Application of Intelligent Systems in Multi-modal Information Analytics: Proceedings of the 2020 International Conference on Multi-model Information Analytics (MMIA2020), Volume 2 [1st ed.] 9783030515553, 9783030515560

This book presents the proceedings of the 2020 International Conference on Intelligent Systems Applications in Multi-mod

348 61 47MB

English Pages XV, 858 [869] Year 2021

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Front Matter ....Pages i-xv
Front Matter ....Pages 1-1
Noise Data Removal Method of Frequency Response Curve Based on MNKriging Interpolation Algorithm (Ling Wei, Zijuan Guo, Shaolei Zhai, Cong Qi, En Wang, Tao Deng et al.)....Pages 3-10
An Analysis Method of Multi Round Interactive Semantics for Power Enterprises Based on Solr Engine (Zheheng Liang, Jijun Zeng, Daohuan Jiang, Gongfeng Zhu)....Pages 11-16
Simplification Method of Two-Level Stroke Line Based on Painting Sequence (Yu Lin)....Pages 17-23
Typical Risk Situations in Driving Situations (Yulei Liu)....Pages 24-31
Construction of Smart Campus Under the Background of Big Data (Peilu Feng)....Pages 32-36
Mass Fashion Life Service Space in Intelligent Cities (Hesen Li)....Pages 37-42
Development Background of China’s Energy Internet Industry and Experiences (Shanshan Wu, Xingpei Ji, Qingkun Tan, Rui Tang)....Pages 43-48
Probe on Curriculum Design of Electronic Circuit Based on Multisim14.0 (Guangjun Yuan, Jiyuan Sun, Zhenjun Lei, Yang Lu)....Pages 49-55
Coupling Dynamics of Complex Electromechanical System (Zhouhong He, Xiaowen Liao)....Pages 56-61
Development Strategy of Educational Robot Industry Based on Big Data Analysis (Jingqiu Yang, Yiquan Shi)....Pages 62-68
Selection of Urban Rail Transit Connection Mode Under Nested Logit Model (Tao Liu)....Pages 69-74
Design Method of Aerobics Teaching Assistant Platform Based on 5G Technology (Qiong Huang, Fubin Wang)....Pages 75-81
Transformation and Upgrading of Manufacturing Industry Under the Background of the Digital Economy (Haiyan Jiang, Xuhui Chen)....Pages 82-87
Effect of Heat Treatment on Microstructure and Properties of Wear-Resistant Cast Steel with High Strength and Toughness (Haijun Cui, Bo Zhang, Meng Wang)....Pages 88-94
Computer Aided Design and Manufacture of Pen Holder for Complex Mechanical Parts (Zhanbin Gu)....Pages 95-100
The Design and Implementation of Seismic Hazard Emergency Assessment System of Dongguan (Ping He, Xiuwu Chen, Ting He)....Pages 101-107
Role of Robot Technique in the Manufacture of New Energy Vehicle Engineering (Juan Shao)....Pages 108-113
Intelligent Vibration Control Method of Wire Rope Lifting Equipment (Ye Tian)....Pages 114-122
Development Path of Energy Internet Industry for Grid Enterprises Based on the Industrial Development Priority Model (Shanshan Wu, Rui Tang)....Pages 123-130
Application of PLC Technology in Electrical Engineering and Automation Control (Meng Wang)....Pages 131-135
Development of Multifunctional Calculator Based on MCU (Microcontroller Unit) (Qinzhu Wang)....Pages 136-142
Innovative Path of IAP Education in Colleges and Universities Under the Background of “Smart Campus” (Shengli Wang)....Pages 143-148
Autonomous Vehicle Control System Based on Mecanum Wheel (Yanchun Cheng, Yu Liu, Rundong Wang, Yong Liu, Rui Zhou)....Pages 149-156
Analysis and System Construction of Information-Based Engineering Management Theory (Jieyun Yang)....Pages 157-162
Device for Super Capacitor Constant Power Charging (Shun Wang, Yixian Chen)....Pages 163-170
Robust Optimization Model of Island Energy System Based on Uncertainty of Wind and Photovoltaic (Zhihong Gu, Huiwen Qi, Zhuo Liu, Rong Zhang)....Pages 171-179
Exploration and Research on Project Engineering Management Mode Based on BIM (Dongfeng Li)....Pages 180-184
Building Optimization Based on Wind Environment Simulation Analysis (Zhuo Wei, Ningning Xie, Zhe Jiao)....Pages 185-194
Feasibility Study of Zero Trust Security in the Power Industry (Fei Hu, Wei Liu, Danni Wang, Ran Ran)....Pages 195-204
Construction of Digital Factory Platform Based on Intelligent Manufacturing (Ying Kou, Longfei Zhang, Liang Zhou)....Pages 205-211
Application of Internet of Things in the Construction of Smart City (Ge Guo, Liang Pang)....Pages 212-217
Adaptive Modeling Algorithm in Distributed Aircraft Intelligent Control System (Zhang Jinhe, Sun Shujian, Hong Tao, Du Bin)....Pages 218-223
Adaptive Control of Wind Power System Based on TMS320 (Zenghui Guo)....Pages 224-230
The Zynq-7000 SoC on UltraScale Architecture (Zhiwei Tang)....Pages 231-236
VHDL Design of Motor Control Module on FPGA (Zhiwei Tang, Xiaoqing Chen)....Pages 237-245
Front Matter ....Pages 247-247
Survey of Computer Vision Synchronous Positioning and Map Construction Technology (Hong Zhang, Ping Yang, Hongjiao Xue, Shixia Lv)....Pages 249-255
Application of Conditional Generative Adversarial Network in Image Super-Resolution Reconstruction (Xiang Wei, Feng Wang, Xi Chen, Yongjie Yan, Ping Chen, Sheng Liu)....Pages 256-265
Automatic Visual Inspection System for Injection Molding Parts of Automobile Center Console (Wenqing Chi, Bin Xue, Xiaofei Li, Yuhang Zhang, Shuangben Jiao)....Pages 266-273
Efficient Clustering Algorithm in Dynamic Nearest Neighbor Selection Model (Jingxin An)....Pages 274-279
Marketing Strategy of Knowledge-Based Virtual Community (Zhi Li)....Pages 280-285
Two-Way Recommendation System for Intelligent Employment of College Students Based on Data Mining (Yifan Zhang, Qian Liu, Qingpeng Meng)....Pages 286-292
Investigation on Knowledge Reduction and Rule Fusion Based on Probability Graph Model (Yun Duan, Hongbo Ouyang, Sheng Duan)....Pages 293-298
Relation Model Between High-Level Athletes’ Energy Consumption Mode and Physical Function (Zhenjun Xu, Weidong Hu)....Pages 299-305
Face Alignment by Coarse-to-Fine Deep Convolution Network on Mobile Device (Huaping Liu)....Pages 306-312
Process Design and Computer Software Simulation of Complex Parts Pen Barrel (Xiurong Zhu)....Pages 313-318
Application of CAD Combined with Computer Image Processing Technology in Mechanical Drawing (Ning Fan)....Pages 319-324
Scene Merging Technology with High Adaptability (Jiuchao Li, Liang Zhou, Ou Qi)....Pages 325-330
The Relation of Self-efficacy and Well-Being of Primary Managers: The Mediating Role of Hope (Jun Luo, Yulan Yu)....Pages 331-335
Image Feature Matching Before Image Fusion (Dingyun Jin, Ou Qi, Xiaoyan Gao)....Pages 336-342
The Role of Drone Photography in City Mapping (Shiheng Zhao)....Pages 343-348
A Cognitive Analysis of Conceptual Metaphors of Color Idioms in English and Chinese Based on Data Mining (Shiqing Zhou)....Pages 349-355
Bibliometric Analysis of Benchmarking Literatures at Home and Abroad on the Basis of CNKI Database (Cheng Wang, Huifan Luo)....Pages 356-361
Distributed Image Fire Detection and Alarm System Based on Machine Learning (Yang Du, Yufeng Fan)....Pages 362-371
Combination of Pre-processing Techniques to Improve the Performance of Target Recognition in SAR Imagery (Pengju Zhao)....Pages 372-382
College English Teaching and Testing Based on Data Mining (Bing Xu)....Pages 383-387
Information Management Mechanism of Informationization Under Cluster Analysis Algorithm (Bo Hu, Yangchun Yuan, Yongcai Wang, Hancong Huangfu)....Pages 388-394
Development and Application of Video Monitoring System for Poles Based on Ubiquitous Internet of Things Technology (Hongli Liu, Nan Li, Ye Zhao, Liyun Zhang, Xuetao Zhou)....Pages 395-401
Talent Demand Analysis of LIS Based on Python and Apriori (Xinyu Wu)....Pages 402-408
Design of Management Learning System Based on SVM Algorithm (Guo Xiaozhou)....Pages 409-414
The Application of Improved Genetic Algorithm and Least Square Method in Computer Mathematical Modeling (Nana Chen, Zhongyu Bai)....Pages 415-418
Research on Properties of Pore Fissures Based on the CART Algorithm (Dawei Dai, Ling Zhang)....Pages 419-425
Recognition Algorithm for Emotion of Japanese Feminine Terms Based on Generalized Semantic Analysis (Xiaoyu Ge, Chang Liu)....Pages 426-432
Optimizing Design of College Teaching Based on C4.5 Algorithm (Gong Sha)....Pages 433-437
Application of SVM Algorithm in Teaching Process Evaluation (Guo Jianliang)....Pages 438-443
Design of Enterprise Human Resource Management System Based on Oracle Data Mining Technology (Qian Liangliang, Yuwei Wang)....Pages 444-449
Research on Image Feature Processing Based on FPGA (YuXin Cai, ZhiGuo Yan, Jia Yang, Bo Zhao)....Pages 450-458
Design and Application Research of Targeted Persons Control System Based on Big Data (Jinbo Wu, San-you Zhang, Zhiguo Yan)....Pages 459-466
Front Matter ....Pages 467-467
An Innovative Teaching Mode Based on Programming Contest (Yongjun Luo, Hong Zheng)....Pages 469-477
The Design of Comprehensive Quality Evaluation System Under the Reform of China’s College Entrance Examination (Xianglin Zhang, Xiaolin Ge)....Pages 478-485
Efficient Teaching Management Based on Information Technology (Cuijuan Wei)....Pages 486-492
Discussion of the Higher Vocational English Teaching in the Informatization Digital Network (Guolan Yang)....Pages 493-500
The Construction of Intelligent Classroom System Based on CC2530 (Yue Yang, Dewei Kong)....Pages 501-507
Development Method of Japanese Translation Teaching Assistant Platform Based on Information Technology (Xiaoxu Xu)....Pages 508-513
Thinking and Exploration of Teaching Management in Colleges and Universities Based on Network Information Technology Such as MOOC (Xin Sui)....Pages 514-518
Computer Multimedia Technology in the Construction of Classroom Atmosphere in College Ideological and Political Education (Guoyong Liu)....Pages 519-524
Application of Speech Recognition Technology in Pronunciation Correction of College Oral English Teaching (Caiyun Liu)....Pages 525-530
Construction of Evaluation-Index System of College Teachers’ Intelligent Teaching Ability Under the Background of Educational Informationization 2.0 (Dongyan Sun)....Pages 531-537
Construction of the Practical Base of Information Sharing Courses Based on Finance (Chengwei Zhang, Xinyan Li)....Pages 538-545
The Application of MOOC in College Students’ Mental Health Teaching (Fei Wang)....Pages 546-551
Plan of Physical Education Teaching Platform Based on Campus Network Technology (Juan Yi, Jie Huang)....Pages 552-558
Development of Teaching Software for Power Electronic Technology Course (Hengjuan Liu)....Pages 559-565
Practice of University Curriculum Construction Under the Background of Informationization (Wei Cong, Jing Liu)....Pages 566-572
Course Construction Process of MOOC (Wei Cong, Hongkun Yu, Jing Liu)....Pages 573-578
MOOCs and Developing College English Teaching (Luqi Li)....Pages 579-584
Influence of Media Technology on the Development of Contemporary Children’s Literature (Mingxiu Ding)....Pages 585-591
Reform and Thoughts of Learning-Centered Classroom Teaching Based on the Cloud Space of World University City (Jinliang Wang, Xuefeng Xie)....Pages 592-597
Challenges and Countermeasures of Family Education in the Information Age (Chaoxi Qian)....Pages 598-604
New Age MOOCS Teaching in Music Class of College (Guofeng Liu)....Pages 605-610
Construction of Behavior-Oriented Smart Teaching Model in Mobile New Media Environment-Take the Course “NC Machine Tool Programming and Operation” as an Example (Lei Shi)....Pages 611-616
Innovation and Practice of “1 + N” Compound Design Talents Training Model in Computer Networks: A Case Study of New Higher Education Group Co-founded Undergraduate Program (Yuanyuan Li)....Pages 617-623
College Hotel Management Teaching Mode Based on Computer Information (Yuerong Wang)....Pages 624-629
Design of Calligraphy Online Course in Primary and Secondary Schools Based on K-Means Algorithm (Ouyang Xuxia)....Pages 630-635
Factors Restricting the Quality of Equipment Support (Ou Qi, Xiaoyan Gao, Lei Zhang, Wenhua Shi)....Pages 636-640
Present Situation, Problems and Countermeasures of China’s Information Industry (Qiang Ping)....Pages 641-645
Application of Information Technology in the Teaching of Art Design Courses (Qunying Li)....Pages 646-650
Sentiment Analysis of Painting Based on Deep Learning (Yu Lin)....Pages 651-655
Informatization of English Teaching and Its Practical Path (Yongxin Li)....Pages 656-661
A Comparative Analysis of Traditional Test of College Oral English and Computer-Based Oral English Test (Xuejing Wu)....Pages 662-666
Customer Satisfaction Evaluation of Airline Based on PLS_SEM (Huali Cai, Xuemei Wei, Yanjun Gu, Fang Wu)....Pages 667-671
Image Projection Space Invariant Technology (Yibo Wang, Ou Qi, Xiaoyan Gao)....Pages 672-676
Secure Network Coding Technology (Zhiwei Jin)....Pages 677-681
A Brief Analysis of the Investigation and Electronic Information Experiment Teaching in Higher Vocational Colleges (Jiao Xue, Wei Sai, Feifei Gao, Guiling Fan)....Pages 682-686
An Algorithm for Predicting the Optimal Path of Forehand Hitting Long Ball in the Backcourt (Ning Zhang, Feng Dong)....Pages 687-691
Feature Extraction of Basketball Shooting Based on Apriori Algorithm (Wei Zou, Zhixiang Jin)....Pages 692-696
Innovative Design of Mouse Based on Cloud Computing (Chen Jinxia)....Pages 697-702
Teaching of Secretary Based on Mobile Phone Teaching Software Application (Yang Jie, Yang Jing)....Pages 703-707
Design of Teaching System of College Students Based on KNN Algorithm (Hao Yifeng)....Pages 708-712
Fault Diagnosis System of New Energy Vehicle Based on Hidden Markov Model (Li Taotao)....Pages 713-718
Evaluation of Tourism Landscape Ecological Environment Based on AHP and Fuzzy Mathematics (Cao Peng, Cui Jing)....Pages 719-723
Collection and Processing Method of Big Data of Network Public Opinion (Chen Feng, Zhang Dali, Fu Xianjun)....Pages 724-728
Internet Finance Innovation and Entrepreneurship Based on Classification Algorithm (Guo Honglei)....Pages 729-733
Research on Embedded Technology in Industrial Control Networking (Hong Yaoqiu)....Pages 734-738
Application of Vision Guarding Technique in Intelligent Grasp of Industrial Robot (Lingyan Kong)....Pages 739-744
K-Means Algorithm in Classical Landscape Design Thought and Modern Landscape Design (Guorui Li)....Pages 745-750
Optimization Design of Refrigerator Turnover Beam Based on CAE Simulation Technology (Li Qiuli, Li Yan, Zhao Yonghao, Li Hailin, Luo Hui)....Pages 751-755
Design College Scores Test System Based on C4.5 Algorithm (Li Tian)....Pages 756-760
Design of Agricultural Precision Irrigation System Based on Wireless Sensor Network (WSN) (Wensen Lin)....Pages 761-765
Network Security Situation Awareness Strategy Based on Markov Game Model (Chengfei Lu)....Pages 766-771
Design of Class Management System Based on Naive Bayes Algorithm (Mao Xu, Haiyan Huang)....Pages 772-777
Hybrid Development of Teaching and Reading Online Course Based on FA Algorithm (Luo Xiaoli, Liu Wenjun)....Pages 778-782
Analysis of Rural Tourism Based on C4.5 (Meng Na, Li Yan)....Pages 783-787
Design of Flexible DC Distribution Control System (Xuntao Shi, Qingpai Ke, Hao Bai, Min Xu, Quan Xu, Zhiyong Yuan et al.)....Pages 788-792
3D Modeling Technology in 3D Film and Television Animation Production (Sun Wen)....Pages 793-797
Construction of Real Estate Featured Price Model Based on Massive Transaction Data (Tian Shan)....Pages 798-802
Enterprise Strategy Management Online Learning with CART Algorithm (Yuwei Wang, Liangliang Qian)....Pages 803-808
Deep Learning Strategies in Media Teaching System Based on ADABoost Algorithm (Wang Chang Jiang)....Pages 809-814
College Online Learning System Based on NLP Algorithm (Xiao Caifeng)....Pages 815-819
Design and Implementation of Music Online Network Course Based on Cloud Computing (Xuenan Yang)....Pages 820-825
Conceptual Cognition and Visual Design of Cloud Computing Products (Zhang Jing)....Pages 826-831
The Application Status and Integration Strategies of Digital Learning Apps for College Students (Jianwu He)....Pages 832-837
Computer Aided Design of Modern Decorative Pattern (Zhong Jiao)....Pages 838-843
The Computer-Aided Design of Miao Costume Patterns Based on Big Data (Gao Tao)....Pages 844-849
Portable Article Management System Based on Wireless Sensing Technology (Bo Zhao, Zhiguo Yan, Jia Yang, Cheng Cheng)....Pages 850-853
Correction to: Design and Application Research of Targeted Persons Control System Based on Big Data (Jinbo Wu, San-you Zhang, Zhiguo Yan)....Pages C1-C1
Back Matter ....Pages 855-858
Recommend Papers

Application of Intelligent Systems in Multi-modal Information Analytics: Proceedings of the 2020 International Conference on Multi-model Information Analytics (MMIA2020), Volume 2 [1st ed.]
 9783030515553, 9783030515560

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Advances in Intelligent Systems and Computing 1234

Vijayan Sugumaran Zheng Xu Huiyu Zhou   Editors

Application of Intelligent Systems in Multi-modal Information Analytics Proceedings of the 2020 International Conference on Multi-model Information Analytics (MMIA2020), Volume 2

Advances in Intelligent Systems and Computing Volume 1234

Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen , Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong

The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156

Vijayan Sugumaran Zheng Xu Huiyu Zhou •



Editors

Application of Intelligent Systems in Multi-modal Information Analytics Proceedings of the 2020 International Conference on Multi-model Information Analytics (MMIA2020), Volume 2

123

Editors Vijayan Sugumaran Department of Decision and Information Sciences, and Center for Data Science and Big Data Analytics Oakland University, School of Business Administration Rochester, MI, USA

Zheng Xu Shanghai University of Medicine and Health Sciences Shanghai, China

Huiyu Zhou Department of Informatics University of Leicester Leicester, UK

ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-3-030-51555-3 ISBN 978-3-030-51556-0 (eBook) https://doi.org/10.1007/978-3-030-51556-0 © Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Contents

Part I: Multi-modal Informatics in Industrial, Robot, and Smart City Noise Data Removal Method of Frequency Response Curve Based on MNKriging Interpolation Algorithm . . . . . . . . . . . . . . . . . . . . Ling Wei, Zijuan Guo, Shaolei Zhai, Cong Qi, En Wang, Tao Deng, Wenhua Chen, and Bing Lu

3

An Analysis Method of Multi Round Interactive Semantics for Power Enterprises Based on Solr Engine . . . . . . . . . . . . . . . . . . . . . Zheheng Liang, Jijun Zeng, Daohuan Jiang, and Gongfeng Zhu

11

Simplification Method of Two-Level Stroke Line Based on Painting Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yu Lin

17

Typical Risk Situations in Driving Situations . . . . . . . . . . . . . . . . . . . . . Yulei Liu

24

Construction of Smart Campus Under the Background of Big Data . . . Peilu Feng

32

Mass Fashion Life Service Space in Intelligent Cities . . . . . . . . . . . . . . . Hesen Li

37

Development Background of China’s Energy Internet Industry and Experiences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shanshan Wu, Xingpei Ji, Qingkun Tan, and Rui Tang

43

Probe on Curriculum Design of Electronic Circuit Based on Multisim14.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guangjun Yuan, Jiyuan Sun, Zhenjun Lei, and Yang Lu

49

Coupling Dynamics of Complex Electromechanical System . . . . . . . . . . Zhouhong He and Xiaowen Liao

56

v

vi

Contents

Development Strategy of Educational Robot Industry Based on Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jingqiu Yang and Yiquan Shi

62

Selection of Urban Rail Transit Connection Mode Under Nested Logit Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tao Liu

69

Design Method of Aerobics Teaching Assistant Platform Based on 5G Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qiong Huang and Fubin Wang

75

Transformation and Upgrading of Manufacturing Industry Under the Background of the Digital Economy . . . . . . . . . . . . . . . . . . . . . . . . . Haiyan Jiang and Xuhui Chen

82

Effect of Heat Treatment on Microstructure and Properties of Wear-Resistant Cast Steel with High Strength and Toughness . . . . . Haijun Cui, Bo Zhang, and Meng Wang

88

Computer Aided Design and Manufacture of Pen Holder for Complex Mechanical Parts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhanbin Gu

95

The Design and Implementation of Seismic Hazard Emergency Assessment System of Dongguan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Ping He, Xiuwu Chen, and Ting He Role of Robot Technique in the Manufacture of New Energy Vehicle Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Juan Shao Intelligent Vibration Control Method of Wire Rope Lifting Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Ye Tian Development Path of Energy Internet Industry for Grid Enterprises Based on the Industrial Development Priority Model . . . . . 123 Shanshan Wu and Rui Tang Application of PLC Technology in Electrical Engineering and Automation Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Meng Wang Development of Multifunctional Calculator Based on MCU (Microcontroller Unit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Qinzhu Wang Innovative Path of IAP Education in Colleges and Universities Under the Background of “Smart Campus” . . . . . . . . . . . . . . . . . . . . . 143 Shengli Wang

Contents

vii

Autonomous Vehicle Control System Based on Mecanum Wheel . . . . . . 149 Yanchun Cheng, Yu Liu, Rundong Wang, Yong Liu, and Rui Zhou Analysis and System Construction of Information-Based Engineering Management Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Jieyun Yang Device for Super Capacitor Constant Power Charging . . . . . . . . . . . . . 163 Shun Wang and Yixian Chen Robust Optimization Model of Island Energy System Based on Uncertainty of Wind and Photovoltaic . . . . . . . . . . . . . . . . . . . . . . . 171 Zhihong Gu, Huiwen Qi, Zhuo Liu, and Rong Zhang Exploration and Research on Project Engineering Management Mode Based on BIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Dongfeng Li Building Optimization Based on Wind Environment Simulation Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Zhuo Wei, Ningning Xie, and Zhe Jiao Feasibility Study of Zero Trust Security in the Power Industry . . . . . . . 195 Fei Hu, Wei Liu, Danni Wang, and Ran Ran Construction of Digital Factory Platform Based on Intelligent Manufacturing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Ying Kou, Longfei Zhang, and Liang Zhou Application of Internet of Things in the Construction of Smart City . . . 212 Ge Guo and Liang Pang Adaptive Modeling Algorithm in Distributed Aircraft Intelligent Control System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Zhang Jinhe, Sun Shujian, Hong Tao, and Du Bin Adaptive Control of Wind Power System Based on TMS320 . . . . . . . . . 224 Zenghui Guo The Zynq-7000 SoC on UltraScale Architecture . . . . . . . . . . . . . . . . . . . 231 Zhiwei Tang VHDL Design of Motor Control Module on FPGA . . . . . . . . . . . . . . . . 237 Zhiwei Tang and Xiaoqing Chen Part II: CV Process and Data Mining for Multi-modal Informatics Systems Survey of Computer Vision Synchronous Positioning and Map Construction Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Hong Zhang, Ping Yang, Hongjiao Xue, and Shixia Lv

viii

Contents

Application of Conditional Generative Adversarial Network in Image Super-Resolution Reconstruction . . . . . . . . . . . . . . . . . . . . . . . 256 Xiang Wei, Feng Wang, Xi Chen, Yongjie Yan, Ping Chen, and Sheng Liu Automatic Visual Inspection System for Injection Molding Parts of Automobile Center Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Wenqing Chi, Bin Xue, Xiaofei Li, Yuhang Zhang, and Shuangben Jiao Efficient Clustering Algorithm in Dynamic Nearest Neighbor Selection Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Jingxin An Marketing Strategy of Knowledge-Based Virtual Community . . . . . . . . 280 Zhi Li Two-Way Recommendation System for Intelligent Employment of College Students Based on Data Mining . . . . . . . . . . . . . . . . . . . . . . 286 Yifan Zhang, Qian Liu, and Qingpeng Meng Investigation on Knowledge Reduction and Rule Fusion Based on Probability Graph Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Yun Duan, Hongbo Ouyang, and Sheng Duan Relation Model Between High-Level Athletes’ Energy Consumption Mode and Physical Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Zhenjun Xu and Weidong Hu Face Alignment by Coarse-to-Fine Deep Convolution Network on Mobile Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 Huaping Liu Process Design and Computer Software Simulation of Complex Parts Pen Barrel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Xiurong Zhu Application of CAD Combined with Computer Image Processing Technology in Mechanical Drawing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Ning Fan Scene Merging Technology with High Adaptability . . . . . . . . . . . . . . . . 325 Jiuchao Li, Liang Zhou, and Ou Qi The Relation of Self-efficacy and Well-Being of Primary Managers: The Mediating Role of Hope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 Jun Luo and Yulan Yu Image Feature Matching Before Image Fusion . . . . . . . . . . . . . . . . . . . . 336 Dingyun Jin, Ou Qi, and Xiaoyan Gao The Role of Drone Photography in City Mapping . . . . . . . . . . . . . . . . . 343 Shiheng Zhao

Contents

ix

A Cognitive Analysis of Conceptual Metaphors of Color Idioms in English and Chinese Based on Data Mining . . . . . . . . . . . . . . . . . . . 349 Shiqing Zhou Bibliometric Analysis of Benchmarking Literatures at Home and Abroad on the Basis of CNKI Database . . . . . . . . . . . . . . . . . . . . . 356 Cheng Wang and Huifan Luo Distributed Image Fire Detection and Alarm System Based on Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 Yang Du and Yufeng Fan Combination of Pre-processing Techniques to Improve the Performance of Target Recognition in SAR Imagery . . . . . . . . . . . . 372 Pengju Zhao College English Teaching and Testing Based on Data Mining . . . . . . . . 383 Bing Xu Information Management Mechanism of Informationization Under Cluster Analysis Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 Bo Hu, Yangchun Yuan, Yongcai Wang, and Hancong Huangfu Development and Application of Video Monitoring System for Poles Based on Ubiquitous Internet of Things Technology . . . . . . . . 395 Hongli Liu, Nan Li, Ye Zhao, Liyun Zhang, and Xuetao Zhou Talent Demand Analysis of LIS Based on Python and Apriori . . . . . . . 402 Xinyu Wu Design of Management Learning System Based on SVM Algorithm . . . 409 Guo Xiaozhou The Application of Improved Genetic Algorithm and Least Square Method in Computer Mathematical Modeling . . . . . . . . . . . . . . . . . . . . 415 Nana Chen and Zhongyu Bai Research on Properties of Pore Fissures Based on the CART Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 Dawei Dai and Ling Zhang Recognition Algorithm for Emotion of Japanese Feminine Terms Based on Generalized Semantic Analysis . . . . . . . . . . . . . . . . . . . . . . . . 426 Xiaoyu Ge and Chang Liu Optimizing Design of College Teaching Based on C4.5 Algorithm . . . . . 433 Gong Sha Application of SVM Algorithm in Teaching Process Evaluation . . . . . . 438 Guo Jianliang

x

Contents

Design of Enterprise Human Resource Management System Based on Oracle Data Mining Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 Qian Liangliang and Yuwei Wang Research on Image Feature Processing Based on FPGA . . . . . . . . . . . . 450 YuXin Cai, ZhiGuo Yan, Jia Yang, and Bo Zhao Design and Application Research of Targeted Persons Control System Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 Jinbo Wu and San-you Zhang Part III: Agent-Based and Multi-agent Systems for Health and Education Informatics An Innovative Teaching Mode Based on Programming Contest . . . . . . 469 Yongjun Luo and Hong Zheng The Design of Comprehensive Quality Evaluation System Under the Reform of China’s College Entrance Examination . . . . . . . . . . . . . . 478 Xianglin Zhang and Xiaolin Ge Efficient Teaching Management Based on Information Technology . . . . 486 Cuijuan Wei Discussion of the Higher Vocational English Teaching in the Informatization Digital Network . . . . . . . . . . . . . . . . . . . . . . . . . 493 Guolan Yang The Construction of Intelligent Classroom System Based on CC2530 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 Yue Yang and Dewei Kong Development Method of Japanese Translation Teaching Assistant Platform Based on Information Technology . . . . . . . . . . . . . . . . . . . . . . 508 Xiaoxu Xu Thinking and Exploration of Teaching Management in Colleges and Universities Based on Network Information Technology Such as MOOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Xin Sui Computer Multimedia Technology in the Construction of Classroom Atmosphere in College Ideological and Political Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519 Guoyong Liu Application of Speech Recognition Technology in Pronunciation Correction of College Oral English Teaching . . . . . . . . . . . . . . . . . . . . . 525 Caiyun Liu

Contents

xi

Construction of Evaluation-Index System of College Teachers’ Intelligent Teaching Ability Under the Background of Educational Informationization 2.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531 Dongyan Sun Construction of the Practical Base of Information Sharing Courses Based on Finance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538 Chengwei Zhang and Xinyan Li The Application of MOOC in College Students’ Mental Health Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546 Fei Wang Plan of Physical Education Teaching Platform Based on Campus Network Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552 Juan Yi and Jie Huang Development of Teaching Software for Power Electronic Technology Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559 Hengjuan Liu Practice of University Curriculum Construction Under the Background of Informationization . . . . . . . . . . . . . . . . . . . . . . . . . . 566 Wei Cong and Jing Liu Course Construction Process of MOOC . . . . . . . . . . . . . . . . . . . . . . . . . 573 Wei Cong, Hongkun Yu, and Jing Liu MOOCs and Developing College English Teaching . . . . . . . . . . . . . . . . 579 Luqi Li Influence of Media Technology on the Development of Contemporary Children’s Literature . . . . . . . . . . . . . . . . . . . . . . . . . 585 Mingxiu Ding Reform and Thoughts of Learning-Centered Classroom Teaching Based on the Cloud Space of World University City . . . . . . . . . . . . . . . 592 Jinliang Wang and Xuefeng Xie Challenges and Countermeasures of Family Education in the Information Age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598 Chaoxi Qian New Age MOOCS Teaching in Music Class of College . . . . . . . . . . . . . 605 Guofeng Liu Construction of Behavior-Oriented Smart Teaching Model in Mobile New Media Environment-Take the Course “NC Machine Tool Programming and Operation” as an Example . . . . . 611 Lei Shi

xii

Contents

Innovation and Practice of “1 + N” Compound Design Talents Training Model in Computer Networks: A Case Study of New Higher Education Group Co-founded Undergraduate Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617 Yuanyuan Li College Hotel Management Teaching Mode Based on Computer Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624 Yuerong Wang Design of Calligraphy Online Course in Primary and Secondary Schools Based on K-Means Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 630 Ouyang Xuxia Factors Restricting the Quality of Equipment Support . . . . . . . . . . . . . 636 Ou Qi, Xiaoyan Gao, Lei Zhang, and Wenhua Shi Present Situation, Problems and Countermeasures of China’s Information Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641 Qiang Ping Application of Information Technology in the Teaching of Art Design Courses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646 Qunying Li Sentiment Analysis of Painting Based on Deep Learning . . . . . . . . . . . . 651 Yu Lin Informatization of English Teaching and Its Practical Path . . . . . . . . . . 656 Yongxin Li A Comparative Analysis of Traditional Test of College Oral English and Computer-Based Oral English Test . . . . . . . . . . . . . . 662 Xuejing Wu Customer Satisfaction Evaluation of Airline Based on PLS_SEM . . . . . 667 Huali Cai, Xuemei Wei, Yanjun Gu, and Fang Wu Image Projection Space Invariant Technology . . . . . . . . . . . . . . . . . . . . 672 Yibo Wang, Ou Qi, and Xiaoyan Gao Secure Network Coding Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 Zhiwei Jin A Brief Analysis of the Investigation and Electronic Information Experiment Teaching in Higher Vocational Colleges . . . . . . . . . . . . . . . 682 Jiao Xue, Wei Sai, Feifei Gao, and Guiling Fan An Algorithm for Predicting the Optimal Path of Forehand Hitting Long Ball in the Backcourt . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687 Ning Zhang and Feng Dong

Contents

xiii

Feature Extraction of Basketball Shooting Based on Apriori Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 Wei Zou and Zhixiang Jin Innovative Design of Mouse Based on Cloud Computing . . . . . . . . . . . . 697 Chen Jinxia Teaching of Secretary Based on Mobile Phone Teaching Software Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703 Yang Jie and Yang Jing Design of Teaching System of College Students Based on KNN Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708 Hao Yifeng Fault Diagnosis System of New Energy Vehicle Based on Hidden Markov Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713 Li Taotao Evaluation of Tourism Landscape Ecological Environment Based on AHP and Fuzzy Mathematics . . . . . . . . . . . . . . . . . . . . . . . . . 719 Cao Peng and Cui Jing Collection and Processing Method of Big Data of Network Public Opinion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724 Chen Feng, Zhang Dali, and Fu Xianjun Internet Finance Innovation and Entrepreneurship Based on Classification Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729 Guo Honglei Research on Embedded Technology in Industrial Control Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734 Hong Yaoqiu Application of Vision Guarding Technique in Intelligent Grasp of Industrial Robot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739 Lingyan Kong K-Means Algorithm in Classical Landscape Design Thought and Modern Landscape Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745 Guorui Li Optimization Design of Refrigerator Turnover Beam Based on CAE Simulation Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751 Li Qiuli, Li Yan, Zhao Yonghao, Li Hailin, and Luo Hui Design College Scores Test System Based on C4.5 Algorithm . . . . . . . . 756 Li Tian

xiv

Contents

Design of Agricultural Precision Irrigation System Based on Wireless Sensor Network (WSN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761 Wensen Lin Network Security Situation Awareness Strategy Based on Markov Game Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766 Chengfei Lu Design of Class Management System Based on Naive Bayes Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772 Mao Xu and Haiyan Huang Hybrid Development of Teaching and Reading Online Course Based on FA Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778 Luo Xiaoli and Liu Wenjun Analysis of Rural Tourism Based on C4.5 . . . . . . . . . . . . . . . . . . . . . . . 783 Meng Na and Li Yan Design of Flexible DC Distribution Control System . . . . . . . . . . . . . . . . 788 Xuntao Shi, Qingpai Ke, Hao Bai, Min Xu, Quan Xu, Zhiyong Yuan, and Jinyong Lei 3D Modeling Technology in 3D Film and Television Animation Production . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793 Sun Wen Construction of Real Estate Featured Price Model Based on Massive Transaction Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 798 Tian Shan Enterprise Strategy Management Online Learning with CART Algorithm: Taking an Empirical Analysis of Turnover Management Based on Gray Correlation Model as an Example . . . . . . 803 Yuwei Wang and Liangliang Qian Deep Learning Strategies in Media Teaching System Based on ADABoost Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809 Wang Chang Jiang College Online Learning System Based on NLP Algorithm . . . . . . . . . . 815 Xiao Caifeng Design and Implementation of Music Online Network Course Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820 Xuenan Yang Conceptual Cognition and Visual Design of Cloud Computing Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826 Zhang Jing

Contents

xv

The Application Status and Integration Strategies of Digital Learning Apps for College Students . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 Jianwu He Computer Aided Design of Modern Decorative Pattern . . . . . . . . . . . . . 838 Zhong Jiao The Computer-Aided Design of Miao Costume Patterns Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844 Gao Tao Portable Article Management System Based on Wireless Sensing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850 Bo Zhao, Zhiguo Yan, Jia Yang, and Cheng Cheng Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855

Part I: Multi-modal Informatics in Industrial, Robot, and Smart City

Noise Data Removal Method of Frequency Response Curve Based on MNKriging Interpolation Algorithm Ling Wei1, Zijuan Guo2, Shaolei Zhai1, Cong Qi2, En Wang1, Tao Deng1, Wenhua Chen1, and Bing Lu2(&) 1

Yunnan Power Grid Co., Ltd., Electric Power Research Institute, Kunming 650217, China 2 China Electric Power Research Institute, Wuhan 430074, China [email protected]

Abstract. The frequency response method is one of the most commonly used methods for determining the winding deformation of a power transformer. However, in the actual measurement, the frequency response curve of the test results will generate spiking data due to interference. If this impact cannot be accurately identified and reduced, the availability of the test results will be seriously affected, causing difficulties and even errors to the analysis and judgment of the test. A multidimensional nonuniform Kriging (MNKriging) interpolation algorithm is proposed in this paper to eliminate spiking data in the frequency response curve and improve the accuracy of the test results. The method constructs a nonuniform multidimensional deformation field model by using the optimal weight coefficient combination, and optimizes it with the particle swarm optimization algorithm to extend the Kriging interpolation to the multidimensional nonuniform field space. It has been applied to the interpolation of the transformer frequency response data. The results prove that the method reduces the noise interference to a certain extent, and therefore the points on the frequency response curve of the transformer winding deformation subject to noise interference are well recognized and repaired. Keywords: Winding deformation  Mnkriging  Nonuniform multidimensional deformation field model

1 Introduction Winding deformation of a power transformer refers to the irreversible change of the size or shape of the winding under the actions of electrodynamic force and mechanical force [1]. Winding deformation is one of the main causes for damages to the transformer [2]. Therefore, the transformer after the impact of short-circuit should be tested for winding deformation to ensure safe and stable operation of the transformer. The peak data in the frequency response curve will affect the test results of winding deformation, and this part needs interpolation. Although the frequency response curve data have different performances in the frequency dimension and phase dimension, different phases are still related to different frequencies to a certain level. For these © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 3–10, 2021. https://doi.org/10.1007/978-3-030-51556-0_1

4

L. Wei et al.

reasons, based on the frequency characteristics and phase characteristics of the frequency response data, Interpolation results is obtained by multi-dimensional nonuniform Kriging (MNKriging) interpolation algorithm. The characteristics of the frequency response curve are extracted and utilized to the greatest extent, and the correlations between adjacent phases and adjacent frequencies are used to identify and remove the noise. Kriging interpolation is a more commonly used method of spatial interpolation based on the statistical variation model. The algorithm uses the raw data of the regional variables to construct the variogram. And uses the data and the variogram to estimate the unknown values of points. Kriging interpolation algorithm is widely used in many fields such as geology, meteorology, mineral resources, and engineering applications [3]. For data with spatial-temporal correlations or multidimensional spatial correlations, the multidimensional Kriging interpolation algorithm take the characteristics of different dimensional data into consideration, and get better results. Multidimensional Kriging interpolation has been gradually applied to many fields because of these advantages. Pucc et al. [4], Rouhani [5], Jaquet et al. [6], Bardossy A et al. [7], Nobre et al. [8], Tarboton et al. [9], Piotrowski et al. [10] studied the application of multidimensional Kriging algorithm in the field of hydrogeology. The multidimensional Kriging interpolation algorithm considers the characteristics of multidimensional data in different dimensional spaces on the basis of the ordinary Kriging interpolation algorithm, and therefore obtains better interpolation effect. The MNKriging applicable to the frequency response data of winding deformation is proposed in this paper. Based on the nonuniformity of the frequency response data at monitoring points, extracts the characteristics of the frequency response data, establishes a specific variogram model according to the frequency response dataset of winding deformation, and simplifies the steps of constructing the multidimensional variogram, and thus improves the efficiency of the algorithm.

2 Method The MNKriging interpolation algorithm proposed in this paper assigns different weight values to different phases and different frequencies. The particle swarm optimization is an optimization algorithm that seeks the optimal solution through information sharing. The PSO is suitable for the optimization of nonlinear and unstructured solutions [11, 12]. PSO is used to solve the optimal solution of each weight values, and a nonuniform multidimensional deformation field model is established. The phase weight and the frequency weight with the multidimensional Kriging variogram are combined, to enable a more accurate model to be constructed for the characteristics of the frequency response curve. 2.1

The Nonuniform Multidimensional Deformation Field Model

By using the Euclidean distance, distance dij between points M and N with the corre  sponding coordinates being ðxi ; yi ; zi Þ and xj ; yj ; zj is shown in the following equation.

Noise Data Removal Method of Frequency Response Curve

5

In calculating the multidimensional distance of the amplitude value of the frequency response curve, in addition to considering the phase distance, the frequency distance, as well as the weight of the temporal distance and the spatial distance, is also  considered.  Assuming that the two spatio-temporal sample points are ðxi ; fi Þ and xj ; fj , define a nonuniform multidimensional distance relationship as follows. dij ¼

qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2  2  2 xi  xj þ yi  yj þ z i  z j

  qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2  2 hpf  ¼ ai xi  aj xj þ bi fi  bj fj

ð1Þ ð2Þ

Where, hpf is defined as a nonuniform multidimensional distance between two points. In multidimensional space, suppose there are n position points in the space. For each position point, different weight coefficient ai is given, wherein, i ¼ 1; 2; 3. In the frequency dimension, assume that there are m time points, for each time point, a different weight coefficient bj is given, wherein, j ¼ 1; 2; . . .; m. Coefficients ai and bj are used to  construct  a two-dimensional array Z to represent a two-dimensional point, i.e. Zij ¼ ai xi ; bj f j , wherein, ai and bj are the phase weight and frequency weight of the sample point respectively. ½ai  and ½bj  are weight coefficients. In deformation field model, they have different effects. By selecting a set of optimal ½ai  and ½bj , a multidimensional model can be constructed to be used for the interpolation algorithm. Particle swarm optimization has a good effect on the optimization problem of this multi-parameter. PSO algorithm optimizes the parameters ½ai  and ½bj  of the multidimensional model. The optimal solution is the set of parameters with the best model construction effect. First, several particles are randomly generated. If the multidimensional spatial deformation field contains m frequency variables and three phase variables, 3 þ m Then the dimension of each particle is 3 þ m , shown as follows. particle ¼ ½a1 ; a2 ; a3    ; a9 ; b1 ; b2 ; b3 ; b4 

ð3Þ

These particles are used to initialize the multidimensional deformable field model, i.e. multiply each dimension of the particles by each phase coordinate and frequency coordinate. Since the research object includes three position points and m time points, 3  m points are cross-validated one by one, and the mean square error (MSE) of the whole interpolation results is used as the fitness function, as shown in the following equation. 3m X 1 MSE ¼ ðobsk  prek Þ2 n  m k¼1

!

Wherein, obs is the actual measured value, and pre is the interpolation result.

ð4Þ

6

L. Wei et al.

Calculate the fitness function value of each particle. The smaller the fitness function value, the closer the particle is to the optimal solution. Each particle’s position is updated according to the following equation.   Vi þ 1 ¼ x  Vi þ c1  rand  ðPib  Posi Þ þ c2  rand  Pgb  Posi

ð5Þ

Posi þ 1 ¼ Posi þ Vi þ 1

ð6Þ

In the equation above, the subscript i represents the iterations of the algorithm; and Posi represents the current position of the particle in the i th iteration; Vi represents the speed of the particle in the i th iteration; rand is a (0, 1) range. Within the random number; Pib represents the individual optimal position of the particle; and Pgb represents the optimal location of the group. When all the particles finally gather to a position where the fitness function value is the smallest, the point corresponding to the position at this time is the optimal solution obtained. Multiply each phase position point and frequency point by the obtained 3+Mdimensional optimal solution, to obtain the multidimensional deformation field model of the multidimensional nonuniform Kriging difference algorithm. 2.2

MNKriging Interpolation Algorithm

Zðx; f Þ is a variable in the nonuniform multidimensional spatial domain, wherein, x represents the phase position coordinates of the sample points, and f represents the position points in the frequency domain. If the number of samples is n, the Kriging model in the nonuniform multidimensional domain is as shown in Eq. (7). Z^ ðx0 ; f0 Þ ¼

n X

ki Z ð x i ; f i Þ

ð7Þ

i¼1

In the nonuniform multidimensional domain, the magnitude of the variogram values is closely related to the multidimensional spatial distance between the two points, and the equation of nonuniform multidimensional variogram is as shown in the Eq. (8). 1 1 cpf ðhÞ ¼ Var ½Z ðpf þ hÞ  Z ðpf Þ ¼ E ½Z ðpf þ hÞ  Z ðpf Þ2 2 2

ð8Þ

The optimal distance scheme is expressed as follows, wherein, ½ai  and ½bj  are the optimal weight coefficients obtained by the particle swarm optimization algorithm, and xi is the phase position coordinate of the sample point, namely, i ¼ 1; 2; 3. fj is the coordinate of the sample point in the frequency dimension, namely j ¼ 1; 2; 3; m: 2 6 6 6 4

a1 x 1 ; b 1 f 1 a1 x 1 ; b2 f 2 .. .

a1 x 1 ; bm f m

a2 x2 ; b1 f1 a2 x2 ; b2 f2 .. .

a2 x2 ; bm fm

a3 x n ; b1 f 1 .. . .. . a3 x n ; bm f m

3 7 7 7 5

ð9Þ

Noise Data Removal Method of Frequency Response Curve

7

Firstly get the distance h and variogram value cpf between the two sample points, and use h and cpf to perform the fitting of the theoretical variogram model. The equation that needs to be solved is shown in the following equation. A set of weights ki for multidimensional nonuniform Kriging interpolation can be obtained by solving the equation. The set of weight coefficients minimize the interpolation error, and the number of dimensions is the same as the number of known points in the study area. Substituting ki into the Kriging model in the nonuniform multidimensional domain can obtain the attribute value of the point to be interpolated. 8 n P > > < cpf ðhÞ  ki cpf ðhÞ ¼ 0 > > :

i¼1

n P

ki ¼ 1

ð10Þ

i¼1

3 Case Analysis 3.1

Model Building

The amplitude Sðx; f Þ of the frequency response curve is regarded as a regionalized variable in a nonuniform multidimensional domain. After overall consideration given to the multidimensional characteristics of the research object, the amplitude of the frequency response curve is constructed into a multidimensional model, as shown in the Eq. (11).   mod ¼ ai bj Sij ; i ¼ 1; 2; 3; 4; j ¼ 1; 2; 3; . . .; 9

ð11Þ

Subscript i represents a different phase, and subscript j represents a different frequency. PSO algorithm optimizes the parameters of the multidimensional model. The mean square error of the cross validation results of the multidimensional nonuniform Kriging interpolation is taken as the fitness function. According to experience, the particle swarm algorithm sets the learning factors c1 and c2 of the initial parameter to the same value, i.e., 1.5, and the inertia weight w to 0.7312. The initial population size is 20. Firstly initialize the individual positions of the population within the range 0–1. The experiment selects 8 frequency points and the parameters aða1  a3 Þ of 3 phase points, and the particle dimension is 11, as shown in the following equation. particle1 ¼ ½a1 ; a2 ; a3 ; b1 ; b2 ; b3 ; b4 ; b5 ; b6 ; b7 ; b8 

ð12Þ

It will be terminated when the fitness function converges or the iterations exceed a specified number of times. The 11-dimensional optimal solutions of the multidimensional model obtained by the particle swarm optimization are [−0.646, −0.359, −0.147, −0.113, −0.142, 0.191, −0.234, 0.520, −0.318, 0.517, 0.520]. The multidimensional

8

L. Wei et al.

deformation field model is constructed using the above 11-dimensional weights as shown in the following equation. 2

0:646p1 ; 0:113f1 6 0:646p1 ; 0:142f2 6 6 0:646p1 ; 0:191f3 6 6 0:646p1 ; 0:234f4 6 6 0:646p1 ; 0:520f5 6 6 0:646p1 ; 0:318f6 6 4 0:646p1 ; 0:517f7 0:646p1 ; 0:520f8

3.2

0:359p2 ; 0:113f1 0:359p2 ; 0:142f2 0:359p2 ; 0:191f3 0:359p2 ; 0:234f4 0:359p2 ; 0:520f5 0:359p2 ; 0:318f6 0:359p2 ; 0:517f7 0:359p2 ; 0:520f8

3 0:147p3 ; 0:113f1 0:147p3 ; 0:142f2 7 7 0:147p3 ; 0:191f3 7 7 0:147p3 ; 0:234f4 7 7 0:147p3 ; 0:520f5 7 7 0:147p3 ; 0:318f6 7 7 0:147p3 ; 0:517f7 5 0:147p3 ; 0:520f8

ð13Þ

Interpolation Results

Perform interpolation of the spiking data of the transformer’s frequency response curves by using MNKriging. Firstly, use the multidimensional model to get the nonuniform multidimensional distance between two points, and use the multidimensional variogram to calculate the variogram values. The nonuniform multidimensional distance and the variogram value are grouped into one-to-one point symmetry, and then the discrete data point pairs are fitted to obtain the variogram model. Then, calculate the distance between the interpolation point and all known sample points and substitute them into the variogram model to get the variogram value. Record the interpolation results of each phase point at different frequency points. The interpolation results of nonuniform multidimensional Kriging using each phase point are shown in Fig. 1.

Table 1. Calculation results of correlations Before interpolation Low frequency Intermediate frequency High frequency After interpolation Low frequency Intermediate frequency High frequency

R12

R23

R31

0.3742 0.1333 0.3118 1.2872 0.1470 0.3613

0.4374 0.1558 0.3197 1.6030 0.1654 0.5150

0.2116 0.9455 0.7209 1.6547 1.3141 1.2248

The frequency response curve after interpolation is shown in Fig. 2, and the red point in Fig. 1 is the interpolation point. The three curves - LaLb, LbLc and LcLa are called curves 1, 2 and 3 respectively, and the correlations are shown in Table 1. It can be seen from Table 1 that the correlations after interpolation by MNKriging are significantly increased, indicating the effectiveness of the algorithm.

Noise Data Removal Method of Frequency Response Curve

9

Fig. 1. Interpolation results of LaLb, LbLc, and LcLa are (a), (b) and (c) respectively.

Fig. 2. Frequency response curves after interpolation

4 Conclusion The frequency response curve is a data set that is related to each other in twodimensional spacetime. For any two frequency response curves, there is not only correlation in the frequency domain but also correlation in phase. Therefore, when interpolating, consideration given to the correlation of frequency and phase can improve the interpolation accuracy. After full given to the characteristics of phase and frequency, combine the spatial-temporal dimensions and phase dimensions to construct

10

L. Wei et al.

a spatial-temporal deformation field model. The experimental results show that the improved nonuniform spatial-temporal Kriging interpolation using particle swarm optimization can represent the data effectively. The interpolated data can effectively eliminate the spike noise data, and can also weaken the influence of other noise to some extent, so that the disturbed frequency response curve is again available.

References 1. Chen, H.: Preventive Test Method and Diagnostic Technology of Electric Power Equipment. China Science & Technology Press, Beijing (2001) 2. Lu, Y.: A Temporal-Spatial Geographic Weighted Regression Method Based on Principal Component Analysis. Chinese Academy of Surveying & Mapping (2018) 3. Chen, H.: Abnormal Operation and Accident Treatment of Power System. China Water & Power Press, Beijing (1999) 4. Pucci Jr., A.A., Murashige, J.A.E.: Applications of universal kriging to an aquifer study in New Jersey. Groundwater 25(6), 672–678 (1987) 5. Rouhani, S., Hall, T.J.: Space-time kriging of groundwater data. Geostatistics 2, 639–650 (1989) 6. Jaquet, O.: Factorial kriging analysis applied to geological data from petroleum exploration. Math. Geol. 21(7), 683–691 (1989) 7. Bardossy, A., Bogardi, I., Kelly, W.E.: Kriging with imprecise (fuzzy) variograms. II: application. Math. Geol. 22(1), 81–94 (1990) 8. Nobre, M.M., Sykes, J.F.: Application of Bayesian kriging to subsurface characterization. Can. Geotech. J. 29(4), 589–598 (1992) 9. Tarboton, K.C., Wallender, W.W., Fogg, G.E., et al.: Kriging of regional hydrologic properties in the western San Joaquin Valley, California. Hydrogeol. J. 3(1), 5–23 (1995) 10. Piotrowski, J.A., Bartels, F., Salski, A., et al.: Geostatistical regionalization of glacial aquitard thickness in northwestern Germany, based on fuzzy kriging. Math. Geol. 28(4), 437–452 (1996) 11. Zhou, C., Gao, H., Gao, L., Zhang, W.: Particle swarm optimization. Appl. Res. Comput. 12, 7–11 (2003) 12. Yang, W., Li, Q.: Overview of Particle Swarm Optimization, no. 05, pp. 87–94. Chinese Engineering Sciences Press, China (2004)

An Analysis Method of Multi Round Interactive Semantics for Power Enterprises Based on Solr Engine Zheheng Liang1(&), Jijun Zeng1, Daohuan Jiang1, and Gongfeng Zhu2 1

2

Information Center of Guangdong Power Grid Co., Ltd., Guangzhou 510000, China [email protected] Yunnan Yundian Tongfang Technology Co., Ltd., Kunming, China

Abstract. The user experience is the foundation for many enterprises to settle down. One of the key points to improve the user experience is to solve the user’s problems immediately and at any time. Therefore, more and more enterprises have added online customer service and other modules in the service software to respond to customer needs at any time. On the other hand, enterprises must find a balance between improving customer experience and controlling human cost. Automatic response system can achieve zero cost and 24-hour duty, which is limited to most enterprises. However, there are some problems in traditional methods, such as single guessing information, low guessing probability and poor user experience. The purpose of this paper is to provide a multi round interactive semantic analysis method based on Solr engine, which can effectively solve the above-mentioned core problems: single guessing information, low guessing probability and poor user experience. The purpose of this paper is to provide a Solr engine based multi round interactive semantic analysis method for power enterprises. In addition to effectively solving the above core problems, it can also improve the accuracy of the semantic analysis results, so that the user consultation module can get a better user experience, use the multi round interactive semantic analysis method, and output the analysis results of user emotion dimension. Keywords: Multi round interactive semantics engine  Advisory module

 Power enterprises  Solr

1 Introduction In order to answer the user’s questions, the automatic response system needs to understand the user’s questions [1], that is, to realize natural language understanding, which is an important function and a huge problem in intelligent question answering. In the power industry, the standard response to the user consultation on power failure is to appease the user’s mood [2], then guide the inquiry or inquiry on whether there is a power failure plan in the user’s area and whether the user’s account is in arrears. After the user responds, they further guide the inquiry on other information of the user © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 11–16, 2021. https://doi.org/10.1007/978-3-030-51556-0_2

12

Z. Liang et al.

according to the different situations of the user [3, 4]. The current technology adopted in the industry mainly depends on key words [5]. In this way, users can guess the most core keywords mentioned in the current problem, query the original database, and provide users with the most relevant data types for selection. The core problems of this way are single guessing information, low guessing probability, and user experience difference. Some scholars have disclosed a multi round interactive semantic understanding method and device, including receiving voice data [6, 7]. In this method, the speech data is segmented to obtain the speech data segments [8], and then the speech data segments are recognized to obtain the current segmented text data [9]. According to the historical data of user interaction, the current segmented text data is semantically understood, and the result of semantic understanding is obtained [10]. However, simple segmentation of speech data and semantic understanding of the segmented speech segments will lead to the problem of single guessing information and low guessing probability. Therefore, how to solve the above problems has become the focus of research in this field.

2 Multi Round Interactive Semantic Analysis Method of Power Enterprise Based on Solr Engine Based on Solr engine, the multi round interactive semantic analysis method of power enterprise includes the following steps. Step 1. Accept the user’s text information input, and make a preliminary analysis of the user’s mood according to the text information input. The preliminary analysis is a rule-based Chinese mood analysis method based on the dictionary. Step 2. Compare the preliminary analysis results with the set threshold value to determine whether it is manic. Step 3. The preliminary analysis results are combined with the common vocabulary of electric power to segment the user’s text information input; Step 4. After word segmentation, the user’s word bank is combined to segment the word twice; Step 5. After the second segmentation, the new segmentation segments are understood semantically. When the initial analysis is finished, the appeasement language to the user is output according to the customer’s emotional situation, combined with the emotional appeasement database. When judging that the user is in a manic state, the personalized part is added to the user vocabulary. The user input text information is segmented through the preliminary analysis results, combined with the common vocabulary of electric power. Let the computer simulate people’s understanding of sentences to achieve the effect of word recognition. This segmentation is based on the understanding of word segmentation method. The second segmentation is based on the statistical segmentation method. On the premise of a large number of segmentation segments, we use the statistical machine learning model to learn the rules of word segmentation, so as to achieve the

An Analysis Method of Multi Round Interactive Semantics

13

segmentation of unknown text. After the semantic understanding, the new words obtained by the most matching word segmentation will be added to the user’s vocabulary. The user’s text information input can be obtained by text communication, or the text content after voice acquisition and speech recognition. The schematic diagram of multi round interactive semantic analysis method is shown in Fig. 1.

Text message input

Emotional coping

Power word library

Mania

Word segmentation User Words Secondary segmentation

Semantic

understanding

End

Fig. 1. Principle block diagram of multi round interactive semantic analysis method

14

Z. Liang et al. Text message input

Emotion analysis

Power word library

Conciliatory language

Fig. 2. The analysis and processing block diagram of emotional dimension

The analysis and processing block diagram of emotional dimension is shown in Fig. 2. The schematic diagram of multi round interactive semantic analysis device based on Solr engine is shown in Fig. 3.

Voice acquisition module

Speech recognition module

Text upload module

Semantic analysis module

Fig. 3. The schematic diagram of multi round interactive semantic analysis device based on Solr engine

3 Case Analysis The method of word segmentation based on understanding is to make the computer simulate people’s understanding of sentences, so as to achieve the effect of word recognition. Its basic idea is to analyze syntactic and semantic information at the same time of word segmentation, and use syntactic and semantic information to deal with

An Analysis Method of Multi Round Interactive Semantics

15

ambiguity. It usually consists of three parts: word segmentation subsystem, sentence French meaning subsystem and general control part. Under the coordination of the general control part, the word segmentation subsystem can obtain the syntactic and semantic information about words and sentences to judge the ambiguity of word segmentation, that is, it simulates the process of people’s understanding of sentences. This word segmentation method needs a lot of language knowledge and information, and the common vocabulary of electric power can make up for the lack of the specialty of common word segmentation plug-ins. The common vocabulary of electric power is shown in the following Table 1. Table 1. The common vocabulary of electric power Word 1. Industry expansion 2. Household table 3. Meter 4. Metering point 5. Watch box 6. Electronic transfer 7. Main network 8. Distribution network 9. Power grid 10. Line loss 11. Purchase and sale of electricity 12. Internetwork transaction 13. Increase capacity ……

Weight 5 4

……

After word segmentation, the second segmentation is based on the statistical segmentation method. On the premise of a large number of word segmentation segments, the rule of word segmentation is learned by using the statistical machine learning model, so as to achieve the segmentation of unknown text. According to the different speech habits of each person, the user’s word library tends to be colloquial. The user’s word library is shown in the following Table 2. Table 2. The user’s word library Word 1. No power 2. A lot of money ……

Weight 5 4 ……

16

Z. Liang et al.

After the second segmentation, the new segmentation segments are understood semantically. After the semantic understanding, the new words obtained by the most matching segmentation method are added to the user’s vocabulary. In this embodiment, when analyzing the user’s emotions, pacifying the user through the pacifying words of the emotional pacifying library can stabilize the customer’s emotions, help solve the customer’s problems, and make the customer’s experience better.

4 Conclusion Multi round interaction based on context dialogue scene is an important function and a huge problem in intelligent questions and answers system. In practical application, the problem that intelligent question answering system needs to solve is likely to be a complex process knowledge, rather than a simple form of question answering. This paper uses an analysis method of multi round interactive semantics for power enterprises based on Solr engine to improve the accuracy of the semantic analysis results and get a better user experience.

References 1. Wiangtong, T., Cheung, P.Y.K., Luk, W.: Comparing three heuristic search methods for functional partitioning in hardware–software codesign. Des. Autom. Embed. Syst. 6(4), 425– 449 (2012) 2. Singh, G., Kumar, K.: Retrieving records of genealogy registers online using genetic algorithm based adaptive heuristic search technique. Int. J. Comput. Appl. 82(11), 17–21 (2014) 3. Hamzehkolaei, N.S., Miri, M., Rashki, M.: An enhanced simulation-based design method coupled with meta-heuristic search algorithm for accurate reliability-based design optimization. Eng. Comput. 32(3), 477–495 (2015) 4. Hamdar, S.H., Khoury, H., Zehtabi, S.: A simulator-based approach for modeling longitudinal driving behavior in construction work zones: Exploration and assessment. Simul. Trans. Soc. Model. Simul. Int. 92(6), 579–594 (2016) 5. Lin, K.-Y., Lin, J.-C., Chen, J.-M.: Defense automatic malicious tools based on navigation behavior. J. Discret. Math. Sci. Cryptogr. 13(1), 17–27 (2010) 6. Adly, M., Besheer, A.H.: A meta-heuristics search algorithm as a solution for energy transfer maximization in stand-alone photovoltaic systems. Int. J. Electr. Power Energy Syst. 51(10), 243–254 (2013) 7. Baier, J.A., Bacchus, F., Mcilraith, S.A.: A heuristic search approach to planning with temporally extended preferences. Artif. Intell. 173(5), 593–618 (2017) 8. Huang, B., Sun, Y., Sun, Y.M., et al.: A hybrid heuristic search algorithm for scheduling FMS based on Petri net model. Int. J. Adv. Manuf. Technol. 48(9), 925–933 (2010) 9. Zhang, D., Wei, L., Leung, S.C.H., et al.: A binary search heuristic algorithm based on randomized local search for the rectangular strip-packing problem. Informs J. Comput. 25(2), 332–345 (2013) 10. Tetteh, G.K.: Application of open source search engine solr to build standards information management and analysis platform. J. Health Inf. Dev. Ctries. 8(2), 42–65 (2014)

Simplification Method of Two-Level Stroke Line Based on Painting Sequence Yu Lin(&) Guangdong University of Technology, Guangzhou 510030, Guangdong, China [email protected]

Abstract. Although with the help of the electronic brush, line sketches can be manually redrawn into normal lines, this will still cost artists a lot of time and affect their efficiency of creation. By using the painting sequence of strokes, the simplified model can be promoted from a single spatial relationship to a time sequence relationship as well as a stroke modification relationship, thus the simplification method of two-level stroke line can be proposed. In the process of painting, the position and sequence of stroke lines will be recorded in real time, and the preliminary clustering of lines will be carried out partially according to the spatial information and sequential relationship. Then the modified relationship between the global line categories can be analyzed by modifying the relationship diagram to understand the painting intention of the artist, and finally the simplified results will be obtained by merging. Keywords: Sketches modification

 Line simplification  Clustering analysis  Line

1 Introduction The simplification method of the line sketch can be divided into two categories: method based on the image and method based on the stroke information. The former takes the line drawing grid graph obtained by scanning or photography as the input, while the latter takes the stroke data with the position information as the input [1]. Due to the increasing popularity of digital brushes and touch screens, the stroke information is more and more easily obtained. Therefore, the method based on the stroke information has attracted more and more attention. This paper also deals with line sketches with the stroke data. However, even with the stroke information, there is still a great challenge to achieve automatic simplification. Firstly, line sketches often contain a large number of stroke lines with the complex structure and the messy picture such as spatial distance, parallelism and other spatial relations. The measurement cannot accurately judge whether the lines should be merged or not [2]. Secondly, the creation of line sketches is not accomplished overnight, and artists often modifies them over and over again until they are basically satisfied. The lines used to modify are closer to the creation intention of the artist than previous lines, but the computer doesn’t know which lines are modified. Thirdly, the emphasis of line sketch is on the rapid expression of creation intention, whose painting speed is usually fast. Thus, the simplification method of the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 17–23, 2021. https://doi.org/10.1007/978-3-030-51556-0_3

18

Y. Lin

computer needs to deal with an increasing number of lines in real time, which poses a great challenge to the efficiency of its algorithm. Existing methods, such as Barla which was proposed in 2005 to cluster for line similarity and spatial distance with the help of Hausdorff distance and Liu which was proposed in 2015 to simplify the input line by means of taking the closed sensing region as the line clustering, are mainly based on the analysis of the spatial relationship between lines or regions. In this way, the modification relationship of lines cannot be analyzed [3, 4], and the calculation efficiency is also relatively low. In addition, the line with the stroke information may also be drawn into the image and simplified by using the image-based method. However, because of the loss of the stroke information, this method is often difficult to deal with more complex line sketches, so it is mainly used to simplify traditional sketch without stroke information. Painting sequence is an important information of line strokes, which not only makes up for the deficiency that the line space information is difficult to reflect the line modification relationship, but also provides conditions for further improving the robustness and efficiency of the simplified method. After a long period of observation and discussion with the artist, it is found that if the sequences of multi-stroke lines are adjacent and the space is close, these lines are usually sketching the same object [5]. The multi-stroke lines with a close sequence and far space distance are often used for different objects. In addition, if multi-stroke lines of which the sequence is not adjacent and the space is close appear, the back line may be a modified stroke of the front line. Based on the above observation, this paper presents a simplified method of doublelevel line sketch. First, the position and sequence of the stroke lines should be recorded in real time in the process of drawing, and the local preliminary clustering of the lines is carried out according to the spatial information and the sequential relationship. Then we should analyze the painting modification relationship between line categories, understanding the painting intention of the artist, carrying on the global clustering and finally merging to get the simplified result. The innovation of this paper is mainly reflected in the analysis of the time relationship and modification relationship between strokes through the introduction of line stroke sequence information, which breaks the shortcomings of the existing methods limited to spatial relationship analysis. In this paper, a two-level simplification method of line strokes is proposed, which automatically converts complex line sketches into concise line vector graphics by clustering partial and global strokes accurately and efficiently.

2 Research Process The simplification of line strokes in this paper mainly includes three main steps: partial line clustering, global line modification relationship analysis and stroke line merging and parametrization. First of all, according to the analysis of the similarity between front and rear lines, the preliminary clustering between lines can be realized. Then, according to the preliminary clustering result, the modified relationship between the line categories should be analyzed to obtain the digraph of the modification relationship [6, 7]. Finally, the final line merging should be carried out according to the modification relationship, and the parameter of the merged lines should be carried out. The

Simplification Method of Two-Level Stroke Line

19

final simplification result will be obtained. Among them, partial clustering and global modification relationship analysis constitute a two-level stroke clustering model, which is the most critical step in this paper and ensures the accuracy of subsequent line merging and parameterization. The main steps of the method are shown in Picture 1. Picture 1a and b show the effect of the two-level clustering in this paper. Among them, the lines marked inside the dotted line show that the method of this paper can detect the modification relationship of lines very well, so the reasonable line clustering and simplification results can be obtained.

a. The picture of input lines

b. Result of partial line clustering

Picture 1. Diagrammatic sketch of the main steps in this paper

It is worth noting that the existing stroke clustering methods mainly consider the spatial position relationship between strokes such as the spatial distance of Barla, the coverage of Shesh, the parallelism and continuity of Liu, etc. However, the sequence relationship and modification relationship between strokes are not taken into account. The method in this paper solves this problem by introducing the sequence information of strokes. In addition, the preliminary clustering of the method in this paper only considers the adjacent lines and line categories of the current stroke lines, which is a partial and dynamic clustering [8]. However, it is a global topological optimization process to merge the graph lines according to the digraph of the modification relationship [9]. Preliminary clustering is performed in real time during interaction, and the combination of modification relationship is only carried out when the digraph of the modification relationship is changed. Therefore, this paper not only makes full use of the sequence information to analyze the modification relationship, but also has the advantages of accuracy and efficiency by using the method of partial clustering and global merging.

20

Y. Lin

3 Experimental Results and Discussion 3.1

Effect Display and Comparison

On the basis of spatial relationship, the line simplification method in this paper elevates the simplified model to the sequential relationship and modification relationship by introducing the sequence information of the stroke. As shown in Picture 1, it can be seen that the [1] method of Barla can easily cause clustering failure in rough painting areas, such as the area marked by circles. Simo-Serra uses depth neural network to learn image simplification, and automatically convert the line drawing grid graph into simplified image but it is difficult to maintain the topological structure of lines and is prone to fracture. In this paper, the modification relationship of line categories is analyzed by stroke sequence, which can remove the error lines and retain the detail structure at the same time.

A. input lines

B. Barla

C. Simo-Serra

D. this paper

Picture 2. Comparison of simplification effects of different methods on error lines with large deviation

Picture 2 shows the comparison between this paper and Shesh, Chien, Simo-Serra and Liu. Because the input line is rough, Shesh, Chien and Simo-Serra are difficult to achieve the purpose of simplification. Although Liu has a high degree of simplification, there are clustering errors in the areas where the lines have modification relationships, leading to errors in the final simplification results. Taking the lines in the circle as an example, the method of Liu gathers the eyebrows and eyes of the stroke lines into one kind, so they are mixed together in simplification. The same problems also occur in areas such as chin and collar. The method in this paper can well identify these modification relationships and divide these lines into

Simplification Method of Two-Level Stroke Line

21

different categories, so there will be no problem of destroying the structure in simplification as shown in Picture 3A and B.

A. clustering of Liu

B. the results of the simplification of the method in this paper

Picture 3. Comparison of line simplification methods with different stroke information

Picture 1 further shows the comparison between this method and the [2] method of Liu, which shows the robustness of this method in maintaining the detail structure. Because of the large structural area near the circle area, the lines at the red circle are divided into the edge lines which outline the larger area when the method of Liu carries on the line clustering, which leads to the excessive merging and simplification of the lines around the large area when the lines around the large area are simplified. In the method of this paper, only the line and the time sequence information are used for analysis, and the line combination and the simplification result at the circle are correct. The small triangle in the circle is next to a long outline line. The method of Liu simplifies the triangle into an oval shape, while the method in this paper basically maintains the triangular shape in the original graph [10]. From the aspect of generalization, because it only depends on the similarity between lines and the sequence relationship of lines, the simplified method in this paper is more widely used than the region-based line clustering method proposed by Liu. Compared with the method proposed by Barla which can only simplify the line drawing with uniform line distribution based on the similarity between lines, this paper can simplify the situation where the distribution of lines is more cluttered. Picture 2 shows more results of line clustering and line simplification for artists by this method of this paper, in which the original diagram of the above two lines comes from the literature. These results show the robustness of the method in this paper, especially in the case of complex lines and more modified lines and non-closed curves, the method of this paper still can achieve the purpose of automatic simplification. The painting habits and sequence of different artists may not be the same. Picture 2 shows

22

Y. Lin

the lines sketches of the same content of the two artists and the processing results of this paper, which fully shows the stability of the method in this paper. 3.2

Experimental Environment and Efficiency

In this paper, the stroke information is collected by the digital plate Wacom CTL-671 under the hardware condition of CPU i7-6700HQ and 8 GB memory. The transformation of stroke information, line information and visual interface are based on QT framework.In this paper, the simplification and vector time of complex line drawing without GPU acceleration is 1–3 s. It should be pointed out that the preliminary clustering and merging in this paper can achieve the real-time speed. Compared with the clustering method of Barla for calculating Hausdorff distance of all input lines and lines as well as regional iterative optimization method of Liu, the efficiency of the simplified method in this paper has certain advantages.

4 Conclusion In this paper, the simplification method of two-level stroke line based on painting sequence is proposed. With the help of the sequence characteristics existing in the process of drawing line of the artist, a simplified model reflecting the modification intention of the artist is established, which overcomes the limitation that the existing methods only rely on the spatial relationship of strokes. This method realizes the clustering of stroke lines at the local and global levels. Firstly, the position and order of stroke lines are recorded in real time in the process of painting, and the local preliminary clustering of lines is carried out according to the spatial information and sequence relationship. Then we need to analyze the painting modification relationship between line categories in order to understand the painting intention of the artist, carrying on the global clustering and finally merging to get the simplified results. The method in this paper only relies on the original input data and completes the analysis of the painting intention of the artist more accurately and efficiently, which can simplify the more complex line drawing that lacks obvious structural characteristics.

References 1. Barla, P., Joelle, T., Sillion, F.X.: Geometric clustering for line drawing simplification. In: Proceedings of the 16th Eurographics Conference on Rendering Techniques, pp. 183–192. Eurographics Association Press, Aire-la-Ville (2005) 2. Liu, X.T., Wong, T.T., Heng, P.A.: Closure-aware sketch simplification. ACM Trans. Gr. 34(6): Article No. 168 (2015) 3. van Nieuwenhuizen, P.R., Kiewiet, O., Bronsvoort, W.F., et al.: Anintegrated line tracking and vectorization algorithm. Comput. Gr. Forum 13(3), 349–359 (1994) 4. Bonnici, A., Camilleri, K.: A circle-based vectorization algorithm for drawings with shadows. In: Proceedings of the International Symposium on Sketch-Based Interfaces and Modeling, pp. 69–77. ACM Press, New York (2013)

Simplification Method of Two-Level Stroke Line

23

5. Bonnici, A., Camilleri, K.P.: Scribble vectorization using concentric sampling circles. In: Proceedings of the 3rd International Conference on Advanced Engineering Computing and Applications in Sciences, pp. 89–94. IEEE Computer Society Press, Los Alamitos 6. Sun, J., Liang, L., Wen, F., et al.: Image vectorization using optimized gradient meshes. ACM Trans. Gr. 26(3): Article No. 11 (2007) 7. Microscopy: Findings from Minjiang University Broaden Understanding of Microscopy (Material and Painting of Ming Dynasty Lacquerware Coffin Based on Microscopic Observation). Sci. Lett. (2019) 8. Brown University: Scientists reveal the physics of Jackson Pollock’s painting technique. NewsRx Health Sci. (2019) 9. Bonaduce, I., Duce, C., Lluveras-Tenorio, A., Lee, J., Ormsby, B., Burnstock, A., van den Berg, K.J.: Conservation issues of modern oil paintings: A molecular model on paint curing. Acc. Chem. Res. (2019) 10. Hayn-Leichsenring, G.U, Kenett, Y.N., Schulz, K., Chatterjee, A.: Abstract art paintings, global image properties, and verbal descriptions: An empirical and computational investigation. Acta psychol., 202 (2019)

Typical Risk Situations in Driving Situations Yulei Liu(&) Southwest JiaoTong University, Chengdu, China [email protected]

Abstract. The three main components of scene, user and driving task in the risk driving situation are analyzed by means of questionnaire survey and video recording. The typical components and characteristics of driving task, user and scene are extracted, and the typical user profile is constructed by using the data obtained. The typical tools for constructing the risk driving situation are applied to in design practice. Keywords: Situation

 User  Typicality  Driving situation

1 Introduction Typicality is a design method commonly used in the process of product planning in the information field. At present, it has been widely used in the field of information interaction design, such as the presentation of typical scenes, typical users, the generation of typical user portraits using data, typical task functions, etc. [1]. In the risk driving situation, such a way is often used to conduct representative analysis and induction and widely used in problem solving. This paper mainly analyzes the situations with risks in driving situations, analyzes the problems in risk situations with typicality, and solves practical problems with typicality driving situations. Driving situation elements include three parts: scene, task and user [2]. According to the typical situations, combing typical driving tasks and scenarios, when drivers face different signals, they should This paper analyzes the audio-visual characteristics of the warning signal, and studies the driver’s perception characteristics of the warning signal. 1.1

Typical Driving Situations

Scene method is to simulate the time and space of construction events, which has a real feeling. In recent years, it has been widely used in digital products and industrial design industry [3–5]. “Product” or “task” must occur in a fixed time and space, which is the basis of interaction events. The typical scene in the situation is a series of typical scenes with high probability of occurrence, which is characteristic representative. In such scenes, the general rules of things can be found. The collection of typical scenarios is the basis for the analysis and design of user behavior and behavior logic in the following typical scenarios. It is helpful to find the real user needs and solve the problems. This paper aims to find out the typical users and scenes through the questionnaire. According to different roads, driving scenes can be generally divided into eight types of road scenes: high-speed road scene, provincial national road driving scene, urban road © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 24–31, 2021. https://doi.org/10.1007/978-3-030-51556-0_4

Typical Risk Situations in Driving Situations

25

scene, urban suburban road scene, rural county road driving scene, parking car scene, intersection scene, and other scenes. The specific method is to find typical scenes and users by sending out questionnaires, invite users who are willing to cooperate with the experiment to conduct indepth tracking and shooting, analyze the typical scenes and observe the audio-visual characteristics of users, and interpret them [6–8]. 1.2

Driver Driving Scene Experiment

Questionnaire survey and video tracking are conducted for the driving scenes of middle-aged and elderly drivers to explore the scene data and accumulate the scene and user data. Experiment 1: through the design of questionnaire, through the network and on-site two ways to invite the target population to answer the questionnaire. The goal is to issue 250 questionnaires. Design the online questionnaire on the questionnaire star, and use the sample service function of friend invitation and questionnaire star to fill in the questionnaire. 236 questionnaires were collected, and 50 were collected offline, including 219 valid online questionnaires and 50 valid offline questionnaires. As shown in the Fig. 1.

Fig. 1. Online and offline questionnaire samples (Source - Questionnaire star and Self drawing)

Participants: Drivers of different ages. Questionnaire Objective: To find out the typical users and scenes of driving, to accept the warning system, and to prepare for the subsequent users and scene analysis. Questionnaire design: Design the questionnaire from the basic information of drivers, driving travel scenarios, warning system use scenarios, system preferences and expectations [9, 10]. Experiment 2: Through experiment 1, statistics of user characteristics and prediction of typical scene characteristics, design experiment 2, collect 10 typical volunteer users, invite them to participate in the 15 min driving task experiment in daily life, and summarize the typical driving scene and subsequent physical and mental reaction experiment from the driving experiment. Test object: The test object has its own car or BMW X1 as the test vehicle, and the daily travel task of the test object is the test object. Test Objective: To collect the typical scenes of the subjects in their daily driving tasks and verify the data conclusions in the questionnaire survey.

26

Y. Liu

Test design: The video is used to shoot a certain period of the subjects’ daily travel, guide the subjects to complete the preset tasks (preset task list: start the vehicle, drive towards the work place, play the radio music, park the car, and complete some tasks according to the time), record the details of various scenes in this period, and use the statistical principle to unify The typical scenes and characteristics of daily travel of the test object are calculated. User selection: The typical users counted from Experiment 1 are invited to test. Experimental methods: Driving task simulation, video shooting, table statistics and induction. Experiment process: Design and select the user, after invitation, agree on the time period of the test object, predict the driving task that will happen according to different test objects, design the corresponding driving task, guide the test object to complete the corresponding test task, while the test staff track and record through video and audio recording technology during the guidance process. After recording, through the analysis of the video, statistics of the main driving scenes and analysis of the typical driving scenes according to the statistical principle, and then build the typical scenes.

2 Driving Scene Conclusion and Typical User Portrait (1) The driving scenes, scene user questionnaires and video scenes are sorted out as follows in Table 1.

Table 1. Driving scenario statistics Driving road scene Urban road scene

Detailed explanation of driving behavior

Free driving, traffic light, following, road deviation, overtaking, calling, using central control information system, braking, merging, intersection, low-speed driving, medium speed driving, high-speed driving, etc. Suburban road scene Free driving, traffic light, following, road deviation, overtaking, calling, using central control information system, braking, low-speed driving, converging intersection, intersection, medium speed driving, high-speed driving, etc. Expressway scene Free driving, following, road deviation, overtaking, calling, using central control information system, braking, driving at medium speed, converging intersection, driving at high speed, etc. Rural county road scene Free driving, following, road deviation, overtaking, calling, using central control information system, braking, intersection, low-speed driving, medium speed driving, etc. Provincial National Road scene Free driving, traffic light, following, road deviation, overtaking, calling, using central control information system, braking, low-speed driving, medium speed driving, high-speed driving, etc. Driving, parking and parking scenes in the unit Driving, parking and parking Make a phone call, use the central control information system and drive scenes in the unit at low speed Intersection scene Driving at three intersections Other driving scenarios Other driving behaviors

Typical Risk Situations in Driving Situations

27

In all kinds of driving scenes, we find that there are a series of similar behaviors in all kinds of driving scenes, and we intend to summarize all kinds of driving behaviors. On this basis, further analysis, some characteristics of driving behavior. Conclusion: Through online and offline questionnaire survey, the scene with the highest proportion of users in video analysis is urban road scene + parking scene in urban units, suburban national road scene and high-speed road scene, as shown in the following figure; and through user operation video analysis, it is found that intersection scene is also a very high attention scene, and the above four types of scenes are selected as typical scene research. Object of study (Fig. 2).

Fig. 2. Proportion of road scenes in the questionnaire (Source - Questionnaire star)

Driver characteristics: Based on the driver questionnaire, it is found that the proportion of users in this group is 50% between the age of 65 and the age of 30–65, and the income range is between 50000–300000, as shown in the following Fig. 3.

Fig. 3. Income of different ages and overall income range (Source - Questionnaire star)

The driver’s acceptance of the warning system, expectations for the system, system use scenarios, and a series of behaviors of the driver in the driving process are as follows.

28

Y. Liu

In Fig. 4, it can be found that 94.91% of users are more receptive to the warning system. The main functions they hope to cut in during driving are following, highspeed fatigue, road deviation, impact and other functional scenarios.

Fig. 4. User acceptance and expectation of warning system (Source - Questionnaire star)

(2) Typical user portrait 4: According to the survey questionnaire to summarize the characteristics of users, combined with the offline questionnaire to extract three typical user portraits. User portrait 1: Zhu XX, male, 34 years old, steady personality, graduate degree, high personal acceptance of digital products, acceptable for new technology products, annual income of about 150000 yuan, there is a 300000 BMW X1, daily travel is mainly to work, take high-speed, city road, like listening to music and radio during driving, occasionally have the habit of calling, think Warning signals are necessary. User portrait 2: Zhu XX, male, age 56, steady, bachelor’s degree, general acceptance of digital products, income range around 300000, a Toyota SUV, daily travel is mainly working hours, in urban areas and industrial parks, driving process is more selfdiscipline, less dangerous behavior, listening to radio habits, think warning signal has a better auxiliary role in driving. User portrait 3: Li XX, female, 28 years old, lively, college degree, good personal acceptance of digital products, active understanding of technology leading edge knowledge, income range around 80000, a 100000 modern car, daily travel is mainly weekend travel, in the city and the National Road, like music, call, use of navigation in the driving process, more identify with the car police Auxiliary driving ability of indicator signal.

Typical Risk Situations in Driving Situations

29

3 Driving Task Analysis From the above section, we can see the common behaviors of drivers, summarize the main tasks of drivers in the driving process from these behaviors, and analyze the requirements of these tasks for warning signals. From the user behavior combed in the driving scene and the risk in the driving process, it can be divided into five categories: driver’s active driving behavior and driver’s non active driving behavior. The driving behaviors in various road scenes are summarized as follows in Table 2. Table 2. Driving behavior classification statistics Driver’s active driving behavior

Driver’s non active driving behavior

Normal road Table 2. Driving behavior driving behavior (free driving, following, overtaking and other driving conditions, use of central control information, mobile communication, etc.), driving start (parking lot, gate entrance, zebra crossing traffic light, etc.), reverse driving, parking and parking behavior Low speed driving, high-speed driving, drunk driving, navigation guided driving, chat driving, operation of central control information system (occupation of vision, etc.), other active behaviors Driver’s non active driving behavior Slight driver fatigue (interview, video analysis) Moderate driver fatigue (interview, video analysis) Driver’s severe fatigue (interview, video analysis) Driver excited state Hardware failure driving (low fuel, door, tire pressure, mechanical failure, etc.) Other non active behavior scenarios

The above active driving behavior is further refined. By using the statistical method, more than three driving behaviors are repeated in 10 sample videos that are statistically effective. Compared with the conclusions of the online questionnaire survey, the driving behaviors with certain risks are selected. The statistics are shown in the Table 3.

Table 3. High frequency driving behavior Driver’s driving behavior

Following behavior, approaching behavior, overtaking behavior, braking behavior, road deviation behavior, speeding behavior, lowspeed driving behavior, backing up, parking behavior, use of central control information system (entertainment, navigation), calling behavior, seat belt forgetting behavior

30

Y. Liu

Among the above user behaviors, the main driving tasks are: driving maintenance (following, approaching, overtaking, braking, etc.), reverse parking, application of central control system (navigation, entertainment, etc.), calling, fault handling, fatigue handling, and other tasks, such as lighting regulation, interior environment control, etc. In the actual driving process, one or more tasks are carried out at the same time.

4 Conclusion Situational perception is mainly divided into two parts, sense and knowing [6]. In the driving process, the external situation information, including the scene information, driving task and equipment status, is transmitted to the user’s brain through the driver’s sensory channel, which is the “sense” part; using the brain processing ability combined with the real-time driving task organization information, it is compared with the existing knowledge Atlas [7] and habits in the user’s brain to become the situation image [8], and finally forms the whole situation. The image is “knowledge”. The process of situational awareness during driving is shown in the following Fig. 5.

Fig. 5. Situational awareness path in driving

Information organization is more of a kind of biological instinct [9], which is in the process of muscle, skin and nerve transmission. It uses the instinctive memory hidden in the body by the organism to sort out the information of various channels, and then transmits it to the brain to use the logical ability and user knowledge map, combining with the physiological and psychological characteristics of users, to form situational perception and understanding, and make decisions. For specific situations (fixed scenes, tasks), situational awareness has great relevance with user information receiving channels and situational thinking. In order to make users have better situational understanding [10]. From the perspective of perception process, we should guarantee the effectiveness of signals and guide users to make effective decisions. The form of signal determines the validity of sense and the content of signal determines the correctness of knowledge.

Typical Risk Situations in Driving Situations

31

As an important means, the typical scene, typical users, typical tasks in driving risk situation, and the typical perception and understanding in driving situation can be used to study and deal with the risk factors in driving situation, and put forward corresponding strategies and solutions. On the other hand, the problems represented by the situational risk driving situation itself include the main problems in the situation. The goal of the researchers is to explore and solve them.

References 1. Liu, J., Wang, L., Huang, W., Zhang, L.: Evaluation method of Beidou navigation effectiveness based on typical application scenarios. Geod. Geodyn. 38(10), 1027–1032 (2018) 2. Wu, J., Zhang, J., Zhang, L.: Research on interactive design of vehicle mounted infotainment system based on situational awareness. Packag. Eng. 39(16), 189–196 (2018) 3. Carroll, J.M.: Five reasons for scenario based design. Interact. Comput. 13, 43–60 (2000) 4. Chen, Y., Chen, T., Dong, Q.: Research on user portrait construction model of multi perspective data driven social Q & a platform. Libr. Inf. Knowl. 5, 64–72 (2019) 5. Chu, Y., Xiao, X., Zhu, J.: Research on active vehicle safety technology based on driving behavior and intention. Mechanic. Des. Manuf. 1, 266–268 (2011) 6. Li, H., Fu, L., Zhou, L.: Research on the design of context aware service content of Intelligent Library. Libr. Sci. Res. 11, 93–101 (2019) 7. Lei, J., Pan, Y., Liu, J.: Research progress and hot spots of Intelligent Tourism from the perspective of knowledge map. Library 8, 52–58 (2019) 8. Liu, D.: Object, subject and situation: a cognitive map of the image of a country. Nanjing Soc. Sci. 2, 113–118 + 135 (2017) 9. Fang, W.: From the theory of instinct to the science of human habitus: The logical process of the biological interpretation of social behavior. Soc. Sci. Front 2, 236–243 (1995) 10. Zhang, G.: Situation and situation understanding: A multidisciplinary perspective. J. Shandong Norm. Univ. (HUMANITIES AND SOCIAL SCIENCES EDITION) 5, 50–55 (2008)

Construction of Smart Campus Under the Background of Big Data Peilu Feng(&) Hohhot Minzu College, Hohhot 010051, China [email protected]

Abstract. Since the beginning of the 21st century, the Internet has not only been widely used in various industrial networks, but has gradually extended to every aspect of people’s lives. In recent years, the Internet technology based on big data has been extended to campus, which has put forward higher requirements for the construction of smart campus. Cloud computing and big data technology are typical representatives of information operation efficiency, and new technologies emerge one after another. This paper is based on big data and cloud computing, and carries out research on the construction of smart campus. The purpose of this paper is to analyze the construction strategy of smart campus service system in the context of big data, and to analyze and apply big data technology from a deeper level to provide support for expanding the application space of big data. Based on the comprehensive comparison of existing research results, this paper proposes a smart campus system model based on big data analysis to improve the efficiency of information operation in campus. The experimental results of this paper show that this model has a strong ability to store and process data, and can fully realize the sharing and construction of resources in the smart campus. Keywords: Big data sharing

 Smart campus  Campus domain space  Resource

1 Introduction Since the beginning of the new century, the continuous development of information technology has injected infinite vitality into the global economic development. With the development of information technology, informatization has become a national strategy in many countries around the world. Through sorting out the research results at home and abroad, it can be found that the theoretical research on smart campus in western developed countries began in 2007 and gradually deepened, while the design and application of smart campus emerged only in 2009 [1]. The application and research directions of smart campus can be divided into three types. The first category is the theoretical research on smart campus, which mainly involves the scientific definition, functional hypothesis and characteristic research of smart campus. The second category is the study on the design and framework of the smart campus, which mainly involves putting forward imaginative Suggestions on the planning and design of the smart campus and the overall © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 32–36, 2021. https://doi.org/10.1007/978-3-030-51556-0_5

Construction of Smart Campus Under the Background of Big Data

33

construction thinking [2, 3]. The third category is about the direct application direction of smart campus, which mainly involves the promotion and transmission of research results and the practice of smart campus design [4]. Compared with the research on smart campus in foreign developed countries, the research on smart campus in China lags behind a lot [5]. In 2011, the financial secretary of the smart campus entered the national vision, and researchers began to realize that the smart campus is a new thing with strong vitality [6]. Up to now, the construction of smart campus is still in the stage of tentative construction at home and abroad, but the core creativity and competitiveness of smart campus have not been formed [7, 8]. The research of this paper starts from the current situation of the construction of smart campus, which makes the research focus of this paper and the correct research direction [9]. In the specific research process, by combining big data technology with information technology, this paper summarizes a set of teaching methods that are easy to popularize and use, so as to try to change the separation of teaching and learning in traditional digital education [10].

2 Method (1) Smart campus Smart campus refers to the comprehensive social function goal of comprehensively improving the effectiveness and efficiency of school management by utilizing advanced information and communication technology, starting with the integration and intelligence of the whole campus. In practice, many campuses have been vigorously implementing the construction of this kind of smart campus recently, and hope to serve the development of schools from the construction of smart campus, to promote the way of communication and learning between teachers and students, so as to improve the overall management efficiency. (2) Big data Big data can be described as a new way of data collection in which the functions of data acquisition, storage, management and analysis are larger than the traditional database management. Big data has four obvious characteristics, namely, scale, diversity, rapidity and value. In other words, diversity, mass, high value and fast speed represent the four characteristics of big data. The key of big data technology is not to collect a large amount of data information, but to mine valuable information from these massive data information, that is, to process the data. This processing requires a lot of computing power. In a society, who has more useful information, who will be undefeated. (3) College smart campus informatization in the era of big data In the modern society with the rapid development of big data, it is completely necessary and appropriate for colleges and universities, as the forefront of scientific research, to implement information measures such as smart campus. Campus smart construction involves a lot of data, and the structure of these data is very complex, therefore, improve the data collection, management, analysis, processing functions, improve the level of higher education, is the key to improve the management level of

34

P. Feng

colleges and universities. In addition, the application of big data technology plays a role in promoting the construction of smart campus.

3 Experiment 3.1

Construction Ideas of Smart Campus

The construction and design of smart campus covers a wide range of fields, the main purpose of which is to solve the problems of low efficiency and absence in campus management. We must realize that the construction of smart campus system in the context of big data can better improve the operating efficiency of the whole campus service system. In the construction process of smart campus based on big data environment, unified implementation standards must be strictly observed, the principle of resource sharing must be strictly observed, and the whole information data can be interlinked. The existing development platform should also be uniformly planned and deployed. In the specific campus network design, we should base on the school’s system application environment and hardware configuration, and take smooth operation as the maximum principle and purpose. In the selection of key equipment, we must fully consider the performance stability factor to ensure that the system can be well maintained in the later period. 3.2

Application Experiment Implementation

In order to test the convenience brought by smart campus to teachers and students, the experimental group and the control group will be used for experimental comparison. A teaching class in a smart campus environment and a teaching class in a traditional digital campus environment were selected and named as experimental group and control group respectively. Before the experiment began, the students in the two groups were basically equal in all aspects. After six months of simulation tests, the students were tested again in the smart campus environment, and the changes in students’ abilities were evaluated to determine the significant changes in the reception of students’ teaching knowledge and other basic aspects in the smart campus environment.

4 Discuss After the end of the experiment, the author of this paper conducted a survey on learning intention during the construction of the smart campus platform, with the purpose of grasping the difference between students’ learning interest under the smart campus model and students’ learning interest under the traditional digital campus environment. Since the experimental group can compare traditional classroom teaching with classroom teaching supported by smart campus with reference to previous learning experience, this survey is only conducted for the experimental group. The results of the survey are shown in Fig. 1.

Construction of Smart Campus Under the Background of Big Data

35

Results of a survey on students' learning interest in a smart campus environment 12% Digital campus Smart campus 88%

Fig. 1. Results of the survey on students’ learning interest in a smart campus environment

As can be seen from the survey results in the figure, among 52 people in the experimental group, as many as 46 people believe that the smart campus environment is more conducive to improving students’ learning enthusiasm, accounting for 88%. This reflects that in the environment of smart campus, the teaching mode of smart classroom is more favored and accepted by students. It is far from enough to evaluate the construction value of smart campus only by evaluating students’ interest in learning, so it is necessary to carry out a multidimensional investigation and analysis. This section also designed a horizontal multidimensional experimental survey to comprehensively evaluate the construction value of smart campus. The specific horizontal multidimensional survey results are shown in Table 1.

Table 1. Horizontal multidimensional survey results

Independent consciousness Inquiry consciousness Cooperation consciousness Innovation consciousness

Front result Control group 63.52

Experimental group 61.84

Posterior result Control Experimental group group 65.28 73.24

16.58 51.38

15.27 53.41

17.22 55.39

22.46 59.32

73.29

69.37

72.17

80.25

According to the survey results in Table 1, it can be found that the environment of smart campus is very helpful to develop and tap the potential of students from the perspective of their comprehensive qualities, such as the consciousness of independent

36

P. Feng

learning, the consciousness of exploring problems, the consciousness of cooperation and the consciousness of innovation. At the same time, it also proves that, at least in the context of all for the growth of students, the construction of smart campus is very necessary.

5 Conclusion Through the research and analysis of this paper, it can be seen that the application of big data technology to the construction and layout of smart campus can better provide teachers, students and all fields of society with informationized and time-oriented highquality education services. With the development of high standard construction of smart campus system, it will be applied in various occasions at a deeper level to meet the development needs of schools at all levels. With the continuous emergence of new ideas and technologies, there will be more new technologies and methods to provide advanced smart campus network solutions, which will play an important role in improving the management teaching of the campus.

References 1. Song, X.-R., Li, S.-H., Dai, J.: Polyphenol-inspired facile construction of smart assemblies for ATP- and pH-responsive tumor MR/optical imaging and photothermal therapy. Small 13(20), 460–472 (2017) 2. Zhan, Y., Li, S., Business School: Financial development, technical innovation and the construction of smart cities: an informatization development perspective. J. Financ. Econ. 56(39), 41–43 (2018) 3. Liu, Z., Wang, Y., Xu, Q.: Study on smart city construction of Jiujiang based on IOT technology. Iop Conf. 69(1), 1215–1217 (2017) 4. Zhao, D., Yi, X., Yuan, G.: Design and construction of a smart targeting drug delivery system based on phototriggered competition of host-guest interaction. Macromol. Biosci. 17(9), 170–180 (2017) 5. Yao, Z., Xia, X., Zhou, C.: Smart construction of integrated CNTs/Li 4 Ti 5 O 12 core/shell arrays with superior high-rate performance for application in lithium-ion batteries. Adv. Sci. 5(3), 1780–1786 (2018) 6. Bhattacharjee, Y., Bhingardive, V., Biswas, S.: Construction of carbonfiber based layer-bylayer (LbL) assembly—a smart approach towards effective EMI shielding. Rsc Adv. 6(113), 2–3 (2018) 7. Zhang, J., Jia, J., Kim, J.P.: Construction of versatile multilayered composite nanoparticles from a customized nanogel template. Bioact. Mater. 3(1), 87–96 (2017) 8. Rad, M.K., Riley, D., Asadi, S.: Improving the performance profile of energy conservation measures at the Penn State University Park Campus. Eng. Constr. Archit. Manag. 24(4), 10– 12 (2017) 9. Zhu, J.: Construction of the service platform for smart pension based on wearable device. Softw. Eng. 32(42), 90–92 (2018) 10. Zhang, Z., Xiong, X.: School of law. Legal safeguard for the construction of China’s smart grid. J. Jiangsu Univ. 34(21), 9–11 (2018)

Mass Fashion Life Service Space in Intelligent Cities Hesen Li1,2(&) 1

The Research Center of Fashion Arts, The Key Research Base for Humanities and Social Sciences in Hubei, Wuhan 430205, Hubei, China [email protected] 2 The Department of Industrial Design, HIFA, Wuhan 430205, Hubei, China

Abstract. The objective of this research is to study deeply the leisure life style that concerns much of people’s livelihood in Chinese intelligent cities so as to find out design basis for construction of mass fashionable and leisure experiencing space with Chinese characteristics. By conducting plenty of field survey and visiting typical entity shops in developed cities of China, the service objects and service modes in these commercial spaces under the background of intelligent cities are analyzed, the research data are obtained by survey, the characteristics of mass fashionable life are analyzed and the core constitutional elements are summarized to provide reference basis for the design of fashionable commercial service modes. Based on the user appraisal data and interview of the research objects, the constitution and service mode of Chinese mass fashionable life space is studied from multiple dimensions. It is expected that this study on fashionable life space could provide references to leisure experiencing platforms which devote to construct Chinese local brands to lead the life style and offer valuable study thoughts for restrictive study on design of fashionable accessories. Keywords: Accessory design  Fashion life  Service space  Intelligent cities

1 Introduction The fashion industry is hot and creates huge economic benefits for society. Fashion has penetrated into the details of people’s lives in the development of intelligent cities. People’s consciousness and subconscious are affected by fashion, which is almost used as a standard to measure and evaluate others. However, there are few researches on fashion life and the design of fashion life at present. This paper attempts to explore the expression of fashion life in our environment in the context of intelligent cities, and provides the basis for the selection of fashion life style through this study, so as to design fashion accessories more reasonable.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 37–42, 2021. https://doi.org/10.1007/978-3-030-51556-0_6

38

H. Li

2 Intelligent City Intelligent city is a quite new concept of city development, which refers to the city that could benefit all the citizens with advanced infrastructure, smooth information network, popularization of smart technology applications, convenient production and living, high-efficient urban management, complete public services, and beautiful ecological environment. The developing and striving direction of intelligent city system is to promote sustainable development of the economy, society and environment with the primary purpose to build the city into the most ideal living place for mankind. So, the fundamental mission of intelligent city is to implement people-oriented philosophy and promote all-round development of human beings. The social system of intelligent city is the basic foothold to reflect the mission of intelligent city, which, centered on “relations between man and himself, man and man, man and the society” and focused on “reproduction of man and man’s intelligence”, makes the new network social forms live up to the development demands of modern people and constructs good social conditions for all-round development of human beings by penetration and extensive application of new information technologies in various fields of social activities [1].

3 Field Survey By investigating popular, efficient, contemporary characteristic life and culture that is in line with international rhythms and efficiencies, to extract a positive, bright and fresh image of contemporary China; to dig out and find out signs that could represent the life styles of contemporary or future young users, focusing on guiding contemporary, young and multi-dimensional life styles. Focus of the study: consumption brands for young and middle-aged people, from which some featured brands would be studied thoroughly [2]. Conduct product marketing survey related with beverages, including coffee and tea, dessert shops, compound spaces and lifestyle shops, and urban convenience facilities (highway service area, community convenience store) that can fully reflect the “third space” of modern people’s daily life and urban cultural characteristics in representative areas of Beijing, Shanghai, Guangzhou, and Shenzhen. Collect materials on users’ drinking methods, drinking tools, corporate product types, and publicity methods of corporate image [3]. Major commercial areas, office areas, cultural and leisure areas, and residential areas in Beijing, Shanghai, Guangzhou and Shenzhen. Taking Beijing as an example, the key research areas are: Sanlitun and Houhai; Dayuecheng and Gaobei Shop in Chanyang District. Cases of field survey are listed below (157 survey samples in total), and are classified as follows Table 1.

Mass Fashion Life Service Space in Intelligent Cities

39

Table 1. Summary of shop research Types Coffee

Regions 42

Tea

31

Bookstores

61

Urban amenity

6

Representational objects Basic Coffee, Luckin Coffee, Barista Specialty, Metal Hands, C5cafe, VOYAGE COFFEE, Fikafika Northern European Coffee & Snacks, CARACE COFFEE… … HEYTEA, Yinwei Tea, Wu Tea, Yizhuo, Mr. Fruits (Fresh Juice Shop), Naixue の Tea, TEASURE, Qisheng Tea Time, Zhaowuxishi… … PAGEONE Bookstore, Zhongxin Bookstore, Yanyouji, Sisyphe Bookstore, Taofen Bookstore, Zashu Bookstore/Xiaoshu Guan, OWSPACE, Geometry Bookstore, Zili Hangjian, Zhilaohu BANMOO… … 7-ELEVEN convenience store, Service zone at motorway, Cultural and Creativity Shop of Palace Museum, Palace Museum Restaurant

4 Questionnaire—“Tea, Coffee and Lifestyle” The questionnaire of this survey used questionnaire stars to promote and fill in WeChat from June 20 to 25 of 2018, and 1,417 valid questionnaires were recovered. The objective of this survey is to know of people’s consumption habits of tea, coffee and other drinks. People aged 46 or above like tea than those of other ages. More men like tea than women. Milk tea and brewed flower-fruit tea occupy certain market shares among the population aged 18 to 28. The newly emerged spiced tea is liked the least. The general drinking preference for coffee is less than half of that for tea, ranking after tea and pure water. In the population who favor other drinks in daily life (white water and tea not included), preference for coffee is higher than the overall proportion [4]. The population who prefer tea is increasing gradually with age, while it has no obvious relations with their cities, occupations, hobbies and other factors. Male is slightly higher than female. In terms of coffee types, ground coffee has absolute advantage to be selected. People who like coffee usually like tea also, especially tea brewed in traditional way [5]. More consumers like to buy beverages at personalized/themed shops and chain stores, while fast food restaurants and bakery shops are at a disadvantage.

5 Characteristics of Lifestyle Service Experience Space By conducting market research on several types of beverage-related products such as cafes and tea shops, bookstores/lifestyle shops, desserts/snacks, highway service stations, and community convenience stores, etc. in Beijing, Guangzhou, Shenzhen and Shanghai, the previously surveyed shops are classified into four categories: beverage stores, dessert shops, compound spaces, and urban convenience facilities, and the common characteristics and features of each type are found out, which are manifested mainly in the following aspects [6]. The interior space layout is mostly open space with

40

H. Li

oriental characteristics. Most of the furniture is made of wood, with modern and simple styles. The furnishings lay emphasis on creation of atmosphere, to attract consumers by plants, wall decorations, and bookcases set against the light, as well as elegant environment, unique furnishings and interesting peripheral products [7]. The beverages are mainly focused on quality and innovation, fresh food material and unique flavors. Innovation of the product is reflected in the combination of traditional tea and modern tea, the oriental tea and western drinks [8]. The high overlap between the sales area and the experience area is a big feature of brands. Many commodities displayed there could also serve the customers. Taking Banmu as an example, furniture in the selling area serves to feed back the old customers or fans. They often hold tea party or music party in the shop. They also sell their own tea or coffee, and customers arriving at the shop could drink tea or coffee at the furniture and utensils to be sold [9]. Consumers are both buyers and users, who can restore usage scenarios truly, not only by their visual feeling and sense feelings, but also by their real feelings in the scenario. WeChat official account, WeChat store, and Weibo are all the necessary publicity approaches. Key design points of the dining region: rational number of seats/layout, the space is spacious room/personalized, complete basic facilities, privacy space, and other elements that could enhance the space experience. Of course, in addition to the basic space division, the space upgrade way of Hey Tea could also be referred to, that is, to expand the space function of the store to fit local lifestyle and integrate into the local life, and to meet the demands for communications in drinking experience [10].

6 Typical Case Analysis 6.1

Urban Amenity: Transportation Hub Service Stations, Taking Highway Service Area as an Example

(1) Consumer orientation and chain store distribution. Highway service areas in China are generally set at a standard distance of 50 km. The highway service areas are generally set up in pairs, that is, to set up one service area on each side of the road. By the year of 2020, mileage of China’s highway will reach 150,000 km, so, 3,000 pairs of highway service areas would be needed. (2) Analysis of the distribution chain stores and it relations with consumer behavior. Highway service areas in China are generally set at a standard distance of 50 km. The highway service areas are generally set up in pairs, that is, to set up one service area on each side of the road. Highway service facilities include public toilets, free boiling water, supermarket/vending machines, catering, refueling, vehicle repairs, accommodation (including parking), leisure and entertainment. (3) Beverage and food. There are bottle-packed and box-packed beverages prepared for passengers who are in a hurry to depart, as well as spaces for passenger to sit down to drink tea or coffee. Characteristic space, furniture and furnishing. There are different local features and styles. Before, the highway service areas are single and simple, but now they begin to focus on forging regional features. (4) Method to stimulate consumption. Services such as recreation, logistics, ticketing, tourist information, and sales of specialty products are appropriately set in the highway

Mass Fashion Life Service Space in Intelligent Cities

41

service area based on local characteristics; meanwhile, RV parking spaces, gas stations, charging piles for new energy vehicles and other facilities are also set. Highways with conditions are also encourage to set passageways freely as required by some important scenic spots. Accessory products. (5) Relations between management and investment scale. Expressway service areas have several business patterns in China: government-constructed, government-owned and government-operated; government-constructed, government-owned and privateoperated; private-constructed, private-owned and private-operated; the service life is generally 20 years; at the expiration, the government would recover the service area as government owned.

7 Conclusion By studying the components of the commercial service space that leads the mass lifestyle, including brands (involving positioning, concepts, image, and consumers), business models (involving characteristics, mechanisms, channels of communication, and benefits), products (involving directories, price, characteristics), environmental image (involving outdoor, indoor, atmosphere, furniture, furnishings), supplies and appliances; gifts (involving directory, price, characteristics), and so on, it could be found that the brand characteristics of mass fashionable life experiencing space in the context of intelligent cities should be cultural, universal, chain-like, experiential, recognizable, public, contemporary and attaching, based on which leisure life experience service mode and service mode could be designed for the public. Acknowledgement. This work was supported by a project “the Research of Fashion Accessories Design” (the number of the project is IFA-2019-01). It belongs to the key project of the Research Center of Fashion Arts, which is the Key Research Base for Humanities and Social Sciences in Hubei in 2019.

References 1. Bloomfield, M., Borstrock, S.: Modeclix the additively manufactured adaptable textile. Mater. Today Commun. 16(5), 34–38 (2018) 2. Choi, T.-M.: Blockchain-technology-supported platforms for diamond authentication and certification in luxury supply chains. Transp. Res. Part E 128(9), 56–60 (2019) 3. Zermansky, A.G.: Deprescribing: fashion accessory or fig leaf? Pharmacy (basel, Switzerland) 7(2), 45–48 (2019) 4. Zhao, F.: Hong Kong exhibitor debuts international star’s accessory collection Hong Kong fashion week for fall/winter closed. China Text. 122(2), 58–61 (2018) 5. Anon: Allergies; researchers from Tohoku University report recent findings in allergies. Biotech. Bus. Week 145(3), 78–83 (2016) 6. Cimatti, B., Campana, G., Carluccio, L.: Eco design and sustainable manufacturing in fashion: a case study in the luxury personal accessories industry. Proced. Manuf. 8(7), 61–64 (2017)

42

H. Li

7. Capalbo, C.: Creativity and innovation of the Italian fashion system in the inter-war period (1919–1943). Investig. De Hist. Econ.—Econ. Hist. Res. 12(2), 21–23 (2016) 8. Anon: Raizal Izaac Pty Limited; fashion accessory in patent application approval process. Polit. Gov. Week 132(9), 123–125 (2016) 9. Smyth, D.: Hyères international festival of fashion and photography. Br. J. Photogr. 163(7846), 189–191 (2016) 10. Liu, T.: Analysis on teaching design of three-dimensional composition in fashion and accessories design major of art design categories in independent colleges. In: Proceedings of 2014 3rd International Conference on Physical Education and Society Management, pp. 45– 48 (2014)

Development Background of China’s Energy Internet Industry and Experiences Shanshan Wu1(&), Xingpei Ji1, Qingkun Tan1, and Rui Tang2 1

State Grid Energy Research Institute Co. Ltd., Beijing, China [email protected] 2 Harbin University of Commerce, Harbin, China

Abstract. China is in the tackling phase of transforming its development model, optimizing its economic structure, and transforming its growth momentum. The downward pressure on the economy is still increasing. However, the rapid development of technology, especially the development of advanced information and communication technologies such as the “Big Cloud and Smart Wisdom Chain”, has promising prospects, providing necessary technical support for the energy Internet industry. At the same time, China has a unique policy advantage. Regardless of the economic situation, technological trends, policy orientation, and industry characteristics, China has the necessity and feasibility of developing the energy Internet industry. It is necessary to fully learn from domestic and foreign experience in digital transformation Under the background of the traditional energy companies around the core business, give play to the advantages of infrastructure, build a service platform, adopt new technologies to carry out diversified business, in order to deal with development bottlenecks and revenue pressure. Keywords: Energy internet industry operations

 Digital transformation  Diversified

1 Introduction With the continuous penetration of the Internet economy, all walks of life have set off a wave of application of new technologies and innovative business models. Under the guidance of the new national energy security strategy, the energy industry has actively applied advanced information and communication technologies such as the “Big Cloud and Smart Mobile Chain” to build an energy Internet, and based on this, has expanded new businesses and tapped new profit growth points. This article analyzes the background of China’s energy Internet industry development from the economic situation, technological trends, policy orientation, and industry characteristics.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 43–48, 2021. https://doi.org/10.1007/978-3-030-51556-0_7

44

S. Wu et al.

2 Research on the Background of China’s Development of Energy Internet Industry China’s economy has entered a stage of high-quality development. General Secretary Xi Jinping clearly stated in the report of the 19th National Congress of the Communist Party of China: “China’s economy has shifted from a high-speed growth stage to a high-quality development stage, and it is in the tackling phase of transforming the development mode, optimizing the economic structure, and changing the growth momentum. We must implement the new development concept of “innovation, coordination, greenness, openness, and sharing”, accelerate supply-side structural reforms, and realize quality, efficiency, and dynamic changes. Continuously improve the quality of the supply system and build a modern economic system that meets the requirements of the new era. The new model of the digital economy is booming. At present, the world is in the midst of a new round of scientific and technological revolution and industrial revolution. Advanced information and communication technologies such as “5G” and “big cloud and mobile intelligence chain” are booming. The digital economy represented by the platform economy and the sharing economy has a strong momentum. The trend of industrial digitalization and digital industrialization is becoming more and more obvious. The State Council, ministries and local governments have successively formulated the “Guiding Opinions of the State Council on Deepening the” Internet + Advanced Manufacturing “and Developing Industrial Internet”, “Guiding Opinions of the General Office of the State Council on Promoting the Healthy Development of Platform Economy and Standardization”, “Guiding Opinions on Promoting the Development of the Sharing Economy” and other policies, plans and guidance. Actively promote the conversion of new and old kinetic energy of the real economy, develop and strengthen the digital economy, promote the development of the new economy, and promote the transformation and upgrading of traditional industries. The new strategy for energy security has been advanced in depth. In 2014, General Secretary Xi Jinping proposed a new energy security strategy of “Four Revolutions and One Cooperation” at the sixth meeting of the Central Finance and Economics Leading Group. He explicitly put forward the promotion of the energy revolution as a national policy for energy development and laid the foundation for energy security. In 2014, General Secretary Xi Jinping proposed the new strategy of “four revolutions and one cooperation” in energy security at the sixth meeting of the Central Finance and Economics Leading Group. Clearly put forward the promotion of the energy revolution as a national policy for energy development, build the cornerstone of energy security, promote civilized energy consumption, diversified supply, scientific and technological innovation, deepen reforms, strengthen cooperation, and achieve a fundamental change in energy production and consumption patterns. Energy Internet is an important means to promote the implementation of the new energy security strategy. It provides technical support for accelerating the construction of a diverse supply system, accelerating the process of clean energy consumption, transforming the power of energy development technology, promoting the extension of the energy industry chain, releasing the

Development Background of China’s Energy Internet Industry

45

vitality of the energy development system and expanding the international space for energy development. Development challenges in the power industry are increasing. Economic development takes the lead in electric power. At present, China’s electric power industry is facing multiple development pressures. First, the economic downturn is driving down power consumption growth. The national economic growth rate in the first three quarters of 2019 was 6.2%, a new low since 1991; Second, the downward adjustment of transmission and distribution prices has increased the operating pressure of enterprises. In 2018 and 2019, the average electricity price of general industrial and commercial nationwide fell by 10%, and the revenue space of electric power companies continued to shrink. Third, the increasing proportion of new energy has brought regulatory pressure. As of the end of 2018, wind power and solar installations accounted for 18.9%. Due to its volatility and randomness, the pressure on grid dispatch operation continued to increase; Fourth, market competition is becoming increasingly fierce. Policies such as direct transactions by large users and the release of incremental power distribution have increased the risk of “pipelining” of grid companies and reduced market share. The above internal and external factors have increased the pressure on the production and operation of the power industry. The deep integration of advanced information and communication technology, Internet concepts and the power industry will promote the digital transformation of the power industry, spur new industries, new formats and new models, and realize the conversion of old and new kinetic energy and high-quality development in the power industry.

3 Domestic and Foreign Experience in the Development of the Energy Internet Industry This article summarizes the domestic and foreign energy Internet industry development experience from five aspects of strategy, resources, means, technology and policy, and provides a basis for China’s energy Internet industry related research. Experience 1: Focus on core business and carry out diversified operations. In addition to operating core business such as power generation, transmission and distribution, Tokyo Electric Power Company actively expands its business scope to information and telecommunications, living environment and other fields through mergers and acquisitions, strategic cooperation, and establishment of joint ventures. In 2000, Tokyo Electric Power absolutely controlled a data center professional company (@Tokyo) with an 84.2% stake. @Tokyo relied on Tokyo Power’s high-reliability power supplies, high seismic equipment, and optical fiber networks to develop data center construction and management, and information communication systems, integrated management and other services. Tokyo Electric Power Grid Corporation (TEPCO PG) and EPCO, a listed company in the field of home residential design, form a joint venture to use the EPCO mature IoT platform and smart home technology to carry out one-stop services such as residential energy saving diagnosis, equipment exchange, energy storage, and after sales. TEPCO PG has absolute control and formed a joint venture with technology company Informetis. Relying on Informetis’ big data analysis based on the Energy Internet of Things, non-home separation technology, etc.,

46

S. Wu et al.

carry out household energy consumption information collection, analysis, and electricity optimization solutions, and sell related data to companies such as real estate, security, insurance, medical services to monetize. PetroChina actively explores “nonoil” business. In order to cope with the operating risks brought by the fluctuation of oil prices, PetroChina entered the high-end mineral water industry through the acquisition of Aershan Beverage Company through its subsidiaries. In addition, PetroChina invested in the establishment of Fujian Wuyi Shanshui Food and Beverage Co., Ltd. in Fujian Province to launch Wuyi Mountain mineral water and other products. By cultivating Jindi Electrical Appliances and getting involved in the household kitchen and bathroom electrical appliances industries, it has introduced products such as range hoods, gas cookers, disinfection cupboards, and water heaters. Utilizing the space resources of gas stations to expand retail business, in 2018, it achieved sales revenue of 22.3 billion yuan. Experience 2: Give full play to the advantages of infrastructure and promote the commercial operation of network resources. Relying on the power grid to build an approximately 4,000-km fiber-optic network, Australia’s TransGrid Power Company has become a major telecommunications operator in New South Wales, the Capital Territory and Victoria through open communication services to the community, which has greatly increased the company’s operating income [1]. By sharing power towers, large power companies such as Pacific Gas and Power Corporation (PG & E) and Edison United Electric Company not only achieve intensive reuse of social resources and avoid duplicate investments [2]; they also become the company’s new profit growth point. Taking the American PG & E company as an example, the types of fees include basic fees, engineering fees, surveying and mapping collaboration fees, and project management fees. Among them, the basic fee is divided into four levels, ranging from $231/rod to $714/rod; The engineering fee includes the hourly engineering collaboration fee, the load per pole, and the renewal evaluation fee for each pole; it also includes the existing facilities for construction labor costs and adjustment costs for the construction; The cost of replacing poles (high-voltage levels) in different regions ranges from $19,000/root to $29,000/root. Experience 3: Build a service platform to enable the development of the industry. More and more energy companies are pushing their core of value creation to transform from energy product provision to energy service provision. The core of this energy service is data services or data application services. Vertuoz, a subsidiary of the French Gas Group, has built a digital service platform for building energy management. By installing temperature sensors, photosensors, CO2 sensors and other devices in buildings, it collects real-time data on building energy use [3]. Based on data monitoring and analysis, formulate energy saving plans, and optimize energy use methods of buildings in real time through remote intelligent energy efficiency monitoring and control systems. By actively building an energy and chemical industry internet and an integrated agricultural service platform, Sinochem Group has formed an industrial cluster focusing on the new chemical material industry and supporting the new energy, biological, and environmental protection industries. Experience 4: Make full use of new technologies to promote the transformation and upgrading of traditional energy companies. In accordance with the trend of low-carbon and intelligent energy transformation, the German Eon Group has repeatedly adjusted

Development Background of China’s Energy Internet Industry

47

its business sector and reorganized the group’s assets twice in 2016 and 2018, focusing on the distribution network, smart grid, electric vehicle charging, and energy supply, energy efficiency services and smart home solutions business, and become a pure energy network operation service provider. Huaxi Energy realized the company’s structural adjustment and transformation and upgrading through the mode of “equipment manufacturing, engineering contracting, investment and operation”; Through intelligent transformation and breakthroughs in supercritical technology, it has realized the transformation from fossil fuel equipment to energy saving and environmental protection equipment, and then to a system solution provider. Experience 5: Government policy support is an important guarantee for promoting industrial development. The United States, Germany, Japan and many other countries have successively formulated plans for the development of the energy Internet industry [4–10]. Centrally upgrade and update the power network infrastructure and implement intelligent systems instead of manual labor. The pilot project covers two-way monitoring of power supply, storage of renewable energy, peak shaving, and smart grid cities. Utilize flexible market pricing mechanisms to implement projects in different cities including urban wind power utilization, renewable energy use in mountainous areas, two-way interactive power systems, multi-industry power supply optimization systems, unit network power systems, and smart meter real-time monitoring. The Chinese government has also actively promoted the development of the Energy Internet. Since 2015, the State Council and relevant departments have issued dozens of related policies. The main contents include: promoting the top-level design of the energy Internet; promoting the innovation of core equipment; promoting the cultivation of the industrial ecosystem; promoting the formulation of technical standards, testing, certification and evaluation systems; and encouraging the construction of pilot projects.

4 Conclusions China is in the tackling phase of transforming development methods, optimizing economic structure, and transforming growth momentum. Structural, institutional, and cyclical issues are intertwined. The impact of the “three-phase superposition” continues to deepen, and the downward pressure on the economy is still increasing. However, the rapid development of technology, especially the development of advanced information and communication technologies such as the “Big Cloud and Smart Wisdom Chain”, has promising prospects, providing necessary technical support for the energy Internet industry. At the same time, China has a unique policy advantage. In the development of the energy industry, it can further achieve the purpose of optimization and adjustment based on market mechanisms. At the same time, China has a unique policy advantage. In the development of the energy industry, it can further achieve the purpose of optimization and adjustment based on market mechanisms. On the whole, no matter in terms of economic situation, technology trends, policy orientation, and industry characteristics, China has the necessity and feasibility of developing the energy Internet industry. It needs to fully learn from domestic and foreign experiences. In the context of digital transformation, traditional energy companies focus on core businesses, leverage their infrastructure advantages, and build a service platform and adopt new technologies to diversify their businesses to meet development bottlenecks and revenue pressures.

48

S. Wu et al.

Acknowledgements. This article is supported by 2018 Science and Technology Project of State Grid Corporation of China (Research and Application of Quantitative Evolution Model of New Energy Industry Format Development Based on New Consumption Pattern, No. SGHE0000K XJS1800549).

References 1. http://www.transgrid.com.au/what-we-do/business-services/telecommunications/Pages/ default.aspx 2. Federation of German Industries (BDI): Internet of Energy: ICT for Energy Markets of the Future. Federation of German Industries Publication, Berlin (2008) 3. Schmeck, H., Karg, L.: Auf dem Weg zum Internet der Energie (E-Energy—Paving the Way for an Internet of Energy). it—Inf. Technol. (2010) 4. Huang A.: FREEDM system-a vision for the future grid. In: IEEE PES General Meeting. IEEE, pp. 1–4 (2010) 5. Akella, R., Meng, F., Ditch, D., et al.: Distributed power balancing for the FREEDM system. In: 2010 First IEEE International Conference on Smart Grid Communications. IEEE, pp. 7– 12 (2010) 6. Huang, A.Q., Crow, M.L., Heydt, G.T., et al.: The future renewable electric energy delivery and management (FREEDM) system: the energy Internet. Proc. of the IEEE 99(1), 133–148 (2010) 7. Boyd J.: An internet-inspired electricity grid. IEEE Spectr. 50(1), 12–14 (2012) 8. Abe, R., Taoka, H., McQuilkin, D.: Digital grid: communicative electrical grids of the future. IEEE Trans. Smart Grid 2(2): 399–410 (2011) 9. Liu, D., et al.: Prospects for the future of integrated power distribution systems for the energy Internet. Power Syst. Technol. (2015). School of Electrical Engineering, Wuhan University 10. Zhou, X., Zeng, J., Gao, F., et al.: The status quo and prospect of the development of energy Internet. Chinese Sci: Inf. Sci. (2): 5–26

Probe on Curriculum Design of Electronic Circuit Based on Multisim14.0 Guangjun Yuan, Jiyuan Sun(&), Zhenjun Lei, and Yang Lu College of Electrical and Information Engineering, Beihua University, Jilin 132021, Jilin, China [email protected]

Abstract. The college students lack of learning ability, application ability and creativity. In order to solve the problem, the experiment teaching must be strengthened. The purpose of practice teaching on Electronic circuit course design in the electronic information is introduced in this paper. A design example is given to illustrate the design and simulation process of Multisim14.0 simulation software and so as to show the effectiveness of replacing the traditional teaching method. In the experiment teaching, the simulation software Multisim14.0 was used to carry out the simulation experiment. The software made the experiment operation more flexible and convenient. The software aroused the students’ interest, too. In the experiment teaching, students could solve problem by the software easily. They could learn how to use circuit theory to solve circuit problems. By this way, the purpose of practice teaching on Electronic circuit course design in the electronic information establish the learning ability, application ability and creativity. Keywords: Multisim14.0  Analog Electronic Technology  Practice teaching  Power supply

1 Introduction At present, due to the weak innovation consciousness, weak knowledge mastery and lack of perseverance of some students, their innovation ability is low, and the learning effect is unsatisfactory [1]. In order to change this situation, Multisim14.0 simulation software is introduced to simulate the actual circuit; multimedia and screen broadcasting are applied in the course design teaching of electronic circuit, fully stimulate students’ interest in learning, mobilize their subjective initiative, so that students understand that the course of analog electronic technology is not abstract, but closely related to engineering practice, which has a very important practical value. The course design of electronic circuit is offered to assist the teaching of the basic course of analog electronic technology. Firstly, multisim14.0 software of EDA (Electronic Design Automation) technology is used to simulate the analog circuit, so that students can complete the preliminary training of EDA technology. Secondly, the actual circuit is connected [2]. Through a concentrated exercitation, students ‘abilities of designing and analyzing problems were improved [3]. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 49–55, 2021. https://doi.org/10.1007/978-3-030-51556-0_8

50

G. Yuan et al.

2 Application Software Multisim14.0 Multisim14.0 is a simulation tool launched by NI (National Instrument Co., Ltd.) in the United States, based on Windows that is used in the design projects of the course of circuit. It has a more visual human-computer interface, including 15 component libraries such as source library, basic library, diodes, etc. It provides all kinds of components that are commonly used in our daily modeling, such as resistors, capacitors, inductors, triodes, diodes, relays, digital display, etc. In terms of analog integrated circuits, there are various operational amplifiers and other commonly used integrated circuits [4]. The circuit is created in the way of graph, and the working state of the circuit is simulated and tested by combining the virtual instruments provided in the software: digital multi-meter, function signal generator, four trace oscilloscope, etc. the designer can easily have a virtual electronic laboratory with perfect components and equipment.

3 Application Example In order to cultivate the students’ ability of analyzing, discovering rules and verifying results in the course design of electronic circuit, and make them master scientific learning methods, some practical and representative topics are selected, common waveform conversion generator, dual source common emitter coupled differential amplifier circuit (dynamic and static analysis), calculus operation circuit, etc. The following takes the simulation of DC series stabilized power supply as an example to illustrate the specific application of multisim14.0 software. 3.1

Composition of DC Series Regulated Power Supply

At present, most equipment and devices need DC power to supply. Most of the DC power supply adopts DC stabilized power supply, which transforms AC into DC [5]. The schematic diagram of DC series stabilized voltage power supply is shown in Fig. 1. AC inpout ui

Mains Rectifier Transformer u1 circuit u2 t

t

Fulter circuit t

DC

U3

Regulated output circuit U0 t

t

Fig. 1. Structure diagram of DC series regulated power supply

DC series regulated power supply consists of mains transformer, rectifier, filter and regulated circuit. After the AC voltage (220 V, 50 Hz) of the power grid is reduced by the mains transformer, the AC voltage obtained conforms to the needs of the circuit, and then the pulse voltage transformed from the rectifier circuit has the same direction

Probe on Curriculum Design of Electronic Circuit

51

and the size changes with time. Finally, the AC component is filtered out by the filter circuit, and the straight DC voltage is obtained. However, such a voltage will change, with the fluctuation of AC grid voltage or load change, so in the case of high demand for DC power supply; a regulated circuit is also needed to make the output voltage more stable. 3.2

Schematic Input of DC Series Regulated Power Supply

Its process is to create new files, new projects, and circuit diagrams and connect circuits on the operation interface of Multisim14.0. The simulation circuit of DC series regulated voltage power supply is shown in Fig. 2, and the virtual frame in the figure indicates the composition of four modules. The bridge rectifier, capacitor filter circuit and regulated circuit are used as a closed-loop negative feedback control system [6]. 3.3

Analysis of the Principle of DC Series Regulated Power Supply

Suppose that when the output voltage U0 decreases instantaneously due to the change of load resistance (the input voltage U1 is constant), the sampling circuit regulated by R4 and R5 will cause the base voltage (UQ3) B of triode to decrease in proportion. Because UBE-UB-UE = UB-2.7 of the triode Q3, the emitter voltage (UQ3) BE will be decrease, so the base current (IQ1) B of the composite transistor will decrease, the emitter current (IQ1) E will decrease, and the voltage (UQ1) CE increases, because the input voltage Ui is constant (Ui = UCE + U0), the output voltage U0 will rise, otherwise, the output voltage U0 will fall. Through the above negative feedback control, the output voltage U0 is stable. XSC1

XMM1

XMM2

G T A

B

C

D

Q1 R1

Vi

220 Vrms 50 Hz T1 0°

1

4

D1

R2 LED2

R3

Q2

RP

LED1

6.5:1

2

Power transformer

rectifier

Key=A

C1 470µF

3

Q3

R66 C2 47µF

filter

R4

50 % R5

D2 2.7V

Regulated circuit

Fig. 2. Simulation circuit diagram of DC series regulated power supply

C3 100µF

52

3.4

G. Yuan et al.

The Regulating Range of Output Voltage Is Adjusted

Adjust the value in the sampling circuit to change the output voltage. The maximum output voltage is U0max ¼ ðUVD þ 0:7Þ

ðR4 þ R5 þ Rpmax Þ ð24 þ 220 þ 330Þ ¼ 8:87 V ð1Þ ¼ ð2:7 þ 0:7Þ 220 R5

The minimum output voltage is U0min ¼ ðUVD þ 0:7Þ

ðR4 þ R5 þ Rpmin Þ ð24 þ 220 þ 0Þ ¼ 3:77 V ¼ ð2:7 þ 0:7Þ 220 R5

ð2Þ

It can be seen from the calculation that the range of output voltage U0 can be controlled by adjusting the resistance RP value. Here R4 is equals 24 X, R5 is equals 220 X to ensure that when the resistance RP is adjusted to the appropriate value, the output voltage is 6 V. 3.5

Simulation and Verification of DC Series Regulated Power Supply

Click the simulation instrument in the right column of Multisim14.0 software, select multi-meter xmm1 and xmm2 to measure the voltage drop VCE and output voltage U0 of the triode Q1, and select the four trace oscilloscope xsc1 to test the input and output waveforms of each point. 3.6

Run the Negative Feedback Voltage Regulated Circuit and Simulate It

Change the load resistance RL value to 330 X, 100 X and 1 kX respectively, and use multi-meter xmm1 and xmm2 to measure the voltage drop VCE and output voltage U0 as shown in Table 1. Table 1. The value of XMM1 and XMM2 Vi (V) RL (X) 220 330 220 100 220 1000

VQ1CE (V) U0 (V) 39.12 6.097 38.68 6.089 39.25 6.099

In Table 1, it can be seen that when the load is increased (330 X is adjusted to 1000 X), the output voltage U0 decreases instantaneously, the voltage drop of collector and emitter VCE of triode Q1 is increased (39.12 v is changed to 39.25 v), the output voltage U0 increases from 6.097 v to 6.099 v, when the load is decreased (330 X is adjusted to 100 X), the output voltage U0 increases instantaneously, and the voltage

Probe on Curriculum Design of Electronic Circuit

53

drop of collector and emitter VCE of triode Q1 is decreased (39.12 v becomes 38.68 v), resulting in the output voltage U0 dropping from 6.097 v to 6.089 v, and the voltage stabilizing 6 V is verified. 3.7

Voltage-Regulation Coefficient Is Measured

Output resistance R0, voltage stabilizing coefficient Sr and ripple coefficient c are the main indexes to measure voltage-regulation coefficient of regulated power supply. In this paper, the constant voltage coefficient Sr is selected for dynamic test. When the load RL is constant, that is equals 330Ω, the ratio of the relative change of the output voltage and the input voltage is the voltage stabilizing coefficient Sr, adjust the output value of the power supply, simulate the voltage fluctuation of the power grid by 10%, and the measured data are as shown in Table 2. By introducing the data into Sr, it can be seen that the output voltage is relatively stable. Table 2. Detection voltage in case of grid fluctuation of 10% Vi (V) 220 200 240

3.8

U2 (V) 45.27 40.976 49.564

U0 (V) 6.097 6.053 6.137

Compare Simulation Value with Theoretical Value

When the power supply voltage Vi is 220 V, adjust the slider of RP in the Fig. 2 to 0%, and measure it with a multi-meter to obtain U0min is 3.628 v (theoretical value is 3.77 v), adjust the slider to 100%, and measure it with a multi-meter to obtain U0max is 8.546 v (theoretical value is 8.87 v). Compared with the theoretical calculation, the relative error is 0.038%. 3.9

Simulation Waveform Is Shown in Fig. 3

The four trace oscilloscope xsc1 is selected to measure the voltage of each point of the DC series regulated power supply. The sine wave of the power supply voltage ui is rectified output U2 by the rectifier bridge, and then filtered to get the ripple U3. Finally, under the action of the negative feedback stabilized voltage circuit, the relatively smooth DC voltage U0 is output. By observing the simulation waveform, the correctness of the principle of DC series regulated power supply is verified intuitively.

54

G. Yuan et al. UO

U3 U2 ui

Fig. 3. Simulation waveform of input and output voltage

4 Conclusions Analog Electronic Technology is a basic technology course of power engineering, including electronic information specialty. The teaching mode of Analog Electronic Technology should be based on working course [7–9]. Through the application of Multisim14.0 simulation software in the electronic circuit practice, verify the correctness and feasibility of the theory, make the teaching of simulation electronic technology theory lively. In the experiment teaching, the simulation software Multisim14.0 is used to carry out the simulation experiment, which makes the experiment operation more flexible and convenient, arouses the students’ interest, and cultivates the students’ ability of self-study and innovation. Therefore, the effective use of simulation software Multisim14.0 can play an active role in the teaching of Analog Electronic Technology course [10]. Acknowledgements. This work was supported by Jilin Science and technology innovation development plan project (Code:20190302147).

References 1. Sun, J.Y., Yuan, G.J.: The applied research of engineering object teaching method in cultivating innovative ability. Exp. Technol. Manage. (2), 21–22, 68 (2014) 2. Rui, W., Hui, S., Zhijie, W., and etc.: Applications of modularized circuit designs in a new hyper-chaotic system circuit implementation. Chin. Phys. B 24(2), 82–90 (2015) 3. Yuan, G.J., Sun, J.Y., Jing, B.: Teaching practice of microcomputer principle course based on engineering object method. Comput. Educ. 256(4), 127–128 (2016) 4. Luckie, D.B., Mancini, B.W., Abdallah, N., Kadouh, A.K., and etc.: Undergraduate teaching assistants can provide support for reformed practices to raise student learning. Adv. Physiol. Educ. 44(1), 4–5 (2020) 5. Hackl, E., Ermolina, I.: Inclusion by design: embedding inclusive teaching practice into design and preparation of laboratory classes. Curr. Pharm. Teach. Learn. 11(12), 1323–1334 (2019)

Probe on Curriculum Design of Electronic Circuit

55

6. Faludi, J., Gilbert, C.: Best practices for teaching green invention: Interviews on design, engineering, and business education. J. Clean. Prod. 234, 1246–1261 (2019) 7. Heitkamp, S.J., Rüttermann, S., Gerhardt-Szép, S.: Work shadowing in dental teaching practices: evaluation results of a collaborative study between university and general dental practices. Springer J. 18(1), 99 (2018) 8. Valentine, D., Kurzweil, A., Zabar, S., Lewis, A.: Objective Structured Clinical Exams (OSCE) are a feasible method of teaching how to discuss a nonepileptic seizure diagnosis. Epilepsy Behav. 100(Pt A), 19 (2019) 9. Sora, M.-C., Latorre, R., Baptista, C., López-Albors, O.: Plastination-A scientific method for teaching and research. Anat. Histol. Embryol. 48(6), 526–531 (2019) 10. Meng, X., Yang, L., Sun, H., Du, X., Yang, B., Guo, H.: Using a novel student-centered teaching method to improve pharmacy student learning. Am. J. Pharm. Educ. 83(2), 6505 (2019)

Coupling Dynamics of Complex Electromechanical System Zhouhong He1 and Xiaowen Liao2(&) 1

Railway Locomotive and Rolling Stock Institute, Wuhan Railway Vocational College of Technology, Wuhan 430205, China 2 Wuhan Optical Valley Mechanical and Electrical Technology Co., Ltd., Wuhan 430074, China [email protected]

Abstract. Complex electromechanical systems play a very important role in people’s actual production and life. In the traditional discrete serial design mode, many mechanical and electrical equipment are designed to enhance operating conditions or product performance requirements, showing many performance limitations. Based on the above background, the purpose of this paper is to study the coupled dynamics of complex electromechanical systems. This article first introduces the historical development process, research direction, research results and related conclusions of previous people about nonlinear mechanical systems and electromechanical coupled dynamic systems, and briefly introduces Lagrange Maxwell’s equations to illustrate electromechanical coupled dynamics. The system has great research value. Secondly, the basic concepts of electromechanical coupling dynamic system are introduced, and the circuit equations of the system are described in detail. Finally, the coupled dynamics simulation of the motor and mechanical system was carried out to analyze the dynamic performance of electric wheels. ADAMS and MATLAB software are used to carry out joint simulation, and an electromechanical coupling dynamic model is established. For the characteristics of starting, steady speed, uphill and deceleration belts, the wheel motion characteristics are calculated respectively. The speed performance and impact resistance were systematically evaluated. Aiming at the dynamic response of the motor under sudden load, the target torque control method was improved. Keywords: Electromechanical system equation  Perturbed equation

 Coupling mechanism  Equilibrium

1 Introduction The invention of permanent magnet generator and motor brings many research problems of electromechanical coupling system. Electromechanical coupling mainly studies the law of interaction between moving objects in electromagnetic field, so the related dynamic problems are very complex [1]. Electromechanical coupling system is composed of mechanical system and electromagnetic system. Mechanical energy and electromagnetic energy are transformed by mutual influence and action of mechanical process and electromagnetic process. The rapid development of Computational © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 56–61, 2021. https://doi.org/10.1007/978-3-030-51556-0_9

Coupling Dynamics of Complex Electromechanical System

57

Mathematics and computer technology, as well as the basic theory of nonlinear differential equations, have gradually matured [2, 3]. Large electrical mechanical system (machine) plays an important role in domestic production and becomes the core machine of national economic basic industries such as energy, chemical industry, metallurgy, material preparation, mechanical processing, transportation, aerospace and so on [4, 5]. Due to the requirements of high-speed, automatic, accurate and efficient, it has developed into a complex electrical and mechanical system with multiple physical processes, multiple module structures and multiple functions. Therefore, it includes multiple physical processes, multiple forms of energy transmission and transformation through multi-dimensional and multi-dimensional movement, main process of system adjustment through process of micro variable information, and different dynamic graphs through different forms of integration [6]. In this paper, the dynamic equation of the electric wheel mechanical system is deduced and analyzed in theory, and the main factors affecting the dynamic performance of the mechanical system are analyzed. The dynamic model of the mechanical system is established in ADAMS, and the suspension in the wheel is simulated and analyzed. Under the constant torque output mode, the single variable principle is used to explore the influence of different factors on the dynamic performance of the mechanical system [7].

2 Method 2.1

Analysis Mechanics of Complex Electromechanical Coupling System

As the system of mechanical process and electromagnetic process, the definition of electromechanical coupling system is quite extensive. The main feature of electromechanical system is the conversion of mechanical energy to electromagnetic energy. Electromechanical system plays an important role in measurement technology, electroacoustic device, automatic regulation and remote control system. 2.2

Dynamic Modeling Based on ADAMS

The multi-body system dynamics theory solver based on Lagrange equation method can effectively analyze the statics, dynamics and kinematics of mechanical system, and output the required displacement, velocity, acceleration, force and other related dynamic curves [7]. According to the mechanical system model, ADAMS software automatically establishes the Lagrangian multi rigid body dynamic equations, and lists the Lagrangian constraint equations with multipliers of six generalized coordinates for each rigid body: 0

1

n X d @@K A @K @/i  þ ki ¼ F i  dt @qj @qi i¼1 @qj

ðj ¼ 1; 2; . . .; nÞ

ð1Þ

58

Z. He and X. Liao

The model in this section is mainly based on the internal model of the electric wheel to carry out the corresponding equivalent modeling. After the model is imported and established, first set the software working environment, such as the unit, then set the relevant information of each component, including name, mass, moment of inertia [8]. After the completion of model building and foundation setting, constraint modeling is carried out, including the definition of motion pairs, the establishment of initial state of components, the addition and definition of driving. Then, the force element modeling, the main forces involved in this model are motor output torque, resistance torque, friction. These force elements can be designed by parameterization, and Adams also allows users to program and define themselves. The joint simulation of ADAMS and MATLAB involves the transfer of parameters. It is necessary to define the corresponding data unit to perform data transfer and interactive calculation simulation between the two software [8].

3 Experiment Step 1: First of all, through various complex combinations of electrical and mechanical systems, these complex combinations will inevitably create interrelated design subtasks. In the operation of complex motor system, there is a combination problem of multiple physical processes. If there are these combination relations, the actual dynamic process of the system can not be described by a single physical process. Therefore, the analysis of coupling relations between subsystems is very important for us to understand the system performance and establish the coupling model. Step 2: Secondly, the dynamic model of mechanical structure is described in the form of second-order differential equation, and the existing parallel solution methods are all aimed at the first-order equation system, and the transformation of the secondorder equation into the first-order equation will increase the dimension of the equation. In this paper, two parallel solutions are proposed: for the coupled mechanical structure dynamics model, a parallel Newmark solution method based on the second-order coupled ordinary differential equations of system segmentation is proposed; for the coupled mechanical and electrical dynamics model, a parallel Runge Kutta ewmark solution method based on the first-order and second-order mixed ordinary differential equations of system segmentation is proposed. Step 3: Finally, the joint simulation of ADAMS and MATLAB was used to establish the electromechanical coupling dynamic model of the electric wheel, and the dynamic performance of the electromechanical system under the conditions of starting, steady speed, uphill, deceleration belt, etc. was analyzed in detail, and the acceleration characteristics and steady speed of the electric wheel were analyzed. Analyze and evaluate performances such as capacity and impact resistance. The output torque calculation model was established, and the mechanical characteristics of the motor were used to improve the output torque calculation model.

Coupling Dynamics of Complex Electromechanical System

59

4 Discuss 4.1

Analysis of Experimental Results

This paper takes the integrated motor as the research object to test its electromechanical coupling dynamic performance. When the motor has a sudden change in load torque, the stability of the motor will change greatly. In the starting condition, the vehicle output torque is first output with constant torque, and then reaches the maximum power with constant power. When switching, different speeds, the torque change value, speed fluctuation value and recovery time are shown in Table 1. Table 1. Speed fluctuations and recovery times due to sudden changes in speed and torque Speed (km/h) 20 Torque change (Nm) 130 Speed fluctuation value (%) 35.8% Recovery time (s) 1.3

40 90 14.9% 1.2

60 55 26.5% 0.6

80 30 7.4% 0.8

For the above reasons, we should try to avoid a large sudden change in the motor load or output torque during the starting process. At the beginning of the motor, we can consider appropriately reducing the motor torque, then increasing it to the maximum torque, and then entering the constant torque output mode. Combined with the mechanical characteristics of the motor and the previous torque curve, the torque output is improved. The torque output curve before and after optimization is shown in Fig. 1.

150 100 50 0 0

5

10 Optimized

15

20

25

Before optimization

Fig. 1. Changes in torque output curve before and after optimization

After optimization, the speed and acceleration changes of the electric wheels are relatively smooth, reducing the abrupt phenomenon. After optimization, the acceleration time is increased by 2 s, but the overall mechanical performance of the system is more stable.

60

4.2

Z. He and X. Liao

Coupling Dynamic Analysis

In terms of acceleration characteristics, the electric wheel only needs 14 s for 0– 60 km/h and 11S for 60–80 km/h, with a maximum acceleration of 1.7 m/s2; on the uphill, it takes about 17 s and an acceleration of 0.32 m/s2 to reach 20 km/h at 15% gradient; in the acceleration process, the motor speed tracking ability is good, with an error of only 0.08% [9]. The speed stabilization performance is good, the maximum error of the whole system is only 0.23%, and the output torque fluctuation is less than 1 nm; when the speed error is 80 km/h, the maximum value is 0.12 km/h, and the output torque fluctuation is about 2 nm [10]. In terms of anti impact performance, when the speed is 40 km/h, the peak value of speed sudden change is less than 0.02 km/h, and the torque sudden change is less than 1 nm, returning to the stable value after about 1 s; when the speed is 20 km/h, there is no obvious fluctuation of speed, and the torque fluctuation is only 0.2 nm, which can be ignored, and the lateral dynamic resistance to vertical dynamic interference is strong [11, 12].

5 Conclusion Complex electromechanical systems generally include multiple subsystems (mechanical, electrical, hydraulic, lubrication, etc.) that interact and have different physical processes. During the design process, the design parameters of each process affect each other. Objectively, a parallel solution mode is also required. At the same time, the design of these systems involves different disciplines, the solution methods and tools are different, and it is difficult to solve with integrated models. Therefore, distributed solution is the only way for parallel design of electromechanical systems. Therefore, through ADAMS and MATLAB software joint simulation, we carried out a coupling simulation study of the electromechanical system, and analyzed the dynamic performance of the wheels in the starting, steady speed, uphill, deceleration and other conditions, and obtained the acceleration characteristics of electric wheels, Performances such as speed stability and impact resistance provide a basis for the performance improvement and technical application of electric wheels.

References 1. Liu, H.-P., Shi, W.-H.: Analyzing the characteristics of electromechanical coupling of a three-parameter energy harvester. J. Vib. Eng. 30(2), 214–221 (2017) 2. Wang, D., Ma, N., Guo, C.: Study on the characteristics of electromechanical disturbance propagation in non-uniform power systems. IET Gener. Transm. Distrib. 11(8), 1919–1925 (2017) 3. Cernotik, O., Mahmoodian, S., Hammerer, K.: Spatially adiabatic frequency conversion in optoelectromechanical arrays. Phys. Rev. Lett. 121(11), 110506 (2018) 4. Tokatli, A., Yiginer, O., Kilicaslan, F.: Quantification of atrial electrical heterogeneity via atrial electromechanical coupling. J. Sports Med. Phys. Fit. 57(1–2), 162 (2017)

Coupling Dynamics of Complex Electromechanical System

61

5. Gong, L.J., Pan, C.L., Pan, Q.S.: Analysis of the actuating effects of triple-layer piezoelectric cantilevers considering electromechanical coupling correction. Mod. Phys. Lett. B 31(4), 1750024 (2017) 6. Zhang, L.: Impact reduction method for electric vehicle dual-mode coupling drive system with modes shift. J. Mech. Eng. 54(8), 165 (2018) 7. Zhang, S., Xu, J.: Review on nonlinear dynamics in systems with coupling delays. Chin. J. Theor. Appl. Mech. 49(3), 565–587 (2017) 8. Junzhou, H.U.O.: TBM electromechanical coupling modeling and comparative analysis of synchronous drive control strategy. J. Mech. Eng. 54(1), 120 (2018) 9. Lee, J., Wang, Z., He, K.: Electrically tunable single- and few-layer MoS2 nanoelectromechanical systems with broad dynamic range. Sci. Adv. 4(3), eaao6653 (2018) 10. Treadway, E., Gan, Z., David Remy, C.: Toward controllable hydraulic coupling of joints in a wearable robot. IEEE Trans. Robot. PP(99), 1–16 (2018) 11. Smith, C.M., Housh, T.J., Hill, E.C.: Effects of fatigue and recovery on electromechanical delay during isokinetic muscle actions. Physiol. Meas. 38(10), 1837 (2017) 12. Lin, C.H.: Modeling and analysis of power trains for hybrid electric vehicles. Int. Trans. Electr. Energy Syst. 28(6), e2541 (2018)

Development Strategy of Educational Robot Industry Based on Big Data Analysis Jingqiu Yang1,2(&) and Yiquan Shi1,2 1

Jilin Engineering Normal University, Changchun 130052, China [email protected] 2 University of Sydney, Sydney, NSW 2006, Australia

Abstract. With the development of Internet technology, the influx of massive data has enabled research in the development of related fields such as the education robot industry. The era of big data has knocked on the door of artificial intelligence that has been silent for many years, combining statistical methodology, information theory, probability theory, etc. Disciplines, a new Internet era is coming. Educational robots, as a segmented industry of service robots, are closely related to artificial intelligence, and have been at the core of capital in recent years. In this context, using big data analysis to promote the healthy development of the education robot industry is of great significance to the development of the domestic education robot industry. This article uses big data technology to analyze the human resource management and debt structure and solvency of Shanghai Future Partners Robot Co., Ltd., analyzes the macroeconomic environment and industry environment of Shanghai Future Partners Robot Co., Ltd., and discusses the opportunities and challenge. Study the internal resources and capabilities of Shanghai Future Partners Robotics Co., Ltd., and analyze the company’s strengths and weaknesses in terms of production management, technology research and development capabilities, financial management, marketing management, and human resource management. This article adopts the method of combining theory with practice and big data analysis, combining the learned economic theory, corporate strategy theory, financial management science, and human resources science with the actual situation of the development of Shanghai Future Partner Robot Co., Ltd., and On this basis, the strategic goals and strategic positioning of the company’s future development are determined. Finally, it discusses how to control and implement corporate development strategies. The study found that the company’s engineering and technical personnel ratio is as high as 61.8%, and the employees are of high quality, which is in line with the high-tech and composite characteristics of the industry. Keywords: Big data analysis Target path

 Educational robot  Development strategy 

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 62–68, 2021. https://doi.org/10.1007/978-3-030-51556-0_10

Development Strategy of Educational Robot Industry

63

1 Introduction Big data has begun to transform in a major era, and modern information systems have made the industrial development of the big data education robot industry inevitable. In the big data education robot industry, the era of mass production, sharing and application of data has begun. Big data will eventually mark the “information society.” The huge population and application market are highly complex and full of change, making China the most complex big data country in the world. Solving such problems caused by big data, and exploring solutions based on big data are important means to upgrade and improve the network. Efficiency of China’s Educational Robot Industry. The core of big data is mining the unique value of large databases. The scientific and social value of big data is reflected here. There are many participants in the education robot industry, covering many product types, and the price range also ranges from 199–3999 yuan. In the field of early education escorts, the Alpha Egg of HKUST News and the future Xiaoqi of artificial intelligence technology in the future are the representatives. In the field of building blocks, Lego, excellent selection, ability storm, maker workshop and other products have higher sales [1]; Capability Storm of the humanoid series of educational robots, Alpha series and Everest series are representative; in the flight and maneuver series, Capability Storm and Fantasy Studio products are representative. This article introduces the background, purpose and significance of the research, elaborates the structure and research methods of the thesis, describes some suggestions for the development of the education robot industry, and uses big data to analyze the external environment of Shanghai Future Partners and the future robot company based on Internal conditions, determine the company’s strategic goals, make strategic choices, and discuss various functional strategies such as finance, scientific research and production in detail. Finally, it discusses how to control and implement a company’s development strategy. The study found that the company’s engineering and technical personnel ratio is as high as 61.8%, which is in line with the high-tech and composite characteristics of the education robot industry.

2 Proposed Method 2.1

Application of Big Data Technology in Educational Robot Industry

Big data technology can collect all kinds of data information in social production and life, and obtain the corresponding knowledge and laws through full mining to provide support for the upgrade of various education robot industries [2]. Information, energy and materials together are called the country’s three major strategic resources. Information technology has now penetrated into various fields including agriculture. In the field of educational robot machinery, information technology can be used to collect data such as the operating environment, operating parameters, and operating status of educational robots. After analysis and processing, they are used to optimize the control of educational robots, making educational machines more intelligent and standardized [3]. The amount of data produced by the production process of educational robots is

64

J. Yang and Y. Shi

also extremely huge. In order to conduct a full analysis of these data, the concept and method of big data need to be introduced into the information technology used. Big data not only promotes social progress, but also deepens the level of scientific research, which has epoch-making significance. Educational robots represent a new trend in educational development and have become a hotspot in educational research internationally [4, 5]. Educational robots have higher technical requirements and need new types of intelligent machines to match them. Therefore, advanced forms of intelligent education machines have appeared, namely, education robots [6]. Educational robot is a kind of intelligent machine with highly self-planning, self-organizing and selfadaptive ability, which can complete agricultural operations in complex environments. The robot was born in the 1950s. The application of educational robots has its own characteristics, such as the weak and complex operating objects, the unpredictable operating environment, and the lack of a fixed pattern of the operating actions [7]. The design and manufacturing costs of educational robots are high, and machine vision, GPS positioning, various sensors and intelligent control technologies are also needed as technical support. As a high-end educational machine, educational robots generate a large amount of data during operation and operation, including operating environment information, robot position information, robot operating parameters, and operation effect evaluation. The scale and complexity of these data are difficult to analyze and store with ordinary equipment and methods [8]. If these data are processed according to the concept of big data, the embedded information can be extracted, which is beneficial to the integration of various parts of the robot. Educational robots integrate various intelligent devices and advanced technologies. By combining with big data, while expanding the scope of big data applications, they can also improve their own performance and application effects [9]. It has a great effect on the analysis of educational robot industry development. 2.2

Cultivation of Educational Robot Market Should First Cut into the Field of Early Childhood Education

Market cultivation in any new field does not happen overnight. The entire industry needs to learn from growth, gradually move to order as soon as possible, and gradually regulate the survival of the fittest. At present, the education robot industry is still in its infancy, with low technology maturity, lack of standardization of products, and relatively low R & D of related educational content. In this context, how to improve market acceptance and expand the scope is the key. Therefore, in the selection of the educational robot industry, in addition to considering the application of technology, it is also necessary to focus on those target areas with clear target demand scenarios, a large user base, and subdivisions of existing mapping products [10, 11]. Due to the low cost of market education and high user acceptance, the upstream and downstream of the industrial chain can work together to form a good mapping product that has been in the field before, namely early childhood learning machines, but early childhood learning machines as digital products can only provide small amounts to infants and young children. With the development of mechanical education, alternative story machines, picture books, recording artificial intelligence and other technologies and the acquisition of big data, early education robots can provide children with comprehensive,

Development Strategy of Educational Robot Industry

65

systematic, sustainable growth education services, and some early education. In practical applications, robots have been able to teach young children to explore and learn like preschool teachers. It is foreseeable that artificial intelligence, cloud computing, big data and other related technologies have a very broad application space in the construction of the educational knowledge system of future educational robots, and have far-reaching effects.

3 Experiments 3.1

Experimental Background

Ability Storm was founded in 1996. Based on the research and analysis of the internal and external environment of Shanghai Future Partners Robot Co., Ltd., this paper proposes the company’s development strategy and discusses how to control and implement the enterprise development strategy. It is hoped that it can provide a reference for corporate governance when studying and formulating corporate strategies, improve the core competitiveness of Shanghai Future Partners Robot Co., Ltd., and contribute to the development of China’s education robot industry. 3.2

Experimental Methods

This article uses the method of combining theory with practice and big data analysis to combine the learned economic theory, corporate strategy theory, marketing theory, financial management, and human resources with the actual situation of the development of Shanghai Future Partner Robot Co., Ltd. In combination, with the help of analysis tools such as tables and MATLAB, the internal and external environment of Shanghai Future Partner Robot Co., Ltd. is analyzed, and the opportunities and challenges facing the company, as well as the company’s internal strengths and weaknesses are discussed. Based on this, the company’s strategic goals and strategic positioning for future development are determined. Finally, it discusses how to control and implement corporate development strategies. 3.3

Subject

Based on the research and analysis of the internal and external environment of Shanghai Future Partner Robot Co., Ltd., this paper proposes the company’s development strategy, and discusses how to control and implement the enterprise development strategy. It is hoped that it can provide a reference for corporate governance when researching and formulating corporate strategies, improve the core competitiveness of Shanghai Future Partners Robot Co., Ltd., and contribute to the development of the intelligent national industry of educational robots in China.

66

J. Yang and Y. Shi

4 Discussion 4.1

Big Data Analysis of Corporate Human Resource Management

Talent is the foundation of enterprise development. The key to improving the core competitiveness of enterprises and achieving development lies in people. As of December 31, 2018, Shanghai Future Partners Robot Co., Ltd. has 2,156 formal employees. The company’s employees were analyzed by occupational structure, education structure and age structure. As shown in Tables 1, 2, and 3. Table 1. Employee analysis table by professional structure Staffing Engineer Marketing personnel Manager Production staff Total Number of people 1332 45 235 544 2156 The proportion 61.8% 2.1% 10.9% 25.2% 100%

Table 2. Employee education analysis form Educational composition Number of people The proportion

Master degree and above 314 14.6%

Undergraduate 1429 66.3%

High school and below 413 19.2%

Total 2156 100%

Table 3. Employee breakdown table by age structure Age composition Number of people The proportion

30 years and under 876

31–40 years old 511

31–40 years old 391

41–50 years old 318

51 and above 60

Total 2156

40.6%

23.7%

18.1%

14.7%

2.9%

100%

As can be seen from Tables 1, 2 and 3 above, the company has a high proportion of engineering and technical personnel and high quality employees. This is a relatively high-tech and composite type consistent with the industry. Employees are of moderate age and have development potential. Overall, the company’s workforce is reasonably structured and its size and strength are comparable to its operations. However, it should also be seen that compared with international multinational companies, there are still some gaps in the current employee structure of Shanghai Future Partners Robotics Co., Ltd., which are mainly reflected in the following aspects: (1) There are few compound talents in the company. (2) The knowledge structure of managers is unreasonable.

Development Strategy of Educational Robot Industry

4.2

67

Responsibility Structure and Solvency Analysis

From the perspective of debt structure, the company’s liabilities are mainly current liabilities. The compound annual growth rate of current liabilities from 2016 to 2018 was 35.56%, which was mainly due to the increase in accounts received in advance, short-term borrowings, accounts payable and bills payable. Its total volume and structure are adapted to the company’s business scale and business characteristics. At the end of each year, the current debt structure is relatively stable. This structure is not expected to change much in the future. The experimental data are shown in Fig. 1.

Fig. 1. Composition and changes of the company’s liabilities from 2016 to 2018

As shown in Fig. 1, the deferred income in non-current liabilities is a government subsidy enjoyed by the company. It can be divided into three categories in nature. The first category is project funding, which is mainly the national debt of the education robot production line project allocated by the Municipal Finance Bureau Special funds; the second category is scientific and technological research and development expenses, mainly the education robot technology, automated production lines and software development, automatic guided vehicle and other projects allocated by relevant government departments; the third category is government discounts and other, mainly It is a financial discount for capital construction loans, a discount for technology renovation loans, a discount for project working capital loans, and other subsidies received from government departments. By nature, this is not a liability, but an equity.

5 Conclusions Based on the development status of the home education robot industry, this article first reviews the research status of the home education robot and its industrial development model. The theoretical basis of the research in this paper is expounded. From the

68

J. Yang and Y. Shi

related literature, we can see that there is less research on the overall development strategy of the educational robot industry in China, and very little research on the development model of the educational robot industry. Therefore, this article uses this as an entry point, focusing on the development model choice of Shanghai Future Partner Robot Co., Ltd. Under the guidance of related theories of industrial development models, this paper studies the development status of the domestic robot industry from a macro perspective. This article first reviews the strategic management theory, summarizes the connotation, characteristics and constituent elements of corporate strategy, the evolution of corporate strategic management theory, and the principles, levels, and processes of strategic management. It provides theoretical support for carrying out strategic management research of Shanghai Future Partner Robot Co. Ltd. Acknowledgement. Science and technology development program project of jilin province in 2020 “Research on development countermeasures of educational robot industry in jilin province based on patent analysis”.

References 1. Arya, K., Coelho, B., Pandya, S.: A model based design approach to system building using the e-Yantra educational robot. Acm Sigbed Rev. 14(1), 37–43 (2017) 2. López-Rodríguez, F.M., Cuesta, F.: Andruino-A1: low-cost educational mobile robot based on Android and Arduino. J. Intell. Rob. Syst. 81(1), 1–14 (2015) 3. dos Santos Lopes, M.S., Gomes, I.P., Trindade, R.M.P.: Web environment for programming and control of a mobile robot in a remote laboratory. IEEE Transac. Learning Technol. 10 (4), 526–531 (2017) 4. Zheng, H., Chen, Y., Li, E.: Research on evolutionary game strategy of promoting development of remanufacturing industries by government. China Mech. Eng. 29(3), 340– 347 (2018) 5. Yoo, S., Choi, K.: Research on development stage of service model in big data industry. Lect. Notes Electr. Eng. 330(7), 545–554 (2015) 6. Sun, Y., Wang, Y., Chen, D.: Research on differentiated marketing strategy of ASEAN market for development of Chinese patent medicine based on principal component analysis and hierarchical clustering method. Chin. Tradit. Herb. Drugs 49(8), 1977–1984 (2018) 7. Zhang, P.: Research on the influence factors and development path of China’s paper industry economic growth. China Pulp Pap. 36(5), 68–71 (2017) 8. Sobreira, H., Moreira, A.P., Costa, P.: Robust mobile robot localization based on a security laser: an industry case study. Ind. Robot. 43(6), 596–606 (2016) 9. Robla-Gomez, S., Becerra, V.M., LLata, J.R.: Working together: a review on safe humanrobot collaboration in industrial environments. IEEE Access PP(99), 1–1 (2017) 10. Goldberg, K.: Editorial: “one robot is robotics, ten robots is automation”. IEEE Trans. Autom. Sci. Eng. 13(4), 1418–1419 (2016) 11. Yamazaki, M., Oda, N.: Vision-based landing foot angle estimation for biped walking robot. IEEJ Trans. Ind. Appl. 135(3), 220–226 (2015)

Selection of Urban Rail Transit Connection Mode Under Nested Logit Model Tao Liu(&) College of Architecture and Urban Planning, Tongji University, Shanghai 200092, China [email protected]

Abstract. Urban rail transit is in a booming stage in China. Rail transit has the advantages of large capacity, fast speed, safety, punctuality, energy conservation and land use. However, neither the number of urban rail transit stations nor the density of the network can be compared with conventional buses. The coverage is limited and the accessibility is relatively low. Therefore, only by effectively connecting with other modes of transportation, rail transit can attract more passenger flows and give full play to the service capabilities of urban rail systems. This article first combs the related theories of the Nested Logit model, builds the Nested Logit model on this basis, and assigns and calibrates the variables and parameters of the model. Finally, the model established in this study was tested, and it was found that the model variables established in this paper were selected correctly, the fitting effect was good, and the vehicle branch structure model had high accuracy. Keywords: Connection mode

 Rail transit  Nested Logit model

1 Introduction Since the reform and opening up, China’s economy and society have developed rapidly, and the process of urbanization is obvious. Especially since the 21st century, the process of industrialization has accelerated, and the size of cities has continued to expand. Prioritizing the development of public transportation is an inevitable requirement to alleviate congestion and change the mode of transportation development. Fast, long-distance, and large-capacity urban rail transit has gradually become an important way to solve transportation problems in China’s large cities. With the construction of urban rail transit, land use has shown a trend of high-density development along both sides of the rail line, and development to the periphery. Urban rail transit has become the main mode of travel for residents along the line, and the resulting “last mile” problem has become increasingly prominent. This article conducts surveys on rail transit station connection mode selection behavior, establishes a rail transit station connection mode selection model based on the Nested Logit model, and explores urban rail transit station connection mode selection characteristics.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 69–74, 2021. https://doi.org/10.1007/978-3-030-51556-0_11

70

T. Liu

2 Nested Logit Model Theory Rail transit station connection behavior can be described as the social activities of people in the city in order to complete a certain purpose of travel by rail transit, enter and exit the rail transit station to choose non-rail transit mode through a certain distance from one rail transit station to another A transfer from one place to another or to a rail transit station. At present, the method of traffic mode division There are two types of methods: one is a statistical method based on aggregate methods, and the other is a non-aggregate method based on probability theory [1, 2]. Due to the many influencing factors of transportation mode selection, and the existence of difficult to determine factors such as travel habits and preferences of travellers, it is difficult for traditional aggregate model methods to accurately describe the process of traveler selection of transportation modes. The non-aggregate model is based on the individual who actually generates traffic activities. The data obtained from the survey is used directly to build the model without any statistical processing. It is more suitable for predicting the division of traffic modes. An individual (or family, or some combination) as a unit of behavioral decisionmaking will choose the branch that has the most utility for him in a set that can be selected and the selection methods are independent of each other. This assumption is called the utility maximization behavior hypothesis, which is the basis of the logit model and a prerequisite for all non-aggregate models. If Uin is the utility for traveler n to select travel mode i, and An is a set of travel modes, then the traveler n selects plan i from the set An under the following conditions: Uin [ Ujn; j 2 An

ð1Þ

According to the discrete choice model of random utility theory, Uin can be expressed as: Uin ¼ Vin þ ein:

ð2Þ

3 Establishment of Nested Logit Model and Parameter Calibration The Nested Logit (NL) model is an improved model based on the Multi nomial Logit (MNL) model, which can better overcome the “unrelated features” of the MNL model, and consider the relationship between the options [3–5]. Because different branches of choices will produce different prediction results, this study builds models according to different branch structures, and compares the parameters to find the branch that is most suitable for the group of students, and then analyzes the influence of various factors on the connection mode. The NL model divides the complete set A into K subsets, the related alternatives are divided into the same S subset, and the irrelevant alternatives are divided into different subsets, namely A ¼ Ak ; Ak \ A1 ¼ u; K 6¼ 1. Based on this, a k

tree structure is constructed, as shown in Fig. 1.

Selection of Urban Rail Transit Connection Mode

71

Fig. 1. Decision tree of NL model

The NL model assumes that the joint distribution function of the random terms is a generalized extreme value distribution in the modeling, that is:  X X     k F eq ¼ exp  exp e =k j2B jq k k k¼1

ð3Þ

The object of this study is Rail Transit Line 1, which mainly investigates the travel and transfer of travelers on Rail Transit Line 1. The survey was completed through a combination of on-site questionnaires and surveys on the subway public platform. A total of 1500 valid questionnaires were obtained. In order to facilitate the establishment of the model, the significant variables are now assigned values, as shown in Table 1. Table 1. Selection of connection methods affecting variable assignment Age Annual household income/10,000 yuan Connection method Connection fee/yuan Connection distance/m

Divided into 6 sections:  18, 19–25, 26–35, 36–45, 46–55,  56, the values are 0, 1, 2, 3, 4, 5 Divided into 6 sections:  3, 3–6, 6–10, 10–15, 15–20,  20, the values are 0, 1, 2, 3, 4, 5 Divided into 4 categories: bus = 0, private car / taxi = 1, public bike = 2, walking = 3 Divided into 5 segments: 0, 2, 3, 4,  5. The values are 0, 1, 2, 3, 4 Divided into 6 sections:  500, 501 to 1000, 1001 to 2000, 2001 to 5000, 5001 to 10000,  10001. The values are 0, 1, 2, 3, 4, 5

72

T. Liu

Considering the selectability and controllability of the data, the NL model was calibrated using Limdep statistical software. The results are shown in Table 2.

Table 2. Calibration results of model parameters Variable Cost Time Bike Bus Taxi

Estimated value Standard deviation t value −0.1023 0.0361 −2.81 −0.2222 0.1633 −2.33 −1.6559 1.4862 2.37 −0.2151 0.8215 −1.92 −0.0927 0.6647 −1.74

From the variable calibration results in Table 2, the absolute values of the t-test values for 95% of the regression variables are above 1.96, with a confidence level of 95%. The absolute values of the t-test values for the remaining variables are also above 1.65, the confidence level. Up to 90%, all factors have a significant impact on the choice of connection method. According to the modeling results, for the student group, gender is an important factor that cannot be ignored, and it has the greatest influence on the choice of bicycle trips. Among the influencing variables of bicycles, the coefficients of gender variables are all greater than 2. The difference in utility values between males and females is more obvious than other connection methods. Boys have a higher probability of choosing bicycles as the connection mode than girls. In addition, the time and cost calibration parameters in the model are negative and have a negative effect on the selection result (that is, for a connection mode, the larger the variable, the less the traveler tends to choose this transportation mode), which is also in line with the actual situation Match.

4 Test of Connection Mode Selection Model for Urban Rail Transit The statistical test of the model is a necessary process for the analysis after the model is solved. In the above analysis, the prediction models for various modes of rail transit have been obtained [5–7]. In order to further test the validity of the model, three test results are given with the help of SPSS software. Model fitting information is shown in Table 3. It can be seen from Table 3 that the significant level is 0.000, indicating that the explanatory variables such as the connection distance, connection cost, and income are significantly linear relative to the bus connection sharing rate, and the model variables are correctly selected.

Selection of Urban Rail Transit Connection Mode

73

Table 3. Model fitting information Model fitting criteria Likelihood ratio test −2 log-likelihood Chi-square value Df Sig. Intercept only final 1447.62 886.215 15 .000

Model

Likelihood ratio test is an index that reflects authenticity, and it is a composite index that reflects both sensitivity and specificity. It can be seen from Table 4 that when the significance level is less than 0.05, the probability values of the chi-square test of income, connection distance, and connection cost are all lower than 0.05, the hypothesis of a regression coefficient of 0 is rejected, and Connection costs contribute significantly to the linear relationship of the model [8–10]. The probability of chisquare test of gender and age is greater than 0.05, which means that factors such as gender and age do not contribute significantly to the linear relationship of the model [11]. This shows that the variables selected in this paper are reasonable. Table 4. Model-likelihood ratio test data Model fitting criteria Likelihood ratio test −2 log-likelihood Chi-square value Df Intercept 55.669 .000 1 Income 559.251 4.095 3 Connection fee 562.178 8.140 3 Connection distance 1327.62 835.514 3

Model

Sig. – .246 .043 .000

The accuracy test of the model mainly uses the three statistical indicators of the model’s odds ratio, branch correlation coefficient and hit ratio for analysis. From the model’s odds ratio, the NL model q2 is 0.350, and the model q is 0.139. The value of q is between 0–1. The closer the value is to 1, the higher the accuracy of the model. However, in practice, when the value of q reaches 0.2–0.4, it is considered to be quite high. Therefore, the accuracy of the NL model is high. In the NL model, the hit rate of the lower layer is 80.8%, and the hit rate of the upper layer is 60.65%; in the second model of NL, the hit ratio of the lower layer is 78.3%, and the hit ratio of the upper layer is 53.91%. In general, if the hit ratio is greater than 80%, the accuracy of the model can be considered quite high.

5 Conclusion In recent years, China’s motorization and urbanization have been further promoted, and many large cities have chosen to build integrated integrated transportation systems with rail transportation as the backbone. To play the role of rail transit and improve its attractiveness, a good rail transit station connection is essential. This paper is based on this research on the choice of connection mode of urban rail transit stations. This study

74

T. Liu

establishes a rail transit connection mode selection model based on the NL model, and analyzes the impact of various factors on residents’ choice of rail transit connection mode. This paper uses the NL model to study the prediction of rail transit transfer methods, and finally obtains a high-precision rail transit transfer mode selection model. The research basis for transportation-oriented comprehensive transportation planning. The choice of connection methods for rail transit stations is the key to constructing urban rail transit as the main artery of transportation in large cities under the current background of vigorously developing public transportation in China. Only by solving the connection problem of rail transit stations can we further develop the role of rail transit and build an integrated urban rail transit system. Therefore, this research is very important in terms of current transportation development. This paper has made some innovations in the use of models and variable collection during the research process, and has achieved some research results. However, there are still some shortcomings in the research’s meticulous level, and further improvements are needed in future research.

References 1. Newman, J.P., Lurkin, V., Garrow, L.A.: Computational methods for estimating multinomial, nested, and cross-nested logit models that account for semi-aggregate data. J. Choice Model. 26(34), 28–40 (2018) 2. Gao, T.Z., Chen, K.M., Li, F.L.: Topology analysis of urban rail transit network. Chang’an Daxue Xuebao (Ziran Kexue Ban)/J. Chang’an Univ. (Natural Science Edition) 38(3), 97– 106 (2018) 3. Feng, J., Timmermans, T., Yang, H.J.P.: An integrated Markov decision process and nested logit consumer response model of air ticket pricing. Transp. A: Transp. Sci. 13(6), 1–34 (2017) 4. Blanchet, J., Gallego, G., Goyal, V.: A Markov chain approximation to choice modeling. Oper. Res. 64(76), 181–182 (2016) 5. Gao, Z., Yang, L.: Energy-saving operation approaches for urban rail transit systems. Front. Eng. Manag. 6(2), 162–163 (2019) 6. Tapia, R.J., dos Santos Senna, L.A., Larranaga, A.M., et al.: Joint mode and port choice for soy production in Buenos Aires province, Argentina. Transp. Res. Part E: Logist. Transp. Rev. 121(3), 153–154 (2019) 7. Liu, C.-W., Deng, C.: Stated preferences of Taiwanese investors for financial products. Qual. Res. Financ. Mark. 11(162), 52–53 (2019) 8. Weijs-Perrée, M., Appel-Meulenbroek, R., Arentze, T.: Analysing knowledge sharing behaviour in business centres: a mixed multinomial logit model. Knowl. Manag. Res. Pract. 21(45), 98–100 (2019) 9. Alfandari, L., Denoyel, V., Thiele, A.: Correction to: solving utility-maximization selection problems with multinomial logit demand: is the first-choice model a good approximation? Ann. Oper. Res. 4(12), 201–202 (2019) 10. Spears, R., Veeraraghavan, S., Coleman, J.: Nonlinear modeling of ground motions at Lotung LSST site with nested surface soil constitutive model. Nucl. Technol. 205(7), 1–14 (2019) 11. Wang, J.H., Pan, C.H., Chang, I.S., et al.: Penalized full likelihood approach to variable selection for Cox’s regression model under nested case-control sampling. Lifetime Data Anal. 13(21), 72–73 (2019)

Design Method of Aerobics Teaching Assistant Platform Based on 5G Technology Qiong Huang(&) and Fubin Wang Jiangxi Institute of Fashion Technology, Nanchang, JiangXi, China [email protected]

Abstract. With the development and application of Internet technology, the construction of network teaching platforms has become an important way to realize information-based education. Therefore, the construction of network platforms in major universities in China is in a rising period. Among them, the construction of the network platform is also applied to the teaching of physical education. In addition, since the two major traction forces of the future development of mobile communications are IOT and mobile Internet, the basic requirement of mobile communications is an increasingly good communication experience. The current research on the application of network platform in aerobics teaching focuses on the development, improvement and influence of network platform combined with information technology. Based on the above background, the research content of this article is the research on the design method of aerobics teaching auxiliary platform based on 5g technology. Through the questionnaire, the experimental simulation of the teaching application practice of 2019 students of physical education major in a university was conducted. “Combining the subjects” is a more advanced teaching design idea, and it can well embody the advantages of the network teaching model. The establishment of aerobics teaching auxiliary platform can better stimulate students ‘enthusiasm for learning, improve students’ learning efficiency and cultivate good study habits. In addition, for students ‘subjective influence, students’ acceptance of the teaching assistant platform is high, and most of the students agree with the application and promotion of the teaching assistant platform. Keywords: 5g technology  Aerobics teaching  Network platform  Colleges and universities

1 Introduction Aerobics is a type of aerobic exercise that combines many advantages in one body, and has universality. Aerobics exercises can strengthen the body and enhance physical fitness, thereby promoting the overall development of the body. Electronic teaching assistance platform (Electronic Learning) refers to a comprehensive support service software system based on the Internet for online teaching [1, 2]. E-Learning consists of an online course development system, an online teaching support system, and an online teaching management system, which respectively complete the functions of online course development, online teaching implementation, and online teaching management [3, 4]. From a macro perspective, the status of E-Learning largely reflects the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 75–81, 2021. https://doi.org/10.1007/978-3-030-51556-0_12

76

Q. Huang and F. Wang

development level of modern distance education in a country or region [5, 6]. As far as distance education entities are concerned, E-Learning is the basic activity space for distance education teaching and management. The quality and efficiency of teaching and management have a great impact [7, 8]. Aitha discusses and analyzes new banking technologies, including digital deposit applications, photo bill payment applications, smart phone credit card scanners, econferences, and mobile payment applications. The advantages and disadvantages of the new technology are analyzed through a table [9, 10]. Strinati focuses on a subset of three disruptive technology solutions developed and tested by 5GCHAMPION during the 2018 Pyeong Chang Olympic Games: high-speed communications, direct satellite user equipment communications, and post-sales evolution of wireless devices through software reconstruction. Assessing the effectiveness of these key 5G functions and conducting trials to understand the actual maturity of 5G technology prototypes and the potential of new 5G services in vertical markets and end-user enhanced experiences when large-scale 5G services are launched [11, 12]. Wang studied the non-linear impairment of OFDM signals in 5G multi-RAT heterogeneous mobile front-end network (MFH). Although extensive research has been conducted on the nonlinear subcarrier inter modulation (IMs) of OFDM signals, in multi-RAT heterogeneous systems, the inter-band interference between multiple OFDM services has not been evaluated. Wang first studied inter-band IMs between multi-band OFDM service sub-carriers in a multi-RAT heterogeneous MFH network. The millimeter-wave MFH test bench was used to evaluate the non-linear interference between multiple OFDM services from various radio access technologies (rats). Through theoretical analysis and experimental verification, the role of inter-band IMs between different OFDM services in MFH performance degradation is actually more important than the known in-band IMs of each service. Finally, non-linear compensation of MFH networks is achieved by using predistortion technology to achieve effective suppression of in-band and inter-band sub-carrier IMs [13]. The research content of this article is based on the design method of the aerobics teaching aid platform based on 5g technology. By applying the aerobics network platform of a university in the aerobics course, the entire teaching process of teachers and students is recorded, and the auxiliary platform is summarized and analyzed from it. Impact on school teachers and students. Finally, the construction of aerobics auxiliary platform combined with 5g technology is proposed. Finally, the experimental simulation of the superiority of the application of the network platform in the teaching of aerobics in colleges and universities and the combination of “dominant and subject” teaching experiments were carried out. Assisting in aerobics teaching, students can watch videos to learn movements through the platform, which can reduce the workload of teachers’ repeated demonstrations.

