore the use of data analysis Application of technology to solve teaching management problems. Analyze the relevant data stored in the school, integrate the data in each independent database, find a more reasonable and feasible analysis method, and obtain the analysis results that can be used for teaching and employment guidance, and provide decision support for teaching management This paper explores the feasibility of applying data mining technology to performance prediction and employment guidance, conducts research on specific application forms, and uses the data provided by a vocational college as an example to demonstrate the application of the method.
References 1. Dremel, C., Wulf, J., Maier, A.: Understanding the value and organizational implications of big data analytics: The case of AUDI AG. J. Inf. Technol. Teach. Cases 1, 1–13 (2018) 2. Grisham, W., Brumberg, J.C., Gilbert, T.: Teaching with big Data: Report from the 2016 society for neuroscience teaching workshop. J. Undergrad. Neurosci. Educ. 16(1), A68–A76 (2017)
730
S. Shi
3. Zhou, L., Fu, Y.: Data reconciliation of heat exchanger system based on bilinear orthogonal transformation. Nanjing Li Gong Daxue Xuebao/J. Nanjing Univ. Sci. Technol. 41(2), 212– 216 (2017) 4. Wang, L., Chen, Q., Gao, H.: Framework of fault trace for smart substation based on big data mining technology. Autom. Electr. Power Syst. 42(3), 84–91 (2018) 5. Bo, D., Kangcheng, D., Guang, C.: Carbon emission management system of port logistics based on internet of things technology. Railw. Transp. & Econ. 28(1), 1094–1098 (2017) 6. Zhao, M., Liu, P., Cao, A.: Design of ultra-low temperature online monitoring system based on data fusion technology. Wirel. Pers. Commun. 103(11), 1–9 (2018) 7. Yukun, T., Yingming, H., Shuangfei, F.: Calibration technology of visual measurement system based on position sensitive detector. Laser & Optoelectron. Prog. 55(8), 081202 (2018) 8. Yan, K., Guo-chen, N.: Research and implementation of snoring head posture detecting system based on sound source localization technology. J. Northeast. Univ. 39(1), 26–30 and 49 (2018) 9. Wei, P., Ran, W., Shi, X.: Design and test of data acquisition system based on nano-channel single molecule detection technology. J. Nanoelectron. & Optoelectron. 12(11), 1228–1236 (2017) 10. Chen, S., Liu, F., Tang, X.-S.: Research on on-line water-meter verification system based on computer vision technology. Jiliang Xuebao/Acta Metrol. Sin. 38(4), 473–476 (2017)
Influencing Factors of College Students’ Entrepreneurship Based on Big Data Analysis Heng Zhang(&) Xi’an Fanyi University, Xi’an, Shaanxi 710105, China [email protected]
Abstract. In the process of rapid economic development, the competition among students is becoming more and more serious, and the pressure of students is also increasing. Guiding college students to start their own businesses is an important way to solve the problem of employment for college students. Cultivating college students’ (CSS) innovative thinking has become an important part of China’s higher education reform. Innovation and entrepreneurship activities play an important role in cultivating CSS innovative thinking. Therefore, it is of significance to improve the quality of CSS innovation and entrepreneurship. This paper collects data through questionnaires for regression analysis, explores the improvement of CSS innovation and entrepreneurship quality, analyzes its influencing factors, and puts forward effective ways to improve CSS innovation quality, striving to build a good campus entrepreneurship culture. Keywords: Big data College students start businesses Innovative thinking Empirical research
1 Introduction The application of big data not only fundamentally changes the relationship between the traditional backward production structure and life, but also provides more convenient conditions and broad development space for people’s life and employment [1–3]. In this situation, the application of big data can form new entrepreneurial ideas. Therefore, in the process of starting a business, college students should make full use of big data to conduct a comprehensive analysis of corresponding professional positions and clearly grasp the basic information content, so as to help college students start a business better and faster [4, 5]. At the same time, Chinese CSS entrepreneurship is in the initial stage, and they will face a series of difficulties in the process of selfentrepreneurship [6]. However, faced with the grim situation of employment of college graduates, CSS entrepreneurship has become an important way for colleges and universities to promote comprehensive college students [7, 8]. Existing research or analysis from the perspective of teaching education influence on entrepreneurship, or analyse the composition of CSS entrepreneurial ability, or from the perspective of the entrepreneurial spirit to talk about in the cultivation of CSS entrepreneurial ability, but not on the influence factors of CSS entrepreneurial ability system carding and in-depth exploration, this leads to our CSS entrepreneurial ability is © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 731–736, 2021. https://doi.org/10.1007/978-3-030-51431-0_106
732
H. Zhang
a lack of understanding [9–12]. Under the existing theoretical knowledge system, the research of this paper has practical and referential significance [13]. Based on the characteristics of college students and the big data environment, this paper will combine questionnaire survey with empirical research to find the factors influencing CSS entrepreneurship. Mainly through the establishment of hypothesis in the empirical analysis of influencing factors, explore whether has the relationship between these factors and the specific size of the factors that affect CSS entrepreneurial values, and specific to these factors, summarizes the factors affecting CSS entrepreneurship specific way, hereby put forward effective feasible Suggestions of improving the ability of university students, for the domestic colleges and universities set up good business platform to provide theoretical basis for [14, 15].
2 Method 2.1
Study Key Points and Difficulties
The research focus of this paper is how to design the questionnaire content to be consistent with the research content of this paper, extract relevant data from the questionnaire, and use SPSS software for reliability and validity test and regression analysis of relevant data. Before the regression analysis, establish the relevant hypothesis. According to the related research, determine the research variables and hypothesis quantity of this paper. The difficulties of this paper lie in how to use the influencing factors of CSS entrepreneurship for empirical analysis, how to test the reliability and validity based on relevant data, and how to establish a reliable descriptive analysis of the model. Based on these analyses, relevant influencing factors were extracted, and countermeasures to improve CSS entrepreneurial ability were proposed based on these influencing factors. Finally, the research conclusions of this paper were drawn. 2.2
Research Ideas and Methods
This paper mainly adopts the method of combining questionnaire with empirical research. The objects of this survey are undergraduate students, who are not restricted by the region or the school. The questionnaire survey and data collection are conducted based on the principle of random sampling. We collect sample data by combining online and offline methods. Online is mainly conducted by the questionnaire star survey platform, offline is mainly conducted by the field research. There are 215 pieces of valid data collected in this study, which will be used as the object data of this study. Meanwhile, relevant data operations will be carried out on these data, such as control variables. Setting control variables can help us make full use of the data for analysis.
Influencing Factors of College Students’ Entrepreneurship
733
3 Experiment Whether the measured variables include college students entrepreneurship policy focus on entrepreneurship policy information and understanding of relevant policies, measurement of the variables in the entrepreneurship education mainly includes entrepreneurial winners or experts to open lectures, the school open entrepreneurship education elective or required courses, school, or set up a local entrepreneurship guidance institutions and held a contest, measurement of the variables in the entrepreneurial traits including difficulty coping with frustration and seek the solution, even if can’t get others’ approval work will not depressed, and never doubted his ability. Then, the reliability and validity of entrepreneurship policy, entrepreneurship education, entrepreneurship characteristics and the attitude of relatives and friends were tested. The reliability and validity test can optimize the research data and reduce the interference of adverse factors. Finally, the regression analysis of influencing factors is carried out to find out the significant factors influencing CSS entrepreneurship among these influencing factors, so as to promote CSS entrepreneurship, improve their entrepreneurship literacy and promote their all-round development.
4 Discuss 4.1
Experimental Results Show
First, statistical analysis is carried out on the samples. The results of statistical analysis are shown in Fig. 1. In Fig. 1, we can see that the number of men in this survey is more than that of women, about 50% of them have started businesses themselves, less than 50% of their families have started businesses, and more than two-thirds of them have friends who have started businesses. A family or friend who has a history of starting a business can indirectly lead to the creation or initiation of a business.
200 150 100 50 0
Man
Women Sex
Yes
No
Own business history
Yes
No
Yes
No
Family business Friend business history history
Fig. 1. Information of respondents
734
H. Zhang
In the experimental part, the results of reliability and validity tests on entrepreneurship policy, entrepreneurship education, entrepreneurship characteristics and the attitudes of friends and relatives are shown in Table 1. The variance contribution rate of the first principal component of entrepreneurship policy, entrepreneurship education and entrepreneurship characteristics was all greater than 40%, indicating that the structural validity of the measurement was good, while the variance contribution rate of the first principal component of the attitude of relatives and friends was slightly less than 40%, but higher than 25%. This paper also believed that the validity of the measurement structure was good. Table 1. Reliability and validity analysis results of variables Content
Measured variable
Entrepreneurship Policy
Focus on policy Learn degree Lecture Related courses Entrepreneurial base Entrepreneurship competition Positive attitude Don’t care about others Believe oneself Support Influence Network
Entrepreneurship Education
Entrepreneurial qualities
Relatives and friends attitude
Factor value 0.43 0.56 0.89 0.69 0.75 0.84
PCA
Reliability
63.70%
0.74
79.20%
0.86
0.65 0.59 0.68 0.45 0.54 0.61
59.60%
0.64
38.90%
0.77
Then, a regression analysis was conducted on the influence of entrepreneurial policies, entrepreneurial education, entrepreneurial characteristics and the attitudes of friends and relatives on entrepreneurial intention. We can conclude that entrepreneurship education, entrepreneurship policy and entrepreneurship characteristics have positive effects on CSS entrepreneurship, namely, hypothesis 1, 2 and 3 are valid. 4.2
Analysis of Influencing Factors
(1) The impact of entrepreneurship policies Supported by the national policies, the society has also formed a good entrepreneurial atmosphere, and entrepreneurship has become a new form of employment for college students. Entrepreneurship can not only solve the problem of difficult employment for college students, but also cultivate their innovation consciousness and entrepreneurial ability, so that college students will be more adaptable in their future career.
Influencing Factors of College Students’ Entrepreneurship
735
(2) The influence of entrepreneurship education Colleges and universities should provide targeted guidance and training on entrepreneurship according to the characteristics of college students, develop their entrepreneurial tendency and entrepreneurial thinking, and establish a complete education system.
5 Conclusion In order to stimulate the entrepreneurial intention of college students, to help college students entrepreneurial success, entrepreneurship policy related countries should introduce, positive publicity, correct guidance, in the entire society should form a good business atmosphere, let students realize the innovation and the national economic development, social progress the significance of the talent, to strive for light in the students’ innovation consciousness, cultivate the students’ innovative spirit, training students’ innovation ability and motivate the students’ innovative action, to improve students’ innovative quality, promote the all-round development of students and so on has made remarkable achievement. Acknowledgements. This work was financially supported by Xi’an Fanyi College, Project of China Youth Research Association in 2019 (2019B28); special scientific research plan of Shaanxi Provincial Department of education in 2019 (19JK0342); Research project on the work of the Communist Youth League of schools in Shaanxi Province in 2018 (SXGQT2018ZDI09); project of Shaanxi Provincial Education Science “13th five year plan” in 2018 (SGH18H464).
References 1. Cao, S.-G., Zhang, Y., Chang, W.-J.: Factors analysis of vortex-induced vibration based on monitoring big data. Bridg. Constr. 49(1), 59–64 (2019) 2. Ji, C., Lei, W., Fu, C.: Analysis and reconstruction of the evaluation index of “innovative experimental plan for college students”. J. High. Educ. 166(217), 75–82 (2017) 3. Liao, X., Liu, X., Feng, F.: Research on citizen participation in the implementation of public policy in big data age. J. Phys: Conf. Ser. 1168(536), 32–37 (2019) 4. Habel, M.A., Brookmeyer, K.A., Oliver-Veronesi, R.: Creating innovative STI testing options for university students: the impact of an STI self-testing program. Sex. Transm. Dis. 45(4), 12–35 (2017) 5. Yang, Z., Cai, H., Shao, W.: Clarifying the hydrological mechanisms and thresholds for rainfall-induced landslide: in situ monitoring of big data to unsaturated slope stability analysis. Bull. Eng. Geol. & Environ. 78(4), 2139–2150 (2019) 6. Sahoo, S., Panda, R.K.: Exploring entrepreneurial orientation and intentions among technical university students: role of contextual antecedents. Educ. Train. 63(43), 324–347 (2019) 7. Becker, B., Roper, S., Love, J.: The effectiveness of regional, national and EU support for innovation in the UK and Spain. J. Pediatr. Gastroenterol. & Nutr. 20(1), 176–183 (2017) 8. Gossec, L., Kedra, J., Servy, H.: EULAR points to consider for the use of big data in rheumatic and musculoskeletal diseases. Ann. Rheum. Dis. 282(164), 215–216 (2019) 9. Goldfarb, L.: Stevens’s poetics of variation as a guide for teaching. Wallace Stevens J. 41 (16), 7–32 (2017)
736
H. Zhang
10. Pathak, A.R., Pandey, M., Rautaray, S.S.: Approaches of enhancing interoperations among high performance computing and big data analytics via augmentation. Clust. Comput. 35 (63), 1–36 (2019) 11. Zhong, Z., Hu, D., Zheng, F.: Relationship between information-seeking behavior and innovative behavior in Chinese nursing students. Nurse Educ. Today 63(15), 1–6 (2018) 12. Magen-Nagar, N., Steinberger, P.: Characteristics of an innovative learning environment according to students’ perceptions: actual versus preferred. Learn. Environ. Res. 20(1), 1–17 (2017) 13. Chandran, S., Kishor, M., Bhargava, S.: An innovative concept book guide for MBBS students. Indian Journal of Psychiatry 59(4), 525–526 (2017) 14. Zhao, G., Xie, D., Xiamen University.: Misunderstanding, difficulties and breakthrough of innovative teaching in China′s universities. J. High. Educ. Manag. 83(53), 7–11 (2017) 15. Downing, K., Taylor, C.: HIM students help build an innovative path to information governance. J. Ahima 88(2), 36–39 (2017)
Discussion on the Application of Computer Technology in the New Media Era Xiaona Li(&) Jiamusi University, Jiamusi, Heilongjiang, China [email protected]
Abstract. With the progress of science and technology, electronic information technology has developed at a fast speed. Computer technology has been applied in many different areas in media technologies. The most important industry is the media industry. The use of computer technology can promote the rapid development of the media industry. In the use of computer technology, the media industry is changing its traditional state of development. They are gradually modernizing and providing science and information. Combining years of work experience, the author mainly analyzes how to use computer technology correctly and effectively in the context of new media. Keywords: New media
Computer technology Media Application
1 Introduction China’s science and technology has obtained continuous development. Under the influence of the biggest socialization process and progress of China’s media industry in the information age, as well as communication and people, and the use of upgrading cooperation between multimedia technology has become a major capital asset and facility, among them, the development and progress of China at this stage especially in the development of the media industry, computer technology plays an important role.
