132 54 43MB
English Pages 2083 [1971] Year 2020
Advances in Intelligent Systems and Computing 1088
Chuanchao Huang Yu-Wei Chan Neil Yen Editors
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019)
Advances in Intelligent Systems and Computing Volume 1088
Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen , Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
More information about this series at http://www.springer.com/series/11156
Chuanchao Huang Yu-Wei Chan Neil Yen •
•
Editors
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019)
123
Editors Chuanchao Huang Huazhong University of Science and Technology Wuhan, China
Yu-Wei Chan Computer Science and Information Management Providence University Taichung, Taiwan
Neil Yen University of Aizu Fukushima, Japan
ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-981-15-1467-8 ISBN 978-981-15-1468-5 (eBook) https://doi.org/10.1007/978-981-15-1468-5 © Springer Nature Singapore Pte Ltd. 2020, corrected publication 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
Contents
Impact of Smart Cities on Resource Conservation Based on Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yongzhi Chen and Yingxing Lin
1
Water Level Measurement Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jian Huang
9
Optimization of Urban Transportation Network Path . . . . . . . . . . . . . Dandan Zhang and Haiyun Zhu
15
Identification and Early Warning of College Students’ Psychological Crisis Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Weie Xiong
23
Application of VR Technology in Intangible Cultural Heritage Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Liang Li
29
Construction of Ultimate Video Experience and Application Innovation System Based on 5G and 8K . . . . . . . . . . . . . . . . . . . . . . . Dong Xiang, Xia Ran and Zhiqiang Xu
35
Cost of Kidney Transplantation on the Base of Data Mining Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Kaixing He, Jinguo Wang, Jiwei Wang and Na Wang
43
Public Service of Retired Personnel in Colleges and Universities in the Internet Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yanping Wang
49
Application Research of Accounting Archives Informatization Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiangdong Xu
55
v
vi
Contents
Construction of Vocational Education Information Platform Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaojun Jiang and Zengxiang Pan Language Conversion and Cultural Communication in Nobrock’s Translation—Taking Xunzi’s Persuasion of Learning as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qingkun Hu Design and Manufacture of Moxibustion Bed Control System . . . . . . . Daming Pei
63
71 81
Development of a New Computer-Aided Algorithm for Three-Layered Seale Wire Strand Geometric Design . . . . . . . . . . . Chunlei Yu, Junqi Pan, Qiang Song and Mingzhao Zhu
89
Designing of Postgraduate Medical English Class in Smart Learning Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaofang Wang and Cheng Liu
97
An Improvement Method of Power Energy Utilization Rate Based on DEA Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fu Mo
105
“Blended Learning” in Construction Cost Network Course . . . . . . . . . Shu Li, Lei Cao and Yunda Shao
111
Data Mining of Privacy Preserving Based on Secret Sharing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jianguo Liu, Xiaoyu Liu, Zhansheng Chen and Zhengkun Hu
119
Application Status and Development Prospect of Artificial Intelligence in Clinical Medicine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mengqiao Wang
129
Core Index System of Provincial Power Grid Company’s Economic Activity Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rongmao Wang, Lei Jiang, Jia Yu and Xiao Pan
135
Application Research of Smart Education in Flipped Classroom of College English . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cheng Liu and Xiaofang Wang
147
Multi-objective Enterprise Partner Selection Model with Different Relative Superiority Parameters Based on Particle Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Junfeng Zhao, Xue Deng, Yingxian Lin and Jinjia Lu
155
Contents
vii
Vehicle Path Optimization with Time Window Based on Improved Ant Colony Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bo Li and Tingting Li
167
Cultivation of Innovative Talents in Higher Education Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jui-Chan Huang and Kuo-Min Ko
177
Reform of Ideological and Political Teaching in Colleges and Universities Under the Background of Big Data . . . . . . . . . . . . . . Hongbing Ge and Baozhi Wang
183
Influence Factors of Consumer Satisfaction Based on SEM . . . . . . . . . Huali Cai, Yawei Jiang and Jingshu Zhang
189
Overview of Underground Space Utilization and Standardization Suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qing Xu
195
Application of Decision-Making Management and Information Management System Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . Kuo-Min Ko
205
Aluminum Foil Surface Defect Recognition Method Based on CNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hui Wang, Chunhua Gao and Pinglian Wang
211
How to Build Hadoop in the Field of Transportation by Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yunhui Gu and Li Fu
217
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral Data Using Grey Relational Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . Wei Guo, Ping Dong, Hongbo Qiao, Haikuan Feng, Huifang Wang and Hui Zhang Financial Auditing Accounting Method Based on Computer Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoyan Ma Wireless Temperature Control System of Big Grain Depot . . . . . . . . . Mingzhi Wang and Xueyi Wang Springback Modification for Biaxial Bending Plate and Its Validation in Multi-point Forming . . . . . . . . . . . . . . . . . . . . . . Qingfang Zhang, Hengyi Yuan, Linlin Li, Hongfen Wang and Songqing Liu E-crime Management System for Future Smart City . . . . . . . . . . . . . . M. M. Kamruzzaman
225
233 239
249
261
viii
Contents
System Dynamics-Based Simulation of E-commerce Industry of Ethnic Regions in China . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haiying Ma
273
Vehicle Safety Reminder System Based on Single Chip Microcomputer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yunlu Lu, Xuefeng Tan, Mengting Luo, Linchao He and Haibo Pu
283
Regional Cooperative Strategy of Social Public Service Under the Background of Cloud Computing and Big Data Environment . . . . Jianbo Li and Xiaohua Li
291
Online Reputation Evaluation for Consumer Products Based on Analytic Hierarchy Process (AHP) . . . . . . . . . . . . . . . . . . . . . . . . . Ying Li, Xiaowei Lu, Lei Han, Yingcheng Xu and Xiuli Ning
297
Discussion on the Influence of Ambient Temperature Based on Big Data Technology on the Development of Asphalt Pavement . . . . . . . . Xiaoduo Liu and Wei Liu
309
Analysis on the Criminal Subject of Artificial Intelligence . . . . . . . . . . Huilin Huang
317
U.S. Air Force Target Knowledge Graph Construction Based on Multi-source Intelligence Analysis . . . . . . . . . . . . . . . . . . . . . Ruijuan Hu
323
Design of Virtual Experiment Platform Based on MATLAB Simulation Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Liyan Zhao and Aize She
335
Traditional Culture Teaching in Chinese Education Under Internet Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenli Zhong
343
College Students’ Entrepreneurship Psychology Education System and Practice Based on Computer Network . . . . . . . . . . . . . . . . . . . . . Yan Zheng and Xu Wang
351
Development Status and Trend of Internet of Vehicles Communication Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jiguang Xue, Zhenbo Liu, Xuliang Zhao, Pingjun Wang and Qiaowen Hong Temperature Controller Based on USB Interface . . . . . . . . . . . . . . . . Yali Ma and Xueyi Wang Construction of Compound DDOS Network Security System Based on PKI and CA Authentication . . . . . . . . . . . . . . . . . . . . . . . . . Bin Wang and Xiaolei Zhang
361
369
375
Contents
Agricultural Sprayer Based on Drip Performance Monitoring System Design and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ling Liu
ix
383
Building Extraction Method in Remote Sensing Image . . . . . . . . . . . . Qinzhe Han, Xin Zheng, Qian Yin and Ziyi Chen
395
Similarity Measures Between Type-2 Fuzzy Sets . . . . . . . . . . . . . . . . . Jing Wang and Gao Zheng
407
Development Strategy of E-Commerce Network Marketing Based on New Media Marketing Mode . . . . . . . . . . . . . . . . . . . . . . . . Tingzhong Wang and Lingli Zhu
417
Reconstruction of Path of Mental Health Education of College Students Under the Background of “Internet+” . . . . . . . . . . . . . . . . . . Zhihui Gong
425
Implementation Plan on the Implementation Plan of the Linear Algebra Gold Course in Independent Colleges . . . . . . . . . . . . . . . . . . . Lijie Ma
433
Search Strategy of Shipborne Satellite Communication Servo with Changing Heading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haidong Zou
439
Hybrid Teaching of College English Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cuibai Li
445
Fuzzy RBF Neural Network Control for Unmanned Surface Vehicle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Renqiang Wang, Keyin Miao, Jianming Sun, Hua Deng and Yue Zhao
451
Feasibility Study on Using Seawater in Ship Pressure Water Mist Fire Extinguishing System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dongfang Zhang
461
Application Sharing Mode of University Information Resources in (IOT) Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Changcheng Xin and Chaohu He
471
Information Reconstruction Strategy for a Ship Power Distribution System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hongdan Liu, Yue Sun and Lanyong Zhang
479
Design and Experiment of a Flexible Array Tactile Sensor . . . . . . . . . Hengyi Yuan and Qingfang Zhang
489
x
Contents
Design of Street Lamp Management Information System . . . . . . . . . . Xiangguo Lin Application of Big Data Technology to Ideological and Political Education in Institutions of Higher Learning . . . . . . . . . . . . . . . . . . . . Jiang Li and Xiaohua Ke Based on Computer Software to Analysis the Influence of Geometry Parameters of Herringbone Plate Heat Exchanger Plate on Heat Exchange Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shuwei Lv and Zhuojuan Yang Analysis of Working Characteristics of Buck Converter in Artificial Intelligence Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zeyu Li and Hongmei Xu Under the Background of Internet +, the Practical Research of Mobile Learning Model in Vocational Practice Teaching Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bingbing Wu, Yun Gao and Li Qiao
499
505
517
529
539
Exploration and Practice of Collaborative Education Mode Based on Informatization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenshuang Zhu and Chen Bai
547
Analysis of Diabetic Association Rules Based on Apriori Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoli Wang, Kui Su and Zhanbo Liu
555
Design and Practice of Basic Physical Experiment Teaching Based on Combination of Virtual and Real . . . . . . . . . . . . . . . . . . . . . Baoxin Tai and Bo Hu
565
Automatic Detection of Cloth Defects Based on Gabor Filtering . . . . . Guanxiong Ding
571
Improved GA-SVM Algorithm and Its Application of NIR Spectroscopy in Orange Growing Location Identification . . . . . . . . . . Songjian Dan and Simon X. Yang
581
Condition Monitoring of Fire Water Supply System Based on LoRa Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fan Yufeng, Du Yang and Yang Shufeng
593
Application Design and Implementation of Intelligent Bracelet in Wisdom Campus Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lingling Gao, Wenjia Luo and Laifeng Tang
603
Contents
xi
Development and Implementation of Education Information Platform Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . Qiang Han
611
Application of Information Processing Technology in Garment Enterprises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lu Miao
623
Application of E-Commerce Network Security Technology . . . . . . . . . Haixiang Li and Weixian Xue
633
Construction and Analysis of a Foreign Language Learning Model Based on the Classroom Network Environment . . . . . . . . . . . . . . . . . . Jing Li
641
Reform and Practice of Advanced Mathematics Course in the Context of New Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . Dongli Liu
651
Innovation of Real Estate Marketing Strategies Based on “Internet+” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lisa Zhu and Feng Yang
661
Load Balance of Cloud Computing Center Based on Energy Awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhenjiang Li and Zhenxiang He
667
Express Internet of Things: Concept, Architecture and Frontier Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ji Liang and Chunhui Yuan
677
Multi-dimensional Similarity Personalized Recommendation Model in Deep Learning Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Feng Liu and Weiwei Guo
689
Teaching Curriculum System and Its Construction on the Course of “Stamping Forming Process and Die Design” Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Songqing Liu Drug Abuse Prediction Model Based on Relevance Analysis . . . . . . . . Yawei Zhou, Zhelin Guan, Pengfei Ji and Xiufen Wang Design of Temperature and Humidity Detection System for Bacteria Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhuojuan Yang, Xirui Sun, Chunyu Mao and Xiaodong Yang Interference Analysis of Mobile Communication Multi-system . . . . . . . Daming Pei
699 705
715 725
xii
Contents
Flipped Classroom Teaching of College English Based on “Rain Classroom” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wei Sun
735
Application of Information Technology to Promote the Practice of Medical Education Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Na Wang, Xige Yang, Rui Wang and Jinguo Wang
743
Analysis of Rock Fracture Deformation of Urban Informatization in China’s Modernization Drive by DDARF Software . . . . . . . . . . . . . Wen Wang, Rui Han, Yanli Zhu and Manxia Wu
751
Enterprise Information Security in the Process of Informatization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guangzheng Wu and Jianyu Wang
759
Meta-cognitive Strategies Application in MOOC Environment—A Case of Integrated English Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . Li Zhang
765
Training Mode of Individualized Skilled Talents Based on Electronic Communication Specialty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mingguang Zhang and Lisa Zhu
775
Calculating the Pore Fractal Dimension of Porous Media by Using Pore Size Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yibo Zhao
785
RETRACTED CHAPTER: Application of Weighted Gene Co-expression Network Analysis in Biomedicine . . . . . . . . . . . . . . . . . Ming Zheng and Mugui Zhuo
793
Design of Enterprise Network Information System Based on Industrial Interconnection . . . . . . . . . . . . . . . . . . . . . . . . . . . Yu Zhuang and Shuili Yang
799
Discussion on the Construction of Computer Software Specialty in Private Institutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoming Yang
809
Design and Implementation of Cow Chewing Behavior Recognition Based on Sound Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ting Zhang and Jiahao Wang
817
Design and Application of Distribution Automation System in Intelligent Power Supply System Management . . . . . . . . . . . . . . . . . Qichang Li, Guangxiao Li, Lin Wang, Qiang Song and Yundong Xiao
823
Contents
A Framework for Occupational Risk Assessment in Power Grid Using AHP Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hualiang Li, Runzhong Liu, Li Li, Zhiting Liu, Shaoyan Lu, Lun Pan and Aihua Lin Digital Media Copyright Protection Technology in the Age of All Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yixin Chen, Xi Hu and Feng Xiao Realistic Dilemma and Breakthrough Path of “Innovation and Entrepreneurship” Education in Private Colleges and Universities Under the Background of Informatization . . . . . . . . . Ying Chen
xiii
835
843
851
Construction of Foreign Language Curriculum Resources Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . Yanxia Hou
859
Intelligent Computation of Bubble Group Motion in Mesoscale Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bingbing Liu, Mingyu Wang, Fulin Yu and Shaojun Zhang
871
Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rongna Xie, Yazhe Wang, Guozhen Shi, Lin Yuan and Quanqi Li
881
Situation and Suggestion of Geology and Mineral Resources Standardization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qing Xu
893
Commodity Sales Data Analysis Based on Qoo10 Platform . . . . . . . . . Yunle Yang, Hailan Pan and Jiaqi Xiang Design of Temperature Detection Systems Based on Wireless Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Weiqing Wan Status Quo and Countermeasures of Students’ Learning Behaviors in Higher Vocational Colleges Under the Internet Age—Based on the Questionnaire Survey of 1248 Vocational College Students . . . . Baiqing Cheng, Xiang Gao and Li Ge
899
909
919
Structural Design of Snapping Machine of Brittle Materials and Its Virtual Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenjun Kou, Xiang Chen, Qiangqiang Wu and Liang Shen
931
Design Idea of Professional Talent Evaluation System Based on Mobile Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping Yang and Hongjiao Xue
943
xiv
Contents
Research and Practice on Diagnosis of Civil Engineering Majors Based on EFQM Excellence Model Analysis . . . . . . . . . . . . . . . . . . . . Aimin Wei Application of Network Score System for Sports Achievements . . . . . . Huihui Du
953 961
Forecast and Model Establishment of Urban Rail—Transit Passenger Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dandan Zhang and Zhiyuan Liu
969
Innovation and Entrepreneurship Education in Higher Vocational Colleges Under Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Linhua He
979
Using Computer Information High Technology to Improve Waterproofing and Drainage of Panel Bulk Dam . . . . . . . . . . . . . . . . Xiaoqing Shi and Gangyu Gu
985
Establishment of a Data Mining System for Estimating the Medical Cost of Renal Transplantation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haoran Yu, Jinguo Wang, Hongmei Xu and Na Wang
993
Application and Innovation of Computer Internet of Things Technology in Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guibin Zhang, Lifan Feng, Hongzhen Zhang and Xiaohua Cai
999
Significance of Embedded Linux to the Development of Internet of Things Under the Background of New Science . . . . . . . . . . . . . . . . 1007 Haipeng Yang Platform of Examination Information Resources in Colleges and Universities Based on Big Data Deep Mining Technology . . . . . . . 1015 Jianbo Li and Xiaohua Li The Impact Factors of International Navigation Talents Based on AHP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023 Jian Yong and Xiuping Sui Application of Information Technology in the Problems and Countermeasures of Kindergarten Science Education . . . . . . . . . . 1031 Bo Yan Construction of University’s Innovation and Entrepreneurship Education Ecosystem Based on Computer Network Platform . . . . . . . 1037 Xu Wang and Yanmin Yu A Unified Unstructured Data Storage System Under Cloud Computing Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1047 Mingming Chen, Ning Wang, Lihua Tang and Yuzhi Chen
Contents
xv
Classification and Pruning Strategy of Knowledge Data Decision Tree Based on Rough Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1057 Xiuying Zhao and Linli Wu Teaching Strategies of Literature Courses in the New Media Technology Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1065 Mingxiu Ding On the Teaching Reform of Mathematics Course in Independent Colleges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1073 Yong He Adaptive Sliding Mode Control for Unmanned Surface Vehicle with Fuzzy Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081 Renqiang Wang, Keyin Miao, Jianming Sun, Hua Deng and Yue Zhao Application and Strategy of Internet of Things (IOT) in College Education Informationization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089 Chaohu He and Changcheng Xin Influence of Inductance Parameters on Intelligent Control of Buck Converter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1099 Yutong Li, Nuo Zhou and Hongmei Xu Research and Development of Remote Monitoring System for High-Speed Rail Protective Fence Gate . . . . . . . . . . . . . . . . . . . . . 1107 Li Qiao, Yu Fan and Bingbing Wu Integration of Information Technology and Three-Dimensional Teaching Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1115 Yanmin Liang and Yao Wang Research and Practice of Laboratory Safety Management Mode . . . . . 1123 Bo Hu and Baoxin Tai Dynamic Model Average for Stock Index Return . . . . . . . . . . . . . . . . 1129 Qingyu Meng Challenges and Countermeasures of Intellectual Property Rights in Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1139 Ping Ma Personalized Distribution Recommendation Model of Dormitory Based on Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145 Weiwei Guo and Feng Liu Time-Limited Tour Planning Based on Ant Colony Optimization Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155 Han Liu, Zhujun Yu, Wenhui Zhang and Zhihong Ma
xvi
Contents
Fungus Bacteria Bag Density Detection System Based on Image Processing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163 Chunyu Mao, Zhuojuan Yang, Xirui Sun and Xiaodong Yang Application of Information Technology in Clinical Education . . . . . . . 1171 Na Wang, Qitong He, Rui Wang and Qun Li Optimization of Fermentation Medium of Camphor Lucidum Based on Artificial Neural Network and Genetic Algorithm . . . . . . . . 1179 Ming Zheng and Haixiao Gong Design and Implementation of Speech Recognition System Based on Gesture Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185 Zuliang Wang, Chuangle Cao and Suying Zhang Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective . . . . . . . . . . . . . . . . . . . 1191 Yuzhong Liu, Zhiqiang Lin, Li Li, Hualiang Li and Yali Shen Digital Watermarking Hiding Technology for Copyright Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1203 Yixin Chen, Xi Hu and Feng Xiao English Teacher Information Resource Affordances in the Context of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1211 Guotai Luo How Does SEW Drive Innovation in an Internet Family Firm? . . . . . 1221 Min Zhao, Yiyi Wang and Xin Yao Construction and Application of Information Management System in Road and Bridge Engineering Construction . . . . . . . . . . . . . . . . . . . 1229 Shufang Li Control Mechanism of Network Public Opinion on Emergencies in Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1239 Baozhi Wang Decision-Making Analysis of Prognosis of Renal Transplant Recipient on the Base of Data Mining . . . . . . . . . . . . . . . . . . . . . . . . . 1245 Yunhai Yu, Jinguo Wang, Xige Yang and Na Wang Application of Virtual Technology in the Management of Computer Laboratories in Multi-campus Colleges and Universities . . . . . . . . . . . 1251 Xudong Zhang Construction of a New Home Decoration Design Network Sharing Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1259 Nuan Sun
Contents
xvii
Dimension Reduction Algorithm of Big Data Based on Deep Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1269 Jianye Zhang, Jia Shen, Tianjun Wang, Kun Liu and Jinhu Li Novel Method of Knowledge Database Data Mining by Association Rules Extraction Technology in Decision Tree . . . . . . . . . . . . . . . . . . . 1281 Xiuying Zhao and Xiangkui Chen Influence of New Media Technology on the Transformation Path of Party Newspaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1291 Liya Yao Application of NB Technology in IoT . . . . . . . . . . . . . . . . . . . . . . . . . 1299 Chao Zhou Implementation of Medical Disputes Information System . . . . . . . . . . 1305 Na Wang, Na Wei, Hongqin Li and Linghao Kong Research and Implementation of RSA IP Core Based on FPGA . . . . . 1311 Boyang Liu Innovation and Entrepreneurship Education in Higher Vocational Colleges Under the Background of “Internet+” . . . . . . . . . . . . . . . . . . 1321 Linhua He Influencing Factors and Adaptive Strategies of Electric Power Demand in the “New Normal” Environment of Economy Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1327 Yu Shen, Kangli Xiang, Yiwang Luo, Ziming Xu and Jing Cai Application of Intelligent Control in Medical Education . . . . . . . . . . . 1335 Na Wang, Jing Yu, Lei Wang and Xiaomei Hao Network Security and Intelligence Analysis Based on Big Data . . . . . . 1341 Weigang Liu Conflict and Balance Between Big Data Investigation and Personal Information Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1351 Kaiqi Cai Influence of “Internet +” on the Development of Campus Baseball and the Countermeasure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1361 Jingxiao Zhao Application of the Computer Aided Drawing in the Wall Painting Artistic Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1369 Hao Qi
xviii
Contents
Accurate Model of the Internet Financial Poverty Alleviation Based on the Multi-agent and the Data Mining . . . . . . . . . . . . . . . . . . 1377 Anni Qian and Chien-Yin Chen Construction of the Integrated Network Service Platform for Smart City Community Home Care Under the Background of “Internet+” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1385 Yinghong Sui Mountain Monitoring System Based on the Digital Photogrammetry and the Component GIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1393 Jiuling Tian Simulation Study on the Geographical Adaptability of the Large-Scale Cultural Buildings in Shanshui Cities Based on the VR Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1401 Litao Wan The Innovation of the Mobile Intelligence Terminal in Foreign Language Teaching Under the Background of the Internet . . . . . . . . . 1409 Bo Wang Design of the Ideological and Political Education Platform for College Students Based on the Mobile App . . . . . . . . . . . . . . . . . . 1417 Honggang Wang Application Effect of the Computer Remote Network System in the Comprehensive ICU Nursing Intervention Mode . . . . . . . . . . . . 1425 Huifang Wang Application of the Computer Database Software in the ICU Nursing Medical Records Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1433 Huifang Wang Design and Research of the Intelligent Aquaculture Monitoring System Based on the Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . 1439 Jianguo Wang, Handong Cheng, Sheng Yuan, Quan Wang, Longzhen Shu and Chunli Zhang Curative Effect Observation of the Computer-Controlled Rapid Three-Dimensional Traction for Prolapse of Lumbar Intervertebral Disc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1447 Qinjian Wang Computer Simulation Generation of the Humanized Music Timbre . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1455 Rui Wang
Contents
xix
Application of the Japanese Teaching Methods Based on the Network Multimedia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1463 Xia Wang On the Network Security Prevention Under the Development of the Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1471 Heping Xi Molecular Action Mechanisms of the Traditional Chinese Medicine in the Treatment of Rheumatoid Arthritis Based on the Computer Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1479 Liang Yan and Wuyin Li Design and Teaching Reform of Interactive Multimedia Courseware for Mechanical Drawing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1487 Lirong Yang Design and Implementation of the News Practice Teaching Platform Based on JavaWeb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1495 Zhen Yang Research on Wi-Fi Signal Coverage and Quality of Urban Rail Transit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1503 Wenjie Yu Design of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1511 Haonan Yuan The Validity of Computer Technologies in Promoting College Students’ Entrepreneurship Education Based on the E-commerce . . . . 1519 Jinming Bai Application of Internet of Things Technology in Industrial Automation Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1527 Liyuan Chang The Application of Transmission Technology in Information and Communication Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1535 YaoZhi Chen The Financial Data Prediction System Based on the Recurrent Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1543 Yixin Deng Design of the “Studio System” Practical Teaching Platform for Advertising Major Based on the Network Resources . . . . . . . . . . . 1551 Weibo Gong
xx
Contents
The Transformer Substation Scenario Modeling and Visual Perception Visualization System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1559 Guangceng He and Yushan Dong Library Information Resources Sharing Model Resources Based on Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1567 Xianjie Hu College Tennis Teaching Based on the Multimedia Platform . . . . . . . . 1575 Zhenhai Huang Application of the Internet-Based Remote Monitoring in Cardiac Nursing Patients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1583 Zhihui Huang and Ximin Li Design of the Innovative Teaching Platform for College English Linguistics Teaching Based on the Network Technology . . . . . . . . . . . 1591 Qinyuan Hui The Application of Big Data Analysis in College Computer Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1599 Zili Jiang Impact Model of the Brand Cross-Border Cooperation from the Perspective of the Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . 1607 Kayi Jin Intervention Effect of Mindfulness Based Cognitive Therapy on College Students Dependent on Online Games in the Internet Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1613 Ying Lei and En Zhang Interpretation Technology of the Risk Causes of Management Based on Eigenvalue Disturbance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1621 Qiang Li, Xusheng Yang and Peiyu Liu Design of the Art Education Platform Based on the Multimedia Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1629 Sen Li Implementation of Large-Scale English Speaking Test Based on P2P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1637 Sijing Li Simulation Analysis of the Life Cycle of the Tire Industry Cluster Based on the Complex Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1645 Xianghua Li
Contents
xxi
Design of the Comprehensive Evaluation Model for Operating Risks of Power Grid Companies in Competitive Environment . . . . . . . . . . . 1651 Di Liu, Yingbao Cui and Peiyu Liu The Coding Technology of Operation and Management Risk Characteristics Based on the In-Depth Learning . . . . . . . . . . . . . . . . . 1661 Di Liu and Zhen Qiu The Evaluation Algorithms of the Computer Aided Instruction System Based on the New Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1673 Qing Liu The Application of the Big Data Age and the Artificial Intelligence in the Computer Network Technology . . . . . . . . . . . . . . . . . . . . . . . . . 1679 Qing Liu Network Security Entity Recognition Methods Based on the Deep Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1687 Weigang Liu Application of the Internet of Things Technology in the Urban Ecological Protection and Environmental Rehabilitation . . . . . . . . . . . 1693 Huanchun Ma Construction of Knowledge Mapping Computing Framework Under Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1701 Boliang Men, Xiumei Zhang and Yun Shi Dynamic Information Management System of Agricultural Economy Based on WebGIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1715 Yue Meng and Wenkuan Chen Application of the Cloud Real-Time Interactive Response System in College English Reading Teaching Platform . . . . . . . . . . . . . . . . . . 1723 Di Qi Service Products and App Design of Public Diocese in Colleges and Universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1731 Ruibo Song and Chenglin Ma Software Elderly-Oriented Interaction and UI Design from the Perspective of Service Design . . . . . . . . . . . . . . . . . . . . . . . . 1741 Ruibo Song and Lei Zheng Application of Fuzzy Algorithm’s Equal Flow Information Sampling Technique in Smoke Concentration Monitoring . . . . . . . . . . . . . . . . . . 1747 Jiying Chen, Shuanghe Chi, Gaoyuan Cheng and Wenqin Zha
xxii
Contents
Design of Human Resource Management System in the Background of Computer Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1757 Jingyuan Zhang Research on Intellectual Property Protection of Industrial Innovation Under the Background of Big Data . . . . . . . . . . . . . . . . . . 1765 Yu Wang and Lei Zhang Foreign Language Teaching and Intercultural Communicative Based on Network Environment and Cloud Computing Platform . . . . 1773 Zhiyin Wang Design of P2P English Teaching Platform Based on Network Technology and Streaming Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1781 Ya Yu Waterfront Recreational Landscape Planning and Ecological Protection Based on Cloud Computing and Neural Network Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1789 Yang Cao Analysis of Rural Labor Transfer Based on Network Data Mining and Financial Time Series Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . 1799 Bowen Guan and Xinze Li Technical Structure Factors of the Teams in the 2018 Russia World Cup Based on Cloud Computing Artificial Intelligence . . . . . . . . . . . . 1809 Xiaowei Lv and Changjiang Tao 3D Reconstruction Method of Waterfront Recreational Landscape Space Based on Artificial Intelligence and Fuzzy Algorithms . . . . . . . . 1821 Yang Cao Research on Computer Network Information Security and Protection Countermeasure in Big Data Era . . . . . . . . . . . . . . . . . . . . 1831 Jiyan He and Yanbin He Intelligent Security Patrolling System of the Robot Based on Improved Encryption Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1839 Bo Zhao, Ming Yang, Yuxin Cai and Zhiwei Tang Integration of Information Technology and Teaching in Vocational Colleges Based on Computer Big Data System . . . . . . . . . . . . . . . . . . . 1845 Hao Yu Research on Private Cloud System Architecture and User Data Security Based on Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1861 Jian Chang
Contents
xxiii
Artificial Intelligence and Deep Learning Application in Evaluating the Descendants of Tubo Mgar Stong Btsan and Social Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1869 Dancairang Ye Analysis of Digital Media Art Teaching Innovation Based on Network and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . 1877 Qian Ma, Bing Zhang and Zhiqiang Xu Application of Big Data Intelligent Algorithms in Enterprise Security Risk Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1887 Xiaogang Gong, Wei Ye, Yaqiong Guo and Chao Chen Application of Network Cloud Resources in College English Listening Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1897 Ning Ding Design of Japanese-Assisted Translation Teaching System Based on Cloud Computing and Intelligent System . . . . . . . . . . . . . . . 1905 Jingxian Huang Risk Control System of Construction Engineering Based on Data Mining and Artificial Intelligence Technology . . . . . . . . . . . . . . . . . . . 1915 Wei Rao and Jian Chen Training Mode of Cross-Border E-commerce Japanese Translators Based on Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1925 Jingxian Huang Application Research of Artificial Intelligence in Medical Information System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1935 Tianhua Bao and Cheng Cheng Discussion on the Application of 5G Network UAV in Public Security of Smart Cities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1945 Zhifang Wang and Cheng Cheng Drug Management System Based on RFID . . . . . . . . . . . . . . . . . . . . . 1955 Shicheng Li, Xiaoming You and Zheming Sun Object Recognition and Content Abstraction of Surveillance Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1959 Xiaoting Pan Real-Time Image Processing System . . . . . . . . . . . . . . . . . . . . . . . . . . 1965 Bo Zhao, Cheng Cheng, Yuxin Cai and Tang Zhiwei Research on Data-Driven Safety Level Assessment System of Refining and Chemical Enterprises . . . . . . . . . . . . . . . . . . . . . . . . . 1971 Desong Wu, Tingchun Wang, Tao Wang and Qiandeng Li
xxiv
Contents
Research on Evaluation Technology of Police Robot Video and Image Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1983 Ming Yang and Na Liu Study on Action Recognition of Drilling Overflow Detection Based on Deep Learning Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 1993 Qiandeng Li, Tingchun Wang, Zhichuan Guan, Jingwen Cui and Desong Wu Thoughts of Artificial Intelligence Enhanced Smart Community Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2003 Xiaofang Zhou, Xin Han and Weili Wang Disk-Based High Dimensional Index Structure . . . . . . . . . . . . . . . . . . 2011 Shiwei Du Semantic Marking Method of Video Scene Based on 3D Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2019 Wu Jinbo Research on Test Technology of Intelligent Algorithm for Police Robot Vision System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2027 Ming Yang and Na Liu Data Encryption Transmission and Authentication Scheme Based on Blockchain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2037 Liugfen Li, Guowei Lin, Zouyu Xie, Shujian Yu, Zhen Guo and Yufang Liang Privacy Protection in Blockchain Systems: A Review . . . . . . . . . . . . . . 2045 Tianjiao yu and Chunjie Cao Model Selection and Estimation in INAR(P) Model Based on Lasso Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2053 Xudong Lin and Zhen Guo Retraction Note to: Application of Weighted Gene Co-expression Network Analysis in Biomedicine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ming Zheng and Mugui Zhuo
C1
Impact of Smart Cities on Resource Conservation Based on Big Data Analysis Yongzhi Chen and Yingxing Lin
Abstract In the past, the traditional urban development model, that is, the form of mechanical use of urban resources, is no longer in line with the future development direction of the city. In the current urban management, it is necessary to integrate advanced science and technology to promote the transformation and upgrading of urban development. Big data technology has significant advantages. It can be used in urban management to achieve revolutionary transformation. This paper explores the potential value under massive data and promotes the construction of smart cities. From the perspective of big data, the relevant requirements for smart cities, as well as the anatomy of smart government, smart enterprises, wisdom and people’s livelihood, and the issues that should be paid attention to later, explore the construction of smart cities based on big data. The research in this paper has contributed to the further improvement of the city’s level of intelligence. Keywords Big data · Smart city · Resource integration · Resource conservation
1 Introduction In the wilderness of time, in the flood of information, what do you use to capture the flow of information generated every minute and every minute, and use these as the dream of a “smart city”? Mastering the pulse of a city, knowing every pulsation of it, the huge flow of information generated by the city in its incessant operation will require a weapon that is sufficient to support it, and big data will be born at this time [1]. Big data is not only a carrier for creating value. It can also affect urban management, e-government, public opinion monitoring, and corporate management. Once the key to big data is mastered, the development dilemma of smart cities will be easily resolved [2]. In the same period of proposing information engineering theory and methods, the concepts, theories and methods of information resource management have also been Y. Chen (B) · Y. Lin The School of Economics and Management, Fuzhou University, Fuzhou, Fujian Province, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_1
1
2
Y. Chen and Y. Lin
developed [3]. Relevant scholars have put forward many important points based on their own research and practical experience [4]. The theory, methods and practices of sending information resources management are very important for information resource planning [5]. They clarify the positioning of information resources, emphasizing that information resources are not only shared resources, but also strategic resources of enterprises. At the same time, it also emphasizes that it is necessary to optimize the allocation and comprehensive management of information resources from a strategic perspective, and to improve the overall efficiency of enterprise management [6]. Some scholars have planned the information resources in a certain university from the perspective of data planning, and have achieved some results. Applying relevant theoretical methods directly to power plant information resource planning can guide demand analysis and system modeling. Some scholars believe that the existing theories and methods of information resource planning are more suitable for enterprise information construction, and the government’s information resource planning cannot simply copy the original research and methods [7]. Based on the potential value of mining massive data, this paper promotes the construction of smart cities. Strengthening the construction of smarter cities will not only help accelerate the pace of urban internationalization, promote the transformation of development mode, promote economic restructuring, but also influence and transform people’s lifestyles, making urban development more scientific, management more efficient, and society more harmonious.
2 The Connotation of the Big Data Period and Smart Urbanization Requirements 2.1 The Connotation of the Big Data Period Today, big data has become a strategic resource in the 21st century, and it has become the focus of strategic deployment of developed countries and capital investment by multinational corporations [8]. The specific connotation of big data can be understood as such, because the amount of information involved is too large, it is difficult to process, analyze and manage data in a certain period of time [9]. Compared with traditional data, the unique basic characteristics of big data can be divided into four aspects, as shown in Fig. 1. Therefore, the big data period is the period of experience fusion of information technology revolution and human social activities. It is a period of information architecture and technology architecture of a new generation [10]. It is also a new world of understanding and transforming the world by using information resources to discover knowledge.
Impact of Smart Cities on Resource Conservation Based …
3 Large storage
Volume Volume
Large increment
Variety 4V features of big data
Velocity
Value
Velocity More sources
Variety More format
Value
Fig. 1 4 V characteristics of big data
2.2 Smart Urbanization Requirements Based on Big Data Analysis The focus of the construction of a smart city is nothing more than “wisdom.” The so-called “wisdom” must be derived from the full analysis and utilization of big data [11]. From the perspective of the architecture of a smart city, the biggest difference is that the data is combined with the processing of big data, thus obtaining the multiinformation that supports and guarantees the smooth operation of the smart city [12]. It can be simply assumed that a smart city is actually an upgraded version of a digital city. The key factor in the transformation from urban digitization to urban intelligence is to achieve intelligent processing of digital information. Therefore, we must vigorously improve the level of big data applications, actively use emerging networks and information technology, promote urban management and public service information, and strive to improve the level of urban intelligence. If government departments are reluctant to disclose and share data, there is no way to make the data generate deep value and comprehensive value. We must make full use of the positive role of the government, enterprises and industry associations, divide cooperation and cooperation, coordinate interests, clarify their position of responsibility in the construction of smart cities, and avoid the phenomenon of self-built system. In the era of big data, we will vigorously promote the construction of big data infrastructure and basic networks, actively promote the construction of information resources data exchange and sharing systems, maximize the integration of resources, avoid low-level redundant construction, and make big data truly generate “great wisdom.”
4
Y. Chen and Y. Lin
3 The Impact of Big Data Analysis on Resource Saving in Smart City Construction As urbanization speeds faster, resources shortages, environmental pollution, and traffic jams become more and more difficult. These urban diseases have become the primary problem of urban construction and development. The addition of big data has solved these problems in urban construction and future development planning. Big data analytics can help solve a range of problems facing smart cities. Big data will be like the blood of the city, covering all aspects of urban life and urban construction, as shown in Fig. 2. With the existence of big data analysis, urban governance is more scientific and efficient. Big data analysis provides a good support for smart cities.
3.1 Impact of Government Resources Wisdom government refers to the use of modern network communication, computer technology, and Internet of Things technologies by government agencies to streamline, optimize, integrate, and reorganize government management and service functions on the Internet, breaking the constraints of time, space, and regulations. Data sharing is possible, which improves the efficiency of collaborative work of government agencies and the efficiency of civil affairs, and enhances the government’s social governance capabilities and public service capabilities, as shown in Fig. 3.
Application layer
Smart management
Smart industry
Smart people's livelihood
Security layer
Cyber security
Application security
Data Security
Data layer
Government cloud
Communication layer
Fig. 2 The overall architecture of a smart city
Industry cloud
Public cloud
Perceptual layer
Impact of Smart Cities on Resource Conservation Based …
5
Government window for receiving and sending information externally
Tax
Government hotline center
Court
Civil administration An open platform environment can provide outsourcing services for enterprises
Medical
Fig. 3 Schematic diagram of smart government work
Due to the application of big data analysis, smart government will become more intelligent. This is conducive to the open processing of information, timely access to online information and rapid processing. And it is conducive to coordination and cooperation between different departments. It can also accelerate the initial application of new modes of intelligent e-government services and mobile government services, expand personalized services, and further strengthen the direct two-way interaction and simultaneous exchange between the government and the society and the public. In big data, government management is both a database that can achieve effective connectivity, and the ability to improve coordination between government offices, greatly reducing government administrative costs. This provides strong support for government decision-making. The stability of “smart” will promote smart cities to be smarter, more scientific and more efficient.
3.2 Impact of Educational Resources The cloud-based education support platform will fully integrate various high-quality teaching resources, platforms, applications, etc. in the education system, and build a unified intelligent open architecture cloud computing platform to provide users with leased or free services to meet users through various The terminal application fulfills the needs of teaching, learning, management, scientific research, social interaction, etc., and realizes the release of educational information, access to teaching resources, interactive teaching, statistical education information and data, formation of scientific decision-making, implementation of educational evaluation, and collaborative research.
6
Y. Chen and Y. Lin
3.3 Impact of Logistics Resources By implanting sensor chips (nodes) in logistics commodities, every link in the supply chain of purchase, manufacturing, packaging, transportation, distribution, sale, and service can be detected and mastered without errors. These perceptual information are seamlessly integrated with the back-end databases such as GIS/GPS, Internet, and sensors, and become a powerful logistics information network. The application of such big data not only protects the interests of customers, but also realizes the effective management of logistics information, further reducing logistics costs, thus creating a more convenient smart city.
3.4 Impact of Medical Resources Whether it is the development of drugs or the use of disease sources, data analysis can get good feedback. The electronicization of a large number of cases in the hospital is more conducive to the mining of high data, and the social network provides a platform for clinical symptom communication and diagnosis and treatment sharing for chronically ill patients, and the hospital can also obtain sufficient clinical effect statistics. The difference in the way the body metabolizes drugs depends on the specific combination of genes, enzymes, and proteins, so genetic information is critical to selecting the optimal treatment. The use of big data can input the user’s daily data into the medical data system. By screening the data matching the pathogens, the infected group, scale and characteristics can be accurately found, and the treatment plan can be quickly called up. The excavation of physique will achieve the right medicine in the true sense and achieve the important goal of emergency management.
3.5 Impact of Traffic Resources Similarly, in the transportation sector, we can still see the impact of big data analytics on smart cities saving transportation resources. Smart transportation is an aspect of a smart city and a new way of travel, unlike traditional transportation. As shown in Fig. 4, the traffic road information is collected in real time, and the information processing of the big data platform is performed to guide real-time traffic according to the analysis result. This provides a good support for the good operation of urban traffic. Through real-time command, the road resource is well utilized and the transportation resources are saved.
Impact of Smart Cities on Resource Conservation Based …
Data collection
7
Analysis result Big data platform
Fig. 4 Schematic diagram of smart traffic
4 Summary Big data is becoming a new driving force for the smooth flow of smart cities, and it has become an invisible operational resource for the construction and management of smart cities. With the right use of big data, the city will explode with amazing energy. Therefore, big data is not only an important driving factor for the future economic and social development of the city, but also a trans-ageal change in the development of human society in a certain sense. The resource management of smart cities is inseparable from the innovation of the application, service and management model of big data related technologies and products, and the exploration of converged services and operation modes.
References 1. Enayet, A., M.A. Razzaque, and M.M. Hassan. 2018. A mobility-aware optimal resource allocation architecture for big data task execution on mobile cloud in smart cities. IEEE Communications Magazine 56: 110–117. 2. Mahapatra, C., A.K. Moharana, and V. Leung. 2017. Energy management in smart cities based on internet of things: Peak demand reduction and energy savings. Sensors 17: 2812. 3. Islam, M.M., M.A. Razzaque, and M.M. Hassan. 2017. Mobile cloud-based big healthcare data processing in smart cities. IEEE Access 5: 11887–11899. 4. Mehmood, R., R. Meriton, and G. Graham. 2017. Exploring the influence of big data on city transport operations: A Markovian approach. International Journal of Operations & Production Management 37: 75–104. 5. Li, R., Z. Zhao, and C. Yang. 2018. Wireless big data in cellular networks: The cornerstone of smart cities. IET Communications 12: 1517–1523. 6. Ngai, E., F. Dressler, and V. Leung. 2017. Guest editorial special section on internet-of-things for smart cities and urban informatics. IEEE Transactions on Industrial Informatics 13: 748–750. 7. Shirtcliff, B. 2015. Big data in the big easy: How social networks can improve the place for young people in cities. Landscape Journal Design Planning & Management of the Land 34: 161–176. 8. Falco, S.D. 2019. Are smart cities global cities? A European perspective. European Planning Studies 27: 1–25. 9. Garg, S., A. Singh, and K. Kaur. 2019. Edge computing-based security framework for big data analytics in VANETs. IEEE Network 33: 72–81. 10. Streitz, Norbert. 2019. Beyond ‘smart-only’ cities: Redefining the ‘smart-everything’ paradigm. Journal of Ambient Intelligence and Humanized Computing 10: 791–812.
8
Y. Chen and Y. Lin
11. Venkatesh, J., B. Aksanli, and C.S. Chan. 2018. Modular and personalized smart health application design in a smart city environment. IEEE Internet of Things Journal 5: 614–623. 12. Hossain, M.S., G. Muhammad, and S.U. Amin. 2018. Improving consumer satisfaction in smart cities using edge computing and caching: A case study of date fruits classification. Future Generation Computer Systems 88: 333–341.
Water Level Measurement Device Jian Huang
Abstract In order to detect water level information accurately, a new sensing technology based on capacitance sensing principle is adopted. A long rectangle metal sheet is inserted into the water. When the water level changes, the parasitic capacitance of the metal sheet will change. using the high precision and digital capacitive sensor FDC2214 senses this slight change and converts it into a digital output of up to 28 bits, data are sampled by the IIC interface, connected it to the high-performance microprocessor STM32, STM32 can efficiently sample and process these data. In programming the software, a multitude of data are sampled each time, and mean filtering algorithm is adopted to eliminate the interference, finally, we accurately acquire the information of water level. The experimental results show that this method can quickly detect the level of the water, the accuracy of measurement is closed to 1 mm. Keywords Water level detection · Capacitance sensing · FDC2214 · Mean filtering algorithm
1 Introduction Water level detection plays an important role in water resources protection and disaster prediction. Literature [1] proposes a water level detection method based on image processing. The video image is de-noised, the boundary is extracted, and the water level is calculated in segments. Literature [2] Template image is designed according to the pattern of standard two-color water gauge, threshold is set, image information is binarized, and water level is detected in horizontal projection curve of binary image. Literature [3] Improves the anisotropic diffusion filter (IADF) algorithm to read the image information of water level acquisition intelligently.
J. Huang (B) Xijing University, Xi’an, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_2
9
10
J. Huang
2 System Struct The system uses channel 0 of FDC2214 to detect parasitic capacitance in current air environment and channel 2 to detect parasitic capacitance in current liquid environment. For reference, the parasitic capacitance of channel 1 is used to detect the change of water level. When channel 1 is used to detect the parasitic capacitance, one side copper clad plate is inserted into the liquid, part of which is exposed in the air and part of which is in the liquid. The measured values of these three channels are output to STM32F103ZET6 through IIC interface. After the data are processed by software, the values will be transmitted to serial port or sent to LCD display through serial port. The whole system uses 3. 3 V DC power supply.
3 Main Working Principles and Techniques 3.1 Basic Principle of Capacitance Sensing FDC2214 is a sensor based on capacitive sensing technology. There are four channels, 0–3. For each channel, its working principle is the same. Take channel 0 as an example, its equivalent circuit is shown in Fig. 1. The sensing plate 1 is a one-sided copper clad sheet inserted into the water. When the water level changes, its value changes, which is expressed by Cx1. C and C X1 are connected in parallel to form an oscillating circuit with inductance L. The oscillation frequency FS is calculated by formula (1) and (2). Formula (3) calculates f r as a reference frequency. Formula (4) finally obtains the digits up to 28 bits after conversion. fs =
1 √ 2π lcx
(1)
In formula (1), L is an 18 H inductance, CX is the equivalent capacitance of capacitor C and C X1 after parallel connection, and the inductance L and CX are Fig. 1 Channel 10 equivalent circuit
Water Level Measurement Device
11
connected in parallel to generate an oscillation circuit with the oscillation frequency of f s . cx = c + cx1
(2)
In formula (2), CX is the equivalent capacitance of CX1 and C after parallel connection. fr =
f clk ch0_sel
(3)
In formula (3), FR is the reference frequency and f clk is the input frequency of FDC2214, which is 40 MHz. Ch0_sel is implemented by software setting the internal register 0 × 14 of FDC2214 to realize the frequency division of f clk . When testing, it is set to the second frequency division. The f r constant is a fixed value of 20 MHz. D AT A0 =
fs × 228 fr
(4)
In the above formulas, because the change of Cx1 in formula (2) will cause the change of Cx, which will cause the change of FS in formula (1). When it is brought into formula (4), the 28-digit DATA0 can be obtained.
3.2 Working Principle of Water Level Detection In order to improve the data acquisition rate, 40 MHz active crystal oscillator [4] is needed. In order to enhance the reliability and practicability of the system, it is necessary to test the environment. Channel 0 of FDC2214 detects the capacitance value of the current air environment, and Channel 2 detects the capacitance value of the measured liquid environment, and immerses it completely in the liquid when measuring. The above two measurements are taken as reference values. Channel 1 connects a one-sided copper clad sheet and inserts it into the liquid, part of which is exposed in the air. When the water level changes, the parasitic capacitance capacity of the copper clad sheet will change. FDC2214 is sensitive to this change and converts it into up to 28-Bit binary digits, which are transmitted to the high-performance microprocessor STM32F103ZET6 through the IIC interface to detect and process the data. The calculation of water level is carried out by formula (5). L =h×
C L − C L (0) CRL − CRE
(5)
12
J. Huang
4 Software Flow Chart and Main Technologies 4.1 Software Flow Chart Software processing. First, the serial port, SPI, IIC, timer and so on are initialized. After initialization, the values of channel 0, channel 1 and channel 2 of FDC2214 are read by IIC interface. Because of interference, mean filtering algorithm is needed to remove interference [5]. After many times of acquisition, the functional relationship between the acquisition value and water level information is obtained (given in the test part). For each acquisition value, water level information is obtained by calculation. These messages are sent to the computer through the serial port or displayed on the LCD screen.
4.2 Software Filtering Algorithm In data acquisition. The FDC2214 data of each channel should be collected many times. For example, 100 times, and then sorted all the data in order from small to large. In order to remove interference effectively, 20 maxima and 20 minima are removed, and the remaining 60 summations are used to calculate the mean, which is the final value of this acquisition.
5 Test According to the above principle, the hardware circuit is designed and the program is written. After debugging, the test sample is made. During the test, the whole copper clad laminate was exposed to air, and the sampling value was 6535. Then the whole copper clad laminate was immersed in water, and the sampling value was 6426. Gradually add water to the water tank and get the data shown in Table 1. As can be seen from Table 1, with the increase of water level, the measured value gradually decreases. In order to get the accurate relationship between water level and measured value. Continue to carry out more detailed measurements, each time the water level increases by 1 cm, record the measured values, import these data into MATLAB, after curve fitting, the following linear relationship can be obtained: y = 6534 − 6.301x
(6)
Water Level Measurement Device Table 1 Measurement results of different gesture recognition
13 No.
Level (cm)
Measurement
1
0
6535
2
0.5
6530
3
1
6527
4
1.5
6524
5
2
6521
6
2.5
6518
7
3
6515
8
4
6508
9
5
6502
10
6
6496
11
7
6489
12
8
6549
13
9
6474
14
10
6470
15
12
6459
16
14
6445
17
16
6432
6 Conclusion In this paper, a new water level measurement method is proposed. Based on capacitance sensing technology, the corresponding hardware circuit is designed, and the software is programmed. Samples are made, a large number of data are measured, and the linear relationship between water level height and measured value is determined, which can accurately measure water level height. Compared with image processing technology, this technology has the advantages of simple hardware circuit, strong anti-interference ability, high recognition rate and accurate measurement, and has certain practical value.
References 1. Bao, Jiang, Qingchuan Tao, and Peng Zhang. 2015. Water level line detection algorithm based on image processing. Hydropower and Energy Science 33 (4): 96–99. 2. Zhang, Zhen, Yang Zhou, Huibin Wang, Hongmin Gao, and Haiyun Liu. 2018. Image water level measurement with standard two-color water gauge. Journal of Instruments and Instruments 39 (9): 236–245. 3. Feng Guang, Changsheng Zhang, Ziyu Liu, Chuan Li, Bin Qian, and Hanping Zhang. 2016. IADF algorithm in water level image measurement of bicolor water level gauge. Sensors and Microsystems 35 (10): 148–151.
14
J. Huang
4. Sun, Bin, Changsheng Zhang, Ziyu Liu, Bin Qian, and Haiyong, Tian. 2015. HVPL algorithm in water level visual detection of two-color water level gauge. Control Engineering 22 (3): 413–417. 5. Bao, Shufeng, Yan Lou, Zhiliang, Dong, Fei Niu, and Rongxing Xie. 2017. Research and development of new groundwater level testing device under negative pressure environment. Geotechnical Mechanics 38 (10): 3067–3073.
Optimization of Urban Transportation Network Path Dandan Zhang and Haiyun Zhu
Abstract With the rapid growth of China’s economy, the urbanization process has been accelerating, urban road congestion has become increasingly serious, and traffic problems such as urban traffic environment pollution have become a hot spot of concern for the whole people. At present, the ways to solve road traffic problems are mainly divided into the class of strengthening road construction, increasing the road capacity to develop intelligent transportation systems, and improving road operation efficiency. However, under the condition of limited urban land resources, it is undoubtedly the most effective way to optimize road traffic organization and management through intelligent transportation system. This paper focuses on the dynamic path selection model and algorithm under multi-source traffic information, focusing on the traveler path selection behavior under multi-source traffic information, the dynamic path selection model and algorithm before travel, and the bus route selection under the influence of transfer behavior. Models and algorithms, as well as dynamic adaptive path selection models and algorithms in travel. The composition of the traffic network is discussed. The construction and expression of the traffic network model are expounded. The morphological characteristics and weight characteristics of the traffic network model are analyzed. The geometric characteristics of the traffic network and the accessibility index are used to analyze the morphological characteristics of the traffic network model. Evaluation and analysis. Keywords Network path problem · Urban traffic · Multi-source traffic · Path optimization
D. Zhang (B) · H. Zhu Zhengzhou Technical College, Zhengzhou 450121, China e-mail: [email protected] H. Zhu e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_3
15
16
D. Zhang and H. Zhu
1 Introduction With the continuous increase of the number of cars owned by Chinese residents, the development speed of China’s road infrastructure is backward [1–4]. From superlarge cities to third-tier cities, traffic congestion is becoming more and more serious, and traffic congestion is endurance for motor vehicles and roads. Such resources bring losses [5, 6], which also increases the time and space resource consumption of the traveler on the road, which in turn leads to an increase in the travel cost of the residents and the production cost of the society. In addition, when traffic is congested, various pollutants emitted by automobiles, such as exhaust emissions, also pollute the urban environment, thus increasing external costs [7–9]. The purpose of the traffic network model is to describe both the characteristics of the traffic network and the application of the algorithm. The optimal path analysis algorithm is a method specifically designed to solve the optimal path problem. The system of optimal path analysis algorithms is huge, and it is very necessary to establish a classification system [10–12]. In the face of road traffic congestion and the safety and environment brought about by the increase in the number of cars, under the premise of limited road investment, this paper mainly uses the theoretical knowledge of complex networks to visualize the public transportation network. The path selection problem based on real-time traffic flow also provides guidance for urban traffic grooming, flow control, and driving route selection at the present stage. Finally, the traffic network is optimized for different time periods.
2 Multi-source Traffic Information In the context of the highly informatized process in the world, the field of intelligent transportation systems also presents a development trend based on multi-source traffic information, diversified system integration as the main form, and multi-level traffic management. As the supporting condition for the realization of various functions of the intelligent transportation system, multi-source traffic information is the core content. It is the collection, transmission, storage, analysis, processing and application of information that realizes the transition of traffic management from simple static management to intelligent dynamic management, which facilitates traffic static and dynamic information to the maximum extent, and is maximized by travellers, drivers, Traffic managers, traffic researchers and government agencies share and utilize, thus realizing the dynamic optimization of the transportation system, effectively meeting the needs of people for the development of transportation systems. Under the background of multi-source development of information, how to make full use of dynamic and static traffic information to realize the rationality of urban road network traffic flow, to achieve balanced road network traffic distribution and effectively alleviate traffic congestion, is the core of intelligent transportation system One of the features.
Optimization of Urban Transportation Network Path
17
The connotation and extension of multi-source traffic information should start with the elements of the traffic system, which consists of four basic elements: travelers, drivers and managers, goods, various kinds of vehicles and corresponding traffic facilities. Therefore, the strict definition of traffic information refers to all the information related to the four major components of the traffic system. From the perspective of traffic management, it mainly refers to the traffic information related to traffic operation and traffic management, which is the basis of the research in the field of intelligent transportation system. At the same time, due to the development of computer technology, network technology, communication technology, electronic technology and so on, traffic information is facing multi-source heterogeneous composition mode, which can be divided into static information and dynamic information from the frequency of information change. From the type of information, it includes traffic geographic information, traffic status information, public traffic information, traffic policy and regulation information, etc. These traffic information are manifested in different types, different organization and processing methods, and different service modes. The basic categories of multi-source traffic information are static traffic information and dynamic traffic information. Static information is a relatively stable traffic information for a relatively long period of time. This information is roughly information that characterizes the performance and characteristics of highways, urban roads, expressways, roads, parking lots, etc., which are the regular components of the transportation system, including related basic geography. Information such as road network distribution, functional cell division, intersections, road sections, etc., road network basic information, road grade, length, toll and other traffic management information such as limited traffic, traffic control, one-way traffic, etc. Dynamic traffic information. Dynamic traffic information refers to specific traffic information that a road traffic network participant has that changes with the actual traffic flow state. It mainly includes traffic information such as traffic flow, speed, and density, traffic dynamic control information, and traffic environment information. At the same time, in the process of dynamic and static information storage and application of intelligent transportation system, according to different data utility, traffic information is divided into transient, shortterm and historical categories. The transient information is to meet the requirements of real-time traffic control and guidance. The short-term information collected in real time is the information collected in a long period of time for the development of a specific traffic plan. The historical information is the previous traffic information selectively stored for the traffic management service, and has a long acquisition time span. Extracting the large sample size can provide data support for traffic evaluation, traffic planning and other program design.
18
D. Zhang and H. Zhu
3 Overview of Real-Time Traffic Information Informatization represents the ability and level of information technology and the integration of resources in a country or region. It is based on database technology, modern communication and network, and builds a large-scale, top-down, organized information network system. It is a kind of intelligent tool that cultivates and develops computer-based, and it is also becoming a new productive force. It can greatly improve the efficiency of people’s work and the productivity of equipment, and provide strong technical support for the improvement of human living standards and quality. It includes five basic processes: information acquisition, information transmission, information processing, information regeneration, and information utilization. A schematic diagram of the acquisition and sharing of real-time traffic flow information is shown in Fig. 1. The real-time traffic information management system realizes deep excavation and refinement of traffic data to generate a variety of traffic data information and transmit it to cars in the road. The working principle of the system is: First, identify the type of data (discrete or continuous) by k-cluster algorithm or heuristic algorithm, deal with redundancy and noise, and improve the rationality and effectiveness of the data. And intelligently supplement the missing data. Second, build a multi-source data fusion model with high correlation, build a data source and a type-rich database or data source, and a traffic status indicator system that conforms to the actual urban environment. Third, use measurement The method of economics or statistical analysis normalizes the traffic flow data collected from various channels, constructs the vehicle path feature database, and combines the real-time data of vehicle travel with the positioning data formed by GPS and Beidou navigation satellite to construct a traffic prediction model. Realized dynamic traffic forecasting.
Fig. 1 Schematic diagram of real-time traffic flow information acquisition and sharing
Optimization of Urban Transportation Network Path
19
4 Optimization of Urban Transportation Network Path Problem 4.1 Multi-objective Factors to Be Considered in Optimal Path Planning The multi-objective factors influencing the optimal path planning considered in this paper include space factor, time factor, cost factor and security factor. (1) Space factor The spatial factor is the influencing factor of measuring the spatial distance to the optimal path planning. Traditional optimal path planning is mostly based on spatial factors. The theoretical basis for the influence of spatial factors on path planning is Tobler’s first law of geography, that is, there is a correlation between everything, and things with similar distances are more closely related. In the traffic network, according to Tobler’s first law of geography, it can be considered that the interaction between two nodes, between nodes and hubs, and between hubs decreases as the distance increases. The measure of spatial factors can be quantified by the gravity model method in spatial accessibility. (2) Time factor Time-optimal path planning is getting more and more attention. Travel time data is based on time-optimal path planning, and its quality determines the accuracy of path planning. The road length can be obtained by calling the corresponding arc length, and the estimated speed can be obtained by acquiring the road design speed corresponding to the road grade attribute value of the road segment. Taking highways as an example, the estimated speed can be as shown in Table 1. (3) Cost factor The cost factor is the factor that measures the cost of the optimal path planning. The cost involved in this article refers to the narrow cost, including the fuel consumption and depreciation expenses of the vehicle, the road and bridge fees and parking fees used, and the cost of the train ticket. At present, for road networks, the cost is mainly concentrated on fuel consumption costs and road and bridge costs, and depreciation expenses and parking costs are generally not considered. The cost of railway, air and water transport is generally included in the cost of the vehicle and boat, which can be obtained by looking up the corresponding attribute data. Table 1 Road average speed Road grade
Highway
State road
Provincial road
City street
County road
Township road
Speed (km/h)
95
80
65
40
30
12
20
D. Zhang and H. Zhu
(4) Security factors The safety factor in this paper only considers the traffic accident rate. In the traffic network, there are many factors influencing the security. Taking the traffic accident rate as an example, the traffic accident rate of each arc segment is solved, and the safety weight is assigned to the arc segment attribute.
4.2 Network Shortest Path Problem Optimization For network models with different characteristics, the definition of the shortest path between the relevant source-target nodes (O-D) and their optimization methods are usually different. The shortest path problem of the same network model also leads to different optimization algorithms due to different optimization goals. In order to study the shortest path problem more systematically, classification is performed according to different classification indicators. According to the understanding of the edge and node attribute values in the network, the network shortest path problem is divided into deterministic and random network shortest path problem. The deterministic network shortest path problem is that the attribute related attribute value in the network is a clear value. The stochastic network shortest path problem indicates that the attribute values associated with the problem in the network are unknown in advance, and the values of these attributes obey a certain probability distribution. The essence of multi-objective optimization is to coordinate tradeoffs and compromises among objectives, so that all objectives can be optimized as far as possible. How to obtain the cooperative optimal solution of these objectives has always been a research hotspot in operational research and geographic information science, and also a basic problem in the analysis of GIS network. The multi-objective optimization problem is to find the best or more satisfactory path planning scheme according to certain conditions (objectives). The multi-objective optimization problem is to find the best or more satisfactory path planning scheme according to certain conditions (objectives). Its mathematical model is as follows: The objective function is: ⎧ ⎨ max(min) f 1 (x1 , . . . , xn ) ··· ⎩ max(min) f m (x1 , . . . , xn )
(1)
⎧ a11 x1 + a12 x2 + · · · + a1n xn ≤ (=, ≥)b1 ⎪ ⎪ ⎨ a21 x1 + a22 x2 + · · · + a2n xn ≤ (=, ≥)b2 ⎪ ... ⎪ ⎩ am1 x1 + am2 x2 + · · · + amn xn ≤ (=, ≥)bm
(2)
Satisfies the constraints:
Optimization of Urban Transportation Network Path
21
Necessary node Path constraint Necessary arc
Traffic rules Constraints Cost constraint
Time window Time constraint Soft window
Fig. 2 Constraints for path planning
The multi-objective factor optimal path planning model in this paper mainly considers four objective factors: space, time, cost and security. So the objective function is: C = min(θ1 Cl + θ2 Ct + θ3 Cc + θ4 Cs )
(3)
Common constraints are path constraints, time constraints and cost constraints as shown in Fig. 2.
5 Conclusion With the rapid development of economy and the acceleration of urbanization process, urban traffic congestion, traffic safety and other road traffic problems continue to spread, not only causing huge economic losses, but also aggravating environmental pollution and energy consumption, which has a serious impact on daily activities of residents such as life, work, travel and so on. At the same time, because of the low road area ratio and the serious mixed traffic flow, it is more difficult to solve the urban traffic problems in China. Optimal path analysis of traffic network is a complex problem involving multi-disciplinary fields. It needs different perspectives and methods such as applied mathematics, traffic economy, geographic information and so on. This paper analyses and evaluates the morphological and weighted features
22
D. Zhang and H. Zhu
of traffic network model, classifies and summarizes the optimal path analysis problems, establishes the classification system of the optimal path analysis algorithm, and studies the applicability of the algorithm, constructs the optimal path planning model based on multi-objective factors and verifies its correctness.
References 1. Chen, D., M. Hu, H. Zhang, et al. 2017. A network based dynamic air traffic flow model for en route airspace system traffic flow optimization. Transportation Research Part E: Logistics and Transportation Review 106: 1–19. 2. Xie, X.F., and Z.J. Wang. 2018. Combined traffic control and route choice optimization for traffic networks with disruptive changes. Transportmetrica B: Transport Dynamics 7 (3): 1–20. 3. Zhao, H., Z. Dong, Z. Dong, et al. 2015. Vehicle route assignment optimization for emergency evacuation in a complex network. Journal of Intelligent & Fuzzy Systems Applications in Engineering & Technology 28 (1): 107–116. 4. Li, P., P. Mirchandani, and X. Zhou. 2015. Solving simultaneous route guidance and traffic signal optimization problem using space-phase-time hypernetwork. Transportation Research Part B Methodological 81 (1): 103–130. 5. Xu, J., Y. Gao, C. Liu, et al. 2015. Efficient route search on hierarchical dynamic road networks. Distributed & Parallel Databases 33 (2): 227–252. 6. Cai, K.Q., J. Zhang, M.M. Xiao, et al. 2017. Simultaneous optimization of airspace congestion and flight delay in air traffic network flow management. IEEE Transactions on Intelligent Transportation Systems (99): 1–11. 7. Niu, S., J. Zhang, Z. Fan, et al. 2015. A method of UAVs route optimization based on the structure of the highway network. International Journal of Distributed Sensor Networks 2015 (1): 1667–1670. 8. Miao, C., H. Liu, G.G. Zhu, et al. 2018. Connectivity-based optimization of vehicle route and speed for improved fuel economy. Transportation Research Part C: Emerging Technologies 91: 353–368. 9. Yang, C., J. Mao, and W. Peng. 2016. Air traffic network optimization via Laplacian energy maximization. Aerospace Science and Technology 49: 26–33. 10. Li, X., J.Q. Sun. 2018. Signal multiobjective optimization for urban traffic network. IEEE Transactions on Intelligent Transportation Systems (99): 1–9. 11. Wang, S., X. Cao, L.I. Haiyun, et al. 2017. Air route network optimization in fragmented airspace based on cellular automata. Chinese Journal of Aeronautics 30 (3): 1184–1195. 12. Xiao, M., K. Cai, and H.A. Abbass. 2018. Hybridized encoding for evolutionary multi-objective optimization of air traffic network flow: A case study on China. Transportation Research Part E: Logistics & Transportation Review 115: 35–55.
Identification and Early Warning of College Students’ Psychological Crisis Based on Big Data Weie Xiong
Abstract Nowadays, the application and popularization of new media such as Weibo, WeChat and QQ make big data’s age come quietly, which will have a great influence on people’s life style, personal thought and behavior, etc. On the basis of analyzing the massive data of college students, this paper designed and developed the prototype system of big data’s analysis for college students’ mental health education, predicted the tendency of students’ psychological behavior and constructed the individualized emergency management mechanism of college students’ psychological crisis, so that to enhance the real-time and effectiveness of the management of psychological crisis in colleges and universities, and to innovate the mental health education of college students. Keywords Big data · College students · Psychological crisis
1 Introduction At present, the application of big data’s technology goes deep into various sectors of the society. In 2013, Big data’s application appeared in the “12th Five-year Plan for the Development of Cloud Science and Technology in China” issued by the Ministry of Science and Technology, and in the “Twelfth Five-year Plan for the Development of the Internet of Things” issued by the Ministry of Industry and Information Technology. Both documents are proposed to focus on supporting big data technology [1]. In the field of psychology, the research on psychological crisis early warning and suicide prevention strategy of college students under the background of big data will be a new trend in the future. We should make use of new media, innovate the carrier and platform of psychological crisis early warning, establish effective interactive mechanism, and make college students change from passive intervention object to active self-intervention subject, so that to fully reflect the subjectivity of college W. Xiong (B) Hunan Judicial Police Vocational College, Changsha 410131, Hunan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_4
23
24
W. Xiong
students [2, 3]. Moreover, we should also give full play to the enthusiasm and initiative of college students in the early warning of psychological crisis and suicide prevention, so as to achieve the good effect of intervention in psychological crisis.
1.1 The Importance of Using Big Data Technology to Identify and Warn College Students’ Psychological Crisis In recent years, there is an increasing number of incidents of students leaving home and hurting themselves caused by psychological problems, which has caused irreparable losses to the students and their families. This not only seriously affects the study, life and daily teaching of college students, but also is not conducive to the harmony and stability of colleges and universities. Through the establishment of big data knowledge base, model base, big data technology applied to early warning of college students psychological crisis and suicide prevention strategy research work, we need to fully mine the data under the support of the bottom data, and use the popular technologies such as ontology description, reasoning mechanism, machine thinking and so on, so that to design and develop big data prototype system which is suitable for the early warning of college students’ psychological crisis. Only in this way can the intelligence and humanization of the system be realized [4]. This is of great significance to the realization of individualized emergency management of students’ psychological crisis and the related theoretical research of information processing technology.
1.2 Analysis on the Current Situation of Identification, Early Warning and Suicide Prevention of College Students’ Psychological Crisis 1.2.1
Early Warning Indicator System
The early warning indicator system is a crisis prediction system by monitoring the situation of the early warning objects, events and individuals, and analyzing the causal relationship between the early warning objects and the state of crisis development according to the early warning indicators. The main components of early warning indicators are: first, the source of stress can be divided into independent stress, learning stress, future stress, communication stress, family and economic stress, major and sudden stress, etc. Second, stress response, mainly can be divided into cognitive response, emotional response, will response, behavioral response and physiological response; third, individual crisis susceptibility factors mainly refer to individual characteristics and individual background, individual characteristics focus on personality, coping style, attribution style, social support and self, etc. Individual
Identification and Early Warning of College Students’ …
25
background includes gender, nationality, grade, major, family source, self-evaluation of academic achievement, parental education, family structure and other indicators [5].
1.2.2
Analysis on the Causes of Suicide of College Students
It is generally believed that suicide is a kind of psychological crisis, and the causes of college students’ suicide are very complex, which is the result of interaction between internal and external factors such as personal factors, family conditions, social factors and so on. Suicide of college students is attributed to self-factors, external environmental factors and inducing factors. The defects in college students’ psychological tolerance, temperament, personality and outlook on life are the core factors that affect suicide behavior. However, college students encounter setbacks in love, too much pressure on learning, and tension in interpersonal relations are the cause of suicide. The emergence of suicide psychology of college students is not sudden or accidental, so it is a system; there is a process of change and development. Negative events play an important role in the formation of college students’ suicidal ideation, which is a very important external factor [6].
1.2.3
Suicide Intervention of College Students
The suicide psychological intervention system of college students is a system which can take prompt and effective measures to deal with the suicide of college students. In addition, this system can give support and help and avoid the occurrence of suicide. The system consists of three levels: social level, school level and family level, among which the school level is the key, including four subsystems: prevention system, early warning system, disposal system and tracking system. The four subsystems play an important role in suicide prevention, discovery, control and solution. College students’ suicide psychological prevention should construct a perfect network mechanism of college students’ suicide prevention so as to play a real role in the prevention of college students’ suicide. Through the mental health propaganda network, the consultation network, the crisis intervention early warning network, the psychological crisis rescue intervention network and so on, we can construct the suicide psychological prevention mechanism of college students.
26
W. Xiong
2 Construct the Emergency Management Mechanism of College Students’ Psychological Crisis Under the Background of Big Data 2.1 Construct a Six-Tier System for Emergency Management of Psychological Crisis in Schools In the aspect of emergency management of college students’ psychological crisis, schools, mental health education centers, families, colleges, classes and dormitories should be set up six-level psychological emergency management system. The school is responsible for overall planning; the psychological counseling center is responsible for professional assistance; the family is responsible for providing psychological support and emotional connection for the growth of college students; the college is in charge of arriving at the scene at the first time when an unexpected situation occurs, and controlling the situation and understanding the causes and consequences of the matter. Classroom and dormitory are the collective place for students to study and live. Class cadres are responsible for regularly providing information to counselors, so that counselors can understand the students’ psychological status, and guide and refer the students who have psychological crisis in a timely manner [7]. The six-tier system is not only the most primitive source of psychological information for college students, but also the most powerful grooming network for psychological intervention and treatment. Within the system, schools and families occupy a dominant position, and good interaction must be established. Only in this way can the system really have long-term vitality.
2.2 Construct a Psychological Crisis Treatment System The core of emergency management system of psychological crisis is to construct psychological crisis treatment system. This should be carried out not only by the psychological crisis advisory group and treatment group of mental health education center, but also by college counselors actively involved in psychological emergency management and auxiliary treatment. In the course of career planning education and life safety education, we should guide and motivate students positively. We also need to coordinate and cooperate with mental health education to systematize and diversify all kinds of educational contents. We should make great efforts to construct the sharing platform of college students’ psychological crisis treatment resources, actively integrate the superior resources both inside and outside the school, and focus on the mental health problems of college students and “consult”, so as to share the platform to absorb and expand the superior resources in all aspects. Only in this way, can we build a strong student psychological crisis therapy professional strength reserve, and improve the professional and scientific level of psychotherapy [8, 9].
Identification and Early Warning of College Students’ …
27
2.3 Construct a Psychological Crisis Relief System Due to the fierce competition in society and the higher demands on students in colleges and universities, the students’ learning pressure is generally greater at present. Moreover, most of the students study alone, and there is a lack of communication and communication between the students. Therefore, the college should establish a psychological crisis relief system. When the idea or tendency of students’ extreme behavior is found, the college counselor should actively assist the psychological counselor to guide and correct the students’ thinking and behavior [10]. Through group activities, such as relying on various competitions, social practices, volunteer services, and so on, students can discover their strengths and weaknesses, understand themselves, and communicate with each other when facing challenges or difficulties together. Moreover, they can help each other to overcome the psychological crisis and enhance the ability to adapt to the social environment. In recent years, the author used the prototype of big data technology development to carry out the early warning work of college students’ psychological crisis systematically, and achieved some results. The warning system uses green, yellow, orange and red, depending on the severity of the psychological crisis. Green means normal, and yellow indicates low-risk state of alert, which means that students’ psychology has unstable factors and is vulnerable to various influences and may develop into crisis, so early warning and prevention should be done well [11]. Orange indicates a moderate crisis alert, requiring school departments to intervene and intervene students in a timely manner. Red indicates high-risk alert status, so we should immediately intervene and evaluate and prevent crisis. This year, our school has successfully warned and has dealt with 6 psychological crisis incidents, so that to ensure the harmony and stability of the school.
3 Summary Taking the psychological crisis early warning and suicide prevention strategy of college students as the object, we should carry out the applied research work of big data’s technology pertinently, which has very important practical application value. We need to make use of the application value of big data’s technology, such as rapidity, relevance, predictability, accuracy, practicality and so on, so that to quickly and accurately judge the state and degree of the person at risk, and to effectively formulate targeted crisis intervention programs. In this way, college students can change from passive intervention objects to active self-intervention subjects, and can fully reflect the subjectivity of college students, so that to give full play to their enthusiasm and initiative in psychological crisis early warning and suicide prevention. Thus, we can give full play to the psychological crisis intervention and controlling.
28
W. Xiong
References 1. Liu, Zhenhai, and Hui Wang. 2017. Exploration on self-identity crisis and psychological intervention of college students in local undergraduate universities. Adult Education in China (21): 50–53. 2. Guo, Jing, Lili Ji, Liping Jia, Lirong Yu, and Guohua Lu. 2019. The role of psychological crisis vulnerability between college students’ life event stress and psychological crisis. Chinese School Hygiene 40 (1): 104–106+109. 3. Chen, Jianwen, and Qingxia He. 2018. Linkage between key-to-key and face-to-face: a new pattern of mental health education for college students. University Science of Education (3): 33–37. 4. Chen, You. 2018. A probe into the intervention method of psychological crisis for art graduate students–comment on the intervention of psychological crisis of college students. Chinese Journal of Education (5): 119. 5. Wu, Caizhi, Guangrong Jiang, and Wenting Duan. 2018. Current Situation and countermeasures of suicide among college students in China. Heilongjiang Higher Education Research 36 (5): 95–99. 6. Cai, Chen, and Yang Tian. 2018. Influence of campus experience input on psychological and social development of Enshi Tujia college students. Research on ethnic Education 29 (2): 80–85. 7. Lin Fan. 2018. An analysis of the application of psychological tenacity in the intervention of psychological crisis in colleges and universities. Party Building and Ideological Education in Schools (7): 80–81. 8. Zhou, Hongxia. 2018. Case study on coping with psychological crisis of college students from the perspective of ecosystem. Academic Journal of Education (2): 87–94. 9. Zhang, Pengcheng, and Ning Chen. 2018. The type, mechanism and intervention of college students’ network psychological crisis. Contemporary Youth Studies (1): 124–128. 10. Ai, Bo, and Tao Wang. 2018. Mental health education of college students and coping with psychological crisis-comment on mental health education of college students. Chinese Journal of Education (1): 136. 11. Zhou, Zhuohong. 2017. A study on mental health education of vulnerable groups of college students from the perspective of psychological capital–taking higher vocational colleges as an example. Vocational Education Forum (35): 93–96.
Application of VR Technology in Intangible Cultural Heritage Protection Liang Li
Abstract The intangible cultural heritage is a “living fossil” which reflects the existence and development of human folk culture and lifestyle. It tells the world in a unique way about the course of human growth. However, intangible cultural heritage is a special cultural carrier with an intangible state characteristics, which brought a variety of difficulties in promoting and protecting to people. Due to the shortcomings in traditional methods, this work applied the advantages of VR technology to the protection of intangible cultural heritage, in order to achieve the sustainable development goal of making innovative and characteristic intangible cultural heritage in the protection. Keywords VR technology · Intangible culture heritage · Traditional culture
1 Introduction In recent years, there has been an international upsurge in applications for intangible cultural heritage. In particular, the success of the application for the Dragon Boat Festival in Jiangling, South Korea, has made the Chinese people reflect on why the Dragon Boat Festival, which has a history of more than 2000 years in China, was first boarded by South Korea [1]. Why are rare cultural relics in China on display in foreign museums? Some Germans even say they want to see Chinese reliefs come to Germany; some Japanese say they want to see Hmong costumes come to Japan. It is undeniable that the ownership of Chinese cultural heritage is losing and many precious intangible cultures have been scrambled by other countries [2]. We must use modern means of protection to protect cultural sovereignty. The development of VR technology provides more advanced technology for the protection of intangible cultural heritage and changes the development trend of intangible cultural heritage protection in a new way.
L. Li (B) Digital Arts Department, Dalian Neusoft University of Information, Dalian, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_5
29
30
L. Li
2 The Concept and Application of VR Technology in the Protection of Intangible Cultural Heritage 2.1 Environmental Modeling Technology Three-dimensional virtual environment is the core of VR technology. The purpose of this is to obtain the three-dimensional data of the actual environment and to establish the related virtual environment by using the obtained three-dimensional environment data according to the actual needs [3]. The construction of virtual scene is mainly three-dimensional visual modeling, including graphics-based rendering technology and image-based rendering technology. The establishment of the model basically realizes the establishment of the three-dimensional virtual environment. However, there are many shortcomings and limitations in the three-dimensional software, thus the established model can not completely accord with the actual things in the detail processing. Until the end of 1990s, Apple company launched the VR technology (QuickTimeVR) system based on still image, which is a virtual reality system based on cylindrical panoramic image. The system can support the users to look around 360° in the virtual environment, walk along the fixed route and see all the high-quality real photos without knowing the 3D geometric information sheet of the image [4].
2.2 Stereo Synthesis and Stereo Display Technology In the real world, the sound we hear and the objects we see have a sense of space. For instance, the sound emitted from different sound sources can feel different sound intensity depending on the location of the sound source. The objects we see are all three-dimensional, which have different characteristics in different angles. Therefore, both objects and sound are space-occupying. However, the audio and video data we hear are played from the same speaker, thus a single tone replaces the original sense of natural space. VR technology can regain the stereoscopic space sense of sound and objects, break the defects of traditional video and audio technology and enhance the reality of virtual environment [5]. The synthesis of stereo sound in VR technology is mainly based on the design of direct sound, echo and mixed sound in surrounding environment to create a stereoscopic effect. Stereoscopic display technology is mainly realized by special stereoscopic display instruments, such as light valve glasses, helmet-mounted display and hand-held stereoscopic display equipment.
Application of VR Technology in Intangible Cultural Heritage …
31
2.3 Human-Computer Interaction Techniques Human-computer interaction technology mainly means that the user breaks away from the restriction of input devices such as mouse and keyboard. Users can first send out the demand information through gestures, voice and other body states, and then the virtual environment gives feedback and response to the commands, thus creating an immersive feeling. This technology is also realized by special sensor equipment, such as digital gloves, motion tracker and power feedback device, which can make relevant information feedback to the user’s gesture posture [6]. Virtual reality modeling language can build a three-dimensional language model base. When the speech control buttons turn on, the virtual environment will make the corresponding information feedback according to the voice of the user.
2.4 System Integration Technique Since there are a lot of perceptual information and models in virtual reality system, system integration technology is the most important part, including information synchronization technology, model calibration technology, data conversion technology, identification technology and synthesis technology. In short, the system integration technology is a systematic process of the perfect combination on the technologies used in the virtual reality environment, such as technology compatibility, playback speed and display effect [7]. In addition, the most obvious difference between intangible cultural heritage and traditional cultural heritage is that the former is a “living” cultural space, which must be associated with a specific cultural space in order to exist. Without cultural space, folk custom becomes a corpse specimen. Therefore, using VR technology to complete the transformation of the informatization form, has many advantages. (1) At present, the main means of traditional image collection is to use camera, video recording and other image equipment, which is difficult to take a complete picture for large main body. The VR technology can repair and stitch all kinds of images and simulate them into a real three-dimensional image. (2) VR technology realizes the digital management system and digital classification for the intangible cultural heritage documents, pictures, recorded sound and photographed images, in order to establish the database with pictures, text and audio-visual materials. (3) VR technology makes the static cultural heritage dynamic through living images, dynamic images and other technologies to dynamically reflect the static cultural data, thus truly making the intangible cultural heritage live. (4) The virtual reality environment not only can reproduce the real environment, but also can imagine the environment that does not exist. It can be constructed according to human needs without physical environment or development trend of the expected project, which breaks the restriction of personal factors of the inheritor.
32
L. Li
3 Case Study: Application of VR Technology in the Protection of Intangible Culture Heritage 3.1 The Significance of the Application of VR Technology in the Protection of Intangible Culture Heritage in Jiangxi Province According to a sample survey conducted in China, 26% of American tourists coming to China aim to appreciating places of interest, while 56.7% of them are most interested in the Chinese lifestyle and the local customs. The survey shows that the focus of attracting tourists is the original local culture and folk customs rather than a large number of artificial commercial facilities. Jiangxi Province is one of the best resources and environment protection provinces in China [8]. In 2009, the State Council made the decision to build the Poyang Lake Economic Circle, which is the first development project in the level of national strategy in Jiangxi Province for years. In addition, Jiangxi has rich cultural heritage and has created splendid Jiangxi culture. From the aspect of sustainable development, Jiangxi Province has great development potential both in terms of ecological environment and cultural connotation. Protecting intangible cultural heritage and developing the local tourism economy at the same time play a good role in promoting the propagation of intangible culture heritage. For example, the ceramic culture of Jingdezhen has attracted many tourists from home and abroad and brought some economic benefits. If the modern scientific and technological means such as VR technology are applied to the tourism development of intangible cultural heritage, the economic development will be greatly promoted.
3.2 Application of VR Technology in the Protection of Nuo Culture in Jiangxi Province The Nuo culture in Pingxiang is one of the most representative intangible cultural heritage in Jiangxi Province, and its most characteristic activity is the role conversion through mask, which is a kind of false act characterized by imitating the performance of the fake face to exorcise the gods and exorcism. It has formed distinct characteristics, such as the rich historical accumulation, the unsophisticated primitive form, the numerous cultural remains, the complete cultural system and the widespread distribution. Due to the lack of regional economic development and protection funds, it is difficult to adopt advanced technologies such as image rendering technology and three-dimensional display chip in VR technology directly [9]. The author considered that the “holarchy” development mode should be adopted. Under the premise of using relatively backward technologies to protect the intangible cultural heritage well, it gradually approaches to advanced technology and finally realizes the development
Application of VR Technology in Intangible Cultural Heritage …
33
mode of synchronizing with technology. For example, based on the establishment of the virtual environment, the early modeling method of VR technology can be adopted, such as the three-dimensional software modeling and the hand-drawn software, to scan the sketch through the way of three-dimensional transformation [10]. Although it lags behind the advanced technology in fidelity and efficiency, it is also a new attempt compared with the traditional protection method of intangible culture heritage. In terms of stereo effects, the stereo equipment with high cost performance can be chosen or multiple speakers can be set up to achieve similar results. In terms of service items, virtual management can be used first to use the virtual site to set up the line, evacuate the personnel and develop the whole cultural site.
4 Summary Under the impact of modern science and technology, many precious traditional cultural and intangible cultural heritage are gradually forgotten. Some intangible cultural heritages are on the verge of extinction or the loss of ownership, as a result, it is particularly urgent to seek a new technical means to save them. The successful case of VR technology has brought a lot of valuable experience and enlightenment to the protection of intangible cultural heritage. We should fully seize the opportunity and make use of advanced technology to protect our culture, in order to make the cultural construction and economic construction develop simultaneously, thus achieving the sustainable development path of protection and innovation. At the international level, we must always uphold political independence, territorial integrity and inviolability of cultural sovereignty, so as to promote the great traditional culture and intangible cultural heritage to the world stage.
References 1. Tan, Guoxin, and Lilong Zhang. 2019. Digital protection and inheritance of intangible cultural heritage. Library (4): 79–84. 2. Huo, Zhimin. 2019. Study on inheritance and protection of intangible cultural heritage about folk art in Northeast China-comment—The study of folk art heritage in Northeast China. Leadership Science (8): 2. 3. Ni, Caixia. 2019. The research status, hot spots and trends of intangible cultural heritage—In China-summary of the symposium on intangible cultural heritage and ethnic folk art discipline construction in China. Cultural Heritage (2): 139–144. 4. Hou, Xilong, Guoxin Tan, Wenjie Zhuang, and Ming Tang. 2019. Research on knowledge management of intangible cultural heritage based on related data. Journal of Library Science in China 45 (2): 88–108. 5. Ma, Xiaona, La Tu, and Yingqing Xu. 2019. Status of digitization on intangible cultural heritage. SCIENTIA SINICA Informationis 49 (2): 121–142. 6. Song, Li. 2018. A preliminary study on the supply mode of Nanyang Jade carving intangible cultural heritage digital platform under the view of internet. Art Panorama (12): 90–91
34
L. Li
7. Zong, Chuanyu. 2018. Innovative application of digital animation technology in intangible cultural heritage preservation. Art Panorama (12): 116–117. 8. Zhang, Jiayi. 2018. A study on the new media communication strategy of intangible cultural heritage—A case study of Shuishu custom in Sandu Shui autonomous county. Film Review (23): 109–112. 9. Wang, Pengfei. 2018. Application of VR technology in intangible cultural heritage protectioncomment on the frontier topic of intangible cultural heritage protection. Journal of Guangdong University of Finance & Economics 33 (6): 114–115. 10. Li, Xia. 2018. Study on the protection and inheritance of the intangible cultural heritage of the Chinese nation from the perspective of the internet. Packaging Engineering 39 (22): 92–96.
Construction of Ultimate Video Experience and Application Innovation System Based on 5G and 8K Dong Xiang, Xia Ran and Zhiqiang Xu
Abstract 5G will make the perfect presentation of 8K UHD and VR, AI, or more innovative applications possible. This paper first introduces the basic attributes of 5G and 8K, then discusses the new era of 5G to open up ultra-high-definition video applications, and then takes four fields of 8K video content production, VR 8K content production, OTT/IPTV content service and AI content service as examples. This paper probes into the innovative application of 5G 8K, and finally puts forward that the media industry should take 5G as the technology engine to layout “8K ecology” to enable the high-quality development of technology enabling media industry. Keywords 5G · 8K · VR · AI · Media integration
1 Introduction In 2019, the Chinese media industry was doomed to be no ordinary. In January 2019, the Propaganda Department of the Central Committee of the Communist Party of China listed “developing Radio and Television 5G” as one of the key tasks this year, marking that China Radio and Television Network will enter the “first year of Radio and Television 5G”. In March 2019, the Ministry of Industry and Information Technology and others issued the Action Plan for the Development of Ultra-HighDefinition Video Industry (2019–2022), which clearly put forward the overall technical route of “4K first, taking into account 8K”, and vigorously promoted the development of ultra-high-definition video industry and the application in related fields [1]. In May 2019, the Shanghai Economic and Information Commission and others issued the Shanghai Ultra-High-Definition Video Industry Development Action D. Xiang · X. Ran (B) · Z. Xu Digital Media and Creative Design Institute, Sichuan University of Media and Communications, Chengdu, China e-mail: [email protected] D. Xiang e-mail: [email protected] Z. Xu e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_6
35
36
D. Xiang et al.
Plan (2019–2022), which optimizes the ultra-high-definition video industry space from the strategic level. The main task is to build the leading “5G+8K” application demonstration area in China [2]. In the same month, at the “World Ultra-Highdefinition Congress” held in Guangzhou, eight provinces and cities, such as Beijing and Sichuan, issued policies and action plans for the development of the ultra-highdefinition video industry. The State Administration of Radio and Television says it will also speed up the upgrading of radio and television transmission coverage networks and promote the application of ultra-high-definition television in cable television, satellite television, IPTV and Internet television. In particular, everyone should accelerate the construction of mobile interactive radio and television network for 5G and create a new ecology for the development of the ultra-high-definition video. The release of several “5G+8K” application policies will undoubtedly promote the overall upgrading of network capabilities, business capabilities, and user experience, and promote the development of media integration in depth.
2 5G and 8K The vision of 5G is to connect everything. Video live broadcast is one of the important applications in the 5G era. The combination of 8K UHD display and 5G will bring unprecedented extreme experience to the audience, and will make all industries develop rapidly to intelligent digitization.
2.1 5G 5th Generation (5G), which has enhanced mobile broadband, eMBB, Ultra-highreliability, and low delay communication, uRLLC, and large-scale (massive) machine communication, mMTC, these three application scenarios. The 5G peak network rate reaches 10 Gbps. The network delay is shortened from 50 ms of 4G to 1 ms, which will greatly promote the development of streaming media services. From the perspective of technology, 5G is further upgraded and evolved based on 4G. From the perspective of the impact of mobile communication on economy and society, 5G will become a new “universal basic technology” after the steam engine, electricity, automobile, and Internet, which can connect everything in the best way. However, from the perspective of commercial applications, mainstream operators around the world have begun to commercialize or deploy 5G networks, and ultra-high-definition video is undoubtedly the primary target business. 5G, the engine that drives the next ten years of information industry development.
Construction of Ultimate Video Experience and Application …
37
2.2 8K The need for visual clarity is very greedy. Generally speaking, FHD/2K/4K/8K, refers to the resolution standard of the video. From FHD to 2K, it is only the improvement of resolution and the accumulation of quantitative variation. From 2K to 4K to 8K, in addition to the improvement of resolution, it also breaks through the five-dimensional technical requirements of wide gamut, high frame rate, high dynamic, high color depth and panoramic sound, which is the beginning of qualitative change. 8K can not only bring users broad vision and high fine picture effect but also have good on-the-spot visual feeling in the aspects of picture color, level, and stereoscopic vision. However, the bandwidth requirement of 8K has exceeded the bandwidth requirement that existing 4G or even Wi-Fi can carry (such as uncompressed 8K video with a length of 5 min, the amount of data). About 1 TB, and the 5G network has good carrying capacity for 4K and even 8K UHD video. In addition, 8K is not synonymous with 8K TV or 8K content, but includes chip, shooting device, content, storage, network transmission, coding and decoding, display device front end to back end, from content making, decoding editing, hyperfusion of high speed transmission to terminal display, full link, full process service of the 8K ecological chain. In March 2018, China Ultra HD Video Industry Alliance was established. Subsequently, the three major telecom operators in China, adopted Large connection strategy to form “mobile communication ultra-high-definition video”. “combination boxing, complete the change of mentality from” “focus on product realization “to” pay attention to the user experience [3]”.
3 5G+8K, They Were Born to Create the Ultimate Video Experience Video is a typical user experience-driven business, and experience is the essential index to build the competitiveness of video business. At present, there are still many bottlenecks in 8K from production, form transmission to reception, such as scarce quality content, less pre-recording technology and equipment, the limited network carrying capacity and high production cost. In order to speed up the development of industry and the popularization of application, the Ultra-High-Definition Video Production Technology Coordination Center (Beijing) was established in August 2018. After the establishment of the center, the strategic thinking of “speeding up the popularization of 4K, cultivating 8K ecology and innovating the application of the industry” was put forward. The purpose of this paper is to gradually promote the scale deployment of ultra-high definition business, to create a whole industrial chain ecosystem covering ultra-high-definition, and finally to meet the growing video and entertainment experience life and production needs of individual and enterprise users.
38
D. Xiang et al.
The network speed limit in the 5G era will be lifted, and the video stream will become the main form of information expression and consumption. However, the new features will enable users not only to watch all kinds of current video content, but also to experience more than 8K ultra-high-definition video anytime and anywhere, bringing users the ultimate visual experience, including fast to extreme (zero waiting, zero blurred screen).It also includes simple to extreme (clear scene entry, perceptual content preview pleasure to extreme (video connection between TV and mobile phone, immersive integrated UI design) care for extreme (personalized video interface, TB class storage telecom home cloud.), and become an individual user ARPU (average revenue per user, average charge) growth, user stickiness to expand the scale of users breakthrough point [4–6].
4 5G+8K: From Quantitative Change to Qualitative Change 5G+8K brings not only faster transmission and higher quality content, but also the integration of data and services, and can also be highly integrated with a series of revolutionary technologies such as AI, VR. 5G+8K will also make more unreachable video applications a reality, and carry more video application scenes, such as live events, live performances, VR videos, and games, and even expand to medical and health, electronic production. AI intelligence and other related fields make it a giant draught of value innovation.
4.1 Production of Plane 8K Video Content In the “5G+4K” news live broadcast scene, the image is clear and delicate, the picture is coherent and smooth, the color is saturated and lifelike, and the compression damage is greatly reduced. Through 4K UHD TV and other content receiving terminals, users can obtain unprecedented sensory experience. At present, several media organizations have adopted the “5G+4K” standard for live broadcast in the process of major events and major theme reports. For example, during the National Congress in 2019, CCTV used 4K ultra-high-definition camera, ZTE 5G mobile phone, video conversion box to achieve “5G+4K” mobile live broadcast. With the improvement of network rate and video resolution, 5G network slicing function can also provide special virtual channel for 8K video, and “5G+8K” news broadcast will be more widely used in all kinds of the news reporting process. Moreover, bring users a more immersive visual experience and more rapid dissemination of information. For example, in December 2018, Chengdu’s “second Ring Road boutique Ring Road” successfully displayed the live broadcast of “5G+4K” in three places, followed by February 2019. The tallest tower in western China presented a bright and colorful
Construction of Ultimate Video Experience and Application …
39
“2019 Dream Tower Optoelectronic Fireworks Show”. It not only realizes the video broadcast of “5G Wireless Communication plus Network 8K Ultra HD Video Technology” to “Night Tour Jinjiang” and “Yuanxiao fireworks Show”, but also creates the global “5G+8K” video live broadcast (that is, 8K capture, 8K coding, all 5G transmission. The real 8K broadcast) the forerunner, for example, CCTV is better reporting on the World Park. The art fair also opened the entire “5G 8K” link in April 2019 and used it as the cornerstone of the 8K broadcast of the 2022 Beijing Winter Olympics [7, 8].
4.2 Video Content Production for VR 8K VR (Virtual Reality), also known as artificial environment, with “3I” characteristics—Immersion, Interactivity, and Imagination. Its essence is to use computers to create a false world. VR 8K video content production, based on 5G ultra-highfrequency and large bandwidth, low delay and high reliability, and relying on 5G edge cloud serviceability, not only stitches the images collected by VR cameras from all directions into 8K (or above) spherical images. Through the technical engine of real physical operation, the whole spherical image is not distorted. At the same time, the high-speed transmission rate of the 5G network transmits data to the cloud for real-time rendering, and then to the viewing end, so that the far end audience can wear VR glasses, and bring the audience a multi-dimensional, cloud-end or even endless shock experience. For example, at the 26th Oriental Wind and Cloud list Music Festival held in March 2019, China Telecom has built immersive sites for users hundreds of miles away to immerse themselves and integrate virtual and real things, through 5G+8K+VR HD live broadcast. This is the first time in the country. For example, in April 2019, Yang Liping’s modern dance drama “Spring sacrifice” also completed 5G+8K+VR live broadcast with the support of Zhejiang Mobile, which not only expanded the audience’s viewing space, but also gave a new dimension to artistic creation. In the future, with the increasing maturity of VR technology and the increasing popularity of terminals, VR can also bring a great sense of presence, immersion and interactive content, such as stadium size holographic display will produce a new artistic style, such as virtual dating based on a variety of two-way communication devices and making dating more romantic.
4.3 OTT/IPTV Content Service OTT is the abbreviation of “Over the Top,” which refers to the use of the Internet to provide users with a variety of application services; IPTV is the abbreviation of “Internet Protocol Television,” which refers to network protocol TV. With the rapid development of the Internet, OTT/IPTV business, as an important entrance to the family, occupies a very important role. OTT/IPTV service is mainly composed of
40
D. Xiang et al.
business management platform and CDN, and providing TV service and management support for users is the main function of the business management platform. With the advent of 8K, the service management platform can smoothly upgrade and support 8K services, requiring CDN streaming media server to have higher outflow, lower delay, and higher density hardware platform. The 5G network can realize seamless roaming of user OTT/IPTV service in the mobile network, home broadband network, and another network environment. In the future, everyone can quickly cut into the market through unrestricted time, positive video consumption patterns, cover more video services, and seize the minds of young users through lightweight OTT/IPTV business. For example, CCTV’s 4K channel, which was launched in October 2018, can screen the content on the user’s APP over a 5G network, providing users with an ultra-high-definition viewing experience.
4.4 AI Content Service AI is the abbreviation of “Artificial Intelligence,” which refers to artificial intelligence. At present, the biggest problem with 4K/8K is the lack of content. However, unlike the past standard definition and HD content, the difference is entering 4K/8K involves not only personal consumption level content playback, but also a super-integrated, whole-process service 8K ecosystem, which will completely bring about subversive changes to the media and entertainment industries. Therefore, for the problem of lack of 4K/8K content, AI algorithm can be used to improve the original low-resolution picture, and to achieve the expected or close to the 4K/8K picture quality display effect. However, it should be noted that cloud-based AI is highly dependent on the network, and is still limited to data transmission bandwidth and high delay, which greatly affects the real-time analysis and decision-making. The development of 5G technology will open up the whole value chain of content production, distribution, and consumption, and make the intelligent collaboration between “cloud side AI” and “terminal side AI” possible, and interact with the cloud in real time through the 5G network. 8K live stream transcoding can be carried out in the cloud, and multi-dimensional data analysis, processing, and distribution of related images can be carried out at edge nodes. For example, by analyzing the key behavior information such as human flow, residence time and so on, in the new retail industry, the customer’s activity law and changing trend in the field can be extracted automatically, and the offline behavior can be digitized. Of course, the future video business will no longer be limited to viewing and mechanical remote click, and the combination of video and AI will run through every stage of the video life cycle, and form an AI application brain and all kinds of terminals, split evolution of the super-large network.
Construction of Ultimate Video Experience and Application …
41
5 Peroration 5G will break through the limitations of existing technology, realize the real-time transmission and interactivity of high-resolution media stream, including immersive game service, VR game experience, home HD mobile video broadcast, real-time traffic and so on. Immersive and visual digital cultural products and services. It will bring infinite possibilities to the new era of “interconnection, vision, and wisdom” that human beings are about to enter [9]. The close combination of 5G and 8K industry will cultivate more new kinetic energy of economic development. In the future, the media industry should take 5G as the technology engine, combine the ultra-high-definition video technology to accelerate the design, use, construct the “5G + 8K” scene and realize the value, build the integration, cross-border coordination, solid transfer fusion. The modularity is strong, supports the diversification local characteristic application, thus explores the whole path for the media fusion to develop in depth, promotes the media industry high quality development [10].
References 1. Ministry of Industry and Information Technology, State Administration of Radio and Television, Central Radio and Television General Station. Action Plan for the Development of UltraHigh-definition Video Industry (2019–2022) [Ministry of Industry and Information Technology United Electronics (2019) 56]. 1 March 2019. 2. Shanghai Economic and Information Commission, Shanghai Culture and Tourism Bureau, Shanghai Radio and Television. Action Plan for the Development of Ultra High definition Video Industry in Shanghai (2019–2022). 5 May 2019. 3. Ren, Jianning. 2018. 2018 opens the 8K first year to compete for the 5G era video outlet? Television Technology 42 (4): 97. 4. China United Communications Co., Ltd. Network Technology Research Institute, Huawei Technology Co., Ltd. China Unicom 5G 8K Technical White Paper. February 2019. 5. Xu Huijun. 2017. Big video accelerating network change 5G is shining into reality. Communication World (5): 30. 6. Cai, Weisha. 2019. 5G era 8K UHD video development prospect. Guangdong Communication Technology 39 (1): 69–70+79. 7. 5G+8K live trial broadcasting will soon realize the appearance of “black science and technology” at Beijing World Park Expo. China Cable Television, 2019 (4): 352. 8. Sichuan Telecom completed the 5G+8K live broadcasting connection of “Night Tour to Jinjiang”. Communication and Information Technology, 2019 (2): 12. 9. 5G Network will be presented at the World Internet Congress. Telecommunication Engineering Technology and Standardization, 2018, 31 (11): 81. 10. In the name of 5G, what changes will take place in future life? Industrial Design, 2017 (11): 144.
Cost of Kidney Transplantation on the Base of Data Mining Technology Kaixing He, Jinguo Wang, Jiwei Wang and Na Wang
Abstract By analyzing the current status and problems of hospital medical data service, to propose the data cleaning scheme, and construct the database with the subject of disease expense to meet the requirements of further data mining. By analyzing costs of patients and the relationship of hospitals, diseases, surgeries, to establish a multilevel and three-dimensional analysis framework to study the current situation and characteristics of renal transplantation patients’ costs based on this framework. By using data mining technology, this paper tries to find out whether there are different rules of medical treatment behavior in the use of drugs and sanitary materials in the diagnosis and treatment of renal transplantation patients, and the current cost situation under different rules, and to explore the main factors affecting the cost of patients, so as to provide new ideas for the management and control of disease cost. Keywords Expence · Kidney transplantation · Medicine · Data mining · Evaluation system
1 Introduction Generally, medical big data is the sum of data generated by doctors in the process of patient diagnosis and treatment, including basic patient data, electronic medical records, diagnosis and treatment data, medical imaging data, medical management, economic data, medical equipment and instrument data, etc. [1]. Promoting and standardizing the application of medical big data is conducive to deepening the reform of the medical and health system, improving the efficiency and quality of health and K. He · J. Wang Department of Urology, First Hospital of Jilin University, Changchun, China J. Wang The Third Operating Room, First Hospital of Jilin University, Changchun, China N. Wang (B) Department of Anesthesiology, First Hospital of Jilin University, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_7
43
44
K. He et al.
medical services, and providing health and health services for the whole life cycle of the people. Under the requirements of digitization, digitization, datalization and intellectualization of modern hospital information management, the application of medical big data in clinical diagnosis and treatment has been paid more and more attention [2].
2 The Current Status and Existing Problems With the continuous improvement and development of modern medical technology, kidney transplantation has been widely used in the treatment of end-stage renal disease. However, due to the risk of rejection and various infections and complications after transplantation, the quality of life after discharge is seriously affected [3]. However, under the traditional mode in China, it is difficult for patients to get professional guidance after discharge, so they have poor self-management and health care ability. Therefore, it is of great significance to strengthen effective follow-up after operation [4]. Liver and kidney function, blood routine test and drug concentration index test were performed weekly in the patients followed up with renal transplantation, and drug use was adjusted according to the report results [5]. All the follow-up patients need to keep the examination report documents for a long time. The traditional examination and examination report documents are usually paper, which is not easy to be kept for a long time and easy to be lost, thus increasing the physical and economic burden of the follow-up patients [6].
3 Statistical Description The distribution, centralization and dispersion trends of the cost of renal transplantation patients were statistically described, and the cost differences among different groups of renal transplantation patients were compared by using statistical tests such as analysis of variance [7]. The general data questionnaire and discharge readiness scale were given to the patients after renal transplantation before discharge, and the follow-up treatment compliance questionnaire and social support rating scale were given to the patients during the first follow-up visit to the hospital [8]. Questionnaires were distributed and collected by researchers. Explain the purpose and requirements of this study to the patients during the investigation, and carefully fill in each item individually by the research object, which can be assisted in special cases [9]. After the completion of the completion of the patient on the spot to check the integrity of the recovery. This is currently the main cost of research data collection methods.
Cost of Kidney Transplantation on the Base …
45
4 Construction of Data Mining System 4.1 To Standardize Electronic Data On the base of the diagnosis of renal transplantation patients, the association rule model was constructed to explore the combination rules of renal transplantation complications and complications [10]. On the premise of the same rule of diagnosis, the association rule model of drugs and sanitary materials is constructed respectively, and the rules of using drugs and sanitary materials are mined. Taking patient expense as decision attribute, a group model of decision tree was constructed to explore the main factors affecting patient expense [11]. Aimed at the present situation of data similar to duplicate records, missing values, inconsistent data, abnormal data as well as the primary key is not the only quality problem, using the basic field matching method and chebyshev inequality method to test the data problems, and formulate the corresponding merge, delete, tags, replace the cleaning solution, such as to construct a relational database in the cost of illness, including data testing, data cleaning, data validation, clean data flow, and the data processing flow of database construction [12].
4.2 To Establish Files of Transplant Patients On the base of the existing data, a multi-level and comprehensive analysis framework of disease cost is constructed from five dimensions, including patients, hospitals, diseases, surgeries and projects, to discuss the content and output of disease cost analysis based on different dimensions, as well as the policy issues and significance that the results may reflect [13]. In different disease types of kidney transplantation, the cost of treating patients with the same subtype of kidney transplantation in different hospitals of different levels and categories is also significantly different. Surgical patients are mainly distributed in hospitalized renal transplantation patients, and the average hospitalization cost is higher than that of non-surgical patients. By using the resources of the hospital information system, inspection system, imaging system, radiation system, pathology system and other related peripheral systems, the hospital adopts port docking technology and relies on the internal network, computer and communication equipment of the hospital to automatically mine diagnosis and treatment information from various peripheral systems. According to the statistical requirements, the follow-up data were screened, output and analyzed, and then the automatically acquired and input information and follow-up information were integrated into the follow-up management system to build a database layer of follow-up files for transplant patients [14]. There is a user operation interface layer outside the database layer, which is a system management function module, capable of storing, processing, extracting and data statistics of the database.
46
K. He et al.
4.3 Mining Approach Combined with Fuzzy Association Rules The cost of out-patient and inpatient kidney transplantation patients were mainly drugs and sanitary materials. The proportion of drug cost of outpatients is high, the proportion of health material cost of inpatients is high, and the proportion of drug cost decreases year by year [15]. In view of the cost differences among patients with different renal transplantation subtypes, this study further explored the causes of the cost differences by using data mining technology. Firstly, the association rule model of renal transplantation patients was constructed to explore the existing rules in the diagnosis of patients. Multiple diagnostic rules are obtained by screening. Under different diagnostic rules, the cost of patients was significantly different. In patients without accompanying diseases, the use regularity of drugs and sanitary materials is stronger, the dispersion trend of patient expenses is smaller under the same rule, while patients with different rules have relatively large differences in expenses, and the influence of rules on expenses is more significant. For patients with accompanying diseases, the use of drugs and sanitary materials is more scattered. Rules based on association rule model mining have limited interpretation of diagnosis and treatment behaviors and patient costs, and items outside the rules may have greater impact on costs. Based on the already discovered rules for the use of drugs and sanitary materials, combined with the basic personal information of patients and hospital visits, the group model of decision tree was built with the cost of patients as the decision attribute to explore the main reasons for the cost difference.
5 Conclusion For patients with different diagnostic rules, the association rules of drugs and sanitary materials are constructed respectively, and the rules of drugs and consumables used by patients are mined. The results showed that the use rules of drugs and consumables of patients with different diagnostic rules were common and had their own characteristics. Drugs such as sodium chloride injection, catheters, disposable syringes, disposable infusion sets and other consumables frequently appeared in the rules. Acknowledgements This research was supported by the First Hospital of Jilin University.
Cost of Kidney Transplantation on the Base …
47
References 1. Bentall, Andrew, Desley Neil, Adnan Sharif, and Simon Ball. 2015. ABO-incompatible kidney transplantation is a novel risk factor for BK nephropathy. Transplantation 2: 195–201. 2. Warejko, Jillian K., and S. Paul Hmiel. 2014. Single-center experience in pediatric renal transplantation using thymoglobulin induction and steroid minimization. Pediatric Transplantation 8: 939–942. 3. Al Aghbari, Zaher. 2004. Array-index: A plug&search K nearest neighbors method for highdimensional data. Data & Knowledge Engineering 3: 239–241. 4. Melab, Nordine. 2001. Data mining: A key contribution to E-business. Information & Communications Technology Law 3: 468–472. 5. Boraty´nska, M., A. Wakulenko, M. Klinger, and P. Szyber. 2014. Chronic allograft dysfunction in kidney transplant recipients: Long-term single-center study. Transplantation Proceedings 8: 755–756. 6. Remport, Adam, Andras Keszei, and Eszter Panna Vamos. 2011. Association of pre-transplant dialysis duration with outcome in kidney transplant recipients: A prevalent cohort study. International Urology and Nephrology 4: 415–418. 7. Hsu, J.H., C.S. Tseng, and S.C. Chen. 2001. A methodology for evaluation of boundary detection algorithms on breast ultrasound images. Journal of Medical Engineering & Technology 4: 459–462. 8. Che, Dongsheng, Qi Liu, Khaled Rasheed, and Xiuping Tao. 2011. Decision tree and ensemble learning algorithms with their applications in bioinformatics. Advances in Experimental Medicine and Biology 3: 365–371. 9. Lim, Wai H., Sean Chang, Steve Chadban, Scott Campbell, Hannah Dent, Graeme R. Russ, and Stephen P. McDonald. 2010. Donor-recipient age matching improves years of graft function in deceased-donor kidney transplantation. Nephrology Dialysis, Transplantation 25 (9): 3082– 3089. Official publication of the European Dialysis and Transplant Association - European Renal Association 2, 142–146. 10. Patricia, B. 2007. Cerrito: Choice of antibiotic in open heart surgery. Intelligent Decision Technologies 1: 89–92. 11. Yang, Wan-Shiou, and San-Yih Hwang. 2005. A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications 1: 143–148. 12. Wang, Louis W., Philip Masson, Robin M. Turner, Stephen W. Lord, Laura A. Baines, Jonathan C. Craig, and Angela C. Webster. 2015. Prognostic value of cardiac tests in potential kidney transplant recipients: A systematic review. Transplantation 4: 724–728. 13. Shu, Wanneng, and Lixing Ding. 2011. ECOGA: Efficient data mining approach for fuzzy association rules. Journal of Software 1: 93–94. 14. Baigent, C., L. Blackwell, R. Collins, J. Emberson, J. Godwin, R. Peto, J. Buring, et al. 2009. ‘Antithrombotic Trialists’ (ATT) collaboration: Aspirin in the primary and secondary prevention of vascular disease: Collaborative meta-analysis of individual participant data from randomised trials. The Lancet 373 (9678): 1849–1860. 15. Hemant, M. 2005. Phatak: Retrospective detection of potential medication errors involving drugs with similar names. Journal of the American Pharmacists Association 5: 639–642.
Public Service of Retired Personnel in Colleges and Universities in the Internet Era Yanping Wang
Abstract At present, the most remarkable characteristic of social development are networking and informatization, which provide a new choice for retirement service in colleges and universities. Colleges and universities are important institutions undertaking the responsibility of old-age service. How to do the old-age service of retired personnel well is of great significance and has a long way to go. Based on the investigation of the life style, material needs as well as spiritual and cultural needs of retired personnel in colleges and universities, this work obtained the results, put forward the countermeasures, and gave full play to the subjective initiative of retired personnel, so as to help the retirement work office of colleges and universities improve the management style and enrich the elderly life, especially to meet the spiritual and cultural needs of retired personnel. Keywords Internet · Retired personnel · Public service
1 Introduction Judging from the demographic characteristics of retired personnel in colleges and universities, the greatest characteristics are their high level of education and the fact that this team is composed of intellectuals, who are the intellectual elites of the society. Researching on the public service of this type of personnel can not only improve the management style of the retirement work office of colleges and universities, but also make use of the convenience brought by the Internet to provide them with excellent service [1]. At the same time, in the process of co-governance for the elderly, using the positive function of the Internet and innovating the traditional service mode for retired personnel also have certain reference significance for other colleges and universities. Doing public service well of retired personnel in colleges and universities can not only give full play to its “silver resources”, but also improve Y. Wang (B) Jilin Engineering Normal University, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_8
49
50
Y. Wang
the veteran cadres’ sense of belonging, trust and happiness to the retirement work office, which is an urgent problem for colleges and universities at present [2].
2 The Present Situation and Problems of Public Service for Retired Personnel in Colleges and Universities 2.1 Retired Personnel in Colleges and Universities Need Superior Service At present, the management service for retired personnel is facing increasingly serious problems, and its nature has also changed, which requires better service. Its service content includes not only the actual implementation of the “two treatment”, but also the families, marriage, health and psychological needs of veteran cadres. More comprehensive and meticulous service provided by the management personnel of retirement work office is required from the daily life to illness and hospitalization of retired personnel. With the improvement of living standards and health indices, retired personnel are looking forward to better management services. For the empty nest elderly, they can not enjoy the family’s happiness, therefore, they are easier to feel lonely, pessimistic and bored after leaving their children for a long time. They need special attention and care from the staff. The management personnel of the retirement work office should visit them regularly, and timely response to the emergency in order to arrange personnel to take care of them. Every year, some personnel in colleges and universities will retire from their jobs, which inject fresh blood into the retired personnel, and they are also the main force to create social and economic value and exert the residual heat [3]. However, most of the veteran cadres are difficult to adapt psychologically after retiring due to the change of status, identity and treatment, as a result, the “retirement syndrome” will appear gradually, then cause diseases. The reason is that their focus of life is still on the job that they have been working for many years, and it is difficult to transfer for a while.
2.2 Retired Personnel Need Pluralistic Cultural Life Retired personnel in colleges and universities are different from other social retired personnel, since they are a special group with a high degree of education, high knowledge, high quality and high income. They have a strong sense of social participation, care about current affairs and politics, have a good mass foundation and their social influence is extensive [4]. Therefore, they have more demands and higher requirements for cultural facilities, and their enthusiasm for participation in cultural activities is also higher. In other words, their need for spiritual culture is greater
Public Service of Retired Personnel in Colleges …
51
than for material needs. However, the existing conditions are difficult to meet their pluralistic needs, which is a very realistic situation that colleges and universities are facing. Subjectively, some retired elderly people have to take care of their grandchildren, therefore, their chances of participating in collective cultural and recreational activities will be greatly reduced; Some elderly care about current politics and often obtain news information through various means, however, they lack the platform to display and exchange and opportunities to carry out some related lectures and to organize life; At the same time, most retired personnel are enthusiastic and eager to make their own contributions, however, there are few opportunities for them to really participate in these activities. Objectively, the building resources of colleges and universities are relatively tight and the venues for activities are quite limited. Take Southwest University as an example, its retirement work office is located in the Wuhou campus, and the existing activity centre of retired personnel, including mainly teachers and other highly educated people, sometimes overlaps with the teaching and administrative buildings, therefore, the activity space is restricted, especially various ball sports and fitness places [5]. For example, the activity places for calligraphy, dance, ball, chess, card and other fitness and entertainment activities are almost all confined to the cultural activity centre of the retirement work office.
3 Suggestions on Improving the Public Service for Retired Personnel of Colleges and Universities in the Internet Era 3.1 To Set Up Network Communication Platform Based on the Internet Nowadays, with the wide development of network and information, Internet, as a new approach to meet the spiritual and cultural needs of veteran cadres, should be made good use of its convenience and advantages to provide the retired personnel in colleges and universities with better service. For example, the network information exchange platform and the network education platform for the elderly can be built, therefore, cadres can learn courses based on their own interest or teach others in order to gain sense of achievement and pride through the Internet without space and time constraints, which is also the reflection of using the “silver resources” [6]. At the same time, through using the advantages of the Internet, such as learning forums, chat tools, personal blogs, e-mail, online video conferences and other interactive tools, veteran cadres can communicate with others at any time, so as to add fun to their spiritual life and to resolve their feelings of loneliness.
52
Y. Wang
3.2 To Implement the Political Life Treatment of Veteran Cadres The system of information briefing, visiting and saluting should be further improved in order to pass on the policies of the government and implement the relevant policies and treatment. Subscribed newspaper and magazines should also be distributed to veteran cadres so as to facilitate their autonomous study. Medical insurance, subsidies, allowances and other benefits for retired personnel should be realized in time, and schools should also increase the retirement holiday consolation payments year by year, so that veteran cadres can share the achievements of the reform and development [7]. In the period of “respecting for the elderly month”, the series activities for respecting the elderly with the theme of “cultivating respect for the elderly and building a harmonious family” should be held among the whole teachers and students in the “respecting for the elderly month” so as to send holiday greetings and greetings. What is more, the activities of “celebrating the Double Ninth Festival” and “Love in the Double Ninth Festival accompanied with youth” should be held to provide a platform for in-depth exchanges between veteran cadres aged 70, 80 and 90 and young volunteers. In addition, leaders can also visit veteran cadres who are aged more than 80 years old and living alone to send.
3.3 To Promote the Construction of Cultural Old-Age Service in Order to Meet Their Needs of Pluralistic Spirit and Culture Firstly, the position construction of the cultural activities for the veteran cadres should be strengthened, so as to ensure the construction of the basic facilities needed by the activities. It can hold various and colorful sports and cultural activities, provide learning, entertainment and fitness places with independence and good environment for veteran cadres and provide them with a wider platform for communication, so as to ensure the smooth development of the activities [8]. Colleges and universities should continuously increase its investment, gradually improve the equipment and facilities, purchase newspapers, magazines and books regularly, and check the safety and health of the center on a regular basis in order to create better conditions for enriching the cultural life of veteran cadres. However, veteran cadres should not be limited in the fixed activity place, for example, they can go out to visit, study and experience the new life, feel the new changes, visit the museum to study and enrich their cultural life and investigate elderly apartments and ecological homes for the elderly to set up new old-age ideas. Secondly, the veteran cadres center should often organize their favorite sports activities, training courses and interest groups that they are interested in, such as yoga class, model class, calligraphy class, dance class, calligraphy class, choir, chess club, flower class, opera class, recitation class, dress performance class, table tennis club,
Public Service of Retired Personnel in Colleges …
53
flower class, square dance class, badminton club and computer class. It is also possible to conduct political theory learning activities in various forms, such as situation reports, lectures, symposiums and reading sessions, so as to guide veteran cadres to pay attention to the mainstream [9, 10]. It can also hold article soliciting activity with the theme of “recalling passionate years and re-creating sunset brilliance” or the knowledge contest about the victory anniversary of the War of Resistance Against Japan. It can carry out activities among veteran cadres, student party members and party-joining activists with the theme of “Chinese Dream”, and combine their personal experiences and personal feelings to tell a good story of China and carry forward the national spirit. Finally, it can organize veteran cadres to participate in arts evening parties, such as holding the “sunset red” fun games, launching the “fun life” chess and card competitions, and holding the activities for women staff with the theme of “celebrating Women’s Day and promoting harmoniousness”, so as to let veteran cadres enjoy happiness in sports activities and further enhance cohesion [11]. The funding of periodical newspapers, such as Friends of Comrade, provides a platform for retired personnel to care about current affairs and politics and to express their feelings.
4 Summary Through the above analysis, it can been seen that the current society is in the era of the Internet, and the Internet has penetrated into various fields. For the retirement work of retired personnel in colleges and universities, it should also use the Internet to optimize the management strategy and build a network exchange platform so as to better meet the needs of the elderly and make them enjoy their life.
References 1. Yue, Jinglun, and Yun Hui. 2018. Research on the satisfaction difference of employees’ endowment insurance from the perspective of insurance participants—A case study of Guangzhou city. Jiangsu Social Sciences (4): 97–106+273 (in Chinese). 2. Chen, Lingquan, and Kaili Yang. 2017. The reasons and countermeasures for the formation of aloneness among retired personnel in colleges and universities. Chinese Journal of Gerontology 37 (23): 5947–5949. 3. Wang, Ping, and Muyang Gao. 2017. Research on the influence of participating in sports activities on the life satisfaction of urban retired personnel. Sports Culture Guide (5): 52–57 (in Chinese). 4. Zhi, Pang, Xiaorao Wang, and Huabin Xing. 2017. Research on the influence of China’s endowment insurance system on the income gap of the elderly. Shanghai Journal of Economics (1): 86–94 (in Chinese). 5. Li, Jinjin. 2016. Research on the reform of endowment insurance in China—A case study of Yuetan community in Beijing. Journal of Shanxi University of Finance and Economics 38 (S2): 15–18.
54
Y. Wang
6. Xiao, Baohua, and Yanxiang Zhang. 2016. Is the school responsible for the injury accident of labor dispatch personnel? Primary and Middle School Management (11): 46–49 (in Chinese). 7. Shen, Haiyan. 2016. Exploration and practice of personnel archives management for retired personnel in enterprises. Zhejiang Archives (6): 62 (in Chinese). 8. Hu, Jiangling, and Lin Wang. 2016. Reemployment of urban retired personnel under the background of population aging. People’s Tribune (17): 185–187 (in Chinese). 9. Yao, Zongliang. 2016. Subjective sense of happiness of retired personnel in colleges and universities and its related factors. Chinese Journal of Gerontology 36 (6): 1473–1475. 10. Guan, Weixian. 2015. Thoughts on the socialized management mode of retired personnel in public institutions. People’s Tribune (21): 236–238 (in Chinese). 11. Chen, Wenhua, Liqing Xian, Jinghong Wu, Yaping Chen, Juanjuan Wu, and Shuxin Jian. 2015. Service management of retired personnel in a certain campus of Sun Yat-sen university. Chinese Journal of Gerontology 35 (5): 1375–1377.
Application Research of Accounting Archives Informatization Based on Big Data Xiangdong Xu
Abstract Today’s society is a high-speed development of society, science and technology is developed, information flow, people’s communication is more and more close, life is more and more convenient, big data is the product of this high-tech era. Therefore, in this context, the inevitable development trend of some application fields is to use and develop large-scale information in the management of archives information. In order to make accounting archives information more extensive, active, timeliness and pertinence, we should apply multimedia technology in big data, which can not only provide great technical support for the management of archives information, but also provide archives information resources through multimedia computers. When we obtain rich and colorful archives resources, it will become very important. Convenient. In order to speed up the construction of accounting archives informatization, we must first enhance the importance of accounting archives, cultivate compound management talents, and improve the security mechanism. And through the sharing of archives information resources and the utilization of archives information resources, we can better promote the development of accounting archives informatization. Keywords Big data · Accounting · Archives · Information construction · Measures
1 Introduction With the rapid development of information in the era of big data, the importance of information has become increasingly significant. The function of digitalization will inevitably expand the function of archives, and will also make it more widely affect and affect information management [1–3]. In the background of modern big data, with the network technology and digital technology becoming more and more mature, and accounting also began to appear a large number of electronic documents, so accounting not only to protect the archives of the traditional genre of archives, but also to manage the digital records [4, 5]. The function of digitalization will inevitably X. Xu (B) Hao Jing College, Shaanxi University of Science and Technology, Xi’an 712046, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_9
55
56
X. Xu
expand the function of archives, and will make it more widely affect and affect the accounting information management [6, 7]. But in the process of archives digitization, we will encounter different bottlenecks and difficulties, such as technology is not perfect, law is not perfect, personal information level is limited, digitization gap is large, etc. So the main thing to do now is to speed up the construction of multimedia technology in the application of archives information under the background of big data era. Once this project is completed, the most important thing is to speed up the construction of multimedia technology in the application of archives information technology. Ultimately, archives and information sharing will be realized [8–10]. Therefore, through the sharing of archives information resources and the utilization of archives information resources, we can better promote the development of accounting archives informatization.