Design Method of Aerobics Teaching Assistant Platform

77

2 Proposed Method 2.1

Aerobics

The direct motivation for college students to choose aerobics is to make their body contours more beautiful. Although a person’s basic body shape is determined by DNA innately, acquired shape can also affect a person’s body shape. Controlling exercise according to reasonable exercise intensity can gradually make the appearance of students’ body more fit. In theory, aerobics is not just a pure course. It is made and improved based on the theoretical guidance of many courses. Its action posture and flow have obvious pertinence to global and partial objects. Based on the pursuit of physical beauty, students with high technical skills can develop to a wider field, and establish aerobics societies to attract more students to participate. At the same time, they also cultivate students’ communication and management skills. 2.2

5g Technology

In order to adapt to the development of the mobile Internet and meet the growing needs of people, the fifth-generation mobile communication technology with ultra-high spectrum utilization and data transmission rate has received widespread attention and formed a new generation of mobile communication. Wireless communication technology communication network. The fifth generation wireless system wireless communication technology pays more attention to the quality of mobile data services. However, the existing Internet architecture based on the Transmission Control Protocol/Internet Protocol protocol is difficult to meet the higher requirements on the transmission quality and other aspects of the future fifth-generation mobile communication technology mobile communication network. Therefore, researchers have proposed a new type of Internet architecture, a content-centric network. The idea of content-centric network design comes from observing the changing needs of today’s Internet applications, that is, paying more attention to content acquisition and distribution. 2.3

Blackboard (BB for Short) Online Teaching Platform

The “blackboard” network-assisted teaching platform is the first software platform developed by computer teachers at Cornell University. After years of development, the “blackboard” has developed into the business E-Learning with the most users in the world. The “blackboard” platform integrates most of the teaching links in one, and provides a platform for teachers to create and publish online content. Not only can it develop online courses without classroom teaching, it can also add online content to traditional courses. All registered teachers and students can use the platform teaching system, which has become a comprehensive teaching platform integrating various resources.

78

Q. Huang and F. Wang

3 Experiments This article applies the teaching practice of 2019 physical education students in a university, and aims at the design of aerobics online courses. During the research period, it continuously retrieves a large amount of literature related to this topic; in China Education and Research Network, China Distance Education Network, Collect relevant materials from official authoritative websites such as China Education Technology Network, Ministry of Education Network of the People’s Republic of China, China Higher Education Network, etc.; and purchase related books, consult relevant literature through libraries and reference rooms, and get some recommended works by visiting experts Inquired. According to the construction of a college online teaching platform and its application in aerobics teaching, a questionnaire for aerobics online teaching platform was designed. According to the progress of aerobics learning and grouping, students who participated in aerobics classes were divided into three categories, and three different questionnaires were conducted. The first is a total of 79 questionnaires sent to the experimental and control classes before the semester. The second part is a questionnaire survey of 39 control classes. The third part is the 40 questionnaires after the semester.

4 Discussion 4.1

Instructional Design Ideas of “Leading-Subject Combination”

In reality, teachers often use it intentionally or unintentionally. Although their understanding of online course design is not profound, the guiding role of some learning theories in online course design can be summarized as follows: The guiding role of behaviorist learning theory in online course design: the principle of proximity, that is, you must do it immediately after stimulation Respond; repeat principles, repeated exercises can strengthen learning and promote memory; feedback and reinforce principles. Information about the correctness of answers can promote learning; prompts and their decay principles guide students to achieve the expected response with reduced prompts, thereby completing learning. The cognitive learning process and online course activities are shown in Table 1. As shown in Table 1, the guiding ideology of constructivist learning theory in the design of online courses is to establish a simulated world environment and use learning-related scenarios; pay attention to solving problems in the real world; teaching goals should be negotiated rather than imposed; evaluation Should be a tool for selfanalysis; emphasize the relationship between concepts, provide multiple expressions and perspectives; provide work to help students understand various perspectives, and study activities are controlled and coordinated by students themselves. With the development of digital learning and the deepening of teaching reform, from the perspective of educational thought, it has undergone a change from “teaching first” to “learning first”. After years of practice and exploration, some experts in the world have proposed to change from “student-centered” to “combination of leading disciplines”, focusing on the emergence of student discipline status and the development of teacher-led work applications, not just on students. Emphasizes autonomous learning, ignoring the leading role of teachers, such as constructivism and digital learning.

Design Method of Aerobics Teaching Assistant Platform

79

Table 1. Cognitive learning process and online course activities Different stages of the learning process Accept look forward to Extract information to short-term memory Choose sensory information Semantic coding Reaction Strengthen Retention of motivational information Form a concept

4.2

The corresponding environment provided by the online course Attract attention Tell students the goals Stimulate students’ memories of previous learning Presenting Stimulating Materials Provide study guidance Behaviors that induce expectations Provide feedback Rating behavior Enhance memory and learning transfer

Advantages of Applying Network Platform in Aerobics Teaching in Colleges

The evaluation of the overall effect of the application of the network platform in aerobics teaching is shown in Table 2. Table 2. Research on the influence of network platform construction on aerobics teaching Problem How do you feel about the overall effect of the application of the web platform in aerobics teaching How do you feel about the classroom atmosphere and teaching effect of aerobics this semester

Very poor 0

Worse (%) 3

General (%) 35

Better (%) 47

Well (%) 15

0

0

20

55

25

As shown in Table 2, 47% of students think very good, accounting for the vast majority, 15% think good, 35% think fair, 3% think bad. 82.5% of students took a positive attitude towards the classroom atmosphere and the teaching effect of aerobics teaching on the Internet platform, and only 20% of students thought it was average. It can be seen that the application of the network platform in aerobics teaching in colleges is quite successful for students, and most students are satisfied with it. Figures 1 and 2 show whether the online platform is worth promoting statistical charts in aerobics teaching and whether it is in favor of the application of the online platform in aerobics teaching.

80

Q. Huang and F. Wang

Summary graph

Not worth it

Unclear

worth it

Fig. 1. Is the network platform worth promoting statistical charts in aerobics teaching

Approve

Disapprove

Unclear

Approve

Fig. 2. Is it in favor of the statistical chart of the application of network platform in aerobics teaching

As shown in Figs. 1 and 2, 65% of the students think that the application of the internet platform in aerobics teaching is worth promoting, 75% of the students agree, and only 7.5 and 12.5% of the students have a negative attitude. According to the track records of teachers during class, it is found that in the classes using traditional teaching methods, the teachers’ explanations and demonstrations are used more frequently. This is due to the special nature of aerobics teaching. It is possible to improve students’ expressive power and sense of rhythm and rhythm. Teachers often perform demonstrations by themselves, giving students more intuitive and sensuous action appearances.

5 Conclusions The application of the fifth-generation wireless system-based network platform to assist the teaching of aerobics has greatly improved students’ learning interest, learning efficiency, and self-inquiry ability. The subjective aspect of the students has a high degree of recognition of the Internet platform, and they are willing to accept and use it, and believe that it should be actively promoted in colleges and universities. The application of the network platform based on the fifth generation wireless system technology puts forward higher requirements for teachers’ own knowledge and

Design Method of Aerobics Teaching Assistant Platform

81

ability, which makes the teaching content in the class more abundant. Most physical education teachers have a positive and positive attitude towards the application of the network platform in aerobics teaching, and believe that it can play a supporting role in aerobics teaching and bring good results. In this paper, there are still some deficiencies in the design of the aerobics teaching aid platform based on the fifth generation wireless system technology. For example, the infrastructure of the network platform can be further improved and improved to increase its compatibility with the browser. Improve the campus network speed to ensure a smoother use of teachers and students. Acknowledgement. This work was supported by General Events of Jiangxi Sports Bureau (No. 2016004).

References 1. Violante, M.G., Vezzetti, E.: Implementing a new approach for the design of an e-learning platform in engineering education. Comput. Appl. Eng. Educ. 22(4), 708–727 (2015) 2. Eley, C.V., Young, V.L., Hayes, C.V., et al.: Evaluation of an e-Learning platform for educators to improve education around infection prevention and antibiotics. Technol. Pedagog. Educ. 5, 1–17 (2019) 3. Kiryakova-Dineva, T., Levunlieva, M., Kyurova, V.: Iphras as an E-learning platform for idiomatic competence. Electron. J. e-Learning 15(2), 137–143 (2017) 4. Abiola, O.B., Adeyemo, O.A., Olatunji, K.A.: Leveraging on E-learning platform for teaching mathematics in high schools. Int. J. Comput. Appl. 126(6), 44–49 (2015) 5. Kobayashi, T., Maehara, K., Aikawa, N.: Development of cross-platform e-learning system for electric circuit. IEEJ Transac. Fundam. Mater. 137(12), 693–694 (2017) 6. Babori, A., Fassi, H.F., Hariri, A., et al.: An e-learning environment for algorithmic: toward an active construction of skills. World J. Educ. Technol. Curr. Issues 8(2), 82 (2016) 7. Anshari, M., Alas, Y., Guan, L.S.: Pervasive knowledge, social networks, and cloud computing: e-learning 2.0. Eurasia J. Math. Sci. Technol. Educ. 11(5), 909–921 (2015) 8. Appalla, P., Kuthadi, V.M., Marwala, T.: An efficient educational data mining approach to support e-learning. Wireless Netw. 32(4), 1–14 (2016) 9. Aithal, S., Karani, K.P.: Massive growth of banking technology with the aid of 5G technologies. Int. J. Technol. Manag. 5(7), 617–626 (2015) 10. Luan, T.H., Chen, C., Vinel, A., et al.: Guest editorial: emerging technology for 5G enabled vehicular networks. IEEE Trans. Veh. Technol. 65(10), 7827–7830 (2016) 11. Strinati, E.C., Mueck, M., Clemente, A., et al.: 5GCHAMPION—disruptive 5G technologies for roll-out in 2018. ETRI J. 40(1), 10–25 (2018) 12. Patzold, M.: Countdown for the full-scale development of 5G new radio [Mobile Radio]. IEEE Veh. Technol. Mag. 13(2), 7–13 (2018) 13. Wang, J., Liu, C., Zhang, J., et al.: Nonlinear inter-band subcarrier intermodulations of multi-RAT OFDM wireless services in 5G heterogeneous mobile fronthaul networks. J. Lightwave Technol. 34(17), 1–1 (2016)

Transformation and Upgrading of Manufacturing Industry Under the Background of the Digital Economy Haiyan Jiang(&) and Xuhui Chen Fuzhou University of International Studies and Trade, Fuzhou 350202, China [email protected]

Abstract. With the intensification of a new round of industrial competition in the global economy, information technology is being integrated into all areas of society at a rapid development rate and depth of development. The digital economy has become the new driving force for the economic development of countries and a key force for economic transformation. The article takes the current Fujian manufacturing industry transformation and upgrading as the starting point to study the challenges facing its manufacturing digitalization. At the last part, find some effective ways to achieve development. Keywords: Digital economy upgrading

 Manufacturing industry  Transformation and

1 Introduction As a brand-new economic system, the digital economy brings internal changes to the entire economic environment and economic system based on the widespread use of digital technology. Western developed countries have formulated digital economic development strategies as a breakthrough point for a new round of competitive advantages. After the digital economy was first written in the government work report in March 2017, our country’s 19th National Congress report also proposed: digital economy and other emerging. The industry is booming, accelerating the development of advanced manufacturing, and promoting the deep integration of the Internet, big data, artificial intelligence and the real economy [1]. It can be seen that the digital economy is penetrating into all aspects of social and economic life and has become a key driving force for national industrial upgrading [2]. This article takes the manufacturing industry in Fujian as an entry point, and the challenges behind achieving certain results in its digitalization process, and proposes corresponding development paths for these challenges, so as to create new advantages and lead new development.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 82–87, 2021. https://doi.org/10.1007/978-3-030-51556-0_13

Transformation and Upgrading of Manufacturing Industry

83

2 Connotation of Digital Economy The concept of the digital economy was first mentioned in Don Tapscott’s “Digital Economy” in 1996, and has subsequently become a focus area for scholars [3]. The G20 summit held in China in 2016 further elaborated the connotation of the digital economy: “Take the use of digital knowledge and information as key production factors, take modern information networks as important carriers, take effective use of information and communication technology as efficiency improvement and economy A series of economic activities that are important drivers of structural optimization” [4, 5]. As the main body of the national economy, manufacturing is the foundation of economic growth. The deep integration of digitalization and manufacturing will be the main battlefield of the digital economy. The acceleration of the traditional manufacturing industry under the strong stimulation of digitalization is bound to usher in a new wave of “digital economy” dividends.

3 Development Status of Digital Economy and Manufacturing Industry in Fujian In 2018, the scale of Fujian’s digital economy reached 1.42 trillion yuan, ranking second in the country in terms of growth rate, accounting for nearly 40% of GDP. According to the 2018 China Internet Plus Index Report, Fujian Index ranks seventh in the country. The top ten rankings are shown in the following Table 1. Table 1. The top ten rankings of digital economy and manufacturing in China Ranking 1

2

3

4

5

6

7

8

9

10

Province Guangdong Jiangsu Zhejiang Beijing Shandong Sichuan Fujian Henan Shanghai Hubei Source: China’s “Internet +” Index Report 2018

During the second Digital China Construction Summit held in 2019, there were 587 digital economy projects in Fujian Province, with a total investment of more than 450 billion yuan [6].

Table 2. The added value of major manufacturing industries in China Major Textile industries industry

Automotive Chemical manufacturing materials and chemical

Nonmetallic Minerals ferrous metal smelting and pressing processing

General Computers, equipment communications manufacturing and other electronic equipment

Electrical machinery and equipment

Value added

4.2

10.3

8.9

14.2

9.0

Source: Fujian Bureau of Statistics

9.4

12.0

8.3

84

H. Jiang and X. Chen

In 2018, the value added of the three major industries in Fujian Province as a proportion of regional GDP was: 6.6%: 48.1: 45.3%. The value added of industries above the designated size increased by 9.1%, of which the manufacturing industry increased by 8.9%. Proportion is high [7]. The added value of major manufacturing industries is shown in the following Table 2. From the perspective of innovation input, it can be seen that Fujian Province mainly relies on traditional manufacturing industries, and the high-tech industries account for a relatively low proportion and lack of development [8].

4 Challenges Facing the Digitalization of Manufacturing in Fujian Province The traditional industries represented by textiles, footwear and building materials are the foundation of Fujian’s manufacturing industry. However, in recent years, problems such as difficult recruitment, low added value, and technical shortcomings have been troubled. Under pressure, Fujian enterprises have chosen to use high-tech and information technology to transform and upgrade [9]. At the same time, the Ministry of Industry and Information Technology of Fujian Province adhered to General Secretary Jinping’s strategic thinking on the power of the Internet and the important directive spirit of digital China construction, devoted his efforts to promoting the development of the “digital economy” of the province, and insisted on accelerating the province’s digital industrialization and industrial digitization. Although many achievements have been made, the digital development of Fujian’s manufacturing industry also faces many challenges [10]. 4.1

Core Technical Challenges

The key to the development of the digital economy is technological innovation. However, the research in the field of artificial intelligence that began in China in 2010 has a gap compared with western developed countries. It lacks important original results, and the gap between core algorithms and sophisticated equipment is also obvious. The current new generation of information technology industry in Fujian Province in communication, core chips, sensors and software is far from advanced domestic provinces such as Guangdong, Zhejiang, and foreign advanced levels. Many technologies still rely on imports, which makes traditional manufacturing Industry transformation and upgrading is still in a relatively passive position. 4.2

Challenges in the Management Model of Manufacturing Enterprises

The development of the digital economy has promoted a new change in the management model of manufacturing enterprises. From the standardized production method structure in the past to the Toyota system in the pyramid mode to today, with the advent of computers, on the basis of a powerful information network, a modular production method, Integrate global resources and seek the best way for their profits. This makes modern manufacturing enterprise management more based on the Internet, big data,

Transformation and Upgrading of Manufacturing Industry

85

artificial intelligence, etc., and uses advanced computer tools and management methods, so that companies can use the product standards and new business rules to better products Development systems or designs, shorter-term product production cycles, more reasonable purchasing models, more scientific inventory management, and more flexible organizational methods provide products and services to product demanders. 4.3

Lack of Digital Service Platform for Manufacturing Industry

At present, Fujian’s manufacturing industry is more developed and is still at the end of the industrial value chain. The added value of products is low, and the coordinated development of the production service industry that matches it is inconsistent. The digital economy provides a wide range of technologies and platform support for manufacturing services. Although the total volume of Fujian’s service trade has been increasing year by year, the overall deficit is present. Half of the deficit is basically caused by the productive service industry. To this end, it is imperative to build a multidimensional innovative digital service platform. 4.4

Challenges for Digital Economy Compound Talents

At present, the Fujian-Taiwan Cross-Strait Youth Digital Economy Collaborative Innovation Park intends to use digital innovation as a link to promote the development of cross-strait high-tech industries and talents. However, the talents of the intelligent transformation of traditional manufacturing are far from enough. This is mainly reflected in the lack of Internet technology talents and the lack of innovative talents in information technology and manufacturing in the current manufacturing industry with more than 90% of its talents.

5 Suggestions for the Transformation and Upgrading of Manufacturing in Fujian 5.1

Breakthroughs in Core Technologies

The digital economy has extremely high requirements for core technologies, the national level should plan in advance, not only to encourage policy, but also to focus on the resources and support from the country to the enterprise in action. The core technology can be broken through enterprise collaboration, school-enterprise collaboration and other ways to build a good digital economy ecosystem. On the other hand, on the basis of actively introducing and absorbing international advanced process technology, enterprises have increased the ability of independent innovation of highend chips. 5.2

The Change of Management Mode of Manufacturing Enterprises

Manufacturing companies should fully combining digital technology to promote the transformation of the organization from a control-oriented and process-driven

86

H. Jiang and X. Chen

organizational structure to a new sharing-oriented and decentralized organizational structure, and to build new experiences in various fields from production to distribution. And based on the “Internet +” to expand business business online, well connected to the individual needs of customers, the extension and expansion of the original product, finally realizing the innovation of business model and mass customization service model. 5.3

Create a Service Collaboration Platform

The interconnected nature of the digital economy requires an effective service collaboration platform to promote the improvement of the digital environment of the manufacturing industry and enhance industrial service capabilities. Fujian’s geographical advantage will be brought into play, and a productive service platform integrating R & D, logistics, marketing, and supply chain will be established, and improve the standardization of service levels. 5.4

Strengthen the Training of Compound Talents

Efforts will be made to cultivate digital economy talents and enhance the core competitiveness of digitalization in the manufacturing industry. At present, the digital innovation and development of manufacturing industry, the core of the transformation and upgrading of traditional manufacturing industry should be talent. To this end, it is necessary to strengthen the cultivation of composite talents in the digital economy from multiple levels, and continuously improve the level of high-level talents in the two industries of manufacturing.

6 Conclusion The traditional advantage manufacturing industry in Fujian needs to constantly change its concept, actively respond to the changes in the information technology environment and the diversity and complexity of customer needs, make full use of new generation information technology to participate in market competition, and accelerate the manufacturing industry to mid-to-high Stride forward.

References 1. Fan, H.: Path choice of quality upgrade of chinese manufacturing clusters under the background of digital economy. J. Qiannan Teach. Coll. Natl. 2, 88–93 (2019). (in Chinese) 2. Zhang, Y.: Development ideas and main tasks for the digital economy to drive the industrial structure to the mid-to-high end 9: 85–91 (2018). (in Chinese) 3. Li, F.: Chinese manufacturing industry and its governance and upgrade in the digital economy era: based on the global value chain analysis framework. Univ. Int. Bus. Econ. 5, 20–21 (2018). (in Chinese) 4. Cao, Z.: Research on new manufacturing modes to promote the high quality development of China’s industry in the digital economy. Theor. Discuss. 2, 99–104 (2018). (in Chinese)

Transformation and Upgrading of Manufacturing Industry

87

5. Zhou, R.: Thinking about the digital economy driving the transformation and upgrading of Fuzhou manufacturing industry. J. Fujian Inst. Technol. 3, 297–301 (2019). (in Chinese) 6. Zhao, X.: Research on the transformation and upgrading of Chinese manufacturing driven by digital economy. Zhongzhou Acad. J. 12, 36–41 (2017). (in Chinese) 7. Wang, X.: Industry 4.0, Internet+, Made in China 2025: The future direction of China’s manufacturing industry transformation and upgrading. Natl. Gov. 23: 12–19 (2015) (in Chinese) 8. Yu, X., et al.: The status quo and experience of the development of global digital economy and its enlightenment to China. Mod. Manag. Sci. 12, 12–14 (2018). (in Chinese) 9. Yang, X.: Digital economy: the economic logic of deep transformation of traditional economy. J. Shenzhen Univ. (Humanities and Social Sciences) 4, 101–104 (2017). (in Chinese) 10. Lu, C.: Thinking on the development of digital economy. J. Fujian Univ. Technol. 4, 39–43 (2017). (in Chinese)

Effect of Heat Treatment on Microstructure and Properties of Wear-Resistant Cast Steel with High Strength and Toughness Haijun Cui(&), Bo Zhang, and Meng Wang Department of Electromechanical Engineering, Heilongjiang Oriental College, Harbin 150066, China [email protected]

Abstract. With the rapid development of economy, wear-resistant cast steel materials with high strength and toughness have been widely used in various industries, including metallurgy and mining industry, building materials industry, chemical industry and power industry. The wear-resistant cast steel with high strength and toughness has special properties in the face of high pressure and high impact load, and can work hardening. There are three steps in the heat treatment of such materials, including heating, heat preservation and cooling, which have a great influence on the structure and properties of the products. To conduct research on the heat treatment, the author first selects the experimental materials and methods, then analyzes the specific experimental results, and finally introduces the commercial application of wear-resistant cast steel materials with high strength and toughness. Keywords: Heat treatment  High strength and toughness  Wear-resistant cast steel  Structure influence  Property influence

1 Introduction In China, the amount of wear-resistant metal materials is increasing gradually every year, the total amount is more than 3 million tons, and the lining plate needed for metallurgical and mining work is more than 100,000 tons. Therefore, the demand of metal wear-resistant materials in our country is extremely large. When making wearresistant cast steel materials with high-strength and toughness such as lining plates, some abrasives will be worn due to the influence of the preparation method of milling. But the material has the request not only in the hardness, also has in the wearresistance, the plasticity and the toughness. Therefore, it is important to study the heat treatment of wear-resistant cast steel with high strength and toughness, comprehensively adjust its mechanical properties and other properties, and make it have better application value in industry.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 88–94, 2021. https://doi.org/10.1007/978-3-030-51556-0_14

Effect of Heat Treatment on Microstructure and Properties

89

2 Materials and Methods of Experiment In this paper, the author chooses the experimental variables as quenching temperature and tempering temperature, and focuses on the analysis of the structure and mechanical properties of the material when exploring to obtain a reasonable heat treatment for the wear-resistant cast steel material with high strength and toughness. The material composition of this study is as follows: Carbon (C, 0.30–0.50%), Manganese (Mn, 0.50–1.50%), Silicon (Si, 1.10–1.90%), Chromium (Cr, 1.20–2.40%), Molybdenum (Mo, 0.10–0.70%), Sulfur (S, > < g ðvðtÞ  v Þðv  v Þ; r i;w r;w i;w gj;w ðtÞ ¼ > ; v  vðtÞ  vr;w i;w > > : gr ; vr;w  vðtÞ  vo;w

ð1Þ

Robust Optimization Model of Island Energy System Based on Uncertainty

173

(2) The output Power Model of Photovoltaic System The output curve of the photovoltaic system generally meets the following conditions: ( f ðhÞ¼

CðaÞCðbÞ a1 ð1 CðaÞ þ CðbÞ h

 hÞb1 ; 0  h  1; a  0; b  0

0; others

ð2Þ

where the shape parameters of Beta distribution are a and b, and the irradiance correlation coefficient is h. (3) The output Power Model of Energy Storage Power Station The storage controller is used to control the power plant to stop discharging. The model is as follows: max gmin k;s ðtÞ  gk;s ðtÞ  gk;s ðtÞ

ð3Þ

min where gmax k;s ðtÞ and gk;s ðtÞ are the upper and lower limits of the storage capacity of the energy storage power station respectively; gk;s ðtÞ is the charge and discharge amount at time t of the energy storage power station.

3.2

Uncertain Sets of Wind and Light Units

The minimum value and maximum value of the variation range of wind power of the wind field at time are shown in the Eq. (4). Variation range of the photovoltaic power of the first PV at the moment of time can be closed, as shown in the Eq. (5). gdj;w ðtÞ  gj;w ðtÞ  guj;w ðtÞ

ð4Þ

gdm;pv ðtÞ  gm;pv ðtÞ  gum;pv ðtÞ

ð5Þ

Usually, the robust deviation coefficient of photovoltaic power generation is set as ~ g ðtÞgpv ðtÞ upv ðtÞ ¼ pv , uw ðtÞ ¼ ~gw ðtÞgw ðtÞ, which controls the fluctuation range of photobg pv ðtÞ bg w ðtÞ voltaic power generation in each period. Considering that wind power, photovoltaic power generation and load demand do not occur in every period of the worst case, the uncertainty factor can be described as: Tw X j~gw ðtÞ  gw ðtÞj t¼1

b g w ðt Þ

 Tpv  X ~gpv ðtÞ  gpv ðtÞ t¼1

b g pv ðtÞ

 Cw

ð6Þ

 Cpv

ð7Þ

174

Z. Gu et al.

where the practical values of wind power and photovoltaic output power in time period t are defined as ~gw ðtÞ and ~gpv ðtÞ. The nominal values of wind power and photovoltaic output power at time t are defined as gw ðtÞ and gpv ðtÞ, the maximum wave momentum ^

^

w

pv

of wind power and photovoltaic output power at time t are defined as gðtÞ and g ðtÞ. Tw ¼ ½1; 2;    ; Tw  is a collection of time periods for wind power generation. Cw and Cpv are robust measures of wind power and photovoltaic power generation, C taking   integer or non-integer, where Cw 2 ½0; Cw  and Cpv 2 0; Cpv . 3.3

Optimal Scheduling Model of Island-Type Energy System

3.3.1 System Operation Objective Function The following quadratic function of power is a mathematical model of diesel generator: min z1 ¼

T X I X

½ui ðtÞ½1  ui ðtÞSUi þ ui ðtÞGi ðgi ðtÞÞ

ð8Þ

t¼1 i¼1

Gi ðgi ðtÞÞ ¼ a þ bi gi ðtÞ þ ci g2i ðtÞ

ð9Þ

where ui ðtÞ is the working and stopping state variable of diesel generator set i at t time. When the unit is on, ui ðtÞ0 s value is 1. When the unit is down, ui ðtÞ0 s value is 0. SUi is the consumption of coal for diesel generator set i start-up (unit: g/kWh) Gi ðgi ðtÞÞ is the fuel consumption function of diesel generator set i about power generation gi ðtÞ. According to the energy consumption characteristic curve of diesel engine, the coefficient of the cost function can be fitted as a, b and c. gi ðtÞ is the power generation power of the diesel engine group i. Setting a = 0.0071, b = 0.2333, c = 0.4333. If the risk value exists, this article sets the penalty item in the objective function. The running cost of the system is the smallest. Considering the operation risk of wind power and photovoltaic units, the expressions obtained are such as formula (10): min p ¼ Z1 þ d  uw;pv

ð10Þ

where uw;pv is the difference between the combined output of wind power and photovoltaic power. d represents the penalty factor in the risk penalty (unit: yuan/kW). 3.3.2 Conditions of System Operation Constraints Under the objective function, the following constraints must be satisfied: (1) The power balance of the system NT X i¼1

gi þ

NW X j¼1

gj;w þ

NP X m¼1

gm;pv ¼ D

ð11Þ

Robust Optimization Model of Island Energy System Based on Uncertainty

175

where gi represents the active output of the diesel generator set i. gj;w represents the active power of the fan j. gm;pv represents the active output of the photovoltaic unit. D represents the demand value of the load of the power system. (2) Constraint conditions of the diesel generator set operation 1) Unit output constraints gmin  gi  gmax i i

ð12Þ

where gmax and gmin represent the maximum allowable output and the minimum i i allowable output of the unit i. 2) Unit Climbing Constraints þ Dg i  gi ðtÞ  gi ðt  1Þ  Dgi

ð13Þ

3) Unit start and stop constraint 

 Tion ðt  1Þ  MTion ðui ðt  1Þ  ui ðtÞÞ  0

ð14Þ

  Tioff ðt  1Þ  MTioff ðui ðtÞ  ui ðt  1ÞÞ  0

ð15Þ

þ where Dg i and Dgi are the dynamic elevating and elevating constraints of the diesel on generator set i; Ti ðt  1Þ is the operating time of the diesel generator set i at t − 1; MTion is the minimum operating time of the diesel generator set; Tioff ðt  1Þ is the stopping time of the diesel generator set at the time of t − 1; MTioff is the shortest stop time for diesel generator set i.

(3) Constraint conditions of the wind power output constraint max gmin j;w  gj;w  gj;w2

ð16Þ

min where gmax j;w represents the maximum schedulable output of wind turbines j. gj;w represents the minimum allowable output of the unit j.

(4) Constraint conditions of the photovoltaic output max gmin m;pv  gm;pv  gm;pv

ð17Þ

min where gmax m;pv represents the maximum schedulable output of photovoltaic units m. gm;pv represents the minimum allowable output of the photovoltaic unit m.

176

Z. Gu et al.

(5) Constraint conditions of the system spare capacity G X

½gmax ðtÞð1  hÞð1  lÞ  DðtÞ þ RðtÞ

ð18Þ

g¼1

where DðtÞ is a load condition and RðtÞ is the spare condition of the system at t time. l is the line loss rate; h is the self-use power rate of the unit; gmax ðtÞ is the maximum unit output of the unit at t time.

4 The Analysis of Example 4.1

Base Data

The energy supply system of an island in China is taken as the research object. The system capacity optimization configuration calculation is carried out according to the annual forecast wind speed, lighting conditions and electric load demand of the island. The wind power cut into the wind is 3 m/s. The cutting wind speed of wind power is 25 m/s; Photovoltaic power generation system power 50 MW; energy storage battery system power 50 MW, maximum discharge depth 70%. 100 MW of diesel generator power. The fuel consumption coefficient is 220 g/kW * h; The price of diesel oil is 6000 yuan/ton; The penalty coefficient is 0.5 yuan/kWh. To verify the effectiveness of the proposed model in dealing with the conservative problem of system operation, and to obtain the robust multi-objective model under different values, we select 2 cases in turn. Cw ¼ 0, Cpv ¼ 0; Cw ¼ 2, Cpv ¼ 2. The change of C directly affects the generation of random scene, and further affects the optimization result. 4.2

Analysis of the Results of an Example

(1) Operation Result in Scenario 1 Cw ¼ 0 and Cpv ¼ 0 are deterministic cases. However, it takes a long time to calculate the optimization problem of system operation with random scenarios. This is because the deterministic case only needs to optimize the outer layer problem. PSO algorithm can search the worst scenario set of all scheduling schemes. The solution of this random scene is a long process. However, from the perspective of 24-h scheduling decision, the solution time of the problem is acceptable for decision makers (Fig. 2).

Robust Optimization Model of Island Energy System Based on Uncertainty

177

100 80 60 40 20

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

Fig. 2. Operation scheme of the island energy supply system under scenario 1 (MW)

Since the energy storage device can be charged and discharged, the capacity can meet the reserve rate of peak load and the power fluctuation caused by the prediction error of wind and solar energy. (2) Operation Result in Scenario 2 Cw ¼ 2, Cpv ¼ 2. In order to verify the effectiveness of the proposed operation method, the operation results of different scene systems are selected for comparison. The system operates under the minimum economic, environmental and carbon emission targets. It is assumed that random fluctuations of wind power and photovoltaic power output occur between 14:00 and 15:00 (Fig. 3).

140 120 100

80 60 40 20 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

Fig. 3. Operation scheme of the island energy supply system under scenario 2 (MW)

This is mainly due to the seawater desalination load, the resident load is low, but the hot water load is high. Diesel generators and boilers bear the main load of electricity and hot water.

178

Z. Gu et al. Table 1. The comparison of multi-objective optimization results Scenario The operating cost (yuan) Punishment cost (yuan) Scenario 1 1815375.591 0 Scenario 2 2099365.434 −10743.5

(3) Comparative analysis of simulation results The comparison results are as follows: As can be seen from Table 1, with the increase of value, the operating cost and penalty cost of the system also increase. This is because the increase of the value leads to the increase of the frequency of uncertainty in the scheduling cycle. Therefore, the decision-maker needs to dispatch the diesel power generation output to restrain the random disturbance, which results in the increase of operation cost and penalty cost.

5 Conclusions Based on the wind/light/firewood/island micro-grid system, the experimental results show that: As the value C increases, the frequency of uncertainty in the dispatching cycle increases. Comparing the optimization results of the problem under different robust measures, it is shown that the solution algorithm can obtain the worst-case set of scheduling scheme within a limited number of iterations. Therefore, on the premise of guaranteeing the orderly operation of the system, the proposed scheduling method can coordinate economic and environmental objectives for decision makers and guarantee the robustness of the system operation, thus verifying the effectiveness and feasibility of the proposed operation optimization method. Acknowledgements. This work was supported by the science and technology project “key technology and application of planning and decision-making based on the whole cost chain of power grid in the market environment” of State Grid Corporation of China.

References 1. Liao, S., Yao, W., Han, X., Wen, J.: Chronological operation simulation framework for regional power system under high penetration of renewable energy using meteorological data. Appl. Energy 203, 816–828 (2017) 2. Dai, T., Qiao, W.: Optimal bidding strategy of a strategic wind power producer in the shortterm market. In: Power & Energy Society General Meeting. IEEE (2016) 3. Tan, R.R.: Carbon emissions pinch analysis for sustainable energy planning. In: Encyclopedia of Sustainable Technologies, pp. 231–237 (2017) 4. Botterud, A., Wang, J, Bessa, R.J., Keko, H., Miranda, V.: Risk management and optimal bidding for a wind power producer. In: Power and Energy Society General Meeting. IEEE (2010) 5. Ross, M., Hidalgo, R., Abbey, C., Joos, G.: Energy storage system scheduling for an isolated microgrid. IET Renew. Power Gener. 5(2), 117–123 (2011)

Robust Optimization Model of Island Energy System Based on Uncertainty

179

6. Chen, C., Duan, S., Cai, T., Liu, B., Hu, G.: Smart energy management system for optimal microgrid economic operation. IET Renew. Power Gener. 5(3), 258–267 (2011) 7. Fetanat, A., Khorasaninejad, E.: Size optimization for hybrid photovoltaic–wind energy system using ant colony optimization for continuous domains based integer programming. Appl. Soft Comput. 31, 196–209 (2015) 8. Maheri, A.: Multi-objective design optimisation of standalone hybrid wind-PV-diesel systems under uncertainties. Renew. Energy 66(6), 650–661 (2014) 9. Perera, A.T.D., Attalage, R.A., Perera, K.K.C.K., Dassanayake, V.P.C.: Designing standalone hybrid energy systems minimizing initial investment, life cycle cost and pollutant emission. Energy 54(2), 220–230 (2013) 10. Cany, C., Mansilla, C., da Costa, P., Mathonnièrea, G.: Adapting the French nuclear fleet to integrate variable renewable energies via the production of hydrogen: towards massive production of low carbon hydrogen. Int. J. Hydrog. Energy 42(19), 13339–13356 (2017) 11. Dehghan, S., Amjady, N., Zareipour, H.: Optimal integration of multiple wind farms into bulk electric system considering wind speed correlation uncertainties. Int. Trans. Electr. Energy Syst. 26(5), 1085–1102 (2016) 12. Mei, W., Chen, Z., Fang, J.: Robust energy-efficient transmit design for MISOME wiretap channels. Signal Inf. Process. (2017)

Exploration and Research on Project Engineering Management Mode Based on BIM Dongfeng Li(&) School of Architectural Engineering, Guangdong Engineering Polytechnic, Guangzhou 510520, Guangdong, China [email protected]

Abstract. In the process of urbanization, the number of construction projects is increasing, so it is necessary to optimize the design of project management. A project management method based on BIM is proposed. The fuzzy balanced scheduling method is used to optimize and cluster the information data of the construction project, and the parameterized identification model is used for the adaptive configuration of the construction project in the whole life cycle process. The dynamic data analysis model of project management is constructed by using 3D rendering method, the basic data of project management is obtained by using BIM technology, and the adaptive query and configuration of project management data is realized by database optimization access technology. Improve the artificial intelligence of project management. The simulation results show that the model has good retrieval ability and high efficiency of database access to the relevant information data of the project, and the intelligent level of project management is improved. Keywords: BIM

 Project engineering management  Database  Clustering

1 Introduction Project management is an important link in engineering construction. Strengthening project management plays an important role in improving the quality of project, controlling the cost and managing the duration of the project [1]. As the key content of the project cost control, on the one hand, it is related to the cost control of the project; on the other hand, it affects the economic benefits of the project, so it is more necessary to strengthen its management [2]. According to the present situation, it is very significant to use advanced technology in order to strengthen the project management and control the project cost effectively. At present, BIM technology has been applied in the management of construction project [3]. From its application effect, it not only realizes the scientific grasp of all elements of construction engineering, but also promotes the improvement of engineering quality and the science of cost control [4]. Has the very high realistic utilization value and the development prospect. In order to better use and popularize this technology in the future project management, it is necessary to study it actively [5]. The Reference lags behind the project progress caused by the current project management company’s schedule management problems, and combines the frontier © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 180–184, 2021. https://doi.org/10.1007/978-3-030-51556-0_27

Exploration and Research on Project Engineering Management

181

research in the progress management field to construct a buffer-based progress management method for the entire process of the project [6]. This method covers the whole process from the setting of progress buffer to the setting of deviation standard, and then monitors the project according to the deviation standard and buffer. The application of this method can improve the accuracy of project schedule management and ensure that the project is completed within the acceptable progress deviation range [7, 8]. However, this method does not have strong accessibility and efficiency [9].

2 BIM Data Analysis and Database Construction for Construction Project Management 2.1

Data Analysis of Construction Engineering Management Project

In order to carry out data analysis, we first need to build a BIM based data management system platform. As the value of BIM has reached the whole life process of the project, and the functions of all kinds of software of BIM are gradually strong, more and more models based systems are gradually developed for project information integration [10]. In order to realize the optimized management index of BIM database of construction project management, based on the platform built above, it is necessary to construct the relative correlative state system model of BIM   database of construction engineering project management, assuming that Ei ; Ej ; d; t is the BIM of construction project management. The trust relation of quaternion contained in the information fusion center in the database, the BIM data classification attribute A ¼ fA1 ; A2 ;    ; Am g of the construction project management, and the maximum correlation value obtained by querying the BIM data at the latest moment, the BIM data of the construction project management are obtained [18]. A BIM local database is represented as a subsystem as i, and the association rule vector state function of the BIM data is obtained as follows [11, 12]: Inforðx; yÞ ¼

N P

xi u i P

Nþ1

j¼i

k¼j þ 1

2mj Lk p k 

 1; i ¼ 1; . . .; N þ 1 N P

ð1Þ

Ek

k¼j

3 BIM Technology Optimization of Project Engineering Management 3.1

Dynamic Data Analysis of Project Engineering Management

In this paper, a BIM based project management method is proposed. Based on the relevant information data of the construction project, the dynamic data analysis model of the project management is constructed by using the 3D rendering method, and the dynamic data analysis model of the project management is derived. The relevant information data of the construction project is associated with the entity knowledge

182

D. Li

base, and the associated knowledge is used to effectively guide the resource fusion and reorganization of the BIM database for the management of the building engineering project, so as to construct the relevant information base of the construction project. An entity model of information data, expressed as:

Qrev ðsÞ ¼ 

1 Ns 1 Ns

Ns P

ð xi  xi þ s Þ 3

i¼1 Ns P

ð xi  xi þ s Þ

2

32

ð2Þ

i¼1

Assuming that the relevant information data association rule item qi of the construction project has ni nearest feature di ¼ ðdi1 ; di2 ; . . .; dini Þ, there are: Wðqi ; dij Þ ¼

ni P

gðqi ; dij Þ  log2 ½f ðdij Þ þ 1

ð3Þ

fgðqi ; dij Þ  log2 ½f ðdij Þ þ 1g

j¼1

The mean mutual information method is used to solve the adaptive threshold of the multi-layer temporal attribute of BIM database of construction engineering project management, the BIM data matrix of H-dimensional construction project management 0 is obtained, the maximum value of C ¼ ½X1 ; X2 ; . . .; Xn  is obtained, and the construction worker is realized. The feature analysis of multi-layer temporal attributes in BIM database of process project management. Assume that the BIM database of multimodel recommended construction project management is distributed with a scale of XðtÞ, which is normalized in the form of: X 0 ðtÞ ¼ XðtÞ=kXðtÞk

ð4Þ

4 Simulation Experiment and Result Analysis In order to test the application performance of the model method in improving the BIM data management of construction project management and the optimization management of engineering project, the simulation experiment was carried out, and the BIM data combination mode of CWT200G construction project management was adopted to construct the model. Build the BIM database structure model of the project management of the network text information construction project under the real environment. More than 100000 BIM data of construction project management were obtained by random sampling method, and the experiment was carried out. The iterative step size of BIM data sampling in construction project management is 0.003, the number of cyclic iterations is 100, the data scale is 200Tbit, and the correlation coefficient is 0.25. The minimum association rule feature of BIM database data structure in construction project management is obtained. The support threshold is min sup p2 = 2.0%, and the minimum support threshold of database is min sup p1 = 30.0%, according to the above

Exploration and Research on Project Engineering Management

183

simulation environment and parameter setting, the dynamic data analysis model of project engineering management is constructed by using 3D rendering method, and the project engineering management model is obtained. The result of three-dimensional rendering of dynamic data is shown in Fig. 1.

3 2 1 0.5

0 -0.5

-0.5

0

0.5

(a) BIM data set A

1 0 -1 0.5

0 -0.5

-0.5 0

0.5

(b) BIM data set B Fig. 1. 3D rendering of dynamic data for project engineering management

5 Conclusions The cost control of engineering project is very important to the improvement of the economic benefit of engineering project. The active use of BIM technology can realize the cost control well, mainly because BIM technology has accurate data computing ability. A large amount of engineering data can be calculated quickly. In addition, BIM technology can achieve the coordination of various positions and departments, and it can also have an accurate grasp of resource consumption. In this paper, a threedimensional building model is established, and the fuzzy balanced scheduling method is used to optimize the scheduling and cluster analysis of the relevant information data of the construction project. The parameterized identification model is used in the whole

184

D. Li

life cycle process. The dynamic data analysis model of project management is constructed by using 3D rendering method, the basic data of project management is obtained by BIM technology, and the database optimization access technology is used to realize the project. The adaptive query and configuration of project management data can improve the artificial intelligence of project management. In a word, BIM technology has widely application value in project management. Acknowledgements. This paper is one of the achievements of the low-carbon and energysaving technology integration demonstration of major science and technology projects in Guangdong province – the low-carbon and energy-saving technology integration demonstration of Chengchuang building in Nanhai district, Foshan (02532290234909148).

References 1. Paragios, N., Deriche, R.: Geodesic active regions and level set methods for supervised texture segmentation. Int. J. Comput. Vision 46(3), 223–247 (2002) 2. Jiang, X.L., Wang, Q., He, B., et al.: Robust level set image segmentation algorithm using local correntropy-based fuzzy C-means clustering with spatial constraints. Neurocomputing 207(C), 22–35 (2016) 3. Yang, F.F.: Research on project schedule management method of whole process based on buffer. Eng. Econ. 13(8), 23–27 (2016) 4. Huang, H.F., Zhao, Y.Q.: The research and realization of teaching project management platform based on web. Comput. Knowl. Technol. 13(7), 93–94 (2017) 5. Zhou, Z.L., Ma, B.J., Hu, F.Y.: On the safety management of the construction project based on the evolutionary stable strategy. J. Saf. Environ. 16(1), 168–171 6. Niu, S., Chen, Q., Sisternes, L.D., et al.: Robust noise region-based active contour model via local similarity factor for image segmentation. Pattern Recogn. 61, 104–119 (2016) 7. Zhou, S., Feng, Y., Wu, W.Y., et al.: A novel method based on the fuzzy C-means clustering to calculate the maximal Lyapunov exponent from small data. Acta Physica Sinica 65(2), 42–48 (2016) 8. Wang, L., Meng, X.F., Guo, S.N.: Preservation of implicit privacy in spatio-temporal data publication. J. Software 27(8), 1922–1933 (2016) 9. Bi, S., Ho, C.K., Zhang, R.: Wireless powered communication: opportunities and challenges. IEEE Commun. Mag. 53(4), 117–125 (2015) 10. Ulukus, S., Yener, A., Erkip, E., et al.: Energy harvesting wireless communications: a review of recent advances. IEEE J. Sel. Areas in Commun. 33(3), 360–381 (2015) 11. Zhao, N., Zhang, S., Yu, R., et al.: Exploiting interference for energy harvesting: a survey, research issues and challenges. IEEE Access 12(5), 10403–10421 (2017) 12. Seo, D.W, Lee, J.H., Lee, H.S.: Optimal coupling to achieve maximum output power in a WPT system. IEEE Trans. Power Electron. 31(6), 3994–3998 (2016)

Building Optimization Based on Wind Environment Simulation Analysis Zhuo Wei1, Ningning Xie1(&), and Zhe Jiao2 1

School of Architecture and Arts Design, Shijiazhuang Tiedao University, Shijiazhuang 050043, Hebei, China [email protected] 2 Beijing Tsinghua Tongheng Urban Planning and Design Institute, Beijing 100085, Beijing, China

Abstract. The comfort level of wind environment of high-density building located in the new construction area of the city is easy to be ignored and also an extremely important indicator. China’s construction and planning departments have relatively strict supervision, and the design at the planning level and the building monomer level has received good attention, while the comfort level of the site design between the planning and the building monomer is often ignored by the design. Keywords: Building wind environment CFD

 Comfort  Computer simulation 

1 Introduction With the cooling of real estate in China, design and development are more and more rational. The requirements for building comfort and green energy saving are more rational. The improvement of architects’ professional quality and computer simulation technology make the green simulation technology more accurate. It is possible to avoid unreasonable and uncomfortable situations in actual operation in the future by simulating the reconstruction of the completed buildings and the buildings to be implemented. The evaluation standard of green building design was just launched this year. Compared with the local energy saving standard which has been implemented for a long time in China, the regulations on building thermal engineering are relatively mature. However, the environment between planning and monomer building is often ignored in the design. Although the monomer building of China Railway Construction Yao center is nearly completed, having simulation on its environment to find out the unreasonable comfort level from the site level and optimize it by landscape or other means, so as to improve the comfort level of the site and finally improve the comprehensive energy-saving efficiency of the monomer building [1].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 185–194, 2021. https://doi.org/10.1007/978-3-030-51556-0_28

186

Z. Wei et al.

2 Overview Apple orchard area is located in the west of Shijingshan district, Beijing. Shijingshan area has a temperate sub-humid climate with an average annual precipitation of about 680 mm. The average annual wind speed in Beijing is between 1.8 * 3 m/s. Due to the relatively perfect meteorological data in Beijing, the corresponding meteorological data in Shijingshan area and the meteorological data in different seasons and months can be found. The average annual wind speed in Shijingshan area is 2.4 m/s, The prevailing southeast wind in summer has an average wind speed of 2.1 m/s, while the prevailing north wind in winter has an average wind speed of 2.4 m/s.

Fig. 1. Plan of plot J and P of China railway construction Yao center (plot J is in the north and plot P is in the south)

China railway construction Yao center is located in the core plot of apple orchard transportation hub business district, Shijingshan district, Beijing. It is plot J and P respectively, and the land is commercial office land. It is adjacent to Shijingshan apple orchard transportation hub and the center of metro M1 line and M6 and S1 rapid transit

Building Optimization Based on Wind Environment

187

hub under construction [2]. The project is located in the west, east to the first planning road, south to Fushi oad, west to the third planning road, north to Jinping road, divided into plots J and P. The total construction area of plot J is 105,831 m2, and the underground construction area is 34,979 m2. There are two towers in the site, block A with 20 floors, block B with 14 floors, and C as the transfer building of commercial and transportation hub, the ground area is 2,044 m2; There is only one 14-storey office building on the land of plot P, with an over ground area of 16,464 m2 and an underground area of 4,851 m2. Block C (circular) in the plot is directly connected with the apple orchard station of metro line 1 in the later stage, which brings a large flow of people to the park’s business. The northern side of the building in plot P is a green space at the present stage, while the line S1 of rail transit passes through in the later stage. The general plan of the project is shown in Fig. 1, and Fig. 2 is the effect diagram of plot J.

Fig. 2. Effect diagram of plot J of China railway construction Yao center

3 Evaluation of Wind Environment Comfort Under some adverse conditions, strong wind speed appears in the building pedestrian area, resulting in discomfort for pedestrians. The influence of different wind speed on human comfort is shown in Table 1. In order to improve the comfort level of buildings and their surrounding environment, China has also issued standards similar to the LEED green certification in the United States. “Green Building Evaluation Standards (GBT_50378-2014)” stipulates the comfort level of wind environment of public buildings, and the following provisions are made in the outdoor environment: Indoor wind environment is conducive to outdoor walk, activities, and natural ventilation of construction, under the condition of winter wind speed and wind direction, it requires the wind speed around the pedestrian area of building is less than 5 m/s, and the outdoor wind speed amplification factor (The amplification factor of wind speed generally refers to the ratio of the maximum wind speed at the height 1.5 m above the

188

Z. Wei et al.

ground around the building to the wind speed at the same height as the open ground) [3] less than 2; The wind pressure on the windward and leeward surfaces is not more than 5 Pa except for the first row of buildings facing the wind. In transition season and summer, it is required that there should has no obvious eddy current or calm zone within the activity area, and the wind pressure difference on the surface of the outer window can be opened above 50%, which is more than 0.5pa. There are a lot of countries and scholars choose 2 m height wind speed of wind environment to define the wind environment of comfort level, China “Green Building Evaluation Standards (GBT_50378-2014)” defines the wind speed of 1.5 m height as the comfort, because the height of 2 m is taller than height of most Chinese people, and at the time of outdoor activities there will be a lot of sitting people or children, etc., thus defining the 1.5 m in wind speed should be more suitable. Table 1. Discomfort caused by different wind speed V Wind speed/(m/s) Uncomfortable level 5 Begin to feel ill 10 Clearly unhappy 15 Affects control of walk 20 Danger, action seriously affected

4 Wind Environment Simulation Analysis According to the construction environment of the region, and the wind environment of large area and that of small plot caused by the green building is analyzed, and the analysis of area is located in the Shijingshan district which is the urban area, the terrain roughness according to the Building Seismic Design Code GB50011-2010, which has requirement on the surface value of gradient wind city, the urban index value of class C city with dense buildings is set as 0.22. The analysis boundary meets the boundary setting requirement that the width of the calculated area is 5 times the width of the building and the height is 3 times the height of the building. The analysis results are shown in Fig. 3. Through CFD software, the annual average wind speed at 1.5 m in the new building and the surrounding site was analyzed. As the annual average wind speed in Beijing is relatively low, the annual average wind speed was simulated, and it can be seen that most of the site met the limit of 5 m/s [4]. Figure 4 is the magnification factor analysis diagram of the annual average wind speed. It can be seen from the figure that part of the windward area of block A exceeds 2, and pedestrians may be uncomfortable in this area. Figure 5 is the vector diagram of annual average wind speed. It can be seen from the figure that part of wake is formed in the area near Fushi road viaduct in block P [5]. In the later stage, landscape planting and other methods are adopted to avoid wake hazards. There are many aboveground structures in block J. Vector analysis is carried out separately below.

Building Optimization Based on Wind Environment

189

V(m/s) 3.66 3.43 3.20 2.97 2.75 2.52 2.29 2.06 1.83 1.60 1.37 1.14 0.915 0.686 1.458 0.229 0.000

Fig. 3. Analysis diagram of annual average wind speed and wind environment at 1.5 m in plot J of apple orchard VSR 2.06 1.93 1.80 1.67 1.54 1.41 1.29 1.16 1.03 0.900 0.771 0.643 0.514 0.386 0.257 0.129 0.000

Fig. 4. Magnification diagram of annual mean wind speed at 1.5 m in apple orchard plot V(m/s) 3.66 3.43 3.20 2.97 2.75 2.52 2.29 2.06 1.83 1.60 1.37 1.14 0.915 0.686 0.458 0.229 0.000

Fig. 5. Vector diagram of annual mean wind speed at 1.5 m in apple orchard plot

Due to the influence of wind speed on wind direction and average wind speed in different seasons, the more typical seasons of both winter and summer on the site are analyzed separately. Figure 6 is 1.5 m in the winter wind speed analysis diagram, Figs. 7 and 8 respectively is the winter wind velocity amplification coefficient diagram and wind velocity vector diagram, the change of wind direction and speed of has relatively big effect on its building wind environment, due to the change of wind direction and speed of its building wind environment influence is bigger, because the prevailing wind in winter is north and northwest wind, and the average wind speed is higher, but it has more low-rise buildings around, although the wind speed is high at 1.5 m, but also within the range of 5 m/s, J plot as an angle of the windward side of the

190

Z. Wei et al.

wind in winter construction form, has a strong wind between A and B. As shown in Figs. 9, 10 and 11, the wind speed in summer is relatively soft on the whole, and the amplification factor of wind speed does not exceed the limit [6]. No harmful wake is formed in block P, and the calm area behind block C in block J should be further analyzed. In general, the wind speed basically does not exceed the limit value of 5 m/s, the wind speed amplification factor which has the limit value of greater than 2 also basically meets the requirements, some part of area which does not meet is need for indepth small area plot validation and wake airless area validation [7].

Fig. 6. Analysis diagram of average winter wind speed at 1.5 m apple orchard plot

Fig. 7. Magnification coefficient of wind speed in winter at 1.5 m in apple orchard plot

Building Optimization Based on Wind Environment

191

Fig. 8. Vector diagram of average winter wind speed at 1.5 m in apple orchard plot

VSR 3.08 2.88 2.69 2.50 2.31 2.11 1.92 1.73 1.54 1.35 1.15 0.961 0.769 0.577 0.385 0.192 0.000

Fig. 9. Analysis diagram of summer mean wind speed at 1.5 m in apple orchard plot

VSR 1.95 1.83 1.71 1.58 1.46 1.34 1.22 1.10 0.975 0.853 0.731 0.609 0.488 0.366 0.244 0.122 0.000

Fig. 10. Magnification coefficient of wind speed in summer at 1.5 m in apple orchard plot

V(m/s) 3.08 2.88 2.69 2.50 2.31 2.11 1.92 1.73 1.54 1.35 1.15 0.961 0.769 0.577 0.385 0.192 0.000

Fig. 11. Vector diagram of average summer wind speed at 1.5 m in apple orchard plot

192

Z. Wei et al. V(m/s) 4.97 4.66 4.35 4.04 3.73 3.42 3.11 2.80 2.49 2.18 1.87 1.55 1.24 0.933 0.622 0.311 0.000

Fig. 12. Analysis diagram of annual average wind speed at 1.5 m in block J of apple orchard

VSR 3.13 2.94 2.74 2.54 2.35 2.15 1.96 1.76 1.57 1.37 1.17 0.979 0.783 0.587 0.391 0.196 0.000

Fig. 13. Magnification factor analysis of annual average wind speed at 1.5 m in block J of apple orchard

V(m/s) 4.97 4.66 4.35 4.04 3.73 3.42 3.11 2.80 2.49 2.18 1.87 1.55 1.24 0.933 0.622 0.311 0.000

Fig. 14. Vector analysis of annual average wind speed at 1.5 m in block J of apple orchard

The site plot was analyzed, the wind field was refined, and the building wind pressure was calculated to provide a basis for the calculation of indoor building wind environment in the later stage. Figures 12, 13 and 14 are the plot site architecture analysis diagram of block J. According to the outdoor site environment, problems encountered by the building in a smaller building group and the indexes that affect the comfort level of human body stipulated by the national green building code are analyzed. Figure 12 shows the annual average wind speed of buildings in plot J at 1.5 m. It can be seen from the figure that all sites meet the wind speed requirement of 5 m/s. As can be seen from Fig. 13, the amplification factor of wind speed is relatively large. According to the provisions of the latest “Green Building Evaluation Standard”, its amplification factor is greater than 2, which cannot reach the comfort standard [8]. Figure 14 is the wind speed vector diagram. It can be clearly seen from the figure that some unnecessary eddies are formed due to the unreasonable position of the wind shaft, as well as the unreasonable arrangement of the building height and building form, which increases the harm of the building site [9]. Due to the small site, part of the

Building Optimization Based on Wind Environment

193

eddies cannot be solved by landscape. In addition, it is in the area where people often move, so it may have a big impact. Therefore, pedestrians can only walk around in the environment of strong wind, which is very uncomfortable. Block A is the direction of the main air inlet, but the main entrance of the plan is set in the north direction. It may be considered that the opening on the northward road is convenient for evacuation, but as the main air inlet is directly facing the main entrance of the building, it is easier to form “irrigation hall wind”, which is conducive to natural ventilation and vertical exhaust wind. However, it is not conducive to the wind environment of the lobby on the ground floor and the wind environment comfort of the windward side of the main facade. Its main entrance is placed on the main air outlet, which may not be suitable from point of view of the architectural geomancy. It is recommended to add wind cloak and other facilities in the later period [10].

5 Conclusion With the development of computer technology and more and more attention has given to green building, the wind environmental simulation is no longer the patent of high building, ground wind environment as one of its important comfort index has received attention again, having analysis and providing suggestion to ground wind environment of both completed buildings and to-be-completed buildings is conducive to improve the site wind environment, reduce building energy consumption, and play an important role in improving site comfort on the premise of having no building renovation. Acknowledgments. Research on the Return and Innovation of Traditional Human Settlement Environment Project of Research Center for Sustainable Development of Human Settlement Environment of Shijiazhuang TIEDAO University, Key Research Base of Humanities and Social Sciences of Hebei (SJ2015012).

References 1. Simiu, E., Scanlan, R.H.: Wind Effects on Structures: an Introduction to Wind Engineering, p. 55. A Wiley-Interscience Publication, New York (1978) 2. Liu, L., Xiong, M., Wang, Q., Wang, J.: Electric oven temperature prediction control based on OPC technology. Sci. Technol. Vision (23), 56–57, 89 (2017) 3. Yan, J.: Study on comfort of building wind environment. Eng. Earthquake Resist. Reinforcement Renovation 6, 126–131 (2015) 4. Jiao, Z.: Application research of visual simulation technology in mountain planning of Central Yunnan Plateau. Yunnan University 5 (2014) 5. Ge, S., Fu, B., Xu, X.: A new control method to improve comfort of indoor environment. Comput. Meas. Control 26(9), 67–71 (2018) 6. Du, Y., Li, Z.: Optimization design and simulation of comprehensive environmental protection and energy saving in urban construction. Comput. Simul. 34(7), 174–177 (2017) 7. Ouyang, S., Lu, X.: Study on three dimensional energy saving simulation of public buildings based on BIM technology-taking Yongan high-speed rail station as an example. J. Green Sci. Technol. 10, 191–194 (2016)

194

Z. Wei et al.

8. Zhang, Y., Fu, C., Wang, J., Cao, H.: Zhangjiakou cold area building wind and loss of temperature process simulation and solve. Sci. Technol. Bull. 32(5), 111–115 (2016) 9. Yuncheng, Liu: Intelligent building indoor environment temperature optimal control simulation. Comput. Simul. 34(1), 318–321 (2017) 10. Lv, Y., Guo, L., Cheng, L.: Temperature control of polymerizers based on dynamic matrix control and its simulation. Comput. Simul. 31(7), 198–201, 250 (2014)

Feasibility Study of Zero Trust Security in the Power Industry Fei Hu1,2(&), Wei Liu1, Danni Wang1, and Ran Ran1 1

2

State Grid Liaoning Information and Communication Company, Shenyang 110000, Liaoning, China [email protected] No. 18 Ningbo Road, Heping District, Shenyang, Liaoning, China

Abstract. Electrical safety is not only related to personal safety and national property security, but also related to the stability and development of the industry itself. Ensuring the safety of the power industry and studying how to improve the safety of the power industry has always been crucial. In recent years, zero trust has received widespread attention in terms of security. The strategy of zero-trust security is to not trust anyone. It needs to verify each access request and turn the traditional “pass-and-trust” mode into a new security model that “passes authentication and does not trust”. This is equivalent to Safety added several big locks. This paper studies the feasibility study of zero trust for the power industry from the perspective of economic efficiency and technology realization. The research shows that with the advantages of softwaredefined data center and virtual network function technology, the performance bottleneck and operation and maintenance workload are solved, which makes the feasibility of this research affirmative. At the same time, it is concluded that the micro-isolation technology is a zero-trust security model. Best practice. Keywords: Zero trust security

 Feasibility  Micro-isolation technology

1 Introduction Electricity safety is determined by many factors. For example, in terms of electricity production. Most of the modern power production is highly automated. Many power plants, transmission lines and other electrical equipment constitute a large, complex, intertwined and mutually constrained process network for power production, distribution and distribution. In this process, parts must be balanced and stable at all times, and problems in any one part can lead to catastrophic accidents. In 2003, the 6 kV contact failure of the power plant in Suihua Power Plant caused many people to burn. The accident exposed many problems. For example, the SF6 contact has no SF6 gas pressure alarm function, which cannot be found in the operation after gas leakage. In November 2006, Huizhou Power Supply Bureau. The 500 kV Huizhou station should be unlocked by the operator on duty, and the individual operation will cause mishandling of the 500 kV Donghui B line 5031 switch. The reason for the accident is that the on-duty personnel use the five-proof unlock key to unlock the operation without performing the five-proof simulation operation and not asking the superior. And the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 195–204, 2021. https://doi.org/10.1007/978-3-030-51556-0_29

196

F. Hu et al.

device name, number, and location are not carefully checked during operation, resulting in a broken switch; and so on. These accidents tell us that we need to learn from the accident and work hard to create safer jobs for electric workers. Safety production, the alarm bell is long. Research on power safety has always been a concern, and research has been ongoing, and the corresponding researches results are of course many. In 2017, China’s Anhui Electric Power Construction Second Company declared the “Hualong No. 1 Demonstration Project Wang Yong Operation Team Construction” was awarded the first-level achievement in the safety management of power construction [1]. Mr. Huang Dake, Development Director of Innovation Technology Studio of Gezhouba Power Plant, has long been committed to the maintenance, maintenance, development and development of modern power generation control system-excitation, providing technical support for the safe operation of large generators [2]. In 2018, the national power supply reliability index increased, and the national average power supply reliability rate was 99.82% [3]. Although these studies have helped the development of the power industry, to improve power security. However, the security issues of these non-device technologies, such as personnel operations and management, still cannot be solved well. Therefore, to completely and effectively solve the power security problem, it is necessary to reset the security mode. Zero trust security has attracted much attention as a new security model proposed in recent years. At present, most of the research on zero-trust security stays on the network. For example, Google’s zero-trust enterprise security architecture transformation project [4]. Tianjin Binhai International Airport built a network access control model based on zero-trust security architecture [5]. In August 2018, Huang Liming, general manager of Tencent’s corporate IT department, introduced how Tencent completely and completely zero trust at the 2018 Network Security Ecology Summit, becoming the best practice of China’s first no-border enterprise [6]. In 2018, Jin Qichao and Ren Chao studied the edge computer access security system based on zero trust framework [7]. In October 2017, at the 32nd National Computer Security Academic Exchange Conference, the application of the zero-trust security model in the cloud computing environment was discussed [8]. These zero-trust security applications solve network security problems well. So, can we combine zero trust with power security? The research on zero trust in power is still in a relatively blank situation. The research on power security based on zero trust is a very valuable research. We all know that accidents in the power industry are often linked, which leads to frequent occurrences. Accident. Among the many electric accidents that have been reported, most of the causes of the accidents are related to improper operation and unscheduled accidents. If we can do every step of operation and every time the investigations are repeated and repeatedly verified, then are these catastrophic Can an accident be avoided? In this way, zero-trust power security research is necessary. This paper studies the practical application of zero-trust-based power security from the economic and technical aspects. It is concluded that the practical application of zero-trust security in the power industry is very widely and practical. It can effectively reduce the operator’s operational errors and equipment failures. The embodiment of

Feasibility Study of Zero Trust Security in the Power Industry

197

zero trust in the operation of the workers lies in the effective, intelligent and strict management of the workers’ operations, and does not allow any illegal or unreasonable operations. Its equipment failure is reflected in the long-term, uninterrupted, and visual inspection of all equipment, and will promptly issue an alarm if any abnormality is found.

2 Method 2.1

Zero Trust Security

In 2010, the Forest Research Institute and the National Institute of Standards and Technology (NIST) first proposed the concept of a zero-trust model. Research indicates that the inherent trust in traditional security measures makes companies vulnerable to external and internal attacks. The original concept of the zero-trust model is a data center network [9], that uses micro-separation to implement more granular rules and ultimately limit the lateral movement of the attacker. The zero-trust security model first needs to design from the inside out, first find key data and applications, and then establish a protective boundary between these key applications and data, and use security as the gene of network design. The zero-trust security model has four basic principles: verifying users, verifying devices, restricting access and permissions, and adapting. Anyone accessing any data is not trusted, controlled, and is minimally authorized. Every visit is recorded and made transparent and transparent. To achieve zero trust, you need to do the following: (1) Around the data assets, design a zero-trust model from the inside out to build security protection. (2) Ensure that access to all resources is secure, whether internal or external. (3) All visits are not trusted, they need to be verified, with minimum permissions and strict access control. (4) Check and record all traffic to visualize traffic. Based on the above design ideas, the following design prototypes are proposed: (1) Separate security domains around different data assets. Several MCAP are divided according to different data assets. (2) Parallel peer-to-peer MCAP. Parallel peers are connected to the isolated gateway, and each MCAP corresponds to a network interface. Each access is authenticated and the minimum access is restricted. (3) The core deployment is highly integrated with the isolation gateway. MCAP is connected in parallel to a highly integrated isolated gateway for deep packet inspection and fine-grained access control. (4) Centralized management. (5) Traffic and threats that enable complete network visibility (Fig. 1).

198

F. Hu et al.

System

Isolation Gateway

MCAP

Isolation Gateway

MCAP

MCAP

Fig. 1. Schematic diagram of model design

Centralized management in the model we use white box management - to build a unified security management platform, real-time monitoring of hardware and software configuration, so that the program, configuration and behavior on the device are clear at a glance, in order to find abnormal behavior in time. Visual and transparent management is the basis of the security system. Based on this feature, the management platform is built with the idea of white box management, and the attributes of data asset partitioning, including program, software and hardware configuration, application behavior, file integrity status, and system, are collected. Information such as memory status, visual display, so that the operating state of the device is clear at a glance. Based on this, a knowledge map such as a program reference library, a configuration template, and a behavior rule base is constructed, and the running state of the device is analyzed, and an abnormality is found in time (Fig. 2). 2.2

Data Evaluation Method

In order to measure the accuracy of the prediction implicitly assuming that the sample cost of each wrong classification is the same, two indicators of error rate and accuracy are introduced as a measure of such cost. Error rate (R): The number of wrong classification samples (E) and the total number of samples tested (S) R¼

E S

A¼1R¼

ð1Þ SE S

ð2Þ

Feasibility Study of Zero Trust Security in the Power Industry

199

Fig. 2. White box management framework

Use pos to indicate the number of samples in the real positive example neg The number of samples representing the true negative example, tpos indicates the number of positive samples that are correctly predicted, fpos indicates the number of samples in which the negative case is treated as a positive example tneg indicates the number of negative samples that are correctly predicted, fneg indicates the number of samples in which the positive example is treated as a negative example. Sensitivity: Sensitivity ¼

tpos pos

ð3Þ

200

F. Hu et al.

That is, the proportion that is accurately predicted in the positive example, that is, the recall rate: the calculation method is the same as the sensitivity. Specificity: Specificity ¼

tneg neg

ð4Þ

That is, the proportion of liabilities that are better predicted. Accuracy: Precision ¼

tpos tpos þ fpos

ð5Þ

That is, the proportion of the true positive example in the positive example of the prediction result, that is, the accuracy rate: the same as the accuracy calculation method Positive proportion of error: FalsePositiveRate ¼ 1 

tneg neg

ð6Þ

That is, the ratio of the proportion of the sample that is proportional to the negative proportion to the number of negative samples of the prediction result. Negative negative ratio: FalseNegetiveRate ¼ 1 

tpos pos

ð7Þ

That is, the ratio of the number of samples whose negative proportion is mistakenly proportional to the positive proportion of the predicted result. Finally, Accuracy: A¼

pos neg tpos þ tneg tpos tneg þ ¼   pos þ neg pos pos þ neg neg pos þ neg

ð8Þ

2PR PþR

ð9Þ

F_1 value: F1 ¼

Feasibility Study of Zero Trust Security in the Power Industry

201

The more general form is  1 þ b2 P  R  F1 ¼ b2 P þ R

ð10Þ

Here P refer to the precision rate, R referring to the full rate, b ¼ 1 degenerates to F1; b [ 1 the recall rate has a greater impact; b\1 the precision has a greater impact. Macro-average: Generally used in text classifiers, the index value is first calculated for each class, and then the arithmetic mean is averaged for all classes. The macroaverage indicator is more affected by the small category than the micro-average indicator. Micro-average: Generally used in text classifiers, it is to establish a global confusion matrix for each instance of the data set without category, and then calculate the corresponding indicators. Average Per-class Accuracy: In order to cope with the different number of samples in each category, calculate the accuracy under each category and then calculate their average. Log-loss function: In the classification output, if the output is no longer 0–1, but a real value, that is, the probability of each category, then the classification result can be evaluated using Log  loss. This example of the corresponding belongs to category 0, but the classifier outputs a probability of belonging to category 1 of 0.51, then the situation is considered to be wrong. This probability is close to the boundary probability of the classification of the classifier by 0.5. Log  loss is a soft classification accuracy measure that uses probability to indicate the confidence of the category to which it belongs. The smaller the logarithmic loss function, the better the model.

3 Experiment This experiment established a zero-trust power security model with software-defined data centers and virtual network functional technologies [10]. Data and economic losses of power safety accidents (Table 1) have been collected for nearly 15 years. The data is analyzed and the analysis results are put into the model for simulation.

4 Results The analysis of electrical safety accidents using the constructed mathematical model and the simulation of electric safety accidents under the zero-trust electric safety model for the next seven years show that the rate of electric safety accidents based on zero trust is greatly reduced (Fig. 3).

202

F. Hu et al. Table 1. Data and economic losses of power safety accidents Year 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018

Number of accidents Total economic loss (100 million yuan) 15 4.1 21 5.5 26 6 17 5.3 22 2.7 28 6.8 23 7 20 7.2 19 8.9 27 6.8 30 9 25 6.7 28 12.4 20 9.8 22 8.5

Fig. 3. Line of change in the number of accidents

It can be seen from the figure that the number of accidents obtained in the simulation dropped sharply in 2019. The zero-trust security model provides accurate prediction and protection against known types of incidents.

Feasibility Study of Zero Trust Security in the Power Industry

4.1

203

In Terms of Economic Benefits

Accidents are often accompanied by this economic loss. Through the analysis of the data of the past fifteen years, we find that the loss of electric accidents is only a small number in economic terms. However, by simulating the zero-trust security model, it is found that the economic loss caused by the accident is quite obvious compared with the traditional one (Fig. 4). Moreover, in recent years, there have been more and more researches on zero trust, and more and more directions have been adapted. The zerotrust security level currently studied is completely directly applicable to power security, so the research cost can be greatly increased. Reduced. Moreover, there is a great improvement in power safety and reliability, the accident rate is reduced, and the economic loss caused by the accident is reduced, which makes the development of the power industry move forward more steadily.

Fig. 4. Comparison of economic loss histogram

4.2

In Terms of Technical Feasibility

Most accidents occur as a result of management loopholes. The zero trust security model proposes a new idea of security protection. Micro-isolation technology not only enables power security to implement a zero-trust security model, but is also a best practice for zero-trust security models. Micro-isolation technology can achieve: (1) Design the network from the inside to the outside, and integrate it into the network safely; (2) A more precise minimum authorization strategy; (3) Clearer traffic and threat visualization; (4) Higher performance and expansion; (5) Higher productivity.

204

F. Hu et al.

5 Conclusion Through this experiment, we learned the dangers of accidents in the power industry and the huge economic losses. However, with the development of science and technology, in the future we are entirely possible to achieve a zero accident power industry. The zero-trust security model proposed in this experiment can reduce the occurrence of accidents to a certain extent, and through the research of this experiment, the zero-trust power security model is completely feasible in terms of economic benefits and technical realization. Acknowledgments. This research was supported by Research on Improving Technological Innovation Ability and Mass Innovation (Grant No. 2019YF-65).

References 1. Anhui Power Construction Second Company Wang Yong Operation Class won the firstclass achievement of national power construction safety management. Team Group (8), 83 (2018) 2. Dan, L.: Innovation is not only for the safety of electric power essays - remembers Huang Dake, the honorary expert of Changjiang Electric Power Excitation, and his research results. Straits Technol. Ind. 01, 107 (2015) 3. The national electricity supply is safe and reliable in 2018. China Electric Power News, 2019-06-26 (005) 4. Zuo, Y.: Zero trust architecture: a new paradigm of network security. Financ. Electron. 11, 50–51 (2018) 5. Zhong, X., Guo, W., Ma, Y., Wang, M.: Airport network security protection scheme based on zero trust security architecture. Civ. Aviat. J. 3(3), 114–116 + 107 (2019) 6. Tencent builds a new generation of borderless network security enterprise network. China Inf. Secur. (9), 106 (2018) 7. Qi, Q., Ren, C.: Research on edge computing access security system based on zero trust architecture. Network Secur. Technol. Appl. 12, 26–27 (2018) 8. Rong, W.: Application research of zero trust security model in cloud computing environment. Chinese Computer Society. In: Proceedings of the 32nd National Computer Security Academic Exchange Conference. Chinese Computer Society: Chinese Computer Society Computer Security Professional Committee, 2017:5 9. Xue, Z., Xiang, M.: Research on data center security protection under zero trust security model. Commun. Technol. 50(6), 1290–1294 (2017) 10. Mali, Y.: Application of zero trust security model in central enterprise security management. Electron. World 11, 164–165 (2019)

Construction of Digital Factory Platform Based on Intelligent Manufacturing Ying Kou1, Longfei Zhang2(&), and Liang Zhou1 1

2

School of Mechanical and Aerospace Engineering, Ji Lin University, Changchun, China [email protected], [email protected] School of Mechanical and Vehicle Engineering, Chang Chun University, Changchun, China [email protected]

Abstract. With the continuous development of computer technology and network communication technology, the machinery manufacturing industry is developing in the direction of network, integration and intelligence. In order to improve the level of digital design and manufacturing, improve the production efficiency, and meet the individual needs of the manufacturing industry, the Digital Factory Platform is introduced into the manufacturing industry. Starting from the concept of Digital Factory, this paper analyzes the overall framework of Digital Factory Platform, constructs a Digital Factory Platform based on Intelligent Manufacturing, provides a feasibility basis for enterprises to build Digital Factory, and provides a model for practical teaching. Through the implementation of the platform, it can cultivate Intelligent Manufacturing related talents with multi-disciplinary comprehensive knowledge and skills. Keywords: Intelligent Manufacturing

 Digital Factory

1 Introduction In the tide of new industrial revolution, various countries have promoted the development of advanced manufacturing as a national strategy. Germany proposed “industry 4.0”, the United States proposed “industrial Internet”, and Japan vigorously developed the robot industry, all of which are striving for the leading position in the global manufacturing industry. China’s manufacturing industry is facing many problems, such as limited core technology, unreasonable industrial structure, low technological content, high energy consumption and weak independent innovation ability of enterprises. Therefore, China urgently needs to change from a big manufacturing country to a great power of manufacturing, realize the upgrading of manufacturing industry. Under the background of intelligent manufacturing, carry out relevant functional manufacturing projects, take advantage of this opportunity to transform, overcome disadvantages, finally achieve technological breakthroughs and economic transcendence, continue to move forward along the high-end links [1]. Digital Factory is a new type of production method that simulates, evaluates, and optimizes the entire production process in the computer virtual environment based on © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 205–211, 2021. https://doi.org/10.1007/978-3-030-51556-0_30

206

Y. Kou et al.

the relevant data of the product’s entire life cycle [2]. As a bridge between product design and product manufacturing, the emergence of Digital Factory has injected new vitality into the basic manufacturing. Intelligent Manufacturing is an upgrade based on digital simulation. It is an intelligent activity in the manufacturing process. The concept of Digital Factory is widely used in foreign countries. However, due to the late introduction in China and the difference in development force and application degree, the application of Digital Factory in China is quite different. It can be divided into the following three levels: • The Digital Factory, it is just the introduction of concept, without overall framework, only as the final electronic delivery. The traditional two-dimensional design process is still used, and the data transfer between disciplines is still achieved by the traditional commissioning form. Without a unified data information connection and management platform, the product lifecycle management of data cannot be achieved. • It can correctly view the concept of Digital Factory, and have some parts of the factory framework. There is a relatively complete digital system. In addition to the three-dimensional design software, also use the two-dimensional design software, which can achieve data transfer between some disciplines. However, there is still no unified data information connection and management platform, the product lifecycle management of data cannot be achieved. • There is a relatively complete Digital Factory framework. Starting from the manufacturing process, data can be transferred between various specialties, and the uniqueness and consistency of data can be guaranteed. There have a unified platform manage the information of data, and the product lifecycle management of data can be achieved. At present, most of the domestic digital factories are still in the first and second stages. The framework of Digital Factory is incomplete or seriously lacking. In order to promote the internationalization of the Digital Factory, build a complete Digital Factory framework and apply it into the actual project management and teaching is the problem that should be considered by universities. The platform of Digital Factory based on Intelligent Manufacturing connects the three-dimensional virtual model of intelligent manufacturing equipment with real-time data of Programmable Logic Controller (PLC) through computer network, forming the platform of intelligent manufacturing digital factory combining virtual and real. The constructed resource-sharing intelligent manufacturing digital factory platform can improve the utilization rate of laboratory resources, cultivate high-quality interdisciplinary talents, and provide talent support for intelligent manufacturing.

2 Intelligent Manufacturing Digital Platform Framework The digital platform is an important support for Intelligent Manufacturing, product manufacturing information cannot flow in the networked world without digitalization. The digital platform will run through the product lifecycle, covering the whole process of product planning, design, manufacturing process, prototype, production, debugging

Construction of Digital Factory Platform

207

and service. By building a digital platform, digital design, manufacturing, service, quality control and management are carried out during the product lifecycle, and finally the realization of Intelligent Manufacturing is supported. Build three core systems through the construction of digital platform Fig. 1: core research and development system, core simulation system and core manufacturing system [3].

Fig. 1. Intelligent manufacturing digital platform framework

2.1

Digital Collaborative Research and Development

In the traditional manufacturing, the design process is seriously disconnected from the manufacturing process, which affects the manufacturability, assembly and maintenance of products, resulting in large amount of design changes, long product development cycle, high product manufacturing cost and product quality is difficult to guarantee, even the manufactured products cannot be put in use, resulting in a huge waste of human and material resources [4]. At present, in the stage of product design, most enterprises only use CAD drawings for design and production, some enterprises use 3D software as auxiliary design, but the engineering drawings still use two-dimensional, which leads to greatly reduces design efficiency. Therefore, in order to achieve the digital collaborative research and development, Model-Based-Definition (MBD) technology has become one of the important means. MBD is definition of 3D manufacturing information and 3D design information into the 3D digital model of the product, so that CAD and CAM can achieve a real high degree of integration. It is that the manufacturing process no longer uses 2D drawings [5]. MBD is based on three-dimensional product model, which defines the product design information and manufacturing requirements into the digital model. Through the definition of three-dimensional product manufacturing information and non-geometric information to achieves higher-level design and manufacturing integration. MBD technology realizes a single data source, eliminates the information conflict between the 3D model and 2D drawings in the traditional R & D mode, reduces the amount of data created, stored and tracked, ensures the correct and rapid transfer of product manufacturing information, thereby effectively shorten the product development cycle, reduce repetitive work, improve production efficiency and quality. Using MBD can change the traditional method of product definition, which uses 3D model to describe

208

Y. Kou et al.

geometry information and 2D engineering drawing to define dimension, tolerance and process information. At the same time, MBD uses three-dimensional solid model as the sole basis in the manufacturing process, changes the traditional manufacturing method based on engineering drawings, greatly improves the collaborative efficiency of product design and manufacturing, effectively solves the problems of upstream and downstream business process connection and change, accelerate the product listing [6]. 2.2

Digital Virtual Simulation Factory

Digital virtual simulation factory is a unique perspective of Digital Factory technology in manufacturing planning layer. The digital virtual simulation factory is based on the relevant data of the product lifecycle, and uses virtual simulation technology to simulate, analyze, evaluate, verify and optimize the manufacturing link from factory planning, construction to operation and maintenance, to guide the planning and field improvement. Using virtual simulation technology can deal with complex system which cannot be handled by digital model, and accurately describe the real situation, determine the key factors affecting system operation. Therefore, this technology plays an important role in the planning, design and verification stage of production system. Because of this, digital virtual simulation factory has been widely used in modern manufacturing industry [7]. The digital virtual simulation factory of Intelligent Manufacturing Fig. 2 establishes a real-time data connection between the 3D virtual model of Intelligent Manufacturing equipment and the physical PLC equipment through the computer network, and forms a virtual and practical Intelligent Manufacturing experimental teaching system. The virtual experiment teaching platform of resource sharing intelligent manufacturing can improve the utilization rate of laboratory resources, cultivate high-quality interdisciplinary talents in the new era, and provide talent support for Intelligent Manufacturing [8].

Fig. 2. Digital virtual simulation factory

Construction of Digital Factory Platform

2.3

209

Digital Manufacturing Process Optimization

Digital manufacturing process optimization is a digital manufacturing solution that uses 3D environment to verify manufacturing process. Process optimization can carry out virtual verification of product manufacturing methods at early stage, which can greatly simplify engineering tasks such as verification, optimization and commissioning of complex manufacturing process, thereby ensure higher product quality and accelerating time to market. Process optimization can be used to verify the manufacturing process step by step, simulate assembly process, CNC machining, laser marking, visual inspection and robot working process in the same environment, simulate virtual production line, simulate the real machining process, robot control and PLC logic and so on [9].

3 Platform Construction of Intelligent Manufacturing Digital Factory The platform construction of Digital Factory is divided into two parts: hardware and software. Hardware refers to the hardware equipment in the production process. Software refers to the automatic integrated manufacturing system composed of Product Lifecycle Management (PLM), Enterprise Resource Planning (ERP) and Manufacturing Execution System (MES). The Digital Factory Platform is divided into five layers: enterprise layer, management layer, operation layer, control layer and field layer [10]. 3.1

Software Application of Digital Factory Platform

The Digital Factory Platform is mainly composed of PLM, ERP and MES. • PLM is a management software at the enterprise layer. A set of efficient and complete PLM solutions can establish detailed, intuitive and feasible digital product information, integrate the information of various parameters to find and solve key problems. Control and automate key processes such as delivery production, change control and configuration management. • ERP is a manufacturing system and resource planning software, including production resource planning, quality management, laboratory management, business process management, product data management and transportation management. EPR is an enterprise information management system which integrates material resources, capital resources and information resources for manufacturing. The core management model of a society that thrives in the era of the knowledge economy. • MES is an operation orient management information system between management layer and control layer. MES management from receiving orders, production, process control to product completion, actively collect and monitor the production data generated in the manufacturing process to ensure the application software of product orders. Using MES can effectively shorten the production cycle, improve the equipment utilization and workshop production capacity, improve the response and handling capacity to the abnormal situation on site, shorten the planning cycle, improve the accuracy of the plan, thereby reduce the inventory quantity, continuously improve the quality control process and improve the product quality.

210

3.2

Y. Kou et al.

Hardware Construction of Digital Factory Platform

The Intelligent Manufacturing Digital Factory Platform performs overall layout according to the existing numerical control equipment and added hardware equipment. The framework of the platform is shown in Fig. 3. The system includes CNC machine, robot, Automated Guided Vehicle (AGV), three-dimensional warehouse, sensor, PLC, camera and other hardware equipment. Using intelligent control, network communication, information security, internet of things, etc., integrates internet order, system data analysis, automatic storage of materials, automatic transportation of materials, loading and unloading of CNC machine, finished product assembly and testing. This platform is a typical skill training equipment. It takes robot as the center and equipped with CNC machine. Each workstation can operate independently or coordinate with each other. It is convenient for teaching and training and can also be used for actual processing and production. The equipment adopts a modular design, which has the characteristics of independence, compatibility and portability, the interface of expansion and upgrade is reserved, the equipment is updated and upgraded continuously according to the teaching needs or the students’ curriculum design and other innovative practices.

Fig. 3. Intelligent manufacturing digital factory platform

4 Conclusion This paper interprets the concept of the Digital Factory, analyzes the overall framework of Digital Factory platform, and then builds a Digital Factory Platform based on Intelligent Manufacturing. It provides a feasible basis for enterprises to build Digital Factory and provides a model for engineering training practical teaching. Digital Factory Platform is not an independent system. Integrating the digital platform with PLM, ERP, MES and other systems is the key to its efficient operation, while the development of PLM, ERP, and MES relies on the Digital Factory Platform. This platform can be used as the basic model of the physical information system to lay the foundation for intelligent application and expansion.

Construction of Digital Factory Platform

211

References 1. Ortíz, M.A., Betancourt, L.E., Negrete, K.P., De Felice, F., Petrillo, A.: Dispatching algorithm for production programming of flexible job-shop systems in the smart factory industry. Ann. Oper. Res. 264(1–2), 409–433 (2018) 2. Wuest, T., Weimer, D., Irgens, C., Thoben, K.D.: Machine learning in manufacturing: advantages, challenges, and application. Prod. Manuf. Res. 4(1), 23–45 (2016) 3. Gong, X., Landahl, J., Johannesson, H., Jiao, R.: Simulation-driven manufacturing planning for product-production variety coordination. In: 2017-December IEEE International Conference on Industrial Engineering and Engineering Management, pp. 2039–2043 (2018) 4. Guizzi, G., Miele, D., Santillo, L.C., Romano, E.: New formalism for production systems modeling. In: 25th European Modeling and Simulation Symposium, EMSS 2013, pp. 571– 576 (2013) 5. Guizzi, G., Falcone, D., De Felice, F.: An integrated and parametric simulation model to improve production and maintenance processes: towards a digital factory performance. Comput. Ind. Eng. 137, 106052 (2019) 6. Lee, S., Cho, H., Jung, M.: A conceptual framework for the generation of simulation models from process plans and resource configuration. Int. J. Prod. Res. 38(4), 811–828 (2000) 7. Mertins, K., Rabe, M., Gocev, P.: Integration of factory planning and ERP/MES systems: Adaptive simulation models. In: T. Koch (ed.). Lean Business Systems and Beyond. IFIP – The International Federation for Information Processing. Springer, Boston, MA (2008) 8. Kuehn, W.: Digital twins for decision making in complex production and logistic enterprises. Int. J. Des. Nat. Ecodyn. 13(3), 260–271 (2018) 9. Lu, Z.J., Xiang, Q., Gu, J.: Data driven process modeling and simulation: An applied case study. Simul. Ser. 45(11), 218–222 (2013) 10. Mumtaz, U., Ali, Y., Petrillo, A.: A linear regression approach to evaluate the green supply chain management impact on industrial organizational performance. Sci. Total Environ. 624, 162–169 (2018)

Application of Internet of Things in the Construction of Smart City Ge Guo1(&) and Liang Pang2 1

School of Management, Wuhan Donghu University, Wuhan, China [email protected] 2 School of Economics and Management, Hubei University of Science and Technology, Xianning, China [email protected]

Abstract. Advances in science and technology have promoted the development of traditional cities to smart cities. In the process of urban development, there will inevitably be some problems, such as information security, traffic congestion, single education mode, unreasonable use of medical resources, etc., which all need the support of Internet core technology to reduce the occurrence rate of these problems. The Internet of things technology is through data collection, comparison and analysis, it improves the speed of information processing, shares urban dynamic data, provides more efficient, diverse and flexible urban services, and realizes the most basic goal of smart city construction. Starting from the background of the development of smart city, this paper analyzes the factors influencing the development of smart city and the application of relevant models by scholars at home and abroad, finds out the problems existing in the development process of smart city, puts forward corresponding solutions, and discusses the application strategies of Internet of things technology in the construction of smart city, I hope this research can contribute to he development and construction of smart cities. Keywords: Smart city

 Internet of Things  Application

1 Introduction With the birth of science and technology, it promotes the continuous progress and reform of society. In 2008, IBM first proposed the concept of “smart earth” to integrate smart technology into urban development and accelerate the process of urban intelligence. Since the concept was put forward, many countries have recognized it very much. Therefore, they have successively issued plans and policies in line with their own smart city development, hoping to become the first batch of smart cities, obtain more development opportunities, and improve their international status and influence. China has also poured into this development boom, joined the development and construction of smart city, and used smart technology to achieve a high degree of integration with the city. The development of smart city is inseparable from the support of Internet of things technology, big data technology and cloud computing technology. Among them, the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 212–217, 2021. https://doi.org/10.1007/978-3-030-51556-0_31

Application of Internet of Things

213

Internet of things technology is the expansion of Internet technology, which mainly uses the network to connect, through the exchange and dissemination of objects, so as to achieve the collection, identification and utilization of object positioning, information and environment and other relevant data. This technology is an important foundation for the development of smart cities. As shown in Fig. 1.

Permeability urban development

information Technology

Smart city construction

Loadability Fig. 1. Information technology for the construction of smart city

2 Research Status at Home and Abroad Views of foreign scholars: The research group represented by Caragliu A. conducted research and in-depth analysis of the smart cities under construction in 27 EU countries and concluded that the main factors affecting the development of smart cities are government management and environmental construction, The level of education, and the use of core Internet technologies, this view was proposed to provide a direction for the construction of smart cities. According to Krassimira, in addition to Internet technology, the core of smart cities also includes e-government. The government should formulate strategies for smart city development and guide the development of smart cities [1]. Theodore Patkos believes that certain standards should be used to evaluate the construction and development of smart cities. Specific data should be analyzed and evaluated, and smart city satisfaction should be evaluated to standardize smart cities. Views of domestic scholars: Guo Liqiao (2015) put forward to promote the construction of new urbanization in China intelligently in the article “Introduction to smart city”. Firstly, he proposed to understand the concept of smart city by different subjects such as government, Academy, enterprise, etc., and discussed the operation direction, technology application, city standard, etc. of the development of smart city. Wu Honghui (2017) pointed out that the key to the development of smart cities lies in service transformation in the “General Introduction to Smart City Practice”, and put forward that the construction of smart cities with government agencies as the lead, process mechanisms as guarantee, user experience as the fundamental, and business model as the driving force are implemented. The four major elements required, and a systematic analysis of examples of smart city development models such as the PPP management model, ZTE’s development model, Hechuan model, Qinhuangdao model, and Jining model.

214

G. Guo and L. Pang

3 Problems in Smart City Development 3.1

Cognitive Differences in Smart City Development

After the concept of smart city is put forward, many cities have put forward their construction plans and goals accordingly, but there is a certain gap between the level of urban economic development and the number of corresponding technical talents, which leads to the uneven use of ideas, applications and models of some advanced information technology, so the development speed of some cities is relatively slow. Moreover, due to individual differences, some cities have different development paths. However, in the process of building a smart city, we are used to following a fixed pattern, following a step-by-step approach, without seeking common ground while reserving differences. Therefore, the development stops, only stays at the conceptual stage, without specific implementation of construction standards. 3.2

Development of Smart Cities Lacks Detailed Implementation Routes

Many cities blindly catch up with the trend of smart city, positioning smart city as an engineering construction to improve their political achievements and social status, and failing to deeply understand the connotation and purpose of smart city development. Therefore, no long-term urban development plan has been formulated, and no corresponding measures, policies and regulations for the development of information industry have been issued. Because the management system is not specific and there is no unified standard and technical support, it is difficult for the executors to implement point-to-point, which hinders the rapid development of smart city construction. 3.3

Technological Risks in the Development of Smart City

The Internet of things is an important technical support for the construction of smart city, with the characteristics of sensor intelligence, mobile distribution, high connectivity, wide application coverage, etc. Although it can be used as a link between things and people, it is also easy to cause technical risks, mainly reflected in three aspects: perception, network and application. First of all, it is the perception risk, which is mainly reflected in the risk of RFID technology. It is to put the coding chip into the goods to facilitate people to obtain the information of the goods, including the user’s identity and other private information. Once the RFID tag equipment can not distinguish the legality of the instructions, it will disclose the user’s privacy, resulting in the information being copied, forged, tampered with or even destroyed, in the intelligent In the transportation system, if there is a purposeful intrusion of remote control equipment, it will lead to the overall collapse of urban traffic [2]. Secondly, network technology risk. The Internet of things is transmitted and interacted through the network, and the transmission channel of the network is open, so it is easy to be interfered and damaged. If the illegal person interferes with the wireless signal, the information cannot be transmitted, or intentionally transmits huge garbage data, it will affect social stability [3].

Application of Internet of Things

215

Finally, the Internet of things technology is still used in the high-frequency field as an international standard, which needs to pay a certain amount of patent fees and improve the construction cost, so that the construction and development of China’s smart city is in a relatively passive position, which is not conducive to the promotion and application of Internet of things technology [4]. 3.4

Lack of Technical Innovation Talents for Smart City Development

China’s smart city construction started late, and related senior technical talents are particularly scarce. Especially the comprehensive talents with technical understanding of management are scarce. Therefore, the organic combination of management information systems with government and city management and operations has been affected, which has affected Operational efficiency and quality of the information platform. 3.5

Increased Financial Pressure on Smart City Development

In the development plans of smart cities in various places, the investment scale is between 500 billion and 100 billion, but the fiscal revenue of local governments has slowed down, and expenditure has increased, resulting in tight financial resources. Therefore, to solve the above problems, we must start from the following aspects. First, long-term planning can be formulated, and the state can issue guiding policies, unite various departments, unify standards for smart city development, and strengthen management and supervision; second, require common ground while reserving differences, and choose different wisdom according to different development stages of each city Urban development models and paths; Third, increase efforts to train hightech and management-composite talents, develop core technologies that can be controlled independently, and use them in products to strengthen information security and create information security integrated with smart cities’ environment and reduce costs. In general, the construction of smart city can not be separated from the guidance of the government. Through the use of Internet of things and other core technologies, the transformation from industrial society to information society, the transformation from artificial to intelligent, the promotion of urban development and the creation of a better social environment can be realized.

4 Steady Development of Smart City Under the Internet of Things 4.1

Intelligent Security

Urban security management is very important for urban construction. Internet of things technology can make the city more secure and conduct real-time supervision on the city. For example, the government departments can use the Internet of things technology to quickly feed back some illegal behaviors in cities, and transfer information to the regulatory platform, so that the platform can analyze and process valuable

216

G. Guo and L. Pang

information. From a more specific point of view, each city has installed monitors [5]. Through the security technology of the Internet of things, you can quickly know the location of the case, and through the monitoring and playback of the scene of the case, you can deal with the case more efficiently, so as to ensure the safety of people’s life and property [6]. 4.2

Intelligent Transportation

Traffic congestion is mainly caused by the backwardness of the urban transportation system, and orderly traffic is the foundation and key to urban development, which can reduce traffic congestion, traffic accidents and environmental pollution. The application of the Internet of Things technology can monitor multiple traffic conditions in real time, quickly integrate traffic conditions, make vehicles travel in an orderly manner, and reduce traffic congestion pressure. For example, if there is a congested road, you can use multi-navigation or the display screen of each road to remind the driver to bypass the road, miss the peak congestion, and achieve traffic diversion and dredging. When using high-speed toll roads, the ETC charging device that binds the owner’s bank account can reduce. The time for vehicles to pass through the checkpoints; in the face of traffic violations, through the cameras to improve traffic accident handling efficiency [7]. 4.3

Intelligent Medical

Through the Internet of Things technology, the medical system can be improved, the medical treatment of the people is difficult, the sharing of medical resources is achieved, and the waste of medical resources is reduced. In addition, intelligent medical treatment under the Internet of Things technology can monitor the patient’s body in real time, track the patient’s diagnosis and treatment, and achieve the accuracy and transparency of medical diagnosis [8]. 4.4

Intelligent Education

Like intelligent medical treatment, the Internet of Things technology can realize the sharing of educational resources. It can broaden the learning methods and ideas of students through online teaching, online libraries, and digital teaching materials, so that students have more ways and opportunities to learn. Improve the educational environment and make teaching methods flexible and diverse [9]. 4.5

Intelligent Life

Today’s urban life is fast and the working hours are constantly increasing, so it is necessary to improve the convenience of life and save time and cost. The intelligent life under the Internet of Things technology has brought various lifestyles to residents. For example, through relevant monitoring of residential air quality, temperature and humidity, combined with individual living preferences, intelligently adjust relevant data to improve the comfort of life. In addition, we can automatically settle living expenses such as electricity and water bills through smart apps to change the traditional lifestyle [10].

Application of Internet of Things

217

To sum up, smart cities are the way forward for urban development. With the continuous innovation of technology, such as online and offline payment, face payment, online booking, and supermarket self-scanning, etc., it has pushed us to continue to become smart. The city moves forward. The development of China’s smart cities is in its infancy. It needs the support of the Internet of Things technology to integrate it with urban construction, thereby improving our living environment and lifestyle, making urban construction information-oriented, intelligent, and scientific, and promoting the urban economy. Rapid development and improve the competitiveness of cities. Acknowledgment. This work was supported by the grants from Hubei Provincial Collaborative Innovation Centre of Agricultural E-Commerce (Wuhan Donghu university research [2019] No. 17 Document).

References 1. Kumar, S., Tiwari, P., Zymbler, M.: Internet of Things is a revolutionary approach for future technology enhancement: a review. South Ural State University 6(5), 26–33 (2019) 2. Hwang, L.-C., Chen, C.-S., Ku, T.-T., Shyu, W.-C.: A bridge between the smart grid and the Internet of Things: theoretical and practical roles of LoRa. Int. J. Electr. Power and Energy Syst., I-Shou University 113, 971–981 (2019) 3. Camero, A., Alba, E.: Smart City and information technology: A review. Cities, Universidad de Málaga 93, 84–94 (2019) 4. Calderoni, L., Magnani, A., Maio, D.: IoT Manager: an open-source IoT framework for smart cities. J. Syst. Archit. University of Bologna 98, 413–423 (2019) 5. Eirinaki, M.: Editorial for Special Issue on “Big Data and Smart Cities”, Big Data Research, San Jose State University, vol. 17, pp. 33–34 (2019) 6. Din, I.U., Guizani, M., Rodrigues, J.J.P.C., Hassan, S., Korotaev, V.V.: Machine learning in the Internet of Things: designed techniques for smart cities. Future Gener. Comput. Syst., University of Haripur, Pakistan 100, 826–843 (2019) 7. Coconea, L., Bellini, E.: Advanced Traffic Management Systems supporting resilient smart cities. Transp. Res. Procedia, University of Florence 41, 556–558 (2019) 8. Ghani, A.: Healthcare electronics—a step closer to future smart cities. ICT Express, Coventry Univ. 5(4), 256–260 (2019) 9. Wataya, E., Shaw, R.: Measuring the value and the role of soft assets in smart city development. Keio Univ. 94, 106–115 (2019) 10. Mouton, M., Ducey, A., Green, J., Hardcastle, L., Hoffman, S., Leslie, M., Rock, M.: Towards ‘smart cities’ as ‘healthy cities’: health equity in a digital age. Can. J. Public Health 110(3), 331–334 (2019)

Adaptive Modeling Algorithm in Distributed Aircraft Intelligent Control System Zhang Jinhe1, Sun Shujian2(&), Hong Tao3, and Du Bin3 1

3

Institute of Advanced Technology, Zhejiang University, Hangzhou 310027, China [email protected] 2 School of Aeronautics and Astronautics, Zhejiang University, Hangzhou 310027, China [email protected] Laboratory of Spacecraft In-Orbit Fault Diagnosis and Maintenance, Xi’an 710043, China [email protected], [email protected]

Abstract. In this paper, based on the traditional routing protocol OLSR, a dynamic adaptive routing protocol FA-OLSR is proposed, which can sense the change of formation configuration. It mainly judges the change degree of formation configuration of distributed aircraft by detecting the state change rate of neighbor nodes, and then adjusts the routing policy according to the change degree. In the routing strategy aiming at the drastic change of formation configuration, this paper proposes a MPR selection algorithm based on the longest connection time, improves the original greedy MPR selection algorithm of OLSR protocol, reduces the selection frequency of relay nodes, in order to maintain the stability of the network, reduce the packet loss rate of the network, and ensure the end-to-end real-time and reliable communication. Keywords: Distributed intelligent aircraft Adaptive  Routing protocol

 Wireless ad hoc network 

1 Introduction The outstanding characteristics of distributed aircraft are “space distribution” and “clustering”. The large space distribution area can make the formation system have “long observation baseline” and “large space perspective” which the traditional aircraft does not have, so as to improve the function [1]; while “clustering” on the one hand improves the space viability, on the other hand, through the distribution of a large number of aircraft It improves the extensiveness, continuity and stability of the information support and support of the whole system; another important feature of distributed aircraft is the “cooperation” of the work [2, 3]. Only by forming a cluster of multiple aircraft in close cooperation, can a unified system be formed, thus greatly improving the overall performance of the system, surpassing the traditional single aircraft. One of the most important foundations of the cooperation is to build a distributed aircraft network with strong communication ability and information perception © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 218–223, 2021. https://doi.org/10.1007/978-3-030-51556-0_32

Adaptive Modeling Algorithm in Distributed Aircraft

219

ability to achieve efficient data transmission and information sharing. However, at present, the networking of distributed aircrafts is faced with many challenges, such as high-speed movement of aircrafts, unstable network configuration, diverse scenes, and limited spectrum resources and processing capacity on the platform, which brings difficulties for the realization of effective cooperative formation flight of clusters or star clusters. Especially with the increase of task types and the complexity of work scenarios, how to achieve efficient cooperative work of distributed aircrafts and build an adaptive network with excellent performance to meet the needs of different scenarios is an important problem to be solved [4, 5]. In order to meet the networking requirements of the distributed aircraft, this paper proposes to design an adaptive routing protocol based on different scenarios, so that it can realize environment-based cognition and prediction, adjust its own routing strategy adaptively, so as to adapt to different scenarios well, improve the robustness and antiinterference ability of the network, and extend the survival time of the network, so as to integrate the space and space networks in the future the deployment and performance improvement of provides technical support. Based on the classic OLSR protocol, this paper proposes a dynamic adaptive routing method (formation aware optimized link state) which can sense the formation configuration changes Routing, FA-OLSR) is mainly to design a formation configuration sensing method based on the state change of adjacent nodes, so that the distributed aircraft can adaptively identify the change of formation configuration, so as to adjust the routing strategy and ensure the performance of the network is not affected. At the same time, this paper improves the MPR in OLSR protocol in view of the dramatic change of formation configuration. In order to reduce the selection frequency of relay nodes, maintain the stability of the network and extend its lifetime, a method of MPR selection based on the longest connection time is proposed. The FA-OLSR protocol will be described in detail below.

2 Protocol Overview The main idea of this protocol is: during the process of distributed aircraft formation, the nodes in the formation periodically check the link state change rate of a hop neighbor node in their neighbor table, and judge the formation according to the range of this value The configuration changes, adjust the sending cycle of routing control packets, and choose different routing strategies to maintain the network topology and ensure the QoS performance of the network. The routing strategy library contains two types of routing strategies, namely formation stable routing strategy and formation highly dynamic routing strategy. The formation stable routing strategy is a routing strategy used when the topological configuration of the distributed aircraft network does not change much. In this paper, the classic OLSR protocol is used as its path finding method. In addition, the sending cycle and chain of control packets are increased. The retention time of road entries is to ensure the quality of business services while reducing unnecessary control overhead and reducing energy consumption. The formation of a highly dynamic routing strategy is when the topology of the distributed aircraft network changes drastically. The routing strategy used in this paper is to

220

Z. Jinhe et al.

optimize its MPR selection method based on the OLSR protocol. This paper proposes a MPR selection method based on the longest connection time. This method helps reduce the frequency of changes in the MPR set of nodes. Sending extra routing control packets reduces the overhead of the network, which helps to maintain the stability of the distributed aircraft network and prolong the lifetime of the network when the topology changes rapidly. Figures 1 and 2 are schematic diagrams of formation stable scenarios and formation highly dynamic scenarios.

Fig. 1. Formation-stable scenario

Fig. 2. Formation highly dynamic scene

3 Formation Configuration Sensing Method Based on Neighboring Node Link State Changes When a distributed aircraft is operating in a highly maneuverable scenario, to ensure the stability and reliability of routing, aircraft nodes need to form a mechanism that can sense changes in formation configuration and adjust routing strategies in a timely manner to ensure that network performance is not affected. Therefore, based on the OLSR protocol, this paper designs a formation configuration awareness method based on changes in the link status of neighboring nodes, and uses the status information of neighboring nodes periodically updated in the protocol to calculate its state change over time. And then adjust the routing policy accordingly. This method does not need to transmit information across layers or support of additional hardware functions, but directly uses the link state information in the node’s local link information for calculation.

4 Simulation of Formation Adaptive Dynamic Routing Protocol 4.1

Simulation Design of FA-OLSR Protocol

This article uses network simulation software OPNET14.5 to implement FA-OLSR. Here, the entire simulation idea is introduced in conjunction with the main design flow of the routing protocol and the simulation mechanism of OPNET. As shown in Fig. 3, for the design and simulation of the FA-OLSR protocol, the establishment and

Adaptive Modeling Algorithm in Distributed Aircraft

221

operation of the entire protocol needs to be clarified first. The protocol has three core processes: one is the formation configuration perception based on the state changes of neighboring nodes; The interaction of routing control packets and the change of the sending cycle; the third is the switching of routing policies (mainly the switching of MPR selection methods). After clarifying the design process of the protocol, it began to use OPNET to simulate its modeling-from the process model to the network model, one by one according to their corresponding requirements, and finally completed the simulation, collected the results, and performed statistical analysis.

Fig. 3. FA-OLSR simulation design ideas

4.2

Network Domain Modeling and Parameter Configuration of FA-OLSR Protocol

In order to verify the feasibility and adaptability of the FA-OLSR protocol in highly dynamic scenarios, this section configures the parameters of its network model as follows: As shown in the parameters in Table 1, 30 aircraft nodes are placed in the network model, covering a square area of 1000 km * 1000 km. The one-hop transmission range of the node is 200 km, the flight speed of the node changes from Mach 0.25 to Mach 4, the length of the data packet is 1000 bit, and the transmission frequency changes from 5 packets per second to 20 packets per second. The service transmission rate is 2 megabits per second. Table 1. Parameter configuration table of FA-OLSR protocol network model Distribution area Node communication distance (km) Number of nodes (number) Node flying speed (m/s) Data packet length (bit) Packet sending frequency (packets/s) Access system Service transmission rate (Mbps)

1000 * 1000 200 30 85–1360 1000 5–20 Competition Strategy (ALOHA) 2

222

Z. Jinhe et al.

The one-hop transmission range of a node is set using OPNET’s own RX Group Config module. In its receiver parameter options, Distance Threshold can be used to set the reception range. The configuration of this part is shown in Fig. 4:

Fig. 4. Setting of one hop transmission range

Based on the above design ideas and related configurations, the simulation model of the entire network is shown in Fig. 5:

Fig. 5. FA-OLSR protocol network scenario

4.3

Fig. 6. Schematic diagram of FA-OLSR protocol node model

Node-Domain Modeling of FA-OLSR Protocol

The node model used in the simulation is shown in Fig. 6: The modules from left to right and top to bottom in Fig. 6 are the application layer statistics module statistic, the application layer send packet module source, the routing protocol module route, the MAC layer module mac, the physical layer receiver module rx, and the physical layer transmission Machine module tx. The functions of each module in the node model are as follows: Among them, the statistic module is responsible for collecting statistics and destroying data packets, the source module is responsible for

Adaptive Modeling Algorithm in Distributed Aircraft

223

generating corresponding data packets in the format and rate set by the simulation, the route module completes the routing function, runs the FA_OLSR protocol, mac. The module mainly handles the access process and is used to control the access of wireless media, including conflict detection, channel and communication resource allocation, etc. The tx and rx modules are the transmitter and receiver, respectively, and are implemented through the pipeline model to complete the wireless signal. Send and receive. At the same time, FA-OLSR added a mobility module. This is because the mobile model that comes with OPNET is not suitable for the setting of high dynamic scenarios. Therefore, this article defines the mobile model of each node programmatically and places it in the node model mobility module to better fit the simulation needs. The various modules in Fig. 6 are connected via different connection lines. The dashed line of the queue module pointing to the mac module indicates the statistics line, which is used to monitor the busy status of the link. The remaining solid lines are packet flow lines for characterization the flow of packets.

5 Conclusions This chapter mainly focuses on the adaptive routing protocol suitable for high mobility scenarios. Based on the classic OLSR protocol, this paper proposes a formation-aware dynamic adaptive routing protocol FA-OLSR. Specifically: using a formation configuration sensing method based on changes in the state of neighboring nodes to enable distributed aircraft to adaptively identify changes in formation configuration, thereby adjusting routing strategies to ensure that network performance is not affected; Scenarios with drastic changes in formation have improved the MPR selection algorithm in the OLSR protocol, and proposed an MPR selection method based on the longest connection time in order to reduce the frequency of change in the set of relay nodes and improve network stability. Finally, the OPNET simulation platform is used to perform simulation verification and comparative analysis of the two protocols FA-OLSR and Predictive-OLSR. The results show that the FA-OLSR protocol’s overall network performance is better than Predictive when dealing with high-mobility scenarios where the network configuration is indefinite. OLSR protocol has better adaptability.

References 1. Vladimirova, T., Wu, X., Bridges, C.P.: Development of a satellite sensor network for future space missions. Aerospace Conference, IEEE, pp. 1–10 (2008) 2. Ravandoor, K., Drentschew, M., Schmidt, M., et al.: Orbit and drift analysis for swarms of picosatellites. Space World Conference (2010) 3. Schilling K.: Earth observation by distributed networks of small satellites. In: International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering. IEEE, pp. 1–3 (2010) 4. Cheng, C.M., Hsiao, P.H., Kung, H.T., et al.: Maximizing throughput of UAV-relaying networks with the load-carry-and-deliver paradigm. In: IEEE Wireless Communications and Networking Conference. IEEE Computer Society, pp. 4417–4424 (2007) 5. Jong De, E.: Flexible data-centric UAV platform eases mission adaptation. http://www.rti. corn/whitepapers/RTI-Data-Driven-Approach-to-UAV.pdf (2013)

Adaptive Control of Wind Power System Based on TMS320 Zenghui Guo(&) SPIC Guangxi Electric Power Company Limited Guilin Branch, Guilin, China [email protected]

Abstract. A new MPPT control method is proposed for the characteristics of uncertainty and multi-interference in complex multivariable nonlinear systems of wind turbines. The model reference adaptive (M melting snake) method The generator is controlled under the condition that the wind speed changes, be able to let the wind-driven machine acquire the maximum wind energy source, and the maximum power point tracking control is implemented. A set of wind power system based on TMS320U, 407A and TMS320VC33 dual DF is designed. Through experiments, it is concluded that the control strategy can suppress the oscillation more effectively and achieve the steady state faster, reach the steady state faster, improve the efficiency and quality of wind energy conversion to power energy system, and implement the variable-speed constant-frequency double-fed wind generator well MPPT control. Keywords: Power generation system

 Model reference adaptive control  Inspection

1 Introduction Many are developing clean energy at the fastest speed, especially wind energy, because it is a green energy without any harm to the environment. The development speed is getting faster and faster, and it is welcomed by all countries. It has the characteristics of environmental friendliness, mature technology, and global feasibility. To more and more widely used [1]. The constant speed and constant frequency generator has some disadvantages, the need of reactive power compensation device, uncontrollable output power, high requirements of blade characteristics, etc., which has become a serious obstacle to the capacity and scale of grid connected wind farms, Since 2000, the main harvest of VSCF technology is to achieve maximum wind energy capture, improve output power, reduce mechanical stress and torque ripple [2]. The wind turbine system is a nonlinear and unstable complex system. The system is uncertain and the model is difficult to establish. The research object of adaptive control is such a system with uncertainty, which can reduce the influence of uncertainty on the system by modifying the parameters of the controller [3]. This paper proposes adopting model reference adaptive control method (MRAC) to perform MPPT control of variable-speed constant-frequency wind power generation systems. Finally, experimental research is performed on an experimental platform. The experimental results show that the strategy can achieve MPPT. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 224–230, 2021. https://doi.org/10.1007/978-3-030-51556-0_33

Adaptive Control of Wind Power System Based on TMS320

225

2 Inspection System Composition Voltage-type AC-DC-AC doubly-fed wind power system based on double DSP [4]. The whole system consists of 5 parts: double-fed generator, voltage-type AC-DC-AC bi-directional PWM inverter, dual DSP controller, grid-connected protection device and DC motor. This experimental system uses TI’s TMS320LF2407A fixed-point DSP and TMS320VC33 floating-point DSP to form the control core. Among them, LF2407A is mainly responsible for data exchange with peripherals, PWM signals, and generation of decoupling signals from the grid. VC33 is mainly used to implement core algorithms. The data sharing and timing coordination between the dual DSP processors are completed by the dual-port RAM through interrupts. This can ensure the real-time control of the control. The voltage type AC-DC-AC Dual PWM inverter consists of two back-to-back three-phase rectifiers/inverters, and the two are connected by a DC bus with capacitive filtering. The power device uses an IPM module. The three-phase inductor be linked together the power grid, and the other side be linked together the rotor windings of the doubly-fed generator through slip rings and brushes.

3 MRAC Adaptive Controller Design This paper designs a model reference adaptive controller. Figure 1 is the system control block diagram, according to the characteristics of the system, the control variable can be modularized to divide the whole system into several functional modules, and each part of the module is relatively independent. The part of the lookup table is the curve relationship between the aerodynamic torque Ta calculated in the light of the best tip ratio speed and the expected generator speed xgd [5, 9]. Z Ta ¼ K1 0

t

ðxt 

xg xg Þds þ K2 ðxt  Þ þ K3 ðxg  xd Þ n n

Fig. 1. System control flow char

226

Z. Guo

Because both the wind wheel and the generator have inertia, when the wind speed changes, they cannot immediately keep up with the change, so the reference model can be taken as ~ ¼ axgm þ axgd x ~ þ aðxg  xgd Þ ¼ x Formula, u ¼ K   K; K ¼

 Ks n

; Bns ; aJs

1 T u W0 Jg

ð1Þ ð2Þ



Zt xg xg W ¼ ½ ðxt  Þds; xt  ; xg  xgd  n n

ð3Þ

0

Define the output error as e ¼ xg  xgm

ð4Þ

~g  x ~ gm e ¼ x

ð5Þ

Derivation on both sides has

Subtract formula (1) from formula (2) and substitute formula (4) into e þ ae ¼

1 uTW0 Je

ð6Þ

Because the wind speed is a very uncertain input, it is constantly changing. In order to slow down the drastic changes in the controller parameters caused by the drastic changes in the output error, a new error signal can be defined as [6]. e¼e

ee2 aþs

ð7Þ

Steady state e¼

ae a þ e2

ð8Þ

When 0 < e < 1, e  e, so limiting the control amount to the low frequency range can improve the robustness of the system.

Adaptive Control of Wind Power System Based on TMS320

227

Take the Lyapurov function as V¼

e2 uT C1 u þ 2Je 2

ð9Þ

Derivative of V 1 V_ ¼ ae2  e2 e2 þ ðeuT W þ uT C1 uÞ Je

ð10Þ

It is desirable to make ore 6 0 euT W þ uT C1 u ¼ 0

ð11Þ

From this we can conclude that the adaptive law is Zt Kðe; tÞ ¼

ðeCWÞds þ K0

ð12Þ

0

The controller designed according to Lyapurov’s method should ensure global stability, and Eq. (10) is always less than zero near the equilibrium point, so the entire process is asymptotically stable. When lim eðtÞ ¼ 0, K becomes a constant matrix, and the convergence is examt!1

ined for the existence of lim eu ¼ 0. At this time, each element in the w vector is t!1

linearly independent, so it can converge to k.

4 Fast Incremental Adaptive MPPT Control Strategy In the process of wind power generation, two situations are encountered, one is where the wind speed is relatively stable, and the other is where the wind speed fluctuates greatly. Due to the variability of wind energy, these disturbances also lead to aerodynamic torque oscillations [6, 7]. In order to make the optimal speed control algorithm adapt to the two situations in the same instant, when the wind speed fluctuates greatly, it can have a large speed disturbance, speed up the MMPT speed, and reduce the impact on the wind turbine when the wind speed fluctuation is small. The disturbance of rotational speed makes the wind turbine’s rotational speed tend to be stable. Here, the MPPT control method with adaptive rotational speed disturbance is proposed. When the control cycle interval is n − 1 and n, the output power P of the generator and the angular velocity x of the generator are sampled to calculate the slope of the wind turbine power to the angular velocity.

228

Z. Guo

dPT PT ðnÞ  PT ðn  1Þ ðnÞ ¼ xr ðnÞ  xr ðn  1Þ dxr

ð13Þ

Among them, the wind turbine power calculation formula is PT ¼ Te xr

ð14Þ

The wind turbine angular velocity increment with maximum wind energy tracking control is [8]. Dx ¼ KMPPT

dPT dxr

ð15Þ

Perturb the command value of the windmill speed control with a certain speed disturbance value Dx, then observe the change in windmill power, and automatically look for the optimum speed point of the electric generator by virtue of MRAC automatically searches for the optimum speed of the electric generator and realizes maximum power tracking (MPPT) control. When the power of the fan is gradually increased, dPT =dxr  0, and thus Dx > 0: This moment, Wind turbine speed is gradually increased with the increase of the fan power in steps of Dx; when the power of the fan is gradually decreased Hours, dPT =dxr  0, so Dx 6 0, this moment the speed of the wind turbine decreases gradually with the step size Dx as the fan power decreases. In order to prevent overflow in the calculation of the processor in the actual system, it should be that reduced properly appropriately turn down the lower limit of the speed disturbance. In this way, the speed disturbance value will be limited between its upper limit value and the lower limit value. During each MPPT control cycle, the disturbance value of fan speed will change the fan speed. The speed of the wind turbine is always different in the two control cycles. When the speed of natural wind for generator power changes rapidly, a larger angular velocity disturbance can be obtained, a smaller angular velocity disturbance can be obtained, so that the wind turbine is stable. There is a relatively stable speed under the wind speed.

5 Experimental Results Double-fed generator rated power is 2.5 kW; rated voltage is 380 V; power frequency is 50 Hz; 4-pole double-fed generator; stator and rotor leakage inductance is 0.005974 H; mutual inductance is 0.2037 H; rotor resistance is 1.083; stator resistance is 1.115; Apply 10 N  m drag torque to the generator. The rotating speed of the three impellers of the wind turbine will change with the speed of the wind. The control system uses a dual DSP control structure. Figure 2 shows the waveform of the system’s progressive wind speed. The progressive wind speed starts to work at zero. The generator’s rotational speed rises slowly in the initial 3.2 s.

Adaptive Control of Wind Power System Based on TMS320

229

Fig. 2. Rotor speed and output power under progressive wind a. Rotor speed curve; b. Output power curve

With the effect of wind speed, the generator speed starts to rise rapidly at 3.2 s, and the power starts to increase rapidly. At 4.2 s, the generator speed and output power basically track the wind speed, and the generator speed follows the wind speed change. The purpose of tracking wind energy is achieved. In the power curve, the dashed line is the maximum wind energy that the wind turbine can capture, and the solid line is the actual captured power. From the power curve, it can be seen that the model reference adaptive control algorithm can capture the maximum wind energy well. There is a lag on the uphill slope, the main reason is that the system has a relatively large inertia; the output power of the generator on the downhill slope slightly exceeds the wind turbine can obtain the maximum efficiency of converting into electric energy, which is because the energy stored by the wind turbine on the uphill slope The reason is released during the descent. Figure 3 shows the waveform of the system under cyclic wind. The wind conversion period is 150 s, and the amplitude of the wind speed conversion is 3–12 m/s. From here, we can see from the speed waveform that the generator speed fluctuates

Fig. 3. Rotor rotational speed and output power under the action of periodic wind a. Rotor rotational speed curve; b. Output power curve

230

Z. Guo

greatly, mainly due to The speed disturbance is constantly adjusted, the speed curve always produces a hysteresis on the upwind slope of the gust, and the wind power system has too much inertia. However, the entire speed curve can be seen that the system can follow the change of wind speed well and can track the maximum Wind energy. It can be seen that the algorithm of optimal speed control and maximum wind energy tracking proposed in this paper can well follow the change of wind speed.

6 Conclusion The research difficulties and hot spots in the field of wind power generation focus on the large-scale wind turbine, the advanced control strategy and optimization technology of wind turbine. Aiming at the maximum power point tracking control strategy of VSCF wind power generation system, a model reference adaptive controller is designed, and a set of voltage type AC-DC VSCF doubly fed wind power generation system based on Dual DSP is designed. In the future, the soft sensing model of effective wind speed will be calibrated online and applied. Because the dynamic characteristics of wind turbine are affected by many factors, with the passage of time and the change of working environment, the characteristics of wind turbine will change. Therefore, the corresponding soft measurement model correction measures must be taken.

References 1. Ye, H.: Control Technology of Wind Turbine. Mechanical Industry Press, Beijing (2002) 2. Liu, Q., He, Y., Zhao, R.: Maximum wind energy tracking control of variable-speed constantfrequency wind power generation system. Autom. Electr. Power Syst. 27(20), 62–67 (2003) 3. Muller, S., Deicke, M., De Doncker, R.W.: Doubly fed induction generator systems for wind turbines. IEEE Ind. Appl. Mag. 8(3), 26–33 (2002) 4. Chen, B.: Electric drag automatic control system. Mechanical Industry Press, Beijing (2003) 5. Liao, Y., Yang, S.: Excitation control of ac excited generator. Chin. J. Electr. Eng. 18(2), 87– 90 (1998) 6. Zhang, X., Xu, D., Lu, Y., et al.: Adaptive fuzzy control of large-scale variable-speed wind turbine. J. Syst. Simul. 16(3), 573–577 (2004) 7. Liang, Z., Shao, C., Peng, B.: Adaptive output feedback control strategy of RBFNN in wind power system. J. Shenyang Univ. Technol. 29(2), 213–217 (2007) 8. Song, Y.D., Dhinakaran, B., Bao, X.Y.: Variable speed control. J. Wind Eng. Ind. Aerodyn. 85, 293–308 (2000) 9. Wang, J., Chen, Y., Xue, K.: Aeroelastic response of coupled rotor/nacelle/tower of wind turbine. J. Tsinghua Univ. (Nat. Sci. Ed.) 42(2), 211–215 (2002)

The Zynq-7000 SoC on UltraScale Architecture Zhiwei Tang(&) The Third Research Institute of Ministry of the Public Security, Shanghai, China [email protected]

Abstract. The Zynq®-7000 SoC family integrates the software programmability of an ARM®-based processor with the hardware programmability of an FPGA, enabling key analytics and hardware acceleration while integrating CPU, DSP, ASSP, and mixed signal functionality on a single device. Consisting of single-core Zynq-7000S and dual-core Zynq-7000 devices, the Zynq-7000 family is the best price to performance-per-watt, fully scalable SoC platform for your unique application requirements. Keywords: Xilinx

 UltraScale  Zynq

1 Introduction The Zynq®-7000 All Programmable SoC redefines possibilities for embedded systems, giving system architects and software developers a flexible platform to launch new solutions, while providing traditional ASIC and SoC users a fully programmable alternative. ARM® Cortex™-A9 processors, integrated with the industry’s leading performance-per-watt 28 nm programmable logic, achieve power and performance levels exceeding that of discrete processor and FPGA systems. Available in dualcore (Zynq-7000 devices) and single-core (Zynq-7000S devices) Cortex-A9 configurations, the Zynq-7000 family boasts the best price to performance-per-watt in its class, making it the best option for a wide range of embedded applications, including small cell base stations, multicamera drivers assistance systems, machine vision for industrial automation, medical endoscopy, and 4K2K Ultra-HDTV.

2 Kintex UltraScale Kintex® UltraScale™ devices provide the best price/performance/watt at 20 nm and include the highest signal processing bandwidth in a mid-range device, next- generation transceivers, and low-cost packaging for an optimum blend of capability and costeffectiveness. The family is ideal for packet processing in 100G networking and data center applications as well as DSP-intensive processing needed in next-generation medical imaging, 8k4k video, and heterogeneous wireless infrastructure. A rapid increase of the deployment of heterogeneous networks is helping deliver the high-speed networks, where we need them, with the capacity that is demanded. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 231–236, 2021. https://doi.org/10.1007/978-3-030-51556-0_34

232

Z. Tang

Many tier 1 suppliers have discovered that their existing designs don’t scale well. When designing mixed mode radios, there are many variables: the number of antennas, which air interfaces to support, bandwidth, and frequency. The Kintex® UltraScale™ family provides a scalable platform to ensure that a single system can be redeployed for multiple providers, in multiple regions, without a complete system redesign. UltraScale architecture has massive I/O bandwidth, massive data flow & routing, ASIC-like clocking, fastest DSP processing and power Management which can benefit the service. The design has 8  8 multi-standard radio platform in a single, low power device. One platform for multiple regions, antenna configurations and standards is designed for fast, cost effective deployment. UltraScale fabric for 491 MHz performance in −1 speed grade device allows for compact, high performance implementation. JESD204B in all available speed grades can reduce power and OPEX. Higher device utilization permits implementation in smaller, lower power devices. Using OpenCL, Vivado® High-Level Synthesis, and IP Integrator make fast algorithm development realized. SmartCore™ DPD, CFR, Filter IP, specialized ecosystem IP are used for reducing the time for integration (see Fig. 1).

Fig. 1. DFE 8  8 100 MHz TD-LTE radio unit

3 Kintex UltraScale+ Kintex® UltraScale+™ devices provide the best price/performance/watt balance in a FinFET node, delivering the most cost-effective solution for high-end capabilities including transceiver and memory interface line rates, as well as 100G connectivity cores. The newest mid-range family is ideal for both packet processing and DSPintensive functions, and is well suited for applications ranging from wireless MIMO technology to Nx100G networking and data center.

The Zynq-7000 SoC on UltraScale Architecture

Fig. 2. 112 MHz point-to-point MWR modem & packet processing

Fig. 3. 1 GHz eBand modem & packet processing

233

234

Z. Tang

There are many applications for Kintex UltraScale+ such as 112 MHz Point-toPoint MWR Modem & Packet Processing (see Fig. 2) and 1 GHz eBand Modem & Packet Processing (see Fig. 3). The UltraScale+™ portfolio adopts 491 MHz pushbutton timing closure to reduce power and maximizes digital integration and scalability to increase DSP resources and so on.

4 Zynq-7000 SoC The Zynq®-7000 SoC family integrates the software programmability of an ARM®based processor with the hardware programmability of an FPGA, enabling key analytics and hardware acceleration while integrating CPU, DSP, ASSP, and mixed signal functionality on a single device. Consisting of single-core Zynq-7000S and dual-core Zynq-7000 devices, the Zynq-7000 family is the best price to performance-per-watt, fully scalable SoC platform. Then we list the information and the comparison of the family devices. The next Tables 1, 2 and 3 give the detailed information. Zynq-7000 devices are equipped with dual-core ARM Cortex-A9 processors integrated with 28 nm Artix-7 or Kintex®-7 based programmable logic for excellent performance-per-watt and maximum design flexibility. With up to 6.6 M logic cells and offered with transceivers ranging from 6.25 Gb/s to 12.5 Gb/s, Zynq-7000 devices enable highly differentiated designs for a wide range of embedded applications including multi-camera drivers assistance systems and 4K2K Ultra-HDTV.

Table 1. The descriptions and applications of the Zynq®-7000 SoC Block diagram

Description Zynq-7000S Feature a single-core ARM Cortex™-A9 processor mated with 28 nm Artix®-7 based programmable logic Available with 6.25 Gb/s transceivers and outfitted with commonly used hardened peripherals, the Zynq-7000S delivers costoptimized system integration ideal for industrial IoT applications Zynq-7000 Equipped with dual-core ARM Cortex-A9 processors integrated with 28 nm Artix-7 or Kintex®-7 based programmable logic With up to 6.6 M logic cells and offered with transceivers ranging from 6.25 Gb/s to 12.5 Gb/s, Zynq-7000 devices

Applications Multi-axis motor control Machine vision Programmable logic controller

ADAS Medical endoscope Small cell baseband Professional cameras Machine vision Carrier ethernet

The Zynq-7000 SoC on UltraScale Architecture

235

Table 2. The features of the family Value Smarter, optimized, and most secure solution

Unmatched integration, performance, and power Proven productivity

Features Innovative ARM® + FPGA architecture for differentiation, analytics & control Extensive OS, middleware, stacks, accelerators, and IP ecosystem Multiple levels of hardware and software security Integration delivering the de facto programmable platform System level performance through optimized architecture Architected to deliver lowest system power Most flexible & scalable platform for maximum reuse and best TTM Industry-leading design tools, C/C++, and Open CL design abstractions Largest portfolio of SW & HW design tools, SoMs, design kits, and reference designs

Table 3. The comparision of Zynq-7000 and Zynq-7000s series Features Devices

Zynq-7000 Z-7007S, Z-7012S, Z-7014S

Processor core

Single-core ARM® Cortex™A9 MPCore™ Up to 766 MHz

Maximum frequency External memory support Key peripherals Dedicated peripheral pins

Zynq-7000s Z-7010, Z-7030, Z-7035, Z-7015, Z-7020 Z-7045, Z-7100 Dual-core ARM Cortex-A9 MPCore Up to 866 MHz

Up to 1 GHz

DDR3, DDR3L, DDR2, LPDDR2 USB 2.0, Gigabit Ethernet, SD/SDIO Up to 128 Up to 128

128

Zynq-7000S devices feature a single-core ARM Cortex™-A9 processor mated with 28 nm Artix®-7 based programmable logic, representing the lowest cost entry point to the scalable Zynq-7000 platform. Available with 6.25 Gb/s transceivers and outfitted with commonly used hardened peripherals, the Zynq-7000S delivers cost-optimized system integration ideal for industrial IoT applications such as motor control and embedded vision.

236

Z. Tang

5 Conclusion Integrated programmable logic on the Zynq-7000 SoC is connected to a processing system with over 3,000 interconnects, providing up to 100 Gb/s of I/O bandwidth, beyond that of a multi-chip solution. The Zynq-7000 SoC single-chip solution enables customization for almost any design requirement. When choosing the chip we need, we need to take into account the functions we need to achieve, the achievable functions of the chip and energy consumption. Choosing the right chip is also a key issue. With the development of technology, the function of the chip has also been developed rapidly, so we need to constantly learn some new series of products, update our knowledge base and play the function of these chips. This work was financially supported by National Key R&D Program of China (2017YFC0803701).

References 1. https://www.xilinx.com/support/documentation/data_sheets/ds890-ultrascale-overview.pdf 2. Xilinx. Virtex-4 family overview. http://china.xilinx.com/support/documentation/data_sheets/ ds112.pdf (2007), 9 3. Xilinx. Virtex-6 family overview. http://china.xilinx.com/support/documentation/data_sheets/ ds150.pdf (2009), 11 4. Xilinx 7 Series FPGA and Zynq-7000 All Programmable SoC Libraries Guide for Schematic Designs 5. https://www.xilinx.com/support/documentation/product-briefs/zynq-7000-product-brief.pdf 6. https://www.xilinx.com/products/silicon-devices/fpga/kintex-ultrascale-plus.html

VHDL Design of Motor Control Module on FPGA Zhiwei Tang(&) and Xiaoqing Chen The Third Research Institute of Ministry of Public Security, Shanghai, China [email protected]

Abstract. This paper mainly introduces the VHDL design in intelligent car controller, and describes how to use state machine to design intelligent car. Using the top-down block design principle, we put forward a kind of design that suitable for implementation of the intelligent car controller. This paper describes how to use motor control module, tracking module, avoidance module and other modules to realize a complete intelligent car control system, and introduces the corresponding principles. Keywords: FPGA

 Intelligent car  VHDL

1 Introduction This paper designs a control system of intelligent car based on the chip EP1C3T100C8 from Altera Cyclone series. The FPGA design is described by VHDL. The modules are designed in Quartus II software environment.

2 Design Scheme The overall design idea of this design is shown in Fig. 1. The infrared sensor and the ultrasonic module transmit the collected environmental information to the core chip. After processing the information, the chip feeds back to the motor drive module to realize the operation of tracking and obstacle avoidance. The data measured by the grating speed measurement module are processed and transmitted to the display module which can display the speed information.

3 Mode Selection Considering that obstacles may be detected in the tracing process, the priority of obstacle avoidance mode should be increased and mode switching should be carried out. The module is shown in Fig. 2.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 237–245, 2021. https://doi.org/10.1007/978-3-030-51556-0_35

238

Z. Tang and X. Chen

Infrared sensor Motor drive module

Ultrasound module

FPGA chip

Display module

Grating Velocity Measuring Module

Fig. 1. System block diagram

Fig. 2. Mode selection module

The input of the module is composed of tracking (s2, A2, B2), obstacle avoidance (s1, A1, B1) and a sensitive enfollow. The output of the module is three sets of outputs connected to the L298N and the pulse width modulation module. The enfollow is high when there is no obstacle to go straight, and the enfollow is low when there is obstacle. The simulation diagram is shown in Fig. 3. When the port enfollow is at high level, the output of s, A and B is the output of the tracking module, and when enfollow is at low level, the output is the output of the obstacle avoidance module.

VHDL Design of Motor Control Module on FPGA

239

Fig. 3. Mode selection simulation

3.1

Speed Module

This part is composed of several modules, including signal control, counter, burr removal, latch, numerical conversion and other modules, as shown in Fig. 4. The principle of this part is to count the number of impulses input in a set gate signal and latch them to prevent numerical instability. Finally, the corresponding numerical output is converted to the display module. There are altogether two speed measurement modules in the design, and one of them is explained as an example below.

Fig. 4. Speed module

3.2

Signal Control Module

As shown in Fig. 5, this module can generate signals of control counter and latch. CLK1 port is connected with 10 Hz clock signal. This module generates a 0.1 s gate signal CNT_EN as the trigger signal of the counter, and periodically generates a lock signal LOCK and a zero-clearing signal CLR to maintain stability. The simulation diagram is shown in Fig. 6.

240

Z. Tang and X. Chen

Fig. 5. Signal control

Fig. 6. Simulation diagram of signal control

3.3

Burr Removal Module

As shown in Fig. 7, the clock of CLK peripheral chip 50 MHz, KIN is the number of pulses measured by the code disc, KOUT is the output after filtering, deburring is carried out in a timing manner to prevent the occurrence of burr signals due to some other factors affecting the accuracy of the counting results. The simulation diagram of the module is shown in Fig. 8. It can be found that when the burr signal appears in KIN, the module successfully filters it out.

Fig. 7. Burr removal module

VHDL Design of Motor Control Module on FPGA

241

Fig. 8. Simulation diagram of burr removal module

3.4

Counting Module

As shown in Fig. 9, the CLK input pulse signal after deburring, ENABLE is enabler. CLR is connected with zero-clearing signal and COUT is eight-bit output. DOUT1, DOUT2 are low four-bit and high four-bit output respectively. Enabler ENABLE and clearing signal CLR are both effective at high level. When the enabling signal is high and clearing signal is low level, counting begins. This module uses eight-bit BCD code counter. The simulation results are shown in Fig. 10. When the counting result reaches “00011001”, that is, “19” in decimal system, the next output is “00100000”, that is, “20”, which can facilitate subsequent data processing.

Fig. 9. Counting module

Fig. 10. Simulation diagram of counting module

242

3.5

Z. Tang and X. Chen

Latch Module

As shown in Fig. 11, the LK is connected to the lock signal output LOCK of the front signal control module. The LED A is four bits high and the LED B is four bits low. When the latch control signal is high, the latch operation is carried out. The simulation results of the module are shown in Fig. 12.

Fig. 11. Latch module

Fig. 12. Simulation diagram of latch module

3.6

Calculating Module

As shown in Fig. 13, H4 is a high four-bit input and L4 is a low four-bit input, which are connected with the high and low-bit input of the latch module respectively. Since the counting module counts the number of pulses generated by the 20-hole code disc in 0.1 s, according to formula 1 and substituting time T = 0.1 s, we can calculate the rotational speed of the wheel in rps, and use the eight-bit BCD code “hl” to represent the simulation diagram of the module as shown in Fig. 14. The design is all integer data, so the values after decimal point are rounded directly. r¼

N 20  T

ð1Þ

VHDL Design of Motor Control Module on FPGA

243

Fig. 13. Calculating module

Fig. 14. Simulation diagram

3.7

Display Module

This design needs to show whether there are obstacles on the LCD1602 screen. If there are obstacles, it will prompt “DANGER”, and if there are obstacles, it will show “SAFE!!”, at the same time, it will show the speed of the left and right wheels. The module is shown in Fig. 15. CLK port is connected with 500 Hz clock signal, echo port is the input of obstacle avoidance signal, echo port is connected with the output of the safe distance setting module, reset is the reset signal, hl4 and ll4 are the high and low four digits of the counting results of the left wheel, hr4 and lr4 are the high and low four digits of the counting results of the right wheel. RS, RW, EN, D are connected to the corresponding input port of LCD1602. LCD_DATA is a 9-bit output of RS and D combination.

Fig. 15. Display module

244

Z. Tang and X. Chen

As can be seen from the foregoing, the design outputs the speed value every 0.1 s. Therefore, in the design of this module, 500 Hz clock is used to ensure that the change of speed can be displayed in real time. The simulation diagram of this module is shown in Figs. 16 and 17 as one of echo 1 and 0 is selected. “DANGER” is displayed when there are obstacles, and “SAFE!!” is displayed when there are no obstacles, and the speed is correctly displayed.

Fig. 16. Simulation diagram when there are obstacles

Fig. 17. Simulation diagram when safe

4 Conclusion This paper describes how to use VHDL to realize a complete intelligent car control system, and introduces the corresponding principles. Especially it introduces such kinds of VHDL modules such as motor control module, tracking module, avoidance module and other modules. The results show that it improves the precision of FPGA parameters optimization and the adaptability of control system. This work was financially supported by National Key R&D Program of China (2017YFC0803701).

VHDL Design of Motor Control Module on FPGA

245

References 1. Liu, F.: Design of Machine Vision Image Acquisition System Based on FPGA. Dalian University of Technology (2017) (in Chinese) 2. Tang, T.: LCD 1602 control based on VHDL. Sci. Mosaic 6, 100–103 (2012). (in Chinese) 3. Huang, Q., Yu, Y.: Design and implementation of vehicle automatic driving control system based on FPGA. J. Yunnan Univ. (Natural Sciences Edition) 2, 199–204 (2014) (in Chinese) 4. Wu, C.: Design of intelligent vehicle control system based on FPGA. Electron Technol. 17, 11–13 (2013). (in Chinese) 5. Duan, L.: Design of intelligent car based on FPGA. Electron. Des. Eng. 9, 184–486 + 190 (2014) (in Chinese)

Part II: CV Process and Data Mining for Multi-modal Informatics Systems

Survey of Computer Vision Synchronous Positioning and Map Construction Technology Hong Zhang(&), Ping Yang, Hongjiao Xue, and Shixia Lv Beijing Polytechnic, Beijing 100026, China [email protected]

Abstract. At present, science and technology are developing rapidly. In order to enhance users’ experience in AR/VR, robotics, unmanned aerial vehicle (UAV) and unmanned driving, more cutting-edge technologies are needed to support. SLAM is one of them. SLAM mainly solves the positioning of camera in space and the creation of environment map. VR/AR Augmented reality, UAV, unmanned driving, robot positioning and so on are all in the core technology position in some popular entrepreneurial directions. The development of SLAM technology has a history of more than 30 years, involving many technical fields. Because it contains many steps, each step can be implemented with different algorithms, SLAM technology is also a hot research direction in the field of robotics and computer vision. Keywords: V-SLAM Deep-Learning

 Computer vision  Monocular vision SLAM 

1 Introduction to V-SLAM SLAM is recognized as the leading direction of spatial positioning technology in the field of vision in the industry. The Chinese translation is “synchronous positioning and map building”. Its uses focus to solve the issue of self-positioning and map building when the robot moves in the environment of no prior information. If we categories SLAM based on sensor types, it can be divided into two type as laser SLAM and visual SLAM. Laser SLAM mainly relies on laser sensors to collect environmental information and is applied to indoor navigation. V-SLAM is a SLAM technology using computer vision technology. It can be divided into depth camera, binocular camera, monocular camera and camera fusion IMU unit according to the types of camera working modes. There is only one pick-up head for monocular camera and two pick-up heads for binocular camera. The working principal of RGB-D camera is complicated. Besides to collecting color pictures, it can estimate the distance between every pixel and the camera. The monocular camera works with only one pick-up head. The sensor has the advantages of simple structure, low cost and wide application range. However, because there is no admeasurement in the monocular SLAM, it cannot restore the environment only by determining the real scale of the image, so it is very challenging to implement the specific algorithm.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 249–255, 2021. https://doi.org/10.1007/978-3-030-51556-0_36

250

H. Zhang et al.

2 Principle of V-SLAM Visual SLAM [1] technology infers the camera’s gesture in the environment based on the image information taken by the camera. At the same time, the environment map is built. Its basic principle multiple view geometry theory, as shown in below Fig. 1.

Fig. 1. Multiple view geometry theory

For convenience, a constant time motion is changed into a distinctive time value: t ¼ 1; . . .k.In these moments, C1 . . .Ck is used to represent the camera’s pose, and X1 . . .Xn is used to represent n environmental landmarks. The pose of each camera is usually expressed as a 3  3 rotation matrix: 

T   Xij ; Yij ; Zij ¼ Ri Xj  Pi

ð1Þ

which is then projected into the image:  T hij ¼ fx Xij =Zij þ cx ; fy Yij =Zij þ cy

ð2Þ

Where f x ; f y are image focal lengths along the x; y axes of the image respectively.  Cx ; Cy is the position of the lens optical center in the image, which is usually assumed to be calibrated and remain unchanged. Therefore, the projection hij of threedimensional point in the image can be expressed as a function of Ci and Xj : 

  hij ¼ h Ci ; Xj

ð3Þ

Visual-SLAM algorithm matches the corresponding road signs in different images, and optimizes the following objective functions by solving:

Computer Vision Synchronous Positioning and Map Construction Technology

arg

min

k X n  X  hðCi ; Xj Þ  ^xij P

C1 ;...;CK X1 ;...;Xn i¼1 j¼1

251

ij

A set of optimal C1 . . .Ck ; X1 . . .Xn is obtained, which makes the projection position hij of all Xj in the Ci image as close as possible to the observed image point position xij . Because visual SLAM needs to match the features of image, it depends on the richness of scene features. In monotonous scene, the general solution is to add IMU (inertial measurement unit) to assist.

3 Frame of V-SLAM After decades of research in the industry, the SLAM system gradually evolved into the following structure [15] (Fig. 2).

Fig. 2. General V-SLAM frame

The layout itself and the logic used in it are basically trained and can be found in many visual and robotic world. Relying on these algorithms, the visual SLAM system can be built directly, so that it can be positioned and constructed in real time in the normal ideal working environment. Following steps describe the complete visual SLAM process: 1. Sensor information reading, there is main reading and pre-processing of camera image information in the visual SLAM. Also, here may be the reading and synchronization of information such as code disks, inertial sensors(IMU)if it is in a robot, etc. 2. Visual Odometry (VO). VO is also called as the Front End. Its main purpose is to evaluate the motion of camera between side by side images and appearance of map. 3. Optimization. As this step is followed by VO so, sometime it’s also called as Back End. This takes camera postures stakes evaluated by the vision odometer at different moments, and also information from loop closing, optimized for globally consistent tracks and maps.

252

H. Zhang et al.

4. Loop Closing. Loop closing find whether the robot has reached its earlier position. If looping is spotted, this step provides information to the back end for processing. 5. Mapping. It build a map that corresponds to the task requirements built on the projected trajectory. There is a significant gap between the actual working environment, mainly concentrated in: dynamic objects, flexible objects, changes in light intensity, and scenes that are considered interference. In these scenarios, we need to optimize for different SLAM algorithms to improve accuracy and avoid environmental interference. This is also the current visual SLAM research direction and core.

4 Representative Monocular V-SLAM System At present, the international mainstream V-SLAM system in the back-end processing, can be categories into three types: filter-based, key frame-based BA and direct trackingbased optimization algorithm. This section provides a brief introduction to these methods.

5 MonoSLAM This system is the first present monocular vision SLAM system [3]. It uses EKF (Extending Kalman Filter) as the back-end process, tracks the thin feature points in the front-end, and updates the mean and covariance with the current state of the camera and all the waypoints as the state quantity. In EKF, the location of each feature point follows Gaussian distribution, and an ellipsoid can be used to represent its mean value and uncertainty. The longer they are in a certain direction, the more unstable they are in that direction. The disadvantages of this method are narrow scene, limited number of landmarks, and the loss of sparse feature points.

6 PTAM PTAM suggests and realizes the parallelization of tracking and mapping. For the first time, it distinguishes the front end and the back end [4]. Many subsequent visual SLAM system designs adopt similar methods. A keyframes mechanism is proposed, which is to combine many key images to enhance their trajectories and maps instead of fine processing each image [5]. The disadvantages of this method are: small scene, easy to lose tracking. The open source of PTAM is of far-reaching significance to the development of VSLAM. At present, many V-SLAM systems on the market are based on the improvement of the algorithm framework of PTAM [6].

Computer Vision Synchronous Positioning and Map Construction Technology

253

7 LSD-SLAM In 2013, Egnel et al. Of the TUM machine vision group proposed a vision odometer system based on the direct method, which was expanded to LSD-SLAM [8] in 2014. LSD-SLAM constructs a comprehensive direct monocular SLAM framework, and proposes an image matching algorithm to directly estimate the similarity transformation and scale perception between key frames, which realizes the rebuilding of partial compressed scenes on CPU. The disadvantage of this method is that it can sense the interior factors and exposure and it is easy to lose when camera moves rapidly, so it still needs the loop closing of feature points.

8 ORB-SLAM In 2015, the ORB-SLAM [11] was proposed and open-source by Mur-Artal and others. In 2016, the ORB-SLAM2 [13] was expanded to support binocular and RGBD sensors. ORB-SLAM is one of the best monocular V-SLAM systems. ORB-SLAM continues the algorithm framework of PTAM, adds a separate loop closing thread, and improves most of the components in the framework (Fig. 3), which is summarized as follows:

Fig. 3. ORB-SLAM system structure

1. ORB-SLAM tracking, mapping, relocation and loop closing all use unified orb features, so that the map can be saved and loaded repeatedly. 2. Thanks to the use of convisibility graph, the tracking and mapping operations are concentrated in a local mutual view area, so that it cannot depend on the size of the overall map, and can achieve real-time operation of a large range of scenes. 3. Repositioning and loop closing detection using the unified bag of words model of BoW, and establish index to improve the detection speed. 4. It improves the defect that PTAM can only select initialization from plane scene manually, a new automatic robust system initialization strategy based on model

254

H. Zhang et al.

selection is proposed, which allows reliable automatic initialization from planar or non-planar scenes. Later, Mur-Artal expanded the system to form visual internal orb-SLAM, which integrates IMU information. The initialization process of IMU and the joint optimization with visual information were described.

9 CNN-SLAM In 2017, Tateno proposed a deep learning method to solve the scale missing problem of monocular SLAM system [16]. When estimating the pose between two frames, the method uses CNN (convolutional neural network) to predict the depth and achieves good results. In order to make sure the high frame ratio, the method only forecasts the deep map on the basic frame, and puts forward the specific normalization program of the depth map, which enhances the robustness to different intrinsic camera parameters. CNN-SLAM uses pre trained CNN model to do depth prediction. The disadvantage of CNN-SLAM [17] is that if the sensors used in SLAM and the sensors used to capture training sets have different internal parameters, the absolute scale of 3D reconstruction will be inaccurate.

10 DEEPTAM In 2018, ZhouH implemented the concept of DTAM in the tracking and mapping steps with CNN method. DEEPTAM[19] avoids the drift of keyframes by processing the comparison of multiple keyframe, moreover, the depth of the image can be further obtained by increasing the number of key frame contrast, and the part of the mapping can be improved and optimized.

11 Current Industry Research Direction At present, the development of V-SLAM is compliance with standards, rules. Each link is evaluated and optimized on the base of precursors, along with continuously gripping the up-to-date achievements in other areas. In the short term, it is sure to keep improving under the existing framework. On the one hand, in multi-sensor fusion, the emergence of new sensors will constantly inject vitality into SLAM. The calculated value of SLAM pressure can be minimized to a lot extent if we can extraordinary rough data directly. Expand its application scope. On the other hand, since learning at depth is very rare in several fields, so researchers try to reconstruct the process of SLAM with the idea of end-to-end in deep learning. At present, some work attempts to replace some parts of SLAM with deep learning. Although these methods do not show an overwhelming advantage, but in the upsurge of deep learning, with the help of deep learning technology, the current technology of object detection and semantic segmentation is developing rapidly. The rich semantic information that can be obtained from the image should be gradually

Computer Vision Synchronous Positioning and Map Construction Technology

255

absorbed by the various links involved in SLAM, and the precision and noise of SLAM will also be improved. Maybe in the near future, many features of SLAM will be substituted by others by learning at depth, forming a new structure.

References 1. Grisetti, G., Stachniss, C., Burgard, W.: Improving grid-based SLAM with RaoBlackwellized particle filters by adaptive proposals and selective resampling. In: Proceedings of the IEEE International Conference on Robotics and Automation (ICRA) (2005) 2. Grisetti, G., Stachniss, C., Burgard, W.: Improved techniques for grid mapping with RaoBlackwellized particle filters. IEEE Trans. Rob. 23, 34–46 (2007) 3. Davison, A.J., Reid, I.D., Molton, N.D.: MonoSLAM: real-time single camera SLAM. IEEE Trans. Pattern Anal. Mach. Intell. 29, 1052–1067 (2007) 4. Klein, G., Murray, D.: Parallel tracking and mapping for small AR workspaces. In: Proceedings of IEEE and ACM International Symposium on Mixed and Augmented Reality (2007) 5. Klein, G., Murray, D.: Parallel tracking and mapping on a camera phone. In: Proceedings of IEEE and ACM International Symposium on Mixed and Augmented Reality (2009) 6. Klein, G., Murray, D.: Improving the agility of keyframe-based SLAM. In: Proceedings of European Conference on Computer Vision, vol. 2, pp. 802–815. Springer, Heidelberg (2008) 7. Newcombe, R.A., Lovegrove, S.J., Davison, A.J.: DTAM: dense tracking and mapping in real-time. In: Proceedings of IEEE International Conference on Computer Vision (2011) 8. Engel, J., Sturm, J., Cremers, D.: Semi-dense visual odometry for a monocular camera. In: IEEE International Conference on Computer Vision (ICCV), December 2013 9. Engel, J., Schps, T., Cremers, D.: LSD-SLAM: LargeScale direct monocular SLAM. In: European Conference on Computer Vision (ECCV) (2014) 10. Tateno, K., Tombari, F., Navab, N.: Real-time and scalable incremental segmentation on dense SLAM (2015) 11. Mur-Artal, R., Montiel, J.M.M., Tardos, J.D.: ORB-SLAM: a versatile and accurate monocular SLAM system. IEEE Trans. Robot. 31(5), 1147–1163 (2015) 12. Mur-Artal, R., Tardós, J.D.: ORB-SLAM2: an open-source SLAM system for monocular, stereo and RGB-D cameras. ArXiv preprint arXiv:1610.06475 (2016) 13. Mur-Artal, R., Tardos, J.D.: Visual-Inertial monocular SLAM with map reuse. IEEE Robot. Autom. Lett. 2, 796–803 (2016) 14. Gao, X.: 14 Lectures on Visual SLAM. Electronic Industry Press, Beijing (2017) 15. Tateno, K., Tombari, F., Laina, I., Navab, N.: CNN-SLAM: real-time DenseMonocular SLAM with learned depth prediction. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6565–6574, July 2017 16. Zhao, Y., et al.: A survey of visual SLAM based on deep learning. Robot 39(6), 889–896 (2017) 17. Zhou, H., Ummenhofer, B., Brox, T.: DeepTAM: deep tracking and mapping. In: 2018 Computer Vision - ECCV 2018, pp. 851–868, August 2018

Application of Conditional Generative Adversarial Network in Image Super-Resolution Reconstruction Xiang Wei1,2, Feng Wang2(&), Xi Chen1, Yongjie Yan1, Ping Chen1, and Sheng Liu3 1

State Key Laboratory of Air Traffic Management System and Technology, Nanjing, Jiangsu Province, China 2 College of Information and Computer Science, Taiyuan University of Technology, Taiyuan, Shanxi Province, China [email protected] 3 Taigu County Meteorological Bureau, Jinzhong, Shanxi Province, China

Abstract. In the process of image processing, the higher the resolution of the image, the richer the data information contained in the image. Aiming at the problem of low image resolution, through the research of generating countermeasure network, the condition generating countermeasure network is used to solve this problem. We use a symmetric convolutional neural network as the generator network, each of which has 6 layers. At the same time, by entering the labels into the discriminator, the connection between the original image and the model-generated image can be derived. In the loss function during the experiment, perceptual loss and mean square error are added, and good results are obtained in the actual experiment, and the visual effect of the generated image is more ideal. Compared with other algorithms, the proposed algorithm achieves the visual effect of SRGAN, and the effect on some pictures has been greatly improved. Keywords: Conditional generative adversarial network Super-resolution reconstruction

 Deep learning 

1 Introduction Learning-based image super-resolution technology has become one of the hot research directions in recent years. In recent years, Goodfellow proposed Generative Adversarial Networks (GAN), which is slowly becoming popular in supervised learning. Inspired by GAN, Ledig et al. introduced GAN into image super-resolution reconstruction and proposed image super resolution (SRGAN) based on generative adversarial networks [1]. Following a series of models based on generative adversarial networks, Zhang et al. [2] proposed a single image denoising method based on the image noise reduction conditional universal adversarial network (ID-CGAN). Among them, the author guided perceived training as a loss function. Huang et al. [3] proposed a facial image super resolution method for face condition generation adversarial network (FCGAN), which is based on boundary balance of generative adversarial networks. Zhao et al. [4] © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 256–265, 2021. https://doi.org/10.1007/978-3-030-51556-0_37

Application of Conditional Generative Adversarial Network in Image

257

proposed a color depth condition generative adversarial networks to solve the problem of depth super-resolution and color super-resolution in three-dimensional video. This paper applies convolutional neural network and generative adversarial networks in deep learning to image super-resolution and optimizes the traditional image super-resolution reconstruction method. In order to enhance the rich details of image reconstruction, a symmetric convolutional neural network is used in the generator of generative adversarial networks and the image tag is introduced into the discriminator, and an image super-resolution based on conditional generative adversarial network model.

2 Image Super-Resolution Reconstruction Technology Based on Condition Generative Adversarial Networks This paper uses the network model of symmetric neural networks in convolutional neural networks to modify the network structure based on SRGAN [1]. It proposes the use of symmetric convolutional neural networks for GAN generators and introduces image tags into discriminators. In this paper, a Super-Resolution Conditional Generative Adversarial Network model is proposed. 2.1

Generator

We use a structurally symmetric convolutional neural network consisting of a network of encoders and decoders, also known as convolutional and deconvolutional layers. Because the deconvolution operation is advantageous to recover the detailed information of the reconstructed image, a structurally symmetrical convolutional deconvolution structure network is employed. As shown in Fig. 1. “Conv” represents a convolution operation, “BN” represents a Batch Normalization operation, and “Deconv” represents a deconvolution operation. For neural networks, the deeper the general network, the better the information extraction capability [5]. However, if the network is deeper and there are problems such as vanishing gradient or exploding gradient [6], this will cause the network to fail to converge. Scholars have proposed various ways to control gradients to prevent the vanishing gradient or exploding gradient, such as normalizing the input of layers. In order to make the encoding-decoding network easier to converge, we use batch normalization to combine the structure of the residual network. We use residual structure to solve some problems.

Fig. 1. Generator structure (Symmetric Convolutional Neural Network)

258

X. Wei et al.

The residual structure can learn the texture information of the image better than the general stack convolution, which is very advantageous for reconstructing superresolution images. Batch standardization can reduce the cost of initializing weights while accelerating the speed of training. The activation functions of all encoders and decoders of the generator network uses the LeakyReLU function. The last layer is the Tanh activation function. As shown in Fig. 1, we use a direct end-to-end image superresolution network. After bicubic interpolation, a smooth image is generated directly through the generator to generate high-resolution images. At the same time, we will input the original image of this smooth image into the generator network and output the image of the high resolution image. The original image of the input smooth image is used as a label of conditional generative adversarial network to help the generator to generate a high-resolution image. Next, we introduce the structure-related parameters of the encoding-decoding network in Fig. 2. Correspond to the structure diagram of the generator, starting from the left to the right, each convolutional layer on the graph is named Conv_1, Conv_2, …, Conv_6. Each deconvolution layer is named Deconv_1, Deconv_2. …, Deconv_6. As shown in Table 1:

Fig. 2. Discriminator structure

All parameters for all convolutional and deconvolution layers are listed in the table above. For the LeakyReLU function, according to the literature [7], a is equal to 0.2. 2.2

Discriminative

The discriminator is also equivalent to a feature extraction module, as shown in Fig. 2. In the generative adversarial networks, the role of the discriminator is to distinguish whether the image came from a generator of a “fake” image or a real image from a training set. The network activation function still selects the LeakyReLU function. The middle 3-layer convolutional layer is followed by the batch standardization operation. The last 1-layer convolution layer is followed by the full-connection layer. After the full-connection layer, the Sigmoid function is used to determine whether the input image is true or false. If the image of the input discriminator is a real image, the output is “1,” and if the image is generated by the generator, the output is “0.”

Application of Conditional Generative Adversarial Network in Image

259

Table 1. Generator’s convolutional layer structure related parameters Convolutional Layer Convolution_1 Convolution_2 Convolution_3 Convolution_4 Convolution_5 Convolution_6 Deconvolution_1 Deconvolution _2 Deconvolution _3 Deconvolution _4 Deconvolution _5 Deconvolution _6

Stride 2 2 2 2 2 2 2 2 2 2 2 2

Convolution kernel number Convolution kernel size 128 3*3 128 3*3 128 3*3 64 3*3 32 3*3 1 3*3 32 3*3 64 3*3 128 3*3 128 3*3 128 3*3 1 3*3

The convolutional layer related parameters of the discriminator network are shown in Table 2, and the related parameters of the convolutional layer correspond to the structure diagrams of the discriminators. As shown in the figure, starting from the left to the right of the diagram, each convolutional layer on the graph is named Conv_1, Conv_2, Conv_3, …, Conv_5. For the LeakyReLU function, a is equal to 0.2. Table 2. Discriminator’s convolutional layer structure related parameters Convolutional layer Convolution_1 Convolution _2 Convolution _3 Convolution _4 Convolution _5

Stride 2 2 2 2 2

Convolution kernel number Convolution kernel size 64 4*4 128 4*4 256 4*4 512 4*4 1 4*4

First, the loss function of the algorithm of this paper is introduced. We use the VGG16 [8] network to help us extract features. It consists of five stacked convolutional neural networks ConvNet, three fully connected layers and one Softmax layer. ConvNet consists of multiple convolutional layers. Then, the convolutional layer is followed by the largest pooled layer. This structure consists of multiple convolutional layers nested together. So The structure can be described as a “network in the network.” After the convolution and pooling layers, there are 3 layers of full-connection layers. Finally, after the output of the fully connected layer is obtained, it is treated as the input of the Softmax layer. After the final processing, the experimental results are obtained.

260

X. Wei et al.

Fig. 3. Perceptual loss

In the adversarial network, the image generated by the generator may be different from the real image. By entering the labels into the discriminator, the connection between the original image and the model-generated image can be derived. So the discriminator’s input is two-channel. As shown in Fig. 3, then calculate its Wasserstein distance. 2.3

Network Training and Loss Function

So the loss function used in the algorithm of this paper is based on the form of Wasserstein GAN. Because we need to provide the spatial resolution of the image, we first use the mean square error to represent the reconstruction loss based on the Wasserstein GAN form. The formula is as follows (3): Lossr ¼ Ex  pg ½Dð xÞ þ k  2 1 XX 0 Ix;y GðI Þxy  WH x y

ð3Þ

In Eq. 3, I represents a low-resolution image, I 0 represents a true value, the second represents a mean square error, W and H is the actual height and width of the original image, and pg is the data of the input original image. Then we also introduced the perceptual loss, in order to get a better reconstruction effect, as in Eq. (4) below: Lossd ¼ x 

1 X X X 0 uðI Þi;j;k JKL i j k  uðGðI ÞÞi;j;k

ð4Þ

In the formula, J, K, L represent the three-dimensional size of the eigenmaps obtained by the u convolutional neural network acting on the image. In this paper, perceptual loss and mean square error are added, and good results are obtained in the actual experiment to make the generated image more consistent with the subjective effect of human eye observation. So, the final generator loss function is:

Application of Conditional Generative Adversarial Network in Image

LG ¼ Ex  pg ½Dð xÞ 2 1 X X 0 þk  Ix;y  GðI Þxy WH x y 1 X X X 0 þx  uðI Þi;j;k JKL i j k  uðGðI ÞÞi;j;k

261

ð5Þ

In the formula, k and x are all balance factors. We adjust the values of k and x to control the loss function used in the experiment and balance each loss function. The uconvolution neural network is pre-trained and used for image feature extraction. The weights are constant during the training process. Then batch-size is selected as 32, and the learning rate initialized to 0.0001. The uninitialized network parameters are all initialized using the TensorFlow default initialization mode.

3 Experimental Results and Analysis 3.1

Data Sets and Criteria

We used 91 image datasets of Yang et al. [9] as the training dataset, and neural network models require a large number of data sets for optimization during the training process, improve the fit of the model. First, we rotate each image 90 , 180 , and 270 in sequence, and then expand the data set to 4 times the original value. We then adjusted the brightness of the images and entered them into the model along with the original data to augment the experimental data. In each image during training, we randomly select 64 image blocks as high-resolution sub-blocks, each of which has a size of 128  128, and then perform bi-cubic interpolation down-sampling to obtain lowresolution image blocks. The test sets we used were Set5, Set14, and BSD100. As shown in Fig. 4, we show a test sample of the test set.

Fig. 4. Samples of test images

We evaluate the experimental results in two parts: the first part is the objective quality evaluation of the image based on the structural similarity index (SSIM) and the

262

X. Wei et al.

peak signal-to-noise ratio (PSNR); the second part is the visual evaluation of the image by the human eye. 3.2

Experimental Results and Analysis

3.2.1 Objective Evaluation Due to the larger super-resolution factor (4), low-resolution images may lose a lot of high-frequency details. Therefore, our experiment compares two objective image quality evaluation criteria, SSIM and PSNR, between each algorithm when the amplification factor is 4. Table 3 and Table 4 are our final experimental results. Table 3 shows the effect of applying several common methods on different datasets for super-resolution of the image at a magnification of 4x. It is measured by PSNR, and Table 4 is measured by SSIM. The indicators of other methods are derived from reliable network dataset. Table 3. Average PSNR for datasets Set5, Set14 and BSD100 at scale factors 4x Dataset Bicubic A+ [10] SRCNN [11] SelfEXSR [12] SRGAN This paper

Set5 28.42 30.28 30.48 30.31 29.40 29.66

Set14 26.09 27.32 27.59 27.40 26.02 26.34

BSD100 25.96 26.82 26.91 26.84 25.16 25.37

Table 4. Average SSIM for datasets Set5, Set14 and BSD100 at scale factors 4x Dataset Bicubic A+ SRCNN SelfEXSR SRGAN This paper

Set5 0.8104 0.8603 0.8628 0.8619 0.8472 0.8495

Set14 0.7042 0.7491 0.7529 0.7518 0.7397 0.7422

BSD100 0.6675 0.7087 0.7101 0.7106 0.6688 0.6746

It can be found from the experiment that since GAN essentially “creates” highresolution images, it will be inferior to the general neural network in objective indicators. The traditional objective evaluation index can only serve as a reference for the evaluation of its generated images, and it cannot accurately measure its perceived effects. From the results of the above table, it can be seen that convolutional neural networks are really good at image super resolution reconstruction problems. In most cases, the PSNR index exceeds other methods. However, this does not mean that the result is

Application of Conditional Generative Adversarial Network in Image

263

better. By observing experimental result of the next image, the convolutional neural network with method training convergence is generally not better than the visual effect generated by GAN. 3.2.2 Magnification of 4x Results Display and Comparison In the experimental results, we compare the images in Set14 and BSD100 datasets as test results and compare them with bicubic interpolation, SRCNN, SelfEXSR, and SRGAN. And select the image in Set5 to perform the image reconstruction effect of image super resolution algorithm. As shown in Figs. 5 and Fig. 6, this is the result of testing image super-resolution on datasets BSD100 and Set14. We performed four-fold magnification of the fur part of the tiger, and the window part of the building. The experimental results of the bicubic interpolation algorithm are still very vague. The edge details shown in Fig. 5 and Fig. 6, the experimental results of SRCNN and SelfExSR algorithm can see the edges slightly, but there is still a gap compared with the original image. The experimental results of SRGAN and the algorithm proposed in this chapter extract more highfrequency details of the image than the previous three algorithms, and the edges are more clear and complete. From the subjective visual effects of the results, because the loss function uses perceptual loss to guide its training, the network reconstructs more image details than ordinary convolutional neural networks.

(a) Original image

(d)SelfExSR

(b) Bicubic interpolation

(e)SRGAN

(c)SRCNN

(f) This paper

Fig. 5. Results of super resolution on tiger image

General convolution neural network is not very good at rebuilding detail-rich images. Even if the image reconstruction capability is good, the reconstructed image lacks detail and smoothness, compared to the reconstruction results proposed in this chapter. Observed from the generated image, its content will be slightly different from the original image, but the image will be more realistic.

264

X. Wei et al.

(a) Original image

(d)SelfExSR

(b) Bicubic interpolation

(e)SRGAN

(c)SRCNN

(f) This paper

Fig. 6. Results of super resolution on building image

The images obtained by general convolutional neural network training are more concerned with the similarity of pixels, which is the performance of objective image quality assessment. Image super-resolution reconstruction ultimately serves the human eye.

4 Conclusions and Prospects In this paper, image objective indexes based on GAN image reconstruction have not reached the standard of general convolutional neural network, but it pays more attention to the authenticity of the image and better visual effect. From the experimental results, It can be seen from the experimental results that this model can be compared with srgan model in the observation effect of human eyes, and even has some improvement. In reality, the ultimate target of service for image super-resolution reconstruction research is the human eye. Therefore, the focus of our future research is to develop images that are more in line with subjective vision, and to increase the visual effect of generating images by combining the generative adversarial networks with other networks of deep learning.

Application of Conditional Generative Adversarial Network in Image

265

Acknowledgements. This work was supported by State Key Laboratory of Air Traffic Management System and Technology(NO.SKLATM201803). Research Project Supported by Shanxi Scholarship Council of China (NO.2017-049). This work was supported by Postgraduate innovation project of Shanxi Province in 2019.

References 1. Ledig, C., Wang, Z., Shi, W., et al.: Photo-realistic single image super-resolution using a generative adversarial network. In: Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017, pp. 105-114 (2017) 2. Zhang, H., Sindagi, V., Patel, V.M.: Image de-raining using a conditional generative adversarial network, arXiv preprint arXiv:1701.05957 (2017) 3. Huang, B., Chen, W., Wu, X., et al.: High-quality face image sr using conditional generative adversarial networks, arXiv:1707.00737 (2017) 4. Zhao, L., Bai, H., Liang, J., et al.: simultaneously color-depth super-resolution with conditional generative adversarial network, arXiv:1708.09105 (2017) 5. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. computer science, arXiv preprint arXiv:1409.1556 (2014) 6. Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. J. Mach. Learn. Res. 9, 249-256 (2010). https://doi.org/10.1.1.207.2059 7. Russakovsky, O., Deng, J., Su, H., et al.: ImageNet large scale visual recognition challenge. International J. Comput. Vis. 115(3), 211-252 (2014). https://doi.org/10.1007/s11263-0150816-y 8. Krizhevsky, A., Sutskever, I., Hinton, GE.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, Lake Tahoe, Nevada, USA, 03–06 December 2012, pp. 1097-1105 (2012) 9. Yang, J., Wright, J., Ma, Y., et al.: Image superresolution as sparse representation of raw image patches. In: .IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2008, Anchorage, AK, USA, 23–28 June 2008, pp. 1-8 (2008) 10. Timofte, R., Smet, V.D., Gool, L.V.: A+ : adjusted anchored neighborhood regression for fast super-resolution. In: Asian Conference on Computer Vision, Singapore, 1–5 November 2014, pp. 111-126 (2014) 11. Dong, C., Loy, C.C., He, K., Tang, X.: Learning a deep convolutional network for image super-resolution. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds) Computer Vision – ECCV 2014, Lecture Notes in Computer Science, vol 8692. Springer, Cham (2014) 12. Huang, J.B., Singh, A., Ahuja, N.: Single image super-resolution from transformed selfexemplars. In: Computer Vision and Pattern Recognition, Boston, MA, USA, 07–12 June 2015, pp. 5197-5206. IEEE (2015)

Automatic Visual Inspection System for Injection Molding Parts of Automobile Center Console Wenqing Chi1,2, Bin Xue1,2(&), Xiaofei Li3, Yuhang Zhang2, and Shuangben Jiao3 1 Engineering and Technology R&D Center of Mechanical and Electrical in Colleges of Shandong, Qingdao Binhai University, Qingdao 266555, Shandong, People’s Republic of China [email protected] 2 School of Mechanical and Electrical Engineering, Qingdao Binhai University, Qingdao 266555, Shandong, People’s Republic of China 3 Qingdao Zhongzhuang Vision Automation System Control Co., Ltd., Qingdao 266555, Shandong, People’s Republic of China

Abstract. For the pattern position deviation and installation error detection of injection molding parts in the automobile center console, the traditional method is to use the secondary dimensional detection equipment, which has low detection efficiency and can only realize sampling detection. In order to solve this problem, a detection method based on machine vision is proposed, which uses 4 K linear array camera with linear light source to collect the image, and the collected image is transmitted to the computer for processing. The image processing is carried out on the VisionPro 9.0 software platform. Firstly, the image of the injection molding part is corrected and the coordinate is located by the method of extracting the feature points from the image mask. Then, the script programming is used to judge. Finally, the detection of the pattern position deviation and installation error prevention on the injection molding part is realized, and the result information is displayed on the computer. Through the operation test, the accuracy of the system reaches 0.05 mm, the detection cycle is 6–10 s, the detection rate is 99.9%, the efficiency is increased by 50 times, the quality is improved by 80%, and the problems existing in the detection of the secondary detection equipment are effectively solved. Keywords: Machine vision

 Precision measurement  Mask technology

1 Introduction With the continuous improvement of people’s living standards, there are more and more cars. The overall reliability and stability of the car will directly affect the life safety of the car drivers. Therefore, the accuracy of the design of the car center console is a necessary condition for the quality of the car products. The traditional automobile center console injection molding parts detection uses the secondary dimensional

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 266–273, 2021. https://doi.org/10.1007/978-3-030-51556-0_38

Automatic Visual Inspection System for Injection

267

detection equipment, which is inefficient and can only realize sampling detection, and does not have the large-scale, full coverage detection ability. With the development of science and technology, it has become an important method to use machine vision technology to carry out high-precision size detection of workpieces in production line. Wang H. A proposes a rapid-precise measurement system based on fence image and phase correlation algorithm (PCA) [1]. Xiaojing Yang uses MATLAB software to study and deal with the collected images of micro nano component such as image preprocessing, threshold segmentation and mathematical morphology, edge detection and extraction, analysis and research [2]. Du-ming Tsai proposed a fast image alignment method using the expectation-maximization (E-M) technique [3]. TANG Song using edge detection of Canny operator to get the valve core image subpixel edge [4]. In order to solve the above problems, this paper designs an automatic visual inspection system for injection molding parts in the center console. The inspection of injection molding parts is divided into four parts: System construction, Image acquisition, Pattern offset detection and Pattern error proofing detection.

2 System Construction As shown in Fig. 1, the mechanical structure of pattern position deviation and installation of error proofing detection system for injection molded parts is composed of vision system and motion control system [5]. Vision system mainly includes industrial camera, industrial lens, industrial computer, visual light source and display, which can realize image acquisition and result display functions; Motion control system mainly includes screw slide and servo motor and servo driver, which can realize the transmit and output functions of injection parts. In order to realize the high precision linear and automatic reciprocating motion of injection molding parts, the system uses a single axis linear screw slide to convert the rotary motion into linear motion, and the maximum effective stroke of the system is 700 mm.

Fig. 1. Mechanical structure of equipment

268

W. Chi et al.

In order to acquire the high-definition image of the large-scale injection molding part of the center console, the 4 K linear array industrial camera model LA-GM04K08A-00-R is selected as the detection system [6, 7]. The distance between the lens and the object to be measured is 375 mm, the camera’s transverse field of view is 300 mm, and the longitudinal field of view is determined according to the actual needs. The lens adopts V interface high precision industrial lens specially designed for small linear array camera. The model is LD3502A, the focal length is 35 mm, and the magnification is 0.08x. After several lighting tests, FG-LN300 linear light source with high brightness, high density and high power LED particles is selected as the system light source. The task of image acquisition and image processing is completed in the Quick Build interactive development environment under the VisionPro 9.0 software platform. The collected pictures are shown in Fig. 2.

3 Image Acquisition of Injection Parts Firstly, it is need to correct the collected image and train the template image. 3.1

Image Correction

In order to improve the accuracy of image measurement, firstly, the image distortion is corrected [8, 9]. The image of the injection molding part is collected by the camera, and a calibration plate with a specification of 10 mm is selected to correct the distorted image back to the normal image through the CogCalibCheckerboardToool board. 3.2

Image Positioning

In order to detect the offset of each key image, it is necessary to accurately locate the injection molding part. After the product is placed, start the slide button, collect an image corrected by checkerboard, and use CogPMAlignTool to match the template in the module position. The system selects two circles on the injection molding part as feature points, and uses image mask editor to enhance image contrast [10]. In order to highlight the concerned pixels on the training image, the mask image uses translucent red pixels to cover the unconcerned pixels, so as to eliminate the interference factors and enhance the search accuracy. Next, train the image and find the center origin. The effect observed in Current.TrainImage form is shown in Fig. 3.

Fig. 2. Pictures of injection parts

Fig. 3. Effect picture after mask processing

Automatic Visual Inspection System for Injection

269

4 Pattern Deviation Detection of Injection Parts In order to realize the pattern offset detection, it is necessary to measure some dimensions of the pattern. It is responsible for calculating the distance between each pattern feature point and the established rectangular coordinate system on the injection molding part. The detection procedure of each injection molding part pattern includes three modules. 4.1

Establishment of Rectangular Coordinate System

According to the feature of the key edge, an intersection point is determined, and then two perpendicular lines are generated through the intersection point, which is the right angle coordinate system. There are two main shapes of the key of injection parts: (1) Establishment of rectangular coordinate system for circular injection parts According to the characteristics of the circular injection molding part, use CogFindCircleTool to set the caliper shape and position in the black and white interval area of the edge, as shown in Fig. 4. In order to fit a suitable circle, the edge 0 characteristic of the caliper is set from light to dark. After the circle finding tool obtains the coordinate information of the center of the circle, add CogCreateLineTool to fit a 90° straight line passing through the center of the circle, we can observe that there are two intersections between the straight line and the circle, select the intersection above to fit a 0° straight line to generate a rectangular coordinate system, as shown in Fig. 5.

Fig. 4. Circular Edge caliper

Fig. 5. Rectangular coordinate system of the edge of circular

(2) Establishment of rectangular coordinate system for irregular shaped injection parts In order to find the intersection of the edge feature lines of the irregular shaped injection molded parts, the system uses two CogFindLineTool to find the edge feature lines of the injection molded parts, as shown in Fig. 6. Two edge feature lines intersect at a point, and a rectangular coordinate system is established according to the intersection point, as shown in Fig. 7.