2 The Value of Computer Technology in Media Industry In generally, the development of new media industry is the result of the progress of science and technology with the times. It includes different industries, different independent systems. Under the background of the continuous progress of human society, the system structure is gradually growing and maturing [1]. Besides, the media industry has certain functions and objectives. You can study further in the field of media. You need network management and computer technology to support sustainable media development. Improve staff management efficiency and timeliness of news release. As an organic whole, the media industry involves the planning, production, editing, word processing and other tasks of development programs. If these types of equipment are in stock, so the main role of the media industry will play a full role. Computer technology with the feature of agility, flexibility and intelligence can accomplish many tasks that human resources can not achieve. For instance, computer-aided automatic control © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 737–742, 2021. https://doi.org/10.1007/978-3-030-51431-0_107
738
X. Li
technology can accelerate the development of broadcast control, transmission and information transmission system on TV [2]. In the media industry, the use of computer technology can process and form digital signals. During the process of automatic control of computer technology, the stability of media industry has improved and the reliability is guaranteed. Computer technology and network communication technology can provide data, equipment and procedures to the media industry to monitor the whole process, it improves the overall equipment planning and operation methods of the media industry, which simplifies the workflow of each rim and the efficiency of aumjobes BS. The use of computer technology can promote the development of media industry. For example, in TV production, using 3D animation can make media works more three-dimensional and prominent. Wonderful scenes, the performance of character animation, can produce us stunning visual effects to achieve the perfect combination of technology and art to step into new areas for creative games. When it is used as a non-linear editing system, it can store images and sound into hard disk then use various editing methods to replace the limitations of traditional methods. Therefore, the use of computer technology in the media industry has contributed to the sustainable development of the media industry. That is the reason why it can exist anywhere.
3 The Impact of Computer Technology on Modern Media 3.1
Changes in Information Dissemination
Up to the present, the development speed of computer network technology has represented an exponential trend, which also leads to a huge change in the way of information distribution. When the Internet appeared for the first time, the main channel to gain information by network technology was websites, followed by the creation of instant messaging tools represented by foreign MSN and QQ from internal Tencent, which would lead people to receive information accordingly. Since then, the emergence of communication tools such as personal cyberspace, blog, microblog and wechat has enhanced the communication between people without delay [3]. Even some media industries have used microblog as an important tool to promote policy information. More than the news industry, microblogging is also used to release news faster and encourage journalists to obtain news materials in news websites as soon as possible. 3.2
Wireless Devices Become the Main Carrier
With the rapid development of computer technology in China and the use of various communication and electronic technologies, China’s personal mobile network communication has entered into the 4G era, which is also a deep integration of computer technology and Internet technology to a certain degree. Based on this status, the scale of the media is expanding. In recent years, with the continuous improvement of China’s scientific and technological level, smart phones have become widespread on a large scale [4]. In the age of smart phones, wireless devices are increasingly becoming the main tool for the masses to access information. In addition to mobile devices, people
Discussion on the Application of Computer Technology
739
can also install various news programs to view, interact and communicate in real time and express their views and opinions on events. 3.3
Information Content Structure Quietly Changed
At the beginning of the Internet development writing messages is the main way to spread information. With the development of technology, the bandwidth of the network was constantly expanding and increasing. Online video has gradually become the main trend in the development of modern society and will be put into practice. This development mode will cause changes in the basic characteristics of information dissemination [5]. From the perspective of video technology, the forms of online live video broadcasting and online live streaming have become highly diversified. The development of computer technology has led customers to use TV programs, such as mobile phone use areas. The terminal plays the video in real time. However, not only this model’s development has the real-time function, but also is brighter on the screen, which can effectively meet the user’s requirements for image quality [6]. At the same time, users can spontaneously upload parts of their daily life to the public network platform, thus it contributes to the total amount of information in Internet media, moreover, these information is much than the capacity of media’s. Campus media is also affected if we develop computer network technology, for example, students can use computer network technology to find the materials they need. Using school technology in the school library not only makes it easier for students to find relevant materials, but also increases the influence of campus network media [7]. In addition, students will have some influence in the aspects of entertainment and dating. Compared to traditional methods, students can use the online chat feature for video chatting, networking and interacting with others. Teachers can also use network technology to change the traditional daily teaching methods, so that the teaching content is more abundant and the teaching methods are more diverse.
4 Application Status of Computer Technology in Media Industry The weak development of the Internet and digital technology has led to a profound adjustment in the media blue spirit and huge changes in the ecology of public opinion. In terms of media development, more and more people receive information through advanced media. The younger generation uses the Internet as an important means of obtaining information. Mainly manifested in the developed online media has a huge impact on traditional media. There are two reasons for this: first, the social environment has changed. Second, technological change [8]. The development of mobile network has helped people can get all kinds of information in the mobile environment. The development of technology provides more choices for the media, which leads to the unprecedented depth, breadth and height transformation of the media. With the development of media, mobile has become an inevitable choice. Mobile network not only connects with users, but also develops in the field of media editing and production gradually becoming a production tool. However, with the rapidly develop in computer
740
X. Li
technology industry the development of China’s started late, which caused many problems in the use of computer technology in the media industry. 4.1
Corresponding Technical Means Are Not Perfect
In order to help the media industry move forward, we need to look these issues from a development perspective. Historically, America is the first pioneer in the development of computer technology and its application in the social development industry in the world. However, China has not conducted socialist reform policy and it started very late. Most of the development of computer technology is to learn and introduce from foreign countries [9]. Due to lack of basic technology Therefore, China’s media industry has many limitations in the use of computer technology, some problems can not be solved in time, it consumes a lot of human, material and financial resources. 4.2
Not Enough Attention on the Application of Computer Technology
The development of the media industry has obvious characteristics, it is a gradual process, but not all industry personnel can actively recognize emerging things and these things can easily be ascribed to the fact cannot be developed on the basis of computer technology. If we do not pay attention to the leading trends in the development of the media industry, it will lead to insufficient use of computer technology in the media industry, and eventually lead to some restrictions and obstacles in the development of the industry.
5 The Specific Application of Computer Technology in the Media Industry in the New Media Era 5.1
Promote Integration Between Media
The development of computer technology has effectively integrated the improvement of Internet technology and finally effectively improved the transmission of various information. At the current stage of the media, it has attained great progress in the reform and innovation process, with unprecedented changes in the relevant media. For the media industry to effectively promote its integration with the times, it needs to conduct research and analysis on the real communication content, communication platforms, communication channels and operator management with diverse threedimensional structure. At the same time, appropriate decision-making and leadership are needed. 5.2
Cultivating Highly Qualified Professionals
High-quality professionals play a key role in the development of the media industry, so talent is the key to media development. Therefore, at the stage of the new media era, computer-based talents will help media industries to achieve development. Computer professional talent training, strengthen, establish a scientific management digital
Discussion on the Application of Computer Technology
741
collection and editing center to get a higher level of technology and new media talent team, especially in the text, different forms such as expressions, pictures and videos, it needs to clear increased forms, which can be transferred to personal computers and mobile computers for inspection and analysis. In addition, a large number of qualified staff training can further promote the development of the media industry, help the industry effectively stabilized [10]. Make sure the complexity and stability of the industry; every detail of the company and actual work processes hold the attitude with “concentrated, patient and attentive” working attitude, which has contributed to the development of the media industry. 5.3
Strengthening the Importance of Computer Technology Applications
China’s media industry has made great progress at this stage, but under the influence of the information age and the new media era, it is necessary to strengthen the practical application of computer technology and give enough attention on related computer technology to become one of the most important developments. For example, to raise enough special funds in the media industry provides sufficient protection for the purchase, maintenance computer equipment. However, in order to improve the universality and adequacy of the information in television media, computer technology should be used to edit news topics and related materials in a timely manner. Meanwhile, the development of creative concepts, which are more modern science and technology for the stable development of the content of the media industry, and the use of integrated distribution methods to maximize the macro and micro adjustments, enable traditional media and the new media era of the media to be able to communicate to achieve an open and shared platform. In this way, the advantages of computer technology can be brought into full play and reflect in the further development and innovation of the effective reform process.
6 Conclusion With the rapid development of computer technology in this age, China’s media industry has also made great progress. However, according to the research results, it still has many problems and deficiencies in using computer technology. If we are really want to solve the problems and promote the rapid development of the media industry, we must promote innovation and expand the training of computer and media talents to make the development of China’s media industry more scientific and informative.
References 1. Bohan, Y.: Discussion on the application of computer technology in the media in the new media era. China Media Sci. & Technol. 7, 41–42 (2018) 2. Yonggang, Z.: Discussion on the application of computer technology in the media in the new media era. China Newsp. 6, 63–64 (2017)
742
X. Li
3. Xiaodong, S., Qingxu, Z.: Application of computer technology in media in the new media era. Sci. & Technol. Innov. Appl. 28, 83 (2016) 4. Juan, Y., Zhiwei, Q., Bing, H., et al.: Exploration of the construction of diversified media labs in the age of media convergence. Mod. Educ. Technol. 10 (2012) 5. Jing, G.: The impact of the development of information technology on the media industry. SME Manag. Sci. Technol. 36 (2012) 6. Jiawei, L.: Analysis of the role of computer technology in contemporary media. Commun. World 14 (2016) 7. Yu, L.: Digital media and traditional media in the internet age. China Media Sci. Technol. 6 (2014) 8. Wei, G.: Exploration on the application of computer technology in cable digital television system. China Media Sci. & Technol. 10 (2014) 9. Leng, L., Shan, G.: Analysis of university network public opinion management based on big data. Int. J. Front. Eng. Technol. 1(1), 38–47 (2019) 10. Li, Y.: A comparative study of tourism business models in the internet era. Int. J. Front. Sociol. 1(1), 99–108 (2019)
Evaluation of Scientific and Technological Innovation Capability in Guangzhou Based on Cross-Efficiency DEA Xue Deng1, Ying Liang1, Luyao Feng2, Chuangjie Chen1, and Junfeng Zhao3(&) 1
School of Mathematics, South China University of Technology, Guangzhou 510640, Guangdong, China 2 School of Finance, Shandong University, Jinan 250100, Shandong, China 3 Department of Mechanical Engineering, Guangdong College of Industry and Commerce, Guangzhou 510510, Guangdong, China [email protected]
Abstract. With the rapid development of the society, scientific and technological innovation has become a hot topic. This paper firstly constructs an evaluation index system for Guangzhou’s scientific and technological innovation ability. As we know that the traditional DEA model only pays attention to its own superiority index, ignoring the problem that there are too many effective units, which lead to the inability to give accurate ranking results of effective decision-making units. In order to overcome the limitations of the DEA model, this paper uses three types of cross-efficiency DEA models, including the friendly, confrontational and neutral type, to obtain the efficiency values and precise ranking of each decision-making unit. The results show that the three methods have differences, but they all passed the Kendall’s W test. In addition, this paper uses the vertical analysis to classify the scientific and technological innovation ability of each district of Guangzhou. Keywords: Scientific and technological innovation ability Cross-efficiency Kendall’s W test
DEA model
1 Introduction Since the DEA model was proposed by Charnes [1] et al. in 1978, the exploration and application of the DEA model has gradually become hot topics. Many experts and scholars have conducted extensive research on DEA models. Doyle [2] et al. studied the efficiency and cross-efficiency in DEA. Bao [3] et al. proposed an interpretation to the cross-efficiency method in DEA. Cui [4] et al. used the improved DEA model to evaluate and analyze the efficiency of the production environment in China in recent years. Xu [5] et al. established an index system for evaluating input and output of agricultural informatization under the CCR model and the super-efficient DEA model. Lian [6] et al. carried out a dynamic analysis of Sichuan’s regional scientific and technological innovation capabilities. Nikitin [7] et al. studied the generalization of Kendall’s tau and the asymptotic efficiency of the corresponding independence test. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 743–751, 2021. https://doi.org/10.1007/978-3-030-51431-0_108
744
X. Deng et al.
Youn [8] et al. assumed that the limited resources divided by the university scale were maximized. Based on the classification of universities, a positive-negative effect DEA model based on input and output was constructed to evaluate the current status of the university. Kempkes [9] et al. used the data envelopment method and stochastic frontier analysis method to analyze the running efficiency of German public universities. Guangzhou, as a central city of China, has outstanding comprehensive strength and a solid resource base. In recent years, it has made gratifying achievements in the investment of scientific and technological resources, patent inventions and the development of high-tech enterprises. However, there are also many problems. It can be seen that the results have certain theoretical and practical significance by using the crossefficiency DEA model to correctly understand and evaluate Guangzhou’s scientific and technological innovation capabilities in promoting economic development and enhancing urban competitiveness.