2 Brief Introduction of Accounting Archives Informatization Based on Big Data 2.1 Definition of Big Data “Big data” is an information asset that needs new processing mode to have stronger decision-making power, insight and process optimization ability to adapt to mass, high growth rate and diversification. A large-scale data set, which is far beyond the capability of traditional database software tools in acquisition, storage, management and analysis, has four characteristics: massive data scale, rapid data flow, diverse data types and low value density. The strategic significance of big data technology lies not in mastering huge data information, but in specialized processing of these meaningful data. In other words, if big data is compared to an industry, the key to making profits in this industry lies in improving the “processing ability” of data and realizing the “value-added” of data through “processing”. From a technical point of view, the relationship between big data and cloud computing is as inseparable as the positive and negative sides of a coin. Big data can not be processed by a single computer, so a distributed architecture must be adopted. Its characteristic lies in the distributed data mining of massive data. But it must rely on cloud computing distributed processing, distributed database and cloud storage, virtualization technology. Big data requires special techniques to effectively process large amounts of data that can be tolerated over time. Technologies suitable for large data include large-scale parallel processing (MPP) databases, data mining, distributed file systems, distributed databases, cloud computing platforms, the Internet and scalable storage systems.
Application Research of Accounting Archives Informatization …
57
2.2 The Application Significance of Big Data Era in Accounting Archives Informatization Multimedia technology plays a significant role in promoting and promoting the construction of archives informatization in accounting. It has the following two main application significance and application value: First, multimedia technology should be applied to the construction of archives informatization, which can give full play to the advantages of multimedia, such as high acceptance, rapid dissemination, strong intuition and large amount of information. In addition, it can improve the working level and efficiency of archives information management. Furthermore, some procedures and operation steps in the management of Archives Informationization are simplified, which can make users more convenient to access and maintain archives information. Second, the application of multimedia technology in the construction of archives information can make the current archives information management keep up with the pace of the era of big data, better adapt to the development of modernization, thus reducing the workload of archives information management, saving the storage space of archives information, and improving the quality and efficiency of archives information management.
2.3 The Status Quo of Accounting File Management Informationization The accounting information management information started relatively late with the enterprise, but after several years of development, the accounting file management informationization has achieved good results. From the hardware point of view, the coverage of new technologies such as image technology, ORC technology, barcode and multimedia in accounting archives is 100%; the transition from client/server mode to browser/server is realized in network construction, all The accounting profession has implemented the accounting file management local area network, forming a vertical and three-dimensional accounting file management system, and has accounting office automation software to realize software management and operation. In terms of the system, various regions have successively issued relevant rules for regulating the accounting information management, and constantly improve the information management process. However, the degree of informatization of accounting files is not high, and it is still in the initial stage of system operation, software maintenance and data archiving; the development of accounting file management informationization is slow; there is no systematic and historical file management, and only financial value is attached to management. The management of documents in economic affairs, neglect of archives, work coordination documents.
58
X. Xu
3 Insufficient in the Accounting Informationization 3.1 Accounting File Information Management Is Relatively Lagging Behind In the latest opinion draft, the definition of accounting files “refers to accounting materials, accounting books and financial reports and other professional accounting materials” was changed to “characteristics with saved values and archived texts, charts, images, audio, video, etc”. “Accounting documents”; “Other accounting information records with preservation value” were added to other accounting materials in the scope of accounting files; the relevant contents of electronic accounting file management were added, but the final draft was still not officially issued. Moreover, from the content of the draft for comment, it is only the revision of the original method, and there has been no substantial change. It only regulates the after-sales of accounting files, and does not cover the specific content and formation process of electronic accounting files, nor does it reflect the contents of the latest relevant laws and regulations such as electronic signature law. At present, the distribution of the literature on the application of accounting archives in different years is shown in Fig. 1. It can be seen that the information management of domestic accounting archives is also growing.
3.2 Accounting Macro Management Work Neglects Electronic Accounting File Management The domestic accounting management is the responsibility of the financial departments at all levels, and the competent department of the industry has the responsibility of guiding, managing and supervising the accounting work of the subordinate units. Fig. 1 Accounting file information application research literature statistics
200 150 100 50 0
Application Research of Accounting Archives Informatization …
59
However, in actual work, financial accounting management departments at all levels are limited to manpower and material resources, and it is difficult to implement effective management of specific accounting work. With the deepening of economic marketization, the role of industry authorities in corporate accounting management is becoming weaker. The lack of management mechanism makes the management of accounting records lack the proper supervision. As the new content of accounting files–electronic accounting files, due to the lack of specific regulations, it is in a state of no standards, unmanned and unmanned. The management of electronic accounting files of all units is completed spontaneously by the unit financial personnel. At the same time, accounting informationization is ignored in the process of accounting informationization. At present, domestic accounting informationization focuses on accounting information processing and output. For example, computerized accounting work management is mainly for the processing of accounting information. The application of XBRL in accounting is for the output of financial information, lack of accounting files. Informationization work should be given due attention. Accounting files have the commonality of general files, but at the same time they have special content and requirements. Compared with general file informatization, accounting file informationization pays more attention to the use of accounting data. The general practice of existing file informationization, such as mainly converting various types of files into graphic files for storage, is not completely applicable to accounting file informationization. Graphic files can maintain the original shape of documents, but cannot satisfy the source data of accounting files. Information needs are also not adapted to the emergence of more and more electronic original credentials.
3.3 Accounting File Information Management Software and Hardware Facilities and Lack of Development and Utilization Software and hardware infrastructure is an indispensable basic condition for accounting file information management. Accounting file information management must be used in specific computer hardware and software environments. The accounting department shall have the necessary hardware conditions for dust storage, antimagnetic, moisture-proof, etc. for the place where the electronic accounting files are stored. The electronic accounting files received and stored shall be loaded into a special software box, and the software box shall be placed in a special anti-magnetic file. Inside the cabinet. However, the reality is that the investment in the software and hardware management of accounting archives is not enough. The necessary software and hardware facilities are lacking, the facilities and equipment are not matched, and the basic demands of information management are not met. The form of accounting file development and utilization is too old and backward, and there is no effective use of information technology. It is not deep enough in the development and utilization of electronic accounting files. At present, many units still use the traditional “you
60
X. Xu
borrow me” type of accounting file utilization, most of them still stay in the passive “waiting for the door” state, the computer is just a typewriter, simply can not talk about computer storage, Review or use online. The ultimate purpose of accounting file information management is to provide utilization. However, the current development and utilization methods have restricted the development and utilization of electronic accounting files, and ultimately the accounting file management work can not play its own effective and effective role.
4 Measures to Strengthen the Accounting Information Management Information 4.1 Enhance the Importance of Leaders Enhance the leadership’s emphasis on the accounting information management information. School leaders play an important role in promoting the informationization of accounting records management. The decision-making layer must not only strengthen the informationization management of accounting file management personnel, but also enhance their own awareness. This requires them to establish a scientific accounting information management information concept, fully understand the importance of file management in school management; based on the overall situation, strengthen the financial budget in the construction of information technology, increase the use of accounting file management information Funding investment; establishment of supporting electronic accounting file management sites and hardware facilities. For example, reasonable configuration of computer hardware, software systems, supporting scanners, recorders, scanners and other input devices, timely update accounting file management software and Internet output devices, easy to operate and consult.
4.2 Enhance the Importance of Accounting Staff This requires a sense of mission and responsibility to strengthen the construction of socialist archives with Chinese characteristics. Under the background of the new era, accounting file managers need to deal with networks, computers, input devices, output devices, etc., which puts higher demands on accounting file management personnel. On the one hand, it is necessary to correctly guide accounting managers to adapt to the development of the times, to shoulder the historical responsibility given by the times, to abandon the traditional concepts, to carry forward the down-to-earth, rigorous and meticulous craftsmanship, and to carry out the accounting archives work; on the other hand, it is necessary to enhance the self-restraint awareness of accounting personnel. Clarify the importance of file management. The accounting
Application Research of Accounting Archives Informatization …
61
information management informationization is not only an effective means to solve the traditional file management complex procedures, but also an important way to realize the accounting, standardization and efficiency of accounting files. By clearly targeting and strengthening responsibilities, accounting staff can actively participate in the construction of accounting archives information.
4.3 Cultivate Compound Talents to Ensure Safety Advanced technology and equipment require supporting professionals to ensure the effective operation of technology. The comprehensive quality and professional skills of personnel determine the speed and quality of accounting file management informationization. At present, the traditional accounting file management personnel in China have a large age and low cultural level, lacking computer operation theory and network security awareness, and facing informationization construction is limited to custody and inspection. However, accounting file management informationization requires high-level composite talents to ensure the effectiveness and security of operations. This requires them to be proficient in computer network management technology, to clarify the importance of file management, and to be proficient in statistical analysis of accounting file data. The first is to strengthen the accounting file management personnel to go out and strengthen the knowledge theory reserve. To achieve full-featured computer proficiency, familiar with national accounting and accounting management laws and regulations, and master the digitalization, networking and other information-based foundations. For the young and motivated staff, according to the actual needs, targeted to send out to participate in professional theoretical training, strengthen the comprehensive management of accounting file management information, and apply the training theory to the actual work. The second is to adopt an introduction strategy. Strictly grasp the entry of accounting file management personnel, introduce a group of new file management talents that keep pace with the times and adapt to information management, realize the research of accounting file information research and management talent team, and ensure strict observance in the daily management of accounting files. Network specifications, security processes, and the phenomenon of artificially modifying files.
5 Conclusion Accounting informationization is an important economic and pragmatic record in accounting work, and an important retention resource in the process of modernization of accounting management. Therefore, the country should continuously strengthen the emphasis on the accounting information management information, improve the system guarantee of information construction, cultivate the various risks
62
X. Xu
in the management of composite talents, build an effective accounting file management information system, and promote accounting files. The business is healthy and sustainable.
References 1. Huan, Q.U. 2018. Spatial distribution patterns of cultural facilities in Shenzhen based on GIS and big data. Journal of Landscape Research 10 (04): 51–57. 2. Xiong, K.Z., W.H. Zhang, G. Han, et al. 2017. The application prospects of provantis system dispense module in the management of test article in non-clinical drug safety evaluation. Chinese Journal of New Drugs 26 (6): 635–638. 3. Zeng, L., C. Meng, Z. Li, et al. 2015. Cloud computing and its decision-making for medical and health informatization in the context of big data. In IEEE International Conference on Bioinformatics & Biomedicine. 4. Brandas, C., O. Megan, and O. Didraga. 2015. Global perspectives on accounting information systems: Mobile and cloud approach. Procedia Economics & Finance 20: 88–93. 5. Chun, N., and S. Lee. 2015. Bonus compensation and productivity: Evidence from Indian manufacturing plant-level data. Journal of Productivity Analysis 43 (1): 47–58. 6. Haijun, L. 2015. Research on contribution of informatization to the development of “four modernizations”—A case study of Henan Province. Journal of Changchun University 21 (2):62, 64–65, 67–68. 7. Li, L., Y. Lei, D. Pan, and C. Si. 2016. Research on sustainable development of resource-based cities based on the DEA approach: A case study of Jiaozuo, China. Mathematical Problems in Engineering 2016 (3): 1–10. 8. Gang, S., X. Dong, L. Zhi, et al. 2015. Design and application of government Wiki based on open knowledge management. Office Informatization 26 (1): 1–15. 9. Sommer, F., J. Klink, D. Senkl, et al. 2015. Determinants of web-based CSR disclosure in the food industry. International Journal on Food System Dynamics 6 (1): 24–31. 10. Najafi, S., S. Saati, and M. Tavana. 2015. Data envelopment analysis in service quality evaluation: An empirical study. Journal of Industrial Engineering International 11 (3): 319–330.
Construction of Vocational Education Information Platform Under the Background of Big Data Xiaojun Jiang and Zengxiang Pan
Abstract In the era of big data, the process of collecting and processing all kinds of information and data in today’s society becomes more simple and convenient. Data analysis technology is also widely used, which has deeply affected all aspects of social life. However, informationization of education is the requirement of the development of the times, the strategic choice of the overall situation of education, and the basic support and necessary means to realize the modernization of education. This paper briefly introduces what is the Vocational Education Informatization Platform under the background of big data, analyses the current situation of the development of domestic Vocational Education Informatization, and puts forward the optimization strategy of constructing the Education Informatization Platform. Keywords Vocational education · Information platform · Existing problems · Strategy
1 Introduction The arrival of the era of big data has greatly reduced the cost of information dissemination and acquisition. At the same time, vocational education informatization also has irreplaceable advantages [1–3]. In the era of big data, teaching is facing excellent opportunities for development. Through various new information and data dissemination methods such as network, the dissemination scope of teaching knowledge and information can be expanded in a wide range, so that teachers and students can acquire it; and through data analysis and collation technology such as cloud computing, the complicated teaching information can become clear and orderly, so as to be mastered by teachers and students [4–7]. It can be said that the achievements of the school cannot be separated from a lot of work, such as the clear orientation of the school, efforts to self-development and innovative personnel training mode [7–10]. X. Jiang (B) College of Extended Education, Jilin Engineering Normal University, Changchun, China e-mail: [email protected] Z. Pan Linjiang Vocational and Technical School, Linjiang, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_10
63
64
X. Jiang and Z. Pan
On the other hand, the construction of the school digital campus network and the application of information management mode have also made important contributions to promoting the development of the school, and they are mutually reinforcing [11–14]. Therefore, we should speed up the construction of vocational education informationization, promote the modernization of vocational education by the informationization of Vocational education, which is an important part of speeding up the development of modern vocational education, and is of great significance for improving the quality of vocational education personnel training.
2 Vocational Education Informatization Platform Under the Background of Big Data 2.1 Development of Internet Technology in Big Data Era As the representative technology of the third industrial revolution, Internet technology has made great progress in the past decades. Tens of thousands of computer systems with different geographic locations and relatively independent functions around the world are interconnected by means of communication equipment and lines, and the data communication network of network resources and information exchange is realized by well-functioned network software. In recent years, with the rapid development of IT and communication technologies such as Internet, Internet of Things, Cloud Computing and Triple Network Integration, the rapid growth of data has become a severe challenge and valuable opportunity for many industries, and the information society has entered the era of Big Data [1]. The basic characteristics of large data can be summarized by 4 V. They are Volume, Variety, Value and Velocity. The development of big data technology not only changes people’s life and work mode, enterprise’s operation mode, but also gradually promotes the change of vocational teaching mode.
2.2 The Connotation of Vocational Education Informatization Platform Under the Background of Big Data Educational information platform in vocational schools refers to the software and hardware environment created for the construction, application and development of information technology in the field of vocational school education in the process of modernization of vocational education and meeting the needs of the times and society by teachers and students of vocational education applying information technology and information resources to promote the development and reform of education and teaching on the basis of network environment. Vocational school education
Construction of Vocational Education Information Platform …
65
information platform mainly includes two aspects: First, the basic support platform: the digital campus basic support platform, which provides a technical platform to support a variety of application systems. It starts from the aspects of information display, security management, information resources management, teaching information resources sharing, business collaboration, and so on. By constructing various basic platforms, it enables various applications. System development can follow the unified technical specifications and standards, but also support the construction of various application systems, thus forming the application support system of digital campus. Secondly, the overall application system: provide various application systems to support the work of the school, covering the needs of digital management of school teaching, moral education, educational research, logistics and other lines, constituting the “digital campus application system”. Such as teacher education and teaching, head teacher, enrollment and employment management, student management, financial charges, logistics management, post practice, educational administration management, office automation system, campus card, etc.
2.3 Necessity of Vocational Education Informatization Platform With the improvement of informationization, data collection channels are more extensive. There are many kinds of data involved in all aspects of work, but there are also problems of low value density. This requires data mining, effective data management, analysis and extraction, from which high-value information can be obtained and teaching work can be improved. Due to the development needs of Vocational education, it is necessary to expand its functions according to the actual learning conditions. The platform should have good applicability and expansibility, such as formulating unified protocols and reserving standard interfaces, so as to avoid wasting resources due to the development of different information systems. At present, vocational education in Colleges and universities has put forward higher and higher requirements for the construction of information platform, which also promotes the continuous development and evolution of the system. It is imperative to establish a unified information platform to maximize efficiency.
66
X. Jiang and Z. Pan
3 Analysis of the Current Situation of the Development of Vocational Education Informatization in China 3.1 Progress in the Development and Application of Digital Teaching Resources Progress has been made in the development and application of digital teaching resources in recent years. In recent years, the Ministry of Education has organized and developed more than 40 national higher vocational education professional teaching resources banks and more than 300 national quality resources sharing course teaching resources. It has opened a national and higher vocational education digital learning resources platform, and has opened 1000 network education excellent courses and 1000 video lectures to the community free of charge. The center integrates more than 30,000 continuing education courses. At present, many regions in China have constructed network learning space and digital resource bank, and initially realized the co-construction and sharing of digital high-quality resources in Vocational education. The educational and teaching resources in the construction and application of educational informatization platform in vocational schools are uneven. As we all know, the well-built information platform is used to serve the future teaching activities of teachers and students, so it is very irresponsible for a few teachers to upload some low-quality teaching courseware, teaching videos, exercise homework to the secondary vocational school education information platform. Under the environment of education informationization, anyone can learn at any time, which provides a strong guarantee for realizing education equity and promoting education balance. At the same time, through the depth and wide application of information technology in education, we can promote the comprehensive reform and innovation of educational content, methods, means and concepts, give full play to people’s learning and development potential, and help to improve the quality of education and teaching.
3.2 Continuous Promotion of Digital Resources and Management Platform Construction National vocational education demonstration schools, higher vocational education demonstration (backbone) school project management information system, vocational school student information management system, national vocational college skills competition management information system and other information management platforms have been built, forming a national website and more than 20 provincial websites complement each other’s vocational education backbone network. Firstly, we should establish a “student-oriented” interactive platform of educational and teaching resources in secondary vocational schools. Strengthen the construction of digital terminals and application platforms in schools, comprehensively improve
Construction of Vocational Education Information Platform …
67
the informationization level in school management, teaching application and student training, including the construction of digital library, audio and video library, courseware library, excellent training cases, reform and innovation courses, Digital Library and other teaching resources, to provide students with high-quality learning resources such as online learning, mobile learning and online counseling. Source.
3.3 Teachers’ Information Application Level Continuously Improves The use of modern information technology has played a positive role in promoting the teaching reform of Vocational colleges, promoting the reform of teaching and learning methods, and has effectively promoted the deep integration of modern information technology and teaching practice. Among them, vocational colleges must actively promote the use of modern information technology for teaching reform, optimize teaching means, and improve the quality of education. Schools try their best to create advanced modern information technology environment and equipment for teachers, such as giving each teacher a notebook computer serving teaching reform and using modern information technology and free account on campus network, setting up special zones of “network learning platform”, “resource management platform” and “interactive learning platform” on the school website, which facilitates teachers and students to adopt existing ones. Teaching reform should be carried out on behalf of information technology.
4 Accelerating the Construction of Vocational Education Informatization Platform 4.1 Evaluation and Acceptance of Information Platform Construction In the process of building the information platform of Vocational education, relevant managers should pay attention to the evaluation and acceptance work and formulate a perfect working system. To a certain extent, it can better improve the quality of information platform construction, according to the analysis of website construction content, introduce advanced technology. At this time, the content, technology and various functions of the website construction should be evaluated, and the acceptance work should be carried out on the basis of understanding its development direction. In the process of setting up the evaluation system, managers should refine the evaluation content and distinguish the importance of various functions and powers according to the actual situation of Vocational schools. In order to improve the efficiency of
68
X. Jiang and Z. Pan
evaluation and acceptance work, managers can organize expert groups to carry out evaluation and acceptance work in the process of in-depth discussion and research.
4.2 Operation Mode of Vocational Education Informatization Platform The development of vocational education information platform depends on the effectiveness of the operation mode. At present, the operation mode of the national vocational education website can be divided into three types: government input type, complete market operation type and government-led operation type. Government investment-oriented means that the government is responsible for the introduction of all funds in the process of the construction of vocational education website, and the ownership belongs to the government. This kind of mode is suitable for vocational schools with lower economic level, and can better improve the efficiency of website construction. Complete market operation is the construction of educational schoolled information platform. The government has little influence on it. This kind of operation mode is suitable for the construction of educational functional information platform. However, during the actual operation period, because it is the website of the educational system, it is difficult to improve the operation efficiency. In a short period of time, it cannot achieve the expected benefits, and only rely on the market to achieve economic benefits. Government-led operation means that the government puts forward the direction of the construction of information platform, manages it to a certain extent, cooperates with vocational schools, and improves the efficiency of the construction of information platform of vocational education on the basis of cooperation.
4.3 Establishment of Information Platform Guarantee Mechanism The operation efficiency of vocational education websites and the degree to which the objectives are achieved are closely related to the guarantee mechanism. Therefore, managers should attach importance to the construction of information platform security mechanism, formulate a sound management system, introduce various types of educational resources, and attach importance to organizational work. In the process of building guarantee mechanism, relevant managers should introduce sufficient funds for the construction of information platform, attach importance to the introduction of advanced technology, and ensure the healthy development of vocational education information platform construction.
Construction of Vocational Education Information Platform …
69
4.4 Promoting the Basic Ability of Vocational Education Informatization The construction of information platform in Higher Vocational Colleges emphasizes that information technology should be used to create an ubiquitous learning environment or teaching environment to provide diversified learning support for the reform of teaching methods characterized by “autonomy, inquiry and cooperation”. Strengthen the infrastructure construction of digital campus and improve the standardization level of digital campus. The key to solving the problem of information resource sharing lies in standardizing the construction of various education systems with standardized and standardized educational technology framework. The Plan of Action puts forward “Promoting the implementation of relevant standards for the construction of digital campus in Vocational education”. Accelerate the construction of ubiquitous and safe full-coverage campus network, strengthen resource integration and standardization, improve the standardization level of digital campus infrastructure and service system construction in Vocational colleges, and promote higher efficiency and wider sharing of high-quality digital education resources.
5 Summary In the campus, teachers and staff should actively promote the use of modern information technology to carry out teaching reform, optimize teaching means and improve the quality of education. Schools try their best to create advanced modern information technology environment and equipment for teachers, such as giving each teacher a notebook computer serving teaching reform and using modern information technology and free account on campus network, setting up special zones of “network learning platform”, “resource management platform” and “interactive learning platform” on the school website, which facilitates teachers and students to adopt existing ones. Teaching reform should be carried out on behalf of information technology.
References 1. Liu, X., and K. Li. 2017. Application research of the microlecture teaching model in the higher vocational education and teaching reform. In International Conference on Information Technology in Medicine & Education. 2. Gessler, M., and F. Howe. 2015. From the reality of work to grounded work-based learning in German vocational education and training: Background, concept and tools. International Journal for Research in Vocational Education & Training 2 (3): 214–238. 3. Wang, Z.L. 2016. Research on the construction of “metal materials and heat treatment” network course to higher vocational colleges under the background of big data. Applied Mechanics and Materials 851: 615–619.
70
X. Jiang and Z. Pan
4. Gleeson, C.P. 2015. Residential heat pump installations: The role of vocational education and training. Building Research & Information 4: 1–13. 5. Guo, G., B. Qiu, and L. Li. 2016. Study on the strategies of improving vocational education teachers’ ability based on the “internet + education” background. In International Conference on Information Technology in Medicine & Education. 6. Guo, C.Z. 2015. Research on the problems and countermeasures of Chinese teachers in vocational education training. In 2015 2nd International Conference on Education Reform and Modern Management (ERMM2015): 157–159. 7. Yin, K., W. Li, and Y. Ke. 2016. Research on the skill teaching reform of higher vocational education from the perspective of sustainability: Case study of software college. In International Conference on Computer Science & Education. 8. Beicht, U., and G. Walden. 2015. How socially selective is the German system of initial vocational education and training? Transitions into initial vocational training and the influence of social background. Journal of Vocational Education & Training 67 (2): 235–255. 9. Li, Y., C. Wang, and M. Ha. 2015. On the cultivation mode of petroleum engineering professionals in higher vocational education. Higher Education of Social Science 8 (1): 132–136. 10. Farías, M., and M.P. Sevilla. 2015. Effectiveness of vocational high schools in students’ access to and persistence in postsecondary vocational education. Research in Higher Education 56 (7): 693–718. 11. Cong, P., and X. Liu. 2016. Study on the construction of “industrial cluster and higher vocational college docking cooperation research base”. Shipbuilding Vocational Education 4 (2): 1–5. 12. Zhu, Z., J.Q. Yan, J.F. Jia, et al. 2017. Influential factors of vocational education training demand of new-generation migrant workers in urbanization—Based on the survey data of Liaoning Province. Journal of Northeastern University 19 (4): 371–377. 13. Lv, C., and X. Ding. 2016. Research on practical teaching reform of tourism management major on the basis of promotion of vocational ability. In International Conference on Contemporary Education. 14. Xu, X., A. Welch, Z. Zhou, et al. 2015. Influence of traditional cultural ideas on the construction of quality culture in higher vocational education and constructive suggestions. Journal of Tianjin University 17 (1): 41–44.
Language Conversion and Cultural Communication in Nobrock’s Translation—Taking Xunzi’s Persuasion of Learning as an Example Qingkun Hu
Abstract The English version of Persuasion of Learning was translated by John Nobrock. This paper chooses several examples of its characteristics of understanding and expression, textually examines the exegesis of Xunzi’s Persuasion of Learning, discusses the differences between its English expression and the Chinese source language, explores the gains and losses of the transmission of Chinese cultural images, analyses how to retain the linguistic and cultural characteristics of the original text in cross-cultural communication, and puts forward the translation principles of “Chinese English” and the excellent cooperation between Chinese and Western translators. They complement each other in order to promote the spread and development of English translation of ancient Chinese works. Keywords English translation of Xunzi’s Persuasion of Learning · Language conversion · Cultural communication
1 Introduction The emergence and study of the English translation of Xunzi’s works is an inevitable trend of the internationalization of local culture. Ancient Chinese with Chinese images is the carrier of Xunzi’s endless ideological and cultural heritage. How to convey its cultural images in English is the focus of translation strategies. Most of the studies on Xunzi in China begin with his thoughts and exegetics [1]. Most of the English translations recommended by foreign translators are published by foreign translators. In China, most of them are translated by Xunzi’s famous sayings and network translators. In 2000, the Greater Chinese Library published three volumes of Xunzi works translated by Nobrock, a professor of philosophy at the University of Miami in 1988, 1990 and 1994 respectively. His version closely follows the original text and translates literally according to the words, taking into account the characteristics of “easy to understand” and “preserving the style of the original work”. Q. Hu (B) Anhui Sanlian University, Hefei, Anhui Province 230601, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_11
71
72
Q. Hu
Xunzi’s Persuasion of Learning is a wake-up warning of educational thoughts more than two thousand years ago [2–4]. Five metaphors are used at the beginning to illustrate the importance of acquired learning. Eight metaphors are used later to illustrate the importance of concentrating on learning. Persuasion of Learning implies that the whole book, whether it concerns about military affairs or governing the country, gentlemen should be good at learning in their lives, to achieve “change the nature of human nature” [5, 6]. The book borrows rich Chinese cultural images to illustrate the truth of self-cultivation learning. When dealing with cultural translation, translators basically use literal translation. The translation is clear and fluent, giving full play to the advantages of their mother tongue. Especially where there are many disputes about the translation of ancient Chinese into modern Chinese, it is achieved by English concisely and clearly [7, 8]. For example: “It is not because the nests themselves are not well-made, but because the building materials are so weak.” There are many disputes about the exegesis of the word “strong”. There are many explanations of the word “strong”: “Perfect” Fang Yong, Li Bo; “complete” by Yang Liuqiao and Gao Changshan; and “strong” by Yu Zhirong [9]. In English translation, the complexity of citation and exegesis is omitted and well-made is used effortlessly. Nobrock’s versions are still popular, making an indelible contribution to the spread of Xun’s studies in English-speaking countries. On the one hand, Nobrock’s rigorous academic attitude and profound academic skills are admirable. As an American, the translator has been studying Chinese culture for a long time. Its advantage lies in the accurate and fluent expression of English and the better understanding of the cultural differences between China and the Western countries. It is worth learning and learning from [10, 11]. The investigation proves that Nobrock’s English translation guides the Western interpretation of Xunzi. On the other hand, when translating Xunzi, a classic of Chinese traditional culture, translators are bound to face the difficulties of how to express the unique words of ancient Chinese accurately in English and how to accurately convey the images of Chinese culture to the West. Translators in English-speaking countries inevitably have deviations in their understanding of ancient Chinese, lack comprehensive knowledge of the cultural background of the Warring States Period, and become inferior translators, which will inevitably lead to the misunderstanding of the translated text and stimulate the discussion in Confucian and translation circles. In this paper, several examples are selected and classified to seek rectification.
2 Differences in the Connotation of Character Images In Xunzi, characters with high frequency are referred as “gentleman”, “villain” and “sage”. There are 14 times for “gentleman”, two times for “villain” and one time for “sage” in the article of Persuasion of Learning. Xunzi has the historical characteristics of the Warring States Period. These characters refer to images with Chinese characteristics in ancient times. They are cultural symbols of the wisdom and history
Language Conversion and Cultural Communication in Nobrock’s …
73
of Chinese people. When translating, people can borrow the expressions of “Chinese English”. As early as 1980, Mr. Ge Chuanhua first put forward the concept of “Chinese English”. He believed that it was either in the old days or in New China, speaking or writing English is something unique, such as Four Books, Keju, Xiucai, etc. All the above expressions belong to “Chinese English”. More than 30 years later in China, English has been honed and used in China. With Chinese characteristics, Xunzi is full of typical symbols of Chinese cultural imagery and fit for the translation principle of “Chinese English” with the original flavor, because exotic culture is not afraid of readers’ misunderstanding, but of changes in translation and misleading readers. The beginning of Persuasion of Learning is “Gentlemen say there is no end to learning.” The term “gentleman” is widely used in pre-Qin classics, which means a man of noble character. During the period of Zhou Dynasty, Zhou was divided into feudal lords and established a state. The princes are called monarchs, and the sons of monarchs are called gentlemen. Later a man of high moral standards is known as a gentleman. Confucius further standardized the meaning of gentleman, making it a standard of moral judgment. The standard of annotating gentlemen in The Analects of Confucius is a person with high moral accomplishment. The first three meanings on Page 719 in the English-Chinese Dictionary (2003) edited by Lu Gusun are as follows: “the person with status, the person with accomplishment, the gentleman.” They are far from the images of a gentleman with broad knowledge, profound thoughts and noble moral character. The Oxford Advanced English-Chinese Dictionary (4th edition) includes the above three meanings, as well as the meanings of rich gentry, rich and idle people, while gentleman is a commendatory word, the image differences between the two are obvious. It is necessary to express the unique Chinese cultural images, which can be translated directly into Junzi. In order to facilitate the readers, it is also possible to start with annotations and explanations. With the gradual development of Xun’s studies, the culture brought about by the alienation of Chinese Pinyin will be understood and accepted. Opposite to the “gentleman’s learning” is the “villain’s learning”. “Villain” usually refers to the antonym of “gentleman” defined by Confucianism. There are 12 explanations in Chinese classics. For example, in the Analects of Confucius: “Only women and villains are difficult to support, if you are close to them, they may not respect you; if you alienate them, they may resent you.” In the past villain referred to the subordinate man, Zhu Xi collected notes: “The villain is also known as the subordinate man.” In Evil Nature, people who indulge in temperament and violate etiquette and righteousness are villains. Villain is an image of indulgence, misconduct and violation of etiquette. There are many kinds of explanations in modern Chinese translation, and English translation is difficult to cover them up. Petty man was once translated by Nobrock. In both Lu’s and Oxford’s dictionaries, the word petty is interpreted as “small, trivial and unimportant”, which has some links with the Chinese images, but it is difficult to cover all the meanings. If it is transliterated into Xiaoren, it symbolizes the meaning of cultural symbols with Chinese characteristics. The highest level of learning is to be a saint. The definitions of saint often appear in the books of various schools of thought. “Owning both talent and virtue are all
74
Q. Hu
saints”, including ancient emperors, and later people with high moral and Confucian attainments. The definition of saint in traditional culture refers to the person who knows and acts perfectly and is the infinite existence in the limited world. Originally out of the pursuit of perfectness in Confucianism, saints were originally directed specifically at Confucianism, but later scholars, even ancient and modern religions and schools, also had their own saints. Christian saints are called sages in English. In the two dictionaries mentioned above, the first meaning is “sage, wise man”, which is close to the image meaning of China; but the second meaning is the name of a plant “sage”, which shows that the English word itself has ambiguity. In order to distinguish saints from different countries and export cultural symbols with Chinese characteristics, after all, “saints” in Xunzi refers specifically to Confucian cultural symbols in history. Although they have similar qualities, they are different from Christian saints. Transliteration of Shengren (saints) may be helpful to distinguish them from other religions and schools.
3 Semantic Differences in Word-Splitting Translation The meaning of nouns in the original Chinese text is significant. The English interpretation is superficial and decomposed into equivalent literal translation. It can be said that word-to-word translation is inferior to the whole sense-to-sense translation. Here are two examples to illustrate. Example 1: If you have not heard the words inherited from the Ancient Kings, you will be unaware of the greatness of learning and inquiry. The word “learning” appears 21 times in Persuasion of Learning. Most of Nobrock’s translations use the world learning and study twice. The meaning of the word learning is obvious in Chinese. Here is the noun, such as “Xunzi is full of learning”. This sentence tells us that the wise kings of the previous dynasties were knowledgeable, and profound in thought. Learning, an essential quality of gentleman, appears frequently in Xunzi. The meanings of words in ancient Chinese and modern Chinese are very clear, but when translated into English, they are divided into two parts: learning and inquiry. Obviously, the differences between English and Chinese are not well understood. Many disyllabic words in Chinese constitute a semantic meaning, which can not be divided into two formal meanings, so it is enough to translate them into learning. Ancient wise king appeared twice. Chinese annotations of the ancient sage kings, including Yao, Shun, Yu, and other wise monarchs, have become the ideological context of Chinese cultural tradition in Xunzi. For example, “the ancient wise king” appeared in the later text, which has self-evident significance. However, in English context, there is no such background of cultural inheritance. Nobrock translated it into ancient kings and the Internet into the former kings, which may include tyrants. As a result, it is necessary to translate the ancient wise kings. Example 2: If you accumulate enough water to fill a chasm, dragons and scaly dragons will be born within it. Jiaolong is a kind of miracle animal in Chinese legend that can make clouds and rain rise. It is found that dragons and scaly dragons have
Language Conversion and Cultural Communication in Nobrock’s …
75
different explanations and meanings. Interpretation in Rhyme: Jiao, Dragon. No horn is called Jiao. In Baopuzi, the mother dragon is called Jiao. This refers to the flood dragon, which is sure to be noisy, without emphasizing which kind of Jiao, and after all, it is a myth and legendary animal, which cannot and need not be scientifically divided into species and subjects. The Chinese character is apparently divided into dragons and scaly dragons. Jiaolong is both a myth and a dragon. To be concise, it is appropriate to translate it into flood dragon or dragon. A steed only leaps ten steps at a time, while an inferior horse can cover a long distance by walking continuously. The meaning of Qiji in the Chinese dictionary is a steed. In the chapter of Self-cultivation, a steed travels a thousand miles in a day, and ten inferior horses can also do that. The word Ji also refers to a steed, which is not different from the meaning of Qi. Nobrock’s English translation is Qiji. I think transliteration is preferable. Similarly a dragon can transliterate Jiaolong. Both of them are disyllabic and monosyllabic words in Chinese. It is not necessary to translate them words by words, otherwise it is easy to mislead readers into thinking that they are two kinds of animals. Example 3: … recites and enumerates his studies that he will be familiar with them, ponders over them and searches into them that he will fully penetrate their meaning,… It is the third time that the word number appears in the article. The meaning of reciting number is reading different books. Nobrock translates it into recites and enumerates, which are recitation and reading. Obviously, recites and enumerates are translated separately. Number here means different books. The translator’s misunderstanding of Chinese vocabulary naturally leads to the deviation of English expression. Textual research on its cultural background shows that the ancient Chinese traditional intellectuals were wearing long gowns and reciting by heart. The paper refers to reciting and digesting the classic books, poems, rituals and so on. Reciting is used in its original meaning, so it can be translated into reciting kinds of books.
4 Differences in the Understanding of Word Meanings Example 1: If the root of the orchid and the rhizome of the valerian are soaked in the water used to wash rice, the gentleman will not go near them, and the petty man will not wear them. The moral of this sentence is to stay away from the evil and close to the kind. Various annotations of the word slops are similar to each other: Zhang Jue’s translation of “urine”; Wang Xianqian annotated “long slops”; Modern Chinese Dictionary explains it as stinky swill water. Zheng Xuan’s Notes in the Internal Principles of Rites: “Qin people call bait as bait.” It’s meant to be foul water with human urine. The water was used to wash rice. But rice-washing water cannot be equated with dirty water or swill water in China. Dai people wash their hair with rice-washing water, which is a prescription for hair maintenance. People wash dishes and meat with rice-washing water, and remove oil and dirt. It is clean and environmentally friendly. We can see that the translated “rice-washing water” is not dirty, but nutritious and
76
Q. Hu
useful. It is obvious that the meaning of bait is different. Therefore, dirty water is used in translation. In the sentence, “common people” refer to the ordinary people without official rank, and later appear in “Tuxiang people”, “Tu people can be Yu” in Evil Nature, and “ordinary people, water” in Lament. It refers to the common people as well. The English translation is petty man, which is similar to the English translation of “villains” appearing in the following text. Other chapters sometimes explain that villains are included in the common people, but the common people are not equal to the villains. This is the meaning of ordinary people. Therefore, it is translated into the common people or commoners on the internet, which is closer to the original text. Of course, Pinyin is also a translation method, Shuren, which can be explained by adding the above two simple English words in brackets. Example 2: In the southern regions, there is a bird called the “dunce dove”… In the western regions, there is a tree called the “servant’s cane”… There is no need for commentary in the translation of the original text, and the original names can be used directly. However, the translation into English is somewhat unexpected. “Dunce dove” and “servant’s cane” mean “dumb pigeon” and “servant’s crutch” respectively. After verification, it is found that the image of the original text is quite different from that of the translated version. The following are the verification notes. Meng jiu is a small, plump light brown nesting bird. The nest is interwoven with twigs, grass leaves, moss and feathers. It is suspended on reeds, rushes or straw poles. The shape of the nest is a dome structure with a side door, 50 cm from the ground. The eggshell laid by the nest is very thick and firm. In Shanshuo, Meng Changjun also mentioned this kind of bird in the talk with others. The guest said, “Otherwise, when I see the bird nesting in the reed with its hair, the skilled female workers can’t do it. When the wind comes, the grass will break their eggs. Why? Its supporter makes it happen.” Dove means the generic name for pigeons. The bird builds the nest on the branches, and lives in trees, forests, or arable land. Dunce dove is a bit like the modern network word pigeon sprouting, which is far from the image meaning of skillful woman bird and hinders the dissemination of cultural image in the original text. The first method of translation uses proper nouns: it can be accurately translated into marsh wren. The second method is to consider the need of context. In order to distinguish it from dove and to make readers understand its nesting characteristics, it is suggested to retain transliteration and add a note to Mengjiu (also called Qiaofuniao in China, a bird with a dab hand at nesting). Black berry Lily Rhizome is a kind of perennial herbal shrub, which can be used as medicine. In Records of History: To its east, there is angelica and black berry Lily Rhizome. Thus it can be seen that Angelica and black berry Lily Rhizome often appear together in the text, they are herbal vine. The original text mentions that the cane is four inches long and is born on a high mountain. The English translation of servant’s cane is a servant’s crutch. In reality, crutches are made of tougher, long and handy sticks. Canes can rarely be used as crutches. So the translation is also transliterated. If necessary, a small explanation can be added: Yegan, a kind of cane. Example 3: An ode says: the ring dove is in the mulberry tree, its young ones are seven. This reference to “dove” can be used exactly as discussed above. Based on this understanding, Nobrock’s translation is the ring dove. It means “pigeons with rings”.
Language Conversion and Cultural Communication in Nobrock’s …
77
This sentence comes from Poetry: a kite dove is cuckoo. Zheng Xuan commented, “A kind emperor should be fair to each person.” The virtue is the example of the emperor’s benevolence. The idiom of the fairness of cuckoo has been passed down. It is said that it can feed the young equally. The image of cuckoo is used to describe that the monarch treats his people fairly. So it can be accurately translated into cuckoo.
5 Cultural Differences in Amplification in Translation Example 1: “Using a finger to plumb the depth of the Yellow River,” or “a lance to pound the husks off millet,” or “an awl to eat the evening meal from a pot.” They have become two idioms with image metaphor in China. The meaning of the first phrase is to measure the depth of the river with your fingers, which means that a person cannot achieve the purpose. “River” is a general term, not a specific term for a river. However, when it was translated into the Yellow River by Nobrock, the use of capitalization clearly referred to the only Yellow River in China. There is no need to give full play to the connotation of cultural image, that is, the general rivers can do it. The meaning of the second phrase refers to the use of cones instead of chopsticks to eat in a pot is also a metaphor that fails to achieve the goal. It does not point out that “meal” is the traditional Chinese meal of three meals a day. Therefore, it is not necessary to translate it into the evening meal, and the source language and culture can be faithfully translated by the word meal. Example 2: It can eat dust and dirt above ground and drink from the waters of the Yellow Springs below, because its mind is fixed on a constant end. As for the translation of “Huangquan” in this sentence, Mr. Jiang’s comments are very reasonable: of course, translating “Huangquan” into “the under world” and “the nether world” is also indispensable, and the annotation trouble can be saved. However, in order to preserve the style of Chinese culture, Nobrock did not hesitate to work hard and took a literal translation and annotation route: The Yellow Springs, deep under the earth, were where the spirits of the dead went and so was another name for the underworld. When “Huangquan” is used as a special noun, it refers to the place where people live after death in traditional Chinese culture. Because the water is yellow when the well is drilled to the depth, and because the person is buried underground after death, the ancients live in the underground world, that is, the Yincao Prefecture, in the Huangquan area in the extreme depths of the earth. Ancient superstition refers to the return of the soul, such as Bai Juyi’s Song of Everlasting Hatred, “Upper Poverty and Blue, Down Yellow Spring, Two Vagueness is not seen.” Nobrock really knows a lot about Chinese culture. The annotations added by the translator are the connotations of the above cultural images. But in this article, “Huangquan” obviously does not refer to the place where earthworms die, but refers to the place where earthworms do not have enough, but can drill down, reach the deep ground, and drink deep underground spring water. It is a metaphor that learning with one mind will succeed. So instead of referring specifically to capitalizing the Yellow Springs, direct lowercase is in line with the original meaning.
78
Q. Hu
Example 3: In antiquity, when Hu Ba played the zither, deep-water sturgeons came up to listen, and when Bo Ya played the lute, the six horses looked up from their feed bags. This sentence describes the zither drums and sounds so beautiful that even the fish sinking under the water can not help but come out to listen. “Shenyu” commutes “Chenyu”. Chinese idioms are “sunken fish falls wild goose, shut the moon and shy flowers”. Sunken fish comes from Xishi in the Spring and Autumn Period. The Fish in the water are amazed to see her face and sink to the bottom of the river. Without specifying what kind of fish it is, deep-water sturgeons are used in translation. Translator subjectivity is also reflected in similar places in the text. Why should the translator translate into sturgeon instead of other kinds of fish? The special verification data are as follows: The sturgeon is an animal-feeding fish, which can prey on zooplankton during the feeding stage of young fish, but soon the fry developed into benthic life. It turns out that sturgeon is a benthic animal. It would be difficult to summon sturgeon if it were not for its pleasant rustle. This kind of translation has a deeper meaning than the original text, but translation is based on the re-creation of the original text. The first task of exerting subjectivity is to be faithful to the original text. Based on this consideration, it is enough to translate into fishes. Hearing the wonderful music, all kinds of underwater fish, including sturgeon fish, cannot help floating to the surface of the scene. To sum up, the discussion of Chinese-English translation of these classics is to convey the culture and thoughts of the source language of Xunzi more faithfully. If word-to-word translation can make “the effect of the translated text on the target readers is the same or similar to that of the original readers” [12], it will be helpful. The risks of word-to-word translation exist if it is the opposite or hinders English readers from understanding the source text. We can draw lessons from the translations of Lin Daiyu’s English names. Pei Yu’s blog article Black Jade, Misleading the West for Forty Years: As early as the 1970s, Daiyu was translated into Black Jade, which was discovered and criticized by Wu Shichang, a world-renowned master of Sinology and Hongxue. Wu checked the dictionary and cited English newspapers and magazines to show that Jade had a bad extension when referring to women: sluts. Later, the Hawks Edition in 1973 and the Yang Xianyi Edition in 1978 agreed with it and replaced Black Jade with the Pinyin Lin Dai-yu. Lin Daiyu is a unique character name in Chinese fiction, which conforms to the category of “Chinese English”. As an example, the principle of “Chinese English” has been successfully applied to deal with the cultural misunderstanding caused by translation. If at first it is convenient for the readers to understand, small notes can be added to explain them later. Pei’s article also mentioned that one of the ways to improve the English translation of Chinese classics is to subsidize foreign translators. In my opinion, this kind of assistance mainly refers to joining the intellectual support of Chinese translators, so as to avoid or save foreign readers’ misunderstanding of the culture and values of the translated text. Chinese cultural imagery can cause translators and readers to make infinite deliberations. Translators need rigorous textual research in order to convey the unique Chinese language and culture authentically.
Language Conversion and Cultural Communication in Nobrock’s …
79
6 Conclusion With the upsurge of English in China, the translation of English masterpieces into Chinese has been vigorous, and even various versions have appeared. However, few versions of Xunzi have been translated into the West. The cultural differences between China and the West lead to the problems of translation. The cultural deficit mentioned in the 18th National Congress is the concentration of this phenomenon: more foreign cultures are introduced into China and few cultures are introduced to other countries. To reverse the deficit, Chinese and foreign translators need to work together to complement each other’s advantages, so that the translation of Xunzi, a Chinese classic, can give full consideration to both language transformation and cultural transmission and highlight the elements of Chinese culture. However, the drawbacks of Chinese Pinyin translation in “Chinese English” are that there are too many homonymous and heteronymous Chinese characters, and expedient measures are parentheses or simple English explanations. With the blending of Chinese and Western cultures, Chinese characters may be used directly. On June 9, 2012, the Chinese character Gaokao in the New York Times entered the English report directly. The blending of language and cultural imagery will create more convenient conditions for the English translation of Xunzi to faithfully reproduce the charm of Chinese traditional language and culture more than two thousand years ago. Acknowledgements The paper is one of the results of Educational Quality Project of Anhui Province—Chinese Culture (English); Code: 2018mooc097.
References 1. Ancient Poetry Network. Records of the Grand History of China [EB/OL]. 22 May 2014. http:// www.gushiwen.org/GuShiWen_ec024a477f.aspx. 2. Baidu Encyclopedia. Sturgeon [EB/OL]. 22 May 2014. http://baike.baidu.com/view/228927. htm?fr=aladdin. 3. Yong, Fang, and Bo Li. 2011. Xunzi. Beijing: Chung Wha Book Company, Limited. 4. Ge, Chuanyi. 1980. On Chinese-english translation. Translation Communication. 5. Jiang, Jiansong. 2016. Text and culture: A comment on Nobrock’s English version of Xunzi. Foreign Language and Foreign Language Teaching. 6. John, Nobrock, and Jue Zhang. Xunzi, greater China library. Changsha: Hunan People’s Publishing House, 2000. 7. Huijuan, Ma., and Ju Miao. 2016. Selection of contemporary western translation theories. Beijing: Foreign Language Teaching and Research Press. 8. Modern Chinese dictionary. Beijing: The Commercial Press, 2014. 9. Yu, Zhirong. 2017. Explanation of the word finish in Xunzi’s persuasion to learn. Language Research. 10. Pei, Yu, and Black Jade, Misleading the West for forty years [EB/OL]. 22 May 2014 http:// book.ifeng.com/zhuanlan/peiyu/detail_2009_01/19/33325. 11. Xianqian, Wang. 2008. Annotation of Xunzi. Beijing: Chung Wha Book Company, Limited. 12. Newmark, Peter. 1981. Approaches to translation. Pregamon Press.
Design and Manufacture of Moxibustion Bed Control System Daming Pei
Abstract To meet the needs of health care, a moxibustion bed control system was designed and manufactured. STC15W4K56S4 is used as the main control chip to detect and control 24 heating bars that used to ignite moxibustion sticks. Using 18B20 to test the temperature, when the temperature of moxibustion bed is too high, the fan is driven to discharge heat to cool down. The host computer software uses eclipse as a development tool and sends instructions to the client computer through the Bluetooth serial port. Keywords Moxibustion bed · STC15W4K56S4 · 18B20 · Eclipse · Bluetooth
1 Introduction Moxibustion therapy [1] is an important part of Chinese medicine. With the improvement of living standards, people’s health awareness is getting higher and higher, and health consumption has developed from “sick treatment” to “preventing diseases” [2, 3]. More and more people pay close attention to traditional Chinese medicine therapy. Traditional Chinese medicine therapies with thousands of years of history, such as a bowl of soup, a needle, a column of moxibustion and so on, are typical representatives of green medicine [4]. Moxibustion has become the main force of health and health care, and the first choice for modern people. In order to meet the needs of health maintenance, this paper designs and makes a moxibustion bed control system. Under the moxibustion bed, 24 moxibustion bars were arranged according to the human acupoints, and the ignition of moxibustion bars commands was sent to the Client Computer via the iPad to control the 24 heating bars (DC 24 V, power 50 W). When the temperature of the moxibustion bed exceeds the threshold, the system starts the fan to discharge excess heat and realizes temperature control. The ignition D. Pei (B) Department of Electronic Information, Guangzhou Civil Aviation College, Guangzhou 510000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_12
81
82
D. Pei
Fig. 1 The block diagram of the control system
of moxibustion bars can in accordance with the Chinese medicine model, or can be customized according to the needs of people to meet the individual needs.
2 The Overall Framework of the Control System The block diagram of the control system is shown in Fig. 1. The system uses STC15W4K56S4 as the main control chip, and communicates with the host computer via serial port, the HC05 Bluetooth [5] module realizes the wireless serial port transmission. The system realizes temperature collection, fan and motor control through IO port, and the detection and control of 24 heating bars. The control of a heating bar needs an IO port, the detection needs an IO port, the control and detection of 24 heating bars needs 48 IO ports, the temperature acquisition needs an IO port, and the control of motor and fan needs two IO ports [6]. Therefore, 51 IO ports are needed to complete the control, and STC 15W4K56S4 with 64 pins (62 IO ports) is used as the main control chip.
3 Hardware Circuit Design Hardware circuit design includes serial download circuit, fan and motor control circuit, heating bar detection and control circuit, etc. Using CH340 chip to download the program, the circuit is shown in Fig. 2. The control circuit of the motor is shown in Fig. 3. When RELAY1 (the IO port of STC15W4K56S4) is low, Q1 turns on, relay J1 coil is energized, the normally open contact of relay J1 is closed, the motor runs. When RELAY1 is high, the motor stops. The control circuit of the fan is the same, and it is no longer listed separately. Figure 4 shows the control circuit of a heating bar, P18 connected to a heating bar. When #HEAT1 (SCM IO port) is low, Q3 is turned on, relay J3 coil is energized, normally open contacts are closed, and the heating bars are heated. When #HEAT1
Design and Manufacture of Moxibustion Bed Control System
83
Fig. 2 Program download circuit
Fig. 3 Motor control circuit
is high, the heater stops being heated. The heating bar is tested with the MAX471 [7, 8]. The current flows through the RS+ of MAX471, and flows out from the RS−, and then flows through the heater (P18), and the normally open contacts of the relay J3, to the ground. When the heating bar is good, HEAT1_FB is high level. When the heating bar is bad, HEAT1_FB is low level. The SCM judges the quality of the heating bar by detecting the level of HEAT1_FB. As shown in Fig. 5, the sensing current (I sense ) flows from RS+ through the precision sensing resistance(Rsense ) to RS−, the output (out) is grounded by the output resistance (Rout ). At this time, Q2 is disconnected, the amplifier A1 works, and the output current (I out ) flows out from the emitter of Q1. Because there is no current flowing through RG2, the potential of A1’s reverse input is equal to the potential
84
Fig. 4 Heating bar control and detection circuit
Fig. 5 MAX471 functional block diagram
D. Pei
Design and Manufacture of Moxibustion Bed Control System
85
of Rsense and RG2 intersection. Because A1’s open-loop gain is very large, its forward input and reverse input basically maintain the same potential. Therefore, the potential of A1’s forward input is approximately equal to the potential of Rsense and RG2 intersection. Therefore, the voltage drop produced by the sensing current I sense flowing through Rsense is equal to the voltage drop produced by the output current I out flowing through RG1. Iout × RG1 = Iload × Rsence , or : Iout = (Iload × Rsence )/RG1
(1)
Vout = (Rsense × Rout × Iload )/RG
(2)
where Vout is the expected actual output voltage, Iload is the actual current sensed Rsense is the precision sensor resistor, Rout is output voltage regulating Resistance resistor, and RG is the gain resistor (RG = RG1 = RG2). For MAX471, the set current gain is: Rsense /RG = 500 × 10−6
(3)
Rout in the system is 2.7 K, then Isense = 50 W/24 V = 2.08 A,
(4)
Vout = (Rsense × Rout × Isense )/RG = 500 × 10−6 × 2.08 × 2.7 × 103 = 2.8 V (5) The design of the moxibustion bed control system PCB board as shown in Fig. 6
4 Software Design 4.1 Software Design of Client Computer Flow chart of the client computer software is shown in Fig. 7. After the system starts, the serial port and IO port are initialized as the following parameters: serial port baud rate 9600, no parity check, 1 bit stop bit. And then wait for the host Computer to send instructions. When the instruction is the system self-check, the system enters the self-check procedure to check the quality of the heating bar. When the instruction is the prescription mode of traditional Chinese medicine, the system connects different heating bars according to the different mode, and disconnects the heating bars after the moxibustion bars are ignited. When the instruction is in shaking mode, the motor is turned on. When the temperature is too high, the fan is turned on and the heat is discharged.
86
D. Pei
Fig. 6 Control board
4.2 Software Design of Host Computer The host computer software is based on the android platform and uses Eclipse (Version: Luna Service Release) as a development tool. Including the Bluetooth detection and communication module, the system self-test module, the user recharge module, the Chinese medicine formula module, the custom module and other modules.
5 Conclusions Nowadays, with the development of economy, people are paying more and more attention to their own health and the huge space for the development of the health care market. The moxibustion bed has the advantages of professional convenience. The user can enjoy professional moxibustion services while lying in bed. The moxibustion bed can be used in health care and other places, has a high practical value.
Design and Manufacture of Moxibustion Bed Control System
87
Fig. 7 Flow chart of the client computer software
References 1. Huang, Chang, and Jun-tian Liu. 2015. Exploration on origin development and application of moxastick moxibustion. China Journal of Traditional Chinese Medicine and Pharmacy. 2015(30): 4218–4220 (in Chinese). 2. Hui, Xin, Chang Huang, and Hao Wang. 2017. Mechanism of Moxa-smoke in moxibustion and Its safety. World Chinese Medicine. 2017(12): 2246-2251 (in Chinese). 3. Qi, Li-zhen, Xiao-wan Ma, and Yu Hong. 2013. Comparison of moxibustion materials and methods between ancient and modern times. Chinese Archives of Traditional Chinese Medicine. 2013(31): 2349–2354 (in Chinese). 4. Shen, Jie, Bin-wei Ai, and Mei-hong Shen. 2016. The effective mechanism of moxibustion on preventing and treating sub-health state. China Medical Herald. 2016(13): 90–92 (in Chinese). 5. Yang, Ying-ming. 2017. Solution of android mobile app bluetooth control intelligent vehicle. Microcontrollers & Embedded Systems. 2017(3): 71–74 (in Chinese). 6. Han, Cheng-hao. 2010. Application technology of DS18B20 and redundancy check. Microcomputer Information. 2010(26): 112,124–125 (in Chinese).
88
D. Pei
7. Fu, Guo-hong, Ji-shan He, and Bin Xiong. 2006. Application of MAX471 in voltage regulator with current-limiting. Journal of Guilin University of Technology. 2006(26): 572–574 (in Chinese). 8. Yu, Ying, Cun-chen Tang, and Fan Ding. 2008. Design of the closed loop digital control direct current source. Electronic Measurement Technology. 2008(31): 34–38 (in Chinese).
Development of a New Computer-Aided Algorithm for Three-Layered Seale Wire Strand Geometric Design Chunlei Yu, Junqi Pan, Qiang Song and Mingzhao Zhu
Abstract A new computer-aided algorithm used for the geometric design of threelayered Seale wire strands is developed in this paper. The biggest advantage of the new algorithm is that it can easily formulate a one-dimensional problem which applied to determinate the diameter ratio of each layer wires of the three-layered Seale strand. Compared to conventional mathematical method, i.e. gradual approaching method, the new presented algorithm does not need a large amount of iterations to be implemented to achieve a good accuracy. Furthermore, the necessary computational condition that adjacent wires in the same strand layer should contact with each other in the conventional algorithm does not also needed. Three-layered 19-wire Seale strand was chosen to verify the newly developed algorithm. Numerical results show better agreement with those derived from the conventional methods. Furthermore, the new algorithm has a good computational efficiency and it can provide the exact coordinate values of the contact point between the 2nd layer wires and the 3rd layer wires. Keywords Seale wire strand · Geometric design · Diameter ratio determination · One dimensional problem · Computer-aided algorithm
1 Introduction Seale wire strands are a class of important engineering component and they are widely used in engineering application and employed as the basic component of stranded ropes. Gradual approaching method is the conventional means to design the Seale strands geometry structure [1]. It requires the cross-section shapes of helical C. Yu (B) · J. Pan · M. Zhu School of Mechanical and Electrical Engineering, Zaozhuang University, Zaozhuang, Shandong 277160, People’s Republic of China e-mail: [email protected] Q. Song Shandong Trunk Line Co., Ltd. of East Route of South-to-North Water Transfer Project, Jinan, Shandong 250000, People’s Republic of China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_13
89
90
C. Yu et al.
wires in the same layer just touch with each other. And more time and calculation resource are needed for achieving a good computational precise. With the development of computer and theory, computing precise and efficiency have been improved greatly for strand structure design. By using the Frenet-Serret frame, derivations of helical parametric equations of helical structures were determined [2]. Stanova et al. [3, 4] developed many geometric models of strands and ropes with different cross-section patterns, such as single-lay or double-lay strands and spiral one or two-layered oval strand. Wang et al. [5] built geometric models of wire strands by using newly developed mathematical geometric relationships on CATIA software. On basis of parameter geometric equations of spiral triangular strands, Chen et al. [6] developed its geometric model on Pro/Engineer software. Sun et al. [7] studied the relations of lay angles and wire radii between the two helical wire layers and presented a geometric model of stranded Seale rope by using the curve function in UG software. Zhao et al. [8] derived the transformation matrix of each wire/strand local coordinate system and presented a geometric model of strands under bending loading. Foti et al. [9] established a bending model of wire strands by using the Strand-attached Reference System. Jiao et al. [10] sets up the geometry model of 6 × 19 W + IWS steel wire rope based on Pro/Engineer software. Xiang et al. [11] proposed a multi-strand wire rope mathematical model, considering wire double-helix in multi-strand structure. Ma et al. [12] presented two methods to build a three-dimensional geometry of a wire rope bent over a sheave by using the Pro/Engineer software. In this paper, an effective geometric design method will be presented for the Seale wire strand. The key problem of the determination of diameter ratio of each layer wires is addressed as a one-dimension problem and golden section method is applied to solve it. In order to verify the newly developed method, a three-layered Seale with 19 wires has been chosen and comparations of numerical results predicted by using the two above mentioned methods are implemented. Numerical results show that the newly developed method in this paper can greatly reduce the calculation difficulty and improves the computational efficiency than the conventional method.
2 Design Process of Geometry Structure The geometry structure of a three-layered Seale strand with 19 wires is shown in Fig. 1. It consists of a straight center wire surrounded by n 2nd helical wires and n 3rd layer wires. αi is the helical angle of i-th layer wire (i = 1,2,3). R1 represents the radius of the center wire. R2 , r2 and R3 , r3 denote wire radius and helix radius of the two helical wire layers respectively. β2 and β3 are included angles between adjacent wires in the 2nd and the 3rd layer wires, respectively. Figure 2 shows the cross-sectional shape of a Seale strand helical wire. It is assumed as an ellipse and its equation can be written as
Development of a New Computer-Aided Algorithm for Three-Layered …
Fig. 1 Geometry structure of 19-wire three layered Seale strand Fig. 2 Helical wire cross-section
91
92
C. Yu et al.
x R/ sin α
2 +
y 2 R
=1
(1)
Selecting an arbitrary point P(x1 , y1 ) on the ellipse, its slope can be expressed as x1 sin2 α dy =± dx α 2 R 1 − x1 sin R
(2)
Also as shown in Fig. 2, the slope at the point P(x1 , y1 ) can be expressed as − tan( π2 − πn + β2 ). Hence tan(
π π β − + )= 2 n 2
x1 sin2 α α 2 R 1 − x1 sin R
(3)
The solution for x1 yields x1 =
π π β 1 R tan( − + ) sin α 2 n 2 2 sin α + tan2 ( π2 −
π n
+ β2 )
(4)
Combining Eqs. (1) and (4), y1 can be solved y1 =
R sin α sin2 α + tan2 ( π2 −
π n
+ β2 )
(5)
An analysis of the configuration shown in Fig. 2 yields r = b1 + y1
(6)
where, b1 = x1 tan( π2 − πn + β2 ), which is defined as shown in Fig. 2. Combining Eqs. (5) and (7), the helix radius r defined by Eq. (6) can be written as tan2 ( π2 − πn + β2 ) (7) r = R 1+ sin2 α As shown in Fig. 2, the wire cross-section shows a good helical symmetric relation, thus a representative segment can be achieved and it is shown in Fig. 3. It comprises the center wire, two 2nd layer wires and one 3rd layer wire which contacted with the two selected helical wires. By using Eqs. (1)–(7), the elliptical equation of the third layer wire O3 can be written
Development of a New Computer-Aided Algorithm for Three-Layered …
93
Fig. 3 A representative segment of the strand cross-section
f 3 (x, y) =
[x cos(π / n) − y sin(π / n)]2 [y cos(π / n) + x sin(π / n) − r3 ]2 + =1 (R3 / cos α3 )2 R32 (8)
Similarly, the elliptical equation of the second layer wire O2 can be expressed f 2 (x, y) =
x2 (y − r2 )2 + =1 2 (R2 / cos α2 ) R22
(9)
where, r3 and r2 can be calculated by using Eq. (7). The radius of the third layer wire can be calculated
R3 =d m
(10)
where, d is the strand diameter, m is the lay coefficient which can be determined by using the empiric table. The helical angle of the third layer wire can be calculated α3 = arctan
π(m − 1) k·m
(11)
where, k is the twisting moment multiplier which can also be determined by using the empiric table. For the Seale wire strand analyzed in this paper, the pitch lengths of each layer wires are equal, i.e. p2 = p3 . Hence the relationships between R2 and α2 can be written as R2 =
r3 tan α2
tan α3 1 +
tan2 ( π2 − πn + sin2 α2
β2 2
(12) )
94
C. Yu et al.
Implementing analysis of Eqs. (8)–(12), the conclusion can be derived that Eqs. (8) and (9) can be determined by α2 , β2 and β3 . Moreover, the values of β2 and β3 are assigned by designer depending on the strand design requirement. Hence the elliptical equations of the helical wires can be expressed as function of α2 . Now, the one-dimensional problem can be established as follows f (x, y) = f 2 (x, y) − f 3 (x, y)
(13)
Analyzing Eq. (13), conclusions can be achieved that if f (x, y) > 0, the aforementioned two ellipses have no intersections; if f (x, y) < 0, the two ellipses intersect with each other; if f (x, y) = 0, the two ellipses only have a tangent point. Since the ellipses O2 and O3 are contacting with each other, let f (x, y) = 0. Considering f (x, y) is the one dimensional function of α2 , hence Golden section method is applied. Based on the solution result of α2 , parameters about the Seale strand, i.e. R1 , p2 , r2 , R2 and p3 , can be achieved easily. Thus the Seale strand mathematical model can be established easily.
3 Numerical Example A typical three-layered Seale strand with 19-wire was chosen to verify the newly developed method. The comparisons of results predicted used the conventional design method and the new method were implemented. Prerequisites for the strand geometry design implementation are that the Seale strand diameter is d = 16.21 mm, twisting moment multiplier k = 8.83 and lay coefficient is m = 4.0525. Implementation of the conventional method, the radii of each inner layer wires are all expressed as multiples of that of the outmost layer wires and based on this the diameter ratio of each layer wires is achieved. When calculation is carried out, the diameter ratio is iterated until enough accuracy has been achieved.
Table 1 Numerical results of conventional method Geometry parameter
1st calculation
2nd calculation
3rd calculation
Lay angle
α2 = 8.13◦ α3 = 15◦
α2 = 8.45◦ α3 = 15◦
α2 = 8.44◦ α3 = 15◦
Helix radius
r2 = 2.99R2 r3 = 3.05R3
r2 = 2.99R2 r3 = 3.05R3
r2 = 2.99R2 r3 = 3.05R3
Included angle between contact point and ellipse major radius
θ2 = 49.91◦ θ3 = 69.91◦
θ2 = 48.39◦ θ3 = 68.39◦
θ2 = 48.43◦ θ3 = 68.43◦
Radius ratio of wires in each layer R1 : R2 : R3
1.986: 1 : 1.765
1.988: 1 : 1.767
1.988: 1 : 1.767
Development of a New Computer-Aided Algorithm for Three-Layered …
95
Table 2 Numerical results of newly presented method for different calculation step ε Geometry parameter
ε = 0.01
ε = 0.001
ε = 0.0001
Lay angle
α2 = 8.44◦ α3 = 15◦
α2 = 8.44◦ α3 = 15◦
α2 = 8.44◦ α3 = 15◦
Helix radius
r2 = 1.69R3 r3 = 3.05R3
r2 = 1.69R3 r3 = 3.05R3
r2 = 1.69R3 r3 = 3.05R3
Radius ratio of wires in each layer R1 : R2 : R3
1.125: 0.566: 1
1.125: 0.566: 1
1.125: 0.566: 1
coordination of contact points between the 2nd and the 3rd layer wires
x = 0.374R3 y = 2.119R3
x = 0.374R3 y = 2.119R3
x = 0.374R3 y = 2.119R3
The numerical results predicted from the conventional method are listed in Table 1. It can be seen that three iterative calculations are needed to implemented to achieve the precise results for the Seale strand analyzed in this paper. For the new method implementation, the included angle of the two helical layer wires should be preassigned, that is β2 = β3 = 0.5◦ . The numerical results with three different calculation step assigned in golden section method, i.e. ε = 0.01, ε = 0.001 and ε = 0.0001, are given in Table 2. It can be seen that numerical results with different calculation step are all identical. This indicated that the golden section method used to solve the one-dimensional problem has good efficiency. By comparing with results given in the two tables, it can be concluded that the results predicted by the new method are in excellent agreement with those achieved from the conventional method. Moreover, the new method can directly achieve good results on the basis of a sufficiently small iterative step, without a large amount of iterations. Hence, the new method can greatly reduce computing time and improve calculating efficiency. At last, the new method can give exact coordinate values of the contact point which located between the 2nd and the 3rd layer wires in the global coordinate system. This provides good foundation for contact behaviour analysis of Seale strands.
4 Conclusion A new geometric design method for Seale wire strands has been developed. Onedimensional problem, which depicts the relations between the helical angle of the 2nd layer wire and other geometric parameters of Seale strands, has been established. Golden section method has been used to address the problem and good results have been achieved efficiently. In order to verify the newly presented method, three-layered 19-wire strand has been modelled by using the new method and the conventional gradual approaching method. Comparisons show that results derived from the new method have shown good agreement with the conventional method and better computational efficiency. Furthermore, the locations of contact point between the 2nd and the 3d layer wires have been determined effectively in the global coordinate system
96
C. Yu et al.
of the strand. The method presented in this paper can also be extended and used for establishing the Seale strand model which has a more complex cross-section. Acknowledgements This work is supported by A Project of Shandong Province Higher Educational Science and Technology Program (KJ2018BBH018) and Doctoral Scientific Research Foundation of Zaozhuang University (2017BS05).
References 1. Pan, Z.Y., and M.H. Qiu. 2008. Production technology of wire rope. Hunan: Hunan University Press. (in Chinese). 2. Erdönmez, C., and C.E. Imrak. 2011. Modeling techniques of nested helical structure based geometry for numerical analysis. Journal of Mechanical Engineering 57 (4): 283–292. 3. Stanova, E., G. Fedorko, M. Fabian, and Kmet, S. 2011. Computer modelling of wire strands and ropes Part I: Theory and computer implementation. Advances in Engineering Software 42 (6): 305–315. 4. Stanova, E., G. Fedorko, S. Kmet, et al. 2015. Finite element analysis of spiral strands with different shapes subject to axial loads. Advances in Engineering Software 83: 45–58. 5. Wang, X.Y., X.B. Meng, J.X. Wang, et al. 2015. Mathematical modeling and geometric analysis for wire rope strands. Applied Mathematical Modelling 39: 1019–1032. 6. Chen, Y.P., F.M. Meng, and X.S. Gong. 2015. Parametric modeling and comparative finite element analysis of spiral triangular strand and simple straight strand. Advances in Engineering Software 90: 63–75. 7. Sun, T.G., and T.L. Shi. 2016. Mathematical model and finite element analysis of wire ropes. Journal of Wuyi University (Natural Science Edition) 20 (1): 64–68 (in Chinese). 8. Zhao, P., H. Wang, X.S. Tian, et al. 2017. Construction of mathematical model for the bending state of braided wire rope. Advances in Computer Science Research 71: 1421–1425. 9. Foti, F., and L. Martinelli. 2016. An analytical approach to model the hysteretic bending behavior of spiral strands. Applied Mathematical Modelling 40 (13–14): 6451–6467. 10. Jiao, A.S., L.M. Liu, and H.P. Yan. 2016. Parametric design and modeling of Warrington steel wire rope with metal strand core. Coal Mine Machinery 37: 236–238. 11. Xiang, L., H.Y. Wang, Y. Chen, et al. 2015. Modeling of multi-strand wire ropes subjected to axial tension and torsion loads. International Journal of Solids and Structures 58: 233–246. 12. Ma, W., Z.C. Zhu, Y.X. Peng, et al. 2015. Computer-aided modeling of wire ropes bent over a sheave. Advances in Engineering Software 90: 11–21.
Designing of Postgraduate Medical English Class in Smart Learning Environment Xiaofang Wang and Cheng Liu
Abstract Based on the smart education environment, this paper employs the combination between the formative evaluation and the summative evaluation in order to conduct a teaching experiment in the second semester of the first academic year for postgraduates, which aims to promote the teaching quality of graduate medical English through various learning resources in the context of smart education. Keywords Smart education · Postgraduates · Medical English teaching
1 Research Background of Smart Education In 2009, IBM launched the Smart Education Program and proposed five major paths: student technology immersion, personalized and diverse learning paths, service economy knowledge and skills, global integration of systems, culture and resources, and the key role of education in the economy of 21st century [1]. Later, the United States, South Korea, Singapore, China and other countries invested in the relevant researches on smart education. The research and practice of intelligent education is not only the up-to-date development tendency of the fourth educational break-through, but also an essential driving force for the innovation [2], smart education of technology intermedium has become a new realm and new appeal of education informationization today [3]. This study combines the research status of domestic smart education. With the method of knowledge map and co-word analysis, we have designed the undergraduate medical English classroom in smart environment in order to provide reference for subsequent smart education research. Scholars at home and abroad have different opinions on the connotation of smart learning. Up to now, there is no definite consensus on the definition of smart learning in the world. Different researchers explain wisdom learning from different perspectives. Kaur’s explanation of intelligent learning emphasizes the role and influence of X. Wang · C. Liu (B) School of Humanities, Jiangxi University of TCM, No. 1688 of Meiling Road, Wanli District, Nanchang City, Jiangxi Province, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_14
97
98
X. Wang and C. Liu
the implantation of technological means on the learning process, which is a relatively broad definition [4]. Hwang [5] of Sungkyunkwan University in Korea holds that smart learning refers to a flexible way of learning in which learners’ abilities can be enhanced by using open educational resources, smart IT and international standards from the perspective of the relationship between resources, technology and learners. This explanation not only from the perspective of technology, but also from the perspective of educational resources and these two perspectives, the purpose of which is to enhance the learning ability based on the change of learners’ behavior and to explain the wisdom of learning. Mumford once said that any understanding of technology cannot be separated from the understanding of human beings, and human beings cannot be totally equal to animals. To view human beings as human beings, technology must take into account the internal state of human beings [6]. In modern society, science and technology follow the path of rationalism and develop rapidly. Along with the logic of rationalism, it can promote the progress of technology to the greatest extent. But outside the technology itself, the subject of using technology is not included in the logic of technology development, which results in the deviation of technology from human beings. Technology is a purposeful creative activity of human beings, and it must reflect a certain value scale in the selection and development of technological projects [7]. The criteria for measuring this value scale are human beings, whether their demands are embodied or not, whether their subjectivity is realized or not, which should be the criteria for measuring technology. Education and technology serve human development, and human is the main body of educational and technological activities. As a new form of education, smart education comes from the integration of technology and education. The most fundamental reason for the integration of technology and education is that they have the common point of integration, which means they both regard human as the purpose of their own activities and promote human development. Education and technology are peoplecentered. People are the bridge connecting the two. People’s growth and development should be the internal requirement of smart education. To develop smart education, we should correctly grasp the relationship between technology and education. Technology is the basis of the development of smart education. Without the support of science and technology, the smart educational environment, interactive educational methods and accompanying learning system will become the castle in the air. But attaching importance to technology does not mean blindly following technology. In the final analysis, technology is only a means to achieve the goal, and human growth and development is the ultimate goal of smart education. The voices that drive educational change are endless, but to this day, limited changes have not met people’s expectations. Technology has changed all aspects of the world, but education has changed little. The famous Jobs’ question is a question, but also points out a direction for our change education, that is, technology to promote educational change. We need to emphasize high-tech information. The integration of technology and education as the new cornerstone of the development of education in the new century [8], the integration of the two is indeed very difficult, and
Designing of Postgraduate Medical English Class …
99
various attempts are under study. The accumulation of historical experience and the achievements of intelligent technology have provided us with the possibility to break through the deep integration of technology and education today, and implement and realize it through the complex ecological system of smart education [9]. Since entering the information age in the 1990s, technology has gradually intervened in the education system, trying to replicate the tremendous influence of other fields into education. Educational informatization has a wide influence both in theory and in practice, and bears great expectations of revolutionary impact on education. Educational informationization has introduced technology into the classroom in many ways, and has carried out various attempts to promote the teaching effect with information technology. It also recognizes that teachers play a key role in the teaching of information technology change, and has carried out continuous training for teachers in the application of information technology. Researchers try to bridge the teaching practice with the application of technology, try to find a good way to solve the problem of education by technology, and try to find a plan to promote the reform and development of education by technology [10].
2 Postgraduate English Teaching At present, there are still inadequacies in the requirements of cultivating high-end English talents in postgraduate English teaching in China. It is mainly embodied in the five common aspects: listening, speaking, reading, writing and translating: (1) In terms of English listening, there are few field training hours. (2) In the aspect of oral English expression, there is a phenomenon of “dumb English”. Many graduate students are less willing to speak or less dare to speak that they cannot express their academic opinions in English. (3) In terms of English reading comprehension, most graduate students have been studying English for at least 10 years, but most of them still cannot read the English literature of their majors, and cannot grasp the latest knowledge of their professional development in the first time. (4) As for English writing, there is no professional English learning in the English class, and students have limitations in grasping English vocabulary. It is difficult to master their professional vocabulary, and they cannot accurately express their academic opinions in English. (5) In English translation, it is difficult to access literature and writing scientific research papers freely. Therefore, we must work hard to explore a new model of postgraduate English teaching with Chinese characteristics.
100
X. Wang and C. Liu
3 Research Significance As high-end talents of various professions cultivated by our country, graduate students will have a lot of opportunities for professional exchanges and academic exchanges in the future. They need to read a lot of English professional materials to get the most cutting-edge information in the profession, and need to know how to retrieve relevant professional English literature, write English papers, and learn how to use English to communicate with professionals orally or in writing. Postgraduate English should emphasize professionalism and academicism. On the other hand, the results of linguistic studies on register analysis, rhetorical discourse analysis and genre analysis show that the English language of each subject has unique vocabulary, syntax, rhetoric and textual features, and these knowledges are not covered by the commonality part in the basic English curriculum of students. So it is necessary to conduct special study. Otherwise, there will be a dilemma that the English level of students is high and their professional communication is very difficult. Only by extending the basic English to professional English and combining language learning with professional subject content can students understand the meaning of learning and fully mobilize the enthusiasm of students to learn. Therefore, it is necessary to strengthen the postgraduate medical English teaching in our school, and cultivate talents with professional knowledge that is more favored by the society. And they should have good communication skills in English and be proficient in using English to carry out professional technical exchanges, negotiations and cooperation.
4 Designing of Postgraduate Medical English Class in Smart Education Environment At present, almost all campuses of colleges and universities have realized complete network coverage, online courses, in this case teaching resources and platforms can be used anytime and anywhere. This study has analyzed the learning needs of students, determined students’ learning ability, their knowledge basis, the online learning goals, learning resources and learning content, in order to make use of smart learning environment to lead students break the limit of textbooks and classroom in English learning, expand English learning from classroom to the outside, and promote students’ effective learning both in the real and virtual situation context. Teachers provide a series of English learning materials for students, a specific arrangement of learning tasks, let students complete the task through cell phones or computers, exchange learning experience and share gains in depth of comprehension through We Chat groups and QQ groups, realize timely interaction, effective tracking and evaluation of the students’ learning process and effect. And the detailed research contents are as follows: (1) Students are divided into several groups, with about 4 people in each group. One group leader is selected, and he or she is mainly responsible for checking
Designing of Postgraduate Medical English Class …
101
the completion of learning tasks, group learning preparation and group learning plan. The teachers share the teaching courseware and the relevant English learning audios, videos and other materials. Students can learn at anytime and anywhere in or outside of class. Teachers randomly check the completion of students’ homework, record students’ learning files, set up formative evaluation manuals, and make 30% achievements in the final exam, then direct them to learn actively. (2) Postgraduates are directed to install VOA application on the cell phones (VOA Standard English), listening to 5 pieces of news everyday randomly. They need to imitate the pronunciation and read two of the five news intensively, two minutes for each. A member of the study group is randomly selected to check others’ learning. Teachers promptly pointed out and corrected the same problems of students, which aims to ensure the effectiveness of students’ learning and their working hard for progress every day. VOA software with normal speed classifies all the news into different categories, updates practical news daily with Chinese caption, which can guarantee the accuracy of students’ comprehension. The software is available online, and students can also download news after learning in the network environment, and support background playing. While listening and reading, students can click on any word for its definition, listen to the sound of the words and add to new word book. When in a network environment, automatic network will update to the interpretation the words of this view; through the previously stored words processed by the law of memory, students can master the words effectively. They can realize the sharing of the words in the web and mobile phone terminal end, and provide online dictionary query for the words used. This can help students to associate words when remembering the vocabulary. There is also search function in it, and students can look for keywords of interest and texts for listening and learning. It will be updated daily, obtain articles with the total amount more than 1000, support online and offline learning, record and analyze learning cases comprehensively. (3) Postgraduates are required to download and use the software of Haici electrical Dictionary on their cell phones, to finish the tasks of “daily hot words” and “daily situational learning” everyday. They can make use of the random function of CET-4 words to learn and memorize 20 random words every day, which is done by the team members together, and the group leader is responsible for recording the examination results. (4) The teacher will make use of the website of www.pigai.org to assign the writing and translation tasks once in two weeks. This website is the largest online platform for English composition and writing practice in China. This platform can submit the composition corrections timely for students, immediately score the compositions and provide the feedback analysis, which can facilitate students to correct the composition while the iron is hot. The platform can point out the existence of errors in each sentence, writing spelling, grammar and vocabulary, collocation errors, and also give suggestions to revise the composition where there are mistakes. This website provides users with specific knowledge of the expansion of training, collocation recommendation and reference example, and
102
X. Wang and C. Liu
provide comprehensive writing guidance for students, which can help students’ autonomous learning. In addition, this website will identify the composition whether there is content repetition with the compositions of other students. With each sentence as a unit after receiving students’ submitted essays, we will know whether there is duplication and repetition by using the online corpus. It can provide the relevant repetition index for teachers’ reference. It also records the growing process of the writing ability of a school, a class, or a individual student. This report is helpful for schools and teachers to grasp the weak points of schools and classes, and to understand the changing trend of mastering degree of knowledge points. In the end, it will provide data support for schools and teachers to plan English teaching. (5) WeChat groups and QQ groups are set up for further learning and better communication. The teachers arrange the learning contents, share the learning materials, record the learning effect and summarize feedback information in the two communicating groups. Students can communicate with members in either group, share their learning gains, discuss the problems encountered in the study, and answer the questions of other students. (6) Our research adopts the combination of the formative evaluation and the finality evaluation. Teachers observe and record students’ extracurricular learning performance, make quantitative and qualitative evaluation for students’ classroom performance through videos, photographs and other forms, including students’ self-assessment, peer assessment as well as teacher evaluation. In the end, they could establish the growth of students archives bag. The language teachers praise the student’s progress and whim through language incentive evaluation, praise and encouragement evaluation, and written evaluation and achievement display evaluation in the affirmative way, timely encourage and affirm students’ efforts to protect the students activeness and quick thinking, maintain good learning atmosphere, help every student to realize a comprehensive development and improve their ability to use English. Teachers test the effectiveness of student learning and the existing problems through final examinations and translation level tests, sum up the teaching innovation experience, and further improve the quality of English teaching.
5 Summary Through a one-semester teaching experiment,we have found that applying multiple smart education methods and measures in postgraduate medical English teaching can greatly promote postgraduate’ enthusiasm and learning efficiency, and improve the educational quality of professional English teaching. The mode of smart education should be paid attention to and popularized in later education reform.
Designing of Postgraduate Medical English Class …
103
Acknowledgements This research was supported by Postgraduate Teaching Reform Project in Jiangxi University of Traditional Chinese Medicine (Grant No: Jzyjg-2017-11) and Research of Education Science Planning Projects of 13th Five-Year in Jiangxi Province (Grant No: 17YB145).
References 1. Rudd, J., P. Sullivan, and M. King. Education for a smarter planet: The future of learning [OL]. http://www.redbooks.ibm.com/redpapers/pdfs/redp4564.pdf. 2. Zhong, Xiaoliu, Shuqiang Song, and Min Hu. 2015. The ecological construction of wisdom education in the vision of the fourth educational revolution. Distance Education Magazine 4: 34–40. 3. Zhu, Zhiting. 2016. New development of wisdom education: From flipping classroom to smart classroom and smart learning space. Open Education Research 1: 18–26. 4. Kaur, Abtar. The future of smart learning: Personalized learning [EB/OL]. 10 March 2013. http://www.elearningasia.net/-program/pdf_pt/[Speaker%205-1]Abtar%20Kaur.pdf. 5. Hwang, Dae-joon. What’s the implication of “SMART” in education and learning? [EB/0L]. 10 March 2013. http://ww.elearningasia.net/-program/pdfpt/[Panelist%203-2]Daejoon%20Hwang.pdf. 6. Wu, Guosheng. 2009. Lecture on philosophy of technology, 36. Beijing: Press of Renmin University of China. 7. Xu, Liang. 2004. Philosophy of technology, 35. Shanghai: Fudan University Press. 8. Gang, Ding, and Lu Wang. 2006. The development of educational technology in the perspective of education. Journal of Electrotechnical Education (8): 3–5 (in Chinese). 9. Hu, Qintai, et al. 2016. Research on the deconstruction and integration path of systematic education of wisdom education. China Electro-Chemical Education (1): 49–55 (in Chinese). 10. Gu, Xiaoqing, Chunli Wang, and Fei Wang. 2017. Looking back on the 20th year: the historical mission and role of information technology in education reform and development. ElectroEducational Research (6): 9–19 (in Chinese).
An Improvement Method of Power Energy Utilization Rate Based on DEA Model Fu Mo
Abstract The operation of electric power industry is closely linked to the smooth development of society, so the study on the using efficiency of power resources is significant. Based on the study sample, the data from 2011 to 2018, this paper analyzes the annual using efficiency of power resources based on DEA model, obtains the slack variable values of input and output, calculates the projection values of invalid variables and gets that the amount of power resources used in power industry is relatively higher. This theory avoids the research on the cost problem of each investment, and completely transforms multi-input and multi-production into fractional problem, so that applying DEA to measure using efficiency can combine input with production, and evaluation indicators finally obtained are more comprehensive and representative. It can be observed from the analysis results that the using efficiency of electrical energy also significantly affects the using efficiency of power resources, so improving the using methods and making all resources allocated relatively optimal can maximize the output, in order to make the using efficiency of power resources reach the maximum value. Keywords Power energy · Utilization rate · DEA model
1 Introduction Good economic development is dependent on the supply of power resources, while electric power is also one of the necessary resources in people’s daily life [1, 2], so a good supply of power resources plays a pivotal supporting role in maintaining the economic promotion of the whole society and changing people’s living standard, and also plays an irreplaceable role in the entire development process of national economy. Power resources, as a pillar of national economic development, have become the main object of energy consumption [3–5]. In recent years, China proposes the policy about energy problems, and the using efficiency of electrical energy has become the F. Mo (B) College of Mechanical and Electrical Engineering, Guangdong University of Science and Technology, Dongguan 523083, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_15
105
106
F. Mo
main influence factor. Thus, to increase the using efficiency of power resources is a strong guarantee for economic development, and also has great significance for the realization of energy saving and emission reduction. Power resources industry is qualified with the feature of both multi-input and multi-output, and data envelopment analysis (DEA) is a theoretical approach to solve the proposed problems. DEA can accurately conduct comprehensive analysis on multi-input, resources problem and multi-output, service problem, to get the efficiency problem of a number of units providing service.
2 DEA Model DEA is different from traditional linear programming model, and its connotation is the ratio issue between the input and output [6, 7]. Conduct unit unified processing on all variables through a certain transformation, compare the performance of similar service units, namely, the similar variables while inputting, find the side with the best performance, and retain it as the performance value of this type of unit, which can help find insufficient points to some extent to conduct corresponding change and to make all similar units reach this maximum performance. DEA helps identify inefficient units, analyze the impact severity of inefficient units, and find the most effective method through a series of analysis and comparison [8]. The non-DEA efficient decision-making unit can keep the output unchanged while reducing input, keep the unchanged input, and reduce the corresponding input. For CCR model, the following ways can be used to project the model to efficiency frontier, and the point input-output combination obtained through projection is valid DEA. xˆio = θo∗ xio − si−∗ = xio − (1 − θo∗ )xio − si−∗ ≤ xio , i = 1, . . . , m yˆr o = yr o + sr+∗ ≥ yr o , r = 1, . . . , s.
(1)
The difference between the value got from the above projection and the original input and output values is the effectively improved values that the evaluated decisionmaking unit is expected to achieve, and suppose the variable quantity of input is xio and the variable quantity of output is yr o xio = xio − xˆio = xio − (θo∗ xio − si−∗ ), i = 1, . . . , m yr o = yˆr o − yr o = (yr o + sr+∗ ) − yr o , r = 1, . . . , s.
(2)
An Improvement Method of Power Energy Utilization …
107
The final optimization model is min θ n λ j X j + S− = θ X 0 j=1 n
(3)
λ j Y j + S + = Y0
j=1
λ j ≥ 0, J = 1, 2, . . . , n S + ≥ 0, S + ≥ 0 The above formula is the specific expression of DEA model, usually an analysis model commonly applied in the relevant research fields. In the formula, λ j shows an effectual decision-making unit part finally obtained from the reconstruction of linear combination, and the No. j decision-making unit will be regrouped, thus getting the final proportional relation; θ represents the optimized distance of the efficient frontier within the decision-making unit, and S + , S + are relaxation and surplus variables, representing the using efficiency of one hundred million yuan input is very low, but the relaxation degree of the output will be greatly improved, which indicates the change space of this unit is large and needs to be further analyzed, to make non-zero variable effectively achieve the frontier, thus being improved. In practice, policy makers sometimes concern about which programs or decisionmaking units are the best, but do not care about the ordering of other units. Therefore, how to use DEA model to directly seek the optimal decision-making unit has become an important issue.
2.1 The Optimal Decision-Making Unit Selection Method with Constant Scale of Returns Minimize m i=1
⎛ ⎞ ⎛ ⎞ n s n vi ⎝ xi j ⎠ − ur ⎝ yr j ⎠ r =1
j=1
(4)
j=1
Subject to s r =1
u r yr j −
m i=1
vi xi j ≤ I j ,
n
Ij = 1
(5)
j=1
I j ∈ {0, 1}, j = 1, . . . , n In the formula, I j ( j = 1, . . . , n) is a binary variable, and only one viable can take non-zero value 1. If Io = 1, the corresponding D MUo restriction of rs =1 u r yr j −
108
F. Mo
m
m ≤ I j is rs =1 u r yr o − i=1 vi xio ≤ 1, that mis, the efficiency value of vi xi j ≤ I j of remaining D MUo is larger than 1, and the restriction rs =1 u r yr j − i=1 DMU is the same with the restriction of original CCR model. Therefore, only the efficiency value of the most effective decision-making unit is greater than 1, and the efficiencies of the remaining decision-making units are less than or equal to 1. Weight restriction proposes the form in the slacking variable model, and this restriction form is widely applied in the actual application. i=1 vi x i j
2.2 The Optimal Decision-Making Unit Selection Method of Mixed Integer Linear Programming Based on Input-Oriented BCC Model Model is the selection method of the optimal decision-making unit based on constant scale of returns. This method can be extended to the case of variable scales of returns, as is shown below, and the form of the model is based on the form of input-oriented BCC model. Minimize ⎛ ⎞ ⎛ ⎞ m n s n (6) vi ⎝ xi j ⎠ − nv0 − ur ⎝ yr j ⎠ i=1
r =1
j=1
j=1
Subject to s
u r yr j −
r =1
m
vi xi j + v0 ≤ I j ,
i=1
n
I j = 1,
(7)
j=1
I j ∈ {0, 1}, j = 1, . . . , n, v0 is unsigned limit.
2.3 The Optimal Decision-Making Unit Selection Method of Mixed Integer Linear Programming Based on Output-Oriented BCC Mode Similarly, the optimal decision-making unit selection method of mixed integer linear programming is shown below. Minimize ⎛ ⎞ ⎛ ⎞ m n s n vi ⎝ xi j ⎠ − ur ⎝ yr j ⎠ − nu 0 (8) i=1
j=1
r =1
j=1
An Improvement Method of Power Energy Utilization …
109
Subject to s
u r yr j + u 0 −
r =1
m
vi xi j ≤ I j ,
i=1
s
u r yr j + u 0 ≥ 0,
r =1
n
I j = 1, j = 1, . . . , n,
j=1
(9) I j ∈ {0, 1}, j = 1, . . . , n, u 0 is free in sign. In the formula, the restriction condition rs =1 u r yr j + u 0 ≥ 0 ( j = 1, . . . , n) is to ensure that all outputs are non-negative, for negative outputs make no sense.
3 Power Energy Utilization Rate DEA analysis theory is to conduct comprehensive analysis on each decision-making unit from the perspective of the maximum efficiency. Specific data are shown in Table 1. In the analysis principle of DEA model, not all decision variables can be saved as an effective variable, and if the efficiency value reaches 1, the non-zero decision variables generated under the condition of constant input is invalid value. For DEA invalid decision variables, the “projection” on the effective side of the DEA can be used to study the final effective disciplinary level that the decision variables can achieve, and the reason for invalid analysis can be further analyzed, in order to be able to find changes direction and policy issues [9, 10]. And then the input value and the corresponding output value of the decision variables can be obtained. Table 1 shows the slack variable values of national power resources. Table 1 Efficiency of national power resources from 2011 to 2018 Year\index
TE technical efficiency
PTE technical efficiency
SE scale efficiency
Status of returns to scale
2011
0.403
0.895
0.451
Increment
2012
0.472
0.913
0.519
Increment
2013
0.546
0.925
0.591
Increment
2014
0.619
0.916
0.676
Increment
2015
0.729
0.940
0.775
Increment
2016
0.819
0.986
0.831
Increment
2017
0.891
1.000
0.891
Increment
2018
1.000
1.000
1.000
–
Average
0.685
0.947
0.717
–
110
F. Mo
4 Conclusion Although the using efficiency of power resources is high, the standard consumption of electricity generation and the standard consumption of electricity consumption are redundant, and thus there is still much room for improvement in the using efficiency of power resources.
References 1. Crompton, Paul, and Yanrui Wu. 2015. Energy consumption in China: Past trends and future directions. Energy Economics 66 (1): 195–208. 2. Fisher-Vanden, Karen, and Gary H. Jefferson. 2016. Technology development and energy productivity in China. Energy Economics 67 (6): 690–705. 3. Yoo, S.H., J.S. Lee, and S.J. Kwak. 2017. Estimation of residential electricity demand function in Seoul by correction for sample selection bias. Energy Policy 81 (35): 5702–5707. 4. Hamdar, S.H., H. Khoury, and S. Zehtabi. 2016. A simulator-based approach for modeling longitudinal driving behavior in construction work zones: Exploration and assessment. Simulation Transactions of the Society for Modeling & Simulation International 92 (6): 579–594. 5. Lin, Kai-Yung, Jin-Cherng Lin, and Jan-Min Chen, et al. 2010. Defense automatic malicious tools based on navigation behavior. Journal of Discrete Mathematical Sciences & Cryptography 13 (1): 17–27. 6. Lean, H.H., and R. Smyth. 2010. On the dynamics of aggregate output, electricity consumption and exports in Malaysia: Evidence from multivariate Granger causality tests. Applied Energy 112 (87): 1963–1971. 7. Han, Y., Z. Geng, Q. Zhu, et al. 2015. Energy efficiency analysis method based on fuzzy DEA cross-model for ethylene production systems in chemical industry. Energy 83 (7): 685–695. 8. Tianjia, Shu, Xiaoqiang Zhong, et al. 2011. TFP electricity consumption efficiency and influencing factor analysis based on DEA method. Energy Procedia 55 (12): 91–97. 9. Yang, L., and K.L. Wang. 2013. Regional differences of environmental efficiency of China’s energy utilization and environmental regulation cost based on provincial panel data and DEA method. Mathematical and Computer Modelling 58 (5–6): 1074–1083. 10. Jie, W., B. Xiong, Q. An, et al. 2015. Total-factor energy efficiency evaluation of Chinese industry by using two-stage DEA model with shared inputs. Annals of Operations Research 255 (1–2): 1–20.
“Blended Learning” in Construction Cost Network Course Shu Li, Lei Cao and Yunda Shao
Abstract Separation of teaching and learning is a prominent problem in distance education, and “vapidness” is one of the primary issues to be solved in network curriculum. Due to the theory and practice properties of Construction Cost, blended learning was used to satisfy students for individualising education, which strengthen students’ motivation and improve availability and interest. The route of guidancestudy behaviour-practice-final review goes through cases, actual scenario of occupational training and work office was rebuilt. Blended learning not only reduces the distance that has existed among students and teachers but also increase the interaction between the two sides. The investigation shows that 90% students consider that through cases oriented, the learning scene is more attractive as tied up with actual scenario; there is a significant increase of students’ motivation and achievement as a result of the blended learning model, and a reduction to 30% of vapidness-feeling student. This research provides experiences for teachers to support and promote the students’ interest and includes tactics such as being an involved role model on cases to facilitate help-seeking processes. Keywords Open education · Engineering · Network course · Construction cost
1 Introduction Education is a determinant in development of a country. Education is one of the largest investment in shaping and building men [1]. Curriculum is the core of school education. It is not only an important measure to guarantee the quality of education, but also a basic way to achieve educational goals [2, 3]. In the face of rapid development of modern science and technology, how to create a group of courses with its own characteristics to provide enough support and space for the development of students’ personality, and to cultivate high-quality talents with all-round development of knowledge and skills, has become important, contributing to the progress of a country which is determined by the quality of human resources. S. Li (B) · L. Cao · Y. Shao The Open University of China, Beijing 100039, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_16
111
112
S. Li et al.
However, at present, there are more discussions on the curriculum construction of ordinary colleges and universities [4, 5]. Online and blended learning is intended for individualising education. However, online and blended learning attracts a diverse range of students, while teachers lack insight into this diversity that hinders them in anticipating students’ individual needs [6] and less research on the curriculum design of distance open education, especially on the more practical courses of engineering majors. This leads to the lack of experiences for the construction and reform of engineering network curriculum, and is often in an awkward position of passively adapting to the content and mode of curriculum in ordinary colleges and universities. Therefore, it is of great significance to actively explore and design courses that accord with the characteristics and to develop online courses in line with students’ learning habits and rules for improving the quality of talents training and adapting to the new social needs of national open universities. Construction Cost is one of the most widely used courses in civil engineering, which not only focus on abstract theoretical reasoning, but also aim at practical abilities of social practice, practical problem solving and case analysis [7]. This course is professional, theoretical and practical-skill emphasised for specific groups, with typical representation in engineering. In this study, the Construction Cost network course of the Open University of China is designed and opened to the students around the country, which effect is tracked and analyzed.
2 Learner Analysis 2.1 Characteristic Distance education attracts a diverse range of students who from different traditional education. Students’ age, knowledge structure, cognitive level and learning needs are diverse. In addition, the vast majority of distance education students are adults. The limited social pressure and framework during online and distance moments [8] and the multiple responsibilities that adults face may create obstacles to complete tasks at home. It depends on beliefs and processes like task values, interest and self-efficacy [9]. They are flexible regarding time, effort and environment. The characteristics mainly lie in three respects, (1) young and fragmentation of time. The age is mainly young, most of them are on the job, the time that can be used for learning is limited and not fixed, and generally there are contradictions between working and learning; (2) weak study foundation. Most learners have a weak foundation, and lack of comprehension and concentration appears in their study. They require the knowledge they have learned is simple and easy to understand, and they prefer to learn practical techniques and lack enthusiasm for learning theoretical knowledge; (3) Separation of teaching and learning. As individual learning is main, the communication between teachers and other students is less, and the information exchange and feedback are not timely because of the separation of teaching and learning.
“Blended Learning” in Construction Cost Network Course
113
2.2 Motivation Motivation is very important to perform, which can affect the students’ choice, effort and persistence [10, 11]. It is formed by processes and beliefs like interest, selfefficacy and task values and is also a determinant regarding students’ educational achievement [9]. To keep students persisting and performing, motivation-analyze must be done to optimise students’ motivational beliefs and processes. Table 1 Table 1 Investigation results of learners Category
Background
Motivation
Requirements
Difficulty level
Employee
Rich practical experience, good professional skills Lack systematic theoretical knowledge Clear learning purpose, strong initiative
Systematic learning theoretical knowledge Raise the level of education Promotion requirements
Systematic theoretical knowledge study Understanding principles of various work Targeted promotion of one or several professional skills
Low
College graduate
Good professional foundation, master certain professional skills Lack practical experience Clear learning purpose, strong initiative
Upgrading professional knowledge and skills Strengthen practical ability Be professional
Enhance professional theoretical knowledge, practice ability; Grasp practical skills
Ordinary
Related industry employee
A certain professional foundation A certain practical experience Clear learning purpose, strong initiative
Master theoretical knowledge and skill Strengthen practical ability Be professional
Master theoretical knowledge and practical skills Preparation for job turnover
Higher
Unrelated industry employee
Little expertise and skill No practical experience Unclear learning purpose, weak initiative
Professional knowledge and skill study Strengthen practical ability Be professional
Master basic knowledge and skills Acquire theoretical knowledge and practical ability
Highest
114
S. Li et al.
displays that motivations are diverse as individualising needs. In-service learners have rich practice experiences, while graduates are adept in the theory knowledge. Graduates prefer experiences rather than theories for employee. They have different difficulties in the education.
3 Design of Network Course 3.1 Blended Learning Model The blended learning model is intended for individualising education [6], blended learning not only increase the interaction between students and teachers but also reduces the distance between two sides [10], which is “task-based, resource-applied, learning-supported”. As is shown in Fig. 1, there are obvious four learning phases Scene guide Source independent exploration On-line study
occupational training Theory
Cases
Resources
Teaching
Multimedia On-line test
Blended learning evaluation and revise
Extended content learning Self-exploration type
Teaching reflection type
Guided cooperative type
Independent inquiry on resources
Well-structured reading
Problem guided learning
Class Time
Fig. 1 Blended learning flow
“Blended Learning” in Construction Cost Network Course
115
occuring before, during and after students’ efforts to learn. First, activation phase includes processes of anticipating efforts to learn. Second, in monitoring phase, students monitor their learning processes and become metacognitively aware of their selves, task and context. Third, with the aim to get closer to the learning goals by using diverse learning strategies, in regulation phase learning efforts are optimised by controlling and regulating themselves, task and context [8]. Fourth, in the reflection phase, processes follow the students’ efforts to learn by reflecting on themselves, task and context [12, 13]. Four learning phases goes through the cases, which occur before, during and after students’ efforts and lead students to enter the learning environment. Actual scenario was rebuilt. Multimedia simultaneously demonstrates training videos, pictures, knowledge points and so on.
3.2 Course Organization Phases do not necessarily act in an orderly progression, although they are showed in a linear way. Results from using a certain means of phases can reactivate a previous phase as students realise current means not assisting with learning process. Furthermore, four phases occur in four areas of function: guidance, study behaviour, practice and review. The route of guide-study behaviour-practice-final review goes through the cases, which leads students to enter the learning environment. Actual scenario was rebuilt. Multimedia simultaneously demonstrate train videos, pictures, knowledge points and so on. In each phase and function, students can change strategies to process their education and learn efficiently. 1. Guidance The content, key points and learning objectives are Introduced systematically, and help students to clarify what content they will learn in each scene, which resources they can choose to organize the next study and what level of knowledge they should achieve after learning. 2. Learning behaviour The course is organized in cases, but an orderly progression is not necessary. “Key points” is linear layout with clear level, according to the need to click on the corresponding title of knowledge points for respectively view. Comprehensive use of multimedia presents multisensory learning content. 3. Practice After each Key knowledge is completed, there will be self-test. The self-test are only for practice, and The feedback will be analyzed after submission. The extended learning can be chosen according to the characteristics of students. 4. Review Every student’s outcome will be analyzed. Opinions will returns respectively, which lead the students to revise their study.
116
S. Li et al.
4 Effect Analysis 150 questionnaires were designed and distributed to all branches of the country to evaluate the effectiveness of the course. About 6000 students have participated in the investigation. Students found that education seemed like a hobby, felt interesting and were motivated to engage in their education intrinsically. The findings indicate that, (1) in the emotional experience of the learning process, 30% students feel vapid, which is down from 70%. Blended learning satisfies students for individualising education. It is not only shortens the distance between students’ study and work, but also makes students have a sense of immersion. (2) for the knowledge of operation and practice, 90% students consider that through cases oriented, the learning scene can be moved into project cases, and the distance between books and real life has be drawn closer. Students can experience the practical problems, think positively, analyze the causes of the problems, and find solutions. So that, they grasp the skills more firmly and effectively. (3) through combination of case and occupational training, the key knowledge is emphasized and the learning results are targeted. The survey showed that the students’ satisfaction was 89%.
5 Conclusion Education is a determinant in development of a country. For the students in the Open University of China, limited social pressure and framework during online, distance moments, and multiple responsibilities that adults face may create obstacles to complete studies at home. Blended learning not only increase the interaction between students and teachers but also reduces the distance between two sides [10]. The network course of Construction Cost, lead students to learn independently, arouse students’ desire to learn, and make students better integrate into the learning atmosphere. Comparing to extrinsic motivation, intrinsic motivation is the strongest motivation [11]. Blended learning model has a significant effect on increasing learn motivation and becomes the basis for student achievement improvement actually. Acknowledgements This research was supported by Open Research Fund of Key Laboratory of Urban Underground Engineering, Ministry of Education (Grant No. TUE2018-03), and Youth Fund for the 13th Five-Year Plan of the Open University of China (Grant No. G18F0031Q).
References 1. Islam, Syaiful, et al. 2018. To boost students’ motivation and achievement through blended learning. Journal of Physics: Conference Series 1114: 012046. 2. Yang, X.T. 2007. Evaluation of web-based learning. Beijing: Central Radio & TV University Press (in Chinese).
“Blended Learning” in Construction Cost Network Course
117
3. Wu, G.X. 2008. Process-oriented examination in modern distance education: Towards a research and practice framework. Distance Education in China 3: 26–31. (in Chinese). 4. Tao, S.L. 2008. Reform of computer specialty in modern distance education of RTVU. China Higher Education 10: 55–57. (in Chinese). 5. Wu, L.Z., and X.D. Ding. 2008. Sewart’s theory of student support in distance education: Interpretation and inspiration. Distance Education in China 1: 25–29. (in Chinese). 6. Vanslambrouck, Silke, et al. 2019. An in-depth analysis of adult students in blended environments: Do they regulate their learning in an ‘old school’ way? Computers & Education 128: 75–87. 7. Wolters, C.A., P.R. Pintrich, and S.A. Karabenick. 2005. Assessing academic self-regulated learning: What do children need to flourish? Conceptualizing and measuring indicators of positive development, 251–270. New York: Springer. 8. Pintrich, P.R., and A. Zusho. 2007. Student motivation and self-regulated learning in the college classroom. In The scholarship of teaching and learning in higher education: An evidence-based perspective, ed. R.P. Perry and J.C. Smart, 731–810. Dordrecht, The Netherlands: Springer. 9. Lazowski, R.A., and C.S. Hulleman. 2016. Motivation interventions in education: A metaanalytic review. Review of Educational Research 86 (2): 602–640. 10. Allen, I.E., J. Seaman, and R. Garrett. 2007 Blending. In The extent and promise of blended education in the United States. ERIC. 11. Baharun, H., and R. Awwaliyah. 2017. Pendidikan Multikultural dalam Menanggulangi Narasi Islamisme di Indonesia. Jurnal Pendidikan Agama Islam (Journal of Islamic Education Studies) 5 (2): 224–243. 12. Pintrich, P.R. 2000. Multiple goals, multiple pathways: The role of goal orientation in learning and achievement. Journal of Educational Psychology 92 (3): 544–555. 13. Zimmerman, B.J. 2015. Self-regulated learning: Theories, measures, and outcomes. International Encyclopedia of the Social & Behavioral Sciences 21: 541–546.
Data Mining of Privacy Preserving Based on Secret Sharing Technology Jianguo Liu, Xiaoyu Liu, Zhansheng Chen and Zhengkun Hu
Abstract Based on Shamir secret sharing technology, this paper designs a vertical distributed association rule data mining algorithm with privacy-preserving level, and analyses the correctness, complexity and security of the algorithm. At the same time, it points out that under the hypothesis of quasi-honesty attack, the algorithm is not only safe, but also can effectively prevent collusion between participants. This algorithm is suitable for privacy-preserving data mining in relatively small distributed databases. Keyword Secure multi-party computation · Privacy-preserving · Data mining · Secret sharing
1 Introduction Secure multi-party computing technology is a common technology in privacypreserving data mining in distributed environment. Especially when secure multiparty computing technology makes it impossible to find fully trusted third party participants, privacy-preserving data mining results can also be obtained [1]. Almost all secure multi-party computing protocols are based on some form of secret sharing. In these schemes, participants can generate the same shared secret, and no one knows the secret they share before cooperating. For example, document [2, 3] proposed decision tree classification mining algorithm for privacy-preserving in distributed environment based on Shamir secret sharing idea. For other data mining tasks such as association rules mining, how to design data mining algorithms with privacy-preserving level based on secret sharing technology remains to be solved.
J. Liu (B) · X. Liu · Z. Chen · Z. Hu College of Applied Science & Technology, Beijing Union University, Beijing 100101, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_17
119
120
J. Liu et al.
2 Secret Sharing Threshold Scheme The so-called secret sharing scheme refers to [4]: dividing a secret s into sub-keys s1 , s2 , . . . sn , also known as shadow or share, and securely allocating it to n participant to hold it separately, so as to satisfy the following two conditions: (1) Reconfigurable secrets si owned by any k or more than k participants. (2) If the value si of any participant or less k − 1 is not reconstructed secret s, the scheme is called (k, n) threshold scheme, which k is a threshold value. Since reconstructing a key requires at least k sub-key, exposing (r ≤ k −1) shares does not endanger the secret. Consequently, the conspiracy of k participants can not obtain the key. In addition, if a share is accidentally lost or destroyed, the key can still be restored (as long as there is at least k valid share). Shamir secret sharing scheme is the representative one in secret sharing threshold scheme. Shamir Secret Sharing Threshold Scheme: Shamir Secret Sharing Threshold Scheme was proposed in 1994 by Lagrange interpolation formula based on Polynomials in reference [4]. Its basic ideas are as follows: Let’s say {(x1 , y1 ), . . . , (xk , yk )} is a set of k points on a plane, which xi (i = 1, . . . , k) are different. Then there exists a unique k − 1 subpolynomial f (x) passing through the k on the plane, f (x) = ak−1 x k−1 + . . . + a1 x 1 + a0 , ( ak−1 = 0) If the secret s is taken as f (0), that is a0 , n sub-key is f (xi ) (i = 1, 2, . . . n), then any of k sub-keys can be reconstructed f (x),than obtain the secret s (that is a0 ). Shamir secret sharing threshold scheme consists of three stages: system initialization, secret distribution and secret reconstruction [5]
3 Privacy-Preserving Distributed Association Rule Data Mining Based on Secret Sharing Technology This section will focus on the privacy-preserving distributed association rule data mining based on Shamir secret sharing technology. According to the distribution of data, distributed data mining technology can be divided into horizontal distribution and vertical distribution data mining technology, which vertical distribution data mining technology is more challenging [6]. The main contents of this section are as follows: (1) A new secure and effective solution is proposed to the data mining problem of privacy-preserving association rules with vertical distribution; (2) Shamir secret sharing technology is applied to the data mining problem of privacy-preserving
Data Mining of Privacy Preserving Based …
121
association rules with vertical distribution for the first time. The algorithm can effectively prevent the collusion between participants and the correctness, complexity and security of the algorithm are evaluated.
3.1 Definition of Problem For data mining of Distributed Association rules, transaction database D is divided into two types: vertical distribution and horizontal distribution. Vertical partitions refer to that in a distributed environment, each site stores only part of the attribute data, and the data on each site has different characteristics (or sets of attributes). In this section, we will study the data mining problem of vertical distributed Privacy Preservation Association Rules with multi-party participation. There are n participants P1 , P2 , . . . Pn , The database D is divided vertically among the n participants P1 , P2 , . . . Pn . Each participant Pi has a database Di . Here is the database D = D1 ∪ D2 ∪ . . . ∪ Dn ,
Di ∩ D j = Φ, f or ∀ i, j ∈ n
That is, each participant only has data records of some attributes in the database D. In order to share common interests, n participants want to cooperate in data mining of association rules in databases D = D1 ∪ D2 ∪ . . . ∪ Dn . Each participant is reluctant to share data with others in the process of collaborative data mining, but only willing to share the results of data mining. Therefore, we can abstract the data mining problem of Privacy Preservation Association Rules with vertical distribution as follows. Question 1: There are n participants P1 , P2 , . . . Pn , in which the database D (a total of N records, Boolean database) is divided vertically among n participants, that is, each participant Pi has a database Di , and Di ∩ D j = Φ, f or ∀ i, j ∈ n. For the common benefit, n participants want to conduct privacy-preserving association rule data mining in vertically distributed databases D = D1 ∪ D2 ∪ . . . ∪ Dn . This algorithm can effectively prevent collusion between participants. In order to design a privacy-preserving distributed association rule data mining algorithm with anti-collusion characteristics, the following assumptions are made: (1) Assuming that data mining participants are quasi-honest, based on maximizing their own profits, choose quasi-honest attack strategy is Pareto’s optimal strategy, so it has practical significance and theoretical basis to assume that data mining participants are quasi-honest attack. (2) Under the hypothesis of quasi-honesty attack, participants can take conspiracy behavior. Under the hypothesis of quasi-honesty attack, Non-Conspiracy behavior is not the optimal Nash equilibrium strategy based on maximizing benefits, especially when participants’ privacy information value is high, because conspiracy behavior is likely to get more High returns.
122
J. Liu et al.
(3) The attackers are divided into two categories: internal attackers (participants in data mining) and external attackers (except internal attackers). The security of the algorithm refers to: (a) for external attackers, the algorithm is secure under the definition of semantic security; (b) for internal attackers, the algorithm is not only secure under the definition of semantic security, but also can effectively prevent the collusion between participants, that is, in the process of data mining, even if there is a collusion between participants, then collusion. In addition to the results of data mining, participants cannot deduce the privacy data of other participants who did not participate in the collusion based on the information obtained. According to the above hypothesis, our target is to design an effective and secure privacy-preserving algorithm or protocol based on Shamir secret sharing technology for data mining of privacy-preserving association rules with vertical distribution.
3.2 Privacy-Preserving Vertical Distributed Association Rules Data Mining Algorithms In order to mine association rules, it is necessary to determine whether a candidate item set is a frequent item set. At first should find out the number of records c.count in database D .whose attribute value of all items in the item set is 1. Given the minimum support threshold s, if c.count ≥ Ns% , the candidate item set is frequent item set. The following Algorithm 1 is Apriori algorithm [7] describes how to find frequent item sets of vertically distributed data. Algorithm 1: Vertical Distributed Association Rule Data Mining Algorithms Input: D // Transaction database Minsup//Minimum Support Threshold Output: L // Frequent Itemsets in 1. 2. 3. 4. 5. 6.
7. 8. 9.
L 1 = { large 1_itemsets} for (k = 2; L k−1 = Φ; k + + ) do begin Ck = apriori - gen(L k−1 ) // Generating new candidate sets for all candidates c ∈ Ck do begin if all the attributes in c are entirely the same party, then that party independently compute c.count else collaboratively compute c.count (We will show how to compute it in Section 4.3.3) end L k = L k ∪ {c|c.count ≥ min sup } end
Data Mining of Privacy Preserving Based …
123
10. Return L = ∪k L k Note 1: In tep 3 of Algorithm 1, Ck+1 = apriori - gen(L k ) is the most famous association rule algorithm. This algorithm is used to generate candidate item sets for each scan except for the first scan. Reference [4]. Note 2: In step 5 and 6 of Algorithm 1, c.count represents the count of each item set, that is, the number of records whose attribute values are all 1 in the candidate item set of transaction database D. The ratio between the attribute values and all records in transaction database D is the support degree of the item set. How to calculate c.count will be explained in detail in Algorithm 2. However, in step 6 of Algorithm 1, in order to calculate the counting c.count of item sets, it is necessary to calculate the value of item attributes among different participants. On the other hand, if the attributes of the candidate item set belong to different participants, data sharing is inevitable, then each participant can first. Establish a vector based on its own attribute values. For example, for a candidate Pi can first item set, the participant Pi has p attribute a 1 , a2 , . . . , a p , the participant p construct the vector Ai , where the j element of the vector Ai is A j i = k=1 a j k Then, multiple cooperating participants can apply Algorithm 2 to calculate the count c.count of the item set.
3.3 Item Set Counting C.Countprivacy-Preserving Algorithms This section will discuss how to apply Shamir secret sharing technology to compute item set counts c.counti without revealing participants’ privacy data in data mining of vertically distributed privacy-preserving association rules involving multiple participants. In this section, we will study the vertical and horizontal distribution of association rule data mining for privacy-preserving based on Shamir secret sharing technology and literature [2]. Participants Pn have privacy vectors An , Ai = (1, 0, 1 , 1 . . . 0)T . And, the element j representing the vector Ai is the Ai j item attribute value recorded in the participant database, whose value is 0 or 1. Whether the records in the database D support the project j or not, the calculation steps are as follows: First step: n participants P1 , P2 , . . . Pn determine an arbitrary k-degree subpolynomial (k ≤ n − 1), whose constant is equal to the privacy value Ai j , and jointly determine m ≥ n different random number X = (x1 , x2 , . . . xm ), Therefore, for each record j in the database, each participant Pi has a k-degree subpolynomial qi (x) = an−1 x n−1 + . . . + a1 x 1 + Ai j , qi (0) = Ai j , i = 1, . . . n. Then each participant calculates each participant’s share (i.e. sub-key) sh(Ai j , Pt ) = qi (xt ) t = 1, 2, . . . n according to its polynomial and different random numbers X = (x1 , x2 , . . . xn ), retains its share, and transmits other shares sh(Ai j , Pt ) = qi (xt ), i = t to the corresponding participants Pt .
124
J. Liu et al.
In the second step, participant Pi calculates S(xi ) = q1 (xi )+q2 (xi )+. . .+qn (xi ) based on q1 (xi ), q2 (xi ), . . . qn (xi ) what is obtained from other participants, and then transmits the intermediate results to all other participants. In the third step, participant calculates the sum of the privacy values based on the results obtained in the second step. Notice that each participant Pi has an arbitrary secret k = n − 1 degree polynomial whose constant term is equal to the privacy S(x) = value Ai j . Therefore, the sum of all these polynomials is another polynomial n−1 + bn−2 x n−2 + . . . + b1 x + ni= 1 Ai j whose q1 (x) + q2 (x) + . . . + qn (x) = bn−1 x constant term is equal to c.count j = ni= 1 Ai j . Therefore, each participant Pi will obtain a set of n-variable linear equations with n equations: ⎧ n ⎪ n−1 n−2 ⎪ b x + b x + · · · + b x + Ai j = s(x1 ) n−1 n−2 1 1 ⎪ 1 1 ⎪ ⎪ i=1 ⎪ ⎪ n ⎪ ⎨ b x n−1 + b x n−2 + · · · + b x + A = s(x ) n−1 2 n−2 2 1 2 i j 2 i=1 ⎪ ⎪ ······ ⎪ ⎪ ⎪ n ⎪ ⎪ ⎪ Ai j = s(xn ) ⎩ bn−1 xnn−1 + bn−2 xnn−2 + · · · + b1 xn +
(1)
i=1
The fourth step, by solving the above linear equations, the unique solution of the equations, i.e. the coefficients of the polynomials S(x), is obtained. Since the n constant terms of the polynomials S(x) are the sum of the privacy values Ai j ni=1 of the participants, all participants can get the sum of the privacy values i = 1 Ai j without knowing the privacy data of the participants. n Ai j . If it In the fifth step, each participant Pi gets the sum of privacy values i=1
is n, it indicates that the item attribute values of all participants’ Article records j in the database D are all 1, so Article Records j support the association rule, then m j = 1, otherwise m j = 0. Repeat the above calculation steps for each record in the database, then each participant can get m j = 1 or 0 for any record j ( j = 1, 2, · · · N ), so as to determine whether the record supports this association rule, and then get the count of item sets c.count = Nj=1 m j in the database D privately. In summary, under the assumption of participant quasi-honesty attack, the algorithms for counting item sets c.count = Nj=1 m j in the computing database D of n participants’ privacy can be summarized as follows: Algorithm 2: Require: Set of parties P1 , P2 , . . . Pn . Ai j : Secret value of Pi , X : A set of n publicly known random values x1 , x2 , . . . xn . k: Degree of the random polynomial k = n − 1. 1
: for each transaction j = 1 to N do
Data Mining of Privacy Preserving Based …
2 3 4 5 6 7 8 9 10 11 12 13 14
125
: for each party Pi (i = 1, · · · n) do : Select a random polynomial qi (x) = an−1 x n−1 + . . . + a1 x 1 + Ai j : Compute the share of each party Pt , where sh(Ai j , Pt ) = qi (xt ) : for t = 1 to n do Send sh(Ai j , Pt ) to party Pt : Receive the shares sh(Ai j , Pt ) from every party Pt . : Compute S(xi ) = q1 (xi ) + q2 (xi ) + . . . + qn (xi ) : for t = 1 to n do : Send S(xi ) to party Pt : Receive the results S(xi ) from every party Pi . n Ai j of secret values : Solve the set of equations to find the sum i=1 n : if the i=1 Ai j = n, let m j = 1, otherwise m j = 0. : Each party computes c.count = Nj=1 m j .
3.4 Item Set Counting C.Count Privacy-Preserving Algorithms Analysis The correctness, complexity and security of the aboveprivacy-preserving calculation item set count C. count Algorithm 2 are analyzed. (1) Correctness analysis Assuming participants Pi have privacy vectors Ai and participants Pi have privacy vectors Ai j for any article record j in the database D, in order to determine whether the record supports this association rule, the key is to see whether the sum of the n Ai j equals the number of participants n. If privacy values of each participant n
i=1
Ai
j
= n, it shows that the item attribute values j of all participants’ article
i=1
record in the database D are all 1, thus the article record supports the association rule, so m j = 1, otherwise, if the item attribute value of the participant’s Article Record is all 1, indicates that the Article Record does not support the association not n Ai j = n, m j = 0. According to Algorithm 2, the sum of the privacy rule, so i=1 n Ai j of each participant is exactly the constant term of the polynomial values i=1 can get a set of linear equations, S(x) = q1 (x)+q2 (x)+. . .+qn (x), each participant n Ai j by solving the linear so that the sum of privacy values can be obtained i=1 equations to determine whether the record supports the association rule. In summary, under the assumption that participants can honestly and correctly execute the algorithm under quasi-honest attacks, Algorithm 2 can accurately calculate the count c.count of item sets in the database. (2) Complexity analysis
126
J. Liu et al.
Assuming that there is n participants in distributed association rule data mining, the communication cost of step 5, 6, 9 and 10 in Algorithm 2 is 2n(n − 1), while the communication between participants is not involved in the other calculation steps, so the communication cost of Algorithm 2 is equal to 2n(n − 1)t. The computational cost of Algorithm 2 includes the generation of polynomials, the calculation of polynomial evaluation and the calculation of solving linear equations, which are as follows: The generation of arbitrary polynomials qi (x) , i = 1, . . . n in step 3; In step 4, participants need to compute total n 2 polynomial values; The number of addition operation is n(n − 1) in step 8; n Ai j by solving linear In step 12, the operation of obtaining privacy values i=1 equations; (E) The addition operation c.count = Nj=1 m j in step 14.
(A) (B) (C) (D)
The computational cost of general SMC method is O(n 6 ) ∼ O(n 8 ) [8, 9]. It can be seen that the computational cost of Algorithm 2 is smaller than that of general SMC method. (3) Safety analysis Theorem 1 (For external attackers, Algorithm 2 is semantically secure.) It is proved that during the execution of algorithm 3, external attackers can intercept data in the transmission process. sh(Ai j , Pt ) = qi (xt ) t = 1, 2, . . . n, i = 1, 2, . . . n, and the value of the polynomial S(x) = q1 (x) + q2 (x) + . . . + qn (x) at the point x1 , x2 , · · · xn , that is S(xi ), i = 1, . . . n, because the external attacker does not know the specific value x1 , x2 , . . . xn , it is impossible to calculate the privacy information of each participant Ai j based on the information obtained. In the process of execution, there is no transmission of private data. Therefore, the external attacker cannot intercept any valuable information, so Algorithm 2 is semantically safe for the external attacker. Theorem 2 (For data mining participants, Algorithm 2 is semantically secure). It proves that, compared with external attackers, data mining participants know the specific values x1 , x2 , · · · xn , and assume that data mining participants can intercept shares sh(Ai j , Pt ) = qi (xt ) t = 1, 2, . . . n, i = 1, 2, . . . n, i = t in the process of data transmission of the algorithm. In the execution of Algorithm 2, each participant Pi calculates the share of each participant sh(Ai j , Pt ) = qi (xt ) t = 1, 2, . . . n (i.e. sub-key) according to its secret polynomial and random number X = (x1 , x2 , . . . xn ). Data can only get the value of the participant’s secret polynomial at n − 1 point x1 , . . . , xi−1 , xi+1 , . . . , xn , so the participant’s privacy value Ai j cannot be obtained. To sum up, Algorithm 2 is semantically secure for data mining participants.
Data Mining of Privacy Preserving Based …
127
Theorem 3 Assuming the number of collusion participants is t < n − 1, Algorithm 2 can effectively prevent collusion between participants. It is proved that in the execution of Algorithm 2, assuming that participants can conspire with each other, in order to obtain the privacy information of non-conspirator participants, at least n − 1 participants is required to conspire, such as P2 , . . . Pn participants conspiracy, in the execution of the algorithm, they can get the values s(x1 ) of the polynomial S(x) at n − 1 points x2 , . . . xn and the P1 participant’s secret polynomial q1 (x) at different points q1 (x2 ), . . . , q1 (xn ). So can get it q1 (x1 ) = S(x1 ) − q2 (x1 ) − · · · − qn (x1 ) When the number of collusion participants is t < n − 1, the linear equations containing n equations cannot be obtained, so the privacy value of non-collusion participants cannot be obtained by collusion. In summary, if the number of participants in the collusion is t < n −1, algorithm 3 can effectively prevent the collusion between participants.