270

W. Chi et al.

Fig. 6. Edge feature caliper

Fig. 7. Rectangular coordinate system of irregular injection molding edge

According to the same principle, the rectangular coordinate system of key edge of other injection parts is established. 4.2

Pattern Size Detection of Injection Parts

After the establishment of the rectangular coordinate system, the Data module is used to detect the distance between the pattern feature points and the rectangular coordinate system. In order to measure the pattern offset, we use CogFindCircleTool and CogFindLineTool to find two feature points of the pattern, and then detect the distance between the two feature points and the coordinate axes X and Y. Setting different values for CogFindLineTool can accurately find the intersection of two features of the pattern. The distance from the detection feature point to the coordinate axes X and Y, as shown in Fig. 8.

Fig. 8. Coordinate rendering of feature points

The same principle is used to detect the distance from the pattern feature points on other keys to the established rectangular coordinate system. 4.3

Threshold Setting

After the size of image feature points to the edge is detected, the next step is to determine whether the image is offset. Since there are four distance data from the characteristic point of a single key pattern to the coordinate X and Y axis of the injection molding part, it is necessary to create a script program in the threshold setting

Automatic Visual Inspection System for Injection

271

module to judge whether these data are within the appropriate range one by one. The program mainly uses the condition selection statement in C# is used to judge for many times. Here, the average value of multiple measurement results is selected as the reference value. As long as one of the data is not within the reference value range, the center console is judged as unqualified.

5 Pattern Error Detection The system checks whether the pattern on the key is correct by creating an image error proofing module. The specific settings of the module input and output are shown in Fig. 9.

Fig. 9. Pattern error proofing module

The system selects the positioned image as the image source of the CogBlobTool speckle tool, frames the area of the speckle tool around the image on the button and runs the LastRun.BlodImag window, and the speckle effect is shown in Fig. 10. The speckled tool displays the pattern clearly.CogPMAlignTool uses the feature pattern extracted by the speckle tool, trains the image and grabs the center origin to complete the pattern template addition, as shown in Fig. 11.

Fig. 10. Effect diagram of spot processing

Fig. 11. Template pattern of training

272

W. Chi et al.

6 Operation Data and Result Analysis After the pattern deviation and error proofing detection, when all dimensions and images of the injection molded parts are correct or when the image of the injection molding part is offset or wrong, the result displayed on the computer screen is shown in Fig. 12.

Fig. 12. Display results of injection parts

After running test, the total running time of the system is one month, the total amount of detection is 4 W + , and the success rate is 99.9%. Using visual algorithm to achieve a 0.05 mm high-precision detection, the detection time of a single product is 6S * 10 s, the detection efficiency is 50 times higher than the traditional quadratic equipment, and all detection data are real-time saved in the background, which can be viewed at any time. In addition, the system has strong expansibility. The above algorithm can be slightly modified to realize the detection of various types of injection parts.

7 Conclusion The automatic vision detection system of injection molding parts in the center console of automobile is to build a machine vision system, collect images with linear camera and linear light source, and generate injection molding parts images through checkerboard correction. After image acquisition, it is processed in the VisionPro 9.0 software platform to complete the detection of each key pattern size and image error proofing. It has been proved that the system is in good condition, with high detection speed, accuracy and success rate. The working efficiency is more than 50 times of the efficiency of the traditional two-dimensional detection equipment.

Automatic Visual Inspection System for Injection

273

References 1. Wang, H., Zhao, J., Zhao, J., Song, J., Pan, Z., Jiang, X.: A new rapid-precision position measurement method for a linear motor mover based on a 1-D EPCA. IEEE Trans. Ind. Electron. (2018) 2. Yang, X., Siqi, W.: Precise detection of micro nano component based on micro machine vision. Comput. Eng. Appl. (2017) 3. Tsai, D.M., Hsieh, Y.C.: Machine vision-based positioning and inspection using expectation–maximization technique. 66.11, 2858–2868 (2017) 4. Song, T., Qihua, Y. Ganghai, L.: Valve core size sub-pixel measurement based on Halcon. Comput. Eng. Appl. (2017) 5. Hu, Y., Long, Z., Alregib, G.: A high-speed, real-time vision system for texture tracking and thread counting. IEEE Signal Process. Lett. 25(6), 758–762 (2018) 6. Zhao, X., Zhou, P., Xue, M.: A kind of linear array camera field self calibration method for electro-optical vertical target system. Opto-Electron. Eng. (2016) 7. Wu, P., Wang, Y.J., Sun, H.H.: Calibration method for linear array camera of intersection measurement system. Guangzi Xuebao/Acta Photonica Sinica 45(6) (2016) 8. Wang, M., Zhu, Y., Jin, S., Pan, J., Zhu, Q.: Correction of ZY-3 image distortion caused by satellite jitter via virtual steady reimaging using attitude data. ISPRS J. Photogramm. Remote Sens. 119, 108–123 (2016) 9. Yang, W., Chen, J., Liu, W., Wang, P., Li, C.: A modified three-step algorithm for TOPS and sliding spotlight SAR data processing. IEEE Trans. Geosci. Remote Sens. 55(12), 6910– 6921 (2017) 10. Huang, C.Q., Yang, S.M., Pan, Y.: Object-location-aware hashing for multi-label image retrieval via automatic mask learning[J]. IEEE Trans. Image Process. (2018)

Efficient Clustering Algorithm in Dynamic Nearest Neighbor Selection Model Jingxin An(&) Information Engineering Department, Shandong Vocational College of Light Industry, Zibo 255300, Shandong, China [email protected]

Abstract. In dynamic nearest neighbor selection model, big data embodies the preference of network users, in order to improve the adaptive recommendation ability of network big data, an efficient clustering model of dynamic nearest neighbor model is proposed based on fuzzy C-means scheduling and dynamic search. The dynamic nearest neighbor selection model big data transfer model is constructed by nonlinear time series analysis method, and the association rule feature quantity which reflects the big data feature of the dynamic nearest neighbor selection model is extracted. The information retrieval and fuzzy scheduling of the dynamic clustering feature quantity are carried out by using the association information annotation method, and the big data attribute classification of the dynamic nearest neighbor feature quantity is carried out by using the fuzzy C-means clustering method. The adaptive information fusion and feature extraction are combined to realize the optimal clustering of big data in the dynamic nearest neighbor selection model to improve the ability of data screening and dynamic recognition. The simulation results show that the proposed method has better accuracy, lower misclassification rate and better global convergence of the whole dynamic clustering process. Keywords: Dynamic nearest neighbor selection model Feature extraction  Information fusion

 Data clustering 

1 Introduction In the big data information base, it is necessary to manage the big data information dynamically, and combine the database and cloud storage system to optimize the big data scheduling [1]. In the process of constructing dynamic nearest neighbor selection model, it is necessary to carry out data optimization clustering and attribute feature analysis for big data in dynamic nearest neighbor selection model, and combine cloud computing and cloud storage technology to realize data classification and clustering analysis [2, 3]. In reference [4], a data clustering algorithm based on multi-layer spatial fuzzy subtraction clustering is proposed. The large database sampling method in the dynamic nearest neighbor selection model of graph model is adopted to realize the attribute clustering of data and to improve the ability of data integration scheduling and information clustering. In reference [5], a data clustering method based on spatial © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 274–279, 2021. https://doi.org/10.1007/978-3-030-51556-0_39

Efficient Clustering Algorithm in Dynamic Nearest Neighbor Selection Model

275

pairing-based dynamic nearest neighbor selection model was proposed. In order to solve the above problems, a dynamic nearest neighbor model (big data) based on fuzzy C-means scheduling and dynamic search is proposed in this paper. The dynamic nearest neighbor selection model transfer model is constructed by nonlinear time series analysis method. The big data attribute classification of the dynamic nearest neighbor feature quantity is carried out by using the fuzzy C-means clustering method. The adaptive information fusion and feature extraction are combined to realize the optimal clustering of big data in the dynamic nearest neighbor selection model. Finally, the performance test shows the superior performance of this method in improving the data clustering ability in the dynamic nearest neighbor selection model.

2 Information Model Construction and Feature Preprocessing of Big Data Feature in Dynamic Nearest Neighbor Selection Model 2.1

Construction of Dynamic Nearest Neighbor Selection Model

In order to realize the optimization search of big data in dynamic nearest neighbor selection model [6–8], Firstly, the nonlinear time series analysis is used to construct the dynamic nearest neighbor selection model feature information model, a dynamic neighbor selection model is obtained: 8 m m P m P P > > bk  12 zj zk bj bk ðyj  yk Þ > max > < j¼1 k¼1 k¼1 m P > s:t: zk bk ¼ 0 > > > k¼1 : 0  bk  vðyk ÞDk ¼ 1; 2;    ; m

ð1Þ

Where, bk ðyj  yk Þ is the weighted coefficient of the maximum gradient difference of the big data distribution of the dynamic nearest neighbor selection model. The semantic directivity of the big data information of the dynamic nearest neighbor selection model is used as the information clustering center vector [9, 10]. The decision formula of the feature clustering of the dynamic nearest neighbor selection model big data is described as follows: x ¼

m X

bk zk yk

ð2Þ

k¼1

According to the above clustering rules, the reconstruction vector model of network users’ similarity information is constructed by phase space reconstruction method as follows:

276

J. An

X ¼ ½xðt0 Þ; xðt0 þ DtÞ;    ; xðt0 þ ðK  1ÞDtÞ 2 xðt0 Þ xðt0 þ DtÞ 6 xðt0 þ JDtÞ xðt0 þ ðJ þ 1ÞDtÞ 6 ¼6 .. 6 4 .  xðt0 þ ðm  1ÞJDtÞ xðt0 þ ð1 þ ðm  1ÞJÞDtÞ

3  xðt0 þ ðK  1ÞDtÞ    xðt0 þ ðK  1ÞDt þ JDtÞ 7 7 7 .. 7 5 .   xðt0 þ ðN  1ÞDtÞ ð3Þ

In the formula, xðtÞ represents the tilt factor of information flow in the dynamic nearest neighbor selection model database, J is the total number of clustering data of the dynamic nearest neighbor selection model, and m is the dimension of phase space reconstruction of the dynamic nearest neighbor selection model. Thus, a dynamic nearest neighbor selection model based on data clustering is constructed as shown in Fig. 1.

Dynamic nearest neighbor selection model

Data preprocessing

Pattern discovery

Data Fusion

Conformity pattern

N

Y Cluster output

Fig. 1. Dynamic nearest neighbor selection model based on data clustering

2.2

Feature Extraction of Association Rule

The process of feature extraction of access state information of dynamic nearest neighbor selection model is divided into the following five parts: (1) The information flow vectors x and xn þ s of the large dynamic nearest neighbor selection model in the dynamic nearest neighbor selection model are investigated, and C value is selected to determine the total number of clusters of data access. If the data set is m, let Aj ðLÞ be the fuzzy clustering center of multi-layer space, where j ¼ 1; 2; . . .; k, and the distance of vector locus in the feature space is expressed by Euclidean distance.

Efficient Clustering Algorithm in Dynamic Nearest Neighbor Selection Model

277

(2) The cluster center vector is adjusted with variable scale in the data set, and the two dynamic nearest neighbor selection models access time t and t þ s are associated with the initialization cluster center Fðxi ; Aj ðLÞÞ, i ¼ 1; 2; . . .; m, j ¼ 1; 2; . . .; k. (3) The correlation dimension feature extraction method is taken, the clustering density features of the data attributes assigned to the remaining clusters are obtained as: min Q

 1 Qj Pj 2 þ lkQk X X F 2

ð4Þ

(4) The average value of the query category SðtÞ is used as the cluster average of the next data clustering iteration: CðlÞ ¼

nj k X X

ðjjxkj  Aj ðLÞjjÞ2

ð5Þ

j¼1 k¼1

(5) By using the central limit duality principle, some l value is obtained, and the data clustering centers are obtained under the condition of independent dependent variables being unconstrained: k  X Aj ðL þ 1Þ ¼ 1 nj Xij j ¼ 1; 2; . . .; k

ð6Þ

i¼1

With the above method, the closeness degree function of the fuzzy set of the least square circle center is constructed, and the Gaussian distribution is used to perturb it to replace the operation of randomly producing the new frog individual, and to complete the feature extraction of the access state information of the dynamic nearest neighbor selection model.

3 Data Clustering Optimization Firstly, the fuzzy C-means clustering algorithm is described, and it is assumed that there are finite data sets in the dynamic nearest neighbor selection model: X ¼ fx1 ; x2 ;    ; xn g  Rs

ð7Þ

According to a distance function, the state information data set in dynamic nearest neighbor selection model access is divided into C categories, where the initial clustering center of sample xi , i ¼ 1; 2;    ; n is:

278

J. An

xi ¼ ðxi1 ; xi2 ;    ; xis ÞT

ð8Þ

When all the individuals are allocated, the attribute value X in the cluster number is classified into class c, where 1\c\n, and the classification termination condition is defined as: V ¼ fvij ji ¼ 1; 2;    ; c; j ¼ 1; 2;    ; sg

ð9Þ

Where, Vi is the first vector of the cluster center in the visiting process of the dynamic nearest neighbor selection model, the total number of clusters is determined, and the fuzzy partition matrix of the attributes of the dynamic nearest neighbor selection model is obtained as follows: U ¼ flik ji ¼ 1; 2;    ; c; k ¼ 1; 2;    ; ng

ð10Þ

When the initial value of the cluster center is known, the optimal fitness solution is obtained by setting the iteration times and combining with the ambiguity index m as the final result of the clustering solution.

4 Simulation Experiment and Result Analysis The computer of the experiment platform uses Intel i5-3230 M 2.6 GHz dual core. CPU, MATLAB simulation software for mathematical programming, the first data clustering parameters initialization settings. The initial parameters of dynamic data clustering are set as Gmax ¼ 30, D ¼ 12, c ¼ 3, NP ¼ 30. The number of data sampling in the selection model of state nearest neighbor is 1024, the period of data sampling is T = 12 s, the data clustering algorithm runs 100 times, the center of dynamic clustering is ½x; y; z ¼ ½1; 0; 1, the iteration step is h ¼ 0:01, according to the above parameters, the multi-layer vector space reconstruction is used to decompose the sampled dynamic nearest neighbor selection model to access the information state. In order to verify the superiority of this method, the method of this article is compared with the methods of [4] and [5]. The result is shown in Fig. 2. The results show that the accuracy of big data search in the dynamic nearest neighbor selection model is 100 after 4 steps search, the ability of feature mining is improved by 12.43% on average, and the computational cost is shortened by 21.89%, the dynamic nearest neighbor clustering error rate in the selection model is low, which indicates that the accuracy of clustering is high.

Efficient Clustering Algorithm in Dynamic Nearest Neighbor Selection Model

279

0.45 0.4 Method in reference[4]

0.35

Proposed method

0.3

Method in reference[5]

BER

0.25 0.2 0.15 0.1 0.05 0 -10

-8

-6

-4

-2 0 SNR/dB

2

4

6

8

10

Fig. 2. Comparison of data clustering performance

5 Conclusions In this paper, an efficient clustering model of dynamic nearest neighbor model is proposed based on fuzzy C-means scheduling and dynamic search. The simulation results show that the proposed method has better accuracy, lower misclassification rate and better global convergence of the whole dynamic clustering process.

References 1. Sun, L., Guo, C.H.: Incremental affinity propagation clustering based on message passing. IEEE Trans. Knowl. Data Eng. 26, 2731–2744 (2014) 2. Ling, C.G., Wang, H.Z.: Optimization research on differential evolution algorithm and its application in clustering analysis. Modern Electron. Technol. 39, 103–107 (2016) 3. Li, M.D., Zhao, H., Weng, X.W.: Differential evolution based on optimal gaussian random walk and individual selection strategies. Control Decis. 31, 1379–1386 (2016) 4. Cattivelli, F.S., Sayed, A.H.: Distributed detection over adaptive networks using diffusion adaptation. IEEE Trans. Signal Process. 59, 1917–1932 (2011) 5. Chutani, A., Sethi, S.P.: Optimal advertising and pricing in a dynamic durable goods supply chain. J. Optim. Theory Appl. 154, 615–643 (2012) 6. Bi, A.Q., Dong, A.M., Wang, S.T.: A dynamic data stream clustering algorithm based on probability and exemplar. J. Comput. Res. Dev. 53, 1029–1042 (2016) 7. Jiang, Y.Z., Chung, F.L., Wang, S.T.: Collaborative fuzzy clustering from multiple weighted views. IEEE Trans. Cybern. 45, 688–701 (2015) 8. Yuille, A.L.: Feature extraction from faces using deformable templates. Int. J. Comput. Vision 8, 99–111 (1992) 9. Benediktsson, J.A.: Classification and feature extraction for remote sensing images from urban areas based on morphological transformations. IEEE Trans. Geosci. Remote Sens. 41, 1940–1941 (2003) 10. Deng, Z.L.: New approach to information fusion steady-state kalman filtering. Automatica 41, 1695–1707 (2005)

Marketing Strategy of Knowledge-Based Virtual Community Zhi Li(&) Department of Journalism Studies, The University of Sheffield, South Yorkshire, UK [email protected]

Abstract. The quality of the marketing strategy plays a vital role in the operation of the company’s products. Now that the Internet is developing rapidly, social media has also gained a lot of room for development, and virtual communities have emerged in this context. Combining product marketing with virtual communities has become a hot topic of research. Therefore, this paper proposes the marketing strategy research of knowledge-based virtual communities. Considering the information dissemination of virtual communities, this article introduces the theory of communication, and analyzes the communication process with theories of emotional interaction ritual, interactive communication, and social exchange. By investigating consumer consumption patterns in the virtual community, a corresponding mathematical model is established. The results show that if companies want to achieve good sales results, they must focus on improving community reputation, product quality, and maintaining the relationship between dealers and customers. Through good word-of-mouth and excellent product quality, the use of community functions can successfully transform community members into marketers of the product, greatly improving the visibility and sales of the product in the community. Keywords: Knowledge-based virtual community Marketing value  Marketing strategy

 Communication theory 

1 Introduction With the continuous improvement of the economy brought about by the reform and opening up, people’s living standards are also constantly improving. The so-called virtual community is only a place where a group of people with the same interests or needs gather, and this group contacts through the network. With the advent of 5 g technology, the era of interconnection of all things has also been greatly supported. Through the connection of Internet platform, the marketing mode also ushered in a new dawn. Therefore, it has high commercial value to study the marketing scheme of knowledge-based virtual community. With the social nature of the Internet, researchers have made great achievements in the research of virtual community. In [1, 2], the author studied the use of virtual communities of practice to improve professional cooperation and education. The literature explored the use of virtual communities by health and social care practitioners © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 280–285, 2021. https://doi.org/10.1007/978-3-030-51556-0_40

Marketing Strategy of Knowledge-Based Virtual Community

281

to determine their potential in cross professional education and cooperation. In [3, 4], the authors designed courses to shape professional social media skills and identities in the virtual practice community. The ability to practice social media and pedagogy that combines this ability has not been well established. In [5–7], the authors studied the growing relationship of social networks to the healthcare virtual community. Of course, research in marketing strategies has always been favored by researchers. In [8–10], the authors studied upstream social marketing strategies: an integrated marketing communication method, including research and determination of target audiences, channel selection and integration, strategic message creation, and measurement and control. Although the existing marketing methods have achieved some results, there are still many shortcomings. First, traditional marketing methods are inefficient and spread too slowly. Second, user adhesion is not high. Third, the type of marketing crowd and the number of customers are limited, and the marketing effect is not good. The existence of virtual communities can better make up for the above shortcomings. Aiming at the problems of low efficiency and low user adhesion and poor marketing effect of existing marketing methods, this paper proposes a marketing strategy for a knowledge-based virtual community through extensive data collection and research. By introducing communication theory into the marketing method of the knowledge-based virtual community, user adhesion has been greatly improved, and product marketing results have been good.

2 Method 2.1

Knowledge Based Virtual Community

The so-called knowledge type actually means that there is knowledge sharing in the community. The main body of knowledge sharing is naturally the crowd, and the shared knowledge also has many aspects, such as explicit knowledge sharing, that is, directly presenting the theory, but also implicit knowledge sharing. In this study, knowledge-based virtual community means that individuals share their explicit or implicit knowledge with others in the community. 2.2

Communication Process of Network Marketing Communication

(1) Motive mechanism——the theory of emotional interaction ritual Sociologist Collins proposed the theory of emotional interaction rituals, which argues that all communication in human interaction is ritual-mediated. These rituals involve symbolic expressions of group emotions, individual postures and opinions, relationship identifiers such as a sense of moral justice, and so on. Interactive rituals generate emotional energy, which is the real motivation for interaction. The exchange of word-of-mouth information includes emotional interaction. The company stimulates consumer interest through consumer interest rituals and awakens the emotions that consumers continue to pay attention to.

282

Z. Li

(2) Essential Features——Interactive communication theory Interactive communication means that the media acts as both a correspondent and a receiver. There are no restrictions between the media and the audience. In different communication cycles and links, some exchanges can be realized. Interactive marketing is paying more and more attention to the use of various media, the use of modern advanced information technology, and interactive marketing based on the Internet. 2.3

Marketing Strategy of Knowledge-Based Virtual Communities

(1) Select the right customers for precision marketing activities. Take multiple measures to collect and analyze customer information, and further fine-grained customer types to find the right consumer group. (2) Make full use of community sharing and interaction for word-of-mouth marketing. Use virtual community platforms to share resources and exchange information with customers. For an emerging brand, the virtual community is probably the most concentrated of a large number of word-of-mouth reviews, and word-ofmouth effects spread through the Internet. Taking prizes as bait, attracting trial users to share product experience, leading consumers to spread word of mouth, and improving the visibility and reputation of the product network to a certain extent. In the process of paying attention to this brand, netizens in the virtual community will pay attention to the word-of-mouth evaluations of other customers about this brand or product. In this way, the brand will get a higher degree of attention. The effect of marketing has achieved certain results.

3 Experiment In order to provide more scientific marketing programs of virtual communities, this paper will introduce several consumption behavior patterns of community members in virtual communities. First, AIDMA model: this model has five processes: first, to attract attention, then to generate interest, then to generate desire, then to form memory, and finally to generate purchase behavior. See Fig. 1 for the model.

Attention

Interest

Desire

Memory

Action

Fig. 1. AIDMA model

With the use of network engine, there are many ways to acquire knowledge. However, too much information is not all true. We often need to spend more time to distinguish the true and false information. Therefore, the emergence of virtual community solves this problem. Through the platform of virtual community, consumers can

Marketing Strategy of Knowledge-Based Virtual Community

283

share consumption information, and experience sharing has become the norm. The emergence of virtual community has changed the traditional consumption mode. Through information sharing, people can better choose their favorite products. The second model is the FIIAS model. The process of this model is: first, people pay attention to the topics they are interested in in in the community, then generate interest, and then interact with other members to generate purchase behavior after satisfaction, and then share their shopping experience in the virtual community after purchase. See Fig. 2 for the model.

Focus

Interest

Interact

Action

Share

Fig. 2. FIIAS model

4 Result Through the investigation, we find that the two kinds of consumption behavior patterns in the knowledge-based community, compared with the traditional marketing strategy, greatly improve the sales of products and services. In the model, the platform of virtual community becomes a credible platform. Members of the community understand the information and quality of products through information exchange and experience sharing. Before buying, consumers communicate with other members who have bought the product to buy the product they want. Therefore, this kind of marketing scheme based on knowledge community has great commercial value. The knowledge-based virtual community marketing strategy proposed in this article is used to market a cosmetic product to verify the effectiveness of the method proposed in this article. Using the method mentioned in this article and the traditional marketing method for cosmetics marketing, the sales volume of a cosmetics product for six months is compared, as shown in Fig. 3. As can be seen from Fig. 3, the sales volume of cosmetics in the traditional marketing method was 2016 in half a year, and the sales volume in the knowledge-based virtual community marketing model was 6,027, which has nearly doubled. In addition, in the virtual community, the customer’s adhesion has also been greatly improved, which also shows that the marketing strategy mentioned in this article has certain effectiveness. In order to further understand the customer’s evaluation of the marketing strategy of the knowledge-based virtual community, a questionnaire survey was conducted on 200 customers. The results of the survey are shown in Table 1. As can be seen from Table 1, 66% of the customers surveyed were satisfied with the effectiveness of the marketing strategy of the knowledge-based virtual community. 23% of customers think the effect is general, only 11% are not satisfied with the current situation. This shows that the method proposed in this article is supported by most

284

Z. Li

Fig. 3. Sales volume comparison between two marketing methods Table 1. Customer evaluation of marketing effectiveness of virtual communities Satisfied General Dissatisfied Number of people 132 46 22 Proportion 66% 23% 11%

people, but it is also important to note the opinions of dissatisfied people. In subsequent research, we need to improve based on this part of deficiencies.

5 Conclusion The traditional Internet marketing is just blind product advertising on the Internet, enterprises often need to spend a high amount of advertising costs but the effect is not high. Different from the traditional Internet marketing strategy, the marketing strategy based on knowledge-based virtual community can not only reduce the cost of advertising, but also provide targeted advertising to the community members who need it, and each member is likely to become a potential marketing member of the product, which is often worth several times more than the traditional marketing. This article introduces communication theory into marketing strategies based on virtual communities. By analyzing the dynamic mechanism and essential characteristics of the communication process of network marketing communication, the marketing effect is better improved in the actual marketing process, which provides a reference for the research in related fields.

Marketing Strategy of Knowledge-Based Virtual Community

285

References 1. McLoughlin, C., Patel, K.D., O’Callaghan, T., et al.: The use of virtual communities of practice to improve interprofessional collaboration and education: findings from an integrated review. J. Interprof. Care 32(2), 136–142 (2018) 2. Pathak, X., Pathak-Shelat, M.: Sentiment analysis of virtual brand communities for effective tribal marketing[J]. J. Res. Interact. Mark. 11(1), 16–38 (2017) 3. Chiu, C.M., Huang, H.Y., Cheng, H.L., et al.: Driving individuals’ citizenship behaviors in virtual communities through attachment. Internet Res. 29(4), 870–899 (2019) 4. Berthaud, S., Mason, S.: Embedding reflection throughout the postgraduate translation curriculum: using Communities of Practice to enhance training. Interpret. Trans. Train. 12 (4), 388–405 (2018) 5. Antonacci, G., Colladon, A.F., Stefanini, A., et al.: It is rotating leaders who build the swarm: social network determinants of growth for healthcare virtual communities of practice. J. Knowl. Manag. 21(5), 1218–1239 (2017) 6. Brueller, N.N., Carmeli, A., Markman, G.D.: Linking merger and acquisition strategies to postmerger integration: a configurational perspective of human resource management. J. Manag. 44(5), 1793–1818 (2018) 7. Zhu, G., Gao, X.: Precision retail marketing strategy based on digital marketing model. Sci. J. Bus. Manag. 7(1), 33–37 (2019) 8. Key, T.M., Czaplewski, A.J.: Upstream social marketing strategy: An integrated marketing communications approach[J]. Bus. Horiz. 60(3), 325–333 (2017) 9. Mao, Z., Feng, B., Liu, W., et al.: Choice of mixed opaque marketing strategy of OTA. Syst. Eng.-Theory & Pract. 38(3), 655–664 (2018) 10. Taecharungroj, V.: Starbucks’ marketing communications strategy on Twitter. J. Mark. Commun. 23(6), 552–571 (2017)

Two-Way Recommendation System for Intelligent Employment of College Students Based on Data Mining Yifan Zhang, Qian Liu(&), and Qingpeng Meng School of Liaoning Institute of Science and Technology, Benxi, China [email protected]

Abstract. Based on big data and the new era, the information employment service technology revolution in China’s smart universities brought about by high-tech applications such as mobile internet, internet of things and cloud computing has put forward new technological transformation points and demands for the construction of the ideology of information service for smart employment and the mode of employment, work and life of Chinese college students. In order to make the employment of college students and the recruitment of enterprises more efficient, we have designed a “two-way recommendation system for intelligent employment of college students” by means of data mining and other means, so as to achieve the effect of intelligent integration, reorganization and intelligent sharing of high-quality relevant employment resources and improve the efficiency of employment services for college students [1]. Keywords: Data mining

 Smart employment  Recommendation system

1 Introduction In recent years, due to the rapid economic development and the high attention and rapid development of higher education in contemporary China, the employment problem has become a matter of great concern to the public [2]. At present, the employment rate of college students has dropped year after year, and the employment market situation is very grim. In addition, the members of our project team also conducted a sample survey and consulted a large number of historical data, and found the following reasons for the employment difficulties of college students. (1) The employment market is not perfect. There are many unsound problems in the current job market. The employment market information lags behind, the talent market cannot efficiently and reasonably solve the problem, and the employment information of college students and the market cannot fully match. The emergence of the network talent market platform alleviates the problem of the lag of the talent market [3, 4]. It connects college graduates and employers conveniently, and is of great benefit for obtaining employment information in a timely manner. However, due to the uncertainty and © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 286–292, 2021. https://doi.org/10.1007/978-3-030-51556-0_41

Two-Way Recommendation System for Intelligent Employment

287

virtuality of the network market, there are also some hidden dangers in the information of the network employment market. (2) The disconnection between universities and the job market. At present, some colleges and universities set up unreasonable courses for universities, and their majors are out of touch with the job market, which leads to the fact that college students are unable to apply what they have learned well in society, and the unemployment rate of college students in their first employment is high [3]. (3) The employing unit lacks scientific selection and employment standards. At present, the biggest problem in the social employment market is the lack of scientific selection and employment standards, and employers do not have perfect recruitment standards [5], which will make the level of personnel employed do not match the ability required by the post [6]. Some small and medium-sized enterprises only strictly require their own high academic qualifications, instead of starting from the perspective of their actual development needs. Most large enterprises pay too much attention to the practical experience of enterprise work when recruiting talents. However, one of the biggest disadvantages of general enterprise college students is that due to the lack of enterprise social work experience, employers often ignore the development potential of general college students and the two major advantages that general college students have high level of mastery of enterprise theoretical knowledge, abundant energy and are more likely to be incompetent in enterprise practical management. In response to these phenomena, we have designed a “two-way recommendation system for intelligent employment of college students based on data mining”. through data mining, the system will make optimal recommendations to both college students and recruitment enterprises, thus achieving win-win results for enterprises, colleges and graduates.

2 Brief Introduction of the System Under the current grim employment situation, we have conceived a “two-way recommendation system for intelligent employment of college students”. Through data collection and technical means, the system carries out crawler acquisition, data collection, data cleaning and data classification on the data of major recruitment websites on the Internet, generates a large amount of data and writes the data into a database to form enterprise recruitment information data; The basic information and job-seeking information data of job-seeking college students are obtained through user registration, and accurate matching employment information is provided for college students [7]. In response to these phenomena, we have designed a “two-way recommendation system for intelligent employment of college students based on data mining”. through data mining, the system will make optimal recommendations to both college students and recruitment enterprises, thus achieving win-win results for enterprises, colleges and graduates.

288

Y. Zhang et al.

3 System Requirements Analysis Faced with the increasing number of graduates year by year and the mixed employment market, many college students cannot find suitable jobs, which makes learning useless and makes colleges and universities fall into the dilemma of low employment rate of fresh graduates. According to the needs of student users and enterprise users, we have designed the following functions macroscopically. 3.1

Individual User Requirements Design

For individual users, individual users look for basic company information and recruitment information. We will provide them with search functions for relevant information. These functions will also provide them with basic analysis of relevant charts and data. We will analyze and explain specific modules. 3.2

Enterprise User Requirements Design

In terms of enterprise users, we need to provide the functions required by the enterprise, including the following functions, modification of personal basic company information, submission of recruitment information, review of information of job seekers, search for suitable job seekers, and issue interview invitations. We will analyze and explain the specific modules.

4 System Design and Implementation 4.1

System Architecture

The system architecture is divided into the following three modules. The first module is the overall architecture of the system and is responsible for the process design of personalized recommendation. The bottom layer of the first module is the collection of various types of user features, including mysql, mongodb and oracle database applications. The second module sets the traffic quantity for offline operation of the system, connects the gateway well in advance, loads the fixed page, and after the user logs in, can directly display the page loaded well in advance, thus improving the user experience, accelerating the software speed and reducing useless memory. The third module is the online algorithm of the system, including data transfer, storage, preprocessing, precise sorting and other operations. In the middle, the filter module gets the final ranking for recommendation. As shown in Fig. 1, Fig. 2, Fig. 3.

Two-Way Recommendation System for Intelligent Employment

Fig. 1. System function architecture diagram.

Fig. 2. System function architecture diagram.

289

290

Y. Zhang et al.

Fig. 3. System function architecture diagram.

4.2

System Function Design

The functional structure of the system is divided into background and foreground. The background is mainly used for administrator maintenance, student maintenance and enterprise maintenance. The administrator maintains the following three data: Basic data: including graduate school information, address information, occupation category, professional information, news release information. Business data: including student resumes and employment statistics. Query statistics: including student resume list and recruitment position statistics. Student maintenance: (1) (2) (3) (4)

Publish resume. to apply for a job. Resume delivery record. Maintenance of registration information.

Enterprise maintenance: (1) the recruitment positions released by the enterprise. (2) enterprise registration information. The front desk is responsible for browsing websites, registering students and businesses. Front desk function: (1) Browse the website. (2) Student registration. (3) Enterprise registration.

Two-Way Recommendation System for Intelligent Employment

4.3

291

System Data Access Optimization

In order to make the “two-way recommendation system for intelligent employment of college students based on data mining” more perfect and reliable, we have adopted the following methods to further optimize the data. (1) Data Acquisition We have realized real-time crawler analysis and acquisition of interview data of major well-known recruitment information websites on the Chinese Internet by using python technology. We have successively conducted big data analysis and collection, data analysis and cleaning, and data aggregation and classification for all crawled data by using the latest Python mobile operating system software technology. We have successively conducted cluster analysis for the crawled recruitment data by using k-means through the latest improved data aggregation and classification data segmentation analysis algorithm, and then conducted secondary employment orientation recommendation for recruitment user data by using data prediction optimization algorithm. (2) Cluster Analysis of College Students Although the system can classify students and enterprises by industry and specialty and further make two-way recommendation, students of the same specialty also have different emphases in different directions and differences in dominant skills among different students. Different enterprises in the same industry also have different demands for talents in the same position, so it is very necessary to classify college students in a more scientific and detailed way. We plan to use clustering algorithm in unsupervised learning to carry out clustering analysis on college students [8], including classification k-means functional clustering analysis algorithm based on density division functional clustering, hierarchical functional clustering analysis algorithm, diana, birch, cure, density-based functional clustering analysis algorithm, mdca, and find out the best functional clustering analysis algorithm recommended by Chinese college students when they apply for jobs through feedback clustering selection method in the analysis results as the main functional clustering analysis algorithm of the whole system [9]. (3) Improvement of two-way recommendation algorithm based on conventional recommendation algorithm and fusion of various recommendation algorithms. Since different recommendations have their own advantages and disadvantages, our solution is to set up a training sample first, then by comparing each user’s preevaluation of the system’s recommendation prediction results, whether it is consistent with the pre-evaluation of the whole system, automatically generate a weighted sample model according to the recommendation results obtained from each training sample, and dynamically adjust the sample weight in real time [10].

292

Y. Zhang et al.

5 Conclusion The “two-way recommendation system for intelligent employment of college students based on data mining” provides a win-win solution for enterprises and college students through data mining based on certain data. To a certain extent, it has solved the social problems of non-use, non-use, even idleness and waste of human resources in enterprises. To sum up, this project has positive practical significance for the personal career development of college students and the retention of talents by employers, and it is also of great significance for promoting the employment of college students. Acknowledgments. This work was financially supported by Liaoning University of Science and Technology 2020 Innovation and Entrepreneurship Training Program for College Students, Twoway Recommendation System for Intelligent Employment of College Students Based on Data Mining, Project Number: 202011430071.

References 1. Lei, F.: Research on intelligent employment service push platform for college students based on intelligent terminal. Comp. Knowl. Technol. Acad. Exch. 2X, 69–70 (2015) 2. Dongmao, W.: Research on system reform and employment behavior of college graduates. Educ. Econ. Manag. (2008) 3. Yao, C., Tiantian, W.: Analysis of the employment situation of chinese college students 4. Jie, Y.: Analysis of current employment situation of college students. J. Weinan Norm. Univ. (2010) 5. Zhiyu, L.: Comprehensive analysis of employment problems of college students. The second half of the new west (2019) 6. Xia, Z.: An analysis of employment difficulties of college students and enterprises and countermeasures. Mod. Econ. Inf. (02) (2016) 7. Hao, L.: Design and implementation of web-based precision employment service system for college students. Shandong University (2016). TP311.52; TP393.09 8. Xiujuan, S.: Analysis and research on K-means clustering algorithm based on genetic algorithm. Master Degree Thesis of Shandong Normal University 9. Lixin, Tang, Baihou, Yang, Mengguang, Wang: Genetic algorithm improved K- average algorithm in clustering analysis. Math. Stat. Appl. Probab. 12(4), 350–356 (1997) 10. Bo, J., Yangdong, Y., Hongxing, L.: Taxi cluster recognition algorithm based on sample weight. Comput. Appl. (5) (2013)

Investigation on Knowledge Reduction and Rule Fusion Based on Probability Graph Model Yun Duan1, Hongbo Ouyang2, and Sheng Duan1(&) 1

2

Xiangnan University, Chenzhou 423000, Hunan, China [email protected] China Post Group Co., Ltd, Chenzhou 423000, Hunan, China

Abstract. With the complexity of social things, the uncertainty of things is also increasing, the study of fuzziness and uncertainty can effectively promote social development. Knowledge reduction and rules in rough set can realize the research and analysis of uncertain things, but in the current situation, the separation of the two hinders the in-depth study of uncertain things. The probabilistic graph model has realized the effective combination of probability theory knowledge and graph theory knowledge, can realize the effective processing of various variables, and provides a new solution for the study of knowledge reduction and rule fusion. The purpose of this paper is to study the fusion of knowledge reduction and rules with the help of probability graph model, so as to promote the continuous expansion of their practical application. Based on the probabilistic graph model, this paper first discusses the concepts of probabilistic graph model, knowledge reduction and decision rules, then proposes a fusion algorithm based on the existing research data, and finally verifies and analyzes the algorithm through experiments, proving the correctness of the algorithm. The experimental results show that the proposed fusion algorithm based on the probabilistic graph model solves a series of problems in knowledge reduction and rule fusion, and promotes the efficient fusion of knowledge reduction and decision rules. Keywords: Probability graph model  Knowledge reduction  Decision rules  Rough set

1 Introduction With the continuous progress of knowledge and technology, the application of rough set theory in various fields of society is expanding. Rough set theory can realize accurate analysis of fuzzy data under the background of insufficient data prior knowledge, and has been applied in deep learning, data mining, decision analysis and other fields. The most important components of rough set theory are knowledge reduction and decision rule knowledge. The fusion of the two can further promote the in-depth development and improvement of rough set theory, thus expanding the practical application range of rough set. The fusion of traditional knowledge reduction and decision rule research model has certain limitations, the probabilistic condition © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 293–298, 2021. https://doi.org/10.1007/978-3-030-51556-0_42

294

Y. Duan et al.

probability graph model of independence and the separation of graph theory, can describe the uncertain problem, which corresponds with the characteristics of the advantages of rough set, for the integration of knowledge reduction and decision rule between research provides a scientific solution. Probabilistic graph model can help to explain some uncertain problems. In recent years, scholars at home and abroad have paid more and more attention to it. In [1], the author discusses the concept of probability graph model, the markov network and bayesian network algorithm are calculated on the basis of the similarity of the two parameters is obtained, and then introduces element piece of concepts in probability graph model, realize the fast dimension reduction of graph model, so as to realize the optimization of the probability graph model algorithm; In [2], the author first discusses the matrix decomposition of the probabilistic graph model, and points out the advantages of the model matrix in establishing the interrelation between vectors, and then introduces it into the personalized recommendation system. In [3], the author classifies the probability graph model into directed and undirected, and applies the directed graph model to the optimization of community algorithm. Scholars at home and abroad have also conducted relevant researches on knowledge reduction and decision rules. In [4], based on the rough set theory and taking the decision system as the starting point, the author proposed an algorithm to automatically obtain rules by using braided recognition matrix and braid function, which can effectively mine knowledge reduction and rules. In [5], the author studies the minimum rule from the decision table with the help of rough set, and finally obtains the heuristic algorithm of knowledge reduction and decision rule acquisition. In [6], the author proposes a direct accounting method for knowledge reduction, which simplifies the reduction work between information system and decision table. To sum up, existing researches usually conduct independent research on knowledge reduction and decision rules, focusing on the data mining and acquisition of the two, and rarely involving the fusion of the two. Based on the probability graph model, this paper first discusses the concept of probability graph model, knowledge reduction and decision rules, then proposes a fusion algorithm based on the existing research data, and finally verifies and analyzes the algorithm through experiments, proving the correctness of the algorithm [7, 8]. The research in this paper not only helps to realize the fusion of knowledge reduction and rules, but also lays a theoretical foundation for future related researches [9, 10].

2 Method As mentioned above, the directed graph model of the probabilistic graph model, namely the bayesian network, can establish the corresponding dependency relationship between specific conditions of different vectors. In order to realize the fusion of knowledge reduction and decision rules, we must first establish the corresponding relationship between the two, and then realize the deep fusion of the two on the basis of the relationship. Therefore, this paper studies the fusion of knowledge reduction and decision rules by means of bayesian algorithm. Bayesian algorithm is a common classification method in statistics, which can realize the classification of knowledge.

Investigation on Knowledge Reduction and Rule Fusion

295

In essence, bayesian algorithm is to infer the prior probability based on its existing experience and knowledge, and then adjust the probability according to the new evidence. The common formula of bayesian algorithm is:   PðBjAÞPðAÞ ð1Þ PðABÞ ¼ PðBÞ In formula (1), P (A) and P (B) respectively represent the prior probability of A and B, P (A|B) represents the conditional probability of A after the occurrence of B, and P (B|A) represents the conditional probability of B after the occurrence of A. On this basis, a naive bayesian model is formed. The specific model is as follows: PðX1; X2; . . .; XnÞ ¼

Y

PðXijFXiÞ

ð2Þ

In formula (2), Fxi represents the fusion effect of X prior probability of a fixed thing, P (X1, X2, …, Xn) represents the fusion coefficient between different variables.

3 Knowledge Reduction and Rule Fusion Experiment The first step is knowledge reduction and rule acquisition. In this step adopted literature method and statistical analysis method, this paper investigates the existing studies of knowledge reduction and rule acquisition data, with the help of the existing heuristic algorithm for knowledge reduction and rule acquisition, finally set up support and reliability two indicators to get the results of detection, in this paper, the reliability index in R. The second step is the reduction of rules. The reduction of rules is the simplification of decision rules, which basically makes the condition data in the table of decision rules reach the minimum. The tables of decision rules before and after flowers are functionally consistent, but the rules after flowers are greatly reduced in terms of condition attributes. The reduction of decision rules includes two aspects: simplified attribute and attribute value. Decision rules that remove redundant attribute values are called kernel rules for conditional attributes. Rule reduction can reduce the different attributes of knowledge reduction and decision rules, find the commonality, and facilitate the integration of the two. The third step is knowledge reduction and rule fusion. The common attribute between decision rules and knowledge reduction after reduction is found, and this attribute is substituted into the bayesian network formula, the prior probability is calculated according to the formula, and the associated network is constructed to realize the fusion of knowledge reduction and rules.

296

Y. Duan et al.

4 Discuss 4.1

Analysis of Experimental Results

Through the above experiments, we can obtain the following experimental data, as shown in Table 1. Table 1. Calculation data of bayesian algorithm in knowledge reduction and rule fusion Serial number Knowledge reduction Decision rules Reliability(R) 1 (1,1,1) (d,1) 0.72 2 (1,1,2) (d,3) 1.0 3 (1,1,3) (d,1) 1.0 4 (1,1,4) (d,3) 1.0 5 (1,2,1) (d,2) 0.58 6 (1,2,2) (d,3) 0.82 …… 23 (3,2,3) (d,2) 1.0 24 (3,2,4) (d,2) 0.56 *Data were collected from questionnaires and documents

In Table 1, a total of 24 decision rules are obtained by using bayesian algorithm. Comparing with existing research data, it is found that compared with existing algorithms, bayesian algorithm obtains the most deterministic decision rules. The more the results, the more scientific the bayesian algorithm can be in realizing knowledge reduction and rule fusion. Finally, we can draw the following conclusions: all decision rules in a certain thing can be obtained by bayesian algorithm, which helps to realize knowledge reduction and rule fusion calculation. 4.2

Knowledge Reduction and Rule Fusion Strategy

In this paper, we find that the concept of weighted inclusion can better solve this problem by referring to a large amount of data. With the help of weighted inclusion degree, this fusion method reduces the complexity of spatial set vectors and the complexity of conditional attributes. By taking similar conditional attributes as connection points, the knowledge condition network is constructed to obtain the corresponding decision rules, and finally the fusion of knowledge reduction and rules is realized. Finally, the method was tested with the help of computer calculation software. The specific test data are shown in Fig. 1, in which the data are calculated and sorted by the author. It can be seen from the data in Fig. 1 that under the decision rule fusion method of the coordination target information system, the speed of knowledge reduction and rule fusion is up to 89.13%, the fusion rate is up to 94.57%, and the fusion error is only 5.42%. This indicates that the fusion strategy proposed in this paper promotes the deep fusion of knowledge reduction and rules, and is a scientific and correct fusion strategy.

Investigation on Knowledge Reduction and Rule Fusion

100.00%

94.57%

297

89.13%

80.00% 60.00% 40.00% 20.00%

5.42%

0.00% Fusion Rate

Convergence Speed

Fusion Error

Fig. 1. Knowledge reduction and rule fusion

5 Conclusion Based on the probability graph model, this paper studies the fusion of knowledge reduction and rules. The fusion of knowledge reduction and rules can better solve the uncertainty problems prevailing in society and expand its practical application range. The following conclusions are drawn through the research: (1) Bayesian algorithm is a scientific algorithm to promote the fusion of knowledge reduction and rules. (2) In this paper, a weighted inclusion degree of set vector space is introduced into the fusion of knowledge reduction and rules, and on this basis, a decision rule fusion method for coordinating the objective information system is proposed. Acknowledgements. This work was supported by Scientific Research Fund of Hunan Provincial Education Department (No. 16C1497).

References 1. Guan, T., Feng, B.: Knowledge reduction method in fuzzy target information system. J. Softw. 15(10), 1470–1478 (2017) 2. Wei, D.-K., Huang, B., Zhou, X.-Z.: Rough set model and knowledge reduction of incomplete fuzzy object information system. Comput. Eng. 32(8), 48–51 (2017) 3. Wei, D.-K.: Incomplete fuzzy decision information system knowledge reduction based on similarity. Hunan Norm. Univ. J. Nat. Sci. 29(2), 18–23 (2017) 4. Zhang, W.-X., Mi, Z.-S., Wu, W.-Z.: Knowledge reduction of discordant object information system. J. Comput. Sci. 26(1), 1–7 (2017) 5. Li, Y., Zhang, J., Liang, J.: Attribute reduction algorithm based on discernibility matrix. J. Shanxi Univ. 27(2), 138 (2018) 6. Huang, B., Wei, D.-K., Zhou, X.-Z.: Maximum distribution reduction and rule extraction algorithm for incomplete information systems. Calc. Comput. Sci. 3(1), 114 (2017)

298

Y. Duan et al.

7. Miz, Z.-S., Wu, W., Zhang, W.-X.: Comparative study on knowledge reduction of discordant target information systems. Fuzzy Syst. Math. 17(3), 54–60 (2018) 8. Miao, W.-Q., Hu, G.-R.: A heuristic algorithm for knowledge reduction. Comput. Res. Dev. 11(6), 42–45 (2017) 9. Liu, Q., Li, F., Min, F.: An efficient knowledge reduction algorithm based on new conditional information entropy. Control. Decis. 20(8), 878–882 (2017) 10. Tao, Z., Xu, B., Wang, D.: Rough set knowledge reduction method based on genetic algorithm. Syst. Eng. 11(4), 118–124 (2017)

Relation Model Between High-Level Athletes’ Energy Consumption Mode and Physical Function Zhenjun Xu(&) and Weidong Hu Department of Physical Education, Changchun Institute of Technology, Changchun 130012, Jilin, China [email protected]

Abstract. Correctly understanding and assessing the physiological and biochemical characteristics of athletes has a very important role. Sports items, training levels, exercise load, post-exercise recovery, and athletes’ own conditions are all factors which affect athletes’ physical performance. These factors should be fully considered in the process of specific performance assessment. The salivary indicators in the current assessment of athletes’ performance are not mature, so blood and urine indicators are mainly used. Keywords: Relation model  High-level athletes’ energy consumption mode Physical function



1 Introduction In the course of an athletics competition, the athlete’s own performance status will directly affect its results and determine its level of play in the game. In order to conduct more scientific training, athletes should be able to correctly and objectively understand the body functions of track and field athletes, and through the detection of their endocrine system, oxygen transport system, bone material energy metabolism system and immune system and other biochemical indicators, to correctly assess the athlete’s physical state [1–3]. We should better deal with the relationship between exercise load and recovery, and then find the best amount of training and restore balance [4–6]. At the same time, track and field athletes’ physical and biochemical indicators of physical function can also be used as the basis for daily training and pre-game training, and they have special guidance significance in improving the level of specific training for athletes and playing a better level of exercise [7]. High-level track and field athletes are given in Fig. 1.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 299–305, 2021. https://doi.org/10.1007/978-3-030-51556-0_43

300

Z. Xu and W. Hu

Fig. 1. High-level track and field athletes

2 Energy Consumption Model and Body Function Relationship Model 2.1

Architecture

During the process of testing and assessing biochemical indicators of athletes, the endocrine, immune, skeletal muscle, oxygen transport, and energy metabolism systems that affect athletes’ physical functions and athletic ability are mainly analyzed. This paper is based on the specific training of athletes in the field of athletes [8]. The energy consumption model and body function relationship model is given in Fig. 2.

Endocrine System

Energy Consumption Model and Body Function Relationship Model

immune system

Oxygen transport system

Skeletal muscle and material energy metabolism system

Fig. 2. Energy consumption model and body function relationship model

2.2

Endocrine System

Plasma testosterone and plasma cortisol are all biochemical indicators of the endocrine system. Among them, plasma testosterone is a major anabolic hormone in the human body. It not only maintains male sexual function and side characteristics, but also promotes bone growth and erythropoiesis. Most of the body’s plasma testosterone exists in a combined form [9]. The free portion occupies only about 2%, and active testosterone is the sum of free testosterone and albumin bound testosterone.

Relation Model Between High-Level Athletes’ Energy Consumption

fi ðx; yÞ; ði ¼ 1; . . .; N Þ

301

ð1Þ

About half of the female testosterone is derived from the conversion of androstenedione in the liver. The testosterone secreted by the adrenal cortex is controlled by the hypothalamus, pituitary and adrenal cortex, while the testosterone secreted by the ovary is controlled by sex hormone-binding globulin synthesis hormone [10]. In the early morning, the male testosterone concentration in the quiet state is 300 to 1300 ng/dl; the female testosterone concentration in the quiet state is 20 to 100 ng/dl. The testosterone levels ranged from 125 to 500 ng/dl in men 13 to 14 years of age. For this reason, it should also be judged whether or not the testosterone causes low blood testosterone problems. P B¼

i fi ðx; yÞ

ð2Þ

N

In terms of athletic ability, plasma testosterone is positively correlated with the body’s athletic ability. The higher the level of plasma testosterone is, the stronger its ability to exercise is, but the change between the two is also separated [4]. This is mainly because plasma testosterone belongs to high levels. The regulation of metabolic hormones, the entire process of anabolism will take some time [6]. Therefore, plasma concentration of testosterone this time does not mean the actual state of function, which is just based on plasma testosterone values to determine the body’s exercise capacity. PðXt Þ ¼

X t

wk gk ðXt Þ

ð3Þ

At the same time, when the body’s plasma testosterone concentration does not continue to rise, but its competitive state remains good, it should pay close attention to timely adjustment of exercise [2]. The concentration of plasma testosterone is mainly affected by factors such as exercise density, load, load intensity, and duration [1]. Overall, exercise leads to an increase in plasma testosterone concentration, but as exercise time increases, testosterone concentration peaks.  M k ðt Þ ¼

1; jXt  lk ðtÞj\ 0; else

pffiffiffiffiffiffiffiffiffiffiffi Dk ðtÞ

ð4Þ

Continuing exercise at this time, plasma testosterone concentration will continue to decline, and even lower than before exercise. At the same time, moderate exercise generally does not affect the concentration of plasma testosterone, but after the training of strength, the value of plasma testosterone tends to increase [5]. The long-term large amount of exercise will also lead to a decrease in its concentration. This is mainly because the training will lead to the inhibition of HPG axis function in many links, and long-term exercise will also increase the decomposition of protein substances, increase the loss of albumin, and reduce the plasma testosterone activity. In the judgment process, the concentration of plasma testosterone varies according to individual differences [8]. Comparison with normal people is obviously not comprehensive, and the

302

Z. Xu and W. Hu

vertical comparison has practical significance. Without the influence of drug interference, plasma testosterone concentration is lower than 25% of the beginning of the training cycle, and does not continue to rise [9]. 2.3

Immune System

Leukocyte, leukocyte classification, humoral immune indicators IGG, IGA, and IGM are all indicators of immune system evaluation. After a large number of load training, leukocytes, NK cells, and IGG, IGM, and IGA decrease significantly, indicating that the immune system of the athlete has emerged. disorder. NK cell activity as well as CD4/CD8, are among the more sensitive indicators, but the test costs are higher and therefore less used. The relationship model is given in Fig. 3.

Fig. 3. The relationship model

 M k ðt Þ ¼

1; jXt  lk ðtÞj\ 0; else

pffiffiffiffiffiffiffiffiffiffiffi Dk ðtÞ

ð5Þ

The humoral immunity indicators IGG, IGM, and IGA are not very sensitive. Only about 20 of the 1000 samples are lower than normal, and most of the athletes’ measurement results are within the standard range, but they have clearly demonstrated low immune function. The white blood cell count and classification index have characteristics such as simplicity, economy. When the athlete’s white blood cells are found below the normal range, they should be given serious attention and take necessary treatment measures [3]. With the increase of exercise, granulocytes are getting closer to lymphocytes. 2.4

Oxygen Transport System

RBC, HGB, HCT, MCH, MCV, MCHC, RDW, transferrin, serum ferritin, folic acid, B12, and total iron binding are all biochemical indicators of oxygen transport system. Hemoglobin mainly transports oxygen and carbon dioxide. The substance has a buffering effect. Therefore, the hemoglobin content will directly affect the athletic

Relation Model Between High-Level Athletes’ Energy Consumption

303

ability of the athletes, especially the endurance athletes. When the HGB content is lower than 110G/L, it can be diagnosed as exercise anemia, and the factors that cause the reduction of HGB content include the following three aspects [2]. First, the application causes a high plasma volume response and reduces the hemoglobin concentration; Secondly, it can cause red blood cell damage, and then cause hemolysis problems; Third, athletes increase the amount of iron, and iron supply or lack of absorption will make the body iron-deficient [6]. Athletes lack folic acid and B12, so iron deficiency is the main cause of exercise anemia and can be judged by ferritin, RDW, and other indicators. wk ðtÞ ¼ ð1  aÞwk ðtÞ þ Mk ðtÞ; k ¼ 1; . . .; N

ð6Þ

When the RDW in the body suddenly rises, we must also be alert to the problem of iron deficiency anemia, but it should be combined with the determination of ferritin content.  lk ðtÞ ¼

ð1  qÞlk ðt  1Þ þ qXt ; Xt does not fit k lk ðt  1Þ; else

ð7Þ

During altitude training, athletes’ hemoglobin will also change significantly. When the altitude is high, appropriate training should be performed. Under the stimulation of hypoxia and pressure, the amount of erythropoietin secreted by the kidneys of athletes will increase, leading to an increase in HGB and increase [7]. The RBC’s ability to transport oxygen improved the lack of oxygen in the plateau. However, HGB will still maintain a high level at this time, so as to ensure the oxygen transport capacity of red blood cells in athletes under high altitude hypoxia. This also shows that the first week is the athlete’s adaptation phase [4]. At this time, the body of the track and field athlete enters a stable state, and the body slowly starts to actively train the load. At this time, it begins to enter the intensive training phase, and this stage also directly determines the altitude training. 8 < ð1  qÞDk ðt  1Þ þ qðXt  lk ðtÞÞT ðXt  lk ðtÞÞ D k ðt Þ ¼ ð8Þ Xt : Dk ðt  1Þ With the gradual adaptation of the body, erythropoietin and HGB will begin to feedback, reducing the promotion. Erythropoietin production, but HGB still maintain a high level, which also shows that during the training process, the athlete’s body function began to stabilize. After entering the third week, a heavy load operation began [1]. After repeated training, the athlete’s ability was effectively improved. In the third week, the HGB level began to approach the plateau level, and after the lower plateau, the adjustment training of medium and small intensity should be carried out in the first week. Before the higher level, the HGB level in the athletes of the track and field athletes was obviously improved.

304

2.5

Z. Xu and W. Hu

Skeletal Muscle and Material Energy Metabolism System

Urea nitrogen, urinary protein, urine specific gravity, urinary occult blood, CK, ALT, troponin, and AST are all biochemical indicators of the skeletal muscle and material energy metabolism system. In the assessment of urea nitrogen, the content of urea nitrogen will increase significantly after intense training of track and field athletes [9]. At this point, the protein begins to undergo severe metabolism, and the glucose-alanine cycle between muscle and liver accelerates.  qk ðtÞ ¼

a wk

; Xt does not fit K 0; else

ð9Þ

In general, after high-intensity exercise, the content of urobilin will obviously increase, which indicates that the amount of exercise increases. When using urine nitrogen for cycle training evaluation, the urine nitrogen content will increase after the end of the small-cycle exercise, and will return to normal after rest, indicating that the exercise is reasonable [7]. At the end of the small cycle, the urine nitrogen content is close to the basic value, indicating that the training volume is insufficient. The system effectiveness of the proposed model is given in Fig. 4.

Fig. 4. The system effectiveness of the proposed model

3 Conclusions The plasma testosterone index in the endocrine system, hemoglobin in the oxygen delivery system, urine nitrogen and CK in the energy metabolism system of skeletal muscles and substances are all biochemical indicators for testing and assessing physical functions of track and field athletes. The plasma testosterone and hemoglobin can directly reflect the exercise ability of athletes, while urine nitrogen and CK can objectively reflect the recovery of body functions of athletes after exercise. Acknowledgements. The authors would like to acknowledge the financial support from the Project of the Education Department of Jilin Province (JJKH20191277SK).

Relation Model Between High-Level Athletes’ Energy Consumption

305

References 1. Ujka, K., Bruno, R.M., Bastiani, L., et al.: Relationship between occupational physical activity and subclinical vascular damage in moderate-altitude dwellers. High Alt. Med. & Biol. 18(3), 249–257 (2017) 2. Warmenhoven, J., Cobley, S., Draper, C., et al.: Assessment of propulsive pin force and oar angle time-series using functional data analysis in on-water rowing. Scand. J. Med. Sci. Sports 27(12), 1688–1696 (2017) 3. Ticinesi, A., Lauretani, F., Milani, C., et al.: Aging gut microbiota at the cross-road between nutrition, physical frailty, and sarcopenia: is there a gut-muscle axis? Nutrients 9(12), 1303 (2017) 4. Pryimakov, O., Iermakov, S., Kolenkov, O., et al.: Monitoring of functional fitness of combat athletes during the precompetitive preparation stage. J. Phys. Educ. Sport. 16(2), 551 (2016) 5. Vetter, R.E., Yu, H., Foose, A.K., et al.: Comparison of training intensity patterns for cardiorespiratory, speed, and strength exercise programs. J. Strength & Cond. Res. 31(12), 3372–3395 (2017) 6. Chacón Cuberos, R., Zurita Ortega, F., Puertas Molero, P., et al.: Relationship between healthy habits and perceived motivational climate in sport among university students: a structural equation model. Sustainability 10(4), 938 (2018) 7. Brocherie, F., Girard, O., Forchino, F., et al.: Relationships between anthropometric measures and athletic performance, with special reference to repeated-sprint ability, in the Qatar national soccer team. J. Sports Sci. 32(13), 1243–1254 (2014) 8. Białoszewski, D., Buda, M., Adamczyk, J.G.: Relationship between functional limitations of the locomotor system and performance in judo. Pol. J. Sport. Tour. 24(3), 145–149 (2017) 9. Abreu, S., Santos, R., Moreira, C., et al.: Relationship of milk intake and physical activity to abdominal obesity among adolescents. Pediatr. Obes. 9(1), 71–80 (2014) 10. Bondareva, E.A., Andreev, R.S., Yakushkin, A.V., et al.: Polymorphism of uncoupling protein genes in football players: investigation of the functional role. Hum. Physiol. 42(6), 645–654 (2016)

Face Alignment by Coarse-to-Fine Deep Convolution Network on Mobile Device Huaping Liu(&) Shanghai Institute of Advanced Communication and Data Science, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai 200444, People’s Republic of China [email protected]

Abstract. Face alignment is a crucial prerequisite for many face analysis applications. Hence, the algorithm with high speed, high precision and small model becomes very important for applications on mobile devices. Addressing this issue, we propose a new lightweight face alignment method which could run fast on mobile devices by coarse-to-fine deep convolution network. Simultaneously, for video-based face alignment, we proposed a simple but effective tracking method by using LK optical flow to ensure the accuracy and stability of facial landmark in video. Keywords: Convolutional network

 Face landmarks  Coarse-to-fine

1 Introduction Early, classical generative methods for face alignment, such as Constrained Local Model (CLM) [1] utilizes Bayesian formulation for shape constrained searches. Computed with these optimization-base methods using parameterized model to describe the image appearance and truth shape, regression-based methods directly learn a series of regression functions to map the image appearance to truth locations, i.e., a set of weak regressors are cascaded to form a strong regressor [2]. Nonetheless, Regression-based model is sensitive to initial shape when initial shape is not well. These methods will be easily to fall in local optimum especially when the face is in large pose variation or occlusion [3]. Different network types have been explored to achieve robust face landmark locations, such as Convolution Neural Network (CNN) [4–6]. But for applications on mobile devices, which computation resources are limited, small size, light computation and high accuracy model is very necessary. Other methods utilize both detecting and tracking to combat jittering [7, 8], but these methods usually require per-frame annotation video or a large amount of manually annotated video data. SBR [9] improve a generic face landmark detector with a very large number of unlabeled videos by differentiable Lucas-Kanade (LK) [10] operation. In this paper, we present a simple and effective smooth method to achieve stable face landmark tracking without extra video data. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 306–312, 2021. https://doi.org/10.1007/978-3-030-51556-0_44

Face Alignment by Coarse-to-Fine Deep Convolution Network

307

2 Proposed Method Given an input face image I 2 RHW3 , where H; W is the height and width of image, which is usually cropped using face box by a face detector. The shape vector is in the form of s ¼ ½x1 ; y1 ; x2 ; y2 ; . . .; xN ; yN  2 R2N , where N is the number of pre-defined 2D face landmarks and ðxn ; yn Þ are the coordinates of the tth landmark. Then the target of face alignment is to find a nonlinear mapping: U : I ! S. However, it is very difficult to learn such a nonlinear function directly to achieve very precise results. Traditional cascaded regress-based approach studies a several nonlinear function (u1, u2, …, uk) in a cascade manner to approximate the nonlinear function U. Inspired by the above, in this paper we use a two-stage strategy to detect face landmarks coarse-to-fine base on CNN. Figure 1 shows the framework of the proposed method. It is made up of two steps. The first step aims to provide good initial local face landmarks (e.g. eyes, mouth and braw) for the second step and accuracy residual landmarks (e.g. outline and nose) by a small convolutional network. In this way, the prediction accuracy can be improved and the difficulty of a single step can be reduced.

Fig. 1. face landmark

2.1

Global Network

As for the processing speed and model compactness, we build the backbone network for our global network using depth separable convolution. Details of the global network architecture is given in Table 1. As getting very height accuracy for all the face landmarks similarity is very hard, our global network may pay more attention to the other landmarks beside local face landmarks (e.g. the points of eyes, mouth and braw) for high accuracy and less attention to local face landmarks. Given ground-truth landmarks S and predict land0 marks S , the loss is defined as:

308

H. Liu Table 1. The structure of global network. Type Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw

Input 64  64  3 31  31  32 29  29  32 29  29  32 27  27  32 27  27  64 13  13  64 13  13  64 11  11  64 11  11  128 9  9  128 9  9  128 7  7  128 7  7  128 5  5  128 5  5  128 3  3  128 3  3  128

Operator Conv3  3 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3

Out channel Stride 32 2 32 1 32 1 32 1 64 1 64 2 64 1 64 1 128 1 128 1 128 1 128 1 128 1 128 1 128 1 128 1 128 1 128 1

Pad 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1

 0  X2N 0 Loss S; S ¼ f ðSi  Si Þ i¼1

ð1Þ

Where N is the number of landmarks, f ð xÞ is the loss function (L1 hurt means L1 ð X Þ ¼ j X j) and L2 loss means L2 ð xÞ ¼ 12 x2 ). In our method, we divide all the face landmarks S into local face landmarks SL (e.g. points in eyes, mouth and braw) and the residual landmarks SR (e.g. points in outline and nose). Then, we define the loss for global network as:  0  X2K  X2ðNKÞ   L 0   R 0  L R Loss S; S ¼ f S  S f S  S þ k i¼1 i¼1

ð2Þ

Where K is the number of local face landmarks and weight k balances the importance of residual landmarks, in the experiment, set k ¼ 1:2. 2.2

Local Network

Motivate by traditional cascaded method, which refine the shape stage-by- stage by modeling the shape residual, we use a simple CNN to refine local face landmarks based on global initial shape. In our method, we divide all landmarks into two sets, the landmarks on eyes, mouth and braw which have much rich texture constitute local landmark set SL , and the residual landmarks form another landmark set SR . We denote   the initial local shape by global network as ðSL Þ0 . For every landmark. Pj ¼ xj ; yj 2

Face Alignment by Coarse-to-Fine Deep Convolution Network

309

0

ðSL Þ ; j ¼ 1; 2; . . .; K (K is the number of local landmarks), we can crop a x  h patch centered at Pj from the input face image. Finally, all local patches form the volume of size h  x  K, which serves as the input for local refine network. The local refine network is shown in Table 2. Table 2. The structure of local network. Type Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw Conv Conv_dw

Input 16  16  3 14  14  64 14  14  64 14  14  64 7  7  64 7  7  64 7  7  64 7  7  64 5  5  64 5  5  128 3  3  128 3  3  128

Operator Conv3  3 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3 Convl  1 Conv3  3

Out channel Stride 64 1 64 1 64 1 64 2 64 1 64 1 64 1 64 1 128 1 128 1 128 1 128 1

Pad 0 0 1 1 0 1 1 0 0 0 0 1

Then, shape residual DSL for local land- marks can be obtained from the local network, which need to be added to the initial local shape by global network to from the finial accurate local landmarks: SL ¼ ðSL Þ0 þ DSL

2.3

ð3Þ

Tracking on Video

In this paper, we also put forward a simple and stable smooth method to track facial landmarks in video. Motivated by [9], we catch the face relationship between consecutive frames in virtue of LK optical flow operation. We select L corner landmarks (e.g. the corner of eyes, mouth and braw) as tracking points for LK optical flow which the parametric motion for denote as P. For these landmarks in frameFt1 , we estimate  t1 t1 ; l ¼ 1; 2; . . .:; L : ¼ x ; y frame Ft from a small patch near Pt1 l l l   Ptl ¼ xtl ; ytl ¼ ðxt1 þ px ; yt1 þ py Þ l l

ð4Þ

where px and py are the displacement of motion along x and y axes. The tracked corner landmark Pt in frame Ft may include track failure points due to changes in lighting and movement. Because of the strong correlation between landmarks in face, it can be considered that these landmarks preserve general motion consistency during

310

H. Liu

movement. If the tracked landmark has very significant deviation, it may be one outlier. In our method, we use Random Sample Consensus [11] to remove outlier. Ransac randomly select four points in P and ensure the four points are note collinear. This set of points is used to calculate the holography matrix of 3  3 which is called model.

3 Data Experimental 3.1

Datasets

To evaluate the performance of our proposed method, we conduct experiments on three challenging datasets, say 106Dataset, 300 W and WFLW. 106Dataset: This dataset is our own annotated data set with 106 landmarks. We use 15000 images as training set and 600 images as testing set. WFLW: The WFLW dataset contains 10000 images with 98 manually an- notated landmarks with large variations in expression, pose and occlusion. We follow to utilize 7500 samples of dataset as training set and the rest 2500 samples as the test set. 3.2

Evaluation Metrics

The accuracy for each single face image was quantified by Normalized Mean Error (NME) between predict and ground-truth landmarks: NME ¼

 1 XN  b  S  S   i i i¼1 Nd 2

ð6Þ

where, N is the number of landmarks, b S i and Si are the predicted and ground truth landmarks. The factor d is normalization factor which represents inter-pupil distance (distance between eye centers for 106Dataset and 300 W dataset) and represents face size for WFLW dataset. 3.3

Experiment Setting

Global Network: We get bounding box for each training sample according to the annotation. Centered at the center of bounding box, we expand the box to a square with the maximum side length. And randomly perturbs at 10% of the side length. In this way, the robustness of facial landmark detector to face boxes is enhanced. we use the face box above to crop the face area from the original RGB image and scale it to 64  64. We normalize the ground truth shape to [−1,1]. Samples are randomly rotated between [−45,45] degrees and randomly flipped horizontally with probability of 50%. We apply Gaussian blur, Gaussian nose, add contrast normalization to perform pixel oriented augmentation. Local Network: For train set samples, we use data augmentation first which including randomly rotating between [−45,45] degrees, randomly flipped horizon- tally and performing pixel-oriented augmentation. Then, we use the global network to detect face landmarks in the augmented samples that could get initial pre-defined local landmarks and accurate residual global landmarks. With each predefined local

Face Alignment by Coarse-to-Fine Deep Convolution Network

311

landmark as center and the pupil distance as normalization factor, the image block is clipped which should be uniformly scaled to 16  16.

4 Results and Analysis Accuracy: We implement our method on 106Dataset. The mean error which is normalized by pupil distance on 600 test set is 3.6282%. Model size: Table 3 compares our method with some classic regression-base and deep learning-base method in terms of model size and processing speed in Personal Computer (PC). Running speed: We evaluate the efficiency of each method on an i7-6700 K CPU and a Nvidia GTX 1080Ti GPU. The results are shown in Table 3. We also perform a test on a Qualcomm ARM 835 processor. Our method spends 10 ms per face (over 100fps).

Table 3. Comparison in terms of model size and speed in PC Model SDM[20] SAN [48] LAB [22] PFLD 1X[49] Ours Size(Mb) 10.1 270.5 + 528 50.7 12.5 0.76 Speed 16 ms(cpu) 342 ms(gpu) 2.6 s(cpu) 6.1 ms(cpu) 2.5 ms(cpu)

5 Conclusions In this paper, we proposed a high accuracy high speed face alignment algorithm, which consists of two networks. the global network and local network. The global network predicts the initial local landmarks and accurate residue landmarks from the whole face image. The local network refines the local landmarks with rich texture from initial landmarks-based image patches. Both global network and local network are lightweight network which can implement fast and accurately on mobile devices. For videobased face alignment, we propose a simple and effective method to keep accuracy and stability of facial landmarks. In our experiments, our method produces state-of-arts accuracies, while enjoying low complexity in both computation and model size. Acknowledgements. The work was supported by the Key Support Projects of Shanghai Science and Technology Committee (16010500100).

References 1. Cristinacce, D., Cootes, T.F.: Feature detection and tracking with constrained local models. In: BMVC, vol. 1, issue 2, p. 3 (2006) 2. Ren, S., Cao, X., Wei, Y., Sun, J.: Face alignment at 3000 fps via regressing local binary features. In: CVPR, pages 1685C1692 (2014)

312

H. Liu

3. Zhang, X., Sun, Y., He, W.: Face alignment based on two-stage localization. In: Journal of Physics: Conference Series, vol. 1069, issue 1, p. 012164, IOP Publishing (2018) 4. Dong, X., Yan, Y., Ouyang, W., et al.: Style aggregated network for facial land- mark detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 379–388 (2018) 5. Chen, W., Zhou, Q., Hu, H.: Face alignment by discriminative feature learning. In: 2019 IEEE International Conference on Image Processing (ICIP), IEEE, pp. 2204–2208, 18 (2019) 6. Yang, J., Liu, Q., Zhang, K.: Stacked hourglass network for robust facial land- mark localization. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 79–87 (2017) 7. Khan, M.H., McDonagh, J., Tzimiropoulos, G.: Synergy between face alignment and tracking via discriminative global consensus optimization. In ICCV, 1, 2, 5, 6 (2017) 8. Peng, X., Feris, R.S., Wang, X., Metaxas, D.N.: A recurrent encoder- decoder network for sequential face alignment. In: ECCV, 1, 2 (2016) 9. Dong, X., Yu, S.I., Weng, X., et al.: Supervision-by-registration: an un- supervised approach to improve the precision of facial landmark detectors. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 360–368 (2018) 10. Baker, S., Matthews, I.: Lucas-Kanade 20 years on: a unifying framework. In: IJCV, 2, 3 (2004) 11. Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381–395 (1981) 12. Zhu, S., Li, C., Change Loy, C., Tang, X.: Face alignment by coarse-to-fine shape searching. In CVPR, 5, 6, 7 (2015)

Process Design and Computer Software Simulation of Complex Parts Pen Barrel Xiurong Zhu(&) Jilin Engineering Normal University, Changchun 130052, Jilin, China [email protected]

Abstract. Based on the research on the process design and simulation processing of the automatic programming of the computer software of the complex part pen barrel, the complex shape processing program with the programming advantage is summarized. Taking the complex part pen barrel processing as an example, the complete processing technology and the simulation processing of the computer software are compiled, which is conducive to the improvement of the processing technology of the NC programmers. Simulation processing is carried out to solve the programming problems encountered in NC machining. More NC practitioners realize the importance of software programming and processing technology, and stimulate their interest in learning automatic programming of computer software. It makes the NC machining personnel realize the importance of computer software automatic programming process design and the necessity of skilled use of automatic programming software. Keywords: Complex parts processing

 Pen holder  Processing technology  Simulation

1 Introduction With the continuous progress of numerical control technology, the performance and structure of numerical control machine tools, system functions and the ability to process complex parts are constantly improving. With the continuous development of intelligent control system, as well as error compensation system, the processing accuracy has made great progress and is constantly developing towards higher accuracy. The level of its technology has become one of the important symbols to measure the level of a country’s industrial modernization [1]. In recent years, with the progress of computer application technology, some automatic programming software has been developed in our country to carry out the process design and simulation processing of computer software automatic programming. The advantages of automatic programming process design and simulation processing are that it can compile the processing program of parts with extremely complex geometry, the programming speed is fast, the program accuracy is high, the use is convenient, the cycle is short, and it is convenient Computer check, verify and check the tool position, path and part shape. Especially for complex parts, the program that can not be completed by hand can be compiled. Therefore, the machining parameters of the automatic programming system for machining complex parts are optimized. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 313–318, 2021. https://doi.org/10.1007/978-3-030-51556-0_45

314

X. Zhu

Especially, the research of machining process design and simulation machining has important practical significance [2].

2 Process Analysis of Part Drawing 2.1

Part Drawing

See Figs. 1 and 2.

Fig. 1. Part drawing of pen holder

Fig. 2. Solid drawing of pen holder

2.2

Accuracy Analysis

Dimensional Accuracy The main requirements for dimensional accuracy of parts are: inner hole Ф 65 mm and the distance between two parallel surfaces of parts is 91 mm and the length is 120 mm. For the requirements of dimensional accuracy, the tool setting is accurate before reprocessing, the reasonable tool compensation is used, the wear is adjusted in time during the processing, and the correct system and correct processing technology are used to determine [3, 4]. Form and Position Accuracy The form and position accuracy of the parts in this example includes: by adjusting the mechanical accuracy of the CNC machine tool and making reasonable clamping, positioning and correction measures for the form and position tolerance of the outer circular axis and the inner hole axis, the coaxiality requirements of the outer circular axis and the inner hole axis are mainly guaranteed.

Process Design and Computer Software Simulation

315

Surface Roughness In this example, the surface roughness of the parts is ra3.2 um. To ensure the quality of the surface roughness, this part is mainly guaranteed by selecting appropriate tools, correct rough milling and finish milling, completing the route, and reasonable cutting parameters and cooling [5]. 2.3

Determination of Blank Type

Select 108 mm * 120 mm billet shaft aluminum material, and the accuracy grade is it8. The machining scheme shall be rough milling first and then finish milling. 2.4

Selection of Tools

See Table 1. Table 1. Tool card for barrel machining Serial number Tool number Tool specification name 1 T01 Ф16 Milling cutter 2 T01 Ф16 Milling cutter 3 T01 Ф16 Milling cutter

Number 1 1 1

Machined surface Inner hole Upper contour Lower contour

3 Determine the Processing Method and Processing Route 3.1

Selection of Processing Method

The roughness of the outer surface and inner hole of the part is required to be 3.2ar, so in the milling process, rough milling can be carried out first, then finish milling. In addition, considering that the blank of the selected part is aluminum, the cutting performance is very good, and the surface is not hard, so the method of peripheral milling can improve the surface roughness of the machined part and reduce grinding [6]. 3.2

Selection of Processing Route

The principle to be followed in determining the processing route is “the base surface shall be processed first, the surface shall be processed first, and then the hole, and the rough surface shall be processed first, and then the fine surface”. In the processing of regular hexagon’s outer contour and circular inner contour, the blank used is aluminum alloy with good cutting performance, so the processing method of down milling should be adopted. According to the characteristics of the blank, the processing should be divided into two clamping processes. Machining one side of the hole for the first clamping. The outer circular surface is the positioning datum, and it is processed according to the sequence, that is, milling hole ! milling upper half outer contour ! finishing turning inner contour ! finishing milling upper half outer contour. Then carry out the second clamping, take the contour that has been milled as the

316

X. Zhu

positioning reference, and carry out the clamping according to the sequence, that is, rough milling the lower half of the outer contour ! fine milling the lower half of the outer contour ! cutting off the allowance [7]. 3.3

Determination of Processing Parameters

Feed Rate Because the maximum feed rate of machine tool is 100 mm/min, in order to improve the machining efficiency, in rough machining, the feed rate of the selected contour direction (FFP 1) is 100 mm/min, and the feed rate of depth direction is 50 mm/min [8]. Spindle Speed As the material is a machined aluminum part, it has good cutting performance, and the selected feed rate and cutting depth are relatively small on the back. By referring to the look-up table, the cutting speed can become larger, so that the selected cutting speed can reach 160 m/min. Therefore, when No. 16 milling cutter is used to mill parts, after calculation, the speed of the rough machining spindle is 1000 R/min, and that of the finish machining spindle is 1200 R/min [9]. Back Knife Consumption Because of the selected part of the blank aluminum, the processing performance of cutting, the use of and for vertical milling machine tool processing, considering the actual use of the characteristics of vertical milling machine (milling machine instructions, less rigid) and processing characteristics, its cutting back (that is, the maximum depth of each grinding mid) is the maximum value of 2 mm, and because the surface roughness of the processing parts is high 2.3ar, it is necessary to Rough machining, finish machining, so the backup of rough machining is the mid of 1.5 mm incision selection, and the selected finish machining allowance (FAL contour direction or depth direction fold) is 0.3 mm [10]. See the table below for the selection of three cutting elements (Table 2). Table 2. Three elements of cutting Spindle speed (r/min) Feed rate Back knife consumption (mm/min) FAL FALD Rough machining 1000 100 50 1.5 Fine machining 1200 80 40 0.3

4 CAXA Manufacturing Engineer Software Automatic Programming and Simulation Processing Define blank, type cylinder. Referring to the model, since the maximum length dimension is 120 mm and the maximum diameter dimension is Ф 108 mm, we define the blank for the round bar blank of Ф 120  108 mm, as shown in Fig. 3.

Process Design and Computer Software Simulation

317

Fig. 3. Defining the blank

After setting, click OK, click the left key to select the roughcast and right key to select the roughcast according to the instruction to form the contour rough finishing data, as shown in Fig. 4.

Fig. 4. Contour rough machining data

Right click the entity simulation in the contour rough machining selection menu in the track management area to carry out the machining quasi simulation, shown in Fig. 5.

Fig. 5. Simulation results

Exit the postprocessing in the selection menu of contour rough machining in the right-click track management area of machining simulation to generate G code. Select the position of G code to be saved and select the CNC system as shown in Fig. 6.

318

X. Zhu

Fig. 6. Generate post code

5 Conclusions Through the research on automatic programming and machining of CNC machine tools, the paper summarizes the rules of automatic programming parameter optimization and simulation machining of complex parts. Taking the machining of the complex part pen barrel as an example, the complete machining process and numerical control program are compiled, and the computer software simulation machining is carried out. Through the research of this paper, NC machining personnel realize the importance of automatic programming and the necessity of mastering computer software automatic programming. In the field of NC machining, software automatic programming has more extensive application space. The design and implementation of computer software automatic programming for complex parts of NC lathe and milling machine has reference value for NC programmers to carry out automatic programming and simulation machining for complex parts.

References 1. Zhang, L., Lv, X.: Graduation Design Guide Book of Mechanical Engineering. Beijing: Peking University Press (2011). (in Chinese) 2. Ni, X.: CNC Machine Tools and CNC Processing Technology. People’s post and Telecommunications Press, (2011). (in Chinese) 3. Wang, M.: Numerical Control Technology. Beijing Tsinghua University Press (2009). (in Chinese) 4. Cheng, G., Lu, J.: Numerical Control Technology and Programming. Peking University Press, Beijing (2015). (in Chinese) 5. Meng, L., Zhang Z.: Numerical Control Technology Training Course. National Defense Industry Press, Beijing (2014). (in Chinese) 6. Tang document: Introduction and improvement of CNC machining technology. China Machine Press, Beijing (2013). (in Chinese) 7. Principles of Numerical Control. China Machine Press, Beijing (2012). (in Chinese) 8. Wu, Z., Huang, Y., Jiang, W., et al.: NC Lathe Programming 80 Cases: Elite Edition. Chemical Industry Press, Beijing (2014). (in Chinese) 9. Xian, J.: Operation Basis and Application Examples of CNC Lathe. Electronic Industry Press, Beijing (2007). (in Chinese) 10. Lu, B., Gao, C., Zhao, W.: Programming Examples of CNC Lathe (FANUC. Siemens). Chemical Industry Press, Beijing (2011). (in Chinese)

Application of CAD Combined with Computer Image Processing Technology in Mechanical Drawing Ning Fan(&) Liaoning Jianzhu Vocational College, No. 24, Qingnian Street, Liaoyang 111000, Liaoning, China [email protected]

Abstract. Computer image processing technology is a major component of computer technology. Computer image processing technology includes digitization and CA technology. However, CAD technology is widely used in mechanical drawing. The development of CAD in mechanical drawing is one of the important elements directly related to the application of CAD in mechanical drawing. This paper combines the application of CAD of computer image processing technology in mechanical drawing for research and analysis. The research in this article shows that the application of CAD combined with computer image processing technology in mechanical drawing has application in descriptive geometry, application in reading assembly view, application in sectional view, application in assembly drawing, and other aspects. Application, CAD has many advantages in mechanical drawing. The most prominent advantage is that CAD is easy to modify and efficient in mechanical drawing. To give full play to the role of CAD in mechanical drawing, we must be good at creating and applying template files and good at Use layers. Keywords: Computer technology Image processing

 CAD technology  Mechanical drawing 

1 Introduction The extensive application of computer graphics and image processing technology is mainly reflected in hardware processing technology, graphics and image interaction technology, and simulation technology. It is part of the computer’s more realistic functions, allowing graphics images to return to the most realistic state. When computer graphics and image processing technology is applied, a virtualized scene is constructed, and the lighting model is used to make scientific and reasonable calculations of light sources and texture effects. It can be seen that image technology and graphics technology in computer technology are closely related. In general, computer graphics and image processing technology plays a key role in our lives and continuously improves our quality of life. In modern enterprises, whether it is the internal mechanical modeling of an enterprise or the application requirements of CNC machine tools, they must rely on the basic knowledge of CAD and the basic technical requirements of 3D modeling [1]. In © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 319–324, 2021. https://doi.org/10.1007/978-3-030-51556-0_46

320

N. Fan

modern drawing, CAD is an important tool. Use CAD technology to effectively shorten the design cycle and improve work efficiency. CAD technology uses the latest methods to represent new products with practical methods. In order to develop the design thinking of developers, designers will have a more comprehensive understanding of newly developed products and radically improve the success rate of product development [2]. Therefore, it is very important to study the application of CAD combined with computer image processing technology in mechanical drawing. This paper analyzes the application of CAD in mechanical drawing combined with computer image processing technology, illustrates the application of CAD in mechanical drawing, and analyzes the advantages of CAD in mechanical drawing.

2 Method 2.1

Analysis of Key Image Processing Technology in Computer

(1) Digital technology Computer image processing technology is based on three-dimensional mathematical technology. When people process graphics and images, they must digitally process them, and then transform graphics and images into a format that can be successfully recognized by a computer [3]. Before the image is processed, people will perform preliminary sampling of the image information. After the sampling is completed, the image must be segmented from the horizontal or vertical direction. The obtained data points can be quantized and then the image is encoded. Compression works [4]. Encoding and compression is also a key part of image storage. People often use predictive encoding, transform encoding, and wave point compression encoding to implement encoding compression. With the advancement and development of the times, digital technology in computer graphics and image processing technology will also continue to innovate [5]. (2) CAD technology This software can be used for enterprise product design, and it is convenient for staff to store and draw computer graphics and image information [6]. People need to use software to handle text information and graphic information. It is the editing work that graphics can be moved, enlarged, and rotated. CAD technology has begun to be applied in the clothing design industry, mechanical design industry, and geological survey industry. This technology includes interactive technology, curved surfaces Modeling technology can integrate the user’s coordinate system and graphic output device necklace, and complete the perspective and translation of computer graphics images [7]. Interaction technology is an indispensable part of computer graphics and image processing technology. Designers can make corrections and see the results of operations in the operating system, which is convenient for people to modify image graphics. This technology is a programming program in computers that originated in the United States and can implement product management and control. With the continuous advancement of computer technology, this program has a related geometric definition

Application of CAD Combined with Computer Image

321

language that can perform program deformation and computer graphics image transformation. Batch processing, the unique superiority of the program makes it recognized by multiple industries [8]. 2.2

Using CAD Software to Solve the Major and Difficult Points of Mechanical Drawing

(1) Using CAD to solve the three-view knowledge problem Three views are the most basic knowledge in mechanical drawing. Now combined with CAD software to display, this abstract space imagination will be directly displayed in front of you and you can observe it yourself [9, 10]. (2) Using CAD to solve the knowledge problem of the assembly This part of the assembly is the focus of mechanical drawing. It involves more knowledge points and is relatively difficult [11]. The most common problem type is the missing edges of the supplementary painting. Although it is not as difficult to directly draw the three views of the composite body, you must first understand the three views. You must be able to imagine what three-dimensional graphics the three views correspond to. Better analysis of missing edges.

3 Application Examples (1) Three views of CAD drawing assembly Using CAD to draw the three views, compared with manual drawing, the accuracy and convenience of the correction has great advantages. In CAD 3D modeling, the 3D shape of a part can also be modeled. A draftsman can draw three views based on a three-dimensional shape, so you can read the drawings to accurately draw the details of the part. Missing or wrong. (2) CAD drawing parts When drawing a part drawing, a part of the part must be cut, and the tolerances and roughness of the size, shape, and position must be marked. By calling the appropriate layer to select the fill pattern, you can draw section lines and quickly draw section lines. In addition, you can adjust the density of the section line according to the scale of the drawing.

4 Discussion 4.1

Application of CAD Combined with Computer Image Processing Technology in Mechanical Drawing

The application of CAD combined with computer image processing technology in mechanical drawing is analyzed, and the result is shown in Fig. 1.

322

N. Fan

29% 26%

27%

21%

5%

18% Application in descriptive geometry Application in section view Other applications

Application in the view of reading combination Application in assembly drawing

Fig. 1. Application analysis of CAD combined with computer image processing technology in mechanical drawing

It can be seen from Fig. 1 that the application of CAD combined with computer image processing technology in mechanical drawing has applications in descriptive geometry, applications in reading assembly views, applications in sectional views, applications in assembly drawings, and other aspects. application. then: (1) Application in descriptive geometry In general mechanical drawing, the projection of points, lines, and surfaces does not seem to be three-dimensional. CAD technology can change this situation. CAD technology can create four viewports, which are set as the main view, top view, left view, and southwest axis. The projections of these three points can be seen intuitively, and they can be solidified by the solid function in the drawing 3D model creation. (2) Application in reading assembly view The combined view in mechanical design is generally composed of multiple parts. When the designer uses CAD technology, CAD can use the system’s 3D modeling function to shape the combined body. 4.2

Analysis of the Advantages and Production Skills of CAD Mechanical Drawing

The application of CAD combined with computer image processing technology in mechanical drawing has many advantages. To make better use of CAD in mechanical drawing, some production skills are needed. The advantages and production skills of CAD mechanical drawing are analyzed. The results are shown in the Table 1 is shown.

Table 1. CAD mechanical drawing advantages and production skills analysis Advantages of CAD mechanical drawing The making skill of CAD mechanical drawing Easy to modify Be good at creating and applying template files Higher efficiency Good at using layers

Application of CAD Combined with Computer Image

323

By analyzing the advantages and production techniques of CAD mechanical drawing in Table 1, we can know: (1) Advantages of CAD mechanical drawing 1) CAD mechanical drawing is easy to modify Mechanical drawings have high accuracy requirements. Once drafters are not careful, they often make errors. In this case, using Auto CAD to make drawings in one day can be more convenient to modify. For errors that occur in drawing As long as it is edited and deleted, it can be redrawn, and no trace of modification will appear in the screen. 2) High efficiency In the drawing process, when using AutoCAD, you only need to use the drawing instructions to complete the drawing, and no size problem is required. Compared to manual drawing, you don’t need to waste time modifying drawing tools. Can effectively improve the efficiency of drawing. In addition, drawing using Auto CAD can also be modified through existing files. This operation method can effectively save drawing exercises.

5 Conclusion Combining traditional mechanical drawing with advanced computers can achieve the purpose of using computer specifications and clear logic to reduce the overall cost of mechanical drawing, which will greatly contribute to the promotion and promotion of the development of mechanical design technology. This thesis studies the application of CAD combined with computer image processing technology of mechanical drawings. Generally speaking, with the continuous development of CAD application of mechanical drawings, the research work of CAD of mechanical drawings has also become a guarantee for CAD of mechanical drawings. The important job of making maps.

References 1. Xueya, S., Li, D.: Development of wireless mobile video surveillance on windows mobile using direct show technology. J. Comput. Theor. Nanosci. 14(7), 3163–3169 (2017) 2. Liu, H., Hang, D., Zeng, D.: Cloud detection using super pixel classification and semantic segmentation. J. Comput. Sci. Technol. 34(3), 622–633 (2019) 3. Chen, D., Zhang, W., Yang, Y.: Detection and recognition of high-speed railway catenary locator based on deep learning. J. Univ. Sci. Technol. China 47(4), 320–327 (2017) 4. Papadiochou, S., Pissiotis, A.L.: Marginal adaptation and CAD-CAM technology: a systematic review of restorative material and fabrication techniques. J. Prosthet. Dent. 119 (4), 545–551 (2017) 5. Weinstein, G., Howard, W.S., Fox, R.: Restorations with CAD/CAM technology. Clin. Dent. Rev. 2(1), 8 (2018) 6. Blackwell, E., Nesbit, M., Petridis, H.: Survey on the use of CAD-CAM technology by UK and Irish dental technicians. Br. Dent. J. 222(9), 689–693 (2017)

324

N. Fan

7. Crupi, G., Raffo, A., Vadala, V.: Technology-independent analysis of the double currentgain peak in millimeter-wave FETs. IEEE Microw. Wirel. Compon. Lett. 99, 1–3 (2018) 8. Moazeni, S., Cadeiras, M., Yang, E.H.: Anthracycline induced cardiotoxicity: biomarkers and “Omics” technology in the era of patient specific care. Clin. Transl. Med. 6(1), 17 (2017) 9. Rezende, L.C.S.H., da Silva, C.A., Otto, G.P., Pereira, M.M., Bergamasco, R., Fávaro, S.L.: Analysis of physical, chemical e mechanical properties of wood-particle boards containing biaxially oriented polypropylene. Acta Scientiarum. Technol. 39(2), 193 (2017) 10. Öztürk, E., Türköz, M., Halkacı, H.S., Koç, M.: Determination of optimal loading profiles in hydromechanical deep drawing process using integrated adaptive finite element analysis and fuzzy control approach. Int. J. Adv. Manuf. Technol. 88(9–12), 1–17 (2017) 11. Jao, D., Beachley, V.Z.: Continuous dual-track fabrication of polymer micro-/nanofibers based on direct drawing. ACS Macro Lett. 8(5), 588–595 (2019)

Scene Merging Technology with High Adaptability Jiuchao Li1, Liang Zhou2, and Ou Qi1(&) 1

2

Army Academy of Armored Forces, Changchun, China [email protected] Equipment Project Management Center, Beijing, China

Abstract. The image mosaic algorithm is used to splice this group of overlapping images into seamless high-resolution images. By splicing the overlapped images acquired at different times in the real world into a scene image with a wide field of vision, people can meet the needs of viewing a wide perspective scene, and even generate panoramas. Image mosaic technology is an effective technology of using computer vision to express the real world. By using image mosaic technology, redundant information of image can be eliminated effectively, and the storage of image information can be compressed. Therefore, the real world can be represented more effectively, vividly and objectively. It has important applications in large area static scene observation, virtual reality, video retrieval, and high-resolution image acquisition. So it is very important to study the accurate, fast and robust image mosaic algorithm. Keywords: Scene merging

 Adaptability  Automation

1 Introduction In modern local high-tech war, the large-scale application of high-tech investigation equipment makes the battlefield show a certain degree of unilateral “transparency”, so “finding the enemy first” means “winning first” [1, 2]. In the last century’s Iraq war, the United forces led by the U.S. Army can find each other on the battlefield a few kilometers away in the dark night or in the daytime, so that the United forces can attack the Iraqi army in a timely and accurate manner, leaving a deep impression on the world. In the process of winning, high-tech battlefield detection equipment has played a great role [3–5]. However, in the real battlefield environment, neither the armored vehicles on the ground nor the aerial vehicles can detect the battlefield situation of their left, right and rear in time, which is an urgent problem for battlefield reconnaissance equipment to solve [6–8]. In the imaging technology of military field, no matter the night vision low light, laser or infrared imaging equipment are limited by the camera equipment, they can’t shoot the image with wide field of vision, let alone 360° panoramic image, which leads to the commander can’t find the enemy in time in the complex battlefield environment. The scientific research project “infrared, visible light, laser compound threat target detection research” is just based on this demand. One demand of this project is to use © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 325–330, 2021. https://doi.org/10.1007/978-3-030-51556-0_47

326

J. Li et al.

image splicing technology to splice multiple images covering one week’s scenery captured by horizontal scanning of the camera, so as to obtain panoramic image [9–13]. For armored vehicles, a set of optical real-time imaging system is installed to obtain the scene images around the battlefield in real time [14, 15]. By using the image splicing technology, the images acquired by the optical imaging system in real time can be spliced to obtain the surrounding panorama of the battlefield in time, so that the vehicle commander can overcome the inconvenience of the existing target indication device, reduce physical consumption, save the combat power to the maximum extent and in time Command the artillery commander and control the fire control system, surpass the artillery commander to fire the launch button in case of emergency, and eliminate the enemy with the greatest threat to himself in time; the artillery commander can also reduce the physical consumption by using the panorama of the battlefield, help the vehicle commander observe the battlefield, and timely operate the fire control system to attack the enemy; the driver can timely observe the road traffic conditions of the battlefield and judge the road conditions as soon as possible by using the panorama of the battlefield, Cooperate with the commander in command and control of the vehicle, so as to effectively eliminate the enemy as early as possible. The successful research of the project will optimize the function of the existing command and control system of the combat vehicle, become the “multiplier” of the combat performance of the combat vehicle, meet the actual military needs, greatly enhance the real-time and efficiency of the battlefield investigation and command, so the image splicing technology has great practical significance in the field of military investigation.

2 Model Construction The projection transformation of image is a kind of linear transformation existing between two planes. The process of mapping the original image point P(x, y) to the target image point Q(x, y), the transformation of image can be defined by 3  3 transformation matrix M 2

3 2 3 X0 X P ¼ MQ $ 4 Y 0 5 ¼ M 4 Y 5 1 1

ð1Þ

According to the transformation effect, plane projection transformation can be divided into four categories: affine transformation, Euclidean transformation, similar transformation and projective transformation. Affine transformation is subdivided into four components: translation, rotation, scaling and staggered cutting. According to the needs of scientific research projects, we can learn how to obtain images and calculate transformation matrix. The camera imaging process is a projective transformation process, and M can be calculated by establishing equations for four or more pairs of scene image corresponding point coordinates. A variety of transformations between different images can be superposed by the point multiplication of the transformation matrix. For example, when the transformed

Scene Merging Technology with High Adaptability

327

images have the features of translation, rotation and scaling, the transformation matrix M has the following forms: 2

1 M ¼ 40 0

3 2 0 tx cos h  sin h 1 ty 5  4 sin h cos h 1 1 0 0

3 2 0 sx 05  4 0 0 1

0 sy 0

3 0 05 1

ð2Þ

Set the camera to rotate in the XZ plane, and the origin of the coordinate system is the observation point O (projection center). L refers to the cylinder surface, J refers to the original image, and K refers to the image after projecting it to the cylinder, which is called cylinder image for short. P(x, y) is any point in the original image J, and Q(x, y) is the corresponding point of P(x, y) in the cylindrical image K. A view formed by a horizontal section and a vertical section of a cylindrical projection stereogram in which the tangent lines of the original image J and its corresponding cylindrical image K are not included. Let R be the cylindrical radius, be the projection width angle of the original image J, and W and H are the width and height respectively. From this, we can get that the width of the cylindrical image K corresponding to j is R, and the height is h. transform any point Pðx; yÞ projection on the original image J to the corresponding point Q(x, y) on the cylindrical image K, and the coordinates of the image are defined by the position of the pixel points on the image, all of which are on their left side The upper angle is the origin, assuming that P(x, y) and Q(x, y) are projected to P(x, H) and Q(x, H), respectively, on the lower surface of the cylinder. According to the horizontal section diagram and the vertical section diagram, the geometric mathematical relations are as follows (Note: X in Q(x, y) is actually the arc length of the cylinder image, which is the half angle of): In △AB, from the trigonometric relation, we can get: tgx ¼

W 2

x r

ð3Þ

In arc and arc, from the relationship of arc angle, we can get: h  r  x0 ¼ x  r 2  W  h 0 2 x x ¼ r  r arctan r 2

ð4Þ ð5Þ

Vertical section diagram: in △OCD, it can be obtained from the scale relation: r H2  y0 ¼ d H2  y

ð6Þ

328

J. Li et al.

Therefore, from Eq. (6), we can get: H r y ¼  2 0

H 2

y d

 ð7Þ

The projection transformation formula can be obtained from Eq. (6) and Eq. (7)  W  8 x h > 0 2 > < x ¼ r  r arctan r 2 H  > r  y > : y0 ¼ H  2 2 d

ð8Þ

3 Key Design of the Model Templates are usually represented by a circular template placed on the image. If there is an area on the template, the gray value at each pixel of the corresponding image in the area is the same as (or similar to) the gray value of the template core, then the area is defined as the core value similar area, i.e. usan, where the number of pixels is defined as the area of usan. In general, a simple 3  3 pixel window template can be selected as the circular template, but in order to determine the corner points robustly, the circular template generally uses a 7  7 pixel window template, which contains 37 pixels about the central symmetry. In the implementation of SUSAN algorithm, the circular template slides on the image, and compares the gray level of image pixels in the template with the gray level of template core at each position: ( C ðr; r0 Þ ¼

1 0

if jI ðr Þ  I ðr0 Þj  t if jI ðr Þ  I ðr0 Þj [ t

ð9Þ

Among them, R is the position of any point in the template except the core, R0 is the position of the template core, I is the gray value of the pixel, t is the threshold value of the gray value, which is used to control the number of corner points generated. When C = L, it is a member of usan. The above formula is usually replaced by a more robust form: C ðr; r0 Þ ¼ eð

IðrÞIðr0 Þ 6 Þ t

ð10Þ

Threshold T represents the minimum contrast of detected corner points and the maximum tolerance of noise. It mainly determines the number of feature points that can be extracted. The smaller the threshold T is, the more features can be extracted from the image with low contrast, and the more features can be extracted. Therefore, different T values should be taken for images with different contrast and noise.

Scene Merging Technology with High Adaptability

The sum of all points c in the template is: X nð r 0 Þ ¼ C ðr; r0 Þ

329

ð11Þ

r2Temðr0 Þ

4 Conclusion This paper analyzes the key technologies involved in image mosaic technology. Firstly, it studies the imaging principle of image, including the motion form of camera, several commonly used coordinate transformations, and the imaging model of camera. It analyzes the motion state of horizontal and vertical scanning of camera related to this subject. Secondly, it analyzes the relationship of image transformation, including how to transform the two-dimensional coordinates into three-dimensional coordinates Homogeneous coordinate representation, detailed analysis of the transformation matrix corresponding to image transformation, through the given “diagram of image transformation type” and “diagram of the relationship between camera motion mode, imaging results and image transformation type”, we know that the horizontal and vertical scanning of the camera correspond to the projection transformation matrix of 8 degrees of freedom; finally, we design the cylindrical projection transformation formula, projection back transformation Formula and bilinear difference method for restoration after geometric distortion of cylinder image.

References 1. Zhi, J., Zhang, G., Yang, F., Yang, R., Liu, F., Song, X., Zhao, Y., Li, D.: Predicting mattic epipedons in the northeastern Qinghai-Tibetan Plateau using random forest. Geoderma Reg. 10, 1–10 (2017) 2. Duan, T., Chapman, S.C., Guo, Y., Zheng, B.: Dynamic monitoring of NDVI in wheat agronomy and breeding trials using an unmanned aerial vehicle. Field Crop. Res. 210, 71–80 (2017) 3. Usevich, K., Markovsky, I.: Variable projection methods for approximate (greatest) common divisor computations. Theor. Comput. Sci. 681, 176–198 (2017) 4. Jiang, Y., Xu, K., Zhao, R., Zhang, G., Cheng, K., Zhou, P.: Stitching images of dualcameras onboard satellite. ISPRS J. Photogramm. Remote. Sens. 128, 274–286 (2017) 5. Entenberg, D., Pastoriza, J.M., Oktay, M.H., Voiculescu, S., Wang, Y., Sosa, M.S., AguirreGhiso, J., Condeelis, J.: Time-lapsed, large-volume, high-resolution intravital imaging for tissue-wide analysis of single cell dynamics. Methods 128, 65–77 (2017) 6. Mortani Barbosa, E., Simpson, S., Lee, J.C., Tustison, N., Gee, J., Shou, H.: Multivariate modeling using quantitative CT metrics may improve accuracy of diagnosis of bronchiolitis obliterans syndrome after lung transplantation. Comput. Biol. Med. 89, 275–281 (2017) 7. Shi, Z., Zhang, J., Cao, Q., Pang, K., Luo, T.: Full-reference image quality assessment based on image segmentation with edge feature. Signal Process. 145, 99–105 (2018) 8. Attard, L., Debono, C.J., Valentino, G., Di Castro, M.: Vision-based change detection for inspection of tunnel liners. Autom. Constr. 91, 142–154 (2018)

330

J. Li et al.

9. Fakiris, E., Zoura, D., Ramfos, A., Spinos, E., Georgiou, N., Ferentinos, G., Papatheodorou, G.: Object-based classification of sub-bottom profiling data for benthic habitat mapping. Comparison with sidescan and RoxAnn in a Greek shallow-water habitat. Estuar. Coast. Shelf Sci. 208, 219–234 (2018) 10. Yin, J., Ou, B., Liu, X., Peng, F.: Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching. Digit. Signal Process. 81, 173–185 (2018) 11. Zhu, W., Chen, H., Ciechanowska, I., Spaner, D.: Application of infrared thermal imaging for the rapid diagnosis of crop disease. IFAC PapersOnLine 51(17), 424–430 (2018) 12. Chang, A., Jung, J., Maeda, M.M., Landivar, J.: Crop height monitoring with digital imagery from Unmanned Aerial System (UAS). Comput. Electron. Agric. 141, 232–237 (2017) 13. Li, H., Wan, W., Fang, Y., Zhu, S., Chen, X., Liu, B., Hong, Y.: A Google Earth Engineenabled software for efficiently generating high-quality user-ready Landsat mosaic images. Environ. Model Softw. 112, 16–22 (2019) 14. Paul, K.E., Saraswathibai, V.S.: Maximum accurate medical image demosaicing using WRGB based Newton Gregory interpolation method. Measurement 135, 935–942 (2019) 15. Wang, Z., Si, B., Chen, S., Jiao, B., Yan, X.: A nondestructive raman spectra stress 2D analysis for the pressure sensor sensitive silicon membrane. Eng. Fail. Anal. 105, 1252–1261 (2019)

The Relation of Self-efficacy and Well-Being of Primary Managers: The Mediating Role of Hope Jun Luo1 and Yulan Yu2(&) 1

School of Management, Guangdong University of Science and Technology, Dongguan 523083, China 2 Department of Psychology, Guangdong Medical University, Dongguan 523808, China [email protected]

Abstract. Objective: To study the relationship between hope, self-efficacy and well-being of junior managers in small and medium-sized enterprises (SME). Methods: 312 junior managers of SMEs in Guangdong Province were investigated by Oxford Happiness Scale-revised (ROHS), General Self-efficacy Scale (GSES) and Adult Dispositional Hope Scale (ADHS). Results: (1) There were significant moderate positive correlation between hope, self-efficacy and wellbeing of junior managers in SMEs. (2) Supposing the well-being as independent and hope, self-efficacy as dependents, a regression equations can be set. Explain rates of hope and self-efficacy to well-being was 42%. (3) Hope played an incomplete mediation between self-efficacy and well-being of junior managers in SMEs. Conclusion: Enhancing the level of self-efficacy and hope of junior managers in SMEs can improve significantly their well-being. Keywords: Self-efficacy

 Subjective well-being  Hope  Junior managers

1 Introduction The junior managers of small and medium-sized enterprises directly face the front-line employees and the tasks assigned by the upper management personnel of enterprise. Their cognition or emotion when completing the task process (especially facing difficult situations or difficult tasks) affects the cognition and emotion of front-line employees directly, which directly affects productivity. Therefore, it is very important to pay attention to psychological factors such as the cognition and emotion of junior management employees [1]. The cognitions, beliefs, or emotions of junior managers accomplishing tasks involve aspects such as hope, self-efficacy, and happiness. Hope is a goal-oriented mindset and a state of positive motivation based on intrinsic success, including both agency thinking and pathways thinking. Studies by Luthans et al. for Chinese employees showed that positive psychological qualities such as hope were significantly positively related to job satisfaction and job performance [2]. Self-efficacy was proposed by the American psychologist Bandura and refers to the speculation and © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 331–335, 2021. https://doi.org/10.1007/978-3-030-51556-0_48

332

J. Luo and Y. Yu

judgment made by an individual as to whether he or she is capable of performing a certain behavior [3]. For college students, research by Yu Yulan et al. showed that hope and self-efficacy were positively correlated with subjective well-being [4]. At present, few researchers pay attention to the positive psychological quality of SME junior managers and their relationships. Based on previous studies, we assumed that the hope, self-efficacy and happiness of junior managers in SMEs were positively related and positive predictive effect on their subjective well-being; and hope played a full or partial mediating role between self-efficacy and subjective well-being.

2 Methods 2.1

Research Objects

A total of 386 junior managers of a small and medium-sized enterprise in a city of Guangdong province were selected by convenient sampling to issue questionnaires. After excluding invalid questionnaires, 312 valid questionnaires were obtained. 2.2

Research Instruments

Oxford revised happiness scale (ROHS) was used to measure well-being. It contains 29 items and adopts 4-level scoring from 0 to 3. The scores of each question are added together to get the total score [5]. The general self-efficacy scale (GSE) has a total of 10 items, with a 4-level scoring from 1 to 4. The total score ranges from 10 to 40, and the higher score means the higher confidence [6]. The Adult Dispositional Hope Scale (ADHS) contains 12 items with a 4-level scoring from 1 to 4, including two subscales of agency thinking and pathways thinking [7, 8]. 2.3

Statistics and Data Processing

SPSS20.0 and AMOS24.0 software were used for data input and statistical analysis. Pearson correlation coefficient, step by step regression analysis and the mediating effect test based on Bootstrap technology were used. The mediating effect was based on the standard report fitness index of Hair et al. [9]: CFI  0.95 or TLI  0.90, RNI  0.92 (when the sample size was less than 1000, it needed to be reported), RMSEA < 0.07 or SRMR < 0.08.

3 Results 3.1

The Relationship Between Hope, Self-efficacy and Happiness of Junior Managers in SMEs

As can be seen from Table 1, the hope, self-efficacy and happiness of junior managers of SMEs were positively correlated with each other.

The Relation of Self-efficacy and Well-Being of Primary Managers

333

Table 1. Correlation coefficients of hope, self-efficacy and well-being Pathways thinking Pathways thinking 1 Agency thinking 0.462** Hope 0.851** Self-efficacy 0.692** Well-being 0.510** **Significant at 0.01 level (2-tailed)

Agency thinking Hope 1 0.859** 0.506** 0.578**

Self-efficacy Well-being

1 0.699** 1 0.637** 0.533**

1

A stepwise regression analysis was conducted with hope and self-efficacy as independent variables and happiness as dependent variables. As can be seen from Table 2, hope and self-efficacy were entered into the equation (F = 112.24, p < 0.001), and the explanation rate of the two factors for happiness was 42%. The regression equation can be established as following, subjective well-being = −0.019 + 0.436 hope + 0.137 self-efficacy.

Table 2. Regression analysis of hope, self-efficacy and happiness Dependent variable

Predictor variable (constant) Well-being Hope Self-efficacy

3.2

Standard regression coefficient Beta 0.517 0.171

t

P

F

sig.

R

R2

−0.181 0.857 8.543 0.000 112.24 0.000 0.65 0.42 2.824 0.005

Hope as Mediating Effect of Managers’ Self-efficacy and Happiness

AMOS was used to construct the structural equation model. The fitting indexes of the model were as follows: x2/df = 2205.820/1221 = 1.807, p = 0.000; CFI = 0.962, RNI = 0.933, RMSEA = 0.051. Although the p-value of the chi-square was less than 0.05, it is generally believed that x2/df less than 3 indicates that the model fits well. Therefore, on the whole, we believed that the model indicators meet the standard and the model was acceptable. The mediating effect used bootstrap technique (1) to estimate the standard error and non-standardized coefficient of the indirect effect, and then calculate the significance level (Z value) of the indirect effect (2) to re-estimate the standard error and confidence interval of the introduction effect to see if 0 is included. If the confidence interval does not contain 0, the product of coefficients is significant. The results of coefficient product in Table 3 showed that the total effect and indirect effect were significant, but the direct effect was not. The two tests of Bootstrap showed that the confidence interval of the total effect did not include 0, and the total effect existed. The confidence interval of indirect effect did not contain 0, and the intermediary effect existed. The confidence interval of direct effect did not include 0, direct effect existed.

334

J. Luo and Y. Yu Table 3. Report on mediating variables of self-efficacy and happiness Variable

Point estimates Product of coefficients SE

Total effects Self-efficacy ! Indirect effects Self-efficacy ! Direct effects Self-efficacy ! Note: wb means

Z

Bootstrapping Bias-corrected 95% CI Lower Upper

Percentile 95% CI Lower Upper

wb

0.612

0.093

6.58

0.455

0.834

0.451

0.831

wb

0.944

0.232

4.07

0.631

1.550

0.633

1.558

wb −0.33 well-being

0.20

−1.65 −0.81

−0.05

−0.83

−0.06

4 Discussion Table 1 and Table 2 showed that there was a significant positive correlation between hope, self-efficacy and well-being of junior managers in SMEs, and hope and selfefficacy had a positive predictive effect on well-being. This was consistent with the research results of Huigui et al. [10], who conducted a survey on 237 leaders from government organs, public security organs and public institutions of various counties, cities and districts in Chongqing and found that leaders’ hope and self-efficacy had a significant positive correlation and predictive effect on their subjective well-being. Similar to the research results of Yulan et al. [4] on college students. In other words, improving the sense of hope or self-efficacy of junior managers in SMEs was conducive to improving their level of happiness. Specifically for self-efficacy, hope, and happiness, exploration of the relationship between the three research was not much, we can only search to Huigui’s [10] study in CNKI. They used Baron and Kenny (1986) to test the mediate effect which was widely used, but in recent years constant criticism and questioning. Since 1998, Mackinnon [11] has compared a dozen test methods through simulation studies and suggested using a high-power test method. Therefore, based on Mackinno’s suggestion, we used bootstrap technology to obtain the confidence interval to see if it contained 0. The results in Table 3 showed that the total effect and indirect effect significantly exist, indicating that there was a mediation effect, but whether it was a complete mediation effect or an incomplete mediation effect, the two have inconsistent results. The Z value of the direct effect calculated by this method in the coefficient product was −1.65, and the absolute value was less than 1.96, and the effect was not significant. However, the confidence interval obtained did not contain 0 by two Bootstrap techniques, indicating that the direct effect was significant. According to the z-value size and the results of the two types of Bootstrap, we tended to believe that the direct effect was significant and hope was a mediating role in self-efficacy and well-being. That was, self-efficacy not only worked on well-being through hope, but also directly on well-being through selfefficacy. Since self-efficacy refers to the degree of individual’s confidence in the ability

The Relation of Self-efficacy and Well-Being of Primary Managers

335

to successfully complete tasks in a specific situation, people with a high sense of selfefficacy have a positive attitude towards themselves and the tasks they can complete. Such a positive attitude provides motivation for individual actions to complete tasks and achieve goals. At the same time, hope also provides the motivation (agency thinking) for the individual and the means and means (pathways thinking) for action to accomplish the task and achieve the goal. When individuals are full of high sense of self-efficacy and hope, and continue to achieve goals, and well-being arises. The goal theory believes that well-being results from the satisfaction of needs and the realization of goals. Acknowledgements. Research project of guangdong university of science and technology in 2020: Research on self-efficacy of primary managers.

References 1. Snyder, C.R.: Hope theory: rainbows in the mind. Psychol. Inq. 13(4), 249–275 (2002). (in Chinese) 2. Luthans, F., Avlio, B., Walumbwa, F.: The psychological capital of Chinese workers: exploring the relationship with performance. Manag. Organ. Rev. 1(2), 249–271 (2005). (in Chinese) 3. Lin, Y., Wang, X., Hu, Y.: Social Basis of Thought and Action: Social Cognition. East China Normal University Press, Shanghai (2001). (in Chinese) 4. Yu, Y., Luo, J.: Relationship between positive personality and psychological quality in college students. Chin. Health Serv. Manag. 3, 222–225 (2012). (in Chinese) 5. Zheng, X.: Positive Psychology—The Science of Human Happiness and Power. China Light Industry Press, vol. 1, pp. 7–10 (2008). (in Chinese) 6. Ren, J.: Positive Psychology. Shanghai Education Press, Shanghai (2006). (in Chinese) 7. Wang, C., Hu, Z., Liu, Y.: Research on reliability and validity of general self-efficacy scale. Appl. Psychol. 7(1), 38–40 (2011). (in Chinese) 8. Wen, Z., Ye, B.: Analysis of mediating effects: method and model development. Prog. Psychol. Sci. 22(5), 731–745 (2014). (in Chinese) 9. Hair Jr., J.F., Black, W.C., Babin, B.J., et al.: Multivariate Data Analysis, 7th edn, pp. 639– 650. Prentice Hall, Englewood Cliffs, NJ (2009) 10. Huigui, L., Xiaofu, P.: The influence of leaders’ hope and self-efficacy on their subjective well-being. Psychol. Explor. 31(2), 176–181 (2011). (in Chinese) 11. MacKinnon, D.P., Lockwood, C.M., Hoffman, J.M.: A new method to test for mediation. In: Paper Presented at the Annual Meeting of the Society for Prevention Research, Park City, UT, June 1998

Image Feature Matching Before Image Fusion Dingyun Jin, Ou Qi(&), and Xiaoyan Gao Changchun Institute of Engineering and Technology, Changchun 130000, China [email protected]

Abstract. Image matching is the most important factors that restrict image fusion technology development. The quality of image matching is directly related to the quality of image fusion. The image with low matching degree will have serious distortion in fusion, and high-precision matching is a NP problem. The method of coarse matching + fine matching is adopted. In the coarse matching, the nearest neighbor and the next nearest neighbor Euclidean distance ratio are used as the similarity criteria of feature point matching to screen out the coarse matching point pairs; in the fine matching, the RANSAC algorithm is used to filter the coarse matching point pairs, and the outer points are removed to get the fine matching point pairs required by the transformation matrix. Through this matching method, the accuracy and speed of matching are improved, which lays a foundation for the realization of high-quality image fusion. Keywords: Image matching

 Coarse matching  Fine matching

1 Introduction Image matching is the method that consure the parameters images based on some similarity measures, in order to make that images come from different time and places that can be transformed to the same coordinate system, and the best matching process on pixel level is simultaneous interpreting the characteristic of image 1. Feature points, and then for any feature point in image 2, find the feature point with the largest correlation in image 1 [1–3]. When the feature points with the largest correlation found in two-way search correspond to each other, it is considered to find a pair of matching points [4, 5]. Selecting a reasonable feature space can improve the adaptability of the matching algorithm, reduce the search space, and reduce the impact of uncertain factors such as noise on the matching algorithm. Search space is a space composed of parameters to be estimated, that is, searching for the optimal solution in the space composed of all possible transformations. Image matching is a problem of parameter optimal estimation. The transformation of an image can be divided into two types: global transformation and local transformation. The global transformation is usually based on the theory of matrix algebra. A parameter matrix is used to describe the transformation of the entire image [6–9]. Typical global geometric transformations include translation, rotation, isotropic or anisotropic scaling, quadratic or cubic polynomial transformation, etc.; local transformation allows the transformation parameters to have position dependence, that is, different positions With different transformation parameter models, © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 336–342, 2021. https://doi.org/10.1007/978-3-030-51556-0_49

Image Feature Matching Before Image Fusion

337

the type and intensity of imaging distortion determine the composition and range of search space [10–13]. In this paper, we use projection transformation, so we search the optimal solution in projection transformation space [14, 15].

2 Rough Matching Model Design The matching process is simply divided into rough matching of feature points, i.e. initial matching of feature points and accurate matching of feature points, i.e. accurate matching of feature points. Rough matching is to find the corresponding feature point pairs between the feature points of one image and the feature points of another image. After the SIFT feature vectors of two images are generated, Lowe proposes to use the Euclidean distance ratio to exclude the outliers in view of the large number of outliers in image matching. In this paper, the distance is be explored to make sure the image fusion exactly. In these two key points, if the nearest distance divided by the next nearest distance is less than a certain scale threshold, then the matching points are accepted. If the ratio threshold is reduced, the number of sift matching points will be less, but more stable. The typical robust nearest neighbor search algorithms are k-d tree and BBF nearest neighbor search method. Because the amount of sift feature points extracted is too big and the amount of descriptor dimension is too high, if the Euclidean distance between descriptors can be computed directly, the time used is too big, this paper uses BBF search strategy to search, and then select the Euclidean distance to calculate the outliers for rough matching of feature points. Taking the Euclidean distance between two feature point descriptors as the similarity criterion of feature point matching, assuming that the feature descriptors of feature point pair and are respectively and, the Euclidean distance is defined as: sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi X  2 d¼ Descriptorp ðkÞ  Descriptorq ðkÞ

ð1Þ

k¼0;1;2;...;127:

Firstly, the algorithm BBF is used to search two approximate nearest and next nearest feature points of each feature point, calculate the Euclidean distance between the feature point pi and its nearest neighbor qi , next nearest feature point qi þ 1 , and then calculate last distance between pi and qi and pi and qi þ 1 two sets of descriptors. Assume the ratio is low than the determination threshold, it is considered that the matching is successful, and the receiver point pair (pi , qi ) is the image order A pair of match points in the column, otherwise the match fails.

3 Design of Precise Matching Model Euclidean distance can only estimate the matched feature points, but it still can’t guarantee the complete accuracy of the matched point pairs, and there may be wrong matched point pairs. If these wrong points are not removed completely, the calculation of perspective transformation matrix will cause great errors, leading to the splicing

338

D. Jin et al.

failure. Therefore, it is necessary to use the robust estimation algorithm which can iterate and refine to refine the rough matching. The main robust methods are MSAC estimation algorithm, minimum median method and RANSAC method. In this paper, RANSAC method is used to precisely match the feature points of sift operator. MSAC (M-estimator sample consensus) is a robust estimation method proposed by Torr and zisserman in the field of image geometry. Its principle is to randomly sample all the matched point pairs of two images, find all the point pairs in the samples, and minimize the cost of getting the Euclidean distance sum of the point pairs through repeated iterations, so that it is less than the set threshold or more than the number of iterations, The final point pair is the correct matching point pair. The specific algorithm is as follows: P Calculating Euclidean distance between pairs of feature points e2i i¼1;2;...;n i i P h P h P ¼ ðxi  x0i Þ2 þ ðyi  y0i Þ2 and e2i ¼ ðxi  x0i Þ2 þ ðyi  y0i Þ2 . i¼1;2;...;n

i¼1;2;...;n

X i¼1;2;...;n

Where is

P i¼1;2;...;n

e2i ¼

X h

i¼1;2;...;n

ðxi  x0i Þ2 þ ðyi  y0i Þ2

i

ð2Þ

i¼1;2;...;n

e2i the distance function of point pair, and its sum cost: C¼

X

q2 ðe2i Þ

ð3Þ

i

The error q2 ðe2i Þ function meets the following requirements: Here is T 2 the given threshold.

4 Realization of Precise Matching Model Calculate the residual difference of all matching point data and take the median as the standard. The matching points satisfying the less than median value are taken as optimization samples, and the basic matrix is recalculated. The collapse point estimation method is as high as 50%, i.e. the outliers can account for up to half of the whole data set without affecting the value of the cost function. It has the characteristics of no need to provide a priori threshold and is suitable for parallel computation. Because the minimum median method is robust to the interference of wrong position and wrong matching, the selected points are some points withsmaller errors.  The algorithm is as follows: given n corresponding points ðxi ; x0i Þji ¼ 1; 2; . . .; n (Fig. 1).

Image Feature Matching Before Image Fusion

339

w(x)

width i

x

Fig. 1. Hat function

The weighted average method of hat function gives lower weight to the pixel in the center of the image area and the pixel in the edge area of the image. The weight function adopts hat function: 1. Determine the number of times N of random adoption. The specific calculation process refers to the repeated times of RANSAC algorithm and adopts the determination method randomly. 2. Calculate the projection transformation matrix of each sub-sample   Hj jj ¼ 1; 2; . . .; N : 3. For each matrix, the residual square of each point pair can be calculated. Take the middle value of the square of the residual error and record it as   Mj ¼ median ri2

ð4Þ

ri2 ¼ d 2 ðx0i ; Hj xi Þ þ d 2 ðxi ; Hj1 x0i Þ

ð5Þ

i1;...;n

Where d is the European distance. 4. The smallest of all N Mj is denoted as Mmin , and its corresponding transformation matrix is Hmin . 5. To reduce the influence of noise, calculate the variance of robust estimation: r ¼ 1:4826 1 þ

pffiffiffiffiffiffi 5 Mj n3

ð6Þ

Constant is a correction coefficient with the same efficiency as the least square method when Gaussian noise is reached, and is used to compensate the effect of small data sets. Weights are calculated based on variance: The weight of 0 is the outer point, and the contribution to h is 0. Points with a weight of 1 are interior points to form a new sample space, which is the sample space formed by the required advantages. 6. In the new sample space, the least square method is used to calculate the new transformation matrix H.

340

D. Jin et al.

The algorithm process is as follows: 1. Repeated sub-random sampling First, the current best estimate number of interior points Ni is set to O. When randomly used, the ideal situation is to search for all possible combinations, but the computation is very large. If the matching points needed by the model estimation are s pairs, then an appropriate number of adoptions can be determined to ensure that the probability that the S pairs of matching points sampled at this time are all interior points is high enough. If the probability that the matching point is an interior point is set as, then the actual application can be satisfied as long as the probability exceeds 95%. Set the probability that any pair of matching points is interior points, that is, the probability that any pair of matching points is exterior points, then when sampling to n times, there are:  N 1  ps1 ¼ 1  p

ð7Þ

Therefore, the number of random uses can be obtained according to the formula. N¼

lgð1  pÞ lgð1  ð1  eÞs Þ

ð8Þ

2. Randomly select 4 pairs of matching points that are not collinear at any 3 points, and calculate the projection transformation matrix linearly according to the formula H; 3. Calculate the Euclidean distance dðx0 ; HxÞ from each matching point x to the corresponding matching point x0 after matrix transformation. 4. Set a distance threshold t between the inner point and the outer point. The range of the threshold t is 0.0010 * 01. For the determination of specific thresholds in practice, we can assume that the extraction error of feature points is Gaussian distribution with a mean value of 0 and a standard deviation of r. The measure defined in this paper, the square of Euclidean distance dðx0 ; HxÞ is a normal population variance hypothesis test problem, which can be approximated by a twodegree-of-freedom distribution v2 with  a confidence of 95%, i.e. a significant level 2 2 hypothesis test: p v ð2Þ [ v0:05 ð2Þ ¼ 0:05. With a value of 5.991, thus obtaining the selection of thresholds and giving each match a weight value: wi ¼

11 0

D  5:991r2 D [ 5:991r2

ð9Þ

Where r is the robustness standard variance: r ¼ 1:4826 1 þ

pffiffiffiffiffiffi 5 Mj n3

ð10Þ

Image Feature Matching Before Image Fusion

341

Constant is a correction coefficient that is as efficient as the least square method when Gaussian noise is reached. 5=ðn  3Þ is in order to compensate the effect of the small data set. Mj is the value obtained after the maximum inner point set reevaluates H; 5. By comparing with the threshold t, determine how many matching points are consistent with H, i.e. the matching points absðdÞ\t that are satisfied are taken as interior points; 6. Comparing the current number of interior points with Ni , if greater than Ni , taking H and the current set of interior points as the current best estimate, and updating Ni ; If it is equal to Ni , the one with lower matching is selected as the current best estimate, and the remaining required iteration number N is dynamically estimated at the same time; If the current iteration number reaches N, then H and the current interior point set are retained and iteration is stopped; 7. Re-estimate all matching points of the current interior point set H. If the total feature point pair is n pair, the number of internal points is ð1  eÞn. After the matrix and the corresponding matching points are estimated, the root mean square geometric error is usually used to measure the estimation accuracy of the transformation matrix, which is called the matching error, and the formula is as follows:

RMS ¼

vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi uP un u dðx0i ; Hxi Þ2 ti¼1 n

ð11Þ

Due to the dynamic prediction mechanism of iteration times, the proportion of outer points will directly affect the number of iterations of the algorithm. The larger the proportion of outer points, the more iterations of the algorithm and the more time it takes.

5 Conclusion Through the problem of difficult matching in image fusion, the method of coarse matching + fine matching is used to solve. Through this method, the problem of poor precision of coarse matching is solved, and the problem of long matching time and low matching efficiency in fine matching is avoided. Through this method, the quality and effect of matching are improved, which lays the foundation for the next image fusion.

References 1. Hou, Y., Zhang, H., Zhou, S.: BoCNF: efficient image matching with Bag of ConvNet features for scalable and robust visual place recognition. Auton. Robots 42(6), 1169–1185 (2018) 2. Hast, A., Sablina, V.A., Sintorn, I.-M., Kylberg, G.: A fast fourier based feature descriptor and a cascade nearest neighbour search with an efficient matching pipeline for mosaicing of microscopy images. Pattern Recognit. Image Anal. 28(2), 261–272 (2018)

342

D. Jin et al.

3. Machado, I., Toews, M., Luo, J., Unadkat, P., Essayed, W., George, E., Teodoro, P., Carvalho, H., Martins, J., Golland, P., Pieper, S., Frisken, S., Golby, A., Wells, W.: Nonrigid registration of 3D ultrasound for neurosurgery using automatic feature detection and matching. Int. J. Comput. Assist. Radiol. Surg. 13(10), 1525–1538 (2018) 4. Wu, M.: Research on optimization of image fast feature point matching algorithm. EURASIP J. Image Video Process. 2018(1), 106 (2018) 5. Divya Lakshmi, K., Rajappa, M., Krithivasan, K., Roy, D.S.: Helly hypergraph based matching framework using deterministic sampling techniques for spatially improved point feature based image matching. Multimedia Tools Appl. 78(11), 14657–14681 (2019) 6. Kong, B., Supancic, J., Ramanan, D., Fowlkes, C.C.: Cross-domain image matching with deep feature maps. Int. J. Comput. Vis. 127(11–12), 1738–1750 (2019) 7. Li, H., Wang, S., Zhao, Y., Wei, J., Piao, M.: 3D view image reconstruction in computational integral imaging using scale invariant feature transform and patch matching. Opt. Exp. 27(17), 24207–24222 (2019) 8. Liu, X., Li, J.-B., Pan, J.-S.: Feature point matching based on distinct wavelength phase congruency and log-gabor filters in infrared and visible images. Sensors (Basel, Switzerland) 19(19), 4244 (2019) 9. Jeong, S., Howat, I.M., Ahn, Y.: Improved multiple matching method for observing glacier motion with repeat image feature tracking. IEEE Trans. Geosci. Remote Sens. Publ. IEEE Geosci. Remote Sens. Soc. 55(4), 2431 (2017) 10. Fan, J., Yang, J., Wang, Y., Yang, S., Ai, D., Huang, Y., Song, H., Wang, Y., Shen, D.: Deep feature descriptor based hierarchical dense matching for X-ray angiographic images. Comput. Methods Prog. Biomed. 175, 233–242 (2019) 11. Zhu, H., Zou, K., Li, Y., Cen, M., Mihaylova, L.: Robust non-rigid feature matching for image registration using geometry preserving. Sensors (Basel, Switzerland) 19(12), 2729 (2019) 12. Tu, Z., Lin, T., Sun, X., Dou, H., Ming, D.: A hybrid features based image matching algorithm. In: International Symposium on Multispectral Image Processing and Pattern Recognition (2015) 13. Wang, G., Guo, F., Lv, Q., Ma, J.: Research on features matching method for visual odometry based on depth image. Other Conferences (2015) 14. He, H., Du, J., Chen, X., Wang, Y.: Oblique low-altitude image matching using robust perspective invariant features. In: International Conference on Electronics and Information Engineering (2017) 15. Liu, N., Zhang, B., Jiao, Y., Zhu, J.: Feature matching method for uncorrected fisheye lens image. In: International Symposium on Precision Mechanical Measurements (2016)

The Role of Drone Photography in City Mapping Shiheng Zhao(&) Liaoning Jianzhu Vocational College, Liaoyang 111000, Liaoning, China [email protected]

Abstract. Since the urbanization construction, the development of urbanization has been accelerating. Some departments have a greater demand for large-scale topographic maps, and they have greater requirements for the timeliness of mapping. Some small-scale mapping data updates need to be completed manually. To a great extent, the work efficiency is reduced and the work intensity is increased. With the development of science and technology, drone technology is gradually developing, drone aerial photogrammetry technology mainly uses low-altitude light and small drone remote sensing systems to complete the mapping of cities. It has the advantages of high resolution, flexibility, and weather resistance, and is easy to operate and mobile. Strong sex. In addition, the application of drone aerial photogrammetry technology in the process of city map drawing not only reduces the difficulty of manual calculation, but also greatly improves the calculation accuracy and work efficiency, and provides a true and scientific basis for the city map drawing data. The purpose of this article is to study and verify the role of drone photography in urban mapping. This article conducts a simulation experiment on a small town, using aerial triangulation, tilt measurement and other technologies suitable for drone photography. After data processing, a three-dimensional model is obtained and compared with actual data to obtain the drone. Photography technology can be applied to conclusions such as urban map drawing, and it proves that it can greatly improve the production efficiency of data acquisition and reduce the labor intensity of field surveyors. Keywords: Drone photography

 City map  3D model  Survey drawing

1 Introduction Since the introduction of the “digital earth” concept in 1998, all areas of human existence have also entered the digital era, and concepts such as “smart earth”, “digital country”, “smart city”, and “digital transportation” have continuously emerged in society. The emergence of these concepts has also promoted the development and use of remote sensing technology, geographic information systems and global positioning systems. At present, drone technology is used for major project monitoring, monitoring of natural disaster areas, safety inspections in dangerous areas, and shooting videos at high altitudes. And production of three-dimensional urban landscape has been widely used. Therefore, it can be applied to the mapping of cities. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 343–348, 2021. https://doi.org/10.1007/978-3-030-51556-0_50

344

S. Zhao

The Yijun F team compared the gray matching and feature matching algorithms, proposed the SIFT feature matching algorithm method, and performed consistent image measurements with the drone. The actual scene. Through the building measurement test, the ics. With high-precision matching of the main feature objects is obtained [1]. The E. Oinga team uses a drone system, a widely used acquisition technology that can create 3D models of buildings, so that a large number of images can be acquired in a short period of time with high resolution or video sequences. Since low-cost drone systems are preferred, the accuracy of 3D models of buildings created using this platform must be evaluated. To get results, the team chose the Dean’s Office Building of the Department of “Hydraulic Engineering, Geodesy and Environmental Engineering” in Iasi, Romania, a complex shaped building with a roof consisting of two hyperbolic paraboloids. The team placed seven points on the ground around the building, three of which were used as GCPs and the remaining four points were used as checkpoints for accuracy assessment. The coordinates of 10 natural checkpoints representing the characteristic points of the building were measured using the Leica TCR 405 total station. The 3D model of the building is created as a point cloud, which is automatically generated from digital images acquired using a low-cost drone system. In the end, the team proved that the complex 3D model of image reconstruction obtained by low-cost drones has certain practicability and convenience [2]. Based on this, the aerial triangulation, tilt measurement and other methods are used in the drone photography technology, which improves the accuracy of the data obtained by the drone, analyzes the experimental results, and proposes some related technologies for the drone. Suggestions for improvement. It is hoped that the data error obtained by the drone technology can reduce the level by another level.

2 Method 2.1

Related Applications of Drones

The characteristics of fast, high-definition, flexible, and multi-angle acquisition of drones not only make up for the shortcomings of satellite remote sensing technology in acquiring data, but also can use multiple angles to obtain ground texture information, so that the establishment of three-dimensional models has sufficient data sources [3]. The basic components of a mature and complete UAV tilt photogrammetry system mainly include: unmanned aerial platform system, flight navigation and control system, mission equipment, data transmission system, ground monitoring system, comprehensive support system and device [4, 5]. The overall workflow of the technology includes four parts: route setting, aerial operations, data processing and data analysis. This article will detail the optimization of drone flight parameter settings and modeling accuracy optimization in the construction engineering application of this technology route. See [6, 7].

The Role of Drone Photography in City Mapping

2.2

345

Tilt Measurement Technology

Tilt photogrammetry has four characteristics: simple data acquisition and less impact from the external environment; access to multiple viewpoint images with real image effects; small amount of data, easy to publish online for shared applications; high image resolution, and clear display Building texture and ground occlusion are rare [8]. In view of these characteristics, oblique photogrammetry usually includes key contents such as image preprocessing, regional network joint adjustment, multi-view image matching, digital surface model generation, true radiographic correction, 3D modeling, etc. [9]. 2.3

D Reconstruction

Three-dimensional reconstruction mainly uses the extraction of a large number of points with the same name to construct an irregular triangular surface, and pastes the texture on the triangular surface to build a true three-dimensional model [10]. The following formula M can be used to calculate the error, x is the abscissa of the orthophoto, y is the ordinate of the orthoimage, and n is the number of inspection points. pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi P 2 ðDx þ Dy2 Þ M¼ n1

ð1Þ

3 Experiments A city is a political, economic, and cultural center within a certain area. The development of a city is a symbol of social modernization. The number of place names in the city is large, the types are diverse, the density is high, and the frequency of use is high. Therefore, the management of place names in cities is also one of the indispensable basic tasks in urban construction, and it also reflects the degree of urban material civilization and spiritual civilization. The basic urban topographic map is the most basic basic geographic information for urban construction, planning management, and land and resources management. Its role in many fields such as urban planning, construction, transportation, management, social and public services, and sustainable development research is becoming increasingly important, and the requirements for the accuracy, current status, and coverage of basic topographic maps are also increasing. This article uses drone photography to draw city maps. After analyzing and processing the data obtained by the drone, it is concluded that the drone photography technology can greatly promote the mapping of cities. At the same time, it describes some problems in this method and proposes related improvement methods.

4 Discussion 4.1

UAV Technology and Its Related Use Prospects

The UAV 3D reconstruction technology not only has the same application functions as the manually created 3D model, but also has a fast update speed, and the model is more

346

S. Zhao

beautiful, real and complete. The unique advantages of drone-related technologies have promoted their own development and broadened their application fields. With the continuous development of technology, their use in 3D city maps of drones, tourism development, mining environment monitoring, agricultural and forestry resource monitoring, and disasters It has application prospects in emergency rescue and oil and gas exploration. The intelligence of the technology and the practicality of the results will also make it one of the preferred high-tech in more fields. Ordinary aerial photography and satellite optical remote sensing technology are susceptible to the influence of clouds, and the authenticity is somewhat biased. Traditional aerial photography is easily affected by high-rise buildings when acquiring images. In comparison, drones obtained by low-altitude flight Not only will not be affected by cloud occlusion, but also can obtain higher resolution images. UAV low-altitude photogrammetry technology can also take pictures from multiple angles, reducing the disadvantages of being affected by buildings. Low-altitude photogrammetry technology for drones has been widely used at present, and urban surveying and mapping functions are gradually improving. In urban surveying and mapping, the role of drone low-altitude photography has been recognized by many industries. For example, national agencies such as the Hydrographic Bureau and the Land Bureau are using drone low-altitude photography. The combination of detection, real-time monitoring of flood control data, and regular aerial photography and measurement of the surrounding terrain allow the staff of the Hydrographic Bureau to grasp the latest hydrological data as soon as possible and analyze it to ensure that the annual hydrological notification is timely. However, the current talents in the application of drones are currently very scarce. Whether it is the operators of drones or the developers and designers of drones, such professionals are seriously lacking. With the continuous development of drone technology, the demand for talent in this area will continue to rise in the future. The current use of drones is shown in Fig. 1:

military Aerial photography Aerial photography of power system Logistics air transportation Terrain Survey and Mapping other Fig. 1. The current use of drones

The Role of Drone Photography in City Mapping

347

As shown in Fig. 1, although drones have been applied to terrain-related aspects, they can only account for about 15% of the total, and most of them are used in archeology, geography, etc., and rarely used in urban maps. Mapping, so it is necessary to apply its technology to the related aspects of city mapping. 4.2

Measurement Results

Through the above experiments, after comparing the map model with the actual terrain, we get Table 1.

Table 1. Drone measurement results and actual data error values Feature type Flat Elevation Maximum error/m Medium error/m Maximum error/m Medium error/m Highway 0.214 0.13 0.312 0.19 Corner 0.327 0.21 0.452 0.27 Field 0.478 0.26 0.624 0.31

In summary, UAV aerial photogrammetry technology can effectively make basemaps during topographic surveying, and has higher use value than field surveys. It not only captures high-resolution images, but also facilitates staff classification and judgment And, it can also mark the ownership in the base map, which can effectively save the manual drawing time and improve the work efficiency of the staff. The method can also be applied to other aspects of terrain measurement.

5 Conclusions This article not only verifies the feasibility of the application of drone photography technology to urban map drawing, but also proves that it can greatly improve the production efficiency of data acquisition and reduce the labor intensity of field surveying and mapping personnel. With the support of drone aerial photogrammetry technology, it can improve the measurement efficiency and quality of large-scale topographic maps, provide technical support for the implementation of corresponding measurement work plans, and achieve the measurement goals in this regard. Therefore, in the future, in the process of improving the measurement efficiency of large-scale topographic maps and optimizing their measurement methods, sufficient attention should be given to the application of aerial photogrammetry technology in drones, and the technical means in this type of topographic map measurement will be continuously enriched to meet the needs of the times. Progressive development requirements.

348

S. Zhao

References 1. Yijun, F., Qichao, Z.: Research on the key technology of survey measurement image based on UAV. Electron. Meas. Technol. 3(2), 99–103 (2018) 2. Oniga, E., Chirilă, C., Stătescu, F.: Accuracy assessment of a complex building 3D model reconstructed from images acquired with a low-cost Uas. ISPRS-Int. Arch. Photogramm. Remote. Sens. Spat. Inf. Sci. XLII-2/W3, 551–558 (2017) 3. Matzen, K., Cohen, M.F., Evans, B.: Low-cost 360 stereo photography and video capture. ACM Trans. Graph. 36(4), 1–12 (2017) 4. Tavana, M., Khalili-Damghani, K., Santos-Arteaga, F.J., et al.: Drone shipping versus truck delivery in a cross-docking system with multiple fleets and products. Expert Syst. Appl. 72, 93–107 (2017) 5. Yijun, F., Qichao, Z.: Research on the key technology of survey measurement image based on UAV. Electron. Meas. Technol. 3(2), 99–103 (2018) 6. Schaffer-Smith, D., Swenson, J.J., Reiter, M.E., Isola, J.E.: Quantifying shorebird habitat in managed wetlands by modeling shallow water depth dynamics. Ecol. Appl. 28(6), 1534– 1545 (2018) 7. Cantoro, G.: Ground and aerial digital documentation of cultural heritage: providing tools for 3D exploitation of archaeological data. Int. Arch. Photogramm., Remote. Sens. Spat. Inf. Sci. XLII-2/W3, 141–145 (2017) 8. Liu, C., Park, J., Spencer, B.F., et al.: Sensor fusion for structural tilt estimation using an acceleration-based tilt sensor and a gyroscope. Smart Mater. Struct. 26(10), 105005 (2017) 9. Ross, M.P., Venkateswara, K., Hagedorn, C.A., et al.: Low frequency tilt seismology with a precision ground rotation sensor. Seism. Res. Lett. 89(1), 67–76 (2017) 10. Shi, Y., Hao, L., Cai, M., et al.: High-precision diameter detector and three-dimensional reconstruction method for oil and gas pipelines. J. Pet. Sci. Eng. 165, 842–849 (2018)

A Cognitive Analysis of Conceptual Metaphors of Color Idioms in English and Chinese Based on Data Mining Shiqing Zhou(&) Xi’an Traffic Engineering Institute, Xi’an 710300, China [email protected]

Abstract. There are many color-related idioms in English and Chinese. The use of color in idioms adds beautiful color to the expression of language. Due to the differences in national culture, “color idioms” bring different cultural imprint. It is of great significance to accurately understand and grasp the meaning and difference between Chinese and English color-related idioms. Color is a precious gift from god to mankind, and it is a great masterpiece. There are also a large number of color words in both English and Chinese. Color metaphor is not only a very important tool for us humans to understand the cognitive world, but it is also a language phenomenon and cognitive system. The article briefly introduces the concepts and important features of conceptual metaphors, and then compares and analyzes the similarities and differences between English and Chinese. There are a lot of idioms and proverbs about colors in English and Chinese languages, and these languages have deep cultural accumulation behind them. Therefore, these words show different degrees of semantic equivalence in expressing linguistic meaning. However, due to differences in cultural backgrounds such as national customs, geographical environment, thinking forms, religious beliefs, and national psychology, the visual and psychological associations, cultural connotations, and meanings of color words produced by various nationalities are different from each other. Keywords: Metaphor cognition idioms in English and Chinese

 Cultural contrast  Data mining  Color

1 Introduction Cognitive linguistics is a linguistic school that studies the relationship between the general principles of language and the laws of human cognition. Cognitive linguists believe that human cognitive processes and language development are inextricably linked to the world outside human cognition [1, 2]. In the vast cognition field of human beings, color plays a very important role in human thinking and daily life [3]. It is one of the most basic areas of cognition. It not only has its own unique physical properties, but also has extremely rich cultural connotations [4]. Whether visually or emotionally, people respond to color and give it a specific meaning. However, due to cultural differences, different countries and nations have very different cognitions and understandings of even the same color. As a result, color metaphors with extremely rich © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 349–355, 2021. https://doi.org/10.1007/978-3-030-51556-0_51

350

S. Zhou

quantitative connotations will be produced. This article will briefly compare and analyze the conceptual metaphors of the concepts and important features in English and Chinese from the perspective of cognitive semantics [5, 6]. Everything has a different shape and color, and the connection between color and things becomes closer, so the color idiom also has its unique metaphorical characteristics. Metaphor is a way of describing something, calling it another thing, implying that it has qualities similar to that thing. For example, if you want to say that someone is very shy or timid, you can say that he/she is a mouse. Metaphors are similar products, and color idioms contain many different metaphors [7, 8]. The idioms composed of color words in English and Chinese are colorful, with many usages and profound connotations. They have their own cultural characteristics. Correctly understanding and using these idioms is very helpful for revealing the differences between Chinese and Western cultures and for effective communication [9]. The understanding of the rational meaning of color words is roughly the same across the world. However, once a color word enters society, it will manifest a certain cultural connotation, associative meaning and linguistic meaning in different times, different regions, and different nationalities [10]. These differences make color words sometimes show a unique personality, which makes people understand and use colors differently [11]. Therefore, paying attention to the study of color words in language helps to better understand language and increase the image and diversity of language; on the other hand, it can provide a reference for studying the unique folk culture of various nationalities.

2 Method 2.1

Conceptual Metaphor

Conceptual metaphors are abstracted from a large number of salient features of life and controversy in everyday life, literary language, and they are the cognitive result of the realization of the abstract concept of “life”. Therefore, it is not difficult to see that conceptual metaphors are highly generalized. The proposition of conceptual metaphors can make us more clearly understand the rich and abundant metaphor expressions in our daily life. In the following, I will use conceptual metaphor theory to make a cognitive comparison and analysis of yellow, green, and red in English and Chinese. In ancient China, color idioms were often used to refer to the common people. “Qing jin” and “qing shan” refer to ancient scholars. The “red clothes” represent prisoners. “Qingyi” is a metaphor for a servant girl. “Dress” stands for prostitute, while “white ding” refers to ordinary people. In western countries, the metaphorical meanings of work in color idioms are also varied. However, most color idioms refer to groups of higher social status. Yellow and purple have different metaphorical meanings in different countries.

A Cognitive Analysis of Conceptual Metaphors of Color Idioms

2.2

351

Data Mining Technology

Deep learning is a feature learning method that transforms raw data into higher-level, more abstract expressions through some simple but non-linear models. With enough combinations of transformations, very complex functions can also be learned. Deep learning is making significant progress, solving the problem that the best efforts of the artificial intelligence community have not progressed for many years. It has been proven that it is good at discovering complex structures in high-dimensional data, so it can be used in science, business, and government. In addition to breaking records in areas such as image recognition and speech recognition, it beats other machine learning technologies in other areas, including predicting the activity of potential drug molecules, analyzing particle accelerator data, reconstructing brain circuits, and predicting mutations in non-coding DNA Impact on gene expression and disease. Perhaps more surprisingly, deep learning has produced very promising results in various tasks of natural language understanding, especially topic classification, sentiment analysis, automatic question answering, and language translation. Deep learning can discover complex structures in big data. It uses BP algorithm to complete this discovery process. The BP algorithm can guide the machine how to obtain errors from the previous layer and change the internal parameters of this layer. These internal parameters can be used to calculate the representation. Deep convolutional networks have brought breakthroughs in processing images, video, speech, and audio, while recursive networks have shown a shiny side in processing sequence data, such as text and speech. In order to obtain information that is absolutely useful to us, we extract a large amount of information contained in the text library to obtain some relatively hidden, never-heard-of information that is helpful to us. This process is called text dig. Features of text mining: (1) This process is processing large-scale text collections, and usually there are not too few text documents processed. (2) Text mining is a process of mining new information or relationships that are hidden in text documents and have never been obtained before. (3) The information obtained through text mining is usually true, which is valuable to us and can be used by us. This information can usually solve some specific problems, or they can usually meet the needs of some specific users. It will change the behavior of people or agents. (4) Because the information processed by text mining is large enough, it must be polynomial (in time and space) in terms of algorithm complexity, that is, when n is used as the length of the text, the algorithm complexity must be expressed O (n) or O (n log n). (5) Since the noise is huge and the structure is often irregular, these characteristics always exist in text data, so the algorithm must be robust in text mining algorithms.

352

S. Zhou

The main processes of text mining include: (1) Text preprocessing: Select the text that we need to mine and convert it, so that the conversion result can be processed directly with a text mining tool. (2) Text mining: After the first preprocessing is completed, we need to extract the knowledge or patterns required for the special purpose. The methods can be machine learning, data mining, and pattern recognition. (3) The last step is called pattern evaluation and representation, which requires us to evaluate the knowledge or patterns we have obtained before according to the defined evaluation indicators. When the evaluation results are consistent with our previous requirements, we will store the model to facilitate the needs of specific users; if the evaluation results are not consistent with our previous requirements, then we need to readjust and improve the previous link, a new round excavation process is the same as above. This paper intends to adopt and compare the following three symmetric strategies to construct a modified adjacency matrix AðmÞ  .

1=2

 T ðmÞ AðmÞ þ AðmÞ  ¼ A

ð1Þ

 T  T ðmÞ AðmÞ þ AðmÞ AðmÞ AðmÞ  ¼ A

ð2Þ

1=2

ðmÞ AðmÞ Din  ¼ Dout A



AðmÞ

T

1=2

1=2

Dout þ Din



AðmÞ

T

1=2

1=2

Dout AðmÞ Din

ð3Þ

3 Experiment 3.1

Research Object

In order to verify the hypothesis of this experiment, the author carried out a 12-week controlled experiment. The subjects of the experiment were students from Grade 3 and Grade 4 of Hongxinglong Senior Middle School. For the control class, the number is 42. These two classes are ordinary classes. The English class is taught by the same teacher. In normal terms, the two classes have comparable results, and there is no obvious difference. 3.2

Questionnaire

The content of the questionnaire was modified for the specific research questions in this thesis and the current knowledge level and cognitive structure of the students being taught. The reason for choosing this questionnaire is that the questionnaire has high reliability, many citations, and the content is in line with this experimental research. The test paper includes 15 multiple-choice questions, asking students to choose from 1 to 5 according to their real situation, that is, from very dissatisfied to satisfied. The questionnaire is mainly conducted after the completion of idiom teaching in both classes. The purpose of the questionnaire is to help examination paper to prove the effectiveness of idiom learning and collect information about students’ attitudes

A Cognitive Analysis of Conceptual Metaphors of Color Idioms

353

towards idioms. It may be the result of rote memorization, but the data analysis after the questionnaire will tell whether the students are actively learning. At the same time, the questionnaire can also investigate whether high school English idiom teaching can cultivate students’ cross-cultural communication awareness and understand the cultural connotation of idioms.

4 Discuss 4.1

Analysis of Color-Related Idioms

(1) Semantic gap Due to different social background cultures, there are still semantic gaps between Chinese and English for some color idioms. Green is often associated with spring, nature and youthful vitality. However, Chinese green idioms have their own meaning for women and sex. There is no corresponding green idiom in English. There are some examples: “Cuilou” refers to women’s residence, “qinglou” implies a brothel, and “cuckold” means derailment of a couple or couple. And the green idioms in English have unique jealousy meanings, such as “green-envier”, “green-eyed monster” and “greener”. In China, black refers to dignity and justice. The “black face” in Chinese opera represents the righteous. “Dark horse” refers to the unexpected winner. However, black has a unique meaning of deception in English-speaking countries. For example, “blackleg” refers to a liar. In China, red stands for love. “Drawing the red line” stands for matchmaker. “Red rope tied feet” represents men and women who are connected by matchmakers. The “red leaf inscription” refers to the love story of the Tang Dynasty. It also has the verse “Red beans are born in the southern country, how many branches are born in the spring? I hope you will bring them together, this thing is the most loved one (Table 1).” Table 1. Distribution of respondents Number of times Percentage Valid percentage Cumulative percentage Test group 44 51.2 51.2 51.2 Control group 42 48.8 48.8 48.8 Total 86 100.0 100.0 100.0

(2) Color semantics do not correspond Different countries have different social backgrounds, so they have different language forms. People have different color associations, and Chinese and English color idioms have certain differences. Here are some meanings that use different color idioms to mean the same thing. Such as: blacandblue (blue and purple), blaceye (blow-eyed blue eyes), blueyedboy (red man), bluefilm (yellow movie), browsaberry (black), yellow (China) People), black tea (black tea), and brown sugar (brown sugar). Due to the differences in language, different colors of idioms convey the same meaning, as shown in Fig. 1.

354

S. Zhou

Number of times

Percentage

Valid percentage

Cumulative percentage

120 100 80 60 40 20 0 Test group

Control group

Total

Fig. 1. Distribution of survey objects

5 Conclusion The same color represents the same meaning in different languages, and there are many different situations. There are great differences. The conceptual metaphors of color in the two languages have similarities, but they also have many personalities. It contains a lot of cultural information, and the conceptual metaphorical meanings caused by visual and psychological are different. The purpose of analyzing the commonalities and differences between the two is to improve the connection between language and culture and social culture, effectively conduct cross-cultural verbal communication, and thereby improve the intercultural communication ability of pragmatics. Acknowledgements. Scientific Research Program Funded by Shaanxi Provincial Education Department: A Cognitive Contrastive Study on Metaphors of Color Terms in English and Chinese Idioms (Program No. 19JK0499).

References 1. Aydin, B., Barin, M., Yagiz, O.: Comprehension of idioms in Turkish aphasic participants. J. Psycholinguist. Res. 46(2), 1–23 (2017) 2. Charmaraman, L., Chan, H.B., Chen, S.: Asian American social media use: from cyber dependence and cyber harassment to saving face. Asian Am. J. Psychol. 9(1), 72–86 (2018) 3. Schmied, J.: Translation and cognitive structures. Hermes 7(13), 169 (2017) 4. Romano, M.: Are similes and metaphors interchangeable?: a case study in opinion discourse. Rev. Cogn. Linguist. 15(1), 1–33 (2017) 5. Silvestre-López, A.J., I Ferrando, I.N.: Metaphors in the conceptualisation of meditative practices. Metaphor. Soc. World 7(1), 26–46 (2017) 6. Benjamin, W., Chang, B.G.: Chinese paintings at the national library. Positions East Asia Cult. Crit. 26(1), 185–192 (2018)

A Cognitive Analysis of Conceptual Metaphors of Color Idioms

355

7. Shen, L., Xing, Y., Lu, Q.: Exploration of the meridian differentiation law in polycystic ovarian syndrome of hirsutism based on data mining technology. Zhongguo zhen jiu = Chinese acupuncture & moxibustion 38(2), 165–173 (2018) 8. Wang, L., Chen, Q., Gao, H.: Framework of fault trace for smart substation based on big data mining technology. Autom. Electr. Power Syst. 42(3), 84–91 (2018) 9. Sorour, S., Goda, K., Mine, T.: Comment data mining to estimate student performance considering consecutive lessons. J. Educ. Technol. Soc. 20(1), 73–86 (2017) 10. Huang, X.-L., Yuan, X., Jun, W.: Noncooperative spectrum sensing with historical sensing data mining in cognitive radio. IEEE Trans. Veh. Technol. 66(10), 8863–8871 (2017) 11. Kimmons, R., Veletsianos, G.: Public internet data mining methods in instructional design, educational technology, and online learning research. Techtrends 62(5), 492–500 (2018)

Bibliometric Analysis of Benchmarking Literatures at Home and Abroad on the Basis of CNKI Database Cheng Wang1,2(&) and Huifan Luo1 1

2

Lijiang Teachers College, Lijiang 674199, China [email protected] Tourism Research Center, Lijiang 674199, China

Abstract. The study is aimed to explore the overall developing trend of benchmarking and to offer references to subsequent studies in this field. Based on CNKI database in Chinese, the research studies the literatures of benchmarking from a two-way perspective of home and abroad, which is proceeded by means of systemic analysis of benchmarking and bibliometric analysis of sample data. It reveals that there is a remarkable decline in studies on benchmarking, in addition, furthermore, there are deficiencies of paradigms recognized by academia, theoretical creation and sound benchmarking theoretical system, as well as strong capability to direct businesses and enterprises in China. The study puts forward four suggestions to solve the problems and to promote benchmarking. Keywords: Benchmarking  Bibliometric analysis of literatures database  Sustainable development

 CNKI

1 Introduction Benchmarking was firstly created by Xerox in 1979, and was systematically normalized by APQC, and then popularized around the world [1]. According to incomplete statistics, benchmarking was used to improve their power of competition and managing performance in most companies among fortune top global 500. Furthermore, abundant researches have been carried on and great success has been achieved on benchmarking. Benchmarking is considered as the top three managements, being equal to the other two: re-engineering, and Strategic Alliance. It is obvious that benchmarking has been becoming the most important way of management. However, on the basis analysis of CNKI database, studies on benchmarking are decreasing, and there are no paradigms recognized by academia, and there’s nearly no study on literature of benchmarking from a two-way perspective of home and abroad, therefore, this study is of great importance.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 356–361, 2021. https://doi.org/10.1007/978-3-030-51556-0_52

Bibliometric Analysis of Benchmarking Literatures at Home and Abroad

357

2 Literature Review Home and Abroad 2.1

Literature Review Abroad

Benchmarking has been used in business and industry since the early 1980’s [2]. Carlos F. Gomes and Mahmoud M. Yasin offer managers a benchmarking-based performance management approach suitable for small to medium-sized organizations with global operational aspirations [3]. James S. Keebler etc. analyze the longitudinal efficiency of branch operations of a third party logistics (3PL) company for comparative performance measurement and internal benchmarking [4]. The combined use of energy analysis with Data Envelopment Analysis is proven to be a valid methodological approach to provide benchmarks oriented towards the optimization of the lifecycle performance of a set of multiple similar facilities, not being limited to the operational traits of the assessed units [5]. Jun Yang, etc. introduce an integrated approach of axiomatic design and benchmarking methods for product development based on diverse needs [6]. It is obvious that systematic, extensive and profound study on benchmarking has been carrying on in western countries, among which, B.C. Johnson, Steven C. Hillmer, C.B. Williams, Stephen A.W. Drew, Yasar F. Jarrar, James S. Keebler, Diego Iribarren, etc. are outstanding Representative scholars. In this field, profound achievements have been made in the research of business running and decision-making, Human resource management and industrial economy integration etc., indicating a diversified tendency. Meanwhile, insufficiency of theoretical creation and practical guiding has always been problems. 2.2

Literature Review in China

Compared with western countries, China began to study relatively late in this field. In 1998, Luo Xiaodong published a paper Benchmarking: Way to Search for Excellence, which explored the connotation and characteristics of benchmarking, presenting the procedures of benchmarking management and finding its inspirations to domestic business [7]. From the references of this study, Luo’s article should be the earliest finding on benchmarking research in China and the following is a detailed literature review. 2.2.1 Study on Benchmarking Application in Profit Sectors Chinese scholars including Wang Yonghua and other scholars consider benchmarking as a new effective scientific systematic way of business management and learning, which is of great importance to accumulate various resources for enterprises [8]. Zhu Jianwu and other scholars believe that more attention should be paid to creative spirit when Chinese enterprises are learning Haier, so that benchmarking would play an important role to primarily improve business’ core competence [9]. Han Xiaohua and Xue Jiasheng’s Evaluation on Performance of Green Supply Chain emphasized more on improvement of performance systematically and practically, effectively providing useful suggestions to implement green supply chain [10]. After benchmarking was introduced to China, famous enterprises including Haier, Lining, and Lenovo have gained some achievements, in addition, benchmarking has been using in the fields

358

C. Wang and H. Luo

including quality management, marketing, cost management, human resources, business strategies etc. [11]. 2.2.2 Study on Benchmarking Application in Non-profit Sectors Being monopolistic, public sectors think little about their relations with opponents, especially about public service providing [12]. By means of benchmarking, information and resources of public sectors are to be shared and skills of benchmarking could be perfectly used in performance evaluation [12]. Four key points should be paid close attention to in benchmarking in performance evaluation in public sectors, that is, selfrecognition, scientific calibration, creation and reinforced implement [13]. To local government, performance evaluation system is an integration of sub factors of performance evaluation, and it also performs as an important carrier and foundation to run performance evaluation [14]. The biggest difference between performance evaluation based on benchmarking and a traditional one lies in the fact that benchmarking emphasizes dynamic optimal references [14]. To summarize, although some success has been achieved in benchmarking research in China, it is not profound and systematic because benchmarking was introduced into China quite late [15].

3 Retrieval Source of Benchmarking Research at Home and Abroad Taking CNKI as the retrieval source, this paper set “2018” as the cut-off time of the literatures and “benchmarking” as the citation key words, meanwhile, the types of citation literature are set as journal database, thesis database, conference paper database, journal article, thesis, conference paper, type of document, standard type, almanac, book type and other types. There are 1963 literatures retrieved in the retrieval system CNKI. As another advanced retrieval was carried on, the English word “Benchmarking” was set as the key word; journal database, thesis database, and conference database were set as the source of citation literature; and foreign literatures and other types were set as the type cited. Following the conditions above, 12432 literatures were retrieved, and 14395 in total. Considering there would be some literatures missed, the retrieval of Benchmarking was not precisely accurate. Nevertheless, as the sample data, the retrieval could reflect the overall situation of research on benchmarking at home and abroad.

4 Econometric Analysis on Literatures of Benchmarking Research at Home and Abroad 4.1

Overall Research on Benchmarking

Table 1 shows that Chinese literatures of benchmarking are obviously less than foreign literatures each year from 1999 to 2018, among which, there are 155 Chinese retrievals in 2008, reaching the top of Chinese literatures, and there are 800 foreign retrievals in

Bibliometric Analysis of Benchmarking Literatures at Home and Abroad

359

2013, achieving the highest of foreign literatures. Furthermore, there’s an increase from 1999 to 2008, and there’s an inflection point in 2008 for China’s literatures, 5 years earlier than foreign literatures, which is followed by a series of declined numbers in the following years, indicating that research on benchmarking is not research focus any more in China. The reasons why this happens could be concluded as the following: the first is the inefficiency in creative study for researchers, the second is the lack of scientific directions for organizers, and the third is the conversion efficiency between research and application is low. Table 1. Chinese literature and foreign literature of benchmarking research Year 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008

4.2

Chinese literature 4 13 19 23 51 98 102 150 141 155

Foreign literature 299 397 453 582 611 600 606 627 567 647

Total of this year 303 410 472 605 662 698 708 777 708 802

Year 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018

Chinese literature 131 146 140 145 138 146 108 99 73 52

Foreign literature 683 684 512 678 800 701 618 389 352 176

Total of this year 814 830 652 823 938 847 726 488 425 228

Analysis of Literature Cited on Benchmarking at Home and Abroad

From a macro perspective, benchmarking literatures are divided into Chinese literature and foreign literature according to the language of literatures, to analyze the literatures cited. From a micro perspective, benchmarking literature was analyzed through the 6 factors including the total number of citations, citation number of each paper, classification of citations, the number of Citations in Key Journals, the maximum citation frequency (MCF), and the citation frequency of the 200 paper (Top200). From Table 2, among these 5 factors, citation number of each paper of Chinese literature is higher than that of foreign literature, and the left 4 factors are less than that of foreign literature. From the statistic results of Chinese literature, the reason why Chinese citation number of each paper is higher is that Chinese scholar cite more Chinese papers and there is not enough benchmarking research in China. The academic influence of benchmarking in Chinese is lower than that of in foreign language, that is, the quality of study on benchmarking in China is lower than that of foreign countries. 4.3

Analysis of Top 200 of Benchmarking Literature Citation in China

After benchmarking literature in China was comprehensively analyzed, top 200 citations from the database were chosen to study in order to reveal the problems of Chinese

360

C. Wang and H. Luo Table 2. Comparison of literature citation of benchmarking Index

Languages of literature Chinese Foreign language Total of citations 15103 48172 Citations per paper 7.69 3.87 Citation types & number of citations Journals: 1548 Springer: 4572 Other Types: 388 Other types: 7860 MCF 338 348 Top200 17 33

benchmarking research, which includes 7 first-level index: the total number of Literature, references, citations, sources, subjects of literatures, fund types and research types. The issues indicated in the findings are as the following: firstly, the citation frequency is low; the sources distribute inappropriately; the subjects distribute intensively; there’s little theoretical study; and there’s no influential academic scholar groups. Particularly, study on benchmarking in China mostly cited foreign literatures and there’s no local creation theoretically, let alone contribution to international study on benchmarking. All these implied that the quality of study on benchmarking in China is lower than that of foreign countries.

5 Conclusion From the analysis above, a conclusion could be drawn as follows: firstly, benchmarking research has been declining obviously and has not been study focus any longer. Secondly, China has a poor quality of findings which is lower than that of foreign countries. Thirdly, there are deficiencies of paradigms recognized by academia, theoretical creation and sound benchmarking theoretical system, as well as strong capability to direct businesses and enterprises in China. Besides, this study hasn’t collected all the research findings on benchmarking of the global academic community, which may result in some faults and errors. The author is looking forward to suggestions and advices from scholars of this field. The abovementioned problems deserve more attention to study and ponder. The study put forward four suggestions to solve the problems and to improve benchmarking management: first, an important principle in Maxim could be taken as the guideline, that is, specific problems should be resolved with specific methods; Second, it is important to study current research findings and excellent cases systematically and thoroughly and to construct complete administrative system, as well as theoretical system on benchmarking research; third, as an important part of the field of management science, benchmarking sees remarkable integrity of multi-subject, which is appealing to study, on the basis of benchmarking theoretical framework, with multi-dimension, multisubject and multi-perspective, including philosophy, geography, phycology, economy, sociology, anthropology, ecology and related subjects [16]. Fourth, under the

Bibliometric Analysis of Benchmarking Literatures at Home and Abroad

361

background of the economic globalization, it is necessary to strengthen the evaluation of benchmarking application, in which a continuous study is needed to adjust the theoretical framework according to newly appeared problems. And conversion efficiency of benchmarking would be promoted to direct the global sustainable development of businesses and enterprises. Acknowledgements. This research was supported by National natural science fund projects of China (Grant No. 41671147) and by Tourism Management, Key Major of Advanced Vocational Education of Yunnan in 2018.

References 1. Shuangcheng, W., Jingzhi, Z.: Benchmarking-a new way to obtain advantages for businesses. Enterp. Vitality 19(7), 24–25 (2003). (in Chinese) 2. Johnson, B.C., Chambers, M.J.: Benchmarking. J. Am. Diet. Assoc. 98(9), A99–A99 (1998) 3. Gomes, C.F., Yasin, M.M.: A systematic benchmarking perspective on performance management of global small to medium-sized organizations. Benchmarking 18(4), 543–562 (2011) 4. Keebler, J.S., Joo, S.-J., Hanks, S.: Measuring the longitudinal performance of 3PL branch operations. Benchmarking 20(2), 251–262 (2013) 5. Iribarren, D., Vázquez-Rowe, I., et al.: On the feasibility of using energy analysis as a source of benchmarking criteria through data envelopment analysis: a case study for wind energy. Energy 67(1), 527–537 (2014) 6. Yang, J., Peng, Q., et al.: Design of a hand rehabilitation device using integrated axiomatic and benchmarking methods. Procedia CIRP 79(7), 295–300 (2018) 7. Xiaodong, L.: Benchmarking: way to search for excellence. J. Yibin Teach. Coll. 20(1), 30– 32 (1998). (in Chinese) 8. Yonghua, W., Yuliang, Z., Yonggui, W.: Benchmarking and value innovation—a compound tool for future business to gain advantages. East China Econ. Manag. 13(1), 26–27 (1999). (in Chinese) 9. Jianwu, Z., Huajing, L.: The case of Haier: strategic innovation of benchmarking. Theory Pract. Financ. Econ. 23(5), 120–122 (2002). (in Chinese) 10. Xiaohua, H., Jiasheng, X.: An evaluation on performance of green supply chain-based on benchmarking. Ind. Technol. Econ. 25(11), 89–92 (2006). (in Chinese) 11. Yuanyuan, C., Yang, Z.: A comparison of benchmarking’s implementation and popularization between China and Western Countries & Lessons for Beijing. Mod. Bus. 9(35), 148– 150 (2014). (in Chinese) 12. Xiaolei, Z.: Benchmarking: a useful way to overcome difficulties of performance evaluation for public sectors. J. Tongling Coll. 8(5), 19–21 (2006). (in Chinese) 13. Bailin, Z., Qing, L.: Controlling the key points of benchmarking. Manag. Obs. 15(16), 127– 128 (2008). (in Chinese) 14. Chang, Y.: The benchmarking: the improvemental research of local government performance evaluation system. J. Hunan Univ. Sci. & Technol. (Social Science Edition) 11(2), 124–128 (2009). (in Chinese) 15. Xiaoyan, L., Junwen, F., Huating, W.: Literature review and analysis on benchmarking. Technol. Econ. 25(11), 97–102 (2007). (in Chinese) 16. Cheng, W., An-Le, L., Qing-Zhong, M., et al.: Bibliometric analysis of tourism traffic research in China. J. Dali Univ. 3(11), 116–121 (2018). (in Chinese)

Distributed Image Fire Detection and Alarm System Based on Machine Learning Yang Du(&) and Yufeng Fan Emergency Management Department Shenyang Fire Research Institute, Shenyang, China [email protected]

Abstract. With the continuous acceleration of the construction of China’s “smart city”, the social unit video surveillance system has been rapidly popularized. Based on the current development of image fire detection, this paper analyzes the problems of limiting the development of image fire detection system, in order to expand the functions and applications of current video surveillance systems, this paper applies artificial intelligence machine learning methods, establishes a framework, data flow and training model of distributed fire image detection and alarm system based on machine theory, and realizes the functional value-added and application expansion of the existing video surveillance system of the social unit. Keywords: Fire image detection

 Model training  Machine learning

1 Introduction The understanding, mastery and use of fire by mankind has extremely important significance in the history of the development of human civilization. However, as a derivative of fire, fire is also one of the common disaster accidents of human beings which has caused property damage and life casualties, and also ranks first in disaster accidents. Humans have never stopped the early prevention and detection of fires, especially with the emergence of computer technology, information processing technology and communication technology, have provided scientific and precise technical means for fire prevention and detection, have greatly reduced the incidence of fire and the loss of peoples lives and property. The technical principle of fire detection is to use the sensing technology to collect the physical characteristics of the fire combustion process, such as temperature, smoke, gas and radiation intensity, etc., to convert these characteristics into electrical signals, and then use wireless communication technology to send electrical signals to the fire alarm controller or alarm call center [1]. Image fire detection, as a technology branch of fire detection, has become a key research direction in the field of fire detection in recent years with the popularization of social unit video surveillance systems and the advancement of image processing technology [2].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 362–371, 2021. https://doi.org/10.1007/978-3-030-51556-0_53

Distributed Image Fire Detection and Alarm System

363

2 Related Works The image fire detection and alarm system refers to an information system that comprehensively uses computer digital image processing technology, information communication technology and image recognition technology to realize early detection and early warning of fire. It is mainly composed of video capture, video transmission, video processing, image recognition and alarm devices [2, 3]. There are already mature image fire detectors and image fire detection systems on the market. According to different classifications of applied image fire detection methods, they are mainly included of infrared/ultraviolet fire image detection methods, visible light fire image detection methods and visible light smoke images. The basic principle of these three detection methods is to use digital image processing technology to filter the image frames, color detection, noise elimination, time series comparison, image enhancement, etc. in the captured image, so as to effectively identify the flames that are focused on the image or Smoke characteristics, to early warn and detect fires. The representative of the infrared/ultraviolet fire image detection method is an embedded image type fire detection system, which consists of one or more infrared/ultraviolet cameras, a microprocessor, a display device and an alarm controller. The national standard GB 15631-2008 “The Special Fire Detector” 4.1.1 stipulates that the detector must have an alarm confirmation light, so it is necessary to integrate the ordinary infrared/UV camera to meet the standard requirements [4]. The representative of visible light fire and smoke image detection method is distributed image type fire alarm system. The system uses existing video monitoring system to install image recognition software on the server to realize alarm and alarm for fire and smoke objects. The system input costs are low. The above two types of image fire detection and alarm systems have been used in a small number of special types of fire protection key units such as banks, warehousing and chemical plant areas, and have played an important role in fire prevention and detection to avoid major fire accidents. However, from the aspects of image information processing technology and image detection application, there are still the following shortcomings. 1) In based on the infrared/ultraviolet fire image detection method, the image acquisition equipment needs to be improved, otherwise it will not meet the requirements of GB 15631-2008 “The special Fire Detector” and GB 50116-2013 “The Specification of fire Automatic Alarm System Design” standard. Therefore, the installation and use costs are high [4, 5]. 2) The key point of the fire image detection method is whether the image processing method used is scientific, accurate and reliable. But the traditional fire image feature extraction method used are such as filter transformation, color detection, noise elimination, time series comparison, image enhancement, etc. The established feature extraction models are based on the laboratory environment [6, 7]. Each method model has a suitable scenario. It has not yet reached a situation that can satisfy all the monitoring scenarios. It needs to comprehensively consider the lighting, wind, background factors and other factors of the actual application site. In actual installation and use, it is necessary to select the method model according

364

Y. Du and Y. Fan

to the actual environment of the site and adjust the parameters. Otherwise, the detection accuracy is difficult to meet the standard requirements. The selection of method models, especially the fine-tuning of parameters, requires a high level of professional technology, and ordinary skilled workers are not competent in project implementation [7–9]. 3) The main goal of the construction of the social unit video surveillance system is to monitor key parts, important equipment and personnel by video means, prevents external damage to the key parts of the unit, prevents theft of important equipment of the unit, and prevents illegal personnel from entering the unit illegally. The system generally is consisted of various point surveillance cameras, DVRs, and video management server hosts (which can be called video management servers with display functions). The video management server needs to have the main function of dynamically adding, deleting, and capturing images to the point cameras. so the performance of the video management server host configured by the social unit is not too good, the key components such as CPU and memory are mainly to meet the system requirements. The traditional fire image feature extraction algorithm needs to process the continuous frame image in real time and extract the motion trajectory of the object in the image. The required computing resources are large. If the number of cameras is too large, the CPU and memory resources will be larger. However, considering the performance of the current social unit video management server host, it is difficult to meet the computing resource requirements of the fire image feature extraction algorithm, so the implementation is difficult. It is also because the above three factors restrict the wide application of fire image detection technology, which leads to the current market share of fire image detection and alarm products in the fire detection and alarm market is relatively small, and it is difficult to widely promote and apply it. But the emergence of machine learning technology, especially the maturity and progress of machine learning in image classification and image recognition, points out new ideas and methods for the detection and alarm of fire images. Machine Learning (ML) is a multi-disciplinary subject involving many disciplines such as probability theory, statistics, approximation theory, convex analysis, and algorithm complexity theory [10–12]. The discipline is to apply computer simulation or to realize human learning behaviors, acquire new knowledge or skills, and reorganize existing knowledge structures to continuously improve their performance [11]. Although the current theoretical knowledge system can not know how machine learning realizes the specific mechanism of image classification and image recognition, the achievements of machine learning in the field of image classification and image recognition are obvious in the industry, so combined with the existing video surveillance system in social units, which applies machine learning to fire image detection and alarm, is an emerging technology research direction in current fire image detection and alarm.