2 The Construction of the Evaluation Index System The main components of the city’s scientific and technological innovation abilities comprise the input and output of scientific and technological innovation. Among them, the output of scientific and technological innovation includes the output of knowledge achievements and socio-economic benefits. Specific indicators are divided into the following two categories. (1) Input indicators: Investment in human and financial resources is a necessary condition for scientific and technological activities, a basis and driving force for scientific and technological innovation, and a necessary condition and key factor for a city’s ability to enhance its scientific and technological innovation. (2) Output indicators: Knowledge achievements are important results of scientific and technological activities of scientific and technological innovation units such as research institutes and universities. Besides, technological spillovers from technological innovation will also play an important guiding role in transforming economic development methods and improving ecological environment. Therefore, we must also add socio-economic benefits to the evaluation of urban science and technological innovation abilities. With reference to previous literature and combining the principles of data availability and comparability, we construct an evaluation index system for Guangzhou’s scientific and technological innovation abilities: ① first-level indicator: input indicator P and output indicator Q; ② second-level indicator: R & D personnel full-time equivalent P1 and internal expenditure of R & D funds P2, these two under the input indicator P; the number of patent applications authorized Q1, the number of scientific papers Q2, the technology market contract turnover Q3, and the high-tech product output value Q4, these four under the output indicator Q.
Evaluation of Scientific and Technological Innovation Capability
745
3 The Building of the Model 3.1
Basic DEA Model
Suppose there are n comparable departments or units (called decision-making units, abbreviated as DMU), and each DMU has m types of inputs and s types of outputs. xj indicates the number of inputs of the j-th DMU, yj indicates the number of outputs of the j-th DMU, v is the input weight, and u is the output weight. A CCR model for evaluating the decision unit DMUj0 can be established ð 1 j0 nÞ. For convenience, note that x0 ¼ xj0 ; y0 ¼ yj0 , for each decision unit DMU, we have corresponding efficiency evaluation values: hj ¼
uT y j ; j ¼ 1; 2; ; n: vT xj
ð1Þ
Assuming hj 1, the objective function is to find the maximum value of DMUj0 ’s efficiency. We can build a CCR model as follows: 8 > > > > > < s:t > > > > > :
max hj0 ¼ hi ¼
uT y 0 vT x0
uT y j 1; ðj ¼ 1; ; j0 ; ; nÞ vT xj
ð2Þ
v 0; u 0:
Model (2) is an optimization model in fractional form. We use C 2 transformed, and let x ¼ tv, l ¼ tu, t ¼ 1=mT xi , transform (2) into its equivalent linear programming model PIC2 R : 8 max hj0 ¼ lT y0 > < ð3Þ s:t xT xj lT yj 0 ; ðj ¼ 1; 2; ; nÞ > : T x x0 ¼ 1; x 0; l 0: The dual model DIC2 R of model (3) can be expressed as: 8 > > > > > > > > s:t > > < > > > > > > > > > > :
min hj0 ¼ h n X
kj xj hx0 0;
j¼1 n X
ð4Þ kj yj y0 0;
j¼1
kj 0 ðj ¼ 1; 2; ; nÞ:
746
X. Deng et al.
Model (4) reconstructs an effective virtual decision unit relative to DMUj0 . Due to the optimal value h 1, the input of this virtual unit is less than or equal to the input of DMUj0 , and its output is greater than or equal to the output of DMUj0 . 3.2
Cross-Efficiency DEA Model
The essence of the model is that based on the CCR model, using the best weights xj and lj of the j-th decision unit DMUj to calculate the efficiency value of the k-th decision unit DMUk . The calculation formula is: Ejk ¼
uTj yk ; vTj xk
ðk ¼ 1; 2; ; n; j ¼ 1; 2; ; nÞ:
ð5Þ
Where Ejk refers to the efficiency value obtained by DMUk ðk ¼ 1; 2; ; n; k 6¼ jÞ using the weight of DMUj ðj ¼ 1; 2; ; nÞ, and Ekk is the self-evaluation efficiency value of DMUk . Calculate the average value Ej of the cross-efficiency of each column. The larger the Ej , the better the decision unit. To solve the multi-solution problem of cross-efficiency DEA, there are three strategies can be adopted: friendly cross-evaluation, adversarial cross-evaluation and neutral cross-evaluation: (1) Friendly cross-efficiency DEA model: 8 > > > > > > > < s:t
max hjk ¼ lT yk xT xd lT yd 0 ; ðd ¼ 1; 2; ; nÞ lT yj ¼ Ejj xT xj ;
> > > > > > > :
ð6Þ
x xk ¼ 1; T
x 0; l 0:
(2) Adversarial cross-efficiency DEA model: 8 > > > > > > > < s:t > > > > > > > :
min hjk ¼ lT yk xT xd lT yd 0; ðd ¼ 1; 2; ; nÞ lT yj ¼ Ejj xT xj ; x xk ¼ 1; T
x 0; l 0:
ð7Þ
Evaluation of Scientific and Technological Innovation Capability
747
(3) Neutral cross-efficiency DEA model: In reality, complete alliances or hostility between decision-making units rarely occur. The calculation results given by the friendly model and the adversarial model using the optimal weights are usually different, and currently there is no effective way to choose one from the two models. To solve this problem, Wang [10] et al. proposed a neutral cross-efficiency model. It introduces the second objective function based on the first objective function lT yi of the CCR model: max d ¼ min
uT yrj : vT xj
ð8Þ
uT y
Among them, vT xrjj refers to the r-th output index efficiency value of the j-th decision unit. Then we can build the neutral model: 8 > > > > > > s:t > > > > > >
> > > > > > > > > > > :
T
ðd ¼ 1; 2; ; nÞ lT yj ¼ Ejj xT xj ; lr yrk d 0;
ð9Þ
x xk ¼ 1; T
x 0; l 0; d 0:
The specific steps of the three types of cross-utility DEA can be expressed as: Step 1: Solve the CCR model to obtain the self-evaluation efficiency value of each decision unit. Step 2: Introduce the secondary objective and give j 2 f1; 2; ; ng;k 2 f1; 2; ; ng, where j 6¼ k; solve the linear programming model to determine the crossefficiency weight. Step 3: Substitute the optimal solution ljk and xjk into the objective function T
Ejk ¼ ljk yk to find the cross-evaluation value, and calculate the average value of the cross-efficiency values in different columns to obtain the cross-evaluation matrix.
4 Empirical Research 4.1
The Collection of Data
The data was collected according to the evaluation index system, and the data were taken from “Guangzhou Statistical Yearbook”, “Guangzhou Science and Technology Statistical Data”, “China Science and Technology Statistical Yearbook”, statistical bulletins and statistical yearbooks of various cities. The specific data are shown in Table 1.
748
X. Deng et al. Table 1. Data collection form for Guangzhou Years District 2016 Liwan Yuexiu Haizhu Tianhe Baiyun Huangpu Panyu Huadu Nansha Zengcheng Conghua 2017 Liwan Yuexiu Haizhu Tianhe Baiyun Huangpu Panyu Huadu Nansha Zengcheng Conghua
P1 269 2250 2250 5927 564 1271 451 90 570 31 0 193 3135 2308 5931 547 1263 380 59 621 57 0
P2 (thousand yuan) Q1 Q2 Q4 (ten thousand yuan) 94,905 31 209 1,106,982 1,866,902 114 1351 507,114 1,293,169 187 1187 931,694 2,458,180 441 3327 4,068,998 250,055 7 213 3,537,340 776,062 92 483 37,875,197 525,240 16 419 9,568,444 13,531 8 2 9,217,309 191,510 102 152 15,630,742 7653 1 11 6,723,545 0 0 0 1,931,108 115,936 45 216 2,139,536 2,753,213 156 1425 118,852 1,430,499 233 1043 768,762 2,684,726 622 3609 1,583,315 319,621 6 107 2,917,074 919,286 96 523 30,932,759 305,919 20 334 12,437,316 12,488 13 1 11,838,851 198,958 152 156 13,080,599 2321 0 15 5,492,923 0 0 0 1,005,868
Because there is no data on the technical turnover of each district, we do not use this indicator when comparing the districts in Guangzhou. It can be seen in Table 1 that the investment indicator data of Conghua District in 2016 and 2017 are all zero, so it isn’t ranked. 4.2
Longitudinal Comparative Analysis
(1) Evaluation of three cross-efficiency DEA models in the districts of Guangzhou Applying the data to the CCR model and the cross-efficiency DEA model, and using MATLAB to derive the efficiency values to rank Guangzhou’s districts in 2016 and 2017, the data are shown in Tables 2 and 3.
Evaluation of Scientific and Technological Innovation Capability
749
Table 2. Some DEA results of Guangzhou’s districts District
CCR Model 2016 Efficiency Ranks Liwan 1 1 Baiyun 0.484 6 Panyu 1 1 Huadu 1 1 Average 0.823 −
2017 Efficiency 1 0.192 0.903 1 0.708
Friendly cross-efficiency DEA 2016 2017 Ranks Efficiency Ranks Efficiency 1 1 1 1 7 0.402 10 0.161 2 0.864 2 0.734 1 0.614 8 0.794 − 0.705 − 0.581
model Ranks 1 10 3 2 −
Table 3. Some DEA results of Guangzhou’s districts District
Liwan Baiyun Panyu Huadu Average
Adversarial Cross-efficiency DEA Model 2016 2017 Efficiency Ranks Efficiency Ranks 0.756 1 0.779 1 0.269 10 0.109 10 0.587 2 0.485 3 0.340 9 0.585 2 0.481 − 0.404 −
Neutral Cross-efficiency DEA Model 2016 2017 Efficiency Ranks Efficiency Ranks 0.796 1 0.837 1 0.298 10 0.134 10 0.697 3 0.604 3 0.518 7 0.706 2 0.574 − 0.481 −
From Tables 2 and 3, we can draw the following conclusions: • The cross-efficiency DEA model can completely rank the decision units, even if the efficiency values of these units are 1 in CCR model. • The average efficiency of science and technology innovation obtained by crossefficiency DEA is lower than that of CCR model. In addition, in 2016, Huadu District was evaluated effectively in the CCR model, but its evaluation result in the cross DEA model was not good as that. It can be seen that the cross-efficiency DEA model is more accurate than the CCR model. • Comparing the efficiency values of the three cross-efficiency DEA models, we can find that the efficiency values of each decision-making unit are highest in the friendly type, lower in the neutral type, lowest in the antagonistic type, which is consistent with the previous conclusions. • From the perspective of cross-evaluation efficiency in each districts, the efficiency values of Liwan District and Panyu District are higher, but that of Baiyun District are significantly lower than the average, indicating that the abilities of technological innovation in Guangzhou are uneven. (2) Consistency test of three cross-efficiency DEA evaluation results Among the ranking results of the three cross-efficiency DEA models, most of the decision units have the same ranking, but that’s not exactly the same. Therefore, we
750
X. Deng et al.
need to reasonably verify the consistency of the three groups of evaluation results to determine whether the evaluation results can be used as a basis for further analysis. This paper uses Kendall’s W test. The test results are shown in Table 4. It can be considered that the evaluation results are consistent. Table 4. Kendall’s W test results Inspection index 2016 2017 W 0.968 0.989 26.127 26.709 v2 Progressive saliency P 0.002 0.002
5 Conclusions On the basis of analyzing the connotation of scientific and technological innovation ability, the construction of an evaluation index system for the scientific and technological innovation ability of Guangzhou is established. The efficiency values and accurate rankings of each decision-making unit were obtained by using friendly, adversarial and neutral cross-efficiency DEA models. The results show that the three methods have differences, but they all passed the Kendall’s W test. Through longitudinal analysis, we obtained the classification of scientific and technological innovation abilities of Guangzhou’s districts, which shows that Liwan and Panyu have great technological innovation abilities, but Baiyun has poor results. Acknowledgements. This research was supported by the “Humanities and Social Sciences Research and Planning Fund of the Ministry of Education of China, No. x2lxY9180090”, “Natural Science Foundation of Guangdong Province, No. 2019A1515011038”, “Soft Science of Guangdong Province, and No. 2018A070712002, 2019A101002118”, and “Fundamental Research Funds for the Central Universities of China, No. x2lxC2180170”. The authors are highly grateful to the referees and editor in-chief for their very helpful comments.
References 1. Charnes, A., Cooper, W.W., Rhodes, E.: Measuring the efficiency of decision making units. Eur. J. Oper. Res. 2(6), 429–444 (1978) 2. Doyle, J., Green, R.: Efficiency and Cross-efficiency in DEA: derivations, meanings and uses. J. Oper. Res. Soc. 45(5), 567–578 (1994) 3. Bao, C.P., Chen, T.H., Chang, S.Y.: Slack-based ranking method: an interpretation to the cross-efficiency method in DEA. J. Oper. Res. Soc. 59(6), 860–862 (2008) 4. Cui, Y.Q., Shi, L.J., Fang, Y.W.: The application of improved DEA model in evaluation of China’s production comprehensive efficiency. Mech. Eng. Technol. 125, 685–694 (2012) 5. Xu, H., Wang, L., Wang, H., Wang, S.Q.: Efficiency evaluation of agricultural informatization based on CCR and super-efficiency DEA model. International Conference on Computer and Computing Technologies in Agriculture. CCTA, 240–246 (2014)
Evaluation of Scientific and Technological Innovation Capability
751
6. Liang, X.D., Si, D.Y., Li, Z., Liu, T.: Dynamic analysis of regional scientific and technological innovation capacity—a case study in Sichuan province. Proceeding of the 24th International Conference on Industrial Engineering and Engineering Management. 315–323 (2018) 7. Nikitin, Y.Y., Stepanova, N.A.: A generalization of Kendall’s tau and the asymptotic efficiency of the corresponding independence test. J. Math. Sciences. 99(2), 1154–1160 (2000) 8. Youn, J.W., Park, K.: Development of assessment model for research efficiency of universities, pp. 19–36. Managing Service Productivity. Springer Heidelberg (2014) 9. Kempkes, G., Pohl, C.: The efficiency of German universities–some evidence from nonparametric and parametric methods. Appl. Econ. 42(16), 2063–2079 (2010) 10. Wang, Y.M., Chin, K.S., Luo, Y.: Cross-efficiency evaluation based on ideal and anti-ideal decision-making units. Expert Syst. Appl. 38(8), 10312–10319 (2011)
Computer Security Vulnerabilities and Preventive Measures Binbin Jiang(&) Nanyang Institute of Technology, Nanyang 473004, China [email protected]
Abstract. With the development of economy and the progress of science and technology, computer network has been widely used in every field of development in our country, and effectively promote the coming of China’s social information age. As an open tool, the network is widely used in people’s daily life, but it is also because of this characteristic that the computer network is faced with great security problems. If a security vulnerability occurs in a computer network, it will cause huge losses to tens of thousands of network users. This paper mainly analyzes the security problems existing in computer networks, and puts forward some preventive measures for the vulnerabilities of network security. Keywords: Computer
Network security Vulnerability Precautions
Nowadays, developed network technology has penetrated into various fields, but also enriched people’s lives, to people’s work has brought a lot of convenience. For example, people now like online shopping, daily necessities will be purchased from the Internet, so will use the online payment function, if in the payment, security vulnerabilities will make people’s money suffered serious losses. In fact, there are many examples, and involve many aspects, so the issue of network security must be attached to, with the right measures to protect people’s property security and to maintain the normal operation of the network order.