4 Conclusion Based on Shamir secret sharing technology, a data mining algorithm for privacy preservation vertical distributed association rules is presented. The correctness, complexity and security of the algorithm are analyzed. It is pointed out that under the hypothesis of quasi-honesty attack, the algorithm is not only safe, but also can effectively prevent collusion among participants when the number of collusion participants is t < n − 1. This algorithm is more suitable for privacy-preserving data mining in relatively small distributed databases [10] (especially when the number of participants in data mining is large).
References 1. Lei, Hongyan, and Hanbin Zou. 2010. Privacy-preserving classification algorithm based on Shamir secret sharing. Computer Engineering and Design 31 (6): 1271–1273. 2. F. Emekci*, O.D. Sahin, D. Agrawal, and A. El Abbadi. 2007. Privacy preserving decision tree learning over multiple parties. Data & Knowledge Engineering 63: 348–361. 3. Schneier, B. 2000. Applied cryptography. Machinery Industry Press. 4. Shamir, A. 1979. How to share a secret. Communications of the ACM 22: 612–613. 5. SIGKDD, KDD CUP 1999 Datasets. http://www.sigkddorg/kddcup/index.php?section=1999& method=data,1999. 6. Levin, I. 2000. KDD_99 classifier learning contest LLSoft’s results overview. ACM SIGKDD Explorations Newsletter 1: 67–75. 7. Hung-Min, Sun, and Shieh Shiuh-Pyng. 1999. Recursive constructions for perfect secret sharing schemes. Computers & Mathematics with Applications 37 (3): 87–96.
128
J. Liu et al.
8. Z. Yang, and R. Wright. 2005. Improved privacy-preserving bayesian network parameter learning on vertical partitioned data. Proceedings of the ICDE Inernational Workshop on Privacy Data Management: 43–52. 9. Justin, Zhan. 2006. Privacy-preserving collaborative data mining (PhD), University of Ottawa, Canada. 10. Zhang, P., Y. Tong, S. Tang, and D. Yang. 2005. Privacy-preserving Naive Bayes classifier. Lecture Notes in Computer Science 3584: 744–752.
Application Status and Development Prospect of Artificial Intelligence in Clinical Medicine Mengqiao Wang
Abstract In the past few years, artificial intelligence has developed dramatically, bringing technological innovation to quite a few fields. At the same time, as people’s demands for medical standards continue to rise, artificial intelligence has also shown great potential for development in the field of clinical medicine. As a good tool, artificial intelligence can alleviate the shortage of doctor resources and improve the efficiency of doctors. Therefore, combining artificial intelligence with clinical medicine has become a hot spot in modern technology. On this basis, this paper briefly introduces the concept of artificial intelligence, elaborates the application status of artificial intelligence in clinical medicine, including medical image recognition, drug development and medical robot, and discusses the development prospect of artificial intelligence in this field. Keywords Artificial intelligence · Clinical medicine · Application status · Prospects · The medical diagnosis
1 Introduction Artificial intelligence as a science and technology that leads the future, its ideas, theories, methods and techniques have penetrated into all areas of technology and science and all aspects of human society. At the same time, various disciplines emerged intensively and rapidly with “smart” disciplines, technologies, systems, engineering and products. “Artificial Intelligence”, a discipline with unlimited potential, is leading the development of modern science and technology and the progress of human civilization with its infinite charm. At the same time, medicine is a complex subject. At present, artificial intelligence has penetrated into many aspects of medical health, such as virtual assistants, drug procurement, nutritional collocation, health management, mental illness monitoring, wearable devices, risk management, pathology and clinical diagnosis and treatment activities. In the medical field, its application prospects are unlimited, and there is also a long way to go. M. Wang (B) Beijing University of Posts and Telecommunications, Beijing 100000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_18
129
130
M. Wang
2 Artificial Intelligence Introduction Artificial intelligence can be abbreviated as AI. It mainly studies how to use artificial methods and techniques to imitate, extend and extend human intelligence using various automated machines or intelligent machines (mainly computers) to achieve certain machine thinking or mental labor automation. Artificial intelligence does not specifically refer to a technology. It is actually a broad field composed of multiple disciplines, including robotics and machine learning. Artificial intelligence can simulate the information process of human consciousness and thinking. According to its intelligence level, it can be simply divided into: weak artificial intelligence, strong artificial intelligence and super artificial intelligence [1]. The ultimate goal of artificial intelligence is to let machines replace humans to accomplish tasks that require cognitive skills. In order to achieve this goal, the machine must automatically learn the mastery, not just the commands written by the programmer. The core issues of AI include the ability to structure, knowledge, plan, learn, communicate, perceive, move, and manipulate objects that resemble or even transcend people. Strong artificial intelligence is still the long-term goal of the field. At present, strong artificial intelligence has already achieved initial results, and even beyond the human level in video identification, language analysis, and board games. There are already a large number of tools that have applied artificial intelligence, including robot vision, image recognition, and expert systems. In the future, as the theory and technology mature, the field of application of artificial intelligence will continue to expand [2].
3 The Application Status of Artificial Intelligence in Clinical Medicine 3.1 Artificial Intelligence and Medical Imaging In traditional medicine, artificial reading requires the development of a good doctor, which takes a long time and costs a lot. In addition, the subjectivity of the manual reading is too large, the use of information is insufficient, and misjudgment is easy to occur in the judgment process. The artificial intelligence reading can save the cost of reading and improve the efficiency of reading. At the same time, 90% of medical data comes from medical imaging, which makes it possible for artificial intelligence to enter the field of medical imaging [3]. The four typical problems of medical image processing are: classification, detection, segmentation, and retrieval, all of which are time-consuming and labor-intensive in clinical medical applications. Currently successfully applied areas include: lung cancer, screening, breast cancer screening, colorectal cancer screening, cervical cancer screening, retinopathy and diabetic retinopathy. The image data analysed by artificial intelligence can provide a powerful reference for doctors, and even for some intelligent high analysis data,
Application Status and Development Prospect …
131
Fig. 1 The CT image of pulmonary nodules in the thoracic cavity [4]
the diagnosis conclusion can be made independently. Due to the two-dimensional properties of medical images, the application of AI in medical imaging has been successful, with ROC values above 0.9 [4]. Taking lung cancer as an example, the most important application of artificial intelligence in this field is identifying and detecting the presence of pulmonary nodules in chest DR or CT images, thereby achieving early screening and the diagnosis of lung cancer (Fig. 1).
3.2 Artificial Intelligence and Drug Development It is well known that the cycle of drug development is long and costly. However, artificial intelligence technology provides a safety expert for testing drugs at lower cost. In recent years, artificial intelligence technology has gradually begun to be applied to drug development research. Using big data analysis and processing technology can screen out suitable compounds or organisms quickly and accurately, which can reduce R&D costs, shorten development cycles, and increase R&D success rates. In addition, the drug activity, safety, and drug side effects can also be predicted by computer simulations. For example, Atomwise, a representative startup in the field of drug discovery and artificial intelligence, uses supercomputers to analyse existing drug databases, and uses artificial intelligence technology to evaluate new drug development risks and simulate the complete process of drug development, greatly reducing its drug development. Cost, and reduce the evaluation time of its new drug. The company made the first breakthrough in search for Ebola treatment solutions in 2015 [5]. In the past few years, the advantages of artificial intelligence technology in drug development have become more and more obvious, and major breakthroughs have been made in many fields, such as cardiovascular drugs, anti-tumor drugs, common infectious disease treatment drugs, orphan drugs and so on [7] (Table 1).
132 Table 1 Top-100 AI experts in drug discovery distribution by organization type [6]
M. Wang Group
The proportion/%
Academia
43
AI companies
30
Pharma corporations
15
Tech corporations
7
Other
5
3.3 Artificial Intelligence and Medical Robots As China becomes aging, the demand for medical care, nursing and rehabilitation continues to increase. Meanwhile, due to the pursuit of medical care quality, the personnel engaged in medical care must reach higher standards for terms of quality and quantity. On the other hand, there is the relative lack of medical staff, and medical robots have enormous potential for development. The main responsibility of medical robots is to liberate medical staff from a large number of cumbersome and streamlined tasks, thereby greatly improving the diagnostic rate. At present, according to the different uses of medical robots, it is divided into four categories: surgical robots, rehabilitation robots, auxiliary robots, and service robots [8]. Among them, surgical robots account for the highest proportion in hospitals. The surgical robot is an intelligent surgical platform that has been widely used in many clinical disciplines. Da Vinci is the best surgical robot in the world without exception [9]. Da Vinci robots have been promoted in major hospitals, and other types of robots have gradually entered the medical market with the development of artificial intelligence (Fig. 2).
Fig. 2 Market size of different branches of medical robots (100 million dollars) [8]
Application Status and Development Prospect …
133
4 The Development Prospect of Artificial Intelligence in the Field of Clinical Medicine The doctor is a very special occupational group. They have long-term professional medical training, continue to learn the latest academic reports, experienced patient death feedback, and finally formed their own unique diagnostic system. However, doctors have been unable to transcend human “subjective” limitations. Different doctors see different numbers of cases, have different comprehension skills, and have different levels of surgery. Therefore, their diagnosis and treatment effects are also different. From this perspective alone, artificial intelligence has obvious advantages, such as the ability to process large amounts of data quickly, with better reasoning capabilities, and avoiding subjective prejudgments. Therefore, the use of artificial intelligence to assist doctors is a benefit that outweighs disadvantages [10]. But this does not mean that the profession of doctors will disappear, because the cases of artificial intelligence learning still need doctors to explore [11]. The development of the times has made artificial intelligence more and more advanced, and artificial intelligence has become more and more widely used in medical scenes. Artificial intelligence is expected to carry out more tedious and repetitive work to improve the efficiency of doctors, and hope to reduce the shortage of doctors and improve the accuracy of diagnosis and treatment [12]. Promote the optimal allocation of quality medical resources and promote the efficient operation of three-level triage and medical associations; provide large-scale quantitative analysis, promote medical diagnosis into a new level of quantitative analysis, and promote new diagnostic methods and treatment options.
5 Conclusion Artificial intelligence is the trend of the times, and the application of artificial intelligence in clinical medicine is the future development direction of medical care. With the continuous advancement of society, the increasing awareness of health, and the acceleration of the current population aging, our desire to improve medical technology, enhance health and prolong life is even stronger [13]. With the continuous improvement of technologies such as computer vision, drug detection, and robotics, it is a reasonable and feasible means to promote the transformation of the medical and health industry through artificial intelligence technology. The future artificial intelligence technology will certainly bring more to the medical and health fields. Opportunity. I believe artificial intelligence will bring about earth-shaking changes in Chinese clinical medicine, and truly bring more benefits to people in the near future.
134
M. Wang
References 1. Bazzocchi, M.,F. Mazzarella, C. Del Frate, F. Girometti, and C. Zuiani. 2017. CAD systems for mammography: A real opportunity. La radiologia medica. 2. Mardani, M., E. Gong, and J.Y. Cheng. 2019. Deep generative adversarial neural networks for compressive sensing (GANCS). IEEE Transactions on Medical Imaging. 3. Schlemper, J., J. Caballero, and J.V. Hajnal. June 2017. “A deep cascade of convolutional neural networks for MR image reconstruction in International Conference on Information Processing. In Medical imaging, 25–30. Cham: Springer. 4. Yang, Y., J. Sun, H. Li, et al. 2016. Deep ADMM-net for compressive sensing MRI in the 30th Conference on Neural Information Processing Systems, 5–10. Barcelona, Spain and Cambridge: MIT Press. 5. Ye, J.C., Y. Han, and E. Cha. 2018. Deep convolutional framelets: A general deep learning framework for inverse problems, December 2016. SIAM Journal on Imaging Sciences 11 (2): 991–1048. 6. Rumelhart, D.E., G.E. Hinton, and R.J. Williams. 2012. Learning representations by backpropagating errors. 7. Eyheramendy, S.,D.D. Lewis, and D. Madigan. 2015. On the Naive Bayes model for text categorization. 8. Nilsson, N.J. 2018. Artificial intelligence: A new synthesis. 9. Miller, Adam. 2013. The future of health care could be elementary with Watson. Canadian Medical Association Journal. 10. Sokol, R.J., J.F. Roux, S. McCarthy. 2015. Computer diagnosis of labor progression: Fetal stress and labor in the occipitoposterior position. American Journal of Obstetrics and Gynecology. 11. Pearlman, M.H., W.E. Hammond, and H.K. Thompson. 2016. A “well-baby” Questionnaire. Pediatrics. 12. Henry, M.J., D.D.F. McColl, J.W. Crawford, et al. 2019. Computing techniques for in-trapartum physiological data reduction. 13. Small, S.L., and E.K. Muechler. 2018. Heuristic determination of relevant diagnostic procedures in a medical expert system for gynecology. American Journal of Obstetrics and Gynecology.
Core Index System of Provincial Power Grid Company’s Economic Activity Analysis Rongmao Wang, Lei Jiang, Jia Yu and Xiao Pan
Abstract As a common method to analyze the production and management activities of enterprises, economic activity analysis can effectively help enterprises improve administration,boost production, and provide scientific basis for decision-making. As a large state-owned enterprise, the grid company has a large number of indicators related to the enterprise’s production and operation, and there are certain internal links between some indicators. Based on this background, this paper takes a provincial power grid company as an example, deeply studies the construction of the core indicator system of the enterprise’s economic activity analysis, and filters the core indicators of the enterprise’s economic activity analysis through gray relational analysis method and factor analysis method, referring to expert opinions. This paper integrate the core indicator systems under the two screening methods to form the final core index system of the enterprise. Keywords State estimation · Economic activity analysis · Gray relational analysis · Factor analysis · Core indicator system
1 Introduction As an important means for enterprises to strengthen economic management and improve economic efficiency, economic activity analysis is a working method to research the effects of operations comprehensively and systematically [1, 2]. Economic activity analysis has significant meaning for enterprises: (1) It is beneficial for enterprise managers to grasp the situation, sum up work and obtain decision-making basis; (2) It is beneficial for enterprises to check the implementation of national policies and plans in all aspects of production and operation, discover and correct the problem in time; (3) It is beneficial for enterprises to improve the management level and economic benefits; (4) It is of great significance for the implementation of performance and responsibility assessment. R. Wang (B) · L. Jiang · J. Yu · X. Pan State Grid Liaoning Electric Power Company, Shenyang, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_19
135
136
R. Wang et al.
Under the current background of the enterprise’s neweconomic development and the reform of state-owned enterprises, the limitations of power grid company’s economic activities analysis of have gradually become prominent: (1) The scale of indicators is large and have become more complex with the developing of the developing. There are more and more indicators in the analysis framework, which adds more work to the writing and analysis of the enterprise’s economic activity analysis report. (2) There is a certain degree of redundancy in the analysis of indicators, and there are two in the analysis of economic activities. The indicators (such as the electricity consumption of the secondary industry and the industrial electricity consumption) have strong correlation, and the main factors affecting the two indicators are basically the same. At this time, the analysis of the two indicators will result in repeat of analysis [3–5]. Concerned the problems existing in the analysis of the enterprise’s economic activities, the main method at present is justly establish a core indicator system. The methods for selecting core indicators mainly include statistical methods such as principal component analysis, factor analysis, and gray relational analysis [6–8], as well as genetic algorithm, neural network and other machine learning methods [9, 10]. Taking into account the economic significance of each indicator and when the indicators are selected, it is necessary to use the expert experience and other factors. This paper mainly adopts the statistical method to construct the core index system. This paper based on the analysis and collation of relevant data in the quarterly economic activity analysis report of the company from 2014 to the present, mainly takes the perspective of the core indicators. This paper takes a provincial power grid enterprise as an example, considering the requirements for the interpretability of the analysis results and the absence of some data. Gray relational analysis and factor analysis are used to screen the core indicators of the enterprise’s economic activities. Combined with expert knowledge, the core indicators are selected under the above two methods are integrated to form the final core indicator system.
2 Gray Relational Analysis 2.1 Theoretical Basis The gray relational analysis theory, usually used in a “small sample” and “poor information” uncertainty systems, whose characteristic is partial information known and partial information unknown, is used to extract valuable information from known information and form a exact description of system operation law. In gray relational analysis system, gray relational degree is used to describe the strength, size and ordering of the relationship between factors. The basic idea is to judge whether the connection is tight according to the degree which describe the similarity between the sequence curve geometries the closer the curve, the greater the correlation between the corresponding sequences, and on the contrary, it’s also set up.
Core Index System of Provincial …
137
For the enterprise’s operating data, there are problems such as insufficient sample size and statistical caliber. The advantage of the gray correlation analysis method is that it is equally applicable to different sample regardless of size and law. Therefore, the gray relational analysis method can be used to screen the economic activity analysis indicators.
2.2 Calculation Process Step 1: determine the reference and the comparing sequence.The system feature sequence W0 = (w0 (1), w0 (2), . . . , w0 (n)) is selected as the reference sequence, and it is known that there are m factor sequences related to W0 . Assume Wi (i = 1, 2, . . . , m) is a system factor, the observed data is wi (k)(k = 1, 2, . . . , n), and Wi = (wi (1), wi (2), . . . , wi (n)) is called the behavior sequence of the factor X i . The matrix Wm∗n can be used to represent the comparison sequence as follows: ⎡
W = (w)m∗n
w11 ⎢ w21 ⎢ = ⎢. ⎣ ..
w12 w22 .. .
... ... .. .
w1n w2n .. .
⎤ ⎥ ⎥ ⎥ ⎦
(1)
wm1 wm2 . . . wmn
Step 2: make the data sequence dimensionless. Considering that the economic activity analysis indicators have positive and negative indicators, the interval value operator is used to make the original data dimensionless. The positive and negative indicators are treated as follows: vi (k) =
wi (k) − min k wi (k) maxk wi (k) − min k wi (k)
(2)
vi (k) =
maxk wi (k) − wi (k) maxk wi (k) − min k wi (k)
(3)
Step 3: find the gray relational coefficient.The gray relational coefficient characterizes the closeness of the the comparison and the reference sequence at a certain index, and its range is (0, 1). The gray relational coefficient of the the comparison and the reference sequence is calculated as follows: u 0i (k) =
min i min k |v0 (k) − vi (k)| + δmaxi maxk |v0 (k) − vi (k)| |v0 (k) − vi (k)| + δmaxi maxk |v0 (k) − vi (k)|
(4)
Among them, δ ∈ [0, 1] is called the distinguishing coefficient. The smaller the δ, the greater the difference between the relational coefficients and the greater the resolving power. Generally take δ = 0.5.
138
R. Wang et al.
Step 4: seek gray relevancy degree. The average of the relevancy coefficients at each indicator of comparing sequences Wi and reference sequences W0 is the relevancy degree between the two sequences: u 0i =
n 1 u 0i (k) n k=1
(5)
In the formula: u 0i ∈ (0, 1], the larger γ is, the greater the effect Wi on W0 is. If u 0i > u 0 j (j = 1, 2, . . . , m), then the factor Wi is better than the factor Wj . Step 5: find the gray relational order. The gray relevancy degree u 0i (i = 1, 2, . . . , m) are arranged in order of largest to smallest, which means the gray relational order is obtained. The gray relational order can reflect the close relationship between each the comparison and the reference sequence directly.
3 Factor Analysis 3.1 Theoretical Basis Factor numerator is a multivariate statistical analysis method that uses the idea of dimensionality reduction to attribute some variables with intricate relationships into a few comprehensive factors. The main idea is to group the original variables according to the size of the correlation, which means that the correlation between the variables in the same group is higher, and the correlation between the variables in the different groups is lower. Each set of variables represents a basic structure and is represented by an unobservable synthetic variable called the common factor. Factor analysis can be divided into 3 steps: determining factor load, factor rotation, and calculating factor score. The element value in the factor rotation matrix represents the relationship between the original index and the principal component index. The larger the value,the greater the relationship between the original index and the principal component index, and the stronger the relationship with the analysis object. Thus it can be an important indicator of the analysis object; on the contrary, if the lower the element value, the smaller the relationship between it and the principal component index and the weaker the relationship with the analysis object. Thus it can be an unimportant indicator. The essence of factor analysis is to use the linear combination of the few common factors for the observed indicator values. The basic model of factor analysis is Wi = ai1 F1 + ai2 F2 + · · · + aik Fk + εi , where Wi is the i-th index (i=1,…m); F j is the j-th common factor (j= 1,…,k); ai j is the load of the i-th index on the j-th common factor, called the factor load; εi is a special factor that only affects the index Wi ; k is the number of common factors, and m is the index number.
Core Index System of Provincial …
139
3.2 Calculation Process First, calculate the correlation coefficient of the normalized index value and the eigenvalue of the matrix R, the j-th common factor is the total variance of the original index value,which means the variance contribution rate of the common factor to the original index value. The eigenvalues are sorted from large to small, and the cumulative variance contribution rate criterion is determined according to the result. The common factor corresponding to the first k eigenvalues is selected and the factor analysis model is constructed. Factor analysis is used to screen the evaluation index. Factor load reflects the correlation between the index and the public factor. The greater the load, the greater the impact of the index and the greater the retention of the index corresponding to the maximum factor load. Factor analysis process ensures that a small number of representative indicators are used to maximize the original information of the index.
4 Determination of Initial Indicators After combining and summarizing the general economic activity analysis content framework and considering the enterprise’s actual, this paper studies the correlation between indicators and the differences in index classification and statistical caliber in different years. Based on the principle of construction such as comprehensiveness, focus, availability, simplicity and versatility, etc., this paper selects 105 initial indicators from the economic activity analysis report of a provincial power grid company and divide it into 8 modules. The initial indicators of economic activity analysis of a provincial power grid enterprise are shown in Table 1.
5 Core Indicator Selection 5.1 Gray Relational Analysis Index Selection Considering that there may be data correlation between indicators under different modules, and there is no logical correlation or weak correlation, this paper chooses to calculate the gray relational coefficient matrix for different modules and filters the indicators in the module. The gray relational coefficient matrix of each indicator under the macroeconomic environment module is shown in Table 2. According to the results of the gray relational coefficient matrix, this paper eliminates the four indicators ME4, ME6, ME8, and ME9. In the same way, the gray relational coefficient matrix of the indicators under other modules is calculated. The indicators according to the gray relational coefficient matrix is filtered, and finally
140
R. Wang et al.
Table 1 Initial indicators of economic activity analysis of a provincial power grid company Module
Indicator
Macroeconomic environment ME
GDP ME1, industral added value ME2, CPI ME3, import and export amount ME4, import amount ME5, export amount ME6, fixed assets investment ME7, real estate development investment ME8, local public finance expenditure ME9
Electricity demand ED
Total electricity consumption ED1, peak load ED2, the electricity consumption of the first production ED3, the electricity consumption of the second production ED4, the electricity consumption of the industry ED5, the electricity consumption of the three production ED6, the electricity consumption of urban and rural residents ED7
Power supply PS
Power generation installed capacity PS1, hydropower installed capacity PS2, thermal power installed capacity PS3, wind power installed capacity PS4, solar installed capacity PS5, nuclear power installed capacity PS6, power generation PS7, hydroelectric power generation PS8, thermal power generation PS9, wind power generation PS10, solar energy power generation PS11, nuclear power generation PS12, power generation equipment utilization hour PS13, hydropower equipment utilization hour PS14, thermal power equipment utilization hour PS15, wind power equipment utilization hour PS16, solar energy equipment utilization hour PS17, nuclear power equipment utilization hour PS18, self-supplied power plant installed capacity PS19, self-supplied power generation capacity PS20, self-supplied power generation generation hours PS21
Production and marketing PM
Electricity sales PM1, large industrial sales PM2, residential sales PM3, line loss rate PM4, 500 kV line loss rate PM5, 220 kV line loss rate PM6, 66 kV line loss rate PM7, 10 kV and below line loss rate PM8, purchasing electricity PM9, Provincial electricity purchase PM10, purchasing contact line power PM11, contact line sales power PM12, net purchasing power PM13, company market share PM14, new equipment / capacity expansion capacity PM15, volume reduction recovery industry Expansion capacity PM16, suspension recovery industry expansion capacity PM17, sales volume expansion capacity PM18, capacity reduction capacity expansion PM19, suspension of industry expansion capacity PM20, industry expansion capacity net value PM21, purchasing unit price PM22, electricity sales unit price PM23, basic electricity fee income PM24, power rate electricity fee income PM25, electricity and electricity fee income PM26, transmission and distribution price PM27 (continued)
Core Index System of Provincial …
141
Table 1 (continued) Module
Indicator
Business benefits BB
Total profit BB1, power enterprise profit BB2, subsidiary company profit BB3, asset-liability ratio BB4, operating income BB5, electricity sales revenue BB6, operating cost BB7, electricity sales cost BB8, electricity purchasing cost BB9, transmission and distribution cost BB10, wage BB11, depreciation BB12, total company assets BB13, total company liabilities BB14, owner’s equity BB15
Power grid development PGD
Fixed assets investment PGD1, grid infrastructure investment PGD2, technology transformation investment PGD3, marketing investment (capital) investment PGD4, information construction (capital) investment PGD5, sporadic purchasing investment PGD6, small infrastructure investment PGD7, non-productive technological transformation investment PGD8, newly started 66 kV and above line length PGD9, newly started substation capacity PGD10, commissioned 66 kV and above line length PGD11, commissioned substation capacity PGD12, centralized purchasing total amount PGD13, material category centralized purchasing amount PGD14, non Material category centralized purchasing amount PGD15
Power grid operation PGO
Grid/equipment events PGO1, urban users’ power supply reliability rate PGO2, rural power users’ power supply reliability rate PGO3, urban power supply voltage pass rate PGO4, rural power grid comprehensive voltage pass rate PGO5
Personnel performance PP
Number of employees in wholly-owned/holding units PP1, number of graduates or above PP2, number of undergraduates in university PP3, number of college graduates PP4, number of secondary vocational education and below PP5, labor productivity PP6
58 indicators to form the core indexsystem are selected. The core indicator system based on gray relational analysis is shown in Table 3.
5.2 Factor Analysis Indicator Selection When factor analysis is used to screen the economic and social development indicators related to electricity, the factor extraction method is the main component method. The eigenvalue must be greater than 1. The factor rotation method is the maximum quadratic method. Using SPSS to calculate the correlation matrix between the indicators, through observation, we can see that the matrix coefficient is large. Combined with the SPSS output results, we can see that there is a certain correlation between each index, so factor analysis can be performed.
ME9
ME8
ME7
ME6
ME5
ME4
ME3
ME2
ME1
1.000
ME1
1.000
0.594
ME2
1.000
0.617
0.648
ME3
1.000
0.641
0.639
0.563
ME4
1.000
0.591
0.693
0.596
0.484
ME5
1.000
0.591
0.591
0.653
0.623
0.559
ME6
Table 2 Gray relational coefficient matrix of each indicator under the macroeconomic environment module
1.000
0.637
0.716
0.643
0.669
0.619
0.571
ME7
1.000
0.662
0.576
0.702
0.619
0.674
0.632
0.583
ME8
1.000
0.649
0.672
0.595
0.582
0.668
0.584
0.709
0.666
ME9
142 R. Wang et al.
Core Index System of Provincial …
143
Table 3 Core indicator system based on gray relational analysis Number
Module
Indicator
1
ME
ME1, ME2, ME3, ME5, ME7
2
ED
ED1, ED2, ED4, ED6
3
PS
PS1, PS2, PS3, PS6, PS7, PS8, PS9, PS12, PS13, PS15, PS16, PS18
4
PM
PM1, PM2, PM3, PM4, PM5, PM9, PM11, PM12, PM13, PM14, PM15, PM19, PM21, PM22, PM23, PM27
5
BB
BB1, BB3, BB6, BB7, BB11, BB13, BB14
6
PGD
PGD1, PGD2, PGD4, PGD7, PGD9, PGD12, PGD13
7
PGO
PGO1, PGO2, PGO5
8
PP
PP1, PP2, PP5, PP6
Table 4 Interpretation variance and total variance for each factor (reverse order) Number
Variance %
Cumulative variance %
Number
Variance %
Cumulative variance %
1
33.191
33.191
2
13.885
47.076
9
2.782
86.817
10
2.527
89.345
3
8.843
4
8.193
55.919
11
2.108
91.453
64.113
12
1.866
5
93.32
7.861
71.974
13
1.62
94.94
6
4.865
76.839
14
1.32
96.26
7
4.121
80.96
15
1.252
97.512
8
3.076
84.035
16
1.01
98.521
According to the calculation results of the SPSS software, the variance and total variance of each factor (reverse order) are shown in Table 4. According to the above calculation results, we extract 16 principal components, and take each principal component in the component matrix corresponding to each original indicators index element as an important criterion for screening economic activity analysis indicators when value is greater than 0.7. The factor analysis method was used to screen the analysis of the enterprise’s economic activities, and a total of 46 important indicators were selected. The results are shown in Table 5.
5.3 Core Indicator System Construction The core indicator system of economic activity analysis is combined based on these two methods above. In view of the fact that both methods have their own advantages and disadvantages, the intersection of the two is taken in the merger and summary (a total of 33 indicators). On this basis, according to the expert knowledge, the
144
R. Wang et al.
Table 5 Factor analysis index screening result Number
Module
Indicator
1
ME
ME1, ME3, ME5
2
ED
ED1, ED2, ED6, ED7
3
PS
PS1, PS3, PS4, PS5, PS6, PS7, PS11, PS12, PS13, PS15
4
PM
PM1, PM3, PM7, PM8, PM9, PM11, PM13, PM14, PM16, PM20, PM23, PM27
5
BB
BB4, BB5, BB6, BB7, BB13, BB14, BB15
6
PGD
PGD1, PGD3, PGD13
7
PGO
PGO2, PGO3, PGO5
8
PP
PP1, PP2, PP3, PP6
Table 6 Core Indicator System for Analysis of Corporate Economic Activities Number
Module
Indicator
1
ME
ME1, ME2, ME3, ME5
2
ED
ED1, ED2, ED4, ED6
3
PS
PS1, PS3, PS6, PS7, PS9, PS12, PS13, PS15, PS16
4
PM
PM1, PM3, PM4, PM7, PM9, PM11, PM13, PM14,PM15, PM21, PM23, PM27
5
BB
BB1, BB3, BB5, BB7, BB11, BB13, BB14
6
PGD
PGD1, PGD2, PGD9, PGD12, PGD13
7
PGO
PGO1, PGO2, PGO5
8
PP
PP1, PP2, PP3, PP6
other indicators selected to be less relevant to the selected indicators and with strong explanatory power of economic activities (15 indicators in total) are the final core index system for analyzing economic activities of the enterprise, with a total of 48 indicators. The core indicator system of the enterprise’s economic activity analysis is shown in Table 6.
6 Core Indicator Selection To illustrate, by taking a provincial power grid enterprise as an example, this paper studies the process of reducing the indicators in the economic activity analysis of provincial power grid enterprise. Based on the analysis of the economic activity analysis report of a provincial power grid company from 2014 to the present, the preliminary index system is determined and divided into 8 modules based on the enterprise’s production and operation activities. On this basis, the gray relational analysis and factor analysis are used to screen the indicators. Through the integration
Core Index System of Provincial …
145
of the two screening results, the final core indicator system is formed, the indicators are effectively achieved and the dimension is reduced. The main conclusions of the article are as follows: (1) There are too many indicators for analyzing the economic activities of provincial power grid companies, and there are correlations and overlaps between the indicators. The treatment of the indicator system makes it simple and representative to facilitate the evaluation; (2) The core index system constructed effectively solves the problem of index correlation, and the final index selection result is reasonable (the intersection of the indicators selected by factor analysis and gray relational analysis accounts for more than 2/3 of the number of indicators in the core indicator system).
References 1. Zhang, Hongshan. 2008. Investigation and development on economic activity analysis system of county-level power supply enterprises. North China Electric Power University (in Chinese). 2. Persist in improving quality and increasing efficiency, and create a new situation of high-quality development. State grid news, 24 October 2018 (1) (in Chinese). 3. Li, Lijun. 2011. Deepening the analysis of economic activities and improving the management level of enterprises. Management Metaphor (11): 7–8 (in Chinese). 4. Wang, Peng, Yanhong Yan, Minfu Wang, et al. 2003. Misunderstanding analysis of the construction of economic activity analysis system for power supply enterprises. Electric Power Information (4): 92–94 (in Chinese). 5. Liu, Xin, Xiong Li, An Dongsheng, et al. 2018. Construction and research of economic activity analysis system of group-type enterprises based on full business integration. Economic Research Guide (4): 17–21 (in Chinese). 6. Sun, Guanzhong. 2010. Economic activities analysis of power generation enterprises. North China Electric Power University (in Chinese). 7. Zhang, Hengbiao, Jihong Han, Jian Zhang, et al. 2015. Algorithm of indexes reduction and weight distribution algorithm based on gray correlation. Computer Engineering and Design 36 (4): 1027–1031 (in Chinese). 8. Li, Xiaopeng, Cunbin Li, and Lizhen Ji. 2018. Construction of energy internet development index system based on rough set and factor analysis. Science and Technology Management Research (20): 75–83 (in Chinese). 9. Zhang, Le, Zhong Liu, Jianqiang Zhang, et al. 2013. Reduction method of weapon system-ofsystems assessment index system based on autoencoder. Journal of Central South University (Natural Science Edition) 44 (10): 4130–4137 (in Chinese). 10. Zhang, Wei. 2013. Research on attribute reduction method based on genetic algorithm and its application in stock prediction. Hunan University (in Chinese). 11. Jiang, F., Zhao, X., Bai, Q. 2018. Simulation and stability analysis of conflict events between employees and organization based on the social network [J]. Concurrency and Computation: Practice and Experience, e5097.
Application Research of Smart Education in Flipped Classroom of College English Cheng Liu and Xiaofang Wang
Abstract Based on the smart education environment, this paper conducted an application research on the flipped classroom of College English teaching. After introducing the smart education and the flipped classroom, we showed the specific practice of the application research on college English flipped classroom. Then we explained and made analysis on the research problem and the relevant causes. In the last part of our research, we recommended some suggestions. Regardless of the implementation process or the effect, college teachers should first lay a good theoretical foundation, combine it with teaching practice, and find out the teaching mode of flipped classroom for the real situation of Chinese universities to further promote teaching reform. Keywords Smart education · Flipped classroom · College English teaching
1 Introduction of Smart Education In 2009, IBM initiated the Smart Education Program and proposed five major paths: student technology immersion, personalized and diverse learning paths, service economy knowledge and skills, global integration of systems, culture and resources, and the key role of education in the economy of twenty-first century [1]. In the following years, the United States, South Korea, Singapore, China and other countries have invested in the relevant research on smart education. The research and practice of smart education is not only the newest development trend of the fourth education revolution, but also a fundamental driving force for this innovation [2], smart education of technology intermedium has become a new realm and new appeal of the informationized education today [3]. This study combines the research status of domestic smart education. With the methodology of knowledge map and co-word analysis, we have designed an application research on the flipped classroom of college English C. Liu · X. Wang (B) School of Humanities, Jiangxi University of TCM, No. 1688 of Meiling Road, Wanli, Nanchang, Jiangxi, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_20
147
148
C. Liu and X. Wang
in the smart environment with the aim to provide suggestions for subsequent smart education research. Scholars at home and abroad have different opinions on the connotation of smart learning. Up to now, there is no definite consensus on the definition of smart learning in the world. Different researchers explain wisdom learning from different perspectives. Kaur’s explanation of intelligent learning emphasizes the role and influence of the implantation of technological means on the learning process, which is a relatively broad definition [4]. Dae-joon Hwang [5] of Sungkyunkwan University in Korea holds that smart learning refers to a flexible way of learning in which learners’ abilities can be enhanced by using open educational resources, smart IT and international standards from the perspective of the relationship between resources, technology and learners. This explanation not only from the perspective of technology, but also from the perspective of educational resources and these two perspectives, the purpose of which is to enhance the learning ability based on the change of learners’ behavior and to explain the wisdom of learning. Mumford once said that any understanding of technology cannot be separated from the understanding of human beings, and human beings cannot be totally equal to animals. To view human beings as human beings, technology must take into account the internal state of human beings [6]. In modern society, science and technology follow the path of rationalism and develop rapidly. Along with the logic of rationalism, it can promote the progress of technology to the greatest extent. But outside the technology itself, the subject of using technology is not included in the logic of technology development, which results in the deviation of technology from human beings. Technology is a purposeful creative activity of human beings, and it must reflect a certain value scale in the selection and development of technological projects [7]. The criteria for measuring this value scale are human beings, whether their demands are embodied or not, whether their subjectivity is realized or not, which should be the criteria for measuring technology. Education and technology serve human development, and human is the main body of educational and technological activities. As a new form of education, smart education comes from the integration of technology and education. The most fundamental reason for the integration of technology and education is that they have the common point of integration, which means they both regard human as the purpose of their own activities and promote human development. Education and technology are peoplecentered. People are the bridge connecting the two. People’s growth and development should be the internal requirement of smart education. To develop smart education, we should correctly grasp the relationship between technology and education. Technology is the basis of the development of smart education. Without the support of science and technology, the smart educational environment, interactive educational methods and accompanying learning system will become the castle in the air. But attaching importance to technology does not mean blindly following technology. In the final analysis, technology is only a means to achieve the goal, and human growth and development is the ultimate goal of smart education.
Application Research of Smart Education …
149
The voices that drive educational change are endless, but to this day, limited changes have not met people’s expectations. Technology has changed all aspects of the world, but education has changed little. The famous Jobs’ question is a question, but also points out a direction for our change education, that is, technology to promote educational change. We need to emphasize high-tech information. The integration of technology and education as the new cornerstone of the development of education in the new century [8], the integration of the two is indeed very difficult, and various attempts are under study. The accumulation of historical experience and the achievements of intelligent technology have provided us with the possibility to break through the deep integration of technology and education today, and implement and realize it through the complex ecological system of smart education [9]. Since entering the information age in the 1990s, technology has gradually intervened in the education system, trying to replicate the tremendous influence of other fields into education. Educational informatization has a wide influence both in theory and in practice, and bears great expectations of revolutionary impact on education. Educational informationization has introduced technology into the classroom in many ways, and has carried out various attempts to promote the teaching effect with information technology. It also recognizes that teachers play a key role in the teaching of information technology change, and has carried out continuous training for teachers in the application of information technology. Researchers try to bridge the teaching practice with the application of technology, try to find a good way to solve the problem of education by technology, and try to find a plan to promote the reform and development of education by technology [10].
2 Introduction of Flipped Classroom With the fast improvement of advanced teaching technologies, flipped classroom, as a new teaching model, has set off a new wave in the field of global education. To meet the needs of educational informationization and the teaching reforms, China has begun to carry out the practice of flipped classrooms ten years ago. Flipped classroom, reflecting the people-oriented philosophy, embodies the theory of mastery learning and the theory of proximal development zone. From the researches of the flipped classroom, we can find out that the flipped classrooms are characterized by the student-centered teaching. And the flipped classrooms have abundant teaching resources, fair teaching evaluation and free teaching environment. In order to ensure the effectiveness of flipped classrooms, universities not only need to have a high level of teachers and active students who are good at learning, but also need to ensure that they have sufficient teaching resources with high quality and excellent technical platform and the consensus and support from all sectors of society. Teaching modes of flipped classroom involve putting the delivery of knowledge ahead of class, the internalization of knowledge in the classroom, and the classroom becomes a place for educators and learners to interact with each other, thus achieving better educational effect in the end. Flipped classrooms will integrate the teaching
150
C. Liu and X. Wang
of learners in accordance with their aptitude and self-study. They can change the status quo of emphasizing writing and neglecting oral training in English teaching in China, create more language expression environment, and improve the learners’ language communication abilities.
3 Application of Flipped Classroom in Smart Education of College English We have applied the teaching reform to the English class of 3A5 in our school, and will gradually apply to other majors of our school. In order to make use of smart learning environment to lead students go beyond the limits of textbooks and classroom in English learning, expand English learning from classroom to the outside, and promote students’ effective learning both in the real or virtual situation context. Teachers provide a series of English learning materials for students, a specific arrangement of learning tasks, let students complete the task through cell phones or personal computers, exchange learning experience and share experiences through WeChat groups and QQ groups, realize timely interaction, dynamic tracking and evaluation of the learning process and effect of the students. And the specific research content is as follows: Students are divided into several groups, with 3–5 people in each group. We will select one group leader, who is mainly charge of checking the finishing of learning tasks, group learning preparation and group learning plan. The teachers share the teaching plan and courseware, the related English learning audios, videos and so on. Students can learn at anytime and anywhere when they have time. Students are required to install the software of VOA Standard English on their mobile phones, practicing five pieces of English news everyday extensively. They need to imitate and repeat two of the five news intensively, at least two minutes for each. In addition, they are required to install the software of Haici electrical Dictionary on their cell phones, and to complete the contents of “daily hot words” and “daily situational learning” every day. Teachers will make use of the website of www.pigai.org to assign the tasks of writing and translation every week. This website is the largest English platform for training translation and writing in China. Through this platform, teachers can submit the composition corrections timely for students, score the compositions and give out feedback analysis instantly, which can facilitate students to correct the composition while the iron is hot. The platform can point out students’ errors of spelling, grammar, vocabulary, and collocation in each sentence, and then give suggestions to revise the compositions with mistakes. WeChat groups and QQ groups are set up for further learning and better communication. In this circumstance, teachers arrange the learning tasks, share the learning resources, summarize the learning effect and feedback information in the two communicating groups. Students can communicate in either group, share their learning experience and thoughts, negotiate the problems encountered in their learning process, and answer the questions of the students.
Application Research of Smart Education …
151
4 Inadequacies of Flipped Classroom Application and Relevant Causes Although Chinese colleges and universities are currently experimenting with new teaching models of the flipped classrooms, they still do not abandon the traditional educational philosophy centered on teachers and imparting knowledge. Whether it is online video or offline discussion, the course is based on the teacher’s introduction of knowledge and knowledge, and knowledge is taught in an orderly manner according to the prescribed syllabus. In this class, the teacher’s video and the traditional class are basically consistent with the way the teacher explains the knowledge. The teacher did not completely implement the flipped classroom teaching with the students as the mainstay. Most teachers only focus on testing exercises when they are practicing the practice of flipped classrooms, so that students can do a lot of questions instead of thinking. Students are more slack in the tasks and assignments prescribed by the teacher. Some students only complete the assignment tasks distributed in the classrooms, and the topics for classroom discussion are also provided by teachers. The students do not find the problems and conduct in-depth research. At the same time, the course discussion in which most learners participate is only a demonstration of the homework. Students did not think deeply about the problem, and there was no corresponding essay writing requirement. In addition, we lack a rich teaching platform guarantee. We must change the deep-rooted teacher-oriented and indoctrinating education. Due to the quality of the flipped classroom teaching video and the reasonableness of the curriculum design, it is important to ensure that the classroom can be successfully implemented. Flipped classroom has high requirements for teachers’ professional knowledge level, broad knowledge structure and skilled information technology mastery. The design of the courses and the production of the teaching video content require a lot of time and energy for the teacher, which also poses a great challenge to the teacher [11]. The reason for the narrow content of China’s flipped classroom teaching resources and the over-formalization of flipped classroom practice is that teachers lack sufficient energy, profound knowledge system, curriculum design and curriculum management skills. We should further develop a high-level team of cooperative teachers. The flipped classroom is student-centered, and the flipped classroom pays more attention to the cultivation of students’ selfexploration ability, innovation ability and the ability of knowledge application. In the flipped classroom teaching mode, whether it is extracurricular self-study or in-class deepening, it puts forward higher requirements for students’ subjective initiative. Students must strengthen their initiative in learning and get rid of the impact of traditional exam-oriented education and avoid flipped classroom practice flowing form. Flipped classroom is technically demanding and requires a lot of technical development funding. We hope that the government and schools will increase their support for flipped classroom practices.
152
C. Liu and X. Wang
5 Research Suggestions for the Teaching Mode of Flipped Classroom In order to carry out the classroom practice better, Chinese universities should do the following suggests. First of all, universities should pay attention to the main role of people, which includes teachers and students. And they should pay more attention to the construction of high quality teachers and incentive policies. Secondly, Chinese universities have to break the shackles of basic curriculums due to the problems of educational philosophy and curriculum setting. In this case, they have to break the traditional teaching concept and system, then they should reduce the amount of courses, deepen and expand the teaching resources in order to improve the teaching efficiency. Finally, Chinese universities should strengthen the technical support and the openness of social platform. During the guarantee of the government system, education officials should strengthen the construction of the network platform and open social organizations to support the practice of flipped classroom. Chinese universities will do better after they have implemented the above suggestions. In the end, the practice of flipped classroom is bound to develop better and faster.
6 Conclusion By analyzing the theoretical basis, characteristics and practical conditions of flipped classrooms, we found that what we need to do about flipped classrooms is to constantly strive to find a flipped classroom teaching model that meets the actual situation under the government’s institutional guarantee. Although the concept of the flipped classroom is very good, no matter from the implementation process or the effect, the teachers in colleges and universities can’t worry. When teachers have laid a good theoretical foundation, combine it with teaching practice, they will find a suitable teaching model of the flipped classroom for the real situation of Chinese universities, which can further promote English teaching reform. Acknowledgements This research was supported by the Research Project of Teaching Reform in Jiangxi Province (Grant No: JXJG-17-12-8); Research of Education Science Planning Projects of 13th Five-Year in Jiangxi Province (Grant No: 17YB145).
References 1. Rudd J., P. Sullivan, and M. King. Education for a smarter planet: The future of learning. http:// www.redbooks.ibm.com/redpapers/pdfs/redp4564.pdf. 2. Zhong Xiaoliu, Song Shuqiang, and Hu Min. 2015. The Ecological Construction of Wisdom Education in the Vision of the Fourth Educational Revolution. Distance Education Magazine (4): 34–40.
Application Research of Smart Education …
153
3. Zhu Zhiting. 2016. New development of wisdom education: From flipped classroom to smart classroom and smart learning space. Open Education Research (1): 18–26. 4. Abtar Kaur. 2013. The future of smart learning: Personalized learning, March 10. http://www. elearningasia.net/-program/pdf_pt/[Speaker%205-1]Abtar%20Kaur.pdf. 5. Dae-joon Hwang. 2013. What’s the implication of “Smart” in education and learning?, March 10. http://www.elearningasia.net/-program/pdf_pt/[Panelist%203-2]Dae-joon%20Hwang.pdf. 6. Wu Guosheng. 2009. Lecture on philosophy of technology, 36. Beijing: Press of Renmin University of China. 7. Xu Liang. 2004. Philosophy of technology, 35. Shanghai: Fudan University Press. 8. Ding Gang and Wang Lu. 2006. The development of educational technology in the perspective of education. Journal of Electrotechnical Education (8): 3–5. 9. Hu Qintai et al. 2016. Research on the deconstruction and integration path of systematic education of wisdom education. China Electro-Chemical Education (1): 49–55. 10. Gu Xiaoqing, Wang Chunli, and Wang Fei. 2017. Looking back on the 20th year: The historical mission and role of information technology in education reform and development. ElectroEducational Research (6): 9–19. 11. Cui Can, Liu Yu, and Wang Qiong. 2015. Analysis of the implementation of flipping classrooms in Chinese colleges and universities. China Education Network (5): 28–30.
Multi-objective Enterprise Partner Selection Model with Different Relative Superiority Parameters Based on Particle Swarm Optimization Junfeng Zhao, Xue Deng, Yingxian Lin and Jinjia Lu
Abstract This paper studies a multi-objective virtual enterprise partner selection model with relative superiority parameter in fuzzy environment. The objective of the model is to maximize customers’ minimum satisfaction index, maximize average customer satisfaction index and minimize project completion cost. The completion time and delivery time are fuzzily processed. By means of relative superiority degree and weighting, the multi-objective model is transformed into a single-objective model and solved by particle swarm optimization (PSO). Finally, a specific example is given to solve the problem. The results of example show that there are different influences on the optimal solution and objective function value as to different relative superiority degrees and different weights. Keywords Partner selection · Fuzzy environment · Relative superiority degree · Multi-objective optimization · Particle swarm optimization
1 Introduction It is difficult for a single enterprise to gain an advantage in the market competition, so achieving a common goal by multiple enterprise alliances becomes the choice of many enterprises. For this form of virtual enterprise, partner selection is very important. Many scholars have done some quantitative research on this kind of scheduling problem, constructed relevant models, and applied appropriate intelligent algorithms to solve the models [1–6]. In addition, considering that there are various uncertainties in reality, the fixed start time and delivery time are not in line with reality. Therefore, it is necessary to consider partner selection problem in a fuzzy environment. For example, Huang et al. [7] study a multi-objective enterprise partner selection model with fuzzy start J. Zhao School of Mechanical and Electrical Engineering, Guangdong Polytechnic of Industry and Commerce, Guangzhou 510510, China X. Deng (B) · Y. Lin · J. Lu School of Mathematics, South China University of Technology, Guangzhou 510640, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_21
155
156
J. Zhao et al.
time and fuzzy delivery time, then solve it by genetic algorithm. Besides, in order to solve the proposed partner selection problem in virtual enterprise, scholars have proposed various algorithms to solve the problem and illustrated the effectiveness of the algorithms [8, 9]. Gao et al. [8] studies the comprehensive evaluation method of virtual enterprise partners based on wavelet network; Huang et al. [10] studies the selection of virtual enterprise partners with fuzzy completion time and fuzzy delivery time.
2 Partner Selection Model Suppose that an enterprise needs to complete a large-scale project but is unable to complete all assignments, so it decides to set up a virtual enterprise to complete the project. We suppose that there are n assignments in the project, H is the set of all assignment pairs, and (i, j) ∈ H represents a pair of assignment with a temporal relationship, that is, the assignment i must be carried out before the assignment j. For any assignment i, we need to select one of the m i existing candidate partners to complete it. For assignment i, if the optimistic value of fuzzy completion time is ci1 , the most completion time possible value is ci2 and the pessimistic value is ci3 , then the fuzzy can be expressed as a triangular fuzzy number c˜i = ci1 , ci2 , ci3 , whose membership function can be expressed as:
μc˜i (x) =
⎧ x−ci1 1 2 ⎪ ⎪ ⎨ c2 −c1 , ci ≤ x ≤ ci i
⎪ ⎪ ⎩
i
ci3 −x , ci3 −ci2
ci2 < x ≤ ci3
0,
otherwise
(1)
For any assignment (e, i) ∈ H , the delivery time of assignment e is the start time of assignment i. For assignment i, if the optimistic value of fuzzy start time is si1 , si3 , then the most possible value is si2 and the pessimistic value the fuzzy start time is 1 2 3 can be expressed as a triangular fuzzy number s˜i = si , si , si , whose membership function can be expressed as: ⎧ x−si1 1 2 ⎪ ⎪ ⎨ si2 −si1 , si ≤ x ≤ si 3 μs˜i (x) = s3i −x2 , s 2 < x ≤ s 3 i ⎪ si −si i ⎪ ⎩ 0, otherwise
(2)
The delivery time of the last assignment n is the delivery date of the whole project. The expectation of a project’ delivery date is a trapezoidal fuzzy number, in which the optimistic value is cn1 , the expected interval is [cn2 , cn3 ], and the pessimistic value is cn4 . That is,the membership function of a project’ delivery date expectation c˜n = cn1 , cn2 , cn3 , cn4 is
Multi-objective Enterprise Partner Selection …
⎧ x−cn1 ⎪ , ⎪ cn2 −cn1 ⎪ ⎪ ⎨ 1, μc˜n = ci4 −x ⎪ , ⎪ c4 −c3 ⎪ ⎪ ⎩ i i 0,
157
ci1 ≤ x < ci2 ci2 ≤ x ≤ ci3 ci3 < x ≤ ci4
(3)
otherwise
Some common notations in this paper are as followed: ➀ The set of the project’s assignments is A = {A1 , A2 , · · · , An }; ➁ The candidate partners’ set of assignment Ai is Pi = pi1 , pi2 , . . . , pim i . Besides, pir = 1 if assignment Ai selects candidate partner pir , or pir = 0 otherwise; ➂ For the candidate partner pir of assignment Ai , its fuzzy start time is s˜ir ; ➃ For the candidate partner pir of assignment Ai , its fuzzy completion time is s˜ir ; ➄ For the candidate partner pir of assignment Ai , its manufacturing cost is s˜ir ; ➅ The transportation time and cost between candidate partner pir and candidate partner p jq are tir jq and cir jq respectively, in which (i, j) ∈ H ; ➆ The planned start time of assignment Ai is Si , that is, The start time of Ai is no later than Si . The delivery time of assignment Ai is C˜ ir = c˜ir + tir jq , (i, j) ∈ H. Therefore, customer satisfaction index between assignments is:
area C˜ ir , i = 1, . . . , n − 1, C S Ii = area C˜ ir s˜ jq
(4)
where area C˜ ir s˜ jq is the intersection’s graphic area of curve C˜ ir and curve s˜ jq (shaded area), and ar ea C˜ ir is the graphic area of curve C˜ ir . Similarly, we define: if (i, j) ∈ H , then customer satisfaction index of the project delivery is the ratio of the intersection’s graphic area of assignment An ’s fuzzy delivery time membership function and the membership function of the project’s expected delivery time to the graphic area of assignment An ’s fuzzy delivery time membership function
C S In = area C˜ nr D˜ area C˜ nr
(5)
where area C˜ nr D˜ is the intersection’s graphic area of curve C˜ nr and curve D˜ (shaded area), and area C˜ nr is the graphic area of curve C˜ nr . Next is the model’s construction, which has three objective functions and three constraints. The first objective function is to maximize the minimum customer satisfaction index, which is expressed as max z 1 = min1≤i≤n C S Ii . The second objective function is to maximize the average customer satisfaction index, which is expressed n C S Ii . The third objective function is to minimize the completion as max z 2 = n1 i=1 cost, which is expressed as: minz 3 =
mi n i=1 r =1
So, we have
cir pir +
mj mi n n−1 i=1 j=1 r =1 j=1
cir jq δ pir , p jq
(6)
158
J. Zhao et al.
⎧ ⎪ z ⎪ max z 1 ; max z 2 ; min 3 ⎪ ⎪ ⎪ 1, ∀(i, j) ∈ H, pir = 1, p jq = 1 ⎪ ⎪ s.t. δ pir , p jq = ⎪ ⎪ 0, otherwise ⎨ mi p = 1, pir ∈ {0, 1}, pir ∈ Pi , i = 1, 2, . . . , n ⎪ ⎪ ⎪ r =1 ir ⎪ ⎪ ⎪ ⎪ s˜ir ≤ Si ⎪ ⎪ ⎩ C˜ ≤ s˜ , ∀(i, j) ∈ H, p = 1, p = 1 ir jq ir jq
(7)
3 Multi-objective Optimization The model can be expressed by optimization matrix F. If there are l virtual enterprise partner selection schemes, then the optimization matrix is expressed as: x x · · · xl ⎤ ⎡1 2 z1 z 11 z 12 · · · z 1l z 2 F = ⎣ z 21 z 22 · · · z 2l ⎦ z3 z 31 z 32 · · · z 3l
(8)
where z wy is the objective z w ’s value of scheme z wy , w = 1,2, 3, y = 1, 2, . . . , l. In this paper, the relative superiority degree μwy = μw x y with different parameters is used to determine the optimality membership degree of scheme x y with respect to objective z w . The relative superiority degree of maximal objectives z 1 and z 2 is: λ μwy = z wy z w,max w , z w,max = max z wy 1≤y≤l
(9)
The relative superiority degree of minimum objective z 3 is: λ μwy = z w,min z wy w , z w,min = min z wy 1≤y≤l
(10)
where λw is the relative superiority parameter set by decision makers. And obviously z w,max > 0, z w,min > 0, thus, we can obtain the relative superiority degree matrix of three objectives: x x · · · xl ⎤ ⎡ 1 2 μ1 μ11 μ12 · · · μ1l μ2 μ = ⎣ μ21 μ22 · · · μ2l ⎦ μ3 μ31 μ32 · · · μ3l
(11)
Multi-objective Enterprise Partner Selection …
159
Considering that it is impossible for each objective to achieve the optimum simultaneously, this paper uses weighted summation method to transform the multiobjective model into a single-objective model. And the evaluation function of the model is: max ω1 μ1 + ω2 μ2 + ω3 μ3 where ωw is the weight value of each objective, ωw ≥ 0, we try to solve the single-objective model:
(12) 3 w=1
ωw = 1. In summary,
⎧ max ω1 μ1 + ω2 μ2 + ω3 μ3 ⎪ ⎪ ⎪ m ⎪ ⎨ s.t. i p = 1, p ∈ {0, 1}, p ∈ P , i = 1, 2, . . . , n ir ir ir i r =1 ⎪ ⎪ s˜ ≤ Si ⎪ ⎪ ⎩ ˜ir Cir ≤ s˜ jq , ∀(i, j) ∈ H, pir = 1, p jq = 1
(13)
4 Particle Swarm Optimization Step 1: In this paper, particle swarm optimization (PSO) is used to solve the model. The basic flow of PSO is as follows: Step 2: Initialize the velocity and position of each particle. Step 3: Calculate the fitness of each particle. Step 4: Find the optimal individual position of each particle and the optimal population position. Step 5: Update the velocity and position of each particle. Step 6: Calculate the fitness of each particle. Step 7: Find the optimal individual position of each particle and the optimal population position. Step 8: If the termination condition is satisfied, the algorithm ends and the optimal solution is outputted. Otherwise, return to Step 4.
5 Numerical Example In this paper, the partner selection model of virtual enterprise under fuzzy environment is solved by taking mold manufacturing [8] as an example. A large-scale injection molding project consists of eight assignments: (1) Three-dimensional modeling and mold design of the product (including design of cavity, core and electrode).
160
J. Zhao et al.
(2) Design of mold frame and its manufacturing process, as well as related process on the mold frame. (3) Process design of cavity and core, NC programming and rough machining of inserts. (4) Process design, NC programming and processing of electrodes. (5) Electrical discharge machining (EDM) of inserts. (6) Design, manufacture and mold assembly of other parts and components. (7) Mold test. (8) Mold repair according to the results of the test. The temporal relationships of these eight assignments are shown in Fig. 1. Table 1 shows the fuzzy start time, the fuzzy completion time and the transportation time of the candidate partners. Table 2 shows the manufacturing cost and transportation cost of the candidate partners. In this paper, the parameters of PSO are set as follows: particles number of the population is 100, the maximum iteration time T = 100, the initial inertia weight wstar t = 0.9, the inertia weight wend = 0.4 when iteration time is T , individual cognitive factor c1 = 1.5 and social learning factor c2 = 1.5. Firstly, this paper sets objective function weights ω1 = 0.5, ω2 = 0.3, ω3 = 0.2 and relative superiority degree λw = 1 as an example to solve the model. The customer satisfaction indexes and transportation costs between assignments are detailed in Table 3, and the manufacturing costs of each assignment are detailed in Table 4. Next, the relative superiority degree with different values is compared and analyzed. Table 5 lists the optimal solutions and objective function values obtained from nine different relative superiority degrees. Therefore, the optimal partner selection scheme is the same as the one where relative superiority degree λw = 1, and it is still X = [1, 3, 2, 3, 1, 2, 3, 1]. Finally, the objective function values of the optimal solution with different weights are compared and analyzed. Table 6 shows the objective function values when only changing weights ω2 and ω3 and keeping ω1 unchanged. Fig. 1 The temporal relationships between assignments
2
1
6
7
5
8
3
4
Multi-objective Enterprise Partner Selection …
161
Table 1 The fuzzy start time, fuzzy completion time and transportation time i
Partner
Fuzzy start time (day)
Fuzzy completion time (day)
Transportation time (day)
A1
p11
0
(4, 5, 6)
–
–
–
A2
p21
(4, 5, 6)
(17, 18, 19)
t2161 = 4.0
t2162 = 3.0
t2163 = 5.0
p22
(5, 6, 7)
(17, 18, 19)
t2261 = 5.0
t2262 = 4.0
t2263 = 4.0
p23
(4.5, 5, 6.5)
(18.5, 19, 20.5)
t2361 = 2.0
t2362 = 3.0
t2363 = 3.0
p31
(5, 6, 7)
(12, 13, 14)
t3151 = 1.0
t3152 = 1.5
t3153 = 1.0
p32
(4, 5, 6)
(11, 12, 13)
t3251 = 2.0
t3252 = 2.0
t3253 = 1.0
p33
(4.5, 5.5, 6.5)
(11, 12, 13)
t3351 = 2.0
t3352 = 1.5
t3353 = 2.5
p41
(4.5, 5.5, 6.5)
(11.5, 12.5, 13.5)
t4151 = 1.0
t4152 = 1.5
t4153 = 1.0
p42
(5, 6, 7)
(11, 12, 13)
t4251 = 2.0
t4252 = 1.5
t4253 = 1.5
p43
(4.5, 5, 6.5)
(11.5, 12, 13.5)
t4351 = 2.0
t4352 = 1.5
t4353 = 1.0
p51
(13.5, 14, 15.5)
(20.5, 21, 22.5)
t5161 = 1.0
t5162 = 1.0
t5163 = 1.0
p52
(14, 15, 16)
(20, 21, 22)
t5261 = 1.5
t5262 = 1.0
t5263 = 2.0
p53
(14, 15, 16)
(19, 20, 21)
t5361 = 1.5
t5362 = 1.5
t5363 = 2.0
p61
(22, 23, 24)
(28, 29, 30)
t6171 = 1.0
t6172 = 1.0
t6173 = 0.5
p62
(21.5, 22.5, 23.5)
(26.5, 27.5, 28.5)
t6271 = 2.0
t6272 = 1.5
t6273 = 2.0
p63
(22, 23, 24)
(28, 29, 30)
t6371 = 1.0
t6372 = 1.5
t6373 = 1.0
p71
(29.5, 30.5, 31.5)
(32, 33, 34)
t7181 = 1.0
t7182 = 1.5
t7183 = 0.5
p72
(29.5, 30.5, 31.5)
(31, 32, 33)
t7281 = 1.0
t7282 = 1.0
t7283 = 1.5
p73
(29, 29.5, 31)
(31.5, 32, 33.5)
t7381 = 1.5
t7382 = 1.0
t7383 = 1.0
p81
(33, 34, 35)
(39, 40, 41)
–
–
–
p82
(33.5, 34.5, 35.5)
(40, 41, 42)
–
–
–
p83
(33, 34, 35)
(38.5, 39.5, 40.5)
–
–
–
A3
A4
A5
A6
A7
A8
162
J. Zhao et al.
Table 2 The manufacturing cost and transportation cost Assignment
Candidate partner
Manufacturing cost (unit: 10000 yuan)
Transportation cost (unit: 10000 yuan)
A1
p11
c11 = 14.0
–
–
–
A2
p21
c21 = 9.5
c2161 = 1.3
c2162 = 1.0
c2163 = 1.5
p22
c22 = 7.7
c2261 = 1.7
c2262 = 1.3
c2263 = 1.4
p23
c23 = 8.7
c2361 = 1.2
c2362 = 1.4
c2363 = 1.2
p31
c31 = 7.0
c3151 = 0.2
c3152 = 0.4
c3153 = 0.3
p32
c32 = 7.1
c3251 = 0.3
c3252 = 0.2
c3253 = 0.2
p33
c33 = 6.7
c3351 = 0.5
c3352 = 0.4
c3353 = 0.6
p41
c41 = 3.1
c4151 = 0.9
c4152 = 0.5
c4153 = 0.3
p42
c42 = 4.8
c4251 = 0.3
c4252 = 0.2
c4253 = 0.3
p43
c43 = 3.7
c4353 = 0.7
c4352 = 0.5
c4353 = 0.4
p51
c51 = 4.4
c5161 = 0.2
c5162 = 0.4
c5163 = 0.5
p52
c52 = 4.2
c5261 = 0.5
c5262 = 0.4
c5263 = 0.6
p53
c53 = 3.8
c5361 = 0.7
c5362 = 0.6
c5363 = 0.8
p61
c61 = 18.6
c6171 = 1.2
c6172 = 0.7
c6173 = 0.6
p62
c62 = 19.7
c6271 = 0.9
c6272 = 0.7
c6273 = 0.7
p63
c63 = 21.5
c6371 = 0.9
c6372 = 0.6
c6373 = 0.8
p71
c71 = 0.6
c7181 = 0.9
c7182 = 0.5
c7183 = 0.8
p72
c72 = 0.8
c7281 = 0.8
c7282 = 0.6
c7283 = 0.5
p73
c73 = 0.7
c7381 = 0.5
c7382 = 0.5
c7383 = 0.6
p81
c81 = 4.5
–
–
–
p82
c82 = 5.0
–
–
–
p83
c83 = 5.5
–
–
–
A3
A4
A5
A6
A7
A8
Table 3 The customer satisfaction indexes and transportation costs between assignments Assignment pairs
(1, 2)
(1, 3)
(1, 4)
(2, 6)
(3, 5)
(4, 5)
(5, 6)
(6, 7)
(7, 8)
Satisfaction index
0.75
1.00
0.75
0.80
0.75
1.00
0.80
0.75
0.80
Transportation cost
–
–
–
1.4
0.3
0.7
0.4
0.7
0.5
Table 4 The manufacturing costs of each assignment in example Assignment
A1
A2
A3
A4
A5
A6
A7
A8
Manufacturing cost
14.0
8.7
7.1
3.7
4.4
19.7
0.7
4.5
2 3
Assignment 3
Assignment 4
66.8
0.84
Average customer satisfaction index
Completion cost
1 0.75
Minimum customer satisfaction index
3
Assignment 7
Assignment 8
2
Assignment 6
1
3
Assignment 2
Assignment 5
1
0.0625
Assignment 1
λw 1
1
1
3
70.1
0.85
0.45
1
3
2
1
0.125 1
70.1
0.85
0.45
1
1
3
1
3
2
1
0.25
Table 5 The optimal solutions and objective function values for different λw
66.8
0.84
0.75
1
3
2
1
3
2
3
1
0.5
66.8
0.84
0.75
1
3
2
1
3
2
3
1
1
66.8
0.84
0.75
1
3
2
1
3
2
3
1
2
66.8
0.84
0.75
1
3
2
1
3
2
3
1
4
0.85
0.45
3
2
3
1
3
2
1
1
70.1
8
66.8
0.84
0.75
1
3
2
1
3
2
3
1
16
Multi-objective Enterprise Partner Selection … 163
164
J. Zhao et al.
Table 6 The objective function values with changing weights ω1 , ω2 , ω3 unchanged Number
ω1
ω2
ω3
Minimum customer satisfaction index
Average customer satisfaction index
Completion cost
1
0.40
0.10
0.50
0.75
0.84
66.8
2
0.40
0.15
0.45
0.75
0.84
66.8
3
0.40
0.20
0.40
0.75
0.84
66.8
4
0.40
0.25
0.35
0.45
0.85
70.1
5
0.40
0.30
0.30
0.45
0.85
70.1
6
0.40
0.35
0.25
0.75
0.84
66.8
7
0.40
0.40
0.20
0.75
0.84
66.8
8
0.40
0.45
0.15
0.75
0.84
66.8
9
0.40
0.50
0.10
0.75
0.84
66.8
6 Conclusion This paper constructs a multi-objective virtual enterprise partner selection model with relative superiority parameters in a fuzzy environment. It is a multi-objective model and can be transformed into a single-objective model according to the weight parameters of different objectives. Then Particle Swarm Optimization (PSO) algorithm is applied to solve the problem. Finally, the example demonstrates the effectiveness and feasibility of the model and algorithm. Different weight combinations of different objective functions lead to different results, which also provide more schemes for reference simultaneously. Acknowledgements This research was supported by the “Humanities and Social Sciences Research and Planning Fund of the Ministry of Education of China, No. x2lxY9180090”, “Natural Science Foundation of Guangdong Province, No. 2016A030313545”, “Soft Science of Guangdong Province, No. 2018A070712002” and “Fundamental Research Funds for the Central Universities of China, No. x2lxC2180170”, “Guangdong Polytechnic of Industry and Commerce Key Special Research Project (GDGM2016-CO-02)” and “Guangdong Polytechnic of Industry and Commerce Teaching Reform Project (2016-J-09)”.
References 1. Ip, W.H., M. Huang, K.L. Yung, and D.W. Wang. 2003. Genetic algorithm solution for a riskbased partner selection problem in a virtual enterprise. Computers & Operations Research 30: 213–231. 2. Zhao, Q., X.H. Zhang, and R.B. Xiao. 2008. Particle swarm optimization algorithm for partner selection in virtual enterprise. Progress in Natural Science 18: 1445–1452. 3. Deng, X., and X.Q. Pan. 2018. The research and comparison of multi-objective portfolio based on intuitionistic fuzzy optimization. Computers & Industrial Engineering 124: 411–421.
Multi-objective Enterprise Partner Selection …
165
4. Deng, X., J.F. Zhao, and Z.F. Li. 2018. Sensitivity analysis of the fuzzy mean-entropy portfolio model with transaction costs based on credibility theory. International Journal of Fuzzy Systems 20 (1): 209–218. 5. Deng, X., J. Song, J.F. Zhao, and Z.F. Li. 2018. The fuzzy tri-objective mean-semivarianceentropy portfolio model with layer-by-layer tolerance evaluation method paper. Journal of Intelligent & Fuzzy Systems 35 (2): 2391–2401. 6. Deng, X., and R.J. Li. 2014. Gradually tolerant constraint method for fuzzy portfolio based on possibility theory. Information Scicences 259: 16–24. 7. Huang, B., C.H. Gao, and L. Chen. 2009. Multi-objective optimization for partner selection in a virtual enterprise under fuzzy environment. China Mechanical Engineering 20 (23): 2865–2870 (in Chinese). 8. Gao, Y., and Y.Q. Liu. 2008. Comprehensive evaluation method of virtual enterprise’s partner selection based on wavelet network. Value Engineering 11: 87–90 (in Chinese). 9. Tao, F., L. Zhang, Z.H. Zhang, and A.Y.C. Nee. 2010. A quantum multi-agent evolutionary algorithm for selection of partners in a virtual enterprise. CIRP Annals—Manufacturing Technology 59: 485–488. 10. Huang, B., C.H. Gao, and L. Chen. 2010. Partner selection with fuzzy completion time and fuzzy due date in a virtual enterprise. Systems Engineering-Theory & Practice 30 (6): 1085–1091. (in Chinese).
Vehicle Path Optimization with Time Window Based on Improved Ant Colony Algorithm Bo Li and Tingting Li
Abstract Ant colony optimization (ACO) is a new heuristic algorithm developed by simulating ant foraging on the basis of group cooperative learning. TSP and other combinatorial optimization problems have been successfully solved. Like other heuristic search algorithms, ant colony algorithm has the disadvantage of being easily limited to local optimum. Aiming at the vehicle routing problem based on time window, the upper and lower limits of pheromone trajectory intensity are determined by analyzing the ant colony algorithm, and the transmission probability and pheromone updating method are improved to improve the convergence speed and global search ability of the algorithm. Aiming at the vehicle routing problem with time windows in logistics distribution, an improved maximum and minimum ant colony algorithm is proposed to improve the optimization performance. The algorithm can be extended to such related path optimization problems and applied. Keywords Ant colony algorithm · Vehicle routing problem · Time window
1 Introduction Vehicle Routing Problem (VRP) is a classic combination optimization problem. It organizes appropriate driving routes, so that vehicles can pass them in an orderly manner, and meet certain constraints. Time-window vehicle path problem (VRPTW) is required to reach the customer point according to the customer’s request in the distribution process based on the VRP, that is, without compromising the vehicle capacity limit, time limit and other constraints. Under the premise of the conditions, the vehicle distribution route-plan during transportation is reasonably formulated, and the requirements for the delivery and service time of the goods in different geographical B. Li (B) Information Engineering School, East China Jiaotong University, Nanchang 330013, Jiangxi, China e-mail: [email protected] T. Li Software School, East China Jiaotong University, Nanchang 330013, Jiangxi, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_22
167
168
B. Li and T. Li
locations are met at the lowest possible cost [1]. Because VRPTW has servicetime access restrictions, VRPTW is closer to practical applications than VRP, and is widely used in transportation and logistics. Since VRPTW is an NP-hard problem, it is mainly solved by using heuristic algorithm [2, 3]. Many scholars have conducted related research on this issue [4–11]. Among them, some scholars have proposed to solve VRPTW, explore the optimization ability of ant algorithm from numerical calculation, and obtain satisfactory results [4]. Another researcher combines the state transition rule introduces the time window span and service waiting time factor [5]; some scholars propose a quantum ant colony algorithm, increase the quantum bit heuristic factor, and use the quantum-revolving gate to realize pheromone update. Experiments show that the algorithm solves VRPTW. Vehicle routing is a vehicle transportation optimization problem. Usually, heuristic algorithm is used to solve the approximate solution of the problem is obtained within a certain search time range. Then, according to the rationality of the solution, a suitable distribution scheme is worked out. In the process of modeling, we should not only minimize the cost of transportation [6, 7]. At present, most of the research on VRP is done in theory, and the main research is the VRP problem with fewer sites. But in the real world, the number of sites is often large. The existing methods can not get satisfactory solutions, so they are often not applicable when dealing with these problems. How to effectively solve the large-scale VRP problem and find a satisfactory distribution scheme has become a difficult problem that logistics enterprises need to solve.
2 Dynamic Adaptive Ant Colony Algorithm 2.1 Ant Colony Algorithm In nature, ants are almost invisible and once they encounter new obstacles in the path, the old shortest path is not feasible, they will find new shortest path. In the course of walking, ants will drop pheromones, and each ant likes to follow the direction of pheromones more probabilistically. When obstacles blocked the previous path, they began to find new shortest paths. Some ants who accidentally chose shorter paths near obstacles would reconstitute new pheromone trajectories compared with ants who chose longer paths. In this way, there will be more pheromones on shorter paths per unit time, which will inevitably cause more ants to choose this shorter path [12, 13].
2.2 Ant Colony System Model Based on the TSP problem, the mathematical system of artificial ant system is described. For ease of expression, let m be the number of ant colonies. dij (i, j = 1, 2, . . . , n) represents the distance between cities i and j, and bi(t) represents the
Vehicle Path Optimization with Time Window …
169
number of ants located in the city at time t. Obviously, τij (t) represents the residual time on the ij line at time t. In addition, τij (0) = C. Ants k (k = 1, 2,…, m) determine the next step to be transferred according to the amount of information on each path during the motion. ⎧ [τi j (t)]α [ηi j (t)]β ⎪ ⎨ [τis (t)]α [ηis (t)]β pikj (t) = j ∈ allowekk ⎪ ⎩ 0, other wise
(1)
τi j (t + n) = ρ · τi j (t) + τi j
(2)
τi j =
m
τikj
(3)
k=1
Among them, allowekk = {1, 2,…, n} − tabuk , which means that the ant k is the next city to be selected. As the motion progresses, the intensity of pheromones left on the path will become weaker and weaker, and the disappearance of pheromones will be represented by parameters 1 − p. Ants use N minutes to complete a cycle. The amount of information is calculated as follows. Q , i f the kth ant passes the path i j in this loop (4) τi j = L k 0, else τij = C, τij = 0. α, β respectively represent the different roles played by the pheromone and expected information accumulated by the ant during the movement of the ant. Heuristic algorithm problems can be expected at regular intervals. According to the specific algorithm, the expressions of ij (t) and ij (t) are different [2]. Their expressions (4) are different. Equation (4) shows the mathematical model of the ant cycle and the ant population system. τi j =
Q di j
, i f the kth ant passes the path i jin this loop
0, else
(5)
In ant-quantity system model: τi j =
Q, i f the kth ant passes the path i j in this loop 0, else
(6)
The main difference between the above three algorithm models is that the update mechanism of the information amount on the path in the latter two models utilizes local information. This information update rule will gradually increase the amount of information corresponding to the short path, which can fully reflect the survivability of the shorter path (good solution) in the global scope of the algorithm, and strengthen
170
B. Li and T. Li
the information positive. The feedback performance improves the speed at which the system search converges.
2.3 Optimal Selection of Ant Colony Algorithm Parameters
0.4 Pheromone residual coefficient ρ=0.9
0.3
0.2
0.1
0.0
Convergence performance
Convergence performance
Set the number of ant colonies m = 5, the total amount of information released by the ant cycle is Q = 1, the information heuristic factor a = 0.9, the expected heuristic factor b = 1.0, and the stop condition of the operation is the most in the adjacent two loop searches. The difference between the optimal solutions is less than 0.001, and the change of the pheromone residual coefficient is p belongs to {0.3, 0.5, 0.7, 0.9, 0.95, 0.99}. The influence of pheromone residual coefficient and convergence on the performance of the algorithm is shown in Fig. 1. This pheromone updating method converges slowly, and its global optimization performance is not obvious. In order to accelerate the convergence speed without affecting the global optimization ability and find the optimal solution in a short time, an improved pheromone updating strategy is proposed in this paper. The strategy retains the best global solution, but in order to expand the scope of pheromone updating, “elite ant” takes the first few places in each iteration result. The stop condition of the operation is that the difference between the optimal solutions in the adjacent two loop searches is less than 0.001, and the change in the number of ants is m ∈ { 2,3,4,5,6,7} . Ants’ number and algorithm performance are shown in Fig. 2. According to the application conditions and actual requirements of specific problems, reasonable or compromised choices are made in terms of global search ability. The above experimental results show that the range of m = 3 ~ 6 (relative to the scale of this problem is n = 10). So this paper believes that the ant colony algorithm should be chosen as m = n ~ n/2 (where n is the size of the problem). The TSP problem listed above is the research object. The difference between the optimal solutions in the two adjacent loop searches is less than 0.001, and the 0.4 Pheromone residual coefficient ρ=0.5
0.3
0.2
0.1
0.0 0
20
40
60
80
100
120
Number of cycles
Fig. 1 Pheromone residual coefficient and convergence
0
20
40
60
80
Number of cycles
100
120
Vehicle Path Optimization with Time Window … Fig. 2 Ants’ number and algorithm performance
4500
ρ=0.4 ρ=0.6 ρ=0.8 ρ=0.9
4000 3500
Number of cycles
171
3000 2500 2000 1500 1000 500 0 0
2
4
6
8
10
Num of Ants
combination of different values of the heuristic factors α and β. The simulation results of the heuristic factors α and β are shown in Table 1. When α and β are too large, the positive feedback of the information on the local optimal path will be extremely strong, and the algorithm will have premature convergence (stagnation). If it is too small, it will lead to the ant colony falling into pure, endless in a random search, the search performed is generally difficult to find the optimal solution. Appropriate selection of the range of values of α and β, even if the combination of parameters is different (as in the problem of this paper, β is about 1.5, α is 0.5 to 5), the algorithm has fewer cycles (that is, faster convergence), and the performance is very close. Table 1 Reliability test results of questionnaire
Factor α
Factor β
Optimal path length
Number of cycles
0.1
0.1
381.82
199
0.1
0.5
337.11
98
0.5
1.5
325.98
75
1.0
1.5
324.88
8
3.0
1.5
325.69
6
5.0
1.5
324.76
6
10.0
5.0
324.78
5
324.89
4
10.0
10.0378.
172
B. Li and T. Li
2.4 Ant Colony Improvement Algorithm Based on Dynamic Adaptive Adjustment of Pheromone At the same time, because the ant colony algorithm mainly relies on pheromone to solve the optimization problem, if the pheromone is not properly controlled. In view of these two problems, combined with the actual requirements, this paper makes the following improvements to the ant colony algorithm. Ant colony algorithm is based on the natural ants in the process of finding addresses, each ant can leave a path called pheromone material for information transmission. When other ants pass through this path, they can perceive the amount of pheromone and pheromone, and judge the probability of choosing this path according to the amount of pheromone on this path. As the number of ants passing through this path increases, the amount of pheromones in this path increases, and the probability of ants choosing this path increases gradually. ρ(t) =
0.95ρ(t − 1) i f 0.95 ≥ ρmin ρmin else
(7)
Through the monitoring of the algorithm, the search state is judged in real time. If the optimal solution obtained within a period does not change, the search is caught in a certain extreme point (not necessarily the global optimal solution). At this time, the enforcement mechanism is adopted. The small pheromone to be added tries to escape from the local minimum. The amount of information needs to be restrained properly to reduce the optimal path and the worst path.
3 Vehicle Path Problem with Time Window 3.1 VRPTW Model VRPTW is described as: a warehouse has k vehicles, each vehicle has a maximum load of w, and needs to deliver goods for n customers, where the warehouse number is 0, the household number is 1 to n, and each vehicle departs from the warehouse as a customer. Delivery and eventually return to the warehouse. qi (i = 1, 2,…, n) for each customer’s cargo demand. The objective function of VRPTW is expressed as: X i jk =
1 vehicle k from i to j 0 else
min p1K + p2
K n n k=1 i=0 j=0
Ci j xi jk
(8)
(9)
Vehicle Path Optimization with Time Window …
173
In general, there are two targets for VRPTW. Therefore, you need to set the values of p1 and p2 to p1 ≥ p2 in Eq. (2).The constraints of VRPTW are as follows: n K
xi jk = 1 ∀ j ∈ {1, 2, . . . , n}
(10)
xi jk = 1 ∀i ∈ {1, 2, . . . , n}
(11)
k=1 i=0 n K k=1 j=0 K n
n i=0
⎛
k=1 j=1
⎝qi
n
x0 jk = ⎞
K n
xi0k = K
(12)
k=1 i=1
xi jk ⎠ ≤ w ∀k ∈ {1, 2, . . . , K }
(13)
j=0
xi jk ≥ 1, ∀S ⊆ {1, 2, . . . , n}
(14)
i∈S j∈S
where Eqs. (10) and (11) constrain each customer to be serviced by a single vehicle only; (12) is a constraint on the warehouse, i.e., the vehicle that departs from the warehouse and returns to the warehouse is K; (13) the load of the vehicle Constraint; Eq. (14) is the secondary loop elimination condition.
3.2 Ant Colony Algorithm for Solving VRPTW The algorithm block diagram is shown in the Fig. 3.
4 Simulation 4.1 Analysis of Results The three algorithms run 25 times at random, and the optimization results are shown in Fig. 4. The optimal path length obtained by the single point optimized ant colony algorithm. For 1157.415 km, the optimal number of vehicles is seven. In addition, the optimal path length obtained by the multi-point optimization ant-colony algorithm is 1189.409 km, and the optimal number of vehicles is for the seven cars, the average running time of the algorithm is 57.63 s. It can be seen that the single-point optimization ant colony algorithm and the multi-point optimization ant colony algorithm have higher efficiency. It is better than multi-point optimized ant colony algorithm.
174
B. Li and T. Li
Begin
IniƟalize parameters to determine the number of ants m, iteraƟon parameter NC_max(NC=1)
Dynamic adapƟve adjustment parameter
Place m ants on the distribuƟon center for a tour k=1
Get the opƟmal soluƟon and opƟmal path for this iteraƟon
Calculate the transiƟon probability of the kth ant, and determine the next customer j according to the constraint
Update pheromone according to the taboo table
Modify the ant's taboo table tabu
Empty the taboo table Tabu NC=NC+1
k=k+1
NC>NC_max?
k>m?
Output opƟmal soluƟon
end
Fig. 3 ACO with dynamic adaptive adjustment
Fig. 4 ACO algorithm optimization results
5 Conclusion Aiming at the problem of vehicle routing optimization, the upper and lower limits of pheromone trajectory intensity are set to improve the probability of pheromone propagation. The pheromone updating method and local optimization method are used to improve the adaptability of the system. The effectiveness and feasibility of the improved ant colony algorithm are verified by the analysis of the experiment and
Vehicle Path Optimization with Time Window …
175
experimental results and an example. Of course, in the actual distribution process, route determination is affected by many factors. How to find a more suitable model and algorithm considering the influence of many factors needs further study to make it better applied in practice. Acknowledgements This work was supported by Natural Science Foundation of China (No. 61863013), Key R & D projects of Jiangxi science and Technology Department of China (No. 20161BBE50091), Science and Technology Foundation of Jiangxi Educational Committee of China (No. 150529), and East China Jiaotong University School Foundation Fund “Research on Urban Fire Monitoring System Based on IoT Collaboration Perception” (15RJ01).
References 1. Wang Qizhen. 2010. Automatic control system regulation scheme of textile air conditioning. Science and Technology Information 22: 395–396. (in Chinese). 2. Liu Jinkun. 2003. Advanced PID control and MATLAB simulation, 2nd ed. Beijing: Electronics Industry Press (in Chinese). 3. Li Jianwei, and Ren Qingchang. 2008. Study on supply air temperature forecast and changing machine dew point for variable air volume system. Building Energy & Environment 27 (4): 29–32 (in Chinese). 4. Kefayat, M., A.L. Ara, and S.A.N. Niaki. 2015. A hybrid of ant colony optimization and artificial bee colony algorithm for probabilistic optimal placement and sizing of distributed energy resources. Energy Conversion and Management 92: 149–161. 5. Abdulkader, M.M.S., Y. Gajpal, and T.Y. ElMekkawy. 2015. Hybridized ant colony algorithm for the multi compartment vehicle routing problem. Applied Soft Computing 37: 196–203. 6. Mahi, M., Ö.K. Baykan, and H. Kodaz. 2015. A new hybrid method based on particle swarm optimization, ant colony optimization and 3-opt algorithms for traveling salesman problem. Applied Soft Computing 30: 484–490. 7. Liu, M., F. Zhang, Y. Ma, et al. 2016. Evacuation path optimization based on quantum ant colony algorithm. Advanced Engineering Informatics 30 (3): 259–267. 8. Wan, Y., M. Wang, Z. Ye, et al. 2016. A feature selection method based on modified binary coded ant colony optimization algorithm. Applied Soft Computing 49: 248–258. 9. Saghatforoush, A., M. Monjezi, R.S. Faradonbeh, et al. 2016. Combination of neural network and ant colony optimization algorithms for prediction and optimization of flyrock and backbreak induced by blasting. Engineering with Computers 32 (2): 255–266. 10. Lalla-Ruiz, E., C. Expósito-Izquierdo, S. Taheripour, et al. 2016. An improved formulation for the multi-depot open vehicle routing problem. OR Spectrum 38 (1): 175–187. 11. Archetti, C., M. Savelsbergh, and M.G. Speranza. 2016. The vehicle routing problem with occasional drivers. European Journal of Operational Research 254 (2): 472–480. 12. Yao, B., B. Yu, P. Hu, et al. 2016. An improved particle swarm optimization for carton heterogeneous vehicle routing problem with a collection depot. Annals of Operations Research 242 (2): 303–320. 13. Cattaruzza, D., N. Absi, D. Feillet, et al. 2017. Vehicle routing problems for city logistics. EURO Journal on Transportation and Logistics 6 (1): 51–79.
Cultivation of Innovative Talents in Higher Education Based on Big Data Jui-Chan Huang and Kuo-Min Ko
Abstract With the continuous improvement of the informatization level of higher education in China, higher education with the core goal of cultivating innovative talents has become a data-intensive research and practice field, and has begun to show the typical characteristics of big data, such as large amount of data, diverse types and low value density. Starting from the data background, this paper analyzes the necessity and advantages of cultivating innovative talents in higher education with the help of big data, and puts forward four training measures including data analysis, innovative research and development, policy integration and practice expansion. The research results are as follows. Keywords Higher education · Cultivation of talents · Big data environment · Innovation
1 Introduction Big data has become an inevitable trend of the development of information technology in the new era, and it is also a strong support for colleges and universities to deepen the reform of higher education [1]. Although the arrival of big data era has made higher education face many challenges, the boom of big data has provided more opportunities for higher education [2].
J.-C. Huang · K.-M. Ko (B) Yango University, Fuzhou 350015, China e-mail: [email protected] J.-C. Huang e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_23
177
178
J.-C. Huang and K.-M. Ko
2 Raising of the Issue The total size of higher education in China has reached 36.99 million, accounting for 20% of the total size of higher education in the world, and ranking first in the world. The gross enrolment rate of higher education has increased to 42.7% in 2016, and is rapidly moving towards popularization of higher education [3]. The characteristics of big data in higher education will become more obvious. Big data will also become a powerful lever to leverage the cultivation of innovative talents in higher education and effectively promote the connotation development of higher education. On September 24, 2017, the Opinion on Deepening the Reform of the Educational System and Mechanism was issued. How to realize the construction of innovative talent training system under the data environment has become the focus of people’s attention in the new era [4].
3 The Advantages of Cultivating Innovative Talents in Higher Education Under the Background of Data Intelligence. It is better to make full use of big data and cloud computing to create virtual practice platform and experimental training situation; The new Internet technology can be used to establish online learning curriculum system, in order to expand students’ learning methods, broaden their horizons, and improve their independent learning ability; The big data and cloud computing technology can be used to develop personalized talent training programs, monitor training programs and analyze data, so as to strengthen the cultivation of students’ practical application ability. High Efficiency. At present, many teachers and students have cognitive biases in classroom teaching, and many teachers blindly pursue teaching results, while students also blindly pursue learning results. Big data can monitor the whole process of talent training efficiently and conveniently, make comprehensive evaluation of teaching and management and form evaluation report, and analyze and feedback the existing problems pertinently. It is helpful for the school to strengthen the guidance to the teachers’ education and teaching and to guide the students’ self-regulated learning, and to improve the teachers’ teaching level and the students’ learning ability. Integration. “Big Data + Education” is an organic body for the comprehensive application of information technology such as big data, the Internet of things, cloud computing, mobile Internet, and so on. It can effectively integrate resources inside and outside the school and make the management work more standardized, efficient, and convenient [5]. And it can save the management cost and improve the management efficiency to a certain extent, which helps to promote the construction of digital campus and intelligent campus. Synergy. Teaching and management is no longer an independent system. Managers can carry on real-time monitoring and evaluation of teaching, and evaluation
Cultivation of Innovative Talents …
179
results timely feedback to teachers, effective integration of teaching and management of resources, so as to solve the problem of “attaching importance to results and neglecting process” in the process of personnel training. Openness. In terms of the choice of learning methods, students have changed from a single offline learning mode in the past to a diversified learning mode where they can choose both online learning and offline learning. At the same time, students can improve their practical ability and broaden their horizons by creating various learning situations. Teachers can also use the new technology of the Internet to change the traditional teaching mode of one-way knowledge imparting and realize the benign interaction between teachers and students, so as to form a good ecological environment for education [6].
4 Training Paths for Innovative Talents in Higher Education Under the Background of Data Do a Good Job in Learning Analysis and Formulate a Training Plan. The theory and technology of learning analysis, which includes learning measurement, learning data collection and analysis, learning evaluation, prediction and optimization, has become a typical application of big data in the field of education. The first International Conference on Learning Analysis Technology and Knowledge was held in 2011, and the Journal of Learning Analytics was founded in 2014, which marked the professional development stage of learning analysis research and practice, and its great value to higher education teaching is self-evident. Harvard University, Yale university, Stanford university and other world-renowned universities have launched the study analysis research and exploration program, aiming to strengthen the use of big data, and promote students’ personalized learning and innovation ability [7]. Learning analysis enables universities and teachers to provide customized teaching support services and adaptive teaching resources for different learners according to their knowledge base, cognitive style, skill level, interest preference, thinking and ability tendency and future career development expectation, so as to truly realize personalized learning. As a powerful tool of teaching reform in colleges and universities, learning analysis theory and technology is the core content of the development of higher education big data. It is the primary way to deepen the reform of higher education and promote the cultivation of students’ creative ability by exploring the system, mechanism and strategy of the deep integration of learning analysis and teaching in colleges and universities. Do Innovative Research and Development Well to Improve the Practical Effect. The cultivation of innovative talents driven by big data is a technical problem first, and then it is a problem of education. Without the big data technology suitable for higher education and the deep integration of higher education and these technologies, the training of innovative talents driven by big data is destined to be a difficult educational ideal, beautiful but powerless. Obviously, it is the first step to use the
180
J.-C. Huang and K.-M. Ko
leverage of big data in higher education and realize the leap. Although many colleges and universities own strong research and development power of big data technology, compared with the advantages of Internet enterprises in big data technology research, application and promotion, the latter is more practical and closer to the application scene. Therefore, realizing the deep integration of big data higher education with the help of big data technology developed by Internet enterprises, and thus promoting the cultivation of innovative talents in higher education is an important way to break through big data technology. Of course, colleges and universities cooperate with Internet enterprises to explore the innovative talents driven by big data to cultivate new thinking and new models. It is necessary to be vigilant against the improper use of big data in higher education (for example for commercial purposes) by enterprises with obvious profit-driven characteristics as market subjects in order to avoid the ethical and moral problems caused by this. Do a Good Job of Policy Integration and Transformational Upgrading. We will guide big data’s application with policies, promote teachers’ data literacy by applying them, and ensure that big data and higher education will be integrated into the ground in terms of literacy. In the pluralistic interaction of “Policy-ApplicationLiteracy-Fusion” and other factors in higher education big data, we can realize the spiraling increase of teachers’ data literacy, and then bring big data into play in optimizing learning, so as to improve teaching and innovation in the process of talent training to promote the role [8, 9]. Secondly, through the typical application of big data in the higher education scene, providing demonstration guidance for the vast majority of teachers, and encouraging teachers to try in person with big data’s many kinds of real-world applications, observation and experience. This paper explores and practices the various applications of big data in the process of cultivating innovative talents, enhances the teachers’ data consciousness and ability in practice, and effectively improves the teachers’ data literacy. The teacher’s data literacy is not only the extent and the depth of the integration of the big data and the higher education, but also the inevitable requirement of the professional development of the university teachers in the large data era, and can provide powerful support for the teachers to carry out the duties of the moral tree. Do a Good Job in Practice Expansion and Encourage Independent Innovation. The curriculum system construction that highlights the cultivation of innovation ability should be supported by big data technology, oriented by practical application, and pay attention to the cultivation of students’ innovation ability. First of all, establish and improve the online course resource database, and highlight the cultivation of innovation consciousness. The online course resource database should be built according to the professional classification, and the resource types in each course resource database should be rich and diverse, such as teaching, inspiration, experiment, design, discussion and other types of resources [10]. The content of course resources should include introduction of course leader, syllabus, teaching content, reference materials, online homework, online answering questions and so on. Secondly, the online teaching platform of micro-course and Mooc should be established and open to students, and the teaching plan combining face-to-face learning and
Cultivation of Innovative Talents …
181
online learning should be developed to meet the diversified and personalized learning needs of college students. Colleges and universities should cultivate students individually, and meet the needs of students’ independent innovation through online learning. Secondly, in the process of training talents, teachers should change the traditional single teaching method of knowledge teaching, and make full use of big data and his new generation of information technology to establish a platform for sharing learning resources [11]. In order to stimulate students’ subjective initiative and cultivate students’ creative ability, the problems encountered in the process of learning are continuously collected and the teaching contents are designed according to the problem-oriented approach.
5 Summary It is undoubtedly of special and important significance to explore the development path and practice path of big data in higher education to facilitate the cultivation of innovative talents. Therefore, it is necessary to formulate various measures oriented to the application of big data. At the same time, it is necessary to improve teachers’ professional quality, guide the education of innovative talents, and form diversified training paths, so as to comprehensively improve the benefits of innovative talents training and comprehensively promote the development process of innovative talents training in colleges and universities under the background of data.
References 1. Wei, Zhihui. 2008. Thoughts on the reform of IT talent training mode in the era of big data. Journal of Guizhou Radio and Television University 26 (3): 64–67. 2. Wang, Yingjie. 2008. Analysis on innovative approaches of ideological and political education for college students in multi-ethnic regions under the background of big data. Journal of Heilongjiang Institute of Education 37 (8): 100–102. 3. Xu, Yafeng. 2008. Necessity and talent cultivation of big data major in higher vocational colleges. Journal of Mudanjiang University 27 (8): 137–138+141. 4. Qiu, Xiangyu. 2008. Application analysis of big data on college teaching reform and education management. Journal of Hubei Correspondence University 31 (15): 27–28+35. 5. Muo, Xianxian, Daxin Zhu, Mingyu Chen, Yuzhu Zeng, Chen Lie, Shifang Zhuang, Wei Zeng, and Lifang Hong. 2018. Cultivation of “dry” talents majoring in information management and information system in application-oriented colleges and universities. Journal of Quanzhou Normal University 36 (4): 10–14. 6. Shao, Lisheng. 2008. Research on the innovation of university administration based on “big data”. Journal of Hebei Software Vocational and Technical College 20 (3): 35–37. 7. Wei, Jia. 2018. Current situation and countermeasures of talent cultivation in colleges and universities under the background of “Internet +”—A case study of 5 colleges and universities in Jiangsu province. Journal of Jinling University of Science and Technology (Social Science Edition) 32 (2): 85–88. 8. Huang, Zhen. 2008. Influence of big data on college education management and countermeasures. Journal of Heilongjiang Institute of Education 37 (6): 4–6.
182
J.-C. Huang and K.-M. Ko
9. Li, Congcong. 2008. “University-media linkage and all-media application”—Thoughts on talent cultivation of broadcasting and hosting majors in the era of big data. Journal of Jiangxi Electric Power Vocational and Technical College 31 (5): 93–94. 10. Tang, Longsheng, and Xiaolei Zong. 2008. Opportunities and challenges of college employment in the era of big data. Journal of Mudanjiang University 27 (5): 150–152. 11. Wan, Tao, Zhang Wei, and Yang Dan. 2008. Reform practice of big data technology and application direction of information management major under the background of new engineering. Journal of Weinan Normal University 33 (10): 41–47.
Reform of Ideological and Political Teaching in Colleges and Universities Under the Background of Big Data Hongbing Ge and Baozhi Wang
Abstract The arrival of the “Big data” provides new opportunities for the reform of ideological and political education (IaPE) in colleges and universities. This work firstly analyzed the favorable opportunities provided by the “micro-era” environment for the development of IaPE in colleges and universities, then researched on the problems existing in the process of the teaching mode reform of IaPE in colleges and universities, and finally put forward effective reform strategies combined with the problems so as to improve the level of IaPE in colleges and universities and to adapt to the requirements of the development of the “micro-era”. Keywords “Big data” · Colleges and universities · Ideology and politics · Teaching reform
1 Introduction The new media represented by Weibo, WeChat and Mobile APP has been widely used in educational circles. Micro video, micro speaking and micro film can be widely transmitted through mobile terminal devices such as smartphones, and other microbehaviors have also become part of people’s living and work [1]. Contemporary college students who are active and willing to try new things. The formation and development of their ideals, beliefs and values are full of unpredictability [2, 3]. The IaPE work carries out the important mission of spreading Marxism and the core socialist values. Therefore, it is of great theoretical significance to probe into the work of the IaPE based on the micro-era.
H. Ge (B) · B. Wang Hunan Judicial Police Vocational College, Changsha 410131, Hunan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_24
183
184
H. Ge and B. Wang
2 The “Micro-Era” Environment Provides a Favorable Opportunity for the Development of IaPE 2.1 It Adapts to the Characteristics of the Times and the Development Direction of Modern IaPE There is no doubt that the IaPE is inseparable from the specific background of the times, which is the inherent requirement of the development of the IaPE law. Only combining with the specific background of the times, the development of IaPE can be possible and realistic [4]. The IaPE should press close to the times and practice, pay special attention to all kinds of new elements under the background of the “microera”, which have a very important influence on every link of the IaPE in colleges and universities. For example, college students can use Weibo and WeChat public platform to exchange information express their views on issues. Teaching stuff of IaPE can take advantage of the strong interactive characteristics of Weibo and WeChat to understand students’ personality and ideas, solve their doubts in their study and life timely, communicate with them and give them guidance, such as transmitting the education contents through voice, text and pictures to them.
2.2 It Helps Expand and Innovate the New Teaching Mode of Ideological and Political Course Firstly, the “micro-era” has expanded a new way of ideological and political teaching in colleges and universities. Weibo and WeChat make students open their hearts in the process of hidden education, which changes the way of infused and passive education, reverses the unequal educational relationship, enables students and ideological and political educators to communicate equally and greatly demonstrates the subjectivity of the students. In addition, the “micro-era” enriches the new contents of ideological and political teaching in colleges and universities. According to the need of teaching purpose, ideological and political teachers can spread rich contents to students through micro-media platform based on the characteristics of rapid dissemination of micro-media information, so that students can know the new events that have taken place throughout the country and even around the world in time. The contents of IaPE are closer to the students’ life and reality, therefore, they are more easily accepted by the students [5]. Finally, the “micro-era” has added new means of political and ideological teaching in colleges and universities. College students can interact in micro-media and participate in the whole ideological and political curriculum. It can be seen that the micro-media has constructed a new platform for college students to provide resources, express their views, communicate ideas, and have public discussion.
Reform of Ideological and Political …
185
3 Problems Existing in the Teaching Mode Reform of IaPE Under “Micro-Era” 3.1 Lack of Professional Teachers At present, most teachers do not have the consciousness of reform, let alone the teaching mode reform. What is more, most teachers think that the teaching content of ideological and political course is mostly fixed, and the reform of teaching mode has no effect on the quality and effect of ideological and political teaching at all, therefore, it is not necessary to carry on the the teaching mode reform of IaPE in colleges and universities. The professional quality of many ideological and political teachers is difficult to meet the requirements of the concept of “micro-era”, and cannot adapt to the reform of ideological and political teaching mode at all, therefore, it is impossible to promote the reform of IaPE.
3.2 Insufficient Emphasis on the Teaching Mode Reform For the teaching mode reform of IaPE under the background of “micro-era”, colleges and universities still lack enough attention [6]. First of all, college leaders believe that the reform process will cost a large amount of money, however, the ideological and political curriculum is not the dominant major, thus it is better to spend the money and energy on the advantageous subjects. In addition, teachers consider that the teaching mode reform has no great relationship with their promotion and development. If they carried on the reform of ideological and political teaching mode, they would need to spend great energy to study. However, it doesn’t have any substantial benefits, thus teachers will not pay attention to and support the reform actively. Finally, students will not pay much attention to the teaching mode reform of ideological and political courses since they have adapted to the infused teaching mode in the classroom [7]. If the teaching mode reformed in the future, they would need to adapt from the start, which has resulted in the present situation that students do not pay attention to the teaching mode reform of ideological and political course.
3.3 Imperfect Reform System Colleges and universities do not provide the teaching model for the teaching mode reform of the ideological and political course, which makes it impossible for some teachers to carry out the reform of the teaching mode. The reform of ideological and political curriculum has no relevant teaching mode reform system, and the ideological and political teachers can not achieve a unified opinion on the issue of reform, resulting in confusion in the direction and content of the reform [8]. Therefore, it is
186
H. Ge and B. Wang
not conducive to unifying standards and it is difficult to evaluate the reform results of teachers based on the assessment. The reform system of the teaching mode of IaPE is not perfect, which will not only affect the curriculum development at the beginning of the reform, but also lead to the interruption of the curriculum reform process. Teachers cannot persist in the teaching mode reform of the ideological and political course for a long time, which is not conducive to improving the teaching effect of the ideological and political curriculum.
4 Strategies for the Teaching Mode Reform of Ideological and Political Course Under the Background of “Micro-Era” 4.1 To Introduce Professional Teachers of Ideological and Political Course In order to promote the teaching mode reform of IaPE in colleges and universities, professional teachers of IaPE are supposed to be introduced. First of all, when recruiting teachers, colleges and universities should not only examine teachers’ professional ideological and political knowledge systems, but also test their ability of using information dissemination and communication tools of the “micro-era”, since only teachers who are familiar with and often use information exchange tools can give full play to it in the process of teaching reform of ideological and political classroom. Otherwise, it is difficult for teachers even with abundant basic knowledge to meet the requirements of the teaching mode reform. In addition, colleges and universities should not loosen to test them after introducing these ideological and political teachers, since they are two separate things that teachers are familiar with these communication tools and they use them in class [9]. It requires colleges and universities to inspect and monitor new teachers to ensure that they can effectively use these tools for ideological and political classroom teaching. Finally, when introducing teachers, colleges and universities should give priority to those who have rich experience of teaching reform. These teachers tend to have a keen sense of reform and have strong execution since they often assist colleges and universities to carry out teaching reform.
4.2 To Strengthen the Emphasis on the Teaching Mode Reform of Ideological and Political Course For the teaching mode reform of the IaPE under the background of “micro-era”, colleges and universities must pay enough attention to it, so that they can better
Reform of Ideological and Political …
187
promote the development of the follow-up work. First of all, colleges and universities are supposed to convey the reform in the form of notice and stress the importance of this teaching model reform of ideological and political course under the background of “micro-era” through the convening of various meetings, which can reflect the emphasis on this ideological and political curriculum reform. In addition, teachers should conscientiously implement the teaching mode reform goal of ideological and political course and regard this goal as an important standard for their future teaching, so that they can change their teaching way in days and months, realize the requirements of the teaching mode reform of the ideological and political course under the background of “micro-era”, and promote the teaching mode reform [10]. Finally, students must attach importance to the teaching mode reform of the IaPE in colleges and universities, and actively cooperate with teachers, so as to promote the integration of the teaching mode with the characteristics of the development of the “micro-era”.
4.3 To Improve the Reform System of the Ideological and Political Teaching Mode Under the Background of “Micro-Era” In order to better reform the teaching mode of IaPE in colleges and universities, the reform system of the teaching mode of IaPE under the background of “microera” must be improved. Colleges and universities should set up a special curriculum research committee and construct this curriculum system from a new aspect. First of all, the person in charge of the curriculum system must combine the characteristics of the development of the times and use the classroom teaching mode based on the characteristics of the “micro-era” when compiling the curriculum system [11]. In addition, when carrying on the system reform, colleges and universities must make detailed stipulation to the teaching content and the teaching mode of each chapter. For example, teachers should be encouraged to use video, audio, graphics film and other materials and make them into Word documents, PPT files, cartoon animation and “micro-class” video. The effect of ideological and political classroom teaching will certainly be improved through such reform and development, therefore, colleges and universities can be better integrated into the development of “micro-era”.
5 Summary As a new teaching mode, “micro-course” teaching is a powerful measure to improve the pertinence and effectiveness of ideological and political theory teaching in colleges and universities. Researching on the teaching mode reform of ideological and
188
H. Ge and B. Wang
political course under the background of “micro-era” is important for the IaPE curriculum and the whole teaching system. The process of preparing “micro-course” is also the process of micro-research. However, it is found that there still exists a series of problems in the teaching mode reform of IaPE under the background of “microera”, which will seriously affect the development and construction of the teaching mode of IaPE in colleges and universities. Therefore, it is hoped that a series of reasonable solutions given in this work will promote the teaching mode reform of the IaPE.
References 1. Ma, Jianqing, and Bianmei Shi. 2018. Research on the influence of IaPE on the development of mental health education in colleges and universities in the past 30 years. Ideological and Theoretical Education (1): 97–102. 2. Liu, Chuansheng. 2018. Improving the affinity and pertinence of ideological and political theory course in colleges and universities guided by Xi Jinping’s thought on socialism with Chinese characteristics in the new era. China Higher Education Research (02): 1–6. 3. Gu, Hialiang. 2018. Theoretical guidance and development concept of ideological and political education in colleges and universities in the new era—Learning Xi Jinping’s thought on socialism with Chinese characteristics in the new era. Leading Journal of Ideological and Theoretical Education (1): 4–10. 4. Ji, Feng, and Yijiang Chai. 2018. Research on the innovation of college students’ ideological and political education in the micro-era. Journal of Jiangsu Institute of Commerce (5): 71–73. 5. Feng, Gang, and Liming Cheng. 2018. Practice and theoretical development of ideological and political work in colleges and universities since economic reform and open Up. Ideological and Theoretical Education 10: 13–20. 6. Yang, Xiaohui. 2017. Strengthening the top-level design of the ideological and political work of party committee in colleges and universities. Ideological and Theoretical Education (3): 10–14+68. 7. Wang, Zhanren. 2017. How to educate students in all ways and directions of ideological and political education in colleges and universities. Educational Research 38 (8): 25–31. 8. Xue, Hai, and Ying Han. 2017. The construction of “six micro” mode of ideological and political education for college students under the background of “micro-era”. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition) 38 (6): 123–127. 9. Li, Li. 2016. Research on the reform of ideological and political education in colleges and universities under the background of “micro-era”. Journal of Jiamusi Vocational Institute (7): 139–140. 10. Ruan, Bo. The innovation of ideological and political teaching in colleges and universities under the background of “micro-era”. Chinese Social Sciences Today, 12 May 2016 (001). 11. Ji, Haiju. 2015. Research on the challenges and opportunities of ideological and political education in colleges and universities in the new media era. Social Sciences in Nanjing (05): 151–157.
Influence Factors of Consumer Satisfaction Based on SEM Huali Cai, Yawei Jiang and Jingshu Zhang
Abstract Structural equation modeling, SEM, can be used to calculate the influence factors of the consumer satisfaction. Based on the SEM, the authors use questionnaire survey method to look for the main influence factors of consumer when purchasing the household appliances. The structural equation model is used to evaluate the consumer satisfaction. From the result, we can see consumers are most concerned about the brand image and least concerned about the perceived value. Besides the quality, the production companies should strengthen the cultivation of brands. Production companies put more focus on the R&D process and can raise prices appropriately when pricing. Keywords Consumer satisfaction · Household appliances · Brand image
1 Introduction China’s household appliance industry is developing rapidly and has strong competitiveness in the international arena. In recent years, China’s household appliance industry has grown into a number of well-known brand companies, such as Gree, Midea, Haier, Robam, Fotile, etc., with very high reputation at home and abroad. However, what are most concerned for Chinese consumers when they buy home appliances, and which are important factors affecting customer satisfaction, which has become the focus of this paper. Among the past researches, different authors use the different methods or a specific field. Sina carried out a comparison between lifestyle and product-centric displays to enhance consumer satisfaction [1]. Through comparing the functional and emotional brand relationships, Teresa studied the consumer brand engagement, satisfaction and brand loyalty [2]. Sigismond analyzed the determinants of the use of several telecommunication networks on the satisfaction of subscribers in Cameroon [3]. Michael Lynn studied the effects of tipping on consumers’ satisfaction with restaurants [4]. Dennis C carried out the study of how delight and satisfaction affect (in a nonlinear way) consumer loyalty [5]. Sangkon H. Cai (B) · Y. Jiang · J. Zhang China National Institute of Standardization, Beijing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_25
189
190
H. Cai et al.
Park applied theories of behavioral economics to evaluate various aspects related to tour satisfaction and general impression of the city [6]. Ahmet Ekici studied the influence of shopping Well-Being and shopping Ill-Being on consumer’s satisfaction [7]. Ting Chi gave a innovative research model about the self-regulatory process theory [8]. Appalayya Meesala found the most critical factors in hospitals related to service quality that relating to survival and success in the future [9]. Yunjin put forward the process of consumer satisfaction formation of e-commerce based on the EDT and TAM [10].
2 Evaluation Model The authors use the structural equation model (SEM) to evaluate the consumer satisfaction. The example of the evaluation model is shown in Fig. 1. Where, the circles in the model means the latent variables. The arrows in the model means the causal relationship among the different latent variables, the larger of the influence, the bigger of value displayed on the arrows. The rectangles means the observable variables. The mathematical form for structural equation can be expressed as follows: η = Bη + Γ ξ + ζ In the upforward formula, the η is the endogenous latent variable. The ξ is exogenous latent variable. The B indicates the influence relationship among the different y41
y2n
y42
...
y4n
…
y51
y52
...
yn1
yn2
...
y22
y5n
y21
…
…...
y1n
y12 y11
x1
x2
...
xm
y31
y32
Fig. 1 Example of structural equation model
...
y3n
ynn
Influence Factors of Consumer Satisfaction Based on SEM
191
endogenous latent variables. The Γ indicates the impact of exogenous latent variable on endogenous latent variable. The ζ indicates residual of structural equation. The mathematical form measuring the equation can be expressed as follows: X = Λx ξ + δ Y = Λy η + ε In the formula, the X indicates the vector formed through exogenous indexes. The Y indicates the vector formed through endogenous indexes. The Λx indicates the different relationship between exogenous and endogenous indexes. The Λ y indicates the different relationship between endogenous index and the endogenous latent variable. The influence coefficient can be computed by the model, which can be taken as the influence level. Specifically, as for appliance industry, the SEM is shown in Fig. 2. Where, brand image means customers’ evaluation on the image of the household appliance company and on the conspicuousness of brand characters. The expected quality includes evaluation of customers on the overall expected quality, expected customized quality, expected product reliability and expected service quality on the household appliance brand. The perceived quality includes the evaluation on the overall perceived quality and several quality indexes in relation to quality of the household appliance company. The perceived value includes the evaluation of customers on the service price of the enterprise under given quality. The customer satisfaction includes customers’ overall satisfaction on brand service, satisfaction compared with the expected, satisfaction compared to other brands and to ideal services. The
Brand image Expected quality Customer saƟsfacƟon Perceived quality Perceive d value
Fig. 2 The structural equation model
Customer loyalty
192
H. Cai et al.
and customer loyalty includes customers’ possible willingness to repurchase brand services and to recommend.
3 Evaluation Result We made a survey for 10 household appliance industries. They are range hood, refrigerator, TV, air conditioner, washing machine, electric water heater, air purifier, gas water heater, gas stove and disinfection cabinet. This survey is made by combination of computer aided phone interview system and online survey in the 250 major cities of China. Around 250 valid questionnaires are distributed to each enterprise. The respondents are individual consumers aged 18 to 70 who have used the brands surveyed in the previous one year. The amount questionnaires are about 20000. The result of calculation is shown in Table 1. From the table, we can see all consumers care more on brand image and perceived quality than other factors. In the field of range hood, refrigerator, TV, air conditioner, washing machine, electric water heater, gas stove and disinfection cabinet, the consumers are most concerned about brand image. However, in the field of air purifier, gas water heater and disinfection cabinet, the consumers are most concerned about the perceived quality. What’s more, the consumers are least concerned about perceived value factors. Table 1 The influence coefficient of consumer satisfaction in household appliances NO.
Industry
Brand image
Expected quality
Perceived quality
Perceived value
1
Range hood
0.66
0.40
0.52
0.21
2
Refrigerator
0.58
0.41
0.52
0.18
3
TV
0.63
0.40
0.53
0.15
4
Air conditioner
0.59
0.47
0.50
0.22
5
Washing machine
0.64
0.46
0.45
0.21
6
Electric water heater
0.58
0.46
0.52
0.19
7
Air purifier
0.57
0.43
0.63
0.17
8
Gas water heater
0.53
0.46
0.60
0.20
9
Gas stove
0.58
0.55
0.57
0.19
10
Disinfection cabinet
0.55
0.55
0.65
0.12
0.59
0.46
0.55
0.18
Average
Influence Factors of Consumer Satisfaction Based on SEM
193
4 Conclusion The authors use the SEM to evaluate the consumer satisfaction and find the main influence factors. From the result, we can see consumers are most concerned about the brand image and are least concerned about the perceived value. Besides the quality, the production companies should strengthen the cultivation of brands. Production companies put more focus on the R&D process and can raise prices appropriately when pricing. Acknowledgements This work is supported by the National Key Research and Development Program of China under Grants No. 2017YFF0206504.
References 1. Sina, Kim. 2019. Enhancing consumer satisfaction and retail patronage through brand experience, cognitive pleasure, and shopping enjoyment: A comparison between lifestyle and product-centric displays. Journal of Global Fashion Marketing: 129–144. 2. Teresa, Fernandes, etc. 2019. Consumer brand engagement, satisfaction and brand loyalty: A comparative study between functional and emotional brand relationships. Journal of Product & Brand Management: 274–286. 3. Sigismond, Hervey Mvele, etc. 2019. Multiple subscriptions to mobile networks and consumer satisfaction. Journal of Retailing and Consumer Services: 375–381. 4. Michael, Lynn. 2018. The effects of tipping on consumers’ satisfaction with restaurants. Journal of Consumer Affairs: 746–755. 5. Dennis, C, etc. 2019. Ringle. Enhancing loyalty: When improving consumer satisfaction and delight matters. Journal of Business Research: 18–27. 6. Sangkon, Park, etc. 2018. Two factor model of consumer satisfaction: International tourism research. Tourism Management: 82–88. 7. Ahmet, Ekici, etc. Michael Bosnjak. 2018. The effects of shopping well-being and shopping Ill-being on consumer life satisfaction. Applied Research in Quality of Life 13 (2): 333–353. 8. Ting, Chi. 2018. Mobile commerce website success: Antecedents of consumer satisfaction and purchase intention. Journal of Internet Commerce: 189–215. 9. Appalayya, Meesala, etc. 2018. Service quality, consumer satisfaction and loyalty in hospitals: Thinking for the future. Journal of Retailing and Consumer Services: 261–269. 10. Yunjin, Cho. 2017. A consumer satisfaction model based on the integration of EDT and TAM. Asia Pacific Journal of Marketing and Logistics: 978–993.
Overview of Underground Space Utilization and Standardization Suggestions Qing Xu
Abstract Exploitation of underground space is an effective way to alleviate many urban problems and is convenient to people’s life. It has a very important and farreaching significance. This paper combs the classification and value of underground space in China. The existing practice of underground space utilization at home and abroad is analyzed and studied. On this basis, standardization suggestions on underground space utilization are given with a view to enhancing the support level of standardization for underground space utilization. Keywords Underground space · Standardization · Standard
1 Introduction Underground space is a space developed and utilized below the surface to meet the needs of production and living, according to terms and definitions 3.1 of national standards GB/T 35636-2017 [1]. Underground space is considered to be the last frontier left for human beings. It is recognized as non-renewable natural resource. Therefore, its development has been highly valued worldwide. Many countries even take it as a policy at the national level. Qian Qihu is committed to building an indestructible “underground steel Great Wall” for China, who is a Chinese expert in protective engineering, the first academician of the Chinese Academy of Engineering and a professor of Army Engineering University of PLA, also the winner of the 2018 National Highest Science and Technology Awards.
Q. Xu (B) China National Institute of Standardization, No. 4 Zhichun Road, Haidian District, Beijing 100191, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_26
195
196
Q. Xu
2 The Classification of Underground Space It may be divided into the following categories, according to functions of underground space [2]: • Underground traffic facilities: underground railway, underground highway, underground static traffic facilities (underground garage), etc. • Underground public space: underground commercial street, underground shopping mall, underground hospital, underground entertainment facilities, underground complex, etc. • Underground municipal public facilities: underground water supply facilities, underground energy supply facilities, underground communication facilities, underground sanitation facilities, underground facilities, etc. • Underground energy and material reserves: underground food and fresh water storage, underground storage, underground oil and natural gas storage, etc. • Underground military facilities: underground civil air-defense facilities, underground military warehouses, underground battle fortifications, underground missile silos, etc. • Underground industrial facilities: underground plant, underground workshop, underground hydropower station, underground nuclear power plant, underground waste incineration plant, etc. Types of underground space can also be divided by different formation causes: • Natural underground space. Underground space associated with geological processes such as dissolution, volcanic, wind and sea erosion, including the karst caves, lava caves and wind erosion caves, etc. • Artificial underground space. There are two types. One is underground traffic space, construction space, storage space, and other underground space; the other is waste and old mine space formed by mining coal, oil and other underground minerals. In addition, according to the depth it can be divided into the following categories: • Shallow underground space: Underground space within the depth range of 10 m. • Middle underground space: Underground space developed and utilized in depth of 10–50 m. • Deep underground space: Underground space below 50 m.
3 The Value of Underground Space Exploitation The use of underground space is gradually rising and developing with city growth and the solution of urban problems. With the progress of economy and society, the process of urbanization is accelerating, and the resulting problems such as pollution,
Overview of Underground Space …
197
land scarcity, and urban waterlogging are increasingly prominent. The exploitation of underground space is the way to improve the quality of environment and residents living [3]. The value of urban underground space exploitation is mainly reflected in: • Realizing three-dimensional expansion of urban space, improve main land use efficiency, and save land resources. • Protecting and improving urban ecology. • Establishing a sound urban underground disaster prevention, space system to ensure the safety of cities in the event of natural and man-made disasters. • Realizing the intensive and sustainable city development mode, and ultimately is convenient to people’s life. The value of underground space utilization outside cities is mainly reflected in: • Building tunnels across the river to ensure that China’s major transportation remain unblocked in wartime. • Constructing underground traffic tunnels to greatly increase train speed and ensure necessary transportation during wartime. • Building a national strategic material reserve system in the mountains, storing a large amount of energy and other materials, not only to withstand the usual disasters and threats, but also to support wartime needs. • Storing various military equipment and weapons to support China’s national defense construction.
4 Domestic Underground Space Utilization Practice There are 3 stages of underground space: the initial stage, scale stage and network stage. The next step is to enter the ecological stage which has deeper development and efficient integration of various underground facilities. Here are cases of Zhejiang province and Xiongan New Area introducing the exploitation of underground space.
4.1 The Case of Zhejiang Province 4.1.1
It Has Formulated Relevant Policies and Regulations
People’s Government of Zhejiang Province issued Several Opinions in 2011. The opinions emphasize that urban underground space is an important part of urban progress. It is necessary to fully understand the importance and urgency of urban underground space, and to clarify the guiding ideology, basic principles, main tasks and safeguard measures of that. In 2012, Zhejiang issued the Guidelines for Designing Cut-and-Cover Underground Space Development and Utilization Project Combining
198
Q. Xu
with Civil Defense Demand (Trial), promoting the underground space to meet the needs of Civil Air Defense. In 2013, Zhejiang issued the Interim Measures for the Registration of the Underground Buildings in Zhejiang Province, which provides an important basis for the registration of underground buildings. Also in 2013, the Zhejiang Department issued the Zhejiang province the urban construction engineering parking lot (warehouse) setting rules and construction standards. For example, Lishui has formulated policies, and Hangzhou, Wenzhou, Jinhua and other cities have stipulated ownership, land management and land registration of underground space. The 13th Five-Year Plan of Urban Underground Space Development and Utilization of Zhejiang Province was issued. It clarifies the overall requirements, the main tasks and implementation safeguard measures in Zhejiang province. The above exploration has strongly promoted the improvement of policies of Zhejiang province.
4.1.2
It Has Carried Out Diversified Planning Practice
Zhejiang Department of Housing and Urban-Rural Development issued the Guidelines for the Compilation of Specifications for the Development and Utilization of Urban Underground Space in Zhejiang Province (Trial, 2010), which is the first guideline at the provincial level. It stipulates the planning period, planning scope, main tasks, contents and achievements in the stages of general planning, specialized planning and detailed planning. In addition, Hangzhou has formulated specialized planning at the divisional level, and Ningbo has carried out the evaluation planning and research on subway line planning. Furthermore, Hangzhou, Ningbo and other cities, combined with the construction of new cities and urban rail transit, carried detailed planning, and made beneficial attempts above overall layout, underground space overall development, index setting, interconnection and other aspects. The compilation of multi-type underground space planning provides important guidance for promoting rational development.
4.1.3
It Has Carried on Fruitful Underground Space Development Construction Practice
The underground space realizes large-scale exploitation. Seen from scale of underground space exploitation, Hangzhou and Ningbo the highest total amount, more than 10 million square meters. Underground space realizes the functional diversification layout. Hangzhou and Ningbo explored the integrated construction of underground business, parking, municipal and public facilities combined with the urban rail transit construction, and built the underground comprehensive pipe gallery combined with the new city development. Combined with the construction of commercial office buildings and the headquarters industrial park, Jiaxing explored the interconnection
Overview of Underground Space …
199
and the overall development and construction of different main plots. Jinhua has built underground storage and logistics facilities in combination with the logistics base. The diversification functions alleviates effectively and promotes the improvement of urban functions. The underground space introduce private capital. Cities have given full play to private capital, and guided private capital to build underground space with multiple functions, such as parking lots, commercial facilities, etc., which has strongly promoted the construction of various underground facilities.
4.1.4
It Has Actively Explored the Construction of the Underground Space Management System
Set up the comprehensive organization. Zhejiang has set up a leading group at a provincial level, which is responsible for coordinating whole province, and holding regular on-site meetings to promote the practice and experience. Hangzhou, Jinhua, Taizhou and Lishui have set up leading groups, actively exploring the comprehensive coordination mechanism. Gradually carried out the underground space information system. The underground pipeline information survey has been carried out in various cities of Zhejiang province, which promotes the construction of the underground pipeline information management system. Shaoxing, has initially established the underground pipeline information management system. In addition, some cities, such as Hangzhou, Ningbo, Wenzhou, Jinhua, Quzhou and Yiwu, have formulated relevant regulations on the management of underground pipelines, clarified the requirements on the survey, registration and use of underground pipeline information, and standardized the management of underground pipeline information.