Distributed Image Fire Detection and Alarm System

365

3 Distributed Fire Image Detection and Alarm System Based on Machine Learning The design idea of distributed fire image detection and alarm system based on machine learning is to integrate the traditional image monitoring system with the fire image detection model on the video surveillance server, and use the ordinary visible light camera in the video surveillance system for on-site image acquisition and transmission to The video surveillance server performs a fire feature calculation to determine the fire implementation alarm. Different from the traditional distributed fire image detection and alarm system, the system designed in this paper has its own “growth” characteristics by applying the machine learning method. The fire image data collected on the video monitoring server can be uploaded to the fire image machine learning cloud platform regularly. The cloud platform periodically updates the fire detection model. After the update, the model is distributed to the video surveillance server for updating. The model is continuously adjusted according to the growth of the data set, and the model can maintain the “growth” feature, and continuously improve the model of the fire image identify accuracy. 3.1

System Design

The distributed fire image detection and alarm system based on machine learning is consisted of monitoring unit video monitoring system, transmission network and fire image machine learning cloud platform. The system configuration diagram is shown in Fig. 1. The unit video surveillance system is installed and deployed in a specific social unit that needs video surveillance. It is consisted of multiple cameras deployed at the monitoring point, a hard disk recorder installed in the fire control room of the social unit, a video surveillance server with display function, and an alarm controller. The camera is a common optical camera for monitoring point image acquisition. The hard disk recorder is used for local monitoring point image storage. The video surveillance server has a display function, in addition to the basic functions of the video surveillance system such as the monitoring point camera configuration, the image real-time preview, the image capture storage function, and the fire image detection model, the monitored monitoring picture is periodically monitored, and the flame in the picture is extracted. The characteristics of the smoke model determine whether a fire accident has occurred and send the detected fire to the alarm controller. The video surveillance server also has the function of periodically uploading the fire false alarm pictures collected by the fire image machine learning cloud platform, and also receives the retrained fire image detection model sent by the fire image machine learning cloud platform to update the model. The alarm controller is configured to receive the fire alarm information sent by the video monitoring server, and perform an audible and visual warning to send a fire to a monitoring point of the on-duty personnel. The Internet is used to connect information between the video surveillance server and the fire image machine learning cloud platform.

366

Y. Du and Y. Fan

Fig. 1. Composition diagram of distributed fire image detection and alarm system based on machine learning

The fire image machine learning cloud platform is connected with a plurality of video monitoring servers, and the function is to receive the false alarm pictures uploaded from multiple video monitoring servers, trains the fire image detection model, and transmit the trained fire image detection model to the video monitoring server for model update. 3.2

Process Design

The data flow of distributed fire image detection and alarm system based on machine learning is shown in Fig. 2 below.

Fig. 2. The data flow of distributed fire image detection and alarm system based on machine learning

Distributed Image Fire Detection and Alarm System

367

The data flow of distributed fire image detection and alarm system based on machine learning is divided into four stages. The phase 1 is fire image detection model training phase. In the first stage, the original fire data was collected first, and there were two data. First, the fire combustion laboratory was used to simulate the initial stage of combustion of various substances to extract pictures of the burning flame and smoke. Second, the use of reptile tools from the Internet, the flame data is crawled. After crawling, it is necessary to manually classify the image data. Then, the collected data is loaded onto the fire image machine learning cloud platform to train the fire image detection model. The training input classification is divided into three categories: flame, smoke and others, wherein fire and smoke are defined as fire. The phase 2 is fire image detection model distribution stage. In the second stage, the fire image machine learning cloud platform transmits the trained fire image detection model to the video monitoring server located in the monitoring unit via the Internet. The phase 3 is fire monitoring and alarm stage. In the third stage, the video surveillance server receives camera images from various points of the monitoring unit, periodically extracts one frame of the image, loads the predicted output onto the fire image detection model, and determines whether it is a fire according to the output result. If the result of the judgment is fire, the information is transmitted to the alarm controller, and the alarm handler checks the fire alarm in real time. If it is a real fire alarm, it performs subsequent processing. If it is a false alarm, the fire picture is saved, and the picture is labeled as other. If the result of the judgment is other, but the fire has actually occurred, the alarm handler must manually store the picture of the fire at that time and mark it as flame and smoke according to the content of the picture. The phase 4 is continue training stage. In the fourth stage, the video monitoring server periodically uploads the stored false alarm fire pictures to the fire image machine learning cloud platform, and the fire image machine learning cloud platform receives the data reported from multiple video monitoring servers, and then detects the fire image. Continue trains and repeats the second, third, and fourth phase. 3.3

Modal Design

The deep learning model has been exponentially improved in recent years in the field of image classification. On the one hand, it has benefited from a significant increase in machine processing power (GPU), and on the other hand, it has benefited from massive data and advanced algorithm technology [10–12]. There are many models for image classification and image recognition in the field of machine learning, such as AlexNet, ZFNet, VGG Net, GoogleNet, Inception, etc. These models have achieved excellent results in the international image classification competition, so there is no model that can cope with all Image data collection for image classification and recognition? the answer is negative. The main reason for this negative answer is that machine learning belongs to a “black box” process. The existing knowledge system and algorithm theory cannot know how the machine trains data, nor how the model works. It is used to measure the model. A key indicator of effectiveness is fit, and only the fit is appropriate to prove that the model is appropriate and effective for the current data set. If a trained

368

Y. Du and Y. Fan

model is applied to other data sets, it must be retrained to re-consider whether the fit of the model meets the recognition accuracy requirements of the current data set. If the model fits properly, then the proof model is valid, otherwise the model is invalid. So how to choose a suitable model in the existing and excellent image classification model as the image classification model of fire image detection and alarm system, and carry out continuous training to improve the classification accuracy of the model is a key to be solved. In order to solve this problem, this paper establishes a fire image model selection method and test verification platform. 1) Data preprocessing In order to improve the training time of the model, the existing model input sizes are small. For example, VGG Net input is 224  224, and Inception input is 299  299. The output image size of the current video surveillance system is relatively large. GB50395-2007 “The Video Security Monitoring System Engineering Design Specification” requires that the pixels of each image of each image are not lower than 352  288. And in recent years, with the technology The progress of the video surveillance system for each image of a single image of the pixels is much larger than the standard requirements [13]. In order to ensure that the elements in the picture are not lost during the process and affect the judgment of the fire, we need to perform preprocessing on the initial picture. The process is as follows. Assume that the video surveillance system outputs the image size as ðm; nÞ, the model input size is ðd; dÞ, and ðm; nÞ  d. The first step is to convert the input image into a square image. If m = n, no conversion is performed. If m > n, add mn column pixels to the right of the original image, and the pixel value is RGB (255, 255, 255). The original image is converted into a (m, m) square image; if m < n, the nm column pixel is added below the original image, and the pixel value is RGB (255, 255, 255), and the original image is converted into a (n, n) square image. After conversion, the picture is represented by (h, h). In the second step, if h%d = 0, it means that the input picture can be cut into an integer number of (d, d) pictures, then the input picture (h, h) is not processed; otherwise, the (h, h) picture is right and below. Increase d – h%d, row pixels and d – h%d, column pixels, pixel values are RGB (255, 255, 255), input image size is converted to (h + d − h%d, h + d − h %d), the input picture after conversion is represented by (x, x). In the third step, the input image (x, x) is cut according to the model input image size (d, d), and the number of pictures after cutting is ðx=dÞ2 . The data preprocessing flowchart is shown in Fig. 3 below.

(d,d)

(m,n)

(x,x)

(d,d)

(d,d)

Fig. 3. Data preprocessing flowchart

(d,d)

(d,d)

(d,d)

(d,d)

(d,d)

Distributed Image Fire Detection and Alarm System

369

Data preprocessing has three aspects. First, the original training data mainly comes from the Internet and laboratory test data. The size of the flame and smoke pictures is not uniform. The method can be used to preprocess the data, and the uniform input is unified according to the image input size requirements of the model. Second, in the process of fire image detection and alarm, the pictures taken by each point camera also need to be pre-processed to meet the requirements of model input; Third, this image preprocessing method does not cause loss to the original image content, and 100% retains the original image content. 2) Data training The model data training flow chart is shown in Fig. 4 below.

Fig. 4. Model data training flow chart

The first step is to collect the original flame and smoke data sets. The second step is to perform data preprocessing according to the size requirements of the input data according to the AlexNet, ZFNet, VGG Net, GoogleNet, and Inception models. 80% of the data is used as training data, and 20% is used as test data. The third step is to modify the output of each model, namely Softmax, so that each model output is 3 categories, 1 for flame, 2 for smoke, and 3 for others. In the fourth step, the pre-processed data is respectively fed to each model for model training, and each model is saved after the training ends. In the fifth step, the test data is fed to each model, the accuracy of the model test is output, and the comparison accuracy is selected to select the optimal model for the data set.

370

Y. Du and Y. Fan

3) Model prediction The fire image model prediction flow chart is shown in Fig. 5 below.

Camera captures image data

Data preprocessing

m

m

OpƟmal model

Three-category output

1

flame

2

smoke

3

other

Fig. 5. Fire image prediction flow chart

The first step is to extract the pictures collected by the camera at each point in the video surveillance system. In the second step, the data in the first step is preprocessed according to the optimal model input size (m, m). In the third step, the pre-processed multiple pictures are input into an optimal model to perform image classification prediction. In the fourth step, if there is 1 or 2 output in the result set after prediction, it is considered that a fire occurs and an alarm is handled. If there is only 3 outputs in the result set, it is considered that no fire has occurred.

4 Conclusion With the rapid development of information and communication technology, internet of things technology and big data cloud computing technology, the pace of construction of “smart city” in China has been promoted. The construction of video surveillance system is an important part of the construction of “smart city”. This paper starts from how to apply the video image information obtained by the existing front-end camera equipment, expands the function and application of the video surveillance system, designs a distributed fire image detection and alarm system based on machine learning. Compared with the traditional fire detection method based on fire image feature extraction, the system designed in this paper has the following two advantages. 1) Implementation cost The system designed in this paper will not increase the social unit economic burden in the specific implementation process, and use the video surveillance system software and hardware equipment of the social unit to use the video surveillance system as the information acquisition equipment and model loading platform. The function application of the video surveillance system is expanded without affecting the function of the video surveillance system.

Distributed Image Fire Detection and Alarm System

371

2) Technological advancement The traditional model based on the fire image feature extraction algorithm is run on the local computer of the social unit monitoring center after the determination, and the model does not have the “growth” feature. The system designed in this paper can retrain the fire image classification model regularly through the development process, so that the model has the “growth” feature. With the increase of monitoring points and the accumulation of time, the recognition accuracy of the fire image classification model will become more and higher. Funding. This work has been supported by The National Key R&D Program of China during the 13th 5-year Plan Period (2017YFC0806607). Conflicts of Interest. The authors declare no conflicts of interest.

References 1. Bi, Z., Le, T., Pan, H., Yang, H., Jiang, Y.: Review of image type fire detection pretreatment methods. Fire Sci. Technol. 35(1) (January 2016) 2. Li, H.: Comparative analysis of two image fire detection techniques. Fire Sci. Technol. 36 (11) (November 2017) 3. Li, G., Zhou, C., Zhang, C., Yao, W.: CECS448: 2016 Visual Image Early Fire Alarm System Technical Specification. China Eng. Constr. Stand. Assoc. (2016) 4. GB 15631-2008: The special fire detector 5. GB 50116-2013: The specification of fire automatic alarm system design 6. Wang, Y., Li, Y., Yang, G.: Research on determination method of fire source point in forest fire alarm image. J. Saf. Environ. 1, 50–54 (2014) 7. Kang, F.: Basic research on early agricultural and forestry fire detection methods based on visual features. Zhejiang University (2010) 8. Bi, Z., Wang, H., Ying, L.: Application research of cloud pattern image type fire detection. Fire Sci. Technol. 32(4), 410–413 (2013) 9. Tong, B., Wang, S.: Video smoke detection using two-layer classification algorithm. Comput. Sci. 42(3), 301–306 (2015) 10. Behoora, I., Tucker, C.S.: Machine learning classification of design team members’ body language patterns for real time emotional state detection. Des. Stud. 39, 100–127 (2015) 11. Ren, S., Girshick, R., Girshick, R., et al.: Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. IEEE Trans. Pattern Anal. (2017) 12. Abadi, M., Agarwal, A., Barham, P., et al.: Tensorflow: Large-scale machine learning on heterogeneous distributed systems (2016) 13. GB50395-2007: The Video Security Monitoring System Engineering Design Specification

Combination of Pre-processing Techniques to Improve the Performance of Target Recognition in SAR Imagery Pengju Zhao(&) ChongQing College of Electronic Engineering, Chongqing 401331, China [email protected] Abstract. This paper researches the preprocessing techniques of synthetic aperture radar (SAR) images and their effects on target recognition performance. Pre-processing techniques process the sizes or image pixels of the original SAR images to depress the background redundancy while enhancing the target characteristics thus improving the target recognition performance. Image cropping, target segmentation and power exponent enhancement are employed as the preprocessing techniques for the original SAR images. And the three preprocessing techniques are combined to improve the ATR performance. Experiments conducted on the MSTAR (Moving and Stationary Target Acquisition and Recognition) dataset demonstrate that the preprocessing techniques have very important effects on target recognition performance. Keywords: Synthetic Aperture Radar recognition  MSTAR dataset

 Preprocessing technique  Target

1 Introduction Synthetic Aperture Radar (SAR) has become an important means of modern battlefield reconnaissance due to its advantages of all-time and all-weather weather and certain penetration of the earth surface. As one of the key links of SAR image interpretation, SAR target recognition technology has been widely studied in the world [1, 2]. Feature extraction and classifier are two key links in SAR target recognition. Feature extraction is aimed at discarding the dross and selecting the essential, and reducing dimension and compression of original high-dimensional SAR images. Common feature extraction methods of SAR images include geometric feature [3, 4], projection feature [5] and scattering center feature [6, 7] etc. The classifier provides a reliable decision-making mechanism for the extracted features. For example, Nearest Neighbor (NN), Support Vector Machine(SVM) [8, 9], Spare Representation-based Classification (SRC) [9], and Convolutional Neural Network (CNN) [10] are successfully applied in the SAR target recognition process. In addition, the preprocessing technology also has an important impact on SAR target recognition [11–13]. By processing the size and pixel of the original SAR images, the pre-processing technology improves the quality of SAR images, so as to facilitate the following feature extraction and classifier design. In order to improve the performance of SAR target recognition, a large number of pre-processing technologies have been adopted, © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 372–382, 2021. https://doi.org/10.1007/978-3-030-51556-0_54

Combination of Pre-processing Techniques

373

including image cropping, target segmentation, image enhancement, super-resolution and so on. Literature [11] proposes an image segmentation algorithm for SAR target recognition, which has effectively improved the recognition performance. Literature [12] significantly improves the feature of enhanced targets and SAR target recognition performance through image enhancement. For the target recognition problem of SAR images, this paper adopts three kinds of preprocessing methods: image cropping, target segmentation and power exponential enhancement. Firstly, it introduces the application of the three technologies in target recognition, and then combines these three technologies to improve the SAR target recognition performance. The combined adaptation of the three pre-processing technologies can effectively remove background noise interference, enhance target features, and have complementary effects. Therefore, it is helpful to improve the ability of original SAR images to distinguish different kinds of targets and improve the performance of target recognition. In order to verify the validity of this method, MSTAR (Moving and Stationary Target Acquisition and Recognition) data sets are used to verify the experiment.

2 SAR Image Preprocessing Technology 2.1

Image Cropping

Image cropping is a very common preprocessing technology in SAR target recognition. It can efficiently remove a large amount of background redundancy from the original SAR image slices, and its operation is very simple. In the center of the original SAR image, a square area with a certain length is segmented as the target image. The length of the selected square has a certain influence on the final target recognition performance. The longer the length is, the more background clutter will be removed, but at the same time, some target areas may be removed. Figure 1 shows the results under different cropping window sizes. The size of the original SAR image (Fig. 1(a) is 128*128, which contains a large amount of background noise, and these background noise can be effectively removed by different levels of cropping. Figure 1(c) shows the results when the length is 40. At this time, a large number of background noise can be removed, but because the window is too small, the target features are also likely to be damaged to a certain degree. Thus, it is very important to select the appropriate cropping windows.

a

128

b

80

Fig. 1. The results at different sizes of cropping windows

c

40

374

P. Zhao

2.2

Target Segmentation

The purpose of target segmentation is to separate the target area from the background pixel and the target shadow so as to remove the interference of background noise as much as possible. Compared with optical images, SAR images have poor visibility and unclear target boundaries. Thus, SAR target segmentation has always been a difficult problem, and it is difficult to reliably evaluate the performance of a certain target segmentation algorithm. This paper adopts the target segmentation algorithm proposed in the literature, and the specific implementation steps are as follows: Step 1: The original SAR image is equalized by histogram and its dynamic range is changed to [0,1]; Step 2: Mean filtering is applied to histogram equalized images [14]; Step 3: The threshold method is used for image segmentation, and the threshold value is 0.8; Step 4: In view of the possible micro-fracture and void in the target area and the influence of background clutter, mathematical morphology is used to eliminate them. Figure 3 shows an example of target area extraction for SAR images. And Fig. 2(c) is obtained by threshold segmentation of the original SAR images after histogram equalization and mean filtering. Figure 2(d) shows the result that can pass threshold segmentation, but still contains false alarm caused by background clutter. Morphological operation is used to eliminate false alarm of background clutter, and the final target area is obtained by connecting the target area as shown in Fig. 1(e). By comparing Fig. 2(a) and Fig. 2(e), it can be seen that the result of target segmentation effectively maintains the target area and removes most of the background noise.

a

Original image

d

b

Histogram equalization

Threshold segmentation

e

c

Mean filter

Morphological filter

Fig. 2. The procedure of target segmentation

Combination of Pre-processing Techniques

2.3

375

Image Enhancement

To meet the application requirements of certain features, image enhancement uses certain image processing technologies to highlight some information in the image or to weaken or remove some irrelevant information, so as to enhance the ability to interpret the concerned information. For the specific application of SAR target recognition, a large number of image enhancement technologies have been used, such as contrast enhancement, image filtering, and power exponential enhancement. This paper uses power exponential enhancement to preprocess the original SAR image as follows. Firstly, power transformation is performed on the gray value of the original SAR image as follows: Kðx; yÞ ¼ ½Iðx; yÞa

ð1Þ

Then, the pixel value after power transformation is normalized according to formula (2): Jðx; yÞ ¼ Kðx; yÞ=

XX x

!1=2 2

ð2Þ

jKðx; yÞj

y

The enhancement effect is different under different power a. Figure 3 shows the power exponential enhancement when a is 2, 2.5, 3, 3.5, and 4. Through observation, it can be seen that the introduction of power exponential enhancement can suppress the background and enhance the features of the target, which is beneficial to correct target recognition.

a

2

b 2.5

d

3.5

c

e

4

Fig. 3. The results at different powers

3

376

P. Zhao

3 Target Recognition 3.1

Feature Extraction

The features used in SAR target recognition are very rich, including the geometric features of the target, the projection features of the image gray scale and the scattering center features that reflect the electromagnetic scattering features of the target. This paper chooses PCA features as a typical representative, which is a classic feature extraction method in pattern recognition and is widely used in SAR target recognition. It aims to construct a linear projection matrix that maintains the total variance of the training samples, thereby achieving dimensionality reduction of the original data. X = {x1, x2, …, xn}, X 2 Rmn is recorded as the training sample and its mean value is: X¼

n 1X xi n i¼1

ð3Þ

The covariance matrix of X is calculated as follows: Q¼

n X

ðxi  XÞT ðxi  XÞ

ð4Þ

i¼1

The eigenvalues and eigenvectors of Q are calculated as follows: ½V; D = EIGðQÞ

ð5Þ

The function EIG calculates the eigenvalues and eigenvectors of Q and stores them in V and D respectively. By choosing eigenvectors corresponding to several maximum eigenvalues, the projection matrix of PCA can be constructed to realize feature extraction. 3.2

Classifier Design

Due to its excellent performance, SVM is widely used in the field of pattern recognition. By kernel function mapping, it projects the original data into the highdimensional space and solves the hyper-plane of the decision space based on the principle of structural risk minimization. The sample to be identified is x, /() is the kernel function, and the decision function of the SVM is: f ðxÞ ¼ wT  /ðxÞ þ b

ð6Þ

In formula (6), w is the weight coefficient and b is the bias term, which are obtained by learning the training samples. Figure 4 shows a schematic diagram of SVM. The black circle and red box in the Fig. 4 represent two different types, respectively. The samples of the green box are selected support vectors, which are used to estimate weight coefficients and bias terms. Support vectors refer to the small number of training samples used to estimate weight coefficients and bias terms.

Combination of Pre-processing Techniques

377

Fig. 4. Illustration of SVM

The original SVM classifier aims at two classification problems. To solve the multiclass classification problem, the researchers use one-to-one, one-to-many and other strategies to promote the original SVM to multiple types of problems. Currently, the widely used SVM toolkit is LIBSVM developed by Lin Zhiren of Taiwan University. The toolkit can directly estimate the posterior probability that the current test sample belongs to each training category. 3.3

Target Recognition

Figure 5 shows the basic flow for target recognition. After the preprocessing and PCA feature extraction, the training samples get the feature library to train the SVM classifier. For the test samples to be recognized, PCA feature vectors are extracted through the same preprocessing process, and SVM classifier is finally used to recognize the target classes. The preprocessing link in Fig. 5 refers to the processing of the original SAR image using one or more items introduced in this paper such as image cropping, target segmentation or power exponential enhancement. Specifically, in this paper, the preprocessing link mainly refers to the combination of three preprocessing methods, and the optimal recognition performance is obtained by adjusting their parameters. For the preprocessed images, PCA is used to extract the 80-dimensional feature vectors from the preprocessed test samples or training samples for subsequent SVM classification.

Training samples

preprocessing

Test samples

preprocessing

SVM

ClassificaƟon

Fig. 5. Procedure of the proposed recognition method

378

P. Zhao

4 Experiment and Analysis 4.1

Experimental Data Set

MSTAR data set consists of 10 kinds of SAR images of ground stationary targets published jointly by the Advanced Program Research Agency and the Air Force Laboratory. The data set collects SAR images of 10 military targets under X-band HH polarization, with an image size of 128  128. Figure 6 shows the optical images of these 10 classes of targets. Table 1 lists the training samples and test samples used in this paper. In the experiment, 10 classes of target SAR images with a pitch angle of 17 degrees are used as training samples, and 10 classes of target images at a pitch angle of 15 degrees are used as test images to be recognized.

(1) BMP2

(2) BTR70

(3) T72

(6)BTR60

(7) ZSU23/4

(8) D7

(4) T62

(5) BRDM2

(9) ZIL131

(10) 2S1

Fig. 6. The optical images of 10 targets

Table 1. Training and test samples used in this paper Classes

BMP2

BTR70 T72

Training set 233(Sn_9563) 233

Test set

4.2

T62 BDRM2 BTR60 ZSU23/4 D7

232(Sn_132) 299 298

232(Sn_9566)

231(Sn_812)

233(Sn_c21)

228(Sn_s7)

195(Sn_9563) 196

196(Sn_132) 273 274

196(Sn_9566)

195(Sn_812)

196(Sn_c21)

191(Sn_s7)

ZIL131 2S1

256

299

299 299

299

195

274

274 274

274

Experimental Result

In order to verify the influence of SAR image preprocessing technology on target recognition, it adopts the recognition process shown in Fig. 5. It analyses the influence of single pretreatment technology and combination of pretreatment technologies respectively. The specific results are as follows:

Combination of Pre-processing Techniques

379

4.2.1 The Influence of Single Preprocessing Technology on Target Recognition Performance (1) Image cropping size In this paper, the length of the square window of the image cropping is set to be 128 (namely no cropping), 80 and 40, respectively. The average recognition rate of the recognition algorithm for 10 classes is shown in Table 2. The recognition rate is highest when the length of the cropping window is 80. This is because the target features are well maintained and a lot of redundant background noise is well removed. When the length of the cropping window is small (40), some features of the target are likely to be cropped incorrectly, although a lot of redundancy is removed. Thus, the recognition rate at this time is lowered, and the recognition performance is directly similar to that of the original image. Table 2. The recognition performances at different sizes of cropping window Window size 128 80 40 Average recognition rate (%) 86.54 89.67 87.01

(2) Image segmentation The target segmentation method proposed in this paper is used to preprocess the original image and then test the recognition performance of the target recognition method for 10 classes of targets. Figure 7 shows the confusion matrix for recognizing the original image and the target segmentation results respectively. The average recognition rates of the two are 86.54% and 90.24%, respectively. It can be seen that the target segmentation method proposed in this paper effectively improves the target recognition performance. This is because good target segmentation effectively removes most of the background noise interference.

BMP2

0.73

0.02

0.14

0.00

0.00

0.00

0.10

0.00

0.01

0.00

BMP2

0.79

0.02

0.12

0.00

0.00

0.00

0.06

0.00

0.02

0.00

BTR70

0.14

0.68

0.04

0.00

0.00

0.00

0.05

0.00

0.09

0.00

BTR70

0.01

0.90

0.01

0.00

0.00

0.00

0.06

0.00

0.02

0.00

T72

0.04

0.00

0.96

0.00

0.00

0.00

0.01

0.00

0.00

0.00

T72

0.06

0.00

0.89

0.00

0.00

0.00

0.00

0.00

0.04

0.00

T62

0.00

0.00

0.00

1.00

0.00

0.00

0.00

0.00

0.00

0.00

T62

0.00

0.00

0.00

1.00

0.00

0.00

0.00

0.00

0.00

0.00

BRDM2

0.00

0.00

0.00

0.00

0.96

0.03

0.00

0.01

0.00

0.00

BRDM2

0.00

0.00

0.00

0.00

1.00

0.00

0.00

0.00

0.00

0.00

BTR60

0.00

0.00

0.00

0.02

0.00

0.97

0.00

0.01

0.00

0.00

BTR60

0.00

0.00

0.00

0.00

0.01

0.99

0.00

0.00

0.00

0.00

ZSU23/4

0.08

0.08

0.07

0.02

0.00

0.00

0.63

0.00

0.08

0.04

ZSU23/4

0.02

0.04

0.05

0.02

0.00

0.00

0.82

0.00

0.05

0.02

D7

0.00

0.00

0.00

0.01

0.01

0.00

0.00

0.98

0.00

0.00

D7

0.00

0.00

0.00

0.01

0.00

0.01

0.00

0.98

0.00

0.00

ZIL131

0.08

0.08

0.04

0.00

0.00

0.00

0.07

0.00

0.73

0.00

ZIL131

0.06

0.06

0.05

0.00

0.00

0.00

0.03

0.00

0.81

0.00

2S1

0.00

0.00

0.00

0.00

0.00

0.05

0.00

0.00

0.00

0.95

2S1

0.00

0.00

0.00

0.00

0.00

0.04

0.00

0.00

0.00

0.96

T72

T62

D7

ZIL131

2S1

BMP2

BTR70

T72

T62

D7

ZIL131

2S1

BMP2 BTR70

a

BRDM2 BTR60 ZSU23/4

Original images

b

BRDM2 BTR60 ZSU23/4

Segmented results

Fig. 7. The confusion matrices of original images and segmented results

380

P. Zhao

(3) Power exponential enhancement The power exponential enhancement is used to process the original SAR image and to test the recognition performance of 10 classes of targets. As shown in Fig. 3, the power exponential enhancement can effectively enhance the target features to achieve the purpose of distinguishing between the target and the background. Figure 8 shows the average recognition rate for different powers a, in which case the original image remains 128  128 in size, namely, no image cropping. It can be seen from the Fig. that the recognition performance under different powers is greatly improved compared with the original recognition rate of 86.54%. In contrast, the recognition performance is best when a = 3.5, which indicates that the enhancement of the target features is most significant at this time.

Average recognition rate/%

95.5 95

94.5 94

93.5 93

92.5 2

2.5

3 Powers

3.5

4

Fig. 8. The recognition performances at different powers

4.2.2 Combination of Preprocessing Technologies The combination of multiple preprocessing technologies is expected to further improve SAR target recognition performance. Tables 3 and 4 show the recognition results after different levels of cropping and power exponential enhancement of the original SAR images and the target segmentation images, respectively. It can be seen that a reasonable combination of various preprocessing can significantly improve the target recognition performance. When the target image is segmented, the cropping window is taken as 80, and the power exponential enhancement of 3.5 is conducted, the target recognition rate reaches the highest 96.35%. Compared with the original image directly, the recognition rate at this time has been significantly improved, and the combination multiple preprocessing effectively combines their respective advantages. Specifically, both target cropping and target segmentation can remove background noise interference, and power exponential enhancement can further enhance the target features. By choosing suitable parameters (such as cropping window size, power size) in various preprocessing algorithms, the combination effect can achieve optimum.

Combination of Pre-processing Techniques

381

Table 3. The recognition performances at different sizes of cropping window and power exponents on original images Power Window size 128 80 2 92.85 93.32 2.5 93.35 93.68 3 94.85 95.12 3.5 95.01 95.64 4 94.82 95.22

40 92.76 93.54 94.35 94.89 95.01

Table 4. The recognition performances at different sizes of cropping window and power exponents on segmented results Power Window size 128 80 2 93.54 94.01 2.5 94.25 95.04 3 95.62 96.12 3.5 96.06 96.35 4 95.32 95.62

40 93.25 94.07 95.65 95.89 94.86

5 Conclusion This paper discusses the influence of SAR image preprocessing technology on target recognition performance, and analyzes and studies three preprocessing technologies, namely SAR image cropping, target segmentation and power exponential enhancement. It tests the influence of three types of technologies on target recognition performance in single use and in combination. In the end, the performance of target recognition is improved by combining three preprocessing technologies and the optimal parameters of different preprocessing technologies are obtained by means of parameter combination test. Based on 10 classes of MSTAR data, target recognition experiments show that the performance of target recognition can be effectively improved by combining multiple preprocessing technologies. It need be pointed out that at present, only the SVM classifier is used for classification experiments. In fact, the combined preprocessing technologies in this paper can be extended to other classifiers, such as SRC and CNN. Acknowledgements. This research was supported by The Youth Project project of science and technology research program of Chongqing Education Commission of China. (No. KJQN 201803111), and Intelligent Robot Technology Research Center of Chongqing College of Electronic Engineering (XJPT201705).

382

P. Zhao

References 1. Gongjian, W., Guoqiang, Z., Hongcheng, Y., et al.: SAR ATR based on 3D parametric electromagnetic scattering model. J. Radar 6(2), 115–135 (2017) 2. Khalid, E., Eric, W.G., Peter, M., et al.: Automatic target recognition in synthetic aperture radar imagery: a state-of-the-art review. IEEE Access 4, 6014–6058 (2016) 3. Ding, B., Wen, G., Ma, C., et al.: Target recognition in synthetic aperture radar images using binary morphological operations. J. Appl. Remote Sens. 10(4), 046006 (2016) 4. Amoon, M., Rezai-rad, G.A.: Automatic target recognition of synthetic aperture radar (SAR) images based on optimal selection of Zernike moment features. IET Comput. Vision 8(2), 77–85 (2014) 5. Cui, Z., Cao, Z., Yang, J., et al.: Target recognition in synthetic aperture radar via nonnegative matrix factorization. IET Radar Sonar Navig. 9(9), 1376–1385 (2015) 6. Ding, B., Wen, G., Yu, L., et al.: Matching of attributed scattering center and its application to synthetic aperture radar automatic target recognition. J. Radar 6(2), 157–166 (2017) 7. Ding, B., Wen, G., Zhong, J., et al.: A robust similarity measure for attributed scattering center sets with application to SAR ATR. Neurocomputing 219, 130–143 (2017) 8. Zhao, Q., Principle, J.C.: Support vector machines for SAR automatic target recognition. IEEE Trans. Aerosp. Electron. Syst. 37(2), 643–654 (2001) 9. Liu, H., Li, S.: Decision fusion of sparse representation and support vector machine for SAR image target recognition. Neurocomputing 113, 97–104 (2013) 10. Chen, S., Wang, H., Xu, F., et al.: Target classification using the deep convolutional networks for SAR images. IEEE Trans. Geosci. Remote Sens. 47(6), 1685–1697 (2016) 11. Han, P., Wu, R., Jiang, L.: Efficient SAR image segmentation and automatic target recognition approach. J. Civ. Aviat. Univ. China 21(3), 6–10 (2003) 12. Hu, L., Liu, H., Wu, S.: Novel pre-processing method for SAR image based automatic target recognition. J. Xidian Univ 34(5), 733–737 (2007) 13. Han, P., Mei, X., Wu, R.: Efficient approach of improving SAR ATR performance. J. Civ. Aviat. Univ. China 21(3), 6–10 (2003) 14. Chang, C., Lin, C.: LIBSVM: a library for support vector machine. ACM Trans. Intell. Syst. Technol. 2(3), 389–396 (2012)

College English Teaching and Testing Based on Data Mining Bing Xu(&) Xing’an Vocational College, Inner Mongolia, Ulanhot 137400, China [email protected] Abstract. With the emergence of “Internet+”, all walks of life have undergone tremendous changes. “Internet + education” has become a trend of development, which brings new opportunities and challenges for College English teaching and learning. Through the online English learning platform for teaching and learning, using data mining technology to analyze students’ learning data and establish relevant models, to explore the correlation between English examination and various elements, has important value for students’ learning and teachers’ teaching. The author has made a thorough study on it. Firstly, this paper introduces the theoretical basis of the research, introduces the function, process of data mining and the commonly used machine learning model. Finally, through the data generated by the College English Teaching and Assessment System for undergraduates in a university, the portrait and analysis of the students are constructed [1, 2]. Keywords: Big data mining

 College English  Teaching  Evaluation

1 Introduction In this paper, we use the data of students’ English practice and examination in College English Teaching and Assessment System to mine and analyze. Machine learning model can achieve better results. Therefore, this paper mainly uses machine learning related model to mine and analyze [3].

2 Application of Data Mining in Teaching Evaluation To meet the needs of teaching management, the business process of teaching evaluation is developed (see Fig. 1). Then the teaching evaluation system is designed. The teaching evaluation mainly involves the school teaching management department, the various teaching departments in the school and most of the teachers and students in the school. The evaluation, inquiry and modification of teachers and students as well as relevant units can be carried out in the campus network. Finally, data mining technology is applied to data analysis, so that school teaching management departments and teaching departments can quickly, accurately and efficiently acquire the required information by inquiring, statistic and analyzing a large number of evaluation data collected, so as to establish a scientific and reliable basis for school-related © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 383–387, 2021. https://doi.org/10.1007/978-3-030-51556-0_55

384

B. Xu

decision-making. On the other hand, teachers can find their own shortcomings and weaknesses in time to improve and improve [4, 5].

Fig. 1. Teaching evaluation business process

3 Application of Analytical Data Mining in College English Teaching and Testing 3.1

Basic Methods of Data Acquisition and Mining

In the basic method of data acquisition, because this function is the largest part of the whole system, the user roles are mainly divided into two categories: teachers and students. The goal is to achieve the complete and accurate collection of large-scale evaluation data. Figure 2 Data acquisition steps [6].

Fig. 2. Data acquisition steps

3.2

Building User Portraits

(1) Static data of user portraits Students’ basic information: Students’ basic information is mainly obtained from the database of English training system. The main attributes include: student number, name, gender, grade, class, major, mailbox, homework completion, time to start answering questions, submission time, equipment information used, among which homework completion attributes include work. The number, proportion and quality of job completion. Homework completion times: the number of times students complete the assignments assigned by teachers. Homework Completion Ratio: The proportion of students completing the assignment by teachers each time. Quality of homework completion: The quality of each assignment made by a student’s teacher can be divided into five situations: failing, passing, medium, good and excellent: the information of the teacher in the classroom where the student is teaching [7–9].

College English Teaching and Testing Based on Data Mining

385

(2) Dynamic data of user portraits Behavior data in the process of answering questions: According to the training of English audio-visual in the use of the system, the main data of students’ answering behavior are: answering time, landing time, practice time, answer modification times, answer path, watching video time, watching video repetition times, listening repetition times, question type time. Answer time: The length of students’ answer time includes the length of time to complete a set of papers on one hand, and the length of time for each type of question on the other. Landing System Time: The difference between the time when students end the landing system and the time when they start the landing system in a day. Length of Practice: How long do students practice English topics every day? Number of revisions to answers: The number of revisions to each question and the number of revisions to all questions in each set of test papers. Question Type Time: The time required for each question type. Answer Path: The order in which students answer questions. 3.3

Prediction and Analysis of Students’ Achievements

After data processing and feature processing, the proportion of positive and negative samples in the sample data is 9:1, that is, the ratio of passing sample data to failing sample data is 9:1. Logic Regression Prediction Achievement Pass Experiment Design: According to the principle of Logic Regression and the use scenario, the experiment was carried out by using Logic Regression Model to select priority. The experiment environment: Linux server, Python compiler environment and Liblinear open source tool were installed. Experiments: Python program is compiled, and the model is built by calling Liblinear open source tool function and adjusting parameters. See Fig. 3 specifically.

Fig. 3. Training set data file format

386

B. Xu

Model evaluation: In this study, AUC index was used to evaluate the model, and its AUC value was shown in Table 1. Table 1. AUC values of logistic regression model training results Number of iterations AUC 1 0.5443790483 2 0.5447356267 3 0.5459663296 4 0.5475944762 5 0.5478530139 6 0.5480117337 7 0.5480953721 8 0.5481455639 9 0.5481964281 10 0.5482134782

3.4

Test Results and Analysis

The test results are shown in Table 2 and Table 3 as the test accuracy data.

Table 2. Test results Features Scores for each item type Students’ test scores Completion of homework Number of English training Interest in English CET-4 and CET-6 Grade IV and Grade VI Pass

Importance 83 81 80 78 74 73 70

Table 3. Test correctness data Excellent Number of archived records 13 Number of test labels 13 Side accuracy 84.6%

Good 67 68 95.5%

Normal 19 19 89.5%

Fail 1 0 0%

College English Teaching and Testing Based on Data Mining

387

4 Concluding Remarks In the follow-up work (will be combined with noise processing methods) effective solution based on PK nearest neighbor classification method of teaching effectiveness evaluation can not effectively deal with the problem of noise samples. On the basis of the relevant attributes and answering behavior data generated by the system, this paper deeply studies data mining, machine learning theory and technology, and realizes the passing prediction of students’ examinations by using logistic regression model, enhanced decision tree model and the model after the integration of logistic regression model and enhanced decision tree model. Logical regression model is the most commonly used algorithm in industry.

References 1. Ellaway, R.H., Pusic, M.V., Galbraith, R.M., et al.: Developing the role of big data and analytics in health professional education. Med. Teach. 36(3), 216–222 (2014) 2. Kulp, C.W., Sprechini, G.D.: Teaching the assessment of normality using large easilygenerated real data sets. Teach. Stat. 38(2), 56–62 (2016) 3. Copp, D.T.: The impact of teacher attitudes and beliefs about large-scale assessment on the use of provincial data for instructional change. Educ. Policy Anal. Arch. 24, 109 (2016) 4. Cope, B., Kalantzis, M.: Sources of evidence-of-learning: learning and assessment in the era of big data. Open Rev. Educ. Res. 2(1), 194–217 (2015) 5. Akhavan-Hejazi, H., Mohsenian-Rad, H.: Power systems big data analytics: an assessment of paradigm shift barriers and prospects. Energy Rep. 4, 91–100 (2018) 6. Tseng, S.-F., Tsao, Y.-W., Yu, L.-C., et al.: Who will pass? Analyzing learner behaviors in MOOCs. Res. Pract. Technol. Enhanc. Learn. 11(1), 8 (2016) 7. Gu, K., Tao, D., Qiao, J.F., et al.: Learning a no-reference quality assessment model of enhanced images with big data. IEEE Trans. Neural. Netw. Learn. Syst. 29(4), 1301–1313 (2018) 8. Makarevitch, I., Frechette, C., Wiatros, N.: Authentic Research experience and “big data” analysis in the classroom: maize response to abiotic stress. CBE Life Sci. Educ. 14(3), 48 (2015) 9. Cooper, M.M., Underwood, S.M., Bryfczynski, S.P., et al.: A short history of the use of technology to model and analyze student data for teaching and research. ACS Symp. 1166, 219–239 (2014)

Information Management Mechanism of Informationization Under Cluster Analysis Algorithm Bo Hu(&), Yangchun Yuan, Yongcai Wang, and Hancong Huangfu Guangdong Power Grid Co., Ltd., Guangzhou, China [email protected] Abstract. In the fierce market competition, China’s power grid companies have gradually realized that through the supply chain management, such an effective mode of cooperation between enterprises, especially through the use of supply chain performance management methods can effectively enhance the core competitiveness of enterprises. From the perspective of grid companies, this study first summarizes and reviews the gray cluster analysis algorithm theory, and then calculates and analyzes the supplier index data. Based on this, the supplier judgment and evaluation level under the clustering method is determined., The index number field extension value, and finally classified the suppliers using the gray clustering evaluation method, and tested the information-based supplier management mechanism under the cluster analysis algorithm with a case. The test shows that the method is interpretable with applicability. Keywords: Power grid enterprises algorithm  Grey cluster analysis

 Supplier management  Cluster analysis

1 Introduction With the globalization of the economy and the intensification of market competition, enterprises have become more and more focused on their core competitive business, and gradually outsourced non-core business. As a result, the satisfaction of customer needs can no longer simply be met by one or more companies. provided. With the rapid development of the power market in recent years, it has also faced a series of problems in the development process. Among them, the issue of supplier management of power grid companies has become an important factor affecting its rapid development. In order to promote the healthy development of grid companies, solve the problems of supplier management, and establish a strategic partnership between grid companies and suppliers, this article uses a cluster analysis algorithm to conduct a comprehensive analysis to determine the supplier judgment under the clustering method. The evaluation level and the extension of the number of indicators are tested and explained on the case of the information supplier management mechanism constructed in this study.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 388–394, 2021. https://doi.org/10.1007/978-3-030-51556-0_56

Information Management Mechanism of Informationization

389

2 Cluster Analysis Algorithm Theory and Management Framework Design A family is a collection of data objects that have similarities to objects in general, while objects in different clusters have dissimilarities [1, 2]. Cluster analysis has been widely used in many fields, including machine learning, data mining, pattern recognition, image analysis, and biological information [3]. Clustering is to divide similar objects into different groups or more subsets by static classification. The difference is large and belongs to an unsupervised learning method [4–6]. There are n objects, m evaluation indicators, s different gray classes, and the observed value of object i with respect to index j is Xij, (i = 1, 2, …, n; j = 1, 2 … m), the corresponding object i is evaluated and diagnosed based on the value of X. The specific steps of the cluster analysis algorithm based on the triangle whitening weight function are as follows: Step 1: According to the requirements of the gray cluster evaluation model, the required number of gray classes is divided into s gray categories, for example, the range of values of the j index [a1, as +1] is divided into s intervals [a1, a2], …, [aK-1, aK], …, [aS-1, as]. Step 2: Let the whitening weight function value of 1 belonging to the kth gray class be kk ¼ ðak þ2ak þ 1 Þ, and connect the starting point ak-1 of the (k, 1) and k-1 gray classes and the end point ak + of the k + 1th gray class. 1. Obtain the triangular whitening weight function fj1 ðÞ; j ¼ 1; 2; . . .; m; k ¼ 1; 2; . . .; s of the j index on the h gray class. For an observation of the index j, see Eq. (1), and calculate the membership degree fjk ð xÞ belonging to the gray class k (k = 1, 2, …, s). fjk ð xÞ

¼

8 < 0;

xak1 kk ak1 : ak þ 2 x ak þ 2 kk

x 62 ½ak1 ; ak þ 2  x 2 ½ak1 ; kk  x 2 ½ kk ; ak þ 2 

ð1Þ

Step 3: Calculate the comprehensive clustering coefficients of the (i = 1, 2, …, n) for the k (k = 1, 2, …, s). Step 4: Determine the advantages and disadvantages of each object belonging to the k* gray class according to the size of the integrated clustering coefficient.

3 Supplier Judging Evaluation Level and Index Number Domain Extension Value under Clustering Method (1) Acquisition and calculation of supplier indicator data At present, most of the research on supplier selection and evaluation issues is based on the research of Dickson G.W. and Weber C.A. In 1966, Dickson first systematically studied the issue of supplier evaluation. He proposed the most important 23 evaluation criteria, such as quality, delivery time and historical performance. The Weber system comprehensively summarizes 74 articles related to supplier evaluation selection

390

B. Hu et al.

published from 1967 to 1990 [7]. Based on statistical analysis, the importance of the evaluation criteria contained in it is ranked. Another scholar put forward three major indicators of service level, supply capacity and quality, and made detailed developments. Some scholars have composed 11 indicators such as the compliance rate of the supplier relationship management system, organizational culture, customer service, product price, quality management personnel, product development time, and shipping quality [8]. From the perspective of domestic research, the issue of supplier selection and evaluation has received more and more attention in the research of evaluation index system with the development of social production management [9]. Another scholar has established an evaluation system consisting of five indicators: price, quality, supply capacity, on-time delivery, and service level for supplier selection and order planning analysis. In summary, the construction of the indicator system should follow the principles of comprehensiveness, hierarchy, science and operability. After consulting the relevant experts and screening and sorting the indicators several times, the supplier evaluation index system is finally constructed. The specific indicators are shown in Fig. 1.

Fig. 1. Indicator system for supplier assessment

(2) Determination of index weight and number domain extension value In the supplier evaluation selection index system established above, there are quantitative indicators and qualitative indicators in the secondary indicators. When the suppliers are evaluated and selected, the indicators of each system reflect the situation of each candidate supplier. For quantitative indicators, the calculation formula can be obtained from the above description of the indicator, and the supplier quantitative index data can be obtained by calculation formula, as shown in Table 1. In the process of supplier evaluation selection, it is one of the most basic and most important tasks to determine the weight of each level of the supplier evaluation selection index system, because the size of the index weight not only directly affects the final evaluation result, but also the change of weight may cause It is very important to

Information Management Mechanism of Informationization

391

Table 1. Formula for calculating quantitative indicators Quantitative indicator Product price On-time delivery rate of products Temporary product availability

Calculation formula Product price ratio = supplier price/market average price On-time delivery rate of products = on-time delivery in a certain period of time/total number of delivery in a certain period of time Temporary product supply = Temporary supply/Temporary demand of power enterprises

be able to scientifically determine the weight of indicators in the process of evaluating the final evaluation value of the program. There are many specific methods for determining the weights. Each suppFormula for calculating quantitative indicators. Supplier evaluation in the process of selection, to determine the index system of selecting supplier in all levels of index weight is one of the most basic and most important work, because the size of the index weight is not only directly affect the final evaluation results, and the change of weight may cause the college program final value changes, thus to determine the index weight is important in the process. There are many specific methods to determine the weight, and each supplier evaluation and selection method has its merits, but also has its defects. Through the investigation and analysis of power grid enterprises and suppliers, and combining the role of each indicator factor in supplier performance appraisal, the weight of relevant indicators is determined. The weight of each indicator in supplier performance appraisal is shown in Table 2. Table 2. Weights of indicators Index Product qualification rate Product popularity Product profit On-time delivery rate Order completion rate Distribution capacity After-sales satisfaction rate Promotion fits

Weights 0.15 0.1 0.2 0.12 0.14 0.07 0.11 0.06

According to the assessment of the classification of gray categories and the requirements of indicators, the relevant research results are used to determine the three gray categories of suppliers to be assessed, namely, A, B, and C, which represent important suppliers, more important suppliers, and general suppliers. According to the actual situation of power grid enterprises and suppliers, according to the combination of quantitative analysis and qualitative analysis, the boundary value of each indicator gray category, supplier performance evaluation index system, weight and gray category are shown in Table 3.

392

B. Hu et al.

Table 3. Supplier performance appraisal indicator system, weights and gray classification Primary indicator

Secondary indicators

Weights

Product level

Product qualification rate Product popularity Product profit On-time delivery rate Order completion rate Distribution capacity After-sales satisfaction rate Promotion fits

Delivery ability

Service level

15

Class C boundary value [50,70]

Class B boundary value [70,90]

Class A boundary value [90,100]

10

[10,30]

[30,50]

[50,70]

20 12

[10,20] [50,70]

[20,30] [70,90]

[30,40] [90,100]

14

[50,70]

[70,90]

[90,100]

7

[50,70]

[70,90]

[90,100]

11

[50,70]

[70,90]

[90,100]

[5,8]

[8,10]

[10,15]

6

According to the theoretical research of the grey clustering model and the actual situation of the supplier performance appraisal, the evaluation indexes are extended to the left and right, and the extension value of each index number field is obtained. The extension value of each index is shown in Table 4. Table 4. The number of domain extensions Index Product qualification rate Product popularity Product profit On-time delivery rate Order completion rate Distribution capacity After-sales satisfaction rate Promotion fits

Extension value 1 Extension value 2 0.40 120 5 90 5 50 10 15 40 120 30 110 40 110 3 18

(3)Classification of suppliers under clustering analysis algorithm For an observation x of the j index, the whitening weight function value fjk ð xÞ for the gray class h(k = 1, 2, 3) can be calculated by the following equation. For the case of j = 1, the product qualification rate index domain extension value a1 = 40, a5 = 120. A1, a2, a3, a4 are taken as the domain values of the three gray classes of “C class”,

Information Management Mechanism of Informationization

393

“B class”, and “class A”, that is, a1 = 50, a2 = 70, a3 = 90, and a4 = 100. Take the mean of ak and ak + 1 [10]: 1 1 k1 ¼ ða1 þ a2 Þ ¼ ð50 þ 70Þ ¼ 60 2 2 1 1 k2 ¼ ða2 þ a3 Þ ¼ ð70 þ 90Þ ¼ 80 2 2 1 1 k3 ¼ ða3 þ a4 Þ ¼ ð90 þ 100Þ ¼ 95 2 2

ð2Þ

According to the calculation results, the eight suppliers are classified as shown in Table 5. From these 8 supplier classifications, we can see that there are 3 suppliers belonging to level A, 3 suppliers belonging to level B, and 2 belonging to level C, showing an olive type with a large middle and small ends. Such a structure can enable grid companies to carry out targeted management and achieve maximum management results with minimal management costs. Category A is an important supplier, and it is a supplier that requires the company to carry out key maintenance; Category B is a more important supplier, and it is necessary for the grid company to provide appropriate incentives; and Category C is a general supplier. Eliminated suppliers do not need to spend too much effort on maintenance. Through the assessment and management of suppliers, not only can we introduce a competition mechanism to increase the enthusiasm of suppliers, but also we can establish a good cooperative relationship with suppliers.

Table 5. Grey clustering coefficient classification results of suppliers Supplier 1 2 3 4 5 6 7 8 Result B A A C A B B C

4 Case Analysis Due to the difficulty of obtaining data from suppliers in the current supply chain, 11 performance indicators such as the supplier’s main product catalog, product qualification rate, regular organization qualification evaluation results, order execution satisfaction rate, and timely delivery rate are used for Examples. Performance data from 250 suppliers was used. Let m = 250 and n = 11, then the matrix X is composed of 250 11-dimensional vectors. After normalizing the matrix X, an m * n-dimensional matrix Y is obtained. Set the density parameter T = 4, D = 2.5, use the clustering method to identify and classify the data, and the results are clustered into five categories. See Table 6 for details.

394

B. Hu et al. Table 6. The finally of clustering Classification 1 2 3 4 5

Class member 3, 7, 9, 15, 22, 25, 33, 38…… 5, 11, 16, 17, 18, 23, 34, 35…… 1, 2, 14, 21, 24, 29, 37, 39…… 4, 8, 12, 19, 26, 28, 31, 36…… 6, 10, 13, 20, 27, 30, 32, 40……

Condensation point 102 234 39 183 67

5 Conclusion In this paper, gray clustering evaluation method is used to establish a gray clustering evaluation method for power grid enterprises to select partners. The use of gray cluster evaluation method to classify and manage suppliers can not only save time, capital and other costs, but also form a fair competition among suppliers, so that suppliers can provide better products for power grid enterprises. Of course, the assessment results of suppliers are not static. Suppliers with poor performance may be demoted in the next assessment, while those with good performance will have opportunities to upgrade.

References 1. Canzaniello, A., Hartmann, E., Fifka, M.S.: Intra-industry strategic alliances for managing sustainability-related supplier risks: motivation and outcome. Int. J. Phys. Distrib. & Logist. Manag. 47(5), 135–136 (2017) 2. Yanga, W., Gaob, Yu., Lic, Y., et al.: Different roles of control mechanisms in buyersupplier conflict: an empirical study from China. Ind. Mark. Manage. 25(12), 65 (2017) 3. Adamczyk, K., Cywicka, D., Herbut, P., et al.: The application of cluster analysis methods in assessment of daily physical activity of dairy cows milked in the voluntary milking system. Comput. Electron. Agric. 3(141), 65–72 (2017) 4. Shahreza, F.A., Hazar, N.: Using routine data to categorize poor control diabetic patients: an application of cluster analysis technique. Iran. J. Public Health 46(1), 120–127 (2017) 5. Brusco, M.J., Singh, R., Cradit, J.D., et al.: Cluster analysis in empirical OM research: survey and recommendations. Int. J. Oper. & Prod. Manag. 37(3), 300–320 (2017) 6. de Araújo, M.C.B., Alencar, L.H., de Miranda Mota, C.M.: Project procurement management: A structured literature review. Int. J. Proj. Manag. 35(3), 353–377 (2017) 7. Srinivasan, R., Narayanan, S., Narasimhan, R.: An investigation of justice, conflict, and moderating effects of supplier autonomy and cultural distance in buyer-supplier relationships. IEEE Trans. Eng. Manage. 3(21), 1–15 (2018) 8. Murthy, V., Paul, B.: Nature of buyer-supplier relationship: small businesses in a small city. J. Small Bus. Manage. 55(3), 365–387 (2017) 9. Ramon-Jeronimo, J., Florez-Lopez, R.: What makes management control information useful in buyer–supplier relationships? J. Risk & Financ. Manag. 11(3), 31–33 (2018) 10. Ahmadi, M., Valinejadi, A., Goodarzi, A., et al.: Geographic Information System (GIS) capabilities in traffic accident information management: a qualitative approach. Electron. Physician 9(6), 4533–4540 (2017)

Development and Application of Video Monitoring System for Poles Based on Ubiquitous Internet of Things Technology Hongli Liu, Nan Li(&), Ye Zhao, Liyun Zhang, and Xuetao Zhou Hebei Power Transmission & Transformastion Co., Ltd., Shijiazhuang, China {sbd_liuhl,sbd_lin,sbd_zhaoy, sbd_zhangly,sbd_zhouxt}@he.sgcc.com.cn

Abstract. In order to ensure the smooth construction of the tower assembly, the State Power Grid Corporation’s Communication and Construction Branch organized several special meetings to study and review the construction methods of the tower assembly, and identified a variety of construction schemes. Tower assembly of inner suspension poles and outer cables. Therefore, the research and application of the monitoring system for the whole process of the suspension pole group tower and the monitoring of the forces and angles of the various parts of the pole system during the entire construction process can eliminate hidden safety hazards during construction and improve the efficiency and safety of the tower tower construction Reliability. This paper mainly researches the development and application of pole tower video surveillance system based on ubiquitous IoT technology. It can be known from the experiments in this paper that compared with the measured data, calculated data and corrected data, the force error of the traction rope, support rope and outer pull wire are all within 10%. The results show that the monitoring system basically achieves the expected results and meets the needs of construction. Keywords: Ubiquitous Internet of Things Technology Monitoring system  Pole holding

 Pole holding tower 

1 Introduction Insufficient large-scale long-distance power transmission capacity of the power grid and over-reliance on coal transportation for energy transmission are prominent issues facing China’s energy development. The implementation of the “One Special Four” strategy is the core task of power development [1]. The so-called “one special and four major” strategy refers to the construction of a strong smart grid with UHV power grids as the backbone grid and coordinated development of power grids at all levels, accelerating the construction of air energy channels, implementing both coal and power transmission, and promoting large coal power and large hydropower Intensive and efficient development of large nuclear power plants and large-scale renewable energy power generation bases, large-scale, long-distance power transmission and nationwide optimization of energy allocation are provided to provide sustainable power guarantee for China’s economic and social development [2, 3]. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 395–401, 2021. https://doi.org/10.1007/978-3-030-51556-0_57

396

H. Liu et al.

Transmission lines can be divided into overhead transmission lines and cable lines according to their structural forms. Among them, overhead transmission lines are more commonly used. This type of power transmission line is composed of pole towers, wires, insulators, line fittings, cable pullers, pole tower foundations, grounding devices, etc., and is erected on the ground [4, 5]. The pole tower is the main supporting mechanism of the overhead transmission line, and it is the skeleton of the transmission line. In the transmission line, a support wire and a lightning rod system are provided to keep the electrical safety distance between the conductor, the lightning conductor and the ground (water surface), and between the conductor and the lightning conductor. Its role is also the basis for ensuring the smooth power supply of transmission lines [6, 7]. Therefore, in the process of erection of transmission lines, ensuring the sufficient strength and stability of the towers is a necessary condition to ensure the smooth flow of the lines [8]. Higher transmission voltage levels increase the requirements for transmission lines. For pole towers, it is necessary to provide higher strength and stability [9]. For construction, the rise of the voltage level will also increase the height and weight of the tower, which puts forward higher requirements for the construction of the tower. Therefore, it is necessary to choose a construction method that can adapt to the characteristics of the UHV tower. While ensuring the quality of construction while ensuring production safety. Increasing the height and weight of the tower will inevitably increase the difficulty of construction, and will also have a certain impact on the safety of construction [10]. Therefore, efforts must be made to solve hidden safety hazards during the construction process, while ensuring the safety of construction and ensuring the smooth progress of the project.

2 Method 2.1

Ubiquitous Electricity Internet of Things Technology

The smart grid is the foundation for the development of the ubiquitous Internet of Things, and the core of the smart grid is to build a comprehensive network system with a variety of energy sources and distributed management that has intelligent judgment and self-adjustment. The technical nature of the system is to achieve substitution and compatibility between different energy sources. The integration of key technologies of the ubiquitous electric power Internet of Things has greatly expanded its application scope, and can provide technical assistance in many energy development levels. Through these applications, massive amounts of power information become more reliable and efficient in the ubiquitous power IoT. From a technical perspective, the ubiquitous electric power Internet of Things mainly includes four major elements, namely: (1) Collection of large amounts of power data and intelligent terminal; (2) Corresponding transmission of large amounts of power data; (3) Integrated management and intelligent analysis of massive amounts of power data; (4) Comprehensive application of power information. The key technologies corresponding to these core elements are smart chips, modern communication technologies, and Internet of Things platform technologies that we will have contact with in daily life.

Development and Application of Video Monitoring System

2.2

397

Smart Chips for Key Technologies of Ubiquitous Electricity Internet of Things

During the development of the power system, devices such as metering, conversion, protection, control, monitoring, and power consumption are constantly being connected to the power system. These different devices generate a large amount of data during operation. In the professional field of field data collection, some equipment is still based on traditional industrial acquisition devices, so the data security cannot be well guaranteed, and the collected data also has the problem of low accuracy, which also makes terminal equipment Can’t achieve intelligence very well. In response to this problem, micro-intelligent sensing and intelligent terminals in smart chip technology can be used to solve this problem. The high-precision, low energy consumption, miniaturization, and intelligent computing functions of smart chips will perform information on the device. Complete collection, extraction and transmission, and the intelligent chip can also intelligentize the terminal device through local edge computing technology, thereby achieving localized self-control. In this way, the embarrassing situation that the traditional equipment has the telemetry function but does not have the remote control ability is completely broken. 2.3

System Principle

2.3.1 Measurement, display and control of tension and inclination. Install a tension sensor at the part where the outer suspension wire of the inner suspension pole, the supporting rope and the pole are connected, to measure the force of the tension wire; install an oil pressure sensor on the tractor to measure the pressure of the main hydraulic system and the pressure of the rope winding device; An inclination (angle) sensor is installed at the pole body and the traction rope to measure the inclination angle of the pole and the angle between the traction rope and the pole. The signals are collected by the control module and sent to the on-board computer through the controller area network (CAN) bus, and it is judged whether it exceeds the rated value, the alarm is determined or the tractor is stopped, so the tower assembly process is monitored in real time to ensure the construction process Security. 2.3.2 Wireless video system. Two video cameras are installed on both sides of the top of the pole, and the wireless signal is transmitted to the computer monitor to monitor the entire process of the tower. 2.4

Suspension Pole Technology

The inner suspension and outer tension wire holding pole means that the pole is suspended in the center of the tower structure. The upper wire of the pole is fixed on the ground around the tower. The supporting rope at the lower part of the pole is fixed to the four main materials of the tower. Therefore, it is called an inner suspension outer pull wire holding rod. The whole pole is suspended in the iron tower structure, and the pole is restrained by the upper cable system and the lower supporting system. The lower support system is composed of a support wire rope, a balance pulley and a chain. The supporting rope

398

H. Liu et al.

is passed through the respective balance pulleys by two steel ropes, and its ends are directly fixed at the main material nodes of the assembled tower section to form a constraint on the bottom of the pole. The pull-up wire of the pole is to connect one end of the four pull wires to the pole cap on the top of the pole. When the inner pull wire method is used, the other end is fixed to the upper node of the four main materials of the assembled tower. When the outer pull wire method is used, Fix the pull-up wire on the ground anchor other than the iron tower to form a constraint on the top of the pole. The hoisting rope passes through the head and sky pulleys on the top of the pole to lift the tower tower and transmit the lifting gravity to the pole axially. Force calculation: Total force of lifting rope: T¼

cos x G cosðx þ bÞ

ð1Þ

T ngn

ð2Þ

Static tension of traction rope: T0 ¼

3 Experiment In this article, the full-range monitoring system of the pole group tower was used in May 2018. After being used in the AN57 tower construction of a general line project (1 bid section) of an UHV AC transmission demonstration project, it was also used in the multi-base steel pipe tower assembly. Now take AN57 as an example, the tower type is SZ273-60, the total height is 102 m, and the total weight is 120t. The 11th section of the single main material weighs 916.6 kg and the single-sided cross iron weight is 362 kg. 3.1

Limiting Torque Setting

3.1.1 Before the tower is constructed, the forces of the outer cables, supporting ropes and traction ropes must be calculated for the maximum lifting mass for different tower types. 3.1.2 Set the alarm value and stop value of each sensor before lifting. The alarm value is generally 90% of the maximum value. In the process of suspending the poles, the cable is the main force component. Analyzing the force of the cable and measuring and monitoring it are important measures to ensure the safety of the construction. The “Guidelines for the Construction Technology of Steel Pipe Towers for Overhead Transmission Lines” stipulates that: for the specificity of the steel pipe tower structure, the shaft and the cross section should be designed as stable structures.

Development and Application of Video Monitoring System

399

4 Discussion 4.1

Comparative Analysis of System Measured Data and Calculated Data

In the field measurement and comparison of calculated data, the force error of the outer pull wire exceeds 20%. After analysis, because the tension sensor that measures the force of the outer pull wire is installed at the connection between the pole head and the outer pull wire, the measured value includes the dead weight of the outer pull wire. When calculating the force of the outer pull wire (/ 18 steel wire rope), the outer pull wire is not considered. The weight of the outer cable when lifting the corresponding tower is multiplied by its weight per meter, and the resulting weight is added to the calculation force for correction. As shown in Table 1 and Fig. 1, compared with the measured data, calculated data, and corrected data, the force error of the traction rope, support rope, and outer pull wire are all within 10%; the results show that the monitoring system basically achieves the expected effect and meets Construction needs. Table 1. Comparison table of single main material data Project

Measured force Calculated force Deviation Force after (kN) (kN) correction Outside pull 9.1 6.7 26% 7.08 line Supporting 25.2 23.5 9.3% rope Leash 15.2 14.2 8.0%

4.2

Error after repair 5.7%

Application Effect

It was successfully applied in the construction of the 1st section of a 1000 kV UHV AC transmission demonstration project, and achieved good results. The main performance is as follows: 4.2.1 The full-time monitoring system of the suspension pole group tower dynamically and accurately displays the forces and inclination values of the outside pull wire, supporting rope, traction rope, and realizes automatic control alarm and shutdown functions, effectively preventing accidents and ensuring construction safety. 4.2.2 The on-site commander can clearly, intuitively and comprehensively observe the lifting process and posture of the hanger through the video monitoring system, and can issue operating instructions based on data and images at any time to maintain good communication with the operators on the tower and avoid The appearance of sight and hearing blind spots. 4.2.3 Using the traction machine as the power of the tower, the hydraulic transmission has a large adjustment range for the traction speed, which can well meet the requirements of stepless speed change, and has strong adaptability to external loads;

400

H. Liu et al.

25

20.7

20

16.2

15 10 5 0

6.8 6.2

3.69 3.52 2.22 0.43 0.41

0.09

0.08

Outside pull line

Supporting rope

Leash

Measured Force (kN) Force after correction

Calculated Force (kN) Error after repair

Deviation

Fig. 1. Cross iron data comparison table

stable operation, fast lifting speed, and improved internal suspension and external Construction efficiency of wire rods. 4.2.4 The tractor has multiple safety protections such as traction setting and automatic alarm, which is safe and reliable to use. 4.2.5 The traction machine has two sets of rope retraction devices, one traction machine can replace two motorized winches, no need to change the traction rope frequently, saving manpower and material resources; the rope retraction device has an independent hydraulic system, which keeps the tail wire rope scheduled Tension and braking. 4.2.6 On-site command adjusts the order of operations at any time based on the on-site wind speed monitoring data and takes corresponding measures to avoid the impact of wind. 4.2.7 The video surveillance system stores and manages all camera information through high-definition digital hard disk recorders, providing strong support for experience summarization and education and training. 4.2.8 This monitoring system accurately measures the force of each system of the pole. 4.2.9 The design of the remote control function improves the working environment of the operator and facilitates the transmission of information between the field commander and the operator.

Development and Application of Video Monitoring System

401

5 Conclusion During the process of assembling the tower with inner and outer suspension cables, the forces and angles of the various parts of the pole system were controlled, which changed the previous field operations and the way the commander carried out construction based on experience, so that the suspension pole was assembled. Higher efficiency and better security. The successful application of this system in the 1000 kV UHV AC transmission demonstration project proves the feasibility of this monitoring system and helps to eliminate hidden safety hazards in the construction of suspended towers and improve the safety of construction. Acknowledgment. This work was financially supported by the Hebei Power Teansmission & Transformation Co., Ltd. (Development and Application of Video Monitoring System for Poles Based on Ubiquitous Internet of Things Technology) Science and technology Support.

References 1. Liu, Z., Wang, Y., Qin, X.: Study on smart city construction of Jiujiang based on IOT technology. Iop Conf. 69(1), 012105 (2017) 2. Sedjelmaci, H., Senouci, S.M., Taleb, T.: An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 66(10), 9381–9393 (2017) 3. Wang, X.V., Wang, L.: A cloud-based production system for information and service integration: an internet of things case study on waste electronics. Enterp. Inf. Syst. 11(7), 952–968 (2017) 4. Eidam, S., Redenz, A., Sonius, D.: Ubiquitous healthcare—do the health and information technology sectors converge? Int. J. Innov. & Technol. Manag. 14(23), 1750039 (2017) 5. Sinha, S., McRobbie, S., Meldrum, A.: Using mobile technology to enhance medical student assessment. BMJ Simul. Technol. Enhanc. Learn. 3(2), 77 (2017) 6. Li, C.-T., Lee, C.-C., Weng, C.-Y.: Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-To-Peer Netw. Appl. 11(15), 198–208 (2017) 7. Oteafy, S.M.A., Hassanein, H.S.: IoT in the fog: a roadmap for data-centric IoT development. IEEE Commun. Mag. 56(3), 157–163 (2018) 8. Roehrs, A., da Costa, C.A., da Rosa Righi, R.: Personal health records: a systematic literature review. J. Med. Internet Res. 19(1), 13 (2017) 9. Zhao, P., Wei, Yu., Yang, X.: Buffer data-driven adaptation of mobile video streaming over heterogeneous wireless networks. IEEE Internet Things J. 5(5), 3430–3441 (2018) 10. Krugh, M., McGee, E., McGee, S.: Measurement of operator-machine Interaction on a chaku-chaku assembly line. Procedia Manuf. 10, 123–135 (2017)

Talent Demand Analysis of LIS Based on Python and Apriori Xinyu Wu(&) Southwest University Library, Chongqing, China [email protected]

Abstract. This article uses Python crawler technology to obtain 3715 recruitment demands data which is highly correlated to LIS, from mainstream recruitment website in China, such as 51job, liepin, lagou, etc., and divides them into three categories: Library Management, Archives Management, and Information Science. Different positions are analyzed from multiple dimensions such as city, industry, education, experience, salary, etc. Then use jieba word segmentation technology to analyze the key skills of different positions. Finally, use Apriori algorithm to do further data mining with the talent demands of different positions. Keywords: Lis

 Jieba  Apriori  Talents demands

1 Introduction With the rapid development of Internet technology, LIS is not limited to traditional Library Management, Archives Management, etc., its application scenarios are becoming increasingly wider and deeper [1]. Therefore, how to train LIS talents to meet the demands of social development and enterprises is very important. The training of talents must be based on the demands of talents, and the companies’ recruitment information can reflect the demands of talents mostly.

2 Basic Technical Route 2.1

Data Collection

According to the market share of recruitment websites, this article selected 3 mainstream websites including 51job, liepin, and lagou [2]. The author obtained 4905 items of recruitment data by using “Library Management”, “Archives Management”, “Data Management”, “Information Science”, etc. as key words in these 3 websites. 2.2

Data Cleaning and Standardization

The data obtained by the web crawler has null values and duplicate values. So data cleaning is necessary [3]. The author used the url address of each recruitment data as an index, and deleted the duplicate values, and finally obtained 3715 items of data. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 402–408, 2021. https://doi.org/10.1007/978-3-030-51556-0_58

Talent Demand Analysis of LIS Based on Python and Apriori

403

In addition, the data of different recruitment websites has different formats, so the data must be standardized as well [4]. 2.3

Data Analysis, Processing and Visualization

This article analyzes the demands of different positions from multiple dimensions such as city, industry, education, experience, and salary. Then use jieba word segmentation technology to analyze the key skills of different positions. Finally, use Apriori algorithm to do further data mining with the talent demands of different positions. This article uses Tableau for data visualization [5].

3 Descriptive Analysis of LIS Talents Demands This article divides all the recruitment data into three categories: Library Management, Archives Management, and Information Science according to job title and job responsibilities [6]. And then analyzes the talents demands of different positions from multiple dimensions, such as city, industry, work experience, education, and salary level. This article also uses a Chinese word segmentation library called jieba to do text data mining with job descriptions to analyze the key skills of different jobs [7]. 3.1

Distribution of Talents Demands in Different Cities

Fig. 1. Distribution of talents demands in different cities

As shown in Fig. 1, LIS-related jobs are mostly needed in First-tier Cities and New First-tier Cities. Besides Beijing and Shanghai have the most educational institutions. Therefore, Beijing and Shanghai have the most demands for Library Management.

404

3.2

X. Wu

Distribution of Talents Demands in Different Industries

Fig. 2. Distribution of talent demand in different industries

As shown in Fig. 2, the real estate industry has the most demands for LIS talents and the positions are mainly about Archives Management. And ICT & Internet industry has the second most demands. The positions are mostly about Information Science. However, the education, media and entertainment industry has the most demands for Library Management positions. 3.3

Distribution of Talents Demands in Different Work Experience

Fig. 3. Distribution of talents demands in different work experience

As shown in Fig. 3, LIS related jobs don’t have high demand on work experience. Most positions only require employees with 0–1 yrs of experience. However, Information Science jobs require practitioner has rich work experience because it’s more difficult technically.

Talent Demand Analysis of LIS Based on Python and Apriori

3.4

405

Distribution of Talent Demand in Different Education Background

Fig. 4. Distribution of talent demand in different education background

As shown in Fig. 4, the demands of education background for different positions are very different. Archives Management positions are relatively simple, so mostly they only require practitioners with College Diploma, or even a college degree below College Diploma. Only 20% of positions require Bachelor Degree and above. Information Science positions generally require practitioners with Bachelor Degree because of its complexity. Library Management is in between, and College Diploma and Bachelor Degree degrees required is up to 74%. 3.5

Talent Demand and Salary Analysis

Fig. 5. Talent demand and salary analysis

At present, the national average salary of LIS is 5.58k, and Archives Management is 5.39k, Library Management is 5.94k, Information Science is 10.56k. Education, computer and finance industries have higher salary levels in various industries (Fig. 5).

406

3.6

X. Wu

Analysis of Key Skills Demands of Different Positions Table 1. Key skills demands of different positions [8]

Position Archives Management

Library Management

Information Science

High frequency vocabulary and frequency Sorting out (10559), architecture (10384), filing (7653), collecting (5406), office software (4716), confidentiality (4278), contract (3936), sense of responsibility (3859), conscientiousness (3821), registration (3742), classification (3712), communication (3304), meticulous (2748), statistics (2412), teamwork (1623), engineering project (1429), office (1380), excel (1098), word (942) Classification (516), communication (276), organization (273), borrowing (238), Bachelor Degree (187), team (160), sense of responsibility (159), classification (143), data management (136), shelves (129), registration (127), English (116), office software (96), communication skills (82), editors (78), inventory (77) Analysis (964), Information Security (803), Intelligence (469), Data (412), Network (367), Public Opinion (357), News (132), Internet (120), Hotspot (114), Data analysis (84), communication skills (82), office software (72), sense of responsibility (69), database (60), excel (51), office (42), logical thinking (39)

According to the results of the text mining of job responsibilities, it can be seen that in addition to responsibility, teamwork, communication, organization, filing and other capabilities, the capabilities required by different positions are also different. Archives Management has higher requirements for Office skills and confidentiality concepts. Library Management has higher requirements for English and inventory management; Information Science requires practitioners to be more sensitive to news, hotspots and public opinion, and it also requires strong information security, data analysis skills, database skills, and logical thinking skills (Table 1).

4 Deeply Mining the Talents Demands of LIS Based on Apriori The Apriori algorithm is the most famous algorithm of association rule algorithms. It is mainly used to mine association rules between different things [9]. This article uses the Apriori algorithm which applies deep mining to relevant jobs information. Then use the obtained information to find the association between different talent demand variables. This article set parameter support to greater than or equal to 0.15, and parameter confidence greater than or equal to 0.8 [10].

Talent Demand Analysis of LIS Based on Python and Apriori

407

Table 2. Analysis of association rules for talent demands Position

Frozenset

Archives Delow College Diploma, Management 0–1 yrs. Delow College Diploma, 3k–5k, 0–1 yrs. New First-tier Cities, 3k– 5k, 0–1 yrs. Information 3k–5k, 0–1 yrs. Science 5k–10k, Bachelor Degree, 3–5 yrs. Library 0–1 yrs., 3k–5k Management College Diploma, 0–1 yrs. 0–1 yrs., Delow College Diploma Bachelor Degree, EDU&Media&ENT Bachelor Degree, EDU&Media&ENT, Firsttier Cities

Support Frozenset_front

Frozenset_end

Confidence

0.25

0–1 yrs.

0.93

0–1 yrs.

0.95

0–1 yrs.

0.82

0–1 yrs. 3–5 yrs.

0.85 0.83

0–1 yrs. 0–1 yrs.

0.88 0.89

0-1 yrs.

0.98

0.15 0.17 0.15 0.15 0.32 0.34 0.22 0.31 0.16

Delow College Diploma Delow College Diploma, 3k–5k New First-tier Cities, 3k–5k 3k–5k Bachelor Degree, 5k–10k 3k–5k College Diploma Delow College Diploma Bachelor Degree Bachelor Degree, Firsttier Cities

EDU&Media&ENT 0.84 EDU&Media&ENT 0.86

As shown in Table 2, less work experience is required if the practitioner is loweducated no matter what kind of LIS position it is. And the salary is relatively low, generally between 3k–5k. In addition, generally EDU & Media & ENT industry require practitioners have a Bachelor Degree. But even for practitioner who has a Bachelor Degree, if he/she wants to make 5000–6000 RMB a month, he/she must have 3–5 yrs work experience.

5 Conclusions This paper analyzes the talent demands of LIS-related positions through technologies such as web crawler technology, jieba word segmentation, and Apriori association rule algorithm. Through the analysis, it can be found that differences in talent requirements between different positions is relatively large. The Information Science has higher requirements for education background, work experience, and professional skills. Therefor the salary is relatively high. But demands is relatively small. The Archives Management has lower requirements for talents’ experience and education, etc. and the positions are mainly distributed in real estate and other industries, and the salary level is generally low. While the position of Library Management is in between. In addition, the author recommends that in the process of relevant talents cultivation, except for the professional knowledge, we also need to teach the students industry knowledge. For example, Library Management major can offer courses about inventory management, Archives Management major can offer courses about the basics of architecture, and Information Science can offer courses such as information security and databases, in order to meet the demands of industries.

408

X. Wu

References Wang, G.: Status analysis and develop countermeasures of LIS——take NanChang as an example. J. Jiujiang Vocat. Tech. Coll. 02, 88–90 (2019) Li, S.: Social Network Recruitment Effectiveness Factors Affecting Research. Nanjing Forestry University (2017) Yujiao, C.U.I.: Design on 51-job data scraping program based on Python. Radio Commun. Technol. 4, 416–419 (2018) New First-tier Cities Research Institute. Ranking LIS of Urban Commercial Charm. CBN (2018) Liu, J.: Recruitment website recruitment data crawler comprehensive analysis. China’s New Commun. 21(18), 123–124 (2019a) Liu, X.: Analysis and enlightenment of current situation of domestic LIS based on recruitment demand. J. LIS Sci 4(12), 46–51 (2019b) Zhang, J., Wei, R.: Mining features of data jobs in domestic recruitment websites. J. Intell. 37(6), 176–182 (2018) Liu, C.: Research on data analysis job demand based on web text mining. China Manage. Informa. 21(10), 76–79 (2018) Wang, X., Zhou, X., Liu, G.: Association rules apriori research and improve. J. Inform. Comput. 5, 71–72 (2019) Huang, S., Liu, X., Mao, J., Li, Y.: Analysis of talent demand in big data based on association rules. Ind. Control Comput. 30(8), 78–80 (2017)

Design of Management Learning System Based on SVM Algorithm Guo Xiaozhou(&) South China Business Trade College, Guangzhou 510650, China [email protected]

Abstract. This article proposes innovatively using data mining technology, and using the “work evaluation quantification table” of the counselor as the basic database, and adopting the K-means algorithm to realize the relevant experience of ideological and political education for college counselor students. Certain reference. Keywords: Ideology

 Education management  K-means algorithm

This paper proposes the use of modern information technology and data mining to effectively mine the ideological and political education experience of counsellor students, and to use the Internet thinking to revise the ideological political work in universities.

1 Clustering Technology Mining Steps Cluster analysis is an exploratory analysis. The characteristics of the group to which the case belongs are unknown. That is, before the cluster analysis, the researcher did not know how many categories the independent observation group could be divided into, and the characteristics of the category were not obtained. The essence of cluster analysis is to establish a classification method, which can automatically classify a batch of sample data according to their closeness in nature without prior knowledge. Cluster analysis of variables is similar to factor analysis. Both can be used to identify related groups of variables. The difference is that factor analysis considers the relationships between all variables at the same time when merging variables; while cluster analysis of variables uses a hierarchical discrimination method, clustering is performed sequentially according to the degree of affinity between individual variables. There are two main cluster analysis methods, one is the “fast cluster analysis method” and the other is the “hierarchical cluster analysis method”. If the number of observations is large or the file is very large (usually more than 200 observations), a fast cluster analysis method should be used. Because the number of observations is huge, the two discriminant graphs of the hierarchical clustering analysis are too scattered and difficult to interpret [1].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 409–414, 2021. https://doi.org/10.1007/978-3-030-51556-0_59

410

G. Xiaozhou

2 Key Data Mining Algorithms–K-Means The so-called k-means algorithm refers to calculating the distance between different groups of objects, that is, the different objects in each cluster, and expressing it by means of average values, so as to obtain the centroid or the center of gravity of the cluster. The basic processing steps are: first select any K objects among them, and use them as the set k centers of gravity or centroids; second, on the basis of the above steps, calculate the remaining objects and the set K The distance of each object is divided into the shortest clusters of K objects according to the calculation result. Finally, the centroid or center of gravity of the new cluster formed is calculated by the steps of the above algorithm. The calculation of the above steps is repeated until the criterion function finally converges to minimize the objective function, thereby stopping the calculation. The criterion function usually uses the square error method, and its expression is: E¼

k X X

jp  mi j2

i¼1 p2ci

Where E represents the sum of the squared errors of all objects present in the space. P represents all points in the data set. M0 is expressed as the centroid of ci, and both p and mi are multidimensional in this calculation.

Design of Management Learning System Based on SVM Algorithm

411

These steps are as following:

Through continuous iteration and calculation, E reaches the minimum value. If E is the smallest, it indicates that the similarity between the two objects is higher. This also fully shows that the efficiency of the algorithm determines the size of the data required for the calculation.

3 The Specific Application of Cluster Analysis in Ideological and Political Education Management 3.1

Data Collection

This article selects a total of 50 quantified assessment forms for the work of our school’s material and chemical school counselors. At the same time, the form mainly includes four aspects of attributes. It mainly includes: First, management attitude. Management attitudes mainly include: clear rewards and punishments at work, and treat each student objectively; get along well with the student relationship; decent talk, be a good teacher; honest and self-discipline; Second, management capabilities [2]. The so-called management ability is the ability to handle things in specific work, which mainly includes: strong organizational management ability in work, and effectively organize students to actively participate in school activities; accurately understand and grasp the situation of poor students, and do a good job Class work, study and student loans, etc.; work fairly and unselfishly to deal with students’ violations of discipline; actively organize students to do good work of high praise; master the situation of the special student group in charge is more accurate and actively help students. Third, management methods. The so-called management method is a method specifically used in student management. Mainly include: in-depth class or dormitory less than 3 times a week; insist on checking the health of the student dormitory once; the proportion of talking with students every semester is more than 30%; scholarships are issued in place, study, etc., and misunderstanding do a good job of guiding

412

G. Xiaozhou

students’ thoughts; build QQ groups and open WeChat platforms to strengthen interaction and communication with students. 3.2

Data Conversion

Through the problems in the above four aspects, the attribute values of the four different attributes must be calculated first. Therefore, it is necessary to transform the data. The method of referring to ordinal variables for data conversion. The method is for those attributes that are difficult to evaluate objectively, we can only use the method of sorting and we take “outstanding, fine, qualified and poor” as the attribute values. Meanwhile, it is projected into the interval of [0, 1] by means of range mapping. The value is “1, 0.75, 0.5, 0.25, 0”. Means of averaging different assessment targets at the same time. Such as management effect = (participation in class meetings + understanding of the situation after class + student evaluation)/3. 3.3

Data Mining and Implementation

By cleaning and preprocessing the data, the specific data mining samples can be obtained as shown in Table 1. Table 1. Data mining basic samples Management attitude Management ability Management effect Management methods 0.65 0.6 0.56 0.58 0.65 0.6 0.56 0.58 0.35 0.35 0.31 0.33 0.76 0.76 0.68 0.75 0.8 0.8 0.81 0.83 … … … …

In response to the needs of data mining, this paper selects the first 3 of the 50 work assessment tables as the sample criteria for the data mining, and then divides the required data points into the nearest clusters by Euclidean distance. We take mean vector of the points in the every cluster as the new center point. The specific algorithm design is: Suppose there is a data set: the purpose of which is to find k clusters. At the same time, K = 3 was taken in the study through analysis. Thus, the algorithm was programmed by VC++:

Design of Management Learning System Based on SVM Algorithm

413

Take the first 3 samples as the cluster center;

3.4

Clustering Results Analysis

According to analysis these 50 different samples, the clustering results can be obtained as shown in Table 2. Table 2. Analysis of clustering results

Cluster 1 (good) Cluster 2 (medium) Cluster 3 (poor)

Management attitude

Management ability

Management methods

Management effect

0.77

0.77

0.74

0.79

With sample number 15

0.61

0.57

0.54

0.56

31

0.31

0.31

0.28

0.30

4

Cluster 1 Through the analysis of the data samples, 1 sample data is deducted, and 14 samples remain, so 14/50 = 28%; 1 sample is subtracted from cluster 2 (medium), then 30/50 = 60%; Three clusters (poor) are 3/50 = 6%. Meanwhile, we consider the center of this data mining, the average score of the above four items is: Management Management Management Management

attitude = 0.77 * 0.28 + 0.61 * 0.6 + 0.31 * 0.06 = 0.6002 ability = 0.77 * 0.28 + 0.57 * 0.6 + 0.31 * 0.06 = 0.5762 method = 0.74 * 0.28 + 0.54 * 0.6 + 0.28 * 0.06 = 0.5480 effect = 0.79 * 0.28 + 0.56 * 0.6 + 0.30 * 0.06 = 0.5752

Therefore, through the above excavation, it can be concluded that in the ideological and political learning of students in the School, their scores exceeded 0.5 points, which belongs to the middle-to-high level. In the above attribute values, we can see that the

414

G. Xiaozhou

management attitude is 0.77, the value is the management attitude which has the largest impact on the work of the counselor, reaching 0.78. The score of the management method is the lowest among all the scores, indicating that the management method to a certain extent requires further adjustment of the materials and the faculty of the School of Chemical Engineering, such as insisting on chatting with more than 30% of students each semester, visiting more bedrooms, thereby deepening the relationship with the students, so as to better understand the students’ thinking dynamics. At the same time, the paper innovatively adds instant messaging tools, for example, WeChat, MSN, making instant messaging tools to promote student and teacher interaction.

4 Conclusions Under the new situation, students’ political and ideological work is facing huge challenges. Therefore, timely adjustment of ideological eduaction and timely exchange of advanced experience can effectively promote the effect of ideological and political work in colleges. In this regard, this article attempts to use data mining. Through the analysis of clustering results, the information it mines has certain reference and reference value for student work.

References 1. C ++ implementation of the C-means algorithm (K-means algorithm) in dynamic clustering. http://www.blog.csdn.net/sandrain_zeq/archive/2006/06/20/816218.aspx.2004 2. Bu, Y., Guan, Z.: Research on k-means clustering algorithm. J. Southwest Univ. Nationalities 1, 1–3 (2009)

The Application of Improved Genetic Algorithm and Least Square Method in Computer Mathematical Modeling Nana Chen(&) and Zhongyu Bai Faculty of Network, Haikou College of Economics, Hainan, Haikou 571127, China [email protected], [email protected] Abstract. The basic idea of genetic algorithm is to imitate the genetic process in biological world. In the whole operation process, it is generally composed of three basic operations: mutation, crossover, selection, gene for parameters, chromosome for binary, and finally a population. Keywords: Genetic algorithm

 Least square method  Matrix coding

As we all know, genetic algorithm is a search algorithm based on natural selection and population genetic mechanism. It simulates the phenomena of reproduction, hybridization and mutation in natural selection and natural genetic processes. When using genetic algorithms to solve problems, every possible solution to the problem are encoded as a “chromosome”, that is, individuals, and several individuals form a population (all possible solutions). At the beginning of the genetic algorithm, some individuals are always randomly generated (that is, the initial solution). An individual is evaluated and a fitness value is given. Based on this fitness value, some individuals are selected to generate the next generation. The selection operation reflects the principle of “survival of the fittest”, and “good” individuals are used to generate the next generation. “Bad” individuals are eliminated, and then the selected individuals are recombined through crossover and mutation operators to generate a new generation. The individuals of this generation are superior in performance because they inherit some of the good traits of the previous generation [1]. In the previous generation, this gradually evolved in the direction of the optimal solution. Therefore, in order to solve the problems of basic genetic algorithms, related scholars have trained and cultivated their comprehensive ability centered on finding, analyzing, and solving problems, which is consistent with the essence of mathematics. The essence of mathematics lies in describing the nature of the problem and its internal laws through phenomena, and using appropriate mathematical forms to express it. The traditional teaching methods of mathematics courses for mathematics majors attach great importance to the cultivation of students ‘logical thinking, thrust, and calculation ability, but they are insufficient in the cultivation of students’ practical ability and practical ability. In order to strengthen the cultivation of students’ practical ability and practical ability, in recent years, some domestic universities and scholars have carried out reforms and studies of traditional education and teaching systems, and primary and secondary schools across the country have also launched reforms in the content and methods of new curriculum education and teaching. With the continuous deepening of basic education © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 415–418, 2021. https://doi.org/10.1007/978-3-030-51556-0_60

416

N. Chen and Z. Bai

reform, it is an important and urgent task to train and train new types of teachers that meet the needs of China’s economic and social development, especially the new round of basic education curriculum reform. In recent years, the mathematics major has also undergone a series of reforms in terms of training objectives, curriculum system, teaching content, teaching methods and teaching methods [2]. After in-depth research and analysis, a matrix coding genetic algorithm has been proposed.

1 Improvement and Perfection of Least Square Fitting of Genetic Algorithm In terms of its content, the improved genetic algorithm least square method is actually a scientific and reasonable combination of the improved genetic algorithm and the identification method. After the combination, a more advanced new method to solve the identification problem is generated, which is useful for industrial processes. The realization and improvement or control system has a great promotion effect [3, 4]. The improvement content of the improved genetic algorithm is a reasonable improvement for the operation of genetic coding. Such an improvement facilitates operation and crossover, and finally realizes the simplicity and convenience of the operation. After the change, the length of the matrix coding can be greatly. It can also be reduced to a large extent. It is also an effective increase in its operation speed. Moreover, the combination of the improved matrix coding and MATLAB language can be closer, which is beneficial to the realization of simulation and programming. In terms of matrix-encoded genetic algorithms, in terms of their changes and effects, they have become huge breakthroughs and innovations in the practice and theory of genetic algorithms [5].

2 Case Study As we all know, the improved genetic algorithm has a strong ability to avoid the more complicated calculation methods of the traditional genetic algorithm identification problem to a certain extent. Finally, the simpler calculation method is used to calculate the most correct parameters. The general calculation process As shown below, the identification initial model is shown in the following formula. yðkÞ ¼ a1 yðk  1Þ  . . .  an yðk  nÞ þ b1 uðk  1Þ þ . . . þ bm uðk  mÞ þ xðkÞ In this identification initial model, the parameters al, a2b1, and b2 in the above formula are mainly obtained according to the least square method, which is also a common identification method. And then based on matrix coding genetic algorithm optimization, the specific optimization process is as follows. Randomly generated population-group size S = 100-code L = 10-evolution algebra M = 50. The following

The Application of Improved Genetic Algorithm

417

aspects of work need to be carried out in the entire process. First, the columns and rows of a matrix string are generally determined according to the number of parameters to be determined. If there are 6 parameters to be determined, a 3  2 or 2  3 matrix will be determined. These specific 6 parameters are each used 6 Element to represent. Second, in the process of parameter search, its range must be determined. The genetic algorithm has a corresponding limit for the search range of parameters. These ranges are mainly determined according to specific problems. Third, make a reasonable evaluation of individual fitness. In this paper, evaluation and selection are mainly based on the definition of least squares. In this formula, J = 0 min, in other words, it is J = [(test estimated value-actual measured value) least square value]. The group with the smallest square is selected as the highest quality output. The core of the combination of the matrix coding genetic algorithm and the least squares identification is this step, and the most critical point of the combination of the least squares and the matrix coding in the whole process is exactly here. Then, the parameters searched by the matrix coding genetic algorithm are obtained. Value, and finally compare the difference between the parameter value and the actual measured parameter value, take the square of the difference, and use it as the fitness function of the genetic algorithm [6]. Fourth, in order to prevent the destructive behavior of excellent parent strings in the process of mutation and crossing, or the problem of missed selection caused by random selection, under normal circumstances, the staff will Then cross or mutate, but choose to let them directly into the offspring. The following formula is to enable the genetic algorithm to more fully find the global optimal parameter construction Pc, Pm that changes with the number of iterations: J¼

X

ðyðkÞ  uT ðkÞhÞ2

f ðxÞ ¼

1 1 ¼P J ððyðkÞ  uT ðkÞhÞ2

when L\ M2 , Pt ðlÞ ¼ ptmax  2ðptmaxMptmin Þ L when M2  L\M, Pt ðlÞ ¼ ptmin

when L\ M2 , Pm ðlÞ ¼ pmmax þ 2ðptmaxMptmin Þ L when M2  L\M, Pm ðlÞ ¼ pmmax

3 Experimental Results In this practice process, we already know about 40 sampling parameters of the input, output data, and statistics of the third-order linear discrete system. Finally, the parameter estimation is performed according to the least square method of the matrixencoded genetic algorithm. The given initial conditions are shown in the following formula, and in this experiment, the deviation and calculation of the previous M steps are shown in the formula. ^hð0Þ ¼ e ðFully small real vectorÞ

418

N. Chen and Z. Bai

^hð0Þ ¼ 0 em ðkÞ ¼ ð^yðkÞ  yðkÞÞ2 JðkÞ ¼

m X

e2 ðkÞ

i

It can be seen that y (k) is the actual measurement value, and y (k) is the matrixencoded genetic algorithm to find the optimal parameters [1.7564 0.9423 0. 1518 0. 9998 0. 5217 0. 0695]. However, the range of parameter changes must be determined before decoding. The identification result is V = 1.6987 0. 9321 0. 1499 1. 002 0. 5215 0. 693.

4 Conclusion In the end, we can obtain from the experimental data that the improved genetic algorithm can quickly and accurately solve the identification problem, and the squared error of the calculation has reached a very high accuracy rate. However, because of the nature of the genetic algorithm, it was originally randomly generated. Matrix strings, as a whole, have some uncontrollability and need to be further improved.

References 1. Guo, Y., Zhang, M., Zhou, N.: Solving long-term vehicle ride-sharing problem based on preference matrix genetic algorithm. J. Comput. Appl. 2 (2017) 2. Wang, Z., Chen, Y., Xu, Y.: Research on charge control strategy based on predicted battery SOC. Electron. Qual. 2 (2017) 3. He, P., Zheng, Z., Yuan, Y., Tan, C.: Optimization of hybrid redundancy strategies supporting real-time replacement in series-parallel systems. J. Softw. 2 (2017) 4. Zheng, P., Lin, D., Liu, X., Wu, Z.: Research on the Technology of Reversing the Lighting Effect Based on the Shadow Track. School of Mechanical and Power Engineering, East China University of Science and Technology, Shanghai (2010) 5. Deng, H., et al.: Probability theory and the reform and practice of Mathematical Statistics Course. Univ. Math. 1 (2004) 6. Shi, Q., et al.: Teaching reform and practice of the course of probability and statistics. J. Nanjing Univ. Technol. (Social Science Edition) 3 (2004)

Research on Properties of Pore Fissures Based on the CART Algorithm Dawei Dai1,2(&) and Ling Zhang2 1

Anhui Province Key Laboratory of Mining Response and Disaster Prevention and Control in Deep Coal Mine, Anhui University of Science and Technology, Huainan, China [email protected] 2 School of Humanities and Social Sciences, Anhui University of Science and Technology, Huainan, China [email protected], [email protected]

Abstract. Methods like low-temperature liquid nitrogen gas adsorption and scanning electron microscope were used in the study to investigate pore and fissure structures of three coal samples of different metamorphic degrees. And the findings show that the volume of nitrogen adsorbed by coal samples of metamorphic degree differs noticeably, that surface fissures and internal pores of samples stay various. With metamorphic degree increasing, the specific surface area of coal body decrease slowly at first and then increase sharply. But the pore diameter of samples increases initially and decreases afterwards, the proportion of micropore diameter rises, and fissures develop, then the number of large and medium pores reduces, while transition holes increases. Combination of lowtemperature liquid nitrogen gas adsorption and scanning electron microscope can better characterize the pore and fissure structures of coal, which provides the study of coal gas adsorption-desorption and diffusion and coal mine safety production with a theoretical foundation. Keywords: LT-N2GA (Low-temperature nitrogen adsorption)  SEM Metamorphism degree  Coal body structure  Pore fissure property



1 Introduction At present, scholars at home and abroad achieved a lot of research results on the pore structure of coal. Yang et al. [1] believed that the pore diameter distribution of shale remains complex, the main pore diameter was within the range of meso-pore (2-50 nm), containing a certain quantity of micropores (less than 2 nm) and macropores (more than 50 nm) [1, 2]. Micropores and mesopore less than 50 nm supplied the main specific surface area and pore volume, and became the major places for gas adsorption and storage. Zhao et al. found that coal porosity presented a high-low-high variation law with the increase of coal grade. The rapid compaction of primary pores at low coal grade explained why the porosity at the initial stage decreased dramatically, while the pores formed by heat and fissure in high coal grades caused the porosity to increase to some extent after decreasing. Kang et al. [4] used LT-N2GA to test coal © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 419–425, 2021. https://doi.org/10.1007/978-3-030-51556-0_61

420

D. Dai and L. Zhang

samples of different coal body structures in three mining areas in Huainan coalfield, and analyzed and classified the pore characteristics. Nie et al. [5] adopted SEM method to study the nano-pores and their shapes of coal at different coal grades. Radlinski et al. [6] took SAXS (small Angle scattering) to explore the porosity and pore distribution of coal, finding that there were also a large number of closed pore fissures inside the coal body. Most of the studies focused on the influence of a single factor or some factors, and there are few investigations on the pore and fissure structure of coal from different sources and with meta-morphism degree. The study combined low-temperature Nitrogen Adsorption (LT-N2GA) with Scanning Electron Microscopy (SEM) to analyze surface pore characteristics of coal samples from 3 different sources with different metamorphic degree and internal pore fissure, and mainly explores the pore diameter distribution and specific surface area of reservoir ability of Adsorption, desorption and diffusion, and the effect of seepage characteristics. The study results are of great significance for evaluation of coalbed methane’s exploitability and improvement of the theory of gas occurrence and flow.

2 Materials and Methods Coal samples were collected from Jiamusi coal mine, Haitian coal mine and Zhaozhuang coal mine respectively. According to the standard GB/T212-2008 of coal industrial analysis, the analyzer SDLA618 was used to crush and screen the dried coal samples of 60–80 purpose to determine the composition proportion of water, ash, volatiles and fixed carbon. The primary information is shown in Table 1. Table 1. Information of coal samples No.

Name

1 2 3

Jiamusi Haitian Zhaozhuang

Coal quality Gas coal Lean coal Anthracite

Moisture content (%) 0.81 0.66 1.51

Ash (%) 14.9 14.24 28.36

Volatiles (%) 28.05 11.73 7.7

Fixed carbon (%) 56.59 73.54 62.98

The moisture content of the three samples ranges from 0.66% to 1.51%, the sample from Haitian coal mine belongs to lean coal with the minimum moisture content of 0.81%, and the sample from Zhaozhuang mine anthracite with the highest moisture content of 1.51%. On the other hand, the volatile content of the samples ranges from 7.7% to 28.05%, the highest is 28.05% in the sample from Jiamusi mine, and the lowest was 7.7% from Zhaozhuang mine. The volatiles content represents the metamorphic degree of coal, and the less volatiles, the higher the metamorphic degree. The study takes the classification method of IUPAC [7, 11]. In addition, Hitachi S4800 field emission scanning electron microscope is used to test three coal samples with different metamorphic degrees after the samples are amplified 30000 and 5000 times respectively. By amplifying and extracting the physical and chemical information of the samples, the study obtains the scanning image of the surface characteristics of

Research on Properties of Pore Fissures

421

the samples. With the enlargement of the magnification factor, more clear, visual observation is made concerning particles, fissures, holes, pore morphology and distribution of the microstructure morphology of the test sample surfaces. It should be noted that three kinds of test coal samples are respectively prepared to produce coal with the length and width not less than 2 cm. After metal-spraying treatment, the bottom of the samples is made flat and fixed on the tray for electron scanning [8–11].

3 Results and Discussions 3.1

Results and Analysis of LT-N2GA

Table 2 expresses the results of LT-N2GA experiment, among which the coal samples from Zhao zhuang mine has the highest BET SSA (12.41 m2/g), BET SSA of the samples from Haitian mine is 0.6982 m2/g, and the samples from Jiamusi mine the lowest BET SSA (1.4385 m2/g), and coal samples of Haitian mine has the lowest BET specific surface area accordingly. Table 2. Test results of LT-N2GA Source of coal sample

Volatiles (%)

BET SSA (m2/g)

BJH pore diameter (nm)

Jiamusi Haitian Zhaozhuang

28.05% 11.73% 7.70%

1.4385 0.6982 12.41

4.65 6.552 3.832

Each pore diameter proportion % 100 nm 31.42 10.97 53.24 43.73 11.11 45.16 59.28 11.65 29.07

BJH pore diameter of Zhao zhuang coal sample is 3.832 nm, that of Haitian coal sample 6.552 nm, and that of Jiamusi coal sample 4.65 nm, and it is evident that BJH pore diameter of Zhao zhuang coal sample is the smallest. Judging from the proportion of each pore diameter, when the pore diameter remains larger than 10 nm, the pore diameter proportion of Zhao zhuang coal sample is the largest (59.28%) among the three coal samples, followed by that of Haitian coal sample, and that of Jiamusi coal sample is the smallest (31.42%). Figure 1 shows the isotherm of low temperature liquid nitrogen adsorption experiment of the coal samples. From the figure, there stand significant differences in nitrogen adsorption volume capacity of the samples from three different sources. The gas coal samples from Jiamusi mine with low metamorphic degree take the lowest adsorption capacity (1.3 cm3/g), the anthracite samples of Zhaozhuang mine with high metamorphic degree have the highest adsorption volume of nitrogen (2.6 cm3/g), and the lowcoal samples of Haitian mine with medium metamorphic degree enjoy the highest adsorption volume (3 cm3/g). The results show that nitrogen adsorption increased first and then decreased with the increase of the metamorphic degree. When the relative pressure keeps P/P0 > 0.5, the three curves show obvious hysteresis rings, indicating

422

D. Dai and L. Zhang

that evaporation and condensation of liquid in pores are irreversible, and there also occurs capillary condensation in the mesopore. According to Kelvin equation, when the relative pressure P/P0 stays larger than 0.5, there is no capillary condensation happening in the pores of coal body. As a result, with the relative pressure equals to 0.5, the slope of the desorption isothermal curve increases sharply at this point.

Fig. 1. Adsorption and desorption isotherms of coal samples using LT-N2GA, (a) Zhaozhuang Coal Sample; (b) Haitian coal sample; (c) Jiamusi coal sample

Additionally, 3 samples are classified according to the hysteresis loop of LT-N2GA. Among them, the adsorption-desorption isotherm of Jiamusi coal sample is type C with a large number of taper pores at both ends. Meanwhile, its smaller hysteresis loop area also demonstrates a poor connectivity of its pore structure with a large number of closed or semi-closed pores, such as wedge, cylindrical and slit pores which remained closed at one end. The adsorption type of Zhaozhuang coal samples is type A, showing that there exist lots of cylindrical pores with openings at both ends and a small number of slit pores in Zhaozhuang coal samples. Meanwhile, the size of the hysteresis loop area indicates that Zhaozhuang coal sample contains fissures in abundance. And the hysteresis loop type of Haitian coal samples corresponds to type E. When the relative pressure is at 0.5, the desorption curve drops significantly, showing the existence of conical bottle-shaped pores. The hysteresis loop in Fig. 1(c) is not closed, which may be caused by the volume expansion and deformation of the coal samples because of adsorption of N2. Figure 2 shows the mesopore diameter distribution of the coal samples tested. It can be seen that the mesopores of the coal samples with different metamorphic de-grees are distributed in multiple peaks, and the distribution of mesopores mostly ranges from 2 to 10 nm. The peak values of Jiamusi samples are at 2.8 nm and 4.6 nm; those of Zhaozhuang coal sample are at 3.8 nm and 7.8 nm; and those of Haitian coal samples are at 3.4 nm, 6.5 nm and 12.3 nm. With the metamorphic degree rising, the number of transition pores increases and so does the volume. The Fig. 3 exhibits that the micropore distribution of coal samples expresses all single peak distribution, and the pore diameter distribution interval lies between 1.5 nm and 3 nm, and the peak value of each coal sample is at around 2 nm. The higher the peak value of micropore distribution in coal samples, the larger the adsorption amount of gas, which keeps consistent with the isotherm of adsorption and desorption of low temperature liquid nitrogen.

Research on Properties of Pore Fissures

Fig. 2. Mesopore distribution of coal samples

423

Fig. 3. Micropore distribution of coal samples

Figure 4(a) illustrates the relationship between the specific surface area of mesopore and volatiles of coal samples. With volatiles decreasing (that is the increase of metamorphic degree), the specific surface area of the coal samples presents a sharp increase after a slow decrease. Figure 4(b) describes the relationship between BJH pore diameter and volatiles of coal sample.

Fig. 4. specific surface area and pore diameter

3.2

Results and Analysis of SEM Experiment

Figure 5 shows that the coal samples with different metamorphic degrees were amplified by 30,000 times and 5,000 times with SEM respectively. As shown in this figure, these SEM results are consistent with the results represented by the adsorption and desorption curve of low temperature liquid nitrogen. Therefore, the two results are conformed each other, thus verifying the reliability of the study results.

424

D. Dai and L. Zhang

Fig. 5. SEM results of coal samples: (a) Jiamusi 1 lm; (b) Zhaozhuang 1 lm; (c) Haitian 1 lm; (d) Jiamusi 10 lm; (e) Zhaozhuang 10 lm; (c) Haitian 10 lm

4 Conclusions In this paper, some conclusions can be drawn as follows: there are obvious distinctions in nitrogen adsorption volume in the coal samples with different metamorphism degrees, and the fissure morphology on the surface of coal samples stays different from the internal geometric pore diameter characteristics. In coal samples with different metamorphic degrees the mesopore distribution manifests as a multi-peak status mostly, while the micropore distribution as a single-peak status with the peak distribution at 1.5 nm to 2.5 nm. With the metamorphism degree rising, the specific surface area of the coal samples first decreases slowly and then increases sharply, and the mesopore diameter decreases after increasing first, the pore diameter proportion of micropores increases. At the same time, the number of macropores and mesopores in the coal body decreases, fissures develop, while the number of transition pores increases. LT-N2GA results enjoys a better consistency with SEM results, making clear that the study results are of good reliability, and can be mutually verified. Acknowledgements. The authors of the paper feel grateful for the financial support from Funding Project for the Cultivation of Outstanding and Top Talents in Colleges and Universities of Anhui Province (No.: gxyqZD2016076).

References 1. Qian, M.G., Xu, J.L., Miao, X.X.: Green technique in coal mining. J. China Univ. Min. Technol. 32(4), 343–348 (2003) 2. Wang, E.Y., He, X.Q.: Fractal structure of coal, rock and other porous media. J. Jiaozuo Inst. Technol. 15(4), 20–24 (1996) 3. Green, U., Aizenstat, Z., Gieldmeister, F., et al.: CO2 adsorption inside the pore structure of different rank coals during low temperature oxidation of open air coal stockpiles. Energy Fuels 25(9), 4211–4215 (2011)

Research on Properties of Pore Fissures

425

4. Qu, Z.H., Jiang, B., Wang, J.L., et al.: Micropore properties and its origin of tectonically deformed coals. J. China Coal Soc. 40(5), 1093–1102 (2015) 5. Yang, S.L., Cui, F.F., Yang, S.S., et al.: Experimental study on mechanism of gas flow in coal bed. China Coalbed Methane 2(1), 36–39 (2005) 6. Liu, D.M., Yao, Y.B., Cai, Y.D., et al.: Study progress on geological and dynamic evaluation of coal bed methane reservoir. Coal Sci. Technol. 38(11), 10–16 (2010) 7. Tian, H., Zhang, S.C., Liu, S.B.: Determination of organic-rich shale pore features by mercury injection and gas adsorption methods. Acta Petrolei Sinica 33(3), 419–427 (2012) 8. Yao, Y.B., Liu, D.M., Tang, D.Z., et al.: Fractal characterization of adsorption-pores of coals from North China: an investigation on CH4 adsorption capacity of coals. Int. J. Coal Geol. 73(1), 27–42 (2008) 9. Wu, J., Jin, K.L., Tong, Y.D., et al.: Theory of coal pores and its application in evaluation of gas outburst proneness and gas drainage. J. China Coal Soc 169(3), 86–95 (1991) 10. Yang, F., Ning, Z.F., Hu, C.P., et al.: Characterization of microscopic pore structures in shale reservoirs. Acta Petrolei Sinica 34(2), 301–311 (2013) 11. Neimark, A. V., Sing, K. S., Thommes, M.: Surface area and porosity. Handb. Heterogen. Catal Online, 721–738 (2008)

Recognition Algorithm for Emotion of Japanese Feminine Terms Based on Generalized Semantic Analysis Xiaoyu Ge(&) and Chang Liu East University of Heilongjiang, Harbin 150046, China [email protected], [email protected]

Abstract. Language is a symbol of human civilization, an important carrier of culture. Firstly, it describes the human linguistics and the current situation of Japanese female language emotions. Secondly, it constructs a genetic algorithm for informational education. It elaborates on the retrieval and recognition of network retrieval information. Finally, it tests the algorithm and uses the IPSOBP algorithm to model the genetic algorithm in the model. Iterative training was performed and the test of the algorithm test set was performed using JMeter software. The test results showed that the algorithm and model constructed in this paper passed the test and had certain reliability and stability, and had the potential for further promotion. Keywords: Semantics

 Feminine terms  Sentiment analysis

1 Introduction There is gender difference among people and languages are inevitably gender-specific. Gender language not only reflects the difference in understanding of society, culture, history and many other aspects between men and women, but also reflects social, cultural, historical and other aspects of the restriction of the use of gender on language [1]. Oscar Wilde once said: “Women are charming and moving, and they may never want to say anything, but once they say it is enough to make people ecstatic.” This reflects the unique charm of women’s language from the side. Japanese is one of the most obvious languages for gender differences, and female terms are even more distinctive [2, 3]. Prior to the Middle Ages, the difference between men and women in Japanese was not obvious, mainly reflected in the choice of vocabulary [3]. Women avoid blunt Chinese vocabulary and choose syllables that are more suitable for expression of euphemisms and detailed emotions. The “Hiyaji Tabori” appearing in the Heian era was mainly used by women serving in the Shrine. Therefore, it was considered to be the earliest female language. The “female room word” in the Muromachi era inherited the characteristics of the “Jiha-ji palace taboo,” and some of the words contained the colour of taboo words [4]. The “female room word” has a great influence on the vocabulary system of modern Japanese. In the Edo period, the honorific expression in “Yeoli language” created by the geisha has a great influence on the system of honorific words in modern Japanese. What needs to be pointed out is that © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 426–432, 2021. https://doi.org/10.1007/978-3-030-51556-0_62

Recognition Algorithm for Emotion of Japanese Feminine Terms

427

compared with the “female room word” and “Yeoli language”, the modern Japanese female language has undergone a fundamental change in its nature. The background of the “female room word” is the social system of the male and female superfluous. The “Yeoli language” is derived from the feudal social hierarchical identity system. In contrast, the modern female language is based on the social division of labour.

2 Methodology 2.1

Human Linguistic Genetic Algorithm Construction

In this paper, we use a new genetic algorithm to push information, and take this algorithm as the evaluation criteria, because this new algorithm can not only sort according to the accuracy, but also provide more convenience for users. In the 1960s, Holland JH, a professor at the university of Michigan, came up with a genetic algorithm that his students then applied. Genetic algorithm is called GA or SGA for short. In GA, the relevant criterion selected is the principle of proportionality of adaptive size. In the role of the i-th individual P under the selection operator, the expected value of continued existence is nðfi = f Þ, there is the following formula: fðH; tÞ ¼

1 X fi nðH; tÞ

then ðH; t þ 1Þ ¼ nðH; tÞ  f ðH; tÞ=f ðtÞ

ð1Þ ð2Þ

In the above formula, fi is the fitness of the i-th character string, and nðH; tÞ refers to the number of optimization solutions belonging to the t-th type H. The related meaning of the selection operator is that if the fitness level is higher or lower than the average level, an objective function in a certain space is set as gðxÞ, and the individual adaptation function in the search space is expressed as f ðxÞ. The conversion manner of the two in the algorithm can be expressed by the formula:  f ðxÞ ¼

Cmax  gðxÞ; gðxÞ\Cmax 0

ð3Þ

In the above formula, Cmax represents a theoretical maximum value of the input value. When maximizing the search problem, an objective function in the search space that meets the requirements of the search is expressed as gðxÞ, and the individual fitness function in the search space is expressed as f ðxÞ, then the two types of functions the conversion formula can be expressed as:  f ðxÞ ¼

gðxÞ; gðxÞ [ Cmin 0

ð4Þ

In the formula (4), Cmin is the input that is specific value, Genetic algorithm has the search direction, it can guide the direction to the lower order, and has good adaptability.

428

X. Ge and C. Liu

but also can use the exchange operator to lower the value in the subsequent operation process. Order information is continuously combined into higher-order forms to achieve a smaller search space. 2.2

Adaptation Value Adjustment

This paper attempts to integrate strings without the concept of type into the unified processing from the perspective of the concept of symbol, and through the general object of semantic concept semantic unit symbols in investigation, summarized the semantic unit successively combination between the order of several laws, analyses the features of the law at the same time, the author put forward the strategy of the automatic recognition and processing, from the preliminary exploration out a analysis method in language components. In order for the genetic algorithm to work effectively, it is necessary to maintain the diversity of bit strings within the population and the competition mechanism between the bit strings. If the operation of the genetic algorithm is divided into three stages: start, middle, and end, then at the beginning stage, if There is a small number of extraordinary individuals in the population (a bit string with a high fitting value). According to the usual selection method, the probability of selecting a P copy is ft = ft , and the expected copy number is ft =ft . These individuals will be copied in large numbers, occupy a large proportion in the population, which will reduce the diversity of the population, leading to premature convergence, which may lose some meaningful search points or the most advantage, and enter the local optimum. In the ending stage, even if the population maintains a great diversity, if all or most of the individuals have high adaptation values, and thus the population average adaptation value and the maximum adaptation value are almost the same, then the average adaptation value is near the individual and the individual with the highest fitting value have the same chance of being selected, so that the choice becomes a nearly random step, and the effect of the fitting value disappears, so that the search performance is not significantly improved. The adaptation value of each bit string in the population can be effectively adjusted, and the difference between the bit strings cannot be too large, but also the level can be opened and the competition among bit strings can be strengthened. In traditional algorithms, information entropy is used as the criterion for selecting attributes, based on data calculations, the value of information entropy is obtained, then the entropy of each information is compared, and the largest information entropy is selected as the selection criterion of attributes. The overall workflow of the information module is shown in Fig. 1.

Fig. 1. Workflow diagram of system data integration module

Recognition Algorithm for Emotion of Japanese Feminine Terms

429

3 Result Analysis and Discussion The algorithm has been proposed above and an experiment has been designed. Specie experimental results will be described below. From the capacity test above, we can see that the sample segment “Snow Country” has a total of 5,401 words, but the nonrepetition word is 1290, the TTR is 23.88, and the standard value of conversion is 42.78 (the software Wordsmith4 specifies), which explains the novel in this novel. There are many words repeated, and the high-frequency synonyms include Laura (78), mother (30), and little (25). This shows that the author repeats what happened around Laura with a few words. There are 1261 nouns, 1183 verbs, and 345 adjectives. There are 218 emotional vocabularies, of which 104 are positive and 114 are negative. There are 37 verbs, 21 nouns, 12 adverbs, and 122 adjectives. One. There are 30 neutral positive vocabularies and 34 negative neutral vocabularies. There are few emotional vocabularies and most of them are adjectives. It shows that the emotional resources in Mansfield’s works are not much, the emotional colour is light, and the flowing state should be slow flowing in the text. The algorithm presented in this paper has three distinct features: parallel processing mode, enhanced sensitivity in information extension, and structure of algebraic and logical operations. One is parallel processing. The detection of the current method, in view of the training set the training method of handling is in a fixed time interval, the testing data set parallel moving window, concentrated to remove the old training data in the data detection, adding new training data. At the same time, same place, in the network data traffic is roughly the same, the amount of data basically does not have a lot of volatility, in its normal state, the training data set can cause a lot of material and resource consumption, and for this data set training algorithm, this paper find a new way to balance the adaptability and accuracy (Fig. 2). 450 400

(1)

350 300

(2)

(4)

Illumination

(3)

250 200

Standard illuminance (1) Self-adaption

150 100

strukturtensor (2) Reference model (3) Typical Fuzzy (4)

50 0 0

1

2

3

4 5 6 7 8 Simulation time (s)

9 10

Fig. 2. The emotional state of the novel

After artificial labelling, the following statistics on sentiment vocabulary and sentiment domains were collected to obtain a snow country’s emotional map. The number of vocabularies covered in each sentiment field in the following figure (field length 1) is the number of vocabularies converted into a unified unit, the formula is the

430

X. Ge and C. Liu

length of the domain vocabulary/total vocabulary, and then we will draw the results A unified graph (emotional flow pattern diagram). The field value column is defined as the value of each emotional vocabulary in the domain is defined as one point, the negative emotional vocabulary is negative one point, the neutral vocabulary is 0.5 points, and the value of each emotional domain is obtained after addition. Then, the abscissa is the length of the domain, that is, the number of vocabularies covered by each domain accounts for the white ratio of the total vocabulary of the novel. The upper end of the ordinate is the positive emotion value, and the lower end is the negative emotion value. Under such a definition, the algorithm is used. The emotion flow diagram drawn is roughly as follows. Generally speaking, the generalized semantics is also called refers to learning, it includes learning language form, semantics, pragmatics, language learning law, also known as the grammar and sentence, studies the relationship between the language expression, does not involve the expression and its alleged object or the relationship between the meaning (Figs. 3, 4, 5).

10

5

Mean Domain value

0

-5

-10 .00

.61

1.28

2.78

5.81

7.61

10.72

Long domain

Fig. 3. The emotional flow pattern of the garden meeting

The emotional curve thus obtained can roughly describe the emotional flow pattern in “Snow Country”. It can be seen that positive emotions and negative emotions appear alternately. In the first half (fields 1–9), the positive emotion value is obviously higher than the negative emotion value because this part mainly focuses on the preparatory work for the hero of the Snow country before the trip. The heroine has always been in a state of excitement. Obvious emotional contrasts only appear in the second half of the novel. According to the thematic meaning, we know that the latter half is mainly about the heroine of the little girl who knows the unease of the driver when he died (fields 10–12), and the happy scene when the snow country was held (field 17). After the snow country, the heroine visits the dead. The fear and the feeling of being out of place (fields 18–20). The domain 19 is a description of the deceased. The author used a lot of positive emotional vocabulary and expressed a point of view: The poor are extremely painful in their lives. Only when they die can they feel calm and peaceful. In the latter part of the work, the heroine feels a strong emotional impact and realizes that there is pain and darkness in addition to a happy and happy life. The progress of logical view is the internal motivation of the development of logical semantics. The transformation from the classical logic view to the modern mathematical logic view contributed to the emergence of Tuskegee’s logic semantics,

Recognition Algorithm for Emotion of Japanese Feminine Terms

10

0

10

431

0

e2 e(n)

Lamda(n)

e1

-0.01

10

10

-1

e2 e1

-0.02

10

10 -100

0

100

200

300

400

500

600

700

Fig. 4. Stable performance of the improved algorithm before and after the signal

-2

0

100

200

300

400

500

600

700

800

Fig. 5. Learning curves of different algorithms

but the excessive attention to the formal system limited it to the extension level. With the further development of the logical view, the bearing plant daily reasoning features by natural language logic become one of the research centre of gravity, this trend makes semantics research by extension to connotation meaning of transition possible, Carl knapp, extension of the connotation and method, establishment principle of the montague grammar is the possible implementation of reality. The rise of it, because of the promotion of computer recognition of natural language research, provides the basis for modern linguistics research; It is conducive to the analysis, research, reference and criticism of western philosophy, especially scientific philosophy.

4 Conclusion In the long-term feudal society, Japanese women are seen as male appendages and are secondary to men in both the family and the society. Although with the progress of society, women’s social status and family status continue to improve, but women’s language still retains the characteristics of the disadvantaged groups, showing courtesy and courtesy. After entering the 21st century, women’s language tends to be more personalized on the basis of the development of neutralization. In this context, this paper studies Japanese female language emotions based on generalized semantic analysis. Bilingual parallel documents are viewed as two views of language description objects, and it is assumed that bilingual parallel documents enjoy the same semantic information. In essence, these views are equivalent. In order to model these views and extract their semantic abstractions, this paper focuses on the theory of PLS statistical analysis and extracts a series of bilingual topic pairs with the same semantic information from a bilingual parallel corpus. Semantic correspondence relationship of the topic space, thus establishing a bilingual language-based cross-language information

432

X. Ge and C. Liu

retrieval framework. Experimental results segmentation of expressions on Japanese sentences, while limiting the size of hypothetical queues in the A*search algorithm can improve the accuracy and efficiency of temporal translation in Japanese in specific contexts.

References 1. Belyk, M., Brown, S., Lim, J., et al.: Convergence of semantics and emotional expression within the IFG pars orbitalis. Neuroimage 156(111), 240–248 (2017) 2. Carr, M., BlanchetteCarrière, C., Marquis, L.P., et al.: Nightmare sufferers show atypical emotional semantic associations and prolonged REM sleep-dependent emotional priming. Sleep Med. 20(32), 80–87 (2016) 3. Rozaliev, V.L., Orlova, Y.A., Guschin, R.I., et al.: General approach to the synthesis of emotional semantic information from the video. Sleep Med. 45(558), 748–750 (2017)

Optimizing Design of College Teaching Based on C4.5 Algorithm Gong Sha(&) Yichun Polytechnic, Yichun, China [email protected] Abstract. This article discusses the methods of using data mining technology to optimize college English multimedia teaching. It mainly introduces the three major processes of data preparation, data mining, and result evaluation in multimedia teaching, and briefly describes the role of four data mining models Numerical experiments show the effect of data mining on college English multimedia teaching. Keywords: Data mining

 College English  Multimedia teaching

The widespread application of database technology, various industries have accumulated a large amount of data materials stored in different forms, and we are difficult to find valuable information or knowledge to serve the purpose of decision-making [1, 2]. In recent years, data mining as a new technology has been widely used in business management decisions. However, the application of data mining technology to university teaching is still scarce. In addition, many English exams also use computer networks to test and review. For example, a listening teaching system can record a large amount of data in teaching or examination during teaching and examination, which may reflect the potential effect of students on English listening teaching. Therefore, we can use data mining technology to mine valuable knowledge in this data to guide our teaching. For example, by mining the answer results of the university listening test paper, clustering the degree of mastery of a certain knowledge point: if the correct use of the phrase “go on” in the past three years is 50%, then it indicates that the teaching effect of this phrase is not ideal [3, 4]. People generally improve it through questionnaires or evaluations. This process is generally implemented through teaching and examination [5]. This paper will study the application of data mining technology in college English multimedia teaching Provide some theoretical discussions for this research.

1 Main Idea At present, in the college English multimedia teaching, in addition to using the developed fixed software, the production of multimedia courseware has become an important task for teachers. Most of the multimedia teaching courseware is slides made by Powerpoint, or specialized slide-based teaching software. These teaching software are made by teachers according to their own teaching experience and syllabus. Then the teachers improve the production of courseware according to the learning and examination of © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 433–437, 2021. https://doi.org/10.1007/978-3-030-51556-0_63

434

G. Sha

students. This process is a process of continuously improving the production of teaching courseware [6]. In the actual teaching process, some teaching software can continuously feedback a large amount of data, such as the listening courseware system. When doing classroom exercises, it can record the practice data of students in the classroom. We can use data mining technology to find students Grasp the content and effect of teaching content to improve the production of courseware. So how to realize this process is what we discuss below. Data mining is a multi-processing stage [7]. The entire process is a continuous loop and iterative process (Fig. 1). The main purpose of data preparation is to extract data related to data mining from the database according to user requirements, and to ensure the integrity and consistency of the data. Data mining mainly includes: determining the purpose of data mining, using correct and efficient algorithms to extract the knowledge required by users from the database. Result evaluation refers to: interpreting the mined knowledge and presenting it to users in a way that users can understand. During this period may also be the consistency of knowledge [8].

Evaluaon of results

Cluster classificaon associaon mode

Data mining

Data preparaon

Mulmedia courseware system or teaching courseware

Feedback

Fig. 1. Data mining process

Data mining is a professional technology. In order to facilitate the use of teaching staff in college English multimedia teaching, it is necessary to develop a corresponding software system. The software system mainly has three functions: data preparation, data mining, and result evaluation. The software system is developed as an additional system of the multimedia teaching system, and it can also be developed as an independent system. The specific details of the entire system development need further research [9, 10]. The following mainly introduces the three processes of data preparation, data mining, and result evaluation. 1.1

Data Preparation

Data preparation is the data collection process of data mining. We are divided into active data collection and passive data collection. The generated data is converted into the required data. In this way, obtaining the data is automatic, and the teacher avoids a

Optimizing Design of College Teaching Based on C4.5 Algorithm

435

lot of labor to actively obtain the data. But these conversion procedures and the original teaching system need to add corresponding functions. The classroom exam is a major source of data, because many multimedia teaching software are equipped with some corresponding classroom contact and test exercises. Through the test, students can learn about their learning and mastery. These data also reflect the potential link between teaching and student learning. We can discover the connection between them through data mining. We set the data objects to include majors, question types, answers, knowledge points, repetitions, etc. Design a specialized database for data collection and data mining. 1.2

Data Mining

The data mining program needs teachers to develop with the cooperation of specialized technicians. According to the requirements of improving the teaching function, design the software that meets the teacher’s requirements, design according to the data mining function, gradually improve, and provide an easy-to-use interface. According to the type of mining knowledge, it can be divided into: clustering rule mining, classification rule mining, association rule mining, pattern mining and so on. 1.2.1 Clustering Clustering is to divide the data into different clusters according to different characteristics of the data set, so that the distance between individuals belonging to the same cluster is as small as possible, and the distance between individuals in different clusters is as large as possible. Using a few clusters to represent the entire dataset will lose some details of the dataset, but this simplifies the representation of the dataset. Cluster analysis is an important human behavior. As early as a child, a person learns how to distinguish between animals and plants by continuously improving the subconscious clustering pattern. Cluster analysis has been applied to many aspects, including pattern recognition, data compression, image processing, sound processing, and market analysis [2, 8]. Therefore, we can discover the group effect brought by multimedia teaching through clustering. Listening is a major aspect of learning English, and listening test data is the easiest to obtain. Through clustering, you can find out which question categories have an impact on students. We can use vector space model clustering, and set the question type, answer, correctness, and knowledge points as clustering data. 1.2.2 Classification The role of classification is to classify an uncertain object into a known class. Generally, the characteristics and classification results of known training data are used to find a reasonable description or model for each class. Description or model to classify a new known data set. Mining results are usually represented by production rules. We can find the learning status of vocabulary, phrase, short sentence and clause through classification. We can use the test data as training data to find out the common characteristics of the data.

436

G. Sha

1.2.3 Related The purpose of association is to discover the mutual relationship hidden in the data. Suppose I = {i1, i2,…, im} is a set of m different items. Given a transaction database D, where each transaction T is a subset of items TI, each transaction record has a unique identifier TID We say that transaction T contains the item set X. If XT, an association rule is an implication of the form X ==> Y, where XT, YT, and XY =, X are called the premises of the rule, and Y is called the rule. result. If s% of the transactions in the transaction database contain XY, then we say that the association rule X ==> Y has support in D; if the transaction database contains X and c% also contains Y, Then we say that the association rule X ==> Y is established with confidence in D (Confidence). Therefore, using associations to discover the comprehension of sentences in listening teaching. For example, we test several keywords X of a sentence, which leads to a meaning Y, and X ==> Y with a rule. 1.2.4 Mode Pattern mining is mining a feature between data. Pattern discovery is applied to multimedia teaching. Teachers can discover some potential patterns that students have in common, such as discovering patterns between vocabulary and phrases. Confidence and support should also be calculated when performing pattern mining. 1.3

Evaluation of Results

The purpose of the results of data mining is to provide decision makers with valuable knowledge and rules. The results of data mining may produce many rules and knowledge. These results may be inconvenient for teachers to understand. Therefore, the interpretation of the output results can be expressed in languages or charts. Based on the results of the mining, the teacher evaluates the effect of the original teaching system or teaching courseware [3, 10]. To improve teaching content. We illustrate this with a numerical experiment below.

2 Numerical Experiments After a period of multimedia teaching, we choose a class of students to do a numerical experiment on the clustering of vocabulary learning characteristics. We have designed a set of test papers, all of which are multiple choice questions, about 600 words have been tested. After inputting the test results into the computer, we have carried out numerical clustering, and calculated the results of correct choice of parts of speech and incorrect parts of speech (Table 1). Table 1. Calculate the result of correctly selecting parts of speech and wrong parts of speech Correct choice Incorrect choice Noun 87.6% 89.5% Verb 78.7% 72.4% Adjective 66.4% 77.8%

Optimizing Design of College Teaching Based on C4.5 Algorithm

437

We use the central clustering method, data format: part of speech, question number, correct answer, incorrect answer, selection results, etc. Through the test results, it is found that students in a class have a common understanding of vocabulary learning, for example, most of the nouns are correctly mastered, otherwise most of them can’t be correctly mastered. Therefore, for most of the words that can not be mastered, we need to focus on teaching and review. Data experiments show that data mining can improve college English multimedia teaching.

3 Concluding Remarks In theory, this paper gives a way of using data mining technology to optimize the process of College English multimedia teaching strategy, which has a certain significance to improve college English multimedia teaching. We still need to do a lot of research work to realize it. The purpose of this paper is to play a role in attracting more and more people to study this topic. Acknowledgements. A study on the Evaluation method of the Educational effect of “Curriculum thinking and Politics” in Provincial and Professional courses taking the course of “English extensive Reading” as an example No.: JXJG-19-60-3+.

References 1. He, G., Fan, J.: Investigation report on college students’ attitudes and effects on computerassisted foreign language learning. Foreign Lang. E-learn. 3 (2004) 2. Wang, B., Li, Y.: Investigation report on the effect of CAI courseware. Foreign Lang. Electrification Teach. 8 (2001) 3. Guo, W.: A review of virtual environment assessment of foreign language learning. Foreign Lang. E-learn. 6 (2002) 4. Zhang, Y., Gong, Y.: Principles and Technology of Data Mining. Electronic Industry Press (2004) 5. Du, M.: Research on association rule algorithm based on FP growth and its application in university education big data. Jilin University (2019) 6. Li, X.: Research on personalized learning support service of distance education based on education data mining. Jiangnan University (2018) 7. Wu, T.: Research and implementation of diagnostic evaluation model and test paper generation algorithm in College English diagnostic practice system. China University of Science and Technology (2018) 8. Luan, H.: Research and application of data mining in College English teaching and evaluation. Beijing University of Posts and Telecommunications (2017) 9. Ding, B.: Research on the segmentation and prediction of students’ academic performance in online education. Jiangnan University (2016) 10. Cheng, Y.: Application of data mining in academic performance prediction. Jiangnan University (2016)

Application of SVM Algorithm in Teaching Process Evaluation Guo Jianliang(&) School of Foreign Languages, Nanchang Institute of Technology, Nanchang 330044, China [email protected]

Abstract. Data mining is an important data processing technology, which can help us discover useful information and existing rules from a large amount of seemingly unrelated, random data. Data mining is an important data processing technology that can help decision makers make better scientific decisions and predict future development trends. Today, there are relatively many problems in English procedural evaluation, which affect the credibility and effectiveness of English evaluation. Therefore, using data mining to solve English process evaluation has become an important method to solve this problem. This article analyzes and summarizes the current status of English procedural evaluation, analyzes the results obtained by teachers in process evaluation using data mining technology, and then works with teachers Finally, the evaluation results are comprehensively compared to judge whether the teacher’s English procedural evaluation is scientific and reasonable. Therefore, the use of data mining to solve the objective problem of procedural evaluation is promoted, and it will promote the scientific and reasonable English procedural evaluation in the future. Keywords: Data mining  English procedural evaluation  Scientific decisionmaking  Prediction  Countermeasures

1 Important Knowledge Content of Current Process Evaluation Procedural evaluation was proposed by American educator Clifford. He asked us that the evaluation of students ‘knowledge should not be periodic and over-emphasis on students’ final grades. He proposed that our evaluation system for students should be a continuous and uninterrupted process. Through the use of various evaluation methods and methods, let us more fully discover the status and reflection of students in the learning process, let us clearly understand the real-time learning status of students, so that we can do in the guidance of teacher teaching and key knowledge transfer Make reasonable judgments to promote the improvement of our teaching level [1].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 438–443, 2021. https://doi.org/10.1007/978-3-030-51556-0_64

Application of SVM Algorithm in Teaching Process Evaluation

439

2 The Scientific Connotation of Data Mining Technology Data mining technology is an important decision-making method. It can analyze and synthesize complicated data. Through the use of big data analysis, data extraction, comparison, and model transformation, the existence of logical relationships and hidden laws behind these data helps us better understand the comprehensive situation of the survey group and promote the rationality and objectivity of the final decision. Data mining technology performs fragmentation of data, and then integrates and unifies the scattered data to obtain a data set different from that before processing, and then analyzes the processed data to show the logical relationship behind it. This technique is the most reasonable for English procedural evaluation. It allows us to see the hidden connections in the data and makes the entire evaluation process more objective.

3 The Status Quo of English Process Evaluation English is an important communication language today, and an important means of political, economic, and cultural communication with foreign people. As a result, English has been widely valued by people. Learning and using English has become an indispensable and important tool, and the population of English learning is mainly concentrated among students. English procedural evaluation is an overall way for students to acquire knowledge and grasp the content in the classroom. It is an important way to help teachers understand the learning situation of students. Therefore, English evaluation plays an important role in teaching. The traditional teaching evaluation system is obtained through students ‘classroom tests and final exams, and the scores are used to determine the students’ familiarity with the English course. This evaluation method can reflect the learning situation of students to some extent, but there are some problems. For example: teachers can not make a reasonable analysis of every student in the class, the subjectivity of the teacher has a large degree of deviation, the test results cannot reflect the most authentic content of the students, and so on. These will inevitably cause deviations in the credibility and scientificity of English procedural evaluation, and affect the rationality of the final evaluation results. Therefore, a more reasonable evaluation system is needed to replace the traditional system. Through more data analysis and digital performance, we can more quantify the comprehensive quality of students and understand the most authentic student learning results. Promote our evaluation system to be more instructive and to reflect the real situation of our students. Some regions in China have begun to study English procedural evaluation systems, but more research knowledge exists only at the theoretical level and has not really been implemented [1, 2].

440

G. Jianliang

4 Experimental Design 4.1

Purpose

This article compares the evaluation process of today’s English process learning with the data mining technology used for student process evaluation, to explore the importance of data mining for English process evaluation, and to show the rationality of data mining for student learning evaluation more scientifically. 4.2

Principles of Data Mining Technology

This article uses the basic principles of data mining technology and refers to the general process of the data mining process. Through the use of data mining technology to analyze, synthesize, process and transform the obtained data, fragment a large amount of data, and then reconstruct these fragmented data Organize a new data as a whole to obtain the rules and conclusions hidden behind the data through data mining, as shown in Fig. 1.

Assimilaon data

Data mining and extracon

Reassembly of data

Processing selecon data

Mass data selecon

Raw data

Fig. 1. Raw data mining and acquisition

4.3

Subject Selection and Experiment Arrangement

This article is aimed at current college students as the evaluation object of process English research. At present, the number of our university admissions is around 8000 to 10,000, which provides enough experimental samples for our data mining. English is an important subject, and nearly 85% of students need to take the course “New Concept English”. In this paper, 16 of the 24 classes in the university are selected as the research object. By classifying the elective courses, they are divided into four groups for repeated experiments. Every four classes are taught by a single teacher. Our teaching process adopts today’s procedural evaluation methods. Teachers enrich the content of the classroom, take each group of students in the classroom to give lectures, explain English PPT in class, classroom activities, English translation and English writing, classroom quizzes, etc. The process-based evaluation of students’ English teaching provides a wealth of data, and the obtained data is added to and analyzed to obtain the final results of the students.

Application of SVM Algorithm in Teaching Process Evaluation

4.4

441

The Technical Process of Data Mining

Through the analysis of class activities and classroom test results of the “New Concept English” course, and obtained from the teacher’s usual grades, enthusiasm for speaking in class, the richness and comprehensiveness of the content of the PPT lectures in the classroom, as shown in student translation and writing Massive information such as English logic mastery and proficiency, student CET4 test scores, etc., further analyze the relationship between learning “New Concept English” and CET4 for comprehensive evaluation of students, analyze the degree of correlation between the two, and propose the use of data mining The technology should be used to provide a basis for the process evaluation of New Concept English. 4.5

Application of Data Mining Technology

Applying to the process evaluation of New Concept English needs to solve three problems, so as to ensure the accuracy and credibility of scientific research. 1. Do the basic English qualities required by the New Concept English and the CET4 requirements meet? Is it possible to reflect students’ CET4 scores through a comprehensive evaluation of New Concept English? 2. How relevant is the assessment index to CET4? Whether it can fully reflect the comprehensive performance of students; 3. What is the proportion of teachers’ subjective effect in the process of comprehensive evaluation? Whether it affects the evaluation of students’ overall performance. This experiment dealt with these three problems: 1. “New Concept English” was comprehensively reviewed and selected by various colleges and universities across the country, and has strong social representation and knowledge content. It pays attention to the comprehensive quality of the five aspects of listening, writing, reading, memorizing and using, so that the students have the ability of social communication and practical application. Ability to understand English conversation and have good listening skills. At the same time, it also examines students ‘sentence comprehension, word usage, and article writing to comprehensively evaluate students’ comprehensive English ability. There is a good correlation between “New Concept English” and CET4. Students ‘CET4 scores can be judged by examining the new concept English; 2. The assessment indicators for data mining in this experiment are: students’ usual performance, Classroom speech motivation, classroom PPT explanation, English translation and writing, English listening exercises, these indicators are consistent with the quality required by CET4 students, can fully represent the comprehensive ability of students; 3. In order to avoid the subjectivity of English teachers to students The impact of comprehensive evaluation. This experiment reduces the subjective impact on experimental data by allowing four groups of teachers to jointly evaluate the overall quality of a student and selecting the average among them from the evaluation results.

442

G. Jianliang

5 Experiment Procedure 5.1

Mass Data Selection

Through the understanding of the need to master the information, the experiment needs to analyze and process the pre-data, select the preliminary data information to be mined from the mass data, delete some data that is irrelevant to student evaluation, and avoid the impact of irrelevant data on the overall quality of students. Screening data needs to be done randomly. Selecting the same number of student results from the four classes can enable the screened data to represent the entire school students’ learning of New Concept English [2]. At the same time, among the selected data, the integrity of the data must be guaranteed, and the errors caused by human input data to the experiment must be reduced. 5.2

Processing Selection Data

The selected data is classified into categories, and different data types are converted into relative formats. For example: classify integer int, decimal float, double, and string char, which is convenient for data mining technology to use model algorithms and summarize classification. At the same time, the experiment also needs to fragment the data and split it into small data fragments to facilitate the in-depth analysis of the obtained data in the later stage. 5.3

Assembly and Construction of Data

For classified data, data processing and data assembly must be performed. Data mining technology is used to synthesize the obtained data, and to organize the data of the same type to obtain a macro data type. At the same time, it is necessary to stitch the fragmented data in the processing selection data to obtain a completely new data type. 5.4

Data Mining and Data Extraction

Data mining can be performed through preparatory operations such as mass data selection, processing selection data, data assembly and assembly, and other data preprocessing and data conversion. The core part in data mining is the selection of mining algorithms, and the most suitable algorithm that meets this experiment is selected. In the data mining technology related algorithm, select Market Basket analysis. This algorithm can more appropriately represent a subset of the algorithm. The main bottleneck of the partitioning algorithm is the algorithm execution time in the communication process. It has good adaptability to rules of different lengths, and has a huge improvement in efficiency compared to the Apriori algorithm. Data mining and modeling by Apriori algorithm.

Application of SVM Algorithm in Teaching Process Evaluation

443

6 Experimental Results Through the use of data mining technology, it is found that the process evaluation of New Concept English students has a significant correlation with CET4 scores. The results obtained by data mining have positive correlations with students ‘comprehensive judgment and CET4’s judgment with students, which is conducive to teaching’s judgment of students’ comprehensive quality.

7 Conclusion Data mining plays a great role in English procedural evaluation. It can replace the traditional mode of evaluating students, promote the scientific and rational evaluation of students ‘comprehensive quality, and improve students’ performance in English learning.

References 1. Wu, Y.: Application of data mining in analysis of college English teaching quality. Mod. Educ. Technol. 4, 73–76 + 84 (2010) 2. Ruibo, G.: Application of data mining technology in English performance evaluation. Financ. Theory and Teach 5, 82–84 (2012)

Design of Enterprise Human Resource Management System Based on Oracle Data Mining Technology Qian Liangliang(&) and Yuwei Wang Gongqing College of Nanchang University, Jiujiang, China [email protected], [email protected]

Abstract. In the era of the knowledge economy, the competition for talents is particularly prominent, and the reasonable development and management of talent resources is especially important for enterprises. The use of modern information technology to build an efficient and convenient human resource management information system is a necessary means to achieve scientific human resource management. This article describes the implementation of the enterprise human resource management system based on the characteristics of the enterprise; Fusion data mining technology, illustrates the application of the Oracle data mining technology in the enterprise human resource management system. Keywords: Enterprise

 Oracle data mining  Systems design

1 Introduction a. Improve system functions At present, the personnel management system has been applied to the human resources work of some enterprises, but there are some problems such as: (1) incomplete functions, focus on generality, no consideration of individual unit differences, no data mining function; (2) low business processing efficiency; (3) Poor timeliness and accuracy of information; (4) Low level of information sharing; (5) Lack of humanity and other issues, so the system focuses on improving insufficient functions, and strives to develop a complete function that meets the actual needs of the enterprise and effectively improves the work Efficient human resource management system [1–3]. b. Emphasize ease of use The ease of operation is mainly manifested in: easy installation and deployment; simple daily maintenance; friendly interface with high ease of use; complete notification function to make the information timely transmitted to various departments of the enterprise. c. Improve the security of the system Due to the special nature of personnel management, safety is an essential and important link. In terms of system security design, we must not only improve system security © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 444–449, 2021. https://doi.org/10.1007/978-3-030-51556-0_65

Design of Enterprise Human Resource Management System

445

from a design perspective or coding perspective, but also provide business security for some important operations. d. Realizing data exchange and sharing As part of the school’s information management, resource sharing is essential. Combined with the characteristics of higher vocational colleges, the method of generating data files is used for data exchange [4, 5]. The specific performance is as follows: when the data volume reaches a certain level and it is difficult to process, the data is imported and exported through Oracle’s Sql load tool; when the amount of data is small, the Excel format or other formats File mode for data exchange and sharing. e. Increase statistical analysis function The statistical analysis of the traditional personnel management system is usually based on the existing data. It does not analyze the data. In this system, it not only retains the statistical function but also provides the data analysis function. The specific method is based on data [6]. Oracle data mining technology analyzes existing data to better provide information services for school human resources management and provide school leaders with human resources information decision support.

1.1

General Requirements

a. Performance requirements: Can run smoothly on most of the current PCs (main platform Microsoft Windows XP, IE6.0 or above), and can support large data retrieval. b. Data output requirements: support Excel file export function, support query, statistics, c. Print and other functions, support custom report function. d. Data input requirements: support template data import function. e. User login requirements: Support single sign-on mode and user password encryption. f. Business process requirements: support workflow custom functions, and provide blocking operation functions for important links. 1.2

Operating Environment Service-Terminal Operating system: Microsoft Windows 2003 Server Database: Oracle 10g Server-side tools: IIS6.0, Microsoft .NET Framework 2.0 Client Operating system: Microsoft Windows 2000/XP (or above) Client tools: IE6.0 (or above)

446

Q. Liangliang and Y. Wang

2 System Function Modeling Design We design the following function module for the system [7], as shown in Fig. 1. a. System login module (1) Divide the permissions for different user accounts. Depending on the permissions after login, the functions implemented are different. (2) Consider the safety of the design system, by limiting the number of illegal inputs, if the password or account is entered illegally 3 times, the system will immediately exit, reducing the possibility of obtaining system accounts through random input Opportunity to improve the confidentiality of the system. (3) In order to further improve the confidentiality of the account, the MD5 algorithm is used to encrypt the account and password, which greatly improves system security [8–10]. b. System management module The system management module includes functions such as system initialization, personal permissions, user permissions, database backup and recovery.

Fig. 1. Overall functional module diagram of the system

(1) System initialization System initialization is used to clear all employee data. (2) Personal authority Can maintain personal information and login password. (3) User rights User permissions can be used to divide system users’ permissions, set user roles, and distinguish between operations that different users can perform based on roles. (4) Database backup and recovery System data backup allows all data to be restored to the original data at the time of backup, preventing system errors and causing disaster effects; system database recovery is a backup operation of the database that allows the database to recover to the state before the data error.

Design of Enterprise Human Resource Management System

447

3 Database Design 3.1

Database Selection

Combined with the characteristics of this system, the requirements for the database are roughly as follows: a. The storage of information can not only face various forms of information (such as characters, graphics, etc.), but also deal with the ever-expanding historical data. b. Information retrieval, which enables various users to quickly query the required information from the database. c. Guarantee data integrity and consistency. 3.2

Entity-Relationship Design

Generally, rectangular boxes are used to represent entities, diamond-shaped boxes connecting related entities are used to represent relationships, and ovals or rounded rectangles are used to represent entities (or relationships) Attributes and connect entities (or relationships) with their attributes with straight lines. Use entity names and their attribute name sets to abstract and characterize similar entities; they are represented by rectangles in the ER diagram, and the entity names are written in rectangular boxes; for example, Student Zhang Sanfeng and student Li Xunhuan are entities. If it is a weak entity, set a solid rectangle on the outside of the rectangle [11]. Attribute: An attribute of an entity. An entity can be characterized by several attributes. If it is a multi-valued attribute, set the solid ellipse outside the ellipse. If it is a derived attribute, it is represented by a dotted oval. Relationship (Relationship): The way data objects are connected to each other is called a relationship, also known as a relationship. According to the system requirements, the analysis entity-relationship is shown in Fig. 2: Working age

Posion

Have Assessment

Archives

Possess

Corporate employees

Where

Department

Assessment Obtain parcipate Aendance

Salary

Training

Fig. 2. System E-R diagram

3.3

Database Structure Design

In this system, there are following table: system user table, user table, department information table, subsidiary information table, subsidiary information type table, subsidiary information value table, static parameters Table, monthly salary information table, system menu table, report configuration table, report item list, report value table, etc.

448

Q. Liangliang and Y. Wang

4 System Architecture Design The architecture used in this paper is divided into three layers, in which the interface used to represent is web browser. This is the client will web browser, a tool for information presentation and processing, is favored by users and R & D personnel in the Internet wave of continuous popularization and development because of its natural advantages. The advantage of its window interaction makes it easy for users to operate the system and transmit information. For example, if users want to send messages edited separately, this window can use text boxes and buttons to complete the operation of sending information. Once the user submits the relevant information, its function module will be started and enter the relevant processing flow. The second layer is called business logic layer, and the other name is function layer. Its main function is to transmit data in addition to being the link of data interaction, it can also manage data and convert various requests from the application layer into database read-write access, which makes data management and control easier, and the corresponding layer can well realize data interaction. The third layer is the data layer, and the other name is the persistence layer. The main function is to access the database. It belongs to the management department a layer of management level, and can identify the instructions sent to the database by the middle layer. In this way, the database can be changed and deleted through the data layer, and the operation can also be fed back to the function layer. The system structure composed of these three layers not only achieves the purpose of fast access to data, but also protects the data according to the information, it has high security and improves the operation and management of data. The function of this mode is divided into three levels. The customer display level is mainly to provide the user with an image interface, which not only enables the user to understand the specific value of relevant application services, but also applies to the actual data management and transmission. Once the user submits the event, the corresponding processing flow will be triggered. The bottom layer of the system structure is the data layer, which not only completely solves the integration and response of data requests, but also can perform other operations on data, as shown in Fig. 3:

Presentaon layer

Business logic layer

Data access layer

Oracle DB

Fig. 3. Three-layer structure

Design of Enterprise Human Resource Management System

449

5 Conclusions Combine the characteristics of the enterprise to realize the informationization of human resources management, and use Oracle data mining technology to complete the indepth analysis of the existing “human” data to a certain extent. Because data mining is a promising research field in human resource management, only a part of the data mining functions is currently implemented in the system. In the future, Oracle data mining will need to be used in depth to achieve, for example, a more reasonable salary and benefit system and a more effective Contents of performance management system and improvement of performance evaluation system for faculty and staff.

References 1. Shen, Z.: Analysis and Design of University Human Resource Management System, pp. 1– 5. Suzhou University, Suzhou (2004) 2. Hand, D., Manila, H., Smyth, P.: Principles of Data Mining (translated by Zhang Yinkui and others), pp. 186–191. Machinery Industry Press, Beijing (2003) 3. Lin, X.: Application and Development of Oracle 10g Database Management. Tsinghua University Press, Beijing, pp. 84–91 (2005) 4. Geng, Q.: Research on Progress Management of Informatization Project of Human Resource Management System of T Group. China University of Geosciences, Beijing (2019) 5. Lu, W.: Design and Application of Enterprise Human Resource Management System Based on SSH. Jilin University (2019) 6. Li, J.: Research on Human Resource Management of HWT Project of H Company. Jilin University (2019) 7. Zhang, W.: Analysis and Design of Human Resource Management System of an Enterprise. Jiangxi University of Finance and Economics (2019) 8. Li, Q.: Design and Implementation of Enterprise Human Resource Management System. Nanchang University (2019) 9. Liu, Z.: Design and Implementation of Enterprise Human Resource Management Information System. Harbin University of Technology (2019) 10. Zhao, J.: Design and Implementation of Human Resource Management System. Qingdao University (2018) 11. Ren, Q.: Design and Development of Enterprise Human Resource Management System Based on Cloud Computing. Shanghai Jiaotong University (2018)

Research on Image Feature Processing Based on FPGA YuXin Cai1(&), ZhiGuo Yan1, Jia Yang2, and Bo Zhao1 1

2

The Third Research Institute of the Ministry of Public Security, Shanghai, China [email protected] Xin Jiang ZhiCheng TianLin Information Technology Co., Ltd., Tianlin, China

Abstract. Regarding present problems of low computational efficiency of the existing large-scale image content retrieval schemes, this paper designs and implements a deep learning image classification system based on FPGA. Utilizing the characteristics of FPGA’s programmable hardware to integrate SATA data communication and CNN algorithm in one FPGA chip. At the same time, the vector comparison method is used to perform feature retrieval and sorting on images when reading data, thereby achieving high-performance integrated image classification and retrieval functions. The experimental results show that when the main frequency of the FPGA is 200 MHz, the characteristic processing capacity is 85 images/second, the power consumption of the algorithm is 24 W, the storage scale is not less than 1 TB, and the SATA read speed is 482 MB/s, and the write speed is 273 MB/s. Keywords: Deep learning communication

 Image classification  FPGA  SATA data

1 Introduction Convolutional neural network (CNN) is a well-known deep learning architecture. It expands with artificial neural networks and is widely used in video surveillance, mobile robot vision, image search engines and other fields. CNN’s design was inspired by biological optic nerves. By processing the data with multi-layer neural link characteristics, the high precision requirements of image recognition are achieved. Recently, the rapid demand based on deep learning algorithms has also greatly promoted the research on deep convolutional neural networks (Deep CNN) [7]. Due to the special operation mode of CNN, it is difficult for general-purpose processor (CPU) to effectively implement CNN algorithm and meet higher performance requirements. Various acceleration modules based on programmable gate array devices (FPGA), graphics cards (GPU) and even application-specific integrated circuits (ASIC) were also designed to improve the computing performance of CNN. Among them, the acceleration module of FPGA has been concerned by a wide range of researchers. This is mainly due to its high performance, high energy efficiency, short development cycle and reconfigurable features.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 450–458, 2021. https://doi.org/10.1007/978-3-030-51556-0_66

Research on Image Feature Processing Based on FPGA

451

On the other hand, with the explosive growth of information dissemination, data storage has also encountered challenges in capacity and speed. In recent years, the technology of solid state drives (SSDs) has matured. Due to the unique access speed advantages of SSDs, traditional hard disk drives are gradually being replaced by faster SSDs. This paper aims to combine high-performance algorithms and high-speed storage to provide a hardware-accelerated interface platform for intelligent storage. A set of intelligent storage systems for image classification and retrieval based on convolutional neural networks is designed. The system can be applied to an image storage server, and achieves high-speed classification and retrieval functions under the condition that the performance of the server processor is low.

2 Design of Image Classification System 2.1

Physical Design

The implementation of this interface software is developed based on FPGA hardware as the core unit. The main functional module distribution diagram is shown in Fig. 1. It includes FPGA, DDR, and SATA-based SSD storage arrays. The main interfaces include HTTP, SATA, JTAG debug ports, and expansion I/O. The SSD is connected to the motherboard through a slot, which facilitates subsequent upgrades and expansions.

Fig. 1. The physical design of FPGA image classification storage transmission.

Among them, FPGA is responsible for SATA interface communication, algorithm acceleration and other related performance are the core devices in the entire design. The operating system can access the storage device through its own file system, and and the FPGA will complete the algorithm implementation and file transfer while completing the read and write operations.

452

2.2

Y. Cai et al.

Application Framework Design

The overall design of the FPGA storage transmission interface library module software is shown in Fig. 2. FPGA is used as the physical interface and the core computing unit. Through asynchronous storage of picture storage and CNN algorithm, performance is improved, and the original data of the picture is maintained.

Fig. 2. The design of hardware framework.

The entire processing flow is explained as follows: 1: Host HOST is initialized, and the weight parameters of each layer are transmitted through SATA; 2: The picture is directly sent and stored through the SATA channel, and stored in the picture file; 3: When the picture is stored, the picture data is extracted and input to the CNN module for classification processing; 4: The classification result is written to the SSD via SATA and stored in the vector cache file; 5: Correspond the image file with the result data according to the vector cache file, and complete the storage. The FPGA storage transmission interface library module combines the main application requirements for image classification, identification, and retrieval. This paper provides a classification operation design based on the CNN algorithm. The host sends pictures to the SATA interface through memory, and uses the CNN operation module inside FPGA to classify and judge the pictures. According to the obtained classification results, the pictures are stored in a catalog file that is created in advance during the initialization process according to the model information.

Research on Image Feature Processing Based on FPGA

453

3 Implementation of Image Classification System 3.1

Software Implementation

The overall process of system implementation is shown in Fig. 3. First, pre-training and weight quantification of the model are performed on the server side. We selected a dataset of 1000 image classes of imagenet. On the server side, all pictures are placed in different folders according to different classes, and then created label, use caffe and SDX IDE to pre-train and quantify the classifier. Due to the large amount of pictures, the training time will be longer. After that, the embedded ARM processor is used to call the xfDNN API, and all algorithm inference operations are performed in the FPGA hardware library. Finally, after the algorithm is finished, the results are processed on the embedded ARM processor, and the PC performs the index calculation statistics.

Fig. 3. System implementation flowchart.

We use the caffe framework for model pre-training and weight quantification. The total number of data sets, the number of training data sets, the number of test data sets, the maximum number of iterations, Batchsize, learning rate, attenuation rate, attenuation step size, category and other parameters need to be configured. At the same time, we use the Ristretto tool under the caffe framework for fine-tuning.

Fig. 4. Caffe prototxt to Zynq.

454

Y. Cai et al.

When using xfDNN to deploy a custom network, this article is mainly done through three main functions provided by xfDNN. xfDNNinit () is a function that implements data initialization, xfDNNExec () is a function that implements data calculation using FPGA hardware, and xfDNNRelease () is a memory release function. The xfDNN acceleration library can import caffe.prototxt and trained weights into Zynq Ultrascale + MPSoC. The specific process is shown in Fig. 4. 3.2

Hardware Platform Selection

In the system implementation of this paper, the hardware platform we use is Xilinx FPGA platform, which has four advantages. 1. Throughput advantage. For low latency AI inference, Xilinx can provide the highest throughput with the lowest latency. In a standard benchmark on GoogleNet V1, Xilinx Alveo U250 provides 4 more throughput for real-time inference than the fastest GPUs available. 2. Pruning advantage. Using CNN pruning technology [2] allows us to achieve AI inferred performance leadership.The optimized pruning tool can achieve 5 to 50 times network performance optimization, while increasing FPS, reducing power consumption, optimizing/accelerating compilation tools, supporting networks such as Tensorflow, Caffe, and MXNet, and compiling the network for the optimized Xilinx edge runtime. 3. Delay advantage. The platform has the advantage of latency, When using large batch sizes to achieve throughput, you must wait for all inputs to be ready before processing, resulting in high latency. When using small batch sizes to achieve throughput, each input is processed immediately when it is ready, reducing delay (see Fig. 5).

Fig. 5. Analysis of delay advantage.

4. Overall application acceleration. Hardware acceleration for AI inference and other performance-critical performance are optimized by tightly coupling custom accelerators in dynamic architecture chip devices. At the same time, it provides end-to-end application performance, which is much higher than fixed-frame AI accelerators such as GPUs; because GPUs are used, other performance-critical functions of applications must still run in software without custom hardware acceleration performance or efficiency (see Fig. 6).

Research on Image Feature Processing Based on FPGA

455

Fig. 6. Xilinx-Matched throughput vs GPU&CPU-Mismatched throughput.

4 Experiment 4.1

Test Environment

The Linux server is used for model pre-training and weight quantification. The xfDNN API call is based on the embedded ARM, the inference operation is based on the FPGA hardware library, the result processing is based on the embedded ARM, and the performance statistics are based on the PC and the Linux server. Among them, FPGA hardware library is designed as FPGA storage transmission interface library module in this paper. The hardware core design of FPGA storage transmission interface library module is based on Xilinx Kintex-Ultrascale series FPGA device development. This device adopts the most advanced TSMC 20 nm process, the highest I/O bandwidth can reach 2.9 Tb/s, and has a maximum of 720,000 logic cells and 5.3TMAC/s DSP and other features. Its main characteristic parameters are listed in Table 1.

Table 1. The main characteristic parameters of FPGA platform FPGA characteristics

Storage performance

FPGA DRAM Logic unit BRAM Clock resources IO resources SATA SSD capacity

Kintex Ultrascale DDR3 SDRAM 8 GB @ 1600 Mbps 726K 36 KB * 1080 DLL, PLL 520HP, 104 h 1.0 (1.5Gbps) 120 GB*1 TB (continued)

456

Y. Cai et al. Table 1. (continued) SSD performance S.M.A.R.T Extended performance NAND Flash File system CNN performance

Classification performance Operating characteristics

4.2

Operating temperature Power

Seq WRITE: 100 MB/s Seq READ: 120 MB/s S.M.A.R.T support Extended support based on host hard drive slot 32 layer 3D V-NAND Support ext2/3/4 file system *3–20 ms/Image (224 * 224) 0–70°C *12 W/pcs

Test Results

The image classification system software uses the googlenet classification model under the caffe framework, which can implement the training and classification of any picture set. The following is the training and classification results for the ImageNet picture set, as shown in Table 2.

Table 2. The training and classification results table.

Googlenet Weight bits: 6bit/8bit Quantification: Xilinx

FPGA Frequency (Hz) 400 200

Feature processing capability (Images/second)

Algorithm runtime power consumption (W)

200 85

29 24

200

47

22

The number of weight bits is set to 6bit/8bit, the quantization method is Xilinx, and the recognition accuracy can currently reach no less than 95%. As shown in Table 2, when the main frequency of the FPGA is 400 MHz, the recognition speed is 200 images/second, and the power consumption is 29 W when the algorithm is running; when the main frequency of the FPGA is 200 MHz, the recognition speed is 85 images/second, and the power consumption is It is 24 W; when the main frequency of the FPGA is 100 MHz, the recognition speed is 47 images/second, and the power consumption is 22 W when running the algorithm. The official performance of xfDNN is shown in Table 3. As shown in Table 3, the performance of the Googlenet network is higher than that of other networks, and can reach 70 Images/second. The experimental results in this article can reach 85

Research on Image Feature Processing Based on FPGA

457

Table 3. xfDNN official performance table. Network type Network name Classification Alexnet VGG16 Googlenet Resnet50 Segmentation Alexnetfcn Detection SSD

Performance (Images/second) 57.85 7.96 70.74 21.48 5.13 10.17

images/second and 200 images/second when the FPGA main frequency is 200 MHz and 400 MHz, Superior to the contrast performance provided. The main function of the picture classification system software is to place the pictures to be classified on a 1 TB SATA disk. After running the picture classification algorithm, all the pictures are automatically classified into corresponding folders, and the classified pictures are also placed on the SATA disk. After testing, the SATA disk read and write speed test is shown in Table 4.

5 Conclusion Table 4. SATA disk read and write speed test table.

Time (s) Data size (KB) Speed (MB/s)

Write (bs = 8k count = 1000000) 28.565 s 8192000000

Write (bs = 1k count = 8000000) 64.762 s 8192000000

Read (bs = 8k count = 1000000) 16.197 s 8192000000

Read (bs = 1k count = 8000000) 20.624 s 8192000000

273 MB/s

120 MB/s

482 MB/s

379 MB/s

In response to the current application needs of image classification and retrieval in the Internet, security protection, criminal investigation and other fields, this paper designs and implements an FPGA-based image classification system. At the same time, it uses the Googlenet algorithm model to implement the feature processing, classification, and storage of picture sets. The research results of this article shows high performance in terms of feature processing capabilities, system power consumption and data storage, and it also provides research support for FPGA heterogeneous computing. Acknowledgements. This paper is supported by the mandatory Science and Technology assistance project for Xinjiang Province (Project No. 2017E0202) and Shanghai Science and Technology Innovation Plan (17595800900).

458

Y. Cai et al.

References 1. Chetlur, S., Woolley, C., Vandermersch, P., Cohen, J., Tran, J., Catanzaro, B., Shelhamer, E.: cuDNN: efficient primitives for deep learning (2014). arXiv.org arXiv:1410.0759 2. Han, S., Mao, H., Dally, W.J.: Deep compression: compressing deep neural networks with pruning, trained quantization and huffman coding (2015) arXiv preprint arXiv:1510.00149 3. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition (2015). arXiv preprint arXiv:1512.03385 4. nVIDIA. Jetson tx1 module. http://www.nvidia.com/object/jetson-tx1-module.html 5. Adam Paszke. torch-opcounter. https://github.com/apaszke/torch-opCounter (2016) 6. Paszke, A., Chaurasia, A., Kim, S., Culurciello, E.: Enet: a deep neural network architecture for real-time semantic segmentation (2016). arXiv preprint arXiv:1606.02147 7. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition (2014). arXiv preprint arXiv:1409.1556 8. Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed S., Anguelov, D., Er-han, D., Vanhoucke, V., Rabinovich A.: Going deeper with convolutions (2014). arXiv preprint arXiv:1409.4842 9. Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision (2015). arXiv preprint arXiv:1512.00567 10. Szegedy, C., Ioffe, S., Vanhoucke, V.: Inception-v4, inception-resnet and the impact of residual connections on learning (2016). arXiv preprint arXiv:1602.07261 11. Sergey Zagoruyko. imagenet-validation.torch. https://github.com/szagoruyko/imagenetvalidation.torch (2016) 12. Shelhamer. cuDNN: efficient primitives for deep learning (2014). arXiv.org arXiv:1410. 0759 13. Collobert, R., Kavukcuoglu, K., Farabet, C.: Torch7: a matlab-like environment for machine learning. In: BigLearn, NIPS Workshop, number EPFL-CONF-192376 (2011). Eugenio Culurciello. Training enet. https://culurciello.github.io/tech/2016/06/20 14. Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)

Design and Application Research of Targeted Persons Control System Based on Big Data Jinbo Wu1(&) and San-you Zhang2,3 1

3

The Third Research Institute of Ministry of Public Security, Shanghai 200031, China [email protected] 2 Department of Science and Technology, Suzhou Wujiang District Public Security Bureau, Suzhou, Jiangsu 215200, China [email protected] School of Information and Control Engineering, China University of Mining and Technology, Xuzhou, Jiangsu 221000, China

Abstract. By studying the needs of targeted persons control, this paper constructs a targeted persons control system based on big data, realizes the structuration and standardization of multi-source heterogeneous data, and carries out big data analysis operations such as data association, personnel label analysis and knowledge map construction. On the basis of this system, this paper puts forward the application of targeted persons control based on big data, such as potential persons discovery, abnormal behavior identification, targeted persons tracking and crime situation analysis, providing development ideas for targeted persons control under the condition of big data. Keywords: Big data

 Targeted persons  Control  Application

1 Introduction 1.1

Definition of Big Data

With the rapid development of Internet, Internet of things, cloud computing and other information technologies, various information application systems emerge one after another [1], resulting in the explosive growth of data scale. The concept of big data again attracts attention and soon becomes the focus of attention of science and technology circles, business circles and even governments all over the world [2]. Big data refers to data sets that cannot be captured, managed and processed by conventional software tools within a certain time frame. It is a mass, high-growth and diversified information asset that requires new processing mode to have stronger decision-making power, insight and discovery power and process optimization ability. Big data is characterized by volume, velocity, variety and low value [3]. Big data is playing an increasingly prominent role in various industries and has gradually become an important factor of production [4–6], so is the targeted persons control in the field of public security.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 459–466, 2021. https://doi.org/10.1007/978-3-030-51556-0_67

460

1.2

J. Wu and S. Zhang

Targeted Persons Concept and Control Significance

Targeted persons refer to those who are suspected of endangering national security or public security and are under the key administration of the public security organs. The targeted persons include people involved in terrorism, people involved in stability, people involved in drugs, people at large, individuals at extreme risk, people with criminal records, people with serious mental disorders, people suspected of major crimes, people obtaining bail pending trial and other types. Targeted persons control is a basic work for the public security organs to implement key management of persons suspected of endangering society in accordance with relevant regulations. It plays an extremely important role in preventing and reducing crimes, accurately cracking down on crimes, and maintaining national security and social order stability. 1.3

The Role of Big Data in Targeted Persons Control

At present, considering the current social order situations, the public security organs have explored a new way to apply big data to the control of targeted persons, trying to solve the problem that “targeted persons cannot be controlled”. In daily work, big data can play the following roles: 1) fully understand targeted persons. Through the fusion analysis of big data resources from multiple aspects, we can fully grasp the dynamic situation of financial, travel, consumption, communication and other aspects of targeted persons. 2) tightly pegged to targeted persons. Using data from multiple aspects, it can control targeted persons’ location, action trajectory, relationship personnel, consumption records and other information in real time, keep a close eye on targeted persons’ every move, and achieve the goal of effective control. 3) accurately determine the behavior of targeted persons. By analyzing the historical big data of targeted persons and establishing the characteristic model, it can be used to find potential targeted persons. By analyzing the multi-source big data of targeted persons, the abnormal behaviors can be predicted in advance and the crime situation can be forewarned.

2 Targeted Persons Control System Based on Big Data 2.1

System Architecture

The targeted persons control system based on big data considers the needs of targeted persons control, and applies new technologies such as big data, cloud computing, Internet of things and artificial intelligence to realize the integration of data, technology, business and application. The system adopts the idea of hierarchical design, which is divided into data access layer, data governance layer, data analysis layer and comprehensive application layer. Its architecture is shown in the Fig. 1.

Design and Application Research of Targeted Persons

Comprehensive Application Layer

Data Analysis Layer

Data Governance Layer

Poten al Targeted Persons Discovery

Abnormal Behavior Warning

Targeted Persons Tracking

Crime Situa on Analysis

Feature Model Genera on

461

……

Associa on Construc on

Personnel Label Analysis

Data Structura on

Data Integra on

Data Cleansing

Redundancy Removal

Knowledge Graph Establishment

Big Data Storage

Data Gathering

Data Access Layer

Communica on Data

Traffic Data

Consump on Data

Medical Data

Social Data

Internet Data

Video Monitoring

Accommoda on Data

Housing Data

……

Data

Fig. 1. The architecture of the targeted persons control system based on big data

2.2

The Data Access Layer

The data access layer defines a variety of data interfaces to obtain the original data from multiple data sources, including: 1) communication data. It is mainly provided by telecom operators to record the communication of persons (including mobile communication and fixed-line communication). Upon demand, the telecom operators can provide the movement path or the real-time location of persons. Such data is generally structured data. 2) traffic data. It is mainly provided by the departments of railway, civil aviation and subway and bus to record the travel records of persons. Such data is generally structured data. 3) consumption data. It is mainly provided by stores, supermarkets and other physical business departments and online consumption companies to record the shopping consumption of persons. Such data is generally structured data. 4) medical data. It is mainly provided by the medical system and records the medical treatment and drug purchase of the personnel, so as to understand the physical condition of the personnel involved from the side. Such data is generally structured data. 5) social data. It is mainly provided by QQ, WeChat, nailing, weibo and other social media operators to record the contact information, friends and mutual exchanges of persons except telephone. Such data includes structured data, semi-structured data, and unstructured data.

462

J. Wu and S. Zhang

6) Internet data. Information obtained from the Internet by web crawlers and other means is used to record the traces of persons on the Internet. Such data is generally semi-structured. 7) video monitoring data. Video monitoring systems built by public security, traffic, education, urban management and other government departments are used to record the activities of persons in the physical space. Such data is generally in the form of video, image and other unstructured form. 8) accommodation data. It is mainly provided by hotels, homestays and other companies that have the conditions for short-term rental to record the short-term stay of persons outside the family housing. Such data is generally structured data. 9) housing data. It is mainly provided by the Housing Authority or the public security department to record the purchase or lease of house property of persons. Such data is generally structured data. 10) other data. In addition to the above data, the system can also access vehicle registration data, express delivery data, household registration data, WIFI probe data, traffic violation data and other types of data. In order to improve the scalability of the system, the system reserved data access extension interface. 2.3

The Data Governance Layer

The control of targeted persons needs heterogeneous data from multiple departments and implement multidimensional perception, which involves basic information of persons, physical behavior, network behavior, activity trajectory, medical records, shopping consumption and so on. These data cover structured, semi-structured and unstructured data, data quality is uneven, data standards are not uniform. In order to ensure the effective use of data, data governance must be implemented. The data governance methods supported by the targeted persons control system based on big data include data structuration, data integration, data cleansing, redundancy removal, data desensitization, etc. Data Structuration: analyze the unstructured or semi-structured data such as video, image and web page data intelligently, extract the entities such as persons, cars, objects and events in the data, describe the entity features in a structured way, and store them in a standard format. Data Integration: data from different sources is centralized logically and physically, provides a unified view of data for users and applications. The data integration process includes three sub-processes: extraction, transformation, and loading. Data Cleansing: repair or remove inaccurate, incomplete or unreasonable data in access data to improve data quality. In addition, format checking, integrity checking, rationality checking and limit checking are also completed in the data cleansing process. Redundancy Removal: redundant identification, data compression, data deduplication and other technologies are used to identify and remove redundant and needless data in the access data.

Design and Application Research of Targeted Persons

463

Data Desensitization: on the premise of minimizing the effect of data application, desensitization is conducted for sensitive information involving personal privacy, trade secrets and technical secrets. This system uses data encryption, differential privacy preserving, data fuzzy processing and other technologies. 2.4

The Data Analysis Layer

The data after governance meets the requirement for further analysis and processing. Based on a variety of data processing models, the system constructs the data analysis layer to establish the correlation between data and data, subject and data, and subject and subject, providing a foundation for further data mining, prediction and early warning. Feature Model Generation: By extracting the characteristics of existing targeted persons, establish the feature model for identifying potential targeted persons. and construct the intelligent evaluation rule model. On this basis, the intelligent dynamic identification and early warning of potential targeted persons are realized, and the source control of targeted persons is carried out. Association Construction: Cloud computing technology is adopted to solve the semantic conflict between massive multi-source heterogeneous high-dimensional distributed data, realize intelligent fusion of multi-source data of targeted persons, and provide data preparation for big data applications such as abnormal behavior discovery and crime situation analysis. Personnel Label Analysis: Using basic attribute labeling, statistics and other technologies, attribute labels, statistical analysis labels and model algorithm labels of targeted persons are constructed. These labels can be used to realize the intelligent classification of targeted persons. Knowledge Graph Establishment: The entities, attributes, and relationships of targeted persons are extracted from multi-source data. Through the process of knowledge fusion, such as coreference resolution, entity disambiguation, entity linking and knowledge merging, ontology construction, knowledge reasoning, quality assessment and other knowledge processing processes are completed. Then, the ontology attribute, the association relationship with other targeted persons, the association relationship with items and the association relationship with other non-targeted persons are constructed to form the knowledge graph of targeted persons. In order to further improve the scalability of the system, the system designed a standard interface in the data analysis layer, to integrate various new methods of big data analysis. 2.5

The Comprehensive Application Layer

By analyzing the data from different data sources, the relationship between persons and relevant data is established, and the general characteristics of targeted persons are summarized. Based on the results of the big data analysis, the application of potential targeted persons discovery, abnormal behavior warning, targeted persons tracking, crime situation analysis and other aspects can be carried out to improve the public

464

J. Wu and S. Zhang

security organs’ control efficiency of targeted persons. The targeted persons control applications will be described in detail in Sect. 3. 2.6

The Processing Flow

The targeted persons control system based on big data accesses heterogeneous data from multiple aspects, carries out data governance operations such as data structure, data integration, data cleaning, etc. The big data analysis engines are used for fusion analysis, and constructs the relationship between subjects and subjects, subjects and behaviors, behaviors and behaviors. Then, the knowledge graph and personal label of targeted persons are established to realize the application of behavior monitoring, identification and tracking, crime situation analysis and so on.

3 Application of Targeted Persons Control Based on Big Data Based on the big data and the analysis results obtained by the targeted persons control system, various targeted persons control applications can be carried out according to actual needs. This chapter introduces some mature application modes. 3.1

Potential Targeted Persons Discovery

Based on the established characteristic models of targeted persons, starting from the social relationship and regular contact relationship of targeted persons, the intelligent evaluation of persons within the jurisdiction is conducted and the quantitative score is given. The persons with higher scores will be tracked and evaluated continually and send warning information of potential targeted persons to system users. System users use data resources such as household registration data, telecom location data and video tracking data to accurately locate potential targeted persons, meet to learn more about the details, and confirm whether they are people who need to focus on. 3.2

Abnormal Behavior Warning

By analyzing the data of targeted persons, the data profile of targeted persons can be obtained. The data profile includes the following contents: 1) basic information. It can be obtained by analyzing household registration data, housing data, vehicle registration data, etc. 2) scope of daily activities. It can be obtained by analyzing telecom location data, video monitoring data, etc. 3) consumption habits. It can be obtained by analyzing consumption data, express delivery data, etc. 4) frequent contact groups. It can be obtained by analyzing telecom data, data provided by social platforms, etc. 5) health status. It can be obtained by analyzing medical data, etc.

Design and Application Research of Targeted Persons

465

After the profile of targeted persons is established, the abnormal behaviors of targeted persons can be warned by monitoring and tracking the abnormal data. The abnormal behaviors warning include: the scope of activities of targeted persons is suddenly expanded and they often go there; The consumption type or consumption amount is abnormal and lasts for a period of time; Contact with strangers frequently; A sudden increase in the number of hospital visits or a significant change in the number of drug purchases. 3.3

Targeted Persons Tracking

The targeted persons tracking includes historical tracking and real-time tracking. The historical tracking is completed by using the telecom location data and video monitoring data. The telecom location data provided by telecom operators can indicate the approximate location of targeted persons within a period. Then the historical video monitoring data within the location is analyzed and the persons is identified to obtain the precise location where the targeted persons have arrived. By connecting all the arrival points according to the time sequence and movement law, the targeted persons’ historical track can be formed. The real-time tracking is mainly accomplished by using video monitoring data. Starting from the location of targeted persons, the cross-lens tracking based on realtime video monitoring data can be carried out. The point information of the surveillance camera can reflect the location of targeted persons in real time which provides location guidance for the meeting and interrogation. 3.4

Crime Situation Analysis

The analysis of crime situation of targeted persons needs to adopt different analysis strategies according to different purposes: 1) crimes related to gathering of persons. Based on the current network public opinion and social opinion, the analysis focuses on the communication data, social data and action trajectory of targeted persons with the characteristics of gathering crimes, and draws the conclusion of crime situation analysis of the crowd. 2) crimes related to personal acts. The analysis focuses on the abnormal behavior of persons and draws the conclusion of crime situation analysis of individuals. 3) crimes related to key areas. The focus of the analysis is to track and analyze the targeted persons who may commit crimes in key areas and draw the conclusion of regional crime situation analysis.

4 Conclusion The targeted persons control is an important basic work of public security organs. In order to adapt to the development of big data and other information technologies, the targeted persons control must be combined with big data technology to realize the deep integration of big data and information collection, data mining, monitoring and early

466

J. Wu and S. Zhang

warning, comprehensive research and judgment, etc. The implementation of targeted persons control based on big data can improve the overall management level of the city. Acknowledgement. This work is supported by National Key R&D Program of China (No. 2018YFB1004605).