1 Computer Network Security 1.1
Computer Security
Regarding what computer security is, we can refer to the definition of ISO (International Organization for Standardization), which generally means to take certain management measures and technical means to protect the hardware, software and related data in the computer network system from damage, change and leakage by its own and external human factors. As we can see from this, computer security mainly includes two aspects: physical security and information security. Information security, also known as logical security, protects the security, integrity and effectiveness of information [1–4]. Because network security is based on information security, it is an extension of information security, therefore, we say that network security refers to the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 752–759, 2021. https://doi.org/10.1007/978-3-030-51431-0_109
Computer Security Vulnerabilities and Preventive Measures
753
security, integrity and effectiveness of network information to protect. At present, the common network security problems in computer mainly include hardware security and software security. 1.2
Definition of Network Security
The term “security” is defined in the dictionary as “unthreatening, free of danger, danger, loss” and “measures taken to prevent inter-operation or deliberate sabotage, crime, attack or flight”. In the IT industry, there are some differences between the three issues involving security, information security and computer security. Network security mainly studies the security issues of data transmission, data storage and data access control in network environment, which are mainly caused by the network, while computer security mainly studies the security of computer single machine, including computer data protection, computer use and access control, computer environment security, etc. Information security mainly refers to data security [5–7]. Network security refers to the protection of the hardware, software and data in the network system and its system, not damaged, changed, leaked due to accidental or malicious reasons, the system continues to run normally, network services are not interrupted. Network security is essentially information security on the network. The specific meaning of network security varies with the “angle”. For example, when some organizations have valuable data, network security is defined as not being accessed by the outside world, some users need to provide information to the outside world, but do not modify the information, then network security is defined as data can not be modified by the outside world, and some users pay attention to the privacy of communications. Network security is defined as information that cannot be intercepted or read by others, and some users have more complex definitions of security, dividing data into different levels, some of which are confidential to the outside world, and some levels of data that can only be accessed by the outside world and not modified. Therefore, in a broad sense, all the technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network belong to the scope of network security. At the heart of network security is data security, which is data integrity, availability, and confidentiality. Specifically: Data integrity: Means to ensure that data and information on a computer system are in a complete, undamaged state. Such as data tampering, deletion, etc. Data availability. The availability of data, no matter what kind of dangerous environment the system is in, ensures that the data is available. This is generally achieved by technology such as redundant data storage [8–10]. Data confidentiality (data. Ensure that only authorized users can access the data, and restrict access to the data by others. The confidentiality of data is divided into network transmission confidentiality and data storage confidentiality. Typically, data encryption is used to keep network transmissions confidential, and through access control and data encryption to ensure the confidentiality of data storage.
754
1.3
B. Jiang
Basic Characteristics of Network Security
A secure computer network should contain physical security, access control security, system security, user security, information encryption security, secure transmission and management security, etc., generally with the following characteristics: Confidentiality: The nature of information not disclosed to unauthorized users. Integrity: A feature that cannot be changed without authorization of data. That is, the information in the storage or transmission process to maintain the characteristics of not modified, destroyed, lost. Availability: Features that can be accessed by authorized users and used as required. That is, you can access the information you need when you need it. For example, denial of service in a network environment, disruption of the network and the normal operation of the related systems, etc. are all attacks on availability [11]. Controllability: The ability to control the dissemination and content of information. Reviewability: the basis and means that can be provided in the event of security problems.
2 The Importance of Computer Security According to the authoritative definition of information industry, computer software mainly refers to the internal programs and documents of its system, and at the same time can divide it into system software and application software. Computer software can only be able to run on the computer through the program to the specific state of the software, computer software security issues directly affect the performance of the computer, especially in the current, with the high prosperity and rapid development of China’s e-commerce market, improve the enterprise, personal computer security management, It is of great practical significance to ensure the healthy development of e-commerce industry and to ensure the information and financial security of users and enterprises.
3 Types of Computer Network Security Vulnerabilities Computer network system, more vulnerable to security vulnerabilities, subject to different degrees of risk threat. Network security vulnerabilities can be manifested in a variety of ways, such as worms, virus programs, DNS attacks, etc. 3.1
System Vulnerability
The network system itself has the characteristics of resource sharing and interaction, which can meet the user’s demand for all kinds of computer functions and increase the expandability of computer system. Based on a number of functions of the system environment, there must be many loopholes, resulting in vulnerability attacks, the longer the cycle of computer network operation, the higher the probability of vulnerability exposure, breaking through the system compatibility constraints. Link is the
Computer Security Vulnerabilities and Preventive Measures
755
basic support of system work, the link in the system in the network file interaction, it is necessary to encounter files or hidden vulnerabilities in the system, such as: protocol vulnerabilities, physical vulnerabilities, resulting in data loss, the formation of systemtype vulnerabilities. 3.2
Illegal Access Vulnerabilities
With the continuous development of computer network, illegal access and other vulnerabilities are more and more common in computer networks, so that many computer users have been seriously disturbed. The vulnerability of illegal access is mainly the use of computer storage functions, attackers use various means to steal relevant data, or change the original data in the computer, the original part of the system to change, can no longer continue to serve the user, resulting in the loss of user information. Although the current computer operation is diversified, but in the final analysis is to provide software platform, with the increasing lyse of computer features, the variety of vulnerabilities will increase, which provides opportunities for illegal access and other vulnerabilities. If the computer itself cannot distinguish such a situation, the security vulnerability of the database will put more users in danger, and even illegal access, which in turn poses a threat to the security of the server. 3.3
Virus Intrusion Vulnerability
The computer is infected mainly in the computer internal hardware and other problems, the attacker through the computer internal unauthorized content to destroy, resulting in computer network failure. China’s network environment in recent years is constantly changing, people can go to the Internet through various means, but users ignore the security of the computer itself, with the virus continues to mutate, the extent of the network damage is also increasing. The way of virus intrusion is the virus or such a spreader will destroy the computer network code into the computer program, the computer virus itself is infectious, people use the computer network process, if the network system does not have a security system will be attacked by the virus, and thus let the user’s information is stolen, And caused huge economic losses. 3.4
Network Protocol Security Vulnerability
From the perspective of TCP/IP protocol in computer network, the main function is to keep communication running normally, and then to ensure the normal transmission of information, and finally to make the data can be presented with accuracy. TCP/IP protocol has a loophole, that is, there is no internal control mechanism to support the source address identification, can not confirm the true source of IP address, which allows hackers through various means to steal relevant data, to tamper with transmission routes, so as to network security to destroy.
756
3.5
B. Jiang
IP Address Theft
The theft of IP addresses is a very common phenomenon, because the theft of IP addresses is the theft of unauthorized addresses, and use these addresses to destroy network resources, but also can hide the identity of the author of the misappropriation. On the other hand, the theft of IP address seriously affects the normal operation of the network, if the stolen IP address permissions are relatively high, it will lead to the network can not function properly, so as to bring serious losses to the user’s economic interests.
4 Computer Security Initiatives At this stage we have shipped so many computer security problems, we have many ways to solve these problems quickly, although dare not say in a moment and a half will be able to sweep away all the disadvantages, but I believe that there will be a day to make our network more secure. Then there should be those initiatives that can curb these problems, in my own light view, there are the following points should be strengthened: 4:1. We want to crack down on cybercrime in terms of legislation: in this respect our country obviously lags behind the developed countries, the number of netizens in our country has now exceeded 600 million, but these 600 million people do not have a special law to protect their network security, which includes the security of a large amount of personal information in their network. The application of the world of chaos, today’s China’s network world is really a mess. A large number of people with ulterior motives wantonly create and spread false information, and even blatantly scold and insult others, they are so open, because our rule of law is not sound. China’s advocate of law can be relied upon, there is law to follow, law enforcement must be strict approach in network management is missing, which also contributes to the network illegal elements of the arrogance. There are the amount of the network hacker sentencing is very vague, there is no special law to examine, so the law of the network hacker only a few, but these are these people, what they do is really shocking! So we call on countries to introduce targeted legal provisions as soon as possible to curb cyber security issues. 4:2. The Ministry of Industry and Information Technology should pay more attention to everyone’s network security: in fact, many hacker attacks can be avoided, although there are some hackers in the master of their methods are more high-end, But for a relatively low-level hacker smare The Ministry of Industry and Information Technology through their own attention can be avoided. As long as the Ministry of Industry and Information Technology in our computer link to add security systems, you can filter out a lot of hacking attacks. Because most of our computers in our country are now hung in the Ministry of Industry and Information Technology, whether it is the computer used by hackers or our private computers, as long as our network links are secure enough, then a large number of low-end hackers simply can not reach our computers, then naturally can avoid these problems. And let everyone more pleased that, after experiencing early unfamiliarity, the Ministry of
Computer Security Vulnerabilities and Preventive Measures
757
Industry and Information Technology has begun to pay attention to the vast number of Internet users of the network security issues. So we can see that in recent years, the Ministry of Industry and Information Technology for the issue of network security has been increasingly invested, and for the network link protection program has also increased the development efforts, these let us see the hope and determination to eliminate hackers. 4:3. The development of network security software should be more targeted: there are a lot of people who say i’m saying here that we have so many problems with our network security, it’s sensational because they say they have all kinds of firewalls, so their computers are secure. Most computers in China are absolutely more or less, or have been or are present in all kinds of Trojan viruses. Then why clearly installed a firewall can not block the virus, can not intercept the intrusion of hackers? The makers of these firewalls will tell you that viruses are constantly mutated, and we have a very strong library of viruses, but we can’t hold them old. Can we find a way to budget the evolution of the virus may, when possible to do as far as possible to do the first step, the virus may evolve in advance to think ahead, advance defense. But I think the security software designers and hacker viruses this is a wise game, but how many hackers, and how many people our network security software designers and practitioners, I believe that as long as we work together, then I believe we will create a more secure firewall, a firewall without a short board. I believe this day is within reach.
5 Prevention Measures for Computer Network Security Vulnerabilities 5.1
Installing Anti-virus Software in a Computer System
In the current network situation, so that more and more computers are attacked by viruses, such a situation is ultimately because the computer lack of anti-virus software, resulting in the spread of viruses, network environment is seriously damaged, and affect the operation of the computer, and the main role of anti-virus software is to remove viruses in the computer. After the installation of anti-virus software, when the computer again by the virus intrusion, anti-virus software can be timely intercept the virus and warn users, some high-end anti-virus software can even automatically enter antivirus mode, to ensure the security and order of the network environment. 5.2
Using Firewall Technology
Firewall is the most important means to protect against hackers, in the local area network and the external network between the firewall, can effectively monitor the traffic trying to enter the internal network. Users install the corresponding anti-virus software to clean up the virus, the application to carry out legitimate operations, prevent users from overstepping their access to network resources, firewall technology can identify and record the suspicious activities of illegal intrusion, so that network users can safely access the Internet. The network environment of the computer is
758
B. Jiang
closely related to each user, only by improving the security of the network system can the computer be protected from all kinds of network attacks. Firewall technology is the most fundamental way to protect against viruses in computer networks, and by creating a barrier between the Internet and computers, network systems can be protected. The current computer network users can distinguish according to their own needs of network data, firewall technology to identify the network information needed in the computer, set whether access to information is allowed to enter and other functions, only in this way can improve the security of the network. 5.3
Backup of Data
Data backup occurs in this way to prevent data from being deleted or tampered with in your computer. In the age of big data, people often use computers to store important data, but if the virus is hacked, it will lead to data tampering or theft and other security risks, but users can restore important data through data backup, thus ensuring the integrity and security of the data. Illegal users target the user’s data stored on the computer, the current amount of data is growing exponentially, the amount of information data per user is also rising, people have become accustomed to using computers to process information, a lot of data is also stored in the computer. If there is a problem with your computer’s network security, user data can be compromised. If you back up the data on a network cloud or USB stick, users can recover the data in a timely manner when the computer is attacked, ensuring that the data is secure and complete. 5.4
Using Encryption
Network encryption technology is the way in which users encrypt the data in transit when they use the computer network, so the security of the data will be greatly improved. Not only can effectively prevent the loss of data, but also will prevent the data transmission process by illegal elements to tamper with or delete. For the current network environment, encryption technology is an important means to improve network security, it is worth promoting and using by users. When users use a computer, if they can encrypt the data in advance, it will improve the confidentiality of the data, reducing the chance of data theft. Encryption technology is like a bulletproof vest of data, but also an important channel to achieve network security, only the important data encryption processing, can ensure the security environment of computer network.
6 Pay Attention to the Security of the Computer from the Daily Use 6:1 The computer should start on external equipment, such as monitors, printers, etc., and then open the host, in order to prevent the instantaneous current burned computer motherboard components; 6:2 Dust is the biggest killer of damage to the computer, daily use of the computer should pay attention to keep the computer host, monitor clean. When the display screen (especially the LCD screen) is dusty or dirty, use a soft paper towel or a
Computer Security Vulnerabilities and Preventive Measures
759
special display cloth to clean, do not wipe with a damp cloth and a rough surface paper towel, otherwise it will damage the display. 6:3 Pay attention to the computer’s sun protection, moisture, lightning protection. Don’t let the sun shine directly on the computer display (especially the LCD screen), the long-term direct sunlight will accelerate aging, causing the display to change color; Immediately shut down the computer, wait for the parts to dry water and then re-open the computer, otherwise it will cause the computer parts shortcircuit, resulting in computer damage, in case of thunderstorms, it is best not to use the computer, so as to avoid the computer parts from lightning damage.