4.2 The Case of Xiongan New Area On January 24, 2019, The Guidance of the CPC Central Committee and the State Council on supporting the comprehensive deepening of reform and opening up of Hebei Xiongan New Area was released [4]. It puts forward nine key tasks, among which the second task, “improving the urban governance system and building a modern smart city”, puts forward “promoting the overall development and utilization of underground space and improving relevant systems of planning, land, construction, property rights, use and management”. The text is as follows:
200
Q. Xu
…… Improve the urban governance system and build a modern smart city. Adhere to the ideas of people centered approach, in accordance with the requirements of strengthening services, source governance, consistency of power and responsibility, coordination and innovation, thinking, means and models of intelligent governance are carried out throughout the Xiongan New Area. It will make innovations in urban planning and design, promote the establishment of a housing supply system, improve the scientific and refined level of urban management, and build a modern socialist city of high quality and level. 7. Establish a scientific and efficient urban planning and design mechanism. Highlight the basic and key role of experts in the planning and compilation of Xiongan new area, let professional people do professional work, explore the work procedures of expert selection, program comparison, review and decisionmaking, and form a planning mechanism for expert leadership, government organization, multi-participation, and scientific decision-making. It will establish a mechanism for overall planning and coordination. The detailed regulatory plan, site plan and the related specialized plan shall conform to the overall land space planning. It will promote the overall development and utilization of underground space and improve relevant systems for planning, land, construction, property rights, use and management. It will establish and improve urban planning, design and the construction management standard system of Xiongan New Area, promote the standardization of infrastructure, urban architecture and other fields, and provide a model for modern urban planning and construction management. …… Chen gang, the secretary of Xiongan New Area pointed out to build two cities, one is above the ground, another is underground. It is necessary to adhere to plan for both, and build first underground and then above ground. It will scientifically plan and design the underground space combined with urban functional requirements according to the principles of safety, efficiency and moderation. Therefore, Xiongan New Area will make scientific and effective use and experience of underground space. Meanwhile, it is important to build a city safety emergency, disaster prevention system and uphold the safety cornerstone of long-term development. The flood control standard for the starting area is once every 200 years, for the five peripheral groups is once every 100 years, and for other characteristic small towns is once every 50 years in principle. The seismic precautionary intensity of Xiongan New Area is 8-degree, the basic seismic intensity of schools, hospitals, lifeline systems and other essential facilities is 8.5-degree. Only fortification and construction with high standards and high quality can ensure safety all the time.
Overview of Underground Space …
201
5 The Overview Abroad In 1991, it is formally proposed “the 21st century is the century of underground space development and utilization” at Tokyo International Forum [5]. Some foreign cities has been more than 100 years old on underground space exploitation. Among them, in 1832, Paris pioneered the water supply, gas and communication pipelines in the drainage-based corridor, forming the rudiment of the utility tunnel [6]. In 1863, the London Underground was opened, officially opening up the development. After years ofexploitation of urban underground space in Britain, France, Russia, Japan and Hong Kong have reached a considerable scale, basically representing the highest level in the world today [7]. In 1863, the world’s first underground rapid rail transit line (subway) was officially opened in London, marking the first development of urban underground space. It has been more than 150 years since then. Years of accumulation have enabled foreign countries to have sound laws and regulations, advanced design concepts, mature construction techniques and scientific management experience. All countries in the world are actively developing and utilizing underground space now. All major cities have built mature rail transit networks, underground roads, integrated commercial streets and integrated pipe corridors. However, the development of various countries has its own characteristics [8]. North America, United States places great emphasis on the underground roads, which not only improves traffic conditions, but also frees up floor space to green the urban environment and develop moderately to increase the commercial value of the land [9]. One example is the project of Central Ave, Boston, which changed the elevated highways into tunnels. Due to the cold climate, Canada has focused on building underground pedestrian passages and connecting subways, buses, and commercial areas into a large underground network. For example, the Montreal Underground City has a development area of more than 4 million square meters, making it the longest underground pedestrian street system in the world [9]. In Europe, the development of underground space in France focuses on integration, such as the famous La Défense business district, the Les Halles Square complex, etc. At the same time, the drainage system of the capital Paris has a large scale, reasonable design and orderly construction. It has always been a model for many countries in the world. The Swedish cities have good geological conditions, and the large underground drainage system has reached the world’s leading level in terms of quantity and disposal rate. The Russian metro and underground integrated pipe gallery system is developed. For example, the Moscow metro has a total length of 212 km and a total of 249 stations. Japan has benefited from a sound and complete legal system, so its construction scale and maturity railway, complex and underground utility tunnel are internationally leading, especially in large depth underground space [10].
202
Q. Xu
6 Laws, Regulations and Standards Related to Domestic and Foreign Underground Space 6.1 Laws and Regulations Laws and regulations related to underground space in China are as follows: • The Civil Air Defense Law of the PRC(1997): It is the first special law on the underground space with Chinese characteristics. • Regulations on Development and Utilization of Urban Underground Space(1997, 2011): It puts forward for the first time the requirement of urban underground space planning, clarifies the main content of underground space planning. • Compiling Method of Urban Planning(2006): It provides a legal basis for special plans for urban underground space. • Property Law of the PRC(2007): It has achieved a major breakthrough in the ownership of urban underground space development and utilization. • Bidding, Auction and Listing of State-Owned Construction Land Use Rights Regulations(2007): This provision provides a legal basis for bidding, auction, listing and transfer of underground state-owned construction land use rights. • Notice of the State Council on Promoting Economical and Intensive Use of Land (2008): It encourages the development and utilization of above-ground and underground spaces to improve land use efficiency. • Urban and Rural Planning Law of the RPC (2008): It clarifies the principles of underground spaceexploitation at the legal level.
6.2 Standards Current national standards related to underground space in China are as follows: • GB/T 35636-2017 Urban Underground Space Mapping Specification. • GB/T 28590-2012 Classification and Code of Urban Underground Space Facilities. The current industry standards related to underground space in China are as follows: • JGJ/T 335-2014 Basic Terminology Standard for Urban Underground Space Utilization. • MT/T 992-2006 Technical Conditions for Uncabled Communication Equipment for Rock Used in Underground Space.The current local standards related to underground space in China are as follows: • DB31/T 948-2015 Basic Requirements for Safe Use of Underground Space (Shanghai). • DG/TJ 08—2156—2014 Underground Space Planning Specification (Shanghai).
Overview of Underground Space …
203
The current association standards related to underground space in China are as follows: • T/CECS 481—2017 Urban underground commercial space design guidelines. • CECS 402—2015 Urban underground space operation management standard. • CECS 401—2015 Urban underground space development and construction management standards. Foreign standards related to underground space is ANSI/NFPA 520-2010 Standard on Subterranean Spaces.
7 Recommendations for Standardization of Underground Space Exploitation Firstly, establish an underground space standard system. Although China’s underground space development and utilization scale is the largest, with leading surveying methods and construction techniques, the rapid progress has also exposed many problems, which seriously restricts the effective development and utilization of China’s underground space and wastes a lot of resources. It is necessary to make clear and perfect specific provisions on ownership, planning, construction, management, operation. However, China’s current underground space management laws and regulations and policy support are insufficient, and the higher-level law of urban underground space resources is missing. The single file law such as Urban and Rural Planning Law of the PRC, The Civil Air Defense Law of the PRC, Mineral Resources Law of the RPC, Construction Laws of the RPC and Protection of Military Installations Law of the RPC are uncoordinated and do not link, and there is no specific law on the development and utilization of underground space. Secondly, establish a comprehensive coordination mechanism management. The development involves various departments, such as National Development and Reform Commission, Ministry of Housing and Urban-Rural Development of the RPC, Ministry of Natural Resources of the RPC, the Office of Civil Air Defence of the RPC, etc. An integrated coordination mechanism for underground space management should be established, and a special management organization for urban underground space development should be established to form an effective mechanism for underground space development in administrative legislation, overall planning, project approval, design review, project management, safety supervision and technological innovation. Establish a collaborative system of management departments, clarify functions and responsibilities, improve the internal coordination capacity of the government, and form an underground space resource the management pattern of “convergence, combination, connectivity, and convenience”. Thirdly, Promote the formulation and release of essential standards in key technical areas. Analyze the problems faced in the current development of underground space, sort out current needs in standardization, promote the formulation and release
204
Q. Xu
of essential standards in key technical areas of underground space, solve the urgent needs improve the level of industry development. Last, Grasp the future trend of underground space and strengthening the frontier design. In order to adapt to this trend, we should strengthen the frontier design of underground space, comprehensive management, overall planning, innovative investment and financing and income models, innovative theoretical systems and key technologies for underground space development. Acknowledgements This research was financially supported by Standardization Administration of the People’s Republic of China project (Project Number: 572018B-6575).
References 1. GB/T 35636-2017. 2. Ye, Fei, Yongxu Xia, and Bangshu Xu. An introduction of the utilization of underground space, 18–19. Beijing: China Communications Press. 3. Zhu, Hehua, Xiao Luo, Fangle Peng, et al. 2017. Development strategy on urban underground space planning in China. Engineering Science 19 (6): 12. 4. http://www.gov.cn/zhengce/2019-01/24/content_5360927.htm (2019.4.30). 5. Qian, Qihu. 1998. Urban sustainable development and development and utilization of underground space. Chinese Journal of Underground Space and Engineering 18 (2): 69. 6. Qian, Qihu, and Xiaoqiang Chen. 2007. Situation problems and countermeasures of utility tunnel development at home and abroad. Chinese Journal of Underground Space and Engineering 3 (2): 191. 7. You, Xinhua, Guangyao He, Qiangxun Wang, and Lei Zhang. 2019. Current status and development trend of urban underground space in China. Tunnel Construction 39 (2): 173–188. 8. Tajima, K. 2003. New estimates of the demand for urban green space: Implications for valuing the environmental benefits of Boston’s big dig project. Journal of Urban Affairs 25 (5): 641. 9. Besner, J. 2007. A master plan or a regulatory approach for the urban underground space development: The Montreal case. Urban Planning International 22 (6): 16. 10. Kishii, T. 2016. Utilization of underground space in Japan. Tunnelling and Underground Space Technology 55: 320.
Application of Decision-Making Management and Information Management System Based on Big Data Kuo-Min Ko
Abstract Big data is another major technological change after appearing the Internet of things and cloud computing, which affects the academics, enterprise or government. Based on the introduction of big data’s concept and connotation, this paper discussed the application of decision-making management system and information management system in enterprise decision-making, government governance and disaster early-warning, so that to provide some theoretical guidance for practical work. Keywords Big data · Decision-making · Information management · Application
1 Introduction With the rapid popularization of cloud computing technology, coupled with the largescale outbreak of Internet of things and the mobile Internet applications, human beings have entered the era of big data. Gartner, a research organization, defines big data as a massive, high-growth and diversified information asset that requires a new processing model to have a stronger decision-making power, insight into the power of discovery and process optimization [1]. At present, big data technology is also developing rapidly, and begins to be widely used. For example, the use of big data technology can fully and effectively excavate the information contained in big data and can promote people’s understanding of social, economic, political, cultural and other aspects of the law and characteristics of activities [2]. Therefore, it is of great significance to discuss the application of decision-making management and information management system based on big data.
K.-M. Ko (B) Yango University, Fuzhou 350015, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_27
205
206
K.-M. Ko
2 The Application of Decision-Making Management System 2.1 Big Data’s Influence on Decision-Making Management (1) Data management under big data. Enterprises can collect comprehensive data about their management, and use digital methods to analyze and model them, so that to find out the valuable information behind the data. In this way, the probability of possible occurrence of events can be further predicted, and a more reasonable decision-making scheme can be provided for decision-makers. Thus, This can improve the predictability, pertinence and scientific degree of enterprise decision-making [3]. Multi-source data should be cleaned, extracted and integrated before using. First, the traditional database management system and data analysis methods are no longer applicable. Google, Amazon, Microsoft and other enterprises have put forward big data solution, which requires enterprises to update technology to meet the needs of big data processing. Second, the speed of data generation is fast, and the application scenario changes from offline to online, and needs real-time processing. Third, it is the relationship between big data and other data. The biggest change in big data’s era is to replace causality with correlation [4]. By exploring the correlation pattern between the data, we should mine the information in big data. (2) Decision-making participants under big data. Big data has changed the longterm experience, theory and thought of management decision-making methods. Intuitive judgment gave way to accurate data analysis, and big data’s role of decision-making participants changed. First, for high-level managers, traditional decision-making depends on the experience of business leaders because of the scarcity of data and important decisions. However, big data can ensure that from the point of view of problems, there is no need to worry about lack of data or difficulties in obtaining data. Decision-making focuses on the problem itself, and the leader’s task is to find and ask the right questions. Second, for the general managers and employees of the enterprise, the information needed for decision-making can be easily obtained, as well as the decision-making ability is greatly enhanced, and the decision-making tends to rely on the first-line employees of the enterprise. Third, as the media continue to promote and facilitate access to data, ordinary people began to recognize and use big data, and everyone can enter the big data world, so that to become a data analyst and then participate in decision-making [5]. (3) The enterprise decision-making culture under big data. Big data’s influence on enterprise management and decision-making culture is enormous. Big data era is not “what we think, but what we know”. First, when enterprises make decisions with big data, they must first change their mode of thinking. When they encounter important decisions, they should firstly collect, analyze, and then make decisions. The change of thinking of enterprise managers will also improve the executive power of employees in using big data. Using data to drive
Application of Decision-Making Management and Information …
207
decisions, they must make reasonable decisions based on large amounts of data, which requires a long analytical process. The results of big data’s analysis from the front line were used by the employees of the enterprise. Overturning the intuitive judgment of high-level managers will be the biggest change in enterprise management decision-making culture. Second, it is necessary to establish a system of collection, creation, sharing, transmission and encouragement of decision-making knowledge based on decision-making tasks, and to set up a learning-type enterprise culture, so that to improve the ability and level of all members of big data in decision-making [6]. The cultivation of enterprise culture and system based on data decision-making is the objective requirement of big data’s decision-making.
2.2 The Framework of Enterprise Decision-Making Management System The framework of enterprise decision-making management system based on big can be divided into the following aspects: data acquisition, processing and application. There are four main sources of data acquisition: access, transaction, network and purchase. From the model in Fig. 1, we can judge the development trend of enterprises and their industries according to the functions, so that to achieve the purpose of analyzing their own and competitors’ abilities and so on [7]. Through the formulation and implementation, we can make more scientific enterprise decision-making. Only in this way can a dynamic and orderly cooperative mechanism be formed. This mechanism can combine the decision-making system of the enterprise, and it is helpful for the enterprise to conduct right decision-making, so as to improve the advantages of the enterprise in the market.
Fig. 1 Enterprise decision-making management system model based on big data
208
K.-M. Ko
3 Application of Information Management System 3.1 Information Subsystem of Government Governance Under Big Data Information subsystem plays a very important role in the process of government decision-making. It is the nervous system of government decision-making system, which can provide information support for government decision-making, execution, evaluation and monitoring. Big data’s technology provides a very important means to strengthen the information subsystem, which can enhance the ability of the information subsystem to collect, organize, store and transmit information. Thus, it greatly enhances the information in the information subsystem and information analysis and processing capacity. It can also provide a very powerful information basis for government decision-making. Big data technology can provide huge amounts of real-time information data for government departments, so that the information of government decision-making can be transformed from a small amount of sample data to a huge amount of all data [8]. Moreover, it is convenient for government departments to grasp the latest information data, so that to make the government decision-making close to the actual situation to the greatest extent. In this way, the government decision-making behavior can be more accurate and objective, so as to promote the modernization and scientific of government decision-making, and effectively avoid the mistakes in decision-making.
3.2 Disaster Information Management Under Big Data Disaster management aims to effectively deal with and avoid the property loss and life threat to society and people caused by natural disasters, wars, terrorist attacks and other emergency events. It is a continuous process. The main tasks include the prevention when the disaster does not occur, the preparation before the disaster, the response in the disaster process, and the recovery after the disaster occurrence [9]. The main function of disaster information management system is to manage and analyze disaster information, and to help related departments coordinate resources and to provide decision support. Traditional disaster information management has the following shortcomings: it is very difficult to restore and create information network in disaster and after disaster. In the explosion of disaster information, all kinds of users need to process and digest a large number of disaster information. The main communication tools, such as personal computers, do not work effectively and rely on mobile devices such as mobile phones. Therefore, it is necessary to introduce big data technology to meet the needs of information exchange. The information network in disaster events is very vulnerable to damage [10]. Therefore, the efficiency of obtaining and exchanging information in various departments is greatly affected, which requires the ability to obtain timely information. Big data technology has the
Application of Decision-Making Management and Information …
209
ability of situational awareness in disaster information and can provide timely and effective disaster event information. In the explosion of disaster information, all kinds of users need to process and digest a large number of disaster information. However, it is difficult to ensure timely access to valuable information only through human or primary means of information processing. In addition, the redundancy and inconsistency of information will greatly reduce the ability of information processing from different channels. Big data technology can provide advanced data analysis, processing methods and can make decision support, which can help disaster emergency management and disaster recovery.
4 Summary In the process of the rapid development of information technology, social change and economic development have also made considerable progress, and their convergence brought about the rapid growth of data. Thus, big data appeared. Based on the development of network information technology, computer technology and statistical technology, big data’s technology can be analyzed by big data, and the rules and characteristics of the operation of things included in it can be excavated. Only in this way can the understanding of the operation process of things be enhanced and the ability to solve complex problems is improved. The decision-making management and information management system under big data environment is not only a technology, but also a brand-new model for enterprises, governments and related scientific research institutions. However, big data’s research and application has just started. Thus, the road to development is still very long, and the future will bring greater value.
References 1. Junjie, Zhang, and Yang Li. 2015. The Realistic predicament and coping strategy of enterprise decision-making management under the background of big data. Research on Business Economy 07: 106–107. 2. Zhiyan, Feng, Guo Xenhua, Zeng Dajun, Chen Yubo, and Chen Guoqing. 2013. Some frontier topics in the research of business management under the background of big data. Journal of Management Science 16 (01): 1–9. 3. Jun, He. 2014. Analysis of big data’s influence on enterprise management decision. Science and Technology Progress and Countermeasures 31 (04): 65–68. 4. Zhongshun, Li, Zhou Liyun, Xie Weihong, Cheng Minghui, Dong Yanfeng, and Jiang Luan. 2015. Research on big data’s influence on enterprise management decision. Science and Technology Management Research 35 (14): 160–166. 5. Xiaofeng, Meng, and Ci Xiang. 2013. Big data management: Concept, technology and challenges. Computer Research and Development 50 (01): 146–169. 6. Guangqing, Xiong. 2019. Big data’s use of technology and the improvement of government governance. Contemporary World and Socialism 02: 173–179.
210
K.-M. Ko
7. Jiyang, Dong. 2014. Enterprise decision-making in big data’s era. China Management Informatization 17 (24): 43–45. 8. Jianqiao, Cai. 2017. Evolution and trend of public management decision-making model based on big data. Journal of Jishou University (Social Science Edition) 38 (05): 103–109. 9. Yue, Huang, and Li Tao. 2015. Disaster information management in big data’s era. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition) 35 (06): 68–76. 10. Jie, Wu, Yi Meiyu, Zhang Jinhui, and Zhang Qilin. 2016. Design and application of structural behavior monitoring information management system under big data. Journal of Hunan University (Natural Science Edition) 43 (09): 76–81.
Aluminum Foil Surface Defect Recognition Method Based on CNN Hui Wang, Chunhua Gao and Pinglian Wang
Abstract In order to accurately identify the defects on the aluminum surface, including perforation, stains, yellow spots and scratches, etc., a method combining the robust principal component analysis and the convolution neural network is proposed to detect defects on the surface of aluminum foil products. Firstly, the defect area image of aluminum foil was segmented by using the method of robust principal component analysis; Then, using TensorFlow platform to build CNN network model, loading aluminum foil images for training, and save the network model parameters of training results, on the basis of this network model, loading aluminum foil images acquired in real time and classify them, complete defect detection tasks. Experimental results showed that the proposed algorithm has the following advantages such as high accuracy, favorable expansibility and so on, it can be easily applied into surface defect detection for other objects. Keywords Defect detection · RPCA · CNN · Tensorflow
1 Introduction As an important industrial raw material, aluminum foil is widely used in many fields. In the production process of aluminum foil, its surface is prone to some defects, including perforation, stains, yellow spots and scratches, etc. How to use machine vision to identify these defects efficiently and accurately is a critical problem that people always pay attention to. In the traditional automatic surface defect detection methods [1], how to select defect features is always a difficult problem. In recent years, image sparse representation [2–5] has been deemed as a rather effective image representation model attracting extensive attentions from scholars at home H. Wang · P. Wang School of Information and Communication Engineering, Hezhou University, Hezhou, Guangxi, China C. Gao (B) School of Tourism and Sports Health, Hezhou University, Hezhou, Guangxi, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_28
211
212
H. Wang et al.
and abroad, the main idea of low-rank sparse decomposition of defect images is to decompose the images into one part of low-rank backgrounds and the other part of sparse defects. At the same time, the method based on convolution neural network (CNN) is also widely used in many fields [6–9]. In this paper, firstly, the robust principal component analysis (RPCA) method was used to decompose the aluminum foil image into low-rank and sparse parts, and the sparse part was further analyzed to extract the defect areas on the aluminum foil surface. Then, CNN method was used to identify different types of defects on the aluminum foil surface, the method combining RPCA and CNN can realize the effective classification of aluminum foil surface defects. Experimental result shows that it is able to effectively detect and identify defects on surface of aluminum foil, such as perforation, stains, yellow spots and scratches, etc., with fast detection speed and high detection precision. Therefore, it has a preferable practical reference value.
2 RPCA for Aluminum Foil Image Defect Detection The method of robust principal component analysis can automatically identify the severely damaged elements in aluminum foil defect image sequence under certain conditions. It is assumed that the observation data matrix has a low rank, and only a few elements in the original data matrix are damaged, that is, the noise part is sparse, but the size can be arbitrary, the RPCA method can effectively realize the low-rank sparse decomposition of observation data [10]. It can be described as the following Eq. (1). min rank(A) + λE0 s.t.D = A + E A,E
(1)
where, D denote the observation data matrix, A denote the low-rank matrix, E denote the sparse matrix, and λ denote the weight of noise. Besides, || • ||0 represents zero norm. For the RPCA model, IALM algorithm is adopted to carry out relaxation optimization processing, which can effectively separate the low-rank background part and the sparse defect part in the aluminum foil image observation data matrix. Observation data of n groups containing aluminum foil defects, I1 , . . . , In ∈ Rw×h , arrange each set of data into a column vector with the size (w × h) × 1, the obtained aluminum foil image sequence observation data matrix can be expressed as the following Eq. (2). I ≈ [vec(I1 )|· · · |vec(I1 )] ∈ R(w×h)×n
(2)
If we represent each image as the sum of low-rank part and sparse part, I1 = I01 + e1 , . . . , In = I0n + en
(3)
Aluminum Foil Surface Defect Recognition Method …
213
Then, the observation data matrix composed of aluminum foil surface defect image sequence can be expressed as the following Eq. (4). D ≈ [vec(I1 )|· · · |vec(I1 )] = A + E
(4)
where, A = [vec(I10 )|· · · |vec(In0 )] ∈ R(w×h)×n denote the backgrounds, E = [vec(I1 )|· · · |vec(I1 )] ∈ R(w×h)×n denote the foregrounds. To solve Eq. (1) is a NP hard problem. As the rank of the matrix is numerically equal to the number of its non-zero singular values, and the rank of the matrix can be approximated by the kernel norm of the matrix. In addition, it is proved that it is feasible to approximate the zero norm of matrix with one-norm of a matrix [11], in this way, the non-convex problem described by formula (1) can be solved by introducing a kernel norm to carry out convex relaxation and then transformed into a convex optimization problem. min rank(A) + λE1 s.t. D = A + E A,E
(5)
where, ||A||∗ denote the core matrix, ||E||1 is one-norm matrix. The IALM algorithm is used to solve the Formula (5). IALM has a good convergence rate and only needs a few iterations, so it is widely used. min f (x), s.t. h(X ) = 0
(6)
The augmented Lagrangian function of the above constraint optimization problem can be expressed as, L(X, Y,μ) = f(X) + Y, h(X) +
μ h(X)2F 2
(7)
where,μ > 0, denote penalty parameter, y denote Lagrange multiplier, Furthermore, functions f and h are continuously differentiable. Then, the augmented Lagrangian function is adopted to perform convex relaxation on Eq. (5), which can be expressed as the following Eq. (8). L(A, E, Y,μ) = A∗ + λE1 + Y, D − A − E +
μ D − A − E2F 2
(8)
IALM algorithm is adopted to solve Eq. (8) through iteration. In each iteration, x and y are only updated once to obtain approximate solutions of the subproblems, which can also make the algorithm eventually converge to the optimal solution of the original problem. In this way, the algorithm is simpler and converges faster. Low-rank and sparse matrix decomposition of aluminum soil image observation data can be realized. Subsequently, surface defect detections are completed only by analyzing the sparse images obtained.
214
H. Wang et al.
Fig. 1 Aluminum foil defects
(a) perforation
(b) stains
(c) yellow spots
(d) scratches
The aluminum foil defect area image was segmented by using the method of RPCA, then designing and training CNN model to identify different defects.
3 RPCA-Based Extraction of Defect Areas on Aluminum Foil Surface Algorithm running equipment utilized in this paper is equipped with CPU of Intel Core i7 2.0 GHz, internal storage of 2G, Win7 operating system and software development environment MATLAB 7.11.0 (R2010b). In the production of aluminum foil materials the probability of aluminum foil surface defects occurring in the production process is low and the defects typically constitute a small area proportion on a foil image. In other words, a linear relationship may be presumed between a foil image and the background, which may both be roughly deemed to under the same low-rank subspace, and a further presumption is that surface defects are approximately sparse. In this experiment, partitioning is carried out for every single image respectively to obtain an observation data matrix, and RPCA algorithm is utilized to decompose the observation data matrix of image sequence. The surface defect part of the segmented aluminum foil is shown in Fig. 1.
4 Surface Defect Recognition Experiment of Aluminum Foil Based on CNN In designing and training of the CNN network model, a 12 layer CNN network model was constructed, including 2 convolution layers, 2 activation layers, 2 pool layers, 2 local response layer functions, 3 full connection layers and 1 normalized soft Max layer. The structure diagram of the CNN model adopted in this paper see Fig. 2.
Aluminum Foil Surface Defect Recognition Method …
215
Fig. 2 CNN model diagram
The experiment selected 3000 aluminum foil images, there are 2500 images without surface defects, each defect has 500 pictures including perforation, stains, yellow spots and scratches, the picture is unified with the size of 200 × 200. In this paper, the defect recognition method of aluminum foil is based on CNN, the result of defect identification is shown in Table 1. The average recognition rate of perforation, stains, yellow spots and scratches reached 95.88%, and the validity of the proposed method is verified. Concerning Experiment 1 during which partitioning of a single defect image is conducted, the achieved detection results suffer from influences of the size of sub-blocks. In detail, if it is over small-sized, detection results contain too many noises and consume great calculated amounts and take much time. In this paper, an aluminum foil image with a size of 880 × 540 is segmented into 8 sub-block images for processing and the time taken is 0.62 s. With regard to Experiment 2 when lowrank sparse decomposition is carried out for an image sequence formed by multiple images, multiple images are required to be input. In the case that the number of images input is too small, substantial background information is included into the sparse component image acquired by decomposition; otherwise, not only is a lot of time needed, but low computational efficiency can be generated. Moreover, a set of image sequences are formed by 20 images in Experiment 2 and the processing of an image takes 0.68 s on average. Clearly, the application of methods described in this paper into aluminum foil material production lines of a speed from 8 to 10 m/min is able to realize real-time detections. Table 1 The result of defect recognition Identification type
Number to be identified
The number of correctly identified
Recognition rate (%)
Perforation
250
250
100
Stains
200
193
96.50
Yellow spots
150
138
92.00
Scratches
250
234
93.60
Total
850
815
95.88
216
H. Wang et al.
5 Conclusion In this paper, the RPCA-based defect detection method applied into segment the defect areas on the aluminum foil surface. On this basis, the method based on CNN is adopted to complete defect classification. The experimental results verify our theory and applications for identification of surface defects of aluminum foil products shows its availability, algorithms presented in this paper are featured with rather favorable expansibility, and it can be conveniently applied to the detection of surface defects of other products, it has high practical reference value. Acknowledgements The research is supported by the fund project of Guangxi young teachers basic ability enhancement project (2017KY0651), the fund project of Guilin University of Electronic Technology 2017 Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, 2018JGA284, 2016ZZSK15, 1608027, 201711838095, 201811838187.
References 1. Sun, Bao-hua, Yue-ping Han, Qing Xu, et al. 2014. Product surface defect detection based on surf algorithm research. Infrared Technology 36 (6): 503–507. 2. Wang, Hui, and Hong Sun. 2017. Robust principal component analysis for aluminum foil surface defects detection. Journal of Signal Processing 33 (4): 577–582. 3. Yang, B., and L. Zou. 2015. Robust foreground detection using block-based RPCA. Optik— International Journal for Light and Electron Optics 126 (23): 4586–4590. 4. Yao, Ming-Hai, Jie Li, and Xian-Bao Wang. 2013. Solar cells surface defects detection using RPCA method. Chinese Journal of Computers 36 (9): 1943–1952. 5. Wang, P., Q. Chen, W. Qian, et al. 2017. Salient motion detection using proximal robust principal component analysis method. Journal of Electronic Imaging 26 (2): 023004. 6. Liu, X., Z. Liu, C. Li, et al. 2018. Fabric defect detection based on faster R-CNN. In Ninth international conference on graphic and image processing, 91–97. 7. Xu, Y., G. Yu, Y. Wang, et al. 2017. Car detection from low-altitude UAV imagery with the faster R-CNN. Journal of Advanced Transportation 2017: 1–10. 8. Li, S., Z.Q. Liu, and A.B. Chan. 2015. Heterogeneous multi-task learning for human pose estimation with deep convolutional neural network. International Journal of Computer Vision 113 (1): 19–36. 9. Philipp, K., P. Michael, and U. Martin. 2017. Segmentation and classification of colon glands with deep convolutional neural networks and total variation regularization. PeerJ 5: e3874. 10. Wright, J., A. Ganesh, S. Rao, et al. 2009. Robust principal component analysis: Exact recovery of corrupted low-rank matrices via convex optimization. In Proceedings of the conference on neural information processing systems, 2080–2088, Vancouver, Canada. 11. Elad, M., and A.M. Bruckstein. 2002. A generalized uncertainty principle and sparse representation in pairs of bases. IEEE Transactions on Information Theory 48 (9): 2558–2567.
How to Build Hadoop in the Field of Transportation by Cloud Computing Yunhui Gu and Li Fu
Abstract Since the twenty-first century, traffic big data has gained unprecedented attention as the basis of many intelligent transportation solutions. Cloud platform technology and big data mining technology have changed the restrictions of traditional traffic management administrative areas, established a comprehensive and three-dimensional intelligent transportation system, and provided new technologies and new means for traffic supervision, security early warning, and high-efficiency management and control. This paper analyzes the importance of the combination of intelligent traffic data analysis center and traffic big data and cloud platform technology from the technical and functional levels, and proposes the architecture design and implementation of the cloud big data platform based on cloud computing. Keywords Traffic big data · Cloud computing · Hadoop
1 Introduction With the surprising development of new generation information theory, big data platform technology has become one of the important supporting technologies in the field of modern modeling and simulation [1]. In particular, various industries in society are paying more and more attention to data-based applications. The rise of big data has triggered a boom in research on big data and big data in various industries. In response to the application of big data in the real life field, many scholars at home and abroad have made a lot of attempts. Sfrent [2] introduced the big data platform technology into the financial industry. The construction goal is to build a multi-scale, multi-resolution, multi-class, multi-user financial basic economic data system. Elagib [3] proposed the core idea of public transportation big data platform for the current situation of public transportation data across companies, systems, and heterogeneous, and built a public transportation big data platform architecture. Fu Qian [4] pointed out the urgency and importance of establishing a big data information sharing platform for various levels of government in China, and made people think Y. Gu (B) · L. Fu China Academy of Transportation Sciences, 240Huixinli, Chaoyang District, Beijing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_29
217
218
Y. Gu and L. Fu
deeply. Wang Liang [5] designed and built a geological big data platform based on geological data and business characteristics, explored and studied how to apply big data technology to the geological industry, combined with the existing hardware resources of geological data characteristics, designed and built experiments based on Oracle architecture. Room big data environment. Through the analysis of domestic and international research work on big data, we can find that the research of big data platform is still scattered. Most of the big data platform architecture is based on Hadoop technology [6], and a lot of research focuses on the mining and analysis methods of big data. There is no relevant technical system to support the development of big data platforms. The research of data mining in big data application is still in the development stage. Many public security, e-government and other business information systems still stay at the primary processing level, lack of comprehensive development and application, intelligent analysis and judgment, scientific Decision warning.
2 Analysis of Traffic Big Data and Cloud Computing Technology 2.1 Traffic Big Data Because of the development of sensors and the 4g network, data in the transportation sector has exploded, including various types of transportation services, monitoring and application data, such as various types of traffic and meteorological monitoring of urban trunk roads and highways. Data, GPS data for city buses, rough and passenger vehicles, highway and channel toll data. These data are characterized by massive, multi-source heterogeneity, extremely fast generation and propagation, and contain a lot of useful information, collectively referred to as traffic big data [7]. Traffic big data can’t be processed by conventional data management, data statistics, regression analysis or other processing time, so the information in traffic big data is difficult to be mined. Traffic big data processing technology is based on Hadoop. It is precisely because of the huge amount of data that traditional data processing technology cannot continue to be applied. Therefore, big data processing technology will be correspondingly developed. Traffic big data cannot be processed by conventional data management, data statistics, regression analysis, etc., or the processing time is too long, making it difficult to mine information in traffic big data. Traffic big data processing technology has played an important role in the intelligent transportation systems. Generally speaking, the processing of traffic big data includes data generation, data collection, data storage, data analysis and data display [8]. Common traffic big data processing technologies include distributed databases, data mining, and clustering analysis. The advancement of traffic big data processing technology has benefited from the development of basic disciplines such as computer technology and network technology,
How to Build Hadoop in the Field …
219
sensor technology and mathematics [9]. Various high-performance big data processing systems and algorithms are emerging, serving all walks of life in society and promoting the development of human civilization. With the advancement of technology, some new and more efficient big data processing technologies have emerged as the times require, and become a powerful driving force for continuously promoting big data applications.
2.2 Cloud Computing Technology With the huge change of the big computer-to-client-server in the 1980s, Cloud computing came into being. Cloud computing is a kind of processing technology, which can realize the unification of hardware, software, and some other resources in the WAN or LAN to calculate and storage data. The cloud platform is divided into a storage-based cloud platform, a data-based computing cloud platform, and an intelligent cloud platform that can both compute and storage data [10]. The cloud computing platform consists of many servers and serves a lot of users. In consequence, the cloud computing platform uses distributed storage and redundant storage, which refer to cluster computing and data redundancy, to ensure data reliability. The redundant way that replace the supercomputer with many low-equipped machines based on the cluster computing and task decomposition can reduce the cost. The open source implementation HDFS of GFS developed by Google and Hadoop team is widely used in the cloud computing platform.
3 The Advantages of Big Data and Cloud Computing 3.1 Improve Traffic Safety With the active use of traffic safety and the extensive use of emergency rescue systems, the traffic safety situation has been improved, and the predictability and real-time nature of traffic big data and cloud platform technologies can help improve traffic safety system data. Processing capacity. For example, when the driver performs automatic detection, the driver can perform alcohol detection, fatigue state detection, reaction detection, etc. on the vehicle-mounted device to determine whether the driver is currently in a state of high mental concentration, whether the mental state and the physical state are normal. At the same time, if some detectors on the roadside are combined to detect the driving vehicle and quickly integrate laser, radar, video and other detectors, the vehicle’s driving speed and driving trajectory can be calculated, and the vehicle can be constructed by traffic big data and cloud platform technology. Drive the safety model to determine whether the current vehicle is in a safe driving state and reduce the possibility of a traffic accident.
220
Y. Gu and L. Fu
3.2 Improve the Efficiency of Information Combination Traffic big data and cloud platform help to build a multi-dimensional traffic information system, integrate data warehouses of all fields, jointly build a public transportation information integration utilization mode, and exert overall traffic functions to bring into play the traffic. The new value of the data. For example, the combination of data from the transportation, meteorological and insurance sectors can better study the field of traffic disaster prevention and mitigation.
3.3 Quickly Configure Transportation Resources Traffic management with the help of the traffic big data analysis and process could develop a great overall solution. It not only improve the rational use of transportation resources but also reduce the material and work force of all transportation departments. For example, according to the analysis results of traffic big data and cloud platform, the multi-mode ground public transport network, the efficient passenger flow organization scheme, multi-level ground bus backbone network green wave traffic control are determined.
3.4 Providing Environmental Monitoring Methods Traffic big data and cloud platform technology can reduce the influence of transportation on the environment and reduce the blockage of road traffic. By establishing regional traffic emission monitoring and prediction models, a traffic operation and environmental data test system is established to effectively analyze the influence of transportation on the environment. At the same time, it can also analyze the environmental historical data, provide decision-making basis for intelligent control of traffic signals to reduce traffic delays and emissions of control prototype system.
4 Construction of Hadoop in the Field of Transportation by Cloud Computing 4.1 Traffic Big Data Platform Architecture Design The design of the traffic big data platform should conform to the business characteristics of the traffic itself and the needs of various aspects. Therefore, this paper extracts and summarizes the data of each business, and designs a cloud big data platform architecture with the help of cloud computing. The platform is characterized
How to Build Hadoop in the Field …
221
by distributed, and consists of four layers: data acquisition layer, data storage layer, data analysis layer and data application layer [11]. Specifically as shown in Fig. 1. (1) Data acquisition layer The data acquisition layer is the lowest level of the entire system architecture and is the basis for system operation. It is divided into close-range information collection and long-distance information collection. Near-distance information collection includes sensor monitoring, passenger flow information monitoring, operational evaluation monitoring, maintenance information monitoring, etc., while long-distance information collection includes data of already formed traffic systems, such as subway system information, bus system information, and taxi system information. This information is collected and aggregated by the data acquisition layer, processed and stored according to a certain data model to form big data. The dynamic data in this paper is stored in a distributed database, and the static data is stored in a relational database. All data is supported as data for the big data application layer. (2) Data storage layer The storage layer can store a large amount of data collected by the acquisition layer according to a certain data structure and model. In order to improve the efficiency Short-range information source Operational assess ment
Long-range information source Maintenance
Passenger flow
Operational Sensor monitoring assess ment terminal monitoring terminal
Passenger flow information monitoring terminal
information
Maintenance information monitoring terminal
Subway system
Bus s ystem
Subway terminal
Bus terminal
Taxi system
Taxi terminal
Internet
Data acquisition layer
Sensor
LAN/WIFI
Hadoop
Spark
Oracle
Statistical analysis
Correlation Analysis
Cluster analysis
Fig. 1 Cloud-based traffic big data platform architecture
APP-based mobile data terminal
Data application layer
Remote access terminal based on B/S
Mobile terminal
Manufacturing Sector
Dispatching command system Simulation interface
MySQL
Data analysis layer
Data cleaning
Dispatch center
Maintenance department
Maintenance department and spare parts library simulation system
Data storage layer
Load balancing
222
Y. Gu and L. Fu
of data storage and query, this paper uses the master-slave structure for data storage. This article supports the distributed storage model built by Hadoop and Spark, and also supports the traditional storage mode provided by Oracle and MySQL. From the perspective of the overall architecture, dynamic data is stored using data warehouse technology, while static data is stored in distributed databases. The application of data warehouse technology provides a good foundation for upper-level data analysis and big data applications. (3) Data analysis layer The function of the data analysis layer is to perform big data analysis on the collected and stored data. This layer is the most important part of big data technology in intelligent traffic information system, which involves a large number of big data analysis algorithms such as data cleaning, cluster analysis, correlation etc., to extract intelligent traffic operations. Valuable data information. Among them, the purpose of cleaning is to remove abnormal data and format the original data to help subsequent data processing. Big data mining algorithms such as cluster analysis, correlation analysis, and time series are the core of data stratification, which can provide data reference for intelligent traffic managers and passengers. (4) Data application layer The application layer is the highest system level directly facing the user. The data service layer based on cloud computing technology realizes the organic integration and integration of structured data and unstructured data of the big data platform by using powerful data storage capability and data computing capability. Ability to take advantage of the value of data mining capabilities. Users can add new data analysis modules as needed to complete new big data mining functions.
4.2 Implementation of the Traffic Big Data Platform The cloud-based traffic big data platform architecture design draws on the theory of hierarchical design. According to the service project of big data platform, the platform is reasonably divided into different modular levels. Each level can only pass the interface of the hierarchical boundary with the upper and lower layers. Interactions effectively avoid cross-layer interactions. By designing a hierarchical big data platform architecture, the internal representation of each module is highly cohesive, and the modules are loosely coupled, which effectively improves the reliability of the big data platform and expands the business scope of the big data platform. Facilitate system maintenance. For example, when the big data platform needs to expand the Hadoop cluster, it only needs to add a new Hadoop node server on the basis of the original data platform, without any changes to other system modules, which is convenient and fast, and is convenient for staff maintenance. The logical structure of the cloud computing-based traffic big data platform is shown in Fig. 2.
How to Build Hadoop in the Field …
Zookeeper Distributed Application Coordination Service
Data Service
Computing Framework
Web display
Spark Memory distributed computing framework
223
Application service data support
Map/Reduce Distributed computing framework
Unstructured data/semi-structured data calculation
MySQL Platform Management Database
HBase Real-time distributed database
HDFS Distributed file system
Application service data support
OLAP Online analytical processing Institutionalized data calculation
Oracle Relational Database
Data Storage Backup data
Data Access Cleaning
ETL tool
Data Source
Various file storage
Database linkage
Various types of database storage
Stream processing technology
Various real-time data streams
Fig. 2 Logical structure of the traffic big data platform
5 Conclusion This paper uses cloud computing, big data and other advanced technologies to build a traffic big data platform based on cloud computing, and expounds the four-tier architecture of the platform, and gives the concrete implementation logic structure of the platform. By building a distributed big data platform based on cloud computing, it can realize the effective integration of traffic data resources and provide real-time traffic information services for traffic management departments and the public. It is a beneficial attempt to apply advanced technology to the transportation industry.
References 1. Park, Kyounghyun, M.C. Nguyen, and H. Won. 2015. Web-based collaborative big data analytics on big data as a service platform. International Conference on Advanced Communication Technology. 2. Sfrent, Andrei, and F. Pop. 2015. Asymptotic scheduling for many task computing in Big Data platforms. Information Sciences 319: 71–91. 3. Elagib, Sara B., A.H.A. Hashim, and R.F. Olanrewaju. 2017. A proposed architecture for generic and scalable CDR analytics platform utilizing big data technology. Advanced Science Letters 23 (11): 11149–11152. 4. Jian, Fu, J. Sun, and K. Wang. 2017. SPARK—A big data processing platform for machine learning. International Conference on Industrial Informatics-Computing Technology. 5. Singhal, Ayush, R. Pant, and P. Sinha. 2018. “AlertMix: A Big Data platform for multi-source streaming data.” 6. Abouzeid, Azza, et al. 2009. HadoopDB: An architectural hybrid of MapReduce and DBMS technologies for analytical workloads. Proceedings of the Vldb Endowment 2.1: 922–933.
224
Y. Gu and L. Fu
7. Qi, Shi, and M. Abdel-Aty. 2015. Big Data applications in real-time traffic operation and safety monitoring and improvement on urban expressways. Transportation Research Part C 58: 380–394. 8. Baccarelli, Enzo, et al. 2016. Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study. Computers & Chemical Engineering 91 (2): 182–194. 9. Cárdenasbenítez, Néstor, et al. 2016. Traffic congestion detection system through connected vehicles and big data. Sensors 16 (5): 599. 10. Buyya, Rajkumar, et al. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25 (6): 599–616. 11. Zhen, Xie, et al. 2017. Modeling traffic of big data platform for large scale datacenter networks. IEEE International Conference on Parallel & Distributed Systems (in Chinese).
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral Data Using Grey Relational Analysis Wei Guo, Ping Dong, Hongbo Qiao, Haikuan Feng, Huifang Wang and Hui Zhang
Abstract Leaf area index (LAI) is an important parameter to evaluate crop growth and crop yield. The purpose of this study is: using grey relational analysis (GRA) to calculate the typical spectral vegetation index (VI) and LAI correlation, choice the sensitive vegetation index to leaf area index in winter wheat, called GVI; the application of correlation analysis to screen the LAI sensitive vegetation index, called CVI. Then the partial least squares (PLS) method is used to estimate the LAI of GVI and CVI respectively, and the method of determining the optimal VI is determined. The results show that grey relational analysis can improve the estimation accuracy of LAI in winter wheat. Keywords Leaf area index · Vegetation index · Grey relational analysis · Partial least squares
1 Introduction Leaf area index (LAI) is a very important physiological parameter that characterizes crop growth. It is a dimensionless variable that can be defined as the one-sided green leaf area per unit ground surface area. As LAI is relevant to many biological and physical processes of crops including photosynthesis, evaporation, evapotranspiration and carbon cycle and can be well correlated to the biomass and yield of crops [1–4], estimating the LAI of farm crops plays a critical role in measuring crop growth, monitoring plant diseases and insect pests as well as yield estimation and field management [5–8]. While conventional LAI surface measurement derives relatively accurate LAI at a specific location, it is hardly able to provide robust support W. Guo · P. Dong · H. Qiao · H. Zhang (B) College of Information and Management Science, Henan Agricultural University, Zhengzhou 450002, China e-mail: [email protected] H. Feng Beijing Research Center for Information Technology in Agriculture, Beijing 100097, China H. Wang Beijing Municipal Climate Center, Beijing 100089, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_30
225
226
W. Guo et al.
for obtaining mass LAI. Hyperspectral remote-sensing technology, on the other side, enables us to obtain fine spectral data of crop canopies in an easier, faster, more flexible and accurate manner, and thereby offers an effective way for large-scale retrieval of crop LAI by characterizing hyperspectral data and the vegetation indices based on the combinations of these hyperspectral bands [9–11]. While satisfactory results have been achieved in estimating crop LAI with vegetation indices, as each of these indices is relevant to crop LAI, it is impossible to tell which are the most relevant to LAI. This is what we call grey relation. In our study, we introduced a grey scale measurement tool called grey relational analysis (GRA) to analyze the grey relevance between each of the vegetation indices (VI) and crop LAI to select vegetation indices having higher relevance. We also incorporated the commonly used regression analysis to filter vegetation indices having the highest LAI relevance. After this was done, we estimated the crop LAI using partial least squares (PLS) method and verified the result with the measured LAI of the second year before selecting the best filtering scenario as reference for subsequent hyperspectral remote-sensing estimation of crop LAI.
2 Methodology The research area is located at Shunyi and Tongzhou, Beijing the two areas have typical continental climate. Shunyi’ geographic coordinates to latitude 40° 00 –40° 21 , longitude 116° 34 –117° 00 . covering a total area of 1020 square kilometers. Daxing’ geographic coordinates to latitude 39° 36 –40° 02 , longitude 116° 32 –116° 56 . covering a total area of 907 km2 . The growth period was from 2009 to 2010. The field survey was conducted for three stages per year from 2009 to 2010. The first stage was jointing stage, which was conducted during the April 16th to 17th in 2009 and April 21st to 27th in 2010. The second stage was heading stage, which was conducted during May 18th to 19th in 2009 and May 20th to 21st in 2010. Canopy spectral measurements were taken by FieldSpec 3 spectrometer (ASD Inc., Boulder, Colorado, USA). The hyperspectral data were acquired under clean sky and windless conditions, and the test time was only during 10:00–14:00 local time. For eliminate the effect of possible variation of illumination, we calibrated the spectrometer by a white spectral on reference panel when the canopy reflectance was measured 10 times. For every measurement, the spectrometer was above 0.6 m from the canopy, and the field of view was 23°. The spectral wavelengths from 400 to 2500 nm. To reduce the influence of soil and sky, 10 readings were made for each measurement, and three measurements for each plot, the mean value was used as the canopy reflectance for every samples. Sampling location was selected nearby the center of the plots, each sampling. Chooses 20 plants of the winter wheat growing close the center. In the laboratory, measure the length and width of all the leaves. At last, the winter wheat leaf area index was calculated using the Formula 1.
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral …
L AI =
0.83 ×
227
20
x×y×n 20 × l 1
(1)
where 0.83 is an empirical parameter, the x and y are winter wheat Leaf length and width. Symbol l is row spacing. Grey relational analysis (GRA) is a systematic analysis process that finds the relevance between characteristic data sequences reflecting systematic behaviors and correlation factor sequences affecting systematic behaviors. Its principle is to measure the relevance between characteristic data sequences and factors of main systematic behaviors, process them and provide a quantitative description of the effects of these factors on the system. Our study demonstrates that, when the vegetation indexes selected by GRA (Table 1) are used to estimate LAI, their relationship is both stable and feasible (Table 2). Partial least squares (PLS) method is the extension of a multiple linear regression model that is especially helpful when we try to predict dependent variables with a very large set of independent variables. In its simplest form, it refers to a linear model between dependent variables Y and independent variables X, expressed as: Y = b0 + b1X1 + b2X2 + · · · + bpXp
(2)
Here in this equation, b0 is the intercept of regression coefficient; bi is the regression coefficient; Xi is independent variable 1 to p. Table 1 Summary of selected vegetation indexes citations for LAI Name
Function
Resource
NDVI
N DV I = (R800 − R670 )/(R800 + R670 )
Rouse et al. (1974)
I R −ρ R 2.5 1+ρ N ρI RN+6ρ R −7.5ρ B
EVI
EV I =
Green NDVI
G N DV I = (ρ N I R − ρG )/(ρ N I R + ρG )
Gitelson et al. (1996)
Blue NDVI
B N DV I = (ρ N I R − ρ B )/(ρ N I R + ρ B )
Wang et al. (2007)
Green-Red NDVI
G R N DV I = [ρ N I R − (ρG + ρ R )]/[ρ N I R + (ρG + ρ R )]
Wang et al. (2007)
Green-Blue NDVI
G B N DV I = [ρ N I R − (ρG + ρ B )]/[ρ N I R + (ρG + ρ B )]
Wang et al. (2007)
Red-Blue NDVI
R B N DV I = [ρ N I R − (ρ R + ρ B )]/[ρ N I R + (ρ R + ρ B )]
Wang et al. (2007)
Pan NDVI
P N DV I = [ρ N I R −(ρG +ρ R +ρ B )]/[ρ N I R +(ρG +ρ R +ρ B )]
Wang et al. (2007)
ANDVI
AN DV I =
ρ N I R −ρ R +(1+0.5)(ρG −ρ B ) ρ N I R +ρ R +(1+0.5)(ρG +ρ B )
Note Ri denotes reflectance at band i (nanometer)
Huete et al. (1997)
Liu et al. (2008)
228 Table 2 Grey correlation degree and rank of vegetation index for LAI at the whole growth stages
W. Guo et al. Vegetation index
Grey correlation
Orders
NDVI
0.750458
5
EVI
0.801417
2
GNDVI
0.697225
7
BNDVI
0.665695
8
GRNDVI
0.767299
4
GBNDVI
0.771134
3
RBNDVI
0.801619
1
PNDVI
0.647952
9
ANDVI
0.743721
6
From literature review, many hyperspectral vegetation indices can represent LAI. To select the optimal ones, we selected ten hyperspectral vegetation indices having definite physical implications, high recognition and higher LAI correlation and compared them with LAI (Table 2).
3 Results and Analysis Firstly, band calculation was performed on hyperspectral data obtained in 2009 from the 81 sampling points. Gray relational analysis was conducted between the 10 different hyperspectral vegetation indices from each sampling point and the LAI at this point. Then, the vegetation indices were prioritized by grey relation degree between each vegetation index and LAI. As can be observed from Table 2, by grey relevance with LAI, the vegetation indices come in the following order: RBNDVI > EVI > GBNDVI > GRNDVI > NDVI > ANDVI > GNDVI > BNDVI > PNDVI. From this result, the top five vegetation indices are RBNDVI, EVI, GBNDVI, GRNDVI and NDVI. Calculation revealed that these indices remain in the same position in terms of grey relevance degree with LAI whether it be the entire growth stage, the regreening stage, jointing stage or flowering stage (data of the jointing, heading and flowering stages are not presented here), which also confirms their relatively constant relation with LAI. Secondly, to compare with grey relational analysis, correlation analysis was also conducted between the ten different vegetation indices obtained from each of the 81 sampling points in 2009 and the LAI at this point. Table 4 presents the correlation analysis result between LAI and vegetation indices. As can be observed from this table, the ten vegetation indices are all very significantly correlative to LAI. The best correlative vegetation index is GNDVI, whose r and R2 are as high as 0.818 and 0.669. By LAI correlation, these significant vegetation indices are prioritized as GNDVI > PNDVI > GRNDVI > ANDVI > BNDVI > RBNDVI > NDVI > EVI > GBNDVI. From correlation analysis (Table 3) and grey relational analysis (Table 2)
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral …
229
Table 3 Relationships between LAI and Vis Vegetation index
Simulated equations
R
R2
Orders
NDVI
y=
+ 3.563
0.797**
0.635
7
EVI
y = 0.263x + 1.003
0.780**
0.609
8
GNDVI
y=
+ 0.254
0.818**
0.669
1
BNDVI
y = 0.005x + 7.067
0.807**
0.652
5
GRNDVI
y=
+ 2.942
0.811**
0.658
3
GBNDVI
y = 0.185x + 3.839
0.732**
0.536
9
RBNDVI
y = 0.252x + 3.006
0.806**
0.649
6
PNDVI
y=
+ 2.716
0.814**
0.662
2
ANDVI
y = 0.126x + 3.916
0.807**
0.652
4
0.117x 0.045x 0.363x
0.516x
Note **and *represent significant at the 0.01 and 0.05 level of probability, respectively
between LAI and vegetation indices, there is some difference between their position by correlation and that by grey relevance. As grey relational analysis nondimensionalizes all data, the resulting grey relevance degree gives a better description of the relation between LAI and each vegetation index. Correlation analysis, on the other side, takes account of only the correlation between LAI and each vegetation index without nondimensionalizing the data. This also explains why there is a difference between their position based on correlation analysis and that based on grey relational analysis. As discussed above, as grey relational analysis nondimensionalizes all data, the resulted relation between LAI and vegetation indices is more comparable and thereby better describes the relation between LAI and each vegetation index. Thirdly, to further validate that grey relational analysis contributes to higher estimation accuracy when it is used to select vegetation indices for LAI estimation, five vegetation indices having the highest relevance based on grey relational analysis and five vegetation indices having the highest correlation based on correlation analysis were separately used to estimate the LAI of wheat in the study area throughout its growth period by means of PLS method. The former include RBNDVI, EVI, GBNDVI, GRNDVI and NDVI. The estimation equation was y = 0.23–47.6691NDVI + 6.3264EVI-42.1258GBNDVI + 47.6273GBNDVI + 32.5619RBNDVI, referred to hereinafter as Model 1. The latter include GNDVI, PNDVI, GRNDVI, ANDVI and BNDVI. The estimation equation was y = 2.0521 + 31.4247GNDVI-23.6538BNDVI-59.8182GRNDVI + 39.7936PNDVI + 18.3953ANDVI, referred to hereinafter as Model 2. As can be observed from Table 4, all the LAIs resulted from Model 1 have significantly higher r and R2 values than those from Model 2, suggesting that the winter wheat LAI directly resulted from vegetation indices based on grey relational analysis provides significantly higher estimation accuracy. Finally, to verify how correctly the estimation models worked, we measured the error between the predicted LAIs from Model 1 and Model 2 with the measured LAIs and hyperspectral data of winter wheat in the study area throughout its growth period
230
W. Guo et al.
Table 4 The correlation of winter wheat LAI with VIs at the whole stages Simulated equations
r
R2
RSME (%)
Model 1
y = 0.23–47.6691NDVI + 6.3264EVI-42.1258GBNDVI + 47.6273GBNDVI + 32.5619RBNDVI
0.6486**
0.4208
1.9392
Model 2
y = 2.0521 + 31.4247GNDVI-23.6538BNDVI-59.8182GRNDVI + 39.7936PNDVI + 18.3953ANDVI
0.6411**
0.4110
1.9722
Note ** and *represent significant at the 0.01 and 0.05 level of probability, respectively
from the 62 sampling points of 2010. The result demonstrates good relationship between the measured values and the predicted ones. These values were verified according to equations y = 0.5674x + 0.5277 and y = 0.4941x + 0.8023, where the R2 values are 0.4567 and 0.4244, and RMSE values are 1.3526 and 1.3602 respectively (Fig. 1). The result also confirms that vegetation indices based on grey relational method provides more accurate LAI estimation of winter wheat. This is mainly because all the vegetation indices are standardized by grey relational analysis.
4 Conclusions Our studies demonstrate that, when Estimating winter wheat LAI in conjunction with PLS, vegetation indices having higher LAI relevance based on grey relational analysis provide higher estimation accuracy than the vegetation indices having higher LAI correlation based on correlation analysis. When GRA-PLS is used to estimate the LAI of winter wheat throughout its growth period, the R and R2 values are 0.6486** and 0.4208; and the RMSE values are 1.9392. When correlation analysis plus PLS is used for the same purpose, the R and R2 values are 0.6411** and 0.4110; and the RMSE values are 1.9722. The LAI estimation models based on these two methods were verified with the measured LAI in the same area in 2010 according to equations y = 0.5674x + 0.5277 and y = 0.4941x + 0.8023. The resulted R2 values are 0.4567 and 0.4244; and the resulted RMSE values are 1.3526 and 1.3602. As demonstrated above, grey relational analysis provides higher estimation accuracy when it is used to select vegetation indices for estimating the LAI of winter wheat throughout its growth period. However, while we have proved that the winter wheat LAI estimation models based on GRA and PLS are quite reliable, as our experiment was limited to the two districts of Shunyi and Tongzhou of Beijing, to build a winter wheat LAI estimation model that applies to the entire municipality, a lot of additional data will have to be accumulated.
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral …
231
(1) Model 1
(2) Model 2 Fig. 1 Relationships between predicted LAI and actual LAI at the whole growth stages for winter wheat
Acknowledgements This research was supported by the National Natural Science Foundation of China (41501481), Henan Science and Technology Research Program (172102110055), Colleges and universities in Henan province key scientific research project (15A210028) and Youth Scientific Research foundation of BAAFS (Winter wheat growth variance monitoring through remote sensing in Beijing suburb). We would also like to thank Beijing Agro-technical Station for providing the wheat hyperspectral samples. We are also most grateful to the anonymous reviewers for their helpful comments.
References 1. Veroustraete, F., J. Patyn, and R.B. Myneni. 1996. Estimating net ecosystem exchange of carbon using the normalized difference vegetation index and an ecosystem model. Remote Sensing of Environment 58 (1): 115–130.
232
W. Guo et al.
2. Pu, Ruiliang, and Peng Gong. 2000. Hyperspectral remote sensing and applications, 82–83. Beijing: Higher Education Press. 3. Feng, Wei, Yan Zhu, Xia Yao, et al. 2009. Monitoring leaf dry weight and leaf area index in wheat with hyperspectral remote sensing. Chinese Journal of Plant Ecology 33 (1): 34–44. 4. Liu, Liangyun, Xiaoyu Song, Cunjun Li, et al. 2009. Monitoring and evaluation of the diseases of and yield winter wheat from multi-temporal remotely-sensed data. Transactions of the VDSR 25 (1): 137–143. 5. Song, Kaishan, Bo Zhang, Zongming Wang, et al. 2007. Based on wavelet analysis is Glycine max leaf hyperspectral inversion area. Chinese Journal of Ecology 26 (10): 1690–1696. 6. Koger Cliff, H., M. Bruce Lori, et al. 2003. Wavelet analysis of hyperspectral reflectance data for detecting pitted morningglory (Ipomoea lacunosa) in soybean (Glycine max). Remote Sensing of Environment 86 (1): 108–119. 7. Shi, Tiezhu, Junjie Wang, et al. 2015. Estimating leaf nitrogen concentration in heterogeneous crop plants from hyperspectral reflectance. International Journal of Remote Sensing 36 (18): 4652–4667. 8. Fletcher, Reginald S., and Krishna N. Reddy. 2016. Random forest and leaf multispectral reflectance data to differentiate three soybean varieties from two pigweeds. Computers and Electronics in Agriculture 128: 199–206. 9. Eriksson, H., L. Eklundh, K. Hall, et al. 2005. Estamating LAI in deciduous forest stands. Agricultural and Forest Meteorology 129: 27–37. 10. Jing, Huaan, Dianwei Liu, Zongming Wang, et al. 2008. Remote sensing estimation model of wetland vegetation LAI in Sanjiang Plain. Chinese Journal of Ecology 27 (5): 803–808. 11. Li, Rendong, and Jiyuan Liu. 2004. Estimating wetland vegetation biomass in the Poyang Lake of central China from landsat ETM data. International Geoscience and Remote Sensing Symposium (IGARSS) 7: 4590–4593.
Financial Auditing Accounting Method Based on Computer Network Xiaoyan Ma
Abstract Research on Accounting Methods in Financial Auditing With the continuous improvement of social and economic level, the era of information technology has come. With the sustained and stable development of China’s economy, people are paying more and more attention to economic development and pursuing higher economic benefits [1–4]. Traditional accounting methods can no longer meet the current situation of financial management. In modern society, computer technology and information technology have been applied to all walks of life, and have gradually become the main direction of the development of accounting methods [5–7]. With the in-depth development of reform and opening up, it is necessary to continuously innovate and reform accounting methods in order to meet the needs of the current era for financial work and accounting [8–10]. Therefore, we should strive to improve the level of accounting, look at the problem from a developmental perspective, realize the improvement of accounting methods, and at the same time improve the working level of financial management personnel [11, 12]. Based on the computer network, this paper discusses the new method of financial accounting audit under computer network technology. Keywords Computer network · Financial audit · Accounting methods
1 Introduction Accounting has always been an important job in the operation and management of enterprises, and has played an irreplaceable role in the development of enterprises. The work of financial audit is an important part of the actual accounting work, which can correctly respond to the production and operation of enterprises. Only by reflecting and managing the company’s capital flow through financial audit and making accurate judgment on the financial statements and other information in enterprise management can we effectively analyze the financial and capital problems existing X. Ma (B) Shandong University of Arts, Jinan Shandong 250014, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_31
233
234
X. Ma
in the enterprise and let the company adopt correct solutions. In the financial management of an enterprise, financial auditing also has the function of supervision, which can ensure the correctness and accuracy of the enterprise’s work. At the same time, it can also accurately manage the income and capital flow of the enterprise and improve the economic benefits of the enterprise to the greatest extent.
2 The Basic Meaning of Financial Audit in Financial Supervision Accounting supervision can effectively ensure the smooth progress of basic financial accounting work and improve the overall financial management level. The main content of financial auditing is to make true and accurate records of financial accounting, and to supervise and manage the truthfulness and accuracy of financial statements according to accounting principles. The basic starting point of financial auditing is to supervise the financial statements of enterprises and correctly reflect the capital status and flow direction of enterprises. Financial audit records the assets and funds of an enterprise truly, and uses accounting audit to realize overall supervision. Its main function is to prevent illegal behaviors of the enterprise, and at the same time it can also realize macro—control. In the management of enterprises, financial auditing can effectively curb the violation of regulations and laws in enterprises, and can also effectively ensure the smooth organization and management of enterprises, laying a foundation for the development of enterprises. Financial audit is a scientific examination of accounting. The main research content is the true record of accounting work, so as to help enterprise management make correct decisions through correct accounting information.
3 Accounting Methods in Accounting Auditing 3.1 Check the Relationship and Check Method In the process of audit management, the related accounting data should be taken as the guide line of the cross-checking relationship and supplemented by the checking method. The check method mainly refers to the use of more than two kinds of written information to carry out relevant cross—checks, to check whether there are differences between the two sides and whether the final calculated data are correct. In the process of checking, relevant problems can be found, and objective and accurate analysis can be carried out on the generated problems to judge the causes of the relevant problems. Through this way to analyze the problem, and use the relevant results to accurately formulate solutions, to minimize the economic losses of enterprises, to ensure the circulation of funds.
Financial Auditing Accounting Method Based on Computer Network
235
3.2 Account Correspondence and Account Analysis In the process of enterprise operation and management, double-entry bookkeeping is the main form of accounting method, which establishes a dependency and comparison relationship between accounts. Such a method is called account correspondence. In the process of auditing, the correspondence between accounts is taken as the main key point, and account analysis can be used in a variety of ways. The account analysis method is mainly based on the correlation of accounts, and finds out the unreasonable phenomena, at the same time, it can accurately and timely find and solve the problems. In the process of accounting, bank deposits and loans are systematically analyzed and managed to check the relevant existing conditions, providing an important guarantee for future inspection and management, finding problems in time and proposing solutions.
3.3 Process Analysis In the process of auditing work, we should regard the internal control system as the main body, and can accurately use the flow control chart analysis method in the process of work, and then strictly examine and evaluate the internal control system of the enterprise. The process analysis method mainly refers to drawing the internal control chart of the relevant project under examination into a matching flow chart, and finding out the relevant problems existing in the project by analyzing the basis of the whole flow chart. The advantage of this method is that it can direct the problems existing in the project more directly and comprehensively, analyze them at the same time and then solve them accurately by writing, and can directly use special colors to mark the errors in the flow chart, thus laying a good foundation for the work of auditors.
4 Accounting Methods in Information Age 4.1 Fair Value Measurement In the information age, fair value has become the main content of current accounting circles. With the development and change of society, historical cost measurement and fair value measurement have become the main contents of discussion. Historical cost measurement method and fair value measurement method are two main methods, but practice shows that the advantages of fair value measurement method are obviously higher than historical cost measurement method. The advantage of fair value measurement is that it can more accurately reflect the business status and
236
X. Ma
liabilities of enterprises. But at present, history metrology still occupies a major position in enterprises and is still the main accounting method in the process of auditing. In the era of information development, accounting systems have been widely used in data processing of various information and have the main feature of automation. Therefore, fair value measurement method is very accurate in data processing.
4.2 Moving Weighted Average Method To a certain extent, the traditional accounting work generally uses the first-in firstout method and the moving weighted average method, which can effectively ensure the accuracy of the data, but also has some shortcomings. For example, in the firstin-first-out method, in the process of using inventory, if the price of inventory is calculated for each use, the operating efficiency of the system will be reduced, and at the same time the speed of accounting will be reduced, resulting in a decrease in the efficiency of audit work. The effective application of weighted average method can not only reduce the workload of auditors, effectively improve the working level and efficiency, and save the cost of enterprises. In the process of using the moving weighted average method, there is also the disadvantage of untimely information, which requires timely updating of the accounting system. In today’s society, the development of cross-level information and data collection is mainly in a dynamic direction. The accounting information system should update the inventory price in a timely manner. The accounting system should realize the automation of mobile weighted accounting to ensure the smooth management of enterprises.
5 Measures to Improve Accounting Level 5.1 To Ensure the Independent Accounting Work The main principles of accounting work are independence, objectivity and accuracy. Enterprises should ensure the independence of the accounting supervision department and realize the function of accounting supervision in the management of enterprises. Therefore, it is necessary to continuously improve the management level of accounting work so that it can be carried out independently. In the daily management and operation of an enterprise, it is necessary to establish a corresponding responsibility mechanism to divide the accounting posts reasonably so that the responsibilities of each post can be accurately implemented. To establish a good power and responsibility system, clear responsibilities of all parts; To ensure that the accounting work can be carried out independently, and clear the relevant responsibility system; To achieve the coordination of accounting work and other departments, and to ensure the independence of accounting work, effectively improve the management level of
Financial Auditing Accounting Method Based on Computer Network
237
accounting work. In the aspect of enterprise management, it is necessary to ensure that the management can have the accounting concept, improve the overall accounting awareness, and improve the supervision system within the enterprise, enhance the supervision level of the enterprise, effectively enhance the economic benefits of the enterprise, realize the development of the enterprise itself, and allow the enterprise to occupy an advantageous position in the stimulated market competition.
5.2 To Improve the Supervision Level of Accounting Work In the operation and management of an enterprise, managers should accurately grasp the actual situation of the company and take this as a starting point to continuously promote the improvement of the supervision and management level so that the supervision system can play an important role in the enterprise. In coordinating the internal systems and relationships of enterprises, it is necessary to ensure that attention is paid to the internal supervision of the accounting work, to build an auditing department, to let the staff of the auditing department carry out accounting in all aspects, to develop problems and solve problems in a timely manner, and to cooperate with relevant departments to supervise the accounting work in all aspects. In terms of management, it is necessary to establish a people-oriented management concept, strengthen the management of enterprise financial personnel, and improve the enterprise financial management system and concept.
6 Conclusion To sum up, under the background of the information age, the operation and development of enterprises are facing various risks and challenges. In order to realize the sustainable development of the enterprise itself, we should strive to improve the level of accounting work. In the process of continuous development of market economy, enterprises should continuously improve their competitiveness, perfect and optimize the accounting system, and continuously carry out skills training in personnel management to improve the professional skills of auditors. At the same time to improve the level of supervision within the enterprise, for the enterprise. Accounting work provides sufficient development space to maximize the economic benefits of enterprises.
238
X. Ma
References 1. Hou, wenchuan. 2017. Research on accounting methods in financial audit. Ten-Day Issue of Corporate Culture (12): 140–141. 2. Li, miao. 2017. Research on accounting methods in financial auditing. Global Market (24): 125–126. 3. Liu, mengting. 2017. Research on accounting methods in financial auditing. Study of Finance and Accounting (7): 114–115. 4. Min, zhihui, lei ao, xia mingyue. 2015. Analysis of accounting methods in accounting audit. Brand (Second Half) (5): 116. 5. Lopes, I.T. 2015. Research methods and methodology towards knowledge creation in accounting. Contaduría Y Administración 60 (Supplement 1): 9–30. 6. Parlakkaya, R., H. Akmese, and K.A. Akmese. 2014. Status Quo of international financial reporting standards and international standards on auditing: A research on the accounting professionals in Konya. Procedia Economics & Finance 15: 1663–1670. 7. Laitinen, E.K. 2014. The association between CEO work, management accounting information, and financial performance: Evidence from finnish top managers. Journal of Management Control 25 (3–4): 221–257. 8. Boritz, J.E. 1986. The effect of research method on audit planning and review judgments. Journal of Accounting Research 24 (2): 335–348. 9. Guanting, Chen. 2007. Positive research on the financial statement fraud factors of listed companies in China. Auditing Research 2 (6): 25–34. 10. Bryant, L. 2003. Relative value relevance of the successful efforts and full cost accounting methods in the oil and gas industry. Review of Accounting Studies 8 (1): 5–28. 11. Baber, W.R., and P.K. Sen. 1984. The role of generally accepted reporting methods in the public sector: An empirical test. Journal of Accounting and Public Policy 3 (2): 91–106. 12. Lin, Z.J., and M. Liu. 2010. The determinants of auditor switching from the perspective of corporate governance in China. Advances in Accounting 26 (1): 117–127.
Wireless Temperature Control System of Big Grain Depot Mingzhi Wang and Xueyi Wang
Abstract It also introduce the working theory and design the method of the temperature system, which working core is AT89C51 SCM. Control system is made up by PC computer and extension computer, the extension respond for monitoring temperature of single depot, the communication method is wireless between main and extension computer, digital temperature sensor DSl8820 collects the temperature signal and transmit the digital signal to SCM, and then the temperature data should be transmit to PC computer by wireless communication module PTR8000. Wireless communication can make the CRC verify and special coding for transmitting data, which enhance the reliability of data transmission. Keywords SCM · Digital temperature sensor DSl8820 · Wireless communication · PTR8000 · Communication
1 Introduction The original grain storage grain test adopts a manual method of sampling the grain divisions of each library, which has a large workload and is not reliable. In recent years, with the development of computer technology and the improvement of measurement technology, the traditional manual method to measure the temperature of grain was gradually replaced by electronic temperature testing equipment. Small grain storage equipment generally uses a small thermometer to detect grain temperature, and large and medium grain storage equipment has been gradually equipped with a microcomputer temperature measurement system. Monitor the grain temperature in the computer room, and use the microcomputer to analyze and compare the grain temperature data.
M. Wang (B) Jilin Teachers’ Institute of Engineering and Technology, Changchun 130052, China e-mail: [email protected] X. Wang Changchun Colored Oriental Casting Ltd, Changchun 130000, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_32
239
240
M. Wang and X. Wang
2 Design of the Monitoring System For the large grain storage area, the controlled objects are dispersed, and the degree of automation is high, the layered system structure and decentralized system installation are adopted. The whole system can be divided into three layers from the structure: the microcomputer system constitutes the upper computer user monitoring layer, and the 89LV51 single-chip system constitutes the main control unit control layer and the extension measurement layer [1]. Master control unit can be used in an extension of master-slave distribution structure of long distance communication through wireless communication. The working process of the system is as follows: the communication of the system adopts the inspection mode, and the PC machine issues a temperature data read command to the main control machine at regular intervals. After receiving the command, the master computer first transmits the most recently measured data stored in the RAM to the PC in sequence [2]. After the completion of the transmission, main control unit sent the first extension read temperature data command, the command via communication microcontroller coding backwardness to wireless transmission module. The first extension sends the received signal to the communication MCU of the extension for decoding, and the decoded command is sent to the extension CPU [3]. After the extension CPU interprets the command, the data stored in the extension SRAM is sequentially uploaded to the master through the code of the extension communication Single chip microcomputer. After the host computer receives the verification and corrects the error, it updates the saved data of the corresponding location in the memory, can then be sent a second extension temperature data upload command, and so on, until all extensions have patrolled. The extension uses the gap of the communication to continuously read the latest temperature value measured by the temperature sensor in the grain store, thereby updating the data in the extension SRAM for the master to read. All commands and data are checked by CRC-16. If the receiver fails to verify the received command (data), the frame data will be discarded and then wait for the next reception. On the other hand, if the sender does not respond to the receiver for a certain period of time, the sender will consider that the previous transmission error will organize the retransmission [4]. If the retransmission fails three times, the sender will abandon the transmission of the command and perform subsequent work. System PC monitoring software using VB software realization, the interface is beautiful and reliable. Thanks to the standard graphical user interface, the operation is very convenient and intuitive. User software functions generally include data reading, display, alarm parameter settings, and so on.
Wireless Temperature Control System …
241
3 The Overall Design of the Extension Project Under temperature measurement task is mainly composed of a machine to complete. The lower position machine is the most complicated part of the whole monitoring system. It mainly completes the multi-point temperature acquisition, measurement line and measurement point selection and data sorting. When the master calls the lower computer, the lower computer sends the data wirelessly to the master. In the extension, the main program of the main MCU 89LV5 1. mainly completes the start of temperature conversion, the acquisition of temperature data, the storage of temperature data, and the main program flow diagram, as shown in Fig. 1. Fig. 1 Master flow chart
242
M. Wang and X. Wang
3.1 Temperature Data Acquisition The temperature sensor uses the digital temperature sensor DSl8820. DSl8820 internal structure is mainly composed of a 64-bit lithography ROM, temperature sensors, non-volatile temperature alarm trigger TH and TL, high speed register of four parts. DSl8820 pins are arranged as shown in Fig. 2. DSl8820 control method: On the hardware, there are two ways to connect DSl8820 to MCU: one is that Vcc is connected to external power supply, GND grounding, the I/O lines connected to the microcontroller. Another is the use of parasitic power supply, the Vcc, GND ground, 0/O is connected to microcontroller I/O [5]. Whether internal parasitic power supply or external power supply, the Xsl-fo line should be connected to the load resistance is about 5 k The DSl8820 has six control commands, as shown in Table 1. The access process for DSl8820 is: first initialize DSl8820, then execute the ROM operation command, and finally execute the memory operation and data operation. Each step of the DSl8820 is subject to strict working timing and communication
I Packaging PI-35 Packaging Fig. 2 DSl8820 pin distribution diagram
Table 1 DSl8820 Control command table Instruction
Contract code
Operation instructions
Temperature conversion
44H
Start DS18B20 for temperature conversion
Read register
BEH
Read the scratchpad 9 bytes of content
Write register
4EH
Write data to TH, The TL byte of the scratchpad
Copy register
48H
Write TH and TL bytes of the scratchpad to E2RAM
Re-adjust E2RAM
B8H
Write the TH and TL bytes in E2RAM to the scratchpad TH, TL byte
Read power supply mode
B4H
Start the DS18B20 to send the signal of the power supply mode to the main CPU
Wireless Temperature Control System …
243
protocols. If the host controls the DSl8820 to complete the temperature conversion process, according to the DSl8820 communication protocol, there are three steps: DSl8820 must be reset before every read and write. Reset after the success, send a ROM instruction, and finally send RAM instructions. This allows the DSl8820 perform scheduled operations.
3.2 Wireless Data Communication The transmission of data is highly susceptible to interference, so the transmission errors are inevitable. PTR8000 has good anti-interference and transmission performance. PTR8000 applies to point to multi-point wireless communication, built-in data protocol and CRC error detection, error free output, monitor the output carrier. Enforcement point to multipoint communication hardware control, comprehensive upgrading wireless module PTR2000 series.
3.2.1
Wireless Transmission Chip PTK8000
PTR8000 is multi-channel multiband, run (1.9 ~ 3.6 V low voltage), 2 ua standby power consumption. Subminiature built-in loop antenna, 430/868/915 MHz highperformance embedded wireless mode stable performance and is not affected by the outside world, is not sensitive to the power supply. Maximum transmitted power + 10 DBM, high anti-jamming GFSK modulation, frequency hopping, 50 KBPS data rate, the only carrier to monitor output, address matches the output, output data is ready. Built-in complete communication protocol and CRC, all of the wireless transmission and transfer can be done through the SPI, wireless communication and SPI communication as convenient. Basic electrical characteristics as shown in Table 2 Table 2 Table of basic electrical characteristics Parameters
Value
Unit
Work pressure
1.9–3.6
V
Maximum transmission power Maximum data transfer (Manchester code) The working current in power output to 10 DBM Working current in a pattern
10
dBm
100
Kbps
11
mA
11
mA
Temperature range
−400 to 85
°C
The sensitivity of the typical
−100
dBm
Working current in power mode
2.5
uA
244
3.2.2
M. Wang and X. Wang
Hardware Design
The hardware interface is shown in Fig. 3. Figure 3 shows the user interface of the PTR8000, which consists of 10 digital inputs and output I/O. It can be divided into three groups according to the work: 1. Model Control This interface is composed of TRX_CE, TX_EN and PWRS. Control of PTR8000 four work modes: shutdown mode and SPI programming model; Standby and SPI programming model; Propagation model; Receiving mode own and SPI programming modes; standby and SPI programming modes; transmit mode; receive mode. 2. SPI Interface Interface SCK, MISO, MOSI and CSN components: in the configuration mode, MCU configures the working parameters of PTR8000 through SPI interface. In the sending and receiving mode, MCU SP1 interface is responsible for the data transceiver. 3. Status Output Interface Provide carrier detect output CD, address matching output AM, output data to the DR. Fig. 3 Hardware interface circuit
Wireless Temperature Control System …
3.2.3
245
Software Design
PTR8000 software programming: because of the high-speed signal processing associated with RF protocol part has been embedded into the module, so the PTR8000 can be used with all kinds of low cost single chip microcomputer [6], and so on high speed processor with DSP systems. VI ’R8000 provides a SPI interface, rate set by the microcontroller itself interface rate decision. AM in RX mode, address matching, and data ready DR signals to single chip microcomputer has been effectively address and data packets, microcontroller through SPI read the received data. In TX mode, automatically generated PTR8000 cow preface and CRC check code, DR prepared data signals to MCU data transmission has been completed. This means that reduce the memory requirements of MCU and reduce the cost of the MCU, and reduce the time of software development [7]. Wireless data transmission system microcontroller software flow chart, as shown in Fig. 4.
Fig. 4 Flow chart of wireless data transmission system’s microcontroller software
246
M. Wang and X. Wang
After power-on, the MCU first configures the VI ’R8000 module, and first sets PWRS, TXEN and TRX_CE switch to the configuration mode. The MCU moves the configuration data into the frrR8000 module through the SPI [8]. After the power-down and standby modes work, the configuration content is still valid, and the configuration data is lost only when the power is removed. When the MCU has data to be sent to the specified node, the address (Tx_address) and valid data (“IX-payload”) of the receiving node are transmitted to the PTR8000 through the SPI interface. The application protocol or MCU settings are connected to the u speed. The MCU sets TRX_CE and TX_EN high to initiate transmission [9].
4 Master Design 4.1 Overall Design In the main control unit, the serial port of the main MCU needs to exchange data with the communication MCU, and also communicate with the computer. The MCU has only one serial port, which cannot meet the needs at the same time. Therefore, a communication selection circuit is used here. Data from the computer sent to the first communication microcontroller RXD side, and then received by communication microcontroller. Wireless communication module receives the data by communication MCU PA sent to the single chip microcomputer to decode, two kinds of data preprocessing controlled by communication. Then the main microcontroller via a serial port to the RXD end, it doesn’t produce cow communication block. Data transmission, the MCU is in a state of active transport, communication circuit can choose transmission selection object.
4.2 Centralized Display and Processing of Data The use of the grain storage monitoring system is ultimately user-oriented, so the development of user monitoring software will determine whether the system can operate conveniently and efficiently. For large and medium-sized grain storage monitoring systems, most of the system designers complete the design tasks of user software. The system host computer monitoring software is realized by VB software, and its interface is beautiful and reliable [10]. Thanks to the standard graphical user interface, the operation is very convenient and intuitive. User software functions generally include data reading and display, and alarm parameters are not set. There are also some software that have a grain analysis decision function.
Wireless Temperature Control System …
247
5 Conclusion In summary, although the design methods of the grain storage monitoring system are not the same, the ultimate goal is the same. At present, many state-owned grain depot and local grain depot is still using artificial temperature management. The use of distributed computer grain storage monitoring system can greatly improve the modern management level of grain storage, save a lot of manpower and material resources, reduce expenses and food losses in food storage. With the modernization of the grain depot, as an automatic monitoring system for grain storage grain, it will have a good application prospect.
References 1. Shousong, Hu. 2007. Automatic control principle. Beijing: Science Press. 2. Jue, Chai. 2009. The principle and application of single chip microcomputer. Xi’an: Xidian University Press. 3. Jiansheng, Chang. 2009. Detection and conversion technology. Beijing: Mechanical Industry Press. 4. Jixiang, Gao. 2006. Electronic instrument design. Beijing: Publishing House of Electronics Industry. 5. Hanfang, Sun, and Xu Aiqing. 1992. Principle and application of MCS-51/96 series microcontrollers, 1st ed. Beijing: Beijing University of Aeronautics and Astronautics Press. 6. Wei, Wu, and Zhang Jing. 1999. Highly stable wireless transmitter module F05A. Modern Communication. 7. Changjiang, Xie, and You Lihua. 1999. Relative humidity measurement using IC sensor. Measurement and Control Technology. 8. Haitang, Zhang. 1999. Visual C++ 6.0 programming guide, 1st ed. Beijing: Aviation Industry Press. 9. Haoqiang, Tan. 2007. C language programming. Beijing: Tsinghua University Press. 10. Haiming, Jing. 2006. Power electronics technology. Beijing: Beijing Posts and Telecommunications Press.
Springback Modification for Biaxial Bending Plate and Its Validation in Multi-point Forming Qingfang Zhang, Hengyi Yuan, Linlin Li, Hongfen Wang and Songqing Liu
Abstract An new algorithm of springback modification is proposed for biaxial bending plate with variable curvature. By the algorithm, the precision forming for Multi-point die can be realized. The idea of discretization is introduced into the algorithm, the whole sheet metal surface was divided into micro-plate elements. The curvature formulas of micro-plate elements were given after springback modification. Based on curvature information of the discrete micro-plate elements, a series of characteristic points obtained by interpolation. Then, The theory of Bezier surface joining is applied to reconstruct the whole bending surface after springback modification. Due to the die surface of multi-point forming is reconfigurable, discrete elements in upper and lower multi-point dies are adjusted to reconstructed surface after modification. According to the compensated and modified shapes, finite element models for multi-point forming are established and analyzed. Experiments have also been completed with multi-point dies. And the results of simulation and experiment are compared with desired shapes, the contrast results show that the springback modification algorithm can effectively controlling forming precision for biaxial bending plate with variable curvature. Keywords Springback modification · Biaxial bending plate · Interpolation processing · Precision controlling
1 Introduction Die surfaces of Multi-point forming (MPF) are composed by discrete punch elements, it is obviously different from traditional solid stamping forming. The contrast between stamping and MPF is shown in Fig. 1, stamping forming with matched solid dies, while MPF with punch matrices. Meanwhile, because of its special forming mode in MPF, elastic cushions are used to restrain dimples. Reconfigurable die surfaces in MPF make flexible and rapid forming more easily. So MPF shows great Q. Zhang · H. Yuan (B) · L. Li · H. Wang · S. Liu Jilin Engineering Normal University, 3050 Kaixuan Road, Changchun 130052, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_33
249
250
Q. Zhang et al.
(a) Solid stamping
(b) Multi-point forming
MPF
(c) MPF die Fig. 1 Contrast between stamping and MPF
advantages in small-lot and individualized production. And the MPF technology is suitable for manufacturing various 3D surface shapes in many fields.
1.1 Precision Forming by Springback Modification Method Springback is always inevitable and it is one of the key problems in MPF and solid stamping, it also impact on the precision of products seriously. Once the springback value exceeds the allowable tolerance, it will influence the whole assembly. Compensation method based on calculated springback value is one of the main modification methods. By modifying and compensating the die surface, the shape after unloading will match well with the target shape, precision forming can be realized. Although MPF has flexible and adjustable characteristics, the springback problem can not be ignored. Iteratively forming technology was used in MPF for controlling springback, its disadvantages are multiple adjusting, materials wasting and a lot of manual works.
Springback Modification for Biaxial Bending Plate …
251
The springback problem of MPF, especially for irregular surface forming, still needs to be solved urgently.
1.2 Some Research on Springback Modification and Precision Controlling In recent years, many studies have been made on springback modification, forming accuracy and springback calculation methods. For example, Liang [1] established a theoretical model to calculate multi-point bend-forming moments and predict springback. Liu [2] proposed a predictive and simplified model of springback, it was used to sandwich sheets forming. Hamid [3] introduced the effects of work hardening and blank holder force on springback, he mentioned a calculated model for springback in U-bending of duplex steel. Alhammadi [4] investigated the influence of various parameters on springback, including die opening height, testing materials, and thickness of sheet metal, etc. Xie [5] simulated the stamping and twist springback, and proposed a new equation for calculating torsional springback, the method is based on three hardening models and calculate the angle between two ends of double C-rail. Wang [6] investigated strategies including ‘squeezing’ and ‘reverse bending’ for reduction of springback in double side incremental forming. Birkert [7] developed a physical compensation method and created compensated die geometries with equal-in-area die surfaces. Jiro [8] carried out a springback cause based on the stress distribution. Hyun Sung [9] thought that springback prediction can be realized well in roll forming, so long as Bauschinger effect, non-linear transient hardening, variable unloading modulus and other parameters of materials can be considered in the simulation. Karsten [10] reported a prediction method of springback behavior for ultra-high strength tension spring by finite element analysis method.
1.3 Establishing Springback Modification Algorithm for Biaxial Bending Plate Although a lot of researches have been made and achievements have been gained in springback modification, the results are dispersive, and the research on biaxial bending plate with various curvature is relatively few. So, springback modification algorithm is established in this paper for irregular biaxial bending plate. Die surface compensation in MPF can be realized more rapidly and easily, validation of the algorithm will be carried out by MPF experiments. By the method, the forming accuracy of multi-point die can be improved, and the target shape can be formed well in one time.
252
Q. Zhang et al.
2 Springback Compensation and Modification Algorithm 2.1 Algorithm for Curvature Before Springback It is assumed that a rectangular plate with thickness t is only subjected to the action of uniform bending moment M x on its opposite edge and M y on the other. Its numerical value is equal to the applied bending moment. For the linear hardening material model, the simplified case of elastic-linear hardening is considered, Linear reinforcement factor is δ. And the bending moments are loaded proportionally. The yield of x and y should occur at the same time. Based on Mises yield criterion and thickness stress integral, the formula of stress distribution moment is: ⎧
1/2 zs ⎪ ⎪ ⎪ Mx = 2 σx bzdz + 2 σs + δσs zzs − 1 bzdz ⎪ ⎪ ⎪ z 0 ⎪ ⎪ s 2 ⎪ ⎨ = Ezs 2 κx + μκy t2 − zs (1 − δ) + δt3 1−μ 4 3 12zs (1)
t/2 zs ⎪ ⎪ z ⎪ σ M = 2 σ bzdz + 2 + δσ − 1 bzdz y y s s zs ⎪ ⎪ ⎪ 0 ⎪ zs 2 ⎪ 2 ⎪ ⎩ = Ezs 2 κy + μκx t − zs (1 − δ) + δt3 1−μ
4
3
12zs
In the formula, σ s is the initial yield stress, μ is the Poisson ratio, σ x is the stress of x axis, while σ y is y axis, κ x is the curvature of bending surface of x axis, while κ y is y axis, E is the elastic modulus, and zs is the length between initial yield fibers and the center surface along thickness directions. Based on Eq. (1) and Mises yield criterion, following equations can be gained: ⎧ ⎪ ⎪ κx = ⎪ ⎪ ⎪ ⎨ ⎪ ⎪ ⎪ κy = ⎪ ⎪ ⎩
2σs σσxy −μ
2 21 λEt 1− σσxy + σσxy 2σs 1−μ σσxy
2 21 λEt 1− σσxy + σσxy
f
=
κx
2 (1−δ)(1+ zts )(1− 2zt s )
=
κy
2 (1−δ)(1+ zts )(1− 2zt s )
f
(2)
where (κfx , κfy ) are curvatures of target shape. The curvatures of springback modification (κx , κy ) are shown as follows: ⎧ ⎪ ⎪ ⎪ ⎪ ⎪ κ = ⎪ ⎨ x ⎪ ⎪ ⎪ ⎪ ⎪ κ = ⎪ ⎩ y
2 2 −1 1− σσxy + σσxy −μ
√ 2 √ σ √ f 3σs σxy −μ + 33 κx Et 1− σσxy + σσxy (cos α3 − 3 sin α3 ) Et 2 2 −1 1− σσxy + σσxy 4σs2 1−μ σσxy
2 √ √ √ f 3σs 1−μ σσxy + 33 κx Et 1− σσxy + σσxy (cos β3 − 3 sin β3 ) Et 4σs2
σx σy
(3)
Springback Modification for Biaxial Bending Plate …
253
2.2 Modification Algorithm for the Construction of Biaxial Bending Surface The idea of discretization is introduced into the algorithm, the whole sheet metal surface is divided into micro-plate elements. The irregular target surface which we need is a given quantity, that is, the curvatures (κfxi , κfyj ) of the micro-plate elements are given. Then, the curvatures (κxi , κyj ) after springback modification can be calculated by Eq. (3). The discrete micro-plate elements which determined by the curvatures in x and y directions, can be regarded as a quadrangle with four control points. According to the interpolation formula, a serious of surface feature points can be described along x and y directions. The curves can be written as follows by interpolation: ⎧
m si i sk ⎪ ⎪ ⎪ ∫ x(s cos ϕ(s κ ds ds = x(s + + ) ) ) 0 0 xi ⎨ i i=1 si−1 k=1 sk−1
m si i sk ⎪ ⎪ ⎪ ∫ z(s sin ϕ(s κ ds ds = z(s + + ) ) ) i 0 0 xi ⎩
k = (1, 2, 3, . . . , i) (4)
k=1 sk−1
i=1 si−1
⎧ j sl n si ⎪ ⎪ ⎪ ∫ κ y j ds ds cos θ (s0 ) + ⎪ ⎨ y s j = y(s0 ) + j=1 si−1 l=1 sl−1 j sl n s j ⎪ ⎪ ⎪ ∫ κ y j ds ds sin θ (s0 ) + ⎪ z (si ) = z(s0 ) + ⎩ s j=1 s j−1
l=1
l = (1, 2, 3, . . . , j) (5)
l−1
where s is the small arc length of every micro-plate surface, ϕ(si ) are the angles between tangent direction of arc s and x axis, while θ (sj ) are the angles between s and y axis. The characteristic points of the plate element are inversely calculated, and a series of characteristic points matrices on the surface of compensating springback are obtained by Eqs. (4) and (5). Then, a smooth and continuous surface after springback compensation can be reconstructed by Bezier surface blending method (as shown in Fig. 2). In Fig. 2, the k × l-th (k = 0, 1, 2, …, l = 0, 1, 2, …, j) Bezier surface blending equation is described in u and v directions: l p=0 q=0 B p,k (u)Bq,l (v)W p,q V p,q k l p=0 q=0 B p,k (u)Bq,l (v)W p,q
k P(u, v) =
(6)
where P(u,v) is the point vectors on surfaces, Vp,q express the control points, W p,q are the weight factors which are bound up with Vp,q , B p,k (u) and Bq,l (v) are Bernstein functions. The whole surface expression is expressed in matrix form as follows:
254
Q. Zhang et al.
Fig. 2 Bezier surface blending
⎤ P0,0 (u, v) P0,1 (u, v) · · · P0, j (u, v) ⎥ ⎢ .. .. .. P(u, v) = ⎣ ⎦ . . . ⎡
Pi,0 (u, v) Pi,1 (u, v) · · · Pi, j (u, v) Construction of Biaxial Bending Surface after springback modification can be realized by Eq. (7).
3 Simulation, Experiment Validation and Error Analysis 3.1 Finite Element Analysis Model MPF which involves large changes of shape, geometric and material nonlinearity, is analyzed by finite element analysis (FEA) software ABAQUS. Die surface information data described by Eq. (7) are imported into MPFCAD software. Based on this, the position information of the punch matrices in the FEA model is determined. In simulation, the dynamic explicit algorithm is suitable for dealing with MPF process (the FEA models of MPF are shown in Fig. 3), two irregular biaxial bending plate (waist drum surface and double wave surface) are simulated and analyzed. And static implicit method is suitable for unloading process. When importing explicit analysis results of forming parts, it is necessary to import the stress and strain data first. Then, removing the multi-point dies and elastic cushion in the process to eliminate the constraints on the sheet metal. At last, imposing appropriate constraints on the sheet metal to eliminate the rigid body movement in the springback process.
Springback Modification for Biaxial Bending Plate …
(a) waist drum surface
255
(b) double wave surface
Fig. 3 The FEA models of MPF
3.2 Simulation Results Figure 4 shows Z-direction displacement of two doubly curved plates. The meshes represent the bending surface before unloading, the color contour represent the final shape after unloading. It can be observed that the curvature after springback is less than that of the sufaces before springback. The maximum springback value of Z-displacement for waist drum surface is 1.34 mm, and double wave surface is 3.47 mm. In order to analyze and contrast the value of errors, maximum error E z is defined, it refers to the maximum Z-direction difference value between simulation and target results. Meanwhile, the formula of relative error E g is defined:
Eg =
m
(Z v − Z v )/
v=1
m
Z v × 100%
v = 1, 2, . . . , m
(8)
v=1
In the formula, the amount of the sampling points is defined m’, Z v represents the Z-direction value of each sampling points in the simulation results, while Z v’ represent the target shape in the same coordinate system.
(a) waist drum surface Fig. 4 Z-displacement distribution
(b) double wave surface
256
Q. Zhang et al.
Table 1 Errors comparison of two surfaces between simulation and target E x /mm
E y /mm
E z /mm
E g (%)
Waist drum surface
0.29
0.35
0.37
1.89
Double wave surface
0.43
0.56
0.69
2.45
Table 1 shows errors comparison of two surfaces between simulation and target. Comparing with the target shapes, the doubly curved plates with springback modification is similar to the target shape, and the error is very small. The maximum error of X and Y axis direction is 0.29 and 0.35 mm for waist drum surface, 0.43 mm and 0.56 mm for double wave surface. Relative error E g is less than 3%. The shapes obtained with springback modification are consistent with the target shapes.
3.3 Experimental Results and Analysis of Springback The die-face of MPF is reconstructed by punch groups. The position for each punch in x and y directions is fixed, and the displacement in the Z direction is controlled during forming. The calculation result of the die surface process is shown in Fig. 5a. According to the height data of punches, the multi-point die is adjusted by the control system. MPF software is shown in Fig. 5b, and the adjusting result is shown in Fig. 5c. The MPF experiments with modification are carried out, formed parts are shown in Fig. 6. The forming trend of parts is consistent with the target shape, and the forming quality is well. In addition, parts without springback compensation are formed with the target surface as the die surface. Comparing the measured three-dimensional surface information with the target shape, the forming errors can be obtained. Errors between measured results and target shapes as shown in Fig. 7. Table 2 provides a list of errors between simulation, measurement and target surface. Two parameters are defined as E 1 and E 2 , E 1 represents the error value between
(a) calculation result
(b) MPF software
Fig. 5 Die surface adjusting of MPF
(c) adjusting result
Springback Modification for Biaxial Bending Plate …
257
Fig. 6 Formed parts
(a) waist drum surface
(b) double wave surface Fig. 7 Errors between measured and target shapes Table 2 Errors between simulation, measurement and target surface With modification E1
Without modification E2
E1
E2
Waist drum surface E z /mm
0.37
0.88
1.26
1.34
E g (%)
1.89
2.35
8.21
9.13
Double wave surface E z /mm
0.69
0.90
1.31
1.41
E g (%)
2.45
2.93
8.25
9.32
258
Q. Zhang et al.
simulation and target, and E 2 is the difference of contrast between measurement and target. According to the results of experiments and simulations, it is found that values of E 1 and E 2 are smaller with springback modification, all less than 1 mm. With modification, the values of E g for two surfaces are all less than 3%, while without modification, E g is relatively larger, about 10% approximately. That means the application of modification algorithm is effectively benefit for precision controlling.
4 Conclusion Springback compensation and modification algorithm of biaxial bending plate are proposed. And the theoretical calculation results are applied to simulation analysis and MPF experiments. By comprehensive analysis between simulation, measurement with modification and target profile, the overall relative errors E g of two surfaces are less than 3%, that is satisfied the industrial production. The forming error of the workpiece without springback modification is larger, which shows that it is difficult to get the accurate target surface. It is also found that the surface after springback modification can match the shape of the target very well, and the error range is small, which also proves that the springback modification algorithm described in this paper has good prediction effect and application value. And the algorithm can also be applied to conventional stamping. Acknowledgements This research was supported by Program for Innovative Research Team of Jilin Engineering Normal University (IRTJLENU).
References 1. Liang, X.B., Z.Y. Cai, and X. Zhang. 2018. Forming characteristics analysis and springback prediction of bi-directional trapezoidal sandwich panels in the multi-point bend-forming. The International Journal of Advanced Manufacturing Technology 98 (5–8): 1709–1720. 2. Liu, J.G., and W. Xue. 2016. Unconstrained bending and springback behaviors of aluminumpolymer sandwich sheets. International Journal of Advanced Manufacturing Technology, 1–13. 3. Hajbarati Hamid, and Asghar Zajkani. 2019. A novel analytical model to predict springback of DP780 steel based on modified Yoshida-Uemori two-surface hardening model. International Journal of Material Forming 12 (3): 441–455. 4. Aysha, Alhammadi, Rafique Hafsa, and Alkaabi Meera. 2018. Abu Qudeiri Jaber: Experimental investigation of springback in air bending process. Materials Science and Engineering 323 (1): 12–21. 5. Xie, Yan-Min, Ren-Yong Huang, Wei Tang, Bei-Bei Pan, and Fei Zhang. 2018. An experimental and numerical investigation on the twist springback of transformation induced plasticity 780 steel based on different hardening Models. International Journal of Precision Engineering and Manufacturing 19 (4): 513–520. 6. Wang, Hongyan, Runfeng Zhang, Huan ZhangQi, and HuJun Chen. 2018. Novel strategies to reduce the springback for double-sided incremental forming. International Journal of Advanced Manufacturing Technology 96 (1–4): 973–979.
Springback Modification for Biaxial Bending Plate …
259
7. Birkert, A., B. Hartmann, and M. Straub. 2017. New method for springback compensation for the stamping of sheet metal components. Journal of Physics: Conference Series 896 (1): 12–67. 8. Hiramoto, Jiro, Masaki Urabe, Akinobu Ishiwatari, and Fusahito Yoshida. 2017. Simple Springback cause analysis using measured shapes of dies and pressed part. Key Engineering Materials 725: 683–688. 9. Hyun Sung Choi, Yoon, Jeong Whan, Lee, Jong Sup, and Kim, Geun Ho. 2019. A Springback prediction of 1.5 GPa grade steel in roll forming process for automotive sill-side inner component. Key Engineering Materials 794: 267–274. 10. Richter, Karsten, Franz Reuther, and Roland Muller. 2019. Simulation-based approach to predict the springback behavior of ultra-high strength spring strips. Materials Science Forum 949: 48–56.
E-crime Management System for Future Smart City M. M. Kamruzzaman
Abstract Architecture of an E-crime management system for future smart city is proposed in this paper. The architecture is divided into four main components: Police Station, Server, Internet and Citizen of smart city. Citizen of smart city can use any type of microcomputer such as: smart phone, tablet, laptop or desktop to register a case from online. Specification of server to make it secure and reliable is listed in this paper. Investigation center is equipped with Forensic Services, Artificial intelligence and Analytics module and connected with the main server. All information related to investigation and criminals can be stored in this system for further proceeding. At present, part of the proposed architecture is designed and implemented which is also described in this paper. Keywords E-crime · Smart city · Management system · Artificial intelligence · Forensic Services
1 Introduction A smart city is a set of artifacts that provides better services for government and private organization such as electricity, transportation, water, sanitation, waste management and so on; reduces useless resource consumption, wastage and overall costs; and makes life easier for people living at that city by using information and communication technologies (ICT). While enhancing facilities through ICT, people and organization are facing complex challenges continuously, including crime and terrorism. Recently, Kenya faced such as terrorist strikes on its cities and coastal towns which has made a big impact on tourism—the second largest contributor to the economy. The Criminal Scene Investigation (CSI) department is usually responsible for recording offences, collecting evidence and looking for criminals and preventing crime. E-crime management system will be used by police force for crime detection, M. M. Kamruzzaman (B) Jouf University, Sakaka, Al-Jouf, KSA, Saudi Arabia e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_34
261
262
M. M. Kamruzzaman
conviction and prevention by gathering and retrieving intelligence-based information from existing records. The proposed system will gather criminals’ information in its own database and it will be linked with the server of smart city where all information of people living at that city is available. The police force will able to get information about any citizen from the database of smart city and identify the offenders by matching information in their own system. The objective of this work is not only identifying criminal but also making a system which will provide complete solution for the work of police station including boo king, investing, managing the cases, case management, investigations, booking systems, storing demographic information in databases, next generation automated biometric identification system, forensic analysis (Latent, DNA), mobile platform, integration and capability of sharing data with global agencies, intelligence reports, and analytics as well as comprehensive ad hoc reporting. The citizen of smart city who registered the case could also get free access for their queries, complaints and improvement at any time from online by login to the system using user name and password. The citizen of smart city could lodge a complaint if they see that there has been no progress made on the case or investigation has not been done properly. Officers in the police force could also monitor the complains and check progress. Numerous features have been included with the proposed system which are absent in present crime management system. For example, webcasting with 3D view which is incorporated with the investigation center to give virtual 3D analysis of crimes scenes and criminal. This system analysis and publishes part of investigation result through online with the help of blogs for enabling people to post ideas, thoughts, and remarks on crime which are linked with facebook, linkedIn, twitter, wikis and other social media. Citizen of smart city can communicate using text or voice chat, video conference through this system. Crime, security and privacy for smart city have been widely studied [1–4]. Intelligent crime prevention technologies & system based on spatial information was explained in [1]. The present condition of security and privacy of smart cities is studied in [2]. Evaluation of cyber risks using artificial intelligence for critical infrastructure has been described [3]. [4] uses mobile and social networking technologies for smart and safe cities. However, to the best of the author’s knowledge, architecture of an E-crime management system for future smart city is unprecedented in the literature which is proposed in this paper.
E-crime Management System …
263
2 Architecture The architecture of proposed E-crime management system for future smart city is divided into four main components (Fig. 1). The following are the four main components: 2.1 Citizen of smart city 2.2 Internet 2.3 Server Setup
Fig. 1 Architecture of an E-crime management system for future smart city
264
M. M. Kamruzzaman
2.4 Police Station
2.1 Citizen of Smart City Any citizen of smart city can submit of Online First Information Report (FIR)/Complaint from online without physically going to the police station. The steps of submitting FIR/Complaint are as follows: – – – – –
Visit this link. It is a form where you have to fill several fields. At first you need to register with this system using username, email and password. Login the to the system using username and password Click on Add Case from menu.
– Write the date of case – Address of place where case occurred. – After
this
you
need
to
describe
your
case
in
detail.
– Set initial state as not resolved – Upload picture or video of crime – Click on save
2.2 Internet Any citizen can use any type of microcomputer such as smart phone, tablet, laptop or desktop to connect with this system using internet. For optimal and recommended performance the proposed system used following specification: – For optimal performance, this system needs greater than or equal to 5Mbps for download and upload. – The recommended internet speed is 1500Kbps for download and upload
E-crime Management System …
265
2.3 Server A secure and easy to handle server is required to host website easily and reliably. Centralized web farm management, powerful admin tools, security and reliability. Issues are taken under consideration to implement the server of proposed system [5]. Those issues are explained in following sections:
2.3.1
Centralized Web Farm Management
Centralized web farm management is considered for the proposed system when servers host multiple instances of an application.
2.3.2
Reliability
There are several issues which have been taken care to ensure reliability of the system such as: routing and load balancing, powerful tools for diagnostic test, compression and dynamic caching, rewriting URL, saving data in local and cloud database, error tracing etc.
2.3.3
Security
Highest concern has been taken on security issues to implement this system such as: providing different privileges to the users, environment for developing the software is separated from testing or producing the software, installing the patches for security on time, monitoring the serve, uninstalling the modules which are not necessary, using strong firewall.
2.3.4
Powerful Admin Tools
A powerful administration tools is used for managing the server. Administrator can easily handle the configuration, user account, diagnostic test, administrative account of developers or content owners.
2.4 Police Station The police station is responsible for checking the online request of FIR. If FIR is valid (all information is available), police will accept and forward it for investigation.
266
M. M. Kamruzzaman
Fig. 2 Process for FIR at police station for E-crime management system for future smart city
Start Login by user (police)
Opening the complaints/ FIR
Not Complete
Verifying the complaints/ FIR Yes Formally accept complaint/ FIR and insert into database
Send back to complainer
Update the status and inform to citizen Send for investigation
Notify citizen after investigation and inform proceedings
End
Investigation department will investigate the FIR and submit the report to the system. An automated email will be sent to the citizen of smart city with required information for preceding the FIR. The process for FIR at police station can be shown by following flowchart (Fig. 2): The police station depends on CIS department for crime investigation reports, criminal personal details, case status, and results of investigation process. Investigation center should be rich with built in state of the art probabilistic matching system including text, images, tattoo matching for finding criminal. To ensure a single click reporting system with transparency and accountability, the proposed system considers following aspects:
2.4.1
Database for Criminal
Investigation Department needs complete data of criminals and crime for performing fruitful investigations. The proposed system has a database to manage criminals and crimes information. The database stores finger prints, name of criminals and crimes,
E-crime Management System …
267
ID card information, passport information, vehicles information; and weapons and threats. Any police station can search records anytime for investigation through online. All authorized users are able to view and comments on important information and share among themselves.
2.4.2
Database for Forensic Services Department
The proposed system also provides a database for forensic services department. This database stores Deoxyribonucleic acid (DNA), fingerprints, facial images for using in future to help police force understanding criminal patterns, identify clues in mysterious cases and incidents [6, 7].
2.4.3
Artificial Intelligence and Analytics Module
This module uses artificial intelligence (AI) with probabilistic analytics to help police for preventing the crime before it happens [8–10]. Third party software will be integrated with this system for getting benefit of AI-driven facial recognition. This software will help to collect video from cameras which are installed at different places in city; find abnormal or unusual behavior; and alerts police if it detects criminal behavior.
3 Implementation Part of the proposed system is implemented for testing using windows 2016 server with PhP and MySql. An Entity Relationship (ER) Diagram is shown in Fig. 3. The login page for this system is presented in Fig. 4. The registration page of this system is presented in Fig. 5. The list of criminal stored in database is presented in Fig. 6. Any citizen of smart city can submit an online FIR using the form shown in Fig. 7.
4 Conclusion Architecture of an E-crime management system for future smart city is proposed and activities of four main components, i.e., Citizen of smart city, Internet, Server Setup and Police Station are described in detailed in this paper. Any Citizen of smart city can use any type of microcomputer such as: smart phone, tablet, laptop or desktop to register and track a case from online. Police stations are connected with investigation center and database of smart city. So proposed system can stop many crimes before occurrence, provide a user friendly interface to handle crime related issues, increase the transparency of FIR handling, and the accountability of police officers. Part of the
268
M. M. Kamruzzaman
Fig. 3 ER diagram for E-crime management system for future smart city
Fig. 4 Login page for E-crime management system for future smart city
proposed architecture is implemented and tested and now we are trying to integrate Forensic Services Department, Artificial intelligence and Analytics module with our system.
E-crime Management System …
Fig. 5 Registration page for E-crime management system for future smart city
Fig. 6 FIR form for E-crime management system for future smart city
269
270
M. M. Kamruzzaman
Fig. 7 Displaying criminals from database in E-crime management system for future smart city
Acknowledgements The authors would like to thank the reviewers for the suggestions which help to improve the quality of this paper. In addition, the authors are also very thankful to Jouf University, Sakaka, Al-Jouf, KSA (No. 40/140) for providing fund and resources.
References 1. WooChul, C., and N. JoonYeop. 2017. Relative importance for crime prevention technologies as part of smart city based on spatial information. In 2017 Smart City Symposium Prague (SCSP), 1–5, Prague. 2. Cui, L., G. Xie, Y. Qu, L. Gao, and Y. Yang. 2018. Security and privacy in smart cities: Challenges and opportunities. IEEE Access 6: 46134–46145. 3. Falco, G., A. Viswanathan, C. Caldera, and H. Shrobe. 2018. A master attack methodology for an AI-based automated attack planner for smart cities. IEEE Access 6: 48360–48373. 4. Ballesteros, J., B. Carbunar, M. Rahman, N. Rishe, and S.S. Iyengar. September 2014. Towards safe cities: A mobile and social networking approach. IEEE Transactions on Parallel and Distributed Systems 25 (9): 2451–2462. 5. Kamruzzaman, M.M., M. Wang, H. Jiang, W. He, and X. Liu. 2015. A web-based remote laboratory for the college of optoelectronic engineering of online universities. In 2015 Optoelectronics Global Conference (OGC), 1–6, Shenzhen. 6. Liu, A., H. Fu, Y. Hong, J. Liu, and Y. Li. October 2019. LiveForen: Ensuring live forensic integrity in the cloud. IEEE Transactions on Information Forensics and Security 14 (10): 2749–2764.
E-crime Management System …
271
7. Taha, K., and P.D. Yoo. April 2016. SIIMCO: A forensic investigation tool for identifying the influential members of a criminal organization. IEEE Transactions on Information Forensics and Security 11 (4): 811–822. 8. Chen, Xue, Lanyong Zhang, Tong Liu, and M.M. Kamruzzaman. 2019. Research on deep learning in the field of mechanical equipment fault diagnosis image quality. Journal of Visual Communication and Image Representation. https://doi.org/10.1016/j.jvcir.2019.06.007. 9. Yin, P., and M.M. Kamruzzaman. 2019. Animal image retrieval algorithms based on deep neural network. Revista Científica, FVC-LUZ/XXIX (2): 188–199. 10. Liang, Rui, Hui Zhi, M.M. Kamruzzaman. 2019. Methods of moving target detection and behavior recognition in intelligent vision monitoring. Acta Microscopica 28 (4): 750–759.
System Dynamics-Based Simulation of E-commerce Industry of Ethnic Regions in China Haiying Ma
Abstract As the national strategic emerging industry, e-commerce industry is attracting more attentions. In order to deeply understand the dynamic mechanism of the E-commerce industry development, this paper divides the e-commerce industry development system into four interrelated subsystems on the basis of system dynamics: technological progress, market demand, economic development and industrial environment. We construct the dynamic model of the E-commerce industry system using MATLAB software, which is guided by the government, technological progress, logistics level. The market demand is variable to design different simulation policies. The corresponding countermeasures and suggestions are also discussed for the development of the e-commerce industry in ethnic regions in China. Keywords E-commerce industry · System dynamics · Simulation
1 Introduction The rapid development of e-commerce has become a significant force of China’s strategic emerging industries. With its openness, high efficiency and global advantages, E-commerce has penetrated into various industries and has become an important area to realize the Internet + strategy. It plays key role in promoting the transformation of economic growth and structural adjustment, and has increasingly become an important engine for promoting the transformation and upgrading of national economy in China [1]. Chinese e-commerce transaction volume reached 20.8 trillion Yuan, increasing 27% over the same period last year. However, the development of E-commerce is confronted with the problems of inadaptable management, the imperfect credit system and irregular market order. Therefore, in order to achieve the coordinated development of e-commerce industry to the economy as the whole, we must thoroughly analyze the development status and the mechanism of E-commerce H. Ma (B) School of Economics, Northwest Minzu University, Northwest Minzu University & the Provincial Key Laboratory of E-commerce of Ethnic Information, Lanzhou 730124, People’s Republic of China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_35
273
274
H. Ma
in China, accurately grasp the interaction between e-commerce and economic growth, and find out the main factors affecting the development of E-commerce in China. This is of great practical significance for optimizing the development environment of e-commerce in China and further improving the quality and efficiency of economic development.
2 Research Status The E-commerce is not an isolated industry or system, rather than industry chain with strong industry-driven and wide-ranging radiation. It is even a complex ecosystem that needs the participation of society, government, service agencies, the public, media and many related industries. Research on e-commerce mostly uses the theory of business ecosystem and industrial chain to analyze. Leong et al. [2] attempted to analyze the development of e-commerce industry by using the theory of business ecosystem, which emphasizes multi-dynamic integration, put forward the concept of e-commerce ecosystem, and summarized the evolution law of e-commerce ecosystem in stages of birth, growth, maturity and decline. Jian et al. [3] constructed a pyramid e-commerce industry chain, and analyzed the market structure and market behavior of e-commerce industry with SCP theory. Wu [4] took the capital of ecommerce as the sample, and by field research on E-commerce related enterprises to understand the development trend of E-commerce to make systematic study of the E-commerce industry chain. Xiao et al. [5] established a constrained selection model and an extended credit risk mechanism for the e-commerce industry and extracted seven industries relating to the E-commerce industry. The application of system dynamics in the research of industrial development system proves its unique superiority. Tang [6] combined the current situation and characteristics of the information resources industry in China and constructed a system dynamic model for e-commerce-based information resources industry, and systematically studied the main influencing factors and trend characteristics of the development of information resources industry in China. Tang and Wu [7] discussed the factors of E-commerce promoting industrialization with the principle of system dynamics, and analyzed the mechanism of e-commerce’s influence on industrialization. E-commerce is a dynamic development system, in which the element changes with time. System dynamics [8] is suitable for studying the dynamic relationship between the structure and behavior of complex systems. It is a feasible attempt to use system dynamics to study the e-commerce industry.
System Dynamics-Based Simulation of E-commerce …
275
3 The System Dynamics Model of E-commerce Industry System Dynamics is an applied discipline that combines qualitative and quantitative methods to analyze social and economic problems systematically. Based on the theory of system feedback control and by means of computer simulation, it studies the dynamic behavior of system development quantitatively.
3.1 Systematic Framework of the E-commerce Industry E-commerce is an important part of the national economy and becoming sub-system of the economic system as a whole [9]. In order to highlight the research, it is necessary to select most closely related factors from a large number of influencing factors to form the research-oriented e-commerce system. The development of ecommerce involves talents, technology, capital, market demand, government policy and economic development, and there is an interactive relationship among these factors [10]. According to the function of elements in the development of E-commerce industry, this paper divides the development system of the E-commerce industry into four subsystems: technological progress, market demand, economic development and industrial environment.
3.2 Causality Analysis of Subsystems According to the subsystems of the e-commerce industry, this paper intends to make a deeper causal analysis of the system. The following four subsystems of the system are analyzed respectively. 1. Technological progress subsystems. The progress subsystem is a subsystem with electronic payment technology innovation, business model innovation and logistics technology innovation as its main content, and it is the core driving force for the development of e-commerce industry. The important feedback loops are: Loop1: Technological progress→GDP→e-commerce strategic position→government support→R&D→industry-university-research cooperation→technological progress. Loop2: technological progress→GDP→e-commerce strategic position→government support→e-commerce training→industry-universityresearch cooperation→technological progress. Loop3: Technological progress→e-commerce development→corporate profit→R&D investment→industry-university-research cooperation→technological progress.
276
H. Ma
The three circuits mentioned above indicate that the improvement of technological innovation level of e-commerce can continuously improve the development level of e-commerce industry. Good user experience comes from excellent technology. Human-computer based websites depends on technology. It will encourage the government to increase investment in e-commerce industry and staffs training. 2. Market demand subsystems. With the improvement of residents’ income level, E-commerce consumption also increases. Online shopping is preferred by consumers because of its convenience and time-saving, and has a huge consumer market. At the same time, with the improvement of information literacy for people, most populations have learned to shop through mobile and computers, and popularity of the e-commerce has become higher and higher. In order to promote industry, the government will also encourage relevant government departments to implement online procurement, and the market demand for E-commerce will be further expanded. Important feedback loops are: Loop1: Market demand→e-commerce transaction volume→e-commerce industry development→contribution coefficient of E-commerce→GDP per capita→per capita consumption expenditure→e-commerce consumer expenditure→market demand. Loop2: Market demand→e-commerce transaction→e-commerce industry development→contribution coefficient of e-commerce→GDP→government policy→national information literacy→e-commerce consumer expenditure→market demand Loop3: Market demand→e-commerce transaction→e-commerce industry development→contribution coefficient of e-commerce→GDP→government policy→government procurement→market demand The above indicate that the government should encourage relevant departments, and to stimulate the market demand for promoting the development of E industry and enhancing GDP. 3. Economic development subsystem. E-commerce industry has become a new driving force of economic growth, which is mainly reflected its contribution rate to GDP growth. The increase of GDP will promote income growth of per capita of residents, and therefore to increase of e-commerce consumption expenditure. At the same time, with the prominent dynamic effect of e-commerce on economic development, the government supports the e-commerce industry. The important feedback loops are: Loop1: GDP→economic development level→government support→Ecommerce transaction→e-commerce sector→e-commerce contribution coefficient to GDP→GDP. Loop2: GDP→GDP per capita→market demand→e-commerce contribution coefficient to transaction→E-commerce→e-commerce GDP→GDP.
System Dynamics-Based Simulation of E-commerce …
277
These two circuits indicate that economic development will promote the development of the e-commerce industry. E-commerce industry not only creates new consumption demand and opens up employment channels, but also accelerates the integration of E-commerce with the manufacturing industry. 4. Industrial environment subsystems. Environmental system is the summarized by industrial policies, laws and regulations to support and guarantee e-commerce industry. Environmental system directly or indirectly affects the development of e-commerce industry by various funds, the talents and logistics services. Important feedback loops are: Loop1: Government support→financial support→e-commerce industry development→e-commerce transaction→e-commerce contribution→GDP→ecommerce industry strategic position→government support. Loop2: Government support→talent support→e-commerce industry development→e-commerce transaction→e-commerce contribution rate to GDP→GDP →e-commerce industry strategic position→government support. Loop3: Government support→improvement of regulations→development of e-commerce industry→e-commerce transaction volume→contribution rate of e-commerce→GDP→strategic position of e-commerce industry→government support. The above three circuits mentioned above indicate that the government can create a good e-commerce environment, enhance the trust of consumers and sellers, enhance the stickiness of consumers online shopping, increase the volume of e-commerce transactions and increase the contribution rate of e-commerce to economy by increasing financial support, strengthening the cultivation of ecommerce talents and improving laws and regulations.
3.3 Variable Determination and Model Construction Based on the above analysis, this paper changes the variables of each sub-system to adapt the integration of the system, and determines the level variables, rate variables and auxiliary variables of the model. In addition, because many variables in the system will change over time, the exogenous variables are chosen to represent the properties of these variables with time. Based on the above analysis, this paper constructs the system flow model of the e-commerce industry. The system dynamic lays more emphasis on the composition of the model, and studies the trend and fluctuation. The specific form of the function does not affect the analysis process and conclusions. The paper also selects 2005–2014 as the research period. The data mainly derived come from China Statistical Yearbook, China Ecommerce Development Report, and the E-commerce Survey Report 1997–2009 in China. It is difficult to get exact values for some parameters. This paper will make reasonable estimates through simulation and continuous adjustment of empirical
278
H. Ma
Table 1 Model variable and equations 错误!链接无效 Variable name
Type
Variable calculation equation
DGP
State
INTEG (GDP increase, 184937. 4)
E-commerce production value
State
INTEG (increased output value, 7400)
Number of practitioners
State
INTEG (the increased number of employees, 238)
Logistics level
State
Market demand factor × Logistics level factor × Human resource factor × Government guidance coefficient × Technology progress factor × Informatization factor
Increase in output
Rate
GDP × contribution coefficient of electricity to GDP
GDP increase
Rate
E-commerce practitioners × Employment growth rate
Increase employees
Rate
14. 104 × R&D expenditure + 27882
Technological progress index
Auxiliary
WITH LOOKUP (Technical Level Index, ([(0,0. 8)—(900000,0. 9)])
Technological progress factor
Auxiliary
WITH LOOKUP (information level, ([(0,0. 5)—(20,0. 8)])
Informatization factor
Auxiliary
WITH LOOKUP (logistics level, ([(1,0. 6)—(20,0. 8)])
Logistics factor
Auxiliary
WITH LOOKUP (logistics level, ([(200,0. 6)—(4000,0. 8)])
data. The calculation equations of the main variables in the model are shown in Table 1.
3.4 Model Validity Test In order to verify the validity and reliability of the model and ensure that the running data of the model can truly reflect the reality, we compare the simulation data of the model with the historical data. This paper chooses the gross GDP as the test variable and takes 2005–2014 as the test period. The simulation value of the model is compared with the actual value, and the relative error of the parameters is calculated. The test data are shown in Table 2. From the data in the table, it can be seen that the relative error between the simulation value and the actual value of the model is 4.74%. The minimum value is 0.02%, and the error is not more than 5%, which is within the allowable range. It shows that the simulation result of the model is in well consistent with the actual value and has a certain degree of authenticity and validity, which can be used to judge the future development trend of the system.
System Dynamics-Based Simulation of E-commerce …
279
Table 2 Comparisons of actual GDP data with simulation data Year
GDP real values (hundred million)
GDP simulated values (hundred million)
Relative error (%)
2005
184.937
184.957
0.01
2006
216.315
217.541
0.34
2007
265.71
259.591
2.34
2008
314.257
314.548
0.13
2009
340.597
360.478
4.74
2010
401.625
382.641
4.62
2011
473.104
460.214
2.74
2012
519.547
525.478
1.22
2013
564.217
547.369
3.47
2014
634.154
636.485
0.02
4 Model Simulation Results and Policy Analysis According to the above analysis, the system dynamics model of e-commerce industry constructed in this paper would simulate the interaction between the e-commerce industry and economic development in China. The simulation results of the main variables of the model show the trends of GDP, E-commerce output, logistics level and the number of e-commerce practitioners shown in Fig. 1. The following conclusions can be drawn:
Fig. 1 Simulation results
280
H. Ma
(1) According to the data of statistical yearbook, GDP has maintained a steady and rapid growth from 2005 to 2015. The simulation results of the model accord with the actual situation. It is predicted that China’s GDP will continue to grow steadily from 2015 to 2020, which is also in line with the experts’ prediction of the future economic development situation. The e-commerce industry in promoting economic development will increase, and the strategic position of e-commerce will become increasingly prominent. The government should gradually increase its investment in E-commerce industry to provide strong financial and policy support for its development. (2) From 2005 to 2020, E-commerce output will continue to rise steadily. After the exploration and rational adjustment in the Tenth Five-Year Plan period, e-commerce began to enter the track of pragmatic development. In 2005, the volume of e-commerce transactions was 74 million Yuan, and in 2008, the scale of e-commerce transactions exceeded 100 billion Yuan. From 2005 to 2008, the central government issued a series of policy to support the development of e-commerce. These policies and measures have further improved the environment for e-commerce and enhanced people’s awareness of its application. In order to cope with impacts of international financial crisis, the central government popularized the application of e-commerce in small and medium-sized enterprises through practical financial support and other means. In 2015, ecommerce transactions reached 18 trillion Yuan. According to the simulation trend, the transaction volumes will exceed 40 trillion Yuan in 2020. (3) The simulation results of logistics level show that China’s logistics service level is steadily increasing. From 2005 to 2015, although the growth rate of logistics level in China fluctuates, the overall trend is better, and the growth rate has increased since 2015. It is predicted that logistics will continue to grow rapidly in the period of 2016–2020, and the growth rate will increase steadily. (4) The simulation results of the number of e-commerce practitioners show that the demand for e-commerce practitioners keeps growing in 2005 to 2015. In 2005, the number of E-commerce practitioners increased from 2.38 million to more than 20 million by 2015. With the continuous expansion of e-commerce, local governments vigorously promote e-commerce development. E-commerce has a strong driving role for related industries, which will generate a large number of employment demands. It estimated that the number of E-commerce practitioners will exceed 30 million by 2020.