References 1. Zikopoulos, P., Eaton, C.: Understanding big data: analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media, New York (2011) 2. Yang, W.C., Chen, H., Qu, Q.Y.: Research of a MapReduce Model to Process the Traffic Big Data. Appl. Mech. Mater. 548, 1853–1856 (2014) 3. Slavakis, K., Giannakis, G., Mateos, G.: Modeling and optimization for big data analytics: (statistical) learning tools for our era of data deluge. IEEE Sig. Process. Mag. 31, 18–31 (2014) 4. Chen, X.W., Lin, X.T.: Big data deep learning: challenges and perspectives. IEEE Access J. 2, 514–525 (2014) 5. Cheng, X.Q., Jin, X.L., Wang, Y.Z., GUO, J.F., Zhang, T.Y., Li, G.J.: Survey on big data system and analytic technology. Ruan Jian Xue Bao/J. Softw. 25(9), 1240–1252 (2014) (in Chinese). http://www.jos.org.cn/1000-9825/4674.htm 6. Chen, Y.P., Alspaugh, S., Katz, R.: Interactive analytical processing in big data systems: a cross-industry study of MapReduce workloads. Proc. VLDB Endowment 5, 1802–1813 (2012)

Part III: Agent-Based and Multi-agent Systems for Health and Education Informatics

An Innovative Teaching Mode Based on Programming Contest Yongjun Luo(&) and Hong Zheng School of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China [email protected]

Abstract. Starting from the needs and orientation of the cultivation of innovative talents in computer science, combined with the current years of programming competitions in universities, the current situation of the teaching curriculum and the problems that need to be solved are analyzed, and the role of programming competition in the cultivation of innovative entrepreneurs is discussed. Combining the programming competition with the practical teaching of the course, the teaching reform of software design practice based on programming competition is proposed. Through the follow-up observation of the students who participated in the programming competition and won the award, it proves that the programming competition plays an important role in cultivating innovative and entrepreneurial talents. In terms of technical ability, selfmanagement, team building, industry awareness and other aspects, the advantages are obvious, and a large proportion of self-employment and success. Keywords: Programming competition practice

 Curriculum reform  Curriculum

1 Introduction The cultivation of innovative talents in computer sciences has injected outstanding talents into China’s software industry, “Internet+”, “Artificial Intelligence+” and so on. ACM International Student Programming Competition (ACM/ICPC), national electronic design competition and mathematical modeling competition will help students improve their ability to use knowledge to solve practical problems, and strengthen the cultivation of students’ practical ability and innovative thinking. In universities, there are many ways to cultivate innovative entrepreneurial talents, such as participation in programming competitions, engineering projects, research teams, and so on. Among them, the programming competition makes full use of the limited teaching resources and talent advantages, combined with competition, teaching students in accordance with their aptitude, has different teaching or training methods than conventional teaching, and successfully integrates computer subject knowledge points into program design competition activities, so that students We changed from “I want to learn” to “I want to learn.” Algorithmic competitions, such as ACM/ICPC [1], aim to demonstrate the ability of college students to use computers to analyze and solve problems. Develop students’ © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 469–477, 2021. https://doi.org/10.1007/978-3-030-51556-0_68

470

Y. Luo and H. Zheng

solid mathematics and computer skills, such as number theory, combinatorial mathematics, graph theory, geometry, etc., proficient in C, C++ or Java programming language [2, 5] and various algorithms and data structures, with multi-angle considerations Ability. Daily training is performed on an automated online design evaluation system [3, 4], each of which is represented as a topic with a specific format. After the answer code is submitted online, the online evaluation system automatically compiles the code, runs and determines whether the running result is correct. This form provides an allweather practice platform for learning knowledge of various algorithms and data structures. In the process of cultivating the algorithm competition, the algorithm teaching with the actual problem background is embedded in the theoretical teaching, and each teaching knowledge point is distributed in each standardized topic. By analyzing the results of the competition, the students’ mastery of the teaching knowledge points is more carefully evaluated. This information is further fed back into the theoretical teaching of the course, which can determine the practical difficulties and key points of the course teaching. The algorithm competition and the regular course teaching complement each other and promote each other. On the basis of regular course study, students use the algorithmic competition and its training form to stimulate their interest in using course knowledge analysis and solving practical problems, and cultivate their various aspects to better understand and master the course knowledge. The algorithmic competition is conducive to cultivating and discovering excellent computer talents as early as possible, laying a good foundation for the cultivation of innovative talents. Most of the university’s programming competitions are directed and directed by the Academic Affairs Office and the School of Information, and a large number of programming competitions are held each year. From 2006 to 2019, there are 80–100 freshmen in the general university who participate in programming training every year. After the selection, there are 15–25 players participating in the competition. The junior and senior students are mainly composed of 3 students. a team. Participate in ACM/ICPC and CCPC every year to receive gold, silver and bronze awards, and the number of awards is 5–8. At present, the Asian regional competitions held in mainland China have been selected from 600 universities. Each year, there are 5 or 6 divisions, each with 200–350 teams, totaling about 1400 teams, including repeated competitions in multiple competition zones. The winning rate of the gold medal is 10%, 140 teams, about 500 people, juniors and seniors; the silver medal is 20%, the 280 team is about 800, the junior and senior students are the mains; the bronze medal is 30%, 420 teams, about 1,200 people, juniors and seniors. The paper makes an introduction to software design teaching method based on programming contest in Sect. 2. Then Sect. 3 and Sect. 4 discuss how to apply the theory and the method to the teaching practice. Section 5 concludes some observations from contest administrators, faculty advisors, and participants.

An Innovative Teaching Mode Based on Programming Contest

471

2 Software Design Teaching Method Based on Programming Contest Computer software practice teaching is an important carrier for cultivating future engineers’ thinking and working methods, an important channel for linking theory with practice, and a bridge for engineering practice in the classroom [8, 9]. Practice teaching runs through the whole process of professional education. It is the only way for highlevel software talents in computational thinking, logic and mathematical thinking, algorithm knowledge, team training and so on. The programming training runs through the entire undergraduate education. From the basics, the knowledge acquired by the university for four years is summarized, summarized and promoted through training. We use the practical teaching of programming training as the carrier and the form of programming competition to explore and practice the improvement of engineering education quality [8]. For students who are determined to become advanced programmers, a large amount of computational thinking training and classical algorithm training are necessary, because: (1) The algorithm is the touchstone for learning and understanding. It is difficult to master the algorithm. Those who can win awards in the algorithmic competition prove their ability to solve complex programming problems. (2) Cultivation of modeling ability. Even if there are ready-made modules, for specific needs, they often need to be modified to be used. (3) The actual program often has complex logical relationships, but it is not a classic algorithm. There is no ready-made module. You need to think for yourself to write the code. This ability is obtained through training. Through the training of the programming competition, students will be trained in the following aspects of software practice: (1) A lot of code. By writing a lot of code, it is the basic skill of an outstanding programmer to be able to make the algorithm exquisite and reasonable, the logic is clear, the code is spewing out, the format is pleasing to the eye, and the bug is picked up. For example, ACM/ICPC team members need to write 50,000–100,000 codes to reach the level of winning in the regional competition. (2) Rich algorithm knowledge. The algorithm is the core of the program and determines the pros and cons of the program. Especially in the case of large data scale, the algorithm directly determines the life and death of the program. The programming competition involves most of the common deterministic algorithms. Mastering this knowledge can not only be applied in software development, but also the basis for further exploration of unknown algorithms. For example, the now popular artificial intelligence research that represents the future of human technology involves sophisticated algorithmic theory. Those who have not been trained by basic algorithms cannot participate at all. (3) Computational thinking and logical thinking. A difficult problem often requires the integration of multiple capabilities, such as data structures, algorithmic knowledge, mathematical methods, processes, and logic. Being able to solve such a problem is a feature of advanced programmers. The winners who won the silver medal in the

472

Y. Luo and H. Zheng

national programming competition can prove that they have such ability by virtue of the medal. This is also the main reason why competitions such as ACM/ICPC are so valued. (4) Team spirit. The programming competition is usually a multiplayer team that completes the competition within a limited time. Teams who have participated in the live competition can immediately realize that three people in a team can do more than one or two questions at the same level, and raise the level of awards to a higher level. For example, some people intensively read English questions, discuss ideas with each other, construct test data for teammates, judge the situation on the spot, judge the order of the questions, and so on. In daily training, only one team of three people can understand each other through long-term running-in, and achieve a reasonable division of labor and complementary advantages, so as to exert the best team strength.

3 Strengthen Innovation and Entrepreneurship by Programming Contest In the university stage of the students, the teachers are conscious of them, have methods to cultivate and expand, and can guide more potential students to turn to selfemployment and become the leader of the future IT industry at the right time in the future. Programming competitions can encourage students to think and practice in close combat, which can greatly enhance their engineering awareness and ability. Selfemployment is one of the important directions for the employment of college students today. The cultivation of computer software entrepreneurial talents needs to stimulate ability in many aspects. Each contestant can show advantages in important aspects such as employment and insurance research while gaining innovation awareness, professional knowledge, engineering and entrepreneurial abilities. During the university, programming competition promoted the development of entrepreneurial talent in these areas: (1) Participating in the programming competition has inspired students’ entrepreneurial passion. Due to the difficulty of the programming competition and the opportunity to communicate with other university programming experts, the students’ passion is encouraged: once they start, they will not retreat; they are eager to become big men and change their ambitions; they dare to work with teachers and IT equally. The courage of industry people to communicate. Huali graduates who have successfully started a few IT companies have shown these characteristics in their freshman and sophomore years. (2) Open thinking. Can seize every opportunity to learn more information. Encourage team members to visit startups during college, broaden their thinking, start their own business during college, and start a business after graduation. (3) Superior technical capabilities. This is very important. Since the IT industry has already entered a mature stage, the number of practitioners is too large and the competition is fierce. Therefore, only those with superior technical capabilities can quickly develop software that is difficult to imitate and increase the chances of success.

An Innovative Teaching Mode Based on Programming Contest

473

(4) Self-confidence. Confidence is not blind arrogance. Self-confidence is gained, based on the experience of conquering difficulties. Students who have been trained in the algorithmic competition have developed a strong self-confidence because they have experienced long-term and very difficult learning and greatly surpassed most of the students in programming ability. (5) Team building. The members of the competition, in the process of long-term joint study and participation, unite and cooperate, make progress together, and form a profound friendship, which is a good partner for future business. The programming competition is not a single course, or short-term study, but a long-term process that lasts for four years, covering programming languages, algorithms, mathematics, software engineering, teamwork, English, etc. It is a comprehensive large-scale cultivation. platform. It is necessary to establish a professional practice teaching system that is gradually deepened and expanded in many aspects and closely integrated with software development. It is necessary to carry out research from the aspects of teaching content, teaching environment, teaching methods, platform construction and capability evaluation. On the basis of years of experience in programming competition, build a capacitybased training with innovative talents as the core, as shown in Fig. 1.

Fig. 1. Programming competition innovation ability training

4 Combination of Programming Competition Training System and Professional Courses There are many computer courses, and there are many courses related to the programming competition, such as “Programming”, “Discrete Mathematics”, “Linear Algebra”, “Advanced Mathematics”, “Calculation Method”, “Data Structure”, “Algorithm Design” Wait. These courses shape the students’ computational thinking and logical thinking, and the theoretical teaching and practice are indispensable. The programming competition can greatly promote the learning of the curriculum knowledge system, so that the activists have the opportunity to greatly improve the programming ability and innovation and entrepreneurship ability [6, 7, 9, 10]. (1) Make up for the lack of course code. Although the practical experiment of the course is getting more and more attention, but because the course needs to explain a lot of theoretical knowledge, the post-class programming practice can not be too high. The programming competition focuses on the coding implementation, and it is required to pass the test of the test bank. Only after a large amount of coding training can the strength be contested. A student who participates in a programming competition, his

474

Y. Luo and H. Zheng

annual code volume can generally exceed the number of students in the university for four years without participating in the programming competition. (2) Facilitate the homework inspection of teachers and students. Course experimentation and practice are generally measured by the teacher’s subjective judgment, and it takes a lot of labor to train each student fairly and in a targeted manner. The programming competition automatically judges whether the program submitted by the students is correct through the judgment system, which not only facilitates the selfexamination of the students, but also liberates the teachers, so that the teachers can focus on cultivating the students’ thinking and methods. Many courses have already introduced the method of the programming competition judgment system, or directly reference the relevant question bank of the programming competition. (3) On the basis of theoretical examinations and written examinations, the examination of hands-on ability has been added. Programming training requires that the results of the program be completely correct, the program can not have any errors, and this strict requirement greatly enhances the hands-on ability. (4) Synthesis of multidisciplinary knowledge. Each discipline has its own system, which is determined by the content of the course. The integration of multiple disciplines is a necessary training for outstanding talents, and the programming competition has accomplished this task well. The topics in the programming competition often combine algorithms, mathematics, logic, data structures and other knowledge, requiring the programmer to have a comprehensive knowledge of the quality, so that he has a more thorough understanding of the depth and breadth of the course knowledge. Through the algorithmic competition training, students are promoted in the following aspects: (1) Learning and training through algorithmic competition to improve hands-on ability. Each time a student writes an experimental program and runs verification, it improves the students’ programming ability; stimulates students’ awareness of competition and promotes students to learn more actively and independently. (2) Combining algorithm competition competition to teach, the algorithm competition topic involves a wide range of knowledge, including programming language, data structure, algorithm, artificial intelligence, discrete mathematics and other programming theories and methods. In combination with the ACM competition questions, teachers grade the content of the teaching, such as knowledge (single algorithm), application (algorithm and actual combination) and comprehensive (to solve large-scale problems). It not only takes care of students at different levels, but also improves the ability to integrate design and solve problems. (3) Improve the quality of student programming through algorithmic competition training. The birth of a high-quality program requires not only programming knowledge, but also other courses such as data structure, combinatorial mathematics and so on. This model enhances students’ joint mastery and use of knowledge and innovation awareness, and cultivates their ability to innovate. Take a typical algorithmic competition as an example to illustrate its role in the cultivation of curriculum teaching. Problem Description: A frog has just learned some number theory, and can’t wait to show his ability to his girlfriend. Now the frog is sitting on a grid map of infinite rows and columns. Rows are numbered 1,2, from the bottom, so are the columns.

An Innovative Teaching Mode Based on Programming Contest

475

At first the frog is sitting at grid (sx,sy), and begins his journey. To show his girlfriend his talents in math, he uses a special way of jump. If currently the frog is at the grid (x, y), first of all, he will find the minimum z that can be divided by both x and y, and jump exactly z steps to the up, or to the right. So the next possible grid will be (x + z, y), or (x, y + z). After a finite number of steps (perhaps zero), he finally finishes at grid (ex, ey). However, he is too tired and he forgets the position of his starting grid! It will be too stupid to check each grid one by one, so please tell the frog the number of possible starting grids that can reach (ex, ey)! Input: First line contains an integer T, which indicates the number of test cases. Every test case contains two integers ex and ey, which is the destination grid. Output: For every test case, you should output “Case #x: y”, where x indicates the case number and counts from 1 and y is the number of possible starting grids. Question type: math problem. The bronze team passed in about 98 min. Ability assessment: the least common multiple and the greatest common divisor problem in number theory, logical reasoning. (1) Algorithm complexity. When solving a problem, you should first pay attention to the size of the data, that is, 1  ex, ey  109, which means that the algorithm with time complexity greater than O(N) cannot be used. (2) Algorithm concepts and logical reasoning. The title indicates that this is an LCM (least common multiple) problem. The starting point is (x, y), the ending point is (ex, ey), the known end point, and the starting point of the reverse. z is the LCM of x, y, assuming x = pt, y = qt, z = pqt. p and q are relatively prime. The starting point (x, y), the next step can go to 2 positions (x, y + z) or (x + z, y), discussed separately below. (i) End point (ex, ey) = (x, y + z) = (pt, qt + pqt) = (pt, q(1 + p)t) p and q(1 + p) are relatively prime, t is the greatest common divisor and is available: t = GCD(ex, ey). The derivation gets the starting point: x = pt = ex y = qt = eyt/(ex + t) This is a possible starting point. Treat the starting point as a new end point and continue the process until the end. Need to pay attention: p, q, t are integers, then judge in the program. (ii) End point (ex, ey) = (x + z, y) The actual situation is similar to (i). Note that in (i) y + z > x, i.e. ex < ey, (ii) e x > e y. This question involves the knowledge of algorithms, that is, the concept of number theory; the derivation process needs to have a clear and flexible reasoning ability; the complexity of calculation needs to be understood; the code is relatively short. This question can examine basic algorithm knowledge and certain logical reasoning ability. Figure 2 is the capacity development process.

476

Y. Luo and H. Zheng

Fig. 2. Algorithmic capability building process

5 Conclusion The ACM/ICPC-based course teaching mode introduces ACM/ICPC competition form and typical competition questions into computer software design teaching. This teaching mode can not only train students’ practical ability, but also cultivate students’ creative thinking and teamwork awareness. Can improve their sense of innovation. Through years of follow-up observations of students who have participated in the programming competition and won awards, it proves that the programming competition plays an important role in cultivating innovative and entrepreneurial talents. These students not only have excellent technical skills, but also have obvious advantages in self-management, team building, and industry awareness. After they are employed, they have a high starting point, rapid improvement, and many opportunities. A large percentage of self-employed and successful. In the university, high-intensity and indepth programming competition training for students who are interested in the software industry is a good way to cultivate IT elites and play a great role in promoting the development of China’s software industry. Acknowledgments. We are pleased to acknowledge Reform and Construction of Undergraduate Experimental Practice Teaching in East China University of Science and Technology; the special fund for Software and Integrated Circuit Industry Development of Shanghai under Grant 150809; the “Action Plan for Innovation on Science and Technology” Projects of Shanghai (project No: 16511101000).

References 1. Zheng, Y.: A novel method of reform and exploration of C++ bilingual teaching based on ACM/ICPC. In: Proceeding of 3rd International Conference on Information Electronic and Computer Science, pp. 626–630 (2011) 2. Wang, C.: Practical teaching reform for C++ course program design. Comput. Educ. 12, 3–4 (2007) 3. Zheng, Y., Sarem, M., Yang, Q., Xie, X.: A novel improvement for international online judging system and its applications to experimental reform of C++ course. Adv. Eng. Res. 118, 1077–1080 (2017) 4. https://icpc.baylor.edu/worldfinals/rules 5. Paul, J.K.: Java C C face growing competition in popularity, InfoWorld. InfoWorld, February 2017

An Innovative Teaching Mode Based on Programming Contest

477

6. Zheng, Y.: Teaching mode exploration of design and analysis of algorithms. Study South Chin. High Educ. Eng. 30(2), 21–25 (2012) 7. Li, H.: Teaching reform and practice of algorithm analysis and design. Chin. Electr. Power. Educ. 16, 74–75 (2010) 8. Zheng, Y.: A novel method of reform and exploration of C++ bilingual teaching based on ACM/ICPC. In: Proceedings of 3rd International Conference on Information, Electronic Computer Science, pp. 626–630 (2011) 9. Yu, H.: Curriculum exploration of algorithm design and analysis in intelligent science and technology specialty. Comput. Educ. 19, 15–18 (2010) 10. Marion, W.A.: Preparation for teaching an ACM-recommended discrete structures (mathematics) course: a joint effort. In: 8th IFIP World Conference on Computers in Education, WCCE 2005 (2005)

The Design of Comprehensive Quality Evaluation System Under the Reform of China’s College Entrance Examination Xianglin Zhang(&) and Xiaolin Ge Central University of Finance and Economics, Beijing 100081, China [email protected]

Abstract. To understand the comprehensive quality evaluation of high school students, the first thing is to go out of the three major misunderstandings and recognize the value of comprehensive quality evaluation, the quantifiable factuality and the necessity of continuous record. It still exists problems in current comprehensive quality evaluation such as single and rough means, serious homogenization, and lack of timely feedback. The root cause of these problems is that we can not find strong “evidence” for the content that is difficult to be standardized, such as ideological and moral character, artistic quality, etc. The lack of technical means make a comprehensive quality evaluation become a mere formality. The arrival of the era of big data provides a new solution to solve these problems. The fine-grained quality of the high school students in the big data system is presented to the corresponding subjects. It is preliminarily conceived that the comprehensive quality evaluation system is constructed under the background of big data to provide a revelation for the evaluation of the comprehensive quality of high school students. Keywords: Big data  Comprehensive quality evaluation students  Technological changes

 High school

As an important basis to differentiate quality education from exam-oriented education, students’ comprehensive quality evaluation has achieved a certain degree of development. In 2014, the State Council promulgated the “Implementation Opinions on Deepening the Reform of the Examinations and Enrollment System”, and re-confirmed the status of the three major sections of the national unified examination, academic level examination and comprehensive quality evaluation. The Ministry of Education has successively introduced “opinions on strengthening and improving the comprehensive quality evaluation of ordinary high school students”, including the five evaluation contents of ideological and moral character, academic level, physical and mental health, artistic literacy, and social practice. Under the guidance, other provinces and cities have also issued their own “local versions” by combining with the pilot demonstrations in Shanghai and Zhejiang Province. So far, the exploration and discussion on the comprehensive quality evaluation have been spurred to prepare the establishment of a modern education examination enrollment system with Chinese characteristics in 2020. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 478–485, 2021. https://doi.org/10.1007/978-3-030-51556-0_69

The Design of Comprehensive Quality Evaluation System

479

At the same time, data mining and analysis technology is becoming more mature, big data technology and cloud computing are making great strides toward various industries. In this context, the quality evaluation of high school students may be able to explore greater breakthroughs in methods and technologies.

1 The Analysis of the Three Major Misunderstandings and Problems Faced by High School Students in Comprehensive Quality Evaluation In fact, the inclusion of comprehensive quality evaluation in the scope of reference for further studies provides support for the legal logic and institutional design of educational equity, but it weakens the meaning of evaluation. In the long run, it will lead to the the dilemma of connotation giving way to extension. In order to bring order out of chaos, it’s necessary to define the connotation of high school students’ comprehensive quality evaluation and get out of three misunderstandings. 1.1

Going Out of the Three Major Misunderstandings of the Comprehensive Quality Evaluation of High School Students

1.1.1

The Value of the Comprehensive Quality Evaluation Is Promoted by Evaluation, Not the Scale of Reward and Punishment In addition to being an evaluation method, comprehensive quality evaluation is an concept, which represents the basic value orientation of the quality education. The essence is the evaluation of personality development, which is also the evaluation of authenticity, the process and the internal [1, 2]. Therefore, the fundamental purpose of comprehensive quality evaluation is to promote high school students through evaluation. In reality, it is extremely easy to enlarge its reference function, get into the wrong area of evaluation, and even appear “moral show”. 1.1.2

The Evaluation Content of Comprehensive Quality Evaluation Can Be Quantified, Not All Be Subjective According to the analysis and practices of relevant localities and policy, it can be seen that the Ministry of Education and other regions have a great similarity that comprehensive quality is understood as “non-academic ability performance” [3]. In reality, the evaluation of many schools is actually formalistic. The most important reason is that the quantification of non-academic ability is impossible, and there are even some comments that are too subjective. What we lack is a kind of visual means that can collect the comprehensive quality of high school students. 1.1.3

The Evaluation Period of Comprehensive Quality Evaluation Should Break the Semester System and Be Continuous and Real-Time In most cases, comprehensive quality evaluation is often conducted at the end of a semester, which is another misunderstanding. High school students’ moral, physical, aesthetic education and intellectual education are carried out and developed at all times. It is obviously unreasonable that the evaluation of morality development must be

480

X. Zhang and X. Ge

carried out at the end of the semester. In fact, it is possible to collect data and store them for the final evaluation instead of review something from 100 days ago and give subjective points by taking a test form with teacher. In fact, if you get out of the three misunderstanding, it will be found that the comprehensive quality evaluation should be the same as the academic evaluation, and can be carried out from time to time, and it can be used to guide thee student standard. It will be able to collect and analyze these seemingly subjective information after the technology has developed to a certain extent. 1.2

Problems Faced by High School Students in Comprehensive Quality Evaluation

1.2.1

The Method of Comprehensive Quality Evaluation Is Still Single and Rough At present, the most versatile and widely used evaluation method is the examination. The forms of examinations are constantly being refurbished, but the contents of the examination papers are still focused on subject knowledge. It is roughly reflected in the parents’ notice at the end of the period based on the vague impression of teachers and classmates, or relied on forms which lack of objective factual basis and evaluation criteria. It is the single and rough method that leads people to fall into the misunderstanding that “the comprehensive quality is difficult to quantify”. 1.2.2

The Comprehensive Quality Evaluation Is Lack of Differentiated Systems and Means The comprehensive quality evaluation is the most all-round summary and evaluation of the students including the academic achievements. Although the viewpoint of teaching students in accordance with their aptitude has been widely recognized from the feedback of most frontline teachers, the implementation is not ideal. Nowadays, in most schools, especially in underdeveloped areas, teachers’ evaluation seems to be based on a specific template. The interest orientation is ignored. The fundamental reason is that the differential teaching is not realized. A lack of the differential evaluation of the multiple indicator system and individual evaluation media for different students greatly reduce the degree of differentiation. 1.2.3

The Feedback of the Comprehensive Quality Evaluation Results Poorly Operates and There Is no Continuous Tracking to the Improvement Effect As mentioned above, the purpose of comprehensive quality evaluation is not only a basis for further study, but to help students improve. However, the actual situation is that most of the evaluation results do not make sense due to the thick lines and low discrimination. The paper written with suggestions is only a homogenized “notice”. In addition, its improvement effect also lacks a tracking mechanism. Taking physical and mental health as an example, it was suggested that a student should consult a psychologist to relieve mental pressure in the feedback of a certain evaluation. The student did as suggested, but his psychological state after receiving the consultation was no

The Design of Comprehensive Quality Evaluation System

481

longer questioned, the next comprehensive quality evaluation seems to be a new one. We should concern about incremental information of comprehensive quality.

2 Big Data Technology Provides Solutions for the Comprehensive Quality Evaluation of High School Students In the practice of education for more than ten years, the implementation effect of the comprehensive quality evaluation is not satisfactory. The fundamental reason is the lack of evaluation data acquisition, analysis and storage and other technical means. The arrival of the era of big data makes establishment of a dedicated large database an inevitable trend. Under the platform of Internet of Things and cloud computing, it is expected to provide solutions in comprehensive quality evaluation. 2.1

Data Mining and Analysis Technology Make Comprehensive Quality Evaluation More Comprehensive and Precise

Educational data mining technology has a long history. It refers to the development, research, and use of computer application technology to discover potential patterns that exist behind large-scale educational data [4]. In the era of big data, the best strategy to correct the “only fraction theory” is to collect and give weight to other aspects that can not be collected before. We can use adaptive learning system to monitor high school students’ learning process data, collect feedback data and other available information from students management system [5]. Because the stored data is well-received and targeted, it can carry out the evaluation for specific links and problems and feed back the evaluation results. 2.2

Big Data System Makes the Comprehensive Quality Evaluation Different

The concept of comprehensive quality is a combination of “certainty” and “non certainty”. There is a logical paradox and a suspicion of “unmatchability” among students [6]. Therefore, the comprehensive quality evaluation should be different. It can not be clearly expressed and covered simply by numbers and grades. It is not reasonable to rank the ideological and moral character and artistic accomplishment of high school students. However, if a system based on personalized design is generated, all traces of high school students in knowledge learning will be collected, such as the web page records which can be analyzed about his recent psychological state and emotional attitude [7]. With the emergence of big data tools, the evidence will inevitably reduce the homogeneity [8]. 2.3

Feed Back Timely and Incremental Development Can Be Quantified

With the help of big data tools, the comprehensive quality evaluation feedback form will become effective. For high school students themselves, they can know the mastery

482

X. Zhang and X. Ge

of their academic knowledge in time in the system. The evaluation sheet will also be fed back to teachers, parents, school managers, etc., so as to take necessary auxiliary by relevant subjects. For example, according to a student’s recent online shopping information to monitor the living expenses. In addition, the big data system has a powerful data storage function, and the feedback sheet of each period will be saved to facilitate the comparison of the next period and get the increment. To sum up, in order to break the situation of rough line and homogeneity, it is necessary to refine the information and data reflecting the comprehensive quality of high school students, collect and analyze them, form a differentiated and available evaluation form, feed back to the corresponding subjects. Above is the big data technology which is expected to be comprehensive and helpful for quality evaluation. The comprehensive quality of students embodied in offline behaviors can be found online. For example, big data means can collect and sort out a student’s comments on specific events in the forum or log, reflecting his ideological quality. Based on big data system, it will greatly promote students’ academic level through intelligent functions such as mouse pause time, video review times, summary of wrong question types. In 2014, the Federal Ministry of Education published a milestone report entitled “Promoting Teaching and learning through education data mining and learning analysis” which makes an important elaboration [9]. In terms of physical and mental health, the pedometer and heart rate software on mobile phones can be the data collection plate [10]. The same is true of artistic accomplishment and social practice.

3 Preliminary Design of Comprehensive Quality Evaluation System for High School Students Under the Background of Big Data The comprehensive quality evaluation system is currently used and operated in most schools, but through the analysis of some schools in Beijing, Chengdu, Chongqing, Hebei and other provinces, it was found that the current evaluation system has two common characteristics. First, the evaluation uses a regular and task-oriented evaluation. Second, the direct evaluation method is adopted, that is, the relevant party performs scoring for a certain student. Under the background of big data, the design logic of the comprehensive quality evaluation system will be changed. It will no longer be similar to a questionnaire and reveal the comprehensive quality with reliable “evidence” [11]. Simultaneously, Big data collection, analysis, and feedback are all immediate, not a fixed time focused on the exam. The computer will evaluate it from time to time and feed back the results to relevant subjects, which guarantees the evaluation goal of “Student-oriented”. The high school students comprehensive quality evaluation system based on big data is not a simple evaluation scale but a complete closed loop covering the entire evaluation process. Under the guidance of system design theory, this system is initially designed as shown in Fig. 1.

The Design of Comprehensive Quality Evaluation System

3.1

483

Five Subsystems

3.1.1 Evaluation Target System The goal of the comprehensive quality evaluation of high school students should focus on the five major sections and decompose the targets. But overall, the goal here can only be the class of expected goal, and especially the Ideological and moral character and artistic literacy are endogenous, which is impossible to set the amount of progress in Ideological and moral character as the amount of task is completed. However, some aspects of academic level, physical and mental health, and social practice can be set with more detailed goals. 3.1.2 Online Conversion System The data of the five major content sections of high school students’ comprehensive quality can’t be completed by high school students at a specific time like standardized test. Whether it happens or not is contingent, random and uncertain. The comprehensive quality of high school students is reflected in a series of offline activities. it must go through online transformation system that converts offline thinking, actions, and ideas into online information. For example, a student had some thoughts about the group fight in his class, then he may record in his journal. 3.1.3 Data Mining and Analysis System In a certain period of time, data collection, purification, and statistical modeling are started under the operation of specific algorithms and programs, And through the artificial intelligence process of machine learning, valuable data materials are generated and stored to use in the next step of data analysis. 3.1.4 Evaluation and Analysis System The data of the data mining and analysis system is imported into the rating analysis system, where the data Processing is completed, and the “finished products” are input into the current data disk. It shows the status of the ideological and moral character and academic level of this particular student within this specific time interval. At the same time, by comparing the current value with the value of the historical data disk, we can get the change degree of the comprehensive quality of high school students, which is displayed in the development value-added display disk. 3.1.5 Evaluation Feedback System In the evaluation and analysis system, a evaluation form is formed, which is timely pushed to relevant subjects according to the actual situation. First of all, it is necessary to do an internal feedback to the student. At the same time, it is pushed to different subjects such as teachers, parents, peers, school administrators, etc., so that they can effectively intervene and guide the students within their respective responsibilities. It is also necessary to track and input the improvement effect after feedback into historical evaluation data disk.

484

3.2

X. Zhang and X. Ge

System Operation

The five subsystems run in the order as shown in Fig. 1, and form a comprehensive quality evaluation loop for high school students with the actual time interval.

self-adaption

Academic level Physical and mental health

Statistical modeling fine-grained quality

develope

artistic literacy Student A

purify

Collect

Ideological and moral character

Big data Machine learning

continuance storage

social practice

Evaluation Target System

Online Conversion System Uniformity

Feedback effect tracking

Evaluation Feedback System

Import

Historical evaluation data disk

Internal feedback system Intervention power system

Data Mining and Analysis System

Send

Current dashboard Development value-added display disk

Evaluation and Analysis System

Fig. 1. Comprehensive quality evaluation system of high school students based on big data

4 Conclusion To understand the comprehensive quality evaluation of high school students, the first thing is to step out of three misunderstandings, and realize the values of studentcentered comprehensive quality evaluation, quantifiable facts and the necessity of continuous records. There are still some problems in the current comprehensive quality evaluation, such as single and rough means, serious homogenization, and untimely feedback. The root cause of these problems is that the lack of technical means. The arrival of big data era provides a new solution to these problems. It changes the design logic of the comprehensive quality evaluation system. As scientist Bruno said, “technology is the best way to make people brave.” All the offline behaviors of high school students will be transformed into online information, and all the “traces” he left on the Internet and the “information” recorded by others will be mined, integrated and analyzed. With the development and deepening of the Internet of things, as the network aborigines growing up under the information technology

The Design of Comprehensive Quality Evaluation System

485

revolution, each high school student will be symbiosis with the network. In the long run, the world’s big data will be in-depth in the future. The comprehensive quality evaluation of high school students will be promising.

References 1. See Wiggins, G.: Educative Assessment. Jossey-Bass, San Francisco; Eisner, E.W.: Reshaping assessment in education: some criteria in search of practice. J. Curriculum Stud. 25(3) (1998) 2. Li, Y.: On the nature of comprehensive quality evaluation. Res. Educ. Dev. 33(24), 58–64 (2011). (in Chinese) 3. Cui, Y., Ke, Z.: A study on the comprehensive quality evaluation of senior high school students. Glob. Educ. 39(9), 3–8 + 12 (2010). (in Chinese) 4. Romero, C., Ventura, S., Pechenizkiy, M., et al.: Handbook of Educational Data Mining. CRC Press (2010) 5. Koedinger, K.R., Cunningham, K., Skogsholm, A., et al.: An open repository and analysis tools for fine-grained, longitudinal learner data. In: First International Conference on Educational Data Mining, pp. 157–166 (2008) 6. Zhou, X., Zhang, M.: The reform of college entrance examination: “feasibilities” and “difficulties” for high school students’ comprehensive quality evaluation. Glob. Educ. 43(7), 101–111 (2014). (in Chinese) 7. Pinar, W.F., Irwin, R.L.: Curriculum in a New Key: The Collected Works of Ted T. Aoki. Lawrence Erlbaum Associates, New Jersey, p. 143 (2005) 8. Popham, W.J.: What teachers need to know: Classroom assessment, p. 11 (2001) 9. U.S. Department of Education: Promoting Teaching and Learning Through Education Data Mining and Learning Analysis. Office of Educational Technology, U.S. Department of Education, Washington (2012) 10. Guba, E.G., Lincoln, Y.W.: Fourth Generation Evaluation. Sage, Newbury Park, CA (1989) 11. Xiong, Y.: A comprehensive quality evaluation on the college students via DEA. J. Interdisc. Math. 18(5), 640 (2015)

Efficient Teaching Management Based on Information Technology Cuijuan Wei(&) Xi’an Urban Architectural College, Xi’an, Shaanxi 710114, China [email protected]

Abstract. With the rapid development of information technology, teaching ideas, models and methods have undergone profound changes. With the help of information technology, teaching management can achieve teaching objectives with high quality, which is conducive to cultivating students’ information literacy, changing students’ learning style and forming good learning habits. In the aspect of teaching management, information technology is embodied in talent training program, performance evaluation, teaching evaluation, examination management and other major aspects. The construction and application of informationization in school teaching management is an important means of teaching development and construction. In order to promote the reform and innovation of education and teaching, we should lay a solid foundation for the development of education and teaching. In this paper, using the data mining technology, aiming to indicate the environment of Internet information technology rapid development, the current teaching management activities for the utilization of information technology, to clarify information technology promotes the use of promote the important meaning to improve the quality of teaching management, find out the deficiency of the current management mode and needs to be improved, optimize teaching management, put forward with the combination of information technology to further achieve efficient teaching management method of strategy. Keywords: Modern information technology education  Humanistic psychology

 Efficient classroom  Quality

1 Introduction With the progress of The Times, human society has gradually stepped into the information society. At the same time, the combination of education and information technology has developed more and more deeply. At present, information technology is fundamentally changing people’s way of life and work, etc. Information technology is increasingly widely applied in school education management, constantly changing school education, teaching methods and students’ learning methods [1]. The popularization of information technology education is pushing forward the modernization of education. Efficient teaching management will not only affect the development of teachers’ teaching work and the success of school management, but also affect the cultivation © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 486–492, 2021. https://doi.org/10.1007/978-3-030-51556-0_70

Efficient Teaching Management Based on Information Technology

487

and improvement of students’ good learning habits and comprehensive quality [2]. The combination of information technology and teaching management is not a matter of a day, it needs educators and administrators to constantly explore and practice. The application of information technology in teaching management refers to a new teaching method that organically combines the content and form of information technology, information resources, information methods, human resources and management work in the process of teaching management to carry out teaching management in a simple and efficient manner and ensure the high quality of teaching tasks [3, 4]. Into the informationization in the information age, the school teaching management to keep pace, its teaching management has many benefits to the school, on the one hand would help improve management efficiency, to ensure that the work has a higher quality of teaching at the same time can also saves time, targeted, the information technology as a demo tools, communication tools, individual guidance tools [5]. Classroom teaching, on the other hand, information fusion technology, make the teaching content from the abstract to the concrete and intuitive content more rich diversity, then play a resources and environment of information technology and information processing tools, and collaboration tools, so that they can break the traditional education form of inherent, in improving teaching quality and cultivate students’ interest in learning, improve the learning efficiency [6, 7]. Information-based teaching management is conducive to the construction of an efficient new management mechanism, thus playing an important role in standardizing the whole process of teaching [8]. Into the modern information technology to the teaching management, through information management standardization construction, must need to the generation of data resources, information management, the application of standards make specific shows that so as to whether the information in the data collection, data processing, data query, print information data, or information data management more standardized and unified, the maximum to avoid the original education management is not precision and wanton sexual [9]. With the help of information technology, teaching management should adhere to the principle of emphasizing people-oriented and serving people, set up functional departments around the student-centered concept, highlight the responsibilities of all departments, maintain a high level of service efficiency, and carry out management work smoothly [10].

2 Method 2.1

Quality Education Theory

Quality education is an educational theory aiming at improving the comprehensive quality of educatees. Quality-oriented education is the practical requirement of social progress, which cultivates people’s ability to deal with things in a stable and stable manner and to understand the world scientifically and objectively. With the help of the powerful force of information technology, quality-oriented education can make teaching management work better implement the teaching requirements of qualityoriented education theory, so as to promote the comprehensive and healthy development of students and better stimulate their innovative consciousness and ability.

488

2.2

C. Wei

Data Mining Algorithm

The so-called data mining algorithm is a process of processing the acquired data repeatedly. It mainly includes the following procedures: first, collection of teaching information, which is mainly collected information of teaching management objects. It should be pointed out that in this process, appropriate methods must be selected to carry out collection. Second, integrate teaching data, which is mainly to sort out different forms and characteristics of data that meet the requirements, so as to lay a foundation for future data processing. Third, teaching data induction and sorting, through the above two links, there must be a large number of qualified data resources have emerged, because of the huge amount, so it is necessary to summarize and sort the data according to the nature, while maintaining the integrity of the original data, improve the efficiency of data mining; Fourthly, teaching data cleaning, which is to discard the wrong and incomplete information in the obtained data, so as to prevent it from entering the database system and affecting the objectivity of the results. Fifth, teaching data transformation. The teaching information obtained from the database is transformed through the conceptual definition of data. The transformed information will be a necessary key link in the process of data mining. Sixth, teaching data mining, according to the teaching data genetic algorithm, decision tree algorithm to obtain qualified data operation and processing mining, so as to obtain valuable research data; Finally, the result evaluation is to conduct scientific and reasonable evaluation from the perspective of experts for the data information mined. If the obtained data meets the expected result, the process will be terminated; if it does not meet the scientific and rigorous conclusion standard, the source of the problem needs to be found out, and the analysis and processing should be conducted until the result meets the rigor. 2.3

Operation Method

There are many data mining methods for teaching information. This paper USES decision tree algorithm and genetic algorithm to process information. (1) Genetic algorithm Genetic algorithm named inspiration from the biological concept of survival of the fittest, survival of the fittest is its soul. In the research of this paper, its workflow is to integrate educational information and form information groups that are easy to process after integration, so that the data mining algorithm can play a more powerful operation function. Genetic algorithm can be expressed logically as follows: Pðxi Þ ¼

f ðxi Þ N P f ðxi Þ

ð1Þ

i¼1

Genetic algorithm does not exist in isolation, it is often combined with other mining algorithms to play a more effective role.

Efficient Teaching Management Based on Information Technology

489

(2) Decision tree algorithm Main body function of the decision tree algorithm is the generalization of classified data processing, information specific to teaching is the teaching information system, the reasonable classification, and then carried out in accordance with the branch corresponding to the concept of sorting, and from these huge data to find the most valuable information for the spare, gives does not comply with the conditions of information to cut. Its overall process is like a big tree, which can be expressed as: uðxÞ ¼ exp½

ðx  hÞ2  r2

ð2Þ

The advantage of the decision tree approach is that it is efficient, simple to operate, and does not fear large-scale data.

3 Experiment 3.1

Integration Experiment of Information Technology and Teaching Management

The integration of information technology and teaching management, to a large extent, requires managers to change the previous management model, teachers to change the old teaching model, change the past single teaching structure, and use the new, humanistic teaching and management methods, so that teaching becomes interesting and management efficiency is constantly improved. Born in for this, in order to interest the promotion of education idea, meet the demand of modern information education there are many ways of teaching management, such as group cooperation teaching method, situational simulation teaching, small class teaching, flip the classroom teaching method, etc., the different characteristics of the teaching management method has been applied to each big classroom, usage as shown in Table 1. The teaching management mode based on information technology can be elaborated into three stages: pre-class, in-class and after-class. Before class, students log on to the online teaching platform provided by the teacher for independent learning. In this stage, teachers should prepare micro video in advance and build a learning platform, such as publishing pre-class learning guidance and teaching cases on the online teaching platform, and setting up discussion groups and other special sections on the online teaching platform. Teachers should also review students’ homework, sort out the communication content in the discussion group, summarize the knowledge difficulties and difficult problems that need to be solved in class, and carry out the design of teaching activities in class through the learning record tracking function of the online teaching platform after students have completed the task of self-study. In class, internalize knowledge, and under the guidance of teachers, use knowledge flexibly through situational experience based on specific problems exposed in the process of independent learning. After class, students, teachers and parents can contact each other freely, improve the students’ growth dynamics through online or offline communication, and update students’ unique growth plans in time.

490

C. Wei

Table 1. Specific mode of integrating information technology in teaching management Category Group cooperation

Always Often Sometimes Never Scenario simulation Always Often Sometimes Never Micro-teaching Always Often Sometimes Never Flipping classroom Always Often Sometimes Never

Number of institution Proportion 36 40 24 0 33 30 35 2 29 35 20 16 48 21 12 19

0.36% 0.4% 0.2%4 0% 0.33% 0.3% 0.35% 0.02% 0.29% 0.35% 0.20% 0.16% 0.48% 0.21% 0.12% 0.19%

4 Discuss 4.1

Current Situation and Problems of Teaching Management Informatization Construction

Although the school has installed many management tools and built a local area network in the actual management work, many defects are still hidden in some aspects. Through investigation as you can see, the school teaching management informationization level to be promoted, such as in the process of examination management, many schools are still in accordance with the traditional operation, the process management of routinization, failed to show maximum information superiority, simplify this management system couldn’t meet the requirements of the corresponding level. Nowadays, many schools to make sure that the management software of consistent with their own actual situation, tend to choose the information developed by the school internal management system, which began the specific to the student management work, such as students’ basic information management, performance management, and please terminate his/her leave management, etc., although can play a role, but this software inevitably exist in one way or another loophole, hampering the school information management work. Although the school has invested enough resources in the information hardware, the staff of the school are bound by the inherent management mode and concept, and show uncredibility and unseriousness in the information process of the school’s teaching management, which is extremely adverse to the teaching work. This is mainly because some managers do not realize the great role of information technology in university teaching management.

Efficient Teaching Management Based on Information Technology

4.2

491

Teaching Management Information Construction Methods

The development of information technology is an objective choice for the progress of The Times. In today’s information explosion society, mass data must be comprehensively processed and utilized through information systematization. The actual application of information technology means in teaching management is shown in Fig. 1.

Teaching management information application

Student status management

Class schedule

Teaching mode

Assessment

Fig. 1. Application of teaching management informatization

First, the school register management is dynamic. The school register management academic early warning is set as a dynamic and immediate mode, which will remind students throughout the whole academic life. For students who fail to meet the standards in each subject assessment, timely and effectively convey the situation from place to point, reflecting the humanistic care of teaching management. Second, curriculum sharing. The management department should make full use of information technology to enhance the screening, operation and error correction functions of the detailed information system, so as to rationalize and humanize the arrangement of curriculum learning, maximize the allocation of school teaching resources and ensure the stability of teaching order. Third, teaching situation, create interesting teaching situation, lead students to enter the country, change the way of practice after class, to achieve efficient learning. The advantages of information technology teaching can enrich the teaching content. The computer information storage function is powerful, the processing speed is extremely fast, creates the humanized study space for the student, causes the student to be able to make the choice according to own situation self control study progress. Fourth, the assessment is flexible, assessment methods have written test, oral test, practice, learning to master the performance through scores or grades. Through the examination, teachers can understand the students’ learning conditions and make a comprehensive analysis of the examination results, so as to adjust the teaching contents, improve the teaching methods and improve the teaching quality.

492

C. Wei

5 Conclusion The integration of information technology into teaching management has become an irresistible trend of education reform, which calls for high-quality teachers and managers with high abilities. The application of information technology assisted teaching management puts forward higher requirements for teachers and managers. This requirement is not only proficient in computers, but also that teachers should be able to use relevant educational software on the basis of proficient operation of computers, so as to combine software teaching with traditional teaching organically. In the process of the combination of information technology and teaching management, teachers need to have the knowledge of discipline accomplishment, teaching method and educational psychology. More importantly, teachers should also have the consciousness of educational research and the spirit of continuous innovation. This requires teachers to actively participate in teaching research, strive to improve their teaching level, and effectively apply information technology to assist teaching management. Acknowledgement. The key Research Project of Education and Teaching Reform in Shaanxi Province: research on the Optimization of Internal Governance structure based on the improvement of Educational and Teaching quality in Private Colleges and Universities, item No.: 17BG028.

References 1. Lin, W.: Research on the teaching management of track and field web course based on software programming method. Cluster Comput. 17(3), 1–12 (2018) 2. Miller, J.A.: Lessons from management 101: learning to manage ourselves. J. Manag. Educ. 41(1), 105–256 (2017) 3. Xiao, X., Li, Z., Matetić, M., et al.: Energy-efficient sensing method for table grapes cold chain management. J. Clean. Prod. 152(12), 77–87 (2017) 4. Guo, Y.F.: Practical research on the efficient integration of junior middle school mathematics teaching and information technology. China External Educ. 23(31), 166–167 (2019) 5. Ming, S.: The deep integration of information technology and the teaching mode of “le xue efficient classroom”. China Rural Educ. 78(11), 107–112 (2019) 6. Liao, X.H.: Efficient teaching in information technology classroom. Fujian Comput. 34(11), 172–178 (2018) 7. Wang, J.Y., Li, H.Z.: Analysis of information technology to make classroom teaching more efficient. China External Educ. 34(32), 168 (2018) 8. Wang, C.C., Xu, P.: Study on flipped classroom teaching model in universities based on BB online teaching platform—a case study of common teaching methods of information technology courses in middle schools. China Educ. Technol. Equip. 34(14), 14–16 (2017) 9. Duo, C.H.: On the reform of college teaching management under information technology. Comput. Nerds 19(07), 118–128 (2017) 10. Ma, J.X.: Deepening the application of big data and improving the quality and efficiency of teaching management. Think Tank era 56(43), 243–244 (2019)

Discussion of the Higher Vocational English Teaching in the Informatization Digital Network Guolan Yang(&) Chongqing Industry and Trade Polytechnic, Fuling 408000, Chongqing, China [email protected]

Abstract. Since entering the new era, informational teaching has become more and more important. In order to promote English teaching in higher vocational colleges, higher vocational colleges should make full use of multimedia technology and internet information technology to improve the quality of English teaching. This paper discusses the development of English informatization digital network teaching in higher vocational colleges, and discusses the methods of English informatization teaching in higher vocational colleges, aiming to provide some reference for further improving the informatization teaching of higher vocational English. Keywords: Informationization Discussion

 Digital network  Vocational English 

1 Introduction With the rapid development of information technology and the popularization of information products, information technology with computer technology and network communication technology as the core has changed the way students learn and teachers. At present, the application of digital network platform in English teaching has gradually become the mainstream, which makes the content and means of English teaching continue to develop, which promotes the fundamental changes of traditional teaching concepts, and also provides more opportunities for the development of English teaching.

2 The Advantages of English Teaching Informationization 2.1

Importance

English teachers should pay attention to the world’s advanced educational technology, grasp the pulse of the times constantly and at the same time should combine the actual situation of English teaching and develop modern educational technology vigorously. In order to cultivate high-quality talents that is more suitable for the needs of the times, and better contributes to the realization of modernization. Informatization learning is a learning method based on the digital platform of information technology, and it is a © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 493–500, 2021. https://doi.org/10.1007/978-3-030-51556-0_71

494

G. Yang

way of learning by using information technology [1]. The development of information technology has had an essential impact on student learning and teacher teaching methods. e.g. The course of Higher Vocational English, students can not only use information technology to achieve online learning in English, but also self-required learning, improve English comprehensive ability and experiential learning. In the process of teaching, the promotion of information-based learning can improve students’ learning adaptability. In the information environment, students’ enthusiasm and initiative can be improved. 2.2

Advantages

2.2.1 Creating a Good Learning Environment In recent years, with the continuous development of English teaching, English modernization teaching is more and more inclined to realize comprehensive teaching of English skills and methods in the real language environment, and with the continuous development of skills such as reading and writing, how to better training students` communicative competence has gradually become one of the key contents of modern English teaching. To this end, we need to be able to provide a good teaching and learning environment for English teaching. The digital network platform constantly exerts its own advantages and creates a good teaching and learning environment. In addition to providing students and teachers with more accurate and scientific content, the digital network platform can also collect a large number of teaching pictures and teaching materials. To achieve a reasonable creation of the learning environment, and provide systematic support for the students’ self-test, Q & A and discussion [2]. 2.2.2 The Vivid Learning Process The application of the digital network platform not only enables the student’s learning environment to be better optimized, but also enables the continuous enrichment of the teaching image, which is mainly through the vivid reading of content, teaching courses, and textbooks. The display is far more vivid than the singular book teaching in the traditional teaching mode, and it is more easily accepted by the students, and the vivid teaching of the teaching content can be realized throughout the learning process. One of the important advantages of the digital network platform is that it can realize the important basis for further optimization of the traditional teaching mode, and to some extent realize the mobilization and stimulation of the students’ enthusiasm for learning. All in all, in the pure teaching optimization using the digital network platform, the learning process of the students can be more vivid, and even have an immersive feeling, which can better achieve the connection optimization of the learning content and the scene. In the end, it will promote the continuous development and progress of students’ comprehensive ability, including the most important communication skills [3].

Discussion of the Higher Vocational English Teaching

495

3 Problems of Higher Vocational English Teaching Higher Vocational English is a basic course for higher vocational colleges. It is not only a language skill course, but also a cultural quality course. It is mainly to teach the basic language ability of English as the main task, and to cultivate students’ comprehensive ability of listening, speaking, reading, writing and translating in the working environment. At present, English teaching in vocational colleges has the following problems: 3.1

Lacking Attention to English Learning

Higher Vocational English is a public course rather than a professional course, which some students pay less attention to English learning. They unilaterally believe that they only need to learn professional courses and have a coping attitude towards English classes [4]. 3.2

No Kept Up with the Development of the Digital Age

In the process of classroom teaching of Higher Vocational English, some teachers still use the traditional teaching mode as the main, assisting with certain multimedia means. However, multimedia classrooms can achieve teacher-student interactions to a certain extent, but it can only be restricted to a fixed place, a fixed location, and a fixed way. The interaction between teachers and students is not flexible and simple. Teachers teach knowledge in the classroom, and students’ digestion and absorption are mainly strengthened through written assignments. This singular, fixed, and programmatic teaching method is difficult to stimulate students’ enthusiasm for English learning [5].

4 English Teaching Mode of Information Digital Network Platform 4.1

Infrastructure Construction of Information-Based Teaching

First of all, build its own modern information technology education platform, and expand the coverage of English course teaching management through this modern information technology education platform, not only in the classroom and the usual English course education activities, but also the students’ education management activities. Infiltrate into the life of every student. Using its own modern information technology education platform, through this platform, education and management personnel can better communicate the teaching knowledge of English courses, and even through daily activities, can better cultivate students’ organizational awareness [6]. 4.2

New Teaching Design Concept

English teachers must first establish a new concept of higher vocational education and teaching concepts, so that the teaching content and methods of the course fully reflect

496

G. Yang

the characteristics of higher vocational education. Guided by the teaching objectives of English courses in higher vocational education, the students will truly improve their language skills and social adaptability, and achieve zero-distance employment. At the same time, we must also realize that digital courses are not the same as micro-courses or micro-course videos. It refers to relying on paper textbooks, digital network platforms and mobile terminals to help students develop self-learning and teachers to conduct online courses online and offline. 4.3

Identify Teaching Reform Goals

The presentation and implementation of the teaching model aims to achieve specific teaching goals. This course combines various professional talent training programs, with the aim of theoretical sufficient and practical application, aiming at workplace communication, and cultivating students’ practical ability to apply English according to professional needs, and opening industry English for follow-up, such as; logistics English, exhibition English, hotel English, travel English and other lay a good language foundation, in order to enhance students’ employment competitiveness, and lay a good foundation for future sustainable development. The English teaching should unify the ideological understanding, clarify the objectives of curriculum reform, and carry out the requirements of knowledge transfer, skill training, ability training, mobilizing students’ enthusiasm for learning and cultivating independent learning ability throughout the process of teaching and learning. To achieve the ultimate goal of curriculum teaching, to meet the requirements of improving students’ English application ability and English related professional ability [7]. 4.4

Building a New Type of Teacher-Student Relationship

The teaching mode of Higher Vocational English with informative digital network combines traditional classroom teaching methods with the use of audiovisual media teaching methods; traditional teacher single teaching methods combined with computer-assisted teaching methods; cooperative learning methods among students combined with the student’s independent learning style. It not only draws on the advantages of digital course interest, interaction, personalization, rich resources, and diverse evaluation, but also retains the advantages of traditional classroom knowledge construction groups and emotional interaction between teachers and students. Teachers play the role of the leader and the teaching resource developer in the new teaching mode. The teaching also changes from the single subject of the teacher to the two subjects of the teacher and the student. 4.5

Teaching Model Change Requires Support Conditions

Different eras, the difference in external environment and conditions will have a profound impact on the implementation of the teaching model. The digital hybrid English teaching model has very high requirements for teaching equipment, teaching resources and teaching environment. Teaching equipment is the basis of teaching activities, including the coverage of campus networks, the provision of digital classrooms, and

Discussion of the Higher Vocational English Teaching

497

the establishment of teaching information systems, and so on. Digital teaching resources refer to multimedia and network resources that can be re-created by teachers and can be applied to new teaching modes. On the basis of the existing teaching resources reserve, teachers need to update and transform the teaching content, improve the teaching resources such as electronic lesson plans, multimedia courseware, problem solving library, test question bank, video teaching, etc., and further collect supplementary materials related to the course. Produce and upload to the course website, and write school-based textbooks and supplementary materials for classroom teaching [8].

5 Strategies of English Teaching in Informative Digital Network 5.1

Enhancing the Digital Ability of Teachers

The quality of education, the quality of the faculty and the level of enthusiasm are the key. In the teaching of the informative digital network platform, in addition to mastering the basic teaching knowledge, teachers must also have the corresponding digital capabilities. First of all, through training, teachers can master multimedia use technology, courseware production technology and network technology. Secondly, through the observation class and other means, the new teaching mode can be practically felt, from imitation to use to innovation; [9] Support teachers to participate in various educational research meetings and various academic exchange activities, actively exchange teaching experience, learn from excellent teaching ideas and teaching methods, and use and promote them in a practical manner. 5.2

Rich Three-Dimensional Digital Teaching Resources System

Informatization digital networked English teaching resources construction requires interactive design of traditional paper textbooks. With the help of Flash, Photoshop and other development tools, students can have a more intuitive understanding of the teaching content, and can use mobile terminals to go offline anytime, anywhere. Learning provides more possibilities for independent learning. The establishment of a rich three-dimensional digital vocational English teaching resource system can start from the following aspects: First, upgrade existing English teaching resources, and present richness and diversity in content. For Higher Vocational English, a curriculum that combines history, geography, politics, science and technology, society, and art, will strive to infiltrate multidisciplinary knowledge into thematic teaching so that students can acquire language foundations. At the same time, it also draws on humanities knowledge, enhances knowledge, and guides students in the classroom on some social phenomena, so as to teach and educate people. Establish resource sharing and support mechanisms with other institutions to ensure the comprehensive development of digital vocational English teaching resources and advance with the times.

498

5.3

G. Yang

Research and Innovation of Digital Network Teaching Methods

In the context of the digital curriculum, teachers are no longer the only way for students to acquire knowledge, and students’ learning is also changed from passive acceptance to active learning. In the course teaching, we must always adhere to the principle of “student-centered, teacher-led”, return the classroom to the students, create the classroom language practice teaching environment to the maximum extent, improve the practical use of language, and adopt the online and offline teaching mode. At the same time, carry out teaching activities. As shown in Fig. 1.

Teacher Offline Classroom Teaching

Student Teaching Mode of Informatization Digital Network

Teacher Online Digital Platforms

Student

Create a Situation and rrange Tasks;Normative Requirements, Intensive Knowledge; Presentations and eviews;Teaching Feedback and Homework Combination of Theory and Practice, Results display, Mutual Evaluation Publish the Task List;Online Practice and esting;Monitoring and Guidance;Multidimensional Evaluation Learning Plan;Watch Video; Exercises and Tests, Give Feedback

Fig. 1. Teaching mode of higher vocational English in informatization digital network

First, Offline Classroom Teaching Teachers: create situations, simulate communication scenarios, and conduct interactive teaching; arrange tasks, use task-driven teaching methods, case analysis methods, group cooperative learning methods, etc., responsibility to people, and have certain emotional care; Analyze, proficiency and common expression, cultivate students’ communication literacy; standard requirements, strengthen knowledge Q & A testing, conduct classroom exercises and demonstrations, teachers feedback and homework assignments. Students: Knowledge is applied to practice, and the results are presented in small groups. It can be a report, a PPT or a video, and a mutual evaluation of students in the classroom. Second, Online Digital Platforms Teachers: Publish self-learning task lists; publish online exercises and online tests; conduct background monitoring of student learning, and regularly guide online for difficult problems; use multi-dimensional evaluation system to assess final scores. Students: Develop an autonomous learning program; watch instructional videos; complete online exercises and online tests, and provide feedback.

Discussion of the Higher Vocational English Teaching

5.4

499

Formative Evaluation System of English Teaching

The traditional teaching evaluation system places too much emphasis on screening and selection [10], and places too much emphasis on summative evaluation and top-down evaluation. The formative teaching evaluation system introduced by the digital network platform teaching has the following characteristics compared with the traditional evaluation system: First, the evaluation methods are diversified. The formative assessment under the informatization teaching mode is mainly realized through the digital platform, and the content is extensive, including teacher evaluation, peer evaluation, self-assessment and so on. Second, the combination of summative assessment and process assessment reflects continuity. Language testing is not only to assess English knowledge at the end of the period, but also to focus on the ability of students to apply the language in practice, and to take the results of the process assessment as an important part of the final assessment. Through a reasonable teaching website design, the digital platform can record the students’ learning behaviors and processes. The teacher can supervise the students’ learning progress, learning time, academic performance and course completion status at any time, and pay attention to the students’ ability to improve in the English learning process, find and solve problems in a timely manner. Third, the evaluation method is flexible. The digital teaching evaluation system does not set a fixed teaching time, nor does it insist on a unified learning progress and learning content. It is a people-oriented evaluation model, which can set individual learning goals according to students’ own English ability, determine learning tasks, progress and methods, make full use of the digital platform, and comprehensively assess students’ English learning status.

6 Conclusions With the development and improvement of China’s modern information technology, China has officially entered the era of informatization digital network teaching mode, integrating modern Internet information technology into all walks of life, helping to help all industries improve their work efficiency and work quality, therefore, for English teaching, English classes in higher vocational colleges should also keep pace with the times, rationally use resources, combine online and offline mixed teaching, and make students active through continuous innovation and transformation of guidance and teaching models. Active participation in English learning will help to improve the teaching effect of higher vocational English and improve the quality of higher vocational training. Acknowledgement. This paper is the one of the research results of “Improving the English Posts Ability of Higher Vocational Students” in 2017; the project is from Chongqing Municipal Education Commission (Project No. 17SKG281).

500

G. Yang

References 1. Wang, X.: On the application of digital network language lab in foreign language teaching. Educ. Occup. 36, 144–145 (2006). (in Chinese) 2. Jia, G.: Research on the construction of digital language learning environment based on cloud technology network. Fujian Comput. 34(7), 176 + 184 (2018) (in Chinese) 3. Wang, X., Zhou, X.: An empirical study of specialized English teaching based on task-based teaching model. New West 9, 162–163 (2019). (in Chinese) 4. Zeng, C.: Design of higher vocational English network teaching based on digital environment. Campus Engl. 11, 70–71 (2016). (in Chinese) 5. Zhu, W.: Design of college English listening and speaking teaching process based on digital cyber language room. J. Qiqihar Teachers Coll. 3, 111–113 (2017) (in Chinese) 6. Fan, X.: Exploring the effective teaching of community education English course: experiential teaching mode and task-based teaching method. Contemp. Continuing Educ. 37(2), 26–32 (2019). (in Chinese) 7. Yang, S.: Application of task-driven teaching mode in educational psychology. Chin. Foreign Entrepreneurs 11, 169–170 (2019). (in Chinese) 8. Joyce, B.: Teaching Model. China Renmin University Press, Beijing (2014). (in Chinese) 9. Su, Y.: The connotation, dilemma and implementation path of digital English teaching model. Teach. Manag. 9, 102–104 (2017) (in Chinese) 10. Wang, H.: Research on college English test and evaluation based on digital platform. Educ. Teach. Forum 8, 266–268 (2012). (in Chinese)

The Construction of Intelligent Classroom System Based on CC2530 Yue Yang(&) and Dewei Kong School of Information and Control, Shenyang Institute of Technology, Liaoning, China [email protected], [email protected]

Abstract. The intelligent classroom is a new educational mode and modern teaching mean, and it brings new opportunities to the education industry. This paper studied the intelligent classroom, and proposed the application of the control system of the intelligent classroom based on the Internet of things. Using various sensors to collect and transmit information, the system transmitted the information to the upper computer by the wireless way, and compared the collected information with the parameters in the database. Through the integration system, the whole system is more systematic and less repetitive investment. It may reduce the cost of installation and debugging, produce the high quality and low price products, and promote the intelligent classroom management system to be better popularized. Keywords: Intelligent classroom things

 CC2530  Control system  Internet of

1 Introduction The intelligent classroom used various sensors to access the intelligent classroom management system through the module wireless. Through the intelligent classroom experimental platform, students can master the basic theory of Internet of things technology, physical information system identification and perception, computer network theory and technology, data analysis and information processing technology and other knowledge. It had a wide range of professional knowledge in information fields such as communication technology, network technology, sensor technology, and certain engineering application system development, practical ability and scientific research ability.

2 The Design of Intelligent Classroom’s Hardware System As the control center of the system, single-chip microcomputer is mainly used to guide the coordination between peripheral devices, so as to complete the function of system setting. The hardware design of the system adopts modular design, different modules corresponding to achieve specific functions. Finally, each module is overlapped [1], which can reduce the complexity of the system. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 501–507, 2021. https://doi.org/10.1007/978-3-030-51556-0_72

502

Y. Yang and D. Kong

Mq-2 smoke sensor can detect harmful gases in the air, such as propane and hydrogen [2], which is cheap and durable. Mq-2 smoke sensor uses the tin oxide gas of materials to detect the conductivity of tin oxide to low concentration clean air. If there is combustible gas in the air, the conductivity can be increased rapidly [3]. Among the gases detected by the sensor, its sensitivity to hydrogen is relatively high. Based on the advantages of the product, many gases can be detected, which is suitable for various applications. DHT11 is a kind of digital temperature and humidity sensor, which can directly transmit the collected current environmental temperature and humidity data. DHT11 adopts single bus communication. Data acquisition and transmission can only be realized by connecting the I/O port of single chip microcomputer and the communication interface of DHT11, which is simpler than other circuits [4]. The project uses photo resistors to collect light intensity. According to the different spectral characteristics of photo resistors [5], they can be roughly divided into three types: ultraviolet photo resistors, infrared photo resistors and visible photo resistors. The main parameters of the light sensor are as follows: (1) dark resistance and dark current: under a certain voltage, the photosensitive resistance has no light exposure, and the current flow is called dark current. The ratio of voltage to dark current is called dark resistance. (2) sensitivity: the resistance value of photosensitive resistance under the condition of no light irradiation, also known as dark resistance, and the relative change of the ratio between the resistance value (bright resistance) under the condition of light irradiation is called sensitivity. (3) volt ampere characteristic curve: the volt ampere characteristic curve is used to express the relationship between the applied voltage and the photo resist current. For photosensitive devices, the photocurrent varies with the external voltage. (4) temperature coefficient: the temperature has a great influence on the photoelectric effect of photo resist. The sensitivity of most photo resists is higher at low temperature, but lower at high temperature. (5) rated power: the power that photosensitive resistance allows the circuit to consume under certain conditions. As the temperature increases, the energy consumed by the circuit will decrease. The sensor data of the system is converted by ADC0809 as A/D converter [6], and then collected by MCU. ADC0809 is an 8-bit ADC based on the principle of successive approximation [7]. The A/D conversion module is a multiplexer with 8 channels [8]. It locks the decoded signal [9] according to the address code and selects only one 8-channel analog input signal for A/D conversion [10]. The intelligent classroom management system consisted of three parts: the main control core (CC2530), the environmental monitoring part (various sensors) and the environmental regulation part (various peripherals). Through temperature and humidity sensor, infrared sensor, gas sensor, photosensitive sensor, RFID tag, card reader, sensor gateway and so on, the system is equivalent to the skin and facial features of the Internet of things. Its main function is to identify objects and collect information, which is similar to the function of skin and facial features in human body structure. It solves the problem of data acquisition in the human and physical world. Firstly, it collects data

The Construction of Intelligent Classroom System Based on CC2530

503

of external physical world through sensors, RFID tags and other devices, and then transmits data through ZigBee wireless communication technology. The system architecture is shown in Fig. 1.

Fig. 1. The system architecture

The intelligent classroom control system is developed by CC2530. It has three different memory access buses (SFR, data and code/XDATA) to access SFR, data and main SRAM in a single cycle. It also includes a debug interface and an 18 input extended interrupt unit. The interrupt controller provides 18 interrupt sources, which are divided into six interrupt groups. Each group is related to four interrupt priorities. When the device returns from idle mode to active mode, an interrupt service request will also be issued. The driving circuit part controls the operation of each electrical appliance by outputting high and low level through the port of CC2530.

3 The Design of Intelligent Classroom’s Software System The software system of the intelligent classroom is mainly divided into the following nine sub modules: teaching system, display system, lighting control system, personnel attendance system, central control system of the intelligent electrical appliances, door and window monitoring system, intelligent security control system, health examination system and remote management system. 3.1

Server

First, confirm that you have the correct template for your paper size. This template has been tailored for output on the US-letter paper size. If you are using A4-sized paper, please close this template and download the file for A4 paper format called “CPS_A4_format”.

504

Y. Yang and D. Kong

The PC server port of the intelligent classroom management system, as the core equipment of the whole set of equipment, has the choice of opening and closing the server, the display of data received by the sensor, and the transmission of remote Android data. It can form a line chart for each data according to the data detected by each sensor, which is displayed in the computer interface. The PC server can check the data of the sensor, and click to open the serial port to realize temperature and humidity detection, light intensity detection, smoke detection and thermal infrared detection. At the same time, it can also control the electrical appliances linked to the nodes. When the user presses the interface button, the PC terminal will send the action event through the serial port to obtain the corresponding processing results of the CC2530 node. At this time, the electrical appliances connected with the node are opened. When the user clicks the “door lock”, “air purification” and other buttons, the electrical appliances will be in different working states. Mobile phone and MCU hardware communicate through WiFi module, because WiFi module uses TCP/IP protocol stack, socket of TCP protocol can be used as the transmission bridge between hardware and software, so mobile software can communicate with MCU hardware and transmit data. Android mobile terminal is communicating with WiFi module in socket of TCP protocol. Before socket communication, access to the mobile network must be enabled, and then the network permission of the application program can be set to connect with Wi-Fi module, and finally connect to WiFi module. The main codes of the socket communication process are as follows: (1) Create a socket object and specify the IP and port number of the server. socket = new Socket (IP.getText().toString(), Integer.parseInt(PORT.getText().toString())); (2) Create input and output flow objects. in = socket.getInputStream(); OutputStream outputstream = socket.getOutputStream(); The main functions of socket communication process are as follows: The startsocket function opens the sub thread of socket communication, and then passes two handler objects to the sub thread. One handler object passes commands between the main thread and the sub thread, and the other sends the received data from the sub thread to the main thread. The run function is the inherited child method in the child thread socthread. The socthread inherits the thread. After the program calls the start method, the thread executes the run method. The run method exists throughout the life cycle of a thread. In this way, the data in the WiFi module is collected circularly. Then the handler is used to transfer the data to the main thread, in which the data is processed and displayed in real time, and then saved to the database. The connect function is used to establish a socket connection. Create a socket image, and specify the server IP and port number, ip192.168.4.2, port number 1819. Create a print writer object, output the instructions sent to the WiFi module, and create a buffer reader object input to receive the data sent back from the WiFi module. The send function is used to send data from the mobile terminal to the WiFi module. The command is mainly to start and stop the fan control operation, and use the

The Construction of Intelligent Classroom System Based on CC2530

505

handler to return the successful signal to the main dispatcher, so that the user can check whether the information is sent successfully. The WiFi module sends the monitored data to the single-chip microcomputer program through the socket method. The single-chip microcomputer first matches the received data and checks whether it is the correct data. If it is the correct data, it will be sent to the corresponding Edit Text for display and saved to the database. The temperature and humidity data collection, judgment and processing procedures are as follows: String result = msg.getData().get(“msg”).toString(); a = result.substring(0, 1); if (a.equals(“T”)) { edittemp.setText(result.substring(1, 3) + “C”); edithumi.setText(result.substring(3, 5) + “%”); 3.2

Android Mobile Terminal

In this system, Android mobile terminal is the terminal of human-computer interaction of the whole monitoring system, and Android mobile terminal is also the client of TCP protocol transmission. Android mobile app is responsible for sending control instructions to MCU and collecting the monitoring data sent by display hardware. The system connects with WiFi module through mobile terminal and sends control instructions to Wi-Fi module. After receiving the control command from the mobile terminal, the WiFi module forwards the command to the MCU of the serial port. After receiving the instructions from the mobile phone, the MCU controls the ADC to execute the instructions, and then sends the collected data back to the mobile phone. The mobile terminal is used to display the collected data. The system is designed to set a fixed temperature threshold value on the interface. When the data returned by the temperature and humidity module is greater than the threshold value, the software terminal will issue control instructions, and the motor module will start to cool down the dormitory environment. When the formaldehyde, smoke and other data exceed a certain standard value, the system will alarm through the buzzer, Display the data and keep it in the database designed by the mobile terminal. The user checks the data detected by the sensor node and the status of electrical appliances through the “intelligent classroom management system” mobile software app installed on the Android mobile platform. Click the start server on the PC side, and the server will display the IP address. We can enter the server address on the Android mobile platform to realize the connection, and the function is the same as that on the PC side, so we will not repeat here. At the same time, it can be adjusted according to the state of electrical appliances. Such as the switch of control lamp, control all kinds of electrical appliances (projector, air conditioner, curtain, door lock, lamp, fan, door), etc. Click the start server on the PC side, and the server will display the IP address. We can enter the server address on the Android mobile platform to realize the connection. The function is the same as that of the PC side, so we won’t go into details here. After that, open the serial port to select the COM port and start the server, open the gateway node, that is, automatically refresh the data detected by the sensor and display it in the computer terminal. At this time, you can view the data detected by each sensor

506

Y. Yang and D. Kong

node, and draw a line graph in the lower window. At the same time, you can click the projector control system, air conditioning control system, intelligent door control system, intelligent curtain system, door lock, air purification and other switch buttons on the software interface to control the electrical appliances linked to each node. Android provides and designs a SQLiteOpenHelper class to enable users to manage database information more flexibly. Through this class, the database can be created and upgraded. At this point, a database named dormitory is created in the system. At the same time, we can control the device through Android mobile software. First, put the mobile phone and the computer terminal server in the same LAN. Link the server by inputting the IP address of the computer terminal in the mobile terminal. After the link is successful, the whole set of equipment can be controlled at the mobile terminal, such as checking the data detected by the sensor node, controlling the working status of the projector, air conditioner, curtain, door lock, light, fan, door and other electrical appliances.

4 Conclusion The empirical research shows that the system has the advantages of high maintainability, simple installation and operation, wide range of application, mutual correlation and coordination among systems, higher efficiency than the independent work of a single system, and can achieve integrated control at the same time. The core of the system is controlled by a mature single-chip microcomputer, which has simple circuit structure, low power consumption, reliable control and low cost. Compared with the existing system, it has a great advantage in reliability price. Acknowledgment. Fund Project: Research on Key Technologies of Intelligent Logistics System Based on Multi-Agent (SIT-i5201801).

References 1. Akkaya, K., Younis, M.: A survey on routing protocol for wireless sensor networks. Ad Hoc Netw. 3(3), 325–349 (2005) 2. Mottola, L., Picco, G.P.: MUSTER: adaptive energy-aware multisink routing in wireless sensor networks. IEEE Trans. Mob. Comput. 10(12), 1694–1709 (2011) 3. Gupta, P., Kumar, P.R.: Critical power for asymptotic connectivity in wireless sensor networks. In: Proceedings of the 37th IEEE Conference on Decision and Control. Tampa: IEEE, pp. 1106–1110 (1998) 4. Sridhar, P., Madni, A.M., Jamshidi, M.: Hierarchical aggregation and intelligent monitoring and control in fault-tolerant wireless sensor networks. Syst. J. 1(1), 38–54 (2007) 5. Fan, K.W., Liu, S., Sinha, P.: Dynamic Forwarding over Tree-on-DAG for scalable data aggregation in sensor networks. IEEE Trans. Mob. Comput. 7(10), 1271–1284 (2008) 6. Ding, D., Cooper, R.A., Pasquina, P.F., et al.: Sensor technology for smart homes. Maturitas 69(2), 131–136 (2011)

The Construction of Intelligent Classroom System Based on CC2530

507

7. Baronti, P., Pillai, P., Chook, V.W.C., et al.: Wireless sensor networks: a survey on the state of the art and the 802.15. 4 and ZigBee standards. Comput. Commun. 30(7), 1655–1695 (2007) 8. Avadikia, P., Tabatabaeefar, A., Omid, M.: Evaluation of intelligent greenhouse climate control system, based fuzzy logic in relation to conventional systems. In IEEE International Conference on Artificial Intelligence and Computational Intelligence (AICI’09), pp. 4:146– 150 (2009) 9. Specification Z B. ZigBee Alliance, p. 558. http://www.zigbee.org (2006) 10. Ha, J.Y., Park, H.S., Choi, S.: EHRP: enhanced hierarchical routing protocol for zigbee mesh networks. Commun. Lett. IEEE 11(12), 1028–1030 (2007)

Development Method of Japanese Translation Teaching Assistant Platform Based on Information Technology Xiaoxu Xu(&) Jilin Engineering Normal University, Changchun 130052, Jilin, China [email protected]

Abstract. The reform of Japanese translation teaching needs to keep pace with the times and introduce new elements and means. The purpose of this paper is to study the development of Japanese translation teaching assistant platform. This paper discusses the introduction of Japanese translation teaching auxiliary platform in the process of translation teaching. From the platform development environment to the development method of the platform. The development of the system is based on Java Web technology, combined with MySQL, elastic search, Hadoop storage, spark flow computing, in CentOS platform, to achieve three-tier architecture of functional applications. Combined with the experiment, the recognition of new sentences by the translation memory of Japanese translation teaching assistant platform is tested. The experimental results show that 33% of the samples match 68%–75% when the number of translated words input to the Japanese translation teaching assistant platform reaches more than 10000. Japanese translation teaching assistant platform plays an auxiliary role in the accumulation of a certain translation memory for scientific and technological Japanese translation, and this auxiliary role will be strengthened with the increase of translation practice of translators using Japanese translation teaching assistant platform. Keywords: Japanese translation platform  Translation memory

 Java Web technology  Teaching assistant

1 Introduction Translation is a complex work, which includes not only the language conversion between the source language and the target language, but also the conversion of religious, humanistic, geographical, historical and other cultural knowledge and values involved in the source language [1, 2]. Japanese and Chinese are two different languages, which contain the cultural values of two different nations. Therefore, for Japanese translators, they should not only have a detailed understanding of the characteristics of the two languages, but also have a wealth of non-verbal information resources [3]. Therefore, in the information age, the existence of network information resources provides a rich and powerful information resource reserve for Japanese translators [4]. Learners often get rich learning resources through the network, enter the network, virtualization, internationalization, personalized education, and start to build © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 508–513, 2021. https://doi.org/10.1007/978-3-030-51556-0_73

Development Method of Japanese Translation Teaching Assistant

509

their own lifelong learning system [5–8]. Therefore, network information resources have become an indispensable auxiliary means for translators in the process of translation. Network information resources not only improve the translation efficiency and quality of Japanese translators, but also make information acquisition and retrieval more simple and convenient [9]. The reform of Japanese translation teaching needs to keep pace with the times and introduce new elements and means. Japanese translation teaching assistant platform is one of them [10]. Boot, Peter introduced the Dutch translation of the dictionary as part of the LIWC 2007 edition. It describes and explains the LIWC tool and compares Dutch and English dictionaries on a parallel text corpus. Dutch and English dictionaries show similar results in both languages, except for a small number of parts of speech. The word number correlation coefficient of the two languages is from high to high, while the influence of word number difference is from low to medium [11]. Mahnaz Mahmoudi Ravesh aims to explore the success of Iranian translation students’ understanding of interlanguage pragmatic features. The results show that students’ learning and memory are lack of characteristics in the university context. The results show that ILP features are effective in improving the interpretation ability of Iranian students. Integrating ILP features into their courses in an attempt to provide a more effective learning and teaching environment [12]. This paper focuses on the configuration of the development environment and the selection of the platform database. The application of elastic search engine based on Lucene in the system. Based on Java Web technology, MySQL database, message middleware (MQ) and spark flow computing, a web page operation interface is realized. Through computer browser and mobile device browser, the translator can visit the home page to display the operation interface, avoiding the shortcomings of the translator’s own purchase and installation of translation software. The system function test and server performance stress test of Japanese translation teaching assistant platform are carried out.

2 Proposed Method 2.1

Platform Development Environment

The development environment configuration of translation collaboration and sharing platform is shown in Table 1. Virtualenv’s biggest feature is to ensure the purity and independence of the development environment and avoid disturbing the development process due to the copy and version conflict of the third-party package. MySQL relational database is selected for the construction of platform database. The background management framework does not choose the automatic management component admin provided by Django, but the third-party management component Xadmin with better performance for the rapid construction of background.

510

X. Xu Table 1. System development components Development tool type Operating system Main development languages Integrated development environment Relational database Web development framework Middleware Virtual environment Background management component Asynchronous task component

2.2

Tool name Mac OS Mojave Python Pycharm MySQL Django Redis Virtualenv Xadmin -Celery

Version number 10.14 2.7 2019.1.1□ 5.8 2.1.0 5.0.4 16.4.1 2.1.0□ 4.0.2

Platform Development Structure

According to the principle of high cohesion and low coupling in software engineering design and the actual functional module division of the system, the project file should be divided into two parts: the core folder and other folders related to the project business process, which are business core apps, templates, translation colla, static, other apps, upload media, manage.py, etc. the function configuration of each folder is briefly introduced in the following order. (1) Translation Colla: the main control folder of the project. The default configuration file includes the following: 1) Project initialization file; 2) Url.py, the routing distribution file, which forwards the specified service to the corresponding class view or function view for processing through the matching rules declared in the file; 3) Settings.py: store the configuration information of Django, including the thirdparty extension package management, static file configuration information, database configuration information and registration information of all apps in the project, etc., and also complete the configuration processing of built-in mail server; 4) Celery.py: the configuration information of celery to complete the asynchronous execution of tasks; 5) Wsgi.py: server startup file, Django is used to obtain user request; (2) Business core apps: it is responsible for the collection of files implemented by various functional modules in the project, including transaction requirements, user actions, shared doc, user message, user app and utils package.

3 Experiments 3.1

Experimental Data Set

The translated text of this practice report is about 15000 words pharmacology experiment report in the field of biotechnology. Through the preliminary study and analysis of the pharmacological experiment report, it is found that the experimental report can

Development Method of Japanese Translation Teaching Assistant

511

be divided into three parts: confirmatory pharmacological experiment (about 5500 words), auxiliary pharmacological experiment (about 6500 words) and safety pharmacological experiment (about 4000 words). 3.2

Test Steps

First, complete the translation of pharmacological experiment report. Then the whole pharmacology experiment report is divided into two parts, one is input into Japanese translation teaching auxiliary platform (about 10000 words), the other is not input into Japanese translation teaching auxiliary platform (about 5000 words). Secondly, for the 10000 words input by the Japanese translation teaching assistant platform, there are two steps: the first step is to input 2000 words of the Japanese translation teaching assistant platform, after each input, randomly select new sentences in the part of verification and auxiliary experiment to test the auxiliary effect of the Japanese translation teaching assistant platform And matching degree; the second step is to input 3500 words of Japanese translation teaching assistant platform.

4 Discussion 4.1

When the Number of Words in the Translation Reaches 2000

When the translation words input into the Japanese translation assistant platform reach 2000 words, the matching degree of the system to short sentences is very low, and the matching degree of a single sample can reach more than 72%, but there are many samples between 50% and 60%, many samples do not match, and the auxiliary effect is generally shown in Fig. 1. Therefore, we should continue to increase the number of input translations, accumulate more translation memory and term base, so as to achieve a higher matching degree. Proportion

13% 8% 65%

86%~95%

62%~85%

14%

50%~61%

Fig. 1. Short sentences

Mismatch(0%)

512

X. Xu

A comparative study of auxiliary translation effects and its causes: and The differences between acoetidine, Itopride and Mosapride. Japanese translation teaching auxiliary platform auxiliary translation Translation: no translation data at present. Cause analysis: there are only three terms of reference: and The accumulation of technical database in Japanese translation teaching assistant platform does not directly affect the matching degree. In the Japanese translation teaching assistant platform, a sentence corresponds to a translation, forming a pair of translation units. The matching degree of this translation unit does not depend on the accumulation of term base. 4.2

When the Number of Words in the Translation Reaches 10000

When the number of translation words input into the Japanese translation teaching assistant platform reaches more than 10000, as shown in Table 2, the translation memory formed in the Japanese translation teaching assistant platform is further enriched. At this time, the Japanese translation teaching assistant platform has certain matching degree and auxiliary translation effect for the selected translation content not input into Trados, whether short sentence or long sentence. Table 2. Safety test Matching interval 85%–99% 68%–75% 40%–54% Mismatch (0%) Total Proportion 15% 33% 28% 20% 100%

The ratio of the effect of the transcription to the effect: In the examination of the postprandial gastric vestibular movement of the anesthetized dogs, acidiamide (30 mg/kg, p.o.) and itopide (30 mg/kg, P.O.) significantly increased the postprandial gastric vestibular movement after 0 to 2 h.

5 Conclusions Due to the flexibility of Japanese syntax, the matching degree of translated text is very low in Japanese translation practice. After the practice, the analysis results are given. There is a positive proportion between matching degree and auxiliary effect. It is proved that the evaluation standard of auxiliary effect represented by matching degree is a correct theory. At the same time, the statistical results also show that the assistant role of Japanese translation teaching platform in scientific and technological Japanese translation, and with the increase of the practice of Japanese translation teaching assistant platform, the assistant role of the translator also increases.

Development Method of Japanese Translation Teaching Assistant

513

References 1. Li, M.: Example-based learning using heuristic orthogonal matching pursuit teaching mechanism with auxiliary coefficient representation for the problem of de-fencing and its affiliated applications. Appl. Intell. 48(9), 2884–2893 (2018) 2. Fraleigh, M.: A cultural history of translation in early modern Japan by Rebekah Clements (review). Monumenta Nipponica 77(1), 153–157 (2017) 3. Matsuishi, Y., Hoshino, H., Shimojo, N.: Development of the Japanese version of the Preschool Confusion assessment method for the ICU. Acute Med. Surg. 5(1), 102–105 (2017) 4. Smith, A.K., Xu, Y., Ropella, G.E.P., et al.: A model mechanism based explanation of an in vitro-in vivo disconnect for improving extrapolation and translation. J. Pharmacol. Exp. Ther. 365(1), 127 (2018) 5. Hoshino, H., Matsuishi, Y., Shimojo, N.: Development of the Japanese version of the Cornell Assessment of Pediatric Delirium. Acute Med. Surg. 5(1), 98–101 (2017) 6. Kanamori, T., Nagaike, T., Kuruma, Y.: Cell-free translation system: development in biochemistry and advance in synthetic biology. Seikagaku 89(2), 211–220 (2017) 7. Martin, D., Martin, D.: Subtitles and audiences: the translation and global circulation of the films of Akira Kurosawa. J. Film Video 69(2), 20–33 (2017) 8. Lopez-Caudana, E.: Robotic platform for teaching maths in junior high school. Int. J. Interact. Des. Manuf. 12(5), 1–12 (2017) 9. Tanaka, I., Sato, M., Kato, T.: eIF2b, a subunit of translation-initiation factor EIF2, is a potential therapeutic target for non-small cell lung cancer. Cancer Sci. 109(6), 1843 (2018) 10. Wang, Ju, Gao, F., Li, J.: The usability of WeChat as a mobile and interactive medium in student-centered medical teaching. Biochemistry & Molecular Biology Education A Bimonthly Publication of the International Union of Biochemistry & Molecular Biology 45(5), 421 (2017) 11. Boot, P., Zijlstra, H., Geenen, R.: The Dutch translation of the Linguistic Inquiry and Word Count (LIWC) 2007 dictionary. Dutch J. Appl. Linguist 6(1), 65–76 (2017) 12. Ravesh, M.M., Tabrizi, H.H.: The effect of teaching interlanguage pragmatics on interpretation ability of Iranian translation students. Adv. Lang. Literary Studies 8(3), 44 (2017)

Thinking and Exploration of Teaching Management in Colleges and Universities Based on Network Information Technology Such as MOOC Xin Sui(&) College of Humanities and Sciences, Northeast Normal University, Changchun, China [email protected]

Abstract. MOOC is the embodiment of the integration of information technology and education. Learners can learn through the network and realize the sharing of educational resources. MOOC brings opportunities and challenges to deepen the teaching reform of colleges and universities. This paper mainly discusses the impact of MOOC on the teaching of colleges and universities, as well as some exploratory research on the teaching management. Keywords: Information technology management

 Educational resources  Teaching

This year is called the first year of MOOC, and MOOC has rapidly developed into a hot spot in the field of education [1]. After that, all countries around the world have built their own MOOC curriculum platforms. MOOC is large-scale, online and open. MOOC has a large number of students and a large scale. Students, teachers and students can communicate and learn through the Internet. All course videos and resources are open to learners. MOOC literally means large-scale open online courses, but it’s not that easy to understand its connotation [2]. In 2013, the development of MOOC in China is also changing with each passing day. 2013 is known as “the first year of MOOC in China”. Most researches on MOOC in China started in 2012 [3].

1 MOOC and SPOC While MOOC is developing in full swing, we should also realize its existing problems, such as high registration rate, low completion rate, ignoring process evaluation, etc. Foreign researches on SPOC begin with the worries about the current situation of MOOC operation, high dropout rate, relatively high cost investment, etc. [4]. Berkeley proposed SPOC which is a small-scale private online course. MOOC has the characteristics of large scale and openness, while SPOC with the characteristics of small scale and private ownership. If MOOC is an online course of “to the greatest extent”, SPOC is “to the smallest extent” [5]. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 514–518, 2021. https://doi.org/10.1007/978-3-030-51556-0_74

Thinking and Exploration of Teaching Management

515

2 Academic Analyses (Questionnaire Survey) Teachers’ teaching and students’ learning constitute the whole teaching. Students’ learning attitude and enthusiasm directly determine the effect of learning. According to the attitude of students towards online learning and the participation of online learning, we take a questionnaire survey. The subjects of the survey include 200 students of Arts and Science in the third year of University (who have completed the MOOC study of Database Technology and Application) and the second year of University (who are studying MOOC). Table 1 is a survey of whether students are willing to participate in MOOC learning. According to the survey results, 80% of students are willing to participate in MOOC learning. Table 1. Students’ attitudes towards MOOC learning Sophomores Willing to participate in MOOC learning Unwilling to participate in MOOC learning Total

79

Junior (frequency) 81

Frequency (in total) 80%

21

19

20%

100

100

100%

In the process of MOOC learning, the result of the survey on whether the students can complete their homework on time and independently is that 59% of the 100 sophomores can complete and submit their homework on time; 67% of the 100 junior students can do it. The statistical results of the reasons for not completing the work on time are shown in Table 2. Table 2. Statistics of reasons for not completing the work on time

Sophomore Junior

Learning content is difficult, not understood 16 12

Teaching content is boring 15 9

Learning content is not related to major 10 12

According to the survey results of students’ interaction in MOOC platform, physical classroom, teachers and students, the statistics are shown in Table 3. Most of the students can actively participate in the activities. There are also most students can only participate in the theme activities that they are interested in.

516

X. Sui Table 3. Survey results of interaction Actively participate in various activities

Sophomore Junior

53 56

Only participate in the interactive activities of interest 29 33

Basically not participate in activities 18 11

3 Influence of MOOC on Traditional Teaching in Colleges and Universities In traditional teaching, students listen to teachers teaching in the classroom, which is limited by time and place. MOOC can let learners not be limited by time and place through the Internet. MOOC can break through the limitation of traditional teaching and maximize the sharing of educational resources. MOOC learning has a free and flexible learning form. Learners can learn anytime and anywhere, and make full use of scattered time to learn. They arrange learning time according to their own actual situation, and provide more free choices for their online learning. Teaching video is the main form of MOOC teaching, and the interaction mechanism mainly refers to the learning activities between students and teachers and students [6]. MOOC provides rich teaching resources, including teaching videos, courseware, reading materials, exercises, test questions, etc. Learners can arrange their own learning schedule according to the learning content. MOOC enables learners to become the leader of learning and arrange online learning time by themselves. In traditional teaching, some students’ enthusiasm is not high. MOOC provides learners with highquality teaching resources. Students can watch teaching videos repeatedly according to their own situation, and truly learn independently, changing from passive learning in traditional teaching methods to active learning. MOOC has greatly increased the number of people with lifelong education [7]. MOOC has a strong faculty, provides more and higher quality curriculum resources, and maximizes the sharing of learning resources [8]. Teachers release questions through the MOOC platform, and students answer questions online. The students cooperate in groups, explore and solve problems individually. Students can also release questions through MOOC platform, and students, teachers and students can discuss through network platform. MOOC has also changed the traditional evaluation methods. MOOC has integrated into higher education and adopted new evaluation methods. The new evaluation methods are more diversified and pay more attention to the evaluation of the whole teaching process. The process evaluation mainly includes the scores of students’ online learning, homework, test scores, etc.

Thinking and Exploration of Teaching Management

517

4 Exploratory Researches on Teaching Management in MOOC Application MOOC uses online teaching resources, and learners can use fragmented time to master their own learning. MOOC course construction includes MOOC team, course construction (teaching video, teaching resources, evaluation methods, etc.), course management team, etc. MOOC teaching video is the most basic condition. Colleges and universities are the main source of online teaching resources, but they do not have the characteristics of marketization and commercialization [9]. There are generally two ways for colleges and universities to obtain teaching resources when teaching online courses. One is to record and edit teaching videos independently by their MOOC teaching team. The MOOC teaching team leader should first divide the knowledge points according to the teaching content and chapter content of the course. Each teaching video is a knowledge point, and the duration is about 10 min. It takes a long time to record the teaching video of a course. We should carefully design the teaching cases of each teaching video. The other is that each university can choose the MOOC course video suitable for its students by using the existing MOOC resources of well-known universities. For the difficult part of teachers, they can focus on Teaching in class, answer questions, and discuss with students. Use the existing MOOC resources to carry out hybrid teaching. MOOC relies on the ubiquitous network to realize the sharing of knowledge and teaching resources. The purpose of teaching management is to ensure the effective implementation of talent training in schools. Teaching management mainly includes personnel training program, teaching task arrangement, teaching supervision and inspection, etc., which must be standardized [10]. MOOC’s concept of open education has brought new challenges to higher education. Some educator’s research shows that learners usually pay more attention in about 10–15 min in the process of learning. Therefore, in the process of MOOC construction, generally a teaching video is a knowledge point, and each video lasts about 15 min. In each teaching video, we should pay more attention to the application of learning strategies. Watching the teaching video can not only enable students to master theoretical knowledge, but also improve their learning ability. In the teaching process, I often say to students: it is important to master the learning methods, and learn to learn, because we do not know much more than we have mastered. Before teaching, teachers have set the weight of each activity. Take “Database Technology and Application” as an example, set the weight of watching videos to 6%, that is, to watch all videos of each chapter and each section completely can get 6 points. The teacher should emphasize that students should watch the video step by step according to the teaching progress, and if they “rush” in a short time, they will not get a score. In order to ensure that students can watch the video carefully and embed interactive links in the teaching video. It is possible to embed test questions in five minutes or ten minutes of the video, so as to investigate students’ understanding of the concept. The purpose of embedding test questions in teaching video is to let students watch the teaching video carefully, and do not want to make students fear difficulties, so the implanted questions should not be too difficult.

518

X. Sui

5 Conclusions MOOC brings opportunities to higher education and challenges to teaching management. We should establish a teaching management system suitable for our school, give full play to the advantages of MOOC and improve teaching quality. Acknowledgements. This work was supported by 2019 the key self-raised project of Jilin Province’s Higher Education and Research “Research on Problems and Countermeasures of Teaching Management in the Process of Integration of MOOC and Higher Education”, Project No: JGJX2019C93. This work was financially supported by Jilin Higher Education Research Base “Jilin Computer Public Education Research Base” (College of Humanities and Sciences Northeast Normal University).

References 1. Wang, L., Dou, Y.: Origin and rapid development of MOOC. Softw. Guide (Educ. Technol.) 13(7), 57–60 (2014). (in Chinese) 2. Han, Y.: Origin and concept of MOOC. J. Hebei Radio Telev. Univ. 18(6), 1–3 (2013). (in Chinese) 3. Deng, D.: Summary of MOOC development research in China’s education reform (2012– 2018). J. Kunming Univ. Sci. Technol. (SOCIAL SCIENCE EDITION) 19(1), 76–83 (2019). (in Chinese) 4. Guo, Y.: SPOC model design based on hybrid learning and flipped classroom. Asia Pac. Educ. 1, 105–106 + 102. (2016) (in Chinese) 5. Wang, J.: New ideas of online course construction in local colleges and Universities under the MOOC wave SPOC. Comput. Knowl. Technol. 11(6), 139–140 (2015). (in Chinese) 6. Zhang, X., Renbao, J., Yang, H., Zhu, X.: Research on the influence and reform of MOOC on traditional teaching mode in Colleges and universities. Economist 11, 264–265 (2015). (in Chinese) 7. Su, G.: Analysis of the impact of MOOC on the quality of Higher Education. Shijiqiao 7, 62–63 (2016). (in Chinese) 8. Cong, X.: The influence of MOOC on the teaching reform of general elective courses in Higher Vocational Education. J. Liaoning High. Vocat. Educ. 18(2), 23–25 (2016). (in Chinese) 9. Wu, W.: MOOC—coursera evaluation. Heilongjiang Education (High. Educ. Res. Eval.) 2, 39–41 (2013). (in Chinese) 10. Wang, G.: On the problems and Countermeasures of teaching management in Secondary Colleges of Higher Vocational Colleges in the new era. Intelligence 20, 184–185 (2018). (in Chinese)

Computer Multimedia Technology in the Construction of Classroom Atmosphere in College Ideological and Political Education Guoyong Liu(&) Xi’an Fanyi University, Xi’an 710105, Shaanxi, China [email protected]

Abstract. With various multimedia teaching methods, they gradually appear in people’s vision. In classroom teaching, the obvious advantages of multimedia technology have caused more and more educators’ interest and attention. The purpose of this article is to study the application of computer multimedia technology in the classroom atmosphere of ideological and political education (IAPE) in colleges. From the perspective of the application of computer multimedia technology, this paper takes the classroom atmosphere of IAPE in colleges and universities (CU) as the background, and on the basis of relevant realistic backgrounds and theories, the general principles of modern educational technology and the practical application of computer multimedia technology Combine specific activities in classroom teaching for applied research. Therefore, its theory must not only follow the theoretical foundation of modern educational technology, but also conform to the theory of IAPE, embody the characteristics of ideological and political science, and conform to the social psychological characteristics and cognitive development laws of college students. The experimental results show that although computer multimedia technology can create a good atmosphere in the IAPE classrooms of universities, it also has some disadvantages. This article puts forward suggestions based on the current situation of the application of computer multimedia technology in the classroom atmosphere of IAPE in CU, so that the application of multimedia in ideological and political classrooms is more efficient. Keywords: Multimedia technology  Ideological and political education College classroom  Atmosphere building



1 Introduction At present, the construction of ideological and political lessons still has problems such as the renewal of educational concepts and the reform of teaching that can not meet the requirements of the implementation of the new curriculum. It cannot create a good classroom atmosphere. These problems not only greatly reduce the quality of ideological and political lessons, but also affect the enthusiasm of students for learning has even made them tired of learning. It can be seen that under the current situation, how to strengthen the construction of IAPE and how to create a good classroom atmosphere,

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 519–524, 2021. https://doi.org/10.1007/978-3-030-51556-0_75

520

G. Liu

put forward new challenges for the construction of ideological and political lessons, and also guide the direction of ideological and political research scholars. Creating a modern education system has always been the focus of research in education circles in various countries [1, 2]. Compared with traditional teaching, “multimedia technology” is based on digitalization. It combines text, graphic images, sound, animation, video images and other information-carrying media, and comprehensively processes, controls, and displays the computer through multimedia. Each element is organically combined and completes a series of random interactive information technologies [3, 4]. The diversity, integration, interaction, control and nonlinearity of multimedia technology create a teaching environment suitable for students ‘cognitive laws. The rich teaching methods give students a variety of sensory comprehensive stimulation, which is conducive to the acquisition and maintenance of knowledge [5, 6]. Combining the general principles of modern educational technology with the practical application of computer multimedia technology and the specific activities of ideological and political classroom teaching in CU for applied research. In the research of this article, the survey research was conducted by means of questionnaire survey method, literature research method and interview method. Through research, I hope to find out the current status and problems of the application of multimedia technology in ideological and political classroom teaching in CU, and put forward strategies to effectively implement multimedia technology based on the current situation of IAPE in CU.

2 Method 2.1

Conceptual Analysis of Computer Multimedia-Technology

Multimedia is a collective term for these media. The general form of multimedia is the transmission form and method of various information carriers [7]. That is, the process of information exchange and dissemination in a computer system by combining two or more types of media through human-computer interaction. In summary, multimedia is the integration of more than two kinds of information, which has produced a new media method that can make the information more vivid and interesting [8]. 2.2

Questionnaire Survey Method, Interview Method and Literature Research Method

Questionnaire-survey method: Prepare and improve questionnaires with reference to previous research, investigate how students adapt to the technology in college classrooms, investigate the recognition of college students in multimedia technology teaching in ideological and political classrooms, and teachers’ experience in multimedia technology. And the overall feelings of students about multimedia technology teaching [9]. Interview method: In order to improve the content of the survey and make the survey data more accurate and comprehensive, interview the relevant teachers as

Computer Multimedia Technology in the Construction

521

data supplement. Investigate teachers’ proficiency in multimedia technology, understand the use of this technology in teaching, and the status of teachers’ teaching through this technology [10]. Literature research method: The current research status of foreign countries, sorting out concepts and theories, and providing theoretical basis for subsequent research. The combination of the three survey methods can make the feedback more specific, which can also make the results of the analysis more specific and convincing [11]. 2.3

Conceptual Analysis of Classroom Atmosphere

The classification of teaching styles includes the emotional rendering teaching style, the layout of the classroom environment, and the educational thoughts, that is, teachers need to invest rich and strong emotions in the teaching process to render classroom emotions and activate the classroom atmosphere. Among them, the emotional teaching style points out that there must be a lot of factual materials, and the teaching language must be vivid, agitation, and appealing [12]. The division of these several teaching styles emphasizes that teachers should pay attention to emotional performance in the classroom, arouse the emotional experience of students, attract students’ attention, which shows that the teaching style of teachers must be closely linked to the classroom atmosphere. In the classroom, teachers should play their leading role, it should not be the subject of the classroom. It is pointed out in the curriculum objectives, students’ interest should be cultivated and students’ self-confidence in learning should be established [13].

3 Experiment Step1: Design of the questionnaire. This article mainly conducted a questionnaire survey from the level of students ‘acceptance of multimedia technology, teachers’ use of multimedia technology, and the use of multimedia, set questions and made a specific survey of multimedia teaching practices and applications to ensure the accuracy of this research. The study objects were 400 students and 9 teachers of 4 different majors in one grade of the school. A total of 100 questionnaires were distributed for each major. Trying to understand the effect of multimedia teaching in this school, the degree of creating the classroom atmosphere. Step2: Design of interview outline. To ensure that the results of this study are more accurate and comprehensive, this article also chooses interview methods to interview teachers, improve the research data, and select 9 teachers from sample schools for specific surveys. Step3: Statistics and collect teacher’s feedback for research. Student questionnaires are distributed by major and retrieved on the spot. Students are randomly selected based on a fixed number of students. At noon on the same day, nine teachers were interviewed in advance.

522

G. Liu

4 Discussion 4.1

Student Sample Situation Analysis

After analyzing the samples, first analyze the reliability of the data and remove the data with incomplete survey contents. The data obtained by statistics and classification are shown in Table 1: Table 1. Student sample situation analysis table Students’ acceptance of multimedia teaching Frequency of teachers’ blackboard writing after using multimedia teaching Teacher-student interaction frequency after using multimedia teaching Time for students to take notes after using multimedia teaching Thinking time given by teachers in multimedia classroom How often teachers use multimedia technology in Chinese teaching

High 92.0% 13%

Medium 4.5% 65%

Low 3.5% 22%

2.1%

74.1%

23.8%

8.3%

78.7%

13%

27% 85%

70% 12%

3% 3%

As shown in Table 1, the school’s students’ acceptance of multimedia is still relatively high, which indicates that multimedia technology is more conducive to stimulating students’ learning interest and keeping students’ thinking at a high concentration. It can be seen from the frequency of writing on the blackboard that the teachers of this school obviously ignored the traditional teaching methods, relied too much on multimedia technology, and paid more attention to the contents of classroom multimedia teaching demonstration. 4.2

Teacher Sample Analysis

The data obtained through interviews with teachers to classify and summarize the problems that they reflect on the use of multimedia teaching are shown in Fig. 1:

Inconvenient operation

Distract students

Affect teaching progress

Fig. 1. Analysis of teacher interview questions

Computer Multimedia Technology in the Construction

523

As shown in the interview question data in Fig. 1, we can understand that the lack of proficiency in multimedia operations will affect the teaching effect. When asked about the problems in the use of multimedia technology, the feedback of old teachers and middle-aged teachers is mostly because they have not been exposed to multimedia technology for a long time, and they are not proficient in making courseware. They usually choose to download ready-made courseware online. Then modify it according to your needs and apply it to the classroom. In addition, the multimedia operation is too cumbersome. Although it is very easy to use, it sometimes affects the progress of the class.

5 Results In terms of instrumental and humanistic subjects, multimedia teaching can play a very good role in helping to create a classroom atmosphere. Based on the use of sample schools, this article clearly understands the specific problems in the use of multimedia technology. It is mainly manifested in the high frequency of use, rich display content, and neglecting the original education model. It is also relatively small, which is not conducive to creating a good classroom atmosphere. This article believes that the following points should be paid attention to: (1) Students must be the main body, teachers must be the guide, and multimedia as the auxiliary, and students cannot be replaced by multimedia as the “protagonist” of ideological and political classroom; (2) Must correctly grasp the use of multimedia-technology according to the characteristics of different teaching links; Acknowledgement. The key Research Project of Education and Teaching Reform in Shaanxi Province: research on the Optimization of Internal Governance structure based on the improvement of Educational and Teaching quality in Private CU, item No.: 17BG028.

References 1. Hu, Z., Wang, Z.: Robust and efficient image watermarking technology in big multimedia data environmental. Multimedia Tools Appl. 1, 1–14 (2017) 2. Li, H.-B., Yang, L.-F., Lü, L.-S.: Analysis and key technologies of the Chinese exhibition and education system of petrology. Acta Geoscientica Sinica 38(2), 256–264 (2017) 3. Li, H.-Z., Yi, X., Cheng, F.: Identifying organic toxicants in sediment using effect-directed analysis: a combination of bioaccessibility-based extraction and high-throughput midge toxicity testing. Environ. Sci. Technol. 53(2), 996–1003 (2019) 4. Banbury, P.: Review: managing information technology in secondary schools. Comput. Bull. 39(6), 31 (2018) 5. Okoye, O., Ezisi, C.N., Ezepue, F.U.: Evaluation of the learning and teaching environment of the Faculty of Medical Sciences, College of Medicine, University of Nigeria, Enugu Campus. Niger. J. Clin. Pract. 20(8), 958–963 (2017) 6. Carlyle, D.: Walking in rhythm with Deleuze and a dog inside the classroom: being and becoming well and happy together. Med. Humanit. 45(2), 199–210 (2019)

524

G. Liu

7. Nakao, M., Ishihara, T., Sugiura, S.: Dual-mode time-domain index modulation for Nyquistcriterion and faster-than-Nyquist single-carrier transmissions. IEEE Access 99, 1 (2017) 8. Macías, P.G., Ramón, M., Mora, K.: The media capitalism; the new capitalism? an empirical approach. Adv. Sci. Lett. 23(8), 7963–7965 (2017) 9. Chircop, K., Gardi, A., Zammit-Mangion, D.: A new computational technique for the generation of optimised aircraft trajectories. BMJ 6(4), 543–545 (2017) 10. Bel-Serrat, S., Knaze, V., Nicolas, G.: Adapting the standardised computer- and interviewbased 24 h dietary recall method (GloboDiet) for dietary monitoring in Latin America. Public Health Nutr. 20(16), 1–12 (2017) 11. Rong, P., Ma, R., Liu, Q.-H.: A commentary of literature research of traditional Chinese medicine for acute upper respiratory tract infection in children. China J. Chin. Materia Med. 42(8), 1455–1466 (2017) 12. Anil, M., Yurtseven, A., Yurtseven, I.: The evaluation of burnout and job satisfaction levels in residents of pediatrics. Turk. Pediatr. Arsivi 52(2), 66–71 (2017) 13. Leong, I.-L., Tomlinson, B., Zhang, Y.: Attaining cholesterol goals: will aiming for lower targets improve the score? Curr. Med. Res. Opin. 34(2), 1–6 (2017)

Application of Speech Recognition Technology in Pronunciation Correction of College Oral English Teaching Caiyun Liu(&) Shandong Women’s University, Jinan 250300, Shandong, China [email protected]

Abstract. Improve students’ oral English expression ability, in order to strengthen the connection between oral English education and English teaching, and achieve the goal of education reform. The analysis of the current situation of English pronunciation education in China shows that the lack of supplementary teaching materials and the high cost of English phonetics are the main reasons for the current decline in English pronunciation education. The development and promotion of speech recognition technology can help reduce the cost of college spoken English and improve college students’ spoken English. The purpose of this article is to study the related applications of speech recognition technology in college oral English pronunciation correction. This paper uses speech recognition technology to analyze and deal with the differences of phoneme expression in spoken English of college students, so as to count the common misunderstandings of English pronunciation and the parts that need improvement. 9 non-native speakers read the text of the experiment aloud. The speakers are all college English proficient, and try not to make mistakes when reading aloud. Keywords: Speech recognition technology pronunciation  Spoken language correction

 English teaching  English

1 Introduction Speech recognition technology continues to develop in depth, and artificial neural networks enter pattern recognition [1–3]. Spoken foreign language learning software is simple, focusing only on foreign language practice. Because the language level of foreign language learners is uneven, it is difficult to find the correct pronunciation correctly during the learning process [4, 5]. Therefore, when speech recognition technology is applied to foreign language learning of spoken language, the system can have the function of correcting the pronunciation of spoken foreign language [6, 7]. The client collects and pre-processes the audio information of the students, and sends the pre-processed information to the network platform through the network through compression coding [8]. The client processes the incoming data. Students can score and correct their pronunciation and speaking skills. At the same time, the processing results are returned to the client via the network [9]. At the same time, the intelligent identification technology used in the system can provide intelligent feedback on the learning process of © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 525–530, 2021. https://doi.org/10.1007/978-3-030-51556-0_76

526

C. Liu

students. For example, voice presentation: pronunciation and pronunciation: pronunciation comparison: pronunciation score; pronunciation correction and other functions [10]. In this way, students can learn on their own without the guidance of a teacher. The learning effect is similar to that of the teacher [11]. The storage and computing functions of the cloud computing platform are very powerful, and more useful English speech recognition technology can be applied to the platform, thereby making college students’ self-help English learning richer and more interesting [12]. In this paper, speech recognition technology is used to identify misread and missed phonemes in spoken English when reading aloud to readers, to demonstrate the feasibility of speech recognition technology in college spoken English. The spoken language scoring method borrows the hidden Markov model (Hidden Markov Model, HMM). This paper uses literature review method, inductive summary method and comparative research method for experimental exploration.

2 Proposed Method 2.1

Scoring Method

In phoneme-associated Viterbi decoding, the HMM trained with reference to the purpose of the speaker is used as a measure, and its similarity is the learning speech score. This similarity is positively related to the pronunciation quality of the sound cable. Assume that the i-th cable is associated with phoneme q, and the corresponding starting point of its time period is Ti . The feature vector observed at time t is Ot , and the corresponding HMM state is St . Based on the HMM likelihood score: Mi ¼

TX i1 1

lg½pðSt jSt1 ÞpðOt jSt Þ

ð1Þ

tTi

Scoring based on HMM posterior probability. Mi ¼

TiX þ 1 1

lg pðqjOt Þ ¼

tTi

TiX þ 1 1 tTi

pðOt jqÞpðqÞ lg P pð Ot jqj Þpðqj Þ

ð2Þ

qj 2Q

Where Q is the set of all phonemes. Generally speaking, the phoneme-associated likelihood scores of non-native English speakers are lower than those of English native speech. This score can reflect the pronunciation errors of non-English speakers. 2.2

Pronunciation Error Correction

The correction of phoneme pronunciation includes two parts: error detection and correction feedback. As for the prosody correction of pronunciation, it is not easy to model the components of the prosody, so instead of directly pointing out the errors and

Application of Speech Recognition Technology

527

suggestions for improvement in the prosody, the prosody of the learning speech is revised to the reference prosody and played to the learners. 2.3

Phonemic Pronunciation Error Detection

Here, phoneme reading errors can be simply classified into three categories based on the recognition results of the phoneme recognizer. (1) Missing phonemes. Phoneme Qi ; the phoneme recognition result of the associated segment does not exist in the period electric phoneme Qi , but is silent Qi1 or Qi þ 1 . (2) Misreading phonemes. Phoneme Qi ; The expected phoneme Qi does not exist in the phoneme recognition result of the associated segment, and it is not a missed phoneme. (3) Add phonemes. There are extra phonemes in the recognition result of the phoneme-associated segment.

3 Experiments 3.1

Experimental Object

This article starts from the general level of spoken English of college students, takes today’s high level of development of speech recognition technology as the background, and takes 9 non-native speakers as the research object, and all have a college English level, using 100 commonly used English as an experiment Speech and text, and explore the effect of positive feedback oral correction. (1) Object requirements Readers are required to make no mistakes when reading aloud; the standard pronunciation uses the pronunciation of a native American speaker. (2) Sound model The acoustic model uses the open source WSJ1. This model is dictation speech, and pronunciation is suitable as the basis for scoring. 3.2

Experimental Methods

(1) Literature review method In this paper, by referring to the relevant data on the development of speech recognition technology and the theoretical explanations of oral English teaching by scholars at home and abroad, combined with the actual situation of existing equipment, the specific application of speech recognition mode is investigated, and problems are found during the inquiry process. Then put forward countermeasures and suggestions based on the theoretical basis.

528

C. Liu

(2) Inductive summary method This paper systematically summarizes the differences between different pronunciation phonemes by speech recognition technology through a practical analysis of the pronunciation of different readers, and specifically analyzes the problems existing in each subject and link during its implementation.

4 Discussion 4.1

Summary of Misreading and Missing Phonemes

Error detection has a better effect on misreading or missing phonemes. But for the inserted phonemes, the detection error rate is higher. In this verification corpus’ error detection results, there were 712 misreading phoneme errors and 653 missed phoneme errors. The statistical results of the least misreadable and most prone to phonemes are shown in Table 3. Each line lists one phoneme that is misunderstood and which three phonemes are most likely to be misunderstood. It can be seen from the statistical results in Table 1 that voiced consonants and compound vowels are easily misread. This is partly because of the pronunciation of voiced voices in Chinese, and partly because the duration of voiced consonants is-as short as possible. Table 1. Least misunderstood and most misunderstood phonemes Misreaded phonemes Correct rate/% Misreaded phonemes k 90.23 t,p,g i: 88.48 I,ʌ,eɪ n 81.50 d,m tʃ 38.45 z,s ʃ 34.58 I,ʌ

It can be seen from the statistical results in Fig. 1 that voiced consonants and compound vowels are easily misread. This is partly because of the pronunciation of voiced voices in Chinese, and partly because the duration of voiced consonants is-as short as possible. 4.2

Long Reader Feedback

After talking with 9 Ron readers, the results show that all 9 Ron readers who participated in the experiment stated that their spoken language skills have been more or less improved, and the learning effects of most students’ spoken language training and their evaluation of eliminating speaking obstacles are very high. However, the readers’ feedback on the shortcomings of speech recognition technology learning can not be ignored. Some readers pointed out that as a new language learning method, real

Application of Speech Recognition Technology

529

Most skippable phonemes

10

0 d

Most skippable phonemes v aʊ ɛ Fig. 1. Most skippable phonemes

situational communication between people cannot be realized at this stage, and only simulation based on training content can be achieved. 4.3

Duties of Educators

We should seek the feasibility of combining new technology with traditional education. Methods, so that the two teaching methods form a model of mutual integration and promotion. In addition, when students use speech recognition technology for autonomous learning, teachers should provide assistance based on the situation, such as assisting students in selecting scientific learning software that is consistent with the teaching content.

5 Conclusions In this experiment, multiple methods such as comparative research were used to explore the phoneme association and phoneme recognition results in English. Regarding the detection of these results, speech recognition technology can effectively detect Misreaded and missed phonemes are detected, but the detection effect on inserted phonemes is poor. It fully proves the remarkable effect of the practical application of the speech recognition system. Although people’s evaluation of pronunciation is sometimes inaccurate, it is intuitive and fast. However, for computers, how to integrate various features and finally give a result that meets expectations is still a question worth thinking about.

References 1. Sidgi, L.F.S., Shaari, A.J.: The usefulness of automatic speech recognition (ASR) Eyespeak Software in improving Iraqi EFL students’ pronunciation. Adv. Lang. Literary Stud. 8(1), 221–226 (2017) 2. Li, K., Qian, X., Meng, H.: Mispronunciation detection and diagnosis in L2 english speech using multidistribution deep neural networks. IEEE/ACM Trans. Audio Speech Lang. Process. 25(1), 193–207 (2017)

530

C. Liu

3. Arora, V., Lahiri, A., Reetz, H.: Phonological feature-based speech recognition system for pronunciation training in non-native language learning. Acoust. Soc. Am. J. 143(1), 98–108 (2018) 4. Sidgi, L.F.S., Shaari, A.J.: The effect of automatic speech recognition EyeSpeak software on Iraqi students’ English pronunciation: a pilot study. Adv. Lang. Literary Stud. 8(2), 48–54 (2017) 5. Mora, J.C., Levkina, M.: Task-based pronunciation teaching and research. Stud. in Second Lang. Acquisition 39(2), 381–399 (2017) 6. Darejeh, A., Salim, S.S., Asemi, A.: Speech pronunciation practice system for speechimpaired children: a systematic review of impacts and functionality. Univ. Access Inf. Soc. (5), 1–21 (2017) 7. Gashaw, A.: Rhythm in Ethiopian English: implications for the teaching of English prosody. Int. J. Educ. Literacy Stud. 5(1), 2202–9478 (2017) 8. Wang, Q.: The application of cognitive-functional approach in college English teaching. Overseas Engl. (5), 233–234 (2018) 9. Wang, X.J., Ma, X.L.: On the application of cognitive strategy in college English listening comprehension—with international talents training as the goal. Overseas Engl. 4, 247–248 (2017) 10. Abdullah, S., Al-Qayoudhi, S., Hussaini, S.S., Khan, F.R.: Application of total quality management (TQM) in higher education institution (HEI) in Oman: Shinas college of technology-a case study. Soc. Sci. Electron. Publishing 5(1), 2395–6518 (2017) 11. Shi, C.Y.: Value and application of expansion training in college physical education. J. Heze Univ. 55(4), 360 (2017) 12. Kahler, C.W., Lechner, W.J., MacGlashan, J., Wray, T.B., Littman, M.L.: Initial progress toward development of a voice-based computer-delivered motivational intervention for heavy drinking college students: an experimental study. JMIR Ment. Health 4(2), e25 (2017)

Construction of Evaluation-Index System of College Teachers’ Intelligent Teaching Ability Under the Background of Educational Informationization 2.0 Dongyan Sun(&) School of Information Engineering, Jilin Engineering Normal University, 3050 Kaixuan Road, Kuancheng District, Changchun, China [email protected]

Abstract. With the new round of technologies represented by artificial intelligence, big data, and blockchain, and the innovative integration of various industries, information technology has become the basic driving force for social development. The embedding and application of various new technologies has become a development trend of the times, that is, the informatization of education, which has become an important part of the sustainable development of an information society. The purpose of this article is to build an evaluation-index system for the wisdom teaching ability of college teachers in the context of educational informatization (EI) 2.0. This paper evaluates the teaching ability of teachers in colleges and universities, finds out where teachers have defects, and puts forward corresponding suggestions based on the research results. The sample selects a college teacher as the research object, and uses questionnaires as an experimental method to investigate the college teachers’ ability. This article tests the sample through five dimensions of basic technical literacy, planning and preparation ability, organization and management ability, evaluation and diagnosis ability, learning and development ability, and gets average scores of 2.6881, 3.0086, 2.3986, 2.1572, and 2.6525 respectively. It can be seen that the wisdom teaching ability of college teachers needs to be improved. Keywords: Education informatization Evaluation-index  Index system

 College teachers  Teaching ability 

1 Introduction In recent years, although China’s higher EI has achieved rapid development, under the general trend of new-generation intelligent technology enabling education. At present, some bottleneck problems restricting the development of higher EI in our country are emerging. According to relevant literature, we find that at present, the evaluation research on EI focuses on the field of primary schools, and there is less discussion on the evaluation of higher EI; the regionalization and localization of research are more obvious, and the evaluation content pays more attention to informatization. In terms of the input and quantity of resources and the construction of infrastructure, there are © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 531–537, 2021. https://doi.org/10.1007/978-3-030-51556-0_77

532

D. Sun

imbalances such as heavy investment, light output, heavy results, and light processes; evaluation concepts, evaluation-index projects and systems, still in the thinking and era of the education informationization 1.0 era. In the frame. All of these indicate that the original evaluation basis, content or framework can no longer be used comprehensively and clearly to evaluate the development requirements of higher education informationization in the new era with new features of technology integration, intelligence and big data application. In April 2018, the “EI 2.0 Action Plan” issued pointed out that China’s EI has transitioned from the initial stage to the integration and innovation stage. It will take the cultivation of talents as its core concept and use intelligent technology to restructure the education system. Efforts will be made to promote the development of EI in China to the forefront of the world. Higher education is the key to China’s development into a country with strong human resources and education. The information technology industry in higher education has become a key force in the development of China’s education information technology [1, 2]. Therefore, in the context of EI 2.0, building a reasonably directional evaluation system for the development of higher EI is conducive to further understanding and mastering the status quo of China’s higher EI development level. Improve and perfect the informationization of higher education, making it a booster in the process of education informationization towards education modernization [3, 4]. The current emergency needs to meet the forward-looking needs of EI 2.0 and the new social development situation, and from the perspective of top-level design, combined with existing related research, to grasp the inherent logic of the current transition, construct a leading and developing evaluation-index system for the development level of higher EI, to systematically and scientifically evaluate the development level of China’s college EI, and move it towards standards Serving the teaching, research and management of the majority of colleges and universities [5, 6]. Therefore, this research has important practical significance and improving the performance of EI. After analyzing the educational background, this paper establishes an evaluationindex system for teaching ability of college teachers by using the iceberg theory, and designs and compiles a questionnaire based on the five dimensions of teacher’s technology application ability [7, 8]. This data result also has important reference significance for future research and analysis of the information-technology application ability of high school mathematics teachers.

2 Method 2.1

Educational Information

Educational informationization refers to the effective use of modern information technology in the field of education to improve the quality of education and promote educational reform. The level of development is an abstract concept, which emphasizes the dynamic changes and constant updates of things, and can more accurately reflect the development of things at different stages [9, 10]. The development level of EI is a dynamic description of the scale, speed and level of the development from the dimensions of time and space, quantity and quality, and technology and concepts. It

Construction of Evaluation-Index System of College Teachers’

533

covers people, things and policies in the field of education. The development of information technology not only reveals the application of modern information technology in education, but also involves the changes and development of educational thoughts, concepts and models. The development level of EI is a major indicator of the development status and potential of EI. It is also a core indicator for carrying out various EI work. It helps the country to comprehensively grasp the overall progress of EI, find shortcomings and formulate practical Feasible education informationization policy to promote the development of education modernization [11, 12]. 2.2

Evaluation-Index System of College Teachers’ Wisdom Teaching Ability in the Background of EI 2.0

(1) The subject of evaluation of teaching ability of college teachers is determined The evaluation methods generally used are: evaluation method based on balanced scorecard, 360° feedback method, objective management method, KPI performance evaluation method, etc. The indicators identified in the previous section are not only individually assessed by a certain level of evaluators. For example, suppose that only the superior is the subject of the evaluation. In the judgment process, it is inevitable that the teacher does not understand the detailed work of the teacher, which will bring pressure on the teacher. Suppose that only the students are the subject of the evaluation. As well as the limitation of knowledge level, it is difficult to guarantee the objectivity and scientificity of its judgment. In order to ensure the scientific and fair evaluation, it is necessary to select multi-level and multi-angle evaluation subjects to carry out specific evaluation, and the most effective way is 360° feedback method. (2) Comprehensive scoring model of evaluation-index system for teaching ability of college teachers This article uses the iceberg theory to introduce the two basic qualities of teaching basic skills and teaching research capabilities, as well as the two hidden qualities of basic teaching literacy and personal summary and planning of teachers. The weights determined by the analytic hierarchy process can be used to determine the dominant indicators. The weight is 59%, and the implicit indicator weight is 41%. It has changed the status quo in the past that only had explicit indicators, or that there were hidden indicators, but the weight was low, and the evaluation of teachers’ teaching ability was more reasonable and objective. The comprehensive score of university teachers’ teaching ability evaluation is represented by Y. The two explicit qualities of the basic teaching skills and teaching and scientific research ability of the upper iceberg are indicated by Y 1 , and the two implicit qualities of the basic teaching literacy and personal summary and planning of the lower iceberg are indicated by Y 2 . Considering that different universities, different departments, different majors, positions and levels of teachers have different requirements for the proportion of explicit and implicit qualities, add weight coefficients a and b, and a + b = 1. Therefore, the comprehensive score of the teaching ability evaluation of college teachers is:

534

D. Sun

Y ¼ a  Y1 þ b  Y2

ð1Þ

In the university teacher teaching ability index system established in this article, the explicit indicator weight is 59% and the implicit indicator weight is 41%, that is, the comprehensive score of the teacher’s teaching ability is: Y ¼ 0:59  Y 1 þ 0:41  Y 2

ð2Þ

3 Experiment Step1: The purpose of the survey is to comprehensively and objectively understand the information-technology application ability of high school mathematics teachers in the context of “EI 2.0”. The data from questionnaires are used to analyze teachers’ technical literacy, design and preparation, organization and management, evaluation and diagnosis, Analysis of five dimensions of learning and development of mathematics teachers’ ability to apply information-technology. Find the factors that restrict the ability of mathematics teachers to use information technology, and propose a plan that is conducive to promoting the “Action Plan for Educational Information 2.0”. A total of 150 mathematics and English teachers from a university were surveyed. The study distributed a total of 150 survey reports, and 140 were eventually recovered. The recovery rate was 93.3%, of which 140 were valid questionnaires and the efficiency was 100%. In this research survey, the method of internet questionnaire survey was adopted. Step2: Questionnaire design. The questionnaire used in this study is mainly divided into two parts in structure, which are investigating teachers ‘basic information and teachers’ information technology application ability. The second part can be subdivided into five dimensions, which are basic technical literacy, planning and preparation, organization and management, diagnosis and evaluation, learning and development. The title of the second part is designed using Likert-type measurement method, which is scored 5, 4, 3, 2, 1 from high to low in the form of a five-point scale; the scores reflect the application of teachers’ information technology level of ability. Step3: Organize and analyze the results. After the questionnaire was retrieved, the results of each group were recorded and related data collated. According to the data analysis, it is concluded that there is a significant difference between the overall level of college teachers and the middle level, which is at a level below the middle level.

4 Discussion 4.1

Experimental Results and Analysis

Figure 1 is obtained by analyzing the data of the information-technology application ability of the college teachers surveyed. As can be seen from Fig. 1, the overall average of the basic technical literacy dimension is 2.6281, the overall planning and preparation

Construction of Evaluation-Index System of College Teachers’

535

capability dimension is 3.0086, the organizational and management capability dimension is 2.3986, and the overall evaluation and diagnosis capability dimension is 2.1572. The dimension of learning and development ability is 2.6525. It is clear that only the planning and preparation capabilities are at a medium level, and the remaining four dimensions are all below the medium level. The overall analysis results of teachers’ information technology application ability are shown in Table 1 and Fig. 1.

3.5

Evaluation score

3 2.5 2 1.5 1 0.5 0 Technical literacy

Plan and prepare

Organization Evaluation Learning and and manage and diagnosis development

Fig. 1. Overall analysis of teachers’ IT application capabilities

4.2

Suggestions for Promoting EI 2.0

(1) Improving the requirements of mathematics informatization teaching The analysis of the survey results shows that the surveyed mathematics teachers paid insufficient attention to information technology. Increasing its importance is, on the one hand, that mathematics teachers have an urgent need to use information technology, and on the other hand, the education department puts forward higher requirements. The education department can actively carry out information-based teaching and put forward higher requirements. Teachers should not be limited to just the display function of information technology in the class. It is necessary to evaluate the application of the multi-faceted ability dimension of mathematics teachers, and to motivate mathematics teachers to actively learn technology-related knowledge. (2) Actively introduce mathematics education platform It was found in the questionnaire survey that the teachers of the colleges and universities surveyed reflected that the school’s resources were insufficient to successfully carry-out information-based education. In the context of the “Thirteenth FiveYear Plan” and “EI 2.0”, we actively introduce educational resources. Comprehensive coverage of school-to-school, class-to-class, all-to-everyone, and a larger education

536

D. Sun Table 1. Overall analysis results of teachers’ IT application ability

Technical literacy 2.6881

Plan and prepare 3.0086

Organization and management 2.3986

Evaluation and diagnosis 2.1572

Learning and development 2.6525

platform, allowing teachers to use these large resources for technical training, lesson preparation, lectures, assessment, and learning. Improve five-dimensional information technology application capabilities. (3) More experience exchange activities in schools Through the analysis of the survey data, we can see that no matter which dimension to look at, teachers with a teaching age of 5–10 years have higher or even highest scores. One is because they are younger and have a greater enthusiasm for work; the other is because they have accumulated rich teaching experience for a few years. Another phenomenon is that young teachers have higher information technology literacy. The young teachers who have more information and ability to accept and the teachers with rich teaching experience can communicate more and help each other, which can promote the information technology ability of young mathematics teachers and older mathematics teachers. I believe that a good learning atmosphere has a strong role in promoting learning.

5 Conclusion Based on the above, we can know that the wisdom education ability is related to many factors. So how to mobilize the enthusiasm of high school teachers, give full play to teachers with strong information-technology, and effectively carry out informationbased teaching management and evaluation are an important issue. If we don’t pay attention to the basic status, it will inevitably make teachers ignore the quality of teaching, which will further make it difficult for the overall teaching standard of the school to be guaranteed. Its status cannot be taken lightly. Acknowledgments. This work was supported by the 13th Five Year Plan Project of Education Science in Jilin Province in 2019 under Grant ZD19086.

References 1. Chiou, S.-F., Su, H.-C., Huang, E.-W.: The application of information and communication technology (ICT) in nursing education. Hu LI Za Zhi J. Nurs. 64(6), 5–11 (2017) 2. Du, Y.-X.: Research on college English teachers’ information literacy in information environment. Engl. Lang. Teach. 10(11), 37 (2017) 3. Xue, B., Liu, T.: Physical health data mining of college students based on DRF algorithm. Wireless Pers. Commun. 102(2), 1–11 (2018)

Construction of Evaluation-Index System of College Teachers’

537

4. Lin, F., Jiang, Z.: Exploratory design and demonstration of rehabilitation information system based on international classification of functioning, disability and health. Chin. J. Rehabil. Med. 34(2), 125–132 (2019) 5. Khan, A., Yusof, Z.: Trade-terrorist evaluation-index (TTEi). Qual. Quant. 51(1), 1–11 (2017) 6. Karalar, H., Doğan, U.: Teacher perception on educational informatics network: A qualitative study of a Turkish anatolian high school. Int. Educ. Stud. 10(4), 101–112 (2017) 7. Lampert, J., Masters, C., Byrne, T.: Embedding indigenous perspectives in reviewing welcome to country with Australian high-school students: more than a book review. Jeunesse Young People Texts Cultures 8(2), 142–151 (2017) 8. Heyd-Metzuyanim, E., Munter, C., Greeno, J.: Conflicting frames: a case of misalignment between professional development efforts and a teacher’s practice in a high school mathematics classroom. Educ. Stud. Math. 97(1), 21–37 (2018) 9. Gerver, R., Santucci, L., Leventhal, H.: Building a high school math research curriculum. Math. Teacher 111(1), 34 (2017) 10. Belfor, J.A., Sena, I.S., Silva, D.K.B.D.: Faculty teaching skills perceived by medical students of a university of the Brazilian Amazon region. Cien Saude Colet 23(1), 73–82 (2018) 11. Dollberg, S., Barilan, M.Y.: TEACHING RESUSCITATION SKILLS ON A NEWLY DEAD INFANT. Harefuah 157(4), 262–264 (2018) 12. Grindle, C.F., Cianfaglione, R., Corbel, L.: Teaching handwriting skills to children with intellectual disabilities using an adapted handwriting programme: HANDWRITING WITH OUT TEARS. Support Learn. 32(4), 313–336 (2017)

Construction of the Practical Base of Information Sharing Courses Based on Finance Chengwei Zhang and Xinyan Li(&) School of Management, Wuhan Donghu University, Wuhan 430212, Hubei, China [email protected]

Abstract. With the economic development and the popularization of Internet technology, information education has become a new proposition in the field of teaching. Based on the background of education informatization, the construction of the practice base of financial sharing informatization course will help students majoring in finance and accounting to have a more forward-looking understanding of financial sharing. In order to meet the talent demand of enterprise financial sharing center and promote the seamless connection of students’ internship and employment, this paper mainly analyzes the construction of college financial sharing information curriculum practice base, and provides a new idea for the construction of college information teaching. Keywords: Financial sharing

 Practice base  Informatization

1 Introduction 1.1

Research Background

With the rapid development of economic globalization and increasingly fierce market competition, enterprises have to constantly innovate in their internal system, organizational structure, corporate culture and other aspects in order to seek the way of survival and development. Financial sharing can effectively reduce costs and improve performance, and plays a crucial role in the institutional management of group enterprises. Therefore, the establishment of a globally integrated operation platform and the active pursuit of Shared services to maximize the overall value have become the direction and trend of group enterprise management reform. Financial sharing refers to the collection and integration of major financial work and data within an enterprise, which is brought into the scope of overall planning services to promote the rapid flow and transmission of information. Different from the common enterprise financial management mode, the advantages of the financial Shared service center lie in the cost reduction, the improvement of financial management level and efficiency and the increase of the core competitiveness of the enterprise under the effect of scale. On the other hand, the rise and continuous development of network and computer technology, In particular, the rise of mobile Internet, artificial intelligence, cloud computing and big © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 538–545, 2021. https://doi.org/10.1007/978-3-030-51556-0_78

Construction of the Practical Base of Information Sharing

539

data have become the core driving force for the innovation of enterprise management model in recent years. Making it possible for enterprises to build financial Shared service centers worldwide [1]. 1.2

Research Status at Home and Abroad

In 2019, Jia proposed that the construction of training bases should embody three principles. The main task and goal of the training base should be to train the skilled personnel in short supply in society and in urgent need in enterprises. According to the supply and demand of human resource market, adjust the professional setting and teaching content of practical training timely. The second is core competence. Through the strengthening of practical skills training, to train the workers with the economic development of the professional ability, especially with the needs of enterprises to adapt to the job operation ability; Through professional quality training, the core abilities of communication, cooperation, innovation and problem solving are cultivated. Third, the principle of multi-party cooperation. Base to strengthen the relationship between schools and enterprises, with the joint between colleges training plan and carry out diverse culture, share the teachers, to build practical conditions, vigorously carry out the order training, orientation training, joint development, give full play to the resource advantages of each school and enterprise, the cultivation of social and economic development needs skills talents together [2]. In 2018, Jing Yumei proposed that in the training of accounting talents in higher vocational colleges, the introduction of information-based teaching methods can promote the development of accounting education in higher vocational colleges and improve teaching efficiency and quality. The information-based teaching method of primary accounting practice complies with the development trend of the current era and promotes the development of colleges and universities in their teaching career. In the future teaching, we should continuously improve the innovative accounting teaching methods, with the ultimate goal of improving teaching quality and cultivating accounting professionals with strong professional qualities [3]. In 2018, Erna Lovita, Anis Andriyani, proposed that here is a positive and significant influence between the training against the effectiveness of the accounting information system [4]. In 2019, Rini Lestari, Diamonalisa Sofianty, Ririn Sri Kuntorini, proposed that QMAIS can influence the implementation of GCG so that it has impact on company performance. Accounting informatization has played a vital role in the development of accounting education [5]. Through domestic and foreign investigations, we can easily conclude that the construction of a service sharing center internship base is extremely important to the professional education of accounting.

540

C. Zhang and X. Li

2 The Necessity of Constructing the Practice Base of Financial Shared Information Courses 2.1

Improving the Infrastructure Provides More Possibilities for Students to Practice

Financial sharing service promotes the financial work of enterprises to be more refined, standardized and standardized. The financial sharing service simplifies the complexity and concentrates a large amount of repetitive information processing work, which greatly reduces the enterprise’s human cost. But at the same time, also causes the accounting accounting post employment reduction. Financial personnel have to devote themselves to business integration, strategic orientation, performance appraisal and other management accounting work. Financial Shared services force the transformation of financial functions, which is difficult to adapt to students without practical experience [6]. The establishment of the practice base of financial Shared information course can enable students to practice in class in advance. While explaining the theoretical knowledge, the instructor instructed the students to use UC and FSSC platforms for post assignment exercises. 2.2

Improve the Employment Rate of Students Majoring in Financial Management

At present, the human resources market, the base is huge, but the lack of corresponding professional personnel. After college graduates, it is difficult to find completely satisfied enterprises, and for enterprises, only with a high degree is difficult to meet their needs. Compared with other majors, finance and accounting majors pay more attention to their practical ability. In the era of rapid economic development, enterprises also hope to recruit professional talents with foresight and experience. The construction of the practice base of financial Shared information course can make finance and accounting students adapt to FSSC, a new service platform, in advance, and make it easier for them to stand out in the application.

3 Research of Domestic Financial Sharing Center 3.1

Students’ Internship Investigation

In order to further understand the students’ internship investigation, we visited the financial sharing centers of six enterprises, including meicai.com and midea, and conducted a questionnaire survey on 200 students who worked in the financial sharing centers. From students before starting work on financial center of Shared understanding of the situation: before work completely don’t know financial sharing center model of students accounted for 31%, slightly know financial sharing center before work model of students accounted for 40%, before the work has been familiar with financial sharing center model of students accounted for 19%, before work can skilled use financial software sharing center students accounted for 10% of the system. Most of the students

Construction of the Practical Base of Information Sharing

541

still haven’t studied systematically and don’t know enough about the mode of financial sharing center (Table 1). Table 1. Students’ views on work intensity Working strength Lower Appropriate Higher The number of students 27 40 133 Accounted for 13.5% 20% 66.5%

Most students think that the work intensity is high, after a day’s work will feel very tired, due to the unfamiliar software caused by low work efficiency or some other reasons caused by overtime is also very common. As for whether the students are willing to stay after the internship, the questionnaire shows that 19.5% of the students directly say that they will not take this kind of job in the future, 50.5% of the students say that they will continue to take this kind of job if they cannot find a better job, and 30% of the students say that they will consider taking this job in the future. Therefore, due to a series of reasons such as high pressure, high work intensity and lack of improvement in personal ability, the dimission rate of the new mode of financial sharing center is still high. 3.2

Current Problems

3.2.1 The Company Has a Long Training Period in the Early Stage Entering the financial sharing center, students do not understand the work content of this new mode. In order to enable students to work as soon as possible, enterprises have to spend a lot of time and energy to train students in the early stage of work. In addition, the relationship between financial sharing center and what students learn in school is not close, so students are not easy to accept such a working mode, and the training of enterprises is difficult, so it will take longer energy. At present, financial accounting students in school, most of the study is financial accounting, intermediate financial accounting and other knowledge. After working in the financial sharing center, students think that the basic work they do is boring, difficult to realize their value, and inconsistent with their future development plans. 3.2.2 Students Have Low Acceptance of the Work in the Financial Sharing Center At present, financial accounting students in school, most of the study is financial accounting, intermediate financial accounting and other knowledge. After working in the financial sharing center, students think that the basic work they do is boring, difficult to realize their value, and inconsistent with their future development plans. This makes it difficult for students to accept the working model of financial sharing center.

542

C. Zhang and X. Li

4 Build an Efficient, Scientific and Reasonable Practice Base for Financial Information Sharing Courses 4.1

Design of Financial Sharing Information Training Base

The practice base construction of financial Shared information course is divided into two parts. Set up computer rooms on campus, build information system, cooperate with enterprises outside campus, arrange students to enterprises for in-post internship, so that students can apply what they learn in practice [7]. 4.1.1 Campus Infrastructure Software licensing without user restrictions. The system has seven system modules: resource distribution system, computer room environment deployment system, computer management system, computer service system, data statistics and decisionmaking system, operation and maintenance support system, and WEB service system. And support to create more than 30 management accounts, custom management rights, to achieve multi-person hierarchical security management function in the computer room [8]. Provide intelligent database backup maintenance tools, can set up the maintenance plan, carry out automatic backup, support the database backup to the network storage, compatible with the existing market mainstream storage array products, with both sides of the official storage array compatibility list, storage array types including SAN, NAS and iSCSI. Software and hardware IT assets information collection; Classification record and management of detailed asset information, support classification query, keyword query, advanced query, asset statement; Asset information notes and maintenance records; Asset tracking and early warning; Asset usage analysis. Students can make computer reservation and seat reservation remotely through the WEB page. For more than 500 sets of the above terminal difference data at the same time deployment, and can automatically assign IP addresses (IPV4/IPV6), computer name, WINDOWS user name (at the same time support 500 terminal interface screenshots and build official seal of original factory) support external LED display, can be customized according to the content, synchronous update user records, allocation of resources. In order to ensure the compatibility and stability of the system, all functions are required to be the same brand of the same product, not allowed to be pieced together from a variety of products. Through the WEB query function, the administrator can query the use of the machine room, the use efficiency of the machine room, all kinds of statistical statements of the machine room, etc. On board personnel can be in the network on board the inquiry, when the inquiry, the machine room arrangement inquiry, on board the reservation inquiry [9]. FSSC’s information platform construction is mainly divided into several sections, covering integrated cost control, budget management, performance evaluation, investment management, and report evaluation.

Construction of the Practical Base of Information Sharing

543

4.1.2 Off-Campus Enterprise Practice Base Cooperation In his report to the 19th national congress of the communist party of China (CPC) on October 18, 2017, President Xi Jinping pointed out that education should be given priority. We will improve the system of vocational education and training, and deepen the integration of industry and education, and cooperation between schools and enterprises. We will accelerate the development of first-class universities and disciplines, and realize the connotation development of higher education. School-enterprise cooperation can bring a win-win result of “complementary advantages, resource sharing, mutual benefit and common development”. In addition to the practical training course of decision-making, the real simulated work position can help students better understand the setting and work content of each post and get familiar with the mode of financial Shared service center. Through school-enterprise cooperation, enterprises get talents, students get skills, schools get development. At present, enterprises have higher and higher requirements for students majoring in financial management. Students who participate in the real in-post internship in school can get familiar with the operation mode and work intensity of the financial sharing center in advance under the real environment, and have a more comprehensive understanding of the financial sharing center. Only on the basis of understanding the financial sharing center, can we have a forward-looking cognition of the current financial personnel development form, which can also greatly reduce the turnover rate and avoid the brain drain of the enterprise. 4.2

Guarantee Measures to Build a Full Financial Shared Information Course Practice Base

Relying on modern information technology, the construction of financial Shared information course practice base inevitably has certain risks. In recent years, in order to further improve the quality of internships and effectively safeguard the legitimate rights and interests of students, schools and internship units, the ministry of education has issued the opinions on strengthening and standardizing the management of internships in ordinary undergraduate colleges and universities. It provides for further strengthening and standardizing the management of internships in regular undergraduate colleges and universities [10]. Colleges and universities are the main body of students’ internship management. In terms of strengthening the guarantee of internship organization, colleges and universities should improve the work responsibility system, strengthen the construction of internship bases, and support the qualified provincial educational administrative departments and colleges and universities to strengthen the construction of internship informatization. Establishing and improving the supervision and management system is also the key to preventing the risk of base construction. First it is necessary to unify the thought, improve the understanding, and set up the idea of constructing the financial sharing center course practice base correctly. The primary premise for the construction of the financial sharing center is whether the administrators of the school can fully realize the importance of the construction of the base. School administrators must understand the financial professional knowledge, have a forward-looking cognition of the financial Shared service concept, fully realize the significance of this to the development of students, lead the teachers in this

544

C. Zhang and X. Li

professional field to invest in the financial Shared service curriculum construction, so as to provide a comprehensive guarantee for teaching [11]. Second, we should increase investment and improve facilities, and arrange special personnel to maintain the training base. There are still some limitations in the development of information technology, and the platform of practice base cannot be separated from the supervision and daily maintenance of specials. In the construction process of the internship base, schools should select targeted teaching materials, improve the financial sharing information platform at the same time, and try to make it consistent with the functions of the real platform of enterprises. In this way, the training time of enterprises can be reduced and students can have a comprehensive understanding of financial sharing informatization.

5 Conclusion In the process of cultivating talents in colleges and universities, the financial management major should keep pace with The Times and pay attention to the construction and improvement of the practice base of financial information sharing courses. The construction of financial Shared information base conforms to the development trend of The Times and promotes the cultivation of students’ practical ability. At the same time, the school should combine the basic tasks of the base, improve the level of talent skills, cultivate students’ professional quality on financial sharing informatization, and explore more new employment paths suitable for the development of financial sharing informatization. Acknowledgements. This work was supported by letter from the Higher Education Department of the Ministry of Education on the publication of the list of the first batch of industry-university cooperation and education projects in 2018 (High school letter [2018] 47) and the grants from Teaching research project of Wuhan Donghu university (Wuhan Donghu university letter [2018] No. 28 Document).

References 1. Li, W., Liu, M.: Research on service quality of financial Shared service center, accounting research, 2017 2. Jia, W.: Thinking on building a high-level training base. China Vocational and Technical Education, 2019 3. Jing, Y.: Discussion on the informatization construction of cloud computing accounting for small and medium-sized enterprises, finance and accounting communication, 2018 4. Lovita, E., Andriyani, A.: Influence of information technology, training and participation of users towards the effectiveness of accounting information systems in the supply chain management. Proceedings of the 5th Annual International Conference on Accounting Research (AICAR 2018), 2019

Construction of the Practical Base of Information Sharing

545

5. Lestari, R., Sofianty, D., Kuntorini, R.S.: The influence of quality of management accounting information system on the implementation of good corporate governance and it impacts on the company performance. Proceedings of the Social and Humaniora Research Symposium (SoRes 2018), 2019 6. Huang, C.: Development history and current situation of management accounting informatization at home and abroad, finance and accounting communication, 2017 7. Tian, G., Shi, L.: Discussion on professional quality of accounting talents in “Internet +” era. School of Accounting, Chongqing University of Technology, 2018 8. Tan, Z.: Competency and cultivation strategy of accounting talents in the era of “Internet plus”. Business School of Hunan University of Technology, 2018 9. Ni, D., Bai, J., Wang, B.: Research on management accounting informatization in the “Internet +” era: A perspective based on financial shared services. Mod. Bus. (2): 126–127 (2018) 10. Sun, X.: Research on promoting the construction of management accounting information based on financial sharing. China Bus. Theory 782(07), 169–172 (2019) 11. Chen, Z., Han, S.: Discussion on the informationization of university management accounting based on financial shared services. Small Mediu. Enterp. Manag. Technol. (Late Issue) 570(03), 75–76 (2019)

The Application of MOOC in College Students’ Mental Health Teaching Fei Wang(&) Clothing Engineering College, Jilin Engineering Normal University, Changchun, China [email protected]

Abstract. The psychological health teaching of college students highlights the theory, but the practical effect is poor. The application of mooc in the psychological health teaching of college students effectively solves these problems and promotes the transformation of the mental health teaching model. But at the same time, there are also some problems in the application of moocs in mental health education. The purpose of this paper is to solve the problems existing in the application of moocs and promote the further development of mental health teaching by studying the application of moocs in college students’ mental health teaching. This paper first gives an overview of moocs and information health teaching, then makes an in-depth analysis of the application of moocs in college students’ mental health teaching and the problems in the application, and puts forward the correct application strategies on this basis. The experiment of this paper shows that the application of moocs in mental health teaching can improve the teaching effect. Keywords: MOOC teaching Application research

 College students  Mental health teaching 

1 Introduction The main purpose of college students’ mental health education is to impart the knowledge of mental health and promote the improvement of students’ mental quality. However, because mental health education knowledge is dull and theoretical, it has brought great difficulties to the mental health teaching of college students. According to the current situation of mental health education, the efficiency of mental health teaching is low, and there are still many problems. In recent years, due to the rise and large-scale use of moocs, researchers and educators at home and abroad pay more and more attention to moocs. Moocs have been deeply applied in college students’ mental health teaching. According to the current development, the application of moocs provides a new teaching method for college students’ mental health teaching and promotes the transformation and upgrading of teaching mode [1–3]. All colleges and universities at present, our country longed for class teaching mode, the domestic and foreign scholars also conducted a series of research on mu class, through comprehensive arrangement can be found on the existing research materials, the current research mainly focus in © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 546–551, 2021. https://doi.org/10.1007/978-3-030-51556-0_79

The Application of MOOC

547

class of class development, mu embodies the education technology evolution, longed for class and the combination of education and longed for class platform built on [4, 5]. There are few studies on the application of moocs in a specific discipline, especially in mental health. From this perspective, there is still a great room for improvement in this aspect of research [6]. In order to promote the deep integration of moocs and mental health education courses for college students, promote the continuous improvement of teaching effect, and help students establish good psychological quality. This paper firstly gives an overview of moocs and information health teaching, and then makes an in-depth analysis of the application of moocs in college students’ mental health teaching and the problems in the application, and on this basis puts forward the correct application strategies of moocs in college students’ mental health education. Through the research, we can draw the conclusion that the scientific application of moocs in college students’ mental health teaching is of great significance to the teaching progress [7, 8]. On the one hand, the research of this paper promotes the scientific application of moocs in mental health teaching; On the other hand, it lays a certain theoretical foundation for future relevant researches [9].

2 Method 2.1

MOOC and Mental Health Teaching

Connectivity theory and Internet learning theory are the basis of moocs. Different from the traditional course teaching mode, moocs have extremely rich characteristics, including sharing, interactivity and abundant course resources, which make moocs show great advantages when combined with teaching [10, 11]. Because the characteristics of moocs make up for the shortcomings of the current college students’ mental health teaching, such as single content, poor interaction, etc., moocs have gradually been widely used in college students’ mental health teaching. The application of moocs in mental health teaching is of great value. It not only effectively solves the problem that teachers in mental health major lack, but also further improves teachers’ professional quality and skills of information technology application. Most importantly, it establishes a new platform for teachers and students to interact on the Internet [12, 13]. 2.2

Specific Application of MOOC in College Students’ Mental Health Teaching

In general, moocs make the contents and materials of mental health teaching more intuitive and vivid, which is conducive to college students’ in-depth understanding of mental health knowledge. Secondly, moocs realize the rapid communication between teachers and students. Students learn independently by means of moocs. If they have doubts in learning, they can communicate with teachers through the online communication platform in a timely manner. In this process, teachers can also find some problems in mental health teaching. In addition, teachers conduct real-time detection

548

F. Wang

and training with the help of moocs, which enables students’ learning results to receive timely feedback. Based on this, teachers can timely adjust the teaching contents according to students’ actual learning conditions.

3 Analysis on the Application of MOOC in College Students’ Mental Health Teaching In moocs learning, there is a widespread cheating situation of “taking exams for students”. There has been a wide discussion about the integrity of students’ learning, but no good solution has been found. The second problem is the poor quality of the curriculum. Although the current mooc teaching can be evaluated and tested by students with the help of information technology, the teaching quality of many courses does not meet the requirements of relevant national curriculum standards. There are many low quality moocs in mental health education moocs, which have a serious impact on teaching quality and students’ learning effect. The third is the operation of the evaluation mechanism and standards. Mental health education is a humanistic course, and it is unscientific to establish its evaluation standard only by network examination.

4 Application Strategy and Prospect of MOOC in College Students’ Mental Health Teaching 4.1

Application Strategy

(1) Promote the continuous improvement of mooc platform construction level Aiming at the problems in the actual teaching application of moocs mentioned above, the emergence of these problems, especially the students’ integrity, is related to the overall construction of moocs platform. In order to solve these problems, we must strengthen the platform construction and improve the overall system level of moocs. First, mooc platform must strive for compatibility with various ports, such as mobile phone terminal and PC terminal, etc. The compatibility of multiple ports can give full play to the function of mooc. The second is to strengthen the design of the supervision system, such as setting the face to punch in class, to avoid the phenomenon of plagiarism; Finally, mooc platform construction can be combined with mental health education subjects to set up psychological columns, such as psychological counseling columns, psychological measurement columns and so on. The setting part of the column realized the effective combination of mooc and mental health education, and also effectively prevented the mental health problems of college students. (2) Improve psychological teachers’ mooc teaching ability Teachers are operators of moocs, whose moocs teaching ability is closely related to the application of moocs in actual mental health teaching. Therefore, the promotion of psychological teachers’ mooc teaching ability plays an important role in the rational

The Application of MOOC

549

use of mooc. Mooc teaching ability includes three aspects. They are conventional teaching ability, psychological counseling ability and mooc information teaching ability. The so-called psychological counseling ability can play a positive role in the psychological health of students and help students to carry out psychological experience and related psychological training. Mooc information teaching ability, that is, can use information technology to transfer materials, courseware, video and other teaching materials production, flexible use of information technology for mental health teaching activities. (3) Reasonably plan the proportion of mooc teaching content The content of college students’ mental health education is very complicated, including theoretical knowledge, psychological practice experience, psychological quality training and other aspects of teaching content, emphasizing both theory and practice. Therefore, when mooc is applied to college students’ mental health teaching, it is necessary to consider the problem of proportional distribution of teaching content, realize the organic combination of mooc teaching and traditional mental health teaching methods, and adopt a hybrid teaching method. 4.2

Application Prospect

In order to analyze the application prospect of moocs in college students’ mental health teaching, this paper analyzes the application status of moocs by means of literature and questionnaire survey. The specific data analysis is shown in Table 1 and Fig. 1 below. The data in the chart is the results of the author’s investigation and collation. Table 1. Comparative analysis of traditional teaching and moocs Name

Mastery of theoretical knowledge 71.64%

Teaching methods Single

Interest in learning 43.17%

Traditional teaching MOOC 89.52% Various 87.61% *Data came from the in-depth analysis of financial data in the experiment

Mental health level 73.21% 90.64%

From the data in Table 1, it can be found that compared with the traditional mental health teaching, the application of moocs in this teaching promotes students’ understanding of psychological knowledge and effectively improves the mental health level of college students. As can be seen from Fig. 1, most people are optimistic about moocs. This indicates that moocs have a good application prospect in college students’ mental health teaching.

550

F. Wang

An Attitude Survey on the Application of Moocs in Mental Health 15% 21%

52% 12%

Support

Against

Neutral

Other

Fig. 1. Survey on the application of moocs in mental health teaching

5 Conclusion Moocs enable students to learn the subject knowledge of mental health education online, conduct corresponding psychological tests and examinations online, and take the psychological quality training experience of offline college students as an auxiliary means, which greatly improves the effect of mental health teaching for college students and promotes the transformation of teaching mode. However, due to the late start of moocs in China, there are still many problems in the application process, so the correct application of moocs needs long-term exploration. Therefore, in the application of mooc to mental health teaching, we should pay attention to the characteristics of mental health courses and the status quo of their development, and strive to realize the organic integration between the two. Acknowledgements. This work was supported by IPIS2012. The conclusion of the 2019 education and teaching research project of Jilin Normal University of engineering and technology, research on the construction of College Students' mental health education curriculum from the perspective of positive psychology.

References 1. Yang, Y., Bao, T.: Research on the teaching model of college students’ mental health under the background of “MOOC”. China Agric. Educ. 15(3), 117–121 (2017) 2. Weiwei, X.: Some thoughts on “MOOC”. Educ. Explor. 3(8), 19–21 (2017) 3. Yue-mei, Y., Zhong-min, C., Shu-ping, P.: Application of mooc platform in higher mathematics teaching. Educ. Explor. 12(8), 140–142 (2017) 4. Xiaogang, W.: Challenges and reflections on education technology in moocera. Educ. Explor. 31(10), 48–50 (2017) 5. Weiping, L.: A brief analysis of the application of moocs in ideological and political theory courses in universities. Ideol. Theor. Educ. Guid. 32(11), 131–133 (2017)

The Application of MOOC

551

6. Liang, L.: Moocs and ideological and political theory teaching model innovation. Ideol. Theor. Educ. 16(1), 65 (2017) 7. Shanming, Z., Kuang, L.: Mental health education for college students: from traditional teaching to flipped classroom teaching. Educ. Teach. Forum 17(39), 164–165 (2017) 8. Guobin, X., Hongqing, H.: On the basic requirements of college students’ mental health education. Res. Ideol. Educ. 14(10), 47 (2017) 9. Wang, B., Wu, F.: Research on teaching design of positive psychology orientation course “college students’ mental health education”. J. Hebei Univ. Eng. 13(3), 104 (2018) 10. Zhiying, S: “Tri-in-one” mental health education curriculum design and experimental research for college students. J. AnqingNormal Univ. 11(12), 135–139 (2017) 11. Li, X.: Crowd and network MOOC practice.Ind. Inf. Educ. 10(9), 46–55 (2017) 12. Jinling. Looking at moocs, micro courses and micro courses from connections. China Inf. Tech. Educ. 15(6), 33 (2017) 13. Ho, K.: New development of educational technology theory in terms of Blending theory Learning. Elem.Tary Second. Sch. Inf. Technol. Educ. 13(4), 21–31 (2018)

Plan of Physical Education Teaching Platform Based on Campus Network Technology Juan Yi1 and Jie Huang2(&) 1

Department of Physical Education, Yuzhang Normal University, Jiangxi, China 2 Institute of Technology, East China Jiaotong University, Jiangxi, China [email protected]

Abstract. With the rapid development of economy, information technology is also making continuous progress. Since the 20th century, human beings have entered the information age, various information technologies are booming, all aspects of human life need to use information technology, all need to use computers, the same is true for the education industry, now it is basically online teaching, which is not only more convenient but also improved Students’ interest in learning. Based on this reason, this paper focuses on the analysis of how to design the teaching platform of physical education based on campus network technology. First of all, this paper describes the concept of campus network technology and what is the network teaching platform. The so-called campus network refers to the network used in a school. The network can provide teachers and students with a variety of services, including network teaching, implementation of scientific research and other comprehensive services, while the network teaching platform is divided into two kinds, namely, the broad and narrow sense of network teaching Platform. Secondly, through the campus network technology, we can design the interface and function module of the sports teaching platform. The function module of the sports teaching platform includes five modules, which are teaching resources module, students’ independent learning module, examination evaluation module, learning and communication module, and sports teaching module. Finally, through the study of a university, we can conclude that the campus network technology is very important in the process of designing the sports teaching platform. We can conclude that the average score of students’ sports has increased by 5.4 points, 5.9 points, 6.6 points and 7.2 points respectively in 2016–2019. Keywords: Campus network technology  Sports teaching platform  Interface design  Function module

1 Introduction Since the invention of computer in the last century, human society has entered the information age, with the vigorous development of various information technologies. With the continuous progress of society, the continuous development of economy, the rapid development of information technology, people’s lives have been completely inseparable from information technology, information technology as air around us, it © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 552–558, 2021. https://doi.org/10.1007/978-3-030-51556-0_80

Plan of Physical Education Teaching Platform

553

covers all aspects of people’s lives. Nowadays, in the campus education, the role of information technology is also very huge. In order to better manage students and schools, each school has its own campus network, and now the classroom is multimedia classroom. Now the campus network technology can be used not only for management but also for designing various teaching platforms. About the campus network technology and network teaching platform, has received widespread attention, has had many scholars to carry on the research. In [1], the author proposes an Internet of things architecture that can transparently manage different communication protocols in the intelligent environment, and studies its application in the distributed energy monitoring of the intelligent campus. The results show that the proposed solution can manage more than 10000 nodes. In [2], the generalized feed forward and back propagation neural networks are used to parameterize the wind. The influence of three meteorological parameters (air pressure, relative humidity and temperature) on the prediction of wind speed in southern India is studied. The results show that the model with six neurons in the hidden layer can predict the wind speed better with the relative humidity as the input parameter. In [3], the author proposes an efficient and light-weight method, which can locate and track the PII from the HTTP layer of the original network traffic reconstruction. The experimental results show that the precision and recall of TPII are 91.72% and 94.51% respectively. The parallel implementation can realize the mining and annotation of 213 million records in an hour, and support 1 Gbps line speed detection in practical application. In [4], the author proposes a micro hybrid fractal antenna (GCHFA) based on Giuseppe PEANO and Cantor set fractal. The proposed GCHFA is designed by combining Giuseppe PEANO and Cantor set fractal, which helps to achieve better performance characteristics and miniaturization. The results of optimization, simulation and experiment show that they are closely matched. In [5], the author discusses the human posture recognition method based on affine invariant geometric feature sift operator. Sift operator has high computational complexity. Different body positions and image blurring will increase the difficulty of feature recognition. The experimental results show that this method can not only effectively reduce the influence of attitude difference and image blur on attitude recognition rate, but also significantly improve the calculation speed and gesture recognition efficiency of sift operator. In [6], the basic motivation of the author’s work is to find various types of attacks in wireless transmission, and propose a security mechanism to prevent wireless transmission vulnerabilities and attacks. This paper describes the security threats in wireless networks. As a means to prevent attacks, mobile agent proposes the security protocol s-raid. In [7], the author studies graph theory and AHP in dealing with network selection. Experimental results show that compared with the traditional algorithm, this strategy has significant performance in real-time flow QOS measurement. In [8], the author aims to propose and implement a new framework for analyzing tweet data from online social networking sites (OSN; twitter). The author’s goal is to use cost-effective tools to obtain and query unstructured data, and to analyze scalable and uninterrupted data flow algorithms with limited memory and resources, so as to effectively process large social data. In [9], the author studies the application of geographic accurate mirror virtual campus model as interactive learning environment. The results show that the reality and the virtual need to be more deeply connected, rather than just reflecting the physical space in the virtual field.

554

J. Yi and J. Huang

In [10], the author’s purpose is to let students participate in and optimize the practical plan for learning. Students expressed positive views on immersion. They attached great importance to simulation and skill practice, peer interaction, interaction with teachers and Leadership Symposium. Immersion enhanced students’ participation and helped optimize learning results. Based on the campus network technology, this paper designs a sports teaching platform. Firstly, this paper briefly summarizes the campus network technology and network teaching platform. Secondly, it introduces the most important two points in the design of sports teaching platform. They are the interface design and function module design of the sports teaching platform. The specific analysis is shown below.

2 Definition of Relevant Concepts 2.1

Campus Network Technology

The so-called campus network refers to the network used in a school, which can provide a variety of services for teachers and students, including network teaching, implementation of scientific research and other comprehensive services. The campus network technology is different from other technologies, because the network is used in the campus, we know that there are many teachers and students in general schools, which requires the campus network to have a very strong interactive function, professional to be very strong, only such a school’s multimedia teaching software development platform, multimedia demonstration classroom, teacher preparation system, electronic reading room and teaching, test database, etc. can operate normally. In addition, the campus network should also have the management ability to monitor all kinds of situations of the school. There are many characteristics of campus network, mainly including the following points: first, the speed is very fast, because the network needs to contain a large number of multimedia information, so the speed is its basic requirement, and second, it is very safe and reliable, because once the campus network is damaged, it will bring great losses to the school, and finally, the operation of the campus network is relatively convenient, and every student can be very square Convenient operation. 2.2

Network Teaching Platform

With the rapid development of information technology, the development of network teaching platform is more and more rapid, because network teaching can not only facilitate teachers’ teaching, but also be more conducive to students’ learning. Network teaching platform is divided into two kinds, namely, the broad sense of network teaching platform and the narrow sense of network teaching platform. The broad sense network teaching platform generally refers to the hardware facilities and software systems, which are related to the network teaching. The narrow sense network teaching platform refers to the general term of the software system which is based on the Internet and provides comprehensive support services for the network teaching. A complete network teaching platform includes many aspects, which is composed of three systems,

Plan of Physical Education Teaching Platform

555

namely, online curriculum development system, online teaching support system and online teaching management system. Only when these three systems work at the same time, the network teaching platform can be better developed. From a large level, the network teaching level reflects the modern education level of a city to a large extent, so the implementation of the network teaching platform is crucial to the development of the education level of a country.

3 Design of Sports Teaching Platform 3.1

Interface Design of Sports Teaching Platform

The user interface of the sports teaching platform includes two parts, namely the user login interface and the front page of the interface. The interface design of the platform is made and designed with the help of PS and other software. In the design process, the campus network technology is used for many times to make, and finally a teaching platform with rich and colorful contents and sports characteristics is presented. The interface design of physical education teaching platform has certain functionality and practicability. Through the login interface, students can easily use the teaching platform, which can help students quickly retrieve the knowledge needed and improve the efficiency of learning. The sports teaching platform fully integrates the sports spirit. Students can see the “higher, faster and stronger” font as soon as they log on the platform, so they have emotional resonance. After students log in and enter the sports teaching platform, the user login dialog box will be displayed first, including user name and password. The entry process of the home page is to search for key words first, and then enter the sports teaching platform. After entering the platform, students can register. After registering, they can log in. After logging in, they can enter the home page of the platform through basic information and quick access. The specific entry process of the home page is shown in Fig. 1.

Keyword search

Enter the physical education teaching platform

register

Basic information + quick access

Sign in

Fig. 1. Entry process of the front page of sports teaching platform

556

3.2

J. Yi and J. Huang

Function Module Design of Physical Education Teaching Platform

The design of the function module of the sports teaching platform is in line with the course content and teaching characteristics of the sports teaching. According to the course content of the sports teaching, the function module of the platform should include theoretical knowledge and various technical skills, as well as various sports teaching videos and technical explanations, followed by an overview of the spirit of sports. According to the needs of physical education teaching, the design of physical activities in line with classroom teaching, according to the different content of physical education assessment, set up different forms of assessment and evaluation. The function module design of the sports teaching platform is perfectly integrated into the campus network technology, which enables students to browse the sports teaching platform through the campus network technology, so that teachers and students have a deeper understanding of sports teaching. The specific functional modules are shown in Fig. 2. It can be seen that the functional modules of the sports teaching platform include five modules, namely, the teaching resource module, the student independent learning module, the examination evaluation module, the learning and exchange module, and the sports teaching module.

Teaching resource module

Students' autonomous learning module

Test evaluation module

physical education module

Learning and AC module

Fig. 2. Function module of physical education platform

4 Results Based on the campus network technology, this paper designs a physical education teaching platform. Through this technology, teachers and students can understand the content of physical education more conveniently, which not only improves the teaching efficiency of teachers, but also improves students’ interest in physical education. This paper selects a university in a certain city for research. It can be found that before the campus network technology is used, the achievements of physical education in this university have been relatively low. The students’ interest in sports is not very large, nor are they very active in class. However, since the use of campus network technology and the design of a unique sports teaching platform, sports performance has been rapidly improved, and students’ enthusiasm for sports has been ignited rapidly, so we

Plan of Physical Education Teaching Platform

557

can find that the impact of campus network technology on the University’s sports teaching is so huge, the average score of students’ sports in 2016–2019 increased by 5.4 points, 5.9 points, 6.6 points respectively Score: 7.2, as shown in Fig. 3.

Fig. 3. Comparison of 2016–2019 average performance

5 Conclusion Starting from the campus network technology, this paper focuses on how to use the campus network technology to design the sports teaching platform. This paper first describes the concept of campus network technology and what is the network teaching platform. Secondly, through the campus network technology, we can design the interface and function module of the sports teaching platform. Finally, through the research of a university, we can get that the campus network technology is very important in the process of designing the sports teaching platform. In the research of this paper, there are still many shortcomings, such as not considering the use of campus network in other schools, which will be solved in the future research.

References 1. Pasetti, M., Ferrari, P., Silva, D.R.C., Silva, I., Sisinni, E.: On the use of LORAWAN for the monitoring and control of distributed energy resources in a smart campus. Appl. Sci. 10(1), 320 (2020) 2. Anwar, K., Deshmukh, S.: Parametric study for the prediction of wind energy potential over the southern part of India using neural network and geographic information system approach. Proc. Inst. Mech. Eng. Part A: J. Power Energy 234(1), 96–109 (2020) 3. Liu, Y., Song, T., Liao, L.: TPII: tracking personally identifiable information via user behaviors in HTTP traffic. Front. Comput. Sci. 14(3), 1–14 (2020)

558

J. Yi and J. Huang

4. Kaur, M., Sivia, J.S.: Giuseppe PEANO and Cantor set fractals based miniaturized hybrid fractal antenna for biomedical applications using artificial neural network and firefly algorithm. Int. J. RF Microwave Comput.-Aided Engin. 30(1), e22000 (2020) 5. Wang, C., Zhang, Z., Xi, Z.: A human body based on sift-neural network algorithm attitude recognition method. J. Med. Imaging Health Inform. 10(1), 129–133 (2020) 6. Rath, M., Pati, B., Pattanayak, B.K.: Manifold surveillance issues in wireless network and the secured protocol. International Journal of Information Security and Privacy (IJISP) 14(1), 16–26 (2020) 7. Lahby, M.: Enhancing modeling for network selection using graph theory in beyond 4G networks. Int. J. Bus. Data Commun. Netw. (IJBDCN) 16(1), 48–69 (2020) 8. Tidke, B., Mehta, R., Rana, D., Jangir, H.: Topic sensitive user clustering using sentiment score and similarity measures: big data and social network. Int. J. Web-Based Learn. Teach. Technol. (IJWLTT) 15(2), 34–45 (2020) 9. Pakanen, M., Alavesa, P., Arhippainen, L., Ojala, T.: Stepping out of the classroom: anticipated user experiences of web-based mirror world like virtual campus. Int. J. Virtual Pers. Learn. Environ. (IJVPLE) 10(1), 1–23 (2020) 10. Hardin-Pierce, M., Hampton, D., Melander, S., Wheeler, K., Scott, L., Inman, D., Parrish, E., Mudd-Martin, G.: Faculty and student perspectives of a graduate online delivery model supported by on-campus immersion. Clin. Nurse Spec. 34(1), 23–29 (2020)

Development of Teaching Software for Power Electronic Technology Course Hengjuan Liu(&) Shanghai City Science and Technology School, Shanghai 201601, China [email protected]

Abstract. A set of teaching software for power electronic technology based on MATLAB is developed in order to overcome the traditional teaching methods’ disadvantages of power electronic technology, deepen students’ comprehension on theoretical knowledge, reduce the influence on insufficient experimental conditions and other factors, and make the teaching process more intuitive and efficient. This paper describes the design and implementation of the software from the system overall design, system interface design, Simulink modeling, and programming, and finally explains the effect and significance of its application. It has been proved that the developed auxiliary teaching software enables students to understand and master the relevant contents more clearly, improves the learning interest of students, cultivates the engineering ability of students on practice, and effectively promotes the teaching reform. Keywords: Teaching software software  Teaching reform

 Power electronic technology  MATLAB

1 Introduction Power electronic technology is a basic course of electrical engineering and related electrical majors, which integrates power, electronics and control theory. In the course of theoretical teaching, the drawing of waveforms is complicated, numerous and difficult. In the experimental teaching, there are many limitations, such as the shortage of equipment, the easy damage, and the safety risk of personnel operation. Therefore, the teaching reform is urgently needed. In the process of reform, as an effective means to improve the teaching quality, course teaching software has attracted the attention of domestic and foreign schools and scientific research institutions. At present, the course teaching software is mostly compiled by Java, C# and other software, which has problems such as the quality of code is difficult to control and the workload of development is large. MATLAB software has powerful functions in numerical calculation, symbolic operation, graphic processing and graphical user interface [1]. Compared with other similar EDA simulation software, it has the advantages of high precision. It brings great convenience to develop the teaching software for power electronics technology course and can effectively promote the teaching reform in this field.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 559–565, 2021. https://doi.org/10.1007/978-3-030-51556-0_81

560

H. Liu

2 System Design and Implementation 2.1

System General Design

The auxiliary teaching system with friendly interface is constructed on the development platform of MATLAB. According to the experimental project to be set up, the whole system is divided into four modules: rectifier circuit module, inverter circuit module, DC chopper circuit module and AC conversion circuit module [2]. A total of 26 experiments can be done. Its structure is shown in Fig. 1.

Singlephase

Rectifier circuit

System main interface

Threephase

Resistive load

Single-phase half wave controlled rectifier circuit

Inductive load without continuous flow tube

Single-phase half controlled bridge rectifier circuit

Inductive load without continuous flow tube

Single-phase full controlled bridge rectifier circuit

Inductive load without continuous flow tube

Three-phase half wave controlled rectifier circuit

Inductive load without continuous flow tube

Three-phase half controlled bridge rectifier circuit

Inductive load without continuous flow tube

Three-phase full controlled bridge rectifier circuit

Inductive load without continuous flow tube

Inductive load with continuous flow tube Resistive load Inductive load with continuous flow tube Resistive load Inductive load with continuous flow tube Resistive load Inductive load with continuous flow tube Resistive load Inductive load with continuous flow tube Resistive load Inductive load with continuous flow tube

Single-phase full bridge active inverter circuit Inverter circuit

Three-phase half wave active inverter circuit Three-phase full bridge active inverter circuit Boost chopper circuit

DC chopper circuit AC conversion circuit

Buck chopper circuit Boost-buck chopper circuit Single phase AC voltage regulating circuit Three phase AC voltage regulating circuit

Fig. 1. System structure

Development of Teaching Software

2.2

561

System Interface Design

The software uses the GUI technology of MATLAB to design the interface. Each experiment corresponds to a sub interface, with a total of 26 sub interfaces. Each sub interface can be divided into four functional areas: menu area, Simulink modeling circuit diagram area, parameter setting area and simulation waveform area. According to the content characteristics of power electronic technology course, the main experimental items that the software can complete are arranged on each menu in turn. The Simulink modeling circuit diagram, IGBT waveform, current waveform through the inductance, and load terminal voltage waveform, etc. corresponding to each circuit are displayed on the corresponding sub interface. The relevant parameters of the circuit, such as input voltage, load and duty cycle, etc. can be set by themselves as required. The waveform will change with the changes of the parameters after operation. For example taking the buck chopper circuit, the sub interface is shown in Fig. 2.

Fig. 2. System sub interface

2.3

Simulink Modeling

Single-phase half wave controlled rectifier circuit is one of the most widely used and simplest circuits in power electronic technology, so it is also power electronic technology course’s very important part. Next, the single-phase half wave controlled rectifier circuit’s simulation model is introduced.

562

H. Liu

The single-phase half wave controlled rectifier circuit is composed of AC power supply, thyristor, load and trigger circuit. The output DC voltage and current can be adjusted by changing the thyristor’s control angle [3]. The simulation process of the circuit can be divided into establishing simulation model, setting model parameters and observing simulation results [4]. 1. Establish simulation model The simulation model of single-phase half wave controlled rectifier circuit [5] is established according to the schematic diagram by using various component models of SimPowerSystems in the Simulink environment, as shown in Fig. 3.

Fig. 3. Simulation model of single-phase half wave controlled rectifier circuit

2. Set model parameters The model parameters are as follows: single-phase AC power supply voltage is 220 V (maximum), frequency is 50 Hz, load resistance is 10 X, thyristor parameter is the default value, and pulse trigger angle is 30° [6]. 3. Observe simulation results The simulation parameters are as follows: the simulation time is 0.06 s, and the numerical algorithm is ode15 [7]. After the simulation parameters are set, the simulation can be started. The simulation waveforms of the load terminal voltage, the load current, and the thyristor terminal voltage are as shown in Fig. 4.

Development of Teaching Software

563

Fig. 4. Simulation results

2.4

Programming

The realization of software function is realized by writing callback functions for each sub menu option and control [8]. In the following, the programming process is introduced by setting the Simulink model parameters of the single-phase half wave controlled rectifier circuit and simulation as an example. Some m language program codes are as follows: load_system(‘dxbkqzldz’); % Load the Simulink model system [9] set_param(‘dxbkqzldz/Series RLC Branch2’,‘a’,a1); % Set the resistance value of model parameters set_param(‘dxbkqzldz/Pulse Generator’,‘PhaseDelay’,g1); % Set the phase of the pulse set_param(‘dxbkqzldz/Pulse Generator’,‘Period’,k1); % Set the period of the pulse set_param(‘dxbkqzldz/AC Voltage Source’,‘F’,h1); % Set the frequency of single-phase AC power supply set_param(‘dxbkqzldz/AC Voltage Source’,‘A’,e1); % Set the maximum voltage of single-phase AC power supply set_param(‘dxbkqzldz’,‘StopTime’,l1); % Set simulation end time set_param(‘dxbkqzldz’,‘MaxStep’,‘1.0000e-004’); % Set the maximum steps for the model set_param(‘dxbkqzldz/Detailed Thyristor’,‘Vf’,‘0’); % Set the forward voltage of the thyristor

564

H. Liu

save_system(‘dxbkqzldz’); sim(‘dxbkqzldz’);

% Save Model % Model simulation [10]

3 Application Effect and Significance The software has been used in the class theory and experimental simulation teaching, and as an auxiliary tool for students’ self-study. It effectively overcomes the limitations of the current theoretical and experimental teaching of power electronics technology, fully arouses the enthusiasm of students and improves the teaching effect. The main performance is as follows: 1. The software establishes and simulates several common power electronic circuits, such as rectifier circuit, DC chopper circuit, inverter circuit, AC conversion circuit and so on. It realizes the function of observing circuit waveform, setting circuit parameters and observing the influence on parameter changes on circuit waveform. 2. It makes the abstract and complex theory of power electronics intuitive, simple and easy for students to understand. 3. It is easy for students to analyze the simulation results, improve the system structure and modify the parameters, so as to achieve the required results and performance, and carry out the system analysis and design work quickly. 4. The simulation is used to verify the waveform analysis under special circumstances, so as to promote the concept understanding and increase the flexibility of teaching. 5. The simple and clear graphic interface of human-computer interaction makes teachers and students use it flexibly without MATLAB knowledge. 6. The realization of experiment teaching content in the form of software can greatly reduce the investment cost and maintenance cost of experimental equipment, and save a lot of money. 7. Not limited by time, space and material conditions, it makes students easy to comprehend and master power electronics technology’s theoretical knowledge and analysis methods, and also provides strong support for students to carry out open and design experiments. The application of software will greatly improve the teaching quality of power electronic technology course in domestic and foreign schools. The software can be applied to the teaching of single-phase half wave controlled rectifier circuit, single-phase full control bridge rectifier circuit, three-phase half wave controlled rectifier circuit, three-phase full controlled bridge rectifier circuit, single-phase bridge active inverter circuit, three-phase bridge active inverter circuit and other circuits in the power electronics technology course. Compared with the traditional teaching method, the software application brings great convenience to the teaching of power electronics technology. It can make students analyze the circuit intuitively and observe the waveform accurately. It also can save the investment and maintenance cost of experimental equipment.