7 Summary In a word, computer network technology has been deeply into all aspects of people’s lives, for people’s lives to provide great convenience, in order to make computer network sbetter service to people, we must ensure the reliability of computer data, security, we must strengthen the attention of network security issues. At the same time as a network user, we should also learn how to prevent network threats tips, network security depends on everyone, we join hands, there will be a secure cyberspace.
References 1. Xue, Z.: Analysis of network security vulnerabilities and preventive measures in the era of big data. Rural economy and science and technology (12) (2019). (in Chinese) 2. Li, X.: Talk about computer network security vulnerabilities and preventive measures. Science and technology information (3) (2018). (in Chinese) 3. Guo, J.: Computer-based network security vulnerabilities and their effective preventive measures. Bonding (10) (2019). (in Chinese) 4. Chen, Z.: Analysis of computer network security vulnerabilities and preventive measures. Information and computers (theoretical version) (9) (2018). (in Chinese) 5. Guan, Z.: Talk about computer network security vulnerabilities and preventive measures. Chinese and foreign entrepreneurs (1) (2018). (in Chinese) 6. Wang, L.: Computer network security vulnerability analysis and preventive measures. Information Systems Engineering (5) (2018). (in Chinese) 7. Myrica rubra: Computer network security vulnerabilities and preventive measures to explore the first. Digital technology and application (6) (2012) 8. Huang, Z.: Computer network security vulnerability and preventive measures research. Science and technology information (2) (2018). (in Chinese) 9. Yu, T., Zhang, Y.: Reflections on computer network security vulnerabilities and preventive measures. The world of digital communications (9) (2018). (in Chinese) 10. Han, J.: Computer network security vulnerabilities and prevention of the security of the computer network. Henan Science and Technology (21) (2017). (in Chinese) 11. Yang, X.: Computer network security vulnerability and preventive measures research. Network security technology and application (7) (2015)
Tolerance of the General Public to Homosexuality Based on Big Data Analysis Pengnian Jin and Xiao Wan(&) No. 51, ZJ Road, XH District, Hangzhou, Zhejiang, China [email protected], [email protected]
Abstract. As we all know, China’s legislation on same-sex marriage has not been established so far. Public opinion is an important factor affecting legislation. The purpose of this study is to explore the tolerance degree of the general public towards homosexuality, Which can provide some reference for our samesex marriage legislation. The significance of this study is to break the state of mutual isolation between homosexuals and the general public directly, so as to enhance the effective communication between the two groups and promote mutual understanding and tolerance. In terms of research methods, this paper selects several representative functional factors and United States Employment Service (USES), relevant parameters of comprehensive social survey to evaluate the inclusiveness of the general public. The study of this paper found that: compared with men, women are more tolerant of homosexual sexual behavior; With the increase of the age range, the public’s tolerance of homosexual sex tends to decrease. Among people with advantages in income and education, they also show more understanding and tolerant attitude towards homosexual sex. The general public’s tolerance of gay sex will increase as they learn more about gay sex on the Internet. However, it should be noted that there are group differences in the gain effect of the Internet, which is mainly manifested in the fact that women, urban residents, highly educated people and some young people influenced by the Internet are more affected by this effect. Keywords: Gay community Big data analysis Degree of inclusion General public
1 Introduction Public data from China’s health management portal shows that homosexual groups account for between 2.4 and 4.7% of sexually active Chinese men of the same age. For a long time, even now, homosexuals were seen as patients who needed counseling and therapy. In order to avoid treatment and discrimination, some gay people have to pretend to live a normal view of the opposite sex; Others have to control their instincts and try to fit into a heterosexual society [1, 2]. In 2016, the penetration rate of the Internet reached a historical peak. At the same time, the knowledge of homosexuality was rapidly spread, and the issue of gay rights was also widely discussed by netizens [3]. Typical cases include college students suing the Ministry of Education for “stigmatizing homosexuality in textbooks,” and an online controversy over the refusal of a © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 760–766, 2021. https://doi.org/10.1007/978-3-030-51431-0_110
Tolerance of the General Public to Homosexuality
761
gay couple in hubei province to register for marriage. The occurrence of these events suggests that people are not only discussing and analyzing the issue of homosexuality, but also thinking more accurately about how to view this group [4]. The research time of domestic scholars on homosexuality is far behind that of foreign scholars. Moreover, at the beginning, domestic scholars’ research on homosexuality only focused on college students, and tried to take individual cases of college students to study the situation of the whole society [5]. For example, some scholars have conducted a survey in henan, a populous province, and found that the attitude of college students towards homosexuality in henan is a very complicated concept, which is manifested in the phenomenon of inclusion and exclusion [6]. Some scholars also jumped out of the regional restriction and focused their eyes on the general attitude of college students towards homosexual behaviors in the whole country by means of sampling survey [7]. As time went on, the topic of homosexuality became more and more popular, and scholars in the field began to turn their research to the people across the country, and the research positioning factors became more comprehensive. There is no lack of scholars who try to use CGSS 2018 to obtain the latest information and make scientific evaluation on the public’s tolerance towards homosexuality with the help of big data information [8, 9]. It is undeniable that, on the whole, the degree of acceptance of homosexuals in the society is still at a low level at the present stage, which is derived from the moderation of traditional Chinese culture. It is also reflected in the fact that only a small proportion of people fully approve and completely deny homosexuals [10]. At the same time, the state does not give homosexuality a legal status in the legal norms. Although the localization of Chinese homosexuals is closely related to globalization, endogenity and embeddedness, such malformations in the public sphere are not completely western. Therefore, in today’s era of big data, the characteristics of collectivization have not been formed among homosexuals in China, but a form of scattered individual existence [11].
2 Factor Analysis Method 2.1
Research Design Purpose
This paper combed the Chinese the authority of the general social interview data, and using the method of order time Logit regression, the areas of the group of multiple tolerance of gays empirical investigation, the purpose is to explore the potential effect of public acceptance for gays and lesbians, guide people to objective about gay and lesbian issues, so as to achieve the goal of social harmony and development. 2.2
Research and Analysis Methods
The national comprehensive social interview project is the largest comprehensive social survey project in China. It is jointly managed by wuhan university and academic units all over the country. Since 2012, more than 10,000 sample populations nationwide have been tracked and interviewed every year, and the data obtained have very high
762
P. Jin and X. Wan
scientific and research value. Stata 5.6 analysis software was used to analyze the investigation and analysis of this paper, and sequential Logit regression was conducted for the data tracked and acquired by Chinese comprehensive social interview since 2012. The data processing method adopts Statal 5.6 scheme for analysis and processing, and its logical expression is as follows: Fx ¼ PðX xÞ ¼ 0
f ð xÞ ¼ F ð x Þ ¼
1 1 þ eðxlÞ=y eðxlÞ=y
cð1 þ eðxlÞ=y Þ2
ðð1ÞÞ ðð2ÞÞ
Before the data analysis, the study of this paper set the variable range of inclusion factor for homosexual sexual behaviors, and combined with useful research experience at home and abroad, took gender, age, educational background, income, information source and other thresholds as fixed quantities, and conducted sequential logit regression. Considering the applicable variable space exists a certain degree of tension, in order to avoid the variable dimension and different threshold due to the different influence, this article will be standardized packaging for each variable to deal with, and according to the serial number to recode, main parameters threshold includes: tolerance, gender, age, education, income, information sources. The specific formula for standardized treatment of each variable is as follows: f ð xÞ ¼
1 1 ¼ z ðw 1þe 1 þ e T x þ bÞ
ðð3ÞÞ
In the above equation, f(x) represents the regression result, which shows that among all the follow-up interviewees, there is a difference in percentage ratio between the degree of inclusion of respondents of gender and that of respondents of gender and that of other males, and the unit is accurate to the second percentage point. In the corresponding relationship between age and tolerance, we set that for every unit increase in age, tolerance decreases by 0.25 logarithm ratio. In terms of educational background and inclusion degree, we assume that the inclusion degree increases by 0.045 logarithmic ratio for every 1 unit increase in educational background. In terms of income and inclusion degree, we set the default logarithmic ratio of inclusion degree rising 0.075 per unit of income increase. In terms of information source and inclusion, we set that the more the interviewees’ contact information source is online, the more the interviewees’ acceptance of homosexuality will increase by 0.025 logarithm. The relationship between them can be expressed as follows: women and men’s tolerance of homosexual sex; Age and tolerance of homosexual sex; Different educational background, income, information sources and tolerance of homosexual sex.
Tolerance of the General Public to Homosexuality
763
3 Experimental 3.1
Experimental Data Sources
A total of 10,985 samples were included in the sample population tracked in this paper. If necessary, the possible missing values and abnormal values were excluded, and the remaining effective samples totaled 10,211. The specific structure of the sample population was as follows: 5,523 males (54.08%) and 4,688 females (45.92%). In terms of age, the age range of the sample population was 17–49 years old, and the average age was 32 ± 0.4 years old. In terms of education level, 1034 people without any education background, accounting for 10.12%; Primary school education has 2,458 people, accounting for 24.07%; Junior high school education 3195 people, accounting for 31.28%; 1856 people with university degree, accounting for 18.17%; There were 1668 people with postgraduate degree or above, accounting for 16.33%. The average annual income of the sample group was 11500 ± 480 yuan. In terms of daily access to information, newspapers and magazines account for 782 people (7.6%). There are 237 people mainly broadcasting, accounting for 2.32%. There were 5298 TV subjects, accounting for 51.88% of the total sample. There are 3894 people, accounting for 38.13%, who are mainly from Internet channels. 3.2
Experimental Setup
In the design of the CGSS questionnaire, the question “what do you think of same-sex sex? There are five possible answers: “always wrong”, “mostly wrong”, “uncertain”, “sometimes right, sometimes wrong” and “always right”. In order to present the data more objectively, we estimated the results of this experiment based on the previous test results. It was estimated that 6,200 people would say that homosexual sexual behaviors were always wrong, accounting for 60.71%. About 1,500 (14.69%) would consider it unethical in most cases; About 1800 people think it is impossible to judge wrong or right, accounting for 17.62%. About 700, or 6.85%, said they were sometimes right; A very small minority, 0.01%, would fully support same-sex sex.
4 Discuss 4.1
Analysis of Experimental Results
After combing the experimental results, it can be found that there is a certain error between the actual measured value and the estimated value. The experimental results and estimated results are shown in Table 1 and Fig. 1 below. As can be seen from the experimental data, due to the popularity of the Internet on people’s view on sexual behavior among gay men and there is a big difference between forecast, in order to understand the popularity of the Internet for public influence on gay tolerance, this article studies to get big data has carried on the descriptive statistical analysis, different information channels for gay tolerance similarities and differences of the results of the survey are shown in Fig. 2 below.
764
P. Jin and X. Wan Table 1. Experimental results and estimated results
Always wrong Most time is wrong Not sure Sometimes right Is always right
Forecasts Number of persons 6200 1500 1800 700 Almost to zero
60.71% 14.69%
Actual value Number of persons 5138 1912
17.62% 6.85% 0.10%
2217 903 41
Proportionality
Proportionality 50.32% 18.72% 21.71% 8.84% 0.40%
Statistical chart of experimental results 60% 50% 40% 30% 20% 10% 0%
6000 5000 4000 3000 2000 1000 0 Always wrong
Most time is wrong
Not sure Sometimes Is always right right
Actual number
Actual percentage
Fig. 1. Statistical diagram of experimental results
level˄0--5˅
Different information channels and gay tolerance 4 3 2.201 2 1 0
1.87
2.263
2.246
2.885
2.62
Fig. 2. Tolerance of homosexuality between different information channels
Tolerance of the General Public to Homosexuality
765
It can be seen from the figure that, compared with traditional media, the test samples with Internet big data as the main source of information showed a higher degree of tolerance towards gay people. With the expansion of the Internet, people’s tolerance of gay people is gradually improving. However, to understand the impact of big data and other Internet technologies on people’s attitudes towards homosexuality, regression analysis is needed to get the desired answer. The influence of Internet use frequency on homosexuality tolerance is shown in Fig. 3 below.
level˄0--5˅
Internet usage frequency and homosexuality tolerance 3.5 3 2.5 2 1.5 1 0.5 0
2.163
2.355
Never
Little
2.501
2.682
Sometimes Usually
2.927
0ften
Fig. 3. Frequency of Internet use and degree of homosexuality tolerance
4.2
Analysis and Discussion
The statistical results in the figure above show that people’s access to information and frequency of using the Internet are closely related to their attitudes towards homosexuals. For example, the more frequently they use the Internet and big data to obtain information, the more tolerant they are towards homosexuals. In particular, the frequency of Internet use in the era of big data also has a profound impact on this figure. As shown in the figure, the longer the exposure in the environment of big data is, the more advanced and rational the views on gay sex will be. Therefore, it is not difficult to find that in terms of tolerance to homosexuality, people’s acceptance of online information does have group fluctuations in the breadth and depth. It has to be admitted that, in the era of big data, Internet technology has built an effective platform of publicity and self-recognition channels for homosexuals. However, those who have not been infected by the era of big data still have a low degree of acceptance of homosexuals, or even still adopt a comprehensive negative attitude. Therefore, how to better combine the background of the era of big data to render beneficial images for these groups, to adopt more effective ways to popularize the knowledge of the legality of homosexuality, and to make those people who hold biased attitudes towards homosexuality change their inherent prejudice through the characteristics of the era of big data is worth thinking deeply.