5 Conclusions This paper uses MATLAB software to model and simulate different simulation policies with government guidance, technological progress, logistics level and market demand. We found that the development of e-commerce industry is affected by many factors, and needs to optimize policy regulation and resource allocation according
System Dynamics-Based Simulation of E-commerce …
281
to the mechanism of each factor. Among them, government guidance, logistics level and technological progress can have a greater positive effect on the development of E-commerce industry, while the government guidance coefficient is the most sensitive policy variable in industrial development, and sensitivity of logistics level is higher than that of technological progress. Therefore, we should improve supporting policies of e-commerce industry, and build a logistics distribution system suitable for the development of e-commerce, speed up the development and application of information technology. Acknowledgements This work was supported by Laboratory Opening Project 2019, the Gansu Provincial Key Laboratory of E-commerce of Ethnic Information of Northwest Minzu University (Grant No: 2019-1), and by The Funds of Central University of Northwest Minzu University (Grant No: 31920190063).
References 1. Ministry of Commerce: Guidelines for the Development of Electronic Commerce in the Twelfth Five-Year Plan, Beijing (2011). (in Chinese). 2. Leong, C., S.L. Pan, and S. Newell. 2016. The emergence of self-organizing e-commerce ecosystems in remote villages of China: A tale of digital empowerment for rural development 40 (2): 475–484. 3. Chen, Jian, Yin Tang, and Jinyu Yang. 2018. A survey of system dynamics in B2C e-commerce business model. Modern Economy 9: 830–852. 4. Xianfeng, Wu, and Guozhu Wang. 2018. Analysis on development strategy of agricultural products e-commerce supply chain based on system dynamics. World Scientific Research Journal 4 (5): 137–155. 5. Xiao Qiang, Liao Hui, and Qian Xiao-dong. 2013. System dynamics simulation model for the electronic commerce credit risk mechanism research. International Journal of Computer Science Issues 10 (2): 33–40. 6. Shoulian, Tang, and Wei Muhua. 2014. System dynamics simulation of information resources industry in China. Information Science 14 (4): 16–20. (in Chinese). 7. Tang Panpan, Wu Liang. 2014. Study on the mechanism of the impact of emerging E-commerce on the industrialization of underdeveloped areas. Management Journal 20 (8): 1143–1149. (in Chinese). 8. Qipan, Wang. 2009. System dynamics. Shanghai: Shanghai University of Finance and Economics Press. (in Chinese). 9. Hu, Ganglan, Xianghua Lu, and Lihua Huang. 2009. E-commerce ecosystem and its evolution path. Economic management 26 (6): 110–116. (in Chinese). 10. Ying, Cheng. 2011. SCP theoretical analysis of China’s e-commerce industry. Contemporary economy 24: 116–119. (in Chinese).
Vehicle Safety Reminder System Based on Single Chip Microcomputer Yunlu Lu, Xuefeng Tan, Mengting Luo, Linchao He and Haibo Pu
Abstract With the popularity of smartphones and the popularity of Weibo WeChat, many people today cannot do without mobile phones. When walking and gathering, it became a “low-headed family”. When driving, it became a “low-headed driver”, laying a huge hidden danger to road traffic. The car safety alert system selects STC’s STC89C52 single-chip microcomputer as the controller, HC-05 master-slave integrated Bluetooth module, and the smart car speed measuring module for the overall design of the hardware system. After the hardware and software design is completed, debugging, repeated tests, continuous improvement of software design issues, and the expected on-board safety alert system requirements. Keywords Playing mobile phone while driving · Single chip microcomputer · Reminder system · Android system
1 Introduction According to a survey commissioned by Ford Motor, 59% of Chinese drivers saw WeChat during driving and 31% played self-portraits or photographed. Studies have shown that when a driver is texting while driving, the chance of a car accident is 22 times higher than usual, and the chance of a car accident is 2.8 times that of normal driving [1], Solving the phenomenon that drivers drive to play mobile phones has become a more pressing issue. At present, there are vehicle intelligent defense driving systems for vehicle driving analysis and driving mobile phone bad behavior warning system, relying on vehicle networking and artificial intelligence technology, through the supervision and reminder of background administrators, to solve the main problems faced by current vehicle safety management [2], But the system involves labor and is currently not heavily put into use; Motor vehicle driving fatigue recognition system, starting Y. Lu · X. Tan · M. Luo · L. He · H. Pu (B) College of Information and Engineering, Sichuan Agricultural University, Yaan 625014, China e-mail: [email protected] Key Laboratory of Agricultural Information Engineering of Sichuan Province, Yaan 625014, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_36
283
284
Y. Lu et al.
from facial feature detection and identification, designing fatigue driving detection system [3], But the system processing speed is lower; There is a big gap in the form of passive warning system such as automobile driving monitoring system, and there is a big gap in the warning and warning system for the poor use of mobile phones by drivers. Lightweight intelligent traffic applications are now gradually being used, such as “air traffic police” multi-rotor drones [4], Lightweight intelligent applications such as artificial intelligence-based fatigue inspection systems have filled some of the blank intelligent safety traffic market, but the smart safety traffic application for driver’s safe driving assistance reminders is still blank. This design is designed to solve the problem of the driver driving the “low-headed family”. The alarm is used to alert the driver, and the alarm sounds the attention of the passengers, reminding the driver to pay attention to safety, thus achieving a double warning effect. This system fills some gaps in China’s intelligent traffic safety, and improves the intelligent transportation system. It has high scientific and advanced performance in the market. The system optimizes the judgment of vehicle driving status, and combines Bluetooth and mobile phone software. The list is a combination of practical and technical lightweight applications, and it is also highly scientific and advanced in technology.
2 System Hardware Design 2.1 Speed Measuring Module Unit The speed sensor module uses a Hall-type speed sensor, as shown in Fig. 1. The Hall speed sensor is mainly composed of a power supply voltage adjustment circuit, a Hall probe, an amplifier, a filter, a comparator, a digital signal processing circuit, and an AD converter DA converter. And so on. Hall sensors have many advantages, such as simple structure, good robustness, high reliability, long life, low power consumption, wide temperature range, strong anti-interference ability, resistance to dust and oil corrosion [5].
+5V
Hall sensor
C1
Fig. 1 Hall-type speed sensor circuit diagram
C2
Vehicle Safety Reminder System …
285
The input shaft of the magnetic turntable is connected to the measured rotating shaft. When the measured rotating shaft rotates, the magnetic rotating disc rotates accordingly. The Hall switch integrated sensor can generate a corresponding pulse when each small magnet passes, detecting the unit time. The number of pulses to calculate the speed of the car. In the physical structure, since the front wheel is mainly responsible for the steering of the car, the front wheel will rotate from time to time, and the detecting device is mounted on the rear wheel [6]. The signal directly from the sensor is very weak, so it must be amplified by a triode. The amplified signal does not change rapidly from 0 V to 5 V—a voltage signal that is easily handled by the microcontroller [6].
2.2 MCU Information Processing Unit The system uses STC89C52 type MCU, 8-bit CPU; has 32 general-purpose I/O ports, on-chip oscillator, working frequency is 12 MHz; with 4 K bytes of EEPROM storage space; full-duplex serial communication. The STC89C52’s operating temperature range of 40 °C to +85 °C, can meet the requirements of automotive applications. The core module of the single chip microcomputer can be composed of a minimum system, and is composed of a single chip core, a power supply circuit and a buzzer circuit. The Bluetooth module uses the HC-05 module. The HC-05 module is a highperformance master-slave Bluetooth serial port module that is compatible with the microcontroller system. It also inputs the electrical signal through the P0.6 and P0.7 ports of the single-chip microcomputer to make it work normally [7]. The STC89C52 can process the signals converted by the HC-05 Bluetooth module and the Hall-type speed sensor in real time after the logic operation, and control the operation of the alarm unit. The program uses the processing method of the time slice and runs once in l0 ms [8].
2.3 Safety Reminder Unit The system safety prompt unit is composed of a buzzer module. The buzzer is a sounding element, and a DC voltage (active buzzer) or a square wave (passive buzzer) can be applied to both ends to sound. The buzzer drive circuit generally includes the following parts: a triode, a buzzer, and a current limiting resistor. The transistor Q1 acts as a switch, and the low level of the base causes the triode to be saturated and conducts, so that the buzzer sounds; and the base high level turns off the triode, and the buzzer stops sounding [9]. A waveform that matches the frequency required by the buzzer is generated by the timing flip level, and this waveform is used to drive the buzzer to act as a cue. The circuit is shown in Fig. 2. The STC89C52 calculates
286
Y. Lu et al.
VCC
Fig. 2 Buzzer structure diagram
Q1 R17 3TY
R19
a speed of 20 km/h, and the Bluetooth module sends a buzzer to remind the driver not to play the phone again after sending the driver’s signal to play the phone.
2.4 Bluetooth Module Design and Implementation The Bluetooth module uses the HC-05 module, and the HC-O5 is a master-slave Bluetooth serial port module. Normal power supply voltage: 3.3 ~ 3.6 V, HC-O5 can be set as the sender or receiver. The sender can communicate with the receiver, and the sender and the sender cannot communicate with each other or between the receiver and the receiver [10]. The mobile phone sends various AT commands to control the Bluetooth module through the serial port. The TTL module is connected to the Bluetooth module, and the connection mode is as shown in Fig. 3. Open the serial port debugging assistant, enter the AT command mode; set the serial port baud rate 9600, no check digit, no stop bit; modify the Bluetooth name, password; set the Bluetooth master-slave mode (1 master 1 slave); realize the master-slave module Bind Fig. 3 Bluetooth module and TTL module connection
Bluetooth module
USB to TTL module
RXD
TXD
TXD
RXD
GCC
5V
GND
GND
Vehicle Safety Reminder System …
287
(two modules implement transparent transmission). After the setting is completed, the vehicle end and the user end communicate with each other through the Bluetooth module.
3 System Principle and Implementation 3.1 System Working Principle When the driver sits in the driver’s seat and starts the engine, the car prompts the owner to use the “do not play” APP to connect to the Bluetooth. If the driver chooses not to connect to the Bluetooth, the car will not be prompted until the next start; if the driver connects the Bluetooth, the car safety system start up. First, the driving safety system detects the vehicle speed through the speed measuring sensor, and transmits the data to the single-chip microcomputer through the serial interface, and the single-chip computer transmits the data to be processed, and then sends the data to the mobile phone through the Bluetooth serial port. The “Do Not Play” app divides the mobile phone software into two categories: whitelist software and blacklist software. The whitelist is navigation software such as “Gaode Map” and “Baidu Map”, and the blacklist is “WeChat” and “Weibo”. Entertainment software such as “vibrato”. When the “Do Not Play” APP detects that the car speed reaches 20 km/h and detects that the driver is playing blacklist mobile phone software, the “Do Not Play” app will transmit the information to the MCU via Bluetooth. The MCU processes the received information, triggers the buzzer at the same time, and sends feedback to the mobile phone, and the mobile phone vibrates. The alarm sound and vibration play a role in reminding the driver that he should not play the mobile phone during driving, and cause other passengers to be alert and urge the driver to play a dual role. Its system structure block diagram is shown in Fig. 4. power supply
Power client (phone)
Fig. 4 System block diagram
Bluetooth module
Single chip
Car speed
microcomputer
measuring module
288
Y. Lu et al. Mobile app and Bluetooth connection
no
Whether the speed reaches 20km/h
no
Security reminder system not activated
Security status
yes APP background monitoring whether there is software running
no
yes Mobile phone vibration + car alarm
Fig. 5 System work flow chart
3.2 APP Design and Implementation The mobile app is called “Do not play”. The app has the following four functions: Bluetooth connection, detection of active apps in the background, vibration and voice prompts. Open the “Do not play” APP. When the user clicks the link Bluetooth, the interface will display the current speed and blacklist after the connection is successful. If the user does not connect to the Bluetooth, the upper end of the APP will appear “Traveling, please connect Bluetooth”. When the car speed reaches 20 km/h and the user is using the entertainment software in the “blacklist”, the phone will issue a warning. The system work flow chart is shown in Fig. 5.
4 Conclusion This design adopts AT89C52 single-chip microcomputer as the main control chip of the system. It is designed to monitor the state of driving. The system has the advantages of low price, small size, easy placement, high precision and strong stability. The voice prompt function and alarm function of the system have positive auxiliary functions for the driver to drive safely. This design proposes a brand-new car safety solution, which combines Bluetooth communication technology with Hall sensor and cooperates with the control technology of single-chip microcomputer to complete the real-time detection and warning of the driver. It opens up new models for automotive safety systems and is highly value-for-money. In practical applications,
Vehicle Safety Reminder System …
289
it can be modularized and fixed in the interior of the car. Nowadays, most of the cars are equipped with a speed measuring module, so the Hall sensor can be omitted in the modular installation, and mass production can be realized. Acknowledgements This work was supported in part by the Google supports the project of the National University Student Innovation and Entrepreneurship Training Program Joint Fund of the Ministry of Education (Grant No. 201801006096), and in part by the Lab of Agricultural Information Engineering and the Sichuan Provence Department of Education (No. 17ZA0297).
References 1. Wangqun, Song. 2018. Drivers playing mobile phones while driving, the probability of accidents increased 22 times. Safety and Health 453 (9): 39 (in Chinese). 2. Xiaofeng, Wang, and Zhu Zhijie. 2018. Vehicle safety management and intelligent defence driving system application. Journal of Highway and Transportation Research and Technology (11): 324–326 (in Chinese). 3. Huaiyang, Han, and Wang Xiuli. 2016. Research on motor vehicle driver’s fatigue driving detection system. Internal Combustion Engines and Parts (10): 6–7 (in Chinese). 4. Jianguo, Mao. 2018. Going to drive a mobile phone like a drunk driving. Zhejiang People’s University 195 (9): 56–57 (in Chinese). 5. Xifu, He. 2013. Introduction to principle and algorithm of hall sensor. Electronic Products World (8) (in Chinese). 6. Chaosheng, Wang. 2007. Design of a smart car system based on 16-bit single chip MC9S12DG128B, Tianjin Polytechnic University (in Chinese). 7. Qiuxian, Yang. 2018. Design of reversing distance measuring system based on SCM. Modern Industrial Economy and Informatization 8 (16): 47–48 (in Chinese). 8. Enmin, Sun. 2018. A driver’s drinking detection system based on single chip microcomputer. Automobile Practical Technology (1): 179–181 (in Chinese). 9. Ziyang, Liu, Su Wei, Chen Wantong. 2018. Design of anti-drunk driving system based on MCU. Electronic Technology 47 (512 [8]): 64–66 (in Chinese). 10. Yanyan, Liu. 2018. Design of smart car based on Bluetooth remote control. Wireless Interconnect Technology (9) (in Chinese).
Regional Cooperative Strategy of Social Public Service Under the Background of Cloud Computing and Big Data Environment Jianbo Li and Xiaohua Li
Abstract Cloud computing and big data promote the development of serviceoriented society and drive regional information sharing, service and social interconnection with large scale and new mode, which provides technical support and reconstruction platform for the digitization of social public service, networked development and regional collaboration. Based on this background, this work started from three aspects: strategic environment, strategic framework and combat realization path, and constructed the regional cooperative strategy of social public service under the background of cloud computing and big data environment, aiming to promote the adoption of cloud computing, big data integration and public service value innovation of social public service organization. Keywords Cloud computing · Big data · Public service · Rational cooperative strategy
1 Introduction Offering public service is an important function of the government. The construction of public service platform based on cloud computing and big data is not only the informatization of public service organization means, but also a measure to promote the reform of equal distribution system of public service resources [1]. In the public service platform, the huge scale, zero-distance interaction as well as convenient transaction rules and processes will reduce the threshold of innovation and entrepreneurship, promote the sharing and opening of resources, activate the participation of different subjects and realize the diversified supply and comprehensive management of public services, which provides an important way for service-oriented governments faced with “public tragedy” and “government failure” [2]. Large-scale J. Li · X. Li (B) Hunan University of Arts and Sciences, Changde, Hunan Province, China e-mail: [email protected] J. Li e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_37
291
292
J. Li and X. Li
and intelligent operation of social public service cloud and big data can also accelerate the linkage among government, society and enterprises, lay an information foundation for the circulation of resources, elements and services and the formation of integrated channels of regional economy, and contribute to the development of regional cooperation and cooperative development.
2 Research on the Regional Cooperative Strategic Environment of Social Public Service Led by Cloud Computing and Big Data In terms of specific policies, the state and related departments have issued a series of development guidance and management regulations based on the Internet, cloud computing and big data. Since the beginning of 2015, the documents of Opinions of the State Council on Promoting the Innovative Development of Cloud Computing and Cultivating the New State of Information Industry, Regulations on the Management of Internet User Account Names and Opinions of the General Office of the State Council on Using Big Data to Strengthen the Service and Supervision of Market Subjects have been issued one after another. Behind these policies, some departments and localities have done a large number of pilot projects for related issues in advance, and accumulated corresponding experience [3]. The adoption and application process of cloud computing and big data is the diffusion process of new information technology innovation in political, social and economic fields, which leads to the revolution of information and communication technology. In addition to the core data and computing platform, 3D printing, WEB2.0, Internet of things, robot and other technologies have formed a peripheral support technology network and associated technology groups. They take the mobile Internet as the main channel and achieve the continuous learning of technology through integrating super large demand flow and resource pool. Open continuous service can destroy the original closed product version, form an Internet-based product ecosystem, form a computing platform and achieve integrated innovation through the integrated Internet technology, service architecture and cluster computing [4]. Cloud computing and big data have changed the measurement standards and trading rules of information service and products, leading to the measurement and transaction mechanism based on service-level agreement and virtualization sharing. The measurement technology and technical standards of cloud computing and big data service are important strategies for technological innovation and management. Using virtual machine as measuring tool and delivering virtual machine resources according to service agreement are the new rule of information service in cloud computing and big data environment.
Regional Cooperative Strategy of Social Public Service …
293
3 Regional Cooperative Strategy Framework of Social and Public Services Under the Background of Cloud Computing and Big Data Under the background of big data and cloud computing, the innovation of social public service content, ability and value depends on the cooperation of resources, relationships and networks. The cooperation of service resources is centered on coordinated sharing, the cooperation of service relationship is centered on synchronous cooperation, and the cooperation of service network is centered on collaborative creation [5]. This three dimensions measure and coordinate the content, ability and value of service, and realize the social value innovation goal of public service regional cooperation. The differences of different regional resources complement each other, coordinate demand and supply capacity, coordinate related resources to form a resource pool, and then implement hierarchical allocation standards. Constructing resource base based on cloud computing and big data, realizing the resource digital and unified allocation mechanism through information coding, and using efficient query, consistent distribution and long-term maintenance can create new service value. Such mechanism facilitates the construction of long-term allocation standards, the implementation of minimum standards, and consistency stratification and grading. The governance ability of public services depends on the continuity of inter-regional policies [6]. Implementing consistent policies and regulations within a certain region is beneficial to reducing the governance consumption caused by regional segmentation. Therefore, synchronously implementing the supporting and supply system of resources is important for the cooperation among regions and the improvement of public service governance ability. In terms of value, it is of great significance for the public service market to reorganize the value activities and the value exchange relationship with the network system. The public resource market based on the network system takes the process of co-creation as the starting point. The competition and cooperation among the network nodes can improve the efficiency and sharing value of the network resources, create the value of joint participation of the service network, give full play to the free mechanism and co-creation effect of the network and construct the cooperative direction and strategy of social public service [7].
4 Realization Path of Rational Cooperative Strategy of Social Public Service Under the Background of Cloud Computing and Big Data Cloud computing and big data have accelerated the digitization path of material, process, relationships and networks. Particularly, with the development and application of the Internet of things, 3D printing and social media, material resource, social service and national government affairs have been further digitized. The whole social
294
J. Li and X. Li
public service system has been virtualized, therefore, the cloud service among the objective organization, the social organization and the government department needs to be classified, layered, distributed and integrated. Planning regional climate, land, energy, infrastructure and other material data can achieve the maximum level of material sharing and use value [8]. Based on avoiding repeated construction and invalid replication, a personalized distributed social network can be built and the complementation of professional and large-scale service can be realized. The overall planning of material resource focuses on policy cooperation. The government should promulgate long-term policies, systems and mechanisms consistent with the sharing and distribution of material resources, introduce short-term guidance and quasi-regulatory documents to coordinate local conflicts and support complementary advantages, resource linkage and capacity symbiosis of the system operation from the level of material and organization. Respective service resources and capabilities should be coordinated around the social structure, social form and social organization to realize the cloud resource sharing and cloud service coordination of social organizations. International cooperation should be carried out based on social organizations to integrate domestic and foreign resources and optimize the resource structure. Social public service demand should be predicted by using social structure, population resource base should be built based on cloud computing to achieve the overall planning of service requirements, and a unified service platform for population, resources and environment should be established based on intelligent medical cloud [9]. In addition, changing serial government examination and approval into network political consultation and parallel evaluation based on material and social planning is conductive to completing the overall planning and coordination of government departments, social organizations and material entities. Cloud computing and big data are an open environment, and the basis of overall planning resources is to establish a standardized system to achieve sharing and co-creation of the service platform based on relevant standards. In the current standardization regulations and practices, the standards of cloud computing and big data should be gradually changed from recommended standards to guiding standards and mandatory standards, which is the need of national technology strategy and national security. In a unified standardization environment, the government can reduce the threshold of mass innovation and entrepreneurship by building a standardized cloud service platform and providing big data mining services. Current systems, such as Government Procurement Cloud Service Guide, Information Security Technology Cloud Computing Service Security and Ability Requirements of Information Security Technology and Cloud Computing Service Security, have corresponding regulations on the meaning and process of use, but lack the integration standard of cloud and noncloud resources and the standard of value creation behavior in cloud use. From the perspective of operations, management and services, the standard system of cloud computing and big data has not yet been formed, and cross-regional cooperation needs to be implemented. At the level of service value innovation, standards are also an important basis for cloud computing and big data to achieve social value. The standard reduces transaction cost and uncertainty cost by unifying measuring units
Regional Cooperative Strategy of Social Public Service …
295
and standardizing transaction rules, which brings economy of distance and benefits of scope based on platform [10]. Facing the globalization and networking of resource competition, simplifying the information development mode and optimizing the service mechanism are the important foundation to reduce the information cost and enhance the information ability. For the regional sharing of social services, cloud computing and big data bring new ideas, platforms and efficient tools for information path optimization. The path of first constructing, then using, and finally maintaining and updating results in idle resources, limited time and site segmentation. The mode of building while using can be explored based on cloud computing and big data. This model has irreplaceable advantages in risk prevention, efficiency improvement and resource allocation. Facing the bottom-up informatization path, cloud computing and big data need top-level design to produce strategic value. In the experience of optimizing the service, both big data and cloud computing need open, free and cheap Internet, and the recent network fee adjustment and Internet security team are both the pioneers to simplify the path and optimize the service. Data is the important strategic resource at present, and geographical data, population data and other basic data play a more and more important role in national strategy, business development and resource utilization. Consumption data, communication data and other social data are also of unprecedented value in the process of national governance and enterprise management. Establishing data protection law and maintaining Internet security are the inevitable requirements of governing the country according to law. Big data and cloud computing have subverted the progressive structure of original data, information, knowledge and wisdom, and have realized the comprehensive innovation of big data and service through free combination and omni-directional openness. Data tends to be more factual than information and knowledge, and can express the law and describe the essence more. The value of big data focuses on the original ecology and comprehensiveness. The upgrade from sample to overall is the transformation from phenomenon to essence and the generalization from causality to relation is the transformation from constraint to freedom [11]. The interactive development of big data and cloud computing needs the reflection of law and morality, and this process needs the law as the backing of long-term development to realize the integration of legal equality rules and moral freedom spirit an to recreate the new value and business culture of Internet freedom, sharing and low price led by the call and guidance of morality.
5 Summary The adoption of cloud computing and the emergence of big data environment, the pace of social progress has been accelerated, the social service has been enriched, and the demand form, the delivery environment, the experience content and the social value of social public service have been faced with unprecedented development opportunities. With the rapid development and wide application of the Internet, the economic value
296
J. Li and X. Li
of cloud computing service and big data has gradually become prominent. Recreating the public service system through cloud computing and big data, migrating these services to the cloud and carrying out the innovation of social public service based on data are conductive to realizing the sharing of public resources, the super value experience of service and the harmony and progress of society. Acknowledgements General project of hunan department of education “Research on regional collaborative strategy of social public services in the context of cloud computing and big data” 18C0745,Research project on teaching reform in colleges and universities of hunan province, Practical research on information teaching of interdisciplinary specialty [2018,543]
References 1. Jujun, Zhao. 2016. How to promote the rational coordinated development through the adjustment of administrative division—A case study of Beijing-Tianjin-Hebei region. Comparative Economic and Social Systems (2): 1–10 . 2. Dongsheng, Zhan, Zhang Wenzhong, Yu. Chen Li, and Dang Yunxiao Xiaofen. 2019. Research on the progress and trend of urban public service facilities allocation. Progress in Geography (4): 506–519. 3. Fei, Li. 2019. Fragmentation and reconstruction of rural public service supply mechanism. Agricultural Economics (4): 39–40. 4. Xiaoyi, Li, and Xie Shun. 2019. Social organization, local financial capacity and quality of public service supply. Research on Financial and Economic Issues (4): 77–84. 5. Lijun, Zhang. 2018. Regional cooperative development of small towns with sports characteristics: Realistic demands and path choice. Journal of Shenyang Sport University 37 (5): 8–14 + 27. 6. Chunmei, Liu, and Tang Jiping. 2017. Research on the management system of cooperative public sports service in Changsha-Zhuzhou-Xiangtan Region. Journal of Anhui Sports Science 38 (06): 1–4. 7. Xiaomin, Song, and Chen Min. 2017. Promoting the equalization of service in Xiongan New Area with cooperative development. China Business and Trade (34): 136–137. 8. Qingjin, Wang, and Ma. Wei. 2017. Research on the system construction of regional cooperative innovation platform. Research on Financial and Economic Issues (12): 110–116. 9. Sheng, Wang. 2017. Coordination of Beijing-Tianjin-Hebei endowment service: Motive force, dilemma and transcendence. Future and Development 41 (11): 100–105. 10. Jianwen, Liu. 2017. The mechanism transformation of regional synergetic development in China: Analysis based on the three regional development strategies of China. Tianjin Social Sciences 5: 77–82. 11. Ling, Li. 2016. Research on the construction mode of regional cooperative innovation system based on network public service platform. China Business (26): 51–52.
Online Reputation Evaluation for Consumer Products Based on Analytic Hierarchy Process (AHP) Ying Li, Xiaowei Lu, Lei Han, Yingcheng Xu and Xiuli Ning
Abstract With the rapid development of information technology featuring “Internet +”, the consumption pattern of e-commerce has impinged heavily on traditional real economy. Unlike the offline service model, for the e-commerce business, how to evaluate online products has become the research object of many scholars. This paper constructs an online reputation evaluation indicator system for consumer products, and develops an AHP model to determine the weight of indicators. It builds an online reputation evaluation model for consumer products based on AHP, and applies it to living examples. Keywords Analytic hierarchy process · Consumer products · Online reputation · Weight of indicators
1 Introduction Thanks to the fast internet speed and its replicable development model; e-commerce has achieved rapid growth. However, the quality of e-commerce products has become a serious impediment to the healthy development of e-commerce economy, while consumers’ distrust becomes the biggest obstacle to its further development [1–3]. Determining the online reputation for consumer products is to shift the reputation of traditional transactions to the special environment of e-commerce transactions. However, it is more difficult to evaluate and control online reputation than the traditional model due to lack of face-to-face communication in the transactions. A good online reputation is a facilitator of smooth e-commerce transactions, a driver for its sustainable development, and an effective evaluation tool for purifying the transaction environment. Unlike the product reputation in the traditional sales model, the quality of online reputation directly determines consumers’ purchase decision. Objectively speaking, online reputation represents consumers’ recognition of the Y. Li · X. Lu · Y. Xu · X. Ning (B) China National Institute of Standardization, Beijing 100191, China e-mail: [email protected] L. Han China Electronics Engineering Design Institute Co. Ltd., Beijing 100142, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_38
297
298
Y. Li et al.
quality of online products. Therefore, it is necessary for the online reputation evaluation indicator system for consumer products to comprehensively consider the relevant factors and highlight the characteristics of online sales. Online reputation has always been the focus of many scholars, and a slew of research has been carried out on it. For example [4], Studies the proposed reputation evaluation model by comparing the reputation calculation methods, and proposes a trust system [5]. Proposes a combination of qualitative and quantitative methods for the reputation evaluation model on the basis of the uncertainty of interactions for the online system [6]. Attempts to use the discrete time optimal control to determine the online reputation evaluation model, so as to evaluate the online reputation of buyers and sellers [7]. Constructs an e-commerce transaction subject reputation evaluation model through AHP. These studies are more about reputation evaluation of companies and other economic entities, than the online reputation of products that consumers really need. At present, the research on online reputation mainly focuses on the evaluation of online services, buyers and sellers of online transactions while seldom touching upon the comprehensive evaluation of related products, services, buyers and sellers in online transactions. Based on the current development of e-commerce, this paper proceeds from the particularity of e-commerce transactions and constructs an online reputation evaluation indicator system for consumer products that integrates consumer products, seller reputation, platform reputation and social concern.
2 Constructing an Online Reputation Evaluation Model for Consumer Products 2.1 The Basic Principles of the Construction of the Online Reputation Evaluation System for Consumer Products (1) Scientific The online reputation evaluation indicator system for consumer products should consider the relevant indicators that affect the quality and user experience of its online products from multiple dimensions and aspects, and consider the hierarchical and weight distributions of different indicators to make a scientific evaluation indicator system. (2) Applicable Unlike the product reputation in the traditional sales model, the quality of online reputation directly determines consumers’ purchase decision. Objectively speaking, online reputation represents consumers’ recognition of the quality of online products. Therefore, it is necessary for the consumer product online reputation evaluation indicator system to comprehensively consider the relevant factors of online consumer products reputation and highlight the characteristics of online sales.
Online Reputation Evaluation for Consumer Products …
299
(3) Comprehensive Since there are many factors affecting the online reputation of consumer products, the evaluation indicator system needs to be both comprehensive and applicable. Therefore, when designing the indicator system, it is necessary to consider the quality of the consumer themselves and the online sales platform and other important factors that affect consumers. More importantly, after-sales evaluation of consumer products, customer complaints, injury accidents and other factors should also be taken into account. (4) Core There are many factors affecting online reputation. It is impossible for the indicator system to include all of them, so it is necessary to grasp the core indicators.
2.2 Online Reputation Evaluation Indicator System for Consumer Products This paper constructs online reputation evaluation indicators for consumer products from four aspects, namely, the product quality, business reputation, third-party website, and the public, as shown in Table 1.
2.3 Weight of Evaluation Indicators 2.3.1
Building a Hierarchical Model
A hierarchical mechanism model shown in Fig. 1 is constructed, including the target layer (the highest layer), the criterion layer (the middle layer), and the secondary criterion layer (the third layer).
2.3.2
AHP
To facilitate quantitative assessment of the weight of each evaluation indicator, this paper adopts the 1–9 scale method proposed by Satty (Table 2) to indicate the relative importance of each evaluation indicator. Since the online reputation evaluation indicator system for consumer products is relatively complex, the results from the judgment matrix are not always reasonable. It is necessary to make consistency check of the judgment matrix to ensure the validity of the online reputation value [8]. The average random consistency indicator RI of the judgment matrix is shown in Table 3 [9]. If the consistency indicator of a certain judgment matrix is CI and the maximum eigenvalue is λmax , its consistency check
300
Y. Li et al.
Table 1 Online reputation evaluation indicators of consumer products Primary indicator
Secondary indicator
Indicator description
A: product quality reputation indicators
A1: product brand
It is an identification mark, a spiritual symbol, a value concept, and an embodiment of excellent quality
A2: product safety indicator
It means the physical, chemical, and microbiological safety indicators meet the requirements or that the potential hazard of the product is acceptable to consumers
A3: product functionality indicator
B: business reputation indicators
A4: product price and added value
Product design, manufacturing, production, etc. surpass the required standards, and reflect the technological elements and technological level of the products, such as user-friendly design and other value-added elements
A5: customer satisfaction
It makes an overall evaluation of the product through the customer’s perception, serving as a supplement for the first few indicators that can not be fully quantified
B1: product conformity
To what degree do the actual function and durability of the product meet the relevant requirements and conform with the product description
B2: product sales
Mainly monthly and annual sales
B3: after-sales service
It includes after-sales service of the product manufacturer, such as changing or refunding products, logistics and distribution, providing information, spare parts, and maintenance for broken products (continued)
Online Reputation Evaluation for Consumer Products …
301
Table 1 (continued) Primary indicator
C: platform credit
D: the public
Secondary indicator
Indicator description
B4: buyer’s evaluation
The buyer’s overall evaluation of the seller’s products and services after receiving the products
C1: platform visibility
The scale and sales volume of products sold by third-party platforms affect the indicators of platform visibility
C2: platform service level
The overall evaluation of the quality of products on the third-party platform, its rigorous review of the settled businesses, the policy services for protecting vulnerable groups such as consumers, etc.
C3: reliability of financial supervision
The reliability of the third-party platform in the supervision of buyers and sellers’ funds protect the property safety of sellers and buyers in the event of a transaction failure
D1: cases of product liability
Statistics on cases of product liability from consumers, third-party evaluation agencies, and media reports
D2: product quality data released by the government
Data on the quality and safety of products such as product spot checks, supervision, monitoring, and government warning
D3: consumer complaint data
Product quality data of consumer complaints from consumer associations and rights protection departments, etc.
value CR is as follows: CR =
CI (λmax − n)(n − 1) = RI RI
(1)
When CR < 0.1, it is generally agreed that the consistency of the judgment matrix A is acceptable; otherwise, it is necessary to make adjustment until satisfactory consistency is achieved [10, 11].
302
Y. Li et al.
An Online Reputation Evaluation Model for Consumer Products
product quality reputation indicators
business reputation indicators
platform credit
the public
consumer complaint data
product quality data released by the government
cases of product liability
reliability of financial supervision
platform service level
platform visibility
buyer’s evaluation
after-sales service
product sales
product conformity
customer satisfaction
product price and added value
product functionality indicator
product safety indicator
product brand
Fig. 1 An online reputation evaluation model for consumer products
Table 2 AHP 1–9 scale Scale
Implication
1
Two factors are equally important
3
Of the two factors, the former is slightly more important than the latter
5
Of the two factors, the former is obviously more important than the latter
7
Of the two factors, the former is much more important than the latter
9
Of the two factors, the former is extremely more important than the latter
2,4,6,8
The intermediate value of the above adjacent judgment
The reciprocal of the scales above
The opposite of the above definition
2.3.3
Using the Judgment Matrix to Determine the Weight of the Evaluation Indicators
Ten experts from relevant industries, research institutes, consumers, and regulatory authorities, etc. are asked to assign evaluation indicators according to the 1–9 scale method. According to the statistical analysis of the survey results by SPSS, the judgment matrix of each level of the online reputation evaluation indicator system for consumer products is determined as shown in Tables 4, 5, 6, 7, and 8. As can be seen from Tables 4, 5, 6, 7, and 8, the consistency ratio CR of the judgment matrices M1–M5 is less than 0.1, indicating that the weight distribution
1
0
n
RI
0
2
0.58
3
Table 3 RI of 1–9 scale matrices 0.90
4 1.12
5 1.24
6 1.32
7 1.41
8
1.45
9
1.49
10
1.51
11
Online Reputation Evaluation for Consumer Products … 303
304
Y. Li et al.
Table 4 Judgment matrix M1 of the criterion layer relative to the target layer A
B
C
D
Wi
A
1
5
3
7
0.5507
B
1/5
1
1/4
3
0.1041
C
1/3
4
1
7
0.2963
D
1/7
1/3
1/7
1
0.0489
Note λmax = 4.1810; CR = 0.0678
Table 5 The judgment matrix M2 of the indicator layer relative to the criterion layer (the comparison of importance of each secondary evaluation indicator of the product quality reputation indicator A) A
A1
A2
A3
A4
A5
Wi
A1
1
1
4
1/5
9
0.2019
A2
1
1
4
1/2
7
0.2168
A3
1/4
1/4
1
1/6
4
0.0712
A4
5
2
6
1
7
0.4782
A5
1/9
1/7
1/4
1/7
1
0.0319
Note λmax = 5.3782; CR = 0.0844
Table 6 The judgment matrix M3 of the indicator layer relative to the criterion layer (the comparison of importance of each secondary evaluation indicator of the business reputation indicator B) B
B1
B2
B3
B4
Wi
B1
1
1/9
1/7
1/9
0.0473
B2
9
1
7
1/7
0.3480
B3
7
1/7
1
1/9
0.0712
B4
9
7
9
1
0.5335
Note λmax = 4.0813; CR = 0.0304
Table 7 The judgment matrix M4 of the indicator layer relative to the criterion layer (the comparison of importance of each secondary evaluation indicator for the platform reputation indicator C) C
C1
C2
C3
C1 C2 C3
Wi
1
3
7
0.6491
1/3
1
5
0.2790
1/7
1/5
1
0.0719
Note λmax = 3.0649; CR = 0.0624
of the above evaluation indicators is reasonable. The weights of the indicators of the online reputation evaluation indicator system for the consumer products obtained by AHP are shown in Table 9.
Online Reputation Evaluation for Consumer Products …
305
Table 8 Judgment matrix M5 of the indicator layer relative to the criterion layer (the comparison of importance of each secondary evaluation indicator of the public reputation indicator D) D
D1
D2
D3
Wi
D1
1
1/7
1/2
0.0905
D2
7
1
6
0.7582
D3
2
1/6
1
0.1512
Note: λmax = 3.0324; CR = 0.0311
2.4 Calculation Method of Online Reputation Evaluation of Consumer Products According to Table 1 and Table 9, when Wi (i = 1, 2, 3, 4, …, n) represents the weight of the secondary evaluation indicators to the primary ones, and Gi (i = 1, 2, 3, 4, …, n) the actual score of the secondary evaluation indicators, the online reputation value of consumer products is: R=
n
Gi × Wi
(2)
i=1
3 Application Cases According to the evaluation indicator system shown in Table 1 and the weight of the online reputation evaluation indicator of the consumer products shown in Table 9, we can calculate the online reputation evaluation value of a certain type of consumer products, as shown in Table 10. As can be seen from Table 10, the model can calculate both the online reputation value of congeneric consumer products on different platforms, and that of different consumer products on the same platform. It provides third-party evaluation agencies and related management departments with the method and model of online reputation evaluation of consumer products.
4 Summary Based on the analysis of the factors affecting the online reputation of consumer products, this paper studies the online reputation evaluation model of consumer products, and uses AHP to determine the weight of each evaluation indicator. It shows that this model is of practical significance for evaluating the online reputation
306
Y. Li et al.
Table 9 Weights of indicators of online reputation evaluation indicator system for consumer products Primary evaluation indicator (weight to the general objective)
Secondary evaluation indicator
Weight coefficient of the secondary evaluation indicator to the primary evaluation indicator
Weight of the secondary evaluation indicator to the general objective
A: product quality reputation indicators (0.5507)
A1: product brand
0.2019
0.111186
4
A2: product safety indicator
0.2168
0.119392
3
A3: product functionality indicator
0.0712
0.03921
7
A4: product price and added value
0.4782
0.263345
1
A5: customer satisfaction
0.0319
0.017567
11
B1: product conformity
0.0473
0.004924
14
B2: product sales
0.3480
0.036227
9
B3: after-sales service
0.0712
0.007412
12
B4: buyer’s evaluation
0.5335
0.055537
6
C1: platform visibility
0.6491
0.192328
2
C2: platform service level
0.2790
0.082668
5
C3: reliability of financial supervision
0.0719
0.021304
10
D1: cases of product liability
0.0905
0.004425
15
D2: product quality data released by the government
0.7582
0.037076
8
D3: consumer complaint data
0.1512
0.007394
13
B: business reputation indicators (0.1041)
C: platform credit (0.2963)
D: the public (0.0489)
Weight ranking
Online Reputation Evaluation for Consumer Products …
307
Table 10 Scoring standards for online reputation evaluation indicators of consumer products General objective
Evaluation indicator
Weight of indicator
Score (100 points)
Online reputation evaluation value of consumer products
A1: product brand
0.111186
85
A2: product safety indicator
0.119392
70
A3: product functionality indicator
0.03921
68
A4: product price and added value
0.263345
60
A5: customer satisfaction
0.017567
80
B1: product conformity
0.004924
78
B2: product sales
0.036227
90
B3: after-sales service
0.007412
90
B4: buyer’s evaluation
0.055537
80
C1: platform visibility
0.192328
75
C2: platform service level
0.082668
64
C3: reliability of financial supervision
0.021304
75
D1: cases of product liability
0.004425
60
D2: product quality data released by the government
0.037076
85
D3: consumer complaint data
0.007394
65
Total score: 71.64586
value of each e-commerce platform through specific consumer online reputation evaluation cases for an e-commerce product. Acknowledgements This paper is funded by the National Key Research and Development Program. Project Number: 2017YFF020960302, 2016YFF0202604.
References 1. Zhang, Yu, Jing Bian, and Weixiang Zhu. 2013. Trust fraud: A crucial challenge for China’s e-commerce market. Electronic Commerce Research and Applications 12 (5): 299–308. 2. Science-Food Science; New Food Science Study Results from University of Turin Described (Italian Wines In China’s E-commerce Market: Focus on Piedmont Region Products). Food Weekly News, 2019.
308
Y. Li et al.
3. Lijuan, Liu. 2019. Theoretic shock and realistic challenge of e-commerce on international trade. Institute of Management Science and Industrial Engineering. Proceedings of 2019 International Conference on Education, Economics, Humanities and Social Sciences(ICEEHSS 2019). Institute of Management Science and Industrial Engineering: Computer Science and Electronic Technology International Society, 4. 4. Sang, A., R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43 (2): 618–644. 5. Zhang, Y., S.G. Wang, and Y.T. Xu. 2008. Online credit evaluation system based on analytic hierarchy process and set pair analysis. International Symposium on Computational Intelligence and Design, 453–456. Tokyo: IEEE. 6. Chaoning, Zhang, Zhang Ying, and Xu Yingtao. 2018. Online reputation evaluation model based on discrete time optimal control. Journal of Zhejiang Normal University (Natural Science) 41 (4): 383–389. 7. Zhiwen, Cai, and Lin Jianzong. 2015. Reputation evaluation of platform-based e-commerce online transaction evaluation subjects. Journal of Southwest China Normal University (Natural Science) 40 (8): 79–85. 8. Li, Yu, Wang Jianli, Li Changxiao, et al. 2014. Health evaluation of wetlands at Ningxia Sand Lake based on DPSIR and AHP. Journal of Southwest University: Natural Science Edition 36 (2): 124–130. 9. Tao, Yin. 2012. Construction of road transportation emergency response evaluation indicator system based on analytic hierarchy process. Journal of Southwest China Normal University: Natural Science Edition 37 (11): 107–111. 10. Heydari, Mohammad, Kin Keung Lai, and Xiaohu Zhou. 30 November 2019. Risk management in supply chains. London: Taylor and Francis. 11. Jalil, M. I. A., Pitchay, A. A., and Yahya, S. 2019. Cash Waqf and preferred method of payment: Case of Malaysia using an AHP approach. In Revitalization of Waqf for socio-economic development, Vol. II, 187–206. Cham: Palgrave Macmillan.
Discussion on the Influence of Ambient Temperature Based on Big Data Technology on the Development of Asphalt Pavement Xiaoduo Liu and Wei Liu
Abstract The asphalt pavement rutting is mainly caused by the high temperature and the channelized traffic, and the permanent deformation of the asphalt pavement structure layer occurs mainly in the high temperature season. Semi-rigid base asphalt pavement under heavy-duty traffic conditions, the rutting mainly occurs in the asphalt surface layer. Compared with traditional data analysis technology, big data technology can realize rapid processing and value mining of massive data, and has been applied to medical and energy industries. In order to explore the application prospects of big data technology in asphalt pavement, it is first necessary to grasp the application status. It also predicts the development trend of big data technology for asphalt pavement rutting at ambient temperature, and provides a reference for further application of big data technology in asphalt pavement. In order to study the effect of temperature and vehicle load on the development of asphalt pavement rut, the analysis model is established under big data, combined with temperature observation data, the variation law of temperature field inside the pavement is analyzed. On this basis, the variation law of asphalt pavement rutting at different temperatures is analyzed. Keywords Big data · Asphalt pavement · Rutting · Environmental temperature
1 Introduction Among the many diseases of asphalt pavement, rutting disease is an important and major form of damage. When the asphalt pavement is used for performance evaluation, the high temperature performance of the asphalt mixture is also listed as the primary test indicator. With the rapid development of the national economy and the X. Liu School of Civil Engineering, Changchun Institute of Technology, Changchun 130012, China W. Liu (B) Institute of Technology, The Tourism College of Changchun University, Changchun 130607, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_39
309
310
X. Liu and W. Liu
highway transportation industry, heavy-duty and even heavy-duty traffic has become a common traffic phenomenon [1, 2]. Although people have already paid attention to the damage effect of overloaded traffic on the road surface and took measures to carry out overload control, the actual situation is that heavy load still exists; although people have carried out many studies on the pavement structure under heavy traffic [3–8]. Asphalt mixture is a temperature sensitive material whose road performance is closely related to its temperature sensitivity. The ruts are usually easy to produce at high temperatures and vary with temperature [9, 10]. As a composite material, asphalt mixture is a typical elastic, viscoal and plastic composite, which is close to the linear elastomer in the low temperature and small deformation range. It is a viscoplastic body in the range of high temperature and large deformation activity, and is a general viscoelastic body in the transition range of normal temperature [11, 12]. In the current building materials engineering, many new technologies and new methods have been widely used, and big data technology is one of the more common ones and one of the more important ones. It plays an important role and significance for the development of building materials engineering. This paper analyzes big data technology and its application in building materials engineering, in order to promote the further development of building materials engineering. Under high temperature conditions, the development speed of rutting is much higher than that under low temperature conditions; under the same load action times, the rutting depth is linearly related to the load size; for the same load growth range, the rutting increases at a lower temperature, but the temperature is higher. Under the conditions, the absolute value of the rut depth increase is even larger.
2 Big Data Technology and Its Advantages The so-called big data, which is also called huge amount of data, refers to related information assets that need to be processed by using new processing modes. Currently, there is a rapid development and application. For big data, its characteristics mainly include large volume, diversity and high speed, and it has high value. Among them, large volume refers to the big data record unit is TB level or PB level. The traditional data processing method can not meet its actual needs; diversity means that big data currently includes three types. They are structured data, unstructured data, and semi-structured data; high speed means that when dealing with big data, it should be guaranteed to be real-time and fast; and valuable means to fully explore big data. The hidden value in big data can be found better. Big data technology is a related technology for analyzing and processing big data. In short, big data is to analyze and process a large amount of data in the network, and on this basis, obtain high-value information and apply it in practice. In the traditional data analysis, the main method is to select the random sampling method for analysis, and most of them are implemented by human resources. In this statistical analysis mode, it is easy to cause the data to be compared in the data collection, and the data is relatively one-sided. In the process of collecting, it often takes a lot of manpower and material
Discussion on the Influence of Ambient Temperature …
311
resources. Compared with traditional data analysis and processing methods, data processing using big data technology can be faster and faster, and can process data more accurately, which can effectively improve data processing efficiency and better meet actual needs. In the construction of roads and construction, the generation of building energy consumption is closely related to many factors, including space, floor space and lighting conditions. At present, relevant researchers have made a reasonable application of the data mining framework to deeply analyze the data occupied by the office area. Based on this, the use of various advanced big data technologies can be used to calculate the building occupancy mode and related timetables. The results obtained can propose a variety of energy saving solutions, and more valuable ideas can be obtained in the analysis of building energy consumption. In addition, the consumption model can be used to analyze the energy consumption of buildings. In the analysis of building energy consumption, power data is an important one, and it is also big data. It cannot be completed by traditional data analysis methods, but through the big data technology. Utilize, for a variety of electrical equipment in a large number of building space samples, timing data acquisition can be implemented, and a large amount of power consumption data can be obtained. On this basis, using the relevant big data processing techniques such as feature extraction, clustering and correlation analysis, statistics can be applied to the data of various power consumption devices with different uses and types, and the general power consumption mode can be obtained. It is possible to predict the actual power consumption in the future buildings, so as to better grasp the energy consumption and better carry out the project construction.
3 Formation Mechanism of Rut on Asphalt Pavement The rut is one of the main forms of asphalt pavement damage. It directly affects the performance of the pavement and the smoothness of the pavement, jeopardizing the driving of the road car, and the increasing depth of the rut will also cause serious road surface damage, resulting in increased maintenance costs. The ruts that occur on asphalt pavement can be classified into the following categories: (1) Structural ruts, which are caused by deformation of the subgrade and the base layer of the pavement; such ruts have a large width, no bulging on both sides, and a cross-section exhibits a glyph; (2) a destabilized rut or flow Sexual rut, due to the poor flow characteristics of asphalt mixture, under the repeated action of vehicle load and temperature change, the asphalt concrete is shaped and sheared. On the asphalt road, the wheel parts are concave and the wheel edge is upward. Uplift, this constitutes a rut, (3) wear-resistant car withdrawal, tire with nails or belt chain; (4) compaction deformation, surface lamination solidity does not meet the requirements of the regulations, generated under the load of the vehicle Consolidate the rut. Due to the greater rigidity of the semi-rigid base layer, the first type of structural rutting is not easy to occur on asphalt roads in China. The rutting of asphalt concrete pavement mainly occurs in the asphalt surface layer. The asphalt concrete surface layer produces
312
X. Liu and W. Liu
viscous flow under the repeated action of vehicle load, which is the main reason for the rut on the road surface. According to foreign literature, the direct cause of large permanent deformation of pavement is: under the condition of heavy traffic, the axle load of the vehicle and the grounding pressure of the tire are increasing, and the number of times of axle load of the vehicle is large, which makes the asphalt pavement surface The layer is in a state of high complex stress. The permanent deformation of the asphalt pavement is mainly due to the shear deformation of the asphalt pavement layer under load. This conclusion is only applicable to the pavement where the compaction degree can be well controlled during the construction process. During the construction process, the compaction degree can not meet the requirements, and the pavement surface layer will of course produce compaction deformation under the load of the vehicle to form permanent deformation. In addition, the vehicle load has a large shear stress at the contact interface between the tire and the road surface. This shear stress has a significant influence on the rutting of the road surface. To accurately analyze the permanent deformation of the asphalt pavement, it is also important to select the load level that matches the actual road surface. Based on the statistical relationship, the statistical formula of the permanent deformation and applied load of the green layer and the performance of the raw material is further determined. lg ε p = c0 + c1 lg N
(1)
The viscoelastic layered theoretical system combined with indoor and outdoor tests yields an empirical relationship between the permanent deformation of the asphalt layer and the material parameters, loads and deflections of the road table: RD =
a1 δ N 1+a2 W (1 + a2 )
(2)
The rutting prediction model is based on rheological model analysis and elastic layered theory system, and combined with the deformation characteristics of raw materials. The prediction equation includes the rutting depth of lateral uplift height when the thinning of Zhejiang-Qinghai layer has been subjected to load: RD =
n i=1
cdt
2 pδ Smi x, p
× Wi (1 + K L )
(3)
Discussion on the Influence of Ambient Temperature …
313
4 Effect of Ambient Temperature on Rutting Development of Asphalt Pavement From Fig. 1, it can be seen that the rutting of asphalt pavement shows obvious reguFig. 1 Sketch map of rutting development in each month
9
8
7
1 2 3 4 5 6 7 8 9 10 11 12
larity with the change of months. The month of rutting development is concentrated between May and October, which is the time of summer, spring and summer, summer and autumn. The average temperature of the environment is higher and the solar radiation is stronger, which causes the temperature field of the pavement structure to be higher. Because asphalt mixture is a kind of temperature sensitive material, it produces more serious rutting in high temperature season. Corresponding to the average temperature of the environment, the month in which the maximum rutting depth occurs is also July when the average temperature is the highest. The rutting depth under standard load is about 7.35 mm, while the smallest rutting occurs in January, February and December, and the rutting depth under standard load is about 0.54 mm. The ratio of maximum rutting depth to minimum rutting depth is close to 14:1. It can be seen that the rutting depth under high temperature is much greater than that under low temperature. Therefore, for asphalt concrete, we should pay attention to its rutting resistance under high temperature, which is also consistent with engineering practice. At the same time, it can be observed from Fig. 2 that although the law of rut development is basically consistent with the law of temperature change, there are still differences. For example, in March and April, the temperature has risen, but the development of the rut is still very similar to that of January and February, and it does not immediately show a significant increase as the temperature rises. The reason for this phenomenon is the material properties of asphalt concrete. Under low temperature conditions, the material properties of asphalt concrete reflect the properties of linear elastic materials to a greater extent. Therefore, under the load of vehicles, most of the deformation can be recovered by elastic deformation; when the temperature rises to a certain extent, the asphalt, the mixture gradually reflects the properties of the viscoelastic plastic material, and its creep effect becomes an important factor under the load of the vehicle. The irreversible plastic deformation caused by it will become a rut disease macroscopically under the accumulation of a long time. From this, it can be judged that although the average temperature has
314 Fig. 2 Diagram of rut changing with temperature
X. Liu and W. Liu
95 90 85 80 75 70 65
1
2
3
4
5
6
7
8
9 10 11 12
changed in 1, 2, 3, and 4 including November and December, under these conditions, the asphalt concrete is still in the elastic stage, resulting in less accumulated deformation and rutting disease. Not obvious; and once the temperature continues to rise, the plasticity increases and the creep effect gradually becomes apparent, resulting in a larger rut. In summary, the rutting disease generally increases with the increase of the ambient temperature, but the two are not linear, but exhibit a nonlinear relationship of mutation. Therefore, in the actual engineering material design, the research focus should be mainly on the anti-rutting performance under high temperature conditions.
5 Conclusion This paper first expounds the related concepts of big data and big data technology, then selects a representative typical scientific literature database, systematically retrieves the literature related to big data and asphalt pavement, and analyzes it. According to the survey results of asphalt pavement rutting, the inductive analysis of the composite structure rutting test and the big data environment were used to analyze the influencing factors of the permanent deformation of the asphalt pavement. The main research conclusions obtained are as follows according to the results of the rutting disease site investigation and literature investigation. Under repeated load, the cumulative residual deformation of asphalt mixture is the direct cause of rutting on asphalt pavement. Under the combined action of compressive stress and shear stress, the strength of asphalt mixture can not resist the load stress, which leads to the rut of asphalt pavement. The root cause. At the same time, it is found that the structural thickness of the asphalt pavement, the interlayer contact conditions of the asphalt layer and the semi-rigid base layer, and the form of the base layer are the main factors affecting the rutting of the asphalt pavement.
Discussion on the Influence of Ambient Temperature …
315
Acknowledgements The corresponding author of this paper is Wei Liu. The work was supported by the Science and Technology Project of the 13th Five-Year Plan of Jilin Provincial Department of Education under Grant No. JJKH20180991KJ.
References 1. Shamami, V.H., and A.K. Khiavi. 2017. Effect of temperature on geosynthetic rutting performance in asphalt pavement. Petroleum Science and Technology 35 (11): 1104–1109. 2. Ji, X., N. Zheng, S. Niu, et al. 2016. Development of a rutting prediction model for asphalt pavements with the use of an accelerated loading facility. Road Materials & Pavement Design 17 (1): 15–31. 3. Du, Y., J. Chen, H. Zheng, et al. 2018. A review on solutions for improving rutting resistance of asphalt pavement and test methods. Construction and Building Materials 168: 893–905. 4. Mallick, R.B., D. Singh, and A. Veeraragavan. 2016. Extension of asphalt pavement life by reduction of temperature. Transportation in Developing Economies 2 (1): 7. 5. Trotochaud, L., R. Tsyshevsky, S. Holdren, et al. 2017. Spectroscopic and computational investigation of room-temperature decomposition of a chemical warfare agent simulant on polycrystalline cupric oxide. Chemistry of Materials 29 (17): acs.chemmater.7b02489. 6. Yu, X., N.A. Burnham, and M. Tao. 2015. Surface microstructure of bitumen characterized by atomic force microscopy. Advances in Colloid and Interface Science 218: 17–33. 7. Ameli, A., R. Babagoli, and M. Aghapour. 2016. Laboratory evaluation of the effect of reclaimed asphalt pavement on rutting performance of rubberized asphalt mixtures. Liquid Fuels Technology 34 (5): 5. 8. Wu, J., F. Ye, F. Hugo, et al. 2015. Strain response of a semi-rigid base asphalt pavement based on heavy-load full-scale accelerated pavement testing with fibre Bragg grating sensors. Road Materials & Pavement Design 16 (2): 316–333. 9. Guo, F., F.U. Hongyuan, and L. Shao. 2015. Fatigue damage analysis of composite base asphalt pavement structure based on change of ambient temperature. Journal of Central South University 46 (5): 1869–1875. 10. Moafimadani, S.R., K. Rahimov, and S. Hesami. 2016. The effect of warm additive on the properties and behavior of an asphalt binder. Liquid Fuels Technology 34 (19): 1654–1662. 11. Javilla, B., L. Mo, H. Fang, et al. 2017. Significance of initial rutting in prediction of rutting development and characterization of asphalt mixtures. Construction and Building Materials 153: 157–164. 12. Wu, J., F. Ye, and Y. Wu. 2015. Modulus evolution of asphalt pavement based on full-scale accelerated pavement testing with Mobile Load Simulator 66. International Journal of Pavement Engineering 16 (7): 609–619.
Analysis on the Criminal Subject of Artificial Intelligence Huilin Huang
Abstract The development of artificial intelligence warns of possible social risk, and artificial intelligence crime put forward a new proposition for criminal law theory and legislation. From the perspective of criminal subject, artificial intelligence can be divided into artificial narrow intelligence (ANI) and artificial general intelligence (AGI). The ANI does not have independent judgment and decision ability, so it can hardly become the subject of criminal responsibility. However, the AGI has independent discrimination and control ability, and it can commit a crime by selfselection and identification, so it is more possible to become the criminal subject. At present, we should gradually construct and improve the scientific normative system of artificial intelligence crime on the basis of focusing on legislative foresight. Keywords Artificial intelligence · Criminal subject · Criminal responsibility
1 Proposal of the Criminal Subject of Artificial Intelligence The research on the criminal subject of AI in academic circles mainly focuses on determining who should bear criminal responsibility as criminal subject according to the analysis of the role played by AI, researchers and users in different AI criminal activities. Some scholars further pointed out that autonomous intelligent machines in the future will be able to act completely autonomously and will no longer be passive tools using by human beings [1]. Although human beings design, manufacture and deploy them, their behavior is not constrained by human direct instructions, but based on the analysis and judgment of the information they acquire. Moreover, their responses and decisions in different situations may not be predictable or precontrolled by their creators [2]. Complete autonomy means that the new machine paradigm is “perception-thinking-action” that does not require human intervention [3]. Some scholars even think that artificial intelligence is a special legal subject, which is the inevitable outcome of human society when it develops to a certain H. Huang (B) Wuhan University of Science and Technology, Wuhan, Hubei 430065, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_40
317
318
H. Huang
stage. It has high intelligence and independent decision-making ability. Its nature is different from traditional tools or agent artificial intelligence crime [4]. At present, AI crime is mainly divided into two kinds of situations. The first case is artificial narrow intelligence (ANI). ANI does not have independent judgment and decision ability, researchers and users have complete control ability on it. Artificial intelligence operates in accordance with pre-set codes and established procedures, makes criminal acts and results that are expected by researchers and users. The second case: artificial general intelligence (AGI). AGI, with independent identification and control ability, can commit criminal acts through self-identification and selection, which can not be foreseen by researchers and users.
2 Analysis of Artificial Narrow Intelligence Criminal Subject Artificial narrow intelligence refers to AI that is good at only one aspect and only used to solve specific problems. From the viewpoint of ANI, intelligent machine just looks like intelligence, its intelligence is only superficial and non-substantial, and it will not really have intelligence and consciousness like human beings [5]. The behavior of ANI is entirely the embodiment of the subjective will of the actor. It is only a tool for the actor to commit criminal acts. Researchers and users are the subjects who commit harmful social acts and should bear criminal responsibility according to law. In criminal activities, ANI operates according to the pre-set procedure of the actor. It has no independent identification ability and control ability, so it does not have the qualification of criminal subject. It only plays the role of tool in criminal activities.
3 Analysis of Artificial General Intelligence Criminal Subject 3.1 AGI Is Inadequate to Be Criminal Subject Firstly, if AI is the criminal subject, it should abide by its obligations in criminal law and not infringe on the legitimate rights and interests of others, but even if it has certain ability of identification and control, it still does not have the same consciousness as the natural person, and there are still obstacles in the motivation and basis of the implementation of crime. The essential attribute of AI is naturalness and mechanics. It can only operates pre-set procedures or chooses behavior independently in the course of operation, and it does not take into account social significance, social responsibility and social consequences, so it can’t carry out real practical activities, form social attributes and possess the personality of natural persons, so the AGI is inadequate to be criminal subject. And then, criminal subject is the premise of judging
Analysis on the Criminal Subject …
319
criminal responsibility and penalty standard. There are two purposes of penalty: special prevention and general prevention. If the artificial intelligence without the personality of natural persons is included in the scope of criminal subject, the purpose of penalty for crime prevention will become a mere formality and can not play its due legal and social role [6].
3.2 AGI Is Adequate to Be Criminal Subject Firstly, the ability of criminal responsibility is the key to become the subject of criminal responsibility. According to the general theory of academia, the ability of criminal responsibility means the ability of identification and control. The AGI has the ability of autonomous learning, reasoning, selection and decision, which proves that AI has the ability of independent identification and control, that is, the ability of criminal responsibility [7]. Secondly, the actor with criminal responsibility ability can become the subject of criminal responsibility. At present, the subject of criminal responsibility stipulated in our country includes natural persons and units. Artificial intelligence and units are all inanimate things. In some cases, the unit is fabricated as the subject of criminal responsibility by law. This means that with the development of artificial intelligence, AI can also be fabricated as the subject of criminal responsibility by law in some specific cases. Finally, as far as AI is concerned, since it has the ability of identification and control, the applicable penalty can also be reformed, so that the criminal subject can receive education and be deterred, so that it can not, dare not, and do not want to repeat, so as to achieve the purpose of special prevention of punishment [8].
4 My Views on the Subject of Artificial Intelligence Crime At present, AI does not possess the qualification of criminal subject. We should use the existing theory of criminal subject to coordinate and solve the problem of the subject of AI crime, focusing on natural persons and units. Article 17.18.19 of The Criminal Law of the People’s Republic of China indicates that the subject of crime in our criminal law is limited to natural persons, not non-living bodies other than human beings. Therefore, the behavior implemented by AI can not be summarized as criminal behavior. There is no theoretical basis for incorporating AI into criminal acts, and the behavior it implements can not be evaluated as criminal acts, nor can it be regarded as the subject of crime [9]. However, in the long run, we can refer to the idea of unit as the subject of crime, and construct the legal fiction model of AI criminal subject qualification. The reasons are as follows: Firstly, with the rapid development and continuous evolution of artificial intelligence technology, intelligent robots are becoming more and more like “people”. In the future, intelligent robots may not only have intelligence quotient, but also
320
H. Huang
emotional quotient. According to the development of AI and on the premise of taking natural person as the center, the law should make specific regulations on the research and development and use process of AI in time, gradually build and improve the meaning and behavior elements of AI subject, and consider bringing AI into the scope of criminal subject in the right time, so as to prevent the situation that legal interests can not be relieved. Secondly, it is feasible to bring artificial general intelligence into the scope of criminal subject. Referring to the double penalty system of our country’s Criminal Law for units, we can use the relevant criminal law theory to solve the application of artificial intelligence as the subject of crime in the penalty system, and apply the subject of double penalty system to artificial intelligence and other natural persons such as researchers and users [10].
5 Concluding Remarks Through the above analysis of AI crimes, we should anticipate the possible criminal risks in the era of AI in advance, clarify the legal characteristics and legal status of AI, and clarify the way AI bearing criminal responsibility in advance. We need to reserve the necessary space for legal drafting, and gradually build and improve the scientific normative system of artificial intelligence crime on the basis of focusing on legislative foresight. The renewal and development of criminal law theory and criminal law provisions are adapted to social development. Exploring the theory and legislative response of AI crime is not only focusing on the current new problems, but also a new thinking of looking into the future.
References 1. Xiao, Si, and Cao Jianfeng. 2017. On the civil liability of artificial intelligence. Science of Law 35(5): 166–173 (in Chinese) . 2. Zeng, Yuan. 2017. Limited legal personality analysis of artificial intelligence. Oriental Law 12(5): 50–57 (in Chinese). 3. Parker, Lynne E. 2018. Creation of the national artificial intelligence research and development strategic plan. AI Magazine 4(2): 25–31. 4. Hilt, Kailee. 2017. What does the future hold for the law librarian in the advent of artificial intelligence. Canadian Journal of Information and Library Science 11(3): 211–227. 5. Jiang, Huang, and Zhang Chunyan. 2016. The road to the future of artificial intelligence. Tsinghua Business Review 45(1): 21–28 (in Chinese). 6. Zhiguo, Ma, and Tian Xiaochu. 2018. The possibility of applying criminal law to artificial intelligence body. Journal of Huazhong University of Science and Technology 52(2): 108–115 (in Chinese). 7. Handong, Wu. 2017. Institutional arrangements and legal regulation in age of artificial intelligence. Science of Law 35(5): 128–136 (in Chinese). 8. Tizheng, Zhu. 2018. Legal responses in the age of artificial intelligence. Journal of Dalian University of Technology (Social Sciences) 15(2):97–102 (in Chinese).
Analysis on the Criminal Subject …
321
9. Qianyun, Wang. 2019. The criminal law system on data security crime under the background of artificial intelligence. Legal Forum 29(1): 27–36 (in Chinese). 10. Xianquan, Liu. 2019. The path of criminal regulation of artificial intelligence crime. Modern Law Science 25(2): 75–83 (in Chinese).
U.S. Air Force Target Knowledge Graph Construction Based on Multi-source Intelligence Analysis Ruijuan Hu
Abstract With the multi-source intelligence data grow exponentially, traditional methods can barely satisfy the requirement, which means to organize and understand the tremendous military knowledge. So, this research project aims to develop unified, highly connected military knowledge graph to integrate information. Using frontend interaction technology, supporting learning function based on inference, errorcorrecting and marking, this graph can continuously modify the logic model and improve the intelligence of itself, so the knowledge will be solid in our department. By doing this, we can reduce our dependence on the experience of special experts, and moreover, provide platform for developing data-driven general battle system in recent years. Keywords Multi-source intelligence · Graph database · Knowledge graph
1 Introduction With the explosive growth of battlefield information and intelligence data of frontline units, the traditional search engine and query methods can no longer satisfy the acquisition and understanding of a large amount of military knowledge. By constructing the knowledge map of the military field of the US Air Force operational targets in the circum-Pacific region, we can provide efficient information retrieval, data de-redundancy and integration, and target potential for front-line units’ intelligence operations. Relation discovery and support intelligence support, combat planning and assistant decision-making and other applications [1]. At present, knowledge graph technology has shown great advantages in solving the accuracy and scalability of knowledge query, and has become a hot research topic. Internet companies led by Google have built a series of application-oriented knowledge maps. In China, Sogou “Knowing Cube” and Baidu “Knowing Heart” [2] are the leading Internet companies. All walks of life have begun to build domain knowledge maps. However, most of the existing knowledge graphs are general, and R. Hu (B) PLA Strategic Support Force Information Engineering University, Zhengzhou 450000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_41
323
324
R. Hu
Fig. 1 Construction process of military knowledge graph
there is no better way to construct and express the domain knowledge graphs with strong pertinence, especially in the military field.
2 Knowledge Graph Construction Technology Data acquisition, knowledge extraction, knowledge representation, knowledge storage, knowledge reasoning and other technologies need to be involved in the process of building military knowledge graph. The overall flow chart is as shown in Fig. 1. It gives the overall structure of knowledge graph technology [3], in which the part of dotted line frame is the process of knowledge graph construction and knowledge graph updating. Figure 1 shows that the process of knowledge graph construction is based on the original data, using a series of automatic or semi-automatic technical means, extracting knowledge elements (i.e. facts) from the original data and storing them into knowledge. The process of identifying database layer and schema layer. This is an iterative updating process.
3 Construction of Knowledge Graph of U.S. Army Target Based on Multi-source Intelligence 3.1 Knowledge Extraction After years of business accumulation, the amount of existing text data in a unit is huge, so the field of text mining has received extensive attention in recent years.
U.S. Air Force Target Knowledge Graph …
325
Most of these text data come from a variety of means, with different forms, such as speeches, important enemy information obtained, Internet news and so on. Most of these data are unstructured text, which is easy for human to process and recognize, but it is very difficult for machine to understand. There is no doubt that a great deal of valuable enemy information and intelligence exist in such unstructured data. Knowledge extraction is a huge task, including named entity recognition, ambiguity elimination, relationship extraction and other sub-tasks. Because this topic focuses on building knowledge graph from engineering to achieve its basic performance, and because of the existence of highly structured text in the unit, most knowledge extraction work has actually been completed by the unit’s salesmen and experts in their daily work. Therefore, this paper mainly extracts entities, relationships and entity attributes from structured text, and semi-structured text and image information from Web pages. In Web page extraction, Python crawler crawls the information of “nationality”, “base”, “army”, and “aircraft type”, while the weapon information equipped on the plane is obtained from the Web page by using “rear harvester”.
3.2 Knowledge Modeling and Representation Ontology-based modeling method is used in the process of data modeling of instances in knowledge atlas system. Ontology should be composed of four aspects: class, attribute, facet and instance [4]. Class representing a category is the set of attributes of the category, the set of classes is constructed into a domain, each instance is a kind of instance. Properties describes the values of various dimensions of a particular class. Conversely, only by combining various attributes can the category of an instance be clearly identified. Facets constraints of attributes, such as value intervals of numerical types. Instances of corresponding classes, namely entities, are specific stored values in the knowledge graph. Further, there are generally three ways to define the hierarchical structure of a class: top-up method, bottom-up approach and comprehensive method. Top-up method: Firstly, the root node is established, which is similar to the class inheritance system of object-oriented programming. Secondly, the object type is defined, including only the basic attributes and methods, and the level above the root is defined layer by layer. Finally, the underlying class is defined, and the concept is refined by adding subclasses in the way of inheriting the base class. For example, we first define the class of weapons, then define the subclasses of aircraft, ships, tanks and so on, and then refine the characteristics of each class in turn. Every node can describe ontology, but the details of description are different. The more leaf nodes can clearly represent an entity [5]. Bottom-up approach: Define many bottom-level, smallest classes, and combine these refined classes to create a new class. For example, we first define the aircraft as engine, wing, refueling system and mounted weapons, which can attack, transport
326
R. Hu
and refuel. We define these basic classes, and then aggregate some of them to create new classes, such as fighter aircraft to aggregate engine, wing, attack and mount weapons; refueling aircraft to aggregate engine, wing, refueling system, refueling, through this way to aggregate upward into a variety of new classes. Comprehensive method: Combining top-down and bottom-up methods. In the process of system model design, comprehensive method is adopted to model. By referring to the military domain ontology of Wikidata, combined with the relevant work experience and application requirements of frontline experts in practical business, the system defines the categories of the following tables (Table 1). Secondary category inheritance base category,as shown in Table 2. The relationship definitions in the atlas are written in a Cypher-like structure, as shown in the Table 3. Table 1 Definition of ontological basis in military domain Category
Description
Attributes
Position
Military positions, such as “Chief Auditor of the Air Force”
Position profile
Affair
Position Supervisors, e.g. “Human and Reserve Services”
Affair profile
Department
Organs or operational departments, such as the National Aerospace Intelligence Center and the Global Intelligence Brigade
Profile Establishment time Responsible for content
Character
Specific stakeholders, such as Wilson, Harris, etc.
Chinese name English name Gender Age Level (military or civilian title) Performance experience
Equipment
Operational or special weapons, such as B-52 bombers
Equipment performance attribute group (Variable) Whether to assemble troops (true/false)
Country
Countries of concern, such as the United States, Japan, Taiwan, etc.
Country profile
Region
A subordinate area of the country, such as Guam.
Region profile
Base
Bases of concern, such as Kadena
Base attribute group (variable)
Facility
Key military facility, such as airport runways
Facility attribute group
Task
Regular or special missions, such as landing in Normandy
Task attribute group
U.S. Air Force Target Knowledge Graph …
327
Table 2 Secondary concept of ontology in military domain Category
Description
Attributes
Secondary Position
Subordinate to a higher position, such as “Assistant Deputy Chief of Staff” subordinate to “Deputy Chief of Staff”
Position profile
Subordinate Department
Subordinate to superior departments, such as the “11th Air Force” under the “Pacific Air Force Command”
Profile Establishment time Responsibility for content
Subsidiary Equipment
Weapons equipped on an aircraft or ship
Equipment performance attribute group (variable) Whether to assemble troops (true/false)
Subtask
Subtasks of a task subordinate
Task attribute group
3.3 Knowledge Storage 3.3.1
Triple Storage of Raw Data
Knowledge graph is a data structure based on directed graph, which consists of points and directed edges. Each node in the graph is called entity, and the edges represent the logical relationship between entities. Knowledge graph can be represented by triples (entity-1, relationship, entity-2) [6]. Each record describes a fact, such as the fact that (the 33rd Rescue Squadron has eight, HH-60G) means that “the 33rd Rescue Squadron has eight HH-60G”. It should be noted that if the relationship is determined, then the position of entity-1 and entity-2 cannot be reversed, because a triple describes a directed edge (fact); the entity is not necessarily a specific thing in real life, but also an attribute value of the thing, and the relationship is that attribute. One problem to be considered when storing knowledge graphs with triples is Entity Recognition and Entity Disambiguation. For example, the entity “Yokota” may refer to Yokota, Japan, or Yokota Air Force Base. In the process of building knowledge graph, if ambiguity is found, the corresponding superior nodes are added. When selecting the word “Yokota”, the superior nodes are used to disambiguate, and the two entities are established respectively. The region and the base are regarded as the superior nodes. In this research topic, the entity and relational data before storage are organized in triple form.
3.3.2
Graph Database Neo4j Storage
If the traditional relational database is used to store the tremendous amount of triple information of knowledge atlas, the construction of database will be enormous. In relational databases, foreign key constraints are used to achieve the mutual reference
328
R. Hu
Table 3 Ontological relation table in military domain Entity-1
Entity-2
Relationship(using cypher)
Position
Department
Position—[: Subordinate]→Department
Position
Subordinate Departments
Position—[: Subordinate]→Subordinate Departments
Secondary Position
Position
Secondary position—[: affiliate]→Position
Position
Business
Position—[: Supervisor]→Business
Person
Position
Person—[: Position]→Position
Subordinate Department
Department
Subordinate Department—[: Subordinate]→Department
Subordinate Department
Equipment
Subordinate Department—[: Ownership]→Equipment
Department
Equipment
Department—[: Ownership]→Equipment
Subsidiary Equipment
Equipment
Subsidiary Equipment—[: Installation]→Equipment
Subordinate Department
Region
Subordinate Department—[: Located in]→Region
Department
Base
Department—[: Located at]→Base
Subordinate Department
Region
Subordinate Department—[: Located in]→Region
Region
Country
Region—[: Ownership]→Country
Base
Region
Base—[: Located in]→Region
Department
Task
Department—[: Execution]→Task
Subordinate Department
Task
Subordinate Department—[: Execution]→Task
Department
Subtask
Department—[: Execution]→Subtask
Subordinate Department
Task
Subordinate Department—[: Execution]→Task
Subordinate Department
Subtask
Subordinate Department—[: Execution]→Subtask
Subtask
Task
Subtask—[: belonging]→task
relationship between some records of two or more tables. Foreign keys are used to search for matched primary key records in the main table for search and matching computation, because this operation is “computationally intensive” and “memory intensive”, and the number of operations will be at the exponential level of the records in the table, so it needs. Consumption of a large number of system resources [7]. For the storage of knowledge graphs, each kind of entity corresponds to different tables, and each relationship needs to establish a relationship table. When querying, a large
U.S. Air Force Target Knowledge Graph …
329
number of table join operations are time-consuming. Adding, deleting and modifying tables also involve the modification of multiple tables. In particular, when new entity types need to be added to the graphs, a new table structure and its correspondence need to be established. The overall engineering implementation is complex, cumbersome and inefficient. Graph database is a new NoSQL database based on graph theory. Compared with traditional relational databases, graph databases support very flexible and finegrained data models [8]. They can model and manage data applications in a simple and intuitive way. They can easily miniaturize and standardize data units. At the same time, they can realize rich relational connections. For the large amount of relational network information in knowledge atlas, graph database has a natural correspondence with it. There are three kinds of graph data models commonly used in graph databases: Property Graphs, Hypergraphs and Triples. Among them, attribute graph model is more intuitive and easy to understand. It can describe most of the graph usage scenarios. It is also the most popular graph database model nowadays. There are fewer database products in the form of hypergraph and triple. Attribute graph model includes Node, Vertex, Edge, Link, Property and Label [9]. In this data model, knowledge graph is described. A node represents an entity, while the edge corresponds to the relationship between the entity and the entity, and tags are used to distinguish different types of entities. The relationship between nodes in a graph can contain complex attribute information. For queries with complex connections in graph databases, they can basically achieve millisecond-level response. Under the same system resources, their efficiency is much higher than that of relational databases.
3.4 Knowledge Query Neo4j database traversal and query efficiency is very high, its traversal focus is its own localization, traversal query data only use the necessary data, and do not need to use join operation in the relational database as all the data sets to implement expensive grouping operations. With the change of traversal depth, when the number of nodes returned remains unchanged, the query performance of MYSQL decreases slightly, while the query performance of MYSQL decreases with the change of query depth (because most of the Cartesian product is discarded). Neo4j tracks the visited nodes, so it can skip the previously visited nodes, thus improving query performance. The query language of Neo4j graph database is Cypher [10], which describes the sub-graph structure with human-readable syntax and is easy to read and understand. Knowledge inquiry can be carried out in the map of target knowledge of the U.S. Army, such as the organizational structure of the U.S. Air Force, the relevant attributes and subordinate forces of the U.S. base, the relevant information of the designated forces, the stationed bases and the aircraft owned, etc.
330
R. Hu
Fig. 2 Part of U.S. air force target Knowledge graph
4 Experimental Design and Result Analysis 4.1 Data Preparation The experimental data source is structured text data and web page crawling data of military units, among which structured text data is mainly provided by base manuals and air force sequences provided by experts in aircraft and naval fields and U.S. military research fields; the data crawled from pages are deployment data and weapon equipment data of U.S. air base.
4.2 Constructing Target Knowledge Graph of U.S. Army The knowledge graph of the U.S. military target is constructed by data cleaning and data model building. It includes the sequence organization structure of the U.S. Air Force, 5134 base entities, deployment, personnel and equipment of each base. Figure 2 shows the part of the knowledge map of U.S. military objectives.
4.3 Knowledge Query Based on Constructed Knowledge Graph (1) Query the basic attributes and subordinate forces of U.S. bases (Fig. 3). MATCH p = (m:base)-[r:besubordinateto]- > (n:army) WHERE m.country = ”U.S.”
U.S. Air Force Target Knowledge Graph …
331
Fig. 3 Query result of all weapons and equipment of the specified aircraft type
RETURN p (2) Inquire about the basic attributes of the designated troops, their bases and their aircraft. MATCH (m:base) < -[: Bestationed]-(n:army)-[: configure]- > (p:plane) WHERE n.name = “第57联队” RETURN m,n,p (3) Query all models of the specified type of aircraft. MATCH (n:Bomber) RETURN n.name (4) Query all weapons and equipment of the specified aircraft type. MATCH(p:plane)-[:provide]- > (w:weapon) RETURN p,w
4.4 Application Performance Assessment This knowledge graph system uses the Performance tool of Chrome developer tool to monitor the performance of the application, record the running time of the application, record the current page load, CPU occupancy, memory, operation and other contents, and generate statistical reports. Through the test unit’s base manual (5134 entity nodes) knowledge graph loading speed in 09, dragging the nodes, browsing pictures, rich text and other operations, the application performance was checked, and the operation of knowledge graph
332
R. Hu
containing 5134 nodes in 60 s was recorded with Chrome Performance as shown in Fig. 4. The index and parameter values of this system are mainly analyzed from four aspects: memory occupancy, resource occupancy, code analysis and time occupancy. The results are as shown in Table 4. Within 60 s, 84.84% of the time was spent executing JS scripts and rendering web pages. At the same time, in 60 s, node dragging and entity content viewing operations were successfully carried out to achieve performance expectations. Under normal use, the occupancy of various resources is within acceptable range. The test results show that the application runs smoothly, but the response time and occupied resources increase correspondingly.
Fig. 4 Large-scale knowledge map rendering performance monitoring results
Table 4 Application Performance Assessment Index
Parametric numerical analysis
General situation of application
Memory occupancy instructions: heap (HEAP) usage is 2.9–37.3 MB
Resource occupation
Network: Requests are focused on loading and rendering knowledge map nodes Frame rate: When displaying the knowledge map, the frame rate is low. Low frame rate shows that the application will not occupy extra resources
Code analysis
JS heap: The heap occupies 2.9–37.3 MB. The loading map is huge and the memory occupies a lot Nodes: Document tree nodes, 109644–227508, with the expansion of the atlas, the number of nodes increased accordingly
Time occupancy
Loading: Data loading, 26.6 ms_ Scripting: JS script execution, 25049.6 MS Rendering: Web page dyeing, 25852.8 MS Painting: Web page drawing, 1540.1 MS Other: Network waiting, operation, etc., 1518.9 MS Idle: idle, 6080.8 MS
U.S. Air Force Target Knowledge Graph …
333
5 Conclusion According to the actual needs of the front-line units and the suggestions of experts in the field of the US Army, this paper puts forward a set of construction scheme of knowledge atlas system, and further gives the implementation process of the whole project. The data used in the system are mainly the data of the existing units of the US Army, supplemented by some open information sources on the Internet. At present, the knowledge map only has the part of the U.S. Air Force in the organizational structure of the U.S. Army. Follow-up consideration will be given to expanding the data scope and further building the organizational structure network of the U.S. Army deployment in the global scope. At the same time, the accuracy of global military base atlas at the national level, except for the United States, will be further considered to refine the geographical location to the city level, adding special attention to the region, so as to optimize the efficiency of graphs query.
References 1. Wu, Wentao, Hongsong Li, Haixun Wang, and Kenny Q. Zhu. 2012. Probase: A probabilistic taxonomy for text understanding. In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, 481–492. ACM. 2. Lehmann, J., R. Isele, M. Jakob, et al. 2015. DBpedia: A large-scale multilingual knowledge base extracted from wikipedia. Semantic Web 6 (2): 167–195. 3. Bin, Ge, Tan Zhen, Zhang Chong, and Xiao Wei-Dong. 2016. Military knowledge graph construction technology. Journal of Command and Control 2 (4): 302–308 (in Chinese). 4. Faguo, Mei, Dai Dawei, and Zhang Yi. 2017. Combat target relation fusion technology based on knowledge map. Command Information System and Technology 8 (5): 81–86. 5. Yuji, Yang, Xu Bie, Hu Jiawei, et al. 2018. An accurate and efficient method for constructing domain knowledge map. Journal of Software 29 (10): 2931–2947. http://www.jos.org.cn/10009825/5552.htm. 6. Hong, Wang, Zhang Qingqing, Cai Weiwei, et al. 2017. Research on domain ontology storage method based on Neo4j. Computer Application Research 34 (8): 1–6 (in Chinese). 7. Zenglin, Xu, Sheng Yongpan, He Lirong, et al. 2016. Overview of knowledge mapping technology. Journal of University of Electronic Science and Technology 45 (4): 589–606. 8. Xuan, Luo. 2018. Design and implementation of personal knowledge management platform based on knowledge map. Master’s Degree thesis of Beijing University of Posts and Telecommunications, 63–68. 9. Alan, A., L. Alexander, and N. Krake. 2012. N-ary facts in open information extraction, Proceedings of the Joint workshop on Automatic Knowledge Base construction and Web-scale Knowledge Extraction.Stroudsburg, PA, ACL 52–56. 10. Kalmegh,P., and S.B. Navathe. 2012. Graph database design challenges using HPC platforms. In 2012 SC Companion: High Performance Computing, Networking, Storage and Analysis (SCC), 10–16. Piscataway, NJ: IEEE, 1306–1309.
Design of Virtual Experiment Platform Based on MATLAB Simulation Technology Liyan Zhao and Aize She
Abstract MATLAB provides matrix operations, drawing functions and data, implementing algorithms, creating user interfaces, connecting programs to other programming languages, and providing a graphical interface to Windows. According to the characteristics of MATLAB simulation software, this paper explores its application in automation teaching. Keywords MATLAB simulation technology · Virtual reality technology · Multimedia teaching · Experimental platform
1 Introduction MATLAB is a combination of the two words matrix & laboratory, meaning matrix factory (matrix lab). MATLAB is an interactive software system that combines command translation and scientific computing. It is a commercial mathematics software produced by MathWorks, USA. It can be used in advanced technical computing languages and interactive environments for algorithm development, data visualization, data analysis, and numerical computing. It can perform matrix operations, draw functions and data, implement algorithms, create user interfaces, programs that connect to other programming languages, and more. Moreover, it is mainly used in engineering computing, control design, signal processing and communication, image processing, signal detection, financial modeling design and analysis. With great improvements in core numerical algorithms, interface design, external interfaces, application desktops, etc., MATLAB is highly integrated with its powerful mathematical computing capabilities, convenient and practical drawing functions, and language [1]. It has gradually developed into a general programming language for scientific computing, graphical interactive systems and control system simulation [2]. The MATLAB L. Zhao (B) Jilin Engineering Normal University, Changchun 130052, China e-mail: [email protected] A. She Hohai University School of Energy and Electric, Nanjing 211100, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_42
335
336
L. Zhao and A. She
language has the following four characteristics: the first is efficient numerical calculation and symbolic calculation function, which can free users from complicated mathematical analysis; The second is to have a complete graphics processing function to achieve the visualization of calculation results and programming; the third is a friendly user interface and a natural language close to mathematical expressions, making it easy for scholars to learn and master; The fourth is a feature-rich application toolbox (such as signal processing toolbox, communication toolbox, etc.), providing users with a large number of convenient and practical processing tools [3]. Because MATLAB has such characteristics, it is widely used in computer-aided analysis, design, simulation, and teaching. Therefore, it is practical and necessary to introduce the MATLAB/Simulink language environment to establish a “soft experiment” environment for related courses [4, 5].
2 Application of MATLAB Simulation Technology in Experimental Teaching Current experiments in electric power automatic control systems, electrical engineering, and power system operations are generally performed on parameters and characteristics. It can be realized in the laboratory through various instruments, connecting lines and experimental equipment. This method can exercise students’ hands-on ability and is a very important part of professional teaching. However, the high price of the components of the system usually requires complicated parameter calculations to build the system circuit. If the parameter exceeds the tolerance range of the device parameters, it may cause system failure, burn out the device, etc. Therefore, computer simulation is introduced in the experiment for fault analysis and troubleshooting. After the circuit is verified by the simulation program, the actual connection is performed, which not only reduces the occurrence of the failure, but also increases the safety factor and success rate of the experiment. Using Matlab, we can simulate the automatic control system and demonstrate the system modeling, analysis and debugging process to students through multimedia teaching. However, when the actual teaching, the use of the program and the parameter debugging are more troublesome, each parameter debugging must be run on the host, and then the effect on the target machine can be observed. Although the teaching effect is improved, the time taken by the debugging program increases, and the parameter setting is not easy [6, 7]. A graphical user interface for graphical user interface development environment provided by Matlab is used to quickly construct a graphical user interface. Using GUIDE to process graphical user interfaces is as easy as drawing on paper. Figure 1 shows the GUIDE program interface: The toolbar is given on the left side of the interface. There are 9 kinds of interface controls. The window area on the right is the user area to be designed. Double-click on the user area and a function dialog appears, allowing the user to modify the contents to change the properties of the window. The user can make his own interface in this window. By selecting
Design of Virtual Experiment Platform …
337
Fig. 1 Guide program interface and description
Fig. 2 Lorenz control simulation experiment platform
one of the controls by left-clicking, the control can be drawn in the user area on the right side, and the function is customized, and the callback function (callback) of the corresponding control is established. The interface created by GUIDE software can adjust the controller parameters and operating environment in real time and can display various parameters. Therefore, the virtual instrument developed by Matlab is used for teaching, which enables students to feel the working environment of the laboratory in the classroom. Figure 2 shows the simulation experiment platform controlled by Lorenz. Different dynamic curves and response characteristics can be obtained by modifying the parameters in the parameter setting column.
338
L. Zhao and A. She
3 Perfect Combination of MATLAB Simulation Technology and Virtual Reality Technology Virtual reality is a combination of computer graphics, optoelectronic imaging technology, sensing technology, computer simulation, artificial intelligence and other technologies to create a realistic computer system with various perceptions such as sight, hearing, touch, smell and taste. People use various interactive devices to immerse themselves in the virtual environment and interact with entities in the virtual environment to produce experiences and feelings equivalent to the real physical environment, making the user feel as if they are there. Figure 3 is a block diagram of the aircraft flight simulation module based on the MATLAB Virtual Reality Toolbox. After the simulation run, the virtual reality picture of the flight process of Fig. 4 is obtained. The simulation uses interactive visual simulation. Students can not only watch the simulation, but also operate some of them to move them autonomously in space. In the course of the experiment, students can also adjust the scene according to their own preferences, which will enable students to have a strong sense of participation, stimulate their enthusiasm for learning, and achieve the purpose of improving the quality of teaching [8, 9]. Fig. 3 Aircraft flight simulation module block diagram
Fig. 4 Virtual reality display of aircraft flight process
Design of Virtual Experiment Platform …
339
4 Simulate the Experimental Environment with MATLAB /Simulink Simulation Software In the classroom teaching process, it is very difficult to optimize the structure and parameters of some real systems, and the simulation can play its special optimization design function. The optimization module provided by MATLAB/Simulink can be used in some experiments that need to adjust the parameter settings. Usually, the simulation needs to determine the optimal value or range of values. Then, the circuit connection is made on the test bench, which avoids burning the components on the test bench and saves the experiment time. After the simulation program, each student has the opportunity to participate in practical debugging, and at the same time, the experimental content can be appropriately increased to further develop students’ practical ability. In order for students to understand the results of theoretical analysis, it is sometimes necessary to bring teaching aids into the classroom and experimentally verify the system characteristics of the analysis. After the establishment of the MATLAB simulation platform, some typical system design cases can be directly applied to the MAT-LAB/SIMULINK simulation software for demonstration, so that physical aids are no longer needed. SIMULINK also offers a wide range of curve and data output modules. In order to improve the connection between students’ theory and practice, SIMU-LINK provides a series of ActiveX technology dial and gauge display components, such as ammeters, pressure gauges, etc. (as shown in Fig. 6). Take the asynchronous motor simulink simulation model in Fig. 5 as an example, and the output port uses a virtual oscilloscope. Through simulation, you can see the desired response speed of the asynchronous motor output speed and torque in the virtual oscilloscope (as shown in Fig. 6). The platform created by matlab software can largely solve a large number of matrix analysis, principle analysis, data calculation and other issues in the automation Fig. 5 Simulation model of asynchronous motor simulink
340
L. Zhao and A. She
Fig. 6 Asynchronous motor speed and error waveform
professional teaching. Students can design independently and build circuits on the virtual platform according to their own design needs. Various control algorithms are used to adjust the motor speed and debug the functional unit. The system can also be optimized to achieve personal ideas. In the development of electric drive systems in some industrial fields, new controllers are tested directly using actual motor systems [10]. It is difficult to implement and costly. Therefore, the emergence of the simulation system not only facilitates it, but also makes the original cumbersome abstraction vivid. And the courseware produced by the software is very interactive, which greatly mobilizes the enthusiasm of the students, and reduces the maintenance cost of the experimental equipment and the consumption of low-value consumables.
References 1. Fang, Liu, Wu Chengjiu, and Pan Juntao. 2016. Construction of power electronic circuit simulation platform based on Matlab/GUI. Experimental Technology and Management (1) (in Chinese). 2. Chao, Feng. 2013. Design and application of electric vehicle simulation model based on Matlab/Simulink, University of Chinese Academy of Sciences. 3. Xianxiang, Wu, Guo Baolong, Yan Yunyi, Zhu Juanjuan, and Meng Fanjie. 2016. Discussion on auxiliary teaching of “automatic control principle” course based on Matlab. Journal of Electrical and Electronic Education (6) (in Chinese). 4. Xianlun, Tang, and Liu Xiangde. 2014. Three-dimensional construction of power electronics and electric drive series courses. Laboratory Research and Exploration (9)(in Chinese). 5. Rui, Wang. 2010. Application of Matlab in experimental platform. Science and Technology Information(in Chinese). 6. Liangyu, Su, Wang Wu, and Ge Yu. 2013. Power electronics technology simulation experiment teaching and innovative thinking development. Experimental Technology and Management (1) (in Chinese). 7. Youling, Yu, and Xu Zhiyu. 2015. Power electronics research experiment based on Matlab/Sim Power Systems. Experimental Technology and Management (11) (in Chinese). 8. Tianlin, Niu, and Fan Bo. 2015. Application of Matlab/Simulink simulation in power electronic technology teaching. Laboratory Research and Exploration (2) (in Chinese).
Design of Virtual Experiment Platform …
341
9. Jiali, Wang, Jin Shuangyan. 2019. Return to the simple digital signal processing classroom. Computer Knowledge and Technology (10) (in Chinese). 10. Weiwei, Gong, Feng Shanshan, and Han Xi. 2017. Rapid construction technology of experimental platform based on Matlab GUI. University Physics Experiment (2) (in Chinese).
Traditional Culture Teaching in Chinese Education Under Internet Thinking Wenli Zhong
Abstract The importance of traditional culture teaching has received more and more attention, and the desire to learn Chinese has become more and more intense. However, the traditional cultural education has been impacted by the Internet, and this kind of impact has changed the traditional cultural education in all aspects. How to choose richer content and adopt a more appropriate teaching method is a problem that Chinese traditional culture educators face today. By analyzing the problems encountered in the development of Chinese traditional culture, this paper proposes a kind of introduction of Internet technology into traditional culture education, thinking about traditional culture education from the perspective and perspective of the Internet, and the strategies that can be chosen in teaching. Keywords Chinese education · Traditional culture teaching · Cultural factors · Strategy · Internet thinking
1 Introduction The teaching of cultural factors in Chinese teaching is still in an immature stage. There are still some problems in the whole teaching process, and the existence of these problems will affect the teaching effect and the development of cultural factors teaching to some extent [1, 2]. Among the Chinese textbooks, it is one of the textbooks with a wide range of use and high frequency of use. It contains a wide range of cultural factors and is highly practical [3, 4]. When Chinese teachers use textbooks to teach cultural factors, only by profoundly understanding the connotation of culture and choosing the correct way of introduction can the meaning of culture itself be effectively disseminated [5, 6]. For the cultural factors to be imported, we should choose the mainstream Chinese cultural factors [7]. Some scholars once thought that “language and culture are not a general juxtaposition, but a partial and overall treatment relationship, or a special juxtaposition of point-to-face treatment. Culture includes language, and language is a special culture in culture” [8]. This paper, W. Zhong (B) Yunnan Technology and Business University, Kunming, Yunnan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_43
343
344
W. Zhong
through the teaching of cultural factors to assist foreign students to learn Chinese knowledge, can stimulate the motivation and interest of foreign students to learn Chinese knowledge to a certain extent. Especially in the advanced stage of Chinese learning, when students encounter bottlenecks in the process of learning Chinese, it is undoubtedly a stimulant to add cultural factors to teaching.
2 Research on the Teaching Theory of Traditional Culture 2.1 Importance of Traditional Culture Teaching As we all know, language and culture are inseparable. On the basis of mastering pronunciation, vocabulary and grammar, it is also very important for learners to understand the cultural customs of the target language countries to improve their communicative competence. It can be seen from this that the cultural teaching of Chinese international education is extremely important and necessary. Chinese traditional culture includes not only traditional customs and customs, traditional festivals and some specific cultural products, but also traditional spiritual culture, that is, “the crystallization of national wisdom, including philosophy and religion, is based on the thinking of human itself and the relationship between human and nature, and society”. With the vigorous development of the international promotion of Chinese language and the development of Chinese as a second language teaching, in recent years, the establishment of Chinese government scholarships and Confucius Institute scholarships has greatly improved the quality and level of students. In addition, the rapid development of Confucius Institutes has also put forward higher requirements for Chinese learning along with years of study in China. With the extension of Chinese language and the improvement of Chinese language level, the learners’ contacts with Chinese society are getting deeper and deeper. The cultural teaching of cultural customs, cultural products and traditional festivals can not satisfy the students’ desire to know what they are. How to carry out the deep traditional culture teaching—traditional spiritual culture teaching has become a problem to be solved.
2.2 The Meaning of Cultural Factors Many learners choose to learn Chinese language, mainly from the curiosity of traditional Chinese culture. Therefore, in the teaching of Chinese, we should specially design and carefully prepare the content of the cultural teaching part, help the learners to eliminate the obstacles caused by the mother tongue culture factors, solve the difficulties brought by the cultural differences as much as possible, and guide step by step. Learners pay attention to the Chinese language itself, so that cultural teaching can be organically integrated into the teaching of Chinese as a foreign language.
Traditional Culture Teaching in Chinese Education …
345
Through fun learning, lead learners to experience different learning processes, discover the charm of Chinese language more quickly, and discover the cultural factors of language. Some scholars have pointed out: “From the perspective of language learning and language teaching, we must study the relationship between language and culture, because language understanding and language use are inseparable from certain cultural factors.” Teachers completed the speech in the classroom, The teaching of vocabulary and grammar, if this process is separated from the understanding of the specific cultural connotations and backgrounds of these linguistic elements, without understanding the behaviors and psychology in the process of using the language, it is still impossible for the learners to achieve effective communication. At the same time, the combination of cultural teaching and language teaching allows learners to have fun in exploration and discovery, and then to learn spontaneously and spontaneously, and is always proud of their unique insights, which will undoubtedly master the learners. Language plays a vital role.
2.3 The Relationship Between Language and Culture in Chinese Education Language is not a tool for conveying this simple meaning with words and words. Language is a complex coal that is composed of various factors such as human thinking, spirit and feelings. The use of language is closely related to the current thinking. Moreover, the language used by humans is not static, but varies according to the environment and the way they think. In this way, language is a simple expression tool that revolves around the existence of human beings. So the concept of language is not an independent element. It must be explained along with the factors of language existence. All things can be called culture. Culture is the sum of material wealth and spiritual wealth created by human beings in the process of social and historical development, especially spiritual wealth. The so-called culture refers to the lifestyle of the local society that has been inherited from history. Language is a system of actions consisting of traditions, and this system of action is made up of multiple components. The most important of these is the way of thinking, attitude and social value system of members of society. Language not only conveys the communication between people, but also has the creation and inheritance of culture. It can be seen that culture and language are not separate, but have an inseparable relationship.
346
W. Zhong
3 Problems in the Teaching of Developing Chinese Traditional Culture 3.1 The Simplification of Teaching Methods in Teaching These cultural factors presented in the book should be explained in depth by teachers, and at the same time, they should predict which way to introduce them is the most appropriate. At present, most of the explanations of cultural factors in teaching are relatively single in the traditional way of education, which is transmitted to students through teachers’ oral statements. Moreover, most of the objects of this book are students of advanced classes. Therefore, some teachers will think that it is not necessary to stimulate the interest of foreign students and focus their attention in the way of teaching in junior and middle classes. As stated in the second chapter of this paper, when a large proportion of cultural factors is involved, it will inevitably aggravate the singularity of the introduction of cultural factors to a certain extent. Change. Only using a single statement or teaching method that students are already familiar with will make students feel tired and outmoded, thus losing the fresh sense of exploring the culture. Therefore, in order to achieve the teaching effect, we should choose a relatively appropriate and novel way to teach cultural factors.
3.2 Cultural Factors and Language Teaching Cannot Achieve Unity Cultural factors teaching and language teaching are complementary and indispensable in the classroom of Chinese as a foreign language. At present, the relationship between the two in teaching is shown in Fig. 1. No matter whether it is Chinese or which language teaching is essential in the teaching process of language teaching, it will be supplemented by cultural teaching. However, some Chinese lessons isolate the cultural connotation behind the language and put a lot of time into the pronunciation and grammar, thus neglecting the teaching of cultural factors. Cultural factors 6 4 2 0
1
2
3
cultural factor
4
5
6
Language Teaching
Fig. 1 Relationship between cultural factors and language teaching
7
Traditional Culture Teaching in Chinese Education …
347
should be justified in the process of language teaching. At the same time, language teaching establishes a solid framework for cultural teaching, so that students can absorb cultural factors as much as possible in the process of learning language. The teaching of cultural factors has long been regarded as one of the important factors that constitute the teaching of Chinese as a foreign language. To a certain extent, it also reminds the instructors that cultural factors should also be taken seriously. Don’t neglect the explanation of cultural factors, so that cultural factors can play their auxiliary role and achieve the unity of cultural factors teaching and language teaching.
3.3 Some Teachers’ Cultural Factors Are Insufficiently Understood On the basis of being familiar with Chinese native culture, teachers have the ability to explain the textbooks and at the same time, they must be extensively involved in the cultures of countries around the world. Nowadays, Chinese teachers are mostly teachers of the linguistics of the liberal arts college or are temporarily seconded to this. In one post, the training of relevant professional content has not been carried out, which has led to some lack of teachers’ cultural literacy. However, this is not only in the personal reasons of the teachers, but also in the daily teaching life of the students, and also in the emotional communication with the students. In the classroom, when you need examples in the classroom, you don’t notice problems that may arise in cross-cultural communication. In the classroom, you will cause unnecessary misunderstandings. These misunderstandings will lead to barriers between students and teachers of different national cultures and customs. It is difficult to have good interaction with teachers in class, and it is even more impossible for such students to have further communication with teachers under the class. In addition, through the analysis of the distribution of cultural factors, we can also see that the cultural factors in the development of Chinese culture cover a wide range of aspects, and the higher the cultural literacy of teachers themselves. However, some teachers still fail to reach this level.
4 Coping Strategies in Traditional Culture Teaching 4.1 Reasonable Selection of Content in Traditional Culture Teaching In Chinese education, language teaching itself has a certain degree of boringness and unity. Because of the exclusion of students from the second language, teaching is
348
W. Zhong
more boring. Experiential teaching requires the participation of students and handson, which requires the fun of teaching content. Chinese culture is profound and profound. In order to mobilize students’ participation, it is necessary to select interesting content for teaching, or to explain in depth, to enhance the fun of teaching content through rich teaching methods. Strong story is an important feature of intellectual culture. There is a story behind each cultural knowledge. There can be stories behind each definition. The characters, plots, suspense and hints of the story can attract students’ participation. Choosing stories with interesting stories can bring together many traditional Chinese cultural figures and ideas, and can reflect Chinese traditional cultural concepts well. While paying attention to fun, it is also integrated with Chinese culture and organically unified. At the same time, while teaching emphasizes fun and participation, it should pay more attention to the thinking after students participate, especially the cultural class. In addition to letting students know the external manifestations of culture, we need to let students understand the meaning behind the form.
4.2 Combining Practice with Theory in Traditional Culture Teaching The combination of practice and theory is mainly for the content of teaching. The cultural knowledge points are quite rich and the coverage is quite extensive. Therefore, when teaching traditional culture, we must establish a holistic concept and grasp the content of the teaching from a systematic perspective, instead of making the various knowledge points of the culture too scattered, there is no connection in the knowledge points, there is no connection between the courses, and there is no connection in the learning stage. Of course, if there is a whole light, it will give people a big, ubiquitous, unstressed feeling, and the effect will be greatly reduced. Part of it is also involved, part of it should be representative of the whole, part should have a clear example, can give people a vivid intuition. Therefore, the teaching content should be point-to-face. But whether it is a classroom experience or an off-campus experience, it is not purely, it is a combination of teaching tasks with teaching purposes. At the same time, in addition to the interest in teaching, we must also pay attention to the concept of teaching. In various activities, teachers should set up corresponding teaching tasks, let students practice in learning, and learn in practice. The two are mutual and the efficiency brought to the classroom is different, as shown in Fig. 2.
Traditional Culture Teaching in Chinese Education …
349
6 4 2 0
1
2 practice
3 theory
4 Effect
Fig. 2 The combination of practice and theory
4.3 Teachers Should Constantly Improve Their Self-quality in Traditional Culture Teaching Teachers are the key to the success of cultural teaching. Teachers with cultural skills can carry out cultural teaching more effectively. The role of teachers is very important for effective cultural teaching by various teaching parties. The qualifications of Chinese teachers are not simply technical personnel, but constantly developed and improved. Introducing a variety of teaching methods, in order to effectively educate, we must constantly check ourselves. Such a posture is the teacher’s own efforts, but through research or other education can establish a correct posture. In order to better implement cultural teaching, teachers should play a flexible role. At the same time, education departments need to provide targeted training opportunities for school teachers at different levels. Every teacher should learn Chinese and culture by himself, and actively participate in various training activities to improve his Chinese level and cultural knowledge. No matter how smart the textbooks are, how to make a reasonable education plan or how to implement the education curriculum correctly depends on the practice of the teachers in class. Therefore, the most important thing in Chinese teaching and culture teaching is the role of teachers themselves. In order to achieve better teaching, teachers and students should cooperate with each other in school education conditions and environment.
5 Conclusion We should combine language teaching with cultural teaching, follow the principles of shallow to deep, step by step, arouse interest and guide understanding, and carry out the teaching of traditional spiritual culture timely, moderately and appropriately at all stages of language teaching. Nowadays, the enthusiasm of Chinese language education is not high, and the real scene of Chinese language education is not mature. Real Chinese education is not only the study of Chinese, but also the full understanding and experience of the traditional Chinese cultural characteristics and diversity.
350
W. Zhong
References 1. Tan, Charlene. 2015. Education policy borrowing and cultural scripts for teaching in China. Comparative Education 51 (2): 196–211. 2. Wang, X., and T. Wang. 2018. Discourse on nationalism in China’s traditional cultural education: Teachers’ perspectives. Educational Philosophy and Theory 50 (12): 1–12. 3. Hong-Li, P. 2017. Research on Chinese culture aphasia in college English teaching and countermeasures. Chinese and American English Teaching: English Edition 7 (14): 420. 4. Sum, R.K.W., M.S. Ma, A.S. Ha, et al. 2016. Action research exploring Chinese physical education teachers’ value of physical education: From belief to culture. Asia Pacific Journal of Sport and Social Science 5 (1): 1–15. 5. Wu, Ming-Hsuan. 2017. Examining Mandarin Chinese teachers’ cultural knowledge in relation to their capacity as successful teachers in the United States. Asian-Pacific Journal of Second and Foreign Language Education 2 (1): 11. 6. Hsu, S. 2015. Education as cultivation in Chinese culture. Education in the Asia-Pacific Region: Issues, Concerns and Prospects 26 (3): 260–264. 7. Wang, Z. [IEEE 2018 International Conference on Robots & Intelligent System (ICRIS)— Changsha, China (26 May 2018–27 May 2018)] 2018 International Conference on Robots & Intelligent System (ICRIS)—The Evaluation Model of Teaching Quality of Modern and Contemporary Literature in Chinese Higher Education Based on Support Vector Regression Algorithm (SVRA): 452–455. 8. Yang, Y., and G. Welch. 2016. Pedagogical challenges in folk music teaching in higher education/a case study of Hua’er music in China. British Journal of Music Education 2016 (1): 1–19.
College Students’ Entrepreneurship Psychology Education System and Practice Based on Computer Network Yan Zheng and Xu Wang
Abstract Under the background of China’s education system reform, college education should also continue to reform the education model to adapt to the demand characteristics of social development in the new era. In the continuous development of information technology, computer networks have gradually appeared in people’s field of vision, and have become an important driving force for the adjustment of industrial structure in traditional industries. Education should also rely on the advantages of computer networks to achieve education system reform and promote the all-round development of students. Innovation and entrepreneurship education is an important part of college education, and it is also an encouragement for entrepreneurial talents in China’s economic development. It is necessary to integrate college students’ entrepreneurial parks with innovation and entrepreneurship education to create a foundation for the development of college students. This paper will explore the integration mode of college students’ entrepreneurial parks and innovation and entrepreneurship education under the background of computer network. According to the shortcomings of entrepreneurial psychology education in the four aspects of college students and college students, the reasons for these shortcomings are analyzed. Keywords Computer network · College students · Psychological education · Practical research
1 Introduction The application of advanced technologies such as cloud computing and big data in various fields of society provides ideas for the reform of the education sector. The education model can be innovated by means of advanced network information technology [1, 2], which is the source of education for China’s education. An important way to continuously develop vitality [3–6]. College student entrepreneurship park is an important channel for students to carry out entrepreneurial practice, which can Y. Zheng (B) · X. Wang Jilin Engineering Normal University, Changchun 130052, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_44
351
352
Y. Zheng and X. Wang
continuously enhance students’ practical ability and enhance their understanding of the knowledge they have learned [7, 8]. Innovative entrepreneurship education is an important educational content that encourages talents to start a business in the current market economy development process, and is of great significance for stimulating China’s economic growth [9]. Effectively integrating innovative entrepreneurship education with college students’ entrepreneurial parks can continuously enhance students’ social resilience and help them improve their practical ability after completing school knowledge learning [10–14]. Under the environment of computer network, the integration of college students’ entrepreneurial parks and innovation and entrepreneurship education is closer, which can continuously enhance the advanced nature and era of innovation and entrepreneurship education. Based on the understanding of the current situation of college students’ entrepreneurial psychology education and the reasons, this paper puts forward what kind of measures should be taken from the perspective of the state and the school, and what kind of suggestions should be adopted at the small level of family and individual to work together. To shape the good psychological quality of college students’ entrepreneurship.
2 Computer Network and Background The social economy is prosperous and developing. The computer network is not only a high-tech in the traditional sense, but an era. In the era of computer networks, no matter whether you are willing or unwilling to accept it, it is extremely difficult to completely avoid the impact of computer networks. In the era of computer networks, our thinking, learning, living, and working methods are changing. We can no longer use traditional thinking patterns to face this era. We need to use computer networks in life and study, and enjoy computer networks. The convenience brought by life. As an era, computer networks have the following three distinct characteristics: 1. Interconnected with Each Other. The mutual connectivity of computer networks spans geographical restrictions and overcomes the gap between time and space, enabling anyone to communicate anywhere, anytime. The computer network connects the whole world closely, and the various elements in the world are combined and intertwined without boundaries. Similarly, the computer network makes the distance between the main students of entrepreneurship education and teachers more and more close, and there is no barrier to geographical communication between students and students, which promotes better communication between the two sides. 2. Big Data Is Highly Mobile. The era of computer network is the era of big data. The big data generated by computer networks anytime and anywhere has the characteristics of dynamicity, predictability and sample accuracy. Sample accuracy means that big data, although very large in sample size, is much more accurate than sampled samples. Enterprises can conduct qualitative and quantitative analysis through big data generated by computer networks, and the results
College Students’ Entrepreneurship Psychology Education System …
353
Fig. 1 A sketch of business models for traditional and computer network entrepreneurship
can predict the future development trend. The same is true for universities. The characteristics of computer network big data play an extremely important role in the enrollment, management and education of colleges and universities. 3. Data Openness. The various resources of computer networks are relatively open. Unlike the spread of knowledge in traditional education, the information age is developing rapidly. Nowadays, the school is constantly improving itself and selftransformation. The various resources provided for students are also constantly expanding. Therefore, colleges and universities in the context of the computer network era are open and shared with each other. From the business model sketch of traditional and computer network entrepreneurship, we can see that there are many types of entrepreneurship modes. But in the final analysis, traditional entrepreneurship takes entity enterprises as the media, and products need to go through many links to reach consumers. Transactions can only occur in entity enterprises, business hours are limited, and the cost of enterprises is greatly increased in the context of computer network. The new business model reduces many links in the middle, improves the convenience of customers and reduces the cost of enterprises (Fig. 1).
3 Problems in the Psychological Education of Computer Network College Students’ Entrepreneurship 3.1 It Is Difficult to Screen Effective Information of Entrepreneurship From the current situation of entrepreneurship education for college students in computer network, it is difficult to screen effective entrepreneurship education information in computer network. Although the era of computer network provides many conveniences for the development of entrepreneurship education in Colleges and universities, it also brings some difficulties to the development of entrepreneurship education in Colleges and universities. The mode of entrepreneurship education in
354 Fig. 2 The form of entrepreneurship education in Colleges and universities
Y. Zheng and X. Wang
Online Course
Incubation base 0
20
40
60
Colleges and universities is still mainly based on traditional curriculum teaching, special lectures, entrepreneurship activities or entrepreneurship competitions. Not all colleges and universities have incubation bases or practice bases, nor do they provide online entrepreneurship education (Fig. 2).
3.2 The Implementation Goals and Tasks of Entrepreneurial Psychology Education Are Not Clear Although our country has 5000 years of history and civilization, people in our country are seriously lacking in adventurous spirit and innovative consciousness. They are easy to settle in the status quo, seek stability, tend to be the same, and are unwilling to be unconventional. The traditional thinking of “learning and being good” in Confucianism encourages college students to seek stable work after graduation. It is hoped that after graduation, they can work in various departments of the state and government. Few college students will consider entrepreneurship. The implementation goals and tasks of entrepreneurial psychology education are not clear, and there are no implementation rules. This makes it impossible for entrepreneurial psychology education to be implemented. What kind of problems will be encountered in college students’ entrepreneurial practice, and what kind of goals need to be achieved is not known. The unclear goals and tasks of the implementation of college students’ entrepreneurial psychology education are important reasons for the lack of attention in entrepreneurial psychology education. Up to 80.83% of students believe that entrepreneurship is a career, and 12.5% of students believe that entrepreneurship is to start a business of their own or to develop a new technology project. It can be seen that college students’ understanding of entrepreneurship in colleges and universities is relatively one-sided and in a state of vagueness and chaos (Fig. 3).
College Students’ Entrepreneurship Psychology Education System …
355
Fig. 3 College students’ understanding of the concept of entrepreneurship
Open a business Technology Technological innovaƟon other
3.3 Less Publicity and Attention in Entrepreneurial Psychology Education At present, our country, government, and society have little understanding of college students’ entrepreneurial psychology education, and they do not know which channels should be used to obtain education and guidance for entrepreneurial psychology. This makes them unable to improve their entrepreneurial psychological quality. The propaganda of entrepreneurial psychology education in relevant departments is not in place. The work of entrepreneurial psychology education is not widely practiced in the group of college students. The intensity of propaganda is not in place, and the propaganda methods need to be improved. If the work of entrepreneurial psychological education gets attention and is well publicized, it can create a good environment for entrepreneurial psychological education for the society, promote the construction of entrepreneurial psychological education system, promote the development of various entrepreneurial psychological education activities, expand the demonstration role, and promote Other social subjects care about and support entrepreneurial psychology education.
356
Y. Zheng and X. Wang
4 The Significance of Computer Network in College Students’ Psychological Guidance Education for Entrepreneurship 4.1 Enriched the Mode of Psychological Guidance for College Students’ Entrepreneurship Traditional entrepreneurship guidance model is relatively single, mainly in the classroom for a simple theoretical education, and lectures, competitions and other ways can not meet the actual needs of students’ entrepreneurship, so such entrepreneurship guidance can not meet the needs of the times, and can not meet the “mass entrepreneurship, innovation” social needs. With the development and popularization of computer network, innovation and entrepreneurship education must be reformed and innovated, which enriches the guidance mode of college students’ entrepreneurship, not just in the classroom, but also through micro-blog, Weixin, professional social software, school employment and entrepreneurship website, etc. Students can choose what they want to learn from online courses.
4.2 Increased Opportunities for College Students to Receive Guidance on Entrepreneurship The greatest convenience of the computer network is that it is not restricted by the region. As long as there is a network, students can fully use the network resources to receive entrepreneurship guidance anytime, anywhere, and more professional and experienced instructors can receive online guidance, which will greatly increase the opportunities for students to receive innovative entrepreneurship education.
4.3 Stimulate the Enthusiasm of College Students’ Entrepreneurship Psychology With the rapid development of computer network, many universities are actively exploring new entrepreneurship guidance modes in order to bring more effective entrepreneurship guidance to students. In addition to the normal entrepreneurship guidance courses, many colleges and universities have added online entrepreneurship guidance courses, online and offline also strengthened exchanges and discussions with students. Online entrepreneurship guidance course enables students to learn more freely and have more choices. Because of this, the computer network will inevitably gradually become an important carrier of entrepreneurship guidance
College Students’ Entrepreneurship Psychology Education System …
357
education reform, thus changing the traditional education model in which teachers are the center and students passively accept classroom learning, thus enabling students to move from passive to active, and stimulating students’ enthusiasm for entrepreneurship.
5 Strategic Thinking on College Students’ Entrepreneurship Psychology Education Under the Background of Computer Network 5.1 Building a Diversified Entrepreneurship Education Practice Platform Entrepreneurship psychology education should rely on the practice platform to effectively improve students’ entrepreneurial ability and entrepreneurial comprehensive quality. The establishment of entrepreneurship education practice platform under the background of computer network can be divided into online platform and offline platform. The construction of the offline platform provides students with practical places for entrepreneurship education, entrepreneurship practice and entrepreneurship guidance. In practice, students’ entrepreneurial skills are effectively enhanced and their entrepreneurial ability is enhanced. Colleges and universities should set up relatively basic entrepreneurial bases, constantly improve the practice platforms such as entrepreneurial parks and entrepreneurial incubators, and provide students with practical space for operation. It is conducive to colleges and universities to use their own advantages, so that students can complete entrepreneurial practice activities under the guidance and cooperation of tutors and team partners, and effectively improve students’ practical ability. Secondly, colleges and universities can jointly build a relatively complete entrepreneurial base with enterprises, which is conducive to students to understand the real scene of entrepreneurship, so as to better integrate into social practice and improve the effectiveness of entrepreneurship education.
5.2 Actively Shaping the Entrepreneurial Personality of College Students College students rarely come into contact with the outside world, and spend a lot of time on campus. Therefore, the life and experience of college students in school has an important impact on the formation of their personality. Entrepreneurial talents must have complete personality qualities, such as self-reliance, self-reliance, coordination and communication skills, organizational leadership and the ability to
358
Y. Zheng and X. Wang
develop and innovate. The stability and persistence of personality affect the individual’s basic behavior. The personality traits of entrepreneurs play a key role in the entrepreneurial process. Colleges and universities have created a strong and relaxed academic atmosphere on campus. The focus of implementing entrepreneurial psychology education is that entrepreneurial teachers should first cultivate the ordinary health psychology of college students, which is the basis for shaping entrepreneurial personality.
5.3 Strengthen the Learning of Relevant Entrepreneurial Psychological Knowledge and Broaden the Knowledge In order to successfully start a business, college entrepreneurs need to strengthen their knowledge of entrepreneurial psychology. Entrepreneurial psychology contains a lot of specific content, and college students are not familiar with it. In order to cultivate a good entrepreneurial psychology of college students, college students need to have a comprehensive understanding and understanding of the connotation and main content of entrepreneurship. After strengthening the study of college students’ entrepreneurial psychological knowledge and broadening their knowledge, they must also find out their own lack of entrepreneurial qualities in combination with the objective environment of entrepreneurship. Based on a comprehensive analysis of subjective and objective factors, they will formulate learning and work plans. Work hard in the direction of entrepreneurial success. College students with entrepreneurial intentions can only find the problem after they have learned the entrepreneurial psychological knowledge, solve the problem, do a good job in the preparation of entrepreneurship, and cultivate a good entrepreneurial psychology.
6 Conclusion This paper compares the characteristics of entrepreneurial education based on computer network in the context of traditional entrepreneurship and computer network. It analyzes the influence of computer network on college students’ entrepreneurial education: it broadens the content of college students’ entrepreneurship education model. Provide more convenience for entrepreneurship education. Increase the fairness of college students’ entrepreneurial education model; promote the innovation of college students’ entrepreneurial education model and improve the educational environment for college students’ entrepreneurship. Therefore, based on the background of the universal popularization of computer networks, a new model of college students’ entrepreneurial education is proposed. On the basis of analyzing the objectives, principles and characteristics of the new model of entrepreneurship education,
College Students’ Entrepreneurship Psychology Education System …
359
the most important achievement of this paper is to adapt to the background of computer network and propose a new mode of adapting college students’ entrepreneurial education. That is to say, the construction of entrepreneurship education concept, classroom teaching construction and entrepreneurial education environment construction, which provides guidance for college students’ entrepreneurial education model. Acknowledgements This work was supported by “Thirteenth Five-Year” Social Science Research Project of Jilin Provincial Department of Education: “Building College Students’ Entrepreneurship Psychology Education System and Practice Based on Career Planning Course” (JJKH20180505SK) and “Education and Entrepreneurship Education Ecology Based on Collaborative Training of ‘Government Schools and Enterprises’ Research on the Construction of the System” (JJKH20190790JY).
References 1. Pu, Q. [IEEE 2018 International Conference on Robots & Intelligent System (ICRIS)—Changsha, China (26 May 2018–27 May 2018)] 2018 International Conference on Robots & Intelligent System (ICRIS)—Analysis of the Setback Education Mode Based on the College Student Entrepreneurial Psychological Quality Model: 395–398. 2. Gyan, M.K., E.Y. Attah, Michael Asare–Appiah. 2015. Empowering Ghanaian polytechnic students through entrepreneurship and competency based education: A case study of Takoradi polytechnic. Journal of Education & Practice, 6 (28): 1–5. 3. do Paço, Arminda, João Matos Ferreira, Mário Raposo, et al. 2015. Entrepreneurial intentions: Is education enough?. International Entrepreneurship & Management Journal 11 (1): 57–75. 4. Deschamps, E., and J.J. Lee. 2015. Internationalization as mergers and acquisitions: Senior international officers’ entrepreneurial strategies and activities in public universities. Journal of Studies in International Education 19 (2): 122–139. 5. Dutta, D.K., K.L. Gwebu, and J. Wang. 2013. Personal innovativeness in technology, related knowledge and experience, and entrepreneurial intentions in emerging technology industries: A process of causation or effectuation? International Entrepreneurship and Management Journal 11 (3): 529–555. 6. Robinson, S., H. Neergaard, L. Tanggaard, et al. 2016. New horizons in entrepreneurship education: From teacher-led to student-centered learning. Education + Training 58 (7/8): 661– 683. 7. Wang, X., L.M. Jessup, and P.F. Clay. 2015. Measurement model in entrepreneurship and small business research: A ten year review. International Entrepreneurship & Management Journal 11 (1): 183–212. 8. Jones, S., S. Underwood, M. 2017. Understanding students’ emotional reactions to entrepreneurship education: A conceptual framework. Education + Training, 59 (7/8): 657–671. 9. Robinson, S., H. Neergaard, L. Tanggaard, et al. 2016. New horizons in entrepreneurship: From teacher-led to student-centered learning. Education + Training 58 (7/8): ET-03-2016-0048. 10. Peprah, J.A., C. Afoakwah, and I. Koomson. 2015. Savings, entrepreneurial trait and selfemployment: Evidence from selected Ghanaian universities. Journal of Global Entrepreneurship Research 5 (1): 1. 11. Dino, R.N. 2015. Crossing boundaries: Toward integrating creativity, innovation, and entrepreneurship research through practice. Psychology of Aesthetics Creativity and the Arts 9 (2): 139–146.