Development of Teaching Software

565

4 Concluding Remarks The design and implementation of the teaching software for power electronic technology course based on MATLAB shows that its design and implementation have reached the expected goal. Its application can provide reference for domestic and foreign schools to carry out the teaching reform of power electronic technology course.

References 1. Sun, Y.: Thoughts on the teaching reform of power electronic technology under CDIO mode. Univ. Educ. 3, 77–78 (2017) 2. Wang, H., Xu, C.F., Yang, L., Hu, Q.H., Ye, Z.D., Yi, M.: Mechanical wave simulation based on GUI of MATLAB software. Phys. Eng. 27(02), 83–86 (2017) 3. Zhang, M.X., Gu, T.T.: Research on MATLAB / Simulink simulation teaching of power electronic technology experiment. Educ. Informatiz. Forum 01, 119–120 (2019) 4. Zhang, X., Ye, Y.Y.: Design and simulation of light control circuit based on AC voltage regulation. Technol. Innov. Appl. 27, 102–103 (2019) 5. Jiao, Y.W.: Design and Simulation of three-phase full control bridge thyristor motor system. Fujian Comput. 34(7), 134–135 (2018) 6. Zhang, W., Qi, K.L.: Modeling and analysis of single phase bridge full control rectification circuit based on MATLAB. Electron. Des. Eng. 25(12), 97–100 (2017) 7. Liu, D.: Teaching design and simulation research of power electronic technology based on MATLAB. Pract. Electron. 13, 71–72 (2019) 8. Wang, X.H., Chu, H., Zhu, G.M., Sun, M.J.: Design and realization of virtual experiment platform for automatic control based on LabWindows\CVI and Matlab. Exp. Technol. Manag. 36(6), 144–147+151 (2019) 9. Su, Y.X., Shen, X.Q., Ye, J.Y.: Teaching reform and discussion of power electronic technology under various teaching modes. Shandong Ind. Technol. (20), 253+203 (2017) 10. Gao, L.X.: Application and practice of MATLAB simulation software in the teaching of automatic control principle. South Agric. Mach. 50(10), 8–9 (2019)

Practice of University Curriculum Construction Under the Background of Informationization Wei Cong(&) and Jing Liu School of Information Engineering, Xijing University, Xi’an 710023, Shanxi, China [email protected]

Abstract. Curriculum construction is the eternal theme of college teaching, and it’s also a process of successive optimization. The deep integration of informationization and education advances higher demands for curriculum construction. Taking the course of “Avionics System General Technology” as an example, this paper first analyzes the present condition of the course teaching, finds out the weak links in the course information construction, and clarifies the necessity of the construction. Secondly, based on the overall training of talents’ knowledge and skill, the paper makes the curriculum construction scheme, makes top-level planning and unified guidance, and finally focuses on the construction of teaching content system, the construction of information-based instruction resources, the exploration of diversified teaching methods, and the integration of comprehensive experimental resources to comprehensively summarize the practice and experience of curriculum construction, for the purpose to provide reference on similar curriculums construction. Keywords: Under the background of informationization construction  Avionics system

 Curriculum

1 Introduction Curriculum construction is the eternal theme of college teaching, but also a process of successive optimization “under the background of informationization” means the application of information technology in weapons and equipment on the one hand, and the deep integration of information technology and teaching on the other hand. These two aspects require that the whole process of curriculum construction should be run through, so as to really play the role of information technology in promoting teaching. In the last few years, with the goal of improving students’ skills and quality, we carry out curriculum construction. In practice, we keep up with the development of equipment, constantly improve the teaching content, continuously explore the teaching mode adapted to the information background, simultaneously develop the information-based teaching resources, boldly develop the information-based teaching methods, effectively alleviate the contradiction between the development of information-based equipment and the teaching of curriculums, and effectively improving the quality of talent education. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 566–572, 2021. https://doi.org/10.1007/978-3-030-51556-0_82

Practice of University Curriculum Construction Under

567

Taking the course of “Avionics System General Technology” as a case study, this paper analyzes the weak links in the curriculum Informationization construction, based on the overall training of talents’ knowledge and ability, and comprehensively summarizes the practice of curriculum construction from the aspects of curriculum construction scheme, teaching content frame, teaching resources, teaching methods, experimental resources, etc. aim to provide reference for the similar curriculums construction.

2 Current Situation of Curriculum Teaching The avionics system is an part of the modern combat aircraft, and it is the key for the aircraft to play the combat effectiveness. The course “Avionics System General Technology” takes the avionics system of combat aircraft as the background, and specifically introduces the basic theory, basic method, system working principle and other contents of the general technology [1]. From the view of course nature, the course belongs to the general principle course, but it is different from the navigation principle, electronic countermeasure principle and other courses. On the basis of these courses, the integrated avionics course is elaborated from the perspective of the system as a whole. With the continuous improvement of the degree of information, the integrity and complexity of avionics system are also increasing [1, 2]. This trend makes the existing course teaching have the following shortcomings: First, the course content can not fully cover the technical status of the equipment. The teaching content is limited to independent electronic equipment and the working principle, working process and equipment application of the system are not introduced. Second, teaching methods can not meet the needs of dynamic presentation of teaching content. Avionics system is a system composed of hundreds of devices. Its working process is also a dynamic process of coordination and cooperation of these devices [1]. The existing teaching methods are not strong enough in the visual display of the dynamic process, let alone the visual display of the working process of the system in flight. Third, the experimental equipment does not support the establishment of multilevel experiments. The integrated avionics system is a complex system. Its ground real installation experimental environment is expensive and requires high experimental site [1]. At present, the existing simulation experimental environment only supports limited demonstration experiments, and does not support enough the design and independence experiments. In addition, it also lacks the supporting environment of course design, graduation design and other activities.

3 Exploration and Practice of Curriculum Construction In order to integrate the information-based teaching means with the teaching links of the curriculum and ensure the actual effect of the curriculum construction, we put forward the guidelines of general planning, comprehensive promotion and key

568

W. Cong and J. Liu

implementation, and carried out the omnidirectional curriculum construction and achieved the expected results. 3.1

Formulate Top-Level Curriculum Construction Scheme

Taking the weak link of curriculum teaching as a breakthrough, we put forward the Trinity curriculum construction scheme of classroom teaching, practical teaching and graduation design (as shown in Fig. 1).

on cti ire dd

yn the sis

se res

ult s

en nd co

new technique

classroom teaching

graduation design

ion t sit in po po m e co dg ts de wle en g o m hin kn ve eac hie t t ac por p su

equipment example

decomposition capability point

laboratory construction

practice teaching

practice teaching

result synthesis

Fig. 1. Trinity curriculum construction scheme

The construction scheme takes classroom teaching as the center, radiates to practice teaching and graduation design in parallel, and integrates the three into a set of mutually supporting system. The specific performance is: condense the direction of graduation design from the classroom teaching content, and decompose the teaching content into knowledge points as the practice topic; at the same time, decompose the graduation design into a series of “ability points”, and integrate into the practice teaching. The results and deepening research of classroom teaching and practice teaching are directly connected with the graduation design. It is important that the classroom teaching content comes from application examples, new technology and scientific research achievements, which not only enriches the teaching content, but also makes the practical teaching and graduation design more reflect the actual problems of equipment. At the same time, graduation design and practical teaching are provided by the laboratory, and their design results can also be used as supporting resources for laboratory construction [3]. 3.2

Grasp the Core Problems and Construct the Teaching Content System

Reflect the technology trend of weapon equipment informationization, the core issue is “what to say” to enable students to know its nature and why, which is the focus of curriculum construction. To this end, we take the following approach:

Practice of University Curriculum Construction Under

569

One is to follow the essential characteristics of avionics system and build the framework of teaching content. According to the viewpoint of “interrelated and interactive whole” in system theory, we have constructed the content framework of avionics system function design method, composition and interconnection structure, information interaction process [1, 2], etc., extracted the principle content and method from the accumulated data, and made the teaching content change from “what” to “why”. Second, take the avionics system design process as the main line to expand the breadth of knowledge in an all-round way. According to the design process of avionics system, we start with the functional design and decompose from top to bottom layer by layer [4] to form a basic content system of 3 levels, 5 types and 18 modules (see Fig. 2. for details), so that students can have system oriented knowledge and ability on the basis of learning deeply. top level functions of avionics system human machine interface

system control management

flight parameters determination

flight task support

combat mission calculation

display processing

air data calculation

communication management

operation processing

flight vector calculation

target detection

alarm management

flight status calculation

store management

status ascertain

data loading record

sensor management

task management

route navigation

fire control paras calculation

data transmission

approach landing navigation

electronic countermeasure

Fig. 2. Basic content frame

Third, from the dynamic characteristics of avionics system as a breakthrough, straighten out the principle mechanism. Under the guidance of “system is an organic whole”, we put forward the working principle and control method of traction system based on “information interaction process” [4]. Then, the application examples of “virtual system” are designed by using the summarized laws and general principles, thus forming the teaching content frame including “1 concept (information interaction process),1 set of methods (information interaction process design method), 1 example (typical avionics system), 5 kinds of processes (preparation, navigation, air-to-air interception, air-to-air combat, air-to-surface attack)”. 3.3

Using Information Technology to Construct Teaching Resources

With MOOC as the core, we have built information-based teaching resources in an allround way. At present, we have completed multiple MOOC lectures. During the construction of MOOC, we completed the planning of 40 knowledge points, wrote nearly 90000 words of scripts, completed about 400 h of micro video recording and

570

W. Cong and J. Liu

production, built 740 test questions database, and provided 25 electronic materials and more than 40 teaching plans and electronic courseware [5, 6]. MOOC provides students with open and shared learning resources and an environment for exchange and discussion. Further more, it uses a large number of 3D Animation videos to vividly show the whole process of the dynamic work of avionics system, so that students can get targeted, intuitive and rich learning experience under the classroom and on the network [7, 8]. 3.4

Follow the Law of Teaching and Explore Information Teaching Methods

MOOC, in essence, is a form of online education. It is a new type of curriculum model that systematically provides online media for teaching, learning and evaluation, and even for certificate granting [7]. However, to make best use of the information-based teaching resources and fully play to the advantages of MOOC and other means to serve the improvement of teaching quality is an important problem to be pondered and solved. We use MOOC class and Rain Classroom to practice the new models of blended teaching and flipped class. In the teaching based on MOOC, we divide the teaching content of the course into independent modules. The “basic related” modules adopt flipped teaching, and students use MOOC to complete independently. The task of teachers is to answer the common problems of students, and expand the knowledge in terms of breadth and depth. The blended method is adopted in the module teaching of “basic irrelevant”. The students first use the MOOC or Rain Classroom to preview, and the teacher guides the students to complete the learning in the class [9, 10]. In the process of exploration and practice of teaching methods, we have solved a series of problems, such as students’ learning first, teachers’ teaching later, students’ learning what, teachers’ teaching what, how to teach and so on [10, 11]. In the use of Rain Classroom teaching, the use of test questions, voting and other forms to actively participate in class activities; the use of random roll call, red packet to improve the focus of students listening to the class, truly play the advantage and role of information resources. 3.5

Integrating Experimental Resources and Opening Up Practical Teaching Links

The integration of experimental resources is still focused on the planning of experimental content. To this end, we will: First, the experiment items were determined by “knowledge point + ability point”. Aiming at the teaching content of abstract and dynamic operation, the experiment contents such as bus transmission, information interaction process, system operation demonstration and cockpit display are designed. In the aspect of ability training, the experiment contents such as equipment identification, bus data analysis, application software program are designed. Second, according to the characteristics of different laboratories, arrange the experiment contents reasonably. The avionics system laboratory is mainly constructed

Practice of University Curriculum Construction Under

571

by real equipment, with a large scale of equipment, arranging demonstrative experimental projects such as equipment identification and system operation demonstration. The system processor laboratory is built with the core processor as the main body to carry out the avionics application software design and other experiments. The bus laboratory has arranged the experiment of bus transmission mechanism, information interaction process, cockpit display design, programming and debugging [1]. Third, all laboratories are combined to conduct comprehensive experiments. For the comprehensive experiment which needs not only the real support but also the students’ hands-on debugging, the distributed experiment method is adopted. For example, the avionics system bus data acquisition and analysis experiment is carried out by using the equipment of avionics system laboratory, and then the recorded data of different system states are distributed according to groups, and the group debugging and analysis experiment is carried out in bus laboratory.

4 Conclusions After years of continuous construction, the course “Avionics System General Technology” has a relatively complete content system, teaching resources and experimental environment. The course has condensed a set of teaching methods and organizational models, and has radiated other curriculums, playing a good exemplary role. At the same time, we also clearly realize that the curriculum construction is a complex and long-term process. We should continue to develop new ideas, new ideas and new methods in a dynamic and open teaching environment, and continue to promote the improvement of teaching quality.

References 1. Wang, H., Niu, W.: A review on key technologies of the distributed integrated modular avionics System. Int. J. Wirel. Inf. Netw. 25(3), 358–369 (2018) 2. Degtyarev, A.R., Kiselev, S.K.: Hardware reconfiguration algorithm in multiprocessor systems of integrated modular avionics. Russ. Aeronaut. 60(1),116–121 (2017) 3. Camille, H., Leah, M., Aileen, L., Sarah, M.: Student-created online teaching resources for students. Adv. Exp. Med. Biol. 1171, 37–46 (2019) 4. Barnat, J., Bauch, P., et al.: Analysing sanity of requirements for avionics systems. Form. Asp. Comput. 28(1), 45–63 (2016) 5. Andrew, A.: The nature and level of learner–learner interaction in a chemistry Massive Open Online Course (MOOC). J. Comput. High. Educ. 29(3), 411–431 (2017) 6. Stich, A.E., Reeves, T.D.: Massive Open Online Courses and underserved students in the United States. Internet High. Educ. 32, 58–71 (2017) 7. Ortega-Arranz, A., Er, E., et al.: Understanding student behavior and perceptions toward earning badges in a gamified MOOC. Univ. Access Inf. Soc. 18(3), 533–549 (2019)

572

W. Cong and J. Liu

8. Howard, Veronica J.: Open educational resources in behavior analysis. Behav. Anal. Pract. 12(4), 839–853 (2019) 9. Dziuban, C., Graham, C. R., Moskal, P. D. et al.: Blended learning: The new normal and emerging technologies. Int. J. Educ. Technol. High. Educ. 15(1), 3 (2018) 10. Almerich, G., Orellana, N., et al.: Teachers’ information and communication technology competences: A structural approach. Comput. Educ. 100, 110–125 (2016) 11. Phan, T., McNeil, S.G., Robin, B.R.: Students’ patterns of engagement and course performance in a massive open online course. Comput. Educ. 95, 36–44 (2016)

Course Construction Process of MOOC Wei Cong1(&), Hongkun Yu2, and Jing Liu1 1

2

School of Information Engineering, Xijing University, Xi’an 710023, Shanxi, China [email protected] Department of Continous Education, Xi’an Shiyou University, Xi’an 710065, Shanxi, China

Abstract. The rapid development of MOOC has set off a climax of MOOC course construction in colleges and universities. The quality of MOOC course is seriously affected by the lack of experience and low efficiency of the course team. This paper comprehensively introduces the practice and experience of the author in the construction of two MOOC courses. First, it analyzes the MOOC course construction process. The process divides into four stages, which are the planning stage, the implementation stage, the integration stage and the operation maintenance stage. Second, it analyzes the main tasks, methods and precautions of each stage with examples. Finally, it puts forward some suggestions for building and using the MOOC courses well to improve the quality of the MOOC. Keywords: Massive Open Online Course  Course construction  Research on the construction process

1 Introduction MOOC is a Massive Open Online Course. After its first trial in the United States in 2010, MOOC is highly praised by people for its unique characteristics and advantages, and has set off a wave of MOOCs around the world [1, 2]. All over the world, there have been in-depth theoretical and practical researches on MOOC, which are summarized into four aspects. The first is to use MOOC resources to promote teaching reform and carry out research on teaching strategies. Combined with the characteristics of the course, MOOC can give full play to its advantages and make up for the weakness of the traditional teaching mode [3]. The second is to study the teaching mode of MOOC resources, which flipped classroom and hybrid teaching are the most popular ones [3–5]. Thirdly, in the research of educational informationization under the background of Internet, MOOC is also regarded as main means of informationization. Fourthly, based on MOOC, it researches with education thought, teaching management and evaluation mode as the main direction [5, 6]. At present the research content of MOOC mainly focuses on the application of MOOC and the education and teaching research based on MOOC. There are few discussions on how to build MOOC and improve the quality of MOOC. Quality of MOOC is the elementary requirement of MOOC construction and the key to realizing © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 573–578, 2021. https://doi.org/10.1007/978-3-030-51556-0_83

574

W. Cong et al.

resource sharing, optimize resource allocation and improve education quality. In recent years, we have completed the construction of two MOOC courses, personally experienced the whole process of MOOC course construction, and accumulated rich experience. Based on this, this paper comprehensively introduces the construction process of MOOC courses, focusing on the main tasks, methods and precautions of the planning stage, the implementation stage, the integration stage and the operation and maintenance, and analyzes them with examples to provide a reference for improving MOOC construction quality.

2 MOOC Course Construction Process The overall process of MOOC course construction divides into four stages: the planning stage, the implementation stage, the integration stage and the operation maintenance stage. Figure 1 is the MOOC course construction process.

• determine course orientation • writing course outline • determine labour division • planning time node

• writing scripts • making PPTs • prepare materials • recording videos • prepare test questions • prepare supporting materials

• uploading resources • uploading test questions • uploading auxiliary resources

• answering questions online • real-time discussion • resource renewal

planning stage

implementation stage

integration stage

operation maintenance stage

Fig. 1. MOOC course construction process

The planning stage is the initial stage, which is the overall design of the MOOC course. In the implementation stage, the work focuses on writing scripts and recording videos around knowledge points. The integration stage is to upload the recorded video and test questions to the MOOC platform. The operation maintenance stage is an online activity between teachers and learners after MOOC online class. Generally speaking, the four stages of course construction arrange from the front to the back, but there is a feedback relationship between the planning stage and the implementation stage. The planning stage is the overall design of MOOC construction, involving uncertain factors such as personnel changes and time changes. In the implementation stage, when these uncertainties occur, they should be fed back to the planning stage, and the planning stage should readjust to avoid any impact on the work in the subsequent stage [7]. 2.1

Planning Stage

The main tasks of this stage include determining the course orientation, writing the course outline, determining the division of labour, planning the time nodes, to support

Course Construction Process of MOOC

575

resource planning such as the experimental site, experimental equipment should also be considered in this stage. Because that determining the course orientation and writing the course outline has the greatest impact on the quality of MOOC course, the following is a detailed introduction. Course orientation is to determine the scope of MOOC, learners, the difficulty of content and the breadth of content, which is the key to determine MOOC content. In terms of the scope of MOOC release, the school-based MOOC content is highly targeted and meets the learning characteristics and needs of students in the school. The level, foundation and knowledge desire of learning objects should be taken into account in the MOOC released in China. In the aspect of the difficulty degree of MOOC content, the difficulty degree of MOOC content is related to the nature of the course. The basic requirements of professional courses are very high, so we should pay attention to the explanation of the difficult contents. The content of basic courses is relatively easy to understand, and the construction of MOOC should pay attention to the breadth and practical application of knowledge. The general course has a wider audience, lower learning requirements, and a wide range of contents and themes in terms of the scope of MOOC content. The scope refers to the expansion of knowledge, which cannot meet the requirements of breadth in a single construction. For this reason, we suggest that we should expand it in 3–5 years, and the content to be expanded later should update to the MOOC platform as supplementary resources. The course outline includes two parts, which are course introduction and knowledge system. Course introduction is a brief introduction to nature, main contents and class hour distribution of MOOC, striving to be clear and accurate. It is worth noting that the course introduction is also the script for making the course propaganda film. The course propaganda film is an important means to promote the course. The vivid course propaganda film can quickly shorten the distance between the course and the learners, and stimulate the interest of the course. The construction of the knowledge system is to divide the course content into knowledge points. Each knowledge point is complete and independent, which presentes with a micro-video conveniently. The time limit is about 10 min to ensure that learners can concentrate on watching a small video completely at one time [8, 9]. It is difficult to divide the knowledge points. The method of dividing knowledge points according to the contents of the chapters and chapters of the textbook can ensure the continuity and logicality of the contents, but it is highly dependent on the chapters and chapters of the textbook. To divide knowledge points in the form of special subject is to form special subjects according to the relevance of the contents, and then reorganize the knowledge points. This method is not limited by the chapters and chapters of the textbook and has great flexibility. 2.2

Implementation Stage

In the implementation stage, the work focuses on knowledge points, and the writing quality of knowledge point script is important for MOOC. Figure 2 is the task flow of the implementation phase. To improve the efficiency, the task in the implementation stage can adopt the parallel process of “writing, recording, making and proofreading”. When writing the

576

W. Cong et al.

knowledge points writing scripts

preparing materials

making PPTs recording videos

producing videos

proofreading

writing test questions

Fig. 2. Task flow of the implementation phase

script, prepare the material synchronously. These two processes carry out at the same time. When a project or 5–10 knowledge scripts and materials are ready, you can start to make courseware, video recording and writing test questions at the same time. Writing knowledge point script is the key and difficult point in this stage. Table 1 are the elements of knowledge point scripts. Table 1. Elements of knowledge point scripts Knowledge points name Person in charge Assistant resources Participation Contents First segment Second segment …

Shooting methods Total words Completion time Manifestation Materials Picture plane. jpg Video … Animation …

Durations 30 s … …

Shooting methods include image matting, screencast, classroom recording, interview, DV+whiteboard, and so on. When image matting is used, there is a prompter machine to prompt the lecture notes, which can be repeated and recorded in sections. The screencast is mainly for software program operation, experimental phenomenon demonstration, etc. The classroom record is just like the real teaching in the classroom, which is flexible and interactive but requires the teacher to give a lecture in one go otherwise, it will start again. The interview form requires the interviewees and topics to have pertinence, contingency and on-site control ability. In the aspect of script content planning, it can adopt the form of segmentation, and concentrate the content in one form in one paragraph; one paragraph can be one sentence, one paragraph. The manifestation in the script includes pictures, videos, animations, etc. these materials should be noted with names and estimated duration to provide a basis for video production. In the process of MOOC video production, we should use special effects technology to strengthen the impact and viewing of video content, and provide free and broad imagination space for learners through high-quality image generation and perfect and realistic content presentation. The combination of virtual and real technology can reappear all kinds of the necessary teaching environment and working scenes, which can bring the learners an immersive learning experience, which can improve their learning efficiency and practical ability.

Course Construction Process of MOOC

577

After video recording, post-production can be started and proofread after production. The course teachers undertake the proofreading tasks. Video content, subtitles, etc. shall be proofread. It is necessary to check whether the application of videos, animations, pictures and other forms of expression is appropriate, and whether the presentation of professional terms is true, etc. to ensure video quality [7, 10]. 2.3

Integration Stage

Task of the integration stage is to upload the recorded video, test questions, auxiliary resources, etc. to the MOOC platform and debug them. The process of uploading resources is relatively simple, which can be executed according to the requirements of the MOOC platform and operation manual. Here, the author adopts the method of “building while transferring and using” to integrate. The specific method is: after the resources of 1/3 (or 2–3 special subjects) knowledge points of the course are ready, they will be uploaded to the platform first and start trial operation, which can improve the use efficiency of MOOC, and find out the incompatibility of video file size, video compression coding and other places with MOOC platform in time. 2.4

Operation and Maintenance Stage

Operation and maintenance are the online Q&A, real-time discussion, opinion collection and other work between course teachers and learners after MOOC online class. At this stage, the MOOC team has to do three things; one is to regularly or on-demand release discussion topics, provide online resources to meet the learning requirements of multi-level learners; the other is to make corresponding adjustments according to the technical development and practical needs so that the course content is more flexible and diverse, the third is teachers should be encouraged to use course resources flexibly in classroom teaching so that MOOC development can become a sustainable process of course development.

3 Conclusions In the process of MOOC course construction, we deeply realize that the MOOC, a brand-new information-based teaching method, is not the accumulation of course videos, nor such a simple process for students to watch videos after class and organize discussions in class. MOOC is a subversion of the traditional teaching mode, and at the same time, it affects the transformation of the teaching mechanism of colleges and universities. It requires the participation of teaching administrators, all teachers and students. Among these factors, it is the determination and confidence of leaders at all levels that play a decisive role. On this basis, it needs the guidance of policies and the cooperation of systems, as well as the active participation of teaching administrators and teachers to form a situation of up-down linkage and jointly build, use and manage the MOOC. The construction of MOOC is a systematic project. It is impossible for a teaching team to have an in-depth study on all aspects of MOOC, so the construction work

578

W. Cong et al.

dooms to be difficult. The author only analyzes the experience and practice in the process of the MOOC construction to provide a reference for improving the quality of MOOC.

References 1. Guo, S., Zhang, G.: Analyzing concept complexity, knowledge ageing and diffusion pattern of Mooc. Scientometrics 112(1), 413–430 (2017). https://doi.org/10.1007/s11192-017-2385-z 2. Mahajan, R., Gupta, P., Singh, T.: Massive open online courses: concept and implications. Indian Pediatr. 56(6), 489–495 (2019). https://doi.org/10.1007/s13312-019-1575-6 3. Dziuban, C., Graham, C.R., Moskal, P.D., et al.: Blended learning: the new normal and emerging technologies. Int. J. Educ. Technol. High. Educ. 15(1), 3 (2018) 4. Rasheed, R.A., Kamsin, A., Abdullah, N.A.: Challenges in the online component of blended learning: a systematic review. Comput. Educ. 144, 1–17 (2020) 5. Lo, C.K., Hew, K.F.: The impact of flipped classrooms on student achievement in engineering education: a meta-analysis of 10 years of research. J. Eng. Educ. 108(4), 523– 546 (2019) 6. Liu, D.: The reform and innovation of english course: a coherent whole of MOOC, flipped classroom and ESP. Procedia-Soc. Behav. Sci. 232, 280–286 (2016) 7. Smith, N., Caldwell, H., Richards, M., Bandara, A.: A comparison of MOOC development and delivery approaches. Int. J. Inf. Learn. Technol. 34(2), 152–164 (2017) 8. Ortega-Arranz, A., Er, E., Martínez-Monés, A., Bote-Lorenzo, M.L., Asensio-Pérez, J.I., Muñoz-Cristóbal, J.A.: Understanding student behavior and perceptions toward earning badges in a gamified MOOC. Univers. Access Inf. Soc. 18(3), 533–549 (2019). https://doi. org/10.1007/s10209-019-00677-8 9. Chang, J.-J., Lin, W.-S., Chen, H.-R.: How attention level and cognitive style affect learning in a MOOC environment? Based on the perspective of brainwave analysis. Comput. Hum. Behav. 100, 209–217 (2019) 10. Stich, A.E., Reeves, T.D.: Massive open online courses and underserved students in the United States. Internet High. Educ. 32, 58–71 (2017)

MOOCs and Developing College English Teaching Luqi Li(&) Department of Public Foreign Language Teaching and Research, Jilin University of Finance and Economics, Changchun 130000, Jilin, China [email protected]

Abstract. MOOCs, characterized by large-scale, open and online education, have become the focus of attention all around the world. Starting from the origin of MOOCs, the author introduces the development trend of MOOCs in classroom teaching and wider education field at home and abroad. At the same time, it also brings some enlightenment and thinking to educators. Although network courses and distance teaching are of great significance, how to transform scientific and technological progress into educational resources and assistants is more important. The construction of MOOCs system in university classroom teaching consist of effective input, human-computer interaction, flipped classroom and course management. It makes up for many disadvantages caused by teachers’ unilateral manipulation of classroom in the traditional mode, breaks the original resource system of higher education, and makes the sharing and coconstruction of massive high-quality resources become a reality. How to better combine MOOCs with traditional courses design and realize teaching is a subject that English teachers make unremitting efforts to explore. Keywords: MOOCs

 English teaching  System construction

1 Introduction MOOCs are Massive Open Online Courses. They are Courses for a wide range of learners, using computer Internet access information exchange and big data information mining functions of open online teaching courses. 1.1

Development of MOOCs

In 2008, Dave Cormier and Bryan Alexande first proposed the idea of Massive Open Online Courses (MOOCs). In 2012, the New York times called it the first year of “MOOCs,” characterized by “large-scale, open and online education,” and it quickly became the focus of attention at home and abroad. EdX, founded by Harvard University and MIT University, Coursera and Udacity, founded by Stanford University, and FutureLearn, founded by the Open University in the UK, are among the platforms that have received positive responses across the globe. The outline of the national program for medium - and long-term education reform and development (2010–2020) states that “improving quality is the core task of higher education © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 579–584, 2021. https://doi.org/10.1007/978-3-030-51556-0_84

580

L. Li

development.” The improvement of higher education requires us to provide high quality foreign language education for college students. From 2013 to 2014, some famous Chinese universities successively joined the overseas online MOOCs platform and launched localized MOOCs. For example, the Xuetang Online platform built by Tsinghua University not only provides more people with high-quality educational resources, but also enables students to receive more flexible and personalized education. The “Rain Classroom”, jointly launched by the platform and the office of online education of Tsinghua University, is the latest research result of the online education research center of the ministry of education. It can quickly make the wisdom teaching in the era of big data come true, including multi-interaction between teachers and students, and full-cycle analysis of teaching. The recent outbreak of the new coronavirus show us the great practical significance of the application of network classroom and distance teaching. As 5G network begins to be put into use, how to translate scientific and technological progress into resources and assistance for education work becomes more important.

2 The Architecture of College English MOOCs Wu yan (2018), director of the Higher Education Department of the Ministry of Education, believes that curriculum is the core element of talent training. With the development and change of times, the design of university courses is also developing. Therefore, the construction of college English MOOCs system is imminent. System construction is the embodiment of the overall design concept and guiding ideology of college English MOOCs, including the whole course hierarchy and the organizational structure of each section. The system consists of the following four parts: “effective input” [1], “human-computer interaction”, “flipped classroom” and “process management”. 2.1

Valid Input

Linguistic Input is the primary requirement for language acquisition [2–5]. Language acquisition depends on efficient language input, abbreviated as “efficient input” [1], which refers to “the arrangement and sufficient amount of input that must be understandable, interesting, non-grammatical”. It not only conforms to the relevant characteristics of TBLT [6], but also conforms to the five characteristics of TBLT [7]. 2.2

Human-Computer Interaction

In addition to providing computer-assisted instruction for teachers, human-computer interaction also provides “online testing”, which achieves “The test paper can be customized and generated in real time. The test can not only be carried out “anytime and anywhere”, but also be evaluated “with ease”, which helps teachers and learners to understand the situation of teaching and learning. To be specific, the test items are “listening”, “speaking”, “reading”, “writing”, “English-Chinese” and “ChineseEnglish”. “Human-computer interaction” and “effective input” complement each other and constitute the first two parts of the complete MOOCs architecture.

MOOCs and Developing College English Teaching

2.3

581

Flipped Classroom

It adjusts the hours in and out of the classroom and transfers the decision to learn from the teacher to the student. It is not only a process to help learners transform language input into language output, but also the language output itself. This is also the case with the college English MOOCs architecture, the interactions of linguistic output. As the output of language learning, it plays an important role in foreign language teaching and learning [8]. 2.4

Process Management

It not only makes “management” run through the whole learning process, but also makes every link embody management and runs through the scientific concept of process evaluation. Computer place, time of each individual learner login and logout, course name, study content and so on are automatically recorded, and the formation of personal file, plus and classroom and real-time online testing and answering questions together, form a complete management pattern, which is an integral part of college English for class system. To sum up, in the university English lesson for architecture, “effective input” is the premise of plates, it not only shows the MOOCs has massive learning in the teaching quality and teaching cost advantage, and also emphasizes the teaching process of “simplification, standardization and normalization” [9], the form tend to “behaviorism learning theory” (behaviorist view) [10, 11].

3 Advantage Under the background of “Internet plus”, the blended teaching model of college English makes up for many disadvantages caused by teachers’ unilateral manipulation of classroom in the traditional model, and implement the organic integration of traditional classroom teaching and network teaching methods. Blended teaching is the collision of traditional classroom teaching and network teaching, which can not only play the leading role of teachers, but also highlight the subjective initiative of students. 3.1

The Overall Advantages of the MOOCs Platform

The platform development pattern centered on North America has been challenged by other countries and regions. More and more universities and educational institutions have participated in the development of “MOOCs” platform, reflecting a highly international development trend. The education alliance formed by the platform breaks the original resource system of higher education, making the sharing and coconstruction of massive high-quality resources a reality. The success of MOOCs platform is of great strategic significance and wide practical value for improving the teaching quality of higher education. For ordinary learners, such teaching resources and learning methods are cheap and flexible, which can help alleviate the problem of educational equity. For students from poor families, it no longer means high fees, but

582

L. Li

may become a nutritious “free lunch”. It is estimated that more than 200 million people worldwide directly benefit from MOOCs’ non-profit education model, of whom 70% are students from poor families. At the same time, for English teachers in China, the massive free and high-quality teaching resources provided by “MOOCs” platform also provide a vast space for secondary development and development opportunities. 3.2

The Advantage of “MOOCs” in Classroom Teaching Practice

The foreshadow of micro-videos and other materials before class can certainly inspire students to think deeply about the topic being taught. The interaction of discussion, question and situation in class can fully stimulate students’ critical thinking and internalize what they have learned. The online learning after class can help students summarize and summarize what they have learned in daily life, and the open questions can urge students to study a wide range of cutting-edge information related to the topic. Therefore, teaching methods such as heuristic teaching method, problem teaching method, discussion teaching method, scenario teaching method and experiential teaching method have been diversified. Based on this, learning tasks, students, teachers, course resources, classroom and other elements have built a three-dimensional model, which promotes and supports each other and forms a dynamic cycle among effective teaching elements as a whole. The mixed teaching mode based on Internet can create a classroom space with flexible teaching methods and students’ autonomy, and effectively solve the personalized differences between teachers and students. To help teachers and students realize better coordinated development and learning. New model emphasizes the development of the two groups interaction between teachers and students circular construction joint role of class activities, especially attaches great importance to the students’ awareness and participation in classroom teaching, attaches great importance to the situation of teachers’ professional development and sustainability, beyond the one-way flow of relationship between teaching and learning, in order to further activate the classroom teaching, improve the effectiveness of the college English classroom teaching.

4 Deficiency The emergence of “MOOCs” teaching model has also caused deep problems in the society such as academic freedom, educational equity and business model Thinking. At the same time, how to effectively combine this new concept with traditional teaching and implement it into the classrooms of universities with large differences in hardware and software is also worth our attention. 4.1

Hidden Concerns of MOOCs Platform

MOOCs have attracted a great deal of attention in the society. However, despite the large number of registered students, the course completion rate is relatively low. Only a few percent of students finish the course and get the certificate. Even among students

MOOCs and Developing College English Teaching

583

who have completed their studies, the identification of online learners and the prevention of cheating remain a major problem, despite real-time video and keyboard comparisons. At the same time, there is still a lack of inter-school mechanism to allow each other to choose courses and recognize credits. The social recognition degree of “MOOCs” teaching quality is also relatively low; It also has the problem of having only a single course certificate and no professional degree. One MOOC course needs the human input of a team and the support of hundreds of thousands of funds, the cost is high, and it is not easy to update the course. Most MOOCs run on special funds or venture capital. We can not help but worry about whether the MOOCs platform with numerous variables can continue to develop after the fresh and hot period. 4.2

Friction in the Combination of MOOCs and Traditional Classes

It is undeniable that a new multimedia classroom can attract students’ attention. However, video production is only one of the core contents of MOOCs, the design and operation of online teaching is the most important thing in the whole course construction. However, many universities in China overemphasize video production but neglect teaching design in the construction of MOOCs. In the teaching design of MOOCs, objective design, interactive design and evaluation design are the keys. Clear and accurate learning objectives will provide accurate direction for learners to conduct mastery learning. MOOCs must provide learners with very specific learning objectives, including the overall learning objectives of the course and learning objectives for each topic. John Hattie [12] argues that the more the student changes to the teacher role, the more the teacher changes to the student role, the better the teaching/learning results. It is not only an online course. One MOOC class is an online classroom, is a teacher, student, teaching content and media virtual classroom. The key lies in the online teaching of teachers and students online learning, and interaction between teachers and students. More important for the lesson is to realize the teachers, students, teaching contents and teaching media perfect interaction. The content of the course and the interaction between lecturers and students are important indicators for the completion of the course [13]. To focus on the video and new technologies is to ignore the basics and turn the power of education into resistance.

5 Conclusion With the rapid development of information science all over the world, MOOCs, a new technology that is developing vigorously, will be constantly improved and become an indispensable part of college English teaching. We hope to combine MOOCs and traditional courses better through persistent exploration, so as to provide students with independent learning platform, and help students realize self-learning, self-management and self-regulation through teachers’ supervision and guidance in and out of class. For the practice of “lifelong learning”, to achieve the ability to lay a solid foundation.

584

L. Li

Through the diversity of blended teaching activities, students’ learning enthusiasm and English learning ability can be improved, so as to form a model of teaching and learning that promotes each other.

References 1. Krashen, S.: Second Language Acquisition and Second Language Learning. Pergamon Press, Oxford (1981) 2. Licheng, L., Zinan, L., Lan, G.: Krashen language input and foreign language teaching learn. J. Tsinghua Univ.: Philos. Soc. Sci. 4, 71–74 (2001) 3. Bialystok, E.A.: Theoretical model of second language learning. Lang. Learn. 28, 69–84 (1978) 4. Krashen, S.: Principles and Practice in Second Language Acquisition. Pergamon Press, Oxford (1982) 5. Gass, S.: Integrating research area: A framework for second language studies. Appl. Linguist. 9, 198–217 (1988) 6. Nunan, D.: Task-Based Language Teaching. Cambridge University Press, Cambridge (2004) 7. Xiugui, T., Zhenhai, Q.: Re-understanding of task and task-based teaching method. A Foreign Lang. Teach. 3, 69–74 (2004) 8. Qiufang, W.: Application of output-driven hypothesis in college English teaching: thinking. Foreign Lang. 6, 14–22 (2013) 9. Songhe, Y., Ruolong, Ma.: MOOCs: openness, debate and revelation. Remote. Teach. Educ. Netw. Educ. 1, 69–75 (2014) 10. Skinner, B.F.: Science and Human Behavior. Macmillan, New York (1953) 11. Skinner, B.F.: The science of learning and the art of teaching. Harvard Educational Review 24, 86–97 (1954) 12. Hattie, J.: Visible Learning: A Synthesis of over 800 Meta-Analyses Relating to Achievement. Routledge, Abingdon (2008) 13. Hone, K.S., El Said, G.R.: Exploring the factors affecting MOOC retention – A survey study. Comput. & Educ. 98, 157–168 (2016)

Influence of Media Technology on the Development of Contemporary Children’s Literature Mingxiu Ding1,2(&) 1

Media Academy, Jilin Engineering Normal University, Changchun, China [email protected] 2 Literature Department, Northeast Normal University, Changchun, China

Abstract. Communication technology and computer network technology are developing with irresistible momentum, in this context, media technology has exerted a great influence on all walks of life. New media technology is one of the external background environments affecting the contemporary children’s literature, which promotes the development of children’s literature, moreover, it also brings more diversified development opportunities which promote a qualitative change in contemporary children’s literature, making children’s creation develop towards the direction of rich forms and diversified contents. However, it must be noted that while new media technology brings new historical opportunities to children’s literature, it also brings great challenges. For example, the increasingly vague themes and over-catering to the market have all seriously affected the healthy development of the contemporary children’s literature. Therefore, it is very important and necessary to explore the development path of the contemporary children’s literature and promote the reform and innovation of children’s literature system. Keywords: Media technology Development  Positive impact

 Contemporary children’s literature   Negative impact

1 Introduction New media has many advantages. Media technology has brought tremendous impact on traditional media, affected the development direction of contemporary children’s literature in China, and effectively promoted to reform the children’s literature in China. At the same time, the integration of media technology makes people have awareness of the shortcoming of children’s literature and make up for it, improves the characteristics of children’s literature [1], and injects new impetus into the development of children’s literature. Undoubtedly, the prospect of contemporary children’s literature is developing all the time which can not be separated from media technology. However, how to use media technology scientifically has not been decided yet. Relevant people need to study the current media environment deeply, treat media technology with a forward-looking perspective, and take good advantage of media technology to promote the development of contemporary children’s literature and transform China’s literary system. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 585–591, 2021. https://doi.org/10.1007/978-3-030-51556-0_85

586

M. Ding

2 The Impact of Media Technology on the Development of Contemporary Children’s Literature Media technology is a mixed blessing, which not only has a positive impact on the development of contemporary children’s literature, but also has a negative impact on the development of contemporary children’s literature(see Table 1 for details). Due to the limitation of the length of the article, it is difficult for this paper to discuss all the impacts, and only a few influential points are selected for emphasis discussion: Table 1. Analysis of influence of media technology on the development of contemporary children’s literature Positive impact Diversification of creation Content enrichment Diversification forms of communication Low threshold of creation Speeding up the dissemination of literary works

2.1

Negative impact Topic ambiguity Over-catering to the trend Abuse of Internet language Rapid development of fragmented reading Unfinished family guidance Serious problems of commercialization Integration of adult literature materials Weakened influence

Positive Impact

Media technology has changed the way of information dissemination. Microblog and WeChat have effectively promoted the online communication of contemporary children’s literature [2]. Taking WeChat as an example, many writers and even publishers of children’s literature regard WeChat Public Number as a new channel to promote children’s literature works, and the marketing promotion based on WeChat Public Number has achieved great success. Meanwhile, the media technology has weakened the authority of traditional paper media, which has affected children’s literature in publishing to some extent. Unexpected changes have taken place in the communication mode between editors and writers, and between writers and readers [3]. All these undoubtedly provide a good environment to develop contemporary children’s literature. Therefore, contemporary children’s literature shows a benign development trend. First of all, it is the creation diversification. Creation diversification mainly refers to the diversification of creative subjects. It is well known that in the traditional media perspective, children’s literature works has always maintained a high quality. Before publishing, publishing enterprises will consider the influence of authors and the quality of works in an all-round way, so that works can enter the publishing channels through checks at all levels. There is no doubt that the above practices can guarantee the quality of children’s literature works, but at the same time it has higher requirements for the cultural accomplishment of creators and hinders the expansion of the team of children’s literature writers. The creator is limited to certain requirements so that insufficient quantity will be harmful to the development of children’s literature. The ways of

Influence of Media Technology

587

dissemination of children’s literature are constantly enriched, which benefits from the development of media technology. The threshold of network platform and self-media platform is low, so children’s literature writers can publish their works through more channels. This, to a certain extent, encourages the author to actively engage in the creation of children’s literature, the aim is to greatly increase the quantity of children’s literature and improve the quality of children’s literature, which gives a strong impetus to the development of contemporary children’s literature [4]. Secondly, the content is diversified. Mediating technology has accelerated media integration and the speed of information dissemination. Therefore, creators can understand much development information of children’s literature in a more timely manner and better consider the current development environment and needs of children’s literature when creating. Children’s literary works based on children’s literary needs can better meet the individual reading satisfactions of young readers and do good to the development of children’s literary works [5]. At the same time, the information source of children’s literature creation is constantly enriched, and the vision of creators is thus broadened, which is conducive to incorporating new ideas into their works, thus enriching the connotation of children’s literature works and improving the extensibility of children’s literature works, which can undoubtedly do good to develop children’s literature. Thirdly, transmission routes are diversified. The development of information technology greatly promotes the research and application of new media so that it broadens the communication path. The traditional means of communication used by children’s literature, mainly in the form of books and journals, relies on physical bookstores sales and has a narrow communication path [6]. The limitation of the communication path leads to the small communication scope and limited influence of children’s literature, which hinders the rapid development of literature itself. However, under the new media technology environment, children’s literature can take more advantage of online channels, sell directly relying on websites, and spread content in vertical fields relying on microblog, WeChat, professional APP, mobile client and other personalized communication terminals. Diversified and convenient communication channels have expanded the transmission speed and scope of children’s literature and effectively promoted its influence. 2.2

Negative Impact

Summarizing the above views, the current media environment is relatively healthy and the application of media technology is also relatively scientific. However, media technology is a new thing. From the perspective of development, there are some imperfections in media technology itself, which inevitably leads to some problems affecting the development of contemporary children’s literature with the help of media technology, which will undoubtedly have a very adverse impact on the development of children’s literature: First of all, the theme of the work is vague. The application of media technology improves the speed of dissemination of children’s literature, enriches its content and greatly increases the number of its works. This leads to having difficulty in examining and supervising children’s literary works timely and effective [7]. As last, the quality of

588

M. Ding

children’s literary works is uneven, as well as it makes maintaining the high quality of works so difficult that its market is mixed. Many violent and pornographic contents which are not conducive to children’s growth frequently appear in children’s literary works. Adult literary materials are introduced into children’s literary creation, which leads to the emergence of adult factors in children’s literary works. Not only does it do harm to the physical and mental health of children and influence children to establish a correct outlook on life and values, but also will become more and more difficult to develop children’s literature. The second point is the over-catering to the trend. Children’s literature works can subtly inspire children’s thinking and help them grow up healthily and quickly, which is also its significance and value [8]. In recent years, the people’s ideological awareness has been continuously improved, parents have paid more attention to education issues, and children’s literary works have continued to grow, which has created good conditions for the development of children’s literary works, while making children’s literary works continue to develop commercially. Many children’s literary creators lack professional ethics, excessively pursue commercial profits and inject a large number of fast food culture into children’s literary works, which to a certain extent weakens the educational value of children’s literary works, furthermore, it is not rewarding for writers to form a correct view of children-oriented creation. In the meantime, the development of media technology has led to the emergence of a large number of network terms. For the sake of catering to the market, many children’s literature creators have introduced a large number of network language into their works. There are many problems in the literary expression of children’s literary works full of network language, which are not conducive to children’s standardization of phonetics and children’s construction of the correct grammatical structure, and may also affect children’s literary connotation and their subsequent growth. Although these negative effects directly affect children, they will also influence the social environment of children’s literary works in a subtle way [9], thus restricting the rapid development of children’s literary works. The last point is that users’ needs are harder to satisfy. Traditional communication of children’s literature is one-way communication. In the communication chain, readers are passive receivers. However, a typical feature of new media technology is interactivity. Therefore, the identity of readers in the new media technology environment has changed, from simple receivers of the past to producers of information, and the production mode of children’s literature has become “user participation production mode”. When users participate in producing children’s literature, the subject and process of content production become more complicated, and users’ original needs will change and more needs will be derived, so it is more difficult to meet them.

3 Strategies of Using Media Technology to Develop Contemporary Children’s Literature in the Media Age In the media era, while media technology brings convenience to contemporary children’s literature, its application also brings negative influence to the development contemporary children’s literature. However, using media technology to develop

Influence of Media Technology

589

contemporary children’s literature is the “general trend” of the times. Using of media technology reasonably, giving full scope to the advantages of media technology application and restraining the adverse effects of media technology application are the key factors to develop the contemporary children’s literature. The author believes that the use of media technology to develop contemporary children’s literature in the media age should pay attention to the following points: 3.1

Strictly Controlling the Quality of Children’s Literature Works

Children’s literary works shoulder the arduous mission of helping children to establish correct values and outlook on life, and are indispensable and important educational resources to promote children’s healthy growth. Guaranteeing the quality of children’s literature will not only promote to develop children healthily, but also promote the healthy development of contemporary children’s literature. Therefore, relevant personnel shall strictly control the quality of children’s literary works, and a sound review system in the media era should be established to improve the quality threshold of children’s literature. Literature education departments should actively build a team of reviewers with professional quality, carry out the work of reviewing children’s literary works, actively prevent problematic children’s literary works from entering the market, standardize the children’s literary market and find a correct direction for the development of children’s literary works. At the same time, corresponding accountability mechanisms should be established. Literature departments and literary federations should fully shoulder their social responsibilities. On the one hand, they should severely punish the creators of problem literary works. On the other hand, they should encourage and help excellent children’s literary creators to promote their works, and use high-quality children’s literary work to convey the spirit of the times and aesthetic spirit [10], so as to guide children’s literary works have a healthier connotation. 3.2

Standardizing the Language of Children’s Literature Works

There is no doubt that network language has become an indispensable part of the language system. Although there are many problems in network language, it does not mean that network language is useless. For example, vividness and interesting is the advantage of network language. However, it should be noted that children are younger, their growth and development are not perfect, their minds are immature, and they do not have a strong ability to distinguish right from wrong. If there are a large amount of network terms in children’s literature works, on the one side, it will affect the standardization of children’s literature works; on the other side, it may also have a negative impact on children’s physical and mental health. Therefore, the use of network language in children’s literary works should be standardized. 3.3

Subdividing the Level of Children’s Literature Works

As the readership of children’s literary works is expanding, developing children’s literary works needs to rely on the broad readership. Therefore, the connotation of children’s literary works should be rich enough to meet the demands of readers of

590

M. Ding

different age groups, and the classification of works under the traditional media environment must be divided into new levels. In addition, when making the reader segmentation, it should combine the new media environment to the user’s reading demand, fully consider different readers’ reading time, location, interests, habits, both user requirements can be integrated into the children’s literature creation, and to fully tap the new media as a communication channel, the supporting role for children’s literature transmission. 3.4

Enrich the Expression Forms of Children’s Literature Works

The contents of children’s literature are vivid and lively, and the traditional form of expression with paper books and periodicals is not conducive to the spread of children’s literature. Based on information technology, new media has natural technological advantages and can enrich the forms of children’s literature works. At present, e-books, stereoscopic books, audio book production has become mature. Audio, video, AR, VR and other technical means in book publishing has also been widely used. Therefore, to enrich the expression of children’s literature works through technical means is also an effective strategy to promote the winder dissemination of children’s literature.

4 Conclusion To sum up, the influence of media technology contemporary children’s literature is twofold. On the one hand, it has a positive impact including the diversification of creative content. On the other hand, it has a negative impact including the vague themes and excessively catering to the trend. Children’s literature play an important role of China’s literary system, and the network of children’s literature is one of its development directions. Although the current media technology on children’s literature is not entirely favorable and it has some unavoidable problems, the relevant people should correctly understand the development trend of children’s literature, treat media technology correctly, and take good advantage of the network environment created by media technology to promote the development of contemporary children’s literature and improve the inner quality of the work and enrich its connotation, so as to enable contemporary children’s literature to play a better role in social guidance. Acknowledgments. The research achievement of the Basic Education and Teaching Research Project of Jilin Province “Research on Optimizing Strategies of Children’s Literature Teaching in Primary School Chinese” (Project No. JLSJY2017Z025).

References 1. Nuochen, X.: Analysis on the problems and countermeasures of the development of children’s literature in the internet media era. Media 12, 75–77 (2017). (in Chinese)

Influence of Media Technology

591

2. Ruhan, A.: Daur children’s literature from the perspective of contemporary Chinese children’s literature. J. Inn. Mong.Ia Norm. Univ. (Arts & Social Sciences Chinese Edition) 45(5), 88–92 (2016). (in Chinese) 3. Qian, K.: Narrative study of contemporary Chinese children’s literature works: a case study of Shen Xiwu’s faithful dog. Youth Lit. 13, 46–47 (2018). (in Chinese) 4. Jinyi, Z.: The development of Chinese minority children’s literature in the new century. Natl. Lit. 6, 146–159 (2016). (in Chinese) 5. Xinping, C.: Reflections on “taboos” in the writing of juvenile initiation stories in the new media era. North Media Res. 01, 74–77 (2017). (in Chinese) 6. Haiya, D.: A probe into the translation model of contemporary Chinese children’s literature in English-speaking countries: a case study of Cao Wenxuan’s English translation of Qing Tong and Kui Hua. Shandong Foreign Lang. Teach. J. 38(5), 88–95 (2017). (in Chinese) 7. Dongna, Z.: Bottlenecks and solutions to the development of children’s literature in the context of new media. Peony 36, 57–59 (2017). (in Chinese) 8. Bojia, W.: Research on the development of children’s literature in the age of media integration. New Media Res. 22, 73–74 (2017). (in Chinese) 9. Ke, Z.: On the publishing situation and development trend of children’s literature series in China. Radio & TV J. 11, 211–212 (2017). (in Chinese) 10. Shaozhen Mo Shaozhen: Leading students into the world of children’s literature and letting them fall in love with children’s literature. Educator 5, 79–79 (2016). (in Chinese)

Reform and Thoughts of Learning-Centered Classroom Teaching Based on the Cloud Space of World University City Jinliang Wang(&) and Xuefeng Xie Guangdong University of Science and Technology, Dongguan 523083, Guangdong, China [email protected]

Abstract. Learning-centered teaching reform is the result of the joint action of modern information technology and constructivism. Cloud space can make the teaching process easier and funnier and better promote the smooth implementation of teaching reform. Through building learning communities and adopting three independent learning methods including imparting knowledge to others, practice and discussion, students can determine learning objectives, meet the demand of “the zone of proximal development” for knowledge and skills, stimulate learning interests and improve learning effects. However, a lot of problems are encountered in practice, which calls for improvement and multilateral coordination. Keywords: Cloud space

 Learning-centered  Classroom teaching  Reform

1 Introduction The primary task of universities is to train talents for social and economic development. At present, improving the quality of talent cultivation is the starting point and objective of universities. Some scholars believe that realizing the organic unity of “teaching” and “learning” is the key to improving the quality of talent training. How to realize the unity of “teaching” and “learning”? Currently, “teacher-centered” and “studentcentered” are two most representative teaching views. Knowledge-based and teaching-centered teaching concept was recognized and admired by higher educational workers, which was however found to affect the overall improvement of teaching and student quality afterwards. Embodied in “four key points” and “four omissions”, this teaching concept emphasizes the imparting of knowledge, the leading role of teachers, the knowledge accumulation of students and the role of dominant curriculum, and neglects the improvement of students’ ideological and psychological quality, the dominant role of students, the rationality of students’ knowledge and the construction of recessive education environment affecting the overall development of students subtly [1].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 592–597, 2021. https://doi.org/10.1007/978-3-030-51556-0_86

Reform and Thoughts of Learning-centered Classroom Teaching

593

2 “Center on Learning” to Construct the New Idea of Teaching Reform In the development process of higher education in China, all departments and universities have made great efforts to improve the quality of talent cultivation. On the one hand, education administrative departments have made remarkable achievements in perfecting management system, improving teaching conditions and enhancing the level of teaching staff. On the other hand, schools have been actively deepening the reform of education and teaching, emphasizing centering on “teaching” and paying attention to updating the teaching concept of teachers, exploring and reforming new teaching methods. In current college classes, however, teachers are like performers who try their best to “preach, impart knowledge and answer questions” while students seem to be spectators who are obsessed, onlooking, absent-minded and even required to “voluntarily” hand in their smartphones to maintain classroom teaching. Blaming each other cannot solve the problem of poor classroom teaching. Therefore, it is necessary to “clarify the hierarchy and level of needs of contemporary college students, return to the essence of learning and the purpose of higher education, construct the new concept of teaching reform based on learning, respect the dominant role of students in learning, attach importance to studying the scientific law of “learning” and pay attention to cultivating the consciousness and ability of active exploration” [2].

3 Carry Out Learning-Centered Classroom Teaching Reform Practice Based on the Cloud Space of World University City 3.1

Construct the Model of Classroom Teaching Reform Practice Based on the Cloud Space of World University City (Hereinafter Referred to as “Cloud Space”

To better carry out learning-centered classroom teaching reform, the model of learningcentered classroom teaching reform practice based on Cloud Space was constructed by taking Chain Business Management as the reform course, constructivism as the guiding thought, learning-centered as the concept of teaching reform, MosoInk Cloud Class as the platform of teaching reform and learning pyramid as the guidance model of teaching reform methods. Firstly, a learning community is built, consisting of learners (students) and facilitators (including community members, teachers, experts and other helpers). The participation of enterprise personnel provides the authenticity of learning application scenes while that of teachers or experts makes the learning process more directional. Community members communicate with each other about learning topics and share learning resources, forming interacting and mutually reinforcing interpersonal relationships and certain community norms and culture. Secondly, Cloud Space is defined as a cognitive tool in the learning process of students and used as the platform of teaching reform practice. The era of mobile

594

J. Wang and X. Xie

Internet has arrived, which turns laptops, tablets and smartphones into a part of people’s lives and greatly improves the space and way of carrying out teaching. Cloud Space realizes the instant communication and sharing of learning information and renders teaching and learning more free, easy and interesting. Thirdly, project and case teaching is more used in the teaching process which is oriented by projects and driven by tasks to organize teaching. In terms of learning methods, priority is given to knowledge teaching, practice and discussion supplemented by traditional learning methods. 3.2

Carry Out Learning-Centered Teaching Reform Practice Based on Cloud Space

3.2.1

Build Learning Communities Based on the Principle of Voluntariness At the beginning of the course, each group is composed of six to eight students, a corporate practice instructor and a classroom theory instructor who form a learning community with freedom. In the beginning, teachers need to make members understand the role of the learning community, the way of teaching operation and precautions in the process of learning. Such an introduction in advance is conducive to reducing the resistance in the future teaching process. 3.2.2 Determine Learning Projects Through Group Discussion At the beginning of teaching, teachers announce the teaching plan of this course to students. This course is mainly divided into two parts, namely the basic theoretical knowledge and operation management practice of chain enterprises. Projects can be selected in two ways. First, learning and research projects are determined by students themselves. Second, learning projects are recommended by teachers. 3.2.3 Implement Teaching on the Platform of MosoInk Cloud Class This course takes MosoInk Cloud Class as the platform of teaching practice. This platform can realize real-time interactive learning in the mobile environment by using smart phones, and meet the needs of schools, teachers and students. In the aspect of schools, this platform facilitates teaching management, raises the application level of teaching modern information technology and improves the quality of talent cultivation. In terms of teachers, this platform promotes the organization and implementation of the teaching process, enriches teaching means and methods, and realizes the modernization of the teaching process. With regard to students, this platform enables them to better get access to learning resources, study with others and acquire knowledge pleasantly. 3.2.4

Actively Promote the Learning-Centered Teaching Model and the Active Learning of Students The first way is to teach group learning outcomes to others. After choosing learning objects such as convenience stores, specialty stores and supermarkets and topics of interest, each group will conduct a social survey and make a PPT to report the survey results. In this process, students will form certain knowledge and experience about the objects they study and think about. With the deepening of study, each group will

Reform and Thoughts of Learning-centered Classroom Teaching

595

constantly improve relevant learning content, send a representative to explain relevant key points and teach other groups their survey methods, ways to analyze and organize data as well as difficulties they encounter. For example, site selection has different requirements as each learning community pays attention different objects. They tell these “differences” to other study groups, continue to think, learn, revise and improve through sharing, and form new knowledge and experience based on teaching others. The second way is practice. Four course design projects are set up, including the logo design of chain enterprises, the layout design of stores, the design of promotion schemes and POP advertising design of physical stores. Students brainstorm and work together in the process of completing works, upload completed works to the class platform, get timely feedback through teacher commenting and mutual evaluation of groups and group members, and have in-depth communication on some points of interest and questions during the feedback process. Thumbs-up, comments, inquiries and other platform functions effectively mobilize the learning interests of students and promote the in-depth implementation of practical teaching. The third way is discussion. Discussion learning has two ways. First, learning communities hold offline discussions, make discussion results into texts or pictures, and upload them to the platform for sharing. Second, learning communities take full advantage of the “brainstorming” discussion module provided by the platform. Students express their own opinions on a topic and the moderator gives feedback, forming the final view or opinion after two to three rounds of discussions and feedback. Facts prove that group discussion indeed stimulates the learning interests of students, mobilize learning enthusiasm and achieve learning objectives.

4 Think About Learning-Centered Classroom Teaching Reform Based on Cloud Space 4.1

Extend Learning Space and Learning Outside the Classroom

The whole learning process is mainly reflected in three links, namely before, during and after class. Before class, students receive work tasks from Cloud Space, and learning communities develop implementation plans for work tasks, determine the division of labor and inquire relevant information. During class, students raise the questions needing to be solved before class, and teachers will look for solutions with each learning community. After class, each learning community needs to provide solutions and learning outcomes. Mobile teaching based on Cloud Space can give play to the great advantage of instant communication in dealing with complex problems needing to cross specialty, discipline, “teaching place”, “workplace” and other boundaries. 4.2

Arouse the Learning Passion and Participation Enthusiasm of Students

In the classroom of learning-centered Cloud Space, teachers will no longer be lonely “performers” while students will become “stars”, leading actors and masters of learning. Regarding learning content, way and effect, students have more choices.

596

J. Wang and X. Xie

Group discussion, practice and teaching others knowledge and skills respect the learning passion of students, stimulate their learning enthusiasm, implement diversified solutions, affirm their learning achievements, release their intelligence and wisdom, and truly turn them into masters of learning. 4.3

Reflect the Equal Importance of Knowledge and Ability and Improve the Quality of Teaching

The teaching process is a process of two-way communication, mutual influence and role interaction between teachers and students. The relationship between teachers and students is free and equal in learning communities where students are the builders of knowledge while teachers are facilitators who offer guidance and help students to study. This kind of teacher-student relationship will “be more conducive to college teaching” [3] and effectively promote equal communication, mutual questioning and free criticism between teachers and students. Three most obvious aspects are reflected in the classroom: Firstly, an increase occurs in the number of students’ reading materials. Secondly, the discussion process of students is no longer limited to the classroom and begins to extend outside the classroom. Thirdly, problem solutions can be modified and improved many times and updated in time. 4.4

Apply Modern Teaching Information Technology and Make the Learning Process More Easy and Enjoyable

“Internet + teaching” requires the support of modern teaching information technology, whose embodiment in real work is real-time teaching implemented in the mobile environment based on Cloud Space. From the perspective of educational concept, the “student-centered” teaching idea can be better implemented to improve the quality of talent cultivation. In terms of teaching means, the organic cooperation and unity of traditional and modern teaching means can be achieved. From the angle of teaching methods, learning outcomes are communicated and presented in real time in the application process of methods like case and situational teaching, which promotes teaching effect. From the view of the teaching process, students feel more relaxed and pleasant. As for the extracurricular active exploration of learning topics, students need to exert their autonomy and insist on learning with strong self-discipline. Otherwise, learning-centered teaching will become a mere formality. The learning of students is guided and supervised by teachers in the classroom, but arranged by students autonomously outside the classroom. However, the current exam-oriented assessment method fails to effectively stimulate the desire of students to make more extracurricular explorations. Acknowledgements. Key Project of Guangdong University of Science and Technology in 2019 (GKY-2019KYZD-12).

Reform and Thoughts of Learning-centered Classroom Teaching

597

References 1. Yang, D.: On the eight changes of higher education institutions reform in China. Peking Univ. Educ. Rev. 2, 105–117 + 190–191 (2008). (in Chinese) 2. Gui, Q., Cheng, X.: Research on learning-centered teaching reform. J. High. Educ. 9, 133– 135 (2018). (in Chinese) 3. Cao, Y.: Learning-centered teaching evaluation practice of universities—Characteristics and enlightenments of British “teaching excellence framework”. Jiangsu High. Educ. 3, 13–20 (2019). (in Chinese) 4. Zhang, H., Ma, X., Zhang, C.: An exploration into the comprehensive design of learningcentered classroom questioning interactive mode. J. High. Educ. 17, 110–111 + 115 (2019). (in Chinese) 5. Zhao, J.: Reform and practice of the teaching mode of basic accounting simulation experiment course—Center on “learning” and oriented by “solution”. J. High. Educ. 18, 132–134 (2018). (in Chinese) 6. Tian, H., Liu, Y., Zhao, L.: Application of the flipped classroom teaching mode based on the learning pyramid theory. J. Electr. & Electron. Educ. 40(1), 18–21 + 125 (2018). (in Chinese) 7. Zheng, J.: “Learning-centered” classroom constructed by tablets. China Mod. Educ. Equip. 24, 44–46 (2016). (in Chinese) 8. Ou, Y., Fang, Z.: Study on the survey and exploration of learning-centered teaching. Mod. Educ. Manag. 8, 89–93 (2016). (in Chinese) 9. Lan, L., Li, M.: My view on the establishment of learning-centered talent cultivation mechanism in universities. Res. High. Educ. Eng. 5, 63–66 (2014). (in Chinese) 10. Chen, B.: Strive to provide satisfactory education. People’s Daily, the 7th edition of September 8, 2017. (in Chinese)

Challenges and Countermeasures of Family Education in the Information Age Chaoxi Qian(&) School of Education, University of Birmingham, Edgbaston, Birmingham, UK [email protected]

Abstract. The 21st century is a period of all-round development in the information age. The rapid development of the Internet has promoted the all-round progress of society. Electronic equipment has become a must-have for every family. Mobile phones, computers, and televisions fill every day of life. Information technology penetrates every aspect of life, and it also brings parents annoyance. Children’s addiction to the Internet has seriously affected their physical and mental health. This article uses information technology to develop family education. It analyzes the challenges faced by family education in the information age and its countermeasures. Through countermeasures, it provides solutions to family education problems in the information age and provides theoretical support for the healthy development of family education in the information age. Keywords: Information age

 Family education  Countermeasures

1 Introduction With the development of the new century, the Internet and information technology change with each passing day [1–3]. The convenience brought by the Internet can be seen everywhere in life, and it also brings new troubles to family education. With huge network information, it is difficult for children who lack basic judgment to distinguish the correctness and rationality of the information. Figure 1 shows the current situation of family education. Integration of information technology and family education: It is to apply information technology to family education reasonably, to fully cultivate children’s ability to obtain information, screen information, evaluate information, and use information technology to learn, solve practical problems in life, and adapt to the information society [4]. Information technology is integrated with family education. Parents act as teachers, and use the tools of information technology to cultivate children’s ability to acquire, screen, and evaluate information; use the role of information technology to accompany children to carry out effective autonomous learning and give full play to children’s Imagination and creativity; using information technology to bridge the gap between parents and children, this is both a bridge of emotional communication and a bridge of teaching merits [5].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 598–604, 2021. https://doi.org/10.1007/978-3-030-51556-0_87

Challenges and Countermeasures of Family Education

599

Home Education Goal "Adult" Health and safety

65.95% 55.47%

Habit formation

53.58%

Daily learning Communication

37.89%

Self-care ability

33.75% 28.09%

Character development

Hobby

19.47%

Emotional emotion

11.93%

Fig. 1. Status of home education

2 Challenges and Problems Facing Family Education in the Information Age Family education, as an indispensable part of everyone’s growth, is the most important influencing factor in the process of children’s growth and children’s socialization. It is an effective way to realize children’s socialization [6]. In the new century, how can we integrate information technology with family education and give full play to children’s imagination and creativity? What kind of challenges does this bring? Figure 2 shows the proportion of young people’s exposure to the Internet and the use of online devices [7–10]. First time on the internet Under 5 year old 3%

6-8 year old 9-11 year old 12-15 year old Internet devices used by teenagers(%) 74.8

65.8

47.6

26.3

13.2

5.0

smart phone

Desktop PC

tablet

laptop

Smart TV

Other

Fig. 2. Proportion of teenagers’ exposure to the Internet and use of Internet-enabled devices

600

2.1

C. Qian

Popularization of Electronic Devices-Children Lack Awareness of Fair Use

In the information age, the development of electronic equipment is changing rapidly, and more and more households are equipped with sufficient electronic products. Televisions, computers, mobile phones, and tablets enrich the daily life of every family. However, the novelty of the online world has attracted children to plunge into it. Once indulged, they cannot restrain themselves and develop reasonable habits. This is the first challenge for family education in the information age. Figure 3 shows the Internet exposure rate of different groups of minors.

Left behind children Countryside City Overall

140 120 100

88.4

94.7

91.9

%

80

80.9

60 40 20 0

Fig. 3. Internet exposure rate of minors in different groups

2.2

Influx of Information-Difficult for Children to Digest

The amount of information in the mass media far exceeds the amount that families can carry and digest, and irrelevant data seriously interferes with children’s choices. Faced with a huge and complex flow of information, how to screen information for children and how to make good use of it requires parental supervision and guidance. Once a child is affected by negative information, the consequences are unimaginable. 2.3

It Is Difficult to Distinguish the True and False of the Virtual WorldChildren Lack Awareness and Crisis Awareness

According to authoritative data, it is estimated that by 2020, the number of Internet users in China will increase from the current 400 million to 750 million. Because of poor student self-control ability, students’ greater dependence on the Internet, and the impact of their living environment, in recent years, there have been numerous incidents of injuries to children’s online dating information and pornographic violence information. How to filter information and avoid harm, family education has a great responsibility.

Challenges and Countermeasures of Family Education

601

In the “Children’s Internet Protection Survey” initiated by Tennent, online fraud, bad information, and cyberbullying have become the three major dangers that children encounter in the process of surfing the Internet. Among them, the proportion of online fraud is the highest, accounting for 61%. The latest data released by the China Youth Research Center in 2016 also shows that the phenomenon of Internet infringement by Chinese high school students is very prominent. 47.2% of high school students have experienced theft of online passwords, 42.3% have received false payment requests online, and 17.0% of online shopping has been deceived. In addition, 7.5% were threatened and threatened online, 7% of personal photos or videos were maliciously transmitted online, and 5% were gang bullied online. Internet fraud and hacking easily lead to property risks; long-term attention to bad information can lead to illegal crimes; cyberbullying and harassment can easily cause psychological harm … Compared with the risks in daily life, cyber risks are because they are out of the sight of schools and families. It is often more covert and more likely to lead to serious consequences.

3 Countermeasures for Family Education in the Information Age 3.1

Attaching Importance to the Maintenance of Family Relationships

The companionship and education of family members, especially the parental companionship and education, play an important role in the development of children’s physical and mental health and social development. The daily interaction between parents and children enables children to gradually acquire some basic life skills and social behavior norms. Children learn and imitate and parents correct and guide their children’s behaviors in the process of socialization, so that children understand their social roles and learn to assume their social responsibilities and develop good living habits and moral qualities. Some parents who are in poor economic conditions but want to give their children better education resources often choose to go out to work, so they have not been with their children for a long time. These children are often raised by their ancestors. However, the ancestors lacked energy, and their concepts of education and life were relatively lagging behind. They could barely take care of the children’s daily life. 3.2

Gradually Changing the Concept of Family Education

Family education must establish the correct concept of family education. At present, the stress of learning makes parents over-rely on and attach importance to school education, which can be seen from the endless variety of tutoring classes, interest classes, and math classes and so on. Although school education is an important part of growth education, parents cannot ignore the importance of family education. One of the main purposes of family education is to teach children to know themselves and society, so as to achieve independent survival. In the era of information, it is even more important to lead children to select the information flow and guide children to use the convenience

602

C. Qian

brought by the network information reasonably, so as to achieve “survival” in the new era. To help children develop good Internet usage habits and cultivate the necessary media information literacy, parents should take the first responsibility. Experts recommend “sparse but not blocked”, go online moderately, and choose the right digital product according to your child’s age. Family education mainly prepares and prepares children for social development. The content of family education should mainly focus on moral education and personality education for children, help children play a good social role, and cultivate children’s sense of social responsibility. However, many parents confuse family places with schools, and the content of family education is essentially subject knowledge in school education. Many parents’ misuse of family education makes children not feel the warmth and love they should have in their families, and it is easy for children to have resistance or even rebellion. The improvement and enrichment of material living conditions, the rapid development and popularization of the Internet and mobile phones have made children more and more tempted, and made communication between children and parents less and less. The rapid development and popularization of the Internet has made children’s access to information more abundant and convenient, but the problems that accompany them are also worrying. Children’s self-control and self-discipline are poor, and they are susceptible to bad information on the Internet. Many children are addicted to the Internet, causing serious negative effects on children. As an indispensable part of national education, family education requires effective attention from the state, schools, and parents. At the same time, it requires certain guidance and assistance from all sectors of society to jointly promote the healthy and healthy development of family education, and promote the healthy development of children’s physical and mental health and children’s society. 3.3

Integration of Information Technology and Family Education

Parent schools attach importance to guiding parents to educate their children to start with themselves, infect children with their own actual actions, and establish a sense of responsibility as the child’s first teacher. The practice of some parent schools has proven that by listening to expert reports and exchanging experiences between parents, parents have reflected on their shortcomings in life, and inspired the desire to reinvent themselves and demonstrate for their children. If parents also have addiction, they can try to quit with their children, such as children quitting Internet addiction, dad quitting smoking, alcohol addiction, mother quitting mahjong addiction, etc. Through the process of working with children, promote parent-child communication, mutual supervision and encouragement, accelerate the speed of quitting addiction and achieve the common growth of children and parents. At the same time, parents should recharge as soon as possible, learn and enrich computer knowledge, be familiar with the series of activities and rules of the network society, and ensure that they can communicate smoothly with their children on network topics. In the Internet era, parents should first improve their own qualities and change their educational concepts and methods to achieve better integration.

Challenges and Countermeasures of Family Education

603

a. Seriously study modern media and guide children to face the media from a young age to form the necessary media literacy. b. Strengthen the guidance of children’s online behavior, care about their children’s spiritual world, give play to their role models and role models, jointly develop good online behavior habits, and jointly create a good family network cultural atmosphere. c. Effectively change the concept of parents and become friends. The long-term “parenthood” and unequal parent-child relationships have affected the communication between parents and children. “Squatting down and communicating with children”, turning “parents” into “friends” and changing subordination into equal relationships are the families that parents urgently need to establish. Improve the child’s living conditions, enrich the connotation of family life, and build an environment for growth. Some experts have analyzed that the Chinese youth’s access to the Internet is mainly to meet the needs of partner interaction, the need to forget the troubles and get rid of the pressure of life, the entertainment needs to stimulate excitement, the need to spend time, and the need for social learning. In order for children to get out of the mystery of advocating “modern media” and be masters of learning in the true sense, parents must really reduce their children’s learning and mental pressure.

4 Summary The information age is an era of all-round development of all walks of life. It has given more young people the opportunity to realize their dreams and turn things that they had never dreamed of before into reality. But at the same time, its disadvantages are also obvious: its richness and convenience make many people rely on it, thereby losing their thinking ability and curiosity. The temptation on the Internet has led many people to lose their way, and the abyss of the Internet has also made many people get lost and want to return. Doing good home education is only one of the most important steps in children’s education. In the face of the powerful influence and challenges of modern media, family education alone is not enough. It is necessary to establish a comprehensive three-dimensional network to educate children, and organically integrate the three aspects of school, society, and family to meet the challenges of child education in the information age.

References 1. Dong, W., Gao, W., Zhang, S., et al.: Effectiveness of ideological and political education in colleges and universities under the outbreak of internet media. Eurasia J. Math. Sci. Technol. Educ. 13(11), 7605–7610 (2017) 2. Gardner, A.H., Dziuban, E.J., Griese, S., et al.: Medical countermeasures for children in radiation and nuclear disasters: current capabilities and key gaps. Disaster Med. Public Health Prep. 13(3), 639–646 (2019)

604

C. Qian

3. Hughes, T.F.: Comparative study of child soldiering on Myanmar-China border: evolutions, challenges and countermeasures, written by Kai Chen. Asian J. Soc. Sci. 45(1–2), 216–217 (2017) 4. Li, Y.: Study on psychzological health problems and countermeasures of university student. Creat. Educ. 8(12), 1795–1802 (2017) 5. Fassbender, I.: Enhancing autonomy in reproductive decisions? Education about family planning and fertility as a countermeasure against the low birthrate. Contemp. Jpn. 28(2), 123–144 (2016) 6. Sakisakai, K., Fujitai, K., Kanekoi, Y., et al.: Trends of suicide and suicide countermeasures in Cambodia. Suicide Policy Res. 2(1), 8–15 (2018) 7. Liu, B.F., Quinn, S.C., Egnoto, M., et al.: Public understanding of medical countermeasures. Health Secur. 15(2), 194–206 (2017) 8. Zhang, S., Li, Y., Liu, B., et al.: The analysis and countermeasures of the psychological problems of impoverished undergraduates. Psychol. Behav. Sci. 6(4), 65–68 (2017) 9. Calatayud, J., Casaña, J., Ezzatvar, Y., et al.: High-intensity preoperative training improves physical and functional recovery in the early post-operative periods after total knee arthroplasty: a randomized controlled trial. Knee Surg. Sport. Traumatol. Arthrosc. 25(9), 2864–2872 (2017) 10. Yang, X., Li, G., Wang, H., et al.: Continuous passive motion after total knee arthroplasty: a systematic review and meta-analysis of associated effects on clinical outcomes. Arch. Phys. Med. Rehabil. 100(9), 1763–1778 (2019)

New Age MOOCS Teaching in Music Class of College Guofeng Liu(&) School of Music, Jiamusi University, Jiamusi 154000, Heilongjiang, China [email protected]

Abstract. The widespread application of information technology in education has drove teaching reform. MOOCS is one kind of new teaching models that emerges in this context. How to effectively apply MOOCS teaching to music classroom teaching in high school and effectively improve the efficiency of music classroom teaching in college. The author explores the feasibility of MOOCS teaching mode in improving teacher-student relationship and teaching effect, innovating teaching strategies and promoting the teaching reform, and explore the promoting effect of MOOCS teaching mode on college music teaching from the aspects of teaching theory and practical application. Keywords: New era

 MOOCS  College music

2012 was called “the first year of MOOCS” by Time. The same year, MOOCS also grew in China. MOOCS is mainly an online teaching model [1]. Students can learn from teaching videos of famous professors at international universities through virtual teaching platforms. On the MOOCSS platform, you can interact with online teachers and students freely, and obtain corresponding graduation certificates when you achieve it. The introduction of the online classroom fully reflects the convenience of the new teaching mode, which makes students’ acceptance to the traditional classroom teaching mode gradually decrease. Especially for the unique teaching of vocal lessons, studentscc can only practice in limited class time, which greatly limits the learning time. However, when MOOCS are combined with vocal teaching in traditional classroom, students can autonomously control the time and space of vocal learning, above all, the effect of vocal teaching in colleges is even more significant.

1 The Concept and Properties of MOOCS MOOCS is a massive open and large online course. The MOOCS is completely different from the traditional teaching method. The speciality of MOOCS lies in its openness and online education [2]. MOOCS teaching can not only greatly improve the teaching quality, but also provide students with a more open and high level platform, allowing students to study at any time or anywhere. Students can also use the extracurricular time to learn and communicate different courses. MOOCS overturns the traditional teaching mode and brings great convenience to music learning. The advantages and characteristics of MOOCS are as follows. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 605–610, 2021. https://doi.org/10.1007/978-3-030-51556-0_88

606

G. Liu

(1) Changing the teacher-student relationship by MOOCS MOOCS classes have a very important influence on the teaching of college music courses. Traditional music teaching is a very mechanical and compulsory way to impart students some methods and knowledge [3]. Students can only implement music knowledge and key points in music classes. MOOCS allow students to make full use of their free time to learn vocal music, which promotes music course not just to be fixed in classrooms. There is no time limit, so MOOCS has changed the limitation of space and place. Teachers can guide and communicate with students on the Internet. That can not only enhance the harmony of teacher-student relationship, but also promote students’ music learning, and the enthusiasm and initiative, which enhance students’ enthusiasm of studying music courses. (2) Wide audience of MOOCS Nowadays is the era of information networks, where the audience of MOOCS is very wide. There are no restrictions on time, place, age, profession and other aspects to MOOCS. Everyone can learn online through MOOCS. This flexible method improves audience experience and increases the approaches to acquire knowledge, and broadens the learning channels and scope of the audience. (3) Changing the status of education by MOOCS The traditional teaching model is conservative, while the MOOCS teaching model is very open. The arrival of MOOCS has overturned the teaching mode of traditional music courses in universities and changed the status of traditional teaching, introducing new music teaching models into higher education, absorbing and accepting new motivation and sources of music teaching, eliminating the reasons that traditional models are not suitable for education reform and development [4].

2 Opportunities and Challenges of MOOCS in College Music Teaching The emergence, development and application of MOOCS have impacted the traditional teaching of college music courses, and transformed the college music courses from the traditional resource possession mode to the network teaching mode [5]. In traditional music teaching in colleges, music teachers play an active teaching role while students are in a passive state of learning. In modern music teaching, students are in the active position of learning, and music teachers play a leading role. The application of MOOCS in college music teaching are both an opportunity and a challenge. From the perspective of the development of colleges in China, the development and application of MOOCS education is injecting new vitality and “fresh” power into the future of college education. Especially for many universities, it can be said that it brings new development opportunities [6]. In addition, MOOCS Education can bring excellent teaching resources into the classroom, which greatly saves investment in such college hardware facilities. At the same time, it can also solve the shortage of teachers with high-level education. From the perspective of students, it can also alleviate the

New Age MOOCS Teaching in Music Class of College

607

difficulties of education funds, thereby narrowing the gap of education and teaching levels between general universities and key universities to a certain extent. More importantly, as time goes on, teachers improve their teaching and management quality to better cultivate high-quality talents that meet the needs of the times. The application and development of MOOCS in colleges is still in its initial stage. The biggest advantage and characteristic of MOOCS teaching lies in its open teaching and learning. The teaching methods of MOOCSs are flexible and very suitable for contemporary college music teaching, giving full play to its functions and advantages, enriching the methods of college music teaching, enlivening the classroom atmosphere, and inspiring students’ interest in learning music. Before its entrance, more than 40 colleges in China have adopted MOOCS teaching methods and spontaneously formed MOOCS teaching alliances to establish a standardized and professional resource sharing teaching platform to promote more teachers and students to share MOOCS resources, which is a good opportunity. MOOCS teaching is also a challenge for universities, teachers and students. During MOOCS teaching process, schools, teachers and students are a whole, and the three complement each other. College teachers are accustomed to using traditional music teaching models, but they cannot adapt to open music teaching methods. Students are also accustomed to the transfer of knowledge and content of music courses to a certain extent, they manage and restrict the development and promotion of college MOOCS teaching [7]. In addition, MOOCS is an open resource sharing platform based on Internet resources, which requires colleges to specialize in Internet equipment. At the same time, many MOOCS education resources on the Internet are video materials based on traditional music classes, not real MOOCS resources. Teachers and students should also make tools to adapt and use MOOCS teaching mode, have professional MOOCS teaching resources to reflect the significance of MOOCS teaching.

3 Development and Application of MOOCS Teaching in College Music Classroom The quality-oriented education in the new era is developing rapidly. The MOOCS teaching model is a product of the new era. It should meet the needs of the times and closely integrate MOOCS with college education. Especially in the music courses of colleges, we should change the traditional thinking model, develop students’ autonomous online learning ability, combine traditional teaching with effective online teaching to improve the teaching level of colleges and promote the enthusiasm of college students to learn music. (1) The music lesson mode adopted in college music classrooms conforms to the physical and mental development laws of post-00 college students [8]. Education must conform to the laws of students’ physical and mental development, which is the most basic requirement of education. Today, college students are a new post00 generation. They have been in contact with computer networks since childhood, and have a strong ability to accept and understand information technology such as computer technology. When this group of young post-00 entered the

608

G. Liu

college music class, what their needs more are the music content of the new era. The MOOCS teaching model has been in operation for several years since its inception, and its cumulative and corresponding impact is also well known. This novel teaching method is well known to our college students before the teachers are fully familiar with it. As students of music teaching major in colleges, they want to learn this major well, and they need a lot of information and materials in line with the times. In the traditional music teaching class, only the characteristics and common sense of vocal music of a music expert will be taught. But in the era of MOOCS, we can explain by choosing multiple video clips or the knowledge points selectively, so that students can learn by comparison, analysis or imitation. It not only meets the requirements of post-00 students ‘physical and mental development laws, but also better promotes students’ learning, which conforms to the law of teaching development. (2) The music teaching mode adopted in college music teaching is adapted to the educational concept in the new era. Keeping pace with the times is the most scientific law for the development of any kind of things [9]. The education concept should also be continuously updated and replaced with the continuous development of China’s market economy. The education concept in the new era is quality-oriented education, training qualified college students with their talents. As advanced talents in music education, we must not only train music composers, but also train players, performers and even all types of music teachers at all levels. With such many needs, our teaching model must also keep pace with the times. In particular, life in the new era is inseparable from network information. Then, the classroom teaching of music colleges must also get rid of the traditional indoctrination style, and lead the classroom teaching with the advocacy mode, so that students can continuously promote the quality of classroom teaching under the guidance of new flexible and fashionable teaching concepts, making college students in the new era take their own advantage in classroom teaching, give play to their advantages, and constantly improve their musical literacy and connotation. (3) Adopting MOOCS teaching mode in the music classroom of colleges allows students to fully understand the society. Music teaching itself is a trend that keeps pace with the times. To create better works, musicians must go into life and touch the society. College music students in the new era can clearly and intuitively understand the current music types, social trends and the main theme of the whole society through the classroom MOOCS teaching mode. In fact, as a college student who has been studying hard for 12 years, he doesn’t know much about society. When they entered the university, they found that they were just babies desperately in need of knowledge. As a specialty of the profession, they want to have a better future in music creation or praise, and they must first complete the social lessons. That is a full understanding of society. The MOOCS teaching mode allows students to be exposed to changes in multiple teaching methods in the classroom, or to use multiple teaching development methods or to integrate and use new teaching materials [10]. It also familiarizes students in the campus with the development and change of music in China and even the world. Through continuous accumulation, students will better control their majors and have better development.

New Age MOOCS Teaching in Music Class of College

609

(4) Adopting the MOOCS teaching mode in the music classroom of colleges promotes rich and effective classroom teaching. Classroom teaching is the main place for college students to acquire knowledge. The classroom teaching organization is well designed, and the introduction of the MOOCS mode into the classroom can bring fresh feelings to students and make the original duck-feeding teaching flexible, effective and dynamic. Particularly, the use of MOOCS resources can share world-class top teaching materials into the classroom, so that the outstanding students in the class can gain more knowledge, and also encourage the remaining students to think and feel. Of course, it is not enough for students to acquire knowledge only in the classroom, so they also need extended training after class. The best platform for MOOCS is to have enough information to meet the different choices of everyone. Such high-low level after-school exercises can meet the development needs of students. It also provides a good platform for the learning and development of students in the future. In conclusion, informatization has popularized all public life. In the future, informatization classrooms will also be popularized in the classrooms of college students and the learning life of the people. What we need to think about is that when the new media play an active role, many negative issues will also arise, including the reform of teaching models, the construction of interactive teaching platforms, and the follow-up of multimedia-related technologies, which need to be taken seriously, and we should timely and effectively solve them. In the new media era, music education acquires big data of music education through these media means through online courses such as MOOCS. These big data affect not only teaching methods, but teaching content. Through new media technology and big data analysis, we constantly find vacancies and deficiencies, and then fill vacancies. This is also the development trend of music education in the new media era. To solve these problems, the national education administrative department needs to support the implementation of new media courses and encourage innovative teaching. At the same time, we hope that through the research and improvement of scholars and teachers, we can lay a solid foundation for the future of network teaching in colleges, and do a good promoting job.

References 1. Xu, C., Bao, J.: An exploration of the teaching design of ideological and political courses for young students in the new media environment. Party Build. Ideological Educ. Sch. (2), 44– 46 (2019) 2. Wang, W., Tian, C.: Research on the status quo of MOOC construction in Chinese universities. Beijing Educ. (High. Educ.) (4), 69–72 (2019) 3. Guo, Y.: A new age mourning event of multiculturalism and digital revolution. People’s Music (6), 68–69 (2019) 4. Ao, D.: Research on innovative teaching of MOOC and turning classes in colleges and universities. Theor. Obs. (4), 174–176 (2019) 5. Yao, Z., Yan, Q.: Exploring the path of “MOOC” integrating into the ideological and political theory class in colleges and universities. New West China (26), 157–158+160 (2019)

610

G. Liu

6. You, H., Zhou, T., Li, L.: Optimization of the ecological environment for college English teaching in the MOOCS era. Sci. Technol. Vis. (28), 170–172 (2019) 7. Shan, Y.: Research on the Application of “Flip Classroom” in Ideological and Political Theory Courses in Southern Xinjiang Universities. Kashgar University (2019) 8. Wang, D.: Research on the Deep Integration of Information Technology and Ideological and Political Teaching in Colleges and Universities. Shanghai Normal University (2019) 9. Teng, T.: The development trend of music education in the new media era. Chin. Music (4), 155–159 (2016) 10. Niu, D.: On the problems and strategies of music teaching reform in the new media era. China Press (24), 35–36 (2016)

Construction of Behavior-Oriented Smart Teaching Model in Mobile New Media Environment-Take the Course “NC Machine Tool Programming and Operation” as an Example Lei Shi(&) Liaoning Equipment Manufacturing Vocational and Technical College, Shenyang, Liaoning, China [email protected]

Abstract. In the mobile new media environment, the vocational education and teaching environment is constantly changing, which has had multiple effects on the teaching model. In order to make the teaching of “NC Machine Tool Programming and Operation” more efficient, it is recommended to take the actionoriented guidance and use mobile new media technology to build a smart teaching mode of “NC Machine Tool Programming and Operation” course. This can achieve effective docking and efficient linkage between teaching and learning. The way of constructing the wisdom teaching mode of the course of “NC Machine Tool Programming and Operation” under the mobile new media environment is to optimize the course standards with the guidance of behavior, create a theme learning situation, and systematically design the course teaching structure. Keywords: Behavior-oriented  Mobile new media  Programming and operation of CNC machine tools  Wisdom teaching mode

The behavior-oriented method, which first appeared in the 1960s, is an action-oriented teaching method based on a complete work process. Professor Ryans of the United Kingdom first mentioned that by the 1980s, a new trend of thought had been triggered in the field of world vocational education and teaching. In particular, a teaching revolution has emerged in the field of vocational education in Germany, the world’s largest power equipment manufacturing country, and a complete education and teaching method has been formed [1]. Since then, it has been widely promoted and applied in countries around the world, especially in the field of vocational education. The behavior-oriented method emphasizes an actual work process or a complete activity process. In this process, human development is the focus, and the emphasis is on teaching methods to improve students’ comprehensive professional ability. The basis of behavior-oriented method is the study of theoretical knowledge. During the learning process, the guidance of learning is emphasized by practice, and the required knowledge and theories are learned with the action process as the clue, so as to achieve the best effect of autonomous learning. The teaching goal pursued by this method is © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 611–616, 2021. https://doi.org/10.1007/978-3-030-51556-0_89

612

L. Shi

marked by students’ behavioral performance, which is conducive to improving learning efficiency, and is also an effective method for dealing with complex problems. We can learn from the successful experience of German vocational education but cannot copy it completely. Especially in the rapid development of China’s mobile Internet today, with the widespread use of mobile new media, the vocational education environment is constantly developing and changing, and more and more teaching models have emerged. With the support of Internet technology, the classroom teaching methods of vocational education are more diverse, and the presentation forms of teaching resources are more abundant in the mobile new media environment [2]. Therefore, it provides better conditions for the reform and innovation of the vocational education wisdom teaching mode under the guidance of behavioral guidance. Vocational education is how teachers are guided by behavior. Therefore, it is necessary to combine the national conditions and education system of our country to build a smart teaching mode suitable for vocational education in China.

1 Optimize the Course Standard of “NC Machine Tool Programming and Operation” Under the Guidance of Behavior Orientation The construction of the wisdom teaching mode of a course needs to be based on scientific and reasonable curriculum standards. In the traditional teaching model, the teaching content and teaching plan of a course are mainly arranged according to the teaching goals in the curriculum standard, and the curriculum knowledge system is constructed according to the discipline structure. The structured processing of knowledge based on the subject system is essentially a course based on knowledge reserve, and it is a stacked storage structure. What is the purpose of storing knowledge? The key is application! It is precisely on this issue that the traditional subject knowledge structure makes it difficult to achieve a high degree of integration between theoretical knowledge and practical applications, and it is difficult for students at different levels to meet individual learning needs. The formulation of the curriculum standard of “NC Machine Tool Programming and Operation” under the guidance of behavior orientation does not emphasize the knowledge structure of subject knowledge, but it is based on actual work cases, emphasizing the process of action, the process of doing things, that is, the work process, and the structure of applied knowledge. First of all, teachers should fully understand the professional (industry) standards, and change the knowledge structure of the curriculum from the structure of stored knowledge to the structure of applied knowledge [3]. The process is the relationship between deconstruction and reconstruction, that is, the deconstruction of the traditional disciplinary system structure mainly based on stored knowledge, the decomposition of the original knowledge system, and the reconstruction of the action system structure based on applied knowledge. It is worth noting that the total amount of knowledge has not changed after deconstructing knowledge, but only the way in which knowledge is arranged and combined has changed. Secondly, under the guidance of behavior orientation, teachers should actively change their identity roles and affirm students’

Construction of Behavior-Oriented Smart Teaching Model

613

subjective status in the teaching activities. Moreover, students should be the center and actively cultivate students’ ability of self-managed learning and solving practical problems. In this way, students can be more involved in self-learning management, in order to fully mobilize students’ subjective initiative in the teaching process, and stimulate learning potential. Teachers play a guiding and guiding role in the entire teaching behavior process. Teachers need to guide students to complete the learning process independently, guide students to participate in learning independently, improve the interest and ability of students to learn independently, and integrate the teaching and learning processes in order to complete the teaching goals. Finally, under the guidance of behavioral guidance, teachers need to scientifically arrange the lesson plan and reasonably arrange the content of the course. From the perspective of teaching time, the course teaching process can be divided into three stages: before the lesson, during the lesson, and after the lesson. Before and after class, teachers can use mobile new media environment to enrich and supplement the teaching content to assist the learning effect in the class; Interaction through mobile multimedia, in order to facilitate teachers to find problems in the learning process of students in a timely manner so that teachers can guide and help students solve problems encountered in learning in class, thereby greatly improving the quality of teaching and learning effects.

2 Create Thematic Learning Situations Oriented at Behaviors “NC Machine Tool Programming and Operation” is a core course of vocational posts that combines theory with practice, and it needs to rely on specific learning situations. This is also a key point in the design of the curriculum architecture, which places high demands on teachers’ professional knowledge and comprehensive practical ability. In particular, the construction of the wisdom teaching mode of the course “Programming and Operation of Numerically Controlled Machine Tools” not only requires teachers to be familiar with the knowledge structure of the subject system. At the same time, professional teachers are required to have the ability to comb, classify, summarize, correlate, and reorganize knowledge, that is, the ability to deconstruct and reconstruct knowledge [4]. But this does not mean that knowledge in all subject systems must be reproduced in the curriculum. Instead, the knowledge should be classified, correlated, and reorganized according to the needs of the work process or activity process, and the subject knowledge should be targeted to support the behavior-oriented learning process in accordance with the principle of moderation and sufficient. This process is not simply the theoretical physical displacement of space, but is integrated into the process of applying knowledge. Under the environment of mobile new media, it is necessary to use the Internet technology to create behavior-based learning situations under the guidance of behavioral orientation, and innovate the method of creating learning situations. Before setting up a learning situation, we must first design the macro structure of the overall structure of a professional course. Here we take the numerical control technology major as an example. First of all, it is necessary to analyze the typical work tasks in professional positions to determine the overall content of the course; Secondly, the typical work tasks in the analyzed professional positions are integrated, the action

614

L. Shi

fields of the professional positions are summarized, and the initial structure of the course is determined; Finally, the field of action, which is summarized by the cognition rules of professional positions and the rules of the process of professional growth, is converted into a curriculum system composed of multiple learning areas, so as to determine the curriculum architecture, which is the curriculum category required by the major. For example, the “NC Machine Tool Programming and Operation” course is one of the core courses for professional positions in CNC technology. The design of behavior-oriented learning situations is based on the teaching of the actual work processes in professional positions. Based on the 6 typical characteristics of professional positions and 6 steps of behavior-oriented thinking, multiple learning areas are created. Each learning situation has a certain logical relationship and is independent of each other. The learning situations can be logical relationships of comparison, transfer and internalization, which are intended to improve students’ autonomous learning ability, professional behavior ability and sustainable development ability. Take the course of “NC Machine Tool Programming and Operation” as an example to explain the process of creating a learning situation: First, analyze the typical working process corresponding to the course “NC Machine Tool Programming and Operation”, sort out the typical working process, and list the specific working steps; then, through the teaching process of typical work process, determine the comparative frame of reference; finally, based on this frame of reference, three or more specific work processes are determined in accordance with the principles of parallelism, progression, or tolerance to design learning situations. Relevant theoretical research and teaching implementation show that three or more learning situations are usually required for a course, because the emphasis is on comparative learning. Through the complete implementation of the teaching-based work process, students make multiple comparisons of knowledge to achieve the transfer and internalization of knowledge, master learning methods, learn to learn and think independently, and achieve competency-based teaching [5].

3 Systematically Design the Teaching Structure of Courses with the Guidance of Behavior Orientation The problem solved in the design of the learning situation of the course is the question of “what to teach”. After designing the learning situation, we must start to solve the question of “how to teach”, that is, the structural design of the teaching process. The traditional teaching structure is based on the discipline system, which is based on the teaching process of storing subject knowledge; the new instructional structure guided by behavior is based on the actual work process, which reflects a complete action and thinking process that has been processed through teaching and is designed as a structure suitable for teaching. Research and practice show that this is a universal method [6]. First determine the reference path of the teaching process, and then use the universal work process as the basic tool for teaching process design; finally, the universal working process is used to teach the actual working process, and finally the teaching process is designed. When teaching with three or more learning situations in the teaching process, you should consider the logical relationship (parallel, progressive or inclusive) between the learning situations, especially courses like “NC Machine Tool

Construction of Behavior-Oriented Smart Teaching Model

615

Programming and Operation” that combine theories and practice. While learning practical skills, the subject knowledge should be taken as the necessary foundation. The two are combined with each other, and they can be integrated. They can adopt methods such as “guide text” to carry out teaching. At the same time, in the new mobile media environment, Internet technology can be used to assist teaching by using smart classrooms and smart teaching methods. However, no matter what method is used for teaching, the teaching process is the result of teaching-oriented treatment of the objective working process with the guidance of behavior. This process is not only the path of student learning (learning process), but also the path of teacher teaching (teaching process).

4 Promote Students’ Autonomous Learning Under the Guidance of Behavior The design of the teaching process structure based on the work process is essentially learning for action, learning through action, and action is learning, which fully reflects the behavior-oriented teaching principles. In the whole process, students are the main body or center of learning, and the cultivation of people always revolves around professional action ability; the teacher plays the role of coordinator or organizer in this process. The teaching process is guided by the actions of the professional work process and always follows the complete behavior of “information, decision making, planning, implementation, inspection, and evaluation”. The orientation process fully reflects the interactive teaching relationship between students and teachers [7]. In the new media environment, with the help of mobile Internet technology through various smart teaching platforms. In this way, students can obtain relevant information and information independently, make plans through independent thinking and group discussion, and after the teacher guides students to implement the plan independently, the students independently conduct self-evaluation and mutual evaluation. Through hands-on practice, students acquire the skills required for professional positions, acquire the necessary professional knowledge, and cultivate students’ professional ethics [8]. In the work-based teaching process based on behavior-oriented guidance, teachers should pay more attention to the philosophical essentials of teaching and adhere to the principle of “hands in hands, let go, shake hands, and use both hands and brains”; It is necessary to adhere to the principle of “learning by doing, learning to do, and combining learning with doing”; at the same time, we must also master the principle of “simple content repeated and in-depth, complex content to learn and learn”. In this way, students can not only get complete training in action sequences in the process, but also build a learning experience and knowledge system of their own, thereby stimulating students’ interest in autonomous learning and improving their ability to learn autonomously. The behavior-oriented work process is not a warehousing, stacking structure for storing knowledge, but a structure for applying knowledge [9]. A systematic course based on work processes is a deconstruction of the discipline system and a restructuring of the action system, and at the same time a smart teaching model with the help of a mobile new media environment. The teaching mode under the traditional discipline system lags behind the development of the enterprise’s industry [10]. Once the

616

L. Shi

enterprise industry has a new direction and new technologies and products have been developed, a systematic course of work process guided by behavioral guidance is bound to be highly synchronized with the enterprise industry. Vocational education and teaching will surely keep up with the new work process that appears in the enterprise industry, and carry out real-time teaching processing to make the teaching work process more synchronized with the actual work process of the enterprise.

References 1. Dayuan, J.: Essentials of Vocational Education, pp. 24–26. Beijing Normal University Press, Beijing (2017) 2. Zhiqun, Zhao: Action-oriented teaching. Vocat. Educ. Forum 10, 1 (2018) 3. Xu, J.: Establishing people is the fundamental mission of universities. Learning Times, March 16 (2018) 4. Dayuan, J.: Reinterpretation of German “dual system” vocational education. Chin. Vocat. Tech. Educ. (33), 5–14 (2013) 5. Dayuan, J.: The structural logic of the systematic course of work process. Educ. Occup. (13), 5–12 (2017) 6. Dayuan, J.: New research on vocational education. Education Science Press, Beijing (2006) 7. Bing, Z.: Construction of college English wisdom teaching model guided by POA theory in the mobile new media environment. Educ. Theory Pract. 39(3), 51–52 (2019) 8. Dayuan, J.: Research on the mainstream teaching thought of contemporary German vocational education. Tsinghua University Press (2007) 9. Cai, B.: Wisdom teaching in the era of educational informatization 2.0: ideas, characteristics, and models. China Educ. J. (11), 56–61 (2019) 10. Xu, W., Min, Z.: Research and practice of new teaching mode based on “Internet +” smart teaching. Vocat. Educ. Forum (32), 58–61 (2017)

Innovation and Practice of “1 + N” Compound Design Talents Training Model in Computer Networks: A Case Study of New Higher Education Group Co-founded Undergraduate Program Yuanyuan Li(&) Yunnan Technology and Business University, Kunming 651700, Yunnan, China [email protected]

Abstract. With the progress of society and the development of science and technology, people are gradually entering the computer age. The advent of the computer age provides unprecedented entrepreneurial opportunities for modern college students, as well as opportunities to build models for the development of composite design human resources. Today, with the rapid development of science and technology, the relationship between computer science and technology and other industries is getting closer. As a modern university student, we must thoroughly study the relevant knowledge of the Internet and cultivate our own algorithmic thinking to lay a solid foundation for entrepreneurship and work after graduation. Based on the actual situation, this article introduces the training model of composite design talents, and explores how to practice the training model of composite talents in teaching. The purpose of this article is to conduct innovation and practice research on the “1 + N” composite design talent training model under computer networks. In terms of methods, we mainly cultivate the design ability of students by strengthening the teaching of basic professional knowledge, and train composite design talents in design competitions, and promote the three aspects of the school-enterprise cooperative teaching model to change the original teaching model. In terms of experiments, it is mainly taught by a class of the undergraduate major co-constructed by the New Higher Education Group, and it is tested at the end of the class time. The exam is over and the students are surveyed. It was found that the passing rate was 90%, and the overall score was good, of which 10% failed, 25% passed, 55% good, and 10% excellent. It shows that the overall teaching effect is worthy of admiration. More than 60% of people said they were satisfied with the teaching mode, and only 18% said they were not satisfied with the teaching mode, indicating that the “1 + N” composite design talent training model is feasible under the support of this data. Keywords: Computer age  Training mode  Student design ability  Teaching mode

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 617–623, 2021. https://doi.org/10.1007/978-3-030-51556-0_90

618

Y. Li

1 Introduction Humans have a long history of design activities. Its inclusion varies with specific social and historical conditions. According to the division of the early art department, the design department mainly includes industrial design, visual communication and media design, information and interaction design, handicraft design and environmental design. The International Design Organization defines design as the process of solving strategic problems, and aims to promote innovation, business success, and quality of life through innovative products, systems, services, and experiences. In recent years, design has become an important measure to improve independent innovation capabilities and build an innovative country. In the policies, outline and opinions published by the state, it is recommended to promote the integration of cultural creativity and design services with related industries, improve the level of high-end comprehensive design services, and strengthen the development of human resources in modern service industries. Yes, for example, design has greatly promoted the in-depth application of design in the social, economic and cultural fields, so that training innovative design talents has become an urgent issue in higher education. After participating in social work, students can not only rely on their outstanding professional skills, but also have high personal qualities and professional ethics to complement each other. Therefore, using the compound human resource development model to develop compound human resources specific to modern computers can meet the learning and work needs of students. As a major economic entity that integrates social resources and creates social wealth, the company has a huge demand for highlevel, high-quality talent. All business owners want to control professional computer talents to ensure the long-term, stable and healthy development of the business. Therefore, the development of a modern computer professional compound human resource with a compound human resource development model can meet the needs of business management and profit. In order to improve social competitiveness, schools must reform existing education programs. Professional construction is the current professional reform model of many schools. The method combined with human resource development mainly considers the students’ skills learning and ability training. This is a more comprehensive development approach. Establishing a computer major with its advantages can enhance the educational competitiveness of schools. Therefore, we can meet the needs of many modern specialties by cultivating mixed human resources to meet the needs of school survival and development. In terms of methods, we mainly cultivate the design ability of students by strengthening the teaching of basic professional knowledge, and train composite design talents in design competitions, and promote the three aspects of the school-enterprise cooperative teaching model to change the original teaching model. In terms of experiments, it is mainly taught by a class of the undergraduate major co-constructed by the New Higher Education Group, and it is tested at the end of the class time. The exam is over and the students are surveyed.

Innovation and Practice of “1 + N” Compound Design Talents

619

2 Method 2.1

Strengthen the Teaching of Basic Professional Knowledge to Cultivate Students’ Design Abilities

As many professional-related courses are involved, many students cannot fully grasp these basic knowledge [1]. Because they do not have a deep understanding of design concepts and design skills, they cannot afford the challenges of future jobs and design products that cannot survive in the enterprise [2, 3]. Therefore, we value the development of students’ basic skills, training them from a literary, scientific, and process perspective, and acquiring solid basic skills should help future learning [4]. Teaching students the basics can meet the needs of modern society and develop their abilities in many ways. Now is the era of rapid computer development. Many software can greatly help the community design. For example, flowcharts that are difficult to complete manually. Using software can make drawing easier. Computer software is also a key tool for future work, and mastering these skills is also key to future development [5]. In addition, the current Internet information technology is quite advanced. Knowing the latest design information through the Internet at any time is also a basic skill for future design. With the rapid development of society, products are being updated faster and faster. Sticking to the original design model and design concept has been eliminated by society. Therefore, we not only focus on developing students’ basic knowledge and skills, but also focus on developing students’ skills to suit the development of society. 2.2

Design Competition to Train Composite Design Talents

It is impossible to train qualified students only in theory, so it is necessary to train students in practice. Design competitions can show students their opportunities [6]. By participating in competitions, students can not only learn advanced design concepts, but also provide their work to professionals for comment. For students, it is necessary to learn the advantages of others, to see their own growth and the disadvantages of mastering professional skills [7, 8]. Therefore, participating in design competitions is a very effective way to train composite design talents [9]. 2.3

Promote School-Enterprise Cooperation Teaching Model

School-enterprise cooperation is also an educational model commonly adopted by many universities to improve students’ practical skills. In school, it is possible to obtain only theoretical knowledge, but it is difficult to obtain practical skills. Provide a place for students to self-test through the school cooperation model. Through practice, we found our shortcomings [10]. Enterprise demand is often the mainstream concept in today’s society. If the product is not designed to meet the needs of the company, students will explain some aspects that are missing [11]. Of course, for companies, they can find more business opportunities from student design products. This is another opportunity for the company to grow. Therefore, the school-enterprise cooperative education model is a win-win model, which is not only conducive to the development of complex human resources, but also provides opportunities for enterprise development [12].

620

Y. Li

3 Experiment 3.1

Purpose of the Experiment

By investigating the teaching classes of the undergraduate majors in the New Higher Education Group, and analyzing the feasibility of innovation and practice of the “1 + N” composite design talent training model under the computer network. 3.2

Subjects

One class of the undergraduate major of the New Higher Education Group was the survey object. 3.3

Experimental Design

By selecting a class as the research object in the undergraduate major of the New Higher Education Group and observing its learning, the class size is 60 people, and the class time is 8 weeks. The learning knowledge is still based on the undergraduate majors co-built by the New Higher Education Group. Teachers normally attend classes, 5 days a week, 1–3 lessons per day, and homework assignments after class. At the end of 8 weeks of class time, take a floor test and count the results. The evaluation of students mainly includes pre-class learning and two parts of class performance to evaluate the overall performance of the class. After the exam, the students will be surveyed to see their learning satisfaction and suggestions, and summarized. 3.4

Experimental Tools

Through the use of the scale survey method-Likert scale method to conduct experiments, and through surveys, the graduates of the New Higher Education Group’s undergraduate majors were asked to understand the students of the New Higher Education Group’s undergraduates in recent years. Professional look and feel for feedback. By investigating the relevant factors that have an impact on the undergraduate majors jointly constructed by the New Higher Education Group, we can further understand the related situation of tourists’ satisfaction with tourism e-commerce.

4 Discussion 4.1

Results of New Higher Education Group Co-construction of Undergraduate Programs

Students’ subjective evaluation is discussed through questionnaire surveys. Students’ satisfaction with the joint construction of undergraduate professional education by the New Higher Education Group, the choice of learning methods, and the adaptability of the joint construction of the New Higher Education Group’s undergraduate professional classroom are analyzed. The questionnaire takes the form of a five-point scale

Innovation and Practice of “1 + N” Compound Design Talents

621

and is divided into five levels. These five levels are very consistent, consistent, uncertain, inconsistent, and very inconsistent. The higher the scale’s score, the higher the degree of personal agreement with the questionnaire item. According to the final exam results, a correlation analysis is performed. If the indicators in the process evaluation or the indicators in the final evaluation are significantly related to the performance, it can be explained that the selection of the research indicators and the construction of the research system in this article are good. By reducing the dimensionality of the evaluation indicators, the main indicators are extracted, and the influence coefficients of each component and the final grade can be obtained based on the analysis. For the component with the highest coefficient, it is the most important factor affecting the learning effect.

Table 1. Investigate class performance Failed Pass Good Excellent People 6 15 33 6 Percentage 10% 25% 55% 10%

It can be seen from Table 1 above that the passing rate is 90%, and the overall score is good, of which 10% is failing, 25% is passing, 55% is good, and 10% is excellent. It shows that the overall teaching effect is worthy of admiration.

Very dissatisfied

Dissatisfied

general

satisfaction

Very satisfied 0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

New Higher Education Group builds teaching satisfaction for undergraduate majors

Fig. 1. Satisfaction of New Higher Education Group’s joint undergraduate teaching

622

4.2

Y. Li

Satisfaction Comparison of New Higher Education Group Coconstruction Undergraduate Teaching

Through questionnaires, students evaluated their satisfaction with their learning methods in the joint teaching of the New Higher Education Group’s undergraduate majors. The specific questionnaire results are summarized as follows. It can be seen from the above Fig. 1 that students are generally very satisfied with the method of co-building undergraduate professional teaching of the New Higher Education Group, and more than 60% of them are satisfied with the method of cobuilding undergraduate professional teaching of the New Higher Education Group, of which 18% People expressed dissatisfaction. 19% were very satisfied with this new higher education group’s method of jointly building undergraduate professional teaching, 42% were satisfied with the teaching mode, 21% were general with the teaching mode, and were dissatisfied with the teaching mode. Thirteen percent of them said they were very dissatisfied with the teaching model. More than 60% of people expressed satisfaction with the teaching mode, and only 18% expressed dissatisfaction with the teaching mode, indicating that the “1 + N” composite design talent training model is feasible under the support of this data. 4.3

Extracurricular Practice

Extracurricular exercises include professional exercises and various competitions. Professional practice provides students with an opportunity to test their expertise, test their practice and work independently. This is also an opportunity for teachers to verify that content and practical education meet social needs and achieve their human resource development goals. The effects of extracurricular exercises should not be overlooked, as they develop students’ abilities from the other end. Studies have shown that it is difficult for students to work on-site during an internship. They can only perform simple daily tasks. I cannot use what I have learned at work. Professional practice is just a form, and students cannot do it manually. Therefore, schools need to carry out a series of extracurricular activities. For example, programming, web design, mathematical modeling and other competitions.

5 Conclusion In terms of methods, we mainly cultivate the design ability of students by strengthening the teaching of basic professional knowledge, and train composite design talents in design competitions, and promote the three aspects of the school-enterprise cooperative teaching model to change the original teaching model. In terms of experiments, it is mainly taught by a class of the undergraduate major co-constructed by the New Higher Education Group, and it is tested at the end of the class time. The exam is over and the students are surveyed. It was found that the passing rate was 90%, and the overall score was good, of which 10% failed, 25% passed, 55% good, and 10% excellent. It shows that the overall teaching effect is worthy of admiration. More than 60% of people said they were satisfied with the teaching mode, and only 18% said they were not satisfied with the teaching mode.

Innovation and Practice of “1 + N” Compound Design Talents

623

Acknowledgements. Fund Construction: Innovation and practice of “1 + N” compound design talent training mode - take the undergraduate major jointly established by Gaoxin education group as an example No: 2019J0985.

References 1. Arslan, F.N., Azak, H.: Application of central composite design for the optimization of reverse-phase HPLC/DAD separation of the cis- and trans- isomers of long-chain unsaturated fatty acids. Food Anal. Methods, 11(1), 1–17 (2017) 2. Sun, Z., Wang, C., Niu, X.: Design optimization method for composite components based on moment reliability-sensitivity criteria. Int. J. Turbo Jet-Engines 34(3), 233–244 (2017) 3. Ye, Y., We, N., Zhang, X.: An optimized design for compact masked AES S-Box based on composite field and common subexpression elimination algorithm. J. Circ. Sys. Comput. 27(11), 1850171 (2018) 4. Boudechiche, N., Yazid, H., Trari, M.: Valorization of Crataegus azarolus stones for the removal of textile anionic dye by central composite rotatable design using cubic model: optimization, isotherm, and kinetic studies. Environ. Sci. Pollut. Res. Int. 24(62), 19609– 19623 (2017) 5. Syam, B., Sebayang, A., Sebayang, S.: Design and production of stopper made of concrete foam composite used for open channel conduit cover and parking bumper. IOP Conf. 126(1), 012053 (2018) 6. Kinashi, K., Iwata, T., Tsuchida, H.: Composite resin dosimeters: a new concept and design for a fibrous color dosimeter. ACS Appl. Mater. Interfaces. 10(14), 11926 (2018) 7. Mostafavi, A., Rezvanipour, H., Afzali, D., et al.: Central composite design for optimization and formulation of desulphurization of iron ore concentrate using atmospheric leaching process. J. Iron. Steel Res. Int. 25(1), 1–8 (2018) 8. Zeng, B., Quan, L., Tong, J., et al.: A new approach based on central composite design and multi-objective optimization for design of a roller-mill mechanism in a maize stubble harvester. Int. J. Adv. Manuf. Technol. 94(5), 1–14 (2017) 9. Schmitt, M.P., Schreiber, J.M., Rai, A.K.: Development and optimization of tailored composite TBC design architectures for improved erosion durability. J. Therm. Spray Technol. 26(8), 1–14 (2017) 10. Kulkarni, P.V., Sawant, P.J., Kulkarni, V.V.: Design and development of plane bending fatigue testing machine for composite material. Mater. Today Proc. 5(5), 11563–11568 (2018) 11. Xiao-Fang, H., Qing-Xiang, Y., Peng-Fei, G., et al.: Optimization of rice-washed water rinsing process technology for Atractylodis Macrocephalae Rhizoma by central composite design-response surface methodology. Chin. Tradit. Herbal Drugs 48(1), 109–113 (2017) 12. Ji, X., Niu, Y., Xu, Y.: Rational design of hierarchical SiO2@TiO2 composite with large internal void space for high-performance microwave absorption. Russ. J. Phys. Chem. 93(6), 1128–1132 (2019)

College Hotel Management Teaching Mode Based on Computer Information Yuerong Wang(&) Yunnan Open University, Kunming, China [email protected]

Abstract. Due to the rapid development of the economy, the development of computer technology is more and more mature, Therefore, in the teaching of hotel management in universities, in order to better meet the actual needs of hotel management, it is necessary to apply computer information technology and other means to education and teaching, so the realization of hotel management information is an inevitable trend. The research method of this paper is to compare the traditional teaching mode with the informationized teaching mode by collecting and searching the literature, and using the questionnaire survey and interview data as the experimental support, to obtain the prominent advantages of the informationized teaching mode. The experimental results of this paper show that the application of computer and wireless network technology to the teaching of hotel management can realize the communication between the teaching subjects, and use the bridge effect of interactive electronic whiteboard to cultivate students’ enthusiasm and practicality, which is conducive to cultivating application-oriented talents. Keywords: Computer informatization teaching mode Interactive electronic whiteboard

 Hotel management 

1 Introduction Hotel management is one of the most popular industries in the world, and hotel management professionals are in hot demand in the market. RevPAR’s recovery and the slowdown in hotel openings suggest that the growing revenue of the hotel industry has shifted away from relying on opening new stores for revenue. This also means: Chinese hotel industry “golden age” has arrived. However, on the other side of the rapidly developing Chinese hotel industry, there is a lack of professional hotel management personnel in China. Contemporary hotel management professionals not only require students to master professional knowledge and skills, but also to be proficient in the use of computer technology, the application of information technology to hotel management, improve the level of management and service. According to the data, in terms of the education and teaching of hotel management, the foreign lausanne model and the Australian HOSPITALITY professional training package model are the most famous [1]. Lausanne hotel management school adheres to the educational philosophy of “combining industry with education”, and its teaching goal is to cultivate hotel management talents with high-level operation and operation © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 624–629, 2021. https://doi.org/10.1007/978-3-030-51556-0_91

College Hotel Management Teaching Mode

625

capabilities [2]. In the course of HOSPITALITY education and teaching, the Australian HOSPITALITY professional training package adopted the teaching method of credit system, adhered to the principle of flexibility, and educational institutions recognized each other’s degrees and qualifications [3]. However, China’s higher vocational education is still in its infancy, and conditions in all aspects are not yet mature [4]. As of 2019, due to the lack of professional talents in the development of the hotel industry, hotel management has been widely offered in various higher and secondary vocational schools with a large number. Will also have many other domestic colleges and universities hotel management specialized as a pilot professional teaching reform, but the emphasis on practice teaching, to integrate theory with practice, action, generally adopt the mode of cooperation between colleges and students into the enterprise for a few months internship, to gain experience, learn knowledge and skills, but takes a lot of time and effort [5, 6]. At present, shandong vocational college of tourism and zhejiang vocational college of tourism are the most representative institutions that have made achievements in China [7]. Based on the beneficial results of domestic and foreign researches, this paper compares the traditional teaching mode with the information-based teaching mode, absorbs the advantages of the traditional teaching mode, and overcomes its disadvantages. Through literature research and the practice of relevant cases, I designed a survey plan, conducted interviews with classmates and teachers, and made use of the interactive electronic white board as a medium to improve the attraction of hotel management teaching, students’ classroom learning ability and after-class practice ability [8, 9].

2 Method 2.1

Computer Informatization

Computer informatization refers to the historical process of cultivating and developing new productive forces represented by intelligent tools mainly based on computers and making them benefit the society [10]. The productivity corresponding to intelligent tools is called information productivity. Informatization on the basis of the modern communication, network and database technology, summarize all the elements for the research object to the database, for certain people live, work, study and auxiliary decision-making and closely related human actions such as the combination of a technology, with fast speed, high efficiency and easy to use features, using the technology, can greatly improve the efficiency of all kinds of behavior, to promote the progress of human society provides great technical support. 2.2

Teaching Mode of Hotel Management Major

Teaching mode can be defined as a relatively stable structure and program of teaching activities under the guidance of certain teaching ideas or teaching theories. As a structural framework, it highlights the teaching model to grasp the overall teaching activities and the internal relations and functions of each element from a macro

626

Y. Wang

perspective. As an activity procedure, it highlights the order and operability of the teaching mode. In the actual teaching process of each teacher, due to the influence of traditional factors and western teaching mode, the main teaching modes in the hotel management major are: teaching mode, model teaching mode, etc.

3 Experiment The research in this paper is based on the collection of relevant literature and questionnaire survey, and the final results of the literature and questionnaire survey are summed up to obtain experimental data. Relevant literature materials were collected through wanfang data, cnki, baidu academic and other paper websites, and the specific data were obtained through the questionnaire survey of two classes. Through literature search, it is found that most of the researches on the teaching mode of hotel management major in China stay in practice and school-enterprise cooperation mode, and the related teaching mode of hotel management based on computer technology is still a blank, with great development potential. Two classes were randomly selected from several classes of hotel management major. One received the traditional teaching method, that is, teachers’ personal teaching was mainly supplemented by pictures. Another received information network teaching way, that is, teachers and students to make full use of the network and information technology platform, adopt systematic teaching, using electronic interactive whiteboard medium role, strengthen the communication between the teaching subject, to reduce the influence of time and place, to overcome the influence of unfavorable factors related, thus the maximum extent to ensure the authenticity of the data and reliability.

4 Discuss 4.1

Comparative Analysis of Experimental Data

Among many classes of hotel management, 68 students majoring in hotel management were randomly selected as class A and 85 students majoring in hotel management were randomly selected as class B. All the students in the two classes were surveyed by questionnaires. By issuing questionnaires, answering questionnaires, recovering questionnaires and summarizing the survey data and results, it was concluded that there was no significant difference in the questionnaire scores between the two classes (P > 0.06). The experimental data of the questionnaire results before class A and class B are shown in Table 1. Table 1. Statistical table of questionnaire scores of two classes of students Group n Before teaching Class A 68 3.06 ± 2.45 Class B 85 6.25 ± 2.72

College Hotel Management Teaching Mode

627

The measurement data were expressed as mean ± standard deviation (±p), and the comparison between the two samples was tested by x. The paired x test was used to compare the scores of the questionnaires of the same class and students before and after teaching. The experimental data showed that the score index of the questionnaire was significantly higher than that of class B before and after teaching (P < 0.01). The experimental data showed that the score index of the questionnaire did not improve significantly after class A was compared with before teaching, P < 0.01. The experimental data of the comparison of scoring indexes between class A and class B before and after teaching are shown in Table 2. Table 2. Difference of questionnaire scores between two classes before and after teaching Group

n

The difference between the scores of questionnaires before and after teaching Mean and standard deviation x P value Class A 68 9.68 ± 3.07 15.66 P < 0.01 Class B 85 5.51 ± 3.48 9.520 P < 0.01

After learning in different education and teaching modes for A period of time, the results of the questionnaire showed that although the scores of class A and class B showed A trend of improvement, the scores of class B improved more significantly. Obviously, the questionnaire scores of the two classes were statistically significant (t = 5.96 P < 0.01), indicating that the teaching effect of class B was better than that of class A. The experimental results show that it is an important way to improve the teaching methods of hotel management major and improve the teaching effect to innovate the course teaching of hotel management major by using network tools and computer technology. 4.2

Future Development Trend

Through the collection of literature and relevant teaching mode data, this paper conducted a comparative study on the classroom application and future development tendency of traditional teaching mode, informationized teaching mode and other teaching modes in the past five years, and obtained experimental data as shown in Fig. 1. Compared with the traditional teaching mode, the information-based network teaching mode has more advantages, so it is inevitable for hotel management major to adopt informationized teaching method. The characteristics of informationized teaching mode are as follows: first, relying on the network platform and abundant information resources, teachers can present personalized teaching characteristics and teach in accordance with their aptitude; The second is to use the interactivity of computer technology, through the bridge function of interactive electronic whiteboard, improve students’ enthusiasm in class and initiative creativity; In this informationized teaching mode, teachers become the organizers and instructors of classroom teaching and can help and promote students’ scientific thinking.

628

Y. Wang

8 7 6 5 4 3 2 1 0

Traditional teaching Information-based teaching Other teaching 2014

2015

2016

2017

2018

Fig. 1. Broken line chart of the application trend of the three teaching modes in the classroom

5 Conclusion Although the traditional teaching model has advantages, but also has many disadvantages, can not meet the needs of social and economic development, so the teaching model based on computer technology arises at the historic moment. In addition, the purpose of higher education in the new era is not to teach students professional knowledge and skills. Therefore, in the teaching of hotel management, we should continue to absorb the advantages of the traditional teaching mode, to ensure the authority of teachers, but also put forward higher requirements for the ability of teachers to control a variety of information technology, teachers need to adapt and make changes; And make full use of the interactive computer information technology, through the interactive electronic whiteboard media role, to provide students with a wider range of relaxed thinking environment and atmosphere, in order to improve the level of teaching, feeding students’ learning.

References 1. Xuemei, R.: Personalized educational mode in tourism and hotel management majors of vocational college: the perspective of innovative talent training. J. High. Educ. 83(325), 20– 21 (2017) 2. Brunato, M., Battiti, R.: Combining intelligent heuristics with simulators in hotel revenue management. Ann. Math. Artif. Intell. 64(3), 64–65 (2019) 3. Goh, E., Nguyen, S., Law, R.: Marketing private hotel management schools in Australia. Asia Pac. J. Mark. Logistics 29(2), 2–4 (2017) 4. Chan, I.C.C., Lam, L.W., Chow, C.W.: The effect of online reviews on hotel booking intention: the role of reader-reviewer similarity. Int. J. Hospitality Manage. 66(35), 54–65 (2017) 5. Wei, X., Qiong, G., Luo, Y.: The reform of computer experiment teaching based on O2O model. Comput. Appl. Eng. Educ. 432(32), 90–92 (2018)

College Hotel Management Teaching Mode

629

6. Laaser, K., Bolton, S.C.: A neglected pool of labour? Frontline service work and hotel recruitment in Glasgow. Eur. Manage. Rev. 46(23), 90–91 (2018) 7. Andreu, R., Claver, E., Quer, D.: Firm-specific factors and entry mode choice: an analysis of Chinese hotel chains. Tourism Econ. 23(4), 756–767 (2017) 8. Birinci, H., Berezina, K., Cobanoglu, C.: Comparing customer perceptions of hotel and peerto-peer accommodation advantages and disadvantages. Int. J. Contemp. Hospitality Manage. 30(3), 1003–1005 (2018) 9. Safavi, H.P., Karatepe, O.M.: High-performance work practices and hotel employee outcomes: The mediating role of career adaptability. Int. J. Contemp. Hospitality Manage. 29(12), 90–93 (2017) 10. Liu, H.H., Su, Y.S.: Effects of using task-driven classroom teaching on students’ learning attitudes and learning effectiveness in an information technology course. Sustainability 10(11), 3957 (2018)

Design of Calligraphy Online Course in Primary and Secondary Schools Based on K-Means Algorithm Ouyang Xuxia(&) School of Science and Technology, Jiangxi Normal University, Gongqing, Jiujiang, Jiangxi, China [email protected]

Abstract. This article focuses on how to use the descriptive data aggregation technology with K-Means algorithm to analyze the test scores in the process of analyzing the quality of teaching in elementary and middle schools based on the subject test. The data, in turn, provide a scientific basis for the effective evaluation of subject teaching quality. Keywords: Teaching quality analysis Descriptive data summary

 Data mining  Data preprocessing 

1 Introduction In order to comprehensively enhance the subject teaching and learning in primary and secondary schools, and effectively guide schools to carry out subject teaching activities, district (county) basic education management departments often need to conduct regional subject unified examinations, and perform statistical analysis of full sample data on test scores. Feedback information on the quality of subject teaching at different levels, and the effective monitoring and guidance of subject teaching in schools in the region [1, 2]. However, for the teaching quality analysis system, its upper-layer application characteristics should be reflected in the ability to provide comprehensive, accurate, and comprehensive evaluation and analysis reports for the district’s education management department in accordance with the subject teaching quality and students’ academic development level in the district. Furthermore, At the same time, it provides a scientific decision-making for the district education management department to effectively monitor the teaching quality of schools in the district. However, in order to get the above purpose, the education quality analysis and decision-making system must have the ability to analyze and present the overall data characteristics of the test results, and identify and remove noise data hidden in the test results. These functions are the concrete realization of the descriptive summary technology used in the data preprocessing process.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 630–635, 2021. https://doi.org/10.1007/978-3-030-51556-0_92

Design of Calligraphy Online Course

631

2 Data Mining Related Technologies 2.1

Data Mining Introduce

DM (Data Mining) is the process of search and acquiring new knowledge and information hidden from the normal, noisy, large-capacity real business data [3]. This process implements extraction, transformation, analysis, and modelling of the existing large amount of data residing in the database, and finally provides critical data that assists decision support for the actual business development. The process of data mining effectively realizes the further in-depth application of the original business data. Data mining is often referred to as another commonly used term: KDD (Knowledge Discovery in Databases) [4]. Generally, the knowledge discovery includes the following steps: data cleaning, data integration, data selection, data conversion, data mining, pattern estimate, and knowledge representation. 2.2

Data Preprocessing

Due to flaws in real business data, it is noisy and incomplete. If you are eager to implement data mining for such low-quality data, it will inevitably affect the final data mining results. However, data preprocessing can raise the quality of the record with advantage, so that the subsequent data mining process can improve performance and accuracy as much as possible. Data preprocessing provides an important basis for obtaining high-quality knowledge discovery. It can be seen that the important role of data preprocessing is reflected in that it lays the necessary foundation for raising the quantity and quality of real data and obtaining high-quality data mining results. Therefore, data preprocessing is an indispensable and important link in the process of knowledge discovery. 2.3

Descriptive Data Summary

A comprehensive understanding of the overall characteristics of the data is a necessary prerequisite for successful data preprocessing. So how can we accurately and effectively obtain the overall characteristics of the data and fully show the centralized and discrete trends of the data set? The answer to this question is: Descriptive data aggregation techniques must be used. Descriptive data summary technology is mainly based on a batch of descriptive statistical measures, performing calculation analysis on the data, identifying the inherent characteristics of the data, and exposing noise points or outliers hidden in the data. This batch of statistical measures consists of two types, one of which is a measure used to describe the trend in the dataset: median, mode, and mean. The other is a metric that describes the discrete trend of the data: standard deviation (r), quartiles, and interquartile range (IQR).

632

O. Xuxia

3 Summary Analysis of Descriptive Data for Test Scores 3.1

Measure the Centralized Trend Characteristics of Test Scores

In the descriptive data summary, there are three common methods for examining the trend of the measurement data set, which are distributed measures, algebraic measures, and holistic measures. Among them, distributed metric refers to dividing the data set into smaller data subsets, then calculating the metric value of each subset, and finally combining the calculation results to obtain the metric value of the entire data set. An algebraic metric is a metric calculated by an algebraic function that contains one or more distributed metrics. An overall metric is a metric calculated over the entire data set. a. Mean. The mean is the mean of a set of data values. It is the most effective and commonly used data measurement value for examining and measuring trends in a data set. In education quality analysis, we call it the average score, which means the arithmetic mean of the original scores of the exam: x ¼

n X

xi

i¼1

Among them, Xi represents the original test score of the i candidate, and n represents the total number of candidates who took the test. The average score is easy to calculate, easy to understand, and highly representative. However, the main problem of the average score is that it is more sensitive to extreme values, and is easily affected by extreme values, which causes it to lose its representativeness. b. Median. Of course, the median can also be calculated by dividing the data interval (or grouping). The specific calculation method is: divide the data set into several consecutive data intervals according to the specified group distance (that is, the data interval width) [5], And then determine the number of data in each interval (that is, interval frequency). For example, you can divide the original test score into intervals of 0 to 10, 10 to 20, 20 to 30, and so on, and then count the number of original test scores in each interval. We refer to the interval containing the median as the median interval, and the median can be get according to the Formula (1): Median ¼ L1 þ

N 2

P   ð freqÞ1 width freqmedian

ð1Þ

Among them, L1 is the lower limit of the P median in which the median is located, N is the number of data in the entire data set, ð freqÞ1 is the sum of the frequencies of all other intervals below the interval in which the median is located, freqmedian is the frequency of the interval in which the median is located, width is the width of the data interval. Of course, this calculation can only be an approximation of the number of bits in the data set. c. Trend analysis of exams using average scores, medians, and modes. When drawing the frequency distribution curve for the original scores of the test [4], if a

Design of Calligraphy Online Course

633

unimodal frequency curve with a moderate slope is obtained, then there are the following relationships between the three concentrated quantities of average score, median, and mode: mean  mode ¼ 3  ðmean  medianÞ

ð2Þ

From this, we can find that for examinations that can produce a moderately sloped single-peak frequency curve of the original score, the mode in the original score data set of the exam can be deduced from this relationship. For the normal distribution of the original single-peak frequency distribution curve (see Fig. 1), the average score mode and median, which are of course an idealized test result. It shows that, as far as the examination is concerned, the academic ability of the candidate group is mainly medium, and there are relatively excellent and relatively poor students, but they do not occupy the main body.

Fig. 1. Normal distribution

Fig. 2. Normal skew distribution

For the original single-peak frequency distribution curve with positive skewness distribution (see Fig. 2), mode < median < mean; this indicates that candidates whose scores are higher than the average score is less than 50%. If the average score at this time is low, it means that the academic ability of the candidate group is poor for this test (of course, this may also be caused by the difficulty of the test paper) [5]. For the original single-peak frequency distribution curve with a negative skewed distribution (see Fig. 3), mode > median > mean, which indicates that the candidates whose scores are higher than the average score exceed 50%. If the average score at this time is high, it means that the academic ability of the candidate group is high for this test (of course, this situation may also be caused by the difficulty of the test paper).

634

O. Xuxia

Fig. 3. Negative skew distribution

3.2

Measuring Discrete Trend Characteristics of Test Scores

Range (also known as full range) is the difference between the maximum and minimum values in a set of data. The range is represented by R: R ¼ maximum  minimum When doing statistical analysis of the test results, the extreme difference is the difference between the highest and lowest points in an exam. To some extent, the poor range reflects the largest gap in the academic level of the group of students participating in the exam. Although the range is simple and clear, its size is completely determined by the scores located at the two extremes. It cannot effectively analyze the difference between the other scores located between the two extremes. Therefore, if only the range is used to describe the overall discrete trend of the test scores, the effect must be very poor. It is like if the highest score of a test is a full score and the lowest score is 0, then there is no very bad measurement significance. However, we can still use the range to get a rough idea of the biggest difference in student performance on an exam.

4 Application Examples of Data Aggregation Technology In the analysis of education quality based on test scores in primary and secondary schools, we can use the five descriptive data measures of the median, two quartiles and the minimum and maximum of the original scores to summarize the concentration trend and dispersion degree of test scores. In data mining, this descriptive data aggregation technology is also called five number summary, and the box graph can intuitively show the data characteristics of five number generalization. The use of the average score to describe the trend of the data set, a good illustration of the overall positioning of the school’s student performance in the district; and the IQR formed by the two quartiles is used to describe the difference in the discrete trend of data It also clearly reflects the difference in the academic level of students in each school.

Design of Calligraphy Online Course

635

5 Conclusion These descriptive statistics are used to measure the average score, mode, and median of the central trend characteristic of the test score, and the range, standard deviation, and middle quartile range of the discrete trend characteristic of the test score. The application of primary school teaching quality analysis can help us effectively understand the overall characteristics and distribution of the original test score data. From the perspective of data mining, we should fully understand the computational significance of these descriptive statistics and use them reasonably to form scientific and accurate analysis results and mine the knowledge information behind the test results. In this way, it can provide effective decision-making basis for the education management department to monitor the quality of school education in the area, carry out curriculum teaching guidance. Acknowledgements. A Study on the Current Situation and Countermeasures of Calligraphy Education in Primary and Middle Schools in Jiangxi Province YS1404 2014.

References 1. Xinping, L., Cunxia, L.: Introduction to Education Statistics and Evaluation. Science Press, Beijing (2003) 2. Xinyong, L.: Statistical Analysis and Interpretation of Test Data. East China Normal University, Shanghai (2007) 3. Siqing, Y.: Application of data mining technology to improve teaching quality. Heilongjiang Sci. Technol. Inf. (4) (2007) 4. Yi, H., Xinqiang, M. Tong, W., Zuoqi, T., Ying, Z.: Design of student performance analysis model based on data warehouse. Inf. Technol. (2), 18–23 (2007) 5. Lin, L., Yuming, X., Jun, S.: Application of data mining in teaching quality analysis. J. Hengyang Normal Univ. 30(3), 86–88 (2009)

Factors Restricting the Quality of Equipment Support Ou Qi1(&), Xiaoyan Gao1, Lei Zhang2, and Wenhua Shi3 1

2

Army Academy of Amored Forces, Changchun, China [email protected] Changchun Military Representative Office of Shenyang Military Representative Bureau of Ground Force, Changchun, China 3 The Army of 95795, Guilin, China

Abstract. Equipment support is an important means to develop equipment performance, and the quality of support is directly related to the generation of combat effectiveness. In this paper, based on the in-depth analysis of the factors affecting the effectiveness of equipment support, rough set theory is introduced to study, which effectively solves the problems of incompleteness and instability, and provides a new research idea for the research of equipment support. Keywords: Equipment support

 Combat effectiveness  Quality

1 Introduction With the upgrading of weapons and equipment, more and more support elements are needed. Under the constraints of time and funds, how to properly handle the relationship between support elements is one of the main problems faced by our army in the transformation of equipment support [1, 2]. In 1995, Yu Yongli et al. [3] analyzed the elements of equipment support in the research of automatic command of equipment support, and pointed out that the research on the relationship between the elements of equipment support is of great significance to the construction of military forces. Ma Yulin et al. [4] studied the relationship of equipment support elements in complex electromagnetic environment, but some elements closely related to the support effect were not included in the research system, which was not comprehensive. Zhou Fujiang et al. [5] studied the relationship between equipment support elements in the process of studying the deployment plan of support forces. The tools they used were information entropy and TOPSIS theory, which effectively solved the incompleteness of the research, but could not describe the inconsistent problem [6, 7]. There was instability in dealing with complex support problems.

2 Fundamental Theory Rough set theory was born in the 1980s. It is a kind of qualitative and quantitative analysis mathematical theory that can get relatively accurate conclusions by using imprecise data under the condition of incomplete information and knowledge [8], © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 636–640, 2021. https://doi.org/10.1007/978-3-030-51556-0_93

Factors Restricting the Quality of Equipment Support

637

which is suitable for dealing with conceptual problems that cannot be accurately described by digital quantity [9]. The data analyzed and processed by rough set theory is generally composed of several tuples with multi-dimensional attributes, which can be described by the following mathematical formula: S ¼ \U; Q; D [

ð1Þ

Where: S is a group of equivalence relations on the domain u U is a finite set of non empty individuals Q is the conditional attribute of the element in the domain D is the decision attribute of the elements in the domain

3 Model Construction Select front support, group point support, remote support, active support, multiattribute cluster support, task-driven support, performance-based support, objectoriented support, autonomous support, focus support, IETM based support, accurate support, ontology based support, entropy based control support, data warehouse based support, availability based support. There are 20 common support strategies, such as center support, predictive access control based support, perception and response support, civil military integration support, and contractor support. Select 10 senior engineers and professors who have long-term work in the front line of teaching and scientific research and profound insights on equipment support to form an expert group to score the performance of support strategy [10]. After data preprocessing [11] and removing redundancy, the relationship between support condition attributes and decision attributes is obtained. In the eight elements of equipment support culture, support theory, support equipment, support equipment, support equipment, support training, support education and support establishment, the first five factors are highly cohesive, which are relatively isolated from the last three factors, and they affect the support effectiveness indirectly, collectively referred to as indirect influencing factors; the last three factors directly affect the equipment support effect and unify it. It is called direct influence factor. The indiscernibility of attributes is an important concept in the rough set theory, which is equivalent to the equivalent class in the domain of theory. It is caused by uncertainty. In rough set, the equivalence class of condition attribute is called atomic equivalence class, which is represented by capital letter A, the equivalence class of decision attribute is called knowledge equivalence class, which is represented by capital letter C. Rup ðCÞ ¼ [ fY 2 U=R; Y \ C 6¼ ;g

ð2Þ

Rdown ðCÞ ¼ [ fY 2 U=R; Y  Cg

ð3Þ

638

O. Qi et al.

In the formula, C is the set of knowledge equivalent classes, u is the domain, Y represents the elements in the domain, Rup (C) and Rdown (C) are the upper and lower approximations of C respectively. The upper approximation refers to the set of elements that may output C in all the atomic equivalence classes under the condition of given knowledge equivalence class C; the lower approximation refers to the set of elements that must output C in all the atomic equivalence classes under the condition of given knowledge equivalence class C. Between the upper approximation and the lower approximation, there is such a region. The output of elements in this region is uncertain. It is recorded as the boundary region BNR, which can be expressed as BNR ðCÞ ¼ Rup ðCÞ  Rdown ðCÞ

ð4Þ

In a domain, if the set of boundary regions is empty, all elements in the domain can determine their position in the knowledge equivalent class through certain mapping relations, which belong to deterministic relations, and such sets are called clear sets. By substituting the data of atomic equivalence class and knowledge equivalence class into (2)–(4), the following results are obtained: Rup ðC1 Þ ¼ fx4 ; x7 ; x9 ; x10 ; x12 ; x14 ; x15 ; x18 ; x19 ; x20 g

ð5Þ

Obviously, the set C1 of knowledge equivalence in the domain belongs to rough set.

4 Analysis of Guarantee Elements In the condition of the existence of the support theory, eliminating the factors of the support culture does not affect the classification of the support effect, which shows that the existence of the support theory makes the impact of the support culture negligible. In the equipment support work aimed at improving the support effect, the goal equivalent to the goal of the constraint support culture meeting the requirements can be achieved through the constraint support theory meeting the requirements. It can also be seen from Table 1 that for all the guarantee strategies whose guarantee effects meet the requirements, the guarantee theory must meet the requirements, which means that the guarantee theory meets the requirements is the necessary condition for the guarantee effect to meet the requirements, and the relationship between the guarantee theory and the guarantee effect belongs to the deterministic relationship, which is not within the scope of rough set theory processing. 1) Delete the guarantee culture from the elements, and achieve the purpose of the guarantee culture meeting the requirements through the guarantee theory meeting the requirements. 2) remove the elements of guarantee theory that have definite relationship with guarantee effect from rough set. Through processing, we can get the relationship among support equipment, support equipment, support equipment and support effect.

Factors Restricting the Quality of Equipment Support

639

Similarly, the atomic equivalent classes are: By comparing the data between the upper approximation, the lower approximation and the border area, it can be seen that deleting the support culture and the support theory does not change the size of the border area and the nature of the rough set. Through the above processing, the relationship between the support equipment, the support equipment, the support establishment and the support effect is equivalent to. In order to better analyze the relationship among support equipment, support equipment, support establishment and support effect, the data in are classified and statistically obtained. No requirement is indicated by “-”; number of strategies is the total number of support strategies in the domain; “number of good strategies” is the number of support strategies that meet the requirements in the domain; “proportion” is the ratio of “number of good strategies” to “number of strategies”. By analyzing the data, the following conclusions can be drawn: 1) Among the three elements of support equipment, support equipment and support equipment, one element meets the requirements, and the other elements cannot meet the requirements. There is no included and included relationship between support equipment, support equipment and support equipment; 2) If any two of the three elements of support equipment, support equipment and support equipment meet the requirements, the support effect under this condition can be ensured to meet the requirements.

5 Conclusion One of the three elements of security training, security education and security establishment meets the requirements, while the other elements cannot meet the requirements. There is no relationship between inclusion and inclusion between security training, security education and security establishment. Under the condition that the training, education and establishment are not all scientific, the effect of the establishment can also be guaranteed, and there is redundancy among the three elements of training, education and establishment. With the change of support elements according to “at least 1 non-conforming”, “at least 1 conforming”, “at least 2 conforming” and “3 all conforming”, the ratio of “good” strategy number to “strategy number” keeps increasing, and there is a strong correlation between support training, support education, support establishment and support effect, which is an important factor affecting the support effect.

References 1. Bousdekis, A., Magoutas, B., Apostolou, D., Mentzas, G.: Review, analysis and synthesis of prognostic-based decision support methods for condition based maintenance. J. Intell. Manuf. 29(6), 1303–1316 (2018)

640

O. Qi et al.

2. Outaki, M., Kerak, E.: Evaluation of implementation of good quality management practices related to the support processes in the laboratories of Moroccan faculties of sciences and techniques. Accredit. Qual. Assur. 23(5), 257–267 (2018) 3. Wang, H., Meng, F.: Research on power equipment recognition method based on image processing. EURASIP J. Image Video Process. 2019(1), 57 (2019) 4. Tamargazin, A.A., Variyukhno, V.V., Dovgal, A.G., Yu Sidorenko, A.: Wear of composition coatings containing SiC–Al2O3 for piston skirt of internal combustion engines of aircraft ground support equipment. J. Frict. Wear 40(4), 303–308 (2019) 5. Mulenga, P., Lutumba, P., Coppieters, Y., Mpanya, A., Mwamba-Miaka, E., Luboya, O., et al.: Passive screening and diagnosis of sleeping sickness with new tools in primary health services: An operational research. Infect. Dis. Ther. 8(3), 353–367 (2019) 6. McIsaac, J.L.D., Penney, T.L., Mâsse, L., Kirk, S.F.: The association between perceived adequacy and capacity for school food policy implementation with food availability and policy adherence in Nova Scotia, Canada. Int. J. Environ. Res. Public Health 16(11), 1974 (2019) 7. Dolan, M.J., Bolton, M.J., Henderson, G.I.: Comparison of seating, powered characteristics and functions and costs of electrically powered wheelchairs in a general population of users. Disabil. Rehabil. Assist. Technol. 14(1), 56–61 (2019) 8. Raphael, B.P., Jorina, M., Gallotto, M., Grullon, G., Dalton, M., Takvorian‐Bené, M., et al.: Innovative discharge process for families with pediatric short bowel syndrome: A prospective nonrandomized trial. JPEN. J. Parenter. Enter. Nutr. 42(8), 1295–1303 (2018) 9. Feussner, H., Krieger, Y., Wilhelm, D., Brunner, S., Ostler, D., Meining, A., et al.: Mechatronic support system for NOTES and monoport surgery—A new approach. Surg. Technol. Int. 34 (2019) 10. Kasper, K.J., Manoharan, I., Hallam, B., Coleman, C.E., Koivu, S.L., Weir, M.A., et al.: A controlled-release oral opioid supports S. aureus survival in injection drug preparation equipment and may increase bacteremia and endocarditis risk. PloS One 14(8) (2019) 11. Kasper, K.J., Manoharan, I., Hallam, B., Coleman, C.E., Koivu, S.L., Weir, M.A., et al.: Correction: A controlled-release oral opioid supports S. aureus survival in injection drug preparation equipment and may increase bacteremia and endocarditis risk. PloS One 14(9) (2019)

Present Situation, Problems and Countermeasures of China’s Information Industry Qiang Ping(&) Shanghai University, Shanghai, China [email protected]

Abstract. Through the study of the present situation of the development of China’s information industry, this paper finds the problems existing in China’s information industry. For instance, the foundation of informatization is weak, the competitiveness of the information industry is not strong and the pace of informatization in traditional industries is slow. Then this paper predicts the future development trend of China’s information industry, as informatization has become the first choice of national development strategy, information industrialization is closely integrated with the global economy. Last but not least, this paper tries to give countermeasures and suggestions for the future development of China’s information industry, for example, strengthen the construction of social information environment, vigorously develop information technology as well as optimizing industrial structure. Keywords: Information industry Countermeasures and suggestions

 Development status  Existing problems 

1 Introduction The information industry is a comprehensive industry in China’s social and economic development. It is based on information resources, supported by information technology, and provides information support through information equipment manufacturing and information services. The development of information industry is an important means to transform traditional industries and promote industrial upgrading [1–3]. The combination of the information industry and the traditional industry can fully stimulate the potential of traditional industries and promote the benign transformation of the industry, thereby improving the economic efficiency of the traditional industry and optimizing the industrial structure. Therefore, at this stage, the information industry can also be combined with fields such as meteorology, agriculture, and media to gradually optimize various fields with its unique and efficient role. At present, the information industry has become a pillar industry of China’s national economy, with an average annual growth rate of output value exceeding 25%. And with the continuous development of computer network, the development situation of information investment products represented by communication products is © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 641–645, 2021. https://doi.org/10.1007/978-3-030-51556-0_94

642

Q. Ping

becoming more and more perfect. Investment electronic products have also optimized the information industry chain to a large extent, so that the information industry structure has been continuously optimized and the overall quality has been significantly improved [4–6]. However, China’s information industry is not perfect. There are many problems in industrial development, including unbalanced development of regions and industrial categories, small scale of industrial economy, lack of talents, weak competitiveness compared with other countries and regions, obstacles in the introduction of industrial technology, and weak national awareness of information industry. 1.1

The Foundation of Informatization Is Weak

Microelectronic technology and integrated circuits are the foundation of the information industry. however, the independent development ability of integrated circuits in China is still relatively weak, which is far from achieving the requirements of market development. In addition, some core integrated circuits, such as computer chips, still rely on the technology of developed countries. China’s information foundation and information industry development capability still lags far behind the western developed countries. 1.2

The Competitiveness of the Information Industry Is not Strong

The development of China’s information industry pays more attention to infrastructure construction and light resource development, and the investment in computer chips and databases which are more difficult is relatively small. The structure of China’s information industry is in a reform process of decentralized development and self-help development, and the information industry is relatively backward [7–9]. 1.3

The Pace of Informatization in Traditional Industries Is Slow

Under the influence of economic benefits and traditional ideas, many traditional industries are still in the initial stage of informatization, informatization cannot be fully integrated into the traditional industries, the level of information service is low, and the awareness of informatization is relatively backward.

2 Forecasts of the Future Development Trend of China’s Information Industry 2.1

Informatization Has Become the First Choice of National Development Strategy

The information industry plays a major role in the economic, political, cultural, and military aspects of countries around the world, and has promoted the economic development and social progress of countries around the globe.

Present Situation, Problems and Countermeasures

643

In order to enhance their own strength and consolidate their position in the whole world, countries around the world continue to invest human, material and financial resources to develop their own information industry, and informatization has become the preferred strategy for the development of countries all over the world. Since the 1990s, China has been increasing the construction of the information industry. In 2006, China proposed the national informatization development strategy from 2006 to 2020, which clarified the development direction of China’s information industry, enhanced the status of the information industry in China’s national development, and became the first choice for China’s development strategy. 2.2

Information Industrialization Is Closely Integrated with the Global Economy

As the global economy continues to deepen, the links between the information industries of various countries in the whole world are getting closer and closer. On account of the early start of western developed countries in the field of information, the technology is relatively mature, and the industrial structure is relatively perfect. A diversified and highly related information industry chain has been formed. under the background of the continuous development of the global economy, information technology will deepen exchanges in various countries. The development of the information industry tends to share information technology in global markets. Under this circumstance, China’s information industry should also achieve common progress with other countries in the world, and promote the development of China’s information industry.

3 Countermeasures and Suggestions for the Development of China’s Information Industry 3.1

Strengthen the Construction of Social Information Environment

Informatization not only stays at the production level of enterprises, but also should be linked with the construction of various industries in China, such as logistics industry, manufacturing industry, service industry, education industry. Even aerospace industry, military industry, foreign trade industry. Infiltrate information into all fields and links, and do a good job in monitoring [10, 11]. In order to develop China’s information industry in an all-round way, we must coordinate the economic development capacity of the central and western regions, encourage more enterprises to run through the production of information technology, and maximize the advantages of the information industry. Promote the transformation of social production to automation and intelligence. Promote the optimization and reform of social informatization, make Chinese enterprises stand at the top of the economic chain, and promote the sustainable development of social information industry.

644

3.2

Q. Ping

Vigorously Develop Information Technology

For quite a period of time, owing to the lack of the support of new information technology, China lags far behind the average level of world economic development. There are still many deficiencies in China’s information industry. For one thing, we should focus on the implementation of the enterprise innovation tax policy issued by the higher authorities. For another, we should strengthen the certification of technology patents and try our best to provide excellent knowledge atmosphere for enterprise innovation. For quite a long time in the future, enterprises will provide major driving power for the innovation and creation of China’s information industry. Giving play to the dominant position of the enterprise is the objective demand of the market economy, and it is also the best way to change market hotspots and generate new industries. In addition, the government should set up demonstration parks for major information innovation projects throughout the country, focus on scientific and technological research and development, speed up the speed of tackling key problems of important and difficult technologies and develop application projects of new technologies, and promote the application and research of new information technology. Set up innovative models and encourage more people and units to participate in information innovation. Update field standards in a timely manner to create a good atmosphere. At the same time, relevant departments should enhance information security capabilities. 3.3

Optimize Industrial Structure

Software and hardware are two decisive factors in the information industry. Coordinating the proportion of software and hardware development will help speed up the optimization of China’s information industry. With the continuous adjustment of the industrial structure, simple hardware or software production has gradually degraded. In order to increase the vitality of information products, it is necessary to formulate a new development strategy. China should objectively analyze the information environment and reasonably locate the development level and international status of the domestic information industry. China is in an important period of industrial transformation and upgrading. With the state’s support for the information industry increasing, the majority of information enterprises should seize good development opportunities and actively use both domestic and international markets to promote their own production transformation.

References 1. Hongxia, S.: Langfang Normal University, Langfang, Hebei 065000, China. Study on the Training of the Core Competitiveness of the Electronics Information Industry Based on the Electronics Processing Technologies. Information Engineering Research Institute, USA. Lecture Notes in Information Technology—Proceedings of 2012 International Conference on Education Technology and Management Engineering (ETME 2012). Information Engineering Research Institute, USA: Information Engineering Research Institute, 70–74 (2012)

Present Situation, Problems and Countermeasures

645

2. Yanbing, C.: Empirical study on the relationship between economic growth and information industry in China—Based on the 18 provincial panel data from the eastern, central and western areas. Information Engineering Research Institute, USA. Proceedings of 2012 International Conference on Advanced in Information and Financial Engineering (AIFE 2012). Information Engineering Research Institute,USA: Information Engineering Research Institute, 30–35 (2012) 3. Xianlong, Z.: Research on the capability Assessment of Information Industry Mobilization Based on Linguistic Variables. J. Simul. 1(6). ACADEMIC PUBLISHING HOUSE, 7–10 (2012) 4. Liu, Y.: Research on the relationship between the regional information industry development and the quality of economic growth in China. Advanced Science and Industry Research Center. Proceedings of the International Conference on Multimedia, Communication and Computing Application (MCCA 2014). Advanced Science and Industry Research Center: Science and Engineering Research Center, 445–452 (2014) 5. Zhao, G.M.: The Research on the Relationship Between R&D Investment and the Performance of Electronic Information Industry Listing Corporation. Science and Engineering Research Center. Proceedings of 2015 International Conference on Advanced Educational Technology and Information Engineering (AETIE 2015). Science and Engineering Research Center: Science and Engineering Research Center, 840–844 (2015) 6. Yu-qiong, L.: Empirical Study on Dynamic Factors of Information Industry Collaborative Innovation. Science and Engineering Research Center. Proceedings of 2016 International Conference on Informatics, Management Engineering and Industrial Application (IMEIA 2016). Science and Engineering Research Center: Science and Engineering Research Center, 42–47 (2014) 7. Ni, X.: The Study on Beijing Electronic and Information Industry Upgrading Under the Condition of Global Value Chain. AEIC Academic Exchange Information Centre. Proceedings of 2017 3rd International Conference on Humanities and Social Science Research (ICHSSR 2017) (Advances in Social Science, Education and Humanities Research Vol. 121). AEIC Academic Exchange Information Centre: International Conference on Humanities and Social Science Research, 560–563 (2017) 8. Yue, L.: Study on operating performance of listed companies in electronic information industry. Procedia Environ. Sci. 10(Pt A) (2011) 9. Fei, P., Qiqi, Z., Zenglin, H., Yan, D., Ningning, F.: Evolution Characteristics of Government-Industry-University Cooperative Innovation Network of Electronic Information Industry in Liaoning Province, China. Chin. Geogr. Sci. 29(3) (2014) 10. Wang, X., Xin, Z.: From the industry convergence perspective, to deep dive China’s opportunities of finance information industry development. E-Business and E-Government (ICEE) (2011). International Conference on (2011) 11. Hou, R., Fu, C., Wan, J.: A study on the engineering dynamic mechanism and patterns of the information industry development. Syst. Eng. Procedia 5 (2012)

Application of Information Technology in the Teaching of Art Design Courses Qunying Li(&) Department of Textile and Clothing Engineering, Shandong Vocational College of Light Industry, Zibo 255300, Shandong, China [email protected]

Abstract. Traditional teaching can no longer meet the teaching needs of visual communication design. In the context of informatization, people’s life style has undergone great changes, the design industry is diversified, and the learning style of design major is in urgent need of reform. The background of informatization provides various emerging teaching methods, such as micro course and MOOC, and the background informatization expands the professional direction of the studio. Information technology, as a new technological means emerging in the network era, can not only effectively improve the teaching efficiency and quality, but also effectively stimulate students’ interest in class, make students become the subject of classroom teaching, and help to cultivate students’ subjective initiative in learning. This paper discusses the changes of teaching methods of art design courses under the background of informatization and the teaching advantages of information technology in the teaching of art design courses. Keywords: Information technology Application

 Art design  Course teaching 

1 Introduction Informatization represents an ideal state in which information technology is highly applied and information resources are highly shared, so that human intelligence potential and social material resource potential can be fully exerted, and individual behavior, organizational decision and social operation tend to be rationalized. Information technology is a general term for various technologies used to manage and process information [1–3]. Information technology has changed the way of life and communication of adults. The definition, scope and way of design are changing. At the same time, it also provides a technical and practical platform for art design education. The integration of art design and information mode will inevitably bring beneficial exploration for art design teaching [4–6]. In the teaching process of art design major, it is difficult for students to fully master the required professional knowledge and skills comprehensively in the classroom, and often they can basically master them only through after-school tutoring. However, due to the limited time of teachers and the individualized problems of students, it is very © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 646–650, 2021. https://doi.org/10.1007/978-3-030-51556-0_95

Application of Information Technology in the Teaching

647

difficult to guide them one by one. By means of the information-based network platform, teachers can systematically upload teaching resources to the network courses, and students can not only study at any time and anywhere, but also interact with teachers in real time. Nowadays, students live in an age of information explosion, and their lives are full of countless new and interesting information. If the classroom teaching is still in the form of teachers as the main speaker and students’ passive listening, it is difficult to catch the attention of students. How to effectively use the advanced information technology and skillfully combine with teaching activities is a problem that needs systematic research [7–10].

2 Application Value of Information Technology 2.1

Stimulating Students’ Interest and Improving Their Learning Initiative

The traditional classroom teaching process is teacher centered. Teachers are the subject of the classroom, students passively accept knowledge points, and the training of design thinking is limited. The role of classroom teaching is very limited. For many students, they are more willing to accept online teaching. The information-based teaching process makes the former “didactic” teaching change to the students’ active learning, and creates a teaching environment of combination of dynamic and static teaching, which can effectively promote the enthusiasm of students’ learning, stimulate students’ interest in class, and help students learn and understand relevant knowledge more comprehensively and systematically. Choosing appropriate teaching resources according to students’ own mastery of knowledge can not only help students to timely check for omissions and make up for deficiencies, which is conducive to cultivating students’ awareness of independent learning, but also broaden student’s vision, expand their knowledge system, and improve students’ learning efficiency and effect. 2.2

Highlighting Ability Training and Optimizing Teaching Effect

The smart classroom and digital teaching platform are switched and integrated, which strengthens the integration of production and learning between projects and majors. In the teaching, students are the subject, and the cultivation of their comprehensive ability is highlighted, realizing the teaching strategy of “learning by doing, and doing by learning” and the all-round positive interaction between teachers and students and between students. Through practice, students can quickly master knowledge and skills, realize diversified evaluation, and get high recognition from customers. Taking teachers as the leading role, fully maximizing the information-based teaching means of classroom teaching, and constructing online and offline participatory teaching mode can fully stimulate students’ enthusiasm for participation, extend the time and space for students to study, and improve teaching efficiency. The content of online education is better under the screening and elimination of technical means, and the continuous updating of the Internet keeps the activity of

648

Q. Li

high-quality content, which is no longer the traditional “empiricism” leading teaching. As the exporter of educational content, teachers can guarantee the high quality of the output content by means of information technology. At the same time, information technology reduces the pressure and estrangement between students and teachers, and provides equal communication platform for teachers and students. Students in online classroom are more interactive, and can more boldly ask questions and discuss. Teachers can understand students more comprehensively, master students’ learning trends in time, and collect information to find a personalized development plan that is truly suitable for each student, so as to lay a foundation for the follow-up optimization of teaching.

3 The Application of Information Technology in Art Design Teaching 3.1

Construction of Curriculum Resource Sharing Platform

In order to take full advantage of information technology in the teaching of art design course, schools should construct a network resource sharing platform according to the actual teaching, and use the advantages of Internet resource sharing to realize the sharing of learning resources. The teaching resource sharing platform of art design courses arranges and develops the academic resources in the related fields of art design courses, and constructs the digital education resource sharing database of MOOC and micro courses of art design courses, which provides the latest and most comprehensive excellent results for teachers and students. As the technical information of art design is increasingly updated, efforts should be made to integrate and digitize professional information and course resources, so as to provide students with the best quality online education services, fully meet the demand of digital teaching, and make the teaching platform play a real role in assisting and even improving the teaching of art design courses. 3.2

Promoting the Informatization of Classroom Teaching

Nowadays, the classroom teaching reform is deepening, so the application of information-based teaching methods in art design class will continue to be strengthened. Schools should upgrade the software and hardware facilities, build more intelligent classrooms, integrated classrooms and information-based training bases, and greatly improve the speed of the campus network, thus providing the most basic support and guarantee for the information-based classroom teaching reform. In the flipped classroom, students become the center of the learning process. Mobile phone check-in, game, answer, discussion, brainstorming, video projection and the opening of the bullet screen enable students to construct knowledge by completing real tasks in actual participation activities. This kind of classroom reform has completely changed the original teaching mode. What is needed is that teachers have a sense of foresight. Teachers should guide students to use mobile phones reasonably in class, fully utilize information technology to enhance classroom interaction, connect industry experts

Application of Information Technology in the Teaching

649

remotely, and introduce market projects. Teachers, as the guide of learning, should teach students in accordance with their aptitude and fully improve the efficiency of classroom teaching. 3.3

The Integration of Information Technology in Curriculum Design

A good teaching design should make both “teaching” and “learning” have clear objectives and measures to achieve the objectives in the teaching process, including textbook analysis, learning situation analysis, the use of appropriate teaching strategies, the implementation of effective classroom teaching and curriculum evaluation, etc. The curriculum teaching design should be paid attention to to make students recognize and like teachers’ teaching. The measure is the appropriate integration of curriculum design and information technology. 3.4

Improving the Mechanism of Teaching Evaluation and Student Assessment

The traditional teaching of art design course is to obtain teachers’ unilateral evaluation through students’ works, combine information technology and improve teaching management level. Schools should establish and improve the student evaluation mechanism, divide the evaluation into online and offline parts, and improve the attention of art design students and teachers to the evaluation. The teaching evaluation mainly includes the comprehensive evaluation of teaching quality, teaching effect, student achievement and attendance results. In the aspect of student evaluation, the traditional single evaluation mechanism is expanded to multiple evaluation, including teacher evaluation, student mutual evaluation, expert evaluation and customer evaluation. Anonymous scoring mechanism is adopted to increase the students’ mutual evaluation and teachers’ mutual evaluation.

4 Conclusions Under the impact of the economic market in the Internet era, schools should build a proper teaching mode to better cultivate talents who can adapt to the social and economic development and scientific and technological change. The teaching mode combining information technology with art design studio can not only effectively utilize the economic resources and media of the Internet, but also provide a project source for the development of design practice, and also a useful exploration for cultivating students’ flexible employment. Acknowledgements. This research was supported by the 2018 Zibo City School Integration Development Plan: Public Training Base for Textile and Garment Specialty, School project 2017JY10, School project 2018JYZ03 and School project 2019RW02.

650

Q. Li

References 1. Tang, Y.P.: Research on the reform of informatization teaching method of art design major. Guide Sci. Educ. 11, 50–51 (2018). (in Chinese) 2. Huang, W.J.: Systematic innovation thinking of art design teaching in the internet background. Off. Oper. 23, 171 (2018). (in Chinese) 3. Yao, G.: Thoughts on art design education in the information age. Art Panorama 9, 144–145 (2018). (in Chinese) 4. Xu, M.X.: Exploration on the construction of information technology courses for art design majors. Des. Res. 6, 31–34+49 (2019). (in Chinese) 5. Liu, X.X.: Research on the teaching reform strategy of environmental art design in the information age. Art Sci. Technol. 11, 214 (2019). (in Chinese) 6. Wang, X.Y.: A probe into the diversification of art design education and teaching in chinese college art education in the multimedia era. Satell. TV & IP Multimedia 13, 91–92 (2019). (in Chinese) 7. Sun, Q.: Research on teaching mode of art design major based on micro-information platform. J. Hunan Post Telecommun. Coll. 2, 88–91 (2019). (in Chinese) 8. Sun, Y.: Discussion on teaching reform of environmental art design in the information age. Econ. Outlook Bohai Sea 6, 182 (2019). (in Chinese) 9. Chen, L., Zhou, S.: Analysis of the teaching of art design major in colleges and universities under the background of “Internet +”. W. China Qual. Educ. 8, 181–182 (2019). (in Chinese) 10. Zhou, Y.C.: Research on environmental art design teaching based on information age. Constr. Mater. & Decor. 3, 139–140 (2019). (in Chinese)

Sentiment Analysis of Painting Based on Deep Learning Yu Lin(&) Guangdong University of Technology, Guangzhou 510030, Guangdong, China [email protected]

Abstract. Painting creation is a kind of existence way of human spiritual selfquestion, and it is also a kind of performance art full of spirituality. In the process of painting creation, creators often reveal their inner emotions through different creative objects, semantic information and different color combinations. At the same time, the appreciator of the painting creation can also generate different emotional reactions according to the visual stimuli received. In view of this, this paper designs a method of painting sentiment analysis based on deep learning. The method extracts the features of the painting through the corresponding fine-tuning of the pre-trained convolutional neural network model. These features mainly include the color, brightness, saturation and horizontal and vertical features of the painting. Then, based on these extracted features, the corresponding categories of emotions expressed by the paintings are classified. Through the experimental results and visual analysis, the performance of the proposed method in the open source dataset has improved by 3.4%, and the model performance is also excellent in the emotional classification of ordinary paintings. Keywords: Painting creation Convolutional neural network

 Sentiment analysis  Deep learning 

1 Introduction In recent years, as the core of deep learning, convolutional neural network has aroused the research interest of experts and scholars at home and abroad. It has been gradually applied in various fields such as image, voice, video and text, and brought innovative solutions to many difficult problems [1, 2]. As a hot topic in the field of deep learning, the core idea of emotion analysis is to enable the computer to understand the emotional characteristics to be expressed by the research object through “observation” just like people. At present, it is mainly focused on the emotional analysis of text data, but there is not much work on emotional analysis of images. The understanding of image emotion is a complicated problem, which not only involves the structure, theme, color and brightness of the image itself, but also cannot be separated from the assistance of knowledge in psychology, art, computer vision, artificial intelligence and other related fields. As the spiritual pursuit of human beings, art often influences viewers’ emotional experience of paintings with rich emotions and different painting techniques. Therefore, image emotion analysis plays an increasingly important role in the current research [3]. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 651–655, 2021. https://doi.org/10.1007/978-3-030-51556-0_96

652

Y. Lin

2 Deep Convolutional Neural Network It has made many breakthroughs in the field of image analysis and processing. It is based on convolution on the standard image annotation set ImageNet commonly used in academia. Neural networks have achieved many achievements, including image feature extraction classification, scene recognition and so on [4]. The convolutional neural network can directly input the original image for a series of work. It has been widely used in various image related applications. From the introduction of the convolutional neural network to the current wide application, it has gone through the theoretical germination stage, the experimental development stage, and the large-scale application and in-depth research stage. 1. Theoretical stage In 1980, Japanese scholar Fukushima proposed a neurocognitive machine based on the concept of receptive field. The neurocognitive machine is a self-organizing multilayer neural network model. The response of each layer is excited by the local receptive field of the upper layer. The recognition of the pattern is not affected by position, small shape change and scale [5]. The neurocognitive machine can be understood as the first version of the convolutional neural network. The core point is to model the visual system and not be affected by the position and size of the vision [6]. 2. Experimental development stage In 1998, computer scientist Yann LeCun and others proposed LeNet5 to use the gradient-based back propagation algorithm to supervise the network [7]. Yann LeCun has made outstanding contributions in machine learning and computer vision, and he is known as the father of convolutional neural networks [8]. The LeNet5 network gradually converts the original image into a series of feature maps through alternately connected convolutional layers and down sampling layers, and passes these features to the fully connected neural network to classify the images according to their characteristics [9]. The receptive field is the core of the convolutional neural network, and the convolution kernel of the convolutional neural network is the structural representation of the receptive concept. The academic community’s attention to convolutional neural networks began with the introduction of the LeNet5 network and is successfully applied to handwriting recognition [10]. At the same time, the research of convolutional neural networks in the fields of speech recognition, object detection, face recognition and other applications has gradually begun. 3. Large-scale application and in-depth research After the LeNet5 network, the convolutional neural network has been in the experimental development stage. It was not until the introduction of the AlexNet network in 2012 that the position of convolutional neural networks in deep learning applications was established. The convolutional neural network AlexNet proposed by Krizhevsky et al. These networks have made the convolutional neural network gradually begin to commercialize, almost as long as where there is an image, there will be a convolutional neural network.

Sentiment Analysis of Painting Based on Deep Learning

653

From the current development trend, the convolutional neural network will continue to develop, and will generate convolutional neural networks suitable for various application scenarios, such as 3D convolutional neural networks for video understanding. It is worth noting that convolutional neural networks are not only applied to image-related networks, but also to image-like networks, such as analyzing chessboard in go.

3 Sentiment Analysis of Painting Based on VGG16 3.1

VGG16 Network

When this model is proposed, it immediately became the most popular convolutional neural network model due to its simplicity and practicability. It performs well in image classification and object detection. In the ILSVRC 2014, VGG scored 92.3% accuracy in top-5. Figure 1 shows the structure diagram of VGG.

Fig. 1. Structure diagram of VGG convolutional neural network

Its input dimension is 224*224*3, and the specific network structure is shown in Fig. 2. 3.2

Application of VGG16 in Emotional Analysis of Painting

In this paper, the strategy adopted is to fine-tune the existing pre-trained VGG16 network. Because fine tuning is a very effective transfer learning method, no need to start training again, and in general can be quickly convergence. However, in general, when the fine-tuning model initializes weights and offsets, the last layer that is replaced due to different visual tasks is removed, and the parameters of other layers need to be preserved. As a result, the convolutional neural network may bring the learned part of

654

Y. Lin

Fig. 2. Structure diagram of VGG16

the experience unrelated to this task into it, and eventually interfere with the performance of the model. In view of this, a new pre-training strategy for related tasks is proposed in this paper to adapt the model to the relatively easier but related tasks and then use it to solve the relatively more challenging identification problems. Figure 3 shows the specific framework of pre-training strategy for related tasks. Firstly, the pre-trained VGG16 is fine-tuned, and the last layer of the network is replaced with a fully connected layer with only two neurons. The model is trained on the Twitter image dataset to learn some more useful features for image emotion classification problems. At the same time, the interference of existing learning experience on the classification results is reduced, and the model is then applied to the task of emotional analysis of paintings.

Fig. 3. VGG16 related task pre-training strategy framework

4 Results Analysis As shown in Table 1, it is the result of comparison between the identification results of the proposed optimization strategy and the traditional unoptimized framework. According to the comparison results in the above table, the method proposed in this paper has better performance in the task of drawing emotion analysis. In terms of the identification accuracy, compared with the traditional unoptimized deep neural network, the identification accuracy of this paper is obviously improved.

Sentiment Analysis of Painting Based on Deep Learning

655

Table 1 Comparison of identification results Model 3-agree 4-agree 5-agree VGG16 without optimization 0.687 0.714 0.783 Ours 0.762 + 0.032 0.814 + 0.028 0.878 + 0.013

5 Conclusion Based on VGG16 network, this paper proposes a pre-training strategy for related tasks. For the study of drawing emotion analysis, this paper proposes a pre-training strategy for related tasks to improve the VGG16 network. Through experimental verification and result analysis, it can be seen that the method proposed in this paper can accurately achieve the purpose of emotional analysis of paintings. Moreover, compared with the traditional unoptimized VGG16 model, the recognition results of the model proposed in this paper have been significantly improved.

References 1. Hatakeyama, Y., Yoshida, S., Kataoka, H., et al.: Multi-voxel pattern analysis of fMRI based on deep learning methods. Adv. Intell. Syst. Comput. 271, 29–38 (2014) 2. Li, X., Liu, L., Zhou, J., et al.: Heterogeneity analysis and diagnosis of complex diseases based on deep learning method. Sci Rep 8(1), 6155 3. Dhomne, A., Kumar, R., Bhan, V.: Gender recognition through Face using deep learning. Procedia Comput. Sci. 132, 2–10 (2018) 4. Zhu, B., Yang, C., Chunyang, Y., et al.: Product Image recognition based on deep learning. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/J. Comput.-Aided Des. Comput. Graph. 30(9), 1778–1784 (2018) 5. Qiu, J., Wang, J., Yao, S., et al.: Going deeper with embedded FPGA platform for convolutional neural network. In Proceedings of the 2016 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays. ACM, 2016 6. Venuti, V., Fazzari, B., Crupi, Vincenza, Majolino, D., Paladini, G., Morabito, Giuseppe, Certo, G., Lamberto, S., Giacobbe, Luigi: In situ diagnostic analysis of the XVIII century Madonna della Lettera panel painting (Messina, Italy). Spectrochim. Acta Part A: Mol. Biomol. Spectrosc. 228, 228 (2020) 7. Alice Dal Fovo, J., Striova, E., Pampaloni, A., Fedele, M.M., Morita, D., Amaya, F., Grazzi, M., Cimò, C., Cirrincione, R.F.: Rubens’ painting as inspiration of a later tapestry: Noninvasive analyses provide insight into artworks’ history. Microchem. J.153 (2020) 8. Pelosi, C., Monaco, A.L., Bernabei, M., Agresti, G., Colantonio, C., Perri, A., Comelli, D., Valentini, G., Manzoni, C.: Beyond the visible: The Viterbo Crucifixion panel painting attributed to Michelangelo Buonarroti. Microchem. J. 154 (2020) 9. Chiriu, D., Desogus, G., Pisu, F.A., Fiorino, D.R., Grillo, S.M., Ricci, P.C., Carbonaro, C. M.: Beyond the surface: Raman micro-SORS for in depth non-destructive analysis of fresco layers. Microchem. J. 153 (2020) 10. Platania, E., Streeton, N.L.W., Vila, A., Buti, D., Caruso, F., Uggerud, E.: Investigation of mineralization products of lead soaps in a late medieval panel painting. Spectrochim. Acta Part A: Mol. Biomol. Spectrosc. 228 (2020)

Informatization of English Teaching and Its Practical Path Yongxin Li(&) Department of Textile and Clothing Engineering, Shandong Vocational College of Light Industry, Zibo 255300, Shandong, China [email protected]

Abstract. The application of information-based teaching methods in the English classroom is conducive to the co-construction of multi-modal corpora in the course website, multi-dimensional interactive teaching mode practice both inside and outside the classroom, and helps to improve the multiple evaluation system. The English teaching based on the cloud computing platform can make the communication between teachers and students more convenient and smooth, and teachers and students can enter into an open and free communication platform, thus creating good conditions for diversified English teaching. In the context of the popularization of big data and cloud computing, information technology has become an extremely important means and channel in English teaching, which has greatly promoted the reform and innovation of English teaching. It has incomparable application advantages and characteristics, which changes the constitution and teaching mode of English course teaching, emphasizes the independent learning and exploration of students supported by modern information technology, makes English teaching system more dynamic and harmonious, and leads English teaching into a dynamic and benign development track. Keywords: English teaching Informatization

 Reform innovation  Information technology 

1 Introduction Computer information technology is constantly infiltrating into the education system, and has become an indispensable part of English course teaching [1–3]. Under the trend of comprehensive and deep integration of computer information technology and English course teaching mode, the necessity of modern English information teaching should be fully realized, and the English information teaching mode and path under the background of Internet and cloud computing should be explored to realize the integration of information technology and English course, and improve the quality and efficiency of English teaching [4–7].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 656–661, 2021. https://doi.org/10.1007/978-3-030-51556-0_97

Informatization of English Teaching and Its Practical Path

657

2 The Influence of Information Technology on English Teaching 2.1

The Influence of Information Technology on English Teaching

With the introduction of computer information technology into English teaching, the traditional English teaching objectives, methods, concepts, teaching materials, environment, assessment and so on have changed accordingly. After the integration of computer technology and English teaching mode, more attention should be paid to the cultivation of students’ English application ability, especially listening and speaking ability [8–10]. English teaching method is no longer the traditional vocabulary explanation and grammar translation method, but the combination of classroom teaching and extra-curricular autonomous learning, using the virtual learning environment created by information technology, carrying out task-based, threedimensional, and personalized English teaching, making the computer gradually move from the former auxiliary position to the foreground of English teaching, focusing on the optimization and organization of English teaching resources, and realizing three-dimensional comprehensive teaching. The evaluation method of English teaching has changed from the traditional summative evaluation method to the combination of summative evaluation and formative evaluation, which has better realized the self reflection, evaluation and adjustment of English teaching. 2.2

An Analysis of the Maladjustment of Information Technology in English Teaching

The traditional concept of English teaching has become the obstacle of informationbased English teaching. Some teachers are dismissive of the application of information technology and think that English teaching can be carried out without modern information technology. This outdated concept has limited the application of information technology in English teaching, making computer a dispensable auxiliary tool, which has not substantially entered the English curriculum system, so it is difficult to apply information technology to English teaching practice. Although some schools are equipped with information facilities, such as language laboratory, multimedia classroom, etc., these modern information technology has not fully played its value, and most of them are only used for English listening teaching, showing the phenomenon of technology and application imbalance. There is also the imbalance of overuse or abuse of information technology, and individual teachers lack rational planning and application of information equipment, which leads to the phenomenon that students are at a loss in English learning.