766
P. Jin and X. Wan
5 Conclusion The results of this paper show that gender, age, education, income and information sources have a significant impact on the public’s tolerance of homosexuals. In addition, against the background of big data, people who take the Internet as the main information source channel are showing greater tolerance to homosexual behaviors than before. The research of this paper confirms that the majority of the public is in the middle level of tolerance towards homosexual sex, the degree of tolerance is lower than the European and American countries, the number of people who hold resolutely negative attitudes is decreasing, and a considerable part of the public’s attitude has been transformed into neither opposing nor approving. This paper believes that in the context of big data, in order to improve the public’s tolerance of gay people, the popularization of big data and Internet knowledge should be enhanced to positively publicize gay people’s knowledge, so as to enhance people’s tolerance of this group. Acknowledgements. This article is specially funded by the teaching and research development of liberal arts teachers in Zhejiang University.
References 1. Griffith, A., Wickham, P.: Tolerance, acceptance, or ambivalence?: changing expressions of attitudes towards homosexuals in barbados. Sex. Res. & Soc. Policy 16(1), 58–69 (2019) 2. Petrou, P., Lemke, R.: Victimisation and life satisfaction of gay and bisexual individuals in 44 European countries: the moderating role of country-level and person-level attitudes towards homosexuality. Cult. Health & Sex. 20(4), 1–5 (2017) 3. Badon, M.M., Tekverk, D.G., Vishnosky, N.S.: Establishing the oxidative tolerance of Thermomyces lanuginosus xylanase. J. Appl. Microbiol. 127(2), 508–519 (2019) 4. Stanfield, P.S.: The betrayed father: Wyndham Lewis, homosexuality, and enemy of the stars. J. Mod. Lit. 40(3), 84–89 (2017) 5. Kirshner, H.S.: The other side of impossible: ordinary people who faced daunting medical challenges and refused to give up. Cogn. & Behav. Neurol. 30(2), 79–80 (2017) 6. Åkestam, N., Rosengren, S., Dahlen, M.: Think about it—can portrayals of homosexuality in advertising prime consumer-perceived social connectedness and empathy? Eur. J. Mark. 51 (1), 82–98 (2017) 7. Killiny, N., Jones, S.E., Nehela, Y.: All roads lead to Rome: Towards understanding different avenues of tolerance to huanglongbing in citrus cultivars. Plant Physiol. & Biochem. 129, 1–10 (2018) 8. Connor, S.L., Hunt, J.J., Ciesinski, A.: Somali American female refugees discuss their attitudes toward homosexuality and the gay and lesbian community. Cult., Health & Sex. 20 (6), 1–15 (2017) 9. Ahuja, K.K.: Development of Attitudes Towards Homosexuality Scale for Indians (AHSI). J. Homosex. 64(14), 1–15 (2017) 10. Patricca, N.A.: Christianity, social tolerance, and homosexuality: gay people in Western Europe from the beginning of the Christian era to the fourteenth century. By John Boswell. Angl. & Episcop. Hist. 86(4), 293–295 (2017) 11. Daoud, A.M., Hemada, M.M., Saber, N.: Effect of silicon on the tolerance of wheat (Triticum aestivum L.) to salt stress at different growth stages: case study for the management of irrigation water. Plants 7(2), 29–31 (2017)
Heterogeneous Network Security Monitoring and Association Algorithm for Big Data Zhenqi Liu1(&), Yangchun Gao2, and Deqiang Shao2 1
2
State Grid Information and Telecommunication Group Co., Ltd., Beijing 102211, China [email protected] State Grid Info & Telecom Group State Grid Siji Testing Technology (Beijing) Co. Ltd., Beijing 102211, China
Abstract. Heterogeneous network layer technology leads to the imbalance of heterogeneous networks, which makes the security problems between networks affect each other, and leads to the security problems of network interconnection more serious. In this paper, the gateway discovery technology and security of this kind of interconnection will be studied in depth. Firstly, the interconnection technology of heterogeneous networks and its security are described. Then the method of heterogeneous network security monitoring is given, and the optimization in the data access architecture is established. The network monitoring system put into use is set to simulate faults according to the test nodes, and then the monitoring effects on different fault nodes and types are statistically calculated. The core algorithm and knowledge representation of the system are analyzed in detail, and the related methods are simulated and analyzed. The system can respond to some typical security events. Keywords: Heterogeneous network architecture Network attack
Security monitoring Data access
1 Introduction After years of development, network security technology has been relatively mature [1, 2]. However, it may take a long time to scan from a large network and find the real security problems in the era of big data. The data grows at a geometric speed, and existing security measures cannot meet the needs of information development. Big data has become a fact that must be faced in the field of network information security [3, 4]. How to deal with the huge amount of data generated by heterogeneous network security devices and network events need to be considered in information network security. Therefore, it is important to build a network security monitoring system for big data environment, analyze and coordinate the heterogeneous and large data security events. According to the result, the corresponding security strategy is adjusted, which makes the overall network security adapt to the dynamic and global requirements of the big data network environment. In the heterogeneous network environment, different network selection, different network technology, the network environment is complex and changeable [1, 5]. In the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 767–772, 2021. https://doi.org/10.1007/978-3-030-51431-0_111
768
Z. Liu et al.
complex and changeable network environment, all kinds of security threats are increasing, so how to deal with different security issues to protect the interests of users has become an important issue in heterogeneous network communication.
2 Security Analysis of Network Interconnection Heterogeneous network layer technology leads to network imbalance, which leads to security problems between networks and aggravates the security problems of network interconnection. At present, the security of the Internet has attracted a lot of attention. Because of its open structure, it is vulnerable to malicious attacks. IP Security Protocol (IPSec), internet key interaction protocol (IKE) and other security protocols provide a certain security guarantee for the insecure Internet. The special structure of MANET determines its poor security performance, and it is vulnerable to active and passive attacks. The early work of MANET focuses on wireless channel access and multi hop routing, which is based on a secure environment. Now, because we want to provide secure communication between mobile nodes in the potential hostile environment, the security problem has become a hot topic. But the characteristics of MANET bring a series of new problems to the establishment of security scheme, such as highly dynamic network topology, strict resource limitation, open network structure and shared wireless resources. Therefore, the existing network security solutions can not be directly applied to MANET. The key points of network security can be divided into two categories: user identity reliable authentication and information and signaling security transmission [6]. We think that as long as these two kinds of problems are solved, the network security can be basically guaranteed by proper configuration. Among them, the security of information and signaling comes from the openness of MANET structure [7, 8], so the work of network interconnection should focus on the security of MANET. If certificate based encryption authentication scheme is adopted, since MANET does not have a special security authentication center, whether the trusted third party needed in the scheme can be replaced in other forms in the network, or how to establish a special security center facility of MANET is a question worthy of discussion [9]. In addition, the authentication problem of user identity mainly exists between heterogeneous networks. Therefore, on the basis of the establishment of MANET security mechanism, special consideration should be given to the security authentication scheme between networks and within each network.
3 Heterogeneous Network Security Monitoring 3.1
Optimization in Data Access Architecture
In order to improve the data processing efficiency, HDFS is introduced to optimize the data access architecture according to the characteristics of data access information, the advantages of cloud computing, and the requirements of data access storage. Data access architecture is optimized as shown in Fig. 1.
Heterogeneous Network Security Monitoring and Association Algorithm
769
Data access information generation and acquisition area Data access information access
Client software
Distributed structured data table
MapReduce
Distributed storage system Linux operating system (Xen virtual machine) Calculation DataNode
DataNode
DataNode
NameNode
storage
Fig. 1. Optimization diagram of data access architecture
The computing core is a distributed system with Linux operating system, namely Xen virtual machine whose key part is the part where HDFS cluster managed by NameNode correspondingly stores the data access information, and it can store and manage massive data access information. Data access information can be transferred to HDFS file or stored in database by data access information access and calculation part according to different requirements, both of which can realize the persistent storage of the data access information. Meanwhile, HDFS referenced at the same time can greatly reduce the delay of data access and increase user experience. 3.2
Network Attack
Integrated gateway discovery is an integrated synthesis of active and passive gateway discovery. On the one hand, the gateway node discovers the announcement gwadv by periodically broadcasting the gateway with a fixed number of hops TTL. On the other hand, the node broadcasting the gateway beyond the range of broadcasting hops TTL discovers the request packet gwsol, the intermediate node receiving the packet returns the routing information from the intermediate node to the gateway and establishes the reverse route to the node, and the node receives the request reply and establishes the route to the gateway. DOS attack is a gateway discovery process, malicious nodes will send a large number of messages to launch an attack. The mobile node receives a large number of control messages and data messages, which leads to a large consumption of computing
770
Z. Liu et al.
resources and memory resources, forming a DoS attack, which poses a great threat to the gateway discovery of the link node. Similar gray hole attack, nodes self attack and black hole attack are essentially a kind of behavior. In the transmission path, packets are discarded with probability p, but the black hole attack shows a probability of 1. Therefore, the strategy of black hole attack can be used for reference to determine the malicious nodes of gray hole attack and selfish node attack. Wormhole attack refers to that one attack node receives the packet, packages the packet and sends it to another attack node in the network in the form of a tunnel. The attack node then unpacks the packet and puts it into the network. Because the tunnel transmission of packets is transparent, the RREP packets returned through the tunnel will have a shorter hop value than the RREP packets returned through normal single hop wireless transmission. Therefore, when choosing the route, the node must tend to the path formed by wormholes, causing wormhole attack. 3.3
Testing Process
The network monitoring system put into use is set to simulate faults according to the test nodes, and then the monitoring effects on different fault nodes and types are statistically calculated. Finally the respective test data are obtained, and the analysis and comparison results are shown in Fig. 2. Intelligent pipe network monitoring Traditional pipe network monitoring
Monitoring accuracy
1 0.9 0.8 0.7 0.6 0.5 0
10
20
30
40
50
60
70
Testing frequency
Fig. 2. Network monitoring effect test
The real-time transmission and reception of data is realized in the network monitoring system. Besides it, the data display effect can be directly compared with the reference for analysis and judgment, and the obtained test score initialization is higher than that in the traditional network monitoring. Moreover, after the test node continues to expand, the accuracy of its monitoring is improved obviously from 0.62 to 0.92, and
Heterogeneous Network Security Monitoring and Association Algorithm
771
the monitoring effect will keep increasing as the system continues, which shows that the proposed network monitoring has the ability to linearly grow as well as judge and analyze continuity (Fig. 3). Traditional pipe network monitoring 50
Intelligent pipe network monitoring
System response time /ms
100 200 400 800
1600 3200 6400
0
10
20
30 40 Test node
50
60
70
Fig. 3. Network monitoring response time test
The network monitoring system simplifies the system operation process by adopting the embedded system so that the time from real-time reaction to action response in system is controlled within 200 ms. Although it is theoretically beyond the normal load, a high system response time is still maintained to achieve the effect that the system can find problems the first time and sends data and information back.
4 Conclusion In the era of big data, the core competitiveness largely depends on the related technical problems and some solutions of heterogeneous network security monitoring system for big data environment. Heterogeneous network contains a large number of interconnected security behavior events of different types. The behavior mechanism and security of heterogeneous network security monitoring in big data environment are discussed from the overall system model and processing process strategy, the core algorithm and knowledge representation of the system are analyzed in detail, and the related methods are simulated and analyzed. The system can respond to some typical security events.
References 1. Ma, Z., Cao, J., Yao, Y.: Workflow scheduling method using auction example and considering intermediate data storage strategy in cloud environment. J. Comput. Integr. Manuf. Syst. 23(5), 983–992 (2017)
772
Z. Liu et al.
2. Md Diah, J., Ahmad, J.: The methodology on statistical analysis of data transformation for model development. Int. J. Stat. Appl. 2(6), 7–11 (2012) 3. Sa, R.: Cloud computing resource scheduling scheme based on ant colony particle swarm optimization algorithm. J. Jilin Univ. Sci. Ed. 55(6), 1518–1522 (2017) 4. Hamdar, S.H., Khoury, H., Zehtabi, S.: A simulator-based approach for modeling longitudinal driving behavior in construction work zones: exploration and assessment. Simul. Trans. Soc. Modeling Simul. Int. 92(6), 579–594 (2016) 5. Adly, M., Besheer, A.H.: A meta-heuristics search algorithm as a solution for energy transfer maximization in stand-alone photovoltaic systems. Int. J. Electr. Power Energy Syst. 51(10), 243–254 (2013) 6. Baier, J.A., Bacchus, F., Mcilraith, S.A.: A heuristic search approach to planning with temporally extended preferences. Artif. Intell. 173(5), 593–618 (2017) 7. Gao, Y., Chen, J., Qiang, Y.: Placement optimization algorithm for virtual machines in large cloud computing systems. Modern Electron. Technol. 40(10), 21–23 (2017) 8. Zhang, D., Wei, L., Leung, S.C.H., et al.: A binary search heuristic algorithm based on randomized local search for the rectangular strip-packing problem. INFORMS J. Comput. 25 (2), 332–345 (2013) 9. Shila, D.M., Shen, W., Cheng, Y., et al.: AMCloud: toward a secure autonomic mobile ad hoc cloud computing system. IEEE Wirel. Commun. 24(2), 74–81 (2017)
Commodity Trading Platform Based on Big Data Analysis Zhiqiang Cai and Jiaai Zhang(&) Jilin University of Agricultural Science and Technology, Jilin 132101, Jilin, China [email protected]
Abstract. This paper mainly studies the use of Apache + PHP + MySQL and big data computing technology to design a commodity trading platform based on big data analysis. This commodity trading platform has multi-style data analysis. The front desk has user personal data analysis, including footprint, order analysis, purchase preferences, consumption information, etc. There are various kinds of marketing data analysis of the platform in the background, including sales profile data analysis, peer hot sales data analysis, sales ranking, etc. In addition, big data computing technology is used to analyze user behavior, collect all access ways of user browsing platform, and process the collected data in depth, so as to obtain a real-time dynamic effect map, dynamically display the access amount and proportion of each access way, and extract valuable information from it, so as to develop an effective promotion plan for the platform and achieve precision marketing. Keywords: Commodity trading
Data analysis Big data PHP XAMPP
1 Introduction At present, the development trend of Internet commodity trading platform is in full swing, especially in the environment of high information transmission speed, ecommerce is becoming more and more mature. And people are more and more interested in online transactions. Big data, specifically, the mobile Internet of things and the Internet have produced massive data. Big data computing technology has solved the problems of collection, storage, calculation and analysis of massive data. After entering the era of social network, Internet behavior is mainly created by the participation of users. A large number of Internet users create a large number of social behavior data, which reveals the characteristics of people’s behavior and living habits. Therefore, it is necessary for us to analyze the Internet behavior created by users. User behavior analysis refers to the statistics and analysis of relevant data, finding out the relevance information we want to know, and combining these laws with marketing strategies to provide basis for further change or re-determination of accurate marketing strategies when obtaining basic data of platform visits such as app or website [1–3]. In 2003, data mining officially started development and research work. Researchers from seven top universities in the United States jointly proposed the project of “data mining vgrads and grid virtualization”. After that, giftag, Amazon and IBM all used © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 773–780, 2021. https://doi.org/10.1007/978-3-030-51431-0_112
774
Z. Cai and J. Zhang
data mining to improve their competitiveness in the industry. Based on the research of using data mining to solve the problems in the field of e-commerce, this paper proposes a commodity trading platform based on big data analysis. The main functions of the commodity trading platform based on big data analysis (1) front end: user registration, user login, personal center, commodity browsing, commodity search, commodity collection, commodity purchase, refund and return, after-sales service, evaluation message, consulting customer service, help center, etc. (2) background: the background is divided into homepage, commodity, order, marketing, member, data, setting and other modules. Functions include: overall sales and commodity data display, commodity information management, order management, logistics management, message management, notice and announcement management, marketing mode management, member management, platform data analysis, system settings, etc. (3) multi style data analysis. The front desk has user personal data analysis, including footprint, order analysis, purchase preferences, consumption information, etc. There are various kinds of marketing data analysis of the platform in the background, including sales profile data analysis, peer hot sales data analysis, sales ranking, etc. (4) in addition, it can be connected to the real-time quality analysis system based on big data through the interface for big data analysis. There are many ways for users to access the platform. What the system needs to do is to collect all the access ways of users, and finally get a real-time dynamic effect map through technical storage, statistics, analysis. Through the analysis of the renderings, we can know which ways users use to access the platform, which access ways are main and which access ways are less, so as to serve as a reference for platform promotion. In particular, because the resulting rendering is dynamic and real-time, with the passage of time, the amount and percentage of each access mode will change, from which we can know the change trend of access mode, so as to adjust the promotion strategy in time and realize a more cost-effective promotion strategy economically.