360
Y. Zheng and X. Wang
12. Hadi, C., I.S. Wekke, and A. Cahaya. 2015. Entrepreneurship and education: Creating business awareness for students in East Java Indonesia. Procedia—Social and Behavioral Sciences 177: 459–463. 13. Kim, J., and Y. Noh. 2015. The effects of psychological capital and risk tolerance on service workers’ internal motivation for firm performance and entrepreneurship. International Entrepreneurship & Management Journal 12 (3): 1–16. 14. Eggers, F., F. Eggers, and S. Kraus. 2016. Entrepreneurial branding: Measuring consumer preferences through choice-based conjoint analysis. International Entrepreneurship and Management Journal 12 (2): 427–444.
Development Status and Trend of Internet of Vehicles Communication Technology Jiguang Xue, Zhenbo Liu, Xuliang Zhao, Pingjun Wang and Qiaowen Hong
Abstract Vehicular Internet, an important mobile Internet portal, will become a competitive place for businesses. Hardware, software and Internet of vehicles service companies are striving for the huge potential market of cars in the Internet. From the perspective of mobile terminal platform and network platform, there is no bottleneck in technology and industry at present, and evolutionary products of the Internet of vehicles are ready to come out. Based on the author’s learning and practical experience, this work reviewed the current situation and trend of communication technology in the Internet of vehicles. Keywords Internet of vehicles · Communication technology · Development status · Trend
1 Introduction Internet of vehicles refers to the mobile communication system in which vehicles interact with vehicles, vehicles interact with roads, vehicles interact with people and vehicles interact with sensor devices to realize communication between vehicles and public networks. Furthermore, it is an interactive network composed of information such as vehicle location, speed, vehicle condition and route, which integrates various advanced technologies such as GPS technology, radio frequency identification technology (RFID), sensor technology and image processing technology [1]. The vehicle connects its status information to the Internet and uploads various information to the central processor [2, 3]. However the central processor can also plan the J. Xue (B) · Z. Liu · X. Zhao Electric Power Research Institute of State Grid Liaoning Electric Power Co. Ltd, Shenyang 110006, China e-mail: [email protected] P. Wang Henan Fine Electric Co., Ltd, Zhengzhou City, Henan 450001, China Q. Hong State Grid Fujian Electric Power Research Institute, Xiamen 361000, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_45
361
362
J. Xue et al.
best driving route and report real-time road conditions for the vehicle through powerful information processing and analysis capabilities. It is conducive to finding the optimal solution for the road signal, and finally achieve the purpose of intelligent transportation.
2 Development Status of Internet of Vehicles Communication Technology 2.1 Vehicle Network Communication Type (1) Vehicle to vehicle—V2V. Vehicle-to-vehicle communication is the process of connecting the bottom terminal equipment of point-to-point in the vehicle network, and realizing the two-way exchange of data between vehicles. V2V is transmitted in a short distance, so a vehicle ad hoc network is established by using special short distance communication, which has the characteristics of wireless distributed structure, multi-hop, self-organization and no center. The vehicle terminal can obtain the information of vehicle speed, vehicle orientation and traffic condition alarm in real time to avoid the occurrence of some traffic accidents. At the same time, it can also spread all kinds of text, pictures, videos and so on. However, when the transmission data is large, it is easy to lose packets because of the fast driving speed of the car, so how to solve this problem is also a major technical difficulty in the vehicle network [4]. (2) Vehicle-to-road—V2R. The communication between vehicle and road means that in the process of driving at high speed, the vehicle terminal equipment is monitored by all kinds of monitoring equipment near the roadbed. Because the communication distance is short and the vehicle is moving at high speed, its communication mode generally adopts special short-range communication technology such as microwave communication and infrared communication. V2R vehicle network communication has been used in practice for a long time. For example, the deceleration reminder when approaching the traffic light, the toll road non-stop charge(ETC), and the monitoring of the congested road section, etc. V2R has different functions in different regions and sections [5]. For example, on the expressway, the vehicle speed is fast, so the road side unit should have the characteristics of large radiation range, small number of channels, which can reduce the time of vehicle disconnection and reconnection, and can also improve the user experience. (3) Vehicle-to-person communication—V2P. Vehicle-to-person communication is a communication type based on vehicle comfort experience and vehicle internal safety. It is mainly connected to the vehicle and human mobile phone or other electronic equipment, mainly using cellular mobile communication to transmit the information in the car and provide alarm information to the owner in real time. It mainly uses cellular mobile communication to transmit information in
Development Status and Trend of Internet …
363
the vehicle owner in real time and provide alarm information. In the aspect of body safety, it provides real-time information about the operation of the owner of the vehicle, including geographical location or in-car safety information. The owner can also issue commands to the vehicle through the V2P platform to achieve the purpose of remote control. (4) Vehicle-to-platform communication—V2C. The communication between the vehicle and the platform includes the communication between the vehicle and the road. But the V2I platform is in a wider range and is the hub of the entire vehicle. Through the platform, the data of each point are collected, and through the information integration, the weather module, the road condition module and the emergency information insertion module are added in, forming a threedimensional vehicle networking platform, which provides the owner with more comprehensive information and higher accuracy. Due to its relatively long propagation distance, medium and short range communication modes such as satellite communication or cellular mobile communication are generally required in V2I scenarios. In case of an emergency, the owner may also report the situation to the relevant units through the platform or seek emergency rescue.
2.2 Open and Intelligent Vehicle Terminal System Platform Just like the computer in the Internet and the mobile phone in the mobile Internet, the vehicle terminal is the medium for the owner to obtain the ultimate value of the Internet of vehicles, which can be said to be the most important node in the network. At present, many car navigation entertainment terminals are not suitable for the development of car networking, and the core reason is to adopt a non-open, non-intelligent terminal system platform. It is difficult to be a network ecosystem based on an open system system that is not open and not intelligent enough. A large number of developers have built hundreds of thousands of applications based on Apple’s IOS and Google Android terminal operating systems, which have created core values for the two mobile network ecosystems. All this is because developers can build applications based on such systems, especially Google’s Android, which is completely open source and can be tailored and optimized. Therefore, from the current perspective, Google’s Android will also become the mainstream operating system of the Internet of vehicles terminal system. It is designed for web applications and is designed for touch operations. It has a good experience and can be personalized and customized [6]. With rich and rapidly growing applications, it has formed a mature network ecosystem. On the contrary, WinCE, which is used most by vehicle terminal, can be said to be a closed system, and there is hardly room for further development.
364
J. Xue et al.
2.3 Server-Side Computing and Service Integration Technologies In addition to the above voice recognition technology to use cloud computing, many applications and service providers are using server-side computing and cloud computing technology. Similar to the Internet and mobile Internet, terminal capacity is limited. Only through server-side computing can more information and resources be integrated to provide timely services to terminals, the server-side computing has entered the era of cloud computing. Cloud computing will be used in the Internet of vehicles to analyze and compute road conditions, large-scale vehicle path planning, intelligent traffic scheduling machines, and vehicle diagnostic computing based on large cases 8 [7, 8]. Internet of vehicles, like Internet and mobile Internet, must adopt service integration to realize service innovation and value-added services. Through service integration, vehicle terminal can obtain more appropriate and valuable services, such as call center service integration with auto insurance business, remote diagnosis integration with on-site service appointment integration, location service integration with merchant service integration, etc.
2.4 Internet Technology The essence of the Internet of vehicles is the integration of the Internet of things and the mobile Internet. The Internet of vehicles is to integrate all kinds of information about cars, roads and people, and finally provide services for people (people in cars and people who care about cars). Therefore, it is not only the on-board terminals that can obtain the information and services provided by the Internet of vehicles, but all the terminals that can access the Internet and mobile Internet [9]. Therefore, computers and mobile phones are also the terminals of the Internet of vehicles. Existing Internet and mobile Internet technologies and applications can basically be used in the Internet of vehicles, including media entertainment, e-commerce, Web2.0 applications, information services and so on. Of course, compared with the existing general Internet and mobile Internet, the Internet of vehicles has two characteristics: one is related to cars and roads; the other is to take location information as the key element. Therefore, it is necessary to develop a special Internet application for the Internet of vehicles around these two key characteristics, which will bring a wider range of users and service providers to the Internet of vehicles.
Development Status and Trend of Internet …
365
3 Key Technologies and Development Trends of the Internet of Vehicles 3.1 Sensor Technology and Information Integration To truly realize the Internet of vehicles in the future, the application of various kinds of sensors is indispensable, such as cameras that sense external environments, tire pressure detection sensors, anti-collision sensors and other in-car sensors, as well as various sensors that are used to collect traffic, speed and congestion on roads and roadsides. These sensors make up the “antenna” of the vehicle. How to extend these “tentacles” longer and further, and how to better integrate sensor information, this will become a major proposition of the Internet of vehicles technology.
3.2 Intelligent Vehicle Terminal Platform Vehicle terminal platform is a medium for drivers and passengers to obtain the final information of the Internet of vehicles. However, the most popular vehicle terminal application is the WinCE system and it is difficult to further develop due to its closed nature. The Android and Google operating system platforms used in smart phones are more suitable for the intelligent requirements of the Internet of cars because of their open source code. Therefore, from the current point of view, such open operating system platform will become the trend of vehicle terminal in the future.
3.3 Server-Side Computing and Service Integration Technologies In the Internet of vehicles technology, there are a large number of sensor information, apps and services of vehicle terminals, which all require server-side computing and cloud computing technologies. Cloud computing has been widely used in analyzing and computing road conditions, large-scale vehicle path planning, intelligent traffic scheduling and vehicle diagnosis computing. Only through these server-side computing and service integration can we provide more and more valuable services for the vehicle terminal.
366
J. Xue et al.
3.4 Development and Application of Communication Technology In terms of communication technology, the Internet of vehicles mainly focuses on two aspects: on the one hand, short-range wireless communication, such as WiFi and RFID radio frequency technology; On the other hand, long-distance mobile communication technology, such as GPRS, 3G, 4G and other mobile communication technology [10]. However, these two technologies are not unique to the Internet of vehicles. Therefore, the Internet of vehicles should focus on the application of communication technologies, such as automatic payment for highways and parking lots, vehicle-road information exchange, vehicle-mounted terminal and Internet information exchange, etc.
3.5 Voice Recognition Technology The touch-vehicle terminal in the driving process is not the best choice based on the consideration of driving safety, but for the current vehicle-mounted terminal, the voice recognition technology of non-fixed commands cannot be well solved, so the voice recognition technology will become particularly important.
4 Conclusion As the foundation of intelligent transportation, internet of vehicles communication can form a self-organizing network between vehicles, people, roads and buildings, to realize the sharing of vehicle service information, traffic control information and vehicle driving control information. The Internet of vehicles has made some achievements in coordinated transportation, green transportation, energy conservation and emission reduction, driving safety and other aspects. With the increasing investment of governments and the continuous efforts of experts and scholars in the field of Internet of vehicles, the Internet of vehicles industry is bound to become a sunrise industry, and will guarantee the efficient and safe travel of people.
References 1. Michael, L. B., & Nakagawa, M. (1999, September). Interference characteristics in inter-vehicle communication from oncoming vehicles. In Gateway to 21st century communications village. VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No. 99CH36324) vol. 2, pp. 753–757. IEEE.
Development Status and Trend of Internet …
367
2. Patsakis, C., Dellios, K., & Bouroche, M. (2014). Towards a distributed secure in-vehicle communication architecture for modern vehicles. Computers & Security, 40, 60–74. 3. Wang, S.Y. 2003. On the effectiveness of distributing information among vehicles using intervehicle communication. Proceedings of the 2003 IEEE international conference on intelligent transportation systems. IEEE. 4. Yang, X., J. Liu, F. Zhao, and N. H. Vaidya. 2004. A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning. 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), Networking and Services, 22–25 August. Cambridge, MA: IEEE. 5. Yang, X., L. Liu, F. Zhao, and N. H. Vaidya. 2004. A vehicle-to-vehicle communication protocol for cooperative collision warning. IEEE Mobiquitous. 6. Sichitiu, M. L., and Maria Kihl. 2008. Inter-vehicle communication systems: A survey. IEEE Communications Surveys & Tutorials, 10 (2): 88–105. 7. Jin, W.L., and W. W. Recker. 2006. Instantaneous information propagation in a traffic stream through inter-vehicle communication. Transportation Research, Part B Methodological, 40 (3): 0–250. 8. Willke, T.L., P. Tientrakool, and N.F. Maxemchuk. 2009. A survey of inter-vehicle communication protocols and their applications. IEEE Communications Surveys & Tutorials 11 (2): 3–20. 9. Torrent-Moreno, M., J. Mittag, P. Santi, and H. Hartenstein. 2009. Vehicle-to-vehicle communication: Fair transmit power control for safety-critical information. IEEE Transactions on Vehicular Technology 58 (7): 3684–3703. 10. Reicharadt, D. 2002. CarTALK2000-safe and comfortable driving based upon inter-vehiclecommunication. Proc of the IEEE intelligent vehicle symposium, June. IEEE.
Temperature Controller Based on USB Interface Yali Ma and Xueyi Wang
Abstract In this paper, the communication between the host computer and the lower computer system is designed by using the new USB interface. The temperature is measured using a new one-line digital temperature sensor and communicated via a USB interface to a computer-side application. The collected temperature data is uploaded to the host PC through the USB interface and processed by the application software. The upper computer application software is written by C ++ builder, and the dynamic link library of CH372 interface chip is used to establish the communication mechanism between the upper computer and the lower computer. The host computer displays the collected temperature data on the PC and displays the real-time temperature acquisition image. Keywords USB · Temperature sensor · CH372 · Real-time temperature · Image acquisition
1 Introduction The temperature control system based on the USB interface measures the temperature of the field through a temperature sensor. And using the microprocessor (single-chip microcomputer), it is transmitted to the computer in real time through the USB interface, and the computer uses the software according to the requirements, and performs alarm and other corresponding processing [1]. It is a technological product of computer technology, single chip technology and temperature sensor technology. This article will use this new computer interface to design a temperature control system.
Y. Ma (B) Jilin Teachers’ Institute of Engineering and Technology, Changchun 130052, China e-mail: [email protected] X. Wang Changchun Colored Oriental Casting Ltd., Changchun 130000, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_46
369
370
Y. Ma and X. Wang
2 System Functions (1) Detect the temperature. Use this system to measure the temperature away from harsh production environments; (2) Real-time collect on-site temperature and display on the PC; (3) The temperature image is made on the PC in real time, and the staff can intuitively obtain the system temperature image on the computer; (4) Simple system control. The temperature can be set by the application software on the computer. Once the limit temperature is exceeded, an alarm is issued to inform the staff to quickly perform corresponding operations on the production site, thus preventing the temperature from exceeding the limit temperature; (5) Provide system usage help on the application software of the host computer.
3 System Development Platform The development tools used are: keil C, C ++ builder, Protel, computer, and writer. Keil C is the world’s best assembly of MC-51 microcontrollers and C language development tools, supporting assembly, c language and mixed programming. At the same time, it has powerful software simulation and hardware simulation functions. C ++ builder is a relatively easy-to-use programming tool for computer high-level language C ++. It is a visual computer language. Protel is the world’s best tool for hardware circuit diagram creation.
4 Overall Diagram of the System The system consists of the following parts: temperature acquisition unit, lower unit temperature preliminary processing unit, USB device interface, host computer application. The structural schematic of the system is shown in the Fig. 1:
Tempe rature sensor unit
Lower computer’s preliminary processing unit (microcontroller)
Fig. 1 Diagram of the system structure
USB interface
Application layer of the host computers
Temperature Controller Based on USB Interface
371
The temperature sensor unit measures the production temperature environment, and transmits the measured temperature to the lower computer (single-chip microcomputer). After the initial processing of the collected temperature by the single-chip microcomputer, the processed data is uploaded to the PC host computer through the USB interface. The host computer will display the collected temperature in real time [2]. If the on-site environment is to be processed, the host computer sends a command and transmits it to the lower computer through the USB interface, and the lower computer analyzes and processes the received data [3].
5 System Hardware Design The application part of the lower computer is DS18B20. The DS18B20 collects the temperature signal and converts it into a digital signal, which is output to the AT89C51 of the single-chip microcomputer. The single-chip computer processes the digital signal. Then, the processed data is transmitted to the USB device driver of the upper computer through the USB interface chip, and the main USB of the upper computer receives the data from the USB device driver, and operates on the application software of the computer [4]. On the contrary, the computer’s control commands pass the control commands to the microcontroller through the USB chip through the USB bus interface. Since the system has already coded the commands of the computer program, the single chip receives the commands from the upper computer and judges them, thereby making different responses.
6 System Software Design To collect the temperature, the system must first use the host computer to issue commands to the lower computer (microcontroller). The MCU makes different treatments for different commands according to the received rules according to the received commands [5]. Then, the processing result is sent back to the upper computer, and after receiving the temperature data, the upper computer draws a data acquisition image according to the temperature data. This is the system to implement the function, and according to this requirement, the system software is designed. The overall module flow chart of the system is as follows (Fig. 2):
6.1 Software Design of the Lower Computer The main function of the application of the MCU is to collect the temperature of the DS18B20 and upload the collected temperature to the application of the computer through the USB interface chip [6].
372
Y. Ma and X. Wang
Fig. 2 Overall module flow chart of the system
Open the system
Initialize various parts of the system
System operation module
The programming flow chart of the lower computer is shown in the Fig. 3:
Initialization
Is there a data download?
Temp is 1?
Set alarm temperature
Read temperature and upload temperature data
Read the temperature
Whether to close the system?
Whether the temperature is higher than the alarm temperature
Alarm
Quit the system
Not Alarm
Fig. 3 Program design flow chart of the lower computer
Temperature Controller Based on USB Interface
373
6.2 Software Design for Host Computer The host computer receives data from the lower computer and operates according to the data to implement various functions. One thing to note is that you need to use the knowledge of the dynamic link library to open a USB device and communicate. Therefore, before writing application software, be sure to understand the use of the C ++ builder dynamic link library [7]. Since the dynamic link library provided by the CH372 driver is written in VC, the C ++ builder must establish a dynamic link library written by VC, but the C ++ builder cannot directly use the dynamic link library written by VC [8]. The following shows the program flow chart of the host computer (Fig. 4):
Initialization
Send acquisition command to accept temperature data
Load dynamic link library
Coordinate image processing
Open USB device
Whether to quit the system
Quit the system Fig. 4 Flow chart of host computer
7 Description of the System Operation (1) First open the USB device. Open the USB device on the host computer software and establish the communication mechanism between the upper computer and the lower computer.
374
Y. Ma and X. Wang
(2) The temperature reading operation of the application software on the computer side will immediately obtain the real-time temperature of the ambient temperature [9]. (3) The alarm limit temperature can be input on the host computer, and the upper computer sends the limit temperature to the lower position machine, and remains in the upper position machine, and once it is exceeded, it will alarm. (4) The host computer application software provides real-time help function. If the user does not know how to use the software, they can quickly use the system software with help.
References 1. Qimei, Chen. 2003. Computer USB interface technology. Nanjing University Press. 2. Wang Chengru, Li Yingwei. 2002. USB2.0 principle and engineering development. National Defence Industry Press. 3. Sha Zhanyou, Ge Jiayi. 2004. Principle and application of integrated intelligent sensors. Electronic Industry Press. 4. Mingye, Liu. 2003. Integrated circuit/computer hardware description language VHDL advanced course. Tsinghua University Press. 5. Weiwen, Xi. 2003. C ++ builder 6 program design and examples. Metallurgical Industry Press. 6. Xiaoping, Lei. 2003. Microcontroller and its application. Electronic Visible University Press. 7. Peiren, Zhang. 2003. Programming based on C language–application and application of MS-51 single chip microcomputer. Tsinghua University Press. 8. Mingxing, Yu. 2001. Borland C ++ Builder 5 Examples. Tsinghua University Press. 9. Xu Ke, Yang Chaolin. 2002. C ++ Builder Practical Technology and Classic Case. Tsinghua University Press.
Construction of Compound DDOS Network Security System Based on PKI and CA Authentication Bin Wang and Xiaolei Zhang
Abstract With the help of client server technology, distributed denial of service attack combines multiple computers as attack platform to launch DoS attack on one or more targets, thus doubling the power of denial of service attack. In this paper, the advantages of traditional IP packet filtering technology are analyzed, and a DDoS attack defense strategy based on dynamic IP packet filtering technology is studied. PKI consists of the following five parts: key backup and recovery system, certificate library, CA system. The paper presents construction of compound DDOS network security system based on PKI and CA Authentication. Keywords Network security · DDOS · PKI · IP packet filtering · Data collection
1 Introduction DDoS attack adopts distributed and cooperative large-scale attack mode, and uses common network protocols (such as TCP, UDP, etc.). It is difficult to distinguish illegal data stream from legitimate data stream. The attack flow is irregular, and IP spoofing technology is often used in attack packets. This kind of attack refers to the attacker illegally wiretapping and monitoring, and obtaining the required information from the information data stream exchanged between them [1]. When the two sides of the communication use encryption technology to block and transform the transmitted information, which makes it impossible for the attacker to precipitate the message directly from the intercepted information, the attacker can observe the frequency, length and traffic of the exchanged information. PKI is a service system, which is to automatically manage keys and certificates, authenticity, integrity of digital information on the Internet. Like the power outlet on the wall and the TCP/IP stack, its access point is uniform. Denial of service, DDoS attack is a kind of system attack which is widely used by hackers. It can weaken or prevent normal users from using system authorization B. Wang (B) · X. Zhang Qingyuan Polytechnic, Qingyuan 511510, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_47
375
376
B. Wang and X. Zhang
by exhausting system resources such as CPU, network bandwidth and disk space. According to CSI/FBI, 25 per cent of users have been subjected to different types of DoS attacks. With the continuous development of attack technology, distributed denial of service (DDoS) attacks have emerged. Asymmetric key system has an open public key as its biggest feature, so it is also called public key cryptosystem [2]. In asymmetric cryptography, there is no longer the difference between encryption key and decryption key. It can be used to protect the confidentiality of data, and private key encryption can also be used to decrypt public key. The paper presents construction of compound DDOS network security system based on PKI and CA Authentication.
2 Research on DDoS Attack Detection and Defense Model in Network Security Feature matching, traffic and access control. According to the size of system detection traffic, there are two kinds of architecture of it: centralized and distributed. Among them, distributed architecture is the development trend of them. In describing the network traffic characteristics, Markov model and Poisson model, which are widely used in traditional telecommunications networks, have been statistically similar. Camouflage attack refers to an attacker participating in the communication process by generating a false information flow and pretending to be another legitimate communication entity [3]. Camouflage attacks are generally used in conjunction with them. For example, an attacker can replay a legitimate authentication information previously intercepted and disguise it as a legitimate communication entity to participate in the communication. Definition 1 Select plaintext attack (Chosen Plaintext Attack, CPA) the attacker selects the plaintext message and seeks encryption help to get the corresponding ciphertext message. The target of the attacker is to use the obtained clear-ciphertext to destroy the security of the password system. TCP SYN attack is that multiple attack hosts send SYN packets to the destination host, and do not send confirmation after receiving the SYN ACK of the attacked host, so the attacked host establishes a large number of connection queue in the cache, resulting in the consumption of system. In the era of low-speed network, hackers always give priority to machines close to the target network when they occupy puppet broilers for attack, because the number of hops passing through the router is small and the effect is good. At present, the connection between telecom backbone nodes is G as the level, and the connection between big cities can reach 2.5 gigabytes. The access to the closed service of the host is prohibited, the maximum is restricted, the access of the specific IP address is restricted to enable the anti-DDoS attribute of the firewall, and the outward access of the open server is strictly restricted.
Construction of Compound DDOS …
377
This is a parallel attack with DDoS [4]. It is a necessary condition for a DDoS attacker to prepare a certain number of puppet machines, For the decryption prophecy query or signature prophecy query of A, algorithm C is suitable for its own needs by deceiving random prophecy answers. The master program will communicate with a large number of agents at a set time. as is shown by Eq. (1).
Λn = max Λn,v 1≤v 150). Generally, the values are taken separately in three horizontal intervals and weighted equally. The formulas are as follows: r (x, y) =
N i=1
wi {log Fi (x, y) − log[G i (x, y) ∗ Fi (x, y)]}
G i (x, y) = ki exp(−
x 2 + y2 ) Ci2
(11) (12)
It should be noted that the input and output of the experiment are all images in RGB color space. According to the analysis of the previous section, the HSV color model in this experiment is more in line with the relevant algorithm. Therefore, the image should be preprocessed before applying Retinex algorithm. The algorithm flow is as follows: (1) The original image F (x, y) is converted into HSV space and make the incident and reflected light components separate. (2) Calculate the newly generated Log [R (x, y)] according to Retinex algorithm. (3) Calculate the mean and mean square deviation of Log [R (x, y)] in the three same channels of image H/S/V, and quantify the reflected light component linearly by means of mean and mean square deviation, so as to enhance the image contrast. The formula is as follows: R(x, y) =
(V − Min) ∗ 255 Max − Min
(13)
V is the value before adjustment, Min and Max are the parameters obtained by calculating the mean and mean square deviation to enhance the image contrast. (4) Finally, the R (x, y) of the three channels is merged and converted into RGB color space and the image is output. The above is the preprocessing of remote sensing image before input to the neural network, which mainly includes the conversion of color space and the use of Retinex color model to remove shadows. Through the above algorithm, remote sensing images show more regular shape features, which can be better applied to the feature. Figure 1 shows the partial results of the image after shading using the above model. Compared with the original image, we found that the shadow in the original image was effectively removed.
Building Extraction Method in Remote Sensing Image
401
Fig. 1 Effect diagram of preprocessing in HSV color space
3 Experimental Results and Analysis The data sets used in this experiment is part of the remote sensing image related to building targets in DOTA data set [11]. DOTA data sets collect 2806 aerial images from different sensors and platform, each of which is about 4000*4000 in size. Targets cover a variety of scales, locations and shapes. Compared with other data sets, DOTA data sets contain more types of target objects. Although the target type of building is not included, the relatively large image scale and rich target types greatly reduce the difficulty of building marking. First, we filter out the remote sensing images with a large number of buildings. Four fifths of them are used as training set data. Firstly, remote sensing images are preprocessed by MATLAB, and then the images in the training set are labeled manually according to the results of human eye recognition by using image labeling tools in MATLAB. The coordinates and categories of the boundary points of each building are obtained. Finally, the training set data are put into the fast R-CNN for calculation. As a supplement, the manual labeling data of Academy of Disaster Reduction and Emergency Management of Beijing Normal University are also used in the experiment. We should pay attention to the selection of samples. In rural remote sensing images, there are often large areas of natural landscape such as mountains, plains, lakes, etc. The number of negative samples is relatively scarce. To solve this problem, we regard the house model as an irregular polygon, and then the positive sample is the bottom outer rectangle of the polygon. At the same time, we randomly extract the area equal to the size of the above outer rectangle in the image. If the merging ratio of all positive samples is less than 0.3, it is usually set as negative sample. When dealing with rural remote sensing images, this experiment chooses to modify the original N-way classification layer to N + 1-way classification layer, and properly improve the merging ratio threshold between positive samples and real borders, which can
402
Q. Han et al.
effectively alleviate the problem caused by too little sample data. The positive and negative sample schematics are as shown in Fig. 2. This experiment first converts remote sensing image into HSV color space, then removes the shadow of the processed image using Retinex model, and finally inputs the preprocessed image into convolutional neural network for target detection. The experimental results are shown in Fig. 3. The left figure shows the experimental results without image preprocessing, and the right figure shows the experimental results after image preprocessing. As a comparison, the traditional pixel-based classification method is also applicable to conduct experiments on test data. In this experiment, the selection of the classification method is based on image gray threshold. The strategy of this method is based on region segmentation. According to the different properties of different kinds of objects in the image, the algorithm uses spectral, shape, texture and other features to extract buildings. The following is the experimental result of a picture in a test set using gray threshold segmentation algorithm (Fig. 4). It can be seen that the outlines of most buildings are displayed. Here is to explain the experimental results of this experiment analysis indicators. The objective of this experiment is to identify buildings in remote sensing images. We choose two indicators of the number and accuracy of buildings to analyze the experimental results. This test uses a remote sensing image of urban buildings in DOTA data set, in which 198 buildings are manually labeled. It should be noted that the experimental results obtained by using fast R-CNN algorithm are many frames, so long as the number of frames is calculated, the number of buildings detected can be obtained; the experimental results obtained by using fuzzy clustering analysis have no frames for us to calculate, here we set the complete rectangular shape of the image as a building, and do not calculate if it is not rectangular shape. The total number of complete rectangular shapes is calculated as the number of buildings detected in the experiment. Besides, in order to measure the test index, we choose the accuracy of target detection as the criterion of experimental results. The accuracy calculation
Fig. 2 The positive and negative samples
Building Extraction Method in Remote Sensing Image
403
Fig. 3 R-CNN test results
Fig. 4 Test results of gray threshold segmentation method
method is as follows: n δ= n
S out
Ssample
(14)
404
Q. Han et al.
Table 1 Comparison of three different detection methods The traditional pixel-based classification method
113
57.07
Fast R-CNN algorithm without preprocessing
141
71.21
Fast R-CNN algorithm with preprocessing
149
75.25
Fig. 5 Rural area detection effect
Among them, Sout represents the area of buildings judged after target detection, Ssample represents the minimum outside rectangular area of buildings in the original sample, and n is the number of all buildings taken by the algorithm. We use the traditional pixel-based classification method, the preprocessed Fast R-CNN method and the Fast R-CNN algorithm without preprocessing to detect buildings in the same remote sensing image. The results are shown in Table 1. It could be seen that the use of preprocessing deep learning method cannot only effectively extract the features of buildings in remote sensing images, thus obtaining more accurate frames, but also cannot easily lose important image information. Fig. 5 shows part of the test results in rural areas, from which we can see that even in the sparse data images, most buildings are still detected.
4 Conclusion In summary, this paper designs a set of building target detection methods based on convolutional neural network according to the judgment requirements of building damage in disaster loss estimation. The method comprehensively considers the traditional image extraction method and deep learning method, and finally achieves the
Building Extraction Method in Remote Sensing Image
405
target detection of the buildings in the remote sensing image, and achieves better accuracy rates. In future experiments, the following points will be considered as further enhancements: 1. Update structure of Retinex model: the Retinex model in this paper only uses multiple multi-scale factors with weights to construct the surround function. For high-resolution remote sensing images, adding color channel factors can achieve more detailed effects. 2. Update the neural network. This paper uses the Fast R-CNN algorithm, and the Faster R-CNN algorithm with better performance can complete the feature extraction classification work more quickly, which is a focus of future work. Acknowledgements The research work described in this paper was fully supported by the National Key R&D program of China (2017YFC1502505) and the grant from the National Natural Science Foundation of China (61472043). Qian Yin and Xin Zheng are the authors to whom all correspondence should be addressed.
References 1. Bateson, C.A., G.P. Asner, and C.A. Wessman. 2000. Endmember bundles: A new approach to incorporating end member variability into spectral mixture analysis. IEEE Transactions on Geoscience and Remote Sensing 38 (2): 1083–1094. 2. Asner, G.P., and D.B. Lobell. 2000. A biogeophysical approach for automated SWIR unmixing of soils and vegetation. Remote Sensing of Environment 74 (1): 99–112. 3. Xu-dong, Wang, Guo Jian-ming, Jia Bai-jun, et al. 2008. Mixed-pixel classification of remote sensing images of cellular automata [J]. Journal of Surveying and Mapping 37 (1): 42–48. 4. Wang, Quan, and John D. Tenhunen. 2004. Vegetation mapping with multitemporal NDVI in North Eastern China transect (NECT). International Journal of Applied Earth Observation and Geoinformation 6 (1): 17–31. 5. Sun, Z.J., L. Xue, Y.M. Xu, et al. 2012. Overview of deep learning. Application Research of Computers 29 (8): 2806–2810. 6. Girshick, R., J. Donahue, T. Darrell, et al. 2014. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 580–587. 7. Girshick, R., J. Donahue, T. Darrell, et al. 2016. Region-based convolutional networks for accurate object detection and segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence 38 (1): 142–158. 8. He, K., X. Zhang, S. Ren, et al. 2015. Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 37 (9): 1904–1916. 9. Girshick, R. 2015. Fast R-CNN. In Proceedings of the IEEE International Conference on Computer Vision, pp. 1440–1448. 10. Zhi, Xiao, and Huang Jianjun. 2004. Edge blur of urban color aerial image retinex shadow elimination. Chinese Stereology and Image Analysis, 9 (2): 95–987; Land, Edwin H. 1977. The retinex theory of color vision. Scientific American 237 (6): 108–129. 11. DOTA: A Large-scale Dataset for Object Detection in Aerial Images. https://captain-whu. github.io/DOTA/index.html.
Similarity Measures Between Type-2 Fuzzy Sets Jing Wang and Gao Zheng
Abstract As an indispensable parameter in type 2 fuzzy logic, the similarity measure has a favorable application prospect. In this paper, the research history and status of this index are discussed briefly. Several typical definitions widely concerned by scholars are researched as emphases, including similarity measures of interval type2 fuzzy sets and those of ordinary type-2 fuzzy sets. Several successful application cases in the fields of pattern recognition, fuzzy clustering, simplification of fuzzy rule base in recent years are listed, and a simulation case of short term power load forecasting is presented to verify the performance of a similarity measure between interval type-2 fuzzy sets. Finally, the deficiency at present and the future development trend are pointed out. Keywords Fuzzy logic · Type-2 fuzzy set · Similarity measure
1 Introduction Fuzzy measures can improve the performance of fuzzy logic and make it fully play its role. According to the difference of measurement ranges, fuzzy measures can be divided into two categories: the first are used to measure the features of a fuzzy set itself, such as entropy [1]; another are used to show the relationships between two fuzzy sets, such as similarity measure [2]. The similarity measure represents the level to which two fuzzy sets are similar and has a good application prospect [3]. A traditional fuzzy set, namely type-1 fuzzy set, has a 2-dimensional membership function, and that of a type-2 fuzzy set is 3-dimensional, so it has an additional degree of freedom. Thus, the type-2 fuzzy logic grounded on type-2 fuzzy sets has a J. Wang (B) School of Computer, Zhuhai College of Jilin University, Zhuhai 519041, Guangdong, China e-mail: [email protected] G. Zheng Department of Electromechanical Management, China Coast Guard Academy, Ningbo 315801, Zhejiang, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_50
407
408
J. Wang and G. Zheng
better performance of describing and dealing with uncertainty [4]. In recent years, the type-2 fuzzy logic has become a research hotspot in the field of artificial intelligence. This paper mainly studies the important index in the type-2 fuzzy logic, namely the similarity measure. The remainder is divided into four sections. Section 2 summarizes the research history and status. In Sect. 3, we mainly study several typical definitions. Section 4 lists several successful application cases in recent years and tests the performance of a similarity measure between interval type-2 fuzzy sets by a simulation example of short-term power load forecasting. At last, Sect. 5 gives the conclusions and prospects.
2 Research History and Status The interconnections between things in nature and the attributes of things have certain vague properties. People often use vague language to describe them, such as describing temperature as “high” and “low”, describing size as “long” and “short”, describing speed as “fast” and “slow”, which are all fuzzy terms and contain more content and information, so fuzzy concepts apply to the entire process of people’s understanding and observation of things in nature. Classical cybernetics could not deal with the fuzzy information contained in a large number of fuzzy and complex systems in human work and life, so it needs a different mathematical method to solve such problems. In 1965, the fuzzy set theory came into being [5]. Since then, Zadeh, the founder of fuzzy set theory, and other scholars have established a complete fuzzy theory. Fuzzy theory uses fuzzy language to describe the characteristics of systems that are difficult to describe by mathematical models, so that fuzzy systems can directly apply human thoughts and intelligence to controlled objects and processes to solve nonlinear problems that are difficult to handle by traditional methods. In 1971, Zadeh came up with the concept of the similarity measure which was easy to understand, conform to human mind [6]. Over the next few decades, more than 60 definitions of this index have been proposed. In recent years, they have been applied more and more widely. For example, Seines et al., proposed a new means to use the similarity measure to simplify the fuzzy rule base for the purpose of eliminating the negative effects of redundant fuzzy sets and fuzzy rules at the same time, improving the interpretability of fuzzy rules, reducing the computational complexity of the system, and making the system easy to design, use, and understand [7]. Uncu and Turksen proposed a fuzzy clustering method on the basis of the similarity measure, which can be used for fuzzy system identification [8]. In 1975, Zadeh gave the concept of the type-2 fuzzy set, whose membership value of each element is a traditional (namely type-1) fuzzy set. With the 3-dimensional membership function it has more freedom to describe and process uncertainty, thus its ability to describe and deal with uncertainty is stronger [9]. Zadeh’s research laid the foundation for the growth of type-2 fuzzy logic. Due to complicated calculations, it didn’t get much attention. This situation continued until the 1990s. People were
Similarity Measures Between Type-2 Fuzzy Sets
409
in urgent need of an advanced technology to cope with the uncertainty information contained in complex nonlinear objects. Against this background, the type-2 fuzzy logic received wide attention. Since then, related theories had developed vigorously, the research on the type-2 fuzzy similarity measure was also increasing, even if they were too complicated to understand. For example, Bustince proposed an interval similarity measure [10], which expanded people’s understanding of the value range of the index. Mitchell first proposed a calculation method of the ordinary type-2 fuzzy similarity measure [11]. Zeng and Li put forward an axiomatic definition which contained four axioms, and the formula was built within the constraint of the axioms, and the computation method was simple and easy to understand [12]. Based on the standardized distance, Zeng and Guo put forward an interval type-2 fuzzy similarity measure [13]. Based on the axiomatic definition, Wu and Mendel gave a vector-type similarity measure [14]. Zhang et al., selected an axiomatic definition, and constructed the formula based on the distance [15]. Yang and Lin proposed a new similarity measure between two ordinary type-2 fuzzy sets based on the axiomatic definition [16]. Hwang et al., presented a new similarity measure of ordinary type-2 fuzzy sets on the basis of Sugeno integral, and proved that its performance was better than that of Yang and Lin’s [17]. Paper [18] raised a formula based on a selected axiomatic definition. Based on the axiomatic definition proposed by Zeng and Li, Tsai et al., gave formulas with exponential forms [19]. McCulloch et al., proposed a method of extending the existing interval type-2 fuzzy similarity measure to the ordinary type-2 fuzzy similarity measure [3]. Li et al., defined a new ordinary type-2 fuzzy similarity measure, and verified its good performance by a clustering algorithm [20].
3 Several Typical Definitions The structures and calculations of ordinary type-2 fuzzy sets are complicated, which limit their development. In recent years, research in this area is mainly concentrated in the similarity measure of interval type.
3.1 Similarity Measures Between Interval Type-2 Fuzzy Sets The interval type-2 fuzzy similarity measure proposed by Zeng and Li was typical. They selected the constraints that must be satisfied by the calculation formula, including four axioms as follows [12]: (S1) S(P, P c ) = 0; (S2) S(U˜ , V˜ ) = 1 ⇔ U˜ = V˜ ; (S3) S(U˜ , V˜ ) = S(V˜ , U˜ );
410
J. Wang and G. Zheng
(S4) For arbitrary interval type-2 fuzzy sets U˜ , V˜ and W˜ , if U˜ ⊆ V˜ ⊆ W˜ , then S(U˜ , W˜ ) ≤ S(U˜ , V˜ ) and S(U˜ , W˜ ) ≤ S(V˜ , W˜ ). where S(U˜ , V˜ ) is the similarity measure of U˜ and V˜ , P is a set with precision values, P c is the complementary set of P. The four axioms conform to people’s intuitive understanding of the interval type2 fuzzy similarity measure. The Formulas (1) and (2) are constructed under the constraints of the four axioms. The former is defined on a continuous domain of X = [u, v], and the latter is defined on the discrete domain of X ={x1 , x2 , . . . , xn } [12]. 1 S(U˜ , V˜ ) = 1 − 2(v − u) 1 S(U˜ , V˜ ) = 1 − 2n
v
( f¯U˜ (x) − f¯V˜ (x) + f U˜ (x) − f V˜ (x))d x
(1)
u
n
( f¯U˜ (xi ) − f¯V˜ (xi ) + f U˜ (xi ) − f V˜ (xi ))
(2)
i=1
Where the symbol denotes the integral, f¯U˜ (x) indicates the upper membership function (UMF) of U˜ , f U˜ (x) stands for the lower membership function (LMF) of U˜ , f¯V˜ (x) and f V˜ (x) denote those of V˜ . The Formula (3) is used for the calculation of the similarity measure with an exponential form proposed by Tsai et al., on the basis of Zeng and Li’s definition [19].
−max(| f¯U˜ (xi )− f¯V˜ (xi )|, f U˜ (xi )− f V˜ (xi )) n − e−1 1e S(U˜ , V˜ ) = −1 n i=1 1−e
(3)
For the similarity measure defined in [18], it also contains four axioms in its axiomatic definition, one is N (W˜ , W˜ ) = maxU˜ ,V˜ ∈I V F Ss N (U˜ , V˜ ), which is less strict than (S2) in Zeng and Li’s definition, another three are the same as those in Zeng and Li’s definition. The Formula (4) is used for calculation.
min f¯U˜ (x), 1 S(U˜ , V˜ ) = ( x∈X 2 max f¯U˜ (x), x∈X
min f (x), f (x) dx ¯ f V˜ (x) d x x∈X U˜ V˜ ) (4) + f¯V˜ (x) d x x∈X max f U˜ (x), f V˜ (x) d x
where the symbol represents the integral, and it is substituted for the summation Σ in discrete situations. The four axioms presented by Wu and Mendel are shown in the following [14]: (S1) S(U˜ , V˜ ) = 1 ⇔ U˜ = V˜ ; (S2) S(U˜ , V˜ ) = S(V˜ , U˜ );
Similarity Measures Between Type-2 Fuzzy Sets
411
(S3) If there are three interval type-2 fuzzy sets U˜ , V˜ and W˜ with the same shape, then the closer two of the three sets are, the greater their similarity measure is. That is: if c(U˜ ) < c(V˜ ) < c(W˜ ), then S(U˜ , V˜ ) > S(U˜ , W˜ ) and S(V˜ , W˜ ) > S(U˜ , W˜ ); If c(U˜ )=c(V˜ )= c(W˜ ) and U˜ < V˜ < W˜ , then S(U˜ , V˜ ) > S(U˜ , W˜ ) and S(V˜ , W˜ )> S(U˜ , W˜ ); (S4) If there is a partial overlap between two interval type-2 fuzzy sets U˜ and V˜ , then S(U˜ , V˜ ) > 0. ˜ c( B) ˜ and c(C) ˜ are the where S(U˜ , V˜ ) is the similarity measure of U˜ and V˜ ; c( A), ˜ ˜ ˜ center of the centroid of U , V and W respectively. (S1) and (S2) in Wu and Mendel’s definition are consistent with (S2) and (S3) in Zeng and Li’s definition respectively, (S3) is transitivity, (S4) is overlap. The four axioms also conform to people’s intuitive understanding. S(U˜ , V˜ ) can be obtained by the Formula (5) [14]. S(U˜ , V˜ ) = (S1 (U˜ , V˜ ), S2 (U˜ , V˜ ))T
(5)
where S1 (U˜ , V˜ ) and S2 (U˜ , V˜ ) are the similarity measure on the shapes and that on the proximity of U˜ and V˜ respectively. When calculating S1 (U˜ , V˜ ), first find c(U˜ ) and c(V˜ ), make V˜ coincides with U˜ , and then move V˜ to the position of V˜ . Finally, calculate S1 (U˜ , V˜ ) with a formula used for type-1 similarity measure. S2 (U˜ , V˜ ) can be calculated by Formula (6). S2 (U˜ , V˜ ) = m(d(U˜ , V˜ ))
(6)
where d(U˜ , V˜ ) is the Euclidean distance of c(U˜ ) and c(V˜ ). m(x) is a monotone decreasing function, lim m(x) = 0, and it meets m(x) = 1, if and only if x = 0. x→∞
Suppose m(x) = e− px , p is a positive constant, S2 (U˜ , V˜ ) can be obtained by Formula (7). ˜ ˜
S2 (U˜ , V˜ ) = e− pd(U ,V )
(7)
If the scalar similarity measure is required, just need to multiply S1 (U˜ , V˜ ) by S2 (U˜ , V˜ ). It can be seen that the measure shown in the Formula (5) is more complex. However, it takes into account the two aspects, namely the similarity measure on the shapes and that on the proximity of two interval type-2 fuzzy sets.
412
J. Wang and G. Zheng
3.2 Similarity Measures Between Ordinary Type-2 Fuzzy Sets Mitchell first proposed a calculation method of the similarity measure between ordinary type-2 fuzzy sets [11]. For arbitrary ordinary type-2 fuzzy set U˜ , its universe of discourse can be discretized into L points, l = 1, 2, . . . , L. It is assumed that the scope of the primary membership value of xl is [ψU˜ (xl ), φU˜ (xl )], and its embedded functions are shown in Formula (8). αU(m) ˜ (xl ) = ψU˜ (xl ) + h m (xl ) × (φU˜ (xl ) − ψU˜ (xl ))
(8)
where h m (xl ) ∈ [0, 1]. U˜ can be regarded as the whole of embedded function αU(m) ˜ (x i ), m = 1, 2, . . . , M. ˜ ˜ The similarity measure of U and V can be calculated by Formula (9). S(U˜ , V˜ ) =
M N
(n) S(αU(m) ˜ (x), αV˜ (x)) · mn
(9)
m=1 n=1 (n) ˜ ˜ where αU(m) ˜ (x) and αV˜ (x) are the embedded function of U and V respectively;S(·, ·) is the weight, which meets 0 ≤ mn ≤ 1, is an
arbitrary type-1 fuzzy similarity; mn M N = 1. and m=1 mn n=1 The method proposed by Mitchell is more complex and lacks the constraint of axiomatic definition, but it is of pioneering significance. The four axioms presented by Yang and Lin are shown in the following [16]:
(S1) S(U˜ , V˜ ) = S(V˜ , U˜ ); (S2) S(P, P c ) = 0; (S3) S(W˜ , W˜ ) = maxU˜ ,V˜ ∈F2 (X ) S(U˜ , V˜ ); (S4) For arbitrary ordinary type-2 fuzzy sets U˜ , V˜ and W˜ , if U˜ ⊂ V˜ ⊂ W˜ , then S(U˜ , V˜ )≥S(U˜ , W˜ ) and S(V˜ , W˜ ) ≥ S(U˜ , W˜ ). where S(U˜ , V˜ ) is the similarity measure of U˜ and V˜ , P is a set with precision values, P c is the complementary set of P. These four axioms conform to people’s intuitive understanding of the similarity measure of ordinary type-2 fuzzy sets. The Formula (10) can be used for calculation [16]. min{r · ax (r ), r · bx (r )}dr 1 r ∈Jx dx (10) S(U˜ , V˜ ) = x∈X d x x∈X r ∈Jx max{r · a x (r ), r · bx (r )}dr where the symbol represents the integral, and it is substituted for the summation Σ in discrete situations; ax (r ) and bx (r ) stand for the secondary membership function of U˜ and V˜ respectively.
Similarity Measures Between Type-2 Fuzzy Sets
413
The construction of Formula (10) takes into account the two aspects, one is the footprint of uncertainty (FOU), the other is secondary membership functions.
4 Applications 4.1 Application Cases In recent years, this index has been obtained wide range of applications, such as pattern recognition, fuzzy clustering, simplification of fuzzy rule base and so on. Mitchell pointed out that this index was suitable for the pattern recognition problems of handwriting recognition, fingerprint recognition, face recognition, X ray image classification, remote sensing data classification and so on, which contained uncertain information [11]. Paper [11] used the ordinary type-2 fuzzy similarity measure shown in the Formula (9) to identify and classify the X ray images of welding structure for the purpose of improving the safety of mechanical equipment and reducing the cost. Yang-Shih clustering method is a typical hierarchical clustering method, which is suitable for dealing with the multi-layer layout problems. Paper [16] combined the ordinary type-2 fuzzy similarity measure with the Yang-Shih clustering algorithm to make clustering analysis of ordinary type-2 fuzzy numbers, and the reasonable clustering results were obtained. Paper [18] established a type-2 Mamdani fuzzy model for power load time series prediction, and gave a backpropagation- similarity measure-singular value decomposition (SVD-SM-BP) hybrid iterative algorithm to simplify the fuzzy rule base. The Formula (4) was used to identify the redundant fuzzy sets, and the merging and deleting methods were used to eliminate them. Finally, the SVD method was used to optimize the fuzzy rules, thus the adverse effects caused by redundant fuzzy sets and superfluous fuzzy rules can be reduced effectively to upgrade the approximation accuracy of the model. The similarity measure has a good application prospect. Some application schemes of type-1 can be expanded to type-2 occasions. For example, Yang and Shih combined the type-1 fuzzy similarity with the Yang-Shih clustering method for the identification of similar Chinese characters and different family members [21], if a type-2 fuzzy similarity measure is used to do something like those, the effect will be better.
4.2 Example and Verification Power load forecasting is a vital and basic work in power industry. The accurate power load forecasting is the basis of safe, stable, and economic running of the power system. The lower prediction values will lead to the lack of electrical energy, and the higher prediction values will cause the waste of electrical energy [18].
414
J. Wang and G. Zheng
Based on SVD-BP hybrid iteration algorithm and SVD-SM-BP hybrid iteration algorithm, two interval type-2 Mamdani fuzzy models with non-singleton inputs (called model 1 and model 2) are established for the purpose of predicting shortterm power load. The input crisp values can be transformed into Gaussian functions with uncertain mean square deviations through the Gaussian fuzzifiers. There are four inputs and one output. Every antecedent set is a Gaussian function with uncertain mean value, and there are three sets included in the input universe of discourse of each antecedent. Every consequent set is an interval number. Type-reduction is achieved by Center-of-sets method, and K-M iterative process is used to simplify the calculation. The detailed procedures are shown in [18]. There are 1728 power load time series data of five minutes of a city in China from June 2 to June 7, 2009. The first 1440 (the first 5 days’ data) are used for modeling, and the latter 288 (the last day’s data) are used for testing the results. The prediction error is expressed by (11). N 1 f x(k) − s(k + 1) E= N t=1 s(k + 1)
(11)
where X(k) stands for input data, f (x(k) ) acts for prediction data, and s(k + 1) shows real data. Prediction results are shown in the Figs. 1 and 2. In each model, there are 81 rules in the complete fuzzy rule base. In the model 1, after parameter training by the BP algorithm, the SVD method is used for the simplification of the fuzzy rules, there are 16 rules, and the prediction error is 2.42%. In model 2, there are 12 rules, and the prediction error is reduced to 2.25%, the reason is that by combining the SVD method with the similarity measure, the fuzzy rule Fig. 1 Prediction results of model 1
Similarity Measures Between Type-2 Fuzzy Sets
415
Fig. 2 Prediction results of model 2
base is further “slimmed down” and optimized. It can be seen from the simulation curves that the approximation performance of model 2 is better.
5 Conclusions This paper mainly studies the similarity measure of type-2 fuzzy sets. Summarizes research history and status of this index. Studies several typical definitions, including interval type and ordinary type. Lists several successful application cases in recent years, and uses a simulation example of five minutes power load forecasting to verify the performance of a similarity measure of interval type-2 fuzzy sets. At present, the research in this field mainly focuses on the theoretical aspect, and it is necessary to make some practical applications in the future. The combination with other fuzzy measures, such as the inclusion measure, can make up their deficiencies and give full play to their advantages. Acknowledgements This work was supported by Teaching Quality and Teaching Reform Project of Department of Education of Guangdong Province (Grant No. 2017009), Innovative Capacity Development Project of Zhuhai College of Jilin University (project number: 2018XJCQ022), Innovative Entrepreneurship Education Curriculum Development Project of Zhuhai College of Jilin University, Teacher Education Development Fund Project of Zhuhai College of Jilin University (project number: JZ2018JZA11), Teaching Quality Engineering Construction Project of Zhuhai College of Jilin University in 2019, Zhuhai Laboratory of Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education.
416
J. Wang and G. Zheng
References 1. Yager, R.R. 2015. Uncertainty modeling using fuzzy measures. Knowledge-Based Systems 000: 1–8. 2. Zhang, Q., H. Xing, F. Liu, J. Ye, and P. Tang. 2014. Some new entropy measures for intervalvalued intuitionistic fuzzy sets based on distances and their relationships with similarity and inclusion measures. Information Sciences 283: 55–69. 3. McCulloch, J. C Wagner, and U. Aickelin. 2013. Extending similarity measures of interval type2 fuzzy sets to ordinary type-2 fuzzy sets. IEEE International Conference on Fuzzy Systems, Hyderabad, India, 1–8. 4. Sancheza, M.A., O. Castillob, and J.R. Castroa. 2015. Generalized type-2 fuzzy systems for controlling a mobile robot and a performance comparison with interval type-2 and type-1 fuzzy systems. Expert Systems with Applications 42 (14): 5904–5914. 5. Ladeh, L.A. 1965. Fuzzy sets. Inform Control 8 (3): 338–353. 6. Zadeh, L.A. 1971. Similarity and fuzzy ordering. Information Sciences 3 (2): 177–200. 7. Setnes, M., et al. 1998. Similarity measures in fuzzy rule base simplification. IEEE Transactions on Systems, Man, and Cybernetics 28 (3): 376–386. 8. Uncu, O., and I.B. Turksen. 2001. A novel fuzzy system modelling approach: multidimensional structure identification and inference. IEEE International Conference on Fuzzy Systems, Melbourne, Australia, 557–561. 9. Zadeh, L.A. 1975. The concept of a linguistic variable and its application to approximate reasoning. Information Sciences 8 (3): 199–249. 10. Bustince, H. 2000. Indicator of inclusion grade for interval-valued fuzzy sets. Application to approximate reasoning based on interval-valued fuzzy sets. International Journal of Approximate Reasoning 23 (3): 137–209. 11. Mitchell, H.B. 2005. Pattern recognition using type-II fuzzy sets. Information Sciences 170 (2–4): 409–418. 12. Zeng, W., and H. Li. 2006. Relationship between similarity measure and entropy of intervalvalued fuzzy sets. Fuzzy Sets and Systems 157 (11): 1477–1484. 13. Zeng, W., and P. Guo. 2008. Normalized distance, similarity measure, inclusion measure and entropy of interval-valued fuzzy sets and their relationship. Information Sciences 178 (5): 1334–1342. 14. Wu, D., and J.M. Mendel. 2008. A vector similarity measure for linguistic approximation: interval type-2 and type-1 fuzzy set. Information Sciences 178 (2): 381–402. 15. Zhang, H., W. Zhang, and C. Mei. 2009. Entropy of interval-valued fuzzy sets based on distance and its relationship with similarity measure. Knowledge-Based Systems 22 (6): 449–454. 16. Yang, M., and D. Lin. 2009. On similarity and inclusion measures between type-2 fuzzy sets with an application to clustering. Computers & Mathematics with Applications 57 (6): 896–907. 17. Hwang, C., M. Yang, and W. Hung. 2011. New similarity and inclusion measures between type-2 fuzzy sets. Proceedings of 2011 IEEE Symposium on Advances in Type-2 Fuzzy Logic Systems, Paris, France, 82–87. 18. Zheng, G., and J. Xiao. 2012. Forecasting study of power load based on interval type-2 fuzzy logic method. Electric Machines and Control 16 (9): 26–32 (In Chinese). 19. Tsai, H.S., C.M. Hwang, and M.S. Yang. 2013. Exponential inclusion, similarity measure and entropy of interval-valued fuzzy sets and their relationship. Journal of Pattern Recognition and Image Processing 4 (4): 493–500. 20. Li, D., T. Li, and T. Zhao. 2014. A new clustering method based on type-2 fuzzy similarity and inclusion measures. Journal of Computers 9 (11): 2559–2569. 21. Yang, M.S., and H.M. Shih. 2001. Cluster analysis based on fuzzy relations. Fuzzy Sets and Systems 120 (2): 197–212.
Development Strategy of E-Commerce Network Marketing Based on New Media Marketing Mode Tingzhong Wang and Lingli Zhu
Abstract The new media marketing is to implement the enterprise’s soft-penetration business strategy in the form of new media. New media are used to express and disseminate ideas, ideas, and concepts that enable consumers to recognize, to achieve product sales and branding. This paper discusses the development of network marketing mode, promotion channels and strategies under the new media marketing environment, analyzes the opportunities and challenges faced by enterprises, and puts forward some countermeasures from two aspects of the government and enterprises. This paper presents research on development strategy of e-commerce network marketing based on new media marketing mode. Keywords E-commerce · Network marketing · New media marketing · Online shopping · Channels and strategies
1 Introduction The close connection between the Internet and the economy has pushed marketing to a new stage-new media marketing based on Internet information technology, spreading information to users through mobile devices such as mobile phones, the most common of which are WeChat and Weibo. The emergence and development of new media has gradually replaced the traditional media, and the advantages of enterprises are limited. Enterprises can use network marketing technology to improve their position in the new media environment. Compared with the traditional media, the concept of new media is put forward, including WeChat, Weibo, post bar, website and other new social platforms. New media marketing combines Internet and digital technology, almost all online publicity, promotion and marketing [1]. In addition, the gradual transfer of network users from computer to mobile has also brought a lot of market space for new media marketing, and its future development trend has become increasingly clear. T. Wang (B) · L. Zhu Luoyang Normal University, Luoyang 471934, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_51
417
418
T. Wang and L. Zhu
The development of electronic commerce connects enterprises and individuals, enterprises and enterprises, individuals and individuals. Through the bridge of crossborder e-commerce, trading and communication can not only improve the efficiency of trade, shorten the trade process, but also promote the development of China’s foreign trade. This paper mainly analyzes and summarizes the application of marketing promotion in cross-border e-commerce enterprises. At a time of increasingly fierce development of cross-border e-commerce, many enterprises, especially small and medium-sized enterprises, are facing great competitive pressure. The emergence of WeChat, Weibo, headlines, Baijia and other self-media platforms has made the content and form of new media more and more personalized, showing personal subjective feelings, with strong personal labels and images. Personalized content makes new media marketing more attractive and can have its own audience. In recent years, the problem of network fraud and information disclosure has gradually attracted the attention of netizens. With the increase of the degree of protection of private information, this limits the publicity and promotion of enterprises in some ways. Although the network media is hidden and virtual, the outbreak of this kind of trust crisis reflects the imperfect rules of the Internet platform and its adverse impact on the society, so the problem of security marketing has attracted great attention at home and abroad.
2 Strategic Change Mode of Network Marketing in the Environment of New Media Marketing With the popularity of electronic commerce, people choose goods no longer confined to a little bit, but really choose goods from the aspects of commodity quality and performance-price ratio to improve their quality of life. As far as consumer security is concerned, the emergence of e-commerce makes people’s way of life more convenient and safer at the same time [2]. Consumers can immediately view the place of production, commodity brands, price information, after-sales service information and other buyers’ evaluation. Content marketing refers to the promotion of consumer desire by giving relevant content to the product and making it resonate in the mind of the consumer. With the improvement of people’s quality of life, the focus point of the consumer is more inclined to the connotation, and people will show their taste and attitude through the pursuit of the “have a soul”. E-commerce has made great progress in the production concept. The traditional production concept revolves around the product and is produced for the sake of production. It does not know how to pay attention to the changes in the market and consumer demand. There is often a situation where the supply exceeds demand. Sometimes a product may be out of date [3]. However, due to the lack of timely follow-up to market changes, the information collected is not enough to make timely
Development Strategy of E-Commerce Network …
419
responses. In vain, the production cost has been increased, and the products cannot be sold well. Especially after entering the media era, the communication between people and the world is faster and more convenient. People are used to using mobile phones for online payment, online shopping and so on. Enterprises can use the network platform to publish relevant marketing information in time, provide sales through various network platforms, and establish their own consumer groups, so they can better position the sales target and better promote the marketing activities of the company. In terms of the number and types of new media marketing platforms, a variety of new media platforms emerge in endlessly. Earlier blogs to the latest popular Douyin are very beneficial to enterprises, increasing the channels of product promotion and expanding the number of audience groups [4]. In terms of the way and content of new media promotion, it was just text and pictures in the early days, and then video was added. This business model is generally the enterprise has its own brand official website, the website can be B2B model, can also be B2C model. The main purpose of the website is to show the strength of the enterprise, the main function is divided into two parts, one is the front customer service and enterprise strength, the product display function, the other is the background management of the front desk and the website content construction and release function, as is shown by Eq. (1) [5]. T =
a1 + a2 x + a3 y a4 + a5 x + a6 y
∼
X a, a = [a1 , a2 , a3 , a4 , a5 , a6 ]T
(1)
As a kind of planning and execution activity, the process of marketing includes the development, production, pricing, promotion and circulation of a product, a service, or an ideology. The purpose of marketing is to meet the needs of an organization or an individual through the process of exchange and transaction. So that enterprises can use new media to implement marketing has a more common mass foundation, for example, in youth groups, middle-aged groups, elderly groups, working groups and so on, new media is widely used in different consumer groups [6]. At the same time, with the help of new media, user information can be classified and summarized according to user needs and consumer preferences, and potential customers can be developed. It is helpful for the production of the brainstorm and the improvement and optimization of the product itself when the enterprise product is promoted. In the direction of the new media promotion source, the original media promotion is one-way, the public can only accept the content that the promoters want to know, and the new media promotion now is the two-way communication process between the promoter and the audience, and through the comments, the message and the real-time play screen interaction, And the distance between the mass and the promotion content is shortened.
420
T. Wang and L. Zhu
How to operate the website, companies can conduct Google search engine optimization through professionals, that is, foreign trade express, similar to domestic SEO optimization, so that more foreign customers in the search for products to see you. You can also use some traditional ways, such as registering B2B sites, to display the Web sites of enterprises on these foreign websites, to sum up, it is the coverage of foreign websites. Marketing is actually included in marketing, relying on the Internet environment of marketing, compared with the traditional marketing relying on offline marketing, e-commerce marketing has brought great changes [7]. The change is obvious in the following points, which provides great convenience for people. In the traditional sales, enterprises decide the style and model of their own products, customers are only consumers, there is no interaction and communication between the two, marketing and promotion, mainly a single way of television advertising, consumers can only passively accept the choice of products. However, in the new media age, consumers see more information and products from different channels. Search engine marketing is to carry out marketing activities through the network search engine, which is a kind of network marketing work to promote the website to improve the ranking of the website and increase the traffic of the website. There are two main ways of search engine marketing: SEO and PPC. Seo (Search Engine Optimization) search engine optimization, according to the search engine ranking mechanism step by step adjustment. The continuous development of information technology and digital technology can also make various enterprise products and peripheral services realize the real globalization development. In the area of the new media outreach, through the use of international new media platform software, such as Facebook, Twitter, Ins, YouTube, even in the country’s microblogs, the people in their use are open-ended, open-ended and can broaden the scope of the business at the international level. The model is the operation mode of the enterprise to the consumer, the mode is mainly retail, the enterprise directly faces the foreign consumption group on the B2C platform, mainly sells like the clothing, the bag, this kind of personal consumer goods, through on-line payment, carry on the express, the logistics, The final transaction is completed in such a way as to be wrapped. Click to pay the advertisement, also known as the keyword advertisement or the price ranking, when the potential target customer clicks, to pay the advertisement cost to the search engine [8]. The most important of the search engine marketing is the ranking of the website in the search engine. The enterprise should constantly optimize and update the website, improve the listing, and increase the exposure of the website by means of the SEM or the SEO.
Development Strategy of E-Commerce Network …
421
3 Promotion of Channels and Strategies in the New Media Marketing Environment Interaction is the biggest advantage of new media marketing. This interaction is not only a reflection of the public’s acceptance of the content of the promotion, but also the choice of the public can be changed to a great extent. The new media marketing, based on the Internet technology, sends the marketing content to the public, and when the receiver receives the promotion information passively, the information can be screened subjectively, and the information which meets the requirements of the audience is the real value. At present, the development of C2C operation model is not mature enough, there are many unsolved and perfect problems in this mode [9]. If consumers form a scientific business model system in the future, individual consumers around the world can also become sellers who can reach transactions through third-party sales platform, which will be a new trade trend. E-commerce marketing. The expansion of the influence of e-commerce greatly improves the convenience of the traditional marketing in the operation mode and the freight mode, and provides a more convenient and more comfortable service for consumers, and also enables a large-scale promotion of the market economy. E-commerce has led to a larger market, or even global, for commodities that would otherwise have only a small market. The video marketing is to take the products, the enterprise and so on into the video, publish to some video websites, move the APP, the new media platform to carry out the publicity and display, so as to achieve the marketing purpose. According to the survey, in the first half of 2018, the number of Chinese Internet users has reached 60,906 million, accounting for 76.0% of all Internet users. Internet video is the main way to watch video by more and more users, and network users will watch a large amount of video every day and share these videos to friends, colleagues and family. More and more new media platforms are interactive, and this interaction is more specific and immediate [10]. The creation of the playing screen is a good expression. At the same time of watching the information, the person can make his own comments and views, and the viewer can see each other, more convenient for the audience to exchange the opinions, as is shown by Eq. (2). V˜ j−1,k =
L−1 l=0
h˜ l W˜ j,k+2 j−1 l mod N +
L−1
g˜l V˜ j,k+2 j−1 l mod N
(2)
l=0
The strategy mainly includes standardized product design strategy and packaging strategy. The design strategy requires that cross-border e-commerce enterprises face the global and different markets to provide products that are consistent in shape, consistent in function and consistent in characteristics. The typical 3C type electronic products and accessories have the characteristics of high standardization level, and
422
T. Wang and L. Zhu
the consistency of the appearance of the products can enable the enterprise to quickly obtain the scale economic benefit. The traditional marketing model, which is the starting point of the producer and the consumer as the end point, has a large number of wholesalers, retailers and the like to make the difference between the middlemen, thus affecting the selling price of the products. Now, the wide application of e-commerce has saved the opportunity for many middlemen to make the difference, and the products can be sold directly through the Internet, and many unnecessary steps are reduced. One of the directions of product marketing in the future is network video marketing, whether products or enterprises, through illustrative video, promotional activities video or animation video and other different types of video, can be more effectively promoted to target users. Today, the most important types of mainstream video platforms include Tencent, iqiyi, Youku and other video sites. The personalization of the new media marketing is largely reflected in the content pushed by the new media platform on the user. According to the acquisition of different types of information by the user, the software background is classified by an algorithm, and a message of which the user is likely to be interested is selectively recommended to the user, so that the effect of the private subscription is achieved. In the time not yet arrived for e-commerce, people can only consume in physical stores, consumers cannot compare the quality and price of similar goods in different places, nor can they clearly inquire about the purchase channels of goods, let alone be guaranteed after sale. So consumers will waste a lot of time in each physical store back and forth to compare the performance-to-price ratio. The form of network video is very interactive, users can discuss and publish their own opinions on the content of the video, the author can reply, the process and content of the interaction enable the user to deepen the sense of feeling and improve the degree of satisfaction. At the same time, the user also forwards or shares the video of interest to the friend, which is also initiative to carry on the virus marketing, the wide range of the video advertisement to go out, can save the promotion cost and energy of the enterprise.
4 Research on Development Strategy of E-Commerce Network Marketing Based on New Media Marketing Mode The interaction of new media platform and the timeliness of information are very helpful for enterprises to close the distance between their products and users. Because the new media software is widely used, people can express their ideas at any time, and the addition of users will make the product more real. For buyers, when we choose a product, the experience of other users will largely determine our intentions. Packaging strategy refers to the need to make different divisions according to the different specifications and physical characteristics of the product, according to
Development Strategy of E-Commerce Network …
423
the product to make standardized packaging design, materials, marks, specifications, easy to carry out packaging of the product. Because of the different places of crossborder trade and export, there are a variety of product categories, packaging needs to be customized according to customer order requirements, cross-border e-commerce companies need to hoard a large number of packaging materials for this purpose, and will increase costs. Online shop shopping shortens consumers’ shopping time. Consumers do not have to consider time, place, can also browse a variety of commodity information, consumers only need to spend half or more of the time to choose a more satisfactory goods. In addition, through online shopping, goods by businesses contact express delivery, can be sent directly to consumers, as is shown by Eq. (3). V (α) =
(I − A(α))yδ 2 /m [tr (I − A(α))]2 /m
(3)
Community marketing is based on a marketing model that is based on the concept of a circle and a person’s pulse, and brings together people with the same interests and needs to meet the business form of the group’s needs through a product or service. The common social marketing platform has QQ group, micro-letter group, micro-blog, forum and so on, and even offline communities can do community marketing. When staying in the era of traditional media, such as newspapers, television, radio and other traditional media era, the cost of publicity is a large amount of expenditure for enterprises, and some small enterprises simply cannot afford the costs brought by traditional media. Compared with the traditional media, the use of new media is more flexible and the threshold is lower. Enterprises can propagate and promote their products through new media software, because of the aggregation of many traffic and the change of people’s habit of obtaining information. Therefore, a standardized and qualified packaging material system can be established by means of informationization big data technology. By collecting important data such as characteristics and weight of exported products, big data technology can be used to excavate, verify and analyze the data, so as to obtain the most common packaging specifications of the products and reduce the packaging design. In the traditional shopping mode, when the consumer is in the physical store, the consumer generally needs to carry the cash, or swipe the card. After the payment of Alipay and the payment of WeChat, the problems and troubles that may arise in some payment are slightly reduced. In the e-commerce environment, the consumer can purchase online, and the transaction can be carried out directly through the electronic money. The key to the community marketing is to determine the core opinion leader, and the opinion leader should have the influence and appeal of the enterprise, lead and complete the communication of the commodity information, and finally realize the target of the individual of the community. Community marketing is a marketing method with higher interactive frequency and higher viscosity. It is a value-to-value process. When you give value, the customer will think of you when you need it.
424
T. Wang and L. Zhu
5 Conclusion Among the many new media platforms, Douyin and Weibo are the two most representative examples. Douyin is new media software in the past two years, and it is also a good one in the current short video media. Douyin mainly plays music short video at the beginning of the launch, and positions the applicable crowd as young people. Later, with the increase of users, there are more and more kinds of short video, and even some state institutions or established enterprises have begun to enter Douyin. The development of network marketing in the new media marketing environment has become the development trend, which provides convenience for our life and adapts to the fast-paced life today. There will be some opportunities and challenges in the process of implementation, and we should look at these opportunities and challenges positively. Acknowledgements This paper is supported by Science and technology project of Henan Province (152102210123, 142102210475).
References 1. Zhiping, Li. 2018. Enterprise marketing characteristics and marketing strategy under the new media environment. Modern Industrial Economy and Informatization 8 (13): 109. 2. Yuan, Huang. 2018. The change of marketing mode under the background of new media. Journal of Wuhan Institute of Metallurgical Management Cadres 28 (03). 3. Xin, Zhang, and Zhang Ling. 2010. Analysis on the reform of marketing concept under the condition of electronic commerce. China Business (20) (in Chinese). 4. Xiaojiao, Liu. 2018. Research on new media marketing strategy based on information age. Computer Products and Circulation (08): 61 (in Chinese). 5. Hengmao, Li. 2019. On the development of network marketing mode under the background of new media. Communication World, 26 (02). 6. Haibo, Song. 2018. Based on the innovation of marketing concept under the condition of electronic commerce. Journal of Jiamusi Vocational College (02) (in Chinese). 7. Mingyue, Liu. 2018. A probe into the specific ways and strategies of new media marketing. Chinese and Foreign Entrepreneurs (28): 75–76 (in Chinese). 8. Xuan, Wu. 2019. Research on the strategy of using new media for marketing. Modern Marketing (Information Edition) (02) (in Chinese). 9. Xin, Dai. 2015. Analysis on the transformation of marketing concept under the environment of electronic commerce. Modernization of Shopping Malls (25) (in Chinese). 10. Hongxu, Luan, Ru Zheng, and Xu Zigeng. 2018. Analysis of several strategies of new media marketing. Modern Communication (24): 79–80 (in Chinese).
Reconstruction of Path of Mental Health Education of College Students Under the Background of “Internet+” Zhihui Gong
Abstract Entering into the era of “internet+”, the educational mode and educational method of mental health education of traditional college students are shocked forcefully. Taking “internet+” as the background, the major characteristics of “internet+” are analyzed, and furthermore, the problems existed in the mental health education of traditional college students are analyzed, and the development path of mental health education of college students under the background of “internet+” is reconstructed. Keywords “Internet+” · Mental health education · Reconstruction of path
1 Introduction As the modern information technology develops quickly, and the science and technology such as Internet of Things, cloud computing, as well as big data emerge, “internet+” plays an increasingly important role in all fields. “Internet+” not only changes people’s mode of thinking and living habits, but also brings the changes to the education and teaching mode. As the fresh troops of construction of social economy, college students are the biggest experience groups in the “internet+” era, and meanwhile, it is also the biggest group which is greatly influenced by “internet+”. See Table 1 for the details. In Table 1, from 2014 to 2019, the scale of Internet users in China is continuously expanding, and the Internet penetration rate is also increasing year by year. The ages of 10–19 and 20–29 are the two main groups of Internet experience, occupying the greatest ratio. Facing with the college students who take the virtual network life as the major living status, there are deficiencies existed in the traditional mental health education such as single education mode, and separation between online education and offline education. Therefore, for improving the effectiveness and accuracy of the mental health education, it is very necessary to reconstruct the development path of mental health education of college students by taking “internet+” as the background. Z. Gong (B) Jilin Engineering Normal University, Jilin, Changchun 130052, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_52
425
426
Z. Gong
Table 1 Statistic report of Chinese internet development situation in recent 5 years Times for statistics
Deadline
Netizen scale
Popularizing rate of internet (%)
Proportion accounting by the group aged between 10 and 19 years old (%)
Proportion accounting by the group aged between 20 and 29 years old (%)
34
June 2014
632 million
46.9
24.5
30.7
35
December 2014
649 million
47.9
22.8
31.5
36
June 2015
668 million
48.8
23.8
31.4
37
December 2015
688 million
50.3
21.4
29.9
38
June 2016
710 million
51.7
20.1
30.4
39
December 2016
731 million
53.2
20.2
30.3
40
June 2017
751 million
54.3
19.4
29.7
41
December 2017
772 million
55.8
19.6
30.3
42
June 2018
802 million
57.7
18.2
27.9
43
December 2018
829 million
59.6
19.6
26.8
Source of data China Internet Network Information Center (CNNIC) [1]
2 Major Characteristics of “Internet+” In 2012, Yu Yang, a Chinese scholar, put forward the concept of “internet+” in public for the first time [2]. “Internet+” represents a new economic form, and namely, fully playing the roles of optimization and integration of the internet in the allocation of production elements, deeply integrating the creative results of the internet into all fields of economy and society, improving the innovation and production of the real economy, and forming the wider economic development new norm by taking the internet as the facility and realization tool [3]. Essentially, “internet+” is the in-depth integration of modern information technology and all kinds of traditional industry and generation of the new pattern. As a new kind of industry, “internet plus” has the following characteristics: first, it has formed an Internet economy. The specific manifestation of Internet economy is the infinite geographical range, the increase of the number of participants, rapid service response, etc. The Internet economy and the offline economy are integrated and mutually supportive. Second, people’s thinking mode has been changed. In the era of “Internet plus”, people are more open and independent, and care more about their individual needs and rights. Third, it expands the interpersonal contact mode of people. The traditional contact mode among people may need to be conducted
Reconstruction of Path of Mental Health …
427
in reality, but the emergence of the internet made the interpersonal communication mode among people changed, and the interpersonal communication can be occurred through the virtual network, as the appearance of the network communication software such as BBS, WeChat, as well as QQ, the communication among people is promoted. The popularization and application of the internet becomes more and more humanized and popularized, which makes the remote friend making, lifelong study as well as public study become easier and easier.
3 Problems Existed in Traditional Mental Health Education of College Students 3.1 Incomplete Working System of Mental Health Education [4] The work of mental health education in colleges is generally generally consists of three parts: part one is college students mental health teaching, the unit in charge of the office of academic affairs; The other part is psychological counseling for college students, which is in charge of psychological counseling center. There is also a part of all kinds of psychological activities to carry out work, its responsible for the organization of the department is at all levels of sub-youth league committee or ministry of student work. These three parts constitutes the entirety of the work of mental health education of college students, however, because of the differences of working functions of three departments, the problems such as being no body’s business, overlapping as well as working conflicts appear, and it is unable to provide more comprehensive mental health service for college students.
3.2 The Bias Existed in the Goals of Mental Health Education The ultimate goal of the mental health education is not to help college students solve problems, but to treat students with the developing viewpoints, and help college students prevent the occurrence of problems. At present, the emphasis for lots of colleges to conduct the mental health education of college students is to help the students with mental health problems and guide and teach them how to solve the mental health problems. This kind of mental health education which mainly gives priority o correction and cure ignored the feeling of the students with normal mental health status, and it doesn’t stimulate their potentials, thus it caused the one-sidedness of mental health education, failing to reach the goal of true mental health education.
428
Z. Gong
3.3 The Simple Form of Mental Health Education and the Narrow Implementation Paths [5] At present, when lots of colleges conduct mental health education, they mainly take the teaching form giving priority to classroom teaching, and the major implementation approaches include mental health education course, face-to-face psychological counseling, psychological lecturers, as well as conducting the psychological activities and other traditional forms. Even though some colleges implemented online teaching, online teaching and offline teaching are two parallels, being independent without interaction and integration. Although the traditional mental health education of college students can achieve a certain effects, with the single education form and narrow implementation approaches, it doesn’t truly play the effectiveness of the work of mental health education of college students.
3.4 Unreasonable Setting of Mental Health Education Course [6] In China, most of colleges set up the course of mental health education, but most of them set it into the optional course, with few course hour and credit. Moreover, it still gives priority to the theoretical knowledge, and ignored the cultivation of the psychological defense skills of college students. In the link of course evaluation, a part of evaluation modes of colleges and universities is unreasonable, without conducting the reasonable and scientific planning, and without the clear requirements and evaluation standards, it caused that it is unable to show the realistic effect of mental health education of college students, hindering the effectiveness of the work of mental health education of college students.
3.5 Deficiencies Existed in the Construction of Teacher Team of Mental Health Education First, the number of mental health education teachers in colleges is insufficient. As the awareness and demand of psychological consulting of college students increase, the number of psychological consulting teachers equipped by colleges becomes seriously insufficient. Some psychological consulting centers of colleges only equip with few full-time teachers, while in the secondary branches, there are even no full-time psychological instructors. On the one hand, it caused the psychological problems occurred in college students who cannot timely consult, while on the other hand, it also cannot meet the increasingly growing demands of college students. Second, lots of teachers who engage in mental health education of college students in colleges are part-time teachers, they tend to lack of the professional knowledge and skills in
Reconstruction of Path of Mental Health …
429
dealing with college students’ psychological problems, they don’t conduct according to the strict psychological consulting procedure, but handle according to their own life experience, and they cannot provide the professional guidance and help to college students, which is unfavorable to the development of college students.
4 The Reconstruction of College Students’ Mental Health Education Path Under the Background of “Internet +” 4.1 Improve the Working Mechanism of Psychological Health Education for College Students First, establish the special mental health service institutions in colleges, and construct the mental file management system of college students. The full-time teachers are responsible for management, completing the working system of quaternity of school, college (department), class, as well as students, and establishing the sound psychological intervention and prevention mechanism. Meanwhile, in virtue of the advantages of the big data analysis of the internet, workers engaged in mental health education in colleges can timely supervise and monitor the psychological status of students, and by collecting the information related to mental health of college students, such as family information, character features, as well as psychological evaluation results, preventing and solving times, workers can help college students overcome the psychological obstacles and improve the psychological quality of college students. Second, complete the course system of mental health education. The links from the course type, course hour, credit, course contents, as well as course teaching form to course evaluation shall all combine with the characteristics of the era of the “internet+” and make the reasonable plan. Third, colleges shall enhance the investment of the hardware of mental health education. On the one hand, combining with the psychological development characteristics of college students, build scientific, reasonable and complete psychological consulting centers, install psychological sand game, and purchase the psychological evaluation software to conduct the effective psychological tutorship for college students. On the other hand, the psychologicalvent room can be built, installing somevent tools, which is beneficial for college students to adopt the positive means tovent bad feelings. Moreover, the whole school shall install the hardware facility of internet, thus to guarantee the network covering the whole school.
430
Z. Gong
4.2 Build the Network Resource Platform and Construct the New Mode of Mental Health Education of College Students Under the Background of “Internet+” First, develop mobile phone APP of mental health education of “internet+”. App contents include few functional modules including textbook resources, mental health knowledge, activity management, mental health service, psychological consulting booking [7]. Textbook resources: electronic courseware, micro course, as well as Mooc; mental health knowledge: some latest information in China and foreign countries, setting different contents of mental health education according to different grades; activity management: publishing of psychological activities in campus, students’ activity signup as well as review, etc.; mental health service: general survey of students enrollment, psychological evaluation, as well as abnormal psychological situation reminding; psychological consulting reserve means to establish the consulting relationship after being agreed by consulting teachers in advance. Second, conducting mental health education work applying the advanced information and science technology. Mental health classroom teaching, psychological lecture, organizing psychological activities, one-to-one psychological consulting and other traditional mental health education modes cannot meet the college students’ needs for the mental health knowledge under the background of “internet+”.By establish the psychological websites with rich and full contents, setting up the mental health service WeChat official accounts and virtual robots, and other internet platform, students are allowed to study the knowledge about mental health at any time and any place, and master the application skills of psychological defense [8]. Third, the effective integration of online and offline mental health education. Under the background of “internet+”, online mental health education has its special advantages, with openness and individuality. However, in the actual educational activities, the continuity and systematicness of offline mental health education are better and it can more profoundly learn about students’ psychology and conduct targeted guidance to students. Therefore, it should effectively integrate them, making complement, penetrate and promote each other [9].
4.3 Strengthening the Construction of Teachers’ Team for Mental Health Education Under The Background of “Internet+” [10] In the era of “Internet+”, college students have a higher vision, more needs and broader horizon, which requires that the workers engaged in college students’ mental health education should not only have profound psychological professional knowledge, skilled psychological counseling skills, but also have good observation ability and the ability to deeply understand the hearts of students. Therefore, colleges need to reasonably equip with a teacher team of mental health education combining with
Reconstruction of Path of Mental Health …
431
both full-time teachers and part-time teachers. On the one hand, it needs to encourage the part-time teachers to improve the cultivation of knowledge and skills of internet+ mental health education; on the other hand, it needs to conduct the training on the modern education information technology of teachers of mental health education, enabling teachers to equip with the ability of the new teaching of applying micro class, Mooc, and flipped classroom, increase the vitality of class, thus to further improve the study motivation of college students.
4.4 Improving Students’ Ability of Distinguishing the Illegal and Harmful Information in the Network Under The Background of “Internet+” In the network environment, on the one hand, college students gained a large amount of useful information, but on the other hand, they also received lots of violent and pornography. These informations which good and bad are intermingled will greatly influence the values and lifestyles of college students, and meanwhile, it also bring mental health education of college students with new problems. Therefore, under the background of “internet+”, we should guide college students to correctly utilize the internet, which can both absorb the positive information in the network and reduce the harms brought by the bad information. All in all, colleges hould fully recognize the problems existed in the process of conducting mental health education of college students under the background of “internet+”, apply the advanced modern information technology, reform traditional forms and methods of mental health education of college students, reconstruct the scientific and reasonable development path of mental health education of college students. Acknowledgements This research was supported by 2019 higher education scientific research project of jilin province (JGJX2019D203): Research on the relationship between college students’ social support, psychological resilience and mobile phone dependence.
References 1. http://www.cnnic.net.cn/. 2. http://business.sohu.com/20131208/n391443706.shtml. 3. The state council’s opinions about positively promoting the action of “Internet+”, GF〔2015 〕No. 40. 4. Li, Gu. 2017. Exploration and analysis on the approaches of mental health education of colleges and universities under the background of “Internet+”. Journal of Tianjin Institute of Education and Science, (6): 35–37.
432
Z. Gong
5. Jing, Shi. 2013. Primary investigation on the mode of mental health education of colleges students under the background of “Internet+”. Higher Vocational Education-Journal of Tianjin Professional College, (3): 153–154. 6. Hongzhi, Fang., and Fan Yaru. 2018. Study on mental health education of colleges and universities under the Era of “Internet+”. Journal of Hubei College of Adult Education, 24 (2): 1–5. 7. Minjiang, Ding. 2019. Exploration and analysis on the working path of mental health education of colleges and universities under the background of “Internet+”. Journal of Jinzhou Medical University (JCR Social Science Edition), 17 (1): 57–61. 8. Limei, Wu. 2017. Discussion on the mode of online and offline mental health education of higher vocational college under the era of “Internet+”. Higher Vocational Education-Journal of Tianjin Professional College, 26 (3): 49–54. 9. Huiyong, Zhang. 2016. Study on the effective coping mechanism of mental health education of college students under the background of “Internet+”. Science Tribune, 11 (31): 156–157. 10. Lingling, Meng. 2018. Creation of mental health education of colleges students under the era of “Internet+”. Journal of Dalian Institute of Education, 34 (4): 73–74.
Implementation Plan on the Implementation Plan of the Linear Algebra Gold Course in Independent Colleges Application of Hybrid Learning Based on Network Education Platform in Application-Oriented Undergraduate Colleges in Linear Algebra Teaching Lijie Ma Abstract At June 21st, 2018, the Ministry of Education was held for the first time since the reform and opening up a new era of Undergraduate Education Conference Chinese colleges and universities. Minister Chen Baosheng of the Ministry of Education put forward the slogan of “eliminating water courses and creating gold courses” and quickly formed a wave of education reform in the country. Wuhan Donghu University is not only heart-warming, but also in action. The teachers of the Basic Courses Department of Wuhan Donghu University have developed some effective action plans, action plans and construction measures based on the actual situation of the school and the characteristics of linear algebra. It provides a good direction for the construction of the golden course of the same institution. Keywords Linear algebra · Teaching reform · Gold course construction
1 Introduction With the development of the teaching reform, more and more emphasis has been put on the cultivation of students’ innovative consciousness in college teaching. This is not only the teaching objectives of colleges and universities, but also the needs of the community on the talent [1]. Linear algebra is an important basic subject, and its teaching quality is directly related to the study of students’ subsequent courses. With the continuous development of science and technology, the demand for talent is also increasing; talented people with creative thinking and pioneering spirit are needed by our society, which puts higher demands on the teaching of colleges and universities [2]. Therefore, the construction of linear algebra gold class is imminent. L. Ma (B) Wuhan Donghu University, Wuhan 430212, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_53
433
434
L. Ma
2 The Following Shortcomings Are Common in Linear Algebra Teaching in Independent Institutions Linear algebra is one of the public basic courses in college teaching. And plays an important role in the cultivation of students’ comprehensive quality [2, 3].
2.1 The Teaching Concept Is Outdated, the Student’s Subjective Consciousness Has Not Been Fully Exerted The main focus of teachers is theoretical knowledge, focusing on the systematic nature of the theory. In this way, the application of linear algebra in other fields is often neglected, and the use of actual integration is lacking. A student often cannot raise interest in the process of linear algebra learning. He only applies formulas and cannot understand the practicality of linear algebra. In the long run, the subjective consciousness of students is gradually weakened, leaving hidden dangers for the learning of subsequent courses.
2.2 The Classroom Atmosphere Is Not Strong As the student’s subjective consciousness gradually weakens, the interaction between students and teachers in the classroom will gradually reduce the communication between students and students. As we all know, to improve the quality of teaching, we must first create a good classroom atmosphere. Only in the interaction, the communication between students and teachers will gradually deepen. Only in the platform of communication, teachers can better grasp the pertinence of teaching. Really the right medicine.
2.3 The Teaching Model Needs Further Improvement When teaching linear algebra, our school adopts the traditional “chalk plus blackboard” theory teaching mode. The advantage of this teaching mode is that it can highlight the theory, but at the same time it has many shortcomings, such as lack of attraction, lack of innovation, can not be in the shortest time, students are allowed to master the content, so it is not efficient. Society is a diversified, information-based society, and the teaching model should also be diversified.
Implementation Plan on the Implementation Plan …
435
2.4 Less Teaching Time Because of the large amount of content and less time, teachers have a sense of urgency when teaching linear algebra courses. In order to ensure the quality of teaching, we only teach the first three chapters of linear algebra, and cut the contents of the last two chapters, so that students It is impossible to form a complete, systematic system of linear algebra theory, and this is extremely unfavorable for students’ postgraduate studies.
3 Wuhan Donghu University Has Carried Out Teaching Reforms in the Following Directions In order to solve the above problems, the Wuhan Donghu University Linear Algebra Curriculum Group will focus on reforming traditional linear algebra textbooks and teaching medium-weight theory practice, weak calculation and application, disconnection between theory and practice, and students’ ability to adapt to subsequent needs. In the teaching of linear algebra course, the mathematics experiment method, mathematical modeling idea, the mathematics software, the practice, calculation and exploration are strengthened, and many linear algebra application examples are collected. The content involves electronics, communication, economic control, etc. Problem-driven and demand-driven, reforming the structure of teaching content, teaching, methods and methods, training students’ scientific computing ability, mathematics ability and practical innovation consciousness, and truly applying what they have learned. Teachers now are changing the traditional teaching philosophy, giving full play to the dominant position of students in the teaching process, and their main role is to guide students to create an equal teaching atmosphere [2]. 3.1 Rationally integrate teaching content and increase the amount of learning information. In order to better cultivate students’ sense of innovation, we can start by learning the history of linear algebra [3, 4]. The content is divided into the introductory part, the self-study part, the teacher and student joint discussion part and the application topic part. From a number of important practical problems, introducing concepts and definitions needed to solve these problems, guide students to linear algebra knowledge re ‘invented’. The most exciting and profound mathematical ideas are actually simple and natural. Try to explain the essence of linear algebra content in plain language. 3.2 Better play the role of the main channel of classroom teaching. We will conduct a series of teaching reform experiments including case-based, tempting, exploratory, research-based, autonomous, and open-type in classroom teaching, comprehensively and effectively implement quality education, and greatly improve the quality and promotion of mathematics teaching in our university. Other courses have played a very significant role in promoting and radiating. The linear algebra curriculum is a lot of writing in the classroom teaching, but it is time-consuming and laborious to describe
436
L. Ma
some complicated practical application examples or some large-scale calculations on the blackboard, which is a waste of time. Combining these characteristics of the linear algebra course, we have carefully crafted electronic courseware that suits our teaching needs. 3.3 Layered teaching. In response to the dynamic changes of students’ different majors, different endowments and achievements in learning, we have broken the overunified pattern, focused on it, and have chosen, divided and diversified. Continue to consolidate, promote and improve the reform results of “teaching students according to their aptitude and dynamic management”, further implement the people-oriented concept of individualized education, and create a good mechanism and environment in teaching so that each student can give full play to his or her individuality. Explore the potential of innovation and successfully reach the ideal side. 3.4 Strengthen practical links, actively carry out mathematics experiment teaching, pay attention to the application of mathematics in the field of engineering technology, organically combine theoretical teaching with experimental teaching, improve students’ mathematical modeling ability, use mathematical software ability and engineering practice ability. Under the premise of ensuring high-quality completion of teaching tasks, we try to introduce mathematical software mathematica into classroom teaching. After the method is explained clearly, after a few examples are detailed, the example is calculated by mathematica software. For example, in the calculation of determinant, matrix multiplication, square matrix inversion, elementary row transformation matrix as the row simplest, square matrix eigenvalue feature vector, etc. are all demonstrated using mathematica software. On the one hand, students are allowed to master the thinking methods of linear algebra, and on the other hand, students are exposed to methods that use mathematical software to solve problems. The effect of the experiment is that students are very enthusiastic about this approach, and they also go to various laboratories to try to use mathematics software to solve the math problems encountered in other disciplines. In this way, we infiltrate the ideas and methods of mathematical modeling and mathematical experiments in the teaching of linear algebra, so that students realize that mathematics is useful and appreciate the interest in mathematics learning in solving practical problems. Teachers cannot simply explain the answer while explaining the linear algebra problem, they need to guide students to guide students to think and communicate the ideas and methods to solve the problem [5–7]. 3.5 Reform the current examination method, try to close the book, open the book and write a small paper to combine the assessment methods, and establish a scientific and reasonable evaluation system. 3.6 The introduction of excellent foreign textbooks, and strive to pilot elite teaching in some classes. 3.7 Effective use of multimedia teaching technology. We should focus on thinking and solving the “expert production, teacher performance, student appreciation” and the shortcomings of students’ thinking.
Implementation Plan on the Implementation Plan …
437
4 Through the Hard Work of All the Teachers of the Linear Algebra Course Group of Wuhan Donghu University, This Kind of Professional Learning-Oriented Mixed Learning Based on the Online Education Platform Has Achieved Gratifying Results in Our School 4.1 A series of excellent teaching materials have been published. These achievements have provided reference for the teaching research and practice of mathematics basic courses in similar applied undergraduate colleges. 4.2 The successful completion of the quality course construction. The website of Wuhan Donghu College Linear Algebra Excellent Course has been deeply loved by students since its establishment. The content of the website is rich and novel, which greatly saves the time for students to browse the website. 4.3 The research level and education level of the teachers of the subject curriculum group have been significantly improved. In the past three years, the teachers have published 12 excellent papers, two provincial projects, and one excellent course. As the teaching level and professional level of teachers improved, they quickly grew into the backbone of the basic course department. 4.4 The quality of personnel training has improved significantly. 4.4.1 The learning atmosphere has been improved. Because the course of linear algebra is very theoretical and the content is boring, it is difficult for students to maintain high attention in the classroom. However, since we carried out this teaching reform, the students’ interest in learning has improved significantly and the classroom atmosphere is good. 4.4.2 The results of students participating in various professional competitions have been significantly improved. While they explaining the exercises, they are more concerned about the problem-solving skills and giving students repeated training, which cannot help students to generalize the idea of solving problems and cannot reveal the essence and law of problem [8]. The achievements of the Hubei University Students Mathematics Competition and the National College Student Model Competition are getting better and better. In the National College Students Mathematical Modeling Competition, our school won the first prize in the country for 16 years, the second prize in Hubei Province, and the second prize; the second prize in the Hubei Province in 17 years, the third prize. One award; 18 years won the second prize of Hubei Province and five third prizes. National College in mathematics competition, our school 17 years before they began to participate in this contest, 17 in Hubei Province won the second prize of a division, third prize two; 18 years by the Hubei Provincial Division first prize, second prize a Name, second prize. 4.4.3 The proportion of graduate students in postgraduate studies has steadily increased, and the number of students enrolled in key institutions each year has increased year by year.
438
L. Ma
5 Summary Wuhan Donghu University is taking advantage of this shareholder style in the construction of the Golden Course, and has created more than 30 courses represented by linear algebra into high-quality, high-level courses, making its greatest contribution to the development of Chinese education!
References 1. Lijie, Ma. 2017. A brief analysis on the cultivation of students’ innovative consciousness in algebra teaching. International Symposium 2017–Social Science Management and Innovation, 99–103 (in Chinese). 2. Zheng, L. 2013. A brief analysis on the cultivation of students’ innovative ability in primary school information technology teaching. Science Education Article Collects (in Chinese). 3. Song, Y.P. 2012. On cultivation of students’ innovative consciousness in ideological and political teaching at higher vocational college. Journal of Yangling Vocational & Technical College (in Chinese). 4. Lan, C.X. 2012. Brief analysis on the cultivation of students’ innovation ability in computer teaching. Software (in Chinese). 5. Liu, B.R., and Z.Q. Tan. 2007. On cultivation of students’ innovative consciousness in electromagnetics teaching. Journal of Guangxi University (in Chinese). 6. Liu, Z. 2016. Brief analysis on the cultivation of students’ innovative ability in computer teaching. International Conference on Education, Sports, Arts and Management Engineering (in Chinese). 7. Zhang, Z.Y., W.P. Ding, M.B. Sun, et al. 2014. Students’ innovative consciousness and development in inquiry-based teaching model for linear algebra. Journal of Hunan Institute of Science & Technology (in Chinese). 8. Hu, J. 2013. On the cultivation of students’ innovative consciousness in primary school english teaching. Science Education Article Collects (in Chinese).
Search Strategy of Shipborne Satellite Communication Servo with Changing Heading Haidong Zou
Abstract Aiming at the problem of the ship-borne satellite communication servo system cannot reliably search the target under changing heading, the corresponding search strategy is studied to achieve the goal of reliable search. Starting from deck angle calculation model of ship-borne satellite communication station, this paper studies the problem of searching strategy of satellite communication station under changing heading, puts forward that real-time heading variable is introduced in searching stage to solve the problem that searching center point is difficult to find target center point without changing heading. Starting from setting threshold of signal-to-noise ratio of satellite beacon, an improved main and side lobe searching strategy is proposed, which effectively solves the problem of existing system. The actual testing results show that the proposed method can effectively improve the performance of the ship-borne satellite communication servo system with changing heading. Keywords Changing heading · Satellite communication · Servo
1 Introduction Shipborne satellite communication station completes a complete target satellite tracking process, which usually includes three steps: acquisition, search and tracking. The acquisition process mainly completes the calculation of the geographic azimuth and elevation angle of the target satellite according to the geographic position of the ship station, and obtains the deck azimuth angle and the deck elevation angle of the target satellite according to the coordinate system of the ship station and the realtime course of the ship [1–3]. The searching process mainly guides the antenna to the deck angle calculated, and then searches around the deck angle [4, 5], and then judges whether the target star has been found according to the signal-to-noise ratio of the demodulated satellite beacon received by the digital tracking receiver and its lock-in state. If the search result meets the tracking criteria, the tracking step will be H. Zou (B) China Satellite Maritime Tracking and Control Department, Jiangsu, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_54
439
440
H. Zou
transferred, otherwise the search step will be repeated until the final tracking process is completed. In the current search step, the deck azimuth is calculated by the instantaneous heading value in the acquisition process. If in this process, the ship is always in the turning, it is easy to lead to the search of the target star in the process. The search center is far away from the actual target star, and lead to search failure. Based on this, this paper proposes a servo search strategy in changing heading, which introduces a heading following strategy in the search process, so that the whole search process is always around the target satellite, and the search strategy can complete the target satellite searching and tracking in changing heading and unchanged heading state. It can effectively improve the performance of the system.
2 Deck Angle Calculation of Ship-Borne Satellite Station Because of the ship’s motion, satellite antenna’s angle to satellite target also needs synchronous follow-up [6], that is to say, there is a problem of instantaneous geographic angle corresponding to ship-borne satellite station. Ship-borne satellite antenna servo system is to track the instantaneous geographic angle for tracking. The ship-borne satellite communication station adopts a three-axis frame system, which corresponds to the azimuth axis and the pitch axis respectively, and adds a crossing axis in the direction perpendicular to the pitch axis [7], thus constituting a stable three-axis frame system. In fact, the A-E-C three-axis antenna pedestal is based on the traditional A-E shafting pedestal. Its servo system usually adopts the form of three-axis stable two-axis tracking. That is to say, the A-axis is used to isolate the change of ship’s course. The E-C two-axis tracking satellite target depends on the gyroscope installed on their respective axes and the pitch and cross error voltage signal provided by tracking receiver [8]. Correspondingly, the deck angle calculation of ship-borne satellite communication station needs to complete the conversion of geographical coordinates and deck coordinates. Usually, the geographic coordinate system OXYZ is defined, in which the origin O is located at the center of the three axes of the antenna stabilized platform, the OX axis is parallel to the horizontal plane and points to the east, the OY axis is parallel to the horizontal plane and points to the north, and the OZ axis is vertical to the OXY plane, and the vertical direction is positive. The deck coordinate system OXjYjZj is defined. The origin O is located in the center of the three axes of the antenna. The OYj axis is parallel to the bow line of the ship and points to the bow line. The OXj axis is parallel to the deck surface and the OYj axis is perpendicular to the right side of the ship. The OZj axis is perpendicular to the plane of OXj and OYj and points upward. Because of ship sloshing, it also involves rolling angle R, which is defined as the angle between the cross section of the hull and the horizontal line of the ship and the transverse axis of the hull, with the starboard inclination as the positive value; pitching angle P, defined as the angle between the stern line and the horizontal plane of the ship, with the bow upward as the positive value; heading angle H, defined as
Search Strategy of Shipborne Satellite …
441
the angle 0° north, clockwise to the direction of the ship, with the clockwise as the positive value. According to document [4], assuming that the coordinates of a test point in OXYZ geographic coordinate system are (x, y, z) and in OXjYjZj deck coordinate system are (xj, yj, zj), the transformation method from OXYZ geographic coordinate system to OXjYjZj deck coordinate system is as follows: M j = mr · m p · m h , ⎡ ⎤ ⎡ ⎤ xj x ⎢ ⎥ ⎢ ⎥ ⎣ y j ⎦ = M j ⎣ y ⎦. zj
(1)
z
Among them, Mj is the deck coordinate transformation matrix of antenna, Mr is the roll transformation matrix of ship, Mp is the pitch transformation matrix of ship, MH is the course transformation matrix of ship, and there are: ⎛
⎛ ⎛ ⎞ ⎞ ⎞ cos H − sin H 0 cos R 0 − sin R 1 0 0 m h = ⎝ sin H cos H 0 ⎠, m r = ⎝ 0 1 0 ⎠, m p = ⎝ 0 cos p sin p ⎠. 0 0 1 sin R 0 cos R 0 − sin p cos p (2) According to the above formula, the deck coordinates of the antenna can be deduced, but the actual antenna uses the A-E-C angle, that is, azimuth angle, pitch angle and cross angle. According to the point (x, y, z) in the rectangular coordinate system and its azimuth A and elevation E, we can calculate: ⎡ ⎤ ⎡ ⎤ x cos E sin A ⎢ ⎥ ⎢ ⎥ ⎣ y ⎦ = ⎣ cos E cos A⎦. z sin E Therefore, the final deck coordinate formula can be obtained as follows: ⎡ ⎤ ⎡ ⎤ ⎡ ⎤ x cos E sin A xj ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎣ y j ⎦ = M j ⎣ y ⎦ = M j ⎣ cos E cos A⎦. zj z sin E
(3)
(4)
442
H. Zou
3 Search Strategy of Satellite Communications with Changing Heading The existing servo tracking system calculates the antenna acquisition strategy based on the above formulas after acquiring the current geographic location information and ship rolling information, then transfers to the target search stage, and then judges whether the tracking target has been found according to the actual signal-to-noise ratio (SNR) of the searched signal. If the result is true, it will be tracked directly. Otherwise the search will be repeated until the target is found. However, the existing programs fail to consider the situation of changing course in the whole process of searching. The center point of actual searching still uses the tracking center point calculated from the angle of real-time heading H1 acquired in the acquisition stage. It can not reliably deal with the tracking center point of real-time heading H2 angle after heading change, especially when the angle of |H2–H1| is larger than the actual searching range. Because of the lag effect of the servo system itself, it is difficult for the servo system to find the search target and fall into the search cycle, thus the target tracking cannot be achieved. In view of this, the real-time heading should be used to calculate the current search centers in the search phase to eliminate the changes caused by the changing heading. Assuming that Ad is the geographic azimuth angle calculated from the ship position information and satellite orbit parameters, Ed is the geographic elevation angle, H is the real-time heading angle, then (Ad-H) is the instantaneous deck azimuth angle of the current heading. Searching according to (Ad-H, Ed) as the central point can effectively achieve target tracking. In addition, the false alarm probability, detection probability, acquisition time, side lobe lock and other factors should be considered comprehensively in the parameter setting of tracking receiver. After the antenna scans the whole set area, the coordinates of the target can be determined by finding the point with the maximum signal strength and the minimum condition of the difference signal, and then the antenna can be transferred to automatic tracking. In order to prevent side lobe lock, the threshold setting of signal-to-noise ratio should minimize the probability of false detection caused by the first side lobe of the antenna. Taking common satellites as an example, setting the threshold of signal-to-noise ratio to be about 6 dB below the peak value of the signal-to-noise ratio of the satellite beacon can prevent false side lobe lock.
4 System Testing and Analysis In order to verify the effectiveness of the above search strategy, a series of tests have been carried out for the existing antenna servo system [9, 10]. Firstly, the tracking effect of a satellite is tested under the condition that the ship’s course change rate is 2/s. The actual tracking curve is shown in Fig. 1. It can be seen from the graph that under the condition of uniform heading change, when the servo system captures, it
Search Strategy of Shipborne Satellite …
443
Fig. 1 Tracking effect diagram of original search strategy under changing heading
turns into tracking, but the search center of the target always revolves around the initial capturing calculation angle, so it cannot find the target in time and turn to normal tracking. Figure 2 is a new modified servo search strategy. Under the condition that the ship’s course change rate is still 2/s, the real-time course is introduced in the search phase, so that the actual search area of the servo system is always around the target center, so that the target can be found in time and transferred to normal tracking. The experimental results show that the ship-borne satellite communication servo search strategy is effective.
Fig. 2 Tracking effect diagram of new search strategy under changing heading
444
H. Zou
5 Conclusion In this paper, the conversion relations between the geographic coordinate system and the deck coordinate system are deduced respectively according to the deck angle calculation method of the ship-borne satellite communication station. Aiming at the problems existing in the current strategy of searching the earth station antenna of ship-borne satellite communication under variable heading, this paper proposes to introduce the ship heading angle in real time in the searching stage to calculate the center point of the searching target and ensure the validity of the searching range, and puts forward the relevant requirements for setting the signal-to-noise ratio threshold of the digital tracking receiver. The simulation results show that the new search strategy can effectively improve the search efficiency of the ship-borne satellite communication servo system for tracking target, and provide a basis for the servo system to capture the search and tracking target in real time under dynamic conditions.
References 1. Xiao-li, Liu. 2011. Analysis of antenna structure in the shipboard satellite communications system. Journal of the Hebei Academy of Science 28 (2): 40–44. (in Chinese). 2. Huling, Zhang, and Huang Kun, et al. 2016. Improvement of calculation method for three-axis stabilized antenna coordinate transformation in ship-borne satellite communication station. Telecommunication Engineering, 56 (2): 183–189 (in Chinese). 3. Zhengcai, Cao. 2010. The commonly used coordinate transformation of stabilization modes for ship-born radars. Radar & ECM, 30 (1): 47–52 (in Chinese). 4. Hui, Meng, and SONG Junhai. 2018. Application and development of satellite communication in emergency communication. Science & Technology Review, 6 (in Chinese). 5. Wang, Yunlong, M. Soltani, and D.M.A. Hussain. 2017. An attitude heading and reference system for marine satellite tracking antenna. IEEE Transactions on Industrial Electronics, 99. 6. PUTRA, A.E., B.A.A. Sumbada, and A. Nurbaqin. 2017. Satellite tracking control system for UGM ground station based on TLE calculation. IEEE International Conference on Communication. 7. Liu, Yong, et al. 2018. Ship target tracking based on a low-resolution optical satellite in geostationary orbit. International Journal of Remote Sensing 39 (9): 2991–3009. 8. Yao, L., Y. Liu, and Y. He. 2018. A novel ship-tracking method for GF-4 satellite sequential images. Sensors, 18 (7): 25. 9. Lampariello, R., et al. 2018. Tracking control for the grasping of a tumbling satellite with a free-floating robot. IEEE Robotics & Automation Letters 99: 1–1. 10. ETANGS, A., et al. 2017. Search for rings and satellites around the exoplanet CoRoT-9b using spitzer photometry. Astronomy & Astrophysics, 603.
Hybrid Teaching of College English Under the Background of Big Data Cuibai Li
Abstract With the development and popularization of Internet technology, human society has entered a new era of big data from the information age. Big Data is usually used to describe the massive data generated in the era of information explosion, and to name the related technological development and innovation. In big data era, the deep integration of information technology and education will have a far-reaching impact on the relationship between teachers and students, teaching materials, learning environment, as well as teaching testing and evaluation. Based on the author’s study and practical experience, this work first analyzed the concept of big data and the meaning of hybrid teaching, and then summarized the framework of the hybrid teaching model of college English based on big data. Finally, this work proposed the roads to college English hybrid teaching based on big data. Keywords Big data · College english · Hybrid teaching
1 Introduction Big data is a collection of mass data with large capacity, variety, high speed and high value. These massive data permeate all kinds of fields, such as communication, transportation, medical treatment, education and so on, through the Internet. They are changing people’s way of thinking all the time and accelerating the social change and development, also, they are changing the way of foreign language teaching at the same time [1]. The Ten-year Development Plan of Educational Informatization (2011–2020) pointed out that the development of educational informatization should be guided by the innovation of educational ideas and based on the construction of high-quality educational resources and information-based learning environment.
C. Li (B) Jilin Engineering Normal University, Changchun, Jilin, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_55
445
446
C. Li
2 The Concept of Big Data and the Meaning of Hybrid Teaching 2.1 Big Data Concept Internet Data Center of United States defines big data as a new technical architecture for capturing, discovering, and analyzing high-speed data to capture value from highvolume data [2]. Big data technology began with the explosion of information, and has grown rapidly with the use of mobile Internet, cloud computing, and the Internet of things. This is only the beginning of big data era to our lives, as well as the way we communicate with the world. The most striking thing is that society needs to give up its desire for causation and just focus on it, that is to say, it only needs to know what it is, not why it is. This overthrew the practice of ancient times, and the most basic way of making decisions and understanding reality will also be challenged [3]. In 2014, Victor Mayer, author of Big Data Era, told about how big data will change education, achieve private customization, and improve learning to become effective. Big data has brought three great changes to study: we can collect feedback data that are neither realistic nor possible to gather in the past; we can implement personalized learning that caters to the individual needs of the student, instead of personalized learning for a similar group of students; We can optimize learning content, learning time and learning style by probability prediction.
2.2 The Meaning of Hybrid Teaching Hybrid teaching is regarded as one of the most important advances in educational research. Experts and scholars have different opinions on hybrid teaching, but Curtis J. Bonk’s interpretation has been generally accepted by the academic community. He thinks hybrid teaching is a combination of face-to-face teaching and computer-aided online learning. However, the definition is not closely related to language learning because of its broad nature. In contrast, Leakey and Ranchoux’s interpretation is more instructive to language learning. They defined hybrid teaching as an integration of CALL and non-CALL teaching using different media and message delivery methods in order to meet the contextual needs of language learning [4]. This study holds that the core idea of hybrid teaching is to select the teaching method which is suitable for learners’ style, so that it can achieve the best effect based on the needs of learners. The advantage of hybrid teaching lies in the dual-dominant role of teachers and students, the evolution of teaching methods, the diversification of learning methods, and the timely exchange and feedback. Hybrid teaching reflects that different learning theories and ways of learning complement each other in different learning environments, and reflects the deepening of people’s understanding of the nature of learning.
Hybrid Teaching of College English …
447
3 Framework of the Hybrid Teaching of College English Under the Background of Big Data The hybrid teaching process consists of four basic steps: identifying and defining learning requirements, formulating learning plans and measuring strategies, determining the development or purchase of learning content, executing the plan. Yang Yanlong, et al., think that the hybrid teaching and learning under the network environment mainly includes four main links: constructive learning environment design, classroom teaching, online teaching and developmental teaching evaluation [5]. Based on the achievements of predecessors and the characteristics of college English course under the background of big data, the researchers put forward a hybrid model of college English teaching, as shown in Fig. 1. The model consists of four parts. The first part is the pre-analysis stage, including the learners, learning content, learning objectives, learning environment, which is the premise of hybrid teaching [6]. The second part is the construction of learning environment, including the construction of hardware facilities, the development of platform, the design of learning resources, learning activities and learning strategies, etc., which is the basis of hybrid teaching. The third part is the implementation stage, where face-to-face learning and online teaching make a integration, and this process is the core of the whole teaching model [7]. The fourth part is the evaluation stage, which is based on the portfolio and curriculum assessment to carry out developmental evaluation.
Fig. 1 Framework of hybrid teaching based on big data
448
C. Li
4 Roads to College English Hybrid Teaching Cased on Big Data 4.1 Innovation of Teaching Idea Big data’s application makes classroom virtualization and learning time fragmentation. The mixed teaching based on big data emphasizes the management of a large group of learners through the association and interaction between the learning partners. Although teachers can plan and implement classroom teaching, the essence of the curriculum is developed around the learners. They are both consumers and builders and participants in the creation of the curriculum. They exist in the curriculum, dialogue with the curriculum, become the subject of the curriculum, with a large number of teachers choose, design and control of learning resources. The teacher’s main function is to become the integrator of massive resources through the online and offline teaching design, by which it can promote their comprehensive ability, cultivate learners’ good autonomous learning and cooperative learning habits.
4.2 Innovation of Teaching Resources Teaching resources are all kinds of objective existing forms that support teaching activities and achieve teaching objectives. They can be divided into static resources and dynamic resources. Static resources include printed material-based textbooks, encyclopedia, magazines and newspaper articles [8]. Dynamic resources are frequently and continuously changing resources, including network resources and human resources. In the era of big data, the number of paper teaching materials gradually decreased, and video open courses, micro-courses, test questions banks, digital professional resource banks, and so on, will become popular. The three-dimensional electronic teaching material, which displays text, image, sound, animation and so on, increases the sensory stimulation of learners, such as vision and hearing, and enhances their interest in learning. Multimedia hyperlinks can make information borderless, and these resources change from “digitization” to “datamation”. The accumulation and optimization of the same curriculum resources, the development and sharing of different cross-curriculum resources make the learning resources extremely rich, so that learners have more choices in web-based teaching than traditional classroom teaching, and learners with different learning forms get the most suitable learning presentation mode [9]. There are many kinds of teaching resources and knowledge everywhere, so that teachers must evaluate teaching resources in an all-round way, such as information quality, information breadth, information stability and continuity, etc. The evaluation of teaching resources mainly includes statistical evaluation, expert evaluation, pre-evaluation and gauge evaluation, among which the gauge evaluation is the most commonly used structured evaluation tool, and it has strong practicability for teachers and learners.
Hybrid Teaching of College English …
449
4.3 Innovation of Teaching Evaluation Teaching evaluation consists of formative evaluation and final evaluation. Formative evaluation focuses on students’ participation in the classroom and aims at promoting learning, while the final evaluation is to examine students’ learning results through periodic tests on schedule or end-of-time tests. In the era of big data, the vast majority of information that people come into contact with in their daily work and life is presented in electronic form, and the proportion of non-electronic information is less than 2%. Therefore, the teaching evaluation of hybrid teaching mode should also rely on the network platform, break the limits of time and space, and combine online and offline evaluation organically. Specifically, the online evaluation is mainly based on formative evaluation, including the statistics of students’ registration and participation in the course, the status of messages in the discussion area of the platform, and the number of WeChat groups related to the course, and so on [10]. Offline evaluation includes not only formative evaluation but also summation evaluation. For the offline, teachers evaluate the learning process in the form of classroom observation, questions, and individual presentation group tasks. However, the final evaluation is still dominated by offline written tests. At present, large-scale international language tests have adopted network-based test forms one after another, which provides an example for the evaluation of college English teaching.
5 Summary Under the era of big data, since the sharing of high-quality educational resources around the world, the quality of education has been improved. Especially for foreign language teaching, it makes the students come into contact with the real language materials. In terms of listening, speaking, reading, writing, the students’ willingness to learn actively is enhanced and the effect of classroom teaching is improved. For English teaching, big data expanded the concept of teaching environment and teaching resources, opened up all-round channels and media for learners, and changed the mode of language learning to a great extent, which has brought new ways of thinking for English teaching.
References 1. Xiaohong, Li. 2017. Big data and college english mixed teaching innovation. Journal of Yangzhou University (Higher Education Research Edition) 21 (06): 104–108. 2. Xin, Guo. 2018. A Probe into the hybrid teaching model of college english based on MOOC course under the background of big data. Journal of Kaifeng Institute of Education 38 (02): 91–92. 3. Ying, Li. 2018. A new way out of college english teaching reform under the background of the times. Research on Course Education Research 07 (36): 116–117.
450
C. Li
4. Liyuan, Liu. 2017. Reconstruction of college english translation teaching model in big data era. World of Labor Security 24 (26): 80–81. 5. Yanlong, Yang. 2017. Big data era college english teaching mode innovation and informatization reform. Techonology Enhanced Foreign Language Education (04): 56–59 (in Chinese). 6. Hui, Cui. 2015. New attempts and thoughts on college english teaching in big data era. Overseas English 09 (19): 51–52. 7. Qingbin, Chen. 2016. Reconstruction of college english writing teaching model in big data era. Foreign Language Research (03): 129–132 (in Chinese). 8. Wei, Chen, and Yang Yue. 2019. A study on the ecological environment construction of college english education under big data environment. Journal of North Minzu University (Philosophy and Social Science Edition) (02): 167–171 (in Chinese). 9. Jie, Yang. 2015. A probe into college english translation in big data era. English Plaza 16 (09): 136–137. 10. Dan, Li. 2015. A probe into the knowledge structure of college english teachers in big data era. Journal of Jiamusi Vocational College (11): 2020–2030 (in Chinese).
Fuzzy RBF Neural Network Control for Unmanned Surface Vehicle Renqiang Wang, Keyin Miao, Jianming Sun, Hua Deng and Yue Zhao
Abstract For the problem of the heading control of USV, the intelligent control method is achieved by fuzzy RBF neural network. Considering the uncertainty of the USV motion system, the fuzzy system with universal approximation performance is used to fuzzily approximate the uncertainties and external disturbances in the USV motion model. To further enhance the fuzzy system approximation, fuzzy rules were optimized online by RBF neural network with fast learning ability. The intelligent control method proposed realizes continuous and stable tracking of USV heading through simulation. Keywords USV · Motion control · Sliding model control · Adaptive control · Fuzzy control · RBF neural network
1 Introduction Due to the obvious uncertainty of the unmanned surface vehicle (USV) motion system, the conventional PID control effectiveness is not satisfied. Using fuzzy technology [1] to adjust the PID controller parameters online improves the PID control accuracy, but the control input chattering problem caused by the system uncertainty problem can not be effectively solved. In view of the invariability of the sliding mode system to the system parameter perturbation and external disturbance, based on the Lyapunov stability theory [2, 3], the Backstepping method [4, 5] is integrated into the sliding mode control [6, 7] to enhance the robust performance of the system. However, the above method has the disadvantage of chattering. Further, the fuzzy control method, the intelligent control method such as the network control, and the intelligent control method [8, 9] can be effectively reduced in the sliding mode control. Fuzzy control systems need to design fuzzy sets, membership functions and fuzzy rules in advance, which are subjective and difficult to adjust online. To this end, the RBF neural network with strong learning ability is introduced into the fuzzy system, R. Wang (B) · K. Miao · J. Sun · H. Deng · Y. Zhao School of Navigation, Jiangsu Maritime Institute, Nanjing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_56
451
452
R. Wang et al.
so that the fuzzy system can promote the approximation performance of the fuzzy system by continuously learning online [10]. Using it in USV motion control can effectively alleviate the sliding mode control input chattering.
2 USV Plane Motion Model The mathematical model with uncertainty and disturbance of USV is described as follows, ⎧ x˙1 = x2 ⎪ ⎨ x˙2 = f (x2 ) + gu + ω (1) ⎪ ⎩ y = x1 In the expression, f (x2 ) and g are both the internal uncertainty function of the system, g > 0. ω is outside interference, and |ω| ≤ D.
3 Sliding Mode Control for USV Defining the switching function as following, s = k1 e + k2 e˙
(2)
In the expression, k1 and k2 need satisfy the Hurwitz polynomial condition. The control law is designed as formula (3), u=
1 (− f (x2 ) − k1 e + x¨d − u sw ) g
(3)
where, u sw = ηsgn(s), η ≥ D. It can be inferred formula (4) by the differential Eq. (2), s˙ = f (x2 ) + gu + ω − x¨d
(4)
It can be inferred formula (4) by the differential formula (2), s · s˙ = ωs − η|s| ≤ 0 Therefore, the system is progressively stable.
(5)
Fuzzy RBF Neural Network Control for Unmanned Surface Vehicle
453
4 Intelligent Control Method for USV ˆ which are The outputs of fuzzy BRF neural network are respectively fˆ, gˆ and h, substituted into formula (3), u=
1 ˆ − f − k1 e + x¨d − hˆ gˆ
(6)
4.1 Fuzzy RBF Neural Network The fuzzy RBF neural network is adopted, and the fuzzy inference system mainly comprises four layers shown in Fig. 1. Therefore, the algorithm for each layer can be obtained as following, The algorithm of input layer is, f 1 (i) = xi
(7)
where, xi (i = 1, 2, · · · n) is input element. The fuzzy layer algorithm is, f 2 (i, j) = exp net 2j
(8)
Fig. 1 The fuzzy RBF neural network
Output layer
Fuzzy reasoning layer
Fuzzy layer
Input layer
454
R. Wang et al.
net 2j = −
( f 1 (i) − ci j )2 (b j )2
(9)
In the expression, ci j and b j is respectively the mean and standard deviation of Gaussian function. The algorithm of fuzzy reasoning layer is, f 3 ( j) =
N
f 2 (i, j)
(10)
j=1
Where, Ni is the number of fuzzy layer nodes. The output layer algorithm is, f 4 (l) = w · f 3 =
N
w(l, j) · f 3 ( j)
(11)
j=1
where, l is the r nodes of output layer, and w is connection weight matrix.
4.2 Approximation Algorithm of the Network The network is used to approximate the object, and the network structure is taken as 2-4-1, as shown in Fig. 2. where, ym = f 4 . The approximative error is, e = y − ym Fig. 2 The approximation algorithm diagram of Fuzzy RBF neural network
(12)
y
u Plant
+
-
ym Fuzzy RBF network
Fuzzy RBF Neural Network Control for Unmanned Surface Vehicle
455
The objective function is defined as, E=
1 2 e 2
(13)
The weight of the output is adjusted as follows, w = −η
∂ E ∂e ∂ ym ∂E = −η = ηe f 3 ∂w ∂e ∂ ym ∂w
(14)
where, η is the parameter of learning rate. Then the weight learning algorithm of the output layer is, wk = wk−1 + w + α(wk−1 − wk−2 )
(15)
where, α is the parameter of momentum factor. So, the input membership function parameter correction algorithm is, 2(xi − ci j ) ∂E ∂ E ∂net j = −η = −ηδ 2j 2 ∂ci j ∂net j ∂ci j bi2j
(16)
2(xi − ci j ) ∂E ∂ E ∂net j = −η = ηδ 2j 2 ∂b ∂b j ∂net j b3j j
(17)
2
ci j = −η
2
b j = −η where, δ 2j =
∂E ∂ ym ∂ ym ∂ f 3 ∂ f 2 = −e = −e = −ew f 3 ∂ f 3 ∂ f 2 ∂net 2j ∂net 2j ∂net 2j
(18)
The parameters learning algorithm of the membership function are as shown in Eq. 19 and Eq. 20, ci j,k = ci j,k−1 + ci j + α ci j,k−1 − ci j,k−2
(19)
b j,k = b j,k−1 + b j + α b j,k−1 − b j,k−2
(20)
456
R. Wang et al.
5 Simulation 5.1 Simulation Object In this paper, the unmanned boat “Blue Letter” is used for simulation test, the parameters [11] of the Nomoto mathematical model with speed at 8.5 kn of which is: K = 1.50226, T = 0.90503, α = 0.001, and the system function is: f (x) = 1 T x2 + αx23 , g = K T .
5.2 Condition Setting A tracking signal is selected with a mathematical model represented an actual performance requirement as follow [12], φ(i + 2) + 0.1φ(i + 1) + 0.0025φ(i) = 0.0025φr (i)
(17)
where, φ(i) is the ideal system performance of the ship, and φr (i) = (sign(sin(π · i/600)) + 1)π/7.2, it is a processed input signal with a range of 0°–50° and a period of 600 s.
5.3 Simulation Results and Analysis The above model was tested on the MATLAB software platform, and the experiments are shown in Figs. 3, 4, 5, 6, and 7. Fig. 3 The output of the course of USV
Fuzzy RBF Neural Network Control for Unmanned Surface Vehicle Fig. 4 The input of the rudder angle of USV
Fig. 5 The approximative error of state function
Fig. 6 The approximative error of the gain of control input
457
458
R. Wang et al.
Fig. 7 The approximative error of external disturbance
Figure 3 shows the USV heading continuous tracking curve. The tracking has no overshoot, almost no error, and the stabilization time is around 120 s. Fig. 4 shows the control input response curve, the control input is smooth, and there is no significant chattering.