658

Y. Li

3 The Integration of Information Technology and English Teaching 3.1

An Analysis of the Relationship Between Computer Information Technology and English Teaching

Computer information technology provides a vivid and intuitive visual image for English teaching, and enriches and diversifies English teaching activities. In the process of using multimedia classroom and equipment, teachers can use multimedia software to demonstrate and teach teaching courseware. At the same time, the following principles should be followed to carry out the teaching application of computer information technology software: The first is the adaptability. The multimedia information teaching software in English teaching should be intuitive, vivid and operable and should be able to adapt to the actual situation of English teaching. The second is the interesting. The application of information software in English teaching should embody interesting and contextualization, so that students can learn English in the scene of combination of pictures and texts, and dynamic and static combination, so as to promote the integrity of their English knowledge system. The third is the incentive. Multimedia information technology has a good human-computer interface. Students can learn English actively and autonomously in an intelligent and interactive multimedia information environment, reduce and overcome their inner shyness, and enhance their self-confidence in English learning. The fourth is the interactivity. In the process of information-based English teaching, students can correct their phonetic, lexical and syntactic errors in the process of communication with multimedia computers, and quickly improve their English learning level. 3.2

The Integration of Information Network and English Teaching

The integration of computer information technology and English teaching has completely changed the traditional English teaching form of “classroom + textbook”, and brought about a fundamental change in the framework of English teaching. Teachers, students, computers, teaching contents and other teaching elements present a two-way relationship, which becomes the component content of mutual connection, interdependence and transformation. Teachers are no longer the center and authority of the English class Teaching. Students have become the active constructors of English learning and have expanded from the former unitary textbook learning media to the online learning media. Students can touch English knowledge far beyond textbooks, open up multiple channels of English learning, and complete the active construction and improvement of English knowledge. In the process of integrating computer information technology with English teaching, a student-centered English learning environment can be created, so that students can eliminate the differences between existing English knowledge and new knowledge and refine their English knowledge. The integration of computer information technology and English teaching can create virtual and real situations. For example, students can see the simulated bank environment on the computer network, and then learn English knowledge such as bank account opening, saving and exchange,

Informatization of English Teaching and Its Practical Path

659

so as to improve students’ English listening and speaking communication level. The integration of computer information technology and English teaching should be based on cooperative learning, requiring students to comprehend and understand English knowledge through group cooperation, communication and discussion, and produce the thinking collision of English learning, so that students’ teamwork ability and English communicative ability can be improved. The integration of computer information technology and English teaching presents the characteristics of openness and inquiry, which can lead students into the learning and understanding of English knowledge through inquiry learning and task-based learning, so that students can better think, analyze and solve the problems of English learning, and gain new knowledge and understanding.

4 The Application Path of Computer Information Technology in English Teaching 4.1

Developing and Utilizing Three-Dimensional English Teaching Materials

Under the trend of integration of computer information technology and English teaching, the paper textbooks, multimedia CD and network learning platform are linked together to become the main part of English three-dimensional teaching materials. Based on the principle of comprehensiveness and theme, the structure of English teaching materials is designed. The development of English textbooks should pay attention to the conciseness, authenticity and practicability of the content, supplemented by multimedia CD, three-dimensionally present the English language environment, and stimulate students’ interest and enthusiasm in English exploration. Taking the network learning platform as the extension and expansion of English learning teaching materials, the advantages of the network learning platform easy to change should be used to carry out English practice and evaluation conveniently and flexibly and form an organic English teaching structure that links, transforms and supplements each other. 4.2

Innovation of the Learning Model Integrating Computer Information Technology and English Teaching

The learning mode integrating computer information technology and English teaching should be thought, and the “online English learning” mode should be explored and implemented to make the English classroom teaching combine the network independent study and make them become the subject of student classroom and the extracurricular study, so as to better develop the students’ English autonomous learning ability, and improve the effect of English teaching.

660

4.3

Y. Li

Exploring the Practice of Foreign Language Teaching Based on Cloud Computing Technology

With the help of the cloud computing platform, an open English teaching materials release and sharing mechanism is built. Teachers and students can release or share English teaching materials through the cloud to avoid the phenomenon of sluggish English teaching resources and better help users to obtain and use English teaching resources. Based on the cloud computing platform, the rich information is quantitatively described, and the modern data mining platform is built to collect and analyze the data, which can be used as the basis for the evaluation of teaching effectiveness, so as to better improve the effect of English teaching.

5 Conclusions This paper integrates the English teaching and computer information technology, fully realizes the impact of computer information technology to English teaching, analyzes the imbalance between information technology and English teaching, considers and explores the integration path and practice mode of computer information technology and English teaching, and constructs an English teaching mode based on questions, network inquiry and group cooperation to make computer information technology enter the foreground of English teaching, optimize and utilize information resources better, and promote students’ independent English learning and exploration. Acknowledgements. This research was supported by the 2018 Zibo City School Integration Development Plan: Public Training Base for Textile and Garment Specialty, School project 2018JYZ03 and School project 2019RW02.

References 1. Jin, L.: Informationization of English teaching and its practice. Teach. & Adm. 12, 105–107 (2019). (in Chinese) 2. Cui, N.: Research on English teaching model of higher vocational education under internet platform. Think Tank Era 18, 205 + 209 (2019). (in Chinese) 3. Geng, B.: On the application of small network information platform in the independent study of traditional painting in colleges and universities. Art Educ. 14, 136–137 (2018). (in Chinese) 4. Nie, M.: Research on the integration strategy of college English teaching and media. China Newspaper Industry 8, 92–93 (2019). (in Chinese) 5. Wang, J.: Research on Teaching reform of college english translation based on network environment. J. Educ. Inst. Jilin Prov. 10, 143–146 (2019). (in Chinese) 6. Liu, Y.: Analysis on the professional development path of college english teachers in the era of big data. China J. Multimed. & Netw. Teach. 10, 130–131 (2019). (in Chinese)

Informatization of English Teaching and Its Practical Path

661

7. Liu, J.: Analysis of self-media in college english teaching. Jiangsu Foreign Lang. Teach. Res. 3, 22–25 (2019). (in Chinese) 8. Wei, R.L.: Exploration of English teaching reform in higher vocational colleges in the network age. New West 20, 159–160 (2019). (in Chinese) 9. Deng, Y.Z.: Design and practice of college English blended teaching supported by information technology. J. Hubei Open Vocat. Coll. 11, 144–145 (2019). (in Chinese) 10. Cui, Y.L.: Exploration of English teaching Reform in higher vocational colleges under the background of “Internet +”. Abil. Wisdom 27, 88 (2019). (in Chinese)

A Comparative Analysis of Traditional Test of College Oral English and Computer-Based Oral English Test Xuejing Wu(&) Jilin University of Finance and Economics, Jilin, China [email protected] Abstract. Comprehensive, objective, scientific and accurate oral English evaluation system, as an important part of college English teaching, is an important basis to ensure teaching quality. This paper compares and analyzes the characteristics and advantages of the traditional college English speaking test and the computer-based college English speaking test, affirms the positive effect of the computer-based speaking test and its promoting effects on college English teaching. Keywords: College English

 Computer-based oral test  English teaching

The political and economic development of today’s society is penetrating into the field of education, bringing new problems and challenges to the educational reform. In order to adapt to the new situation of the development of higher education in China and improve the quality of college English teaching, the ministry of education has promulgated college English teaching requirements (trial), which is the main basis for colleges and universities to organize English teaching for non-English majors [4]. This paper puts forward a new college English teaching objective: to cultivate students’ comprehensive English application ability, especially listening and speaking ability. Therefore, the importance of oral English communication ability has been fully reflected in the changes of college English teaching objectives. Since then, college English oral teaching is an important means to improve college students’ oral English comprehensive language application ability, and oral English assessment and testing have also become an important part of college English teaching quality improvement.

1 College English Oral Test Status Oral English test is an important part of language test and one of the important means to test college students’ oral English communicative ability. At present, there are three kinds of oral English test in Chinese universities: interview, oral recording test and computer-based speaking test. Interview and computer-based speaking test are the most common forms of application. Interview is the most traditional and effective way of examination of students’ oral English level by the examinee and the examiner face to face, this kind of test has been widely applied both at home and abroad, such as Hong Kong oral exam, the IELTS speaking test (IELTS), the college English band four and six level of test (CET), Cambridge oral communication skills in English, Cambridge © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 662–666, 2021. https://doi.org/10.1007/978-3-030-51556-0_98

A Comparative Analysis of Traditional Test

663

business English certificate test, etc. The following focuses on the college English test band four and band six. The test is conducted face to face, with two examiners interviewing three candidates for each test. The exam consists of three parts. The first part is “warm-up”, in which the examinee introduces himself and then answers the examiner’s questions to get the examinee into a good state. The second part is the key part of the exam, using the examinee speech and group discussion in the form of a combination. After the examinee is given the picture or other form of prompt, do 1 min of preparation, and then do 1.5 min of speech, then the examinee on the designated topic for about 4.5 min of discussion. In the third part, the examiner will ask further questions to give the candidates an opportunity to further demonstrate their oral communication skills. The total time of each test is 20 min [5–7]. Interview is relatively close to real life oral communication activities, fully embodies the communicative function of language. However, we know that the quality of the speaking test depends not only on the formulation of the test questions, but also on the implementation of the test and the impartiality of the grading process. There are many difficulties in technical implementation, the most serious one is efficiency; Moreover, some artificial factors are likely to lead to the low reliability of the oral test, because the scoring method, scoring criteria and grading personnel greatly affect the reliability and stability of the scoring. Therefore, with the deepening of college English teaching reform in colleges and universities and the popularization and development of computer multimedia technology, computer oral English test has become a new form of oral English assessment, which has been recognized and applied by more and more colleges and universities. The comparative analysis between traditional interview and computer-based oral test is also reflected in the following aspects.

2 Characteristics of Computer-Based College English Oral Test College English speaking test is an important part of English language ability test. In a short period of time, students should express the comprehensive language knowledge they have learned, and achieve accurate language, appropriate words and rich content. The computer speaking test is a kind of communicative test, which tests the students’ language application ability by examining the completion of actual tasks in the real context of computer simulation. Compared with the traditional oral English interview, the computer oral English test has relatively higher validity and reliability, and on this basis, the operability is strong. The conversational mode of computer speaking test is mainly man-machine conversation [9]. The speaking test will be conducted in the multimedia voice lab. Each candidate will have a computer and a headset with a microphone. Complete the whole process according to the prompts and requirements on the computer within the specified time, and all language activities will be automatically saved into the computer system for scoring. The main spoken language test based on computer are TOFEL internet-based (TOFEL IBT), Versant for English Test, FLTRP College Oral English Test System, etc., among them, foreign clubs of College English Oral Test System is geared to the needs of institutions of higher learning, computer based on the

664

X. Wu

implementation of Oral English in the campus network environment evaluation System, has been applied to many universities. The system contains an oral test database composed of a variety of test questions, all of which are developed by excellent English teachers and test experts in colleges and universities. At the same time, users can also use the test setting function to customize test questions. At present, the system supports a total of nine types of questions; the contents of the questions are widely related to daily life, science and technology, travel and transportation, phonetic literature and art, society, emotion, work, education, entertainment and other aspects. Compared with the traditional speaking interview, the computer speaking test requires only five or six sets of questions in a test, which are used repeatedly in different sessions. In the same examination room, students who answered the same set of questions heard the same quality of language and had the same speaking time, so the examination was relatively fair. In addition, because of the use of computer-based oral examination, breaking through the limitations of the test, oral test questions are becoming rich and flexible. Moreover, the computer speaking test is designed to test students’ English listening and speaking ability. Therefore, the selection of questions fully reflects the tester’s understanding of the essential features of language, and the selected questions should design communicative situations as much as possible in accordance with the needs of actual communication, so as to enable the examinee to complete communicative tasks [8–10]. In the assessment and grading process, we know that if the teacher fails to grade correctly, the test will have no credibility. In the traditional interview test, the examiner will bring his own aesthetic tendency, views and even prejudices into the context of the test. But the computer-based oral language test implements the appraisal separation, the teacher cannot see the student’s examination number and the name in the examination paper during reading process, greatly reduces the subjectivity and the tendency in the examination paper. In addition, the teacher can listen to and correct the uncertain examinees repeatedly during the examination, so the grading is more objective and accurate. From the perspective of students’ subjective response and emotional anxiety, the attitude of examiners in traditional oral interview often determines the degree of emotional anxiety of examinees and affects their performance. The examiner’s pronunciation, speed, volume and the improvisation of other examinees in the same group can also cause problems or anxiety for other examinees. The computer speaking test avoids the awkwardness of man-machine dialogue, and most of the examinees can boldly express their own opinions and freely apply the language knowledge they have learned. From the computer oral test hardware conditions, time and effort, labor, material and financial resources can be saved effectively, compared with the traditional interview oral test. So, the computer-based oral English test is more convenient. Take the oral English test of our school as an example, we set up three examination rooms with 50 computers, and calculated at 50 students per 30 min, we can test 2,100 students in 7 h a day. A total of 3 invigilators and 3 operators are required. In addition, the examination questions and various audio files used in the examination can be well saved in the computer, hard disk and other storage devices for the use of postexamination marking, which can provide beneficial reference and basis for future oral English teaching, scientific research and examination.

A Comparative Analysis of Traditional Test

665

3 Improvement of Computer Oral Test and Its Promoting Effect on Teaching Compared with the traditional interview oral test, computer oral test has higher requirements on the hardware equipment and software system configuration of the multimedia language lab, so it is necessary to promote this oral test form in a comprehensive way with various technical and financial support. But we see the reliability and validity of computer-based interview test is higher than that in oral English test [1– 3]. As long as the guarantee of the same reliability and validity of the premise, in the process of actual operation, examiners pay attention to item number of test, the test time length, and the quantity of examiners. Therefore, the lower the cost of such computer oral test, the stronger its operability. First of all, although from the perspective of students’ subjective reactions and emotional anxiety, students in the computer speaking test can overcome their fear by facing the machine instead of the examiner; after the test some students say that manmachine dialogue cannot find the real feeling of oral communication, resulting in unnatural expression. In addition, there is a lack of interaction between speakers in real language communication and teachers’ encouragement to students in face-to-face oral test, which is not conducive to students’ real performance. Secondly, from the perspective of exam questions, reading aloud, reciting and answering questions to express views are currently used more questions. Studies have shown that reading aloud is the most popular type of question for students, but it is generally believed that because of the lack of interactive communication, it cannot reflect the real oral communication ability of students. Therefore, it is necessary to have realistic and applicable diversified test types in the computer speaking test to increase the validity of the speaking test. On the one hand, the design and development can be applied to computer oral English test, the new test software is indispensable, using advanced computer technology integrated processing text, images, voice, video and other multimedia function, simulating all kinds of real life English communication, increasing dialogue, group discussion, debate, and other forms of interaction, the diversification and realistic test materials, all of these factors can guarantee the vitality of the test. On the other hand, the real language communication materials selected in the exam will also encourage students to pay more attention to listening and speaking training. Finally, with the popularization and continuous application of computer speaking test, the test has increasingly become one of the effective ways to solve the problems of insufficient teacher resources, large examinee base and test reliability. Therefore, we should maximize the positive validity of the computer speaking test and reduce the negative validity in the actual English teaching. Teachers should guide students correctly in the teaching process according to the characteristics of the computer speaking test, so that the test is no longer the baton of teaching, but an essential means to evaluate learners’ learning effectiveness.

666

X. Wu

4 Conclusion Compared with the traditional oral English test, we can see that computer-based oral English test is a new thing in college English teaching reform, and also provides a new platform for us to conduct large-scale oral English test in a more fair, efficient and scientific way. In the promotion of large-scale computer oral English test, the useful experience gained can promote oral English teaching in college and improve students’ comprehensive application ability. However, there are still a lot of improvements and attention to be paid to, such as the improvement of the test questions and interaction mode of the computer-based speaking test. Further research and exploration will improve the computer-based oral test, better serve English teaching.

References 1. Cai, J.: Validity, reliability and operability of CET-4 and CET-6 computer oral English test. Foreign Lang. (4) (2005) 2. Li, J.: Research on computer-aided college English speaking test. Foreign Lit. (Bimonthly) (8) (2011) 3. Xie, C.: A study on the after-effect of computer-based college English speaking test. J. Cap. Med. Univ. (Supplement of social science edition) (2011) 4. Exam Committee.: Reform plan of CET-4 and CET-6 (trial). College Foreign Language Teaching Newsletter (2005) 5. Li, L.: Empirical research on computer-aided oral English test. J. Wuhan Shipbuild. Vocat. Tech. Coll. (4) (2007) 6. Yan, S.: Empirical study on the reversal effect of oral English learning—a case study of ESC oral English test. J. Jishou Univ. (Social science edition) (S2) (2018) 7. Jia, G.: Expected reversal effect of college English oral test—a case study of CET-4 and CET-6 oral English test. Foreign Lang. Test. Teach. (2016) 8. Gao, L.: A review on the test design of college English oral test. Educ. Mod. (2016) 9. Gao, J.: Design and practice of large-scale oral English test system. J. Sichuan Univ. Educ. (S1) (2008) 10. Wen, Q.: Oral English Testing and Teaching. Shanghai Foreign Language Education Press (1999)

Customer Satisfaction Evaluation of Airline Based on PLS_SEM Huali Cai1, Xuemei Wei2(&), Yanjun Gu1, and Fang Wu1 1

2

Quality Research Branch, China National Institute of Standardization, Beijing, China National Science Library, Chinese Academy of Sciences, Beijing, China [email protected]

Abstract. Nowadays, civil aviation is an important industry in national economic and social development, and also an advanced means of transportation. The competition among airlines is becoming increasingly fierce. The paper puts forward a PLS_SEM method to evaluate the customer satisfaction. Through an investigation in 50 cities, the authors conclude that customer cares more on the brand and service quality. Company EE gets the highest customer satisfaction and BB gets the lowest result. Customers prefer the cabin crew, overall image, website and APP, and the ground information disclosure accuracy. They give the worst experience in the catering situation. Keywords: Consumer satisfaction

 Airline  PLS_SEM

1 Introduction Civil aviation is an important industry and also an advanced transportation tool. With the quick development of China’s national economy, civil aviation industry continues to develop and expand, the scale of transportation continues to expand, the route network develops rapidly, the capacity increases rapidly, and the competition among airlines becomes increasingly fierce. Providing more satisfactory service for passengers has become the main goal pursued by many airlines. However, in the past experience, what passengers most concern about, how satisfied passengers are with various services of airlines, and how the overall satisfaction of airlines are, are the research contents of this paper. In this paper, a structural equation model suitable for civil aviation industry is constructed by using the mechanism equation model and partial least square (SEM_PLS) algorithm. Some scholars have carried out relevant studies in the past. Two different non-classic methods, a decision tree based classification algorithm and a probabilistic method, were applied to calculate the customer satisfaction [1]. Xu Xiaoli researched how service quality, customer satisfaction, value and choosing barrier on customer loyalty in the China’s airline companies [2]. Leong Lai-Ying offered a new viewport by using the SERVPERF combing with an SEM-artificial-neural-networks predictive analytic method [3]. Jiang Hongwei researched the service quality of China’s four airline companies and found out the relationship between their service quality and their customer satisfaction, they also researched the conditions under which the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 667–671, 2021. https://doi.org/10.1007/978-3-030-51556-0_99

668

H. Cai et al.

companies could keep old customers [4]. Lucini Filipe R used text mining method to mine the aspects of airline customer satisfaction by collecting and analyzing lots of online customer reviews [5]. Namukasa, Juliet detected the impact of airline companies’ service quality on customer satisfaction and customer loyalty [6]. Sezgen, Eren investigated the key factors of customer satisfaction and customer dissatisfaction for full-service and low-cost airlines as well as economy and premium classes. Latent semantic analysis - a text mining and classification technique – was applied to analyze airline reviews generated by online users [7]. Chow, Clement Kong Wing focused on the relationship between customer satisfaction, and service quality [8]. Chen Ching-Fu proposed a conceptual model to study the relationship between customer participation, co-creation of value and customer loyalty in the air transport environment [9]. A model of the relationship between airline service quality and market share was established and compared with the traditional airline demand model was built by Suzuki, Yoshinori [10]. However, there was a lack of comprehensive research on the evaluation method of customer satisfaction in airline industry based on PLS_SEM.

2 Customer Satisfaction Model To be first, we construct the SEM model, which is show in Fig. 1.

Fig. 1. PLS_SEM conceptual model

Where, circle and rectangle represent latent variables and observation variables respectively. The arrows indicate the relationship of influence and the direction of influence. And the PLS method is shown as follows: g ¼ Bg þ Cn þ f

ð1Þ

Customer Satisfaction Evaluation of Airline

669

In the model, g and n represent endogenous and exogenous latent variables respectively. B is the correlation between endogenous potential variables; C is the relationship between two kinds of latent variables; f represents the unexplained factor. Then, the following mathematical equation is obtained: X = Kx n þ d

ð2Þ

Y = Ky g þ e

ð3Þ

Where, X and Y are vectors composed of exogenous index and endogenous index; Kx reflects the relationship and Ky reflects the interaction between different variables. On this basis, the model of airline customer satisfaction is established and the empirical analysis is carried out, which has been proved effective (Fig. 2).

Fig. 2. Customer satisfaction model

The model consists of six structural variables, which are brand image, expected quality, perceived quality, perceived value, customer satisfaction, and customer loyalty.

3 Results We investigated 6 airline companies (the names were substituted for privacy by AA, BB …). We collected questionnaires from 50 cities in China, and each company received about 250 valid questionnaires. Then, the customer satisfaction model and SEM_PLS were used to calculate the impact coefficients of the six structural variables, and the results of the potential variables were shown in Table 1.

670

H. Cai et al. Table 1. The latent variables results

Latent variables Brand image Expected quality Perceived quality Perceived value Customer satisfaction Customer loyalty

Overall Influence coefficient 76.42 0.77 76.54 0.21 76.16 0.68 75.99 0.12 76.23

AA

BB

CC

DD

EE

FF

75.39 75.99 76.18 76.46 77.15

77.15 77.05 76.72 77.14 75.40

75.99 76.28 75.11 75.60 75.71

75.76 75.63 75.56 74.45 76.29

76.38 77.34 76.32 75.85 77.29

77.74 76.94 77.13 76.44 76.23

77.98

77.76 79.06 77.91 76.72 77.60 78.80

From Table 1, we can conclude that company’s brand and service quality have a significant impact on consumer satisfaction. In the six companies, the overall impact coefficient of brand image is 0.77 and perceived quality is 0.68. The expected quality and perceived value are not important to customers, and their influence coefficients are 0.21 and 0.12 respectively. So more and more people focus on brand and service quality, they pay less attention to the price. Through the calculated results, company EE gets the highest customer satisfaction, which indicates EE is the favorite airline. Table 2. Several observable variables results Observable variables The overall image Service features On time situation Catering situation The cabin equipment Cabin crew Ground information disclosure accuracy Website and APP Luggage service

Overall Influence coefficient 77.87 0.41 74.74 0.36 75.66 0.08 72.93 0.08 75.03 0.08 78.68 0.08 76.98 0.09

AA

BB

CC

DD

EE

FF

76.76 73.78 74.27 71.11 75.72 79.82 77.16

78.58 75.30 77.10 74.53 74.58 77.99 77.77

76.96 74.93 75.23 69.34 74.06 79.36 75.67

78.23 73.33 75.13 74.63 74.14 76.98 76.55

77.97 74.54 75.85 73.82 75.22 78.38 77.20

78.74 76.53 76.39 74.09 76.44 79.55 77.52

77.41 74.56

78.77 76.87 77.17 75.51 76.79 79.31 74.15 76.87 72.20 74.36 74.68 75.04

0.08 0.09

From the Table 2, observable variables results are shown. Through all the variables, the cabin crew, overall image, website and APP, and the ground information disclosure accuracy get the higher result. However, customers don’t like the catering situation. Maybe all the airlines should pay more attention to the food they provide. We can also see the result of each company on each variable, which can be taken as the important data for management decision support.

Customer Satisfaction Evaluation of Airline

671

4 Conclusion Based on PLS_SEM, an airline customer satisfaction model was established and the customer satisfaction of 6 airline companies was calculated. We found that brand and service quality are key factors in consumer satisfaction. Company EE gets the highest customer satisfaction and BB gets the lowest result. Customers prefer the cabin crew, overall image, website and APP, and the ground information disclosure accuracy. They give the worst experience in the catering situation. Acknowledgments. This work is supported by the National Key Research and Development Program of China under Grants No. 2017YFF0206504, the National Social Science Fund Major Project (Research on Quality Governance System and Policy to Promote High Quality Development), No. 18ZDA079.

References 1. Giovanna, N., Silvia, S.: Customer satisfaction in the airline industry: The case of British airways. Qual. Reliab. Eng. Int. 22(5), 581–589 (2006) 2. Xu-Xiaoli, Wan-Yinghong, Huan-Zhijian, Liu-Hui: The impact of service quality, satisfaction, value and switching barrier on customer loyalty in Chinese airline industry. In: 2006 International Conference on Service Systems and Service Management, vol. 2, pp. 1316– 1321 (2007) 3. Leong, L.-Y., Hew, T.-S., Lee, V.-H., Ooi, K.-B.: An SEM-artificial-neural-network analysis of the relationships between SERVPERF, customer satisfaction and loyalty among low-cost and full-service airline. Expert Syst. Appl. 42(19), 6620–6634 (2015) 4. Hongwei, J., Yahua, Z.: An investigation of service quality, customer satisfaction and loyalty in China’s airline market. J. Air Transp. Manag. 57, 80–88 (2016) 5. Lucini, F.R., Tonetto, L.M., Fogliatto, F.S., Anzanello, M.J.: Text mining approach to explore dimensions of airline customer satisfaction using online customer reviews. J. Air Transp. Manag. 83, 1–12 (2020) 6. Juliet, N.: The influence of airline service quality on passenger satisfaction and loyalty the case of Uganda airline industry. TQM J. 25(5), 520–532 (2013) 7. Eren, S., Mason, K.J., Robert, M.: Voice of airline passenger: A text mining approach to understand customer satisfaction. J. Air Transp. Manag. 77, 65–74 (2019) 8. Chow, C.K.W.: Customer satisfaction and service quality in the Chinese airline industry. J. Air Transp. Manag. 35, 102–107 (2014) 9. Chen, C.-F., Wang, J.-P.: Customer participation, value co-creation and customer loyalty - A case of airline online check-in system. Comput. Hum. Behav. 62, 346–352 (2016) 10. Yoshinori, S., John, T., Robert, N.: Airline market share and customer service quality: A reference dependent model. Transp. Res. Part A: Policy Pract. 35(9), 773–788 (2001)

Image Projection Space Invariant Technology Yibo Wang, Ou Qi(&), and Xiaoyan Gao Changchun Institute of Engineering and Technology, Changchun 130000, China [email protected]

Abstract. Image projection is the premise of image transformation, and also the premise of image preprocessing, splicing, operation and fusion. When the camera collects the image, it usually carries out complex motion, and different motion modes will produce different effects on the scene imaging. The motion mode of camera is usually divided into several relatively simple motion modes: translation motion, lens zooming, horizontal sweeping, vertical sweeping and rotation motion. Through image distortion restoration technology, the interference factors that affect image quality are solved, and these factors are removed by technical means, so as to ensure the space invariance of image projection. Keywords: Image projection

 Image quality  Space invariance

1 Introduction When the camera sweeps horizontally and vertically, the imaging plane will not be parallel to the scene plane, so there will be keystoning and chirping phenomenon [1–3]. Trapezoid distortion refers to the trapezoid distortion produced when the image is taken, that is, the phenomenon that the parallel lines in the original scene intersect in the image taken; LFM refers to the phenomenon that the spatial frequency of the scene image taken by the camera in the process of motion will increase or decrease with the change of the spatial position [4–8]. Because the imaging plane is parallel to the scene plane, translational motion, lens zooming and rotational motion will not produce the above two kinds of distortion [9–12]. These two kinds of distortion bring the effect of perspective projection. Therefore, the coordinate transformation under horizontal scanning and vertical scanning is projection coordinate transformation [13–15].

2 Model Building When the image is collected from a fixed viewpoint, the camera motion only includes horizontal rotation and vertical rotation. When projecting panoramic image of cylinder or sphere, it is necessary to solve the motion parameters of camera. Only by obtaining the horizontal and vertical rotation angles between the images, can the images be mapped to the polar coordinate system of cylinder and sphere. Set the camera to rotate in the XZ plane, and the origin of the coordinate system is the observation point O (projection center). L refers to the cylinder surface, J refers to the original image, and K refers to the image after projecting it to the cylinder, which is © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 672–676, 2021. https://doi.org/10.1007/978-3-030-51556-0_100

Image Projection Space Invariant Technology

673

called cylinder image for short. P(x,y) is any point in the original image J, and Q(x,y) is the corresponding point of P(x,y) in the cylindrical image K. Let R be the cylindrical radius, be the projection width angle of the original image J, and W and H are the width and height respectively. From this, we can get that the width of the cylindrical image K corresponding to j is R, and the height is h. transform any point P(x,y) projection on the original image J to the corresponding point Q(x’,y’) on the cylindrical image K, and the coordinates of the image are defined by the position of the pixel points on the image, all of which are on their left side The upper corner is the origin.

3 Model Solution Suppose P(x,y) and Q(x’,y’) are projected to P’(x,H) and Q’(x’,H), respectively, on the lower surface of the cylinder. In △O’AB, from the trigonometric relation, we can get: tgx ¼

W 2

x r

ð1Þ

From the relationship of arc angle, we can get: h  r  x0 ¼ x  r 2

ð2Þ

Therefore, from formula (1) and formula (2), we can get:  W  h 2 x x ¼ r  r arctan r 2 0

ð3Þ

In △OCD, from the proportional relationship: r H2  y0 ¼ d H2  y

ð4Þ

Therefore, from Eq. (4), we can get: H r y ¼  2 0



H 2

y d



H r 2

The meaning of the parameter in formula (6) is as follows:

ð5Þ ð6Þ

674

Y. Wang et al.

8 >
: h ¼ 2arctanðW Þ 2f

ð7Þ

Similarly, the projection inverse transformation formula can be obtained from formula (5) and formula (7) (

0

x ¼ W2 þ rtanðxr  h2Þ y ¼ H2 þ

dðy0 H2 Þ r

ð8Þ

According to the projection transformation formula of formula (8), the restoration formula of geometric distortion of cylinder image is obtained: 8

< x0 ¼ r h  r arctan W2 x 2 r rðH2 yÞ : H 0 y ¼ þ 2

ð9Þ

d

It can be known that in the calculation of cylindrical image coordinates (x’,y’), the mathematical results of cylindrical image coordinates (x’,y’) are coordinates with small values because the calculation formula includes inverse trigonometric function and division operation. In the field of digital image processing, image pixel coordinates are all represented by integer coordinates in the computer, so cylindrical image pixel points (x’,y’) In this way, the data will not have continuity, resulting in the sawtooth phenomenon of the cylindrical image after projection, which destroys the overall continuity of the image. In order to avoid the generation of sawtooth in cylinder image, bilinear interpolation is used to solve this problem Traverse every pixel in the cylindrical image, and use the inverse transformation formula of cylindrical projection: 8 < x ¼ W2 þ rtanðxr0  h2Þ :

y ¼ 2fH þ

dðy0 H2 Þ r

ð10Þ

Set the gray value of the original image pixel point as V(x,y). Although the coordinates of the sampling point reflected in the original image by the cylinder image are also small values, the gray value of the sampling point can be approximately obtained from the gray value of the original image according to the bilinear interpolation method in the gray level interpolation, and then assign the gray value of the original image sampling point to the corresponding pixel point of the cylinder image. Bilinear interpolation can be simply understood as: the gray value of four vertices of the unit square is known, and the gray value of any point in the square is calculated. In order to explain the mathematical process, the pixel spacing is set as 1. The coordinates of four vertices of unit square and one point in it are given in XY plane. The V (x,y) in Z direction of vertical axis not only represents the gray value of each point, but

Image Projection Space Invariant Technology

675

also is the mathematical name of the point. From the triangle proportion relation, we can get: V3 ðx þ t; yÞ  V2 ðx þ 1; yÞ ðx þ 1Þ  ðx þ tÞ ¼ V1 ðx; yÞ  V2 ðx þ 1; yÞ ð x þ 1Þ  x

ð11Þ

Therefore, from Eq. (10), we can get: V3 ðx þ t; yÞ ¼ ð1  tÞV1 ðx; yÞ þ tV2 ðx þ 1; yÞ

ð12Þ

From the triangle proportion relation, we can get: V6 ðx þ t; y þ 1Þ  V4 ðx; y þ 1Þ ðx þ tÞ  ðx þ tÞ ¼ V5 ðx þ 1; yÞ  V4 ðx; y þ 1Þ ð x þ 1Þ  x

ð13Þ

Therefore, from Eq. (13), we can get: V6 ðx þ t; y þ 1Þ ¼ ð1  tÞV4 ðx; y þ 1Þ þ tV5 ðx þ 1; y þ 1Þ

ð14Þ

V ðx þ t; y þ sÞ  V3 ðx þ t; yÞ ðy þ sÞ  ðy þ tÞ ¼ V6 ðx þ t; y þ 1Þ  V3 ðx þ t; yÞ ð y þ 1Þ  y

ð15Þ

According to Eq. (15), the gray value of the sampling point in the original image can be obtained, and then the gray value is assigned to the corresponding point of the cylinder image, so that the gray value of each pixel in the cylinder image can be obtained by traversing each pixel in the cylinder image, avoiding the saw tooth phenomenon that the cylinder image is easy to produce.

4 Conclusion Through the research of projection transformation in image processing, the causes of image projection transformation distortion are found. By means of modeling, the projection change of image is realized, the problem of large distortion in image projection is solved, and the sawtooth phenomenon in image processing is avoided, which lays the foundation for further image processing. Image fusion is the next research direction.

References 1. Soliman, S.R., Zayed, H.H., Selim, M.M., Kasban, H., Mongy, T.: Image quality enhancement in Neutron Computerized Tomography based on projection exposure time adjustment. Appl. Radiat. Isot. 154, 108862–108864 (2019) 2. Liseo, F.G., Lautenschlaeger, T., Ewing, M., Langer, M.: The dosimetric differences in calculating lung SBRT plans on different image data sets: comparison of the free breathing scan to both the average intensity projection scan and to the sum of calculations on each respiratory phase of the 4DCT scan. Med. Dosim. 44(3), 1824–1829 (2019)

676

Y. Wang et al.

3. Yin, L., Wang, Z.: Measurement of the flatness or the shapes of mirrors by one-shot projection of structured light dot pattern. Results Phys. 15, 107114–107118 (2019) 4. Zhang, L., et al.: A polar coordinate system based on a projection surface for moon-based earth observation images. Adv. Space Res. 64(11), 2209–2220 (2019) 5. Yu, Y.-F., et al.: Sparse approximation to discriminant projection learning and application to image classification. Pattern Recognit. 96, 106963–106968 (2019) 6. Huang, H., Duan, Y., He, H., Shi, G., Luo, F.: Spatial-spectral local discriminant projection for dimensionality reduction of hyperspectral image. ISPRS J. Photogramm. Remote. Sens. 156, 77–93 (2019) 7. Chavez-Burbano, P., Guerra, V., Rabadan, J., Perez-Jimenez, R.: Optical camera communication system for three-dimensional indoor localization. Optik 192, 162870–162870 (2019) 8. Mauf, S., et al.: Flat chest projection in the detection and visualization of rib fractures: across-sectional study comparing curved and multiplanar reformation of computed tomography images in different reader groups. Forensic Sci. Int. 303, 109942–109946 (2019) 9. Wang, L., Bi, S., Lu, X., Gu, Y., Zhai, C.: Deformation measurement of high-speed rotating drone blades based on digital image correlation combined with ring projection transform and orientation codes. Measurement 148, 106899–106899 (2019) 10. Wang, G., Yi, D., Tang, R., Liang, W.: Complete factorization for poly-phase matrix with linear phase based on semi-rank orthogonal projection matrix. J. Comput. Appl. Math. 366, 112390–112390 (2020) 11. Molina-Viedma, Á.J., Felipe-Sesé, L., López-Alba, E., Díaz, F.A.: Comparative of conventional and alternative Digital Image Correlation techniques for 3D modal characterisation. Measurement 151, 107101–10718 (2019) 12. Liu, W., et al.: Comparative study of forage toxic metals of conventional versus nonconventional pastures in relation to animal mineral nutrient allowance. Environ. Sci. Pollut. Res. Int. 122, 131–137 (2020) 13. Karthik, S.A., Manjunath, S.S.: Automatic gridding of noisy microarray images based on coefficient of variation. Inform. Med. Unlocked 11(2), 146–149 (2019) 14. Zhu, F., et al.: Optimization of back projection with different geometry configurations of Xray sources in digital breast tomosynthesis: a Monte Carlo simulation study. Optik 202, 163604–163634 (2019) 15. Zhang, H.-L., et al.: See-through 2D/3D compatible integral imaging display system using lens-array holographic optical element and polymer dispersed liquid crystal. Opt. Commun. 456, 124615 (2020)

Secure Network Coding Technology Zhiwei Jin(&) School of Economics and Trade, Jilin Engineering Normal University, Changchun 130052, China [email protected]

Abstract. In the process of network transmission, we usually need to store and forward data at the location of intermediate nodes. Because of information security, we can’t code in a reasonable way. Therefore, we put forward the network coding theory, which can provide convenience for the communication technology of social network in mass data. However, network security puts forward higher requirements for coding. It is necessary to ensure the security of information while enhancing the transmission efficiency and node application. Firstly, this paper summarizes the network coding theory, describes the existing problems, then puts forward the security issues, and introduces the security network coding module. Keywords: Information theory

 Network coding  Security  Module

1 Introduction The information transmitted through the original routing mechanism usually cannot be overlapped. In the process of transmission, the intermediate node can only store and forward data packets. This makes it difficult for us to achieve the maximum transmission efficiency in the transmission environment [1]. In 2000, network coding was proposed. We can theoretically verify the tremendous advantages of this technology, that is, if the information is transmitted at the location of the intermediate node, we can not only store and forward, but also encode it in a reasonable way, so as to achieve the maximum transmission rate. This theory has completely changed the information transmission mode of the traditional communication network [2]. It enables us to achieve maximum transmission rate. Therefore, this technology has made a qualitative leap in the field of information theory. The advantages of this theory are as follows: firstly, it can improve the throughput of the network. Whether we use wireless or wired networks. The more the number of nodes in network [3], the more obvious the advantage of this technology is; secondly, it can achieve network load balancing, so as to evenly distribute network traffic in a wider network; thirdly, it has higher bandwidth utilization and smaller energy consumption of nodes. This makes the link more robust. Although network coding [4] is a potential technology, it has attracted wide attention and great attention. But it needs to be improved in terms of network security. In order to improve the performance of network coding, we still need to consider the network security threats.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 677–681, 2021. https://doi.org/10.1007/978-3-030-51556-0_101

678

Z. Jin

2 Network Coding With the rapid development of computer technology and network science [5], the storage and transmission of network information is becoming more and more important to all walks of life, especially in the form of an exponential change in the network environment [6]. Traditionally, the communication and transmission systems of computers usually use point-to-point channels to transmit information. In other words, the realization of active nodes of information relies on network media. After passing through intermediate nodes, the storage and forwarding are carried out at the same time to reach the end node. However, this transmission mode does not rely on intermediate nodes, but its efficiency is relatively low. For the current network environment, it cannot meet everyone’s needs. Therefore, network coding has been proposed, breaking the traditional storage and transmission mode, abandoning the single storage. Firstly, for a single point information source, information [7] needs to be transformed into the content needed by the receiving source through program decomposition after blending and reorganization, which makes the process efficient and fast, and reduces the dependence on network lines. But there are also some problems in network coding. First, in the process of network coding, intermediate nodes often need to code data, causing attacks. In the selected path, the attacker attacks the nodes arbitrarily, which increases the passivity of the system attacked because of the joining of intermediate nodes. Secondly, after encoding [8], messages are often transmitted through multiple paths, and can be decoded at the destination node. Therefore, attackers mostly perform some operations around some paths or even some nodes, such as tampering, eavesdropping, forgery and so on, so their security is greatly threatened. Thirdly, if resources are limited in the network environment, some situations will occur, even in order to prolong the time without participating in coding, only sending and node packets are chosen, which will reduce the reliability of the network system. Figure 1 shows the encoding and decoding process.

Fig. 1. Network encoding and decoding

We can’t ignore the influence of these unfavorable factors. For network attack mode, the superiority of network coding will be limited, so we need to consider the security of network coding, and we need to obey the following requirements. First of all, we must

Secure Network Coding Technology

679

obey confidentiality to ensure that data is not acquired in the transmission process [9]; secondly, we must ensure integrity, the information carried in network coding system cannot be arbitrarily tampered with, and then the destination node can correctly decode the final source message; secondly, we need to ensure authenticity, in the network, the source of information needs to be verified, and then accepted and trusted, and most need to be traceable. Radioactive wireless systems are vulnerable to intrusion and forgery of data by other systems. If the origin of data can be traced back, the security of this information can be analyzed and tracked according to auditing if there is a problem with this node. Finally, it is necessary to ensure that this information is available, because network coding [10] is used to balance the network load, to balance the energy of each node, to ensure the normal links, and the information needs to be available. In order to achieve the ultimate goal of network coding.

3 Secure Network Coding Because the development of network technology will inevitably bring threats, such as information theft, loss and so on, the transmission mode of network information cannot rely solely on transmission for forwarding. If information is stolen, the important communication content will be leaked. The result is conceivable. The loss of property caused by information leakage is incalculable. In the increasingly perfect network era, the security problem is particularly serious. The development of network coding technology solves the transmission efficiency in the network environment. At the same time, we need to consider the security of network information in transmission. For example, Fig. 2 represents the steps of encryption and decryption of information in the transmission process. In this process, when the information is sent to the intermediate node through the source node, that is, when the transmission is found from the data plaintext to the encryption process, the network coding begins to work at this time. Integrating the information obtained through different ways, retaining important information and transmitting it in an encrypted way, this adds security protection to the transmission process. As information gets closer and closer to the recipient, relying on this protection will decrypt it in a unique way. In this process, the information needs to be modified first when it is encoded to reduce the degree of confusion. Continuously optimize network coding, apply it to network security, and then promote the breakthrough of network security.

Fig. 2. Encryption and decryption process

680

Z. Jin

The implementation of network security coding project usually has the following aspects. Uncertainty brings great inconvenience to network coding. Uncertainty of capacity will affect stability. Because of the limitation of source node information, information is often lost in the transmission process, which will restrict the development of network coding. Because network information needs to be transmitted in the network environment, although it faces huge problems, it still needs to transmit data continuously. If the information in the former part is found to be wrong or stolen, it is necessary to modify some relevant information in the transmission state, which will also be a way of protection and solution. Figure 3 is the module of secure network coding system. Adding some security modules when necessary will increase its stability. Under the specific security construction, information transmission technology, effective and fast transmission channel will become a relatively perfect measure.

Fig. 3. Security network coding system module

When security problems arise in the network environment, the point-to-point mode will only result in information being stolen. On the one hand, secure network coding can make the signal source modify or encrypt the data to be transmitted in time, and on the other hand, it can also code in the area of intermediate nodes. Similarly, in order to deal with security issues, information publishers need to give corresponding instructions, such as deeper confidentiality protocols at the nodes, real-time detection within a certain range, so that information can be interpreted by integrity. Discover the missing information of the source node in time, give the source node quickly, and then optimize the inadequacy. This method requires corresponding coding procedures. The modules in Fig. 3 provide hardware and technical support for this technology. In a word, with a secure network coding system, it can further improve the security of the network environment and make it better serve human beings.

4 Conclusion At present, as a widely accepted technology in the field of computer network, network coding is very popular because of its huge upper limit capacity. But information security needs timely feedback and repair. It requires us to further study the performance of network coding, in order to minimize the complexity of network coding, and then make the technology more convenient for society.

Secure Network Coding Technology

681

References 1. Kong, Y., Yang, Z., Lu, B., Tian, F.: A secure network coding system based on channel generation key. J. Nanjing Univ. Posts Telecommun. (Natural Science Edition) 38(3), 7–13 (2018) 2. Xiao, S., Guo, Y., Huang, K., Jinliang: Collaborative key generation method for multi-hop relay system in the Internet of things. J. Commun. 39(3), 86–94 (2018) 3. Wang, L., Sun, Z.: Mobile network location privacy protection technology based on secure network coding. J. Nanjing Univ. Technol. 42(1), 56–61 (2018) 4. Yao, S., Chen, J., He, Q., Du, R.: A review of network coding theory and application. J. Cent.L South Univ. Natl. (Natural Science Edition) 36(2), 115–128 (2017) 5. Yang, J., Gui, C., Liu, Q., Du, R.: Secure network coding for anti-wiretapping based on routing selection. Comput. Appl. Softw. 34(3), 300–305+311 (2017) 6. Wang, H., Mei, Z.: An anti-pollution attack mechanism based on secure network coding technology. Comput. Technol. Dev. 26(7), 94–99 (2016) 7. Chen, J.: Exploration of secure network coding against eavesdropping and pollution attacks. Netw. Secur. Technol. Appl. (1), 96 (2015) 8. Du, H., Xu, C., Meng, Z.: Legitimacy analysis of reverse engineering technology for network coding. Comput. Sci. 41(11), 12–15 (2014) 9. Xu, G., Fu, X.: Secure network coding against universal attack. Comput. Sci. 39(8), 88–91 +114 (2012) 10. Liu, Q., Pan, J., Liu, J.: Weak secure network coding based on synchronous satellite communication network. Comput. Technol. Dev. 22(7), 143–146+166 (2012)

A Brief Analysis of the Investigation and Electronic Information Experiment Teaching in Higher Vocational Colleges Jiao Xue(&), Wei Sai, Feifei Gao, and Guiling Fan Xijing University, Xi’an 710123, Shaanxi, China [email protected], [email protected], [email protected], [email protected] Abstract. When the first computer was born, after half a century or so, electronic information technology with its unique influence and vitality has quickly become the global science and technology history of the most extensive impact on human beings in a field. In the new era, higher vocational colleges attach great importance to cultivating students’ electronic information technology. In this context, higher vocational colleges continue to reform and innovate the teaching system and mode, but no matter how to reform, electronic information experiment teaching will always be the most important part. Electronic information experimental teaching department can only enable students to master electronic information knowledge, but also conducive to the development of students in electronic information innovation spirit, practical operation ability and the ability to analyze practical problems and solve problems, it has an irreplaceable role. Keywords: Higher vocational colleges information

 Experimental teaching  Electronic

1 Status of Electronic Information Experiment Course in Higher Vocational Colleges The course of electronic information experiment in higher vocational colleges in China is generally carried out step by step according to the experimental steps and experimental requirements in textbooks [1]. In the experimental class, some equipment and other equipment are ready for direct use, and the location of most circuit components has been determined. In the process of electronic information experiment, students only need to make the actual measurement according to the requirements of the steps in the textbook [1, 2], and summarize the measured data to determine the existing conclusion. This mode of electronic information experiment course is a confirmatory experiment. According to the theory, students only verify the experiment to obtain the correctness of the theory [3]. The model experiments can allow students to consolidate their knowledge in the content, but in terms of the whole experiment, the students in the process of the electronic information experiment has failed to fully own thinking, you just need to imitate the textbook experiment steps, no will have to actual operation © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 682–686, 2021. https://doi.org/10.1007/978-3-030-51556-0_102

A Brief Analysis of the Investigation and Electronic Information

683

ability and the ability to think is really a combination of failed to give full play to the requirement of students’ autonomous learning, also failed to achieve the goal of experimental teaching had hoped. In the process of electronic information experiment teaching, teachers usually explain the experimental steps and requirements in detail before the electronic information experiment operation class, and then students carry out experimental operations step by step according to the requirements. Electronic information experiment should be a very interesting course for students in higher vocational colleges, but teachers do so will be boring [3, 4], students will gradually lose interest in electronic information experiment. In some schools, some experiments cannot be carried out because of the lack of funds, and many experiments that need to be verified cannot be carried out. In the process of higher vocational college of electronic information experiment examination, generally is based on the experiment report, but the experiment report is in accordance with the standard experimental steps and experimental data, and even some students failed to finish the experiment can only lab report for the inspection pass, this evaluation criteria is not worthy of our learning.

2 Higher Vocational College Electronic Information Experimental Course Reform Ideas In the new situation, higher vocational colleges should actively reform the education and teaching mode, aiming at the electronic information experiment major, because to cultivate students’ innovative spirit ability. Higher vocational colleges should attach importance to the electronic information experiment system and strengthen the rectification of the experiment content and facilities so as to form a relatively independent teaching system [2, 3]. The new electronic information experiment teaching system should be closely related to the social training of professional talents as the main plan, the teaching level should be clear, the assessment principle should also be reformed, the assessment requirements should be to the students’ practical ability as the main goal. In the reform process, higher vocational colleges must attach importance to the overall and systematic construction, and carry out the reform from the bottom up. The teaching content, teaching strategies and methods, laboratory management and faculty management of electronic information experiments should be designed reasonably and scientifically, so as to better promote the all-round development of students. Students of electronic information experiment course in higher vocational colleges are seldom allowed to carry out experiments except in class, so the experiment system should be reformed. The management of laboratory is not only the management of assets but also the main place to train students [3, 4]. In addition, the laboratory can also be opened so that students can have time to carry out experimental learning in addition to classes, which can strengthen students’ practical ability and innovation ability. The opening of laboratories can also be carried out at different levels [5]. Different laboratories can be opened according to students of different grades to enhance the opening efficiency of laboratories. In the process of opening the laboratory, the classroom should also strengthen the guidance and supervision of students so that students can understand the purpose of the experiment.

684

J. Xue et al.

3 Teaching Mode of Electronic Information Experiment Course in Higher Vocational Colleges The most important aspect of electronic information experiment course is the teaching mode of teachers, which is an important form to achieve teaching objectives efficiently and reasonably. There are several excellent teaching modes of electronic information experiment course. 3.1

Hierarchical Teaching Method

The hierarchical teaching method in electronic information experiment class can be divided into four levels 1. Preparing experiment teaching stage: at this stage is mainly electronic experimental teachers teach students the basic theoretical knowledge is given priority to, the emphasis of this process is the teacher’s leading role, through the experiment before the evaluation to make students understand the purpose of this experiment, the importance and significance, in the process of middle school students can be familiar with the process, and master some basic electronic information experiment data processing ability, can better let the electronic information experiment from theory teaching to practice teaching. 2. Basic experimental teaching stage: this stage is mainly to make students master the experimental methods and basic experimental operation steps. In this teaching process, teachers should attach great importance to this, and tirelessly explain to students, excluding students’ questions about this experiment. Such as the most basic: data processing, experimental results of the decision, report format, etc. These all need the teacher to carry on the strict request to the student, trains the student to treat the experiment the rigorous attitude and the good operation habit. In the process of teaching, teachers should also pay attention to heuristic teaching, to avoid the whole process boring, so that students lose interest. 3. Comprehensive experiment teaching stage: at this stage, students have mastered certain experimental basis, and with the improvement of students’ experimental operation ability, teachers should pay attention to students’ subject status and inspire students to think about experiments. The experiment is more difficult, and there are many ways to verify the experiment, which requires students to conduct the experiment independently or discuss with teachers. Students can create their own experimental procedures and experimental reports, process data, and design and improve them. 4. The innovation experiment teaching: teachers can will undertake to the student assessment at this stage, the emphasis at this stage is the subjectivity of the students, the students should give full play to its own innovative spirit and ability, under the guidance of teachers to self innovation of experiment, and finally the experiment scheme, general had better have more than two set of solutions. In this process, teachers can also discuss with students, select the best experimental scheme,

A Brief Analysis of the Investigation and Electronic Information

685

stimulate students’ thinking and promote students’ communication and learning, and take the experimental report of this stage as part of the assessment. 3.2

Experimental Method

This teaching method is based on the theory of trial and error of the famous educator thorndike [6, 7]. Students use the existing experience to make continuous attempts, and finally reach the conclusion after several attempts. For example, in the process of electronic information data processing, some data can be set as unknown by the teacher [8], which requires students to try it and come up with possible answers according to various considerations. Although this kind of experiment takes a little longer, students can constantly consolidate the experimental knowledge and principles they have learned in the process of trying, broaden their thinking patterns, stimulate their imagination, and cultivate their innovative spirit and ability.

4 Higher Vocational Colleges Electronic Information Experimental Teaching Assessment Requirements The electronic information experiment should be evaluated in a diversified mode rather than in a single experiment report or test paper. Since students in higher vocational colleges are relatively weak in general theoretical knowledge, in-class examination should be strengthened in the process of electronic information experiment teaching, with the average score accounting for about 50% [9, 10]. Secondly, in the final examination, students should combine experimental operation with theoretical test, open book examination with closed book examination and other forms. In addition, in the assessment process of experimental operation, students can also flexibly set questions or let students choose questions to solve problems, this form can effectively avoid the phenomenon of students copying each other. The significance of electronic information experiment teaching in higher vocational colleges 1. It can enable students to understand and master basic experimental theories. Experimental teaching is to help students better feel the process of knowledge generation, understand theories and master them. Because experiments are intuitive and realistic, some theoretical knowledge is abstract, and it may be difficult for students to understand and master it only when they explain it in class. Therefore, experiments can help students better master it. 2. To train students’ basic electronic information skills, students’ practical ability can be enhanced through experimental operation. In the new situation, students’ practical ability is more important, and experimental teaching is an important way to cultivate their practical ability.

686

J. Xue et al.

5 Conclusion In the process of electronic information experiment teaching in higher vocational colleges, we must adhere to the people-oriented teaching concept, so that students can master basic theoretical knowledge, practical operation ability, innovative spirit and promote the all-round development of students.

References 1. Guo, D., Hua, X., Wei, D.: New exploration on the reform of experimental teaching management mode in tsinghua university—design and implementation of experimental course selection system. High. Sci. Educ. (06) (2005) 2. Yuan, S.: Status quo and analysis of teacher-student relationship in higher vocational colleges. J. Xi An Aeronaut. Technol. Coll. (2) (2006) 3. Fang, Y., Wang, Y., Fei, J.: A comparative study on the experimental curriculum setting and talent training mode of mechanical engineering in Chinese and American universities. Exp. Technol. Manag. (10) (2011) 4. Youqin, Z., Ping, W., Zhu, C., Zhu, H.: Cultivating innovative talents by taking the innovative experimental plan of college students as an opportunity. Exp. Technol. Manag. (7) (2011) 5. Zhong, H., Huang, J, He, G.: Investigation of physics laboratory of Harvard University and thinking on physics experiment teaching in China. Lab. Res. Explor. (7) (2011) 6. Liu, j., Qiu, L., Li, D., He, Q., Zhang, Y.: Exploration and practice of constructing higher vocational personnel training mode based on “embedded”. J. Hunan Polytech. Inst. (5) (2010) 7. Xie, S, Yong, W.: Exploration on the construction and implementation of higher vocational talent training program based on “platform+module”—a case study of Guangzhou city vocational college. J. Guangzhou City Vocat. Coll. (3) (2009) 8. Wang, T., Cheng, W.: Research and practice of cdio-based innovative engineering talent training mode—practice of engineering education reform in chengdu institute of information engineering. High. Eng. Educ. Res. (1) (2010) 9. Hui, L., Yu, B., Tao, W., Lei, W., Heyong, C.: Development status of computer specialty experimental curriculum construction in colleges and universities. China Sci. Educ. Innov. Guid. (10) (2011) 10. Lilian, Y.: Collaborative analysis of quality education and talent cultivation in higher vocational colleges—a case study of the practice of quality education model in Tianjin vocational university. Vocat. Educ. BBS. (24) (2012)

An Algorithm for Predicting the Optimal Path of Forehand Hitting Long Ball in the Backcourt Ning Zhang and Feng Dong(&) Department of Physical Education, Xi’an University of Technology, Xi’an 710048, Shanxi, China [email protected] Abstract. Aiming at the low prediction accuracy and poor timeliness of the current optimal route prediction of arm movement, a method based on EMG for predicting the optimal route of the arm movement for backcourt forehand stroke of high flying ball is proposed. The local predictive controller is designed for each linear sub-model of arm movement so that it meets the control requirements in the corresponding subspace. Finally, the trapezoidal membership function is selected for weighted summation with the local predictive controller to obtain the global multi-model predictive controller. The experiment proves that the proposed method can accurately predict the optimal route of arm movement and the timeliness of prediction is good. Keywords: Backcourt forehand stroke of high flying ball Action  Optimal route  Prediction

 Arm movement 

1 Introduction Badminton is a sport which has the characteristics of fast, changeful and continuous power, and has high physical requirements. Because of the need of technique and tactics, the reserve of physical ability has higher requirements. Badminton is based on strength, speed and endurance, in which fast strength is the core content of strength quality training. After meeting the basic stability and flexibility functional requirements, the rapid development of power is listed as the key project. Fast ball speed, fast changing rhythm and fast movement all need good fast strength quality as support. The influence on the movement speed of forehand technique of badminton [1]. In order to monitor the skill of ball players and predict the score of ball players, the optimal route of the arm movement for backcourt forehand stroke of high flying ball needs to be predicted and analyzed. Through predictive analysis, the standard and practicality of arm movements are determined to ensure the quality of their training. Therefore, the prediction and analysis of the optimal route of the arm movement for backcourt forehand stroke of high flying ball is highly valued by relevant experts and scholars. In reference [2], the sEMG detection device based on active electrode and supporting software including signal acquisition, analysis, off-line identification and online identification modules are proposed. The system can collect four channels of sEMG data at the same time, and analyze it with 16 time-domain, frequency-domain © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 687–691, 2021. https://doi.org/10.1007/978-3-030-51556-0_103

688

N. Zhang and F. Dong

and time-frequency-domain methods. Seven methods of sEMG feature extraction and classification can be compared. But the motion path predicted by this method is not accurate. In reference [3], a feature extraction method based on the geometric distribution of gesture is proposed for gesture recognition. Firstly, the hand gesture image after segmentation is normalized, and the width to length ratio of the main direction of the hand gesture and the smallest circumscribed rectangle of the hand gesture contour is calculated, and the similarity function is used for preliminary recognition to select some candidate hand gestures; then, the contour segmentation method is used to count the distribution of the hand gesture contour points in polar coordinates, and the modified Hausdorff distance is used as the similarity measure to identify the final hand gesture. But the recognition time of this method is long. In reference [4], neural network ensemble (NNE) algorithm is applied to the field of human arm motion pattern recognition. Through the acquisition, analysis and processing of sEMG signals under different arm motion patterns, the corresponding arm motion patterns are identified. Wavelet packet decomposition (WPD) algorithm is mainly used to extract the timefrequency eigenvector of sEMG signal, and integrated neural network is used to identify the eigenvector of sEMG signal; neural network integrated model is generated by bagging algorithm, and the individual neural networks involved in the integration are BP neural networks, and the output of integrated neural network is generated by the output of single neural network through relative majority voting method Life. But this method is not effective. At present, the most efficient route prediction of arm movements is achieved through the identification of electromyography (EMG) signals [4], and the muscle EMG signal is used to recognize motion state. The EMG and joints angle signal are collected and applied for EMG feature extraction with neural network model, and by error inversion learning method to optimize the weight of all layers of the network to map the relationship between the EMG signal and the state of motion. Due to the good timeliness of this method, this method has drawn the attention of relevant experts and scholars. This method has also become a hot topic of research and has produced a great deal of research results. This paper proposes a method of predicting and analyzing the optimal route of arm movement for backcourt forehand stroke of high flying ball based on EMG signal. The experimental results show that the proposed method can effectively reduce the timeconsuming of predictive analysis and ensure timeliness of predictive analysis, and predictive analysis of higher accuracy [5].

2 Prediction and Analysis of Optimal Routes for Arm Movement Lob is one of the techniques of backcourt hitting. Lob is divided into high ball and high ball. To hit the high ball is to hit the ball high and far, the ball to the opponent’s baseline is developed from the high ball, it flies faster than the high ball, the arc is lower than the high ball, is one of the effective offensive techniques in the back field. Lobs can be divided into forehand, overhead, backhand straight and diagonal lobs. When predicting the optimal route of arm movement, it is necessary to predict the motion state of forehand hitting arm.

An Algorithm for Predicting the Optimal Path of Forehand

689

The state equation of arm movement for forehand stroke of high flying ball in the backcourt is established: 

xðtÞ ¼ GxðtÞ þ HuðtÞ þ f ðxðtÞÞ yðtÞ ¼ ExðtÞ

ð1Þ

In the above formula, xðtÞ ¼ ½ hm ðtÞ xm ðtÞ h1 ðtÞ x1 ðtÞ T , where hm ðtÞ represents the rotation angle of arm movement, xm ðtÞ is the angular velocity of arm movement [6]. The control input changes only from k to k þ M  1, and then remains unchanged, so ui ðk þ MÞ ¼ ui ðk þ M  1Þ ¼    ¼ ui ðk þ P  1Þ; P is the prediction time domain and M is the control time domain [7]. In order to make the initial predictive output of arm movement at the next moment as accurate as possible, it needs to be corrected with error, namely: Y^i0 ðk þ 1Þ ¼ Yi0 ðk þ 1Þ þ LeðkÞ

ð2Þ

where: Y^i0 ðk þ 1Þ is the initial predicted output of the corrected value at future P moments; L is the P-dimensional column vector with element 1. @Ji ðkÞ ¼ 0, where, Ji ðkÞ is the arm inertia of forehand stroke for high flying ball Let @DU i ðkÞ at the backcourt, the optimized DUi ðkÞ can be obtained: DUi ðkÞ ¼ FiT Qi Fi þ Ri

1

  FiT Qi Wi ðk þ 1Þ  Y^i0 ðk þ 1Þ

ð3Þ

The optimal control increment Dui ðkÞ and ui ðk  1Þ of the current moment are added to get the control input ui ðkÞ at the current time, which can be used as the output of the local controller [8, 9]. Through the above discussion, the local predictive controller is designed for each linear sub-model of arm movement to make it meet the control requirements in the corresponding subspace. Finally, the trapezoidal membership function and the local predictive controller are performed with weighted summation to obtain the global multi-model predictive controller, so as to achieve the prediction and analysis of the optimal route of arm movement [10].

3 Experimental Results and Analysis In order to verify that the proposed method can accurately and quickly predict the best path of backcourt forehand long pass, the experimental environment is set as follows. In this paper, optimal route prediction and analysis of four kinds of arm movement of backcourt forehand stroke for high flying ball is implemented in the GUI interface platform of MATLAB, the GUI interactive interface is utilized, so that experiments can be conducted in an orderly manner. Four sets of cross-validation experiments were performed on 160  8 samples taken from arm movement. The samples of each crossover experiment were 40  8,

690

N. Zhang and F. Dong

and four kinds of arm movement mode in each group have 10  8 matrix samples, and then each group of the samples was tested with 10 fold cross-validation experiment, that is, 9 samples of each arm movement mode were regarded as training samples, and 1 sample as the test sample. Then, 10 recognition rates were averaged and regarded as the final correct prediction of recognition rate. The experimental results are shown in Table 1.

Table 1. Experiment results of cross-validation test Action

Before hitting Before swing While hitting After hitting

Cross validation group First group (%) 95 Before hitting 90 Before swing 100 While hitting 95 After hitting

First group (%) 95 90 100 95

Before hitting Before swing While hitting After hitting

First group (%) 95 90 100 95

From the experimental results, we can know that in the four cross-validation tests, the average correct recognition rate of each arm movement pattern is above 91%, while the correct recognition rate is the highest in the same set of cross-validation experiments, it’s above 95%, while the average recognition rate is 98.75%, which shows that the proposed method can accurately predict the arm movement.

4 Conclusions The arm movement for backcourt forehand stroke of high flying ball is the basic and important movement in badminton, the optimal route prediction analysis can identify the standard of arm movement, which provides technical support for badminton training smoothly. In this paper, a method based on EMG signal is proposed for predicting the optimum route of arm movement for backcourt forehand stroke of high flying ball. A local predictive controller is designed for each linear sub model of the arm motion to meet the control requirements of the corresponding subspace. Finally, the trapezoid membership function and the local predictive controller are selected for weighted summation to obtain the global multi model predictive controller. The experimental results show that the method proposed in this paper can accurately predict arm movement, and the timeliness of prediction is better.

An Algorithm for Predicting the Optimal Path of Forehand

691

References 1. Liu, D., Wang, X., Pian, J.X.: Inertial motion tracking algorithm for human arm based on Lie algebra. J. Shenyang Univ. Technol. 39(1), 73–77 (2017) 2. Wong, Y.T., Fabiszak, M.M., Novikov, Y., et al.: Coherent neuronal ensembles are rapidly recruited when making a look-reach decision. Nat. Neurosci. 19(2), 327–334 (2016) 3. Wu, Y.L., Zhang, X.B.: Dynamic arm three dimensional posture recognition based on device and simulation. Comput. Simul. 33(7), 369–372 (2016) 4. Zhao, W., Hao, Y., Shi, Y.B., et al.: Kinematic analysis of backcourt forehand hit the lofty goals of Amateur badminton player in Gansu Province. Anhui Sports Sci. Technol. 38(1), 32–36 (2017) 5. Vokac, Z., Bell, H., et al.: Oxygen uptake/heart rate relationship in leg and arm exercise, sitting and standing. J. Appl. Physiol. 39(1), 54–59 (1975) 6. Shoushtari, A.L., Abedi, P.: Realistic dynamic posture prediction of humanoid robot: manual lifting task simulation. Lect. Notes Artif. Intell. 7506, 565–578 (2012) 7. Woo, H., et al.: A 3D kinematic analysis of the squash forehand stroke. J. Biomech. 7(25), 720 (1992) 8. Bahamonde, R.E., Knudson, D.: Kinetics of the upper extremity in the open and square stance tennis forehand. J. Sci. Med. Sport 1(6), 88–101 (2003) 9. Arash, A., Salarieh, H., et al.: Human arm motion tracking by inertial/magnetic sensors using unscented Kalman filter and relative motion constraint. J. Intell. Rob. Syst. 1(90), 161–170 (2017) 10. Tao, Y., Hu, H.: A novel sensing and data fusion system for 3-D arm motion tracking in telerehabilitation. IEEE Trans. Instrum. Measur. 57(5), 1029–1040 (2008)

Feature Extraction of Basketball Shooting Based on Apriori Algorithm Wei Zou(&) and Zhixiang Jin Sports Department, Huazhong Agricultural University, Wuhan 430070, China [email protected]

Abstract. To enhance the extraction and detection of basketball shooting feature and guide basketball training, an improved intelligent line breakage extraction method based on Apriori algorithm is proposed under computer vision. The template feature matching method is used to find the initial pixel cluster center of the basketball shooting action feature point visual image, and the false action information in the basketball shooting action feature image is eliminated by the gradient information enhancement method. The Apriori algorithm is used for image enhancement to realize the intelligent extraction and location of basketball shooting action feature, and to improve the ability of normative recognition of basketball shooting action. The proposed method realizes intelligent extraction of basketball shooting action features. Keywords: Apriori algorithm

 Basketball shooting  Feature extraction

1 Introduction Basketball is one of the most popular ball games, basketball shooting is the key to score. Based on basketball shooting video tracking recognition, extraction of basketball shooting action characteristics, and image processing technology for trajectory analysis, the accuracy of basketball shooting can be improved. Traditional methods have weak adaptability in actual application. In this work, an improved intelligent line breakage extraction method based on Apriori algorithm is proposed, which can enhance the extraction of basketball shooting action feature.

2 Principle and Problem Description of Basketball Shooting Feature Detection 2.1

Principle of Basketball Shooting Feature Detection and Visual Acquisition

The sensor data acquisition method is used to extract the edge contour information of the basketball shooting action feature point visual image. The intensity of the receiving reflectance field of the basketball shooting action feature point visual image is n ¼ 0, D1 ¼ 1. Then the initial pixel cluster center of the image is found by using template feature matching method. According to the template feature matching algorithm given © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 692–696, 2021. https://doi.org/10.1007/978-3-030-51556-0_104

Feature Extraction of Basketball Shooting Based on Apriori Algorithm

693

in reference [1], Construction of the pixel feature points of the shooting action image, ^ n is: and the total average distortion of the remotely captured image for the A m1 X ^n; A ^ n ÞgÞ ¼ 1 min dðxj ; yÞ Dn ¼ DðfPðA m j¼0 y2A^ n

ð1Þ

In the computer visual feature acquisition of basketball shooting action feature node, the angle of calculation image will be deviated randomly according to the change of acquisition sensor. Through the above processing, the accurate visual feature observation value can be obtained, and the visual deviation can be avoided. The accuracy of detection is improved [2]. 2.2

Extraction of Feature of Basketball Shooting Action Image Based on Pixel Feature Quantity Monitoring Image

Through acquisition of the pixel characteristic quantity of the shooting action image mentioned above, in order to accurately locate and identify the damaged nodes and realize the intelligent extraction of the damaged nodes, and the wavelet decomposition method is adopted to calculate the l ¼ 0; 1;   ; N of the image. The wavelet analysis function is: Kmin ¼ bKpoly þ ð1  bÞKrbf ;

b 2 ð0; 1Þ

ð2Þ

Where, Kpoly ¼ ½ðx  xi Þ þ 12 represents edge feature kernel function of basketball shooting feature point visual image, KRBF ¼ expðckx  xi k2 Þ denotes space state vector of Mallat wavelet, and grayscale separation of visual image. The basketball shooting action feature point visual image shooting action image pixel feature point and intact area binary separation results are obtained as: 8 d d d d > < Vi ðt þ 1Þ ¼ W  Vi ðtÞ þ C1  R1  ðPbest ðtÞ  Pi ðtÞÞ þ C2  R2  ðGdbest ðtÞ  Pdi ðtÞÞ > : Pdi ðt þ 1Þ ¼ Pdi ðtÞ þ Vid ðt þ 1Þ

ð3Þ

Where, Vid ðtÞ, Vid ðt þ 1Þ, Pdi ðtÞ, Pdi ðt þ 1Þ are the Mallat wavelet feature intensities of basketball shooting action feature point visual image. In the process of visual monitoring and extracting, the control of the whole system will affect the camera angle change according to the change of the pixel feature of the shooting action image [3]. The texture feature measurement value of pixel feature point of shooting action image is Zk ¼ fz0 ; z1 ;    ; zk g and the grayscale pixel feature is extracted as follows: ð0Þ

aðcj Þ ¼ A3 ecj =T3 ; fcj

¼ 0; j ¼ 0; 1;   ; N  1g

ð4Þ

694

W. Zou and Z. Jin

According to the above grayscale feature extraction results, the discrete form of the video stepwise tracking state equation and observation equation of basketball shooting action feature points is obtained as follows: xðk þ 1Þ ¼ Ui ðkÞxðkÞ þ wi ðkÞ i ¼ 1; 2;    ; m zðkÞ ¼ Hi ðkÞxðkÞ þ vi ðkÞ i ¼ 1; 2;    ; m

ð5Þ

Where, wi ðkÞ is the the state noise and vi ðkÞ is the observation noise of basketball shooting feature; Qi ðkÞ and Ri ðkÞ are variance subjected to normal distribution of S j ðkÞ. Therefore, the visual features of the image can be effectively used in the visual monitoring and recognition of basketball shooting action features by using the pixel feature quantity of the shooting action image extracted by the method in this paper [4].

3 Intelligent Feature Extraction of Basketball Shooting Based on Apriori Algorithm The state equation and observation equation of pixel feature point location of basketball shooting action vector xðtÞ ¼ ½xðtÞ; yðtÞ; zðtÞ; x_ ðtÞ; y_ ðtÞ; z_ ðtÞ; €xðtÞ; €yðtÞ; €zðtÞT are expressed as follows: xðk þ 1Þ ¼ UðkÞxðkÞ þ wðkÞ

ð6Þ

The feature image of basketball shooting action can be divided into K segmentation regions and multi-dimensional search iteration for K segmentation area. The texture subspace of the image is represented as: " # x y



cos h ¼ sin h

 sin h cos h

" # n g

ð7Þ

In the process of calculation, in order to realize the security monitoring of basketball shooting action feature point, by pre-setting the threshold K, the feature points of basketball shooting action with abrupt changes and smooth regions is distinguished, the adaptive basketball shooting action feature extraction is realized.

4 Simulation Simulations were carried out to evaluation the performance of the proposed method in extraction of basketball shooting action feature based on Apriori algorithm. An intelligent image data acquisition system for basketball shooting action characteristics under remote computer vision is constructed. The performances of existing methods in reference [3] and [4] and proposed method were compared, as shown in Table 1.

Feature Extraction of Basketball Shooting Based on Apriori Algorithm

695

Table 1. Comparative analysis of performance testing Iterations 100 200 300 400

Proposed method Reference [3] Reference [4] 0.968 0.872 0.853 0.987 0.923 0.879 0.999 0.954 0.923 1 0.968 0.945

The proposed method and the traditional method were both used to evaluated the location accuracy of pixel feature points in shooting action image, and performance comparison is shown in Table 1. From the Table 1, we can see that the method in this paper increases with the number of iterations. With the increase of test samples, the accuracy of basketball shooting action feature localization is improved, and the intelligent extraction of basketball shooting action feature based on Apriori algorithm is realized, and the performance is superior [5–7].

5 Conclusions In conclusion, an improved intelligent line breakage extraction method is proposed based on Apriori algorithm under computer vision. the proposed method can achieve accurate information analysis and brings high accuracy in extraction and detection of the basketball shooting action, so as to realize the intelligent extraction of basketball shooting action features [8–10]. The proposed method has good application value in guiding basketball training.

References 1. Hoyle, C.E., Lowe, A.B., Bowman, C.N.: Thiol-click chemistry: a multifaceted toolbox for small molecule and polymer synthesis. Chem. Soc. Rev. 39, 1355–1387 (2010) 2. Huang, H.W., Ge, X.T., Chen X.S.: Density clustering method based on complex learning classification system. J. Comput. Appl. 37, 3207–3211 (2017) 3. Zhang, B.Z., Gui, X., He, T., et al.: A novel recommender algorithm on fusion heterogeneous information network and rating matrix. J. Comput. Res. Dev. 51, 69–75 (2014) 4. Lin, X.Y., Dai, L.L., Shi, S.H., et al.: Matrix factorization recommendation based on topic model. J. Comput. Appl. 35, 122–124 (2015) 5. Wang, X.Y., Zhan, Y.Z.: A watermarking scheme for three-dimensional models by constructing vertex distribution on characteristics. J. Comput.-Aided Des. Comput. Graph. 26(2), 272–279 (2014) 6. Weihong, W., Qin, Y., Dandan, J.: Object-oriented remote sensing image classification based on GEPSO model. Comput. Sci. 42(5), 51–53 (2015) 7. Le, B., Guanying, H., Qingwu, L.: Multi-threshold MRI image segmentation algorithm based on Curevelet transformation and multi-objective particle swarm optimization. J. Comput. Appl. 36(11), 3188–3195 (2016)

696

W. Zou and Z. Jin

8. Li, J.Y., Dang J.W., Wang, Y.P.: Medical image segmentation algorithm based on quantum clonal evolution and two-dimensional tsallis entropy. J. Comput.-Aided Des. Comput. Graph. 26(3), 465–471 (2014) 9. Rui, L.L., Zhang, P., Huang, H.Q., et al.: Reputation-based incentive mechanisms in crowdsourcing. J. Electron. Inf. Technol. 38(7), 1808–1815 (2016) 10. Yu, T., Hu, B., Gao, X., et al.: Research on dynamic tracking and compensation method for hyperspectral interference imaging. Acta Photonica Sin. 45(7), 0710003 (2016)

Innovative Design of Mouse Based on Cloud Computing Chen Jinxia(&) Institute of Information Technology of GUET, Guilin 541001, China [email protected] Abstract. As ergonomics emphasizing “human-oriented”, under the premise of human-oriented theme, the physiological damage of mouse to human body under frequent repeated operation is fully considered with anatomical principles to analyze the design factors of human hands when operating mouse and carry out innovative design of mouse so as to reasonably apply ergonomics to product design. Keywords: Ergonomics

 Mouse  Innovation  3D rocker

1 Introduction As a very common and often used computer input device, the mouse can locate the cursor on the current screen and operate the screen elements where the cursor passes through with the keys and roller device. According to the investigation and analysis of mice at home and abroad, it is found that most of the users of mouse are office workers. People who sit in front of computers for a long time and operate the mouse have more or less suffered from wrist pain, shoulder numbness, inflexible finger joints and other phenomena [1, 2]. If they are ignored, nerve damage and muscle necrosis may result. Therefore, we hope to design a new type of mouse that not only reflects the characteristics of office products, but also takes into account the concept of health in order to release the perplexity caused by this IT occupational syndrome.

2 Analysis of the Disadvantages of Traditional Mouse Elated Work and Background Knowledge As an indispensable tool in modern people’s work and life, most of the mice have not reached the optimal state in terms of design with their shape and size not conforming to the principle of ergonomics, so the traditional mouse design can no longer meet the requirements of modern life and work. The mouse we use now is generally “prone” on the desktop, with the left and right keys parallel to the desktop. When using the mouse, we usually use the wrist as the supporting point, which will cause the palm and the supporting surface of mouse to be difficult to fit and lead to the bone in a crossed state, causing the forearm to twist with the distance between the mouse and the body to be widened as the mouse is placed on the desktop for use [3]. If you use a mouse that does © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 697–702, 2021. https://doi.org/10.1007/978-3-030-51556-0_105

698

C. Jinxia

not conform to ergonomics for a long time, it is easy to suffer from wrist soreness and right arm weakness in severe cases, so constant working with this type of mouse will not only cause wrist syndrome, but also cervical spondylosis [4, 5] (Fig. 1).

Fig. 1. Traditional mouse causes meridian distortion

3 Ergonomics in Mouse (1) Ergonomic Principles Ergonomics in mouse is essentially to meet people’s comfort to the greatest extent with its usage as suitable as possible for the natural form of human body. With the ergonomic design of the mouse focusing on the modeling design of the mouse, we need to first understand the anatomical structure of the human hand for studying this topic, so the design of the mouse must match the contour shape of the palm of the human hand to maintain an appropriate and comfortable posture when holding the mouse with the principles of anatomy and ergonomics in the design necessary to be followed. (2) Relationship Between Human Hand Structure and Mouse Operation Due to the long-term use of poorly designed mice, many people suffer from physical discomfort, injuries and diseases with reducing work efficiency and increasing people’s physical and mental pain (Figs. 2 and 3).

Fig. 2. Volar view model of human hand

Fig. 3. Wrist motion state

In order to make the mouse suitable for long-term computer users, it is necessary to study the anatomical function of human hand. When operating the mouse, the forearm relies on the interlacing of the main bones including ulna, radius, etc. to complete the

Innovative Design of Mouse Based on Cloud Computing

699

rotation of the wrist, of which a wrist bone plays a major role in the wrist structure with its rotation to enable the wrist to perform dorsiflexion and volar movement, and the palm of the human hand is mainly composed of two groups of muscle groups with a depression formed between the two muscle groups and the main nerves, blood vessels and ligaments of the human hand collected at the depression. (3) Anatomical Factors of Mouse Design 1 Avoiding static muscle force ○ When using the mouse, the arm being in a twisted state and the palm gripping for a long time will make the shoulder, arm and hand muscles bear static load so as to result in fatigue and reduce work efficiency. For the upper arm and palm, they will feel more comfortable to use the mouse in a natural posture, for example, when the upper arm and palm are laid flat on the desktop with the outer side of the palm contacting the desktop, and the upper arm and palm being in a state close to vertical with the desktop, then the main muscles and blood vessels of the upper arm will not be distorted, even if the posture is maintained for a long time, muscle fatigue and hypoxia will not occur. Duocai has introduced a vertical mouse that fully meets the requirements of ergonomics in design idea. 2 Keeping the wrist straight ○

When the wrist is in a straight state during operation, the wrist joint should be in a relaxed state in the middle, but when the wrist is in a twisted state such as palm flexion, back flexion and ruler deviation, wrist soreness will occur. According to the principle of ergonomics, the comfortable height of the mouse bow should keep the back of the human hand at an angle of 15–30 with the desktop in the shape of a semi-clenched fist (as shown in Fig. 4). If it exceeds this range, the forearm muscles will be stretched and blood flow will be impeded. 3 Avoiding the palm from being under great pressure ○ Due to the collection of many nerves and blood vessels in the muscle group of human palm, if the mouse is not designed properly, it will cause great pressure on the palm and fingers to hinder the circulation of blood in the ulnar artery, which will lead to ischemia, numbness, tingling, etc. For the palm, its most natural form is the halfclenching state, so the modeling design of the mouse should conform to this form as much as possible. The ergonomic radian perfectly fits the palm curve with full and perfect grip feeling (as shown in Fig. 5), i.e. when the fingers stretch naturally, all five fingers are not suspended with being in a state of about 150°. Meanwhile, the belly of the third section should be just on the microswitch of the mouse button, so as to obtain the best button feel.

700

C. Jinxia

Fig. 4. Comfortable mouse bow height

Fig. 5. Ergonomic arc

4 Innovative Design of Mouse (1) Analysis of Several Problems in Mouse Use and Improvement Programs Size and shape. For the design of mouse, we should not only pay attention to the static body size, i.e. palm width and radian, knuckles, etc., but also consider the dynamic body size. According to the analysis of human anatomy that the wrist “lifts up” between 15–30° and the finger assumes about 150° to keep themselves in a natural stretching state, the mouse needs to move frequently in use and the mouse is used depending on the range size generated by the coordination of the angle generated by the joint movement and rotation as well as the limb. However, as people are always moving, this scale is an active and variable, instead of maintaining a certain rigid structure. Optical tracking. Since the optical engine of the optical mouse determines the cursor orientation by receiving the feedback image, the mouse cannot work normally on smooth surfaces such as glass, metal or some special color surfaces. This is because the moving surface is too smooth to generate enough diffuse reflection light and the intensity of the reflected light received by the sensor is very weak so as to make the positioning chip unable to determine, thus causing the mouse to work abnormally. However, the 3D joystick operation completely gets rid of the limitation of this twodimensional surface, which adopts the leading 3D joystick mouse technology that makes the traditional mouse breaking away from the dependence on the desktop and upgrading to an air mouse to realize the 3D joystick operation. Material selection. The selection of materials for the mouse is also very important, because the materials cannot be too heavy or too light. If the materials are too heavy, it will cause inconvenience to the movement of the mouse, and if the materials are too light, it will make the mouse slide freely on the desktop, causing great influence on the operation of the mouse. When using the mouse, the mouse often slides off the hand due to sweaty palms, and sweat stains also corrode the mouse shell to a certain extent with being not easy to clean and maintain. (2) Design of 3D Rocker Mouse with Controllable Angle The main design purpose of the 3D rocker mouse with controllable angle is to reduce or eliminate the grip force required for moving and clicking by traditional mouse, which can provide comfortable support for the user’s palm instead of passively grasping and

Innovative Design of Mouse Based on Cloud Computing

701

controlling it with ergonomic design. With 3D remote sensing technology, the mouse can adjust and control the mouse axis according to various scales to adapt to the palm of the user to enable the user to find the desired comfort with back and forth, left and right move, and use the mouse in a natural posture as much as possible, so that the user is not necessary to move laboriously the mouse of uncomfortable and clamp the sides of the mouse for adaptation and with the finger to excessively bend back to click the button. An obvious convex block is designed on the top of the mouse, which just fills the empty area of the palm, so that the palm can be placed on the surface to relax with the hand and wrist bones being leveled, and the wrist is slightly raised above the working surface, which is helpful to break the bad habit of using the traditional mouse, namely, the wrist is placed on the desktop or the mouse pad to move the mouse with hand rotation that can cause the forearm bones (ulna and radius) to twist and generate pain. The design of lengthened key can be touched by fingers, while the design of lengthened touch bar can make the tendon of fingers fully stretched with touching the function keys of the mouse without bending fingers. Compared with the traditional and smaller mouse, most people bend their fingers back to touch the button, while this 3D rocker mouse can make their hands placed on the mouse and touching the button with little force without bending their fingers (Fig. 6).

Fig. 6. Moneng 3D rocker mouse

5 Conclusion Since the first mouse appeared, the development of mouse has experienced from mechanical to light, from wired to wireless. Although the control technology is constantly updated and developed and high-end products emerge in endlessly, the mouse still cannot be replaced. Mouse is currently one of the products with the highest usage rate in the world with its users being all over various types of office workers, designers, students, etc. With the experience and comfort of the mouse having a direct impact on the work efficiency, and various diseases caused by long-term use of the mouse disturbing people’s physical and mental health, the future mouse will develop towards a more humanized direction. In addition to the necessary aesthetic design, advanced optical sensors and more comfortable hand feeling will be the main development direction of the mouse in the future.

702

C. Jinxia

References 1. Yulan, D.: Ergonomics. Beijing Institute of Technology Press, Beijing (2002) 2. Yang, Y.: Application of Ergonomics. China Light Industry Press, Beijing (2000) 3. karau, H., Huang, Y., Lei, Z., trans.: Spark Rapid Data Processing, pp. 47–84. China Machine Press, Beijing (2014) 4. Lei, Y.: Ergonomic application analysis in vertical mouse design. Packag. Eng. 8, 56–57 (2011) 5. Xiaoli, W.: Application of human-machine manual control principle in mouse design. Mech. Des. Res. 8, 77–78 (2009)

Teaching of Secretary Based on Mobile Phone Teaching Software Application Yang Jie1(&) and Yang Jing2 1

2

Yunnan Jiaotong College, Kunming, China [email protected] YunNan Branch, Agriculture Bank of China, Kunming, China [email protected]

Abstract. With the rapid development of smart phones and mobile network technologies, modern secretarial work has begun to change, some skills are weakening, and some skills require higher and higher requirements. As a secretarial major, its practical teaching is to improve the professional teaching effect also brings new opportunities. In the face of this phenomenon, how vocational secretarial majors use smartphone software to improve the practice teaching system, so as to cultivate secretarial talents that meet the needs of the market in this era is worth pondering. Keywords: Mobile phone

 Teaching software  Practical teaching

1 The Background of Practical Teaching in Mobile Phone Teaching Software With the continuous update of smartphone software and hardware technology, today’s smartphones are compact, lightweight, and easy to carry. Therefore, modern society has almost a mobile phone, and as a new generation of post-98 college students, it is almost a manual one. The mobile network is also developing at a high speed. In the era of 4g to 5g, smartphones have gradually become a mobile medium. Now people’s lives can not be separated from mobile phones, and mobile phones have become a learning tool. It can provide a good learning platform for everyone [1]. Nowadays, the time of college students is fragmented. Mobile phones can be used as a medium to utilize student fragmented time. This new learning mode will attract students. With the help of mobile phone software, the practice teaching of secretarial majors will be conducted. The link is closely combined with mobile software, providing students with rich teaching resources, learning materials, teaching videos, audio, etc., and setting up special sections such as answering links, online tutoring, and test assistants. Students can easily download and learn from mobile phones. Resources acquire knowledge, the subjective status of students’ learning is strengthened, and their learning initiative and enthusiasm are improved [2]. The traditional secretarial work is a paper pen, which basically can complete most of the work. But with the development of the times and the popularity of smart phones, the current secretarial work must also keep pace with the times, and its functions are © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 703–707, 2021. https://doi.org/10.1007/978-3-030-51556-0_106

704

Y. Jie and Y. Jing

becoming more and more powerful. Many secretarial tasks can be completed on mobile phone software, saving time and cost and improving work efficiency. As a vocational college, it is necessary to keep pace with the times in training students. Therefore, it is necessary to improve teaching conditions in the practice teaching of the secretarial specialty. Make full use of the software of the smartphone, improve its professional practicability, and increase its gold content.

2 The Characteristics of Traditional Practice Teaching (1) Traditional practical teaching attaches importance to the teaching of theoretical knowledge The teaching methods of many vocational colleges are still mainly based on teachers’ teaching of theoretical knowledge. Teachers’ lectures, students’ listening, and purely theoretical teaching. The teaching methods are single and rigid, and the theory and practice are not combined. There are many gaps in practical teaching requirements [3]. From the perspective of the curriculum setting of the secretarial major in many colleges and universities, the proportion of theoretical courses is large, and the proportion of practical courses is small. In addition, whether it is theoretical courses or practical courses, the major is to cultivate humanities. Most of the practical courses basically follow the teaching of theoretical knowledge. Of course, there are also many colleges that position the core skills of secretarial students: cultivating essays and conferences, but these schools only talk about official documents theoretically. The knowledge of writing, training on writing topics, meeting procedures, meeting schedule considerations, etc., lack practical training. These teaching methods seem to be inconsistent with the requirements of higher vocational colleges. Such teaching methods are not effective for students to master skills. Obvious [4]. (2) Insufficient practical teaching and unfamiliar students’ skills At present, many vocational college students do not have outstanding skills or mastery of skills, which has a lot to do with the lack of practical teaching and skills training. First, in recent years, with the development of vocational colleges, Many schools have begun to attach importance to practical teaching, but many schools have simple training equipment and low training simulation. In addition, the lack of training teachers will affect the enthusiasm of students and decrease their motivation. Participation is not enough, so the effect of practical teaching is not obvious. Second, although many universities actively build on-campus training platforms, after all, they can provide limited training positions, and the on-campus training platforms are different from enterprises, such as: job content, In terms of working methods, institutional settings, management systems, etc., this has resulted in a low degree of practical teaching simulation. Slowly, this practical teaching has evolved into formality and cutscenes, which is a waste of time and students can not learn any skills.

Teaching of Secretary Based on Mobile Phone

705

(3) The lack of novelty in the design of practical teaching The practice teaching of the secretarial major in many colleges and universities still stays in the scope of book knowledge. The students’ practical skills are rarely trained. During the class, students will feel that the theory is told a lot, the content is boring and tedious. The reason is because many schools Teach pure theoretical content on the teaching content of the practice class, and let students train at will in the classroom. The content of the practice teaching is outdated and there is no novelty in pure theoretical teaching. Students are not interested in such practical classes, and many students just cope. (4) Outdated practice teaching equipment The secretarial major is a highly practical major, and normal teaching cannot be separated from practical equipment. The reality is that many colleges and universities have insufficient investment in the practice teaching equipment of the secretarial major, which has led many teachers to practice teaching. It is difficult to carry out teaching tasks. Most of them are walking through the classroom and coping with things, and over time, the phenomenon of air-to-air appears, causing practical teaching to flow in form and surface, and it is difficult for students to learn substantial content.

3 Advantages of Applying Mobile Phone Teaching Software Today’s smartphone is a mobile multimedia medium. In addition to communication, entertainment, and information transfer functions, it also has auxiliary functions for learning and teaching. (1) Bring innovation in teaching Teachers can use the data on the mobile phone software platform to always grasp the weak points of students’ learning, so that later teachers can adjust their teaching progress, teaching content, teaching methods, teaching design, etc. in a timely manner according to specific conditions. It is necessary to have a variety of abilities and literacy to meet the requirements of mobile software teaching. The practical teaching of mobile software has changed the traditional teacher-centered teaching mode and gradually turned to student-centered. And do a good job of online and offline guidance. The requirements for teachers of mobile phone software practical teaching are not only to design the entire teaching process, but also to prepare scenario presets, resource question banks, data sharing, practice exercises and other content. Facing society According to the demand for secretarial professional compound talents, teachers can use the advantages of mobile phone software to innovate in practical teaching according to the nature of certain courses, such as: “Etiquette Lesson” students upload their etiquette training assignments to mobile phone software Teachers can watch student assignment videos and guide them repeatedly. One to one guidance system in the form of counseling to students, which helps to save time, but also be able to guide every student.

706

Y. Jie and Y. Jing

(2) Expansion of practical course path The practice teaching of secretarial major is not limited to textbooks, classrooms, etc., you can use mobile phone software to arrange various practical teaching tasks. For example: Take a course of practical teaching as an example: Teachers upload learning materials through mobile phone software before class— students log in to study independently through mobile phones from time to time—the students independently complete the tasks of practical teaching arrangements—when in doubt, leave a message in the message area—the teacher’s Questions and Answers Concerning the Content -Comment and grade the assignments submitted by the students one by one. This practical teaching can be carried out anytime, anywhere, and it is not necessary to use any training equipment to complete the entire practical teaching with ease and content. (3) More convenient communication between teachers and students The traditional teaching mode is basically the classroom and the training room, and the interaction between the teacher and the student is just a few tens of minutes in the classroom. Under the condition of the smartphone application, the teacher can publish various messages, materials, and documents through the software on the mobile phone. Many tasks such as knowledge preparation, content teaching, and homework submission can be performed in the classroom or outside the classroom with the help of mobile phone software. At the same time, the daily management of students can also be performed on the mobile phone software. Completed, students can ask the teacher any questions on the software. The communication and interaction between students and teachers is not limited to the classroom, and the communication area is expanded and more convenient. (4) The quality of practical teaching has been improved The practice teaching of secretarial major based on the mobile phone software platform is different from the previous practice teaching. Most of the previous practice teaching was carried out through classroom exercises, simulated scenarios, role deduction, etc., which can also promote students’ theoretical knowledge to a certain extent. Combined with practical skills, but many of the exercises are hypothetical after all, a bit of cut-scene taste, and students will lack of realism in training. Then mobile phone software is used to assist teaching. According to the requirements of each practical class, students must put words, The uploading of pictures, videos, audios and other content will promote students to a certain extent. Each student will strictly ask himself and take every task and requirement seriously, so the overall practical teaching has gained something.

Teaching of Secretary Based on Mobile Phone

707

4 Conclusions In short, practical teaching in the era of mobile phone software requires teachers to change their educational concepts, make everything student-centered, make full use of modern education methods and technologies, serve teaching, form resource sharing, and apply new teaching models. In practical teaching, train students to master solid skills.

References 1. Ying, L.: Questionnaire survey on the practice teaching reform of the student association of higher vocational secretarial majors. Contemp. Vocat. Educ. (01) (2017) 2. Li, Y.: Research on the status and countermeasures of the practice teaching of Secret Major under the background of “Internet +”. Yangtze River Ser. (22) (2018) 3. Tuo, H.: Design of practical teaching system for secretarial major in higher vocational education in the “Internet +” era. Off. Bus. (06) (2017) 4. Juan, W.: Analysis of the current situation and countermeasures of the training teaching of secretarial major in higher vocational colleges under the background of “Internet +” era

Design of Teaching System of College Students Based on KNN Algorithm Hao Yifeng(&) Guangdong University of Finance and Economics, Guangzhou 510320, China [email protected]

Abstract. The virtual community of college students has become a new platform for college ideological and political education in the new media era. The article selects a university’s new media integrated service platform as the research object, uses the platform’s virtual community chat content as the data source, and uses ROSTCM content mining software to analyze the data. It analyzes the overall characteristics of political theory teaching network structure and members’ participation roles. Summarizes and summarizes the interpersonal relationships and information dissemination characteristics of the online community, and based on this, puts forward suggestions and suggestions on the perfect function, rich content, and operation and management of the community, so as to improve the effectiveness and scientificity of ideological and political education on the Internet. Keywords: Data mining Social network analysis

 Content mining  ROSTCM  Political theory 

1 Introduction The new media has profoundly changed people’s lifestyle, thinking habits and social patterns. According to statistics from the 39th China Internet Network Information Center (CNNIC) in January 2017, the proportion of Internet users in the 20–29 age group reached 30.3% [1]. The online virtual community has become a space field for college students’ gathering activities. The members of the community make the virtual network of the social network virtual through the participation of information exchange, knowledge sharing, social interaction and social support. This paper uses social network analysis methods to study the overall characteristics of virtual communities and the role of members, and through data collation, it excavates and presents the operation and social participation of college students’ virtual communities. On the basis of regularity, opinions and suggestions on the perfect function, rich content, and operation management of virtual communities are important to further guide the operation of the platform and promote management innovation, thereby improving the scientificity and effectiveness of ideological and political education on the Internet in universities Practical significance.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 708–712, 2021. https://doi.org/10.1007/978-3-030-51556-0_107

Design of Teaching System of College Students

709

2 Social Network Analysis of Political Teaching (1) Analysis of Member Participation In order to understand the information transmission and participation roles of the organizational structure of college student virtual community members, this paper selects the top 15 group members who have spoken frequently as serial numbers for social network analysis. In general, Density is the closeness of the relationship between nodes in the network [2]. The density value is between 0 and 1. The closer the value is to 1, the closer the relationship is, and the smoother the communication is. If the social network is a directional network (asymmetric network) and there are n actors, then the theoretical maximum possible value of the total number of relationships contained in it is n (n − 1), and the density of the network is equal to m/[n (N − 1)], m represents the actual number of relationships included in the network. The centrality value of a node reflects the number of relationships actually generated at that node. Table 1 gives the data of the centrality of the social relationship network. According to the density calculation method, n = 15 and m = 174 in the network, from which the network density is calculated to be 0.8286. Existing research data show that the density of public-type social networks reaches 0.14, the average density of social networks at the bureau level is 0.05, and the average density of square-type social networks is 0.004 [4]. It can be seen that the members of this community have close relationships, good teamwork and good group work performance. (2) Analysis of member roles Based on the above theory, combined with the specific characteristics of the “E Dream Garden” new media integrated service platform community, the growth trajectory of the community members of the platform can be described as follows: the cadres of the freshman academy register and become members of the community, after the adaptation period (Dive period), gradually become familiar with the workflow and community environment, actively participate in community discussions and activities, and make greater contributions to the community. Among them, members with high user participation, strong interactive management capabilities, and strong public opinion influence have gradually grown into leaders (opinion leaders), but with the graduation of students, the change of cadre cadres, the adjustment of student work managers, and other factors will “fade out” Community or “migrating” to a new community. The degree centrality (point-out and point-in) is used to calculate the number of connections between actors and other actors. It describes the local central index of each member in this community. Click-out indicates that the node reflects the member’s reading, quoting, and commenting on others’ opinions in the social network; clickthrough degree indicates that the node reflects the member’s welcome, recognition, and trust in the social network. The higher the click-through value, the greater the influence of the member in the social network and the more central he is. The normalized outdegree (in-degree) is the ratio of the out-degree (in-degree) of a node to the maximum possible number of relationships of the node in the network. As shown in Table 1, the out-degree and in-degree values of member 8 are 2, 12, respectively. The out-degree of

710

H. Yifeng

standardized points is 14.29%, and the in-degree of standardized points is 85.71%. It stated that member 8 was following the statements of 14.29% of other members in the network, and his speech was followed by 85.71% of members in the network. Intermediate centrality, as an index of “control ability” of an actor, reflects to what extent the member is an “intermediary” of other members, and it plays a “media” and “filter” role in information dissemination. Intermediate centrality characterizes the degree to which a node controls the resources in the network. The higher the central centrality, the more occupying the key position of resources and information flow. It can be found from Table 1 that There are 6 members with higher degrees, which are 8, 3, 11, 10, 14, and 1, respectively. The corresponding standardized entry values are 0.86, 0.71, 0, 79, 0.86, 0.71, and 0.62, and 8, 3, 11. These three members have the strongest centrality. This shows that the information sent by the three members in the community is more likely to be received, has stronger control, cohesion and advantages of information resources, controls the key links of information flow, and is the central figure and leader of the entire network, we call it a “level one opinion leader.” Group members 10 and 14 have a relatively high degree of standardization, but the intermediate centrality is average, indicating that their speeches are often followed by group members, and the probability of receiving information is relatively large. It has a wide range of influence in the field, but it has a wide domain influence. The control power is slightly inadequate, and it lacks guidance in the processing of public opinion. We call it “second-level opinion leader”. We collectively refer to Level 1 and Level 2 opinion leaders as “core opinion leaders.” In real work, I learned through interviews that member 8 is an ideological and political counselor, has a good educational background, is diligent and dedicated, and is proficient in the network discourse system. He is good at using the grounded and fashionable network discourse system to develop with students. Network communication, paying attention to hotspots and news, often combining with practical issues encountered in the work to express opinions, focus on hotspots, and share knowledge. Members 3 and 11 are related to the main cadre of the class and part-time student union, so they can keep abreast of the information on campus activities and have a certain advantage in information resources. They often guide members to interact on issues such as exams and courses, and have a strong ability to solve practical problems. The teachers and classmates of the faculty of the university evaluated the two classmates as enthusiastic and active, with strong communication, coordination, organization and management skills, and a high mass foundation. The members with a higher degree of standardization in the social network are members 9, 5, and 12. The values of the degree of standardization are 0.86, 0.78, and 0.65, respectively, but the degree of entry is small, and they act as “spreaders” in the network. It can spread the received information at the first time, and is more active in group notification, message receiving and replying, etc., and can respond in time and “spread”. The interaction between the nodes in the social network determines whether the node will spread the received information in a certain way in the social network, thereby affecting its neighboring nodes. Therefore, the members of this group have potential influence, have the qualities and possibilities to become “opinion leaders”, and deserve the attention and training of community managers.

Design of Teaching System of College Students

711

The indicator of closeness to centrality is the “free index” of actors, reflecting the extent to which actors are not affected by other actors. The two members with the highest degree of centrality in the social network are members 6 and 2. The values of the degree of centrality are 23, but the indicators of centrality are relatively low. There is a certain degree of participation, but it has not received exchange feedback from other members. It is not in the key position of information dissemination and belongs to the role of “water army” in the network.

3 Countermeasures and Suggestions As an important position for the education of socialist core values, colleges and universities must actively explore new ways and methods to adapt to the dissemination of current social ideas, and enhance the effectiveness of socialist values leading social trends of thought. Facing the evolution of the knowledge dissemination concept in the new media era, social ideology is more diverse and diverse, and various ideological trends are becoming more frequent. The colleges and universities should attach importance to the seamless connection between youth ideological and political education and social education, and strive to create virtual and realistic education. The interactive and open environment confirmed by each other must actively change the educational concept and realize the “form ownership” to “perfect mechanism” of new media in colleges and universities. With regard to the construction of new media, students should be the center, with “self-education, self-management, and self-service” as the purpose, and strive to build a platform for ideals and beliefs, ideological education, capacity building and personality development, growth services and affairs management. It is necessary to strengthen the construction of platform content, take new media as a new breakthrough to guide the ideology and guidance of teachers and students, give full play to the role of the new media’s main position of the Communist Youth League, strive to explore the use of new media and combine culture, art, and fashion to carry out work and closely integrate the group The work focus and deployment of the Central Committee, the Communist Youth League and the Provincial Committee of the Communist Party of China and the Central Committee of the Communist Party of China and the Communist Party of China (CPC) are to carry out “online” activities, using important time nodes and opportunities to effectively convey the good voice of young students, spread the positive energy of the network, and promote the main theme. It is necessary to strengthen the construction of the “Internet Army” of the Communist Youth League and the Student Union, cultivate young “Big V”s organized by the Communist Youth League and the Student Union, and improve the ability to set issues on the Internet and guide public opinion. At the same time, it is necessary to strengthen the exchanges and interactions between the new media platforms in the school, realize the aggregation and communication, give full play to the role of the students’ “three self’s”, and gradually realize the integration of publicity, leadership, education and service. The fissionable development of emerging media has changed the content and structure of information products, the form and function of communication terminals,

712

H. Yifeng

and the psychology and habits of audiences in receiving and using news information. Due to the limitations of their own knowledge reserves and social experience, college students have weak ability to analyze media information and lack media criticism and participation. In the virtual environment of social networking, the guidance of “opinion leaders” is even more needed. The external environmental factors such as conflicts and conflicts have further spawned the group of “Opinion Leaders”. Ideological and political educators need to further study the formation mechanism, behavior characteristics and activity rules of colleges and universities’ opinion leaders, establish a database of opinion leaders, systematically sort out their job titles, departments, and personality characteristics, and strengthen their relationship with The entire process of “Opinion Leaders” is docked, grasping their ideological trends, timely identifying problems and conducting guidance, so that “Opinion Leaders” play an active role in guiding, controlling and managing public opinion and public opinion in colleges and universities.

4 Conclusions This paper is only used as a case study and exploratory attempt of university new media application innovation. The research results are not universally representative. Through data analysis of the ROSTCM content mining system, it is found that the overall centrality of the social network is high, and some members are too central. Although this facilitates the close ties and members of the community. Solidarity, but weakened the ability of other members to discuss and speak on their own. In the teaching of political theory, a moderate number of small groups can enhance the group’s active atmosphere and attract marginal members to participate, so it can generate more information resources and effectively promote information dissemination and knowledge sharing. The research method in this article highlights the characterization of community homogeneity. However, due to the limitation of the calculation method of the software itself, it cannot analyze the subgroups such as small groups and subgroups, and cannot further explore the “group factions” among group members.

References 1. China Internet Network Information Center: The 39th statistical report on Internet development in China. Http://www.cnnic.net, cn / hlwfzyj / hlwxzbg / hlwtjbg / 201701 / t20170122_66439.htm. 24 Jan. 2017 2. Suping, Z.: Social network analysis of team learning in virtual learning communities. Mod. Inf. (8) (2014)

Fault Diagnosis System of New Energy Vehicle Based on Hidden Markov Model Li Taotao(&) Henan College of Industry & Information Technology, Jiaozuo 454000, China [email protected]

Abstract. Information technology has been developed rapidly, but various types of network attacks are constantly emerging, ensuring the security of information networks has become an urgent need. Starting from network security situation awareness, this paper expounds Markov theory and designs Markov game model. In the model, the system security is improved through security reinforcement and risk repair. The experiments verify that the algorithm in this paper is superior to the risk assessment model of propagation. Keywords: Markov game model

 Network security  Security assessment

1 Introduction Based on the state estimation of lithium power battery, fault diagnosis is made. Due to the lithium battery is a complex nonlinear system, influence each other between each fault symptoms, lead to the cause of the problem of judgment is very difficult and fuzzy Bayesian networks to analyze it, to be able to convert the input data to membership in the form of fuzzy rules of fault symptoms, greatly simplifies the diagnosis rules, and the Bayesian network is based on the probability of event description, even under the incomplete data sets to ensure the integrity of the probability, the fuzzy theory and Bayesian networks in combination with the fuzzy Bayesian networks can effectively solve the battery failure of complexity and uncertainty [1]. Bayesian network method is a representation and reasoning model for uncertain knowledge and information based on probability analysis and graph structure. A node in the Bayesian network represents a variable, and each variable is connected by a phase arc to visually represent the causal relationship between variables. In Bayesian networks, nodes with phase-arc output are called parent nodes, while nodes with phasearc input are called child nodes. In this paper, the fault cause is the parent node, and the fault symptom is the child node. For the root node, its prior probability should be determined according to historical data records and expert domain knowledge, and for the child node, the conditional probability under different parent node states should be determined. In case of system failure, the probability of battery failure can be obtained by combining the topological structure of battery failure, the prior probability of fault cause and the conditional probability. However, as a complex nonlinear system, the battery pack has many fault causes, which requires a high demand for the diagnosis © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 713–718, 2021. https://doi.org/10.1007/978-3-030-51556-0_108

714

L. Taotao

model and a large amount of data calculation. A fault symptom node has n parent nodes, accompanied by 2N conditional probabilities, which will improve the complexity of fault diagnosis and reduce the reaction speed of fault diagnosis. In view of the above situation, some scholars proposed to use the Bayesian network of Noisy-OR model to reduce the demand for data [2]. This model is very suitable for the principle of simple system, but for complex systems such as power lithium battery system, the fault reasons and influencing factors cannot be entirely sure, the appearance of some kind of fault symptoms could be a variety of fault reason and together with the unknown, unknown factors measurement problems may include environmental impact, and the unknown faults in the system, does not consider the unknown factors are likely to trust excessive fault diagnosis problems. Therefore, the Leaky Noisy-OR model is proposed in this paper. The introduction of Leaky Noisy-OR model can reduce the demand for conditional probability from 2N to 2N, thus greatly reducing the data demand of the model and improving the accuracy of model.

2 Cyber Security Situation Awareness Situational awareness is mainly divided into three levels: element acquisition, data integration to find correlation, and situational prediction through data mining. Network security situational awareness is the current status and subsequent development of the entire network system composed of the operating conditions, network status, and user behavior of network facilities. Its system architecture is. It can be that the network security situational awareness system uses sensors to obtain data, and then uses the situational understanding module to predict system state changes. The security reinforcement module in the figure will play a role in repairing and maintaining the system, thereby reducing external invasion of the system [3].

3 Markov Game Model Design At present, Markov game theory has been widely used in network security systems. This article uses the two-person zero-sum game as an example to explain the principle [2, 3]. The state set is s, the action set of the two is A1 and A2, the probability set of state transition is P, and the reward function of the two is r1 (s, a1) and r2 (s, a2). The decisions of the two parties to obtain the maximum overall return are p1 (s) and p2 (s). Let s0 be the initial state of the game, bt be the discount rate with period t, and the action strategies of the two people in period t are p1 (st) and p2 (st), and the expected discount obtained after infinite cycles is Vp (i), the state after a period is i, then: Vp1 ðSi Þ ¼ Ep1 ð

1 X t¼0

bt r1 ðst ; p1 ðst Þ; p2 ðst ÞÞjs0 ¼ si Þ

ð1Þ

Fault Diagnosis System of New Energy Vehicle

Vp2 ðSi Þ ¼ Ep2 ð

1 X

bt r2 ðst ; p1 ðst Þ; p2 ðst ÞÞjs0 ¼ si Þ

715

ð2Þ

t¼0

According to above formula, we get r1 ðst ; p1 ðst Þ; p2 ðst ÞÞ ¼ r2 ðst ; p1 ðst Þ; p2 ðst ÞÞ According to the joint strategy p (s) of the two formulas, we can get: Vp ðsi Þ ¼ Ep ð

1 X

bt rðst ; p1 ðst ÞÞjs0 ¼ si Þ

ð3Þ

t¼0

Let pðsi Þ\a1 ; a2 [ , then the estimated Vp ðsi Þ is: Vp ðsi Þ ¼ rðst ; a1 ; a2 Þ þ b

1 X

pðst þ 1 jst ; a1 ; a2 ÞVp ðst þ 1 Þ:

ð4Þ

t¼0

In the process of the game between the two sides, it is impossible to achieve a win-win situation, and both sides hope that their overall returns will be maximized. In the Markov game, both parties need to consider the other’s strategy to minimize their benefits: Vp ðsi Þ ¼ min max Vp ðsi Þ

ð5Þ

p ðsi Þ ¼ arg min max Vp ðsi Þ

ð6Þ

a1 2A1 a1 2A1

The optimal strategy is: a1 2A1 a1 2A1

The Markov game model of this article contains the following 7 parts: 3.1

State Space

At the kth moment of the threat, the dangerous state of the nth asset in the system is stn ðkÞ, and its values are 1 and 0.1 represents a threat and 0 represents no threat. Then the threat of the entire system at time k is: st ðkÞ ¼ ðst1 ðkÞ; st2 ðkÞ; . . .; stn ðkÞÞ

ð7Þ

At the kth moment, the fragile party v, the fragile state of the nth asset in the system is and its values are 1 and 0, where 1 represents fragility and 0 represents no vulnerability. Then the vulnerability of the entire system at time k is: svn ðkÞ,

sv ðkÞ ¼ ðsv1 ðkÞ; sv2 ðkÞ; . . .; svn ðkÞÞ

ð8Þ

716

L. Taotao

Therefore, this article records the risk status of the entire network system at the kth moment as: sðkÞ ¼ sv ðkÞ  st ðkÞ

3.2

ð9Þ

Damage Function

In the system, when an asset is threatened, the probability that the next asset will be threatened will increase. Probably the threat damage at the k-th moment in the system is denoted as V (s (k)). The threat damage at time k + 1 is denoted as R (s (k)). X VðsðkÞÞ ¼ RðsðkÞÞ þ b pðsðk þ 1ÞjsðkÞ; ut ; uv ÞVðsðk þ 1ÞÞ ð10Þ sðk þ 1Þ

where s(k + 1) is the state at system k + 1, which is related to sðkÞ; ut ; uv , pðsk þ 1 jsðkÞ; ut ; uv Þ is the state transition probability of the system; b is the discount coefficient of the system. According to the principle of risk calculation: RðsðkÞÞ ¼ VA  st ðkÞ  sv ðkÞ

ð11Þ

where V is the severity of vulnerability; A is the value of the asset. According to the damage function at each moment, the total risk value of the system can be obtained: Vsys ¼

X

Vi

ð12Þ

i

3.3

Risk Assessment

Without any remedial measures, the system’s risk assessment stipulates: uv ðkÞ ¼ 0; k ¼ 1; 2; . . .; n

ð13Þ

When the threat of the system spreads at a certain rate, the system needs to choose a propagation strategy to make the risk value of the system reach the maximum value, so as to conduct risk assessment. VðsðkÞÞ ¼ max Vt;v ðsðkÞÞ t2T

ð14Þ

Fault Diagnosis System of New Energy Vehicle

3.4

717

Patching Strategy

When a system is threatened, it needs to be patched with a certain strategy to reduce the risk of the system. The optimal patching strategy is recorded as: p ðsi Þ ¼ arg min max Vt;v ðsðkÞÞ a1 2V a1 2T

ð15Þ

4 Model Experiments and Analysis In order to verify the validity of the Markov game model, the constructed network system contains 3 assets, denoted as A ¼ ð1; 2; 3Þ, and the probability of a threatening party spreading on asset 1 is 0.2, while the other 2 assets have no Threat, then the threat state is recorded as st ðkÞ ¼ ð1; 0; 0Þ. The vulnerability severity of assets 1 and 3 is V = 3, and the fragile state is recorded as sv ðkÞ ¼ ð1; 0; 1Þ. Let the threat propagation cycle be 4, and the discount coefficient b = 0.8. When sv ðkÞ ¼ ð1; 1; 1Þ, the traditional risk assessment and the Markov game model in this paper are used to compare the risk assessment, as shown in Fig. 1.

Fig. 1. Risk assessment comparison of the two models

It can be seen from Fig. 1 that under the same threat propagation conditions, the risk value of the traditional risk assessment model is greater than the Markov game model in this paper. The main reason is that the reinforcement model in this paper will strengthen the assets to improve security performance. And asset repair also reduces the risk of the system.

718

L. Taotao

5 Conclusions This article first introduces the Markov game theory, and designs the Markov game model from seven parts. Finally, this model is used for network security risk assessment. By comparing with the traditional risk assessment model, the experimental results illustrate the Markov game designed in this paper. Models can reduce the risk of the system.

References 1. Feng, D., Zhang, Y., Zhang, Y.: Review of information security risk assessment. J. Commun. 25(7), 10–18 (2004) 2. Wang, Y., Liu, J., Chen, Z., et al.: Design of a computer network vulnerability assessment system. Comput. Eng. 32(17), 200–202 (2006) 3. Fu, Y., Wu, X., Ye, Q.: Research on security risk assessment of military information support system. Ship Sci. Technol. 31(8), 127–130, 143 (2009)

Evaluation of Tourism Landscape Ecological Environment Based on AHP and Fuzzy Mathematics Cao Peng(&) and Cui Jing Taizhou Institute of Science and Technology, NJUST, Nanjing 225300, China [email protected], [email protected]

Abstract. Guided by the theory of integration of tourism and landscape ecology and the thought of system dynamics, this paper highlights two major goals: to develop tourism and protect the ecological environment, to optimize the combination of the elements of the original landscape evaluation and to introduce new elements, and to design and build an evaluation model based on AHP and fuzzy mathematics. Keywords: AHP  Fuzzy comprehensive evaluation Ecological environment

 Tourism landscape 

1 Introduction In recent years, with the development of tourism activities and the spread of the idea of sustainable development, there are contradictions between the development of tourism resources and environmental protection. How to alleviate and coordinate these conflicts, make the tourism landscape not only play its value function, but also not destroy its proper ecological environment, realize the equal importance of the rational development and utilization of the environment and environmental protection, create a more scientific and reasonable tourism landscape pattern in line with people’s aesthetic outlook, solve the contradiction between development and environment, and implement the “planning combined with nature” and “tourism coordinated with environment” thought is of great practical significance to the development of tourism. From the perspective of ecological sustainable development, the analysis and evaluation of tourism landscape ecological environment, and then the planning of tourism resources development will not only produce important ecological and social benefits in a short time, but also produce huge economic benefits due to the display of good ecological landscape, tourism landscape and investment environment in the tourism area. This paper adheres to the concept of attaching importance to natural landscape and respecting the geographical characteristics of the region, constructs the evaluation system of tourism landscape ecological environment, and provides auxiliary decisionmaking for the relevant planning of tourism destinations, so as to better realize the ecological, landscape and practical of tourism attractions [1].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 719–723, 2021. https://doi.org/10.1007/978-3-030-51556-0_109

720

C. Peng and C. Jing

2 Construction of Index System By the framework model of ecotourism, on the basis of comprehensive consideration of regional economic development, ecological environment protection and social progress, referring to the national standard of the people’s Republic of China classification (GB/T 18972–2003) [2, 3], the criteria layer of tourism landscape ecological environment evaluation system is constructed into four parts: natural ecological environment of tourism landscape, social ecological environment of tourism landscape, ecological economic environment of tourism landscape and ecological atmosphere environment of tourism landscape, and then the evaluation index system of tourism landscape ecological environment is proposed. The scoring standards of each index are based on the classification (GB/T 18972–2003), the quality rating of scenic resources of China National Forest Park (GB/T 18004–1999), the national standards of classification and evaluation of tourism area (point) quality and the detailed rules for scoring of Tourism area (point) quality. On this basis, according to the evaluation criteria of the evaluation indicators, the specific performance of each indicator of the tourism landscape ecological environment is scored on the 10 point system or the 100 point system.

3 Evaluation Method and Determination of Weight Set 3.1

Determination of Evaluation Method

Any comprehensive evaluation method needs to synthesize the evaluation results of each single index. The change of weight proportion will change the results of comprehensive evaluation, so the selection of methods is very important. The advantage of fuzzy comprehensive evaluation method is that it can comprehensively evaluate the object system involving fuzzy factors. It is a commonly used fuzzy mathematical method, which is widely used in economic management and other fields. AHP is to decompose the problem into different elements by analyzing the factors contained in the complex system and their related relations, and to merge these elements into different levels, so as to form a multi-level analysis structure model, which has advantages in determining the weights of multi-level evaluation indexes. Analytic hierarchy process can overcome the defects of many sample points and large amount of data. It has high reliability and small error, which makes the quantitative analysis among system factors possible. In this paper, AHP and fuzzy comprehensive evaluation method are selected to study. 3.2

Determination of Weight Set

Using the theory of fuzzy mathematics, the relative importance comparison of elements in the same layer is assigned by the 9-level scale method as shown in Table 1.

Evaluation of Tourism Landscape Ecological Environment

721

Table 1. Comparison proportion of relative importance of elements in the same layer Comparison between Xi and Xj Aij Aji

Equally important 1 1

Slightly important 3 1/3

Important 5 1/5

Very important 7 1/7

Absolutely important 9 1/9

For n-order judgment matrix, only n matrix elements need to be given numerical value. According to the hierarchical structure model, using the experience of experts, the judgment matrix of weight is given, and then the weight is calculated by the eigenvector method, that is, for the judgment matrix B, the eigenvalue and eigenvector satisfying BW = k maxw are calculated. In order to test the consistency, it is necessary to define Cr = CiRi, where the consistency index Ci = k max-nn-1, and the value of the average random consistency index Ri coefficient is shown in Table 2. When Cr < 0.10, the judgment matrix has satisfactory consistency, otherwise it needs to be adjusted.

Table 2. Average random consistency index of matrix of order 1–9 Order number 1 2 3 4 5 6 7 8 9 0.00 0.00 0.58 0.90 1.12 1.24 1.32 1.41 1.45 Ri

4 Example Verification In the evaluation index system of tourism landscape ecological environment, many indexes are qualitative rather than quantitative. Through the fuzzy mathematical model, these qualitative data can be transformed into quantitative form, making the results more accurate. This paper takes Zhalong Nature Reserve of Qiqihar as an example to verify. 4.1

Introduction to Zhalong Nature Reserve

Zhalong National Nature Reserve was founded in 1979, located in Qiqihar city and Daqing City, the lower reaches of Wuyuer River, Songnen Plain, Western Heilongjiang Province, with an area of 21 square kilometers. It is a world-famous “Bird Paradise” with 265 species of birds, including 6 species of cranes (15 species in the world). Its unique natural conditions, abundant bird resources and original unique wetland natural landscape attract a large number of scholars and tourists to come here for scientific investigation and sightseeing. In the 1980s, Zhalong opened the first professional birdwatching area in China, and successively investigated and studied the wading and swimming bird resources of three routes. The land ownership in the area involves more than 50 natural villages in 13 towns, and more than 10 state-owned farms, animal husbandry, fishing and reed farms, with a population of more than 2900.

722

4.2

C. Peng and C. Jing

Determination of Weight

According to the scores of experts from relevant departments on the importance of the evaluation indexes of ecotourism environment in Zhalong Nature Reserve, based on the AHP theory, the relative importance matrix is given, and only the calculation process of A-P ecotourism environment is given here. The A-P 0 judgment 1matrix is: 0 1 0:2428 1 2 3 1=5 B 1=2 C B 0:1424 C 1 2 1=7 B C B C @ 1=3 1=2 1 1=8 A, kmax ¼ 4:0578, the eigenvector is: @ 0:0888 A after nor5 7 8 1 0:9554 0 1 0:1699 B 0:0996 C C malization, the eigenvector is: B @ 0:0621 A, Cr = 0.0214 < 0.1. 0:6684 4.3

Calculation of Evaluation Results

According to the constructed evaluation index, according to the percentage system, 10 experts are employed to score, 50 questionnaires are sent out to the residents of the tourist area, and 100 market surveys are conducted to the Zhalong area, and the score of the evaluation index of the ecotourism environment of the Zhalong Nature Reserve is obtained. Using the weights and scores of each index calculated above, we can get: X f¼ Ei bi ¼ 62:1 Where Ei is the weight of each indicator in the element layer relative to the target layer, and Bi is the score of each indicator in the element layer. This result is in line with the facts. The development of various performance indicators of Zhalong Nature Reserve is not balanced. Zhalong Nature Reserve is a national first-class reserve with high popularity and rich animal and plant species in the tourism area. The government strongly supports ecotourism, issues relevant policies and pays attention to the protection of tourism resources, but the spatial combination of tourism resources is poor, and the service quality of the tourism area needs to be improved, The service skills of tourism service personnel need to be strengthened, the food and beverage hygiene needs to be improved, the tourism supply is not rich enough, and the development of related tourism products is weak, such as fewer tourism souvenirs with crane as the theme. Although foreign culture does not impact the local culture of the tourism area, it makes less communication between residents and tourists, does not have a significant impact on the way of life and ideas of residents, and residents have a low support rate for tourism activities, and do not have a strong interest. The education level of local residents is generally low, the awareness of environmental protection is weak, the relevant publicity measures taken by tourism practitioners in the reserve are less, and the ecological publicity is not enough, which are the main factors leading to the low evaluation of tourism landscape ecological environment.

Evaluation of Tourism Landscape Ecological Environment

723

References 1. Guihua, Y., Linsheng, Z., Qingzhong, M.: Ecotourism. Higher Education Press, Beijing (2000) 2. Daopin, C.: Ecotourism development model and case. Chemical Industry Press, Beijing (2006) 3. Angui, L., Zhihong, Z., Yan, M., et al.: Fuzzy mathematics and its application, 2nd edn. Metallurgical Industry Press, Beijing (2005)

Collection and Processing Method of Big Data of Network Public Opinion Chen Feng(&), Zhang Dali, and Fu Xianjun Zhejiang College of Security Technology, 2555 Ouhai Avenue, Wenzhou, Zhejiang, China [email protected], [email protected], [email protected]

Abstract. This article mainly discusses the design of a large-scale data collection and analysis architecture for water supply in the field of “public opinion”. At present, in terms of water supply data collection, there are problems such as low real-time data collection, difficulty in storing large amounts of data, and complexity in big data calculation. The big data collection and analysis architecture designed in this article uses the concept of SOA architecture and applies different Internet technologies in a service-oriented mode to solve the above problems, thereby realizing the business needs of real-time collection and analysis of water supply data. Keywords: Public opinion  SOA architecture Real-time collection and analysis

 Big data computing 

1 Introduction The concept of “public opinion” is a symbol of the current high-tech urbanization construction. Its essence is to use advanced Internet information technology to achieve the management and operation of urban public opinion through the centralized management of key information. Of people create more convenient living facilities and a better living environment, thereby promoting the harmonious and sustainable development of the city. The development of a “public opinion city” depends not only on the enhancement and improvement of hardware facilities, but also on the construction of informatization. Through the construction of informatization, the basic elements of normal operation in a city are fully integrated to fully integrate the available cities. Resources, through the Internet of Things, big data, cloud computing, artificial intelligence and other high-tech information technology means to achieve the optimal configuration, the most accurate calculation, and the most reliable prediction [1]. “Public opinion” is a key part of urban water supply in “smart cities”. The relationship between the supply and demand of water resources is very important for a city. How to effectively avoid excessive waste of water resources and accurately control the water quality and water conditions in the water source area. These are the key research goals of “Public Opinion”. Through the study of the water supply data of various regions, it is found that the water supply situation is complex and changeable, and the water source areas and geological features of each region are different. Then the water supply © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 724–728, 2021. https://doi.org/10.1007/978-3-030-51556-0_110

Collection and Processing Method of Big Data of Network

725

cycle data of different cities are required Perform effective analysis to develop a comprehensive water data analysis framework, and then customize it to achieve the effect of adapting to local conditions [2]. The big data distributed computing framework is fully capable of analyzing and calculating water data.

2 Related Work and Background Knowledge 2.1

Spark Framework

Spark is a big data distributed computing framework that is open sourced by UC Berkeley AMP Lab (UC Berkeley’s AMP Lab), and has now developed into an Apache incubation project. Spark’s excellent computing efficiency is being praised by more and more developers. It is 100 times faster than Hadoop in memory computing, and has high ease of use and versatility. Spark has strong adaptability and can read data from various types of databases such as HBase, HDFS, Mysql, and MongoDB. Spark borrows the advantages of MapReduce and improves the obvious defects of apReduce. It is currently one of the most popular big data computing frameworks. One. And Spark uses its own huge ecosystem [3]. Figure 1 is a diagram of the Spark ecosystem.

BlinkDB

MLBase

SparkSQL

Mllib/ML

Spark Streaming

GraphX

SparkR

Spark Core

Local operation mode

Standalone

EC2

MESOS

YARN

HDFS,Amazon S3,HBase

Fig. 1. Spark ecosystem

2.2

MongoDB Document Database

In the face of the rise of Web 2.0, the application of high concurrency and large amounts of data has made relational databases inadequate. Nosql databases have emerged at this time. Nosql refers to non-relational databases, leaving out the design of traditional relational databases. From more perspectives, to solve the pressure brought by high concurrency and massive data. MongoDB is the best in Nosql, a non-relational database based on document design, which can be used for mass data storage. The data storage format of MongoDB uses a variant BSON similar to the JSON data format. The format is as follows: {“Data”: “test”, “value”: “123”}. The biggest feature of MongoDB is that the query language it supports is very powerful, it provides multiple combined queries, and it also provides low-level APIs in multiple languages. At the same time, MongoDB supports clustered deployment. In the case of limited resources, MongoDB also supports

726

C. Feng et al.

sharding technology to cope with high throughput and difficult single-machine capacity expansion. As shown in Fig. 2, a database with 10 TB, after using sharding technology, Divided into five 2 TB shards, when querying a piece of data, only the shards where it is located can be accessed, effectively saving memory consumption [4].

Fig. 2. MongoDB sharding technology

2.3

Netty Network Communication Framework

Netty is an asynchronous, event driven network application framework, that is to say, netty is a communication development framework based on NiO client and server, supporting a variety of network communication protocols. In addition to the complicated programming experience of socket, netty provides a more portable programming API. Netty designs a unified interface for a variety of transmission types, i.e. the implementation of blocking and non blocking. At the same time, it implements a simpler and more powerful thread model internally, and realizes the real connectionless data report socket support [5]. The netty framework can support TCP requests up to a million, and the request response efficiency is higher. Using netty as the server of GPRS underlying collection device is a very good choice. Figure 3 shows the netty architecture.

Fig. 3. Netty framework

2.4

Redis Cache Database

The related concepts of Nosql database have been mentioned above. Redis database is also a member of Nosql database. Unlike MongoDB, Redis is a memory based database, which is saved in the form of Key-Value key value pairs

Collection and Processing Method of Big Data of Network

727

Data, because of its memory based characteristics, redis has a very high efficiency for data storage and reading. In the same way, redis supports cluster deployment at the same time, which ensures the data unification in the cluster environment. Redis is also a cache database based on memory. Using redis with cache mechanism can not only achieve the effect of data cache, but also perform persistent operation of data according to different business scenarios, achieving the effect of unified combination of cache and persistence [6].

3 Data Collection The core of “public opinion” is the real-time collection of water supply data and the intelligent analysis and prediction of data. How to achieve the optimal allocation of resources depends on the analysis results of water supply data. How to obtain water supply data in real time and accurately is the core research issue of “smart water” big data collection Architecture [7]. First of all, there are two key points in real-time data collection: one is timeliness, the other is mass data storage performance, which can be solved smoothly, so other problems can be solved. According to the above technical architecture, mongodb is used to store water data, and its performance and fragment expansion can perfectly cope with real-time water meter collection data; spark big data calculation framework is used to calculate collection data in real time, provide complete and effective calculation results, and accurately judge whether there is a current report according to historical analysis records Alarm or tube explosion and other abnormal phenomena achieve the prediction effect; netty is used as a communication service, which parses and assembles the remote control resolution protocol and then sends it to the collector or intelligent water meter, and stores it in mongodb after a data return.

4 Technology Architecture “Public opinion” big data acquisition system architecture is a complete set of Internet architecture including big data computing system and real-time communication system. First, the upper layer uses nginx for load balancing, unified user access channels, and nginx reverse agent to reduce the pressure on the server. At the same time, redis is used as the cache library to effectively cache and update the frequently accessed historical information, providing users with better operation experience and shorter response time. MySQL is used to store relational data for revenue, such as basic user information, basic water meter information, basic staff information, etc. mongoDB is used to store the collected data of intelligent water meter. Due to the large amount of collected data and high real-time performance of intelligent water meter, it uses spark big data analysis framework to calculate the collected data in real time The calculated data is stored in the result mongodb, and the centralized control cloud platform can call mongdb to query the relevant collection statistics data in real time.

728

C. Feng et al.

Netty communication service receives the collection instructions from the management platform. In order to avoid channel blocking, nginx is also used as the load here. At the same time, MQ message queue is called to push the instructions of the water meter in queue mode, so as to ensure that the collection commands can be effectively issued. The water meter protocol conversion is transferred to netty end for input-output conversion. After the water meter responds to the instruction and returns data, it is directly stored in mongodb after the communication service conversion. According to the netty architecture model, TCP communication will establish corresponding channels. In order to ensure the timeliness and regular cleaning rules of channels, redis is used to cache channels. Redis can customize the cache aging and define whether it needs to be persistent. The connected channels will be cached in redis when messages are received or sent After sending, in order to save resources, netty will destroy the channel and delete the cache in redis, achieving the expected cache effect.

5 Conclusion Based on the research of water supply data collection and data analysis of “public opinion”, this paper designs and puts forward a set of complete water big data collection and analysis framework, which solves the real-time problem of data collection on the one hand, and the storage and analysis problem of big data on the other hand. The whole framework not only uses spark, mongodb, redis and netty, which are mature and advanced development frameworks and databases, but also introduces SOA service-oriented design mode to decouple and separate application modules. Each module uses its advantages to focus on demand services, designs corresponding interface calls between services, and finally realizes a complete set of “public opinion water” Service “technical architecture system.

References 1. Yi, Z., Yujun, C., Bowen, D., et al.: Multimodal data fusion model of public opinion City. J. Beijing Univ. Aeronaut. Astronaut. 42(12), 2683–2690 (2016) 2. Yang, M., Jiang, Y., Tian, Y., et al.: Analysis of public opinion and water construction demand. J. Tsinghua Univ. (Nat. Sci. Ed.) 54 (01), 133–136; 144 (2014) 3. Holden, K., Yu, H., Zhang, L., trans: Spark Rapid Data Processing, pp. 47–84. China Machine Press, Beijing (2014) 4. Chodorow, K., Dirolf, M.: Translated by Cheng Xianfeng. Authoritative guide of mongodb, pp. 23–87. People’s post and Telecommunications Press, Beijing (2011) 5. Gu, J.: Data, information, knowledge, wisdom and meta- synthesis of wisdom-comment on wisdom global and wisdom cities. Procedia Comput. Sci. 17, 713–719 (2013) 6. Yi, Z., Quan, G., Jianyong, W.: Neural network method for big data analysis. Eng. Sci. Technol. 49(01), 9–18 (2017) 7. Yuxing, Ma.: Analysis of redis database characteristics. Internet Things Technol. 5(03), 105– 106 (2015)

Internet Finance Innovation and Entrepreneurship Based on Classification Algorithm Guo Honglei(&) School of Innovation and Entrepreneurship, Shandong Women’s University, Jinan 250300, Shandong, China [email protected] Abstract. In order to study the ways of Internet financial companies innovating financial products and services under the artificial intelligence, and the positioning of startups on their own development direction and core competitiveness, this paper combines the current practical examples of innovations in the Internet financial industry using AI technology. The five aspects of transaction mode, business efficiency and strategic optimization, user service, risk control and trend forecasting, and Internet financial inclusiveness expound the impact of AI technology on the Internet financial industry, and analyze the current status and existence of AI technology’s innovative practice in the field of Internet finance. Pointed out that start-ups should seize a new round of opportunities given to the Internet financial industry by the AI model by gaining user trust, innovative algorithms and talents, and should look at the addition of AI from a forward-looking perspective, so that AI can better serve Humanity. Keywords: AI technology  Internet finance  Innovation and entrepreneurship

1 Introduction In the summer of 1956, McCarthy and others formally established the term Artificial Intelligence. In 2017, AlphaGo defeated humans as the world Go champion. It is undeniable that AI has stood on the cusp of social science. “AI will be the first to break out in the field of Internet finance in the future.” In 2016, AI broke out in all industries, accelerating the transformation of Internet finance to intelligent driving. According to industry speculation, the emergence of AI is undoubtedly a remodeling in the context of Internet finance now entering the “second half” and many Internet finance companies have encountered the strictest financial risk control ever (hereinafter referred to as “risk control”) and regulation. In the era of Internet finance, global unstable macroeconomic conditions have also promoted financial innovation to a certain extent. So under the AI model, how can Internet finance companies innovate financial products and services to solve user pain points? How should startups position themselves and their core competitiveness? The author discussed this.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 729–733, 2021. https://doi.org/10.1007/978-3-030-51556-0_111

730

G. Honglei

2 Analysis of the Impact of al Technology on the Internet Finance Industry Generalized AI technology is mainly driven by massively parallel computing, big data, neural networks, deep learning algorithms, expert systems, and human brain chips [1]. Traditional Internet finance integrates people, machines, and things to form a ternary space that is interconnected and independent. AI can integrate information about people, machines, and things to solve problems beyond the accuracy and cost of humans. The impact of AI technology on the Internet finance industry is mainly concentrated in five aspects. 1. Trading Mode. In the field of Internet financial investment, quantitative trading has been using machines for auxiliary work since a long time. Analysts write simple functions and design some indicators to observe the data distribution. After AI is added, they can quickly analyze and fit massive data. As a result, investment institutions can accelerate the efficiency of analysis, operation and screening. In addition, cognitive intelligence (that is, AI-driven natural language interaction) technology will bring a “dialogue as a platform” model, improving transaction autonomy and reducing transaction costs for ordinary users. 2. Operational Efficiency and Strategic Optimization. The biggest feature of AI to empower Internet finance is that machines can get optimal results faster than humans. Taking the credit business as an example, AI’s machine learning can continuously update and correct credit models to improve the accuracy and efficiency of pre-loan evaluation results. By quickly identifying problem customers and promptly alerting them, the timeliness of monitoring during the loan can be improved. At the same time, based on the data of the user’s loan period, the user’s original credit record score can be supplemented, the credit limit can be increased or decreased, and post-lending feedback can be completed automatically [2]. Compared with human work, since the operation of the machine does not need to consider salary rewards and physical burdens, the AI-based operating system can execute business instantly and automatically according to market rules, which can solve the problems of employee incentives and constraints and fatigue. 3. User Services. In terms of user services, AI’s machine learning and cognitive intelligence are based on personal attributes. Through deep innovation in information and technology, AI services can continuously learn online and continuously adopt big data to update what one can afford. Risk, the most reasonable return that can be obtained, expand the single user view to the entire front and backstage, and finally tailor the product to specific individual users through multi-module data to achieve more personalized and positive services. 4. Risk Control and Trend Forecast. Traditional Internet financial institutions use users’ personal consumption data and transaction frequency as experience to make risk control judgments. Most companies have a core technology to identify users, but because such a risk control system only depends on a specific Technology or a certain type of specific experience, targeted attacks and destruction in the market are also endless. After the AI technology is added, a more scientific risk control model can be established. The big data processing technology based on AI technology can

Internet Finance Innovation and Entrepreneurship

731

not only refer to industry data and news public opinion, fuse network relationships and complex features, and effectively combine deep learning with graph calculations. In both aspects, a strong global analysis of the established risk model is performed, and further iterations are corrected to discover some potential financial risks. In addition, AI can discover new complex interactions in the financial system and better predict trends. 5. Internet financial inclusion. The high-end services of traditional Internet financial institutions are generally only open to high-net-worth users, and there is no or very limited access to a large number of disadvantaged and low-income users, leading to the existence of an unequal deficit. But now with the support of AI, Internet finance companies can evaluate the credit rating of small and medium-sized enterprises and middle-class groups, and effectively match the potential small amount of small and micro users with the potential for small decentralized financing and social capital supply, reducing the Internet The losses caused by distrust between financial companies and users have lowered the threshold for asset allocation, expanded the professional service radius, effectively solved the problems of small and micro users’ financing difficulties, and the effective supply shortage of the lending market, making Internet finance more inclusive finance. Leaning facilitates a more inclusive, fair and equitable environment.

3 Status and Problems of Al Technology Innovation Practice in Internet Finance As of the end of 2017, there are many domestic examples of innovations in AI technology in the field of Internet finance. Among them, companies with greater influence are Beijing Advantage Wealth Technology Co., Ltd. (Pano Financial), Ant Financial Services Group (hereinafter referred to as “Ant Financial”), Ping An Insurance (Group) Co., Ltd., etc. Despite the increasing advantages, there are still some problems in the application process. As a winner of the “China’s Most Promising Startup Company” at the end of 2017, Bono Financial has been at the forefront of the domestic “AI+ Internet Finance” field and is committed to the sharing and innovation of Internet finance. On the asset side, the use of AI to innovate technology and algorithm models to generate higher-yield and more secure products; on the user side, develop services such as intelligent evaluation and intelligent investment consultants. The most outstanding innovation of Plano Financial is that its team has developed a mechanism based on the technology of AI. This mechanism can allow financial professionals to directly connect with the already expanding middle-class group, allowing financial professionals to work more efficiently. Under the traditional Internet financial model, the cost will be very high. Ant Financial’s most typical sub-business segment, “Sesame Credit”, uses machine learning and cloud computing to comprehensively process and evaluate users’ data in various dimensions to give each person’s credit score. The customer service robot launched by it has realized algorithm innovation on the matching model of user behavior trajectory. “Fortune Robot” is based on the emotional knowledge base and deep learning in the

732

G. Honglei

financial field, using Convolutional Neural Network (CNN) and Tensorizing Neural (Network, TNN) to combine, count emotional units, and integrate all information for evaluation. Similar to Ant Financial, Ping An’s development in the field of Internet finance has also made extensive use of AI technology. In the online insurance business qualification review process, Ping An relied on an intelligent approval model to more effectively and multi-dimensionally capture the credit qualifications of policyholders, accurately portray its risk image, and complete the scientific approval process [3]. In terms of Internet securities, PingAn of China uses AI for intelligent stock selection, and uses a forward-looking perspective to discover unexplored market growth. China PingAn Pratt & Whitney innovatively introduces a series of biometric recognition technologies including face recognition in the loan service. The user only needs to open the mobile phone camera during the operation, and the system will capture and capture several facial images of the user for detection and verification. The identity verification can be performed, and the designated operations can be completed after the verification is successful, such as app unlocking, face payment, and face loan. At the same time, Ant Financial’s solution is not perfect. Intelligent robots still require the trust and cooperation of users and do not completely replace familiar manual operations. PingAn’s face recognition system is easy to operate. However, this has also led to many negative messages that face recognition operations have been cracked. According to experiments, each person’s face recognition system can be verified by passing only a static photo. Therefore, this application Has been questioned.

4 Application Suggestions for Al in Internet Finance Innovation and Entrepreneurship 1. Get user trust. No matter the era, the democratization and service nature of Internet finance will remain unchanged. Who can provide users with a better and more comprehensive experience, who can stand out from the competition. This experience includes automation and one-click operation procedures; personalization and customization of service content. Based on this, future startups using AI technology need to consider how to gain user trust through services, improve customer acquisition efficiency and customer experience, and strengthen customer stickiness, thereby forming their own competitive advantages. For example, signing a privacy protection responsibility contract will increase user autonomy in every service that does not require human involvement. 2. Take algorithmic innovation as the core competitiveness. The use of intelligent algorithms for machine learning does not imply zero bias, which is why Ping An’s face recognition operation can be cracked. At present, the domestic Internet finance industry’s use of AI is still in its infancy. If the market reaches saturation in the future, in the state of perfect competition, each company will have similar basic AI algorithms. If you want to gain an advantage, algorithm innovation is essential. For example, in feature mining, as long as one more effective weak feature is mined, it is likely to form a more accurate effect under conditions that are much lower than the original cost and risk. Therefore, algorithm innovation may become one of the keys to future industry success.

Internet Finance Innovation and Entrepreneurship

733

3. Take talent as the innovation point. From the perspective of the innovation model, in order to distinguish it from several other products, the founders and developers of the Platinum Financial App tried to fill the gap in the talent end, and tried to use AI to make financial professionals work more efficiently. After all, due to its essence, AI depends on human intelligence to be produced, and artificial intelligence cannot replace human intelligence [4, 5]. Ant Financials powerful customer service robot also has a misjudgment problem, so it’s better to consider using AI to make people smarter, or how to combine human wisdom with AI wisdom to form a “1 + 1 > 2” effect. This has a pioneering significance for future startups to grasp their strategic positioning and core competitiveness.

5 Conclusions In summary, it can be seen that the transformative development of AI technology has provided an internal method for Internet financial companies. Future opportunities are ubiquitous. Although the innovation of AI in the field of Internet finance may involve disadvantages such as privacy security, moral hazard, etc., it must not be a waste of food, it is precisely because of allowing transparency or reducing middlemen, and more importantly, because of people’s behavior and information Under the circumstances that can be obtained by AI, the development of AI will make human beings more compliant with principles and regulations, reduce crime, enable vulnerable groups to be given more power, and promote fairness. Therefore, at any time, we should look at the joining of AI from a forward-looking perspective, so that AI can better serve humanity. Acknowledgements. Humanities and Social Sciences Projects of Shandong in 2019, Code: 19ZZ-JJ-07, Research on Internet Finance’s Boosting Model for Undergraduate’s Innovation and Entrepreneurship.

References 1. Li Yang, S.G.: Blue book of Fintech: China Fintech development report. Beijing: Social Science Literature Publishing House (2017) 2. Guojian, L.: Fintech, financial technology leads financial innovation. China Financ. Comput. 1, 17–19 (2017) 3. Lingyue, D.: Ping An wealth winner: The preferred wealth management brand for high net worth customers. Stock. Mark. Dyn. Anal. 43, 60 (2017) 4. Shushan, C., Xiaodi, X.: Artificial intelligence and human intelligence—Human-computer warfare from the perspective of five levels of cognitive science. J. Peking Univ. 53(4), 145– 154 (2016) 5. Xiaomei, L.: On the application of artificial intelligence in the field of Internet finance. Economist 5, 148–149 (2017)

Research on Embedded Technology in Industrial Control Networking Hong Yaoqiu(&) Office of Academic Affairs, Jingdezhen University, No. 3, Fuliang Avenue, Fuliang County, Jingdezhen 333000, Jiangxi, China [email protected]

Abstract. Networked measurement and control instrument is a core part of the measurement and control system and a key unit of the measurement and control system. Measurement and control instruments have a wide range of applications in practice. For example, measurement and control instruments are used for data processing and data calculation. The embedded Linux operating system is applied to a networked measurement and control system. Based on this, wireless networking can be used to integrate network instruments and measurement and control hardware to complete the data storage function. Keywords: Wireless networking  Measurement and control instruments  Key technologies

1 Introduction The continuous improvement of China’s science and technology, at the same time, has accelerated the progress of computer technology, and the networked measurement and control instrument technology closely related to computer technology has also continued to develop and progress. In order to promote the mutual development and improvement of both measurement and control technology and measurement and control equipment to achieve a great improvement in the entire measurement and control industry, it is very meaningful to research and implement networked measurement and control instruments and measurement and control technology.

2 Interaction Between Wireless Measurement and Control Technology and Measurement and Control Instruments With the continuous development of wireless measurement and control technology, the research on measurement and control instrument technology has also improved accordingly [1]. Wireless network measurement and control instruments are complex and diverse, and can enable different technologies and different hardware to be effectively combined. Applications, such as: wireless network measurement and control instruments can make computers, automated control PLCs, communication technologies, and measurement technologies effectively integrate with each other, thereby showing the advantages of each technology, achieving resource integration and © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 734–738, 2021. https://doi.org/10.1007/978-3-030-51556-0_112

Research on Embedded Technology in Industrial Control Networking

735

enabling a favorable situation Make full use of it, so that multi-system instruments can not only serve one person or a specific field, but also allow one instrument to be used for multiple persons or more fields at the same time, which not only saves costs but also improves the efficiency of the instrument [2]. The development of wireless measurement and control instruments has also promoted the development of measurement and control instruments, enabling the hardware system of measurement and control instruments to be continuously improved and improved. With the continuous development of science and technology, computers have also been more widely used. The role of wireless network measurement and control technology on measurement and control instruments has become increasingly clear. At the same time, the advantages of measurement and control instruments on measurement and control technology have become more and more clear.

3 Implementation of Key Technologies for Embedded Wireless Networked Measurement and Control Instruments 1. Virtual instrument technology implementation method of embedded wireless networked measurement and control instrument. The prerequisites for the use of wireless network resources should first be to coordinate network application technology and data resource collection services with each other. At the same time, the subsequent processing of data resources and the application nature of wireless network technology can be the same. After that, according to all the characteristics of data resource control, the measurement procedures of the virtual instrument during use can be effectively controlled, and all control procedures can be promoted to meet the requirements of network resource processing. Contact the needs of network data collection [2], and analyze all software resource characteristics effectively, so that all virtual devices can run in coordination with the instrument’s application programs. It is necessary to carry out the next sequence based on the existing measurement salary, and to effectively analyze the use characteristics of the following measurement and control equipment, so as to ensure that the subsequent virtual instruments can be applied to the requirements of technical processing details, so as to facilitate the processing of virtual technology. Make sure that the virtual instrument during its use shows its maximum use. Judging from the characteristics of the current virtual instrument device software resource development, in order to ensure that subsequent coding programs can follow the principles of technical processing of instruments and equipment, so that subsequent driver devices conform to the processing characteristics of driver programs, all devices should be Intuitive factors for research analysis, As shown in Fig. 1.

736

H. Yaoqiu

Web Server Virtual file system Web DocumentaƟon

ConfiguraƟon module

Security module

HTTP engine

Internet

ApplicaƟon Program Interface

GGI

Embedded operaƟng system

ApplicaƟon system management

Embedded ApplicaƟon System

Fig. 1 Embedded wireless network system block diagram

2. The realization method of embedded system technology of measurement and control instrument. First of all, it is necessary to meet the application characteristics of embedded technology, and analyze all user resources effectively, and then deal with them, so that the next system operation can meet the basic requirements in the process of promoting production activities, so that the next network resource processing activities can be more effectively applied in the process of embedded applications. So that all the technical processing schemes can be more intuitive for the next step, so that the next programming activities can be effectively used in easier operating procedures, and all the application links of embedded technology can meet the processing requirements of programming technology, so as to ensure that all the system processing functions can be obtained in the process of data resource inspection More efficient use, so that the next embedded technology processing link can effectively ensure the completion of all the requirements of measurement and control technology information input. It is necessary to simplify the programming technology processing system in the operation of application programs, and make the next inspection work carry out efficient processing of hardware resources based on the embedded technology processing process, so as to ensure that the next hardware resource control system can coordinate with the acquisition program of data resources. At the same time, to effectively control the current operation of all data resources, in the effective analysis process, so that all data resources can be properly controlled, to ensure that the next information input link can complete the pulse characteristics of the embedded technology application

Research on Embedded Technology in Industrial Control Networking

737

process. We should pay more attention to the application characteristics of embedded technology, combine with the measurement of data resources, and ensure that the application of data resources can be combined with the standard dynamic processing, and then implement it, so that the next dynamic processing mode can be well integrated with embedded technology.

4 The Implementation of Embedded Technology in the Process of Data Transmission First, according to the requirements of information resource technology sending program, and then research and analyze the data processing program, so that all the database utilization can meet the requirements of data resource processing mechanism, and then analyze its processing, so that the next processing flow can send commands corresponding to information resources, so as to ensure that the quality of information resource processing can meet the network Application requirements, as shown in Fig. 2.

Data acquisiƟon module

Switching module

Interface acquisiƟon module

Data StaƟsƟcs Module

Embedded CPU module

Storage module

Display module

Correct calculaƟon module

Data sending module

Background terminal

Fig. 2 Data sending and receiving system block diagram

738

H. Yaoqiu

5 The Implementation of Embedded Technology in the Process of Data Receiving According to the requirements and suggestions of the data receiving system, the network setting program in the process of technical application should be effectively controlled, and at the same time, it should meet the following requirements of password resource processing. In addition, combined with the application characteristics of the gateway address, the receiving program of the data resource should be studied and analyzed, which should correspond to the processing opinions of the physical address in the process of technical application. In order to ensure that the current network resources can be effectively controlled by using computer programs, so that it can coordinate with the sending program of network information resources, and at the same time, the packet processing level can be significantly improved. To ensure that the current packet processing mechanism conforms to the application characteristics of packets, so that the data receiving program can be completed and carried out smoothly.

6 Conclusion In the actual application process, whether the measurement and control instrument can operate reliably and stably has a crucial influence on the whole measurement and control system. The stable operation of the measurement and control instrument depends not only on its own hardware, but also on the development level and stability of the wireless network measurement and control technology. It can effectively combine the two, so that the stability and practicability of the wireless network measurement and control system can be greatly improved, and at the same time, it can reduce the information in the whole measurement and control system production, so that it can be reasonable Effective use, and reduce waste and serve people.

References 1. Huadong, L.: Research and implementation of key technologies of embedded wireless networked measurement and control instruments. Shandong Ind. Technol. (23), 118 + 55 (2016) 2. Yishan, Z., Naiming, W., Yuyuan, Y.: Research and implementation of key technologies of embedded wireless networked measurement and control instruments. Sci. Technol. Commun. (14), 91 + 122 (2016)

Application of Vision Guarding Technique in Intelligent Grasp of Industrial Robot Lingyan Kong(&) Xinxiang Vocational and Technical College in Electrical System, Xinxiang, China [email protected]

Abstract. It is one of the basic problems in the application of industrial robots to recognize and accurately grasp the designated objects from the working scene. Based on the theory and technology of computer vision, this paper studies the vision guidance technology of intelligent grasping to industrial robot, puts forward a solution based on computer vision guidance, and gives the solution to the key problems such as target recognition, target position and pose calculation. This paper aims to introduce the new technology of computer vision into the application of industrial robots, so as to improve the perception ability and intelligence level of industrial robots. Keywords: Industrial robot estimation

 Vision guiding  Target recognition  Pose

1 Introduction As Human beings acquire process and understand visual information through eyes and brain. Objects in the surrounding environment form images on the retina of human eyes under the irradiation of visible light, which are then converted into nerve pulse signals by photoreceptor cells, and then transmitted to the cerebral cortex through nerve fibers for processing and understanding. Vision not only refers to the feeling of light signal, but also includes the whole process of obtaining, transmitting, processing, storing and understanding visual information. After the emergence of signal processing theory and computer, people use camera to obtain environment image and convert it into digital signal, trying to use computer to realize the whole process of visual information processing. In this way, a new subject computer vision is formed [1, 2]. The development of computer vision has become an interdisciplinary subject composed of computer science, signal processing, artificial intelligence, pattern recognition, artificial neural network and other disciplines. It focuses on the study of visual theory, and its research content is mainly image analysis and image understanding. It provides a unified theoretical framework for visual re-search, but it is difficult to be directly applied in engineering. Because the visual problem is too complex, there is still no theory to describe it completely. In addition, the huge amount of computation when using computer to deal with vision problems also limits its application to a certain extent. Therefore, in the practical application of computer © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 739–744, 2021. https://doi.org/10.1007/978-3-030-51556-0_113

740

L. Kong

vision, it is usually guided by the theory of computer vision, according to the specific problems and people’s prior knowledge to properly simplify the specific problems to be solved. This is also the main form of computer vision application [3, 4].

2 Architecture and Control Strategy of Visual Guidance System 2.1

Vision System Architecture

The composition of the visual guidance system. Here, two cameras are installed in the working scene as an example to introduce. The situation of multiple cameras is similar to this. 1. Hardware part. The vision guidance system consists of camera 1 and camera 2, video capture card, computer, industrial robot body and its controller as well as light source. Among them, camera 1 and camera 2, based on the principle of being able to shoot better target images from different angles, are flexibly placed in the installation position in the scene, and constitute eye to hand system with robot. The camera one, camera 2 and robot have no specific position. In the figure, {C1}, {C2} are camera coordinate systems of camera 1 and camera 2 respectively; {W} is world coordinate system of industrial robot; {T} is end coordinate system of robot; {O} is target coordinate system of object to be grabbed. 2. Software part. The software part of vision guidance system mainly refers to the program which is responsible for image acquisition and preprocessing, feature extraction, pose estimation, target recognition and control signal generation. The Fig. 1 showed various functional modules.

Image AcquisiƟon (Control the camera and complete the image acquisiƟon)

Image preprocessing and feature extracƟon (Obtain geometric features such as corners, lines, arcs, etc.)

Target recogniƟon and pose calculaƟon (Get pose informaƟon of target)

Crawl plan (Generate control informaƟon to guide the robot's grabbing process)

3D model library

CommunicaƟon module (Communicate with robot control and send control signals)

Fig. 1. Functional modules of visual guidance system

Application of Vision Guarding Technique

2.2

741

Visual System Control Process

The control flow of visual guidance system is shown in Fig. 2. First of all, the camera C1 obtains the original digital image of the target object, after the gray correction, smooth filtering and other preprocessing, the noise generated in the shooting process is removed, which paves the way for the next image processing. Then we detect the image features on the preprocessed image, and obtain a series of basic geometric features in the target image, such as: image coordinates of corner points, image coordinates of two ends of line segments, image coordinates of arc center, etc. Then on the basis of these geometric features, we select and combine them to form a combination of geometric features that can be used for target pose estimation. In this paper, the combination of geometric features is referred to as the image features of the target image. In the later part of this paper, when referring to the image special diagnosis of the target image, there is no special description, which refers to the combination of a series of basic geometric features of the target image used for the target pose estimation. The image feature detection will be described in the third part. Camera C1

Camera C2 Coordinate system transformaƟon

Feature detecƟon Image consultaƟon

Edge detecƟon

PosiƟon relaƟve to C2

Edge image

ProjecƟon calculaƟon

Target pose esƟmaƟon PosiƟon relaƟve to C1

Projected image

Model data

Is it coincident enough

Model features Clamping point Model selecƟon

3D model library

Crawl plan

Control informaƟon CommunicaƟng with the robot

Fig. 2. Control flow chart of visual guidance system

After getting the image features of the target image, select a 3D data model from the pre-established 3D model database, and assume that the model is the 3D data model of the target object. In this model, a series of geometric features corresponding to image features are combined to form the model features involved in target pose estimation. Set the image coordinates of the target image features as {(u0, v0), (u1, v1), …, (ui, vi)}, where each coordinate point represents an image coordinate point of a specific geometric feature; the coordinates of the corresponding model features in the target coordinate system of the 3D data model are {(x0, y0, z0), (x1, y1, z1), …, (xi, yi, zi)}.

742

L. Kong

2 3 2 u 1=dx 6 7 6 ZC 4 v 5 ¼ 4 0 1 0 2

fx 6 ¼40 0

0

u0

f 76 v0 54 0 1 0

1=dy 0

0

u0

fy 0

v0 1

32

3

0 C 7 R 05 W 0 0

3 0 C 7 R 05 W 0 0

0 0 f

0

0 1 2

XW

3

2 3 XW C 6 Y 7 Wt 6 W 7 6 7 1 4 ZW 5 1

ð1Þ

C 6 Y Wt 6 W

7 7 6 7 ¼ M1 M2 XW ¼ MXW 1 4 ZW 5 1

From the camera model introduced in Sect. 2.4.1, it can be known that if the image coordinates of image features{(u0, v0), (u1, v1), …, (ui, vi)} and the coordinates of target coordinates of model features {(x0, y0, z0), (x1, y1, z1), …, (xi, yi, zi)} are respectively substituted into formula (1) in this section, and the parameter matrix in formula (1) is solved according to the camera parameter calibration process introduced. The external parameter matrix M2 in formula (1) can be obtained when the camera internal parameters are known. The external parameter matrix M2 is the description of the target’s pose in the camera coordinate system. This process is the target pose estimation process of vision guidance system.

3 Image Acquisitions and Processing 3.1

Visual Image Acquisitions and Preprocessing

The acquisition and transmission of the object image is mainly composed of camera optical system, signal processing and transmission circuit, video image acquisition card. After A/D conversion of image acquisition card, video signal becomes digital image to be provided for calculation and processing. However, the collected image usually has different types of noise points, so it is not suitable for direct application to the subsequent image processing. Only after the collected image is demised can the subsequent processing be convenient. Smoothing is a common image preprocessing method, also known as smoothing filtering, which can effectively remove the noise in the image. Because there are many kinds of noise sources, such as grating scanning, mechanical components, channel transmission, etc., the kinds of noise are complex, so there are many kinds of corresponding filtering methods. According to space domain and frequency domain, it can be divided into two categories: frequency domain filtering and spatial domain filtering. 3.2

Image Feature Detection

Obtaining the image features of the target image is the premise of the pose estimation of the target object. Modern digital image processing technology provides us with many technologies and methods to achieve this goal. For the grasping operation of industrial robot under the guidance of vision, it is necessary to select appropriate digital

Application of Vision Guarding Technique

743

image processing methods and apply them. In view of the industrial robot’s grasping objects are mainly rigid objects such as mechanical parts, and the shapes of these objects always contain a large number of simple geometric elements such as line segments, vertices, circles, etc., therefore, these geometric elements can be taken as the basic features of the target object image, and then combined on the basis of these features into an image suitable for target pose estimation features. The data of model features are organized in text files in the following forms: [Vertex] aðxa ; ya ; za Þ bðxb ; yb ; zb Þ bðxb ; yb ; zb Þ cðxc ; yc ; zc Þ cðxc ; yc ; zc Þ bðxb ; yb ; zb Þ ... hðxh ; yh ; zh Þ eðxe ; ye ; ze Þ

dðxd ; yd ; zd Þ aðxa ; ya ; za Þ dðxd ; yd ; zd Þ

eðxe ; ye ; ze Þ f ðxf ; yf ; zf Þ gðxg ; yg ; zg Þ

gðxg ; y; zg Þ

dðxd ; yd ; zd Þ

[Vertex] End [Rectangle] aðxa ; ya ; za Þ bðxb ; yb ; zb Þ eðxe ; ye ; ze Þ f ðxf ; yf ; zf Þ aðxa ; ya ; za Þ bðxb ; yb ; zb Þ ... aðxa ; ya ; za Þ dðxd ; yd ; zd Þ

cðxc ; yc ; zc Þ dðxd ; yd ; zd Þ gðxg ; yg ; zg Þ hðxh ; yh ; zh Þ eðxe ; ye ; ze Þ f ðxf ; yf ; zf Þ hðxh ; yh ; zh Þ

eðxe ; ye ; ze Þ

[Rectangle] End

4 Conclusions This paper first introduces the design of vision guidance system. In the second section, the architecture, control flow and working principle of vision system are introduced. In the third section, the methods of image acquisition and preprocessing, image feature detection and modeling are discussed in detail.

References 1. Findlay, P.: Intelligent System for Automated Components Recognition and Handling. Mechanical and Manufacturing Engineering Department, Rand Afrikaans University, Johannesburg (2002) 2. Hager, G.D., Hutchinson, S., Corke, P.I.: A tutorial on visual servo control. IEEE Trans. Robot. Autom. 12(5), 651–670 (1996)

744

L. Kong

3. Chaumette, F., Malis, E.: 2D 1/2 visual servoing: A possible solution to image-based and position-based and position-based visual servoings. In: IEEE International Conference on Robotics and Automation, pp. 630–635. San Francisco (2000) 4. Malis, E., Chaumette, F., Boudet, S.: Positioning a coarse-calibrated camera with respect to an unknown object by 2D 1/2 visual servoing. In: IEEE International Conference on Robotics and Automation, pp. 1352–1359. Leuven (1998)

K-Means Algorithm in Classical Landscape Design Thought and Modern Landscape Design Guorui Li(&) Shaanxi Fashion Engineering University, No. 1 Chongwen Road, Qindu District, Xianyang 712046, Shaanxi, China [email protected]

Abstract. This paper discusses the importance of developing rural landscape, summarizes the gains and losses of the development of modern rural landscape in China from the aspects of theoretical research, plant selection, configuration mode, etc., and puts forward some suggestions for the research and development of rural landscape in China. Keywords: New countryside

 Garden plants  Configuration mode

1 Introduction Since the reform and opening up, China’s social and economic construction has made great achievements, especially the rapid development of urbanization. At the same time, China’s agricultural development foundation is weak, the lack of aftereffect is also further highlighted. Building a new socialist countryside has become a major strategic deployment to promote the overall development of rural economy and society in the new situation, is a major measure to implement the scientific concept of development and build a harmonious society, and is the fundamental way to change the backward appearance of rural areas in China. Among them, the construction of rural landscape architecture is also an important part of the current construction of a new socialist countryside, which is an important part of land greening, and also a basic cause of the current construction of a new socialist countryside of “production development, well-off life, rural civilization, clean village appearance and democratic management”.

2 The Significance of Developing Rural Landscape It is of great significance to develop the landscape industry with rural characteristics for improving the rural environment, promoting the construction of modern agriculture, increasing farmers’ income and improving their living standards.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 745–750, 2021. https://doi.org/10.1007/978-3-030-51556-0_114

746

2.1

G. Li

Improve the Rural Ecological Environment

In recent years, the problem of environmental pollution has been exposed constantly. Urban environmental pollution also has an impact on the rural ecological environment, especially in the urban-rural junction. At the same time, rural environmental pollution is also special. Because of the characteristics of low development level, high input, low output and high emission of township enterprises, farmers pursue crop yield and use a lot of pesticide and chemical fertilizer, which makes the rural soil environment continue to deteriorate, and the rural soil pesticide residues, heavy metals, soil acidification, etc., affect the safety of China’s agricultural base This control of rural pollution is the key to consolidate the foundation of China’s economic and social development. The development of landscape with rural characteristics can absorb and decompose pollutants and control pollution sources. At the same time, through the construction and publicity of rural landscape, it can improve the environmental awareness of farmers, gather environmental protection forces, and effectively curb the momentum of the deterioration of rural ecological environment, and gradually improve. 2.2

Improve Rural Economic Benefits

The village has rich plant resources and a favorable ecological environment. Combining plant characteristics with rural characteristics can not only change the rural appearance, but also guide the local development of flower and fruit breeding, planting, distribution, characteristic rural tourism and other industries, and can continue to expand rural industrial forms., Develop the secondary and tertiary industries, and promote the transformation and upgrading of local industries, thereby effectively improving the level of local economic development and improving economic benefits. In addition, according to the climatic conditions in the countryside and local characteristics of local economic tree species in each village, not only can it create a good green space environment, but it can also provide farmers with some material resources and create a certain economic income. 2.3

Improve Farmers’ Living Standards

The economic benefits brought by the development of rural garden landscapes are the economic basis for improving farmers’ living standards. Of course, the improvement of living standards should also include the improvement of living environment and spiritual life satisfaction. Obviously, garden landscapes with rural characteristics can be significantly improved the dirty and messy home environment in the countryside can purify the ecological environment, and at the same time, it can provide rich materials and elements for the spiritual and cultural life of the villagers, improve the cultural quality and health level, and contribute to the rural spiritual civilization construction.

K-Means Algorithm in Classical Landscape Design Thought

2.4

747

Improve External Investment Environment and Promote Agricultural Modernization

Agricultural modernization requires not only the modernization of agricultural infrastructure, management and technology, but also a clean and beautiful agricultural production environment to improve the efficiency of agricultural production. Moreover, in order to produce high-quality “green food” and build a modern agriculture that integrates commodity agriculture, foreign exchange earning, and ecological agriculture, it is even more necessary to have a clean and healthy high-quality agricultural production environment. The implementation of rural natural ecological gardening can not only provide the healthiest, most beautiful, safest, and most ideal production space for agricultural modernization, but also create a good external investment environment for attracting foreign investment and developing foreign exchange earning agriculture.

3 Research and Application of Rural Garden Landscape in Foreign Countries For the research sample data, two key undergraduate colleges that set Mu as a public elective course in the spring and summer semester of 2017, one local undergraduate college, and one local undergraduate art college. Among them, there were 8958 student samples eligible for MOOC selection. Among these learning samples, 2229 people chose MOOC courses, and the remaining 6729 people did not use this learning method. From the consideration of the students’ own factors, set the random event “choose MOC learning” as the dependent variable Y, the student as the sample X, and the student’s gender as the influencing sample factor (independent variable) X1, the age is X2, the available credit is sufficient as X3, The number of classes is X4, the highest score obtained by MOOC learning is X5, and the student’s specialty category is X6. These 6 factors are included as samples to evaluate whether MOOC learning method is selected (hereinafter referred to as MOOC). Among them, the “number of learned MOOCs” and the “highest score obtained by MOOC” are independent of each other. Students’ professional attributes are determined as categorical variables and dummy variables [7] (virtual independent variables) need to be set. Except that the student’s specialty category X6 is determined to be included in the equation using categorical variables, age X2, the highest score X5 obtained in MOOC can be used in the regression model as a continuous variable [8], and can also be included in the model as a categorical variable. In the end, it is necessary to determine which variable type is more suitable based on the effect of equation fitting and combined with actual experience. In this study, SPSS19.0 [8] was used to perform equation regression analysis. First, the above two variables were designed according to categorical variables, where X1 (“Female” is represented by 0, “Male” is represented by 1), and X2 (“less than “18 years old” is recorded as 0, “18–19 years old” is recorded as 1, “20–22 years old” is recorded as 2 and “22 years old and above” is recorded as 3), X3 (0 means none, 1 means yes), X4 is continuous variable, X5 (“learning score less than 60 points” is recorded as 0, “60–70 points or lower” is recorded as 1, “70–85 points or lower” is

748

G. Li

recorded as 2, and “85 points or higher” is recorded as 3), X6 For (“Cultural and historical” is represented by 0, “Art” is represented by 1, and “Technical” is represented by 2.) Or select the above two types of pending variables as continuous variables to design the model, and the remaining variable types and values remain unchanged. After 6-step regression analysis, the variables and coefficients of the influencing factors that are finally included in the equation are shown in Table 1. Similar to the results of the previous multi-factor analysis, only the P value of X22 in age X2 is less than 0.05, that is, the age of 20 to 22 has a significant impact on the equation, and the remaining age groups should not be included in the equation; similarly, the available credits are sufficient X3 The P-value is significantly greater than 0.05, which is not statistically significant, and the equation should be eliminated. Referring to the test results in Table 2, the chi-square value is less than the chi-square critical value of 15.507 when the degree of freedom is 8 and a = 0.05, which means that the rejection of the null hypothesis test is passed, and the P value is greater than 0.05, which proves that the test is significant. Therefore, the Logit equation is: Logit ¼ hT X ¼ h0  0:237X1  0:66X2  1:094X4 þ 0:054X5 þ 1:364X61 þ 0:6X62 Table 1. Multi factor analysis results of mixed variable type Variable X1 Gender X2 Age X21 Age(1) X22 Age(2) X23 Age(3) X3 Sufficient credits available X4 Number of MOOC lessons learned X5 The highest score of MOOC study X6 Student major study category X61 Student major study category(1) X62 Student major study category(2) Constant

Regression coefficient −0.273

Standard error 0.125

Freedom

10153.233 0.208 0.182 1527.995

Wald value 4.767 11.831 0 10.125 2.12 0

−18.511 −0.66 −0.265 21.149

1 3 1 1 1 1

P value 0.029 0.008 0.999 0.001 0.145 0.989

Odds ratio 0.761

−1.049

0.16

46.749

1

0

0.335

0.054

0.003

422.267

1

0

1.056

86.172

2

0

0 0.517 0.767 1.53

1.364

0.148

85.014

1

0

3.912

0.6

0.153

15.288

1

0

1.822

−24.458

1527.995

0

1

0.987

0

K-Means Algorithm in Classical Landscape Design Thought

749

Table 2. Hosmer and EShow test results of mixed variable type model Chi square Freedom P value 13.094 8 0.109

4 Establish MOOCs and Learn Classification Guides Bring the obtained parameters into the regression equation and calculate the student’s choice of MOC [7, 8]. Based on the results of probability calculations, establish a MOOC learning classification guideline. The students who choose MOOC learning probability (0, 0.4) will be divided into MOOC low-interest groups, and (0.4, 0.5) and (0.5, 1) will be divided into The middle and high interest groups studied by MOOC are shown in Table 3. With the help of statistical results, the teaching management department can take the lead in conducting targeted investigations on non-selected MOE learners among the middle and high-interest groups; based on the summary of the survey results, specific guidance for students is provided: Advantages of learning methods, the use of MOOC and the collaboration between MOOC and traditional classroom. By fully showing the diversity and richness of the knowledge on the MOOC platform to students, it makes them feel the convenience and flexibility of MOOC learning, and promotes MOOC learning to be accepted by more students, thereby improving college students. The proportion of learners in MOOC has further improved the efficiency ratio of college investment in MOOC construction, which fully reflects the advantages of MOOC teaching. Table 3. Distribution of observation results in prediction selection probability interval Prediction selection probability interval Observation results Choosing MOOCs No MOOCs selected (0, 0.4) 792 5304 [0.4, 0.5) [ (0.5, 1) 1437 1425

References 1. Liu, G., Li, J., Liang, Z.: Thoughts on and countermeasures for teaching innovation in colleges and universities in the “Internet+” era. China High. Educ. Res. (2), 93–98 (2017) 2. Fan, L.: The number of MOOCs in China has ranked first in the world. Wenhui Bao, 2018-0116 (A2) 3. Gu, S., Wang, C., Gu, C.: Influencing factors of psychological toughness of college student athletes based on hierarchical multinomial logit model. J. Beijing Sport Univ. (03) (2017) 4. Lu, L., Tan, Q.: Maximum entropy distribution algorithm and its application. Syst. Eng. Electron. (5), 820–822 (2007) 5. Wang, J.: Logistic Regression Model: Method and Application. Higher Education Press, Beijing (2001)

750

G. Li

6. Li, H., Mai, J., Xiao, M.: Application of dumb variables in logistic regression model. Evid.Based Med. (01), 42–45 (2008) 7. Xu, R.: Screening of logistic regression variables and selection of regression methods. Chin. J. Evid.-Based Med. (11), 1360–1364 (2016) 8. Zhang, W.: Basic Course of SPSS Statistical Analysis, 2nd edn. Higher Education Press, Beijing (2011)

Optimization Design of Refrigerator Turnover Beam Based on CAE Simulation Technology Li Qiuli1, Li Yan2, Zhao Yonghao1(&), Li Hailin1, and Luo Hui1 1

2

School of Mechanical and Electrical Engineering, Guangzhou City Construction College, Guangzhou 510925, Guangdong, China [email protected], [email protected], [email protected], [email protected] School of Business, Beijing Institute of Technology, Zhuhai, Zhuhai 519088, Guangdong, China [email protected]

Abstract. In the current design of refrigerator turnover beam, it mainly depends on the experience of structural engineers. The overturned beam often has problems such as bending, large assembly gap, large overturning resistance and condensation. The mold needs to be changed repeatedly, extending the product design cycle and increasing the verification cost. It will also bring market complaints and increase the cost of after-sales maintenance. Through the CAE simulation technology, the structure simulation analysis, thermal stress simulation analysis and rotation simulation analysis of the refrigerator turnover beam are carried out, and the targeted optimization design of the refrigerator turnover beam can shorten the design cycle, reduce the design defects of the refrigerator turnover beam, and improve the reliability of the refrigerator turnover beam. Keywords: Refrigerator  Turnover beam  CAE  Structure simulation Thermal stress simulation  Rotation simulation  Optimization design



1 Introduction At present, the turnover beam of refrigerator is mainly designed according to the experience of structural engineer. The turnover beam designed often has problems such as bending of the turnover beam, large assembly gap, large turnover resistance, inadequate turnover, condensation of the turnover beam, etc. it needs to be repeatedly verified and changed the mold, which prolongs the product design cycle and increases the product development cost. With the increasing sales volume of large volume doorto-door refrigerators, as a key component of door-to-door refrigerators, it is particularly important to improve the design reliability of the flip beam of refrigerators and shorten the design verification cycle of the flip beam. CAE simulation analysis technology is more and more widely used in the field of home appliances, and the technology is becoming more and more mature. CAE technology is used to simulate and analyze the turnover beam of refrigerator. According to the simulation results, the rationality of the structure of the turnover beam is evaluated in advance. The optimization design of the © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 751–755, 2021. https://doi.org/10.1007/978-3-030-51556-0_115

752

L. Qiuli et al.

turnover beam can greatly shorten the design cycle of the turnover beam of refrigerator and the verification cycle of opening mold, and improve the reliability of the design of the turnover beam. 2 Technical flow chart (Fig. 1). Initial structural design of rotating beam

GAE Analysis of part model

Output GAE Analysis Report

Structural optimization

Judge whether the structure is reasonable according to the rigidity of transfer beam, thermal analysis deformation and rotating opening force of GAE Analysis Report

NO

YES Conduct product structure sample inspection

Confirm product status production

Fig. 1. Technical flow chart

2 Structure Simulation The two ends of the overturned beam are constrained, and the virtual load is applied in the middle to analyze. The results are shown in Figs. 2 and 3.

Fig. 2. Simulated stress cloud chart of turnover beam structure

Fig. 3. Simulation deformation cloud chart of turnover beam structure

Optimization Design of Refrigerator Turnover Beam

753

3 Thermal Stress Simulation According to the actual use environment of the rotating beam, different temperatures are applied to the inner and outer sides of the rotating beam, and the bending amount of the rotating beam caused by the temperature difference between the two sides of the rotating beam is simulated. The simulation results are shown in Fig. 4 below.

Fig. 4. Cloud chart of thermal stress simulation deformation of turnover beam

4 Rotation Simulation According to the actual use of the turnover beam, the movement process of the rotating beam during the opening and closing of the door is simulated and analyzed, the model is simplified, the contact, constraint and rotation displacement are applied, and the stress nephogram during the opening of the door is shown in Fig. 5 below, and the curve of the opening force with the opening angle during the opening of the door is shown in Fig. 6 below.