2 Design Scheme 2.1
Production Survey
According to the characteristics of online shopping, the commodity trading platform based on big data analysis adopts the idea of software engineering for system analysis and design. The commodity trading platform adopts MVC design mode, windows as the platform, Apache + PHP + MySQL framework technology. Using PHP script language to design platform web page, using Apache as web server, dealing with user request, using MySQL as database to store website data. Dreamweaver is used as the main development tool of the platform, fireworks is used to make the platform map, and div + CSS is used to realize the web page layout. The server development needs to integrate at least three environments: Apache, MySQL and PHP. Here we use the integration package xampp (APACHE + MySQL + PHP + Perl), which has helped us integrate the required environment [4, 5] . The use of B/S mode can not only simplify the development process of the platform, but also improve the maintainability and Extensibility of the platform.
Commodity Trading Platform Based on Big Data Analysis
2.2
775
Technology Introduction
Apache is one of the most popular web server-side software. Its characteristics are simple, fast and stable. PHP is a popular dynamic web page programming language. PHP has the characteristics of database connection, Extensibility, object-oriented programming, Extensibility, efficiency, robustness, stability and so on. It is the best choice for developing websites. Xampp is a server system development kit integrated with Apache + MySQL + PHP. It also includes phpMyAdmin, a tool for MySQL management, which can perform visual operations on MySQL. 2.3
Platform Design
1. The platform is developed with standard B/S three-tier structure, which are user interface layer, business logic layer and data layer. 2. The path of configuration file of related services in xampp is: Apache configuration: \xampp\Apache\conf \httpd.conf; PHP:\xampp\php\php.ini; PHP:\xampp\php\php.ini; MySQL:\xampp\mysql\bin\my.ini; phpMyAdmin:\xampp\phpMyAdmin\config.inc.php; FileZilla FTP server: \xampp\FileZilla FTP\FileZilla server.xml; 3. The default path of the root directory of xampp platform is: xampp\htdocs; the default path of storing data in MySQL database in xampp is: \xampp\MySQL\data; 4. All network files are placed in the main folder of htdocs (\xampp\htdocs).cgi files and PHP program files are in this folder. 5. The design of the database is the key of the commodity trading platform based on big data analysis. Using mysql to establish the database, establish multiple folders, divide and manage each functional module, which is helpful for the management, development and maintenance of the platform. MySQL database is a relational database, which supports SQL language and implements various platform background programs with PHP language. This commodity trading platform mainly uses PHP database functions to associate with MySQL database, mainly using four database functions [6, 7]: MYSQL_CONNECT(): creates a connection to the MySQL server. MYSQL_SELECT_DB(): select the database in MySQL server for query processing and data query operation. MYSQL_QUERY(): send query string to help MySQL do relevant processing and execution.
776
Z. Cai and J. Zhang
MYSQL_FETCH_ROW(): used to move the result single row of the query to the array variable. The index of the array is a numeric index, and the first index value is 0. 2.4
Platform Extension: Real-Time Analysis System of External Chain Quality Based on Big Data
The processing method to obtain the access mode data of the user to the commodity trading platform is to bury the point on the corresponding outer chain, and then collect the data through ETL operation. After the data collection, it is necessary to collect the data through flume, and then flow to Kafka for data caching. The data in Kafka is consumed in real time by writing the code of spark streaming. After storing in the HBase database, write the corresponding code with springboot to take out the data in HBase and show the effect with echats [8–10]. As shown in Fig. 1.
Fig. 1. Architecture flow chart of external chain quality real-time analysis system
3 Exhibit 3.1
Some Interfaces of Trading Platform
See Figs. 2, 3, and 4.
Commodity Trading Platform Based on Big Data Analysis
Fig. 2. Member center
Fig. 3. Operation report
777
778
Z. Cai and J. Zhang
Fig. 4. Sales rankings
3.2
The Analysis Effect of External Chain Quality Real-Time Analysis System on the Platform Is Shown in the Figure Below
See Fig. 5.
Fig. 5. External chain quality analysis
Commodity Trading Platform Based on Big Data Analysis
779
4 Epilogue This paper mainly studies the commodity trading platform based on big data analysis. As a commodity information publishing and trading platform, this platform provides the release of commodity information for the convenience of commodity trading between buyers and sellers. It can also be used as a second-hand trading market to integrate offline idle goods resources and realize the reuse value of goods. It can also be used as an object sharing platform, such as book borrowing, bike sharing, etc., to realize sharing economy. In particular, the platform has multiple styles of data analysis. The front desk has user personal data analysis, including footprint, order analysis, purchase preferences, consumption information, etc. There are various kinds of marketing data analysis of the platform in the background, including sales profile data analysis, peer hot sales data analysis, sales ranking, etc. In addition, big data computing technology is used to analyze user behavior, collect all access ways of user browsing platform, and process the collected data in depth, so as to obtain a real-time dynamic effect map, dynamically display the access amount and proportion of each access way, and extract valuable information from it, so as to develop an effective promotion plan for the platform and achieve precision marketing. Acknowledgements. National Undergraduate Science and technology innovation and entrepreneurship training program. Fund: National College Students’ science and technology innovation and entrepreneurship training program.
References 1. Utku, A., Aydogan, E., Mutlu, B., et al.: A new recommender system based on multiple parameters and extended user behavior analysis. In: The 9th International Conference. ACM (2017) 2. Zeng, Z., Rao, H.K., Liu, A.P.: Research on personalized referral service and big data mining for e-commerce with machine learning. In: 4th International Conference on Computer and Technology Applications (ICCTA). IEEE (2018) 3. Yan, L.: Personalized recommendation method for e-commerce platform based on data mining technology. In: International Conference on Smart Grid and Electrical Automation (ICSGEA) IEEE Computer Society (2017) 4. Nixon, R.: Learning PHP, MySQL, and Javascript. Oreilly Media (2018) 5. Zhao, H.Q.: Best scheme of design dynamic website: Apache + PHP + Mysql. Computer Engineering and Design (2007) 6. Anderson, D., Hills, M.: Query construction patterns in PHP. In: IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE (2017) 7. Harris, R., Murach, J.: Murach’s PHP and MySQL: Training & reference. Mike Murach & Associates Inc (2017)
780
Z. Cai and J. Zhang
8. Singh, A., Mittal, M., Kapoor, N.: Data processing framework using Apache and Spark technologies in big data. Big Data Processing Using Spark in Cloud (2019) 9. Han, D., Chen, X., Lei, Y., et al.: Real-time data analysis system based on Spark Streaming and its application. Journal of Computer Applications (2017) 10. Sunny, B.K., Janardhanan, P.S, Francis, A.B., et al.: Implementation of a self-adaptive real time recommendation system using spark machine learning libraries. In: IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES). IEEE (2017)
Transformation and Upgrading of Fresh E-Commerce Mode Based on Big Data Conception Ping Yang(&), Jing Wang, and Liqin Hu Information Management Department, ChengDu Neusoft University, Chengdu, Sichuan, China {yangping,wang.jing,huliqin}@nsu.edu.cn
Abstract. In recent years, the fresh products market online in China has developed rapidly with a rapid growth rate and a large transaction volume. Three major fresh e-commerce modes have been basically formed, namely, platform fresh e-commerce mode, vertical fresh e-commerce mode and online sales mode of physical supermarket [1]. These three models have their own advantages and disadvantages, which are insufficient to meet the needs of customers of online fresh products. This paper analyzes the needs of fresh online shopping customers, including the main reasons, key factors, channels and types, frequency and the concentration time period of fresh online shopping, and analyzes the existing problems of fresh e-commerce model, including imperfect fresh product standards, distribution time difficult to meet customers, limited types for customer purchased actually, low frequency. Then, it puts forward the regional + platform + customer’s E-commerce model, and establish a distribution ecosystem, customer relationship management methods and product quality and safety management based on big data. The purpose of this article is to make up for the shortcomings of the existing fresh e-commerce model and promote the healthy development of fresh e-commerce in China. Keywords: Regional + platform + customer Big data Distribution ecosphere
1 Introduction The transaction scale of China’s fresh food market was about RMB 139.13 billion in 2017, up 59.7% year-on-year [2], which had a large transaction volume and a rapid growth rate. However, the number in China is about 1%, but about 25% in Britain, about 20% in the United States, and less than 15% in Holland, Germany and France [3]. The penetration rate refers to a comparison of current demand and potential market demand in the market [4]. The potential market of fresh e-commerce is huge in China from the above penetration data. However, 88% of fresh e-commerce platforms were in a loss state in 2016, and 14 fresh e-commerce enterprises were closed [5] according to the 2017 domestic fresh E-commerce Market Research Report. What kind of fresh ecommerce mode to adopt for fresh e-commerce is very important. Because it can meet these potential market demand and respond to market competition in the case of huge potential market demand and huge competition (Table 1). © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 781–787, 2021. https://doi.org/10.1007/978-3-030-51431-0_113
782
P. Yang et al. Table 1. Advantages and disadvantages [6] of existed e-commerce modes
Fresh ecommerce Modes Platform fresh e-commerce mode Vertical fresh e-commerce mode Online sales mode of physical supermarket
Advantages
Disadvantages
A huge customer, the average cost of customers for the merchants who check in, the powerful supply chain system Price, customer experience and product quality
Maintain customers’ repeated purchase and monitor customers’ experience
Fresh food service and supermarket location
The large investment in warehouse construction, cold chain logistics, customer acquisition and other aspects Online and offline comprehensive operation costs, supermarket coverage
2 Analysis on the Customers’ Demand of Fresh Online Shopping Market demand can be divided into the pushing market demand and the pulling market demand on the whole [7]. Pushing market demand means Producers provide products to push market demand, while the pulling market demand means customers’ demand pull Producers provide what they need. The customers’ demand of fresh online shopping is a typical pulling demand. The customers’ demand of fresh online shopping drives fresh e-commerce to provide the products they need (Figs. 1 and 2).
Fig. 1. A push system
Fig. 2. A pull system
Transformation and Upgrading of Fresh E-Commerce Mode
783
So what are the needs of fresh online shopping customers? Next, it will analyze the customers’ demand of fresh online shopping from the main reasons, important factors, main channels and types, frequency and concentration time. 2.1
Main Reasons of Fresh Products Purchased Online by Customers
• First, time is flexible. The customers can place an order at any time, who can save time to buy fresh products in physical stores. • Second, the program is simple and easy to operate. After the customers place an order on the platform, products can be delivered home. For most customers, online shopping for fresh products can save the process of going to the supermarket or market to purchase and carry, and save time and effort. • Third, the selection of varieties is more abundant and the selection efficiency is more efficient. Many fresh food platforms provide a wealth of products for customers to choose, which has much more selection range and varieties than the Physical store. At the same time, customers can quickly select fresh products with high cost performance ratio through comparison, similarity, evaluation, and other data provided by online shopping platforms in a very short time. 2.2
Factors of Fresh Products Purchased Online Effecting Customers
• First, product safety. The safety of fresh products, as food, is the most important. The safety of food can be roughly divided into production safety, storage safety and transportation safety before it reaches customers’ hands, which should be guaranteed by quality standards. The quality standards of some fresh products are very clear, such as dairy products, grain and oil seasoning, leisure food, drinks, frozen food, etc. However, the quality standards of some fresh products are not very clear, such as vegetables, meat, fruits, eggs, aquatic products, tea, etc., which are difficult to define due to their freshness, quality level, residual chemicals, etc. • Second, the price. E-commerce businesses can give more profits to customers, so that customers can enjoy more affordable product prices. The price of fresh products also follows this rule. • Third, logistics distribution. Fresh products are daily necessities, and some of them have time and quantity requirements. The logistics distribution to satisfy the customers should be to deliver the just products in the just place and in the just time, which is the factor effected the customers. • Fourth, rich categories. Due to the diversity of products required by life, the variety of fresh products required by customers is rich. In addition, platform brand awareness, word-of-mouth and other factors are also important factors for customers to purchase fresh products online.