6 Conclusion The RBF neural network with strong learning ability is introduced into the fuzzy system, so that the fuzzy system can promote the approximation performance of the fuzzy system by continuously learning online. At the same time, the integration of the network into the sliding mode control system significantly suppresses the control input chattering problem. The intelligent control method proposed realizes continuous tracking of USV heading, tracking without overshoot, basically no error, and the stabilization time is about 120 s, which meets the requirements of navigation practice; the control input response curve is continuous and smooth without obvious chattering. Acknowledgements This research was supported by Natural Science Research Project of Jiangsu Province (Grant No. 18KJB580003), and Innovation Fund of Science and Technology of Jiangsu Maritime institute (Grant No. KJCX1811).
Fuzzy RBF Neural Network Control for Unmanned Surface Vehicle
459
References 1. Sun, Jianming, and Renqaing Wang. 2017. Application of genetic algorithm and neural network in ship’s heading PID tracking control. Advances in Intelligent Systems and Computing 686: 27–35. 2. Ning, Wang, Lv Shuailin, and Liu Zhongzhong. 2016. Global finite-time heading control of surface vehicles. Neurocomputing 106: 662–666. 3. Wang, Aihui, Qiang Zhang, and Dongyun Wang. 2015. Robust tracking control system design for a nonlinear IPMC using neural network-based sliding mode approach. International Journal of Advanced Mechatronic Systems 6: 269–276. 4. Benslimane, Hocine, Abdesselem Boulkroune, and Hachemi Chekireb. 2018. Adaptive iterative learning control of nonlinearly parameterised strict feedback systems with input saturation. International Journal of Automation and Control 12: 251–270. 5. Wang, Yang, Chen Guo, and Fuchun Sun. 2015. Dynamic neural fuzzified adaptive control of ship course with parametric modelling uncertainties. International Journal of Modelling, Identification and Control, 4: 251–258. 6. El Yakine, Nour, Mohamed Menaa Kouba, Mourad Hasni, and Mohamed Boudour. 2016. Design of intelligent load frequency control strategy using optimal fuzzy-PID controller. International Journal of Process Systems Engineering 4: 41–64. 7. Renqiang, Wang, Zhao Yuelin, and Sun Jianming. 2016. Application of optimized RBF neural network in ship’s autopilot design. Proceedings of Advanced Information Management, Communicates, Electronic and Automation Control Conference, 1642–1646. 8. FAN Yunsheng, SUN Xiaojie, WANG Guofeng, GUO Chen. On Fuzzy Self-adaptive PID Control for USV Course, Proceedings of the 34th Chinese Control Conference, 7: 8472–8478 (2015). 9. Wang, Renqiang, Yuelin Zhao, and Keyin Miao. 2016. Application of neural network minimum parameter learning algorithm in ship’s heading tracking control. Proceedings of International Symposium on Computational Intelligence and Design, 135–139. 10. Deng, Hua, Renqiang Wang, Jingdong Li, etc. 2018. RBF neural network control for USV with input saturation, MATEC Web of Conferences 214, 1–5. 11. Wang, Renqiang, Hua Deng, Keyin Miao, Yue Zhao, and Du Jiabao. 2017. RBF network based integral backstepping sliding mode control for USV. Matec Web of Conferences 139: 143–146. 12. Wang, Renqiang, and Yuelin Zhao. 2016. Keyin Miao application of neural network minimum parameter learning algorithm in ship’s heading tracking control. International Symposium on Computational Intelligence and Design 8: 135–139.
Feasibility Study on Using Seawater in Ship Pressure Water Mist Fire Extinguishing System Dongfang Zhang
Abstract Fire is the most deadly type of ship safety accident, because ship fires are generally accompanied by bad sea conditions due to their poor fighting conditions, and the ship’s engine room environment has more oil and gas, and the equipment layout is chaotic and the space is narrow. Once a fire is fired, it is more difficult and dangerous. Therefore, ship fires are also regarded as one of the most difficult fires to extinguish. In this paper, the feasibility of using seawater in the ship’s pressurized water mist fire extinguishing system is studied. The feasibility of seawater fog fire extinguishing is explored through the characteristics of ship water pressure and water mist. From the experimental results, it can be seen that seawater fog is used in ship fire fighting. The obvious effect is therefore that it is feasible to use seawater to extinguish the ship’s pressure water mist fire extinguishing system. Keywords Ship fire · Feasibility of seawater fog fire extinguishing · Fire extinguishing system · Fire extinguishing experiment
1 Introduction Fires cause huge losses to people’s lives, property, production and life. Fire-fighting work is responsible, fire-fighting is efficient, and environmental friendliness is the direction of fire technology efforts in the new era [1, 2]. Ship fires are generally accompanied by poor sea conditions due to their poor fighting conditions, and the ship’s engine room environment has more oil and gas, and the equipment layout is chaotic and the space is narrow [3]. Ship fires are also considered to be one of the most difficult fires to extinguish in the event of a fire that is difficult and dangerous. [4, 5]. The ship pressure water mist fire extinguishing system is the internationally respected ship fire extinguishing system product. The water mist fire extinguishing system has been widely used due to its high efficiency, environmental protection and wide range of fire extinguishing [6–8]. “Water mist” has become the hottest and most popular keyword in the field of fire protection. The research on water mist fire D. Zhang (B) Jiangsu Maritime Institute, Nanjing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_57
461
462
D. Zhang
extinguishing technology is also getting deeper and deeper [9]. In this paper, the feasibility of seawater fire extinguishing is studied. The alkali metal salt in seawater increases the specific gravity of seawater fog. Under the conditions of the same diameter droplet and mist flux in seawater spray atomization zone, seawater fog is compared with freshwater fog. It has a larger amount of haze, because the ability of the mist to stop the penetration of the water zone and the effect of the creation and tearing of the flame is also stronger.
2 Application of Fine Water Mist Fire Extinguishing Technology 2.1 Water Mist Definition The pressurized water is ejected from the injection holes at a high speed, and the surrounding air is strongly rubbed, and the water flow is torn, thereby forming very fine droplets, and the diameter of the droplets is usually between several tens of micrometers and several hundred micrometers. According to the definition in the Fire Protection Association (NFPA750), water mist is a water jet produced by highpressure water spray using a special nozzle. Under the minimum working pressure of the design, the thickest part is measured on a plane 1 m away from the nozzle. The water particle diameter Dv0.99 is below 1000 µm. In the design and installation standard of water mist fire extinguishing system NFAP750, the definition of water mist is that the diameter of water droplets in the thickest part of water mist is Dv0.99 ≤ 1000 µm at the minimum design working pressure and on the plane away from the nozzle lm. Water mist is divided into three grades according to the diameter of droplets, as shown in Fig. 1. As shown in Fig. 1, the first stage of the first water mist Dv0.1 = 100 µm is the same as the left part of the line with Dv0.9 = 200 µm,
Fig. 1 Classification of water mist definitions
Feasibility Study on Using Seawater …
463
which represents the finest water mist; the second level of fine water mist is the first level of fine The boundary between the water mist and the line of Dv0.1 = 400 µm with Dv0.9 = 400 µm; the level 3 fine water mist is Dv0.9 greater than 400 µm, or the right side of the second water mist boundary To the part between Dv0.99 = 1000 µm.
2.2 Principle of Water Mist Fire Extinguishing The water mist fire extinguishing system uses the pressurized high-pressure water to flow through the special nozzle to form extremely fine water droplets, thereby achieving the function of extinguishing fire, mainly in the aspects of isolating oxygen and cooling. Isolation of oxygen mechanism. Since the diameter of the fine water mist droplets is small (usually not more than 200 µm), when the water mist is extinguished, it can be rapidly vaporized after being subjected to high temperature, and the water mist density and specific surface area are relatively high, and the volume is at the same time of vaporization. It can expand more than 1000 times in a short time, which greatly reduces the oxygen concentration at the fire site; the mechanism of cooling. Due to the heat of vaporization, a large amount of heat in the fire is taken away during the vaporization of the droplets, which rapidly reduces the temperature at the fire site. It can be seen that the water mist fire extinguishing system mainly relies on oxygen suffocation and vaporization heat absorption to achieve rapid fire extinguishing. For most types of fires, the water mist fire extinguishing system can extinguish fires well, and the applicable places are also very extensive.
2.3 Requirements for Ship Water Mist Fire Extinguishing System The ship water mist fire extinguishing system suppresses the local fire of the main engine and generator internal combustion engine of the protected ship type machinery space, the front part of the boiler, the incinerator, and the heated fuel purifier, without shutting down the generator, evacuating the personnel, cutting off the fan or The premises are closed. The basic requirements of the system are, for example, first, the system should be able to be manually released; second, the start of the fire suppression system should not result in loss of power or reduce the maneuverability of the ship; third, the system should operate the fan and input air to the protection site. In this case, the suppression of the fire is carried out or the air supply of the fan is automatically cut off when the system is released, and the extinguishing medium is not blown off. Fourth, the system should be available immediately and have the ability to continuously supply the water medium for a minute to suppress or extinguish
464
D. Zhang
the fire, while at the same time preparing for the release of the ship’s main fire suppression system. Fifth, the system and its accessories are designed to withstand the effects of environmental changes, vibrations, humidity, collisions, shocks, obstructions and corrosion commonly encountered on ships. The components placed in the protected space shall be designed to withstand the effects of temperature rise that may be experienced during a fire; and sixth, the capacity of the system design shall be determined based on the maximum amount of water required for the protected area.
3 Analysis of Experimental Results of Feasibility of Seawater Fog Fire Extinguishing 3.1 Experimental Effect of Seawater Fog on the Feasibility of Fire Extinguishing When the raft begins to burn, the flame is small, and as time continues, the flame gradually grows and reaches a steady state. After the seawater mist is turned on, the seawater mist gradually presses down and wraps the top of the flame. The flame begins to oscillate and sway, and the flame size gradually decreases. The flame after being pressed by the water mist is limited to a small area above the raft, and the flame The color is gradually transformed into orange-red. With the continuous action of the water mist, the flame is gradually confined to a small space inside the raft, and finally extinguished, and a large amount of white smoke appears above the raft. For deep fires such as wood bonfires, it is often difficult to extinguish fresh water mist, and after the fire is extinguished, it is prone to re-ignition. This is because the fresh water mist extinguishes the gas phase flame and cools the surface layer of the raft, while the high temperature hot coke inside the raft continues to heat the surface of the raft cooled by the water mist after the water mist stops, making it pyrolyzed. Vaporization and precipitation of volatiles, eventually forming flammable steam, the steam temperature reaches the ignition point and catches fire, and the raft is re-ignited. Compared with freshwater fog, seawater fog does not re-ignite after the firewood is extinguished. This may be due to the fact that after the seawater fog stops, the wood will be combusted and gasified due to internal high temperature to produce combustible gas. The alkali metal salt in the water mist adheres to the surface layer of the raft. At high temperature, the metal salt ionizes the metal ions and the chloride ion to kill the H, OH and O radicals in the combustion process of the combustible gas, and blocks the combustible gas and the air. In the chain reaction of oxygen, the combustible gas is burned and the raft is not re-ignited.
Feasibility Study on Using Seawater …
465
3.2 Experimental Effect of Seawater Fog on the Feasibility of Wire Fire Extinguishing When the sea water fog acts on the wire fire, the flame height of the wire is suppressed rapidly when the fog momentum is sufficient. With the continuous action of sea water fog, the inhibited area of the flame is further reduced and finally extinguished. From the point of view of the wire burning process, a large amount of sea water mist immerses the fuel layer, reduces the thermal radiation of the flame to the wire, and prevents the solid wire from transforming into the melting state; at the same time, the water film is formed after the sea water mist droplets fall through the flame area to the surface of the wire, and the vaporization and evaporation of the flammable Songsheng liquid are inhibited by the evaporation of the mist droplets, which greatly reduces the direction of the flammable liquid. The transformation rate of combustible gases, and the volume expansion after evaporation of sea water mist also reduces the oxygen content in premixed gases, which suffocates the combustion process of combustible gases. Under the combined action of various fire extinguishing mechanisms of sea water mist, the wire fire is extinguished finally. Therefore, the burning process of wire is different from that of general solids. Firstly, it changes from solid state to melting state, then to liquid state, and finally to liquid combustion process. This complex burning process of wire determines that the wire fire is easily extinguished by sea water mist.
3.3 Experimental Effect of Seawater Fog on the Feasibility of Oil Pool Fire Extinguishing The seawater mist contains a large amount of alkali metal salt. Under the same working pressure, the spray of seawater mist is larger than that of fresh water mist, thereby increasing its ability to penetrate the fire, so that more droplets can reach the surface of the fuel layer. Suppress the pyrolysis and evaporation rate of the fuel. From the experimental situation that the seawater mist extinguished the oil pool fire, it is seen that when the seawater mist starts to act on the flame, the flame scale increases and the instantaneous expansion phenomenon occurs because the mist droplet is heated and vaporized, and the micro-explosion effect and the decomposition of water molecules at high temperature occur. It promotes the combination of steam and air and strengthens combustion. Subsequently, the flame oscillated greatly, the sea fog quickly covered the flame, and the flame was controlled to a small extent. Within one minute after the seawater fog, the flame height was reduced to about three minutes before the water mist was applied. One or so, the color of the flame turns orange, and then gradually becomes dark red. This is because the sea fog not only absorbs a large amount of heat as the sea fog continues, but also the fire plume sucks a large amount of sea water mist, so that the combustion is maintained. The amount of air required is reduced, resulting in insufficient oxygen supply, which can cause the
466
D. Zhang
flame to suffocate. Moreover, the flame entrains the seawater mist to form a premixed gas flame with a vortex, which causes the flame to be positively stretched under the action of the pulsating vortex, and the flame is extinguished when the elongation rate reaches a certain level. Therefore. The fine water mist around the flame zone will weaken the heat radiation of the flame. A fine water mist at a certain flow rate will enhance the heat exchange between the micro kerb and the surrounding environment, and the increase in heat loss is reflected by the convection heat coefficient and the radiation absorption coefficient.
4 Exploration and Analysis of Seawater Fog Fire Extinguishing Experiment Results 4.1 Feasibility Comparison of Seawater Fog Fire Extinguishing Experiments on the feasibility of seawater fog fire extinguishing can be seen not only in relation to the height of the nozzle, but also in the characteristics of the seawater associated with the pressure of the ship. First, for the combustion model, changing the nozzle height has two effects. The droplet velocity and the spray density of the flame and the burning surface are reached, and the average time of the fire extinguishing test is sorted according to different factors, and the corresponding data is obtained, and the influence of the nozzle on the fire extinguishing effect is shown in Fig. 2. At the same time, the alkali metal salt in the seawater mist causes changes in physical parameters such as density, viscosity and surface tension, which leads to corresponding changes in the seawater mist characteristics of the system. Under the complex mechanism of seawater fog physical and chemical fire extinguishing, the chemical fire extinguishing effect of seawater mist salt ions can be more effectively played out than the fresh water mist, the temperature and height of the flame are reduced more, and the fire extinguishing time is also shortened accordingly. The process of seawater fog extinguishing solid and liquid fuel fires is a Fig. 2 Fire extinguishing time at different heights
35 30 25 20 15 10 5 0
0.5m First experiment
1m
1.5m
Second experiment
2m Third experiment
Feasibility Study on Using Seawater …
467
very complicated physical and chemical process involving many disciplines such as combustion, chemical reaction kinetics, heat and mass transfer, and multiphase flow. It is very difficult to analyze the process in detail. Moreover, increasing the spray pressure can reduce the diameter of the droplets and significantly shorten the time required for the gasification of the droplets, so that the fire extinguishing effect of the misty gasification and suffocation can be better exerted, which is very effective for extinguishing the oil basin fire. For seawater mist fires, increasing the spray pressure can significantly reduce the time to extinguish the fire.
4.2 Fire Extinguishing Mechanism of Ship Pressure Water Mist Fire Extinguishing System Vaporization endothermic cooling. The water has extremely high heat absorption and latent heat of vaporization during vaporization. A large amount of latent heat of vaporization will lower the temperature of the fire field and extinguish the fire. 1m3 of water will be atomized into a droplet of 1 mm in diameter, and the surface area of the original sphere will be expanded by 1503 times. The droplet diameter is 100 microns, and the surface water sphere is expanded by 15,030 times. The droplet diameter of the seawater mist is in the range of 40 to 200 µm, and the surface area there of is greatly enlarged, so that it can be completely evaporated in the fire field, the heat absorption efficiency is high, and the cooling effect is strong. The cooling effect of seawater fog is mainly manifested in: cooling the flame, cooling the surface of the burning matter and even deep layers; and isolating the effect of oxygen asphyxiation. After the vapor droplets of the seawater vaporize, a volume of water vapor is formed, which can quickly repel the air of the fire field, forming a water vapor barrier around the combustion material to block the entry of fresh air. When the oxygen concentration of the fire field is reduced to the extent that it cannot be burned, the fire is lacking. The oxygen is extinguished to achieve the purpose of extinguishing the fire; the heat radiation is reduced. After the seawater mist is vaporized, a barrier that blocks the heat radiation is formed. The radiation is a physical effect. According to the research, the wavelength of the flame radiation is on the micrometer level. When the particle diameter of the water vapor or the water mist is close to the wavelength of the flame radiation, the water is hot. The attenuation of radiation is the strongest. The use of fine seawater mist technology can reduce the flame heat radiation in the fire field, and it is of great significance to protect the people in the fire field, prevent skin burning and reduce casualties; the stretching effect of the flame. Through the above experiments, it is shown that the stretching effect of the seawater mist on the flame leads to an increase in the heat dissipation amount of the fire field. High-pressure seawater mist impacts the surface of the combustion object and the flame, which causes the flame to lengthen, increases the contact area with the seawater mist, and increases the speed of cooling.
468
D. Zhang
4.3 Suggestions on the Optimization of Nozzles in Marine Pressure Water Mist Fire Extinguishing System Generally, the design of marine fine water mist nozzle adopts inner and outer doublelayer channel, which swirls backward in the closed swirl chamber, and finally sprays fine water mist through the inner and outer double-layer nozzles nested together. Water mists shear each other in the air. The velocity direction of fine water mist sprayed from different nozzles in air is opposite, shearing and disturbing each other. The atomization effect of water mist nozzle is enhanced. Moreover, the doublelayer sprinkler improves the distribution characteristics of droplet and spray density, making the droplet size of the double-layer sprinkler smaller and more evenly distributed, effectively covering more areas and better extinguishing effect. Hope to enhance the atomization effect of water mist nozzle, produce water mist nozzle with lower pressure, finer fog particles and better extinguishing effect.
5 Conclusion As a research hotspot of fire science, the marine pressure water mist fire extinguishing system has shown broad application prospects with its advantages of rapid fire extinguishing, no environmental pollution and being suitable for ships in this special situation. The interaction between sea water droplets and flames, including the penetration ability of flames, evaporation and vaporization, and the movement process of expansion and migration, directly affects the fire extinguishing status and working performance of the actual fire site. It is necessary to study the corresponding gas phase and thermodynamic phenomena in the fire field.
References 1. Voitkov, I.S., M.V. Zabelin, and A.O. Zhdanova, et al. 2016. Experimental analysis of the feasibility of polydisperse droplet water flow using at fire extinguishing. EPJ Web of Conferences, 110: 01079. 2. Zhao, H., and J.S. Liu. 2016. The feasibility study of extinguishing oil tank fire by using compressed air foam system. Procedia Engineering 135: 61–66. 3. Valladares Linares, R., Z. Li, V. Yangali-Quintanilla, et al. 2016. Life cycle cost of a hybrid forward osmosis—low pressure reverse osmosis system for seawater desalination and wastewater recovery. Water Research 88: 225–234. 4. Yu, H.Z., R. Kasiski, and M. Daelhousen. 2015. Characterization of twin-fluid (water mist and inert gas) fire extinguishing systems by testing and modeling. Fire Technology 51 (4): 923–950. 5. Glushkov, D.O., G.S. Nyashina, P.A. Strizhak, et al. 2015. Experimental evaluation of the effectiveness of water mist automated fire extinguishing systems for oil transportation. IOP Conference Series: Earth and Environmental Science 27: 012063.
Feasibility Study on Using Seawater …
469
6. Zhou, Y, R. Bu, J. Gong, et al. 2018. Assessment of a clean and efficient fire-extinguishing technique: Continuous and cycling discharge water mist system. Journal of Cleaner Production, 182. 7. Pancawardani, F., D. Arini, R.P. Yunindar, et al. 2017. Analysis of water mist fire suppression system applied on cellulose fire. Procedia Engineering 170: 344–351. 8. Shao, Z., D. Wang, Y. Wang, et al. 2015. Controlling coal fires using the three-phase foam and water mist techniques in the anjialing open pit mine, China. Natural Hazards 75 (2): 1833–1852. 9. Koshiba, Y., S. Okazaki, and H. Ohtani. 2016. Experimental investigation of the fire extinguishing capability of ferrocene-containing water mist. Fire Safety Journal 83: 90–98.
Application Sharing Mode of University Information Resources in (IOT) Internet of Things Changcheng Xin and Chaohu He
Abstract In recent years, the development of Internet of Things technology has led a new trend of information development, and has been applied in all walks of life. Internet of Things technology can not only greatly improve the efficiency of campus management, but also promote the development of education in China. However, there are also some drawbacks in the current resource information sharing. If we want to explore a specific kind of problems in depth, we need to share information resources among multiple information institutions. In view of the above-mentioned situation, this paper makes an in-depth analysis of the information resources sharing service mode under the current Internet of Things environment, and combines the characteristics of Internet of Things technology and information resources sharing, puts forward reasonable plans and strategies to apply Internet of Things technology to the process of university information resources sharing, which is conducive to promoting the development of Internet of Things on campus and speeding up the process of University informatization. Keywords Internet of Things · University information resources · Sharing model
1 Introduction In the “Internet +” era, the development of shared economy has spawned the rapid growth of entrepreneurial enterprises and accelerated the transformation of human resource management [1]. Information and communication technology (ICT) improves the effectiveness and efficiency of government affairs. However, the application of information and communication technology in the field of educational administration is very few [2]. With the continuous development of scientific and C. Xin Jose Rizal University, Manila1552, Philippines C. He (B) Yunnan Technology and Business University, Yunnan 651701, China e-mail: [email protected] Cavite State University, Indang, Cavite 4122, Philippines © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_58
471
472
C. Xin and C. He
technological information, more and more colleges and universities have entered a new era of information education, and each school has its own high-quality curriculum resources. However, many universities do not maximize their resources. In the era of information sharing, information exchange with other universities should be strengthened, and information resources exchange among universities should be strengthened [3]. In today’s era, universities can produce and disseminate knowledge in various organizations, communities and communities. Therefore, universities should promote the process of knowledge sharing among different academic members. Knowledge sharing is the key to knowledge management [4]. Knowledge sharing is an effective way for college students to acquire knowledge. Students share knowledge with their classmates, improve their academic performance, and strengthen social networks [5]. Collaboration based on digital resource sharing is an effective way to maximize the use of digital information resources, and the construction of unit collaboration platform based on digital resource sharing is the best way to meet users ‘information needs [6]. In the era of rapid economic development of sharing, how to solve the outstanding problems existing in cooperation, resource sharing, service and other related resources of university libraries is the construction. Key and Important Breakthrough for the Insufficient Supply of Resources in “Double-first-class” Universities [7]. The Internet of Things, also known as the Internet of All Things or the Industrial Internet, enables the interconnection of global machine and equipment networks that interact with each other. The Internet of Things (IOT) is recognized as one of the most important areas of future technology and has attracted wide attention from all walks of life [8]. The Internet of Things can communicate with each other through the Internet and with other devices and services, and achieve environmental intelligence [9]. The Internet of Things (IOT) system seamlessly integrates virtual and physical worlds to effectively manage things of interest. Users can monitor, visualize and aggregate services and resources provided by things to achieve value-added services [10]. Colleges and universities have always been the place to train advanced scientific and technological talents. In order to enhance the quality of teaching and improve the comprehensive level of schools, Internet of Things technology has gradually entered the campus of colleges and universities. Internet of Things (IOT) technology has been used in many aspects of daily teaching and administration. Internet of Things (IOT) technology has brought a positive impact on College life. It is convenient for teachers and students as well as for students’ daily life and learning. Based on the Internet of Things (IOT) technology, this paper studies the sharing of university information resources, analyses the characteristics, problems and challenges of information resources sharing and related technologies of Internet of Things in China’s universities, puts forward the countermeasures and suggestions to solve the construction of information resources sharing mode in China’s Universities Based on Internet of Things technology, and puts forward the new generation of Internet of Things technology for the construction of University informatization. The influence of construction and the direction of future university informatization put forward some ideas and suggestions.
Application Sharing Mode of University …
473
2 Relevant Technologies of Internet of Things and Information Resources Sharing in Colleges and Universities 2.1 Application of Internet of Things Technology As an important part of the new generation of information technology, Internet of Things (IOT) technology, which is rising with the Internet, is an important stage of the development of the information age. Internet of Things (IOT) technology is a complex information system involving many disciplines (such as biology, physics, communication, microelectronics, computer, etc.). It integrates many technologies, such as perception and recognition technology, network communication technology, data processing technology, information security technology and so on. Its application process is relatively complex, mainly including perceptual identification system, network construction system, service management system and integrated application system, which requires multiple systems to run together in the specific operation. The role of perceptual recognition system is mainly to collect and identify information, and manage related equipment through corresponding processing; while network construction system is used to transmit relevant information, transmit relevant information collected by the perceptual layer, and transfer it to the service layer; and service management system is used to process information transmitted by the network perceptual system. Finally, the system integrates the received information effectively, so as to achieve good communication between people and equipment, so as to support specific applications, and ultimately make the whole management process more intelligent.
2.2 Characteristics of Information Resources Sharing Service in Colleges and Universities The purpose of building university information resources sharing service is to ensure data sharing within universities and even between universities and colleges. The construction of information resources sharing is a complex process, which pays attention to standardization and unity. At the same time, it also needs to ensure that users can not encounter obstacles when accessing information. At the user’s application level, the uniform service interface and retrieval interface should be achieved. Sharing of information resources in Colleges and universities: mainly through the LAN to achieve the sharing of information resources on campus, to achieve the effect of sharing resources on campus, as long as the relevant communication equipment can meet the requirements of connection, and in order to ensure that resources on campus are not stolen. Basically, independent resource networks are
474
C. Xin and C. He
Fig. 1 Information resources sharing construction in colleges and universities
used for communication connections. Under the guarantee of physical isolation, data security can be fully maximized. Information Resource Sharing among Universities: Most of them share resources through some platforms, and integrate the government affairs network system of universities and higher education authorities to form a certain scale of university information resource sharing database. In recent years, breakthroughs have been made in the construction of information resources sharing in Colleges and universities in China. Statistics from the Science and Technology Development Center of the Ministry of Education show that 92.8% of the universities in China have built their own campus network, and 6.2% of the schools are under construction. Among the universities with their own campus network, 98.5% of them have realized office automation and educational and scientific research networking. In addition, 91.5% of the classrooms are networked and 75% of the students’ dormitories are networked, as shown in Fig. 1. It can be seen that the informationization construction of colleges and universities in China has begun to take shape, and the ways and contents of informationization are becoming more and more abundant.
2.3 University Information Resources Sharing Service Model Based on Internet of Things Technology Many colleges and universities in today’s society have realized information resources sharing, mainly combining network technology and modern management concepts. As the most extensive platform for information resources dissemination, colleges and universities play an important role in the process of social information development. On the basis of the Internet of Things, information resources sharing has been established, so as to realize the availability and sharing of efficient information resources. It can make the social groups get the university information resources
Application Sharing Mode of University …
475
fairly, and ultimately maximize the value of university resources sharing. The service modes of University Information Resources Sharing Based on the Internet of Things technology are generally divided into three types: intra-school sharing mode, inter-school sharing mode and social sharing mode. (1) On-campus sharing mode: build a platform for resource sharing within universities, and build a basic mode of information sharing according to the resource distribution of different departments and institutions. This mode is not only the most basic mode of resource sharing in universities, but also the easiest mode to realize. (2) Inter-school sharing mode: This sharing mode is a kind of information resource sharing mode established between universities and colleges. As far as the current inter-school sharing mode is concerned, most of them realize resource sharing through some platforms. (3) Social sharing mode: The operation of social sharing mode is mainly through the Internet technology to play a breakthrough role in the restriction of space and region, to provide information resources to different universities, so as to achieve the effect of information resources sharing.
3 Specific Measures to Strengthen the Construction of Information Resources Sharing in Colleges and Universities Based on Internet of Things Technology The purpose of education reform in China is to continuously improve the quality of teaching. The emergence of the Internet of Things has shown new ways to teaching and opened new channels. The idea of sharing resources and data has been prevalent in Colleges and universities. In order to maximize the use of information resources, it is necessary to integrate, classify and optimize the allocation of resources by using Internet of Things technology.
3.1 The Necessity of Strengthening the Information Resource Sharing Model of Colleges and Universities Based on Internet of Things In the era of information globalization, with the development of network technology, massive data information runs through people’s daily life all the time. The number of data is still increasing, and the era of data has come. Cloud computing, Internet of Things and other related network technologies, these new technologies provide a new opportunity for the construction of university education information resources sharing, and provide unlimited resources and data sources for University information.
476
C. Xin and C. He
It provides a platform and support for the transition from digital campus to intelligent campus. With the development of the economy. The sharing of university information resources based on Internet of Things technology refers to the comprehensive management of classrooms, equipment, teachers and students, teaching resources and teaching activities by using Internet of Things technology on the basis of digital campus, so as to realize the intellectualization of campus network on the Internet of Things technology platform, so that all the people in the campus can access to the Internet of Things information resources platform. There is no ready-made mode and path to share university information resources based on Internet of Things technology. Therefore, it is necessary to establish an effective application mode of university letter refinement.
3.2 Constructing Informatization Infrastructure Colleges and universities in the twenty-first century already have the conditions to realize the sharing of information resources and data. The concept of sharing resources and data has been prevalent in all colleges and universities. A large number of information data processing in Colleges and universities basically need to realize the sharing of resources. Colleges and universities can combine Internet of Things technology and Internet, mobile communication network and other networks to transmit and interact information. Intelligent computing can be used to build an all-round sharing platform of basic information resources for intelligent campus and teaching. The campus Internet of Things system based on the Internet of Things technology monitors and records the location and status information of campus users in real time, ensures that the data fully reflects the latest information of users, and supports the transmission of information through integrated WLAN functions, so as to improve the data transmission function in the Internet of Things solution. Actively use cloud computing, big data and other new technologies combined with Internet of Things technology to innovate the construction and application mode of resource sharing platform and management platform. The various network technologies used to construct information infrastructure are shown in Fig. 2.
3.3 Establish a Perfect Operation Mechanism by Adopting a Collaborative Service Model The information service provided by traditional colleges and universities is to collect, collate, collect and stream information materials for data collation. This data processing mode is obviously not suitable for the current era of information development, but also can not meet the needs of teachers and students. If we want to do a good job in the service of information resources in Colleges and universities, we should not
Application Sharing Mode of University …
477
Fig. 2 The various network technologies used to construct information infrastructure
only meet the needs of users, but also establish a mode of collaborative service chain among colleges and universities, so as to bring a new information sharing service mechanism for colleges and universities. In the construction of collaborative service mode, the following points should be done: (1) Combining the modern Internet of Things technology and data technology, the final data display of Internet of Things technology application will ultimately be attributed to LAN or WAN application, and the service content of various information resources in Colleges and universities will be further explored and studied. Achieving accurate content and complete data is another breakthrough that needs to be made in the development of resource sharing. (2) Data center construction scheme, the campus data center has entered the era of cloud computing data center from the traditional data center. In order to make rational use of resources, reduce duplicate investment and realize the sharing of server resources, the original equipment resources such as servers that can be used continually by various departments are centralized into the network and Information Center for unified management and use. (3) Strengthen the construction scheme of security protection, along with the rapid development of campus Internet of Things technology and mobile terminal users, and the centralized deployment of campus business in cloud computing data center, all of these require high-speed processing capability of the network, at the same time, security equipment, especially the security of cloud computing data center, should have higher performance requirements.
478
C. Xin and C. He
4 Concluding Remarks In colleges and universities, Internet of Things (IOT) technology is used in both teaching and other logistics systems, which facilitates the work of teachers and has a positive impact on students ‘learning. Internet of Things technology has promoted the development of society and universities. Major universities have successfully established various management systems and identification systems by using the Internet of Things technology, which not only reduces unnecessary labor, but also improves the efficiency of work. Based on the application characteristics of the Internet of Things and the service mode of information resources sharing, this paper puts forward specific measures to strengthen the construction of University Information Resources Sharing Based on the Internet of Things technology, so as to ensure that university information resources can be truly shared and play a greater advantage in the future development process.
References 1. Chen, M., and H. Wang. 2018, December. Construction of sharing human resources platform for entrepreneurial enterprises based on internet plus. In 2018 8th International Conference on Management, Education and Information (MEICI 2018). Atlantis Press. 2. Qin, C., and B. Fan. 2016. Factors that influence information sharing, collaboration, and coordination across administrative agencies at a Chinese university. Information Systems and E-Business Management 14 (3): 637–664. 3. Xiao, J. 2017, July. Realistic predicament and countermeasure of the construction of high quality curriculum resource sharing platform in universities. In 2017 3rd International Conference on Economics, Social Science, Arts, Education and Management Engineering (ESSAEME 2017). Atlantis Press. 4. Alsuraihi, M.D., K. Yaghi, and A.B. Nassuora. 2016. Knowledge sharing practices among Saudi academics: A case study of King Abdulaziz University. Journal of Current Research in Science 4 (1): 63. 5. Chen, Z., S. Deng, A. Mamtimin, J. Chang, F. Liu, and L. Ma. 2017, July. Exploring factors influencing knowledge sharing of international students at chinese university. In International Conference on Cross-Cultural Design, 521–530. Springer, Cham. 6. Hsu, C.M. 2012. The construction of a web-based learning platform from the perspective of computer support for collaborative design. International Journal of Advanced Computer Science and Applications 3 (4): 44–67. 7. Wang, H. 2018, July. A study on problems in cooperation, resource sharing and service of university libraries and countermeasures. In 3rd International Conference on Contemporary Education, Social Sciences and Humanities (ICCESSH 2018). Atlantis Press. 8. Lee, I., and K. Lee. 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons 58 (4): 431–440. 9. Whitmore, A., A. Agarwal, and L. Da Xu. 2015. The internet of things—A survey of topics and trends. Information Systems Frontiers, 17 (2): 261–274. 10. Yao, L., Q.Z. Sheng, and S. Dustdar. 2015. Web-based management of the internet of things. IEEE Internet Computing 19 (4): 60–67.
Information Reconstruction Strategy for a Ship Power Distribution System Hongdan Liu, Yue Sun and Lanyong Zhang
Abstract The aim of this study was to address the information computational complexity resulting from the highly coupled switching state and load power supply in the reconstruction of a traditional ship power distribution information network (SPDN). Then the cohort intelligence algorithm (CI)-based strategy of maximum power supply recovery for a non-fault load is proposed. Accordingly, the problems of restoring the power supply, supplying power for the key load and the maximizing the load power supply, can be addressed efficiently based in power information reconstruction. Finally, based on the malfunction of the ship medium-voltage DC (MVDC) integrated electric propulsion system, the effectiveness and reliability of the strategy in solving problems in reconstructing the SPDN are verified, and the mission performance of the ship can be better ensured. Keywords Medium-pressure DC integrated electric propulsion system · Distribution network reconstruction · Cohort intelligence algorithm · Information reconstruction of power
1 Introduction The network structure of a ship power system has become increasingly sophisticated, making the power system of increasing significance to ships. Additionally, reconstruction of the distribution network is a typical problem in power systems, and the distribution network consists of segmented switches and contact switches. By changing the state of these switches, reconstruction of the distribution network can be finished to achieve the objectives of optimized operation and safe operation [1]. The ship integrated electric propulsion system should also restore the power supply quickly [2]. During reconstruction, the nonlinear power flow equation satisfying the operating constraints of the system should be solved. In general, the genetic algorithm [3], particle swarm algorithm [4] and other artificial intelligence algorithms H. Liu · Y. Sun (B) · L. Zhang College of Automation, Harbin Engineering University, Harbin, Heilongjiang Province, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_59
479
480
H. Liu et al.
are adopted to solve the switching state in the distribution network to maximize the power supply after system failure and to achieve high coupling between the switching state and the maximum power supply of the load. However, these algorithms are disadvantaged in large computations and slow power recovery. To solve these problems, the cohort intelligence algorithm (CI) [5]-based strategy of maximum power supply recovery for a non-fault load is proposed under the condition of an MVDC integrated power system to satisfy the demand for real-time reconstruction of the ship’s power systems. Moreover, an effective reconstruction strategy can introduce new ideas for achieving ship power recovery.
2 Implementation of Distribution Network Reconstruction Based on the CI Algorithm The typical NP-hard problem is 0–1 knapsack problem [6, 7]. There are 2N (N objects) combinations of solution spaces. With the increase of the problem size, the traditional solving knapsack problem using an exhaustive method, dynamic programming and greedy algorithm is difficult to solve ideally within a limited time [8]. Additionally, with the rapid development of the genetic and particle swarm algorithms in recent years, intelligent evolutionary algorithms such as the ant colony and cuckoo algorithms provide solutions to solving this problem. In CI algorithm, taking the initialization of the number of cohort candidates C as the starting of procedure, as well as the number of variations t. In the cohort of C candidates, each candidate c(c = 1, . . . , C) first randomly selects a few objects and the associated profits F C = { f (v 1 ), . . . , f (v c ), . . . , f (v C )} and weights F C W = { f (w 1 ), . . . , f (w c ), . . . , f (wC )}. The steps of using the queue intelligence algorithm to reconstruct the ship’s power grid are illustrated in Fig. 1. The probability p2c increases linearly with the rise of the total weight of the knapsack and reaches its peak at the maximum capacity W. With any further increase in weight, the probability will decrease rapidly. Thus, the probability reaches its peak around the maximum capacity and decreases on either side with a decrease beyond W at twice the slope. Associated profit f (v c[?] ) for candidate c(c = 1, . . . , C) are chosen and the superscript [?] suggests that the behavior is selected by candidate c and is not known in advance. The modification approach is inspired by the feasibility-based rules discussed in [6]. The modifications are stratified as follows: In step 1, the probability p c (c = 1, . . . , C) of selecting a profit f (v c ), (c = 1, . . . , C) is calculated as p c = p1c + p2c , where p1c =
f (v c ) C f (v c ) c=1
Information Reconstruction Strategy …
Fig. 1 Load supply maximization based on CI algorithm flowchart
481
482
H. Liu et al.
⎧ ⎪ ⎨
f (w c ) , f (w c ) ≤ W W c p2 = c ⎪ ⎩ 3 − 2 f (w ) , f (w c ) > W W
(1)
It adds a randomly selected object from the candidate being followed, such that the object has not been included in the present candidate c and the weight constraint given by Eq. (1) is still satisfied. (1) It replaces a randomly selected object with another randomly selected object from the candidate being followed, such that Eq. (1) is satisfied. (2) If candidate c(c = 1, . . . , C) is in-feasible, such that the total weight f (wc ) of the candidate, c, decreases. Every candidate performs the above procedure t times. This makes each candidate c available with associated profits F c, t = { f (v c )1 , . . . , f (v c ) j , . . . , f (v c )t }, (c = 1, . . . , C). Furthermore, each candidate selects the optimal profit f ∗ (v). Select the best variable under the following conditions: in-feasible and feasible of variations are chosen to judge the maximum and minimum profit.
3 Case Analysis of Ship Distribution Network Reconstruction All-electric ships are the most advanced representative in the field of electric ship applications. The integrated electric propulsion system also employs an MVDC structure [3, 9]. The 11 areas divided by the bus lines are represented in the figure, i.e., the vertices of each directly connected edge represent protected areas, as shown in the pink dotted-line box in the Fig. 2. This section illustrates the application process of the proposed phase distribution network reconstruction strategy in combination with specific examples. It is assumed that the operation state of the ship MVDC integrated electric propulsion system before failure is shown in Fig. 3.
3.1 Reconstruction Instance 1—Bus1 Failure A generator-connected regional bus fault is one of the easiest-occurring faults that cause a shortage of power in the system. Assuming the MTG1 connection of bus bar Bus1 undergoes failure, to isolate the fault, breakers BK1, BK10, BK17 and BK18 must be in the off state. The current system is shown in Fig. 4. The black dotted-line path suggests that the circuit breaker cannot be applied for reconstruction. (1) Update the state vector BK_STATUS of the circuit breaker: set the state of the uncontrollable circuit breaker To-1.
Information Reconstruction Strategy …
V1
V9
V8
V7
483
V2
V3
V10
V11
V6
V5
V4
Fig. 2 Graph representation of a shipboard MVDC IEP system 20MW
36MW Bus 1
22MW
MTG1
0MW
20MW
BK8
Load 3
BK15
BK4 Bus 7
BK9 Load 5
4MW
2MW
BK23
0MW
20MW
BK15
BK13
BK3
BK14 BK6
ATG2 4MW
2MW
Bus 6
Load 2 20MW
Fig. 3 MVDC IEP system before surfing a fault
Bus 4
Bus 11
Bus 10
2MW
0MW
BK22
Load 4
BK21
BK19 BK16
BK12
2MW
Bus 9 2MW
0MW
BK2
2MW
BK20
2MW
Bus 8
Bus 3
0MW
BK18 BK7
ATG1
BK11
BK10
BK17 2MW
2MW
BK5
Bus 2 BK1
4MW
Load 1
22MW
MTG2 36MW
Bus 5
484
H. Liu et al.
Fig. 4 Graph representation of shipboard IEP system
BK_STATUS = [−1, 1, 1, 1, 1, 1, 1, 1, 1, −1, 1, 0, 0, 1, 1, 0, −1, −1, 1, 1, 0, 1, 1]; (2) Update the flow vector BK_ FLOW of the circuit breaker as follows: set the flow element corresponding to the uncontrollable circuit breaker to 0, and set the flow rate of the controllable circuit breaker connected to the generator to the capacity of the corresponding generator. BK_ FLOW = [0, 4, 36, 4, 20, 20, 2, 2, 4, 0, 0, 0, 0, 20, 2, 0, 0, 0, 0, 0, 2, 2, 2]; (3) Update node-branch correlation matrix S as follows: make all row elements corresponding to Bus1 of the fault and all column elements corresponding to the uncontrollable circuit breakers BK1, BK10, BK17 and BK18 equal to 0. (4) The regional power balance matrix can be calculated, and the results are listed in Table 1. “−” denotes that the area is malfunctioning. The power values of region 2 and region 9 are negative, suggesting that these two regions have insufficient power due to Bus1 failure. Before the failure, zone 1 provided power supplies of 20 MW and 2 MW for zone 2 and zone 9, respectively. The power values of regions 3, 5 and 7 are positive, suggesting that these three regions can provide surplus power. To maximize the load requirements, the problem of maximum load satisfaction after Bus1 failure Table 1 Power of each region after failure Area
1
2
3
4
5
6
7
8
9
10
11
Power balance
–
−20
2
0
14
0
2
0
−2
0
0
Information Reconstruction Strategy …
485
is expressed as: object : f (x) = 0.3 × 5(x1 + x2 + x3 + x4 ) + 0.3 × 5(x5 + x6 + x7 + x8 ) +0.15 × 2x9 + 0.05 × 2x10 + 0.2 × 4x11 s.t. : 5
8
xi + 2x9 + 2x10 + 4x11 ≤ 44
i=1
xi = 0 or 1, i ∈ [1, 2, . . . , 11]; The program first initializes the candidate C and variable of the cohort t, in which the candidate C = 5 and execution times t = 12.11. Each candidate first randomly selects some objects from a given set and gets five sets of solutions. The optimal result is candidate 1, f (ri · PLi ) = 13.2, but it does not meet the constraint. The worst result is candidate 5, f (ri · PLi ) = 11.7, but it meets the constraint. In accordance with the roulette-wheel selection approach, the selection probability of each candidate is calculated as follows:
The candidate
1
2
3
4
5
The probability
1.02
1.11
1.024
1.1103
1.16
Using the roulette-wheel selection approach, each candidate will select a target candidate to follow. When selecting the target candidate, each candidate follows a similar probability function of roulette-wheel selection approach, which is selected randomly and could not be determined beforehand. The optimization scheme is as follows: (1) If the candidate solution is feasible, i.e., if f (PLi ) ≤ PG is satisfied, one of the following modifications is randomly selected: (1) Randomly select an object from the target candidate and introduce it to the current candidate, which requires that the object is not included in the current candidate and still meets f (PLi ) ≤ PG . (2) The strategy also meets f (PLi ) ≤ PG if an object randomly selected from the original candidate is replaced with an object randomly selected from the target candidate. (2) If the candidate solution is not feasible, one of the following modifications is randomly selected: (1) Randomly remove an object from the current candidate. (2) Randomly replace an object selected from the original candidate with an object selected from the target candidate to reduce the total weight f (PLi ) of the candidate c. In line with the changes in the above table, candidate 1 selects the optimal result that meets the constraint after the change. Likewise, candidate 2 follows candidate 3, candidate 3 follows candidate 4, candidate 4 follows candidate 5, and candidate 5 follows candidate 1, respectively. Each candidate performs the above procedure 12 times, enabling each candidate to obtain the corresponding solution. The five candidates have regenerated a series of evolutionary solutions.
486
H. Liu et al.
At this point, after each execution is completed, each candidate selects the optimal solution. Based on the updated result, candidate 2, f (ri · PLi ) = 12.8, is the optimal result and meets the constraint. Candidate 5, f (ri · PLi ) = 11.7, is the worst result, also meeting the constraint. The optimal solution for each candidate selection is the initial input for the next program run. Since there may exist unfeasible results in iterations of evolution, the optimal solution is selected under the following conditions: If the result after evolution is feasible, select the solution with the maximum value. If the result of evolution is not feasible, select the solution with the minimum weight. If there is an unfeasible and a feasible change, select the feasible solution with the greatest value. The updated selection probability calculation results of each candidate are as follows:
The candidate
1
2
3
4
5
The probability
1.2042834
1.2108731
1.170024
1.1538864
1.1700239
Likewise, using the roulette-wheel selection approach, candidate 1 follows candidate 5, candidate 2 follows candidate 1, candidate 3 follows candidate 4, candidate 4 follows candidate 5, and candidate 5 follows candidate 1, respectively. The optimal results are obtained by changing each object 12 times, and the following updated candidates can be obtained. At this point, based on the updated result, candidate 2, f (ri · PLi ) = 12.8, is the optimal result and meets the constraint. Candidate 5, f (ri · PLi ) = 11.7, is the worst result, also meeting the constraint. This process continues until saturation (convergence), similar to the process for the previous results. The output is f max (ri · PLi ) = 12.8, f max (PLi ) = 44. This reveals that Load3 and Load4, with lower priority, are unloaded to meet the power balance of the system when the power generation capacity of the system is insufficient. Hence, the power generation of the system is 44 MW, and the load is 44 MW. The ship MVDC integrated electric propulsion system after fault reconstruction is shown in Fig. 5.
4 Conclusion Aiming at the characteristics of the MVDC power system in ship integrated power propulsion systems, this study analyzes the algorithm of ship distribution network reconstruction. Specifically, the problem of load restoration power supply for ship power is resolved by CI algorithm optimized. This algorithm avoids complex calculations due to high coupling of the switching state and the load supply in traditional distribution network reconstruction methods and verifies the validity and reliability of the proposed reconstruction strategy through fault analysis.
Information Reconstruction Strategy …
487
Fig. 5 Reconstruction power distributions
Acknowledgements It is appreciated that this research is supported by Fundamental Research Funds for the Central Universities 3072019CF0406, 3072019CF0407.
References 1. Santander-Jiménez, S., and M.A. Vega-Rodríguez. 2015. A hybrid approach to parallelize a fast non-dominated sorting genetic algorithm for phylogenetic inference. Concurrency & Computation Practice & Experience 3: 702–734. 2. Shagar, V., S.G. Jayasinghe, and H. Enshaei. 2017. Effect of load changes on hybrid shipboard power systems and energy storage as a potential solution: A review. Inventions 2 (3): 21–30. 3. Xu, Q., B. Yang, Q. Han, et al. 2017. Optimal power management for failure mode of MVDC micro grids in all-electric ship. Volume 4, pp. 164–169. 4. Zhang, L., J. Sun, and G. Chen. 2017. A novel multi-objective discrete particle swarm optimization with elitist perturbation for reconfiguration of ship power system. Polish Maritime Research 24 (s1): 98–102. 5. Kulkarni, A.J., G. Krishnasamy, and A. Abraham. 2017. Modified cohort intelligence for solving machine learning problems. In Cohort intelligence: A socio-inspired optimization method, 45– 67. Cham, Switzerland: Springer. ISBN. 6. Kulkarni, Anand Jayant, Ganesh Krishnasamy, and Ajith Abraham. 2017. Cohort intelligence: A socio-inspired optimization method, 1–7. Cham, Switzerland: Springer. 7. Badertscher, Christian, Sandro Coretti, and Ueli Maurer. 2017. Efficiency lower bounds for commit-and-prove constructions. In Conference: 2017 IEEE International Symposium on Information Theory (ISIT), 234–244. 8. Kulkarni, A.J., I.R. Kale, and K. Tai. 2016. Probability collectives for solving discrete and mixed variable problems. International Journal of Computer Aided Engineering & Technology 8 (4): 325–335. 9. Satpathi, K., N. Thukral, A. Ukil et al. 2016. Flux estimation based dc bus voltage control in marine dc power system. In Industrial Electronics Society Conference of the IEEE, 178–185. IEEE.
Design and Experiment of a Flexible Array Tactile Sensor Hengyi Yuan and Qingfang Zhang
Abstract With the continuous improvement of robot intelligence, machine tactile and machine vision technology have been greatly developed, but most tactile sensors can not meet the requirements of tactile sensing applications. Therefore, piezoresistive effect and force information detection principle based on new sensitive materials are proposed, and a flexible force sensitive tactile sensor with three-dimensional array structure is designed. The mathematical description of calculating the threedimensional force is obtained through analysis, and the finite element simulation of the array structure of the multi-dimensional flexible tactile sensor is carried out. The three-dimensional displacement changes of the coordinates of the central node under different three-dimensional forces are obtained, and the output resistance of the force-sensitive conductive rubber array unit before and after the three-dimensional force action is calculated. The changes provide an effective basis for verifying the experimental results and new structure design. The test results show that the proposed sensor can measure normal force with high accuracy, good repeatability, and can detect sliding phenomena. In addition, the proposed sensor has simple structure, low cost, and is easy to mass production and application. Keywords Tactile sensor · Flexibility · Slip detection · Force measurement
1 Introduction With the continuous progress of robotics technology, the application of robots is no longer confined to industrial and military fields, but also to the commercial fields such as medical aid and entertainment. The number of humanoid robots and other bionic robots is increasing. These robots usually interact with human beings. Although very advanced sensors and data processing technologies are available in visual and auditory areas, the key inputs needed by humanoid robots and bionic robots also need to include information about body contact. Tactile sensors can provide all kinds of information about body contact, such as strength, sliding, temperature, softness/hardness, H. Yuan · Q. Zhang (B) Jilin Engineering Normal University, 3050 Kaixuan Road, Changchun 130052, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_60
489
490
H. Yuan and Q. Zhang
and organizational structure. These information can be used to estimate the control parameters of various tasks such as grasping, pushing/pulling. These sensors are also very useful in the industrial field, which can handle objects with irregular shape or fine structure. With the development of tactile sensor design, a variety of sensing technologies have been developed, such as resistance, capacitance, optics, resistance and Hall sensor.
1.1 Robot Tactile Sensor Tactile sensation is a form of human perception of the external environment through the skin. It mainly senses the temperature, humidity, pressure and vibration from the outside, and senses the shape, size, material, soft and hard degree of the target object. The function of tactile sensor based on human tactile principle is becoming more and more perfect and has been developed to many fields, which is mainly used in robots. Like vision and hearing, touch is an important means for robots to perceive external information. Robot tactile sensor mainly judges the state and characteristics of the object contacted by detecting and recognizing functions. The flexible capacitive tactile sensor with floating electrodes is introduced in the literature. The design of the sensor has high spatial resolution, but the process of producing the sensor with floating electrodes is very complicated. A three-dimensional force tactile sensor based on composite materials has been proposed. The range and sensitivity of the sensor are good, but the composite materials used are very expensive and difficult to obtain, which is not suitable for large-scale production and application. In addition, a three-dimensional force tactile sensor using electromagnetic induction coil is proposed. Although induction method can detect force in a wide range, it usually has low resolution and high power loss. The reason of low resolution is that the magnetic field generated by the coil is low. Increasing resolution requires more turns to increase sensor size or larger current to increase power loss.
1.2 Working Principle Piezoresistive effect is used to describe the resistance change of material under mechanical stress. The piezoresistive effect of pressure-sensitive conductive rubber can be divided into bulk effect and surface piezoresistive effect. The microscopic mechanism of bulk piezoresistive effect of force-sensitive conductive rubber is referred to the literature [1]. Surface piezoresistive effect refers to the phenomenon that the resistivity of two contact surfaces changes with the change of bearing capacity. Dirk Goger make use of surface piezoresistive effect to make one-dimensional sensor array. Surface piezoresistive effect refers to the fact that the resistance of the contact surface decreases with the increase of the carrying capacity when the force-sensitive conductive rubber contacts with the conductor. The contact surface
Design and Experiment of a Flexible …
491
Fig. 1 Piezoresistive effect schematic diagram
begins to be incomplete contact. As the pressure is gradually applied on the forcesensitive conductive rubber, the contact surface becomes better, the conductive path increases, and the surface contact resistance (Rs in Fig. 1) decreases. The threedimensional force-flexible tactile sensor is a combination of the above-mentioned volume piezoresistive effect and surface piezoresistive effect. Therefore, under the action of external pressure, the total resistance of the force-sensitive conductive rubber R = Rv + 2Rs (where Rv is volume resistance) [2]. Karsten Weibeta put forward the viewpoint that the piezoresistive effect of the force-sensitive conductive rubber body changes little, the surface piezoresistive effect changes significantly and the linearity is better. In order to compare the difference between bulk piezoresistive effect and surface piezoresistive effect, three groups of experiments were designed: the first group was to measure the bulk resistance effect by arranging the conductors inside the conductive rubber. Because the conductors were fixed and bonded to the conductive rubber, the surface piezoresistive effect of the conductors was eliminated, and the measured data was volume resistance Rv . The second group was to place the conductive rubber inside two. The total resistance R = Rv + 2Rs , the total resistance sensitivity GF = R/F = GFV + GFS, and the middle F is the loading force. In the third group of experiments, the force-sensitive conductive rubber was placed between two circular copper plate electrodes with half the area of the second group to measure the surface piezoresistive effect of different contact surface areas. The resistances Ra , Rb and Rv of the samples were measured by weight loading on the above experimental samples. The experimental results are shown in Fig. 2. The results show that the resistance changes little without surface piezoresistive effect. The sensitivity of bulk resistance Rv is GF = GFv = 0.029 k/N, while the sensitivity of total resistance Ra with surface piezoresistive effect is GF1 = 1.642 k/N, and the surface piezoresistive effect changes more than bulk resistance. The resistance effect is more significant, so the design of surface piezoresistive effect is considered in the research of three-dimensional force flexible tactile sensor; the sensitivity of the total resistance Rb of 1/2 contact surface is GF2 = 1.216 k/N, which is less than that of the resistance with large contact area, indicating that the surface piezoresistive effect is related to the contact area of the electrode. Surface piezoresistive effect is the main theoretical basis, and the contact area should be increased as much as possible to improve the sensitivity of force-sensitive conductive rubber.
492
H. Yuan and Q. Zhang
Fig. 2 Comparison of bulk piezoresistive effect and surface piezoresistive effect
2 Sensor Design 2.1 Microstructure Design of Sensor Unit Tactile sensors need to measure the information of large area contact surface accurately, so they need to be designed as an array structure composed of multiple units. Each element should be tested for three-dimensional force, so the structure design of the sensor unit is particularly important. Considering the flexibility of tactile sensor, the flexible printed circuit board is used to design the electrode wiring of sensor array. The micro-dome structure flexible tactile sensor is fabricated based on 3D printing technology and silicone rubber fluid forming characteristics. The microdome structure flexible tactile sensor is fabricated by constructing micro-structure on the surface of conductive composite materials. Figure 3 is a schematic diagram of the structure and sensing mechanism of micro-dome tactile sensor, showing respectively the tactile sensing unit [3]. CB/CNTs/SR is selected as the force-sensitive composite material, and a micro-dome contact array is left on the contact surface of the interdigital electrode. Figure 3 also shows a schematic diagram of micro-dome structure and the sensing mechanism when the force is applied, and piezoresistive tactile force is sensitive. The output resistance of the unit is composed of volume resistance and contact resistance. Under the effect of tactile force, the contact state of the micro-dome array structure and the electrode changes from point-to-surface contact to surface-to-surface contact. At the same time, the force-sensitive composites are compressed, the tunnel effect is enhanced, and the conductive paths are formed between conductive fillers. The synergistic effect of the two constitutes the tactile sensing mechanism. Figure 3 shows the stress and strain of the micro-dome tactile sensor under stress. In order to detect the three-dimensional force, a hemispherical sensor head is set above the sensor unit to transmit the force. The sensor head is made of polyethylene material with a hard texture, in which the deformation of the sensor head can be
Design and Experiment of a Flexible …
493
Fig. 3 Dome structure and force diagram
neglected. The displacement of the sensor head will occur after it is stressed, which will change the pressure of the stress-sensitive conductive rubber in its lower layer, thus causing corresponding changes of the resistance R1–R3. The three resistor changes reflect the three-dimensional force information that the sensor head feels [4]. By the following analysis method, three-dimensional force can be solved. Assume that under the action of three-dimensional force F = Fx , Fy , Fz , three resistor changes are R1 = f1 (Fx , Fy , Fz ) = f1 (Rx , Ry , Rz ) = f1 (Rx , Ry , Rz ); R2 = f2 (Fx , Fy , Fz ) =f2 (Fx , Fy , Fz ) = f2 (Fx , Fx , Fy , Fz ) = f2 (Rx , Rx , Ry = f3 (Fx , Fy , Fz ) = f3 (Rx , Ry , Rz ). Arbitrary The function of force F= (Fx , Fy , Fz ) is decomposed into three independent components and analyzed one by one. When F= (0, 0, Fz ), i.e., only Z direction is compressed, the sensitive elastic element is the whole sensor unit, and the resistance value of R1–R3 decreases Rz . When F = (Fx , 0, 0), i.e. only horizontal force in X direction, Fx produces a rotating moment around y axis, which makes the stress of the force-sensitive conductive rubber layer different: R1 is compressed, resistance decreases Rx ; R2 and R3 are stretched. Because R2 and R3 have an angle of 30 degrees in X direction, the deformation is half of that of R1, and resistance increases Rx /2. When F = (0, Fy, 0), that is, only horizontal force in the positive direction. When Fy generates a rotating moment around the x-axis, the force acting on the force-sensitive conductive rubber layer varies slightly at the top of the moment; R2 is compressed and resistance decreases Ry ; R3 is stretched and resistance increases Ry because of symmetry. In summary, the sensitivity of R1–R3 to three directions is different,
494
H. Yuan and Q. Zhang
which contains three-dimensional force information. The three-dimensional force can be calculated according to the information of resistance change. The matrix is expressed as assuming that there is no translation at the bottom of the spherical crown when the force is applied, and it is considered that the change of resistance is linear with the pressure. ⎤ ⎤ ⎡ ⎤⎡ R1 −1 0 −1 Rx ⎣ R2 ⎦ = ⎣ 1/2 −1 −1 ⎦⎣ Ry ⎦ Rz R3 1/2 1 −1 ⎡ ⎤ ⎡ ⎤⎡ ⎤ Rx −2/3 1/3 1/3 R1 ⎣ Ry ⎦ = ⎣ 0 −1/2 1/2 ⎦⎣ R2 ⎦ Rz −1/3 −1/3 −1/3 R3 ⎡
Fi = Ri /ki (i = x, y, z)
(1)
(2)
According to the relationship between Ri and Fi in Eq. (2), the coefficient ki is calibrated by least square method based on a large number of measured data. The magnitude of each component of three-dimensional force F = Fx , Fy , FZ can be obtained by resistance variation Ri (i = x, y, z).
2.2 The Array Design of Sensor The array design of sensor is shown in Fig. 4. The sensor unit is designed as a 3 × 3 array and scanned by an array structure. In the diagram, VO1 , VO2 and VO3 are the reference voltages; VA1 , VA2 , VA3 , VB1 , VB2 , VB3 , VC1 , VC2 and VC3 are the output voltages [5]. When measuring, the transverse and longitudinal lead wires are selected in turn to obtain the corresponding resistance and force information of the corresponding position. The sensor center unit is the first unit. As an example, the force acting on the element in Row 2 and column 2 can be obtained as follows: Fx = fx (VA2 , VB2 , VC2 ) = fx (R1, R2, R3); Fy = fy (VA2 , VB2 , VC2 ) = fy (R1, R2, R3); Fz = fz (VA2 , VB2 , VC2 ) = fz (R1, R2, R3). In practical use, the relationship between input force information and output voltage can be determined by calibration. Design and develop electrodes on standard PCB. All electrodes are square in size and 4.5 mm in length. The distance between electrodes is 0.5 mm. The distance from the ground plane is 1.25 mm. The PCB is 3.2 mm thick and the bottom is used as the ground plane. PCB conductors (A, B, C and D) are terminated with SMA connectors and then connected to the measurement system through shielded cables, which include a capacitive digital converter. The insulation layer is 0.8 mm thick, with a square hole 8 mm long in the middle as a variable air gap. This paper
Design and Experiment of a Flexible …
495
Fig. 4 Schematic diagram of sensor array
designs with the aid of CAD program (AutoCAD) and manufactures with the aid of 3D printer. GD401 (Zhonghao Chengguang Chemical Research Institute Co., Ltd.) [6] silicone rubber was used as flexible matrix and YC-2 silicone conductive silver adhesive (Nanjing Heite Adhesive Co., Ltd.) as electrode. The top silicone rubber layer is manufactured by proper die, and the final silicone rubber layer is formed. Due to its proper mechanical properties, silicone rubber has been widely used in tactile sensors in the past. The width and length of a single sensor element are both 1 cm and less than 1 cm. Multiple sensing elements can be arranged tightly on the surface of the manipulator.
3 Experimental Results Three groups of measurements were selected from the range of 0 to 100 mN. Figure 5 is the measured capacitance of CAB (solid line) and CCD (dotted line). It can be seen from the figure that the capacitance change is repeatable in many measurement results. Under ideal conditions, the drawings of CAB and CCD should be the same, but in fact, it is impossible to make fully symmetrical equipment and apply normal force to the sensor accurately. Therefore, there are slight deviations and differences in the shape of the curve, but this difference can be neglected compared with the numerical range of capacitance changes. In order to correct the equipment, the average values of the first two sets of data are obtained, and then the rectangular window with size 5 is used for filtering. Then, a polynomial model of capacitance-force relationship
496
H. Yuan and Q. Zhang
Fig. 5 The relationship between average capacitance and normal force
is constructed based on the filtered data [7]. The force-capacitance CAB curve is modeled by the polynomial of each order under the minimum mean square deviation criterion [8]. The experimental results show that the root mean square error of the fifth order polynomial is less than 1%. Equivalent to the computation and complexity of polynomials, higher-order polynomials do not bring obvious improvements. Therefore, the fifth order polynomial is chosen to model the system, and the root mean square error is 1%. When the sensor runs in the low sensitivity region under the condition of low input force (0–0.2 N), most of the errors are caused by the sensor [9]. However, in the application of mechanical arm and so on, the error in the input force area is allowed. Then, the polynomial model estimates the applied force by measuring capacitance. Figure 6 shows the error result of the estimation based on the fifth order polynomial. The model is used to calculate the input forces of various capacitance values, and the estimated results are compared with the measured forces [10]. The input force predicted by the model is better, and the average error is less than 0.01 N. The normal sensitivity is about 0.4 pF/N in the range of 0–100 mN. After calibrating the equipment with a high resolution dynamometer, the error can be further reduced and the resolution can be improved. In recent years, although tactile sensing technology has developed to some extent, there are still some problems. Firstly, there are not many kinds of new materials for Fig. 6 Sensor error results
Design and Experiment of a Flexible …
497
tactile sensors; secondly, there is no obvious breakthrough in the working principle and technology of tactile sensors. Moreover, many research results are mostly in the laboratory stage, and few can be used as a result of large-scale commercialization. With the development of science and technology, flexible tactile sensors are required to be applied in various special environments, so flexible tactile sensors need to be combined with intelligence. Multifunctional tactile sensors are also an important development direction. Intelligent robots need not only to perceive the physical properties of objects in contact, but also to perceive the state of the external environment. In the process of industrial production, it is necessary to measure the pressure distribution of a plane or a curved surface under many special conditions, such as the pressure distribution of mechanical seal face in small and micro-gap, or the pressure distribution of fluid in pressure vessel and pipeline, etc. All of these put forward new and higher requirements for measuring principle, measuring method and structure and characteristics of flexible tactile sensor. At the same time, there are still many problems to be solved in the calibration of flexible tactile sensors. In order to improve the wearing comfort and force sensitivity of tactile sensors, a flexible wearable tactile sensor with micro-dome array structure was fabricated based on carbon black/carbon nanotubes/silicone rubber composites. The structure characteristics and fabrication process of micro-dome tactile sensor are described. The tactile sensor can be used to wear tactile sensor to achieve flexible tactile sensing by force-sensitive characterization experiment and plantar pressure distribution sensing application. Acknowledgements This research was supported by Program for Innovative Research Team of Jilin Engineering Normal University (IRTJLENU).
References 1. Javad, Darqahi, and Najarian Siamak. 2014. Theoretical and experimental analysis of piezoelectric tactile sensor for use in endoscopic surgery. Sensor Review 24 (1): 74–83. 2. Bermúdez, G.S.C., D.D. Karnaushenko, D. Karnaushenko, A. Lebanov, L. Bischoff, M. Kaltenbrunner, J. Fassbender, O.G. Schmidt, and D. Makarov. 2018. Magnetosensitive e-skins with directional perception for augmented reality. Science Advances 4 (1): 1–9. 3. Sergio, M., N. Manaresi, and M. Tartagni. 2016. On a road tire deformation measurement system using a capacitive—Resistive sensor. Smart Materials and Structures 15 (6): 1700–1706. 4. Lee, H.K., S.I. Chang, and E. Yoon. 2016. A flexible polymer tactile sensor: Fabrication and modular expandability for large area deployment. Journal of Microelectromechanical Systems 15 (6): 1681–1686. 5. Lee, H., J. Chung, and C.H. Sun. 2018. Normal and shear force measurement using a flexible polymer tactile sensor with embedded multiple capacitors. Journal of Microelectromechanical Systems 17 (4): 934–942. 6. Park, J.H., Y.O. Lee, and J.Y. Hong. 2014. Tactile-direction- sensitive and stretchable electronic skins based on human-skin-inspired interlocked microstructures. ACS Nano 8 (12): 12020– 12029. 7. Breazeal, C., and W.D. Stiehl. 2016. A sensitive skin for robotic companions featuring temperature, force and electric field sensors. Intelligent Robots and Systems, 1952–1959.
498
H. Yuan and Q. Zhang
8. Takei, K., W. Honda, S. Harada, T. Arie, and S. Akita. 2015. Toward flexible and wearable human-interactive health-monitoring devices. Advanced Electronic Materials 4 (4): 487–500. 9. Wang, Y., L. Rong, H. Wang, and G. Wen. 2017. One-step sneak-path free read scheme for resistive crossbar memory. ACM Journal on Emerging Technologies in Computing Systems 13 (2): 25. 10. McCoul, D., W. Hu, M. Gao, V. Mehta, and Q. Pei. 2016. Recent advances in stretchable and transparent electronic materials. Advanced Electronic Materials 5 (2): 4–7.
Design of Street Lamp Management Information System Xiangguo Lin
Abstract A street lamp system using STM32F103RD6 embedded microprocessor, ZigBee and GPRS is designed in this paper. In the system, the light intensity information, current, voltage and power are obtained and sent to the gateway center through ZigBee. Then, the gateway center will communicate with the server using GPRS. In order to analyze the street lamp information, an ant colony clustering algorithm is used in the server. The system has the characteristics of humanized timing calibration, remote monitoring, fault location and alarm, etc. It is stable, reliable and low communication cost, and has broad application prospects. Keywords IOT · Smart street lamp · GPRS
1 Introduction In recent years, with the development of economy, street lighting systems have been installed in many rural areas. However, due to the remote location, sparse population and inconvenient traffic in many rural areas, the traditional time switch and manual patrol management methods appear to be very inefficient, mainly manifested in the consumption of large manpower and material resources, the inability to monitor the operation of street lighting facilities in real time, the lack of timely maintenance, greatly affecting the villagers’ travel and traffic safety [1]. Especially, the control system mostly adopts wired control mode, which has high cost of laying cables, complicated construction and difficult maintenance [2–4]. Aiming at the problems existing in rural street lamp management at present, this paper designs a set of intelligent street lamp control and management system which is suitable for the application requirements of vast rural areas, realizes remote intelligent control of rural street lamp and automatic detection and alarm of street lamp faults. It not only saves energy, but also guarantees the safety of villagers’ travel in time, and has wide application. X. Lin (B) Department of Communication, Civil Aviation College, Guangzhou 510640, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_61
499
500
X. Lin Vehicle Detection
APP Webpage
Monitoring Center
A9 GPRS
Gateway
ZiBee
SMS Telephone
Street Lamp Node
Light Detection Human Detection Electrical Detection
Fig. 1 System overall design
2 System Overall Design The system is mainly composed of monitoring center, street lamp gateway and street lamp node. The monitoring center realizes centralized management of the whole street lamp system. Its main functions include fault judgment, transmission of fault information, calibration and update of timing time, street lamp switches in special scenes such as cloudy and rainy days, and the issuance of various control commands. Its communication objects are mainly street lamp gateways and street lamp managers. Street lamp gateway is responsible for the reporting of sensor information of street lamp nodes in the section under its jurisdiction, as well as the analysis and execution of monitoring center instructions to achieve intelligent control of street lamp nodes. Street lamp node is STM32F103RD6 as the core controller. ZiBee is used to communicate with street lamp node, and Anxinke A9 module is used to transmit GPRS data with monitoring center. Street lamp nodes perceive the light intensity of the scene environment through the photometric module, human body and voicecontrolled induction module to perceive whether pedestrians and vehicles, electric parameters inspection module to detect the electric parameters of street lamp operation. STM32F103RD6 as MCU, ZiBee wireless communication module to achieve communication with the street lamp gateway. The system block diagram is shown in Fig. 1.
3 Hardware Circuit Design 3.1 Minimum System of STM32F103RD6 STM32F103RD6 is used as MCU in street gateway and node. The processor has abundant resources, including 48KB SRAM, 256KB FLASH, 3 12-bit ADCs, 1 12-bit DAC, up to 51 universal IO ports, 5 serial ports, 2 basic timers, 4 universal timers and 2 DMA controllers. The minimum system schematic diagram of STM32F103RD6 is shown in Fig. 2.
Design of Street Lamp Management …
501
Fig. 2 Minimum system schematic diagram of STM32F103RCT6
3.2 Power and Program Download STM32F103RD6 power supply voltage is 3.3 V DC, ZiBee and A9 GPRS module working voltage are 5 V DC, while solar LED street lamp is widely used in rural areas, power supply voltage is 12–24 V, so we can reduce the voltage of solar LED street lamp power supply to 5 V ZigBee and A9 GPRS power supply, and then through AMS1117-3.3 power supply regulator chip converted to 3.3 V DC power supply STM32F103RD work. In order to facilitate download and upgrade of system program, MCU of street lamp node and gateway uses serial port 1 to connect with USB interface through CH340G chip. The schematic diagram of STM32F103RD6 power supply and program download circuit is shown in Fig. 3.
3.3 GPRS GPRS module adopts A9G module of Anxinke Technology. A9G GPRS module embedded operating system has the characteristics of simplicity and ease of use. It supports AT commands, provides information transmission functions such as serial port to GPRS/short message/voice call, works at a voltage of 3.5–4.2 V, low power consumption current of less than 2 mA, supports four bands of GSM/GPRS, has positioning function, and is very suitable for Internet of Things/Vehicle/Power Environment Detection and other fields. A9G GPRS module receives and transmits information through serial port 2 and STM32F103RD6.
502
X. Lin
Fig. 3 STM32F103RD6’s schematic diagram of power supply and program download circuit
3.4 ZigBee Street lamp node and street lamp gateway communicate with each other directly through ZigBee module. The module uses TI’s CC2530 chip, which conforms to the IEEE 802.15.4 protocol, works in the common frequency band of 2400~2450 MHz and is connected with STM32F103RD6’s serial port 3 [5]. It can be used for pointto-point communication, broadcasting communication, working voltage 2.8~3.5 V, transmitting power 20 dBm, working current less than 50 mA, transmission distance of 1000 m, plug-and-play, especially suitable for the transmission of LED street lamp information in rural areas.
3.5 Electrical Detection Electric energy measurement mainly includes the measurement of output current, voltage and active power. This system uses ADE7755 electric energy measurement integrated circuit to measure the electric energy parameters of LED street lamp. The module has good stability and high accuracy in the case of great changes in environmental conditions and time [6–8].
Design of Street Lamp Management …
503
3.6 Design of Light Detection The measuring circuit mainly realizes the intensity measurement of ambient light in the field. When the intensity of ambient light is lower or higher than a certain intensity, it informs the center of the street light gateway to judge whether to turn on or off the street light. The system uses B-LUX-V30B environmental light sensor of Blue Control Electronic Technology Co., Ltd. as the light measuring module of street lamp node. The sensor provides I2C digital output, working current less than 0.8 mA, 32-bit illumination value register and 112-byte EEPROM data storage unit, which can measure 0–20000 lm illumination intensity [9, 10].
4 Software Design The software program design mainly includes the street lamp gateway and the street lamp node program design. Street lamp gateway includes data transmission with server, command analysis, data exchange and command sending with street lamp node, judging the intensity value of street lamp node in control area, street lamp in switch area under special circumstances (rainy day), and correction of street lamp timing time, etc. The MCU of the gateway node first initializes, and then enters the While cycle to send the street lamp environment information of the control area to the server at regular intervals. When GPRS (serial port interrupt 2) and ZigBee (serial port interrupt 3) receive data to enter the corresponding serial communication to parse the relevant commands, if received the information from ZigBee, first parse the corresponding header ID (each street lamp node MCU has a unique ID ID), and extract the environmental information of the street lamp node. It mainly completes the detection of pedestrians and vehicles, the regular turn-on and turn-off of street lights, the detection of ambient light, the measurement of electric energy parameters, and communicates with the street light gateway through ZigBee.
5 Conclusion This paper designs a smart street lamp management system based on STM32 and Internet of Things technology according to the characteristics of rural solar LED street lamp. The architecture of the system is described, and the hardware structure, circuit design and software design of the street gateway and the street lamp node are given. The key algorithm for the detection of street lamp faults is given. The system has the advantages of network timing calibration, automatic discrimination of ambient light intensity switch lights, automatic fault detection, low power consumption and communication costs, and has broad application value.
504
X. Lin
References 1. Wei, Zhang, Wang Honggang, and Cheng Peiwen. 2010. Research on intelligent street lamp remote monitoring system based on GPRS. Computer Measurement and Control 18 (9): 2104– 2106. 2. Bai, Chenglin, and Ma Jun. 2014. Intelligent street lamp monitoring system based on internet of things. Electronic Technology and Applications 40 (3): 82–89. 3. Zhu, Jianke. 2011. Design of simulated road lamp control system. Chengdu: University of Electronic Science and Technology of China. 4. Yan, Yong, and Xiangbing Zhou. 2016. Dynamic monitoring and early warning system of mine gas based on Internet of Things. Research and Exploration in Laboratory 35 (1): 93–96. 5. Zhou, Xiaosa. 2014. Design and implementation of embedded web server. Practical Electronics (12): 79–80. 6. Biao, M.A. 2007. Design of electricity power measurement and management system for student apartment based on ADE7755. Computer Engineering 33 (2): 205–207. 7. Hongyu, Zhang, Jia Sumei, and Jiang Shaojun. 2017. Design and implementation of solar LED street lamp system based on internet of things. Chinese Journal of Power Sources 41 (7): 1039–1041. 8. Bai, Chenglin, and Jun Ma. 2014. Intelligent street lamp monitoring system based on internet of things. Application of Electronic Technique 40 (3): 82–85. 9. Xiongsheng, Su. 2017. NB—IoT technology and application prospect. Telecommunications Information (5): 6–8. 10. Yuning, Qu, Jiangli Yu, Chao Liu et al. 2017. Intelligent street light control system based on ZigBee and LabVIEW. Chinese Journal of Power Sources 41 (8): 1191–1192.
Application of Big Data Technology to Ideological and Political Education in Institutions of Higher Learning Jiang Li and Xiaohua Ke
Abstract The big data era has arrived. To improve the scientific level of ideological and political education in institutions of higher learning, this paper discusses the value and function of big data technology applied to ideological and political education in institutions of higher learning and the way and content of constructing big data platform through literature research, comparative research and empirical research. Based on problem orientation and in order to deal with the difficulties, this paper proposes to train inter-disciplinary talents, coordinate to get through “data islands”, establish a reasonable data analysis model, apply advanced technology to enhance the validity of analysis, improve laws and regulations, and standardize the research and use of big data. The application of big data technology can effectively enhance the pertinence and effectiveness of education in ideology and politics. Keywords Big data technology · Institutions of higher learning · Ideological and political education
1 Introduction The popularization of the computer and the rapid development of information technology have sparked an unprecedented data revolution, and thus the contemporary society has entered the big data era. It has the technical advantages with the features of the mass, timeliness, diversity, low value density and authenticity. Thus it is widely used in all walks of life of the society, and quickly becomes the power to lead the scientific and technological innovation, the capacity adjustment and social change. It has great impact on people’s mode of thinking, mode of production and mode of lifestyles. As the base of talent training, institutions of higher learning should take the initiative to adapt to the trend of this era, make full use of the new technology and resources brought by big data, and vigorously promote the new development of ideological and political education. This paper mainly applies literature research, comparative research and empirical research to explore the application of big data. J. Li · X. Ke (B) Guangdong University of Foreign Studies, Guangzhou, Guangdong, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_62
505
506
J. Li and X. Ke
Besides, this paper discusses the difficulties faced and effective ways to solve problems, so as to provide certain theoretical and empirical reference for improving the scientific level of political and ideological education. In this regard, this paper has practical significance and theoretical value.
2 Research Overview The concept of big data has not been clearly defined yet. The scholars commonly agree with the concept raised in the book Big Data: A Revolution That Will Transform How We Live, Work and Think by Viktor Mayer-Schönberger and Kenneth Cukier. They put forward that “Big data is a technique for systematic analysis of massive data. Through analysis of big data, it provides scientific information consultation for organizations and helps them make more effective decisions.” “Big data is not only a technology, but also a value and methodology [1].” Nowadays, the development of big data has been widely concerned all over the world. And governments all over the world are competing to carry out strategic deployment at the national level to promote the research and application of big data technology. In July 2012, the United States released the white paper Big Data for Development: Challenges and Opportunities. In the same year, the United States kicked off the Big Data Research and Development Initiative and published a report Enhancing Teaching and Learning Through Educational Data Mining and Learning Analytics, vigorously promoting big data applied to education. Subsequently, such developed countries as the United Kingdom, Japan and Australia have also included big data in national development strategies. Although there is no related research on “ideological and political education” in foreign countries, the combination of big data and education has been carried out all the time. Relevant research results can provide theoretical reference for the big data technology application to education in China. In 2013, Xu Zipei firstly systematically introduced the concept of Big Data to China in his book Big Data. In August 2015, the State Council issued the Action Outline for Promoting the Development of Big Data, and this was the first time that big data had been raised to the national strategic level. In June 2016, the Ministry of Education issued the 13th Five-Year Plan for Education Informationization and declared the requirements of “innovating the construction and application mode of the resource and management platform by making use of new technology, like cloud computing and big data” [2]. In February 2019, the Central Committee of the Communist Party of China and the State Council issued the Chinese Education Modernization 2035, which determined that it was one of the top ten strategic tasks to speed up the educational reform facing the modernization of education. Since 2013, the application of big data in the industry has been extended rapidly. By March 2019, 561 relevant academic papers have been found by entering the key words “big data” and “ideological and political education in institutions of higher learning” at cnki.net, and they were mainly published from 2016 to 2018. The research results of domestic scholars mainly focus on four aspects: first, the definition, characteristics,
Application of Big Data Technology …
507
meaning, and feasibility research; second, the research on the theoretical innovation of ideological and political education based on big data technology, including data outlook, the value theory, the education law, the relationship between subject and object, the evaluation theory and the theory research of the network education environment of the subject; third, practical innovation based on big data technology, including education method, model, teaching innovation, etc.; fourth, the research on the opportunities, challenges and solutions of ideological and political education in the big data era, etc. It is fair to say that the domestic academia has comprehensively studied this subject and made considerable achievements, which has greatly promoted innovation in this field. However, there are also some shortcomings. The studies mainly focus on the theoretical research and they are weak in practice; due to the single professional background of humanities, the researchers lack the concrete and detailed operation scheme and analytic and empirical research, and these studies rarely involve the construction of ideological and political education network platform based on big data technology.
3 Method and Content of Constructing Big Data Platform The construction of big data platform satisfies the need to carry out the national development strategy, deepen the reform of education and teaching, and improve the quality and level of ideological and political education for college students. It is a cross-disciplinary applied research and needs to be based on related knowledge such as computer data science, network informatics, statistical analysis, and so on. Focusing on “how to construct”, “how to use”, “how to manage” and “who to serve”, the overall idea of constructing big data platform can be defined as: guided by Xi Jinping thought of socialism with Chinese characteristics in the new era and the spirit of the 19th CPC National Congress, and under the unified leadership of Party Committee in the school, making effective use of big data platform to collect and organize data; establishing the content and organization of data analysis, the model and algorithm of data analysis, analyzing the ideological dynamics of college students, finding out the behavioral correlation through the relationship between the data, and predicting the possibility of the future; providing regular big data analysis reports, feeding back the results of big data analysis to the management departments and providing data sharing services for teachers and students according to relevant regulations. The platform should have the functions: ideological and political education, party and government publicity, public opinion analysis, as well as ideological and psychological intervention and monitoring. Therefore, the operation mechanisms such as analysis, control and feedback mechanism, guidance, coordination and integration mechanism, prevention, diffusion and education mechanism, publicity, management and decision-making mechanism shall be established [3]. From the perspective of technology, data collection and storage, data value mining, data analysis and processing and data interpretation and presentation are the key links in constructing the big data platform.
508
J. Li and X. Ke
4 Value and Function of Applying Big Data Technology 4.1 Big Data Technology Subverting the Research Paradigm of Ideological and Political Education in Institutions of Higher Learning and Realizing Quantitative Research Traditional education in ideology and politics usually applies questionnaire sampling survey, interview, daily behavior observation and the Internet chat public and opinion supervision to understand the students’ ideological dynamics. It is qualitative research. Most of the research can only rely on experience to judge and analyze the development rules and development trend of students’ thoughts and behaviors. There are such problems as strong subjectivity, poor timeliness, obvious lag and untimely intervention to solve the problems. Big data technology has created conditions for the transformation of ideological and political work. It breaks the traditional concepts like ideological behaviors and values that cannot be quantified. It can quickly and efficiently collect information about students’ study, work, life and thoughts through the big data platform, and present the whole process of education in the form of data, which provides rich data resources for educators to fully understand the real ideas of students.
4.2 Big Data Technology Helping Obtain the Full Sample Data and Greatly Improving the Accuracy of the Research Big data era has opened up the full data model. The traditional cannot take all the research objects as samples because of the limitation of technical conditions, and it is difficult to focus on the details and key characteristics of the individual students. Thus it cannot meet the requirements of accurate analysis. Big data technology makes the research of political and ideological education no longer limited to empirical analysis and sampling survey. Instead, by means of making the number of samples equal to the total numbers, the overall research replaces the individual research by obtaining relevant data of all students through big data platform. In this way, the scientific basis can be provided for the correct grasp of the law of thought, the analysis of the group of college students and the individual thoughts that are difficult to grasp in the past, and the prediction trend, so the analysis results should be more accurate.
Application of Big Data Technology …
509
4.3 Big Data Technology Equipping Ideological and Political Education with Predictive Function Prediction is one of the most important functions of big data. By analyzing relevant data of students, the behavior track and law of individual and group of students can be found out. So it is convenient for educators to master and predict the changing trend of students’ thoughts and behaviors in advance, intervene and guide students in time and effectively, and eliminate the factors that may occur and are not conducive to the growth of students into talents in the bud.
4.4 Big Data Technology Providing Diversified Choices for Educational and Teaching Methods Most of the classroom teaching adopts the form of unidirectional transfer of book knowledge from teachers to students. Big data technology enables the courses to enter the network platform from plane teaching material. Open network education platforms, such as MOOC, Ketangpai, and flipped classroom, make it possible to share with pluralistic massive data. Educators can obtain more abundant education resources, including massive pictures, scripts and videos. They can also improve their teaching methods by learning from and communicating with online quality courses. Besides, educators can analyze the data of the students’ online and offline learning recorded in the backstage supporters to understand the social hot pots concerned by the students and the personal evaluations on teaching methods and effects. Then they can adjust the teaching contents and methods in time for better teaching effects of relevant courses.
5 Problems of Applying Big Data Technology 5.1 Shortage of Interdisciplinary Talents Applying big data technology to political and ideological education in institutions of higher learning requires the cooperation between different disciplines. It demands that educators not only understand big data technology, but have solid theoretical knowledge. However, although most ideological and political educators in colleges and universities by now have profound theoretical knowledge and rich practical experience, they lack the capability of applying big data technology. And professionals in big data technology have not received necessary training. The shortage of interdisciplinary talents severely restricts the role of big data technology in the educational field.
510
J. Li and X. Ke
5.2 The Imperfection of Data Sharing Platform Causing the Incompleteness of Data In the time of big data, widespread use of the Internet has brought massive data, but the sharing platform of data information has not yet been formed in China. The openness of data remains is in a low level, and the internal information sharing mechanism is not perfect in colleges and universities. That can be reflected in three aspects. First, colleges and universities in China consist of many departments, and each department has their own working network platform. Due to differences in job duties, service objects, and competent departments, different departments have different standards and formats on data, and different rules for the management and use of the database. Each department can only obtain the data within its own department, and each teacher can only get the data within the limits of his/her authorization. Second, there is no large-scale cooperative data sharing platform among institutions of higher learning in China. Data sharing is only conducted between individual schools or within one region. Data sharing mainly occurs in academic exchange, seldom in the exchange of education, which greatly reduces the richness and correlation of data sample. Third, most data generated by students comes from the Internet and entertainment platforms, consumer software, electric commercial enterprises, governments and so on. From the data, we can know the information about students’ online shopping and consumption, internships in governments and enterprises, and their participation in personnel recruitment examination. However, because of business interests, data security, and policies, data barriers have been built among universities, governments, and enterprises. They do not share data with each other. As a result, it is very hard for ideological and political educators to obtain these data for research.
5.3 Untrue Data Nate Silver believes that “The volume of information is increasing exponentially. But relatively little of this information is useful—the signal-to-noise ratio may be waning. We need better ways to distinguish the two” [4]. The real and fake data are intermingled on the Internet, since some social organizations, and individuals create a large amount of fake data for interests. Students in institutions of higher learning frequently use and depend on the Internet, which makes them not only the audience of false information, but also creators of fake data for various reasons. If the fake data are not identified and removed, they will inevitably affect the result of analysis, causing ideological and political educators to make misjudgments.
Application of Big Data Technology …
511
5.4 Not Advanced Technology of Data Analysis Data analysis is both the key technology and technical difficulty in big data. At present the development and application of big data is still at a low level. In the process of big data analysis, researchers need to find effective correlates, and discover the relevancy, correlation, and causal structure among data. The choice of correlates depends on the construction of reasonable evaluation model of big data analysis. However, it is far from enough in how to utilize the diversified data and correlate data in different fields for analysis. Moreover, it is still a technical difficulty in how to effectively combine qualitative and quantitative analysis involved in big data analysis in ideological and political education [5].
5.5 Insufficient Data Security Nowadays, many ideological and political educators, aiming to pursue teaching effect, will conduct a long-term track record of the daily life of educational objects through big data technology, to analyze and dig into educational values and laws behind the data. However, the practice may be conducted without the approval of students, and even in the absence of students’ knowledge, and thus it will violate students’ privacy, including their personal background that they are unwilling to let others know, interpersonal relationship, relationship status, personal spending, online time, and dormitory records of entry and exit. That will leave students without security, and cause crisis of confidence in educators. A small number of ideological and political educators have poor safety awareness, and therefore they do not encrypt or protect the data of students. The huge value behind the data then becomes the resource that many people compete for. Once the data are disclosed, stolen and sold, it will severely violate students’ legitimate interest. Therefore, the comprehensive collection and analysis of students’ data is caught in the legal and moral dilemmas.
6 Ways to Meet Challenges and Solve Problems 6.1 Cultivating Interdisciplinary Talents with Big Data Technology and Profound Educational Theory Colleges and universities can rely on the network ideological and political work center to establish a research and development team of big data technology, responsible for the research and development, and analysis and processing of big data technology. Also, a group of teachers and students majoring in ideology and politics with training qualifications will be selected to participate in learning relevant theory and
512
J. Li and X. Ke
in innovative activities based on big data technology. Systematic information technology training should be carried out to improve the capability of ideological and political educators to apply big data technology. Furthermore, institutions of higher learning may integrate disciplines of big data and political and ideological education to jointly cultivate interdisciplinary talents with knowledge of the two.
6.2 Strengthening Top-Level Design, Coordinating and Integrating Resources, and Getting Through “Data Island” To change the state of “data barriers”, a “big data chain” of ideological and political education linked by government, society, and school should be formed. China’s Education Modernization 2035 issued in February, 2019, provides policy possibility for solving the problem. The document clearly states that we should accelerate education reform in information era, speed up the reform of talent cultivation model by modern technology, and promote it under the master plan framework of national education modernization. First, with the strong national support, sharing mechanism of data information should be established at government level to conduct comprehensive integration and management of data resource. We should also establish public information database and gradually open government data to make data information flow, so as to provide a great deal of data for education in ideology and politics. Second, we should promote the development of big data industry, and form a complete data market chain, so that we can achieve the flow of business data. Third, “data barriers” among schools or within a school should be broken. We should strengthen the construction of smart campus, construct an integrated platform of intelligent teaching, management and service. We should set up a sound data sharing mechanism among institutions of higher learning, collect and share data resources, to open a “complete data model”.
6.3 Establishing a Data Analysis Model of Ideological and Political Education It is the core of big data model to construct a data analysis model. The model mainly includes four data modules: data collection, presentation, prediction, and intervention, and supplemented by working mechanisms like analysis, feedback, prediction, intervention, and prevention. We mainly collect all kinds of data about students during their school years, including data about study, life, activities, and community. By filtration, data related with students’ ideological and political education will be selected. Through online analysis of big data platform and manual analysis of data
Application of Big Data Technology …
513
Fig. 1 A diagram of data analysis model of ideological and political education in institutions of higher learning
model, the correlation between different data can be found and data graphs be created, which can be given to educators as feedback. Educators can know students’ ideological trends and pattern, and then predict their thoughts and behavior, and provide individual or group intervention and guidance as early as possible, so as to prevent the occurrence of crises (The model can be depicted as follows) (Fig. 1).
6.4 Improving the Effectiveness of Big Data Analysis by Applying Feasible Data Processing Technology 6.4.1
Data Filtering Technology
To filter distorted data, data filter should be designed in the process of data processing. To prevent useless or wrong outlier data from exerting negative influence on the final data results, they should be filtered by cluster analysis or correlation analysis. Specific databases should be set up to classify different types of data information for storage, so that it can accelerate data extraction, and reduce the time for data query and access [6].
6.4.2
Data Analysis Technology
Traditional methods of data processing and analysis include data mining, intelligent algorithm, statistical analysis and so on. However, the mobile Internet technology develops, and the smart mobile terminals become popular, and explosive growth of data, these methods can no longer satisfy the demand of data analysis. At present, the approaches to big data analysis are mainly Olson’s back description methods, namely clustering and schema. First, cluster analysis should be done on the data, and weight of all classified data should be determined by AHP method. Then we should conduct
514
J. Li and X. Ke
cluster analysis to classify the large amount of data by their similarity, and make cluster result evaluation and preliminary result description and interpretation, so that we can form basic tree diagram. Second, we should carry out regression analysis, find the relation between independent and dependent variables by SAS and SPAA, and obtain the stable data analysis model. Third, we should build highly parallel neural network, and combine the above results into an integration. The neural network can automatically set, memorize and remember input data, and we can get the result of data analysis. Finally, Bayes statistics and MCMC algorithm will be applied to conduct simulation and detection on the big data analysis model of ideological and political education [7].
6.4.3
Data Display Technology
Traditional data display methods can no longer meet the requirements for complex analysis results of big data. Users prefer that analysis results of big data can be presented by visual ways like figures and tables. Data portraits, as an effective means for explaining big data, can also be applied in the interpretation and presentation of education in ideology and politics. The technology of “data portraits” processes all data generated by educational objects in big data through related algorithms, and then form “visual” models of analysis results. In this way, abstract data can be transformed into visual graphs and pictures, and the analysis results of students’ data can be vividly, clearly, and effectively presented to educators, to help educators find the internal laws behind the data.
6.5 Improve Laws and Rules, Formulating Strict Management System, and Regulating the Research and Use of Big Data in Ideological and Political Education In the process of integrating big data and political and ideological education, many legal and moral problems, and cybercrime like “data selling” and “data theft” may occur. Therefore, it is urgent and necessary to formulate sound laws and rules and management systems so as to conduct powerful regulation and prevention. The aim of legislation is not only to crack down on actions like data breach and selling, but also to clearly define how to protect students’ privacy and rights, the value exploration and development of big data, and duration for schools to keep students’ data. We should formulate a strict internal management system for big data department, regulate the procedure of big data processing in education and the procedure of application for the use of big data, and establish credit archive of using big data in education. Users, when applying for accessing the data, should clearly state the reasons for using data,
Application of Big Data Technology …
515
the extent of data usage, and the purpose for the analysis results. Applicants who fail to observe the application procedure should not be allowed to use the data [8].
7 Conclusion The era of big data is an inevitable trend of social development. The introduction of big data technology to ideological and political education in institutions of higher learning provides a new method and new perspective for the innovation of the field under new conditions. Institutions of higher learning should seize the opportunity of national big data strategy, grasp the characteristics of big data era, and strengthen the awareness of big data. We should also explore the value and function of big data to ideology and politics education, and keep abreast of students’ ideological trends by taking advantages of big data’s characteristics, namely comprehensiveness, analysis, sharing and prediction. By predicting and preventing possible problems, we can advance the pertinency and effectiveness of political and ideological education. Although many problems and difficulties may occur during the process of integrating education and big data, they can be solved through policies, technologies, and institutions and mechanisms. Therefore, it can infer that there is a wide prospect for applying big data technology to ideological and political education in institutions of higher education.
References 1. Mayer-Schönberger, Viktor, and Kenneth Cukier. 2013. Big data: A revolution that will transform how we live, work, and think. Zhejiang: Zhejiang People’s Publishing House (in Chinese). 2. Ministry of Education issues 13th Five-Year Plan of Education Informatization. Ministry of Education of the People’s Republic of China, June 7, 2016. 3. Liu, Guolong, and Chen Bo. 2016. Analysis on the operation mechanism of big data platform of ideological and political education in institutions of higher learning. Ideological and Political Education Research 32 (3): 120–124 (in Chinese). 4. Silver, Nate. 2013. The signal and the noise, trans. Hu Xiaojiao, Zhang Xin, and Zhu Chenchen. Beijing: Critic Press (in Chinese). 5. Liu, Zhihui, and Zhang Quanling. 2014. Research overview of big data technology. Journal of Zhejiang University (Engineering Science) 48 (6): 957–972 (in Chinese). 6. Wu Lei. 2015. Study on the application of big data technology from the perspective of ideological and political education in institutions of higher learning. Higher Education Forum (6): 20–23 (in Chinese). 7. Evelson, Brian. 2014. Research on high education of big data system of the entrepreneurial and innovational capability. The Communication of the ACM 6: 19. 8. Hu Zixiang, and Yu Jiao. 2015. Ethical challenges and countermeasures brought by big data carrier to ideological and political education. Ideological and Political Education Research (5): 84–86 (in Chinese).
Based on Computer Software to Analysis the Influence of Geometry Parameters of Herringbone Plate Heat Exchanger Plate on Heat Exchange Performance Shuwei Lv and Zhuojuan Yang
Abstract Based on computer software (FLUENT) to simulate the diversion region and heat exchange region of herringbone plate heat exchanger. An internal fluid model of a diversion zone and a heat exchange zone consisting of two sets of plates with different geometrical parameters was established. The velocity, temperature and pressure distribution of the flow field in the model were analyzed to investigate the effect of different tilt angles and peak spacings on the heat transfer performance of the herringbone plate heat exchanger under the same arc radius. The results show that when the peak spacing h = 20 mm, the herringbone plate with radius of arc R = 180 mm the inclination φ = 20◦ has better heat transfer performance than the herringbone plate with the radius of arc R = 140 mm the inclination φ = 30◦ . Provides basis for optimizing design of diversion zone of herringbone plate heat exchanger plate. Keywords Herringbone plate heat exchanger · Plate geometry parameters · Numerical simulation · Heat transfer performance
1 Introduction The plate heat exchanger is a kind of heat exchanger equipment laminated with thin corrugated thin metal heat exchanger plates. It has the advantages of high heat transfer coefficient, compact structure, low fouling coefficient, and easy maintenance and cleaning [1]. A plurality of flow passages with small flow sections are formed between the plates of the plate heat exchanger, and heat exchange is performed through the plates. An important indicator for measuring plate heat exchangers in industry is heat transfer performance [2]. Because the herringbone corrugated sheet has the advantages of good heat transfer performance, large pressure bearing capacity, etc., the corrugated plate shape of the existing plate heat exchanger plate has the largest number of herringbone shapes, and most researches are mainly directed at herringbone corrugations [3]. German S. Lv · Z. Yang (B) Jilin Engineering Normal University, Changchun 130052, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_63
517
518
S. Lv and Z. Yang
researcher Focke first studied the herringbone plate heat exchanger plate [4], studied how to change the parameters such as corrugated angle in the plate structure to improve the heat transfer efficiency, and became the founder of this technology. Mehrabian et al. [5] intercepted the smallest computational area and studied plate heat exchangers using CFD simulations. It is believed that the corrugated shape has a very important effect on heat transfer and pressure drop. Qu Ning numerically studied the flow and heat transfer characteristics of the plate heat exchanger. The results showed that the parameters such as corrugation angle, corrugation depth and corrugation pitch had important influence on the flow field and temperature field distribution of the plate heat exchanger [6]. In this paper, numerical simulation software Fluent was used to numerically simulate the diversion region and heat transfer region of herringbone plate heat exchanger plate. To study the relationship between arc radius and dip angle, the peak-to-peak plate heat exchanger has good heat transfer performance within the allowable range of various parameters of the plate, and the peak spacing is constant.
2 Evaluation Factors By consulting the literature and analyzing the research status of herringbone plate heat exchangers by researchers at home and abroad, we can see that the ideal factor parameters for the heat transfer performance of the herringbone plate heat exchanger are Nussel number (Nu ) and pressure drop (p). The evaluation method for evaluating the heat transfer performance of the herringbone plate heat exchanger is as shown in Eq. (1): Nu ς 1/ 3
(1)
qde λ(Tw − T f )
(2)
ψ= Nusselt number: Nu =
q the average wall heat flux
de the equivalent diameter
λ the thermal conductivity
Tw the average wall temperature
T f the average fluid temperature
Friction factor:
Based on Computer Software to Analysis …
ς=
519
2pde Lρμ2
p the pressure drop
L the length of the runner
ρ the density of the fluid
μ the average speed of the fluid
(3)
3 Model Design 3.1 Simulation Model Design The actual herringbone pattern sample is shown in Fig. 1. The geometric parameters of the diversion zone of the plate are: (1) arc radius R: radius of each row of peak corrugations or groove corrugation; (2) dip angle ϕ: peak per row or groove The angle between the ripple and the horizontal line; (3) The peak spacing h: the distance between the two peaks. Arc radius R, dip angle ϕ and peak spacing h are the main geometrical parameters of the plate diversion zone and are also the main factors affecting the flow characteristics and heat transfer characteristics of the plate heat exchanger [7]. In the process of computational fluid dynamics analysis of this problem, the heat transfer and pressure reduction conditions of the fluid in this model are studied, and the flow channel model that can fully reflect the three parameters in the rapid diversion region of the heat exchanger, i.e., the above factors, is selected. Based on the heat transfer principle of the herringbone plate heat exchanger, the effective heat transfer area plate model of the heat exchanger is drawn using CATIA software, as shown in Fig. 2. Fig. 1 Model parameter picture
520
S. Lv and Z. Yang
Fig. 2 Plate model
3.2 Creating a Runner Model Herringbone corrugated sheets stacked together in the same direction cannot form flow channels in this space. In the assembly process of the plate heat exchanger, the same plate of heat exchanger needs to be taken, the previous plate is placed on the set plane, and the other plate is placed on the previous plate by rotating 180° along the geometric center of the plate. This cycle constitutes a heat exchanger. Two identical plates form a single channel heat exchange system according to the appeal method. Using CATIA software, the two plates were stacked together according to the appeal method, and the internal flow channel model of the two plates was redrawn, as shown in Fig. 3. This model contains a total of six walls, which are the fluid inlet A and outlet surfaces B, the boundary wall surface C, and the heat exchange wall surface D.
Fig. 3 Internal fluid model
Based on Computer Software to Analysis …
521
4 Computational Fluid Dynamics Simulation This model uses FLUENT software to calculate the basic process as follows [5, 8, 9]: According to the idea of finite element calculation, the input physical state parameter is known, the boundary condition parameters are set and other physical condition states are specified, and the pressure solver is used for the speed, temperature, pressure, and other unknowns are solved. The solution process is: The solver solves the equation containing a single variable on all the grids, obtains the solution of the equation, and solves the solution of another parametric equation by solving the loop. Because this equation is a nonlinear control equation, and they are coupled to each other, multiple operations can be performed. The iterations eventually converged the equations and the calculation process ended.
4.1 Conditional Parameters The simulation parameters of the two simulation models are input in the same simulation conditions as shown in Table 1. Table 1 Simulation conditions parameters
Plate Width (a) 80 mm Plate Length (b) 200 mm Equivalent Diameter (de ) 0.006 m Friction Coefficient (f ) 0.2 Length of Runner (L) 0.05 m Density (ρ) 1000 kg/ m3 Thermal Conductivity (λ) 0.67 w/m.K
4.2 Iterative Solution Each iteration of Fluent consists of the following steps. (a) Update the flow variable based on the results of the previous round of solution; (b) Obtain the velocity field by solving the momentum equation; (c) If the velocity solution does not satisfy the continuous equation, the poisson type pressure correction equation is constructed using the momentum equation and the continuity equation, and the pressure correction equation is solved to obtain the correction values of the velocity field and the pressure field;
522
S. Lv and Z. Yang
Fig. 4 Data convergence process curve
(d) Use the correction values of the velocity field and the pressure field to solve the temperature control equation; (e) Check the convergence of the system of equations. If the system of equations does not converge, repeat the appeal convergence process [10]. The residual graph is activated and iteratively solved. After iteration 151, the data converges, as shown in Fig. 4.
4.3 Numerical Simulation Results After numerical calculation, the internal flow field velocity, temperature, pressure distribution map and data were obtained. Arc radius R = 140 mm Dip angle φ = 30◦ Peak spacing h = 20 mm Flow field velocity, temperature, pressure distribution picture and data (Figs. 5, 6 and 7, Table 2). Arc radius R = 180 mm Dip angle φ = 20◦ Peak spacing h = 20 mm flow field velocity, temperature, pressure distribution picture and data (Figs. 8, 9 and 10, Table 3).
Based on Computer Software to Analysis …
523
Fig. 5 Velocity distribution diagram
Fig. 6 Temperature distribution diagram
5 Conclusion The numerical simulation software FLUENT was used to numerically simulate the flow and heat exchange zones of the herringbone plate heat exchanger plate. An internal fluid model in the diversion zone and heat exchange zone consisting of two sets of plates with different geometrical parameters was established. As the fluid
524
S. Lv and Z. Yang
Fig. 7 Pressure distribution diagram Table 2 Pressure distribution data
Average Wall Heat Flux (q) 49.5 J Average Wall Temperature (Tw ) 339.6 K Fluid Average Temperature (T f ) 339.5 K Fluid Average Speed (μ) 1.74 m/s Nusselt Number (Nμ ) 131.22 Pressure drop (p) 0.1948E7Pa Friction factor (ζ ) 15.44 Ψ 52.70
Fig. 8 Velocity distribution diagram
Based on Computer Software to Analysis …
Fig. 9 Temperature distribution diagram
Fig. 10 Pressure distribution diagram
525
526 Table 3 Pressure distribution data
S. Lv and Z. Yang Average Wall Heat Flux(q)-1526 J Average Wall Temperature (Tw ) 347.38 K Fluid Average Temperature (T f ) 347.37 K Fluid Average Speed (μ) 4.36 m/s Nusselt Number (Nμ ) 1366.57 Pressure drop (p) 6.360E7Pa Friction factor (ζ ) 802.96 Ψ 147.03
dynamics simulation object, the same condition parameters were input and simulation calculations were performed one by one. The velocity, temperature, pressure distribution map and data of the flow field in the model were obtained. The results show that when the peak spacing h = 20 mm, the herringbone plate with radius of arc R = 180 mm the inclination ϕ = 20° has better heat transfer performance than the herringbone plate with the radius of arc R = 140 mm the inclination ϕ = 30°. Provides basis for optimizing design of diversion zone of herringbone plate heat exchanger plate. Acknowledgements This study was supported by Jilin Province Science and Technology Development Plan Item (No. 20190302045GX), Program for Innovative Research Team of Jilin Engineering Normal University.
References 1. Wang Xi, and Hang Huaizhi. 2017. The flow and heat transfer mechanism of the corrugated channel of the plate heat exchanger. Journal of Chemical Industry and Engineering (China) (S1): 71–82 (in Chinese). 2. Shujing, Qin, and Ye Wenbang. 2003. Chemical equipment design book—Heat exchanger, 176–182. Beijing: Chemical Industry Press (in Chinese). 3. Zhai Zhijian, Zhang Guanmin et al. 2007. Mechanism of corrugated geometric parameters on flow patterns in herringbone plate heat exchangers. Journal of Shandong University (Engineering Science) (37) (in Chinese). 4. Zhang, Guan-min, and Mao-cheng Tian. 2006. Simulation and analysis of flow pattern in cross—Corrugated plate heat exchangers. Journal of Hydrodynamics 18 (5): 547–551 (in Chinese). 5. Mehrabian, M.A., and R. Poulter. 2000. Hydrodynamics and thermal characteristics of corrugated channels: Computational approach. Applied Mathematical Modeling 24 (5–6): 343–364. 6. Zhang Jing, Wen Wei et al. 2015. Heat transfer and flow analysis of plate heat exchanger and optimization of ripple parameters based on numerical simulation of computational fluid dynamics. Chinese Journal of Mechanical Engineering 12: 137 (in Chinese). 7. Yang Chonglin. 1998. Plate heat exchanger engineering design manual, 78–82. Beijing: Mechanical Industry Press (in Chinese). 8. Koen Grijspeer, Birinchi Hazarika, and Dean Vucinic. 2003. Application of computational fluid dynamics to model the hydro dynamics of plate heat exchangers for milk processing. Journal of Food Engineering. 9. Wu Jinxing, Wei Xinli et al. 2006. Performance analysis of baffle bar heat exchanger based on CFD technology. Light Industry Machinery 24 (2): 61–63.
Based on Computer Software to Analysis …
527
10. Lv Shuwei. 2015. Analysis of flow characteristics in the plate diversion zone of plate heat exchanger. Changchun City, Jilin Province, 2055 Yan’an Street: Changchun University of Technology, 4 (in Chinese).
Analysis of Working Characteristics of Buck Converter in Artificial Intelligence Background Zeyu Li and Hongmei Xu
Abstract Buck converter is the core part of the control system. With the rapid development of artificial intelligence, higher and higher requirements are required for the performance of the converter. When the parameters of the circuit change, nonlinear phenomena such as bifurcation and chaos will occur. In this paper, the operating state conversion of step-down converter is analyzed by taking capacitance as parameter transform. The transformation of the working state of the circuit from a steady state to periodic state to a chaotic state is presented by the two angles of time domain diagram and phase diagram. The simulation results are clear and intuitive. The validity and feasibility of the research method in this paper are verified, and provides theoretical basis and application value for the study of nonlinear characteristics of other mode DC-DC converters. Keywords Artificial intelligence · Buck converter · Capacitance · Bifurcation
1 Introduction With the development of artificial intelligence, intelligent control systems have also developed rapidly, and switching converters have been widely used in various industries [1]. The rapid development of the application field puts forward higher requirements on the working efficiency, accuracy, stability and applicability of the switching converter. Switching converter is composed of switching, inductor, capacitor and other nonlinear components, which leads to chaos phenomenon in the process of operation, and the generation of chaos will seriously affect the performance of switching converter [2, 3]. Therefore, the research on the chaotic generation mechanism and control strategy of the switching converter is an urgent problem to be solved [4, 5]. Z. Li · H. Xu (B) Institute of Engineering, Yanbian University, Yanji, China e-mail: [email protected] Z. Li e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_64
529
530
Z. Li and H. Xu
In recent years, many control strategies have been put forward at home and abroad, among which the intelligent control strategy is the fastest developing one [6]. Intelligent controllers have low dependence on models and eliminate complex computational processes. Even if there is no accurate initial value, you can get precise control parameters through step-by-step adjustment during the running process [7, 8]. In addition, the robustness and anti-jamming of the system are greatly improved, and the performance of the converter is improved. Intelligent control methods are gradually introduced into the research field of DC-DC converters [9]. Various intelligent control strategies are developing rapidly, replacing traditional control methods in the near future. However, Buck converter is widely used in most industrial fields because of its simple circuit, good applicability and high reliability, but there are many shortcomings in the complex control field [10]. The selection of its control parameters needs to go through a complex calculation process, which leads to a long adjustment period and higher requirements for operators’ setting skills and experience, especially in the high-precision control field at the forefront of science. In this paper, the voltage-controlled Buck converter is considered as an example, and capacitance of the circuit is taken as the parameter to build the Simulink simulation model. The time-domain waveform and phase diagram of the working state are obtained, which makes the simulation results more intuitive and consistent with the theoretical analysis and previous research results. This guiding significance be analyzed for the modeling and chaos analysis of other types of DC-DC converters.
2 Characteristics of Buck Converter The schematic diagram of the Buck converter is shown in Fig. 1. The circuit consists L
S
Vf Rx
Vin
C
VD
R Ry
driver
+ -
Vco
+ Vramp
Fig. 1 Circuit diagram of voltage controlled Buck converter
Vref
Analysis of Working Characteristics …
531
of a power supply Vin, a switching transistor S, a filter capacitor C, a storage inductor L, a diode VD , and a load resistor R. The function of reducing input voltage Vin to output voltage u is completed. Analysis of working process of Buck converter: When the parameters of input voltage and load resistance change in a wide range, the voltage-controlled Buck converter can work in both continuous inductance current mode (CCM) and discontinuous inductance current mode (DCM). Therefore, the Buck converter has two different switching states in one switching cycle and has two different circuit topologies. As showed in Fig. 2, the two switching state topologies are as follows. (1) Switch state 1: Switch S conduction, and diode VD off. The inductor current i increases linearly, capacitor C provides power to load R, the upper electrode of output voltage is positive and the lower end is negative, as showed in Fig. 2. (2) Switch state 2: The inductance current iL resonance decreases, and the capacitor is in discharge state, which is conducive to maintaining Io and Vo unchanged and the output voltage is lower than the power supply voltage, as showed in Fig. 3. Compared with the reference voltage Vref, the sampling value Vf(t) obtained by sampling resistance is amplified to get the Vco(t). After comparing the Vco(t) with the ramp signal Vramp(t), the driver outputs a series of pulse with different duty ratio to control the state of S and achieve the purpose of stabilizing the output voltage. L
+ Vin C
R
Vo
Fig. 2 Switch S on, Diode D off
i in =0
S
L +
V in C
R
Vo -
Fig. 3 Switch S off, Diode D on
532
Z. Li and H. Xu
When Vco(t) is greater than ramp voltage Vramp(t). Power switch S is switched off and the diode VD is on. When the Vco(t) is less than the ramp voltage Vramp(t), the power switch S conduction, diode VD cut off.
3 Buck Converter Simulation and Result Analysis Simulink dynamic system simulation in MATLAB is adopted, and various modules with different functions in the module library are used to build the simulation model. According to the theoretical analysis, the difference between Vramp(t) and Vco(t) is used as the control signal of the switch to control the access of the input voltage. When Vramp(t)-Vco(t) > 0, Vin(s) is connected; and when Vramp(t)-Vco(t) < 0, the constant is zero, it means that Vin(s) is not connected. Based on the above analysis, the simulation model diagram of the Buck converter can be established. According to the phase diagram, when the capacitance is the parameter, with the increase of the capacitance, the working state of the circuit gradually changes from a chaotic state to the steady state. When the output capacitance is 47 µF, the phase diagram is a closed ring, as showed in Fig. 4. The circuit operates in the first cycle state. Vco can be observed fluctuating within a fixed range by time domain waveform. Vco and sawtooth waves intersect steadily in reference period as showed in Fig. 5. That is to ensure that the switch in the work cycle has a stable on-off ratio. In the 0.62
0.6
0.58
I/A
0.56
0.54
0.52
0.5
0.48 12
12.02
12.04
12.06
12.08
U/V Fig. 4 Steady-state phase diagram
12.1
12.12
12.14
12.16
Analysis of Working Characteristics …
533
11 10 9
Vram p&Vc o
8 7 6 5 4 3 2 1 0.035 0.0355 0.036 0.0365 0.037 0.0375 0.038 0.0385 0.039 0.0395 0.04
t/s
Fig. 5 Vramp(t) and Vco(t) waveform
time domain waveform diagram, the output current is shown as a stable sawtooth output with an output voltage reaching a steady state of approximately 12 V. When the capacitance reduces to 40 µF, the working state of the circuit enters second cycles. At this time, the phase diagram exhibits an inner loop, as showed in Fig. 6. The Vco rises faster evidently. The maximum value of Vco is close to the peak of reference voltage during the interval period. Cause it to intersect the reference voltage waveform twice in an interval. Therefore, the turn-on and turn-off Fig. 6 Two cycles phase diagram
0.66 0.64 0.62 0.6
I/A
0.58 0.56 0.54 0.52 0.5 0.48 0.46 11.8
11.9
12
12.1
12.2
U/V
12.3
12.4
12.5
534
Z. Li and H. Xu 9
8
Vramp&Vco
7
6
5
4
3 0.035 0.0355 0.036 0.0365 0.037 0.0375 0.038 0.0385 0.039 0.0395
0.04
t/s
Fig. 7 Vramp(t) and Vco(t) waveform
status of the switch is abnormal. It can be seen from the time domain diagram that the output current waveform has a small shake during the period of each cycle, which is consistent with the result of the two intersection when the Vco is falling. The small shake of voltage waveform has been obtained, as showed in Fig. 7. When the capacitance reduces to 20 µF, the circuit enters the chaotic state completely, as showed in Fig. 8. Vco(t) and the sawtooth wave voltage intersect randomly. During some sawtooth cycles, Vco(t) intersects multiple times during rising process. In other sawtooth cycle, Vco(t) intersects multiple times during fall process, and the intersection is random. The time domain waveform shows that the output current oscillates obviously and the amplitude of the output voltage waveform increasing. This indicates that the circuit is completely chaotic, as showed in Fig. 9. When the capacitance is 23 µF, the circuit enters the critical state of the chaotic state, and the phase diagram is disorderly overall but still retains some regularity, At this time, during the rise process of Vco(t), it repeatedly intersects with the sawtooth wave voltage until it exceeds the peak value of sawtooth wave, as showed in Fig. 10. In the time domain diagram, it can be observed that the rise process of output current can be divided into two stages. The first stage is [0.48, 0.58], during this process, the output current can grow normally, but in the interval [0.58, 0.6], the output current oscillates obviously, which corresponds to the oscillation shape at the top of the phase diagram as showed in Fig. 11.
Analysis of Working Characteristics …
535
0.64 0.62 0.6 0.58
I/A
0.56 0.54 0.52 0.5 0.48 0.46 0.44 11.7
11.8
11.9
12
12.1
12.2
12.3
12.4
12.5
12.6
12.7
U/V
Fig. 8 Chaotic state phase diagram 10 9 8
V r am p &Vc o
7 6 5 4 3 2 1 0.035
0.0355 0.036 0.0365 0.037
0.0375 0.038 0.0385 0.039 0.0395
t/s
Fig. 9 Vramp(t) and Vco(t) waveform
0.04
536
Z. Li and H. Xu 9
8
Vr am p &Vc o
7
6
5
4
3
2 0.035
0.0355
0.036
0.0365
0.037
0.0375 0.038
0.0385 0.039
0.0395
0.04
t/s
Fig. 10 Vramp(t) and Vco(t) waveform
0.8 0.7
Io/A
0.6 0.5 0.4 0.3 20
Vo/V
15 10 5 0 0.02
0.025
0.03
0.035
0.04
0.045
0.05
t/s
Fig. 11 Waveform at C = 23µF
4 Conclusion The working status of Buck converter with capacitor as its parameter is analyzed, and model of Buck converter working characteristics of Simulink been built to obtain
Analysis of Working Characteristics …
537
ideal results and conditions. Through the model, the Vramp waveform of ramp signal and the Vco(t) waveform of output voltage signal which from scope can be intuitively observed, and the influence of changing the intersection point of the two waveforms on the working state is analyzed from the perspective of time domain. According to the phase diagram with capacitance as parameter, the working state of Buck converter from a steady state to periodic state and then to chaotic state is further analyzed. The analysis method in this paper has universal applicability, which provides reference for the model building and simulation analysis of other mode DC-DC converters, offers a theoretical foundation for the selection of switching converter parameters and the study of non-linear characteristics, and provides a theoretical basis for the study of converter control strategy.
References 1. Klauˇco, Martin, Martin Kalúz, and Michal Kvasnica. 2019. Machine learning-based warm starting of active set methods in embedded model predictive control. Engineering Applications of Artificial Intelligence 77: 1–8. 2. Jha, Kapil, Santanu Mishra, and Avinash Joshi. 2015. High-quality sine wave generation using a differential boost inverter at higher operating frequency. IEEE Transactions on Industry Application 51 (1): 373. 3. Huang, C.S., D. Chen, and C.J. Chen. 2018. Design of buck converter based on hybrid system model. China Integrated Circuit 27 (9): 36 (in Chinese). 4. Shen, J., Z.G. Zhi et al. 2017. Modeling and design of current-mode control half-bridge DC/DC converter. Power Electronics 51 (3): 30 (in Chinese). 5. Qi, Wenlong, Sinan Li, Siew-Chong Tan et al. 2018. Parabolic-modulated sliding-mode voltage control of a buck converter. IEEE Transactions on Industrial Electronics 65 (1): 844–854. 6. Babaei, Ebrahim, Zahra Saadatizadeh, and Carlo Cecati. 2017. High step-up high step-down bidirectional DC/DC converter. IET Power Electronics 10 (12): 1556–1571. 7. Wu, X.D. 2018. Design and control of buck converter based on simulink model. Journal of Anhui Electrical Engineering Professional Technique College 23 (3): 75 (in Chinese). 8. Sha, J., J.P. Xu, and S. Zhong. 2015. Distortion analysis and duty ratio correction algorithm for asymmetric modulation of two-stage matrix converter. IEEE Transactions on Power Electronics 62 (1): 351. 9. Pulido, Belarmino, Jesús M. Zamarreo, Alejandro Merino, and Anibal Bregon. 2018. State space neural networks and model-decomposition methods for fault diagnosis of complex industrial systems. Engineering Applications of Artificial Intelligence 79: 67–86. 10. Chien-Hung, Tsai, Yu-Shin Tsai, and Han-Chien Liu. 2015. A stable mode-transition technique for a digitally controlled non-inverting buck-boost DC-DC converter. IEEE Transactions on Power Electronics 62 (1): 475.
Under the Background of Internet +, the Practical Research of Mobile Learning Model in Vocational Practice Teaching Guidance Bingbing Wu, Yun Gao and Li Qiao
Abstract Since the 18th National Congress of the Communist Party of China, the development of vocational education has been placed in a particularly prominent position. The state has successively issued several important issues such as the file “the National Vocational Education Reform Implementation Plan” and “the State Council’s Decision on Accelerating the Development of Modern Vocational Education” teaching practice is the most important practice in higher vocational education. Under the background of the Internet +, the mobile learning mode such as the rain classroom and the micro-curriculum is the core, guiding the teaching practice of higher vocational teaching. It can effectively use information means to achieve the purpose of distance instruction. Effectively solve the theoretical and technical problems students encounter in the Post practice. Keywords Internet + · Mobile learning mode · Higher vocational education · Post practice
1 Introduction of Mobile Learning Mode in the Context of Internet + With the development of national Internet technology, the mobile learning model is increasingly welcomed by college teachers. At the same time, the arrival of the 5G era has brought about a different change in the traditional teaching methods. The research on mobile learning mode under the background of Internet + is very B. Wu · Y. Gao (B) · L. Qiao Liaoning Equipment Manufacturing Vocational and Technical College, Shenyang 110161, Liaoning, China e-mail: [email protected] B. Wu e-mail: [email protected] L. Qiao e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_65
539
540
B. Wu et al.
prominent in front of educators. The current mobile learning modes include MOOC, flipping topics, rain class, blue ink cloud class, micro-class and UMU interaction. MOOC is a large-scale mobile learning model and a product of Internet + education. The difference between MOOC and traditional teaching is that there are more participants in the MOOC. Teachers and students can come from all over the world. As long as they are interested in the content of the course, they can participate. It solves the problem of “teaching” very well, but it is difficult to solve the problem of “learning”, which means that the evaluation of students’ learning effect is not good. However, as a pioneer in the mobile learning model, its mobile learning effect in the context of the Internet cannot be ignored. The Rain Class is a new smart teaching solution jointly launched by Tsinghua University and Xuetang Online. It is the latest research result of the Online Education Research Center of the Ministry of Education. It is committed to providing data and intelligent information support for all teaching processes quickly and freely [1]. It can provide a better mobile learning model in the context of the Internet. The rain class includes multiple modules such as pre-study, class teaching and after-school review, and can be interactively learned through online name-based, online answering and other methods. Blue ink cloud class is also an intelligent learning assistant in the mobile learning mode. SPOC (Small Private Online Course, hereinafter referred to as SPOC) is called “private broadcasting class”, which is a small-scale online course. It is a new concept put forward by Harvard University after MOOC. SPOC refers to the on-campus curriculum that uses MOOC’s technology platform and teaching methods. SPOC usually only allows students from the school to participate, teachers will organize offline teaching activities, so as to achieve online and offline mixed teaching, to play their respective advantages [2]. The free Blue Ink Class is a very good SPOC platform. The most important component of the mobile learning model is the teaching resources. The micro-course is the most important form of mobile learning resources. The traditional teaching resources are almost all electronic documents. Although MOOC breaks through the traditional teaching resources, its video form is not flexible enough. The mobile learning mode that uses micro-courses to form teaching resources is the most flexible mobile teaching method under the Internet + background [3]. In this way, the post-training link of higher vocational teaching is guided to achieve the purpose of remote guiding teaching, and effectively solve the problem of students’ internship stage. Technical bottlenecks and ideological problems.
2 Analysis of the Current Situation of Post Practice in Higher Vocational Colleges The postgraduate internship in higher vocational education is mainly to improve the practical operation level of higher vocational learners, and quickly transform the
Under the Background of Internet + …
541
theoretical knowledge learned in the classroom into the production capacity of the enterprise. Most of the higher vocational colleges in China use the post internship to seamlessly connect students. Study at school and practice in business. However, due to the different operation of each school, the effect of improving the skills that should be revealed during the internship stage is not obvious. Mainly in the following aspects.