Fig. 5. Simulated stress cloud chart of turning beam

754

L. Qiuli et al.

Fig. 6. Change curve of simulation door opening force of turning beam

5 Structural Optimization Combined with the structural analysis and thermal stress analysis of the deformation and stress-strain distribution, the structural strength of the rotating beam is improved by optimizing the structure of the notch, increasing the stiffener, increasing the flanging height of the sheet metal, etc., the influence of the residual stress and the shrinkage stress is reduced by optimizing the assembly clearance, optimizing the position of the limit block of the rotating beam, etc., and the change curve of the opening force and the The change of stress and strain in the process of opening the door, optimize the structure of the rotary beam cam, the setting of the spring and the setting of the pulling block. Carry out structural simulation analysis, thermal stress analysis and rotation simulation analysis for the optimized turnover beam again, and get the structural simulation deformation cloud diagram as shown in Fig. 7, the thermal stress simulation analysis deformation cloud diagram as shown in Fig. 8, and the rotation simulation door opening force angle curve of the turnover beam as shown in Fig. 9.

Fig. 7. Simulation deformation cloud chart of the optimized turnover beam structure

Fig. 8. Simulated deformation cloud chart of thermal stress of optimized turnover beam

Optimization Design of Refrigerator Turnover Beam

755

Fig. 9. Change curve of opening force with opening angle after optimization of turnover beam

6 Result Processing and Analysis The comparison of simulation data before and after optimization is shown in Table 1. According to the simulation analysis results, the strength of the optimized overturned beam structure is greatly improved, the bending deformation is greatly reduced, and the opening force is also greatly reduced. It can meet the use requirements.

7 Conclusion It can be seen from the simulation and test data that the bending degree of the optimized turning beam is reduced by 53.4% compared with the original turning beam. Under the premise of ensuring the self-locking force and turning force of the rotating beam, the opening force is reduced by 20.5%. The error between simulation results and test results is about 8%, which is acceptable. Under the guidance of CAE simulation analysis results, targeted optimization of the turnover beam structure greatly improves the structural performance and use experience of the turnover beam, shortens the development and verification cycle, improves the design and development efficiency, and ensures the reliability of the turnover beam structure.

References Lei, C., Daihua, W.: Finite element analysis and Simulation of a high axial stiffness triaxial rotating flexible hinge. Mech. Des. (1) (2009) Guangping, F., Weixiang, Z., Longchun, H.: Optimization of refrigerator product structure and external packaging scheme based on CAE. Packag. Eng. (5) (2003) Hongjun, W., Jianwei, D., Qiang, S.: Calculation of moment of inertia and moment of inertia by finite element method. Shijiazhuang Railw. J. Polytech. (2006) Nianjie, W., Yu, L., Lang, G, Ling, P.: Xiangdong refrigerator structure system based on UG secondary development is fast Design. Mech. Des. Manuf. Eng. (11) (2013)

Design College Scores Test System Based on C4.5 Algorithm Li Tian(&) Foreign Language Department, Shaoyang University, Shanyang 422000, Hunan, China [email protected]

Abstract. With the rapid expansion of data volume, data mining comes into being. We use the advantages of data mining widely used in various industries, but in the education management industry, especially according to the students’ historical scores for data analysis and guidance. In this paper, we use data mining to analyze the relationship between English scores and CET-4, and the relationship between English scores and CET-4. By using the improved Apriori algorithm, the paper analyzes the indirect relationship among the four levels of English scores. According to the analysis, we also get the concrete conclusion: Although the students’ entrance English scores have certain influence on the CET-4 scores, they are definitely not decisive factors, but the school English scores play a decisive role in the passing of CET-4. Finally, it is proposed that students with excellent English are more likely to fail in CET4, which needs more attention. Keywords: Data mining

 College English  Score  Pass rate

1 Introduction The research of data mining technology has a long history in foreign countries, and has achieved fruitful results. In the teaching and management of foreign schools, data mining has become more and more important tool to raise the level and quality about teaching management [1, 2]. However, data mining is not widely used in various industries in China. Many enterprises and companies are still in wait-and-see. About the teaching management system of university, data mining has not been got full attention, and needs to be further studied. Due to the lack of data mining, College English scores are buried in the database, and the relationship between these data can be fully utilized. Therefore, it is very necessary for us to use data mining to analyze the massive data of universities scientifically, and raise the education management level of colleges and universities according to the reliable conclusions, so as to achieve the ideal management effect. For students, it is mainly reflected in the change of their scores, especially the CET-4 and CET-6 required to be passed by graduates [3, 4].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 756–760, 2021. https://doi.org/10.1007/978-3-030-51556-0_116

Design College Scores Test System Based on C4.5 Algorithm

757

2 Data Mining and Improved Apriori Algorithm 2.1

What’s the Data Mining Concept

Data mining is to mine valuable knowledge and rules from large-scale data that are of interest to users and guide decision-making. Data mining needs data collection, preprocessing, analysis, result evaluation and other processes. The main algorithms used are association rules, artificial neural network, decision tree method, fuzzy theory method, genetic algorithm, rough set method Bayesian model and so on [5, 6]. 2.2

Apriori Algorithm

Apriori algorithm is a prior knowledge-based, Boolean association algorithm which is widely used in engineering. It makes use of the subsets property, reduces the number of searches, adopts the search method of iterative layer by layer, first generates frequent item set L1, then generates frequent binomial set L2 according to L1, then generates the current frequent item set according to the previous frequent item set, and circulates until there is no maximum item set. There are two steps to lead L2 from L1: connection and pruning. Connection refers to the set ck of candidate k-term set generated by connecting LK−1 with itself in order to find LK. Pruning refers to that in order to compress the superset of CK, that is, LK, all the subsets that are non-empty and frequent item set of Apriori algorithm must also be frequent, so as to judge whether a candidate’s non empty subsets are frequent, if not, then the candidate is certainly not frequent, then it will be removed from CK. In the algorithm, min sup represents the minimum confidence. We use the following rules to describe the Apriori algorithm:

2.3

Improvement of Apriori Algorithm

Although Apriori algorithm is relatively mature in theory and engineering application, it still has defects. When calculating the item set support, all records are scanned and compared. If it is a large-scale database, this kind of scanning comparison will increase the I/O load of the computer system. Therefore, it is necessary to design an algorithm to

758

L. Tian

reduce the I/O cost of this system. If an element becomes an element in the kdimension item set, the count times of the element in the k−1 level frequent item set must be greater than k−1. Otherwise, the k-dimension item set cannot be generated. If the count number is less than k−1, delete the element in advance, so as to exclude all combinations of large specifications caused by this element. The specific steps of the improved algorithm are as follows: (1) Count the frequency of occurrence of all item sets with one element; (2) Find the item set with the support degree Da B at the confidence level, that is, find the frequency Complex 1-term set, and C’1; (3) Starting from the second act of loop processing until there is no frequent project set Generation cutoff. There are two stages in the cycle ① The first stage is to generate a function apriori_gen, which generates candidate item set CK and C’k through frequent item set Lk 1 which is not in the middle of k−1; ② In the second stage, by traversing C’k, the support degree of candidate project set CK is calculated. In this algorithm, C’k is a set, XK represents TID in transaction, and the potential frequent k-item set. When k = 1, C’1 is consistent with the database; when k > 1C’k is obtained by the algorithm, and the elements in set c’k are consistent with transaction t. Therefore, the data of c’k must not be larger than the data of things in the database.

3 The Establishment and Solution of English Achievement Model Based on Mining This paper is based on the students’ English scores, freshmen, sophomores, juniors and seniors. Using the improved Apriori algorithm to analyze entrance English. In this paper, the author makes a further analysis of the influence of the scores of entrance English and school English on CET-4, and gets the corresponding conclusion. The details are as follows: (1) Enrollment score and support: enrollment score = excellent support is 14.81, enrollment score = good support is 33.33, enrollment score = medium support is 40.74, enrollment score = poor support is 11.11. (2) Grade and support of CET-4: 62.96 for CET-4 passing and 37.04 for CET-4 failing (3) Entry English and CET-4 scores: The score of admission = 7.41, Admission score = 7.41 for those who fail to pass CET-4, The score of admission = 29.63 for passing CET-4 of good & English, Admission score = 3.66 for good & CET-4. Admission score = 18.52 for CET-4, Admission score = 22.22 for CET-4 failure, Admission score = poor & the support of passing CET-4 is 7.41, Admission score = poor & the support of failing CET-4 is 3.65. If the false setting reliability is set to 50%, we can get the rules.

Design College Scores Test System Based on C4.5 Algorithm

759

Using the association rules, we get the following conclusions: (1) Confidence level of English scores and CET-4 scores: a) The confidence of passing CET-4 is 50% b) The confidence of failing CET-4 is 50% c) The confidence of passing CET-4 is 89% d) The confidence of failing CET-4 is 55% e) The confidence of passing CET-4 is 67% (2) English scores and CET-4 confidence: a) The confidence of passing CET-4 is 98% b) The confidence of passing CET-4 is 68% c) The confidence of passing CET-4 is 64% d) The confidence of failing CET-4 is 99% From the above association rules, we find that: (1) For the students with excellent English scores, the confidence of passing CET-4 is 0.5, while for the students with poor English scores, the confidence of passing CET-4 is 0.67; for the students with good English scores, the confidence of passing CET-4 is 0.89; (2) The confidence of failing CET-4 is 0.99 for students with poor English scores, and 0.98 for students with excellent English scores. From (1) and (2), we can draw the following conclusion: a student’s English score has a certain influence on the student’s CET-4 score, but it is not a decisive factor. However, the school’s English score plays a decisive role in the passing of CET-4, so we should educate the students to study English hard after they enter the school, and the teaching management department should pay attention to strengthening the students In order to make the students pass the CET-4 smoothly, we should teach them English at school. According to the Apriori algorithm in 2.4, the data mining of Hulan college students’ English scores in entrance, school and CET-4 is carried out, and the result with confidence degree greater than 0.5 is that the confidence degree of {entrance English = good, school English = excellent, CET-4 score = pass} is 87%. Through the improved Apriori algorithm, we can see that the students who are good at English entrance, good at English in school, and pass level 4 can reach a confidence level of 87%, which is enough to believe that the students who are good at English entrance and good at English in school are very likely to pass level 4, so we don’t need to worry about the passing of level 4 of these students.

4 Conclusion This paper used the popular data mining method to support and guide the school education work, which is helpful to the school education decision-making. In this paper, we mainly use association rules and Apriori algorithm to analyze the relationship between the entrance English scores and the school English scores on CET-4 scores, and use Apriori algorithm to analyze, so as to get a very instructive direction. At the end of this paper, the author gives some suggestions: the teaching management

760

L. Tian

department should pay more attention to and manage the students who are easy to be proud of their good English scores, encourage the students who are not good at English scores, and let the students understand that English scores in school are the decisive factor for CET-4 scores. Acknowledgement. Scientific research project of Education Bureau of Hunan Province, China: Justify the use of ETIC in Application-oriented Universities.

References 1. Chen, L., Jiao, L.: Research status and latest progress of Internet/Web data mining. J. Xi’an Univ. Electron. Sci. Technol. (Natural Science Edition) 28(1), 3 (2011) 2. Member Qiaoyun, Cheng, G.: Summary of data mining research in China in recent years. J. Inf. Sci. 24(2), 250–256 (2015) 3. Yu, L., Zhang, J.: Performance analysis and prediction of higher vocational students based on data mining. J. Zhengzhou Light. Ind. Coll.E 21(3), 77–79 (2006) 4. Zhang, F.: Application of association rule mining in the design of personalized learning system. J. Shaoguan Univ. (Natural Science Edition) 26(9), 36–40 (2010) 5. Yan, X., Cai, Z.: Research on an efficient association rule mining algorithm based on Apriori. Comput. Eng. Appl. 38(10), 209–211 (2012) 6. Ding, Y.: Research on the application of data mining technology in the evaluation of teaching quality in colleges and universities, p. 15. East China Normal University, Shanghai (2005)

Design of Agricultural Precision Irrigation System Based on Wireless Sensor Network (WSN) Wensen Lin(&) Sichuan Tianyi College, Mianzhu, Sichuan, China [email protected]

Abstract. The current situation of water shortage in agriculture in China and the significance of implementing precision irrigation are described. The agricultural precision irrigation system based on wireless sensor network is designed from the aspects of system structure, routing protocols, cost control, etc. The combination of network technology and agricultural irrigation technology has achieved the goal of precision irrigation, thereby improving the utilization of water resources and alleviating the problem of water resources tension. Keywords: Wireless sensor network  Precision irrigation  Crop water status  Routing protocol  Sensor node

1 Introduction Although the total amount of water resources in China is large, it is due to the large population. The annual water consumption is also very large. At present, China’s per capita water resources are about one quarter of the world’s per capita. In addition, the natural environment between North and South of China is very different. Several northern provinces are even less watery. In recent years, the urban population has increased dramatically, the ecological environment has deteriorated, industrial and agricultural water technologies are lagging behind, serious waste, and water pollution have made the originally scarce water resources more scarce. Water shortage has become the most important factor restricting China’s agricultural development. Therefore, in the production and planting of crops, fruit trees, etc., it is imperative to implement water-saving irrigation, and the implementation of precision irrigation is the top priority. With the increasing shortage of water resources, the contradiction between water supply and demand in countries around the world has become increasingly prominent. The fundamental way out to resolve this contradiction is to vigorously develop and promote precision irrigation, and to carry out scientific irrigation in a timely and appropriate manner according to the information of crop water demand to achieve the goal of saving water and increasing production [1]. As the pillar industry of our country’s economy, the need for water consumption is self-evident. For a long time, it has been limited to ideological concepts, financial support, technical equipment and other reasons. The irrigation of crops has always followed the traditional large-scale © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 761–765, 2021. https://doi.org/10.1007/978-3-030-51556-0_117

762

W. Lin

flood irrigation. With the increasing shortage of water resources and the increase in agricultural water demand year by year, the contradiction between the two is constantly intensifying. The modern water-saving irrigation mode, precision irrigation, is gradually replacing the traditional flood irrigation mode.

2 Application of Wireless Sensor Network in Precision Irrigation 2.1

The Significance of Precision Irrigation

Agricultural water saving is based on efficient water use. The precise irrigation of crops has always been the research focus of water saving irrigation, that is, to solve the problem of when and how much irrigation [2]. Precision irrigation refers to the use of microspraying, drip irrigation, etc., according to the physiological characteristics and water demand of crop water, and the relationship between crop growth and environmental factors such as soil moisture, soil nutrients, air humidity, and atmospheric temperature. Speed, implement precise water volume control, so as to get rid of the constraints of soil, climate, water source and irrigation facilities, keep the farmland water potential at the optimal state suitable for crop growth, and achieve the purpose of water-saving irrigation. Precision irrigation technology can not only use the limited water resources to the greatest extent to alleviate the severe situation of fresh water shortage and excessive groundwater extraction, but also can effectively improve the soil environment and growth conditions of crops and fruit trees through effective combination with precise fertilization. So as to improve the yield and quality of crops and fruits, it brings good economic and social benefits. Precision irrigation is not only an important means to ensure the growth and water demand of crops, to obtain high quality and high yield, but also an important measure to improve fertilizer and drug efficiency, and reduce environmental pollution. Precision irrigation can greatly improve the utilization of water resources, reduce the waste of fertilizers, avoid weeds, improve soil conditions, reduce the pressure on water resources, and make agricultural production and life truly lowinput and high-yield.. Precision irrigation takes scientific water distribution, scientific water use, and scientific water-saving as the core. It can greatly improve the water utilization rate and increase agricultural production and income. It is an effective way to solve the agricultural water shortage in China. 2.2

Introduction to Wireless Sensor Networks

WSN is make up many micro-sensors which distributed in these monitoring local. They quickly establish their own network through wireless communication to collect dynamic information of the perceived objects in the network coverage area [3]. Calculation and processing. Wireless sensor networks have been regarded as the second largest widespread network after the Internet. As one of the important and commonly used new technologies for information acquisition, wireless sensor networks have developed rapidly and gradually penetrated into all areas of people’s production and life, including agriculture in the field of precision irrigation.

Design of Agricultural Precision Irrigation System

2.3

763

Advantages of Wireless Sensor Networks in Precision Irrigation

WSNs have been widely used in various fields, and they are in the agricultural field. Especially in the field of agricultural precision irrigation, the application prospect is very broad. To achieve precise irrigation, it is necessary to accurately obtain the crop water demand information, and to formulate an irrigation control plan based on the water demand information [4]. Wireless sensor networks have the characteristics of flexible network structure, large coverage area, long data transmission distance, good compatibility, high sensing accuracy, and low application cost. They are very suitable for agricultural water-saving irrigation systems. achieve. The application of wireless sensor network technology to agricultural precision irrigation is in line with the characteristics and development direction of crop growth and fruit tree planting. With the continuous in-depth research of wireless sensor networks, the use of wireless sensor networks to implement agricultural precision irrigation presents an increasingly broad development prospect. The wireless sensor network can aim at the characteristics of large amount of data collection in field irrigation, and can easily realize the long-distance transmission of a large amount of data. The implementation of precision irrigation must have three conditions: one is to master detailed crop water demand data; the other is to use advanced information technology; the third is to provide a large number of technical indicators that connect the two and convert these indicators into remote sensing labels and model. It can be seen that the monitoring of crop water status is the basis and guarantee of precision irrigation [5]. Through the WSN, the soil and crop water conditions in the farmland can be monitored in real time, and areas lacking water can be identified to achieve precise irrigation. WSNs can be used to collect and monitor soil moisture, canopy temperature information, worse stem diameters, plant transpiration rates, acoustic emission signals, etc. These are all for better diagnosis of crop moisture conditions, combined with agricultural irrigation equipment and technology, Quantitative precision irrigation provides the necessary conditions. WSN can not only realize real-time monitoring, sensing, and collection of monitoring object information in the network distribution area, and process these information, but also send the information to the user wirelessly in real time. Applying it to precision agriculture can effectively solve the problem of obtaining farmland information. In the actual farmland irrigation process, it is relatively easy to collect information such as soil moisture, and then diagnose the water shortage of the crops, and feed the results and solutions back to the farmers.

3 Design of Agricultural Precision Irrigation System Based on WSN 3.1

System Structure

In order to transmit real-time, accurate, and stable data on farmland soil and crop moisture, wireless sensor networks must establish a stable and reasonable architecture to ensure accurate data transmission. The basic structure of a complete precision

764

W. Lin

irrigation system based on WSN is shown in Fig. 1. In this structure, various sensors of the wireless sensor node network are used to monitor the soil moisture and external environment of crop growth in real time. The sensor is responsible for collecting field soil moisture information. Mining signal. After processing, the data is transmitted to the base station through the wireless sensor network. The base station collects and aggregates the collected data and sends it to the irrigation expert system. The central processing server of the irrigation expert system combines the weather conditions and background irrigation knowledge base according to the received soil moisture information data. Decide on the corresponding irrigation measures and irrigation decisions, and form irrigation control instructions, and then send them to the irrigation control executive through the base station, so as to achieve large-area, agricultural information collection automation, precision irrigation precision irrigation. The wireless sensor network realizes the collection and transmission of soil moisture, and the transmission of irrigation control instructions.

User Interface

Base staƟon

IrrigaƟon Knowledge Base

IrrigaƟon Expert System

Weather condiƟons

Soil moisture collecƟon

IrrigaƟon Control Actuator WSN

Fig. 1. Basic structure of precision irrigation system

3.2

Routing Protocol

With the research and development of WSN at home and abroad, many routing protocols have been proposed. From the perspective of network topology, they can be roughly divided into two categories: flat routing protocols and cluster routing protocols. The more representative ones are flooding protocol (FLOODING), directional diffusion protocol (DD), and low energy adaptive clustering layered protocol (LEACH). In order to meet the needs of precision irrigation, when selecting a wireless sensor network routing protocol, various factors such as network structure, sensor node deployment, reliable data transmission, complexity, and low power consumption should be considered. Because wireless sensor networks are highly related to applications, their routing protocols are also diverse, and it is difficult to say which protocol is superior. Because routing protocols in sensor networks are application-dependent, there has not been a universally applicable routing protocol for wireless sensor networks. In the actual production or planting process of crops, it is necessary to make reasonable selection and optimization based on the topography, crop area, and location distribution. 3.3

Cost Control

The large-scale application of wireless sensor networks in the field of agricultural precision irrigation has a large amount of soil moisture and crop moisture information that needs to be collected under a large area of irrigation area, so a large number of

Design of Agricultural Precision Irrigation System

765

sensor nodes are required accordingly. A sensor node is a basic functional unit of a wireless sensor network, and should have basic attributes such as low power consumption, low cost, and wireless networking. At present, many technologically advanced sensors, such as soil temperature and humidity sensors, air temperature and humidity sensors, are mainly dependent on imports, and their prices are not low. Therefore, the sensor nodes of the sensor network should be arranged according to the actual situation and the actual goals to be achieved, the number of sensors should be appropriately controlled, the characteristics of the flexible design of the wireless sensor network networking, and the cost should be controlled. The cost is an important indicator of whether the wireless sensor network nodes can be successfully implemented in agricultural irrigation systems. Only low costs can be deployed in large areas in large areas, reflecting the various types of wireless sensor networks in agricultural precision irrigation.

4 Conclusion Modern agriculture requires an efficient and accurate agricultural irrigation system, and the application of wireless sensor network technology to agricultural precision irrigation can provide a reliable basis for soil moisture and crop moisture conditions, thereby reducing irrigation costs, improving water resource utilization, and promoting agriculture. The development of irrigation in the direction of precision irrigation has greatly improved the level of networking, digitalization and intelligence in the field of agricultural irrigation.

References 1. Feng, G., Li, Y., Wenan, Z., et al.: Preliminary study on precision irrigation system of wireless sensor network based on crop water stress acoustic emission technology. J. Agric. Eng. 24(1), 60–63 (2008) 2. Bing, Z., Jiansheng, Z., Wensheng, H., et al.: Research on irrigation fuzzy decision-making system based on crop physiological and electrical characteristics and soil moisture. Jiangsu Agric. Sci. 6, 440–441 (2009) 3. Cai, J., Liu, Y., Lei, T., et al.: Research status and progress of quantitative indicators for precise irrigation decision-making. Adv. Water Sci. 15(4), 531–537 (2004) 4. Antai, H., Yong, H., Chen, Z., et al.: Distributed irrigation control system for tea garden based on wireless sensor network. J. Agric. Mach. 42(9), 173–180 (2011) 5. Feng, G., Li, Y., et al.: Crop precision irrigation system based on wireless sensor network changes in stem diameter. J. Agric. Eng., 24 (2008)

Network Security Situation Awareness Strategy Based on Markov Game Model Chengfei Lu(&) Shandong Polytechnic College, Jining 272006, Shandong, China [email protected]

Abstract. Information technology has been developed rapidly, but various types of network attacks are constantly emerging, ensuring the security of information networks has become an urgent need. Starting from network security situation awareness, this paper expounds Markov theory and designs Markov game model. In the model, the system security is improved through security reinforcement and risk repair. The experiments verify that the algorithm in this paper is superior to the risk assessment model of propagation. Keywords: Markov game model

 Network security  Security assessment

1 Introduction Internet technology and big data technology have developed rapidly in recent years, and the network has been widely used for information transmission. In complex information networks, data is often intercepted to varying degrees, and the resulting network security has become a research hotspot. This article analyzes network security situation awareness, then uses Markov decision-making to design a Markov game model based on game theory, applies this model to network security assessment, and finally analyzes the evaluation results.

2 Cyber Security Situation Awareness Situational awareness is mainly divided into three levels: element acquisition, data integration to find correlation, and situational prediction through data mining. Network security situational awareness is the current status and subsequent development of the entire network system composed of the operating conditions, network status, and user behavior of network facilities. Its system architecture is. It can be that the network security situational awareness system uses sensors to obtain data, and then uses the situational understanding module to predict system state changes. The security reinforcement module in the figure will play a role in repairing and maintaining the system, thereby reducing external invasion of the system [1].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 766–771, 2021. https://doi.org/10.1007/978-3-030-51556-0_118

Network Security Situation Awareness Strategy

767

3 Markov Game Model Design At present, Markov game theory has been widely used in network security systems. This article uses the two-person zero-sum game as an example to explain the principle [2, 3]. The state set is S, the action set of the two is A1 and A2, the probability set of state transition is P, and the reward function of the two is r1 (s, a1) and r2 (s, a2). The decisions of the two parties to obtain the maximum overall return are p1 (s) and p2 (s). Let s0 be the initial state of the game, bt be the discount rate with period t, and the action strategies of the two people in period t are p1 (st) and p2 (st), and the expected discount obtained after infinite cycles is Vp (i), the state after a period is i, then: Vp1 ðsi Þ ¼ Ep1 ð

1 X

bt r1 ðst ; p1 ðst Þ; p2 ðst ÞÞjs0 ¼ si Þ

ð1Þ

bt r2 ðst ; p1 ðst Þ; p2 ðst ÞÞjs0 ¼ si Þ

ð2Þ

t¼0

Vp2 ðsi Þ ¼ Ep2 ð

1 X t¼0

According to above formula, we get r1 ðst ; p1 ðst Þ; p2 ðst ÞÞ ¼ r2 ðst ; p1 ðst Þ; p2 ðst ÞÞ According to the joint strategy p (s) of the two formulas, we can get: Vp ðsi Þ ¼ Ep ð

1 X

bt rðst ; pðst ÞÞjs0 ¼ si Þ

ð3Þ

t¼0

Let pðsi Þ\a1 ; a2 [ , then the estimated Vp(si) is: Vp ðsi Þ ¼ rðst ; a1 ; a2 Þ þ b

1 X

pðst þ 1 jst ; a1 ; a2 ÞVp ðst þ 1 Þ:

ð4Þ

t¼0

In the process of the game between the two sides, it is impossible to achieve a winwin situation, and both sides hope that their overall returns will be maximized. In the Markov game, both parties need to consider the other’s strategy to minimize their benefits: Vp ðsi Þ ¼ min max Vp ðsi Þ

ð5Þ

p ðsi Þ ¼ arg min max Vp ðsi Þ

ð6Þ

a1 2A1 a1 2A1

The optimal strategy is: a1 2A1 a1 2A1

The Markov game model of this article contains the following 7 parts.

768

3.1

C. Lu

Both Sides of the Game

The two sides of the game are the threatening party and the vulnerable party. The former spreads the threat to increase the risk, and the latter performs system repair to reduce the risk. 3.2

State Space

At the k-th moment of the threat, the dangerous state of the n-th asset in the system is stn ðkÞ, and its values are 1 and 0. 1 represents a threat and 0 represents no threat. Then the threat of the entire system at time k is: st ðkÞ ¼ ðst1 ðkÞ; st2 ðkÞ; . . .; stn ðkÞÞ

ð7Þ

At the k-th moment, the fragile party v, the fragile state of the n-th asset in the system is svn ðkÞ, and its values are 1 and 0, where 1 represents fragility and 0 represents no vulnerability. Then the vulnerability of the entire system at time k is: sv ðkÞ ¼ ðsv1 ðkÞ; sv2 ðkÞ; . . .; svn ðkÞÞ

ð8Þ

Therefore, this article records the risk status of the entire network system at the k-th moment as: sðkÞ ¼ sv ðkÞ  st ðkÞ

3.3

ð9Þ

Behavior Space

In the entire system, the threat party can continuously spread the threat with a certain probability, so that only one asset is transmitted at a time during the spreading process. At the k-th moment, the i-th asset is threatened as ut ðkÞ. At the same time, during the process of threat propagation, the fragile party is also constantly patching, and at the kth moment, the i-th asset is patched as uv ðkÞ. 3.4

State Transition

In the entire network system, assets are constantly changing, and its law is pðsk þ 1 jsk ; ut ; uv Þ, sk + 1 and sk are system states at time k + 1 and k, respectively, and ut ; uv are k-th when both parties adopted the behavior. 3.5

Damage Function

In the system, when an asset is threatened, the probability that the next asset will be threatened will increase. Probably the threat damage at the k-th moment in the system is denoted as V (s (k)). The threat damage at time k + 1 is denoted as R (s (k)).

Network Security Situation Awareness Strategy

VðsðkÞÞ ¼ RðsðkÞÞ þ b

X

pðsðk þ 1ÞjsðkÞ; ut ; uv ÞVðsðk þ 1ÞÞ

769

ð10Þ

sðk þ 1Þ

where s(k + 1) is the state at system k + 1, which is related to sðkÞ; ut ; uv , pðsk þ 1 jsk ; ut ; uv Þ is the state transition probability of the system; b is the discount coefficient of the system. According to the principle of risk calculation: RðsðkÞÞ ¼ VA  st ðkÞ  sv ðkÞ

ð11Þ

where V is the severity of vulnerability; A is the value of the asset. According to the damage function at each moment, the total risk value of the system can be obtained: Vsys ¼

X

Vi

ð12Þ

i

3.6

Risk Assessment

Without any remedial measures, the system’s risk assessment stipulates: uv ðkÞ ¼ 0; k ¼ 1; 2; . . .; n

ð13Þ

When the threat of the system spreads at a certain rate, the system needs to choose a propagation strategy to make the risk value of the system reach the maximum value, so as to conduct risk assessment. VðsðkÞÞ ¼ max Vt;v ðsðkÞÞ t2T

3.7

ð14Þ

Patching Strategy

When a system is threatened, it needs to be patched with a certain strategy to reduce the risk of the system. The optimal patching strategy is recorded as: p ðsi Þ ¼ arg min max Vt;v ðsðkÞÞ a1 2V a1 2T

ð15Þ

4 Model Experiments and Analysis In order to verify the validity of the Markov game model, the constructed network system contains 3 assets, denoted as A = (1, 2, 3), and the probability of a threatening party spreading on asset 1 is 0.2, while the other 2 assets have no Threat, then the threat state is recorded as st ðkÞ ¼ ð1; 0; 0Þ. The vulnerability severity of assets 1 and 3 is

770

C. Lu

V = 3, and the fragile state is recorded as sv ðkÞ ¼ ð1; 0; 1Þ. Let the threat propagation cycle be 4, and the discount coefficient b = 0.8. When sv ðkÞ ¼ ð1; 1; 1Þ, the traditional risk assessment and the Markov game model in this paper are used to compare the risk assessment, as shown in Fig. 1.

Fig. 1. Risk assessment comparison of the two models

It can be seen from Fig. 1 that under the same threat propagation conditions, the risk value of the traditional risk assessment model is greater than the Markov game model in this paper. The main reason is that the reinforcement model in this paper will strengthen the assets to improve security performance. And asset repair also reduces the risk of the system.

5 Conclusion This article first introduces the Markov game theory, and designs the Markov game model from seven parts. Finally, this model is used for network security risk assessment. By comparing with the traditional risk assessment model, the experimental results illustrate the Markov game designed in this paper. Models can reduce the risk of the system.

Network Security Situation Awareness Strategy

771

References 1. Feng, D., Zhang, Y., Zhang, Y.: Review of information security risk assessment. J. Commun. 25(7), 10–18 (2004) 2. Wang, Y., Liu, J., Chen, Z., et al.: Design of a computer network vulnerability assessment system. Comput. Eng. 32(17), 200–202 (2006) 3. Fu, Y., Wu, X., Ye, Q.: Research on security risk assessment of military information support system. Ship Sci. Technol. 31(8), 127–130, 143 (2009)

Design of Class Management System Based on Naive Bayes Algorithm Mao Xu(&) and Haiyan Huang Sichuan TOP IT Vocational Institute, Chengdu, Sichuan, China [email protected], [email protected]

Abstract. This paper starts with the current needs of class management in colleges and universities, analyzes the basic structure of class management information systems in colleges and universities, gives the basic content of system module design and database design, and explains the main problems in system implementation. Keywords: Universities

 Class management  ASP.Net  B/S mode

1 Introduction The teaching management system is a multi-module comprehensive information management department for all departments of the college and users at all levels, including public information maintenance of teaching affairs, student management, teacher management, teaching plan management, intelligent course scheduling, test management, course selection management, performance management, Teaching materials management, practice management, charge management, teaching quality evaluation, graduate management, sports management, laboratory management, and comprehensive student information inquiry, teachers’ online score entry and other modules can meet the entire process from student enrollment to graduation and teaching management needs. The current teaching management system is mainly focused on solving teaching management, while the daily student management is still weak, especially the class management mainly relies on the manual management of counselors and class cadres. The manual method or only the office software is used to assist the management. The efficiency is low, the labor intensity is large, and there is a lot of repeated labor, which does not play a good effect, and the student information is not easy to update and query and analysis. For the problem, we designed ASP.NET. College class management system based on ASP.NET. This system can provide fast, efficient and accurate information management, can raise the availably quality of class management, and realize information sharing on this basis, laying a foundation for further and better student work.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 772–777, 2021. https://doi.org/10.1007/978-3-030-51556-0_119

Design of Class Management System Based on Naive Bayes Algorithm

773

2 System Design and Function Analysis 2.1

Architecture Selection

Software architecture defines the composition of software’s local and overall computing components, and the interactions between these components. From the early “architecture-free” design stage, it has developed into a widely used client/server (Client/Server, C/S) mode and browser/server (Browser/Server, B/S) mode. At present, software systems are being improved and upgraded more and more frequently. The “thin” client and “fat” server B/S mode has the characteristics of no need to install special client software, and simple maintenance and upgrade methods, so the scope of application Getting wider. In view of the large number of students in colleges and universities, the client is not easy to maintain, and the requirements may change frequently, the B/S mode can better satisfy the system, as shown in Fig. 1.

Fig. 1. Interaction between local and global calculations

2.2

System Function Design

Based on ASP. NET’s class management system for colleges and universities mainly serves 13 regular class information management of colleges and departments. According to the current status of college class management, the system functions are now divided into the following modules. 1. Student file management subsystem. This module is responsible for managing the student’s personal profile information, which teachers can use to view and update the student’s personal information. 2. Student performance management subsystem. At present, each university generally has a teaching management system [1]. This module can be directly connected with the performance management module in the teaching management system, and has functions such as querying results and printing student transcripts. 3. Shift management subsystem. This module is used to publish relevant notices and announcements of schools and classes, handle scholarships, bursary evaluations, student loans, work-study programs, various honor applications and approvals, and voting on important matters in the class.

774

M. Xu and H. Huang

4. Organization management subsystem. This module is responsible for processing students’ applications for class positions, voting for class committee elections, and daily management of class committees. 5. Class management subsystem. The class management subsystem is used to manage the class income and expenditure, as well as the application and approval management of major expenses. 6. Attendance management subsystem. This module is responsible for student attendance registration and management, application and approval of leave requests, automatic generation of fake slip numbers, generation of fake slips, printing of fake slips, and recording of student leave information. 7. User management subsystem. This module is responsible for user rights management. According to the actual situation of colleges and universities, the system sets up four types of users, including administrators, counselors, professional teachers, and students. Each user has different permissions, and the module also has user log management functions, as shown in Fig. 2.

Fig. 2. University class elective management system

2.3

Database Design

To design a satisfactory information management system database, in addition to having a complete functional design, it must also have a reasonable database structure. In the design process, first draw E. R diagram, by E. The R diagram makes the initial database design, and then optimizes according to the dependencies between the tables to meet a certain paradigm [2]. According to the features of the class management system in universities, the system design has the following basic tables. 1. Student personal information module which used store student profile information. 2. Notice form. Store relevant news and announcements. 3. Personal honor information form. It is used to store the applications of various honors such as “Three Good Students” and outstanding group leaders. 4. Reward and loan assistance information form. Used to store application and approval information for scholarships, bursaries, work-study programs, and student loans. 5. Class organization information table. Store class organization information, and application approval status of class staff.

Design of Class Management System Based on Naive Bayes Algorithm

775

6. Voting information form. Store the vote of class committee elections and other major class matters. 7. Schedule of income and expenditure for class fees. It is used to store the income and expenditure information and approval information of class fees. 8. Attendance information form. It is used to store the attendance of students, as well as the application and approval information of fake notes. 9. User information table which used to store user names, passwords, and permissions information for various users.

3 System Implementation 3.1

System Development Tools and Operating Environment

The system development platform is Microsoft Visual Studio 2008, and the programming language is ASP. NET + C # is built on. The programming framework on the common language runtime environment of the .NET framework can be used to generate functional Web applications on the server. Compared with other Web development models, ASP. NET has stable performance, excellent upgradeability, faster and easier development, easier management, new languages and network services. We use Microsoft SQL Server 2005 as the database platform. Because the database platform has better operation and compatibility. 3.2

System Security Policy

The security issue is a sensitive and important issue for the establishment of a networkbased information system. The network provides the convenience of information circulation, but also brings many hidden dangers, making the information confidential and secure, and the normal security of the system facing challenges. The security of the system is a problem that designers must consider. It is necessary to make full use of the security settings of the system development platform to combine it with the security of the application system. 1. Identity verification. The system should provide a login page to ensure the normal entry of all types of users, while also preventing illegal users from trying to bypass the login page to access the system abnormally. Use ASP. The system configuration management and authentication provider in .NET can implement user authentication for a specified page. 2. Authority control. University class management system is a medium-sized data resource management system, which includes a large amount of information and varying degrees of information sensitivity, making its security management relatively complicated. The role-based system security control model can well meet the needs of the system. Its characteristics are that user permissions can be granted and canceled by assigning and canceling roles, and it also provides role assignment rules and operation check rules. It can define various roles as required and set

776

M. Xu and H. Huang

corresponding access permissions, and users are then assigned to different roles based on their responsibilities and qualifications. The entire access control process is divided into two parts, that is, access rights are associated with roles, and roles are then associated with users, thereby achieving a logical separation of users from access rights and enhancing system security. When using it in the login interface part, write in the form that needs to add the verification code. The codes are as following:

This is just a simple method of implementation. According to the design ideas and points introduced in this article, you can learn from the others by slightly changing the image verification code program, such as adding distorted or distorted characters, dynamic backgrounds, etc. to interfere with illegal user identification. For a strong captcha program. 3. Data encryption. Important information such as the user’s password should be encrypted. This design uses more complex encryption algorithms such as AES. 4. Database security. The security of the database greatly affects the security of the system.

4 Conclusions Based on ASP. NET’s college class management system covers the basic functions of daily management of college classes, and various roles in college class management can obtain convenient information services from it. Counselors can manage the class more efficiently through this system, class teachers can supervise students’ learning through this system, class committees can use this system to handle class work, students can easily obtain class and other information, and participate in class related Decision. Based on ASP. NET’s college class management system standardizes class management, improves the efficiency of class management, and has strong design and development value.

Design of Class Management System Based on Naive Bayes Algorithm

777

References 1. Mai, Z., Dai, C.: The concept of software architecture. Comput. Appl. (11) (2001) 2. Wu, H., Pan, Y.: ASP.NET programming tutorial. Shanghai Jiao Tong University Press, Shanghai (2006)

Hybrid Development of Teaching and Reading Online Course Based on FA Algorithm Luo Xiaoli(&) and Liu Wenjun Jiangxi University of Applied Science, Nanchang, Jiangxi, China [email protected], [email protected]

Abstract. The rapid development of information technology and storage technology provides a realistic possibility for the construction of Japanese interpretation corpus. Based on the platform of antConc, a database retrieval software, this study chooses the 20 representative texts in the Qing Kong corpus This is a Japanese novel. The lines in the novel are processed by data, and a small Japanese Corpus is built to provide useful reference for Japanese classroom teaching. Keywords: Corpus

 Japanese novel  Retrieval software

1 Introduction With the advancement of the “Belt and Road” national strategy and the rapid development of international trade cooperation, contemporary college students not only need to practice five basic skills of listening, speaking, reading, writing, and translating, but also the development of the times. Interpretation skills are even higher. How to improve the quality of foreign language classroom teaching in a limited time? How to train foreign language talents more effectively to meet market demands? This poses a challenge to current foreign language teaching, and it also has to cause educators to think deeply. The development of information technology and the continuous improvement of storage technology have provided convenience for foreign language teaching and research. This article first reviews the current situation of the construction of Japanese corpora at home and abroad, and briefly analyzes the features and functions of these corpora. Secondly, on the basis of absorbing the excellent experience of the predecessors, based on the database retrieval software AntConc platform, the representative 20 Japanese novels were selected, and the lines in the novel were processed by data. Interpreting classroom teaching provides useful references.

2 Overview of Japanese Corpus Development In the past ten years, with the rapid development of hardware storage technology and Internet technology, the construction of corpora at home and abroad has also shown good development momentum. Using the keyword “corpus” to search in China HowNet, we can find that the number of research papers in this field has increased from © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 778–782, 2021. https://doi.org/10.1007/978-3-030-51556-0_120

Hybrid Development of Teaching and Reading Online Course

779

481 in 2008 to more than 1,000 now. But by entering the three keywords “Japanese Corpus”, only 17 references can be retrieved, and the earliest article on the Japanese Corpus was published in 2009, and as early as 1982, the scholar Yang Huizhong began to construct JDEST English for Science and Technology Computer corpus, which shows that the construction and development of Japanese corpus is far behind the development of English corpus. Through the review of the prior literature, it is found that in terms of domestic research, the “Chinese-Japanese Translation Corpus” constructed by the team of Professor Xu Yiping of Beijing Foreign Studies University and the “Chinese Corpus of Chinese Learners of Japanese” constructed by Professor Mao Wenwei’s team of Shanghai Foreign Studies University are representative. In terms of foreign research, in the past ten years, the National Research Institute of Japan has made rapid progress in the construction of corpora [1]. It has established a balanced corpus of modern Japanese written languages, a modern Japanese spoken corpus, a Japanese language corpus of the Japanese Language Institute, Which greatly facilitates foreign researchers and learners. 2.1

Overview of the Development of Domestic Japanese Corpora

The development of domestic Japanese corpora is mainly divided into three stages. The first stage is the stage before computerization. It is called the traditional corpus period, which is mainly based on card corpora. The second stage is the period after computerization, which is called the modern corpus period. The third stage is the supercomputer storage stage, which is called the big data corpus period. Before the 1990s, the construction of domestic corpora was generally established by card storage. This diarytype corpus construction required manual writing, took up a lot of space, was inconvenient to consult, and had a very limited scale. Since the 1990s, with the development of computer storage technology and network technology, the construction of Japanese corpora in China has begun to improve. After 2000, the construction of Japanese corpora entered a period of rapid development. Among them, the “Chinese-Japanese Translation Corpus” constructed by Professor Xu Yiping of the Beijing Center for Japanese Studies and the “Chinese Japanese Learner Corpus” constructed by Professor Mao Wenwei of Shanghai Foreign Studies University are very representative. In terms of quality, they have filled domestic gaps. The “Chinese-Japanese Translation Corpus” project built by the team of Professor Xu Yiping at the Beijing Center for Japanese Studies at Beijing Foreign Studies University has a milestone meaning in the history of domestic Japanese corpora construction. The corpus contains more than 2013 Chinese and Japanese bilingual text corpora. word. The Corpus of Chinese Japanese Learners built by the team of Professor Tan Jinghua and Professor Mao Weiwei of Shanghai International Studies University has set a precedent for the construction of a corpus of Japanese learners. The development of this corpus has positive guiding significance for Japanese teaching in universities. Although the construction of Japanese corpora in other universities at home and abroad has also made some achievements, it has not been particularly rapid because of the restrictions on funds and copyrights as mentioned above.

780

2.2

L. Xiaoli and L. Wenjun

Overview of the Development of Foreign Japanese Corpora

In December 1948, the Ministry of Education, Culture, Sports, Science and Technology of Japan established the National Language Institute. As early as the 1950s, this research institution conducted a large number of investigations and researches on Japanese. However, due to the limitation of objective conditions, the construction of Japanese corpora has been relatively slow for nearly half a century. Until the first half of the 1990s, the construction of Japanese corpora was mainly carried out manually [2]. In the late 1990s, with the rapid development of computer technology, Japanese corpus construction also entered a period of rapid development. Aoko Bunko, established in February 1997, is a free electronic library of Japanese literature. The corpus covers almost every period, genre, and type of literary works in Japan. The corpus currently provides three file formats: zip, ebk, and html. The encoding method is Shift-JIS encoding. Qingkong Bunko’s free literature greatly facilitates Japanese learners and Japanese literature lovers.

3 Japanese Novels and Construction of Corpus In 2009, I started to build a small-scale, simple teaching corpus, and the current corpus is about 20 million words. The construction of the corpus is still in progress. The expected goal is to build a corpus that is small in size, easy to use, and quick to retrieve. The source of the corpus is articles by some famous writers in Qingkong Library. The software carrier for corpus retrieval is AntConc. This software has three major functions: word retrieval, vocabulary generation, and topic words. The encoded and compressed corpus can be displayed in Japanese in the software without garbled characters. The reasons for choosing Qingkong Library are as follows: First, there are no copyright issues. Copyright issues are issues that must be considered during the construction of the corpus. In Japan, the copyright of any literary work is strictly protected, and no institution or individual may reprint or use its work without the author’s permission. This is why older corpora are commonly used in corpus construction. As mentioned above, the copyright of the corpus collected by Qingkong Library has disappeared. According to the Japanese Copyright Law, these works no longer have copyright problems and can be used freely. The produced corpus can be provided to teachers and students for free, which greatly facilitates Japanese learning and research. Second, the corpus is rich. Since the construction of Qingkong Library started in 1997, it has taken 13 years, and its scale has reached a considerable size, including 10,752 literary works. Most of the works of some of the authors have been entered into the database. Qingkong Library has a wide range of topics, including novels, prose, travel notes, book reviews, memoirs and other topics, which ensure the diversity of the corpus, and can start from a variety of different language materials to study specific language phenomena [3]. Thirdly, the famous essays ensure the scientific nature of the corpus. In the process of corpus extraction, famous literary works such as Natsume Soseki, Senouwai, Arashishima Takero, and Tayama Hanahiro were mainly extracted. In grammar teaching

Hybrid Development of Teaching and Reading Online Course

781

and vocabulary teaching, corpora can be directly retrieved through corpora to avoid teachers Errors in making your own sentences. Moreover, the corpus composed of famous articles is highly literary and artistic. In the specific teaching, the extraction and study of corpus can greatly improve the students’ Japanese level and literary quality.

4 The Limits and Difficulties of Japanese Corpus Construction First, the issue of scale. Corpus construction is an extremely large-scale project. Affected by computer memory and storage performance, a corpus built with personal financial and material resources has certain limitations in size and performance. Compared with the hundreds of millions of large-scale corpora of the National Institute of National Languages in Japan, this corpus can only search for some simple linguistic phenomena, and the construction of larger corpora can only rely on the cooperation between domestic universities. AntCon retrieval software can only search small-scale databases. If it is a large-scale database, the software retrieval takes a lot of time [4]. Second, the corpus selection problem. Corpus construction As the name suggests, the choice of corpus is of great significance. What kind of corpus is chosen is the spoken language used by Japanese in daily life, the dialogue of characters appearing in Japanese dramas, or business Japanese used by Japanese companies, which is based on the nature of the corpus. Plays a vital role. Due to financial support and manpower issues, this corpus is only a raw corpus, and does not involve the issue of corpus balance. Therefore, in the selection of materials, representative novels are mainly selected. In terms of time span, works from the four different periods of Meiji, Taisho, Showa, and Heisei were selected to strive to cover literary works from various historical periods, making the corpus more scientific and representative. Third, the timeliness of the corpus. Another issue that needs to be considered in the production of corpora is the issue of timeliness. The corpus selected in this corpus is not the Japanese currently used, but fixed in the form of literary composition, which is a well-known literary work of the Japanese. What needs to be explained about this issue is that the timeliness of language materials is not the same as the shelf life of food, and qualitative changes will occur within a short period of time. Language is a relatively fixed thing, and we can read the Dream of the Red Mansion written more than 250 years ago fluently.

5 Conclusion With the continuous development of computer storage technology and big data retrieval technology, a large number of Japanese learning corpora are flooding the Internet, which greatly broadens the horizons of Japanese learners and enriches the learning methods of Japanese learners. However, how to filter out useful information from so many corpus information and effectively improve our learning efficiency has undoubtedly become an urgent problem. Based on the AntCon retrieval software, this article selects the representative novels in Qingkong Library to make a simple corpus,

782

L. Xiaoli and L. Wenjun

which serves the Japanese interpretation teaching and improves the teaching effect. At the same time, this article explores the boundaries and difficulties of self-built corpora in order to make breakthroughs and progress in future research and development.

References 1. Wenwei, M.: A review of the status quo of Japanese corpus construction. Japan. Lang. Learn. Res. (06) (2009) 2. Jinghua, T., Wenwei, M.: A review of the construction and application of CLJC in the corpus of Chinese Japanese learners. Japan. Learn. Res. (04) (2011) 3. Zebing, D.: A corpus-based study of the structure and functional features of Chinese academic English chunks. Electr. Foreign Lang. Teach. (05) (2016) 4. Kaibao, H., Yi, L.: A study on the construction and application of corpus of contemporary English teaching materials. Foreign Lang. Electr. Teach. (03) (2016)

Analysis of Rural Tourism Based on C4.5 Meng Na(&) and Li Yan Weifang Engineering Vocational College, Qingzhou, Shandong, China [email protected], [email protected]

Abstract. Based on Sina Weibo, combined with computer technology information retrieval and mining methods, by extracting, processing, and analyzing Weibo data from 2014 rural farming related rural Weibo in Jiangsu Province, the analysis results were displayed visually, and the spatial and temporal distribution of rural farming rural tourism was studied. Analyze the vocabulary of medium and high frequency on Weibo, study the hot issues of rural tourism in rural villages, so as to understand the needs of rural tourism market, and provide information and decision-making on the development planning and market development of rural tourism products. stand by. Keywords: Rural tourism

 Big data  Data capture  Spatiotemporal analysis

With the rise of new media and social networks, the era of big data has arrived. Take Sina Weibo as an example. Since its emergence in 2009, hundreds of millions of travelrelated data have been generated and need to be explored and used by researchers [1]. Reflects the number of micro-blogs on rural tourism in recent years. It can be clearly seen that the overall number of relevant micro-blogs has increased during the year from 2010 to 2014, especially from 2010 to 2012. Due to the online social tool Sina Weibo The widespread use of social media and the rapid development of the rural tourism market, the number of relevant microblogs has increased geometrically, and has steadily increased since 2013. As of 2014, Sina Weibo had more than 1.1 million Weibos containing the keyword “rural tourism”, and the number of Weibos containing the keyword “farm music” exceeded 9.78 million. How to mine tourism big data, process and process tourism big data, and analyze tourism big data has become a real problem facing the tourism industry. The results of domestic tourism big data analysis are mainly focused on the research of rural tourism network attention [2, 3]. Using the huge amount of big data of social networks, the research and analysis on the characteristics and hot spots of rural tourism are still blank. This article is based on Sina Weibo, using multiple keywords of “farmhouse + rural tourism”, combined with computer technology information retrieval and mining methods, through the extraction, processing, and analysis of microblog data related to rural tourism in rural Jiangsu in 2014, The analysis results visually show that the spatial-temporal distribution of rural tourism in farmhouses is studied, and the hot issues of rural tourism in farmhouses are analyzed.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 783–787, 2021. https://doi.org/10.1007/978-3-030-51556-0_121

784

M. Na and L. Yan

1 Research Framework and Process Due to the open nature of the Weibo platform, and the fact that Weibo users cover multiple groups of different genders, different ages, different regions, different educational backgrounds, different jobs and incomes, the differences in their topics of concern have led to the diversity of Weibo data. It is difficult to directly and clearly obtain Weibo data of a specific topic through general channels, which objectively causes certain difficulties in relying on Weibo for data mining of farmhouses. Figure 1 shows the flow chart of the rural tourism data collection and analysis framework based on Sina Weibo. In general, the data collection analysis based on Sina Weibo can be summarized as 3 numbers “325”, that is, 2 key technologies (algorithms): Web Crawler and ICTCLAS algorithm; 3 operation steps: (1) Weibo search conditions Settings, (2) Weibo data capture, (3) Chinese word processing; 5 types of correlation analysis: (1) analysis of seasonal characteristics of farmhouse music, (2) analysis of time distribution of farmhouse music, (3) analysis of spatial distribution of farmhouse music, (4) The frequency of keywords on farmhouse Weibo keywords, (5) The word cloud of farmhouse keywords. Through 2 key technologies interspersed between 3 operation steps, 5 different aspects of farmhouse music analysis are realized. The detailed analysis of the three operation steps is as follows.

Fig. 1. Sina Weibo Weibo posts on rural tourism, 2010–2014

Step 1: Set Weibo search conditions. Just as the aforementioned diversity of Weibo data makes it difficult to obtain farmhouse related Weibo in a single step. In this step, it is preferred to filter and determine the search conditions (multiple keywords, data coverage time, data coverage location, user characteristics, microblog classification characteristics, etc.) of Weibo based on the basic spatio-temporal characteristics of rural tourism in rural areas. Step 2: Weibo data capture. For the microblog search results obtained in step 2, the Web crawler tool is used to crawl all the microblogs, and the seasonal distribution, time distribution and spatial distribution of the farmhouse are analyzed according to the time of the microblog posting and the location information of the publisher. Step 3: Chinese word processing. Contains Chinese word segmentation and stop word deletion. The ICTCLAS algorithm was used to segment each microblog. After removing stop words in the results, the statistics and analysis of the keywords of the farmhouse in Weibo were performed to further explore the hot issues of farmhouse tourism.

Analysis of Rural Tourism Based on C4.5

785

Analysis of seasonal characterisƟcs of farm stay

Weibo data scraping

Web Crawler

Time DistribuƟon Analysis of Farmhouse

SpaƟal distribuƟon analysis of farmhouse

Weibo search condiƟon seƫngs

Farmhouse Weibo Keywords Word Frequency

Chinese word segmentaƟon ICTCLAS algorithm Stop word deleƟon

Farmhouse Weibo Keywords Word Cloud

Fig. 2. Research overall process

The research in this paper does not involve too many calculation formulas. All processes rely on the data of Sina Weibo and are mainly developed by mature algorithms in the field of text retrieval. Because the algorithms used in this article are mature algorithms in related research directions, the specific description and code of the algorithms will not be described in detail in the length of this article. This article will focus on analyzing the characteristics of farmhouse music through the relevant Weibo of farmhouse music in Jiangsu Province, and verify the feasibility and effectiveness of this method.

2 Case Study 2.1

Selection of Search Conditions

The concept words of rural tourism are more popular: farmhouse, agricultural tourism, leisure agriculture, and rural tourism. Leisure agriculture is used in the agricultural sector, agricultural tourism is used in the tourism sector, and farm tourism is more used in the tourism market. The country’s unified concept has become rural tourism. The four words are similar in content and interactive substitution. In order to understand the needs of the multi-level tourism market customer base and obtain more diverse data results, this article selects the keywords as “farmhouse” and “rural tourism”. 2.2

Weibo Crawl

The acquisition of Weibo data can be achieved in two ways. One is the Sina Weibo open platform. This tool can be called directly through the API port to implement the search and download functions of Weibo data and obtain data. The second is the Web crawler tool. This “automatic browsing network” program can automatically collect all the page content that it can access. By setting keywords and restrictions, Web Crawler automatically crawls specific web pages and stores the required data. Considering that the API port of Sina Weibo’s open platform is object-oriented, developers have many restrictions on the use of data, time, functions, and number of requests. In this paper, the Web Spider tool is finally selected to crawl Weibos that meet the search criteria. The captured data includes three parts: Weibo post time, Weibo text

786

M. Na and L. Yan

content, and Weibo user location information. Finally, in 2014, 10523 pieces of Weibo data including the keywords of “farmhouse” and “rural tourism” released by users within the geographic scope of Jiangsu Province were obtained. 2.3

Processing of Chinese Words

Chinese word segmentation refers to the process of dividing a sequence of Chinese characters into individual words. Chinese word segmentation is the basis for text content mining. For a segment of Chinese input, successful Chinese word segmentation can achieve the effect that the computer automatically recognizes the meaning of the sentence. The pros and cons of the segmentation results directly affect the collection and extraction of rural tourism information and subsequent analysis. In this paper, the open-source word segmentation algorithm ICTCLAS [4] developed by the Chinese Academy of Sciences is used to perform word segmentation on the captured 10523 Weibo text content. Through the word segmentation processing of this algorithm, the word frequency of each word can be counted to extract the rural tourism keywords that the tourists pay most attention to, and further analyze the diverse needs of the rural tourism market. The result of word segmentation also needs to be deleted. In this case, we delete the words such as “de”, “de”, “Er”, “since”, “but” and so on, which have no practical meaning. In this paper, the same words are removed from the segmentation results compared with the stoppage Thesaurus of Harbin University of technology [5, 6].

3 Case Analysis 3.1

Time Distribution Analysis

Analysis of the seasonal characteristics of rural tourism in Nongjiale [6]. According to the statistics of microblog publishing volume of Jiangsu Province from 2010 to 2014, because the seasonal characteristics of microblog publishing volume from 2010 to 2014 are similar, the average value of five years is taken to draw the monthly index mean distribution chart (Fig. 2). The mean value of each month is 0.45, 0.52, 0.85, 1.24, 1.62, 0.81, 0.84, 1.21, 1.17, 2.45, 0 51, 034 respectively. The seasonal distribution pattern of rural tourism microblog publishing volume generally shows the “three peaks” feature of high in the middle and low in the two ends. From January to may, it rose, reached the first peak value of 1.62 in May, decreased rapidly in June compared with may, increased slowly from July to August, reached the second peak value of 1.17 in August, decreased slightly in September, rose rapidly in October to the annual maximum peak value of 2.45, and declined during November to December. According to the general classification standard, the months with monthly index > 1 are divided into the peak season and the months with monthly index < 1 are divided into the off season. The peak season of the annual rural tourism related microblog is April to May and August to October, while January to March, June to July and November to December constitute the off-season. Although the release of micro blog has a slight short-term lag in the travel of rural tourism, it can be inferred

Analysis of Rural Tourism Based on C4.5

787

that the travel peak season and off-season of rural tourism can be divided according to the distribution of micro blog release volume. The travel peak season of rural tourism is April to May and August to October. There are many reasons that affect the seasonal distribution of rural tourism. On the one hand, the pleasant climate, beautiful scenery and comfortable body temperature at the beginning of spring, summer and autumn are the best seasons for ecological sightseeing and green rural tourism; on the other hand, public holidays are also the main factors that affect the seasonal changes of rural tourism. The holidays of Qingming, May 1 and the golden week of national day are relatively concentrated and holiday activities are relatively concentrated Rich, the arrival of students’ traditional long vacation summer vacation makes April to May and August to October become the peak season of rural tourism.

4 Conclusion From this, it can be clearly seen that the volume of Weibo data is mainly distributed in economically developed provinces such as East China and the coast. Beijing has the largest amount of Weibo data including “farm tourism”. Bo nearly 420,000. Secondly, Henan, Sichuan, Shaanxi, and Hubei provinces also have more Weibo posts. Compared with other provinces, the number of Weibo in Northeast, Northwest, Southwest and other provinces is smaller. Acknowledgements. The Present Situation and Prospect of Rural Culture Construction under the Strategy of Rural Revitalization – Based on the Construction of Beautiful Rural Culture in Qingzhou City, Dr. Research Start-up Project of Weifang Engineering Vocational College (WGYBSZZ201702).

References 1. Yuhang, C.: Review and thinking of China’s collective forest property reform. Old District Constr. (6), 22–27 (2012) 2. Zaiyu, Z., Ronghong, W., Jiansheng, H., et al.: Intrinsic mechanism of forest rights circulation and practical research in Jiangxi. Ecol. Econ. 5, 100–104 (2011) 3. Zhiyong, Z.: Southern Forestry Exchange exceeded 1 billion yuan. Jiangxi Daily (1), 7 January 2014 4. Gangjun, Y.: The reform of state-owned forest farms has turned the “dilemma” into “winwin”. Learning Times, 6 January 2014 5. Yangtian, Z.: Jiangxi applied for the establishment of a national ecological civilization demonstration province. Information Daily (1), 1 January 2014 6. Xuemei, M.: 97 representatives called for speeding up the establishment of ecological compensation mechanism. Wuxi Daily (A05), 15 January 2014

Design of Flexible DC Distribution Control System Xuntao Shi(&), Qingpai Ke, Hao Bai, Min Xu, Quan Xu, Zhiyong Yuan, and Jinyong Lei China Southern Power Grid Research Institute Co., Ltd., Guangzhou 510080, China {64581574,keqingpai,baihao,xumin,uquan,yuanzhiyong, leijingyong}@sina.com

Abstract. Energy is an effective way to solve the large-scale use of renewable energy and has huge development prospects. This article introduces the current research status of DC power distribution technology. Based on this, the typical structure of the AC energy Internet is discussed and analyzed. A flexible DC power distribution system based on it is introduced to introduce its system structure and key technologies. Taking the park as an example, an example of the energy Internet scheme based on the flexible DC power distribution network is given, which provides a reference for China’s energy construction. Finally, the development prospect based on flexible DC power distribution network is prospected. Keywords: Renewable energy

 DC distribution  Energy router  DC grid

1 Introduction In today’s world, environmental pollution and energy shortages caused by fossil fuels have received widespread attention from various countries [1]. In the discussion of the third industrial revolution, some scholars will establish a new type of energy supply and demand structure to promote the third industrial revolution, which has attracted widespread attention worldwide [2, 3]. In a broad sense, the energy of the future will be the integration of information networks, transportation networks, power networks, natural gas networks, and even heat networks. Among them, the power grid is the core of energy conversion. The power network and the transportation network interact with each other through electric vehicles and charging piles; the power network and the natural gas network interact with each other through gas turbines and electricity-to-gas technology; the power network and the heat network improve energy efficiency through cogeneration; Integrate industrial control network and Internet to ensure efficient dispatch of energy supply. Therefore, the Energy Internet will be a multidisciplinary concept.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 788–792, 2021. https://doi.org/10.1007/978-3-030-51556-0_122

Design of Flexible DC Distribution Control System

789

2 Energy System Based on Flexible DC Power Switch 2.1

Typical Structure

The energy structure shown in Fig. 1 is mainly based on the existing AC grid. The distribution of all high-voltage transmission lines and the access to new energy need to go through the transition of the AC system. Figure 2 shows a typical structure of an energy system based on flexible DC power distribution.

Fig. 1. Typical topology of ac energy internet

2.2

Fig. 2. Typical topology of energy internet based on medium-voltage dc distribution

Energy Router

Due to the existence of the medium-voltage DC distribution bus, the energy router can no longer be a 3-step conversion system in the DC energy Internet, as shown in Fig. 3. The energy router between the high-voltage AC transmission bus and the mediumvoltage DC distribution bus requires only two steps of conversion: AC-DC conversion connecting HVAC and HVDC and DC-DC conversion connecting HVDC and MVDC. The energy router between the HVDC transmission bus and the DC distribution bus requires only one conversion step: the DC-DC conversion connecting MVDC and LVDC. In the same way, the energy router between the medium-voltage DC distribution bus and the low-voltage AC microgrid and DC microgrid only needs two steps and one step of transformation, respectively. In this way, DC routers have fewer conversion steps than AC routers, so efficiency, power density and cost can be further improved. At present, Tsinghua University has implemented the first and second generation energy router prototypes based on 1.2 kV Si-IGBT and 1.2 kV SiCMOSFET. The maximum efficiency of DC routers using two-step and one-step conversion links can reach 96% and 98%. Compared with AC energy routers, it is easier to meet the needs of practical applications.

790

X. Shi et al.

Fig. 3. Power conversion of dc energy router

3 Key Energy Technologies Based on Flexible DC Distribution 3.1

Multi-terminal Flexible DC Control Technology

According to the above analysis, when a large amount of new energy is connected, in order to ensure the operating efficiency of the DC energy Internet and ensure the stability and reliability of the operation, it is necessary to study the multi-terminal, multi-voltage level allocation based on the medium-voltage DC power distribution bus. Electric network operation control technology, including multi-source coordinated control of DC bus voltage, power quality management; the influence of DC microgrid on the operating characteristics of the entire distribution network under high penetration, and the influence of the DC distribution network on the operating characteristics of the entire energy Internet, Such as the impact on the stability of large power grids; and the multi-period energy optimization scheduling method of AC and DC systems under the constraints of DC system voltage, current, AC system voltage, power flow equation, etc. 3.2

DC Energy Router Technology

Similar to the AC energy router technology, the key technologies of the DC energy router also include: topology technology, voltage and power control technology, fault control technology, and energy control technology. Due to the limitation of voltage level and capacity of power devices, AC energy routers mainly increase the voltage and power level through the cascade technology of inverters. The DC energy router is mainly connected to the high-voltage DC transmission line, the DC power distribution line, and the low-voltage DC micro-grid through the series-parallel combination technology at the DC end. 3.3

DC Fault Management Technology

In order to quickly cut off and isolate the fault point, a fast circuit breaker is required. Unlike AC, DC does not have a natural zero-crossing point, and the DC impedance is small, but the short-circuit current rises very quickly when a fault occurs, which has brought difficulties to the development of high-voltage large-capacity DC circuit

Design of Flexible DC Distribution Control System

791

breakers. Circuit breakers based on semiconductor devices that have appeared in recent years have low losses and fast operating speeds. And other advantages have attracted extensive attention from academia and industry. In particular, the hybrid DC circuit breaker combines the characteristics of a mechanical circuit breaker and power electronic devices. It has the advantages of fast breaking speed, low on-state loss, and high control reliability. It is considered to be the most promising DC circuit breaker solution.

4 Application Example According to the investigation of the park, its technical requirements for energy mainly include: improving power supply reliability, improving power quality, accessing new energy, energy storage, and AC and DC sensitive loads. The specific access requirements are as follows: 1) AC sensitive loads with high power supply reliability and high power quality requirements, with a voltage of 10 kV and a total capacity of 8 MW; 2) AC microgrid systems with reverse power transmission, including: large-capacity photovoltaic power generation systems and AC loads, with a voltage of 380 V, Total capacity −3.5–+5 MVA; 3) DC microgrid system without power return, including: distributed photovoltaic power generation, electric vehicle charging equipment and small capacity DC load, voltage 400 V, total capacity 2.5 MW; 4) Yes A DC microgrid system for power transmission, including: a large-capacity energy storage power station or a V2G electric vehicle charging station, with a voltage of 400 V and a total capacity of −4–4 MW. Among them, the positive sign of capacity refers to the absorption of power from the energy Internet, and the negative sign refers to the return of power from energy.

5 Conclusion In general, research in various countries is also at the exploratory stage. The energy solution based on flexible DC power distribution is a technical solution worthy of research and exploration. From the perspective of the development prospects of the integration of the high-voltage transmission backbone network into the energy Internet: 1) the medium-voltage DC power distribution bus can pass a single step The DC energy router is connected to the high-voltage DC transmission grid without the need to go through the AC grid transition, reducing the conversion link and improving the system reliability; 2) The medium-voltage DC power distribution bus can be connected to the high-voltage Connect AC power grid, isolate voltage drop of AC power transmission system, control harmonics, and compensate for reactive power; 3) DC technology is easy to form a multi-terminal power distribution network, and multiple power sources support each other to improve system power supply reliability. From the perspective of the development of energy system access to the energy Internet: 1) The medium-voltage DC distribution bus is designed for high-power AC power users, variable frequency loads, and DC loads that require high reliability and high power quality. High-quality power supply solutions to reduce conversion links; 2)

792

X. Shi et al.

Medium-voltage DC distribution buses provide DC grid-connected interfaces for largecapacity electric vehicle charging stations (including V2G forms), battery energy storage stations, and photovoltaic power stations, reducing voltage conversion links, Reduce equipment investment and operating losses, and improve system reliability; 3) medium voltage DC distribution bus provides grid-connected interfaces for DC or AC microgrids, improve the reliability of microgrid system operation, and meet the harmonics of AC microgrids Wave governance, reactive power compensation, and energy return requirements.

References 1. Lasseter, R.H.: Smart distribution: coupled microgrids. Proc. IEEE 99(6), 1074–1082 (2011) 2. Federal Ministry of Economics and Energy of Germany: E-Energy project official website. http://www.e-energy.de/en/index.php. 26 June 2013 3. Yi., W.: Research on flexible interconnection technology of AC/DC hybrid distribution network. Dissertation, North China Electric Power University (2019)

3D Modeling Technology in 3D Film and Television Animation Production Sun Wen(&) Hainan College of Software Technology, Haikou 571400, Hainan, China [email protected] Abstract. 3D modeling plays an important role in many fields, especially in 3D animation. This paper focuses on the role construction of 3D modeling technology in 3D animation. Through 3D modeling technology, we can design and produce characters, commercial advertisements, scene design and construction in 3D animation. In addition, people often use the complementarity of 3Ds MAX software and OpenGL technology to make vivid 3D models. By discussing the role of 3D software modeling technology in 3D simulation animation, we will further explore its significance and value. Keywords: 3D modeling technology

 3D animation  3D modeling function

1 Introduction NURBS has a good application for models that require precision, flexibility and complexity, and is suitable for quantitative production applications. Polygon mesh modeling is based on the ramen method, which is suitable for renderings and animations of complex scenes. Generally speaking, each has its own advantages [1]. NURBS has a good application for models that require precision, flexibility and complexity, and is suitable for quantitative production applications. Polygon mesh modeling is based on the ramen method, which is suitable for renderings and animations of complex scenes. Generally speaking, each has its own advantages [2]. The rapid development of computers has made 3D modeling possible. Through the three-dimensional figure needed by computer design, the concrete object figure can be expressed vividly. For example, a CAD program can generate object shapes on a screen, use equations to generate lines and shapes, and place them precisely based on their relationship to each other. The main activities in the modeling process include: identifying the data and its related processes. Define data. Ensure data integrity. Define operational procedures. Select a data storage technology [3, 4]. It is important to know that modeling often involves the management of a company in unexpected ways. For example, data ownership (and the implicit responsibility for data maintenance, accuracy, and timeliness) is often questioned. Data design often prompts companies to recognize how interdependent corporate data systems are, and encourages companies to seize the opportunities, that come with coordinated data planning. At the end of the modeling design, the previous application requirements have been fully defined, identified data and services that may be reused, and laid a strong foundation for future expansion [5]. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 793–797, 2021. https://doi.org/10.1007/978-3-030-51556-0_123

794

1.1

S. Wen

3Ds Max Modeling Software and OpenGL Technology

1.1.1 3Ds Max Modeling Software Since the advent of Windows NT, the combination of 3Ds Max and Windows NT has lowered the threshold of CG production, and at the same time, it has broken the situation that SGI workstation monopolized the production of industrial grade CG for a long time [6, 7]. 3Ds MAX has a wide range of applications, including film and television, games, architecture, art, etc. In addition, 3Ds MAX is easy to operate and enables users to master basic modeling skills quickly. At the same time, 3Ds MAX also provides users with many advanced 3D modeling instructions, which enrich the modeling technology, including three core modeling methods: NURBS modeling, polygon modeling, patch modeling. However, these three methods have their own advantages and disadvantages: NURBS modeling has high editing flexibility, but also high rendering complexity; polygon modeling is suitable for simple geometry, such as doors, windows, furniture, but not for editing complex graphics; patch modeling is mostly used to build smooth surfaces. However, these three methods can complement each other and should be mastered as much as possible. In addition, 3Ds Max also has the disadvantages of not being able to achieve real-time control, and the model is difficult to simulate, which requires OpenGL [4] technology to process. 1.2

OpenGL Technology

OpenGL is a three-dimensional computer graphics development package, but also a hardware independent software interface. It is a software graphic function library, which has the characteristics of powerful function and supporting the bottom drawing and modeling ability. At the same time, it is independent of the hardware and window system, suitable for all mainstream operating platforms such as windows, MAC, etc. it has a wide range of hardware support, and is designed for graphic applications such as games, modeling and CAD [2]. In the network environment, OpenGL can work in client mode or server mode. This technology is mainly used in high-end fields such as professional graphics processing, and is a professional standard graphics library. In terms of function, OpenGL supports particle system, so it can simulate natural scenery such as water, snow and fine sand. However, OpenGL is only the underlying graphics library of graphics, which cannot be directly used to describe the scene without providing geometry entities. When the model of 3ds Max is finished, we use wcvt2pov or other software to convert the model to C\C++ format, and use OpenGL program to load the model for secondary processing. It can be summarized as follows: first, use 3ds Max to build the model, then use OpenGL to read the relevant model, and use the interactive control technology of OpenGL to realize real-time control, so as to achieve the ideal model effect. The interface between 3D and OpenGL is shown in Fig. 1.

3D Modeling Technology in 3D Film

795

Fig. 1. The interface between 3D and OpenGL

2 Example of 3D Modeling in Three-Dimensional Animation 2.1

Design and Production of Three-Dimensional Animation Character

To make 3D animation, modeling is the first step [3]. Among them, the design of production of three-dimensional animation characters is an important part of 3D modeling. Taking the animation “the arpeggio of Cang LAN steel” as an example, this film can be called the special case of celluloid style CG in the history of TV animation works, in the behind the scenes production, all the characters do not use the action capture technology, but rely on hand drawing to design the figure sketch, then analyze and study the figure sketch, choose the appropriate modeling method, and finally start modeling. For human characters, we usually use subdivision modeling method (one is to complete the general shape of the model with basic geometry, and then edit polygons or meshes to subdivide the details of the model), and finally complete the rendering. Using 3D modeling technology to design and make 3D animation characters requires the creator to have a certain level of art, otherwise the created 3D characters cannot bring people a vivid feeling. The characters created through three-dimensional modeling have a very good performance in the film. With the support of the particle effect of the environment and the dynamic effect physics engine, their actions, expressions and interactions with the environment are particularly lifelike, giving the audience a more shocking feeling. 3D modeling is shown in Fig. 2.

796

S. Wen

Fig. 2. 3D modeling of arpeggio in cang lan steel

2.2

Construction of 3D Scene Modeling

Three dimensional scene design is an important part of three-dimensional animation. Scene design refers to the modeling design of all things that change with time except the character modeling in three-dimensional animation. Good scene design can enhance the beauty of 3D animation, strengthen the theme of rendering, and make the rendering effect of 3D animation better. In the implementation of “virtual campus” with virtual reality technology, 3D scene modeling is a very important work, which accounts for 70%–80% of the total work [4].

Fig. 3. 3D modeling of Virtual Campus

3D Modeling Technology in 3D Film

797

Before modeling, we need to obtain relevant data through campus plan, building plan, aerial photography and even satellite remote sensing; secondly, divide the campus into several areas, separate each area for analysis, mainly for the main buildings and secondary buildings in this area; finally, make and combine the models of each area, and paste the corresponding texture and Material, final render shape. The scene modeling in 3D animation can be the virtualization of real scene or the concretion of fictitious scene. This kind of “virtual campus” scene Based on 3D model satisfy the requirements of visualization, virtual roaming. As shown in Fig. 3.

3 Conclusions This paper mainly introduces the commonly used 3D modeling software 3Ds Max and 3D modeling technology OpenGL, and discusses the three-dimensional model with three-dimensional animation by taking 3D animation character design and production, 3D animation, 3D animation advertisement and 3D scene modeling design as examples. Although 3Ds MAX software has powerful modeling function, it still needs OpenGL Technology to assist; 3D animation character design and production, to 3D animation brought realistic effect; 3D animation to commercial advertising, the biggest help is to give the vividness and Simulation of 3D animation to commercial advertising, making commercial advertising with intuitive, real, easy to accept features; in scene design, 3D modeling makes 3D animation more aesthetic. For the development and application of modeling software, further research is needed. The future modeling software should have the characteristics of more simple operation, more humanoriented real-time interaction, higher quality model processing and rendering, and more efficient. As for the role of three-dimensional model with three-dimensional animation, we still need to further explore and explore.

References 1. Guohua, P.: Research and application of 3D animation character modeling technology based on 3Ds MAX. Shaanxi Sci. Technol. J. Univ. 28(2), 145–148, 165 (2010) 2. Wang, X., Zhu, W.: 3D scene modeling based on OpenGL and 3Ds Max. Electron Technol. 25(1), 79–80 (2012) 3. Chen, L.: Artifice, Ghost and Axe—Optimization of 3D Model. China Machine Press, Beijing (2004) 4. Chen, A., Hu, C., Qi, X.: Research on 3D scene modeling technology and implementation method of Campus Virtual Reality. J. Chongqing Norm. Univ. (Natural Science Edition) 24 (4), 37–40 (2007) 5. Li, B.: Design and implementation of 3D film and television animation production management system. Shandong University (2013) 6. Lu, Q.: Applied research on thinking and performing skills of film and television animation performance. Shaanxi University of Science and Technology (2013) 7. Liu, J.: Art construction of 3D film and television animation scenes. Northwest Normal University (2010)

Construction of Real Estate Featured Price Model Based on Massive Transaction Data Tian Shan(&) Shandong Women’s University School of Business Administration, Jinan 250300, Shandong, China [email protected]

Abstract. Based on the massive transaction data of Dalian’s commercial housing market, this article comprehensively considers the availability of characteristic information of each house. From the three aspects of building characteristics, neighborhood characteristics and location characteristics, 22 characteristic variables affecting housing prices and the standard of “standard commodity housing” in Dalian were determined: and a model of characteristic prices of commodity housing in Dalian was constructed accordingly. Furthermore, the influence direction, numerical value and degree of influence of each house characteristic on house price are analyzed and compared. Keywords: Commercial housing

 Featured price  Mass transaction data

1 Introduction Since China completely cancelled the housing distribution system in 1998. Real estate has become one of the important pillar industries of the national economy. Among the many economic and social issues related to the real estate sector, the issue of factors affecting the price of real estate has attracted particular attention from all sectors of society [1]. The rapid rise has evolved into the large fluctuations in real estate prices over the past two years, making the issue of real estate prices a hot topic discussed by domestic experts, scholars and even ordinary people. The author intends to take advantage of the extensive participation in Dalian real estate survey practice in recent years. It also draws on the experience and results of theoretical and empirical studies of characteristic price models at home and abroad. Based on the massive transaction data of Dalian’s commodity housing market. Comprehensively consider the availability of each house’s characteristic information, and the standard of the “standard commodity house” in Dalian from the three aspects of building characteristics, neighborhood characteristics and location characteristics: and construct the Dalian commodity Housing characteristic price model. And then analyze and compare the influence direction, influence value and influence degree of each house characteristic on house price.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 798–802, 2021. https://doi.org/10.1007/978-3-030-51556-0_124

Construction of Real Estate Featured Price Model

799

2 Real Estate Characteristic Price Model 2.1

Featured Price and Featured Real Estate Price Model

The purpose of household purchase is to transform the characteristics of the house into utility, and the level of utility depends on the number of various features contained in the house. Therefore, each residential characteristic corresponds to a characteristic price. Since the price cannot be directly observed in the market, sometimes the characteristic price is also called the implied price of the characteristic [2, 3]. Since Ridker applied the characteristic price theory to the analysis of the residential market in 1967 [4], after more than 30 years of practice and continuous improvement, the characteristic price model has developed into one of the models widely used in the real estate field. In the actual market. Residential products are sold as a collection of intrinsic features. Although the transaction price of a house can be directly observed in the market, the implied price corresponding to a house feature cannot be obtained directly. Studying the relationship between residential characteristics and residential prices, and estimating the implied prices of characteristics, so as to analyze the supply and demand characteristics of the residential market, is one of the main purposes of constructing characteristic price models [3]. 2.2

Setting the Characteristic Price Model of Real Estate

2.2.1 Determination of Characteristic Variables The essence of the characteristic price model is to start from the heterogeneity of the product, decompose the product price into the characteristic price, and estimate the implied price of the product characteristic through market transaction data. To construct the characteristic price model of real estate, we must first identify the various characteristic factors that affect the function and utility of residential use and determine the residential price. Through a review of the existing literature, the characteristics of houses can be divided into architectural features, neighborhood features, and location features. This article will follow this analysis framework. The analysis is based on the massive transaction data of the newly built commercial housing market in Dalian. 2.2.2 Selection of Function Form Regarding the choice of the function form of the characteristic price model, generally speaking. Most researchers preliminarily set the function form based on experience, and make the model fit the sample data [5, 6]. The general form of the characteristic price model for real estate is: P ¼ fðX1 ; X2 ; X3 ; . . .; Xn Þ Among them, P is the price of real estate and X is the characteristic of real estate. In practical applications, researchers have considered the interrelationship between independent and dependent variables and used a variety of function forms, including linear functions, quadratic functions, logarithmic functions, logarithmic linear functions, antilogarithmic linear functions, exponential functions, etc. [7, 8].

800

T. Shan

The relationship between the characteristic variable and the characteristic price expressed in the form of a linear function is the simplest and most intuitive, and how to influence the characteristic variable is given. This further affects the clear thinking of characteristic prices, so this article is out of the need to analyze the real estate market. Build a characteristic price model using a linear function: P ¼ a0 þ

X

ai Zi þ e

The regression coefficient ai corresponds to the implied price of the characteristic variable, which means that the value of the price changes for each unit of the characteristic when the other conditions are unchanged. when ai , is positive, it means that the increase of the characteristic value will lead to an increase in price; when ai ; is negative, it means that the characteristic value increases. Will result in lower prices.

3 Construction of Characteristic Price Model of Dalian Commercial Housing Based on Mass Transaction Data 3.1

Selection of Housing Characteristic Variables and Data Sources

The selection of residential characteristic variables can refer to the research results of relevant literature at home and abroad by Table 1. But the selection of characteristic variables. It will vary depending on the study area and some realistic conditions. This article is in determining the characteristics of Dalian residential characteristics. Comprehensively consider the availability of data and combine with the trial results of the model [5]. In order to construct the characteristic price model of the house. The transaction amount is equal to the product of the unit price of the area and the building area. Due to the difference from the sale of stock houses, developers sell newly built commercial houses. Generally, the unit price of the area is determined first, and then the total amount calculated by multiplying the price per square meter by the building area of each house is sold. Therefore, this article will choose the transaction price of the house as the dependent variable. The characteristics of the residential characteristic variables vary in their quantitative methods. The main methods are: ① The actual observation data method, that is, directly using the actual values of the residential characteristic variables or the dependent variables; ② Hierarchical assignment method. That is, the variable is assigned a value in the form of a rating scale according to the level difference of the variable itself. ③ Comprehensive evaluation and scoring method, that is, using comprehensive indicators for measurement. Score based on what is included. This method can reduce the number of characteristic variables and avoid serious collinearity problems. ④ Dummy variable method. That is, by introducing dummy variables, the influence of qualitative or attribute factors on the dependent variable is quantified. Since the housing transaction data of the Exchange are unsorted raw data, and the amount of data is huge, in order not to affect the model building effect, it is necessary to supplement, modify or delete missing values or observations with obvious registration

Construction of Real Estate Featured Price Model

801

errors in the database in advance; At the same time, according to the requirements of establishing a characteristic price model. This article treats the real estate with annual sales of less than 100 units as late sales and deletes them. In addition, due to the small proportion of villas. Affordable housing is also only supplied to specific groups, and its price cannot fully reflect the market price, so it is deleted. Finally, in 2006, there were 20,824 commercial residential transaction records in Dalian’s four districts. In the process of pre-construction of the full-variable model, it was found that the sign direction of the regression coefficients of the six variables, such as state, decoration degree, greening rate, living facilities, educational facilities, and whether the existing house is not in line with expectations. Regarding the decoration degree variable, the decoration degree of different residential buildings may vary greatly. However, this article is simply divided into three cases: rough rooms, rough-furnished houses, and fine-furnished houses, which causes a large error in the quantitative analysis process. The sign of the greening rate variable is contrary to expectations, most likely due to the large missing value of this indicator and the excessive registration error caused by the late addition. The symbols of the two variables of “living support” and “education support” also did not meet expectations. It may be related to the comparatively standardized municipal construction in Dalian and the complete set of living and educational facilities. In fact, it may represent some characteristics of tail room sales to a certain extent. Therefore, in consideration of this, we will continue to retain this variable in the subsequent establishment of characteristic price models. As a reference variable for determining whether or not the sale of a tail house, the expected impact on residential prices is negative (See Table 1). Table 1. Goodness-of-fit test of the straight line model Root MSE 2 R 0.8147 0.6637 0.6634 961.798 R

R2

(1) Goodness-of-fit test. According to the test of goodness of fit (see Table 1), it can be known that the complex correlation coefficient R = 0.8147. The adjusted judgment  2 ¼ 0:6364, which shows that although it is based on more than 20,000 coefficient R pieces of massive transaction data. However, the straight line model can still explain 66.34% of the difference of the dependent variable, and it can be considered that the fitting degree is good, and the regression model has a good explanatory ability. (2) The overall significance test of the regression model. From the analysis of variance table of the regression equation, it can be known that the test hypothesis that the adjoint probability of the F value of the statistic is less than 0.001, and the coefficients of the independent variables are all zero. It shows that all the independent variables entering the model have a significant effect on the common effect of the dependent variable, that is, the regression equation is valid.

802

T. Shan

4 Economic Significance Analysis of the Characteristic Price Model of Commercial Housing in Dalian Knowing from the above calculation process. The straight line model has good fitting goodness and high explanatory ability. The regression coefficient of each characteristic variable is statistically significant. Therefore, it can be used to analyze and explain the impact of housing characteristics on housing prices. By constructing a characteristic price model of the house, each feature is decomposed and its impact on the house. If the most typical clusters of residential characteristics are combined, a standard residence is formed. Although this virtual standard house does not have practical significance, it is in line with the basic idea of the characteristic price model, and it also has the best representation of the general level of properties for sale in the market. The most general and representative home in the market.

5 Conclusion The standard house is determined as follows: For the continuous variables (building area, floor area ratio, and CBD distance) that approximate the symmetrical distribution in the characteristic price model, the average value is taken as the value of the variable in the standard house; for the discrete variables (building category), Floor type, whether it is a top floor, whether it is duplex, whether it is overstory, whether it is based on a mountain, whether it is near the sea, whether it is a first-level qualification, whether it is an administrative subdivision, whether it is a star bay area, whether it is a high-tech park, whether it is an existing house), and continuous variables.

References 1. Haizhen, W.: The characteristic price of urban housing: theoretical and empirical research, 1st edn. Economic Science Press, Beijing (2005) 2. Freeman, A.M.: The measurement of environmental and resource values: theory and methods, 2nd edn. Washington, DC, Resources for the Future (2003) 3. Haizhen, W., Shenghua, J.: New method for real estate evaluation based on characteristic prices. Foreign Econ. Manag. (6) (2004) 4. Hua, Z., Tongsheng, L.: Study on the spatial differentiation mechanism of residential prices in Xi’an based on Hedonic model. J. Xi’an Univ. Arts Sci. (Nat. Sci. Ed.) (2) (2007) 5. China Index Research Institute. Theory and Practice of China Real Estate Index System, 2nd edn. Economic Management Press, Beijing (2005) 6. HaoChen, Z.: An Empirical Study on the Impact of Bank Credit on Real Estate Prices. East China Normal University (2019) 7. Jianjie, Z.: Research on Real Estate Market Regulation in Dongguan. Huazhong University of Science and Technology (2019) 8. tengtian, Z.: Research on the Influence of Industrial Structure Change on Real Estate Price. Xiangtan University (2019)

Enterprise Strategy Management Online Learning with CART Algorithm Taking an Empirical Analysis of Turnover Management Based on Gray Correlation Model as an Example Yuwei Wang(&) and Liangliang Qian Gongqing College, Nanchang University, Gongqing, Jiangxi, China [email protected]

Abstract. Data mining, as a new driving force for the development of the knowledge economy, has been applied in many fields such as finance, retail, insurance, and medical treatment, and has achieved remarkable results. However, the application of data mining in the field of human resource management is still in its initial stage. There are many limitations in the implementation, popularity, and technology maturity. In this context, taking the management of turnover as an example, based on the perspective of data and risk, the gray correlation analysis method based on data mining technology is used to quantitatively evaluate the turnover factors. The empirical analysis results are used to guide managers in making decisions. The need for business and human resource managers. Keywords: Human resource management management

 Data mining  Turnover

The wave of data mining for analysis and prediction of huge amounts of data has been It is a strategic resource for enterprises to achieve sustainable development by sweeping multiple fields and industries and achieving remarkable results. The development of enterprises in the field of human resources is mainly reflected in whether the development speed and development quality of employees’ skill levels and knowledge capabilities match the overall strategy of the enterprise, while traditional human resources data analysis often stays at the query and statistical level, and can only obtain surface information It is difficult to accurately measure a series of dynamic information such as the changing quality level of employees. However, domestic human resource management started relatively late, the popularity of data mining in the field of human resource management is significantly lower, managers lack the awareness of cultivating data thinking, and the technology maturity is still in the exploratory stage [1, 2]. Therefore, this article takes the application of data mining technology in departure management as an example to clarify the necessity of combining management with data.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 803–808, 2021. https://doi.org/10.1007/978-3-030-51556-0_125

804

Y. Wang and L. Qian

1 Overview of Data Mining Theory Data mining, also known as knowledge discovery in databases, is the process of obtaining valid, potentially valuable, and ultimately understandable patterns from a large amount of incomplete, noisy, fuzzy and random practical application data. The high popularity of the Internet in the 21st century has made society officially enter the era of huge data, that is, the era of big data. The characteristics of large data, large dimensions, and completeness require high-level deep processing methods to effectively capture and integrate the required readable information. Automatically mine useful information from a large number of fuzzy random data storage sets, thereby completing the internal regular search of massive data and discovering patterns hidden in the data. Discovered models include the descriptive model and the predictive model. The descriptive model is a canonical description of the current data, which characterizes the current data. The predictive model predicts the future based on historical and current values. It can be subdivided into classification mode, clustering mode, association mode, regression mode and sequence mode [3]. As a technology for practical applications, data mining has been widely used in retail, medical, financial, insurance and other fields. In retail, identify different customer groups and predict purchasing behavior. In terms of medical treatment, the drug mechanism is verified, and disease diagnosis is performed through classification algorithms, and some diseases are predicted through algorithms such as neural networks and support vector machines [4]. In terms of finance, we have established a customer credit risk assessment system. In terms of insurance, analyze the influencing factors that determine the amount of insurance and the type of insurance, and predict the customer’s insurance model. As long as the industry has a data warehouse or database with analytical value and needs, targeted data analysis can be performed, as is the human resources field.

2 Overview of Human Resource Management Theory The basic connotation of human resources was first proposed by the well-known management scientist Peter Drucker in the book “The Practice of Management” in 1954, emphasizing that people are a resource, a production factor that creates wealth, and needs the same as other material resources management. According to the existing relevant literature, based on the connotation of human resources management, human resources management theory is roughly divided into: strategic theory, emphasizing human resources as the primary competitive advantage, and its configuration and activities must be vertically matched with corporate strategy, such as Miles and Sri Lanka Nuo’s human resource management and corporate strategy adaptation model. Descriptive theory emphasizes the openness of human resource management, introduces it to a wider range of research areas, and comprehensively controls management variables, such as Professor Zhao Shuming’s “Five Talent Model” management. Normative theory emphasizes that human resource management needs to be based on empirical investigations and statistical analysis, such as Arthur’s control and commitment model. The current explanations of human resource management are mostly

Enterprise Strategy Management Online Learning

805

comprehensively elaborated from its management purpose, process, function, subject and other aspects, that is, human resource management is a new type of personnel management model with human-centered management as its core concept. According to the strategic goals of the enterprise, tap the potential value Improve the quality of work to achieve organizational goals [5, 6]. Knowledge has become the most differentiated competitive advantage of enterprises. Human resources as the carrier of knowledge is undoubtedly the core capital for sustainable development of enterprises. The quantifiability of human resources is far lower than the components of assets and technology. In the context of the huge amount of information generated by digital technology, the dynamic and three-dimensional characteristics of the organizational environment of the enterprise are becoming increasingly prominent. The heterogeneity, variability and complexity of individual employees make the management of evaluation, prediction and decision-making particularly difficult There is no objective standard for measuring the effectiveness of human resource management. Data is often the carrier of individual dynamic behavior trajectories. Therefore, how to use data mining to achieve deep-level knowledge discovery and apply it to management is an urgent problem for human resource management.

3 Data Mining and Human Resource Management In management practice, data mining is the in-depth analysis of massive human behavior data, corporate environmental data, business operation data, etc., to obtain information that can help improve management efficiency, promote talent development, optimize business processes, and further enhance corporate competitiveness Knowledge information. Among them, human resources data are mainly generated by individuals and individual behaviors, including basic data, ability data, efficiency data, potential data At present, the human resource data management technologies commonly used in China include statistical technology, econometric technology, survey technology, and information system technology. Although they have achieved certain results, they still prefer qualitative analysis. The system software is more general and the data lacks dynamicity and three-dimensional features, ignoring the function of dataassisted decision-making. Data mining has given new management features to human resources, and the characteristics based on data links have broken the limitations of explicit data analysis. Based on the characteristics of the data platform, it is helpful to realize the dynamic real-time storage, mining, modeling and analysis of data. Based on the characteristics of the data direction, the data mining and analysis process is systematic and complete through data models and algorithms, thereby realizing the core value of data-assisted prediction and decision-making. The characteristics of the correlation, development, and integrity between the two make The interaction between data mining and human resources has more development potential. Through data mining, managers can track, analyze, and share employee data, and realize the standardization and quantification of in-depth analysis and predictive decision-making in management work, so that human resources data is no longer just

806

Y. Wang and L. Qian

the content in tables or databases, but the underlying fact Correlation is a thinking tool and reference assistant for managers to make decisions, so as to realize the use value of the best management of data at the enterprise level and the optimal decision at the business level.

4 Empirical Application of Data Mining in Turnover Management Based on the existing model, this article introduces four new influencing factors: conversion cost, career matching, relationship, and career length into environmental variables, individual variables, and structured variables. It is used as a risk assessment indicator for risk assessment [8]. The Price-Mueller model is based on expectation theory and exchange theory, and integrates the results of research on departures from multiple fields, including economics, sociology, and psychology. The prediction effect is good. The model reveals the impact of environment, individual, structured, and intermediary dimensions on employee turnover behavior. Environmental variables directly affect job search behaviors and turnover intentions. Individual variables and structured variables pass job satisfaction and organizational commitment. Indirectly affect job seeking behavior and turnover intentions. Price-Mueller turnover model factors are shown in Table 1.

Table 1. Price-Mueller turnover model variable factor index Variable category Environment variable (Exogenous variable) Individual variable (Exogenous variable)

Number of variables 3

4

Variable name (Variable indicator) Relative responsibility Opportunity Conversion cost General training Work participation Positive and negative emotions Career match

Duties and obligations to relatives Opportunities for alternative work Mental and material losses due to conversion Extent to which own factors meet other requirements Voluntary effort for work Experiencing happy or unhappy individual tendencies The company provides the matching degree of development and employee expectation (continued)

Enterprise Strategy Management Online Learning

807

Table 1. (continued) Variable category Structured variable (Exogenous variable)

Number of variables 9

Variable name (Variable indicator) Work autonomy Fairness of distribution Working pressure Remuneration Promotion opportunities Work monotony Social support Relationship Career length

Mediation variable (Endogenous variable)

4

Job satisfaction Organizational commitment Job search Intention to leave

The extent to which one can exercise his power to work Employees’ judgment on the fair distribution of performance rewards and penalties The degree of stress caused by incomplete tasks due to objective factors Remuneration and benefits for work T Career promotion possibilities Work is repeated Other people’s understanding and support for employees’ work Potential for individuals to access scarce resources and avoid dilemmas Opportunities that companies can provide to enhance their quality and knowledge Degree of preference for work Loyalty to the business Finding other job possibilities Degree of want to leave the current unit

5 Conclusion The fundamental purpose of human resource management is to maximize the profit of the enterprise. Just as the economy is the amplification system of knowledge and technology, the profit of the enterprise can be regarded as the amplification system of data power. As one of the three major asset assets of an enterprise, talents have been promoted to the status of strategic resources. Driven by the intelligent wave of the times, human resources are all dependent on management-level affairs such as search, acquisition, cultivation, and mobility. Data mining analysis to guide decision making. The data that is available at any time can assist enterprises to achieve effective operation and optimized configuration in all aspects of business processes. Data power is becoming the core carrier of intelligent quotient for enterprises and HR managers. Conversion.

808

Y. Wang and L. Qian

References 1. Zhu, J.: Application Research of Data Mining Technology in Human Resource Management, 5. Shanghai Jiaotong University (2008) 2. Chen, Z.: Application and research of forecasting decision model based on data mining. China Manag. Informationization 57–59 (2009) 3. Qu, X.: Application of data mining technology to staff turnover. Technol. Innov. Manag. 35 (5), 452–456 (2014) 4. Yang, F.: Human resources informatization management based on data mining technology. Inf. Commun. 152–153 (2017) 5. Li, Y.: Credit risk assessment of small and medium-sized enterprises based on grey correlation model. Economist (06), 79–80 (2014) 6. Zhang, M., Zhang, D.: Influencing factors of employees’ intention to leave: quantitative research on some new variables. Hum. Resour. Manag. (04) (2007)

Deep Learning Strategies in Media Teaching System Based on ADABoost Algorithm Wang Chang Jiang(&) Science and Technology College of Gannan Normal University, Ganzhou 341000, Jiangxi, China [email protected]

Abstract. Artificial intelligence is applied in various industries, adding new development impetus to the industry. Under the background of artificial intelligence, to promote the deep learning of English teaching, we should make layered learning plan by using the high efficiency of the teaching end of artificial intelligence; create targeted learning methods by using the individualization of artificial intelligence teaching; promote collaborative learning by using the teaching resources of artificial intelligence; and promote the students’ autonomous deep learning by using the generativeness of thinking class. Keywords: Artificial intelligence

 English teaching  Deep learning

1 Introduction In the current era, artificial intelligence technology has played an important breakthrough. At present, the accuracy of artificial intelligence speech recognition technology, which is in the leading position in the world, has reached a very high level. This speech recognition technology is widely used in all aspects of our life [1, 2]. In addition, language translation, speech synthesis, speech testing, speech conversion, voiceprint recognition and other artificial intelligence technologies are also closely related to language learning. In modern society, machines can not only understand people’s words, but also give full feedback to people’s words. Artificial intelligence has brought new ideas and breakthroughs to the way of human learning, but also challenges and opportunities to all aspects of teaching [3, 4].

2 Artificial Intelligence (AI) Brings English Teaching Opportunities The development of AI technology promotes the innovation of college English language learning and English teaching methods. “The traditional foreign language teaching, and the new ecology and new paradigm of foreign language teaching must be reconstructed.” The undifferentiated teaching under the unified teaching task can’t get the real-time feedback of students’ knowledge mastery, students have little opportunity to learn to apply, and teaching and learning can’t form a good cycle. The use of © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 809–814, 2021. https://doi.org/10.1007/978-3-030-51556-0_126

810

W. C. Jiang

advanced artificial intelligence technology makes personalized and accurate education possible. Based on big data, artificial intelligence can track and record all kinds of data of learners, model, analyze and evaluate learners, effectively intervene learners, and provide data support for teachers to improve teaching methods and strategies, so as to truly realize the “take full consider of individual differences and learning styles of students, use appropriate Effective teaching methods embody the teaching idea of taking teachers as the leading role and students as the main body, so as to realize the transformation of teaching activities from “teaching” to “learning”, and form the requirements of teaching normality characterized by teachers’ guidance and inspiration and students’ active participation. Artificial intelligence not only changes the way of students’ language input and output, which enables students’ language learning to penetrate into their daily life. It is of great significance to raise the quality of teaching to use AI technology better in the complex language environment [5–7].

3 Problems in Teaching Process 1. Problems in Teaching The importance of College English is not only reflected in the fact that it is a compulsory course for students in the college stage, but also in the fact that it has a significant impact on the future development of College Students’ life. After decades of exploration and practice, College English teaching has made considerable progress, but we are still many issues in college teaching [8, 9]. 1. The teaching methods of College English teaching fail to meet the needs of the development of the current era. Up to now, large class teaching is still the form of English course in most universities. From another point of view, this undoubtedly means that the possibility of interaction between teachers and students is almost zero. In addition, different English foundations and learning objectives among students make it more difficult for English teachers to prepare lessons, and at the same time, it is really difficult for teachers to make sure that their teaching can be suitable for each student’s personality, so as to reduce the students’ College English learning effect [10]. 2. English listening and speaking ability of college students in China is relatively backward compared with their reading and writing ability. Some college students do have enough English vocabulary and some reading and writing skills, but once they use English to express themselves and communicate with others, their listening and speaking skills will be exposed. It is not difficult to see that the special listening and speaking practice has not been paid enough attention in the current English teaching. The lack of students’ listening and speaking ability has become the key to hinder the further improvement of their comprehensive English ability. 3. College students’ enthusiasm in English learning is not high enough. On the surface, the reason for this phenomenon is that English is a required course, but not a professional course for non-English majors. Specifically, in the middle school stage, the teacher will not only grasp the key and difficult points in English knowledge to say and emphasize repeatedly, but also arrange after-school learning tasks for students. What this change challenges is the autonomy and self-discipline of college

Deep Learning Strategies in Media Teaching

811

students. Entering university, students have more free time, but if they do not make good use of it, they will delay their studies.

2. Problems in learning 1. The current college English teaching system is still influenced by the concept and mode of examination oriented education. Some teachers are not active in teaching and do not take the initiative to study. Teaching is closely around the content of teaching materials. In the long run, it is easy to produce burnout and affect the learning of College English. 2. Learning motivation and goal are not clear. Many students slack off a lot from the thought after the college entrance examination, so that the learning attitude and state after entering the university are very loose. Learning in university is not only to ask students to accept knowledge passively, many contents need students to study and think further after class on the basis of classroom learning, and there are more requirements for independent learning. 3. The evaluation model is old. In the current college English teaching, the examination result is one of the important means and bases to test a student’s learning effect. According to the survey, the assessment of students’ English level in most schools mainly depends on their final English test results. At the same time, the survey also reflects that the contents of the final college English test can’t fully reflect the students’ ability to understand, master and use English. 4. At present, we have no teaching supervision system in English learning. Firstly, the supervision mechanism is reflected in the restraint of students’ behavior and discipline. Although most undergraduates are adults, they still lack of self-discipline. Many students attach great importance to professional courses, but they don’t pay enough attention to English courses, which leads to problems such as low class arrival rate, absent mindedness in class, not listening carefully, and failure to complete after class learning tasks as required. In addition, in the teaching of College English, nor apply students’ autonomous learning ability to college English learning, so as to form an effective teaching supervision system.

4 Strategies of Deep Learning in College English Teaching The birth and development of science and technology is to better serve mankind. In the field of language learning, artificial intelligence can play its unique advantages and teachers’teaching. We analyze the application with AI from the following four aspects: listening, speaking, writing and translation, and discusses its role in promoting the reform of English teaching. 1. A corpus based approach to college English Listening Teaching in artificial intelligence. As an indispensable part of College Students’ English learning process, listening training is of great significance for the cultivation of College Students’ basic English literacy.

812

W. C. Jiang

2. Robot based oral English Teaching in artificial intelligence University. The purpose of learning any language is to achieve better communication. The ultimate goal of learning English is to use the language more flexibly. The level of students’ oral English expression can fully demonstrate their practical English application ability. 3. English Writing Teaching in artificial intelligence university based on intelligent writing correction platform. The application of artificial intelligence technology in English writing teaching is mainly reflected in the correction of English composition content. Intelligent English correction learning platform such as correction network has been widely promoted in many universities. 4. English translation teaching of AI university based on cloud service and computeraided translation. Artificial intelligence also has a breakthrough in the field of English translation, and has achieved some teaching results in the process of English translation teaching. English learning is a long-term, step-by-step process. Under the guidance of the new era and with the help of new means, College English should be an interesting and indepth course. Therefore, according to the current situation of College English, the author puts forward the following strategies for deep learning of College English, as shown in Fig. 1.

Fig. 1. Deep learning strategy of College English in artificial intelligence environment.

1. Make effective teaching plan. Effective teaching plan is a guide for the whole college English course to be carried out orderly. Teaching plan is the direction of the implementation of College English teaching activities and the expected learning effect. According to the teaching objectives of university courses and the learning situation of students, the author makes a teaching plan: Knowledge and skills. Students can learn the content related to the theme from multiple angles through the Internet and dig deeper learning resources. 2. Development of personalized deep learning method. Relying on the website and APP, every student can create personal learning plan, and convert the works formed by each student during the course of learning into electronic version and publish on the online platform. Evaluators can understand the dynamic change process through the network anytime and anywhere, and download and organize it into folders.

Deep Learning Strategies in Media Teaching

813

3. Enhance the awareness of autonomous and cooperative learning. College English courses should constantly enhance students’ awareness of autonomous and cooperative learning, make students responsible for their own learning, and make students enter the stage of thinking, from dependence to independence, from passivity to initiative, actively participate in various listening, speaking, reading and writing activities in learning, and constantly improve learning efficiency. 4. Monitoring learning effect. College English courses should give network feedback while using network resources, and combine all kinds of learning resources and new evaluation methods in the Internet resources, so that learners can learn anytime and anywhere without the limitation of time and space. Teachers can organize papers for students through the network platform, and the type of test is no longer a single paper form, adding audio and other multimedia forms.

5 Conclusion The application of artificial intelligence in English learning and teaching is still in the primary stage. The deep integration of artificial intelligence and College English teaching will become the new normal of language teaching. Teachers should keep up with the trend of the times to achieve higher level of teaching reform and upgrading in the new era, free from the simple and high repetition rate of College English teaching work, so as to spend more time and energy, and take full use of artificial intelligence technology to strengthen for college students English teaching in-depth and effective development. Acknowledgement. Basic Education Research in Jiangxi province in 2019, School-based English Curriculum Research in Primary School Project No. SZUGKYY2019-1057 Project Leader: Wang Changjiang.

References 1. autumn, L., Jingyun, Z.: Internet plus, the mixed teaching of college English listening and speaking. Engl. Teach. 19 (24), 51–52 + 68 (2019) 2. Shengxue, Z.: College English teaching reform and strategy in the age of artificial intelligence. J. Anshun Univ. 21 (06), 73–77 + 104 (2019) 3. Jing, T.: Reflections on college English teaching in the context of artificial intelligence translation. Sci. Educ. Guid. (mid ten issue) 11, 141–143 (2019) 4. Xing, N.Z.: Internet plus. Sina’s English Teaching in Chao Chi University. J. Hubei Vocat. Open. Univ. 32 (20), 179–180 (2019) 5. Kaiyan, S.: Analysis on the effectiveness of college English teaching. Overseas Engl. 14, 160–161 (2019) 6. Xinxing, L.: The current situation of college students’ autonomous English learning in the new media era. J. Kaifeng Educ. Coll.E 39(07), 89–90 (2019) 7. Jing, W.: Research on the development of foreign language education information policy in China. Shanghai Foreign Studies University (2018)

814

W. C. Jiang

8. Jianlin, C.: Research on the integration of computer network and foreign language teaching. Shanghai Foreign Studies University (2011) 9. Ludandan. College English assisted instruction expert system based on artificial intelligence. Beijing University of chemical technology (2009) 10. Shili, G.: Research on the general computer composition scoring and feedback method for College English Teaching. Beijing Language and Technology University (2008)

College Online Learning System Based on NLP Algorithm Xiao Caifeng(&) School of Foreign Languages, Jiangxi Science & Technology Normal University, Nanchang, Jiangxi, China [email protected]

Abstract. This article introduces the results of the second round of teaching application of the artificial intelligence English teaching system application and evaluation project, which is guided by design-based research. In the second round of teaching application, we learned the current situation of oral English learning of high school students, and obtained the principles of improving the system and deepening teaching integration. Finally, we review and reflect on the previous work. Keywords: Artificial intelligence teaching

 Design-based research  Oral English

1 Introduction With the development of Chinese society and the increase of foreign exchanges, oral English teaching has received increasing attention. Special emphasis was also given in the new curriculum. However, the phenomenon of light spoken English still exists in China’s English classroom. Several surveys also show that the spoken English level of college graduates is far from meeting the needs of society [1]. The artificial intelligence chat system is built to meet the current growing demand for oral English learning. It is committed to using natural language understanding and processing, Agent, semantic network and other technologies to create an interactive learning environment for English learners, convenient for learners to practice speaking English by chatting with robots. We hope that this artificial intelligence teaching system can provide users with English training anytime, anywhere. Promote the solution to the problems of current English learners’ lack of opportunities for practical language training and lack of practical communication skills [2, 3]. During the construction of the system, situational learning theory provides us with design principles. It pays attention to the dependence of language learning on cognitive situational conditions, emphasizes the creation of situations that stimulate learning motivation, and encourages students to effectively master language through practice related to the field and participation in social activities. The situational learning theory provides guidance for the construction of the system. In the Hickey system, we provide users with a dialogue on any topic with the robot. It is divided into text dialogue and animation dialogue (that is, an animation character is selected to represent both sides of © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 815–819, 2021. https://doi.org/10.1007/978-3-030-51556-0_127

816

X. Caifeng

the dialogue, and different animation characters have different dialogue characteristics [4]. Users can also hear sound in the animation dialogue). Users learn in the process of applying language through role-playing in simulated real situations. In addition, we also provide text reading capabilities. The robot can read any text entered by the user.

2 Artificial Intelligence Teaching Applications and Evaluation: Design-Based Research During the development of the project, we use design-based research as a guiding methodology. Design-based research has developed since the 1990s. It is aimed at the problem of the integration of traditional technical education from research and practice. Committed to bridging this divide and truly promoting technology and curriculum integration through practice-oriented research to improve the effectiveness of learning. Design-based research also aims to design learning environments and development theories. Emphasize that research and development are carried out in a continuous cycle of design, implementation, analysis, and redesign, and focus on providing theoretical results that practitioners and teaching designers can share. Focus on recording the specific use of the design results in the real environment. And pay attention to the research method that can fully record and link the execution process with the final result. Based on the requirements analysis and related literature review based on system prototype testing. The first version of Heathco was launched in 2002. And put online for free use by users. Use this to gather user feedback and continuously improve the system. after that. From September to December 2006, we applied Hickey to the public English teaching of graduate students in a university. The first round of local teaching application of the system was carried out. It is hoped that the application process research and formative evaluation will be carried out. On the one hand, deepen the theoretical research. Understand the current situation of oral English teaching and learning. Summarize the system design principles based on context theory. On the one hand, adjust the teaching integration measures, improve the system, and promote the effectiveness of teaching integration. Teachers recommended the Hexico system to students in early September for use by students. We address teaching needs. Designed chat features for specific topics that are linked to weekly role-playing activities in the classroom. Closely related to student life and learning. In addition, we also launched a “two-person transfer” for chat content on specific topics, that is, two robots performing dialogue performances. Provide examples for student conversations. Before class, students can practice by chatting with robots; in class, teachers randomly assign students to role-play around specific topics. A combination of questionnaires and discussions. Investigated the situation of students’ oral English learning. It summarizes the areas where the system needs to be improved and the relevant experience in the application of information technology teaching.

College Online Learning System Based on NLP Algorithm

817

3 Application of Artificial Intelligence System in High School English Classroom 3.1

Students’ Evaluation of the Application of Systematic Teaching

At the end of the semester, we asked students about their attitude towards the application of system teaching. 60.5% of the students chose “like” or “very like”. Only 2.3% of students chose “dislike”. 95.3% of students indicated that they would recommend the system to their friends, and 69% of students said that even if the teacher did not explicitly ask for it later. Student still will to continue to use Hisak. Only 11.9% of students said they would no longer use it. When reviewing the benefits of using the system. Through questionnaires and discussions, the students stated that through the use of the chat system, they “revised the important content of the text. In addition, they also improved their grammatical abilities”. “Proficiency in English”, and can “improve listening and interest in English”, they said that the reading of chat and related webpage materials is conducive to “mastery of texts and expansion of extracurricular knowledge. They also believe that learning “in a new form” by talking to robots. And don’t worry about saying wrong, “I won’t be nervous.” Can cultivate “confidence in spoken dialogue.” Other students expressed their appreciation for this new way of learning, thinking that in this way, learning is no longer “limited to textbook reference books.” Conducive to students “adapted to networked development.” It is also “suitable for middle school students to obtain information mainly through the network.” Regarding the reflection function, students joined relatively late. The number of uses is limited, so the effect is relatively insignificant. According to the content of reflection submitted by students, we can see that students will become more familiar with and summarize unit topics and dialogues during reflection. Some more Students will ask questions that arise in the system. This is a win-win situation for both the student and the researcher. We used a five-point scale and asked students to evaluate the effects of the system. 3.2

Oral English Learning for High School Students

Through questionnaires and discussions at the beginning of school. We also conducted an in-depth investigation of the situation of spoken English learning among high school students. As an English specialty class. At least 68.2% of the students in the class have taken an oral English test, including the National Public English Speaking Test, the 13level test in Beijing, and everyone speaks English. 97.7% of students think that spoken English is “more important” or “quite important” for them. They realized the importance of their spoken English. Including in going abroad, looking for a job, etc., and also talking about “English is a tool for communication. You can’t even talk and write on paper.” We also asked students to conduct a self-assessment of their spoken English level, including four levels: “Basically able to communicate with foreigners in most spoken languages” (excellent) “Able to complete 70%–50% with foreigners Oral communication “(better)” Able to complete 50%–30% of VI language communication with foreigners “(lower middle)” Basically unable to communicate with foreigners “(low). 44 students who answered. 56.8% of students think that their spoken language

818

X. Caifeng

belongs to middle-low level. Only 31.8% of the students considered their spoken language level to be good or excellent. When asked how satisfied the students were with their spoken English, 84.1% said they were “sloppy” or “unsatisfied”, and 7.7% said they were “relatively expected” or “very expected” to improve their spoken English. In the March questionnaire, we also used a five-point scale to ask students about the current situation of spoken language learning. The results are shown in Table 1. Students expressed confidence in improving El language. but. At the same time, they acknowledged that they had not invested enough energy in speaking, and we also asked the students “in the most recent month, how much time did you spend on speaking English every week in class on average?” Students’ answers are shown in Fig. 1. It can be seen that students have not invested enough time in oral English after class. Table 1 Status and strategies of students’ oral learning

Proactively create spoken language learning environments to improve spoken English Clearly know where your spoken language is deficient Know how to plan for speaking Know effective strategies to improve your spoken English Believe in improving your spoken English To master language knowledge is more conducive to improving spoken language skills than communicative exercises Use of your mother tongue when speaking Less effort in speaking than listening, speaking, reading and writing (Mean: 5 = No Help, 1 = Great Help)

100% 98% 96% 94% 92% 90% 88% 86%

N

Mean

44

3.4318

Std. Deviation 0.84627

44 44 44 44 44

2.6232 3.5227 .34091 2.2955 3.32955

0.96968 0.82092 0.84408 1.02480 1.09075

44 44

2.27273 2.3023

1.12815 1.08089

Std.Deviation Mean N

Fig. 1. Compare with status and strategies of students’ oral learning

College Online Learning System Based on NLP Algorithm

819

4 Correlation Analysis We also analyzed the self-assessment of students’ oral proficiency and the current situation of oral learning. The results show that the higher the level of self-evaluation, the more important the spoken language is. The more confident you are in improving your language; the clearer you are about the areas where your spoken language is insufficient. The more actively I can create an oral learning environment. At the same time, the more emphasis is placed on the importance of communicative exercises. These provide the basis for user-level work. In the questionnaire, students mentioned that the use of the system “should be divided into various levels: difficult, difficult and easy dialogues, not only to train poor students, but also to improve learning,” students also expressed similar views in the interview.

5 Conclusions Through the investigation of students’ oral English learning in the first and second rounds of teaching application. We understand that current English teaching still pays little attention to spoken English. Although students realize the importance of oral learning, including the importance of oral learning for work, going abroad, and English learning itself, the energy invested in oral learning is seriously insufficient. Lack of opportunities and context for oral practice, lack of motivation to persist. And the lack of time and energy investment due to the burden of schoolwork. It is a major obstacle to language learning that graduate students and high school students agree with. In addition, the lack of learning management ability and the problem of teaching evaluation methods have led to the stagnation of students’ oral English ability.

References 1. Zheng, F., Jixian, P., Xing, Z.: Analysis of the influence of Chinese life on college English teaching and its demand prediction. Foreign Lang. 5, 16–21 (2001) 2. Jiyou, J., Mainzell, K.: Creating English with natural language human-computer interaction dialogue context Tian. China Educ. Technol. 10, 87–91 (2006) 3. Chunyu, Z.: Research on English teaching model based on situational cognition. East China Normal University, Shanghai (2003) 4. Reeves, T.H., Oliver, J., Hong, D.: Research: A socially responsible approach to instructional technology research in higher education. J. Comput. High. Educ. 16(2), 97–116 (2005)

Design and Implementation of Music Online Network Course Based on Cloud Computing Xuenan Yang(&) Hunan Sany Polytechnic College, Changsha 410100, China [email protected]

Abstract. Based on the analysis of typical PaaS platform technology at home and abroad and the current status of the construction of music education online courses, an Azure-PaaS-based music education network course architecture is designed. The development environment for online courses is configured, created, tested, and deployed to the Azure platform The other steps have realized the construction of music education online courses using cloud computing technology, which has achieved the high scalability and openness of online courses, and effectively met the needs of learners to realize distributed online learning. Keywords: Music course

 Online course construction  Cloud computing

1 Introduction Music education network courses belong to the category of modern distance network courses. In the “Technical Specifications for the Construction of Modern Distance Education Resources”, the Ministry of Education defines the online course as “the sum of the teaching content and implemented teaching activities of a subject expressed through the network. It includes two components: according to certain teaching goals teaching content organized by teaching strategies and supporting environment of network teaching. Therefore, the music education network course can be considered as a new music education system formed by the integration of multimedia information technology and traditional music education. In order to meet the diversified learning needs and the huge amount of curriculum resources, online education music education courses need to solve the problems of rapid deployment, reliable operation and flexible expansion [1, 2]. The music education network course applying cloud computing technology can make full use of the advantages of “cloud” to provide large-scale, highly reliable, virtualized computing and storage services on demand, and has strong information service and resource management capabilities. Based on the analysis of related research status at home and abroad, this paper establishes a PaaS-based music education network course structure through the Azure public cloud service provided by Microsoft, and designs and implements a music education network course based on this structure.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 820–825, 2021. https://doi.org/10.1007/978-3-030-51556-0_128

Design and Implementation of Music Online Network Course

821

2 Cloud Computing (1) Comparison of cloud computing and typical PaaS platforms Cloud computing is a network-based computing method. Its core idea is to coordinate management and scheduling of software and hardware resources to provide users with on-demand, scalable computing services. Infrastructure as a service enables pooled sharing of hardware resources and supports the rapid deployment of information systems from the hardware level. Platform-as-a-Service enables pooled sharing of platform software such as middleware and databases, simplifying the deployment of information systems at the software level [3]. At present, there are many PaaS products on the market, with Google’s Google App Engine (GAE), Microsoft’s Windows Azure, and Amazon’s Amazon Web Services (AWS) being the most typical. They all provide computing environment and development environment as a service to users. They have the characteristics of dynamic resource expansion and load balancing. The cloud computing service models and strategies provided by each product have some emphasis, and the typical characteristics of the three products can be compared (see Table 1) [4–6]. Table 1. Comparison of typical PaaS platforms Production Development environment Running environment Code publisher

GAE Plugin of Eclipse Go, Java, PHP, Python GIT

Data base

SQL

Azure Windows Azure tool of Visual Studio Java, PHP, Python, NET, Node.js TFS, FTP, Dropbox, GIT SQL Azure

Vision control Portability

Yes Low

No High

AWS Tool of Eclipse Java, PHP, Python, NET, Node.js, Ruby GIT, SVN, WEB Simple DB, My SQL, SQL Server, Oracle No High

It can be seen from Table 1 that the three products have their own characteristics: GAE has the advantages of good scalability and free usage, can implement application hosting, and can integrate all application services on the Google platform, but GAE is portable It is relatively weak and requires repeated development for existing application systems; the emergence of Microsoft Azure solves the problem that traditional PaaS cannot autonomously choose the cluster architecture and dependent basic software, and the problem of poor deployment flexibility can provide a comprehensive Stack, fullprocess Internet business platform deployment plan. AWS is a service. Its Simple Queue Service (SQS) publishes a web message framework as a network service. Users on the network can read messages after security settings, without having to install any software or configure special Firewall, Simple DB supports structured and unstructured data storage and query services for applications.

822

X. Yang

From a technical perspective, Windows Azure is more suitable for the development of online courses. First, Windows Azure and. The .NET development environment is a Microsoft product, and Azure can seamlessly support it. NET development environment, developed online courses can be deployed directly to the Azure platform without any modification; Secondly, Azure supports Data Storage and SQL Server, can store relational data, and can manage course data and user information online; finally Azure supports multiple languages, and the runtime and database are more flexible than other PaaS products. (2) Cloud computing-based music education online course Music education online courses can better solve the problems of limited time and space of traditional music education, limited teachers and curriculum resources, and enable music learners in different spaces and time to learn music knowledge and performance skills through the Internet. The following focuses on analyzing the nature, implementation approaches, main problems and coping strategies of music education online courses. The essence of music education network courses is music network education resources. Summarized the types of information resources in music education as text, pictures, audio, video, etc., and summarized computer music education as multimedia technology and Internet technology. The way to implement music education online courses is to support the media or platforms mentioned above. He Yunfeng summarized the development of Internetbased music education online courses, including online course development, online teaching support, and online teaching management. The latter two points are both the basis for supporting student registration, teaching delivery, and teaching tracking, curriculum development and guarantee of teaching process. There are problems with the deployment, operation, and expansion of music education online courses. Especially with the continuous increase in the requirements of learners on the type and content of courses, the number of files and storage space of course resources has increased geometrically. Considering the needs of PaaS for online courses, teachers and learners need to quickly save various courseware, documents, videos, and assignments in the cloud when using online courses. However, the total number of files is large, and the Blob object that Azure has provides a large number of unstructured files, such as video, audio, and image storage services. This is one of the advantages of Azure over other PaaS products.

3 Design of Music Education Network Course Architecture Based on Cloud Computing Based on the analysis of related research status at home and abroad, based on Microsoft’s Azure public cloud service, a music education network course architecture based on PaaS has been designed. This architecture can fully take advantage of cloud computing, and has significant features such as loose coupling and easy deployment.

Design and Implementation of Music Online Network Course

823

Windows Azure completely abstracts the physical components of the system. The essence of its architecture is to build applications and data on top of Windows Azure. Users access applications and data through the network. Windows Azure supports different functional units of applications through service definition interfaces and contracts, and is independent of the hardware platform, operating system and programming language, unstructured storage that implements the service. Build an AzurePaaS-based music education network course structure, consisting of a user interface layer, a business logic layer, and a data access layer from top to bottom. The user interface layer is used to display data and receive user input data, and provides an interactive operation interface for online course teachers and learners; the business logic layer provides user registration, course release, course retrieval, online communication, resource download, course evaluation and other functions The combination and implementation of logic; the data access layer provides data encapsulation and data access interfaces for the business logic layer, realizes the storage of user data and course data, and supports database systems, binary files, text documents and XML documents.

4 Development and Testing of Music Education Network Courses Based on Azure-PaaS The process of developing a music online course application and deploying it on the PaaS platform mainly includes three stages: environment configuration, creation and testing, and Azure deployment. (1) Configure the online course development environment The configuration of the development environment includes the selection and installation of the native operating system, database, development tools, and support tools. (2) Create and test online courses Use Visual Studio .NET to build a music course website, in the New Project dialog box and expand the program code template. In this project, we choose “ASP.NET MVC Web Application” in “Web”. Select Microsoft. The .NET Framework version is “NET Framework 4.5”. After naming this web application music-course, click the “OK” button to create a program code project. After the project construction is completed, in Visual Studio. The prototype system application is executed in .NET, it is ready to be deployed to the cloud. (3) Deploy web courses to Azure First log in to the account management platform, create a cloud service, storage account, and database service to obtain the connection string of the database; then modify the project configuration file, update the local information to the cloud storage account information, and replace the Web with the database connection string of Windows Azure. The connection string is in the Config file. Upload the application package on the cloud service management page. After the upload completed, cloud

824

X. Yang

roles configured in the Azure launch package. There are production and test environments in Azure. When the platform is running normally, you can use the test environment to perform program update testing. In the Windows Azure management portal, “STATUS” shows running status, which means that the web course application is successfully deployed in Windows Azure. After the deployment is successful, the upload and download speed of the network course in different test packages is tested through the upload and download tool, and the average response time when multi-user access is tested through the simulated concurrent tool. The test items and results are shown in Table 2. The test results show that the online course can meet the usage requirements. Table 2. Network course test items and test results Serial number Test item 1 10M courseware upload speed 2 20M courseware upload speed 3 10M courseware down speed 4 20M courseware down speed 5 Response time with 100 people 6 Response time with 500 people 7 Response time with 100 0 people

Test result 42 KB/s 45 KB/s 339 KB/s 412 KB/s 100 ms 350 ms 1400 ms

5 Conclusions This paper designs and implements a music education network course based on AzurePaaS designed a music education network course architecture based on Azure-PaaS. Through the steps of configuring, creating, testing, and deploying an online course development environment to the Azure platform, the music education network course construction using cloud computing technology was realized. The advantage of this construction mode is to migrate traditional applications to the cloud, and obtain the required computing and storage resources through the network in an on-demand and easy-to-expand manner, achieving the high scalability and openness of the course. In the next step, we will use the latest research results of big data and cloud computing to conduct multi-dimensional, real-time and dynamic analysis of learner activity trajectories, discover the rules and problems in the use of course resources, and support developers of music education online courses to continuously improve their courses targeted and practical.

Design and Implementation of Music Online Network Course

825

References 1. He, Z., Yan, L., Li, H., et al.: Internet industry based on open source PaaS technology service platform automatic deployment scheme. Telecommun. Sci. (10) (2015) 2. Shen, Q., Tang, Y.: Research on Google-cloud-computing platform service framework. ECommer. Serv. (6) (2013) 3. Han, L., Li, B., Cheng, B., et al.: The establishment of information means in music education practice. Symph. (3) (2002) 4. Yunfeng. Distance education and modern distance music education. Cent. Conserv. Music. Rep. (3) (2002) 5. Liu, X.: Design and implementation of a distance education system based on open source cloud computing. China Educ. Informatiz. (9) (201l) 6. Li, G.: The development of cloud computing and its application in distance education. Tianjin TV Univ. J. (4) (2011)

Conceptual Cognition and Visual Design of Cloud Computing Products Zhang Jing(&) Modern College of Northwest University, School of Art and Design, Xi’an 710130, Shanxi, China [email protected]

Abstract. This paper studies the differences of users and designers’ cognition and expression of product concepts in cloud computing products, as well as the visual design methods. This paper introduces participatory design into experimental research, explores the differences between users and designers on the concept cognition of virtual products, analyzes the similarities and differences of concept visual expression through label classification, and seeks a concept visual design method that conforms to users’ cognitive style. This paper proposes a pad method which takes the participatory design of role interaction, label classification analysis and concept visualization design as the process model to effectively assist the concept vision expression of cloud computing products. Keywords: Cloud computing products design  Visual design method

 Concept recognition  Participatory

1 Introduction With the development of big data and cloud computing, various innovative virtual service products emerge in an endless stream. In the existing design process, the transformation of conceptual semantics and graphics is mainly done by designers independently. As the new virtual service product is highly technical and the concept is not clear, whether the designer’s personal cognitive understanding can effectively convey the product concept and achieve the user’s psychological expectations remains to be studied. In this paper, user “Participatory Design” is introduced into the process of conceptual visualization of virtual service products, and the problems of user’s receptivity and understanding, sensory experience Optimization and other issues in visual design are discussed. Through experimental research, the differences of user and designer’s cognition and expression of concept are observed and analyzed, and conceptual visual design is carried out based on the analysis results. This paper explores a visual design method of virtual service product based on the process model of multi role interactive participatory design, label classification analysis and concept visualization design [1, 2].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 826–831, 2021. https://doi.org/10.1007/978-3-030-51556-0_129

Conceptual Cognition and Visual Design

827

2 Definition and Visual Design Process of Cloud Computing Products (1) Cloud Computing and Cloud Computing Products Cloud computing is a model, which supports users to access a shared and configurable resource pool conveniently and on demand anytime, anywhere [3]. Cloud computing product is a kind of IT service product which is supported by cloud computing technology and provides dynamic, virtualized and scalable computing capability services, storage services and platform services through the network according to user needs [4]. This kind of technology driven virtual service products are highly professional, complex and obscure in concept, which is often difficult for users to understand. (2) Visual Design Process of Cloud Computing Products Because the concept of cloud computing product is difficult to understand, the visual design of it becomes an important part of concept communication. Compared with traditional products, the visual design process of cloud computing products increases the research stage of the product itself, focusing on the analysis of product characteristics and the definition of design requirements. Because of the complexity of products, visual designers need to grasp the concept of products, clarify their functional characteristics, technical principles and application situations, and define the design requirements according to the characteristics of products, which mainly includes the grasp of product types and design forms and the analysis of users’ cognitive needs. The lack of product technical knowledge and the lack of understanding of users’ cognitive needs are the main problems faced by designers in dealing with visual design of cloud computing products, which is mainly reflected in how to present complex concepts of products in a way that users can understand. Designers extract key words from concepts, and then transform them into graphic elements. Designers need to constantly adjust according to the feedback of online test, and the design cycle is too long. In addition, due to the variety of cloud computing product types and complex functional characteristics, there is a lack of unified and effective forms of expression, which requires specific design for specific products, and the judgment of design results is also lack of basis. In the design process, it is necessary to introduce users’ cognitive needs and grasp the direction of visual design from the perspective of users.

3 Experimental Research on User Participation Design (1) Participatory Design Research Any effective information dissemination and information service should be usercentered and stimulate users’ awareness of active participation and the ability to adopt and absorb new information [3]. Michael gekker summarized and sorted out 12 common user centered design methods. It can be divided into two categories.

828

Z. Jing

1) Indirect access to user needs, using competitive analysis, field research and other methods. These methods are through the collection of user behavior data, using the way of thinking transposition to analyze and then integrate into the design process [5]. As the object of study, users have weak participation. 2) Directly obtain user needs, using questionnaire, interview, participatory design and other methods. Among them, participatory design requires users to participate in the prototype design within the scope of the task, express their creative ideas openly, and obtain users’ real needs and product awareness through good communication and observation.

(2) Purpose and Design of Participatory Design Experiment In order to grasp the user’s concept awareness of cloud computing products, this paper takes Alibaba cloud’s newly developed cloud computing product “SLB” as the design object, invites designers and users to participate in the visual design of the concept, discusses the differences between the two in the concept awareness and expression of cloud computing products, helps designers grasp the user’s cognitive needs and find effective visual design Method. The experimental process model is shown in Fig. 1.

high fidelity

"1 + 1" pairing

Concept visualization design

Low fidelity

Creative description and sharing

Label classification analysis

Sketch rendering

5 designers and 5 users

Participatory design of role interaction

Label classification

Concept description graph selection graph description

Subjects selection

After experiment

Label consolidation

Experimental questionnaire design

In experimenting

Common ground extraction

Before experiment

Fig. 1. Experiment process

Server load balancer refers to a load balancing service that distributes traffic to multiple cloud servers. Participants were required to carry out visual design based on product concept, mainly represented by sketch. In the experiment, five webmasters were selected as participants. At the same time, 5 designers who have no experience in visual design of cloud computing products are invited as reference groups. In addition, the product manager is the host of the experiment, who is responsible for guiding, observing and recording the experiment process. The first stage is concept description, in which the subjects express the concept graphically and explain the understanding and thinking process of the concept verbally, mainly collecting the concept cognition and expression information of users and designers respectively; the second stage is the

Conceptual Cognition and Visual Design

829

interactive participation of multi role objects, adopting the organizational form of pairing cooperation, users express the concept cognition, designers assist the visual expression, and hosts successively participate The cognitive process of the two groups was observed and recorded. (3) Participatory Design Experiment Process In the first stage, the concept description lasted for 20 min, adopting the “fingertip agitation method” of Harada Jin, i.e. in a certain period of time, keep drawing ideas on paper. The two groups describe the concept independently, and explain the process of understanding, thinking and expression of the concept orally. Users generally extract key semantic words and express them through common association, such as association of extracted semantic words “distribution diffusion” to “trunk and branch”, “biological cell”, etc. It is very difficult to translate these semantic words into visual expression. Designers often use related adjectives to refer to product concepts and use related semantics to express them. The second stage is “1 + 1” pairing cooperation experiment, the time limit is 30 min. First, the user explains the cognitive and thinking process of the concept to the designer, then the designer uses graphic elements to describe the concept, and the user evaluates the expression results and iterates repeatedly to obtain accurate expression. In the interactive process, designers show users words or pictures related to concept points to stimulate vision and stimulate thinking expansion. In visual representation, users generally tend to let designers draw illustrative illustrations with lines, frames and other elements. (4) Analysis of Experimental Results At the end of the experiment, 5 sets of effective sample materials of a (designer) and B (user) were obtained. From the clustering results, the expression forms can be divided into three main categories: reticular structure, radial structure and concrete object type. Among them, there are two reticular structure types, most of which are represented by abstract graphic elements; while there are four concrete object types, most of which are represented by users, and most of which are represented by real object elements. The differences between designers and users are mainly reflected in the whole and part. 1) Overall. The result of designer’s design mostly presents the network structure and radial structure, vivid and complete. The output result of the user is similar to the product description chart, and the picture is relatively rigorous. 2) Local. Users tend to associate abstract words with concrete objects close to life, or associate them with similar objects based on structured personal knowledge, and then express them visually. Designers usually use relevance semantics to describe. The experimental results show that designers often adopt the way of synonymous transformation to recognize the concept of new products. The results presented are abstract, thinking jumping, divergent and more perceptual. However, users generally simplify the complex concepts through common association, and the concept expression comes from life experience. The logical reasoning chain is shorter and more direct than the designer’s thinking. Designers should pay attention to the user’s experience

830

Z. Jing

and inertia thinking, avoid long-term reasoning and association, and adopt more direct and visualized elements to express the concept of such technical products. According to the experimental results, this paper proposes a pad visual design method of cloud computing products with participatory design as the core.

4 Pad Visual Design Method Combined with the participatory design experiment, through the interaction of multi role objects, the divergent thinking of designers can make up for the lack of user association transformation, and the user’s concrete expression of abstract concepts well reflects the experience mapping, which provides a good guidance for visual expression, and effectively avoids the failure of information capture due to the implicit thinking of users. In addition, the product manager participated in each group of communication as a coordinator, and sorted out the thinking and expression differences between users and designers through label classification analysis. From the perspective of visual design, it combines synonymous transformation and common association. Cognitive mode, through the means of generalization, simplification or exaggeration, extracts and refines the image of the characteristics of things, and makes a reasonable layout of visual elements such as shape, color and line in the aspects of symmetry and balance, contrast and harmony, rhythm and rhythm. Finally, the concept map of “SLB of load balancing” on the product details page of Alibaba cloud official website is designed under the guidance of pad method. Based on the process and results of the experimental study, the paper proposes a design method of process model, which is called pad visual design method for short, in three progressive stages of role interactive participatory design.

5 Conclusion In order to study the differences between users and designers on the concept cognition and expression of cloud computing products, we seek a product concept visual design method that conforms to the user’s cognitive style. By introducing participatory design into experimental research, this paper explores a pad method based on multi role interactive participatory design, combined with label classification analysis and concept visualization design, which can effectively promote design communication among members of the team, make concept expression more suitable for user expectations, and provide a design method worthy of reference for the concept vision design of cloud computing products.

Conceptual Cognition and Visual Design

831

References 1. Liu, J.: Analysis on the influencing factors of small and medium-sized enterprises’ willingness to adopt cloud computing products. Hubei University, Wuhan (2014) 2. Song, X., Wang, P.: Research on the concept and influencing factors of information adoption behavior. Inf. Sci. 28(5), 760–767 (2010) 3. Gao, D., Chen, M.: Agile design supported by user perception. Packag. Eng. 35(10), 65–68 (2014) 4. Yuan, X., he, R.: Study on design solidifying effect of case reflection in concept generation. Packag. Eng. 36(6), 92–95 (2015) 5. Harada, J.: Design brand. Jiangsu Art Press, Nanjing (2009)

The Application Status and Integration Strategies of Digital Learning Apps for College Students Jianwu He(&) Educational Science School of Xianyang Normal University, Xianyang 712000, Shaanxi, China [email protected]

Abstract. With the development of mobile Internet, mobile learning tools such as smart phones have been popularized, mobile learning has become a hot topic in education circles. Digital learning APP has become an important way for mobile learning, and also an effective means of extracurricular learning for students. College students have been selected as representative study objects since they do autonomous learning and utilize APP more often. It mainly uses questionnaires and interviews to investigate the Applying, learning behavior and using effect of digital learning APP among college students. It also puts forward some suggestions on the Application, design and development and management of digital learning APP for college students. Keywords: College students Integration strategies

 Digital learning  APP  Investigation 

1 Introduction With the rapid development of information technology, smart phones, tablet computers and other mobile devices have become the main tools for people to work, study and communicate. Innovating the organizational form of education, enriching modern learning methods, and accelerating the construction of a learning society [1]. As an important learning tool for students, intelligent devices need various App Applications as carriers to transmit information. Learning App can integrate various subject knowledge and resources. It presents educational resources in the form of text, audio, video, pictures and other multimedia, providing students with a good learning platform and interactive communication space [2]. In December 2018, the Ministry of Education issued the guiding opinions on strengthening the construction and Application of online learning space. By 2022, for all kinds of education at all levels, all teachers and school-age students, we will comprehensively popularize the green, safe, manageable, functional and distinctive real name space. Make the space become the main entrance of all kinds of schools, all teachers and school-age students’ education information Application, and realize “one person one space, everyone uses space” [3]. Students are mainly affected by advertising, self-Media marketing and so on, which impact on the school education system. © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 832–837, 2021. https://doi.org/10.1007/978-3-030-51556-0_130

The Application Status and Integration Strategies

833

It is representative to understand the Application of digital learning App in college students. By investigating the use of digital App of college students, we can find the existing problems. Put forward suggestions for the design and development of learning App, help the developers of learning App to develop products that are really helpful to learners and can promote learning [4].

2 Design and Implementation of the Study The researchers mainly used the method of questionnaire and interview. The questionnaire is divided into basic information, the use of digital learning App, the learning behavior of digital learning App and the effect of digital learning App. This survey is mainly carried out in the form of on-the-spot questionnaire in 8 colleges and universities in Shaanxi, including one, two, three and higher vocational colleges. The factors such as school category, subject, grade and gender are taken into account in the selection of respondents. A total of 300 questionnaires were sent out, 296 were recovered, the recovery rate was 98.7%, 286 were effective questionnaires, the effective rate was 96.6%. The statistical data were processed by Excel and SPSS.

3 Survey Content and Results A survey of the types of e-learning Apps is shown in Fig. 1. The number of college students using reading/information digital learning App is the largest, accounting for 24.53%, and the number of students using online course learning App is similar to the former, accounting for 23.06% of the total. 21.8% of the learners chose language vocabulary, 18.66% chose electronic notes. In addition, the least number of users is tool learning App, which only contains 9.85%, and 2.1% will choose other types of learning App. Through interviews, they said that they would choose the App suitable for them according to their own interests and learning majors. Students majoring in Arts prefer to learn Apps in the language/vocabulary category. After class, students will practice their oral English, read books at home and abroad, and increase their knowledge; students majoring in science will prefer to learn Apps with professional skills, learn theoretical knowledge, and complete practical operations.

Fig. 1. Types of digital learning App frequently used by college students

834

J. He

At present, the media of digital App mainly include smart phones (or tablets), laptops, desktops, etc. According to statistics, 57.69% of them use smart phones (or tablets) to learn. Secondly, notebook computers account for 33.57%, and the number of people who use desktop computers to learn accounts for at least 5.59%. The portability of smart phones (or tablets) greatly improves their utilization rate. Users can listen to pure English pronunciation at any time by using mobile phones, computers, tablets and other resources as long as they have the Internet or download the content in advance. Watch the teaching videos of relevant contents of other schools and browse the latest news at home and abroad in real time, which greatly reduces the time for college students to get the latest information [5]. For the learning App, 40.91% of them use the App within 5 h a week, and 31.12% of them use the App within 1 h. While 18.88% of the students used it within 10 h, and 9.09% of the students used it more than 10 h. Through face-to-face conversation with some learners, most of the time of learning with App will be concentrated in the morning and evening, and the language/vocabulary learning App will be used in the morning. In the evening, use the App in the dormitory or library that suits your specialty or interest. It can be seen that the use of digital learning App for college students has accounted for a large part in mobile learning. Most college students regard App learning as a micro learning method, and generally use fragmented time to study for a period of time [6]. Whether college students are willing to choose paid learning App is shown in Fig. 2. 56.29% of college students think that “if the learning content is useful to them, they will choose to pay”, and about 15.03% of them are unconditionally “willing”. However, 28.67% of college students choose not to pay for digital learning App. Through interviews, we know that college students do not exclude paying for high-quality content, and are willing to pay high prices for high-quality content. The essence of knowledge payment is that users can obtain the best quality information in the fastest time by paying to professional teams, which means people’s desire for highquality content and respect for knowledge [7].

Fig. 2. Payment for digital learning App by college students

Fig. 3. Improvement of learning ability of college students using digital learning App

The Application Status and Integration Strategies

835

On the contrary, some learners will not pay for learning Apps. Some of them only accept classroom teaching, while some think that practice is the most important thing in University and they will not invest in theoretical knowledge learning. In a word, the cost is not the main obstacle of learning by using App, but it will affect college students’ choice of App. The most popular form of learning resources is video/micro class, PPT, audio courseware and other resources. College Students’ understanding of the learning function of digital learning App mainly lists the value, participation, independent exploration, social interaction and so on. The results show that 43.01% of the learners in this questionnaire think that the content value is the most helpful to their own learning and can carry out targeted learning. 33.22% of the learners think that participation is of great help to their learning, and the proportion of self exploration and social interaction is 15.73% and 8.04% respectively. When college students choose digital learning App, they first consider the value of learning content, including professional knowledge, skill knowledge, extracurricular knowledge, etc. In terms of participation in cooperation, college students can learn independently and cooperatively through intelligent devices, such as participating in knowledge search and sharing knowledge with others, group communication and discussion, etc. In the aspect of active exploration, digital learning App has changed the learning mode of school education, which is mainly taught by teachers. It can meet the learners’ independent learning and select the learning content they need. The statistical data about the improvement of learning ability of college students after using digital learning App are shown in Fig. 3. Key university, Normal university, College and higher vocational students have a large proportion of improving their learning ability of using digital learning App, which are 2.67%, 6.76%, 5.80% and 11.76% respectively. There was a certain increase of 84%, 78.38%, 88.41% and 54.41% respectively. No increase was 13.33%, 14.86%, 5.8% and 33.82% respectively. On the whole, college students hold a positive attitude towards the improvement of learning ability of App. The statistical data of Key university, Normal university and College were tested by x2. Results x2 = 4.689 < X2 (4) 0.05 = 9.49 (P > 0.05). It shows that the recognition degree of undergraduate students on the improvement of learning ability using App is basically the same. However, the data of undergraduate and higher vocational students were tested by x2 test. The results showed that x2 = 28.162 > X2 (6) 0.01 = 16.81 (P  0. 01), the difference was very significant. It shows that the recognition degree of higher vocational students to improve the learning ability of App is the lowest, which reflects the phenomenon that the foundation of higher vocational students is poor, and the autonomous learning ability is generally low.

836

J. He

When using App for learning, it is also an effective means to help learners to complete tasks through App automatic recording, monitoring, reminding and other functions. The survey data is shown in Fig. 4. Most students want to remind themselves to complete the learning task through this function. 40.9% of the students think that the proportion of

Fig. 4. Requirements for assessment function of digital learning App

“App often prompts the gap with other learners”, “learning on time and clock in” and “not entering the App learning system reminder” is about 25%. At the same time, 9.4% of the students are willing to “pay a certain amount of deposit in advance”, and agree that if the learning task is completed, the system will refund the money.

4 Research Conclusions and Suggestions First, establish a proprietary platform to integrate all kinds of learning applications. To establish a special website or application program, users can quickly locate education applications that meet users’ needs according to different ages, disciplines and other information. Secondly, develop and optimize the educational function of digital learning application. At present, all kinds of learning applications only focus on resource development and online evaluation, and should be further optimized in terms of real-time communication and formative evaluation of applications. Last, realize the integration of digital learning application and school education system, and truly realize the integration of online education and offline Education. Acknowledgements. The “12th Five Year Plan” of education science of Shaanxi Province “Research on the Educational Guidance of New Media to Teenagers and the Application of Digital Campus Innovation” in 2014 (subject No: SGH140803); the key research project of Xianyang Normal University “Reform and Research on the Educational Technology Application Talents Training Mode Guided by the Service of Basic Education” (Project No: 2017Z019).

The Application Status and Integration Strategies

837

References 1. Guidance on promoting healthy development of online education (GF [2019] No. 11) [EB/OL]. http://www.moe.gov.cn 2. Li, L.: Research on the Application of education App in College Curriculum Teaching. Bohai University (2017) 3. Ministry of Education issued guidance on strengthening the construction and Application of online learning space (JJ [2018] No. 16) [EB/OL]. http://www.moe.gov.cn 4. Wei, Y.: Research on Education App in College Students’ Informal Learning. Guangxi Normal University (2016) 5. Wei, S.: Survey and analysis of the current situation of the use of mobile learning App for College Students—Taking Suqian College as an example. Meihe Times (City Edition) (2), 111–112 (2017) 6. Li, S.: Application Status and Demand Analysis of Chinese Interactive Learning App Based on Smart Phones. Shanghai Foreign Studies University (2017) 7. Zhao, B., Yao, Y.Y.: Study on the influencing factors of users’ willingness to continue to use knowledge payment App. Library Sci. Res. (17), 96–101 (2017)

Computer Aided Design of Modern Decorative Pattern Zhong Jiao(&) Jiangxi Normal University Science and Technology College, Nanchang 332700, Jiangxi, China [email protected]

Abstract. Based on the analysis and research of the design process of paper-cut pattern, this paper applies the evolutionary computing technology to the design process, puts forward a new method of computer-aided generation of paper-cut shape, and establishes an intelligent CAD system of paper-cut pattern, which provides a support platform for designers to develop ideas and improve efficiency. In this paper, evolutionary design is introduced into Computer-Aided Creative Design of paper-cut pattern, and an intelligent creative CAD system of paper-cut pattern is realized. Keywords: Modern decoration

 Computer-aided  Pattern design

1 Introduction Chinese paper cutting has a long history. It has been 2000 years [1]. It is the cultural crystallization created by the working people through the accumulation of generations. It is the product of thousands of years of history of the Chinese nation. Traditional papercut is a kind of local art, rooted in the folk, which is created by the working people to meet their material and spiritual needs. She is not only the appreciation of beauty, but also the embodiment of Chinese folk culture. Paper cutting comes from life, attached to life and enriches life. In modern society, paper-cut still represents auspiciousness and festivity. It integrates practicality and aesthetics, and integrates appreciation and entertainment. With the dramatic change of life, the modern characteristics of paper-cut are more and more obvious. As one of the basic activities of improving living conditions, the essence of design is innovation. Product innovation is an important component of enterprise production process in market economy. It is a process to achieve enterprise management objectives and create products with market competitive advantages [2, 3].

2 Implementation Technology of the System The modeling technology of product information model is the core of CAD system, which is about the abstract description and expression of design objects [4–6]. In the conceptual design stage, product information modeling is divided into geometric information modeling and functional information modeling according to the types of information describing the product. Geometry oriented information model is mainly © Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 838–843, 2021. https://doi.org/10.1007/978-3-030-51556-0_131

Computer Aided Design of Modern Decorative Pattern

839

represented by lines, frames, faces, entities and hybrid models. It focuses on the complete and clear geometry data of products, which is the core foundation of CAD system. However, this kind of model can’t express non geometric information such as function, layout, principle, user demand, designer style, material, etc., and can’t support abstract and complex conceptual design solution process. ACIS is a 3D geometric modeling engine launched by spatial technology company of the United States. Its features include: ① Using object-oriented data structure, the whole content is written by C++ language, which is composed of a series of C++ classes and functions. When developing their own application system, programmers can obtain powerful geometric modeling functions by calling these classes and functions. ② It provides a unified data structure, supports wireframe, surface and solid models and allows them to coexist. ③ ACIS is a geometric modeler represented by a boundary, which is composed of a set of closed faces, which divides ACIS entities from the outer space. ④ In addition to flow patterns, ACIS also supports the representation of non flow geometry, which is extremely important for the representation of special geometric topologies such as overhanging edges and surfaces. (1) ACIS development interface As shown in Fig. 1, there are three development interfaces based on ACIS: API functions, C++ classes and di functions. AMFC in the figure is the interface with MFC specially provided for Microsoft Windows platform.

ApplicaƟon API DI

API DI

API DI

API DI

Classes

Classes

Classes

Classes

AMFC assembly

Assembly

Assembly

...

opƟonal assembly

MFC

Fig. 1. Interface between C++ application and ACIS

① API functions. API functions provide the main interface between application and ACIS. The application creates, modifies or recovers data by calling API functions. No matter how the underlying data structure or function of ACIS is modified, these functions remain unchanged in each version. ② Class. Class is a development interface provided by ACIS in the form of C++ class, which can be used to define the geometry, topology and other functions of the model. In application, ACIS can interact directly with the class’s public data members, protected data members and member functions. Developers can also derive their own application classes from ACIS classes according to their special needs. The class interface may change in different versions.

840

Z. Jiao

③ Di function. Di functions provide an API independent interface directly accessible to ACIS modeling functions. Unlike API, these functions may change in different versions. Di functions cannot access all the functions in ACIS. They are usually used for operations that do not change the model, such as queries. (2) Main features The open architecture based on software component technology is an important feature of ACIS. Its main features are as follows: ① Open architecture based on components. By adopting software component technology, different users and applications can adopt different component combinations, and developers can also replace ACIS components with their own developed components. ACIS C++ library is composed of 35 DLLs, which provides great flexibility and functional basis for developers to develop 3D applications. Developers can quickly integrate the new version of ACIS into products. ② Geometric bus of ACIS. ACIS’s open architecture and its sat constitute the ACIS geometric bus. ACIS geometric bus enables the data of geometric and topological models of wireframe, surface and entity to be freely exchanged. From conceptual design to manufacturing process, the product model may use the application provided by multiple businesses. Through the geometric bus, it gets rid of the burden of data translation and does not need to do any work for model interoperability, which is unimaginable in the closed system. ③ Powerful component functions. ACIS not only provides various powerful builtin components in its ACIS 3D toolkit, but also provides optional husks Optional components to meet higher-level requirements are provided in, including advanced transition, advanced rendering, deformable surface, patching, mesh surface, local modification, accurate blanking, shell extraction and other components. In addition, there are many third-party developed components, which can also be embedded in ACIS based applications. (3) Component structure The system component structure is based on the analysis of the system functional requirements and the overall framework structure. In order to facilitate the centralized management and calling system of components, the hierarchical structure is adopted, which is mainly divided into three layers: core component, functional component and interface component. The upper component can call all services provided by the lower component arbitrarily. Core component layer: this layer contains the most important and basic components of the system, and is the shared part of three-dimensional feature modeling, two-dimensional associated drawing, component assembly, dynamic simulation and other modules. Functional component layer: This layer is built on the core layer, and the main application-oriented functional components of the system are implemented in this layer. Users will want to configure different functional software systems according to their different requirements. Interface component layer: it is the highest level of the system, and also the component layer that directly carries out interactive operation management with users. MT of mouse tool and the components of dialog, menu, toolbar and other resources involved in the management system interface. This component design

Computer Aided Design of Modern Decorative Pattern

841

structure not only greatly facilitates the configuration of systems with different user requirements, but also separates the user interface and the specific implementation of functions of the system. (4) Geometry and topology The ACIS model is composed of geometry, topology and attributes, which are derived from the most basic abstract class entity. Although entity itself does not represent any object, the data and methods that all its subclasses should have are defined in entity. ACIS topology includes body, block, shell, sub shell, face, ring, wireframe, common edge, edge and vertex. ACIS stores wireframes, surfaces and entities in a unified data structure.

3 Overall Design of the System The intelligent paper-cut pattern CAD system is divided into four modules: intelligent pattern generation module, manual modification module and user management module. The functions of each part are as follows: (1) Intelligent pattern generation module. The main function is to import the existing pattern pictures, obtain the edge curve of the pattern, generate the parent individual, carry out crossover and mutation genetic operation, generate the paper-cut pattern, and save it in the pattern database by setting the type, length, width and genetic parameters of the pattern. (2) Automatic assembly module. The main function of this module is to assemble the required patterns according to the designer’s intention, and to manage and backstage the patterns accordingly. For this part of the work, read the patterns stored in different pattern databases to the same view, select different assembly methods, so that the designer can make reasonable configuration according to the needs, and at the same time use genetic algorithm to optimize the combination, automatically generate rich and colorful paper-cut patterns, and view the whole pattern at any time in the design process. (3) Manual modification module. After the paper-cut pattern is assembled and generated, if the generated result meets the requirements of the designer. Otherwise, in the manual modification module, you can modify the pattern by copying, deleting, moving, rotating, zooming and other operations for individual patterns. (4) User management module. The module provides management functions such as user creation, modification, deletion and permission setting. The system sets two levels of management permissions for system administrator and designer. The specific design operation is completed by the designer.

842

Z. Jiao

4 Design Steps and Examples Because this system is mainly for the conceptual design stage of paper-cut patterns, the overall design steps are as follows: Step 1: extract the boundary points of existing patterns, generate the initial population, and obtain a large number of patterns through genetic operation. Step 2: select patterns according to the designer’s intention to assemble. Step 3: view the whole, If it fails to meet the requirements of the designer, it shall be saved after manual modification. Figure 2 shows the interface of each design module and the rich and colorful papercut patterns generated by the system.

Fig. 2. Pattern design CAD system interface and system generated pattern

5 Conclusion Paper cut pattern design has always been one of the art design themes that people pay close attention to. Because of its variety, different forms and high adaptability, it is widely used in various decoration fields. According to the development of evolutionary computation and innovative conceptual design and the analysis and Research on the process of paper-cut pattern design, this paper discusses the method of conceptual design of paper-cut pattern based on evolutionary computation technology, which generates paper-cut pattern by evolutionary design method, and generates pattern assembly scheme by product feature tree and genetic algorithm, thus providing support for designers to develop ideas and improve efficiency Support platform.

Computer Aided Design of Modern Decorative Pattern

843

References 1. Yunhe, P., Shouqian, S., Enwei, B.: Development and trend of computer aided industrial design technology. J. Comput. Aided Des. Graph. 11(4), 249 (1999) 2. Hong, L., Xiyu, L., Lina, M.: Computer aided design environment supporting evolution. J. Comput. Aided Des. Graph. 15(2), 167–173 (2003) 3. Qi, H., Shouqian, S., Lisan, Z.: Research on 3D sketch design technology for product innovation. Comput. Integr. Manuf. Syst. (2), 224–227 (2007) 4. Peien, F., Yong, C., Shuai, Z., et al.: Conceptual design based on product gene. J. Mech. Eng. 38(10), 1–6 (2002) 5. Fenggao, L.: Paper Cutting Art at Home and Abroad. Liaoning Art Press, Shenyang (2000) 6. Xianquan, Z., Jinhui, Yu., Linglin, J., et al.: Pattern based computer paper cutting system. Comput. Eng. 32(11), 248–250 (2006)

The Computer-Aided Design of Miao Costume Patterns Based on Big Data Gao Tao1,2(&) 1

2

Faculty of Decorative Arts, Silpakorn University, Bangkok, Thailand [email protected] Jiangxi Normal University Science and Technology College, Nanchang, China

Abstract. Miao Huamao is well-known both at home and abroad. It is rich in varieties, patterns and embroidery techniques. Through the analysis and research of Miao Flower Hat, the paper studies the composition law of Miao Flower Hat, analyzes the characteristics of basic pattern, studies the key technology of computer-aided modeling of Miao Flower Hat pattern, seeks the application method of computer-aided design in the traditional pattern drawing of national costume, so as to realize the application exploration of computer-aided design in the design of national costume. Keywords: Big data

 Miao clothing  Pattern  Computer aided

1 Introduction Miao nationality is one of the oldest ethnic groups in China. It is also ethnic group with a large population and numerous branches. Miao costumes and patterns have developed together. Miao women use patterns to record the whole contents of Miao people’s cultural features and production work, reflecting the thick historical and cultural accumulation of Miao people, forming a living fossil in the history of Chinese costumes. The ever-changing patterns and patterns are not only the modern continuation of the Miao nationality’s strong customs and traditions, but also the Miao women’s strong national consciousness and yearning for a better life, which fully demonstrates the Miao people’s high wisdom and extraordinary creativity [1, 2]. Miao traditional clothing patterns still remain in Miao daily clothing. The earliest traditional clothing patterns are drawn by Miao old people as a part of cultural heritage. Traditional art patterns often contain the deepest roots of traditional culture, and retain the formation of the original state of the national culture and the unique way of thinking. They have high aesthetic, cultural, and application values. With the increasing attention of the world to the protection of traditional cultural heritage, more and more attention has been paid to the protection of traditional art patterns, especially to the research of digital modeling [3].

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 844–849, 2021. https://doi.org/10.1007/978-3-030-51556-0_132

The Computer-Aided Design of Miao Costume Patterns

845

2 Introduction to Related Algorithms 2.1

Bézier Curve

Bézier curve is the Bezier curve [2, 4]. It is a smooth curve drawn according to the coordinates of four arbitrary points. In this paper, de Casteljau subdivision Bézier curve algorithm is used. Let P0, P20 and P2 be three different points in order on a parabola. If the two tangents passing through P0 and P2 intersect at P1, and the tangents passing through P20 intersect at P0P1 and P2P1 at P10 and P11 , then the following proportion holds: P0 P10 P1 P11 P10 P20 ¼ ¼ P10 P1 P11 P2 P20 P11 This is the so-called three tangent theorem of parabola. When P0 and P2 are fixed, the parameter t is introduced to make the ratio t: (1 − t), namely:

2.2

P10 ¼ ð1  tÞP0 þ tP1

ð1Þ

P11 ¼ ð1  tÞP1 þ tP2

ð2Þ

P20 ¼ ð1  tÞP10 þ tP11

ð3Þ

Image Rotation Algorithm

Image rotation refers to the process that an image rotates a certain angle with a certain point as the center to form a new image. Of course, this point is usually the center of the image. Since you rotate according to the center, there is a natural attribute: the position of the point before and after rotation from the center does not change. 2.3

Algorithm of Image Horizontal Mirror Transformation

Mirror transform refers to turning the image of the specified area left and right to display on the screen. By analyzing the process of image transformation, it can be found that the processing method of image information in each row is the same, and the row order does not change, but the pixel information in each row is reversed from left to right, thus realizing image transformation. Therefore, the image is mirrored by line point by point transformation. The coordinate transformation formula of the new coordinate (x1, y1) after mirror transformation of any point (x, y) in the original drawing is given: x1 ¼ width  x  1 y1 ¼ y

846

G. Tao

According to the above formula, after calculating the new coordinates for each pixel point, the pixel value in the original image is read into the (x1, y1) point of the new buffer.

3 Pattern Drawing Process The pattern of flower cap is composed of one basic pattern, which is composed of lines with clear outline. According to the composition law of the flower hat, we need to consider several issues in the process of drawing: how to store the drawn pattern; whether to draw the pattern as a whole or to draw it by decomposition; how to get the complete pattern if we use decomposition drawing Because the pattern of the flower cap is mainly symmetrical, each complex pattern can be regarded as a combination of one basic pattern. The basic pattern is composed of smooth curves with clear outlines, and the curve is composed of several points. Of course, if every point is described one by one, the workload will be very large. Therefore, in the process of computer-aided pattern drawing, the idea of this paper is: first, decompose the original pattern, decompose the pattern into basic patterns, draw each basic pattern separately; further decompose each basic pattern, get the pattern curve, and use the Bézier curve correlation algorithm to achieve the pattern curve drawing; Then the basic pattern is formed by the combination of the pattern curve through mirror image, rotation, synthesis and other methods; finally, the complete pattern is formed by the combination of the basic pattern. Generally speaking, it is the drawing method of “opening and closing, forming lines with points, lines and pictures”. Figure 1 shows the basic pattern drawing process. Calculate curve related point information

Drawing Bézier curve

Draw basic pattern

Fig. 1. Basic pattern drawing process

The idea of pattern drawing in this paper can be summarized as: decomposition drawing synthesis. The process is also represented by point drawing line and line construction surface, as shown in Fig. 2. decompose Pattern design

Synthesis Draw basic pattern

Draw pattern

Drawing Bézier curve

Calculate curve related point information

Fig. 2. Drawing process of pattern

The Computer-Aided Design of Miao Costume Patterns

847

4 Pattern Drawing Legend In this paper, windows is used as the running platform of the system, and Visual C is used as the development tool to achieve the basic pattern drawing. Based on Bézier curve, the structure of the system is shown in Fig. 3. Basic pattern drawing Pattern drawing

Pattern mirror image Pattern rotation

Pattern display Pattern synthesis

Bézier curve pattern drawing Pattern output Pattern introduction

Pattern preservation Pattern printing

Fig. 3. System structure

The window structure of pattern curve drawing is shown in Fig. 4. The left side is the pattern Title pane, and the right side is the pattern display pane.

Fig. 4. Pattern drawing window structure

Fig. 5. Basic pattern

848

G. Tao

After further decomposing the basic pattern shown in Fig. 5, the composition curve is obtained, and each curve is drawn by de Casteljau algorithm. After combining, the basic pattern of the left half of the pattern is obtained (Fig. 6). The image rotation algorithm and image algorithm are used to rotate and image transform the above patterns to obtain the horizontal image pattern and the pattern with any rotation angle, so as to prepare for the later synthesis process.

Fig. 6. Basic pattern

Image synthesis is to generate a new image with two image information by calculating the pixel values of two images, which is widely used in image processing programming. Image synthesis can be realized by writing screen directly. In this paper, image synthesis is realized by modifying data buffer directly. Finally, through the synthesis of the basic pattern, we get the pattern of the flower cap.

5 Conclusions This paper first introduces the composition rules of Miao Huamao, and then puts forward the drawing ideas of “opening and closing, line by point, line and picture by picture”, and further demonstrates the method with examples, which shows the technical feasibility of using Bézier curve to draw Miao Huamao pattern. This paper studies the drawing method of Miao Huamao pattern, which is helpful to inherit and carry forward the traditional culture. The creation of Huamao pattern has a wide application prospect in tourism product development, book binding, interior design, architectural decoration, clothing design, decoration design, electronic greeting card, pattern teaching and other fields.

The Computer-Aided Design of Miao Costume Patterns

849

References 1. Xu, L.: Study on Miao traditional clothing patterns. Shandong Textile Economy (09), 31–34 (2019) 2. Fu, Q.: Research and application of Miao pattern in wedding gift packaging design. Xi’an University of Technology, 2019 3. Yu, X., Chen, X., Huang, C., Huang, Y.: Study on inheritance and fashion application of Miao pattern. Prog. Textile Technol. (06), 46–49, 62 (2019) 4. Yang, S.: Study on decoration and aesthetics of Miao traditional patterns in Eastern dialect area. Southwest University, 2018

Portable Article Management System Based on Wireless Sensing Technology Bo Zhao1,2(&), Zhiguo Yan2, Jia Yang3, and Cheng Cheng2 1

3

School of Communication and Information Engineering, Shanghai University, Shanghai, China [email protected] 2 The Third Research Institute of the Ministry of Public Security, Shanghai, China Xinjiang Zhicheng Tianlin Information Technology Co., Ltd., Shanghai, China

Abstract. With the acceleration of information and the rapid development of economy,the management of various industries in the society will tend to be intelligent, information and standardization. There are many fields, that are video surveillance telectronics, wireless communications, optics, imaging, voice and so on have different equipment. The equipment, which is especially for the work with special needs, needs necessary to closely and accurately monitor. Keywords: Wireless sensing technology

 Management system

1 Introduction The current status of equipment management like this: Manual recording and archiving of basic equipment and related information, and archiving of archives, and the archives are largely unmaintained afterwards. The information of the equipment, that include the location changes of equipment, location changes, equipment maintenance, and current operating status. Theses would not be reflected at all, equipment tracking information cannot be reflected in the equipment file in a timely manner. In addition, although some equipment management systems can reflect part of the equipment’s tracking information in the equipment file, the information is still at a low level. Taking the public security system as an example, the construction of public installations has always been the focus of public security work. The number of public installations is gradually reduced, the types are gradually complete, the technology is simple to complex, and the number of high-end equipment is gradually increasing. Divided into mandatory equipment and optional equipment according to the needs of police work. Therefore, according to the types, use conditions, and management status of special equipment, wireless sensor technology is used to develop an efficient and precise special equipment management intelligent system.

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 850–853, 2021. https://doi.org/10.1007/978-3-030-51556-0_133

Portable Article Management System Based on Wireless Sensing Technology

851

2 The Overview 2.1

Special Equipment Management Status

During the investigation of the current use of various types of equipment, it was found that the following problems were encountered in current equipment management. At this stage, some companies, factories, etc. use bar code technology-based systems to manage special equipment [1, 2]. This type of system is poorly automated and requires a lot of manual participation in the process. The content of manual registration cannot truly reflect the equipment brought out by the staff. At the same time, the system cannot give rich statistical output, and it cannot give guidance on the original basis for the purchase of equipment. Therefore, it is necessary to improve the efficiency of material and equipment management, reduce the investment of manpower and material resources in management, and at the same time implement strict dynamic supervision and precise management of special equipment. The material management mobile black box based on wireless sensing D technology can fulfill the appeal requirements, and is compatible with barcode technology to solve the problems encountered in current equipment management. Equipped with corresponding equipment management system software to complete.

3 Special Equipment Management Intelligent Monitoring System Design 3.1

An Overview of the System

In this paper, the basic working principle of the intelligent monitoring system is that the staff removes the equipment from the common equipment storage cabinet in the equipment management room and places it in a dedicated intelligent monitoring box, and then puts the dedicated intelligent monitoring box through the UHF band RFID monitoring base station and UHF-band RFID monitoring base station at the gate of the building [3, 4]. In this process, the RFID tag information on the device is written to the UHF tag embedded in the dedicated smart monitoring box (the tag can be used by the device to manage the UHF band of the door of the room at a long distance. Read by the RFID monitoring base station. The UHF band RFID monitoring base station of the equipment management room door and the UHF band RFID monitoring base station of the building gate can monitor the information that can be transmitted to the equipment intelligent management system central server of the central information control room. The operating schematic is shown in Fig. 1.

852

B. Zhao et al.

Fig. 1. Intelligent patrol system chart

3.2

Implementation of Intelligent Monitoring Management System

The dedicated intelligent monitoring system consists of the following parts. Low power consumption dual-frequency reader with storage function,Dualfrequency antenna (HF & UHF), UHF band label (same life as smart monitoring box), reasonable power management part, unpacking mechanism, communication interface, and reasonable layout of internal space due to different equipment sizes. The system diagram as shown in Fig. 2.

Fig. 2. The diagram of the functional structure of the intelligent management system

The internal low power consumption dual-frequency reader (HF & UHF) reads the RFID tag information attached to the important equipment in the box through the dualfrequency antenna (HF & UHF) and writes the UHF band label (same life as the monitoring box). The power management section includes a charging section, a battery

Portable Article Management System Based on Wireless Sensing Technology

853

replacement section, a power monitoring indication section, a box opening and closing detection circuit, and a power delay shutdown circuit. The box opening mechanism provides the box opening and closing signals and triggers the power-off delay shutdown circuit. The reasonable layout of the internal space due to different device sizes can achieve reasonable placement of devices with different shapes and different labels, so that they can be reliably read by low-power dual-frequency readers (HF & UHF) with storage.

4 Summary and Outlook This paper introduces introduces the current status of the use and management of special equipment in various industries, and mainly explains the design principles and function implementation of intelligent monitoring boxes based on Wireless sensing technology for special equipment management. New ideas and methods are proposed for the management of special equipment. Realizing the intelligent identification, positioning, tracking, monitoring and management of items is a beneficial attempt in the direction of “connecting things with Wireless sensing technology” in the context of the rapid development of the Internet of Things. The UHF band tag (same life as the monitoring box) can achieve the validity of the UHF tag during the effective use period of the box. This tag is mainly for long-distance communication and only stores the main identity information of the device. The low power consumption of the low-power dual-frequency reader with storage function (HF & UHF) can effectively extend the life of the built-in battery, while the built-in large-capacity storage device can record the use of important equipment inside the box in detail. Acknowledgements. This work is supported by Mandatory Science & Technology assistance project for Xinjiang Province (Project No. 2017E0202) and Shanghai Science and Technology Innovation Plan 17595800900.

References 1. Information technology-Radio frequency identification for item management-Part 6: Parameters for air interface communications at 860 MHz to 960 MHz[S]. International StandardISO/IEC 18000-6 (2004) 2. Ngai, E.W.T., Moon, K.K.L., Riggins, F.J., et al.: RFID research: an academic literature review (1995–2005) and future research directions. Int. J. Prod. Econ. 112(2), 510–520 (2008) 3. Parks, A.N., Sample, A.P., Yi, Z., et al.: A wireless sensing platform utilizing ambient RF energy (2016) 4. Jincheng, Z., Aili, Z.: Frequency-Selectable RF Ablation Treatment System. Zhongguo yi liao qi xie za zhi. Chin. J. Med. Instrum. 42(6), 409–412 (2018)

Author Index

A An, Jingxin, 274

Duan, Sheng, 293 Duan, Yun, 293

B Bai, Hao, 788 Bai, Zhongyu, 415 Bin, Du, 218

F Fan, Guiling, 682 Fan, Ning, 319 Fan, Yufeng, 362 Feng, Chen, 724 Feng, Peilu, 32

C Cai, Huali, 667 Cai, YuXin, 450 Caifeng, Xiao, 815 Chen, Nana, 415 Chen, Ping, 256 Chen, Wenhua, 3 Chen, Xi, 256 Chen, Xiaoqing, 237 Chen, Xiuwu, 101 Chen, Xuhui, 82 Chen, Yixian, 163 Cheng, Cheng, 850 Cheng, Yanchun, 149 Chi, Wenqing, 266 Cong, Wei, 566, 573 Cui, Haijun, 88 D Dai, Dawei, 419 Dali, Zhang, 724 Deng, Tao, 3 Ding, Mingxiu, 585 Dong, Feng, 687 Du, Yang, 362

G Gao, Feifei, 682 Gao, Xiaoyan, 336, 636, 672 Ge, Xiaolin, 478 Ge, Xiaoyu, 426 Gu, Yanjun, 667 Gu, Zhanbin, 95 Gu, Zhihong, 171 Guo, Ge, 212 Guo, Zenghui, 224 Guo, Zijuan, 3 H Hailin, Li, 751 He, Jianwu, 832 He, Ping, 101 He, Ting, 101 He, Zhouhong, 56 Honglei, Guo, 729 Hu, Bo, 388 Hu, Fei, 195 Hu, Weidong, 299 Huang, Haiyan, 772

© Springer Nature Switzerland AG 2021 V. Sugumaran et al. (Eds.): MMIA 2020, AISC 1234, pp. 855–858, 2021. https://doi.org/10.1007/978-3-030-51556-0

856 Huang, Jie, 552 Huang, Qiong, 75 Huangfu, Hancong, 388 Hui, Luo, 751 J Ji, Xingpei, 43 Jiang, Daohuan, 11 Jiang, Haiyan, 82 Jiang, Wang Chang, 809 Jianliang, Guo, 438 Jiao, Shuangben, 266 Jiao, Zhe, 185 Jiao, Zhong, 838 Jie, Yang, 703 Jin, Dingyun, 336 Jin, Zhiwei, 677 Jin, Zhixiang, 692 Jing, Cui, 719 Jing, Yang, 703 Jing, Zhang, 826 Jinhe, Zhang, 218 Jinxia, Chen, 697 K Ke, Qingpai, 788 Kong, Dewei, 501 Kong, Lingyan, 739 Kou, Ying, 205 L Lei, Jinyong, 788 Lei, Zhenjun, 49 Li, Dongfeng, 180 Li, Guorui, 745 Li, Hesen, 37 Li, Jiuchao, 325 Li, Luqi, 579 Li, Nan, 395 Li, Qunying, 646 Li, Xiaofei, 266 Li, Xinyan, 538 Li, Yongxin, 656 Li, Yuanyuan, 617 Li, Zhi, 280 Liang, Zheheng, 11 Liangliang, Qian, 444 Liao, Xiaowen, 56 Lin, Wensen, 761 Lin, Yu, 17, 651 Liu, Caiyun, 525 Liu, Chang, 426

Author Index Liu, Guofeng, 605 Liu, Guoyong, 519 Liu, Hengjuan, 559 Liu, Hongli, 395 Liu, Huaping, 306 Liu, Jing, 566, 573 Liu, Qian, 286 Liu, Sheng, 256 Liu, Tao, 69 Liu, Wei, 195 Liu, Yong, 149 Liu, Yu, 149 Liu, Yulei, 24 Liu, Zhuo, 171 Lu, Bing, 3 Lu, Chengfei, 766 Lu, Yang, 49 Luo, Huifan, 356 Luo, Jun, 331 Luo, Yongjun, 469 Lv, Shixia, 249 M Meng, Qingpeng, 286 N Na, Meng, 783 O Ouyang, Hongbo, 293 P Pang, Liang, 212 Peng, Cao, 719 Ping, Qiang, 641 Q Qi, Cong, 3 Qi, Huiwen, 171 Qi, Ou, 325, 336, 636, 672 Qian, Chaoxi, 598 Qian, Liangliang, 803 Qiuli, Li, 751 R Ran, Ran, 195 S Sai, Wei, 682 Sha, Gong, 433 Shan, Tian, 798 Shao, Juan, 108

Author Index Shi, Lei, 611 Shi, Wenhua, 636 Shi, Xuntao, 788 Shi, Yiquan, 62 Shujian, Sun, 218 Sui, Xin, 514 Sun, Dongyan, 531 Sun, Jiyuan, 49 T Tan, Qingkun, 43 Tang, Rui, 43, 123 Tang, Zhiwei, 231, 237 Tao, Gao, 844 Tao, Hong, 218 Taotao, Li, 713 Tian, Li, 756 Tian, Ye, 114 W Wang, Cheng, 356 Wang, Danni, 195 Wang, En, 3 Wang, Fei, 546 Wang, Feng, 256 Wang, Fubin, 75 Wang, Jinliang, 592 Wang, Meng, 88, 131 Wang, Qinzhu, 136 Wang, Rundong, 149 Wang, Shengli, 143 Wang, Shun, 163 Wang, Yibo, 672 Wang, Yongcai, 388 Wang, Yuerong, 624 Wang, Yuwei, 444, 803 Wei, Cuijuan, 486 Wei, Ling, 3 Wei, Xiang, 256 Wei, Xuemei, 667 Wei, Zhuo, 185 Wen, Sun, 793 Wenjun, Liu, 778 Wu, Fang, 667 Wu, Jinbo, 459 Wu, Shanshan, 43, 123 Wu, Xinyu, 402 Wu, Xuejing, 662 X Xianjun, Fu, 724 Xiaoli, Luo, 778 Xiaozhou, Guo, 409 Xie, Ningning, 185

857 Xie, Xuefeng, 592 Xu, Bing, 383 Xu, Mao, 772 Xu, Min, 788 Xu, Quan, 788 Xu, Xiaoxu, 508 Xu, Zhenjun, 299 Xue, Bin, 266 Xue, Hongjiao, 249 Xue, Jiao, 682 Xuxia, Ouyang, 630 Y Yan, Li, 751, 783 Yan, Yongjie, 256 Yan, ZhiGuo, 450 Yan, Zhiguo, 850 Yang, Guolan, 493 Yang, Jia, 450, 850 Yang, Jieyun, 157 Yang, Jingqiu, 62 Yang, Ping, 249 Yang, Xuenan, 820 Yang, Yue, 501 Yaoqiu, Hong, 734 Yi, Juan, 552 Yifeng, Hao, 708 Yonghao, Zhao, 751 Yu, Hongkun, 573 Yu, Yulan, 331 Yuan, Guangjun, 49 Yuan, Yangchun, 388 Yuan, Zhiyong, 788 Z Zeng, Jijun, 11 Zhai, Shaolei, 3 Zhang, Bo, 88 Zhang, Chengwei, 538 Zhang, Hong, 249 Zhang, Lei, 636 Zhang, Ling, 419 Zhang, Liyun, 395 Zhang, Longfei, 205 Zhang, Ning, 687 Zhang, Rong, 171 Zhang, San-you, 459 Zhang, Xianglin, 478 Zhang, Yifan, 286 Zhang, Yuhang, 266 Zhao, Bo, 450, 850 Zhao, Pengju, 372 Zhao, Shiheng, 343 Zhao, Ye, 395

858 Zheng, Hong, 469 Zhou, Liang, 205, 325 Zhou, Rui, 149 Zhou, Shiqing, 349

Author Index Zhou, Xuetao, 395 Zhu, Gongfeng, 11 Zhu, Xiurong, 313 Zou, Wei, 692