784
2.3
P. Yang et al.
Main Channels and Types of Fresh Products Purchased Online by Customers
There are many kinds of fresh products that customers can buy online, including fresh fruits, vegetables and eggs, meat, seafood and aquatic products, cold drinks and frozen food, drinks, imported food, leisure food, local specialty, tea, beverage preparation, grain and oil seasoning, etc. According to data statistics, fruit was the most frequently purchased by online customers of fresh food in China, which occupied 32.0%, followed by dairy products and vegetables, which occupied 24.2% and 12.8% respectively, and the proportion of meat, poultry, eggs, aquatic products, cold drinks and cold food was less than 10% [8] in 2017. There are few kinds of daily fresh products actually consumed in China, such as vegetables, meat, poultry and eggs. 2.4
Frequency and the Concentration Period of Fresh Products Online by Customers
There are more than half of the fresh online shopping customers have the experience of buying fruits or vegetables once a week, but only 29.5% of the customers buy vegetables twice or three times a week on the platform, while the frequency of dairy products and cold drinks is low [9]. The frequency of online shopping for daily fresh products, such as vegetables, is very low, according to the data analysis. Fresh online shopping customers focus on 9:00–12:00 and 18:00–21:00 [10]. These two time periods correspond to lunch and dinner respectively. Customers can select the required ingredients according to their needs.
3 Problems and Analysis of Existing Fresh Food ECommerce Mode 3.1
The Quality Standard of Online Fresh Products Is Not Perfect
The current fresh e-commerce mode does not provide perfect quality standards for customers to purchase fresh products. Customers can buy fresh products with perfect quality standard system at ease, such as dairy products, grain and oil seasoning, the leisure food, wine, frozen food and so on. But such as vegetables, meat, eggs, fruits, aquatic products, tea and other fresh products, because there is no perfect quality standard system, different customers will have a different understanding of quality. The product size, freshness, the pesticide residue, the growth environment and other factors are opaque, without a unified standard, so customers can not be assured of purchasing. 3.2
Delivery Time Is Difficult to Meet Customers’ Needs
The current fresh e-commerce mode does not provide perfect delivery time. The time for customers to purchase fresh products is mainly from 9:00 to 12:00 (to satisfy the purchase on that day) and from 18:00 to 21:00 (to satisfy the purchase on the day and the next day). If the purchase of fresh products online can not meet needs of customers, customers will choose to turn to the physical store to purchase what they need, as
Transformation and Upgrading of Fresh E-Commerce Mode
785
customers have corresponding requirements for the daily, necessary and the three meal lead time (inspection, receiving, cleaning, cooking and other time required to meet the dining time). 3.3
Limited Types and Low Frequency of Fresh Products Purchased Online by Customers Actually
The current fresh products online are abundant. But the types and frequency of fresh products that customers actually buy online are limited. The uncertainty quality standards and the difficulty daily delivery time are the two main reasons.
4 Research on the Transformation and Upgrading of Fresh E-Commerce Mode Based on Big Data Conception This paper suggests that the fresh e-commerce operation mode is region + platform + customers based on the conception of big data, combined with the demand of customers for fresh products online and the analysis of the existing problem of fresh ecommerce mode. 4.1
Establish Distribution Ecosystem Based on Big Data Conception
The distribution area is divided into several small areas based on the big data analysis of customer online purchase. Suppose that the area of a certain region is s. The number of regional divisions is n. The average single distribution time in each region is t. The average single distribution distance in each region is d. The average single distribution cost in each region is c, and the average number of daily distribution in each region is m. In addition, the number of the distribution staff is a. The average number of staff required for each distribution is 1, and the average single distribution profit is p. The distribution ecosystem is established based on the conception of big data. The model is as follows: MIN Z =
X
nþ
X
cþ
s.t t satisfaction delivery time for customer d r t(r is speed setting for the vehicle) c the satisfaction delivery cost for customer Rn = s And X MAX Y ¼ PM s.t R1 m a
X
m
786
4.2
P. Yang et al.
Customer Relationship Management
This mode will pay attention to the needs of all kinds of customers, make corresponding reminders or launch some activities timely, and even make accurate recommendations. At the same time, regional conception is adopted, which can develop a large number of offline customers into online customers, and it will realize online sales with the help of the online shopping platform. The fact is that the number and degree of customer acquisition are closely related to the degree of establishing a good distribution ecosystem. In addition, the return and exchange of fresh products purchased online is tedious, which leads to poor experience of customers. Products can be well deployed in the region, and they can meet customer needs in terms of time and product quality at the same time by using regional and big data analysis in this mode. 4.3
Product Quality and Safety
The customers value the quality and safety of the products when the customers buy fresh products online. The fresh e-commerce can refer to the national food quality standard for products without the perfect quality standard system, formulate the corresponding standards by each region, and implement them in each region, so that online fresh customers can clearly know that the purchased fresh products are safe. Fresh ecommerce provides customers with detailed product identification or the relevant QR code through the platform, so that customers can understand the indicators or growth, production, distribution and other processes of fresh products in detail. It realizes the transparency of fresh product supply chain, so as to realize customers’ safe purchase.
5 Conclusion This paper proposes the regional + platform + customer e-commerce mode. This mode focuses on the distribution area, customer relationship management and product quality and safety based on big data. It will realize the multiple types and high frequency of daily fresh products online shopping by customers, and realize the greater development of fresh market online shopping finally.
References 1. Hun, D.L., Hao, Y.Y.: Research on the operation mode of fresh food e-commerce based on o2o platform. Chin. Bus. Theory 3, 12 (2017) 2. Ai Rui Consulting: Consumption insight report of Chinese fresh e-commerce industry, 4 (2018) 3. Anbo, W., Linhui, S., Zhenyu, L.: Study on storage and distribution mode of fresh agricultural products in e-commerce environment. Commer. Econ. Res. (24), 92–94 (2017) 4. Guanghua, X.: Strategic integration strategy in cross-border M & A of Chinese Enterprises. Rev. Ind. Econ. (6), 87–90 (2016) 5. Pengjin, Y.: Analysis of fresh Chinese e-commerce industrial organization based on SCP paradigm. Commer. Econ. Res. 21, 69–72 (2017)
Transformation and Upgrading of Fresh E-Commerce Mode
787
6. Fanjiao, C.: An empirical study on the influencing factors of consumer satisfaction of fresh E-commerce. Commer. Econ. Res. (8), 49–51 (2016) 7. Fali, L., Changgang, L.: E-commerce fresh food logistics distribution based on RFID & GPS / GPRS technology. Chin. J. Commer. (12), 9–11 (2018) 8. Ai Rui Consulting: Consumption insight report of Chinese fresh e-commerce industry, 24 (2018) 9. Ai Rui Consulting: Consumption insight report of Chinese fresh e-commerce industry, 25 (2018) 10. Ai Rui Consulting: Consumption insight report of Chinese fresh e-commerce industry, 27 (2018)
Author Index
A An, Li, 42 C Cai, Hua, 535 Cai, Huali, 112 Cai, Xiaohua, 175 Cai, Zhiqiang, 773 Cao, Lixiang, 150 Chen, Caihong, 541 Chen, Chuangjie, 96, 743 Chen, Danping, 278 Chen, Jingyi, 670 Chen, Weihong, 451 Chen, Xilong, 487 Chen, Yong, 291 Cheng, Yanxia, 34 Chu, LeiFang, 528 Cui, Changcheng, 431 Cui, Meng, 264 D Dai, Li, 3 Dai, Rui, 368 Deng, Lijun, 208 Deng, Xue, 96, 444, 743 Ding, Yushu, 130 Du, Jiabao, 9 F Feng, Luyao, 743 Feng, Xinhui, 473 Fu, Guohua, 479 Fu, Jia, 572 Fu, Ting, 278
G Gan, Baiqiang, 252 Gao, Fei, 487, 494 Gao, Hongxu, 16 Gao, Jiaqiong, 467 Gao, Yangchun, 767 Gao, Yiqiong, 150 Gao, Zhijun, 3 Ge, Xiaoyu, 415 Ge, Zhenxing, 425 Gong, Mingming, 593 Gu, Yanjun, 112 Guo, Jianli, 90 H He, Chaohu, 42 He, Yulu, 34 He, Zhenxiang, 353 Hu, Liqin, 781 Hu, Ying, 425 Huang, Bin, 22 Huang, Cuirong, 96 Huang, Jie, 272 Huang, Liling, 76 Huang, Qiang, 473 Huang, Xinchun, 494 J Ji, Xingpei, 64 Jia, Ziqi, 305 Jiang, Binbin, 752 Jiang, Man, 547 Jiang, Wei, 232 Jiao, Shuangben, 224 Jin, Pengnian, 760
© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1233, pp. 789–791, 2021. https://doi.org/10.1007/978-3-030-51431-0
Author Index
790 Jin, Zhao, 487, 494 Jiuchao, Li, 514 Juan, Du, 190 L Lai, HuiJuan, 461 Lee, Sungwon, 461 Lei, Guoping, 643 Li, Bing, 54 Li, Bingxiang, 164 Li, Hejia, 487, 494 Li, Jianqiang, 683 Li, Jingrui, 635 Li, Jiuchao, 487 Li, Meng, 164 Li, Mengnan, 650 Li, Shujuan, 143 Li, Xi, 374 Li, Xiaona, 737 Li, Ying, 326 Li, Yun, 494 Li, Zhuo, 285 Lian, Zeyu, 611 Liang, Ying, 743 Lin, Keyao, 400 Lin, Renzao, 714 Lin, Tingting, 400 Lin, Yingxian, 444 Liu, Chang, 415 Liu, Chunhua, 500, 657 Liu, Chunming, 123 Liu, Gang, 232 Liu, Hongchang, 391 Liu, Hongdan, 54 Liu, Hongjiang, 201 Liu, Huifang, 677 Liu, Jianshun, 3 Liu, Lining, 238 Liu, Miao, 547 Liu, Ping, 720 Liu, Shuangying, 28 Liu, Wanfeng, 150 Liu, Yanli, 264 Liu, Yizhao, 391 Liu, Zhenqi, 767 Luo, Jun, 298 Luo, Qinglan, 565 Luo, Wenliang, 467 Luo, Xiuying, 643 Luo, Yulin, 105 M Ma, Huanhuan, 84 Ma, Lili, 285
Ma, Shufang, 224 Ma, Xiaoyan, 689 Ma, Yige, 169 Mao, Xingjing, 473 Miao, Yinjia, 618 O Ou, Qi, 514 P Pang, Zhaojun, 158 Q Qi, Xiong, 42 Qin, Caiping, 246 R Ren, Xiaoqiang, 650 S Sai, Wei, 553 Shang, Yongwei, 547 Shao, Deqiang, 767 Shao, Juan, 319 Shen, Dan, 677 Shen, Lu, 96 Shi, Shuyu, 725 Song, Shukui, 438 Su, Zheqian, 547 Sun, Quande, 444 Sun, Wenqian, 238 Sun, Yan, 312 Sun, Yue, 54 T Tang, Rui, 64, 332 Tang, You, 22, 285 Tao, Rui, 164 Tao, Yongmei, 702 Teng, Qilong, 22 Tian, Zhiling, 183 Tu, Chao, 494 W Wan, Xiao, 760 Wang, Jing, 76, 781 Wang, Jinliang, 326 Wang, Jinting, 627 Wang, Lei, 664 Wang, Mantao, 473 Wang, Na, 664 Wang, Quan, 635 Wang, Rongxia, 252 Wang, Tao, 208
Author Index Wang, Wei, 455 Wang, Wenbin, 708 Wang, Xin, 3 Wang, Xiuqing, 117 Wang, Xiyuan, 278 Wang, Yi, 9 Wang, Zhe, 137 Wang, Zi, 70 Wei, Li, 695 Wei, Xuemei, 112 Wouagabe, Justin, 190 Wu, Fang, 112 Wu, Jiang, 224 Wu, Shanshan, 64, 332 X Xiao, Fen, 400 Xiao, Ke, 643 Xie, Chao, 105 Xie, Hui, 695 Xie, Libin, 347 Xu, Jing, 183 Xu, Ronghui, 47 Xue, Bin, 224 Xun, Chao, 400 Y Yan, Tiecheng, 150 Yang, Kai, 487, 494 Yang, Ping, 781 Yang, Qian, 217 Yang, Sen, 643 Yang, Yue, 291 Yang, Zheng, 583 Yao, Fushan, 487 Yao, Yi, 618
791 Ye, Hui, 521 Yi, Juan, 272 Yu, Binbin, 361 Yu, He, 565 Yu, Hongbo, 602 Yu, Yulan, 298 Yuan, Changfu, 9 Z Zeng, Shasha, 383 Zhang, Chi, 391 Zhang, Dongmei, 507 Zhang, Guibin, 175 Zhang, Heng, 731 Zhang, Hongzhen, 175 Zhang, Hualei, 76 Zhang, Jiaai, 773 Zhang, Lin, 90 Zhang, Ning, 112 Zhang, Penglong, 238 Zhang, Xingdong, 535 Zhang, Yongsheng, 238 Zhang, Zheng, 408 Zhao, Danni, 558 Zhao, Jian, 76 Zhao, Junfeng, 96, 444, 743 Zhao, Languang, 3 Zhao, Shengping, 635 Zhao, Yao, 494 Zhao, Yu, 339 Zhao, Yue, 9 Zheng, Jieyun, 400 Zheng, Yang, 391 Zhong, Yushan, 438 Zhou, Liang, 514 Zhu, Lingjun, 258