2.1 The Management Method of Post-training Practice Is Backward The post-training internship is mainly divided into a teaching-based internship and a practice-based internship. Based on the teaching-based internship stage, most of the students are still in school, but at least two and a half days in the week to practice, the practice content is mainly familiar with the corporate environment, corporate culture, work content. Based on practice-based internships, students are completely separated from the school environment and formally enter the corporate work. On the basis of familiarity with the corporate environment and corporate culture in the early stage, you can quickly enter the working state. However, the problem is that students will encounter many technical problems and ideological problems during the internship phase. The solution for most colleges and universities is to use QQ, mail, telephone and text messages to guide teachers to connect with students. This management method is relatively backward and cannot solve students’ problems.
2.2 Students’ Internship Assessment Is Not in Place The internship performance is an important part of the student’s school performance. During the internship of the enterprise, the instructor can assess the internship effect of the student through telephone interviews, field visits and corporate ratings. However, this assessment method is relatively simple and has a poor timeliness.
2.3 The Questions and Answers in the Internship Process Are Poorly Targeted Although the post-internship process mainly trains the students’ hands-on ability, it also needs to improve the students’ knowledge level. Because most of the teachers have insufficient work experience, during the internship process, the students are only taught in the school. The improvement of knowledge and skills is not much help [4]. In recent years, the state has paid more and more attention to ideological and political
542
B. Wu et al.
education. In addition to solving the technical problems of students, teachers should also strengthen the ideological education of students in the post practice stage, but the traditional post practice can hardly meet the requirements of instant communication between teachers and students.
3 The Organization Form of on-the-Job Practice Teaching in Mobile Learning Mode The postgraduate internship stage of higher vocational education is the most important stage to train students’ hands-on ability. After the first two years of professional course study and course teaching practice, the students’ hands-on ability has been improved, but there is still a great deal with the actual factory workers. gap. The post-internship phase is an important stage in the transformation of student status. Quality internships allow students to grow into skilled workers. However, students will encounter a series of skills problems and even psychological problems during the internship stage. In 2017, the Central Committee of the Communist Party of China issued the “Opinions on Strengthening and Improving the Ideological and Political Work in Colleges and Universities under the New Situation”, stating [5]: To further improve the ideological education of colleges and universities, fully Giving play to the role of the main channel of ideological education, improving the quality of teachers, and innovating teaching methods [6], it also highlights the importance of ideological and political education, based on the form of post-training teaching organization based on the mobile learning model, and effectively solves the problem by using the immediacy of the Internet. The technical difficulties and ideological problems of students’ internships.
3.1 The Construction of Fragmented “Micro Course” Guides the Post Practice In the mobile learning mode, the construction of teaching resources is very important, and the visualized teaching resources can better attract students’ interest. Therefore, the mobile learning model based on micro-courses has attracted the attention of many teachers in the early stage of Internet + mobile learning mode. The use of micro-courses to guide internships is primarily to solve the source of micro-course content construction. The instructors can investigate and understand the technical problems encountered by students during the internship process, and then collect and summarize these technical problems to find out the prominent parts of the problem. The content is distributed to a team of professional teachers, and a team of professional teachers records a micro-course video that can solve the skill problem. Subsequently, the recorded micro-course video is placed in the “Mobile Learning”
Under the Background of Internet + …
543
Fig. 1 Mobile learning platform
section of the college. Figure 1 is a screenshot of the college mobile learning page, and students can browse the micro-course video on the website. In addition to the micro-curriculum resources to solve the technical problems, the professional teacher team can also combine the students’ career development planning, workplace psychology, etc., in the mobile learning section to link the ideological and political teaching and research section of the career development planning, psychological counseling and other aspects of the content, so that students While paying attention to skills learning, the infiltration type runs through the ideological and political education. Finally, each post-study teacher can request that the student’s micro-course viewing and learning in a semester be reflected in the internship report submitted by the student [7]. However, this kind of mobile learning mode without interaction can not assess the learning effect of students, only solves the problem of teachers “teaching”, and does not fundamentally solve the problem of students “learning”. In the later stage of the Internet + mobile learning model, gradually stepped out of the historical arena.
3.2 “Rain Classroom” Guides the Post Practice In order to better meet the interaction between teachers and students, a platform for real-time communication between teachers and students is established [8]. Use the “rain classroom” and “blue ink cloud class class” to conduct internship guidance. The post-training teachers set up classes in the “rain class” and added their
544
B. Wu et al.
managed students to the class. Secondly, instruct the teachers to carry out resource construction, and upload some resource packages such as post-internship requirements, theoretical course teaching content, and college institutional documents to the “Rain Classroom” courseware column. Teachers can set the learning time and limit the students to complete the corresponding theoretical study within the specified time. After the classroom teaching is started, the teacher can also randomly name the students to specify the students to answer the specified questions. This theoretical learning method breaks the limitation of distance and makes the communication between teachers and students more immediate. After the theoretical study, the instructor can also publish the test paper to test the student’s learning effect. In order to understand the good interactivity, you can track the internship situation on the discussion page, and ask the students to upload a post-internship report every week. The report can include text, pictures, sounds, etc., so that the log report is more vivid [9]. In the process of reporting, the instructor can collect materials such as photos of the students’ on-the-job internship work. After sorting and summarizing, as a supporting material for the teacher’s work, it also exempts the single ills of the previous guidance for the internship. Every once in a while, the instructor will issue corresponding ideological and political content to guide students to observe the problems, encourage students to increase their sense of professional belonging, and provide recognition of corporate work. In order to facilitate the understanding of the students’ psychology, a questionnaire survey was issued to timely understand the technical and psychological problems that occurred during the student’s internship. The data analysis function of “Rain Classroom” allows the instructor to clearly know the clicks of each resource student, discuss the topic’s speech status, class participation, etc. At the end of the semester, the students’ internship results are summarized. Through the “rain classroom” to guide the internship, it not only solves the problem of teachers’ “teaching”, but also solves the problem of students’ “learning”. The teachers and students have good communication and interaction, and the teachers can understand the students’ dynamics in a timely and convenient manner. Greatly reduced the “transaction” of students’ internships, and the effect of internships was greatly improved.
4 The Effect Achieved 4.1 Forms of Post Management The mobile learning model in the context of the Internet + has been applied in the six professional internships of the college. Among them, based on the microcourse guidance form, from 2012 to 2016, more than 200 micro-curricular courses were produced, involving more than 20 Courses, the recording of each micro-course is to answer the questions that students encounter during the internship [10]. The recorded micro-courses are placed in the “Mobile Learning” section of the college
Under the Background of Internet + …
545
website. Students can play the software on the mobile phone and broadcast it at any time. Based on the “Rain Classroom” mobile learning guide format from 2017 to the present, more than 10 teachers have tried to benefit more than 300 students. The mobile learning type of post-internship teaching organization form frees teachers from traditional teaching management, and uses the Internet to realize interaction with students, so that the form of internship guidance is more vivid.
4.2 In Terms of Professional Construction and Resource Construction The characteristic professional construction needs to rely on the characteristic theoretical teaching and practical teaching curriculum system. In order to effectively solve the commonality and individuality in talent training, the college constantly explores professional construction models and resource construction methods. As the final export of the acceptance teaching effect, the post-training practice has become one of the focus of the college. However, due to the inability of teachers and students to communicate in time during the internship process, there are certain deficiencies. First, the curriculum of this part of the content is designed in the professional teaching plan. However, students do not have the opportunity to study hard. Second, some new content is not covered in the professional teaching plan. Students need to make timely supplements. The third is the deficiencies in the theoretical knowledge of students. From the perspective of individual students, there is still a situation of universality or individuality. The construction of the mobile learning platform can make up for some of the above deficiencies. By understanding the technical and psychological problems encountered by students during the internship process, the teachers produce related micro-course videos or other types of teaching resources hanging on the college mobile learning platform. In the “Rain Classroom” platform, students can solve problems in their hearts and minds on the mobile phone anytime and anywhere. There are more than 200 micro-curriculum courses in the mobile learning platform of the College. There are more than 200 dynamic media resources such as animation, video and career planning in the “Rain Classroom” platform. The construction process of the above micro-curriculum and other forms of teaching resources is professional. The accumulation of teaching resources laid the foundation.
5 Conclusion The study of mobile learning mode in the context of Internet + can not only re-learn the knowledge already taught, but also add new knowledge; it can not only carry out universal teaching for more students, but also realize individualized teaching of
546
B. Wu et al.
individual learning. In the context of the Internet +, the interaction between teachers and students is simply realized, effectively solving the two problems of teachers “teaching” and students “learning”.
References 1. Rain Classroom—Free Wisdom Teaching Solution [EB OL]. 2019. http://rain.xuetangx.com/, June 24 (in Chinese). 2. Based on the practice of flipping classrooms in the blue ink cloud class, the teacher blog garden [EB OL]. 2019. https://www.cnblogs.com/rocedu/p/6673380.html, June 22 (in Chinese). 3. Wang Rui. 2017. Research on primary school mobile teaching under the background of internet. Educational Modernization, 249–250 (in Chinese). 4. Gao Yun. 2014. Based on the micro-course-based mobile learning-style post-training teaching organization form. Dada University of Science and Technology (4): 34–35 (in Chinese). 5. Zhou yamin, and Lin Lu. 2017. Research on the education management of the party members of the post-training students in higher vocational colleges under the combination of work and study. Science Teaching (18): 177–178 (in Chinese). 6. The Central Committee of the Communist Party of China. Opinions on strengthening and improving the ideological and political work in colleges and universities under the new situation (2017-2) (in Chinese). 7. Li Yuzhen, and Xiao Huaiqiu. 2017. Analysis on the problems and countermeasures of the post-internship process in higher vocational colleges—Taking Hunan Chemical Vocational and Technical College as an example. Jiangxi Chemical Industry (2): 161–163 (in Chinese). 8. Qian Xusheng. 2015 Teacher professional development N(E-I) path: Research on remote online collaborative lesson preparation based on Edmodo platform. Distance Education Magazine (4): 84–90 (in Chinese). 9. Hu Zhubing. 2018. The application of blue ink cloud class in the off-campus internship. Science and Technology & Economy & Market (8): 144–145 (in Chinese). 10. Wei Haoen. 2018. Application of mobile internet in the management of post-job internship. Era Education (2) (in Chinese).
Bing-Bing Wu female, master of computer application, the main research direction includes computer research and school-enterprise cooperation management research. Yun Gao male, associate professor, the legal profession, the main research directions for education and teaching management, recruitment and employment management direction. Li Qiao female, master of Control Theory and Control Engineering, the main research direction is intelligent control.
Exploration and Practice of Collaborative Education Mode Based on Informatization Wenshuang Zhu and Chen Bai
Abstract In order to comply with the national document that “general undergraduate colleges and universities should transform and develop with the application of technology, and local ordinary higher education institutions should focus on cultivating applied talents to provide dependable services for local economic development”, the innovation trend of colleges and universities proceeding “the combination of production and education and the cooperation with enterprises” has formed out like an irresistible force. And the collaborative education mode has thus become an inevitable path to improve the quality of higher education and to undertake new engineering construction. With the development of information technology and the establishment of the “Internet +”, the collaborative education mode is bound to present new connotations and methods. Hence, the environmental design should enhance its teaching strength and strive to explore a collaborative education mode in line with professional development for teaching based on informatization. Keywords Information method · Environmental design major · Collaborative education mode
1 Introduction Implementing the collaborative education mode in the process of teaching and student cultivating is conducive to the overall development of students and their ability to adapt to social development. Nowadays, many problems come out in the teaching process of environmental design, and a large part of them can only be solved by further cooperation between schools and enterprises. Therefore, in current overall context of rapid social development, it is necessary to make sustained innovations on the teaching mode of environmental design major, break through the bottleneck of the traditional teaching mode within colleges and universities, and accelerate the process of school-enterprise cooperation, so as to enable students to learn as much as possible about skills required by social enterprises and to carry out targeted learning. W. Zhu · C. Bai (B) College of Art, Guilin University of Technology, Guangxi 541000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_66
547
548
W. Zhu and C. Bai
With the growing demand for applied talents (the difference between application and research is that the former emphasizes the combination of theory and practice in the teaching process) in China, the environmental design major during its construction will seek association with local economy, culture, and major industry, so as to eventually foster students who can adapt to market needs. The collaborative education mode has been subject to many restrictions in the past, like the phenomenon that student education fails to keep up with the society and the situation in which the major is not equal to the industry. The maturity and promotion of information technology will be undoubtedly helpful in the practice of the collaborative education mode in environmental design major, and the development of the Internet and related platforms can promote more comprehensive cooperation between schools and enterprises, and ultimately establish co-constructing and sharing resources.
2 Main Teaching Problems in Environmental Design Major 2.1 Implicit Professional Training Objectives Teaching is a main process for cultivating students with all-round development and professional knowledge. As early as 1985, China put forward the requirements for implementing quality education. This has as yet harvested some fruits, but teachers in environmental design major among the majority of colleges and universities are still not clear enough about the goal of fostering “applied talents” [1]. The reason is that environmental design is a branch of art design discipline, and many colleges and universities have offered far fewer practical courses than theoretical or basic courses in environmental design due to the influence of the college entrance examination in the previous stage, so that students are weak in practice and find themselves unable to adapt to the society in the process of employment.
2.2 Obsolete Teaching Mode The environmental design students in colleges and universities have entered the colleges and universities after the examination-oriented education, and many teachers just pay more attention to teaching contents rather than teaching methods, which brings about the phenomenon that teachers are busying in teaching while students have no desire to listen to them. In addition, some teachers with long-term working experience find it difficult to break through the traditional teaching mode and even just pass over innovations, so students will show little interest in the boring theoretical learning and refuse to accept the knowledge taught by teachers. And this even exerts an influence on the divergent thinking of students in design major. Current teaching in environmental design major is usually in the form of classroom teaching,
Exploration and Practice of Collaborative …
549
where teachers first talk about the basic theoretical knowledge and then introduce some simulated cases for teaching. This form neglects the communications between teachers and students. Therefore, the teaching mode in the past can no longer satisfy the current development as it is unable to mobilize the passion of students to learn actively.
3 Difficulties Encountered in Current Collaborative Education Mode of the Environmental Design Major 3.1 Lack of Corresponding Economic and Policy Support In the teaching process of environmental design major, the teaching goal is to cultivate applied talents who are suitable for the society, and relevant policies have also referred to the crucial path of the combination of production and education and school-enterprise cooperation. Despite the introduction of those policies, the ultimate effect does not perform well enough due to the absence of specific guidance and the macroscopic characteristics. In addition, there is also a lack of relevant economic support and supervision mechanisms in the process, and teachers in colleges and universities just stay on the surface, rather than have a full understand of the actual content of the policies.
3.2 Unsatisfactory Enterprise Participation There is not an overall mechanism or complete process for the promulgation and implementation of relevant policies because of the short interval, and the enterprises themselves have the nature of profit orientation so that they usually pay more attention to pursue social benefits and their own interests in the establishment of cooperative mechanism with colleges and universities. As a result, their participation has achieved a poor effect. For enterprises, it will take substantial human, material and financial resources to co-cultivate students with colleges and universities, such as reception expenses and transportation fees to campus, so they are more inclined to invest their expenditure into their own internal employees.
3.3 Talents Cultivated by Colleges Unable to Match the Needs of Enterprises The reason why talents of the environmental design major in colleges and universities cannot fit into the requirements of enterprises and fail to catch up lies in the inadequate
550
W. Zhu and C. Bai
integration of production and education. The curriculum and teaching methods in fostering environmental technology professionals in colleges and universities are too institutionalized or theoretical, because what enterprises desire is compound talents with theoretical foundation and practical experience [2]. And colleges and universities are also weak in the management mode of practice and the training of practical management personnel [3].
4 The Role of Informatization in the Collaborative Education Mode 4.1 Accelerating the Process of Modern Education Reform, Strengthening the Application of Modern Education Informatization Among Teachers and Students, and Improving the Quality of Talent Cultivation The application of informatization in the teaching of environmental design can help integrate certain supporting resources into new teaching methods. As more and more attention has been paid to talent quality in colleges and universities, teaching concepts and methods are bound to be transformed into modern information technology. And the education method after the transformation will greatly promote the realization of education modernization [4].
4.2 Accelerating the Combination of Production and Education, Establishing the Goal of Cultivating Talents Together with Enterprises, and Promoting the Realization of Win-Win Between Schools and Enterprises The combination of production and education is an inevitable requirement of applied undergraduate education. It is the requirement of economic transformation and development in China, the requirement of applied undergraduate majors to serve the local economy on the basis of their own development, and also the requirement for the joint development of universities and enterprises. It is a process to integrate information technology into the school-enterprise integration, such as building some education platforms, resource pools and other means for college students and teachers, whilst colleges and universities can establish some talent pools for enterprises to seek and recruit suitable talents. Colleges and universities have the advantages of talents and policies, while enterprises possess resources and technologies. Therefore, there will be a win-win situation if they carry out integration [5].
Exploration and Practice of Collaborative …
551
4.3 Improving Existing Teaching Resources, Cultivating Students’ Active Learning Ability, and Promoting More Professional Development Colleges and universities are the most complete and abundant environment for teaching resources, but they actually have some problems in the management of teaching resources. It is difficult to form an effective management mechanism on account of complex ranges and huge amounts, so that teachers and students inevitably get into trouble in operating. The application of information technology in the process of resource management has given birth to the teaching resource library, which can help stimulate students’ enthusiasm for learning and promote students to learn actively with its convenience and dynamics. As enterprises have high requirements for the application ability of students from environmental design, students can perceive the design market in the resource library to know about important knowledge such as the implementation process of a project, specific specifications and standards for various designs, and the latest international design trends. Enterprises can put some actual representative cases into the university teaching resource library to cultivate students to grasp more industry-oriented knowledge.
4.4 The Practical Results of Informatization in Teaching to Promote the Development of the Overall Teaching Level and Comprehensive Strength The practice of information-based collaborative education mode can maximize the resources of universities and enterprises, and help them make up for each other’s shortcomings to achieve a win-win situation at the same time. Relevant practical achievements have strong practicality and innovation, which, after improvement and promotion, can promote the overall teaching level and comprehensive strength of colleges and universities.
5 Practice of Information Integration into the Collaborative Education Mode of Environmental Design 5.1 Establishing an Information-Based Teaching Resource Library The information resource library includes resource pools of various majors and subjects, and public education and enterprise resource pools. Among them, resource
552
W. Zhu and C. Bai
pools of various majors are mainly composed of the main talent training program, curriculum arrangement, teaching team, experimental process, and professional books, and professional journals; resource pools of various subjects comprise major required courses, major elective courses, teaching plan design, course performance evaluation, courseware, teaching files, practical cases, and test questions; the public education resource pool is mainly made up of public course arrangement, news and politics, and foreign language learning; and the enterprise resource pool consists of enterprise recruitment resources, corporate image, corporate brand, corporate culture, enterprise field, enterprise work model, and corporate practice cases [6]. Each kind of teaching resource pool will be operated through the network platform with each specific resource being uploaded to the library in electronic file format, and teachers and students can choose to use according to their own needs.
5.2 Enhancing the Interaction The introduction and application of information technology can greatly enhance the interaction between teachers and students, teachers and enterprises, as well as students and enterprises. Good interaction can complement the shortages in traditional classroom teaching and enable students majoring in environmental design to form more comprehensive design thinking and enhance their communication skills. And Internet-based interactive methods can break the traditional limits of regions and time to allow the online transfer of pictures, texts, videos, etc. [7].
5.3 Improving the Evaluation and Management Mechanism The evaluation and management in the practice process have always been a problem for the environmental design major, and the original practice mode is unable to manage and control the students in the practice process [8]. Therefore, the evaluation and management mechanism established on the basis of informatization can help know about the practice effect of students in enterprises and the feedback on the practice process and results of students from the enterprises, and colleges and universities can follow up to provide immediate solutions when students and enterprises encounter problems [9]. In the meantime, the establishment of the information evaluation and management mechanism can also help teachers to teach and students to learn more effectively.
Exploration and Practice of Collaborative …
553
6 Conclusion The key to the cultivation of talents in colleges and universities lies in the comprehensive quality education. And the collaborative education mode based on informatization can enhance the training effect. The combination of enterprises and colleges can help students to form innovation consciousness and enhance their adaptive capacity to the society, and ultimately promote the teaching reform in colleges and universities and the development of the education industry [10]. Acknowledgements This article is a phased research achievement of Research and Practice on the Three-Dimensional Teaching Mode of Environmental Design Major in the Context of “Internet +” (project number: 2018JGB200) in the education reform project of Education Department of Guangxi, and Research and Practice on the “Dual System” Collaborative Education Mode of Environmental Design Major under the Background of New Engineering (project number: 2019B33) in the teaching reform project of Guilin University of Technology.
References 1. Chang Chang. 2016. The present situation and development trend of local application-oriented colleges and universities. Education and Vocation 7: 28–30 (in Chinese). 2. Zhang Lili, and Zhang Yaning. 2018. On the effective cultivation of inter-disciplinary talents in cultural industry from the perspective of industry integration. China Journal of Commerce 13: 182–183 (in Chinese). 3. Yang Hui. 2016. Study on professionalization of college administrators under the background of popularization. Journal of Chifeng University (Philosophy and Social Science Chinese Edition) 12: 256–257 (in Chinese). 4. Xu Jin. 2019. In the new era, the service upgrading and transformation of continuing education in colleges and universities and the concept renewal. Journal of Hubei Adult Education Institute 3: 6–8 (in Chinese). 5. Yang Yi. 2017. Strengthen the research and implementation of talent pool construction. Computer Knowledge and Technology 10: 117–118 (in Chinese). 6. Gao Shijie. 2019. Research on the construction of Shared teaching resource platform jointly built by schools and enterprises. Journal of Harbin Vocational & Technical College 1: 12–14 (in Chinese). 7. Wang Haiying, Ma Yingyi, and Liu Zhifeng. 2018. Research on school-enterprise “collaborative cultivation” applied talent cultivation model under the information background–taking architecture major as an example. Computer Knowledge and Technology 35: 146–147+157 (in Chinese). 8. Tian Chenglong. 2019. Research on the teaching mode of undergraduate environmental design education under the background of integration of industry and education and school-enterprise cooperation. Think-tank Era 19: 179+181 (in Chinese). 9. Lou Gang, Cao Ning, and Shi Chengyong. 2018. Research on the construction strategy of off-campus internship security system under school-enterprise cooperation—Taking environmental design major of northwest university of agriculture and forestry science and technology as an example. Heilongjiang Education (Higher Education Research & Appraisal) 11: 56–58 (in Chinese). 10. Wang Yao. 2018. Reflection on the current situation of classroom teaching evaluation in colleges and universities and improvement path. Education Modernization 25: 195–196 (in Chinese).
Analysis of Diabetic Association Rules Based on Apriori Algorithms Xiaoli Wang, Kui Su and Zhanbo Liu
Abstract In this paper, the association rule is elaborated on the basis of Apriori taking the diabetic patient’s disease record as a case. The core idea of association rule on the basis of Apriori algorithm for mining large item sets is discussed, furthermore the example shows the execution process of the algorithm. Keywords Apriori algorithms · Association analysis · Data mining · Medical informatics
1 Introduction Agrawal borrowed the logic reasoning of Petr Hjek [1] and proposed the concept of association rules in 1993 [2]. Agrawal cited one of the most typical use cases, the basket analysis of the supermarket shopping basket. In the massive shopping, the supermarket found an interesting phenomenon. About 40% of young men would buy beer after they bought diapers. The supermarket then put the diapers and beer together for promotion, which led to a significant increase in sales of diapers and beer. Using similar associations, supermarkets can obtain a variety of similar product buying habits of customers, which can help them develop better marketing strategies to facilitate the sale of goods. The practical application of association rules is far more than that. It is closely related to association analysis in various fields such as financial analysis, engineering construction, railway aviation, big data, network security, medical and health, and biomedicine. At present, association rules have become an important research direction of data mining. A large number of researchers have improved related algorithms and applied them to specific cases. In practice, patients often have multiple diseases at the same time. Many diseases can cause serious complications. For example, diabetes is often related with hypertension, hyperlipidemia, coronary heart disease, pancreatitis, obesity, gout, alcoholic hepatitis, peripheral neuritis and so on. It can also cause complications such as retinopathy, kidney and neuropathy. Medical practitioners X. Wang · K. Su (B) · Z. Liu Mudanjiang Medical University, Mudanjiang 157011, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_67
555
556
X. Wang et al.
often look for the association between these diseases in these large patient electronic case databases. The number of diseases may be tens of thousands, and the number of cases in the electronic case database can reach hundreds of thousands or more. Among the various methods of association rules, the Apriori published by Agrawal in 1994 is one of the most influential algorithms [3]. Taking the diabetic patient’s disease record as a case, the classical association rules on the basis of Apriori are analyzed and its implementation process is discussed in this paper.
2 Association Rules and Their Abstract Description For convenient description, the type of tens of thousands of diseases are reduced to five types: diabetes, hypertension, fatty liver, cataract, and kidney disease. That is to say, suppose that only five or five types of diseases are in the patient case, and it is assumed that the five diseases are arranged in the case database according to the dictionary number. Diabetes is ranked in front of hypertension. Hundreds of thousands of cases in the case database are reduced to 10 and miscellaneous are removed. The specific description is shown in Fig. 1. Through the above example, a formal description of the association rules can be introduced: Definition: Assign I = {i1 , i2 , …iu } as a set of u units or u items, which can be called an u-unit set or unit set in short consisting of units ‘i1 ,i2 ,…iu ’. Each unit ‘i1 ,i2 ,…iu ’ is the basic unit of database data. It can be seen that the unit set in the example shown in Fig. 1 = {diabetes, hypertension, fatty liver, cataract, kidney disease}. The transaction database D is a collection of things ‘T1, T2, …Tn ’, i.e. D = {T1 ,T2 ,…Ti ,…Tn }. Each of these things is a binary sequence described by the unique serial number (also called identifier) TID and a subset of the unit set I. It can also be described as Ti = T, where Ti is the identifier TID, T ⊆ I. For Xi ⊆ I, if Xi ⊆ T, then thing T contains Xi . In the example of Fig. 1, the transaction database Case number T1 T2 T3 T4 T5 T6 T7 T8 T9 T10
Diseases of each patient Diabetes, hypertension, fatty liver Diabetes Diabetes, cataract Diabetes, hypertension, fatty liver, kidney disease Diabetes, hypertension Diabetes, kidney disease Diabetes, fatty liver Diabetes, hypertension, cataract Diabetes, hypertension Diabetes, hypertension, fatty liver
Fig. 1 Diseases record of patients
Analysis of Diabetic Association …
557
D is a case set {T1 , T2 , …T10 }, where T1 = ‘diabetes, hypertension, fatty liver’, T2 = ‘diabetes’. The association rule refers to an implication Xi ⇒ Yi , where Yi ⊆ I, Xi ⊆ I, and Xi ∩ Yi = . Xi is called the former term of association rule, and Yi is called the latter term. In the example of Fig. 1, Xi = {‘diabetes’, ‘hypertension’}, Yi = {‘fatty liver’, ‘kidney disease’}, because Yi ⊆ I, Xi ⊆ I, and Xi ∩ Yi = , then {‘diabetes’, ‘hypertension’} ⇒ {‘fatty liver’, ‘kidney disease’}, this is one of the association rules of unit I. According to the above definition, there are parameters describing the properties of association rules: Support: The thing number containing unit set Ai in the things set D is called the support count of unit set Ai , where Ai ⊆ I [4]. The ratio between the support count of unit set Ai and the thing totality of D is called the support of Ai , and is denoted as Support (Ai ). In the thing set D, if the ratio between the thing number including Xi ∪ Yi and the totality of things is s, the association rule Xi ⇒ Yi in the thing set D obtains the support s%, that is, Support (Xi ⇒ Yi ) = s% [5]. The support of the association rule (Xi ⇒ Yi ) depicts the probability that the union set of Xi and Yi appears in all things, i.e. Support (Xi ⇒ Yi ) = P(X i ∪ Yi ). In the example of Fig. 1, if Xi = {‘diabetes’}, Yi = {‘hypertension’}, things including ‘diabetes’ and ‘hypertension’ include 6 units: T1, T4, T5, T8, T9, T10. The total number of things set D is 10, then Support (Xi ⇒ Yi ) = 60%. Confidence: The thing that contains Xi in the set of things D. If Yi is also contained in c%, the confidence of the association rule Xi ⇒ Yi in the set of things D is c%, that is, Confidence (Xi ⇒ Yi ) = c% [6]. In the example of Fig. 1, if Xi = {‘diabetes’}, Yi = {‘hypertension’}, there are 10 things that contain Xi , and things that contain both Xi and Yi are T1, T4, T5, T8, T9, T10, then Confidence (Xi ⇒ Yi ) = 60%. It can be seen that confidence reflects the degree of association of Yi to Xi . The more times Yi is also present in a thing containing Xi , the greater the probability that Yi will appear when something containing Xi appears, and the higher the relevance of Yi to Xi . When things in a thing contain Xi and must contain Yi , we have reason to speculate that if there is something having Xi in the future, there must be Yi , that is, the probability of Xi ⇒ Yi is 1. However, a single confidence does not fully describe the association between Xi and Yi . Even if the confidence of Xi ⇒ Yi is 1, all things in the set have Xi must have Yi. If the frequency of Xi and Yi is very low, it’s meaningless. Assuming that there are 10,000 total units, including only one containing Xi and also Yi , then the confidence of Xi ⇒ Yi is 1. But things that happen by chance do not have any persuasive power in the overall set of things. Therefore, the support reflects the persuasiveness of things containing Xi and Yi in the overall concentration of things. The association only makes sense if support and confidence are larger than a certain reference value. Of course, other than the support and confidence, the corresponding parameters in actual analysis include ascending degree, chi-square coefficient, KULC coefficient, etc. These parameters all describe a certain aspect of the degree of association. Frequent unit sets: When the unit set Ai meets Support (Ai ) ≥ min_sup, unit set Ai is called a frequent unit set [7]. The min_sup is called the minimum support, and
558
X. Wang et al.
is the threshold defined by the line according to the actual needs of the user [8]. If unit set Ai has the number of m, we can call Ai as a frequent m-unit set. Strong association rule: When an association rule has the support and confidence that is larger than the minimum support min_sup and the minimum confidence min_conf, the association rule is called strong association rule [9]. The minimum support min_sup and the minimum confidence min_conf is a threshold defined in accordance with the actual needs of the user [10]. It can be seen that it is the goal of association analysis to find strong association rules.
3 Association Rule Brute Force Algorithm According to the basic definition of association rules, simple brute force algorithm of most basic solving association rules can be obtained: for the set of m units, firstly the method of exhaustion generates all the association rules, and then the support and confidence are calculated for each association rule scan database [11]. And then, they will be compared with a prescribed threshold and a strong association rule is generated. According to the permutation and combination, it can be known that through the method of exhaustion, all association rules generate the number that m i m−i j is: i=1 Cm j=1 Cm−i , and it’s necessary for each association rule to scan the transaction database for one time, and the time complexity of scanning the transaction database will reach an exponential level. Using the brute force algorithm, all the frequent unit sets can be exhausted first, and their quantity is Cm1 + Cm2 + · · · Cmn . Then the frequent unit set is used to generate a strong association rule. It can be seen that the time complexity of these two methods is exponential. If the set minimum support and minimum confidence are close to zero, then all the association rules exhausted by the brute force algorithm are strong association rules. Any improved algorithm needs to generate all association rules as the brute force algorithm. When the given threshold is not very low in practical applications, there are not so many obtained strong association rules, especially the number of frequent unit sets may be small. For the library management system with hundreds of thousands of records, thousands of books, to find the association rules, and it is obviously not a good choice to use an exponential brute force algorithm with time complexity. This requires us to find another more efficient algorithm for association analysis.
Analysis of Diabetic Association …
559
4 Apriori Algorithm 4.1 The Algorithm’s Basic Idea The generation of strong association rules needs to meet 2 points: minimum support and minimum confidence. Therefore, the unit set that meets the minimum support can be generated in some method, that is, the frequent unit set. The infrequent unit set, and the corresponding association rule can be quickly eliminated. Then, the frequent unit sets generate the strong association rules. The generation method can simply generate each non-empty subset of each frequent unit set by brute force method, and then use the set as the front unit of the association rule, and use the frequent unit set and the difference set of the subset as the post unit of the association rule, and if the confidence is larger than the minimum value, a strong association rule is generated. The Apriori algorithm is the one that can quickly generate frequent unit sets. The Apriori algorithm first generates a 1-unit set for each unit in the unit set I (the generated unit set may be a frequent unit set or not a frequent unit set, and it’s called a candidate unit set), and then scans the database D, comparing all the 1-unit set and the minimum support to generate a frequent 1-unit set. The units in the frequent 1-unit set are spliced together in two to generate a candidate 2-unit set, and the database D is scanned again, and all candidate 2-units generated by the frequent 1-unit set generates a frequent 2-unit set by comparing with the minimum support. A candidate 3-unit set is generated by a frequent 2-unit set, and then a frequent 3unit set is generated… until frequent unit set generation is over. In the process of splicing frequent (k−1)-unit sets into candidate k-units, it is necessary to find the unit sets with the same first k−2 units and different last unit for splicing in two in turn. Because the units in the unit set are already arranged by dictionary number, the generated unit set does not produce duplicate unit. The contrast between the Apriori algorithm and the brute force algorithm reveals that the Apriori algorithm generates a candidate 2 unit set from the frequent 1-unit set, and then generates a candidate 3-unit set from the frequent 2-unit set. The brute force algorithm generates a candidate 2-unit set from all candidate 1-unit sets, and then candidate 3-unit sets. The Apriori algorithm generates candidate sets only in frequent unit sets starting from the 1-unit set, thus preventing generating redundant candidate sets and improving the efficiency of the algorithm. The reason for this is derived from the following theorem: If an unit set isn’t frequent, all its supersets are also infrequent. There is also a similar theorem: If an unit set is frequent then all its subsets are also frequent. According to the theorem, it can be concluded that if a subset of an unit set is not a frequent unit set, then this unit set must also be an infrequent unit set. Using this conclusion, the candidate set after splicing can be first judged, and if there are infrequent unit sets in the subset, the branch can be reduced.
560
X. Wang et al.
4.2 Algorithm Description Figure 2 shows the main algorithm for solving frequent unit sets. The algorithm is roughly shown below: 1. The transaction database is scanned, the support of each unit is determined, and get all the frequent 1-unit sets to store them in L1; 2. Generate a new candidate k-unit set from the frequent (k−1)-unit set of the previous iteration from the frequent 2-unit set. The apriori-gen function is used to generate the candidate; 3. The transaction database is scanned to count the support for all candidate sets; 4. Compare the support of all candidate k-unit sets with the minimum support, and generate a frequent k-unit set Lk. If the generation of new frequent unit sets is over, the iteration ends. The apriori-gen function has two parts: connection and pruning. The algorithm of the connection part is described in Fig. 3. The algorithm of pruning part is shown in Fig. 4.
Fig. 2 Apriori solving the master algorithm of frequent unit set
Fig. 3 Connection process for the frequent (k−1)-unit set generating candidate k-unit set
Analysis of Diabetic Association …
561
Fig. 4 The subtraction process of the candidate set
4.3 Example of the Algorithm Set the minimum support as 0.1. Figure 5 shows the solving process of the transaction database’s frequent unit sets shown in Fig. 1. According to the main algorithm for solving frequent unit sets (Fig. 2), first generate a 1-frequent unit set L1, substitute L1 into the Apriori-gen () function to calculate the candidate 2-unit set C2, and
Support
Frequent unit set L2 Diabetes, Hypertension
Frequent unit set L1
Support
Candidate unit set C3
Diabetes, Fatty liver
{diabetes, hypertension, fatty liver} Diabetes, Cataract
Diabetes,
{diabetes, hypertension, cataract}
Diabetes, Kidney disease {diabetes, hypertension, kidney disease}
Hypertension, Hypertension, Fatty liver
Fatty liver
{diabetes, fatty liver, cataract} Hypertension, Cataract
Cataract
{diabetes, fatty liver, kidney disease} Hypertension, Kidney disease
Kidney disease
{diabetes, cataract, kidney disease}
Fatty liver, Cataract
{hypertension, fatty liver, cataract}
Fatty liver, Kidney disease
{hypertension, fatty liver, kidney disease}
Cataract, Kidney disease
{hypertension, cataract, kidney disease}
Frequent unit set L3 {diabetes, hypertension, fatty liver}
Candidate unit set C4
{diabetes, hypertension, cataract}
{diabetes, hypertension, fatty liver, cataract}
{diabetes, hypertension, kidney disease}
{diabetes, hypertension, fatty liver, kidney disease} {diabetes, hypertension, cataract, kidney disease}
{diabetes, fatty liver, cataract} {diabetes, cataract, kidney disease} {hypertension, fatty liver, kidney disease}
Candidate unit set L4
Support
{diabetes, hypertension, fatty liver, cataract} {diabetes, hypertension, fatty liver, kidney disease}
Fig. 5 Demo for Apriori algorithm solving frequent unit sets
Support
562
X. Wang et al.
return to the main algorithm and the transaction database is scanned to calculate the support of each candidate unit set. Delete the unit set {fatty liver, cataract} and {cataract, kidney disease} which are less than the minimum support, and get the frequent 2-unit set L2. The process of L2 calling Apriori-gen () to generate C3 includes the process of connection and pruning. Since the 2-unit set {fatty liver, cataract} and {cataract, kidney disease} are not frequent unit sets, their supersets are not necessarily frequent unit sets. So, the units in the generated C3 {diabetes, fatty liver, cataract}, {hypertension, fatty liver, cataract} and {hypertension, cataract, kidney disease} can be pruned and deleted to form a new candidate set C3. When the 4-frequent unit set L4 is obtained, no new unit set can be generated and the iteration ends.
5 Conclusion The core idea and basic solving process of Apriori algorithm in association rules are explored through simple diabetes disease record as an example of a set of things, and the more difficult content in the text is analyzed. How to improve the enforcement efficiency of association rules algorithm more effectively, and the more effective and practical improvement of Apriori algorithm is a problem we need to think further. Acknowledgements This research was supported by 2018 Funds for basic scientific research in Heilongjiang Province (project number: 2018-KYYWFMY-0096).
References 1. Hájek, Petr, Ivan Havel, and Metodˇej Chytil. 1966. The GUHA method of automatic hypotheses determination. Computing 1 (4): 293–308. 2. Agrawal, R., T. Imieli´nski, and A. Swami. 1993. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD international conference on Management of data—SIGMOD ’93, 207. 3. Agrawal, R. 1994. Fast algorithms for mining association rules in large databases. In Proceedings of the 20th international conference on very large data bases (VLDB), 478–499. 4. Lei, Z, Z. Zi-dong, W. Xiao-dong et al. 2009. The applied research of association rules mining in automobile industry. WRI World Congress on computer science and information engineering. IEEE 4: 241–245. 5. Tie, Xu. 2010. Processing and analysis of residents travel survey data based on association rules. WASE international conference on information engineering. IEEE 3: 377–380. 6. Mohapatra, D.P., and S. Patnaik. 2013. Intelligent computing, networking, and informatics. Advances in Intelligent Systems & Computing 243: 1047–1054. 7. Jung, H., and K.Y. Chung. 2014. Mining-based associative image filtering using harmonic mean. Cluster Computing 17 (3): 767–774. 8. Liu, Z, Q. Shen, and J. Ma. 2018. Extracting implicit features based on association rules. In Proceedings of the 3rd international conference on crowd science and engineering. ACM, 18.
Analysis of Diabetic Association …
563
9. Liu, J., L. Yinan, and Z. Ting. 2012. The analysis and evaluation on heavy metal pollution of topsoil in Chinese large-scale cities. Energy Procedia 16: 1084–1089. 10. Yanhua T. A discovery for the association rules of operation sequence based on improved Apriori algorithm. In Software engineering and knowledge engineering: Theory and practice, 399–405 Springer, Berlin, and Heidelberg. 11. Hemalatha, M. 2012. Market basket analysis—A data mining application in Indian retailing. International Journal of Business Information Systems 10 (1): 109–129.
Design and Practice of Basic Physical Experiment Teaching Based on Combination of Virtual and Real Baoxin Tai and Bo Hu
Abstract In the process of design of physical experiment teaching, the virtual instrument LabVIEW has been introduced into the teaching course of the physical laboratory to construct a basic physical experiment platform combining virtual and real. In the teaching practice, the advantages and characteristics of the physical experiment and the virtual experiment are fully combined, and a hierarchical teaching system is adopted to design the experimental teaching content from shallow to deep, and a physical experiment platform combining virtual and real is developed. Only in this way can the students’ experimental innovation ability be effectively improved and can the innovation education be smoothly carried out. Keywords Combination of virtual and real · Basic physics · Experimental teaching Foreword With the continuous advancement of the new curriculum reform process, cultivating students’ innovative consciousness and practical ability has become an inevitable trend of various disciplines. The university physical experiment course, as the first experimental class for students to enter the university, is the basic course for the absentee students of various science and engineering students, and its income range for students is broad. Therefore, it is very necessary to design and develop basic physical experiment teaching research combining virtual and real. This paper mainly explores how to introduce the teaching method of physical experiment research combining virtual and real in the process of physical experiment teaching through the use of virtual instruments.
B. Tai (B) · B. Hu Wuhan Donghu University, Wuhan City 430212, Hubei Province, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_68
565
566
B. Tai and B. Hu
1 Introducing Virtual Instrument Technology into the Physical Experiment Course With the continuous progress of scientific and technological innovation, most colleges and universities have innovative educational reforms in physical experiment teaching. On the basis of the original computer equipment and physical experiment equipment, they have adopted the digital construction of laboratories and introduced the latest LabVIEW software and data acquisition card in the United States [1]. In addition, the effective innovative construction of the laboratory can provide more excellent instruments and related accessories for the physical laboratory, to build a good physical experiment platform to provide students with higher ability training and innovative practice, so that students can combine theory and practice, make comprehensive use of modern testing means to explore physical experiments in depth, and carry out experimental teaching research. Relevant studies have shown that it is very appropriate for freshmen and sophomores to use virtual instrument technology in physical research. It does not require students to have a high level of circuit foundation, which makes students easy to use in the learning process. Moreover, virtual instrument has the characteristics of high efficiency and low investment in technology, and the main equipment for virtual experiment is general software and acquisition card, which can be reused. At the same time, it makes the variety of experimental instruments rich and colorful. Finally, the virtual experiment is carried out by software programming, which is not limited by the teaching place. The introduction of virtual instrument technology and virtual experiment can effectively improve the teaching drawbacks in traditional teaching, and provide strong technical support for the creation of comprehensive, technical and practical physical laboratories, so that students in lower grades can quickly participate in the innovative research and exploration of the project [2]. At present, the LabVIEW technology used in the experimental teaching platform belongs to a graphical programming language. Its functionality has been recognized by the academic and industrial circles as a standard data acquisition and instrument control software, so the related applications of LabVIEW is also known as virtual instrumentation. The so-called virtual instrument is actually a product of deep integration of instrument technology and computer technology whose basic functions are all based on computer software. It measures signal parameters, collects and processes data, transmits and stores information, and displays results, and print. Virtual instruments have the basic functions of ordinary instruments; it also has special functions that are not available in general instruments. They can use the design of software to expand the functions of traditional instruments to break the unreal experiment process of traditional instruments. The virtual instrument is different from the traditional simulation experiment. The experimental parameters, conditions and experimental process are all real and effective, and have certain scientificity. At the same time, students can have a real sense of experiencing the experiment in the process of using the virtual instrument.
Design and Practice of Basic Physical …
567
2 The Hierarchical Teaching System of Physical Experiment Teaching Combining Virtual and Real The so-called physical experiment platform of combination of virtual and real is mainly based on students’ personality and learning needs, to teach guidance step by step through the teaching content from shallow to deep, and to use a hierarchical teaching system to carry out physical experiment research of combination of virtual and real [3]. Hierarchical teaching system is composed of three levels, namely, learning stage, simple application stage and flexible application stage. In this way, students can improve from primary learning to application stage, and finally improve teaching efficiency and help students better complete physical experiment research. Among them, the learning stage is carried out mainly through the ready-made experimental procedures, so that students can conduct experimental research in the simulated experiment site; and the simple application stage is mainly to guide students to participate in teaching research and to simple transform the instrument, so that students can fully understand the relevant structure and accessories of the physical experimental instrument; finally, the flexible application stage is to enable students to fully experience the fun of physical research mainly through the development of experimental competitions to actively participate in innovative projects.
3 Design of Physical Experiment Content Combining Virtual and Real 3.1 Learning and Development of Virtual Experiments Students should lay a solid foundation in the process of virtual experiment learning, and can first guide them to use the edited program to practice the virtual instrument. After the foundation is solid, learn how to edit independently and design the experimental content, and simulate the phenomenon of physical experiment through programming to help students understand the principle of the experiment. In the lab, pure virtual experimental topics is used for learning, and students can use the computer to download LabVIEW before class to try to prepare their own programming [4, 5]. For example, virtual instrument technology is used to design the electrostatic field delineation experimenter, and LabVIEW programming is used to simulate the Lorentz equation and the Chua circuit to effectively study the chaotic phenomenon. Relevant data show that the experiment is simulated and experimentally performed with LabVIEW. LabVIEW programming simulation experiment visualizes the abstract content and makes it more convenient for students to analyze the experimental results, which further strengthens students’ perceptual cognition and helps students to deepen their understanding of the principles of electrical experiments.
568
B. Tai and B. Hu
3.2 Analysis and Modification of Existing Experimental Instruments Using Virtual Instruments Compared with other programming languages, the biggest point of LabVIEW software is that it has all the functions of data acquisition card communication and various hardware. It can easily connect experimental instruments and equipment, making the experiment easier. Therefore, in the process of physical experiment, after students have certain programming ability, they can guide them to use virtual instruments, and fully excite the functions of experimental instruments such as signal generators, oscilloscopes and spectrum analyzers through virtual instruments, and the existing instruments and equipment can be reformed to realize automatic measurement [6]. In addition, when students find that certain instruments have certain defects, they can explain their opinions and improvement methods to the teacher, and then conduct exploratory experimental research through virtual instruments. Furthermore, in the research of the physical experiment subject of combining virtual with real, we can design the automatic measurement of the experimental instrument by combining the existing experimental research appropriately. For example, students use virtual instrument technology to study the problems of hysteresis loops and LED voltampere characteristics experiments, so that the experimental results can be tested in real time.
3.3 Flexible Use of Virtual Instrument Technology for Experimental Design and Development In the project of physical laboratory teaching, students can be guided to design and develop virtual experiment independently and actively participate in the competition of physics experiment if they have certain experimental ability and can use LabVIEW programming and data acquisition card freely. If students can use virtual instruments flexibly, they can design relevant experimental schemes by themselves in physical experiment research, and design and develop the instruments needed for their experiments from their own interests, so that the developed experimental instruments can complete a specific function, and help students to carry out innovative research [7, 8]. In addition, after many years of experimental accumulation, physical experiment research teaching has completed several representative physical experiment topics. For example, the pulse tester designed by LabVIEW programming realizes many functions such as collecting the data of pulse signal, automatic counting and waveform display; LabVIEW is used to measure the impedance characteristics of super-generating transducer, effectively simulate the relevant situation of reversing radar, measure and predict the velocity and flow of water and the speed and remaining time of infusion in infusion bottle. In addition, the virtual instrument system can make the measurement instrument software, and take the high-speed operation of
Design and Practice of Basic Physical …
569
the computer as the starting point, effectively realize the data acquisition and processing. The modularization of virtual instrument design in LabVIEW technology enables users to simply make new instruments, which can transform hardware into software and integrate them. Different instruments with different capabilities can be combined successfully through flexible application and enrich the measurement of virtual instrument [9]. In addition, different experiments can be made into different Vis, that is to say, one computer can be used as a measurement tool for multiple sets of experiments, making the computer the center of the experiment and effectively integrating multiple sets of physical experiments. This kind of practice can greatly help the experimental management while saving the experimental cost. For example, ultrasonic experiments are new experimental instruments that have been combined with existing experimental equipment. Piezoelectric ceramic ultrasonic transducers are required for sound velocity experiments, and students can explore and study the physical characteristics of ultrasonic transducers through virtual instruments, and then measure the impedance characteristics of the piezoelectric ceramic transducer at different frequencies [10, 11]. In the process of conducting experiments, students will have a certain interest in the experiment and help to stimulate students’ creative thinking. The use of virtual instruments can further help students to better understand physics and explore unknown physical characteristics. In the basic physics experiment teaching, the experimental platform combining virtual and real can provide a comprehensive and open operating environment, to improve the experimental equipment and the lack of space, solve the drawbacks of traditional teaching to some extent, and make the physical experiment teaching more close to the requirements of modern teaching. And using virtual instrument technology can provide students with a better experimental innovation platform, so that students no longer stop their interest in physics research due to lack of technology. When technology is no longer a hindrance to students’ learning, it can effectively stimulate students’ interests in physics learning, which make it more active to explore new knowledge, and the related problems encountered in the experiment can be solved independently [12].
4 Conclusion With the continuous advancement of teaching reform, in the process of constructing the platform of combining virtual with real physical experiment, we should constantly innovate its content and use new methods to build a memorable platform. The difficulties in teaching are closely related to the experimental content chosen by students, and the difficulty of the basic skills training content chosen is relative to the difficulty of students’ practice. How to expand its imagination space and what kind of instruments should be developed? Only by carrying out experimental teaching research can the existing experimental teaching system be improved.
570
B. Tai and B. Hu
References 1. Li Weiyang, Wang Yewu, Chen Shuiqiao, et al. 2018. Design and practice research of basic physical experiment teaching with the combination of virtual and real. Physics and Engineering 28 (S1): 157–162+167. 2. Zhang Deqian, Zhang Yuqin, and Zheng Chunlong. 2018. Research and practice of physical experiment teaching model in universities combining virtual and real. Light Engineering Technology (1): 161–162. 3. Liu Yuexin, Xu Fei, Liu Fang, et al. 2017. Exploration and practice of the open experimental teaching model of combination of virtual and real in large instrument analysis experiments. Guangdong Chemical Industry (23): 118–119. 4. Chen Shunfang, Xiong Sanming, and Xu Siliu. 2018. Reform and practice of physical experiment teaching in local engineering universities: Taking Hubei Institute of Science and Technology as an example. Journal of Hubei Institute of Science and Technology 38 (5): 143–145. 5. Dai Guiping. 2019. Experimental teaching research on communication principle and practice of “combination of virtual and real”. Journal of Suzhou Vocational University 30 (1): 83–88. 6. Li Jinhua, and Yao Fangping. 2015. Exploration and practice of NC machine tool experiment teaching model combining virtual and actual. Laboratory Science 18 (4): 65–67. 7. Ke Danxia, and Shu Yong. 2018. Practical teaching research of fermentation technology based on the combination of virtual and actual. Light Engineering Technology (4): 148–149. 8. Zhang Yuxi, Wang Jun, Ha Congying, et al. 2016. Exploration and research of the experimental platform combining of virtual and real. Industrial and Information Education (7): 74–78. 9. Li Ning, Yang Kun, and Shi Qin. 2016. Preliminary exploration and practice of open teaching of physical virtual simulation experiment in colleges. Education Modernization (40): 126–127. 10. Yuan Xiaoping, Chen Ye, Chen Shihai, et al. 2018. Construction and practice of group system of electronic technology experiment courses based on the combination of false and real. Experimental Technology and Management (8): 216–220. 11. Wang Chengyi. 2016. Practice and reflection on promoting the teaching reform of hardware courses by combination of virtual and real. Journal of Hubei University of Economics (Humanities and Social Sciences) 13 (10). 12. Gu Hao, Sun Zhijie, and Li Qin. 2016. Exploration and research on the experimental teaching mode of combination of virtual and real in biology. Laboratory Research and Exploration 35 (4).
Automatic Detection of Cloth Defects Based on Gabor Filtering Guanxiong Ding
Abstract In this paper, the difference between the fabric features of the cloth and the normal part is used to realize the automatic detection of the flaws in the cloth. And the Gabor filtering method and support vector machine (SVM) classifier are used to detect the flaws. The detection mainly includes two steps. The first step is to divide the cloth image into multiple sub-blocks of the same size, each sub-block as a sample, and then calculate the texture features of each sub-block separately, and the second step uses SVM classifier to different the samples of cloths. In the second step, the SVM classifier is used to classify different cloth samples to detect the fabric defects. Experiments show that the proposed algorithm can basically realize the automatic detection function of flaws in the cloth and can effectively identify whether the cloth has flaws. Keywords Flaw detection · Gabor filtering · Support vector machine
1 Introduction In the evaluation criteria of fabric textile quality, whether the fabric contains defects and the length of defects are the most important evaluation indicators. In order to minimize the impact of defects on the fabric, efficient and timely detection of defects is the key to improve fabric quality. At present, in the domestic cloth textile industry, because of the introduction of a large number of artificial subjective factors in the process of testing, the quality of testing is ultimately uncertain. In addition, this method has a large workload, poor reliability, relying on the experience of staff, and causes inefficient work, unable to repeat operations for a long time and other irresistible drawbacks. According to relevant research, the human visual system can only detect about 60–75% of the significant defects. Therefore, in order to minimize the impact of human factors in the detection process, the development of automatic detection technology is an important way to improve the reliability of detection results. G. Ding (B) Shanghai Normal University, Fengxian District, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_69
571
572
G. Ding
The automatic detection methods in China can be divided into two categories which are laser broken yarn detection method and image acquisition and processing detection method. The former mainly uses laser to detect whether the yarn fluctuates and whether the laser scanning reflects centrally, so as to judge whether the fabric is defective; the latter mainly uses real-time image acquisition and digital image processing technology to detect defects. Laser yarn breaking detection method has the shortcomings of large power consumption and high missed detection rate, and the real-time cloth image monitoring system is difficult to popularize because of the expensive price of imported equipment and the low detection rate [1]. Machine vision has been applied in industry abroad for a long time, and has a wide range of application prospects, especially in finished product detection and quality detection. The following high-performance complete sets of equipment have been put into the market for fabric detection: the IQ-TEX system launched by Evs Company of Israel adopts high-definition color line scanning technology and enhanced defect sorting algorithm, which can be exploited concurrently. Fabric defects with accuracy greater than 0.5 mm were detected. German Dr. Schenker can detect textiles with multi-image defect analysis technology, which can identify defects below 1 mm. Fabriscan system of Swiss Uster Company collects moving cloth images using multiple high-level linear array CCD camera arrays according to cloth width and detects flaws through trained neural network models. At the same time, there are Cyclops of Barco, ELSISS of Erhardt Leimer, Germany, SmartView Texture and Surface Detection System of COGNE, USA, etc. However, the imported equipment is expensive, and the maintenance process is cumbersome and inconvenient, so it can not be popularized. There is no self-developed high-efficiency automatic detection system in China, and the automatic detection technology of fabric defects needs to be further studied and improved [2, 3]. This paper mainly studies how to detect faults in real-time after they appear in the fabric textile process, and proposes an automatic detection algorithm which uses Gabor filter to extract features and then uses SVM classifier to identify and detect faults. Machine vision has been applied in industry abroad for a long time, and has a wide range of application prospects, especially in finished product detection and quality detection. The following high-performance complete sets of equipment have been put into the market for fabric detection. The IQ-TEX system launched by Evs Company of Israel adopts high-definition color line scanning technology and enhanced defect sorting algorithm, which can be exploited concurrently. Fabric defects with accuracy greater than 0.5 mm were detected. German Dr. Schenker can detect textiles with multi-image defect analysis technology, which can identify defects below 1 mm. Fabriscan system of Swiss Uster Company collects moving cloth images using multiple high-level linear array CCD camera arrays according to cloth width and detects flaws through trained neural network models. At the same time, there are Cyclops of Barco, ELSISS of Erhardt Leimer, Germany, SmartView Texture and Surface Detection System of COGNE, USA, etc. However, the imported equipment is expensive, and the maintenance process is cumbersome and inconvenient, so it can not be popularized. There is no self-developed high-efficiency automatic detection
Automatic Detection of Cloth Defects …
573
system in China, and the automatic detection technology of fabric defects needs to be further studied and improved [4]. This paper mainly studies how to detect faults in real-time after they appear in the fabric textile process, and proposes an automatic detection algorithm which uses Gabor filter to extract features and then uses SVM classifier to identify and detect faults [5, 6].
2 Gabor Filter 2.1 One-Dimensional Gabor Filter Gabor filter is the best bandpass filter for one-dimensional signal processing. A complex Gabor filter is the product of a Gauss kernel function and a complex sin function, for example: g(t) = ke jθ w(at)s(t)
(1)
w(t) = e−πt
(2)
where 2
s(t) = e j(2π f0 t)
(3)
e jθ s(t)e j(2π f0 t+θ ) = (sin(2π f 0 t + θ ), jcos(2π f 0 t + θ ))
(4)
We can think of this complex Gabor filter as two phase filters divided into real and imaginary parts of a complex function: gr (t) = w(t)sin(2π f 0 t + θ)
(5)
gi (t) = w(t)cos(2π f 0 t + θ )
(6)
2.2 Two-Dimensional Gabor Filter In this paper, a two-dimensional Gabor filter, also called spatial Gabor filter, is used. Its mathematical expression is as follows: Complex expression:
574
G. Ding
2 x x + γ 2 y 2 exp i 2π + ψ g(x, y; λ, θ, ψ, σ, γ) = exp − 2σ 2 λ The real part: 2 x x + γ 2 y 2 cos 2π + ψ g(x, y; λ, θ, ψ, σ, γ) = exp − 2σ 2 λ The imaginary part: 2 x x + γ 2 y 2 sin 2π + ψ g(x, y; λ, θ, ψ, σ, γ) = exp − 2σ 2 λ where x = xcosθ + ysinθ and y = −xsinθ + ycosθ In the formula: λ: θ: ψ: σ: γ:
Sinusoidal function wavelength; Direction of Kernel Function of Gabor; Phase offset; Standard deviation of Gaussian function; Width-to-height ratio of space.
Through in-depth analysis of the description of the real part and the imaginary part, we can see that the real part can smoothly filter the image, and the two imaginary parts can be used for edge detection.
2.3 Application and Adaptability of Gabor Filter 1. Gabor filter can transfer function well under light intensity stimulation, and has good characteristics in extracting local spatial and frequency domain information of the target. 2. Gabor wavelet is sensitive to image edge, can provide good direction selection and scale selectivity, and is insensitive to illumination changes, and can provide good adaptability to illumination. Gabor is widely used in visual information analysis. Two-dimensional Gabor wavelet transform is an important tool for signal analysis and processing in time-frequency domain. Its transform coefficients have good
Automatic Detection of Cloth Defects …
575
visual characteristics and biological background, so it is widely used in image processing, pattern recognition and other fields. 3. Gabor wavelet has multi-resolution property zoom ability. That is to say, a group of Gabor wavelets with different time-frequency characteristics are applied to image transformation by using multi-channel filtering technology. Each channel can get some local characteristics of the input image, so that the image can be analyzed at different coarse and fine grains according to the need. 4. Compared with other methods in feature extraction, Gabor wavelet transform can process less data and meet the real-time requirements of the system. On the other hand, it is insensitive to illumination changes and can tolerate image rotation and distortion to a certain extent. When Euclidean distance is used for recognition, feature mode The robustness of the system can be improved without strict correspondence between the formulas and the features to be measured [7–9].
3 Support Vector Machine Classification Support Vector Machine (SVM) is a commonly used classification and recognition algorithm, which has good generalization ability and has been widely used. The basic idea is to construct an optimal classification function for two types of problems, so that the two types of samples can be separated as far as possible without error, while maintaining the maximum gap between the two categories, which is particularly effective for small samples and high-dimensional classification problems. The different inner product kernel functions of SVM will form different algorithms. The main kernel functions can be divided into the following three categories: (1) Linear inner product function: k(x, y) = x · y d (2) Polynomial inner product function (Ploy): k(x, y) = (x · y) + 1 (3) (3) Radial Basis Inner Product Function (Rbf): k(x, y) = exp −|x − y|2 /δ2 . Literature [1] compares the above three kernels. The experiments show that the radial basis function has good performance for most databases. In this paper, different kernels are selected and the statistical results are compared.
4 Flow Chart of Algorithm The flow chart of defect detection algorithm based on Gabor filter is as follows (Fig. 1): The specific steps are as follows: (1) Acquisition of real-time cloth image
576
G. Ding
Fig. 1 Flowchart of algorithm
(2) Gray level of preprocessed image (3) Select a part of the flawless image as positive sample and a part of the flawed image as negative sample (4) Texture feature extraction by Gabor filter (5) Using data results as input training of SVM classifier to test flaws.
5 Experimental Design 5.1 Composition of Experimental Data Six images captured in Fig. 2 are taken as original sample images for experiment. One is normal image and the other five are defective images. Each of the first five experimental images is evenly segmented into pixels of the same size. In this case, the size of the pixel block is 16 × 16, 200 normal pixel blocks and 40 defective pixels are selected. Block is used as training set, and the 6th experimental picture is processed the same way. 63 normal and 34 defective pixel blocks are selected as
Automatic Detection of Cloth Defects …
577
Fig. 2 Original sample
test set. Because the cutting size of the pixel blocks will affect the test results, three different sizes are used to compare the same samples. The sizes are 16 × 16, 32 × 32 and 64 × 64, respectively. Thus, the optimal size of the test results is obtained [10].
5.2 Recognition Algorithm in This Paper Firstly, 200 pixel blocks are selected as positive samples from known flawless images, and some flawed pixel blocks are selected as negative samples from flawed images. Texture features are extracted by two-dimensional Gabor filter. The feature extraction results are used as input of SVM classifier, and the training model is trained and the prediction results are compared and analyzed [11, 12].
5.3 Comparison of SVM Results with Different Kernel Functions The main parameters of SVM are penalty factor (c) and kernel function parameter (g). The function of parameter C is to adjust the confidence range and the proportion of experience risk of the learning machine in the determined feature space so as to adjust its generalization ability. For the kernel function parameter g, when G is too small, the test sample will produce “over-learning” phenomenon which does not
578
G. Ding
Table 1 Predicts the results of SVM using four commonly used kernels (percentages) Size/Kernel
Rbf (%)
Ploy (%)
Gauss (%)
Auto (%)
16 × 16
83.45
91.67
91.52
95.43
32 × 32
87.93
94.83
92.24
96.55
64 × 64
83.33
94.44
97.22
97.22
have any generalization ability. When G is too large, there will be a phenomenon of “under-learning” which divides all samples into one class [13]. At the same time, the size and size of the selected pixel blocks are different, and the texture information carried is also different. In order to select the optimal size of pixel blocks, this paper compares the selected size of pixel blocks, and selects 16 × 16, 32 × 32, 64 × 64 different size of pixel blocks to compare, and carries out experiments on different kernel functions under different size of pixel blocks. In this paper, by adjusting and comparing, the appropriate nuclear parameters are selected to achieve the optimal recognition effect. The prediction accuracy of different kernel functions with different block sizes is shown in Table 1.
6 Conclusion In this paper, we use Gabor filtering feature extraction method and SVM with different kernels to compare the results under the same data set of pixel blocks of different sizes. Compared with the prediction accuracy results, when the size of sub-pixel blocks is small, the number of defective sub-pixel blocks is large, which makes the training model more accurate; and when the size of sub-pixel blocks is large, the texture information contained in each sub-pixel block is more detailed, which makes the training results more fitting, but at the same time, the robustness may be worse due to fewer samples. Looking up the table, when the size of sub-pixel block is 32 × 32, the recognition accuracy of defects can reach 97.22% when using the SVM of Gauss kernel function. The Gabor filter texture feature extraction and SVM junction proposed in this paper have a good research role in fabric recognition and defect detection. At the same time, the parameters of SVM can be further optimized to achieve higher accuracy, which is the main research direction of the author in the future.
References 1. Liang, Xiao. 2006. Image classification based on support vector machine. Shanghai: Tongji University. 2. Zhao, Qingjie, Fang Qian, L.G. Shapiro, and G.C. Stockman. 2005. Computer vision, trans. Cai Lidong, 159–166. Beijing: Mechanical Engineering Press.
Automatic Detection of Cloth Defects …
579
3. Long Beach. 2016. SVM abstracts. Vascular Medicine 21 (3): 287–310. 4. Fengguohe. 2011. Comparison of kernel function and parameter selection for SVM classification. Computer Engineering and Application 47 (3): 123–124. 5. Yi, Zhang. 2004. Research on real-time fabric defect detection technology. Tianjin: Tianjin University of Technology. ´ 6. Smieja, Marek, Jacek Tabor, and Przemyslaw Spurek. 2017. SVM with a neutral class. Pattern Analysis and Applications. 7. Chen, Ning, Jun Zhu, Jianfei Chen, and Ting Chen. 2018. Dropout training for SVMs with data augmentation. Frontiers of Computer Science 12 (4): 694–713. 8. He Wei. 2015. Research and development of real-time visual detection technology for fabric defects. Jiangnan University. 9. Wang Mingjing. 2014. Research and development of fabric defect detection technology. Jiangnan University. 10. Chen, Tingting, Lizhi Zhang, Zhijie Zhao, Huadong Sun, and Cedar Jin. 2015. Image depth information estimation based on MRF and texture features. School of Computer and Information Engineering, Harbin Commercial University. 11. Detailed introduction of Gabor filter [DB/OL]. http://mplab.ucsd.edu/tutorials/gabor.pdf. 12. Gabor Filter Learning [DB/OL]. http://blog.csdn.net/jinshengtao/article/details/17797641. 13. Explanation of Gabor filter parameters in foreign universities [DB/OL]. http://matlabserver.cs. rug.nl/edgedetectionweb/web/edgedetection_params.html.
Improved GA-SVM Algorithm and Its Application of NIR Spectroscopy in Orange Growing Location Identification Songjian Dan and Simon X. Yang
Abstract In order to establish a more accurate and efficient orange growing location identification model, we proposed Genetic Algorithm Support Vector Machine (GA-SVM) that based on Support Vector Machine (SVM). This algorithm combines genetic optimization options to improve the SVM algorithm, and the experimental results indicate that GA-SVM can significantly improve the prediction rate of SVM. Keywords GA-SVM · NIR spectroscopy · Orange growing location identification
1 Introduction Support Vector Machine (SVM) is a recognition model proposed by Vapnik that can be effectively used for pattern recognition and data mining [1, 2]. Especially when dealing with high-dimensional nonlinear samples, SVM has a good recognition effect. As a supervised classification model, SVM has the following advantages: It is more suitable for small sample data sets; more rigorous mathematical theory support; efficient nonlinear classification performance and the ability to avoid dimensionality disasters to some extent [2–5]. In this paper, we first analyze the detail of SVM recognition algorithm, and test the different kernel function of SVM in order to obtain better recognition results. Secondly, based on SVM algorithm, this paper combines the gene optimization selection algorithm to improve the SVM algorithm. The experimental results show that GASVM can obtain better prediction rate than SVM in the identification of NIR in 16 regions.
S. Dan (B) College of Continuing Education, Chongqing University of Education, Chongqing, China e-mail: [email protected] S. X. Yang School of Engineering, University of Guelph, Guelph, ON, Canada e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_70
581
582
S. Dan and S. X. Yang
2 Origin Identification Model Based on GA-SVM Through the experiment results, we can see that although PCA can effectively retain the data information before dimensionality reduction, it does not mean that the principal component with the most information content is the most distinguishing feature. The performance of SVM is different when we input different principal components. In order to further improve the recognition accuracy of SVM, this paper proposes the SVM recognition algorithm (GA-SVM) [6] based on genetic algorithm (GA), which achieves the best recognition results through the optimal combination of extracted principal component information. The model is shown in Fig. 1.
2.1 GA-SVM Genetic algorithm (GA) is a heuristic search model simulating biological evolution, natural selection and genetic mechanism in nature [7, 8]. Its main characteristic is that it can directly operate the structure object, and there is no limit for function continuity and derivative. It has inherent parallelism and better ability of global optimization. The probabilistic optimization method is used to automatically obtain and guide the optimized search space, and adaptively adjust the search direction without any definite rules. Therefore, in this paper, genetic algorithm is very suitable for solving the optimal principal component combination [9]. In genetic algorithms, starting from a population with potentially potential solutions, another better solution can be obtained by evolution. Each population contains a certain number of individuals who can mutate, usually encoded by a zero or a one. Solving genetic algorithm is an iterative process, and each iterative process produces a new generation of population. By randomly creating new individuals, individuals’ genes undergo random mutations to evolve In each generation at the same time, according to value of the fitness of the individual in the problem domain to choose the appropriate individual, and combine natural genetics with crossover and mutation through genetic algorithms, to produce the new solution set of the population, and put it as the input of the next iteration, thereby evolution repeatedly, until they get the optimal approximate solution. In this process, the new population is similar to the next generation in the natural evolution, which has more ability to adapt to the environment than the previous generation (solve the problem is more appropriate to the target solution), the optimal individual in the last generation population is decoded to find the final result of optimization. The corresponding elements of GA algorithm and the survival of the fittest principle in natural selection are shown in Fig. 2. The left side of the figure is the basic element of the GA algorithm, and the right side is the operation of the most suitable natural selection. In this paper, the detailed process of principal component selection based on GA algorithm is as follows:
Improved GA-SVM Algorithm and Its Application …
583
Raw NIR Data
Data Deducing (SG)
Attribution Selection (PCA)
Gene
Evaluation
SVW
Selection
Optimal Attribution selection (GA)
N
Terminal Condition
Y
Final SVW Model
Fig. 1 Flowchart of the proposed GA-SVM classier for orange geographical origin identification
584 Fig. 2 Corresponding elements for genetic algorithm and the evolution principle of survival of the fittest
S. Dan and S. X. Yang
Genetic Algorithm Encode possible solutions Initial population
Survival of the fittest Chromosome, Population Generate the next
Fitness function
Generation
Choose the next
Environment
1) Initialization: first, a population is randomly selected from the first 25 principal components, and the initialization of iterations is set to T = 0, the maximum evolution iterations is Tmax . We choose the first 25 principal components, it is because according to the experiments in Chapter 3, the first 25 principal components have basically covered all the information about the orange NIR spectrum. 2) Gene encoding: the input of each individual in the population is encoded as a string of [1–25]. i.e. a six-bit string represents the best possible combination of features {1, 2, 3, 5, 7, 9}, indicating that the gene sequence contains the first, second, third, fifth, seventh, and ninth principal components. 3) Fitness calculation: the fitness of an individual determines the degree of advantages and disadvantages of each individual, thus determining the size of its genetic opportunity. In this paper, the classification accuracy Pa% of SVM is directly used as the evaluation index of individual fitness. 4) Selection operation (or replication operation): transfer the individuals with higher fitness in the current group to the next generation group according to certain rules or models. Generally, individuals with higher fitness have a higher probability of passing it on to the next generation. In this paper, roulette selection is used to select individuals. In this method, the selection probability of each individual is proportional to its fitness. In order to retain the best fitness method to determine the number of each individual copied to the next generation population, the population with the maximum identification rate is selected as the parent to copy the next generation. Let the population size be n, where the fitness of the ith individual is f i , then the probability that the individual Pi = f i / nj=1 f j is selected. It can be seen that the individual fitness is greater, the more likely it is to be selected, and vice versa, which is similar to the survival of the fittest rule in nature. 5) Crossover operation: crossover operation is the process of generating new individuals by exchanging part of chromosomes between two individuals with a certain probability. In this paper, the method of single point crossing is adopted, that is, the group is firstly randomly paired. Secondly, the location of intersections is set randomly. Finally, some of the genes that pair the chromosomes are swapped with each other.
Improved GA-SVM Algorithm and Its Application …
585
6) Mutation operation: mutation operation is to change the gene value of one or some loci of an individual with a small probability, and it is also an operation method to generate new individuals. In this paper, the method of fundamental positional variation is adopted to carry out mutation calculation. Firstly, the gene mutation position of each individual is determined, and then the original gene value on the recorded mutation position is directly reversed according to a certain probability, so as to obtain the individual after mutation. Through iteration, GA algorithm automatically identifies the principal component combination that is most suitable for the SVM model, and discards the principal component that does not have the degree of discrimination, and obtains the final feature set as the training input of the SVM model, so as to obtain the best SVM classification model. Figure 3 shows the flow chart of the above process. Fitness evaluation is directly selected as the optimization objective, namely the classification accuracy of SVM as the evaluation index. Genetic operator includes the process of gene selection, crossover and mutation. The termination condition is to reach the maximum number of iterations or the set training accuracy. The final output is the gene combination with the highest training recognition rate, and the optimal principal component combination can be obtained by decoding.
2.2 GA-SVM Parameter Setting and Discussion GA algorithm requires lots of parameters, including population size, commutativity, mutation rate, etc. In order to get the best performance of GA-SVM, it is necessary to set appropriate parameters for GA algorithm according to the characteristics of orange NIR data in this paper. In the experiment, the optimal principal component combination is encoded as an integer from 1 to 25. The number of chromosomes output is equal to the number of principal components selected last. For example, if the output is 6, that is, the length of the chromosome is 6, which represents the optimal 6 principal components selected from the corresponding 25 principal components. 1) The size of the population In GA algorithm, the size of the population affects the search for the optimal solution and the speed of convergence [10]. If the population is too small, GA cannot achieve sufficient accuracy or does not find the optimal solution when the search stops. But large population increases the complexity of searching range and computation. Due to the different complexity and distribution of data in each application, there is no specific algorithm in the literature to automatically select the size of the population. In this paper, different population sizes are tested and their fitness is recorded to obtain appropriate parameter values. After testing, the fitness under the optimal condition of each parameter is shown in Fig. 4.
586
S. Dan and S. X. Yang
The first N Principal Component of PCA
Initial population
Fitness function
Choose the best parent
Genetic operator
The procedure of evolution
Fitness function
NO
Terminal Condition
YES
The optimal gene combination
Fig. 3 Flowchart of GA to implement the procedure of evolution
Improved GA-SVM Algorithm and Its Application …
587
Fig. 4 Best fitness along with different population size for GA-SVM classifier for training
It can be seen from Fig. 4 that GA-SVM can get the optimal fitness when the population size is set at 200. Therefore, in this experiment, the population size will be set to 200. 2) Genetic operator In GA algorithm, genetic operators (crossover and mutation) promote the diversity of the next generation of genes, so that heuristic search can be effectively carried out in the feature space, while mutation effectively ensures that possible solutions will not be lost [11]. Crossover rate and mutation rate often affect the performance of GA algorithm and the speed of convergence. The general crossover rate was set between [0.5, 1], and the mutation rate was 0.1. In this paper, we test different mutation rates and crossover rates at step size 0.1. Meanwhile, single point mutation is used to produce the optimal next generation, and uniform mutation is used to store the lost information of the next generation to produce more suitable individuals. The optimal fitness under each crossover rate is shown in Fig. 5. As can be seen from the figure, with the increase of crossover rate, the fitness also increases, but decreases rapidly after the crossover rate exceeds 0.7. This phenomenon indicates that higher crossover rate can lead to more new generations and thus more opportunities to get better solutions. However, when the crossover rate is too high, GA algorithm will degrade to a certain extent. Therefore, according to the above experiments, the crossover rate in this paper is set as 0.6. For the mutation rate, six groups of parameters including 0.01, 0.02, 0.03, 0.04, 0.05 and 0.06 are selected in the experiment, and the optimal fitness is shown in
588
S. Dan and S. X. Yang
Fig. 5 Best fitness along with different crossover rate for GA-SVM classifier for training
Fig. 6. As can be seen from the figure, when 0.03 is taken, the optimal fitness is reached, so the optimal mutation rate is set at 0.03.
2.3 GA-SVM Experimental Results After selecting suitable parameters, the results of habitat identification for orange NIR data set using ga-svm model are presented. For comparison, SVM model is also used to predict the same data set in the experiment. According to the framework proposed in this paper, after SG smoothing and PCA analysis of the original NIR data, the first 25 principal components are selected as the input of GA-SVM and SVM for training and testing. In this paper, 5 × 10 times of cross validation are carried out, and the final average recognition rate is taken as the final performance output. Table 1 shows the situation of the 25 principal components selected when the number of different final features is determined, where 1 means the principal component is selected and 0 means the feature is not as the output. As can be seen from the table, the first principal component is selected most because it contains the most abundant information. In addition, the third, sixth, seventh and eighth principal components are also selected may times, indicating that the selected features were highly differentiated.
Improved GA-SVM Algorithm and Its Application …
589
Fig. 6 Best fitness along with different mutation rate for GA-SVM classifier for training
Table 2 shows the performance comparison between GA-SVM and SVM. Among them, SVM takes the first n principal components which contains the largest information for training, while GA-SVM takes the first n optimal principal component combinations. It can be seen that GA-SVM is obviously superior to SVM when the same number of principal components are selected for identification through genetic algorithm optimization. When 16 principal components are selected, GA-SVM gets the highest recognition rate of 94.57%, and its final average recognition rate is 93.43%. At the same time, SVM also reaches the highest recognition rate of 93.52%. The final average recognition rate is close to GA-SVM, reaching 93.01%. The experimental results verify that the genetic algorithm can improve the recognition rate of SVM to some extent through the optimal selection of principal components.
3 Conclusion In order to further improve the recognition performance of SVM, this paper uses GA to optimize the feature combination of the first 25 principal components extracted. At the same time, we discuss the parameters of GA model, such as population size, crossover rate, mutation rate, etc. and this paper has carried out all the optimal fitness experiment. After obtaining the best GA model parameters, we conduct a field identification experiment on orange in 16 regions and compare it with the SVM algorithm. The experimental results show that the GA feature selection algorithm
590
S. Dan and S. X. Yang
Table 1 Best individual PCs are selected using GA-SVM model based on SG smoothed oranges NIR spectra PCs
Output number 6
8
10
12
14
16
1
1
1
1
1
1
1
2
0
0
0
0
1
1
3
0
1
1
1
1
1
4
0
0
0
0
0
1
5
0
0
1
0
1
1
6
1
1
1
1
1
1
7
1
1
1
1
1
1
8
1
1
1
1
1
1
9
0
0
1
1
1
0
10
1
1
1
1
1
1
11
1
1
1
1
1
1
12
0
0
1
1
1
1
13
0
0
0
0
1
1
14
0
0
0
0
0
1
15
0
0
0
1
1
0
16
0
0
0
0
0
0
17
0
0
0
0
0
0
18
0
0
0
0
0
0
19
0
0
0
0
0
0
20
0
0
0
0
0
1
21
0
1
0
1
1
1
22
0
0
0
0
0
0
23
0
0
0
1
0
0
24
0
0
0
0
0
1
25
0
0
0
0
0
0
Table 2 Performance of GA-SVM and SVM models for geographical origin identification of oranges PCs
6
8
10
12
14
16
Avg.
GA-SVM (Pa%)
92.65
93.06
93.57
93.48
93.25
94.57
93.43
SVM (Pa%)
92.62
92.44
93.21
93.36
92.90
93.52
93.01
Improved GA-SVM Algorithm and Its Application …
591
can effectively improve the recognition performance, the final GA-SVM model can achieve a recognition accuracy of 94.58%. This result verifies that the identification of orange origin based on GA-SVM has certain practical value. Acknowledgements This work was supported by China Scholarship Council (CSC), Advanced Robotics and Intelligent Systems (ARIS) Laboratory in the School of Engineering at the University of Guelph. The authors thank Qiuhong Liao for providing the data used in this research work. Project: The project of Chongqing University of Education “study on orange growing location identification technology based on near infrared spectroscopy” (Project Number: KY201711B).
References 1. Cortes, C., and V. Vapnik. 1995. Support-vector networks. Machine Learning 20 (3): 273–297. 2. Hao, L., Z. Jiewen, C. Quansheng, Z. Fang, and S. Li. 2011. Discrimination of Radix Pseudostellariae according to geographical origins using NIR spectroscopy and support vector data description. Spectrochimica Acta Part A: Molecular and Biomolecular Spectroscopy 79 (5): 1381–1385. 3. Müller, K.-R., S. Mika, G. Rätsch, K. Tsuda, and B. Schölkopf. 2001. An introduction to kernel-based learning algorithms. Neural Networks, IEEE Transactions on Neural Networks 12 (2): 181–201. 4. Chang, C.-C., and C.-J. Lin. 2011. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2 (3): 27. 5. Asir, D., S. Appavu, and E. Jebamalar. 2016. Literature review on feature selection methods for high-dimensional data. International Journal of Computer Applications: 136. 6. Kumar, M., M. Husian, N. Upreti, and D. Gupta. 2010. Genetic algorithm: Review and application. International Journal of Information Technology and Knowledge Management. 2 (2): 451–454. 7. Yun, Y.H., H.D. Li, L.R.E. Wood, W. Fan, J.J. Wang, D.S. Cao, et al. 2013. An efficient method of wavelength interval selection based on random frog for multivariate spectral calibration. Spectrochimica Acta Part A: Molecular and Biomolecular Spectroscopy 111 (7): 31–36. 8. Jiang, H., Z. Yan, and X. Liu. 2013. Melt index prediction using optimized least squares support vector machines based on hybrid particle swarm optimization algorithm. Neurocomputing 119 (16): 469–477. 9. Tewari, J.C., D. Vivechana, C. Byoung-Kwan, and K.A. Malik. 2008. Determination of origin and sugars of citrus fruits using genetic algorithm, correspondence analysis and partial least square combined with fiber optic NIR spectroscopy. Spectrochimica Acta Part A: Molecular and Biomolecular Spectroscopy 71 (3): 1119–1127. 10. Allegrini, F., and A.C. Olivieri. 2011. A new and efficient variable selection algorithm based on ant colony optimization. Applications to near infrared spectroscopy/partial least-squares analysis. Analytica Chimica Acta 59 (1): 18–25. 11. Liu, C., S.X. Yang, and L. Deng. 2015. Determination of internal qualities of Newhall navel oranges based on NIR spectroscopy using machine learning. Journal of Food Engineering 161: 16–23.
Condition Monitoring of Fire Water Supply System Based on LoRa Wireless Network Fan Yufeng, Du Yang and Yang Shufeng
Abstract Whether the tank water level and pipe network water pressure of the fire water supply system meet the water supply requirements is of vital importance to the fire extinguishing of buildings. Based on the point, this paper studies the wireless networking, sensor sensing information collection and integration technology in buildings. Designs and develops a fire water supply system monitoring system based on LoRa wireless network, and the LoRa wireless networking technology is used to construct a data collection private network in the building to realize the collection and transmission of water pressure and water level status of different nodes in the building. After the actual experimental verification and performance analysis of the scene, the shortcomings in the current state collection process of the fire water supply system are overcome. Keywords Fire water supply extinguishing system · LoRa wireless networking · Wide coverage · Low power consumption
1 Introduction Fire water supply extinguishing system is a common automatic fire extinguishing fire-fighting facility for buildings. It is mainly used in various civil, commercial and industrial buildings to extinguish building fires other than chemical, fuel, metal fires and so on. There are many types of fire water supply fire extinguishing systems, including indoor fire hydrant systems, automatic sprinkler systems, automatic spray fire extinguishing systems, fire water tank fire extinguishing systems and outdoor fire
F. Yufeng (B) · D. Yang · Y. Shufeng Emergency Management Department, Shenyang Fire Research Institute, Shenyang 110034, China e-mail: [email protected] D. Yang e-mail: [email protected] Y. Shufeng e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_71
593
594
F. Yufeng et al.
water combiners. Fire water supply extinguishing system is one of the key fire extinguishing facilities for firefighting in high-rise and super high-rise building rooms. Its design and installation are carried out simultaneously in building design and construction. According to Chinese “Code for Fire Protection of Building Design” (GB50016-2018), For 10 or more floors of buildings, other civil and industrial buildings with a building height of 24 m or more, fire water supply extinguishing systems must be installed. The fire water supply extinguishing system is composed of fire water supply pipes, fire water pools, fire water tanks, fire water pumps, fire stability (increasing) pressure equipment and fire water pump adapters. Its working principle is to trigger the action of the water supply pump through the change of the pressure of the pipe network, to start and stop the water supply pump, and spray the water and water mist through the nozzle to carry out the fire extinguishing action. At the same time, the system can also start and stop the signal through the control of the fire linkage control system. From the working mechanism, it can be seen whether the water supply pipeline has pressure or whether the tank water level meets the requirements, which is a key factor for the normal operation of the system. If the pipeline has no pressure, even if the control system can operate normally, the fire extinguishing system cannot perform the fire extinguishing action. Therefore, monitoring the operational status of the fire water supply system should be based on monitoring whether the water supply line has a normal pressure/water level. The long-term normal and effective operation of the fire water supply fire extinguishing system is inseparable from the daily maintenance and operation test. However, due to the lack of effective supervision, the owner and maintenance enterprise are negligent in the management and maintenance of the fire water supply extinguishing system. It is common for the system to have no water and low pressure in the pipeline when the fire occurs. Therefore, the establishment of real-time online fire water supply system status monitoring is extremely important for the firefighting of high-rise and super high-rise buildings. The traditional way to collect the pressure of the water supply pipeline is to use a wired method, connect the pressure sensor, collect the pressure of different nodes, transmit the data to the fire control room through the CANBus bus, and then access the fire linkage control system. In this way, because the wiring is to be carried out in the building, it is necessary to rectify the main body of the building for the completed building, which is difficult to construct and has large economic expenditure.
2 Preliminary Work The water pressure or water level monitoring technology of the fire water supply system is now relatively mature. The difficulty lies in the installation location and the monitoring center that uploads the collected status data. At present, the status monitoring methods of fire water supply systems mainly include wired and wireless modes. The wired mode is synchronized with the design of the fire water supply
Condition Monitoring of Fire Water …
595
system. Water pressure and water level sensors are installed at the most unfavorable nodes of the water supply for data acquisition, and then the state data is transmitted by the CANBus bus. Literature [1] introduces a remote monitoring system for water pressure in the fire-fighting pipe network of the oil depot area. The system sets the water pressure monitoring unit at the working point position, and transmits the water pressure status data to the monitoring platform through the wired network. The literature [2] also mentions the water pressure monitoring and application of the fire water supply system in super high-rise buildings. The wireless method is that the monitoring equipment on the network management monitoring point transmits the collected state data to the monitoring center through the wireless network. Compared with the wired mode, the advantage of the wireless mode is that it is convenient to install and use without wiring. Currently, the wireless communication networks that can be used include WiFi, ZigBee, public mobile communication network (2G/3G/4G), NB-IOT and 433 MHz data transmission network. Document [3] introduces a fire pump monitoring system based on wireless network. The water pressure data is transmitted to the designated monitoring system through the wireless transceiver module based on the nRF2401 chip. The nRF2401 is a single-chip RF transceiver chip that operates at 2.4~2.5 GHz ISM frequency band. Document [4] designs and implements a remote wireless fire hydrant water pressure monitoring system based on GPRS (2G). The system is a remote wireless fire hydrant water pressure monitoring system based on MSP430F155 single chip microcomputer. It also adopts public mobile communication network (2G) for data transmission. Document [5] introduces a collection and transmission system that uses ZigBee communication technology to transmit water system pressure data. The transmission network belongs to a private wireless local area network. From the perspective of existing wireless communication technologies, wireless communication networks that can be used for water pressure and water level monitoring are mainly classified into two categories. The first type of public mobile network includes 2G/3G/4G/5G, NB-IOT, etc. The public mobile communication network has better communication effect outdoors, but the signal quality is poor in buildings or underground spaces, and the most unfavorable monitoring points of the fire water supply system are generally located at the top and bottom of the pipe network. At the same time, the public mobile network access node has high power consumption. If the lithium battery is used for power supply, the use period is short, and the data communication fee is required for data transmission, which is a continuous investment. The second type of wireless private LAN includes WiFi, ZigBee, 433 MHz wireless data transmission technology. The advantage of a wireless LAN is that the network can be freely deployed and maintained by the user without incurring communication costs. However, the WiFi and ZigBee currently in use are relatively close to each other, usually between tens and 100 m, and the number of nodes to be deployed is large. The 433 MHz wireless data transmission technology currently only supports peer-to-peer communication, and does not support centralized star-shaped networking communication mode, and node power consumption is high, which is not conducive to widespread promotion.
596
F. Yufeng et al.
In recent years, with the rapid development of the Internet of Things technology [6], in order to solve the problem that the traditional wireless communication technologies cannot meet the wide coverage and the high cost of the public mobile communication network application such as WiFi, Zigbee, etc., the low-power wide area network (Low Power Wide Area Network, LPWAN) technology comes into being. LPWAN has the characteristics of low power consumption, long distance, low operation and maintenance cost, so it is suitable for applications in long-distance data transmission and battery-powered scenarios [7, 8]. Since 2012, LPWAN wireless communication technology has received increasing attention from all over the world. In recent years, it has become a hot research topic in the global Internet of Things [9, 10]. In the mainstream LPWAN technology solution, the LoRa (Long Range) technology proposed by Semtech has a brighter application prospect. At present, Semtech has established LoRa-Alliance with companies such as IBM and Microchip, and has gradually established an industrial ecosystem in related industries. Based on the above, this paper uses LoRa wireless communication technology to construct a wireless communication network in a building. By deploying one or more LoRa base stations, the full coverage of LoRa wireless signals in the building is realized, and the water pressure/water level acquisition and wireless connection are developed. The function of the fire water supply system condition monitoring device ensures that all the water supply pipeline monitoring points in the building can upload the data to the fire control room of the unit building in real time through wireless. The first chapter “Impact of Smart Cities on Resource Conservation Based on Big Data Analysis” of this paper gives a detailed description of the current status of fire water supply system monitoring, industry status, standard specifications, etc. The second chapter “Water Level Measurement Device” mainly introduces the relevant research progress in the field of fire water supply system condition monitoring. The third chapter “Optimization of Urban Transportation Network Path” is based on LoRa wireless networking, the fire water supply system monitoring system is realized. The fourth chapter “Identification and Early Warning of College Students’ Psychological Crisis Based on Big Data” tests the system. The fifth chapter “Application of VR Technology in Intangible Cultural Heritage Protection” summarizes the technical advantages and subsequent research directions of the fire water supply system monitoring system based on LoRa wireless network.
3 Research Work The fire water supply system is installed inside the building to provide water for various types of water fire extinguishing systems in the event of a fire in the building. Therefore, the water pressure of the water supply pipeline and the water level of the storage tank meet the requirements of the fire extinguishing system and the relevant water supply standards or specifications. It is the basic requirement for the normal operation of the fire water supply system, and it is also the key to the success of
Condition Monitoring of Fire Water …
597
the firefighting of high-rise and super high-rise buildings. The fire water supply system pipeline is distributed on every floor of the building. The relevant standard specifications require that the water pressure/water level of the most unfavorable point should be tested when the system is tested. The conventional method is based on the pipeline design diagram in the top and bottom end. Therefore, if the pressure/water level is collected and transmitted by the fire water system status wireless acquisition transmission mode, the wireless signal should be covered to cover the entire building. In terms of business requirements, there is usually no power access near the fire water system status monitoring point. The power supply of the monitoring device should be battery-powered. Therefore, the demand for low power consumption is obvious, and the subsequent maintenance cycle can be avoided. It will result cost to rise. From the analysis of the transmitted data volume and transmission rate, the fire water system status data does not need to be uploaded in real time, but the alarm prompt is given when the status is lower or higher than the predetermined threshold, and the status can be reported in a few minutes or tens of minutes when the status is normal. Compared with the existing traditional wireless communication technology, LoRa wireless communication technology has the advantage of long-distance data communication under low power consumption. It adopts technologies such as spread spectrum modulation, forward error correction coding and digital signal processing, which can guarantee low security. Based on the accuracy of rate data transmission, it has superior anti-interference ability and strong penetrating power. The terminal equipment has a high sensitivity as low as—148 dbm and a low receiving current of 9.9 mA. Due to the use of CAD channel detection technology and ADR rate adaptive technology, the working energy consumption is greatly reduced. Relevant tests show that under the condition of transmitting power consumption of 20 dbm, the measured communication distance in the underground tunnel of civil air defense project can reach 2–3 km (the wide space communication can reach more than 20 km), and can penetrate the stratum 2~3 m for normal communication. These communication performances are other wireless communication is difficult to do [11, 12]. Low-power application features make the terminal node suitable for long-term (more than one year) applications in complex unattended environments, while use spread-spectrum frequency and hopping communication technology, in frequency hopping or by spreading factor (6~12) multiple virtual channels can reduce mutual interference and can effectively improve data transmission efficiency. Therefore, this paper applies LoRa wireless communication technology longdistance, low-rate, large-scale networking communication application characteristics, and builds a fire water supply system monitoring system based on LoRa wireless network (Fig. 1).
598
F. Yufeng et al.
Fig. 1 Schematic diagram of the fire water supply system status monitoring system
3.1 System Design It can be seen from the above figure that the fire water supply system based on LoRa wireless local area network has the functions of pressure sensing monitoring and wireless LoRa data transmission. It consists of a fire water supply system status monitoring platform, a LoRa wireless base station, a fire water supply system condition monitoring device and a water supply pipeline located in the fire control room of the unit building. In a specific implementation, one or more LoRa wireless base stations need to be deployed in a building to implement signal coverage of a wireless LoRa local area network inside a building. A pipeline tee joint is installed at a portion of the water supply pipeline to be monitored, and the tee joint is connected to the fire water extinguishing system monitoring device, and the device automatically obtains the pipe network pressure of the monitoring point, and sets the upper and lower thresholds of the pipe network pressure, usually The status data is uploaded to the LoRa radio base station according to the established period. Once the status data is lower than the lower threshold or higher than the upper threshold, the status data is uploaded to the LoRa radio base station in real time, and the LoRa radio base station transmits the collected information to fire water supply system status monitoring platform in the fire control central office (Fig. 2).
3.2 Monitoring Terminal Design The fire water supply system status monitoring terminal designed in this paper adopts Semtech sx1255 module. The pressure monitoring module is used for real-time monitoring of pipe network pressure. The CPU control module compares the collected
Condition Monitoring of Fire Water …
599
Fig. 2 Schematic diagram of the status monitoring terminal of the fire water supply system
pressure data with the established upper and lower thresholds, and lowers or exceeds the threshold to alarm. At the same time, the pressure monitoring data is reported according to the reporting period, and the status indicating module prompts the network connection status, the power status and the working status, and the lithium battery pack is used to independently supply power to the terminal. The circuit design of the fire water supply system condition monitoring terminal is shown in Fig. 3.
3.3 流程设计Process Design The data collection and transmission process of the fire water supply system status monitoring terminal is shown in Fig. 4. The reporting period can be set by itself, and the power saving should be set on the basis of meeting the system business requirements.
600
F. Yufeng et al.
Fig. 3 Circuit diagram of the status monitoring terminal of the fire water supply system
Fig. 4 Fire water supply system status monitoring terminal data acquisition and transmission process
4 Experiments Based on the fire water supply system condition monitoring system designed in this paper, the water pressure monitoring transmission experiment is carried out in a building. The purpose of the experiment is to test the actual operation of the system. The test items include communication distance, bit error rate and communication energy consumption. The experimental scene is a commercial building with a height of 24, 3 underground and 21 floors above ground, each with an area of 120 × 80 m2 .
Condition Monitoring of Fire Water …
601
Table 4.1 Test results of different nodes in the building Test point
Floor
Distance (m)
Data pack
Packet loss rate
Average field strength (dbm)
Positive south 1
3
150
100
0
−58
Positive south 2
10
180
100
0
−75
Positive south 3
16
200
100
8
−96 −113
Positive south 4
21
220
100
22
Positive south 5
−1
160
100
0
−62
Positive south 6
−3
170
100
24
−126
The experimental equipment configuration parameters are the following, LoRa radio base station frequency is set to 470 MHz, frequency division factor 9, bandwidth 125 kHz, coding rate 4/6, transmission power 15 dBm. One LoRa wireless base station is deployed and deployed on the outer wall of the third floor. The test data is shown in Table 1. From the experimental results analysis, the communication effect in the building is better, at least can penetrate 3 floors, the data transmission accuracy is more than 70%, it can be seen that LoRa wireless communication has a good and stable communication effect. The actual test monitoring terminal sleep current is less than 120 µA, the emission current is less than 150 mA, and the receiving current is less than 35 mA. According to the lithium battery capacity configuration of the terminal, according to the current pressure data collected every 10 min, the monitoring terminal can theoretically work for more than one year.
5 Conclusion The fire water supply system status monitoring system designed in this paper adopts the LoRa wireless transmission mode. By deploying the LoRa wireless base station in the building, the pipe network pressure and the tank water level of the fire water system in the building are collected, and the data is wirelessly uploaded to the unit building fire control room in real time. Compared with the existing GPRS, 3G, 4G public mobile communication wireless transmission methods, the wireless transmission mode has the characteristics of stable transmission, and the data cannot be uploaded due to the signal coverage blind spot of the public network. At the same time, because it is the architectural mode of the private network, it will not generate data communication costs in the subsequent use process, so it is economical and efficient. In the future, project team will continue to improve the fire water supply system status monitoring system, especially the system is applied in different buildings, collects data through actual operation, tracks the system performance and continuously to improve.
602
F. Yufeng et al.
Acknowledgements Funding: This work has been supported by The National Key R&D Program of China during the 13th 5-year Plan Period (2017YFC0806607). Conflicts of Interest: The authors declare no conflicts of interest.
References 1. Tao, Wen, and Li Jian. 2014. Remote monitoring system for water pressure in fire protection pipe network in oil depot area. Instrumentation Electric 9: 75–76. 2. Zhang Zi Cong. 2017. Application of intelligent fire fighting system in super tall buildings. Engineering Technology Research (7). 3. Li Yan Long, and Li Shen Shan. 2017. Research on fire pump monitoring system based on wireless network. Journal of Shijiazhuang Railway University: Natural Science Edition 30 (2): 72–76. 4. Liao Ren Xiu. 2015. Remote temperature wireless fire hydrant water pressure monitoring system based on GPRS. Journal of Jinhua Vocational and Technical College 15 (3): 55–57. 5. Liao Yi Jiang, Jie Jia Jia, Chen Rui Di, and Xu Pei Long. 2012. Real-time monitoring system for fire protection water pressure of remote buildings based on Internet of Things technology. Automation & Instrumentation (9): 16–20. 6. LORA Alliance. 2017. LoRa Alliance TM Technology [EB/OL]. https://lora-alliance.org/ resource-hub/what-lorawantm, December 24. 7. Sergio, B.M., B. Boris, A. Toni, et al. 2017. Multi-hop communication in the uplink For LPWANs. Computer Networks 123 (123): 153–168. 8. Kim, D.Y., S. Kim, H. Hassan, et al. 2017. Adaptive data rate control in low power wide area networks for long range IOT services. Journal of Computational Science 22 (22): 172–178. 9. Augustin, A, J.Z. Yi, C. Thomas, et al. 2016. A study of LoRa: Long range & low power networks for the Internet of Things. Sensors 16 (9): 1466–1484. 10. Haxhibeqiri, J., F.V.D. Abeele, I. Moerman, et al. 2017. LoRa scalability: A simulation model based on interference measurements. Sensors 17 (6): 1193–1218. 11. Hao, Zheng. 2017. Implementation and application of LoRa technology in low-power wide-area networks. Information and Communication Technology 1: 19–26. 12. Liu Yan Jun. 2017. Design and implementation of terminal test system based on LoRa base station. Wuhan: Wuhan University of Engineering.
Fan Yufeng (1979–), male, Chifeng City of Inner Mongolia, Master degree postgraduate, Associate researcher, got master degree of electronic and information engineering of Dalian University of Technology in 2009, and is engaged in fire protection communication and fire protection geo information research. Yang Du (1983–), male, Shenyang city of Liaoning, Bachelor’s degree, Associate researcher, got bachelor’s degree of computer application of Harbin Institute of Technology in 2007, and is engaged in fire protection communication and fire protection geo information research. ShuFeng Yang (1984–), male, Assistant Researcher, got Master degree from the Northeastern University in 2010, engaged in Fire Communication Technology and Fire IOT Technology research.
Application Design and Implementation of Intelligent Bracelet in Wisdom Campus Construction Lingling Gao, Wenjia Luo and Laifeng Tang
Abstract This paper proposes the application of wearable Band in the construction of wisdom campus based on the existing technology of Internet of Things in the university. From the design and implementation of the applicable functions of the intelligent bracelet in colleges to the coverage of application scenes, the analysis, design and implementation have been carried out, and good expectations have been achieved in the functional implementation of personnel information positioning, attendance, health and movement step counting on the wisdom campus, which is worthy of further promotion and application. Keywords Wisdom campus · Netty technology · Sensor technology
1 Introduction Wisdom campus refers to a intelligent campus work, study and life integration environment based on the IoT. This integration environment takes various application service systems as carriers and fully integrates teaching, scientific research, management and campus life. Nowadays, the construction level of wisdom campus has become one of the important factors that reflect the comprehensive strength of the school, and is an important indicator to measure the comprehensive strength of teaching and scientific research and the modernization level of the school. Wisdom campus is a systematic project. According to the information construction of many universities investigated by the author, the overall level is generally not high. On the one hand, as the information construction process in existing universities is generally progressing step by step, there is a common feature that multiple L. Gao · W. Luo · L. Tang (B) Department of Intelligent Technology, Tianfu College of Swufe, Mianyang, China e-mail: [email protected] L. Gao e-mail: [email protected] W. Luo e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_72
603
604
L. Gao et al.
subsystems are constructed at different times and the degree of information sharing among various systems is not high. For example, the student attendance system and the teacher attendance system are relatively independent, and the functions of the personnel identification entrance guard system are relatively scattered. On the other hand, the information collection in the campus environment involving work, study and living is not comprehensive enough and the current implementation method is not perfect enough. Take the one-card card used by students as an example. At present, most college students still use IC cards, which are generally used as canteen meal cards, examination cards and library cards. They need to be carried by students and easy to wear and tear. Once lost, they are not easy to find. Therefore, at this stage, comprehensive information collection and easy integration need to be taken into account when formulating the required functions in the construction of smart campus. In horizontal high speed development of modern science and technology, all kinds of intelligent wearable devices has become a lot of people are essential to life [1–3], gradually change the way people work, greatly improve the work efficiency, and the corresponding functions such as signs and positioning information, personal data acquisition is also very perfect. Therefore, research on intelligent wearable devices intelligent bracelet in colleges and universities will of great value for the application of space, and play a positive role in construction of wisdom campus, has broad prospects and research practical significance. This article, through the custom staff attendance in intelligent hand ring, positioning, management of college students, sports measurement and health application aspects of function, the asynchronous communication based on Java NIO web framework Netty framework for data collection, data storage is realized by using Redis distributed cache server framework structures and Spring MVC technology [4], is given a set of feasible intelligent bracelets on campus application system implementation scheme.
2 System Design In this system, multiple sensors are built into the bracelet worn by students to obtain the wearer’s position data, health data and movement data, etc., and the smart campus data collection and processing and corresponding platform construction are completed by combining with the actual university application scenarios. According to the system analysis, the following business processes should be included in the design of smart bracelet for the construction of smart campus (Fig. 1): (1) User static information collection: in the part of business data layer, it is necessary to store the wearer’s basic personal information in the background database, and collect the corresponding wearer ID information, so as to facilitate the later data analysis and processing.
Application Design and Implementation …
605
Fig. 1 Systems business flow chart
(2) Real-time collection of user dynamic information: according to functional requirements, the following data collection modules need to be integrated into the intelligent bracelet: • position data: it includes the acquisition of students’ position information and the supplementary transmission of blind spot data, and the map trajectory is drawn through geographic information to achieve the functions of attendance and safety management for wearers • health data: the health management of college students is realized by collecting real-time and interval physical signs data of students, such as heart rate, body temperature, blood pressure and even sleep data, as well as reference information of students’ physical and emotional changes in response time • sports data: a preliminary intelligent body measurement data platform for college students is built on the basis of sports data of college students • customized data: data mainly reflecting humanistic concern for students, such as sedentary reminder, eye reminder, etc. (3) Background server data transmission: various data collected based on the bracelet need to be synchronized to the background server for subsequent data analysis and processing.
3 System Overall Architecture On the basis of J2EE Multi-tier Web framework, the system architecture is divided into four layers, which are composed of user layer, application layer, data layer and infrastructure layer. As far as wireless communication is concerned, the currently adopted wireless standards are IEEE802.11b [5], HomeRF [6] and Bluetooth [7]. However, the transmission rates are 11 Mbps, 2 Mbps and 1 Mbps, and it is unrealistic to transmit image data of the location. Therefore, the system mainly transmits digital information such as location and number of steps.
606
L. Gao et al.
(1) User layer: The system is aimed at students, teachers, logisticians and system administrators. (2) Application layer: This layer includes user management, motion data management, health data management and other background management, as well as information query and maintenance management for user access. Hand ring data uploaded to the server, need to be displayed through the front-end interface for content display, convenient for administrators to query, so need supporting interface display function. (3) Data layer: This layer mainly stores all kinds of data reported by the bracelet, including location data, user information data, health data, sports data, etc. This layer is through the establishment of the relevant database in the background, the storage of reported data, through the analysis and comparison of data, data analysis conclusions. Because of the need of concurrent users, the traditional IO can not afford a large number of concurrent users access. Therefore, system transmission also needs to consider the security of data transmission and network congestion caused by mass data transmission. (4) Infrastructure layer: This layer is the guarantee of high-speed operation of the system. Infrastructure includes servers, operating systems, etc.
4 Technologies of System Implementation 4.1 Hardware Design of Intelligent Bracelet According to the business requirements of the system and the supporting technology architecture, the intelligent bracelet system used in the construction of smart campus should include the following basic functional modules, and finally determine the following hardware design and implementation scheme: (1) Attendance and positioning function: GPS module is built in the bracelet, which can report the wearer’s position data in real time and punch in the attendance and location information according to the location data. (2) Step-counting and achievement testing function: Three-axis accelerometer is built in the hand ring. The movement of the wearer is judged by the detection of the acceleration of the hand ring, and the performance of the wearer’s planned task is finally obtained by drawing the wearer’s behavior trajectory. (3) Health data acquisition function: Inside the hand ring, a heart rate-based sensor can detect the wearer’s real-time heart rate, sleep and other data.
Application Design and Implementation …
607
4.2 Definition of Hardware Data Acquisition Interface The system integrates several modules inside the bracelet to realize various data acquisition: internal integration of GPS module to support positioning information reporting and blind spot re-transmitting; built-in three-axis acceleration sensor based on statistical data, through compensation algorithm to calculate heart rate, blood pressure and other data; built-in buzzer to complete business reminder and sedentary reminder functions. For power saving purposes [8], when reporting location data, the bracelet considers that it can carry data for one-time reporting. Therefore, the bracelet reporting data content interface is defined as follows, while reporting location, step-counting data, sleep quality data, etc., the specific interface is limited as follows: • Position data, step-counting data: [UD* command number, date, time, GPS positioning validity, latitude, N, longitude, E, speed, direction, altitude, number of satellites, signal strength, power, counting steps, number of sleep flips, hand ring, CDMA system identification code, CDMA network identification code, CDMA cell unique identification code, signal strength] • Heart rate data: [UD* command number, heart rate value] • Emergency call: [UD* command number, emergency distress number].
4.3 Network Communication Framework Considering the needs of concurrent use of users, this system adopts the Java framework Netty based on TCP, which is an asynchronous event-driven network application framework and tool for the rapid development of maintainable high performance and high scalability protocol server and client [9] for data interaction between the server and the bracelet (Fig. 2). In the information interaction process as shown in the above figure, after socket between a bracelet end and a server end is established, the thread will not block to accept the Socket like BIO (blocking IO), but will send the request to Selector, who will continuously traverse all Sockets and pay attention to the previously registered Channel. Once the socket is established, the thread will directly call CN Anne’s Pipeline process and return to the client after the process is completed. Using this event-driven mode can support a thread to process more requests [10]. Some setup codes are implemented as follows: Channel initialization section: protected void initChannel(SocketChannel socketChannel) throws Exception { socketChannel.pipeline().addLast(“handler”, new HttpHandler());} The main program running part: EventLoopGroup bossGroup = new NioEventLoopGroup(); EventLoopGroup workGroup = new NioEventLoopGroup();
608
L. Gao et al.
Fig. 2 Netty NIO timing diagram of server-side communication
ServerBootstrap b = new ServerBootstrap(); b.group(bossGroup,workGroup); b.channel(NioServerSocketChannel.class); b.childHandler(new HttpChannelHandler()); Channel ch = b.bind(16166).sync().channel(); ch.closeFuture().sync();} bossGroup.shutdownGracefully(); workGroup.shutdownGracefully();} Using Netty technology, multiple student user data can be uploaded simultaneously with high performance and without high concurrent pressure.
5 System Operation Effect The system acquires the wearer’s position information, blood pressure and heart rate data, movement meter data, Sleep data through a plurality of modules built in the hand ring, and realizes the server-side reporting of test data, and supports the query and display function on the web side. It can be seen from the system test results that: • The research on the application platform of Smart bracelet in the construction of wisdom colleges and universities shows that the existing technology is relatively mature, and the architecture that divides the user layer, data layer, application layer and basic setting layer into four layers is relatively easy to implement. The wearer’s
Application Design and Implementation …
609
Table 1 Bracelet update message Message interface definition
Actual test result data
Position data, step-counting data: [UD* command number, date, time, GPS positioning validity, latitude, N, longitude, E, speed, direction, altitude, number of satellites, signal strength, power, counting steps, number of sleep flips, hand ring, CDMA system identification code, CDMA network identification code, CDMA cell unique identification code, signal strength]
[YS*86015702779726*0003*UDCDMA, 050818,195854,A,31.49567783,N, 104.6853888,E,1.850000023841858, 6.2,498.0,28,-95,86,795,0,00000000, 1,255,460,11,40711,167269425,-95,0] Position data: Latitude: 31.49567783 Longitude: 104.6853888 Step-counting data: 795
Heart rate data: [UD* command number, heart rate value]
[YS*86015702779726*0003*HEART,79] [YS*86015702779726*0003*HEART,78] [YS*86015702779726*0003*HEART,79] [YS*86015702779726*0003*HEART,77] Heart rate data: 79、78、79、77
Emergency call: [UD* command number, emergency distress number]
[YS*86015702779726*0012*CENTER,130*******] Emergency call:130*******
data is collected through the bracelet and transmitted to the background server through the wireless network. After the server data is stored and the collection effect is displayed through the web interface, the test data can be clearly seen in real time. • Through the Smart bracelet test, it can be seen that the wearer’s position information, such as Table 1, can be reported and obtained in real time. Using student information to locate and further checking attendance through individual movement tracks can provide powerful assistance for attendance checking of teachers. This kind of Smart bracelet has a wide market in colleges and universities. • Intelligent bracelet is more easily accepted by teachers and students in colleges and universities due to its combination of sports and health data and portability, which is in line with the expectation of the pre-research function and can be considered for promotion on campus in the later period.
6 Summary and Prospect With the continuous improvement of education informatization level, the construction of “wisdom campus” is also warming up year by year. This paper, through the research on the construction of Smart bracelet in colleges and universities, gives a feasible technical framework and pre-research, and gives a set of feasible system implementation scheme of Smart bracelet in campus application, which is conducive to promotion in the construction of smart campus.
610
L. Gao et al.
Acknowledgements This work is supported by the Education Department of SiChuan Province scientific research project “Research on the Application of Intelligent Wearable Equipment in the Construction of Wisdom Campus” (18ZB0588).
References 1. Knoblauch, M. 2014. The history of wearable tech, from the casino to the consumer[J/OL]. www.Mashable.com, May, 13. 2. Badcock, N.A., P. Mousikou, Y. Mahajan, et al. 2013. Validation of the Emotiv EPOC. EEG gaming system for measuring research quality auditory ERPsfJ/OLD. https://emotiv.com/. 3. Levy, S. 2012. Google Glass[J/OL]. https://www.google.com/glass. 4. Chen, R., X. Jiang, X. Ding, et al. 2012. The design and development of an enterprise invoicing system based on SSH framework. In Proceedings of 2011 international conference in electrics, communication and automatic control proceedings, 537–542. 5. IEEE Standard for Information Technology, Part 11[DB/OL]. http://standards.ieee.org/ getieee802/download/802.11b-1999_Cor1-2001.pdf. 6. Myers, Eamon. HomeRF Overview and Market Positioning[EB/OL]. http://www.palowireless. com/homerf/homerf.asp. 7. Specification of the Bluetooth System, version 1.1[DB/OL]. http://www.bluetooth.org/docs/ Bluetooth_V11_Core_22Feb01.pdf. 8. Rice, J., T. Waters, and J.C.J. Krajcov. 2014. Wearable power management system. U. S. Patent 8,796,888, 5 August. 9. JBoss. Netty project[CP/OL]. 1 April 2012. http://netty.io/. 10. Jfarcand. The Async Http Client[CP/OL]. 16 March 2012. http://sonatype.github.io/async-httpclient/.
Development and Implementation of Education Information Platform Based on Cloud Computing Qiang Han
Abstract In the development of teaching system cloud service, loosely coupled mode is a relatively advanced development mode, which can be used to develop cloud computing teaching system. Loosely coupled development mode keeps sharing and cooperation among various teaching systems, but only data and information are shared among each teaching system, and only some data and information are released through a certain way, all tasks are limited. It is handled by a teaching system. Assuming that a teaching system can’t handle the user’s request, loose coupling can only transmit the request to another teaching system for processing. This development model can reflect the independence and integrity of each system module, and is conducive to the realization of the function module and the overall goal of the teaching system. The developer of the teaching system can make it possible. With the relevant program language and system framework, the application of various teaching systems can be developed, and the system can be linked and seamlessly connected between loosely equipments and networks. It is beneficial for users to obtain the data and services of the teaching system in the cloud through browsers or other ways of obtaining information, realize the sharing of teaching resources, avoid duplicate development and reduce unnecessary waste. Keywords Cloud platform · Integration of resources · Teaching system
Q. Han (B) Education Technology and Network Center, Jilin Engineering Normal University, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_73
611
612
Q. Han
1 Introduction 1.1 Background and Significance of the Paper 1.1.1
Background
With the growing popularity of the Internet and the continuous improvement of user information literacy network, network services put forward higher requirements. Internet need to handle large amounts of data every day, the face of such heavy data processing tasks, how to quickly and easily process the data [1], to provide users with a more personalized web service. Network development becomes a problem need to be resolved. In the process of informatization of higher education development, affected by factors of location, network transmission rate, the server’s data processing capability, resulting in a higher education information platform can not meet the needs of teachers and students learning, information and resources can not be effective sharing and other issues. These problems become the bottleneck of information technology college education. We need to urgently seek a new technology to solve these problems. In this background of the demand, resulting in a new network computing modelcloud. Cloud computing is based on distributed computing, user-centric, data stored in the sea of clouds, the user can at any time (Anytime), anywhere (Anywhere) with a convenient way to get information securely or share with others computing model. Cloud computing allows Internet becomes everyone’s data storage center, data center computing. Emergence of cloud computing, allowing users to the desktop as the core, transferred to a Web-centric, network storage and use network services. Cloud computing lead us into a new era of information—the cloud era. Ubiquitous Information Service in University campus, teaching and research environment for innovation-demand services, the integration of educational resources and a better application experience, constitute the user to pursue the new era of information technology in higher education. Campus network infrastructure after years of effort, has become the most solid education information bearing platform. Campus Card, a variety of video surveillance applications, expand IPv6 IP address, voice telephone, video conferencing, distance learning, online teaching and so on are built on this platform. A campus, a network integration of network and strengthen the integration and sharing of information technology education college. On this basis, cloud computing and virtualization and other high-tech start growing interest of universities, colleges and universities across the next development of educational information, it will be the basis of the current network from the core to the cloud computing concept of “service delivery” into [2].
Development and Implementation of Education Information …
1.1.2
613
Research Status at Home and Abroad
Cloud computing applications in the field of education is increasingly being valued by the people, but in the application of different countries. Cloud computing has a place in Britain’s schools. Many UK higher education institutions, for example, Leeds Metropolitan University, University of Glamorgan, University of Aberdeen, University of Westminster, University of London, Royal Institute of Technology, utilize the Google program. Pike County, Kentucky will cloud computing applications to the school district has 10,200 pupils [3]. Pike County platform selected IBM reseller ICC technology management. Cloud services platform, the original Pike County outdated abandoned in 1400 in the warehouse computer into a virtual machine capable of functioning. Because cloud services do not need a local computer with a hard disk, this conversion becomes possible. In a cloud environment, the processing performed at the server level instead of the local computer level. Local computer is print terminal apparatus, and the reception processing capacity of the server software coming from. In this way, Pike County in the next five years is expected to be able to save half of IT expenses. Because of the use of IBM data center, Pike County can further reduce hardware costs and personnel costs servers [4]. Africa also welcomed the cloud. Africa has a lot of educational institutions chose cloud computing services, select the main driver of cloud computing comes from the incomplete IT infrastructure and no money to update the software and hardware equipment. Education in Africa to develop enterprise cloud market to Google and Microsoft representatives. Google developed the education market in eastern Africa quite successful. For example, Google has a partnership with a number of East African educational institutions to provide Google’s cloud computing services for these schools. These schools include National University of Rwanda, Kigali Institute of Education, Kigali Institute of Science and Technology, University of Nairobi, Kenya Methodist University and the University of Mauritius. Google has provided service Gmail, Google Calendar, Google documents. Achieved thanks to the cooperation of the World Bank’s support for these universities broadband services (Wanjiku, 2009). Microsoft has provided 250,000 laptop computers equipped with Microsoft’s Azure cloud platform for Ethiopian teachers. These computers allow teachers to download curriculum, teaching records, the student information transmitted through the education system, eliminating the need for additional expenditures to establish a system of hardware and software support.
614
Q. Han
2 Requirements Analysis 2.1 System Functional Requirements University science portal system based on cloud computing platform will be based on the role of the main face of division, personalized portals for different roles, including leading users, teacher users, student users, administrators and other user roles, and has the following features: 1. Infrastructure Needs-based Teaching System of Cloud Computing Cloud platform includes a management server, production server, storage, network management, production network, and storage networking. a. Self-Service Functions Cloud-based teaching platform includes a comprehensive self-service system, provide users with automated customer support resource platform, and can submit a service request online, communicate directly with the customer. Through this selfservice system, users can self-service systems, remote management and maintenance of the purchased goods and services. Self-service platform also implements a unified user resource management, user regardless of the distribution of resources on which cloud computing node, Management and maintenance can be carried out in a unified WEB page. Dynamic cloud solution is self-service portal to show through. Since the program uses a standard Web Services interface, self-service portal can be achieved using different languages and technology platforms. In the default scenario we were used ASP.NET and Silverlight implemented in two ways. b. Resource Management IDC cloud resource management key management platform core resources, including accounts, privileges, image files, virtual machine, network configuration, storage configuration, hardware and software as well as license and so on. This feature can be achieved by System Center Configuration Manager asset management functions. c. Resource Service Resource service module provides encapsulation of resource pool resources, and packages the underlying resources into services, including data acquisition, monitoring and alarm, software deployment, application migration, backup and recovery sub-modules. We will use System Center Operations Manager (SCOM) to monitor the whole system and collect data, aggregate and generate reports. SCOM can collect data from the following infrastructures:
Development and Implementation of Education Information …
615
d. Backup and Recovery The overall backup/restore management of servers is also an important part of server management. Server backup should include two levels: application level data backup/restore, system state backup/restore. Based on Microsoft System Center Data Protection Manager (SCDPM), backup/recovery at application level and system state level can be realized comprehensively. e. System Management The cloud computing platform of this scheme will use several servers to carry the system management functions of all platforms, including the operation and maintenance operations of the whole cloud platform, servers and client computers. But in addition to the operation and maintenance of these resources, hardware and software equipment, the management of the system management module itself is also extremely important. Ensuring the normal operation of the system management module is a very important part of the IT architecture. As a support for the whole business platform and application platform, it must be more reliable and sustainable operation and maintenance to ensure its smooth operation. The operation of the system management module includes: server change and configuration, server operation and maintenance monitoring management, server backup/recovery management. 2. Demand for Services Based on Cloud Computing System of Teaching a. Unified Identity Authentication, Authorization In the cloud-based teaching system, for information systems and user authentication and rights management is a very important part. For in the “islands of information” state information system, user authentication and rights management is self-managed by the system, with the increase of the system, users need to remember multiple user names and passwords systems, system administrator the same need to manage different user identity information in different systems, from the overall framework, a new generation of campus network security system needs to establish a centralized and unified independent of the application system user authentication and rights management mechanisms to achieve safe and efficient user identity and rights management. b. Data Exchange After years of building the campus network education platform, many schools, educational authorities have begun to take shape helps to establish application system of teaching, research and administration, but with the level of information depth, encountered a general question: “islands of information” [5] which restricts educators, resulting there are two reasons for this: (1) when building applications, the lack of the concept of the overall structure, the functional departments each a “war” independent construction; (2) at different times each application system construction,
616
Q. Han
construction personnel on a variety of different techniques will inevitably lead to the coexistence of applications in a variety of technical architecture built. Therefore, the establishment of data exchange platform imminent, must have a data exchange platform interoperability, scalability, high availability and security [6]. None of the applications are isolated, living in institutions as a service-oriented environment, a single system can be integrated into the overall business process efficiency. Microsoft BizTalk 2010 to achieve this goal exist. His specific functions are: a new application platform support; new Hyper-V virtualization support; improved failover clustering; new WEB Service registration; new LOB adapter; enhanced host systems integration; enhanced business activity monitoring; enhanced Education customer service bus ESB guide; strengthen support for EDI and AS2 protocols and so on.
2.2 Teaching System Based on Cloud Computing Resources Required Unified Communications needs to provide rich functionality to meet different scale building needs of the mail system, and control the deployment, management and effective control with a powerful message on the spread, can help organizations avoid the risk, should specific features are flexible and reliable, according to the organization business conditions, the flexibility to customize deployment, from single to the cluster, from distributed to centralized, supported by the vast storage, mobile office; can support users from all platforms, WEB browser, mobile device, PC secure access to all communications, real-time communication, users can easily find instant online teachers and students, colleagues, and with the security of real-time communication. 1. Teaching Materials Teaching materials contain a large amount of educational information resources, able to create certain kinds of information resources educational value. Information technology education information materials are defined by a variety of teaching materials exist in a digital form, including a variety of digital material for teachers and students in the learning and teaching process needs, educational software, supplemental materials, and so on. 2. Support System Refers to a support system to support the learner learning effective internal and external conditions, including support, support information support device, the support personnel to learn the energy and the like. Support system uses a software-plusservices model structure. “Software + Services” can be simply described as two modes: a. Software architecture model itself is software plus services. For example, antivirus software deployed within the enterprise itself, but antivirus software virus
Development and Implementation of Education Information …
617
database update service is carried out through mutual network, that is taken from the “cloud” b. Part of the education system Teaching built by himself and partly leased from a third party to obtain services from the cloud. 3. Teaching Environment Teaching environment is not only refers to the location of the teaching process occurs, more importantly, means that learners and teaching materials to support the process of interaction between atmosphere system formed, characterized in that the main way to interact and exchange effects brought about. Teaching environment is the use of teaching resources for the user’s specific learning contexts, reflecting the composition of all kinds of resources, interactions between the various elements, is to recognize the concept of learning resources relational perspective.
3 System Architecture 3.1 The Overall Logic Architecture Platform Based teaching system using the cloud is the cloud of IDC solutions. These include self-service functions, service life cycle management, resource management, resource services, security management, and external interfaces and other functions [7] and [8] 1. Self-Service Self-service function refers to freedom of choice to provide services, the user can select a different university services based on actual business needs, such as computing resources can select the operating system, processor power and memory size according to. 2. Service Lifecycle Management Service Lifecycle Management is a directory listing application combination supported by IDC resources (packages) for the current IDC cloud platform. Service Catalog Management provides administrators maintain operation of a service catalog. 3. Resource Management Resource management refers to the management of the resources of the main IDC cloud platform manages core resources, including the account number, Rights, image files, virtual machine, network configuration, storage configuration, hardware and software as well as license and so on.
618
Q. Han
4. Resource Service Resource Service refers to an operation of the resource pools package, packaged into the underlying resources and services, including data acquisition, alarm monitoring, software deployment, application migration, backup and recovery submodule. 5. Safety Management Security management refers to the relevant safety unified management, including: user management, access authentication, security auditing, vulnerability management, patch management, security configuration management, security event management, resource pool security control. Dynamic cloud computing platform is designed to pursue standardization, openness, completeness, robustness, flexibility, monitoring/traceability, safety, operation and maintainability requirements, while adhering loosely coupled, modular, reusable the principle configurable to B/S architecture design and maintain scalability, providing customers with measurable service standards. And using Java.NET and other development platform for development, based on the above requirements, provide the following dynamic architecture cloud computing platform.
3.2 Cloud Computing Platform’s Core Management Module Software Architecture Dynamic data center core management user self-service module and platform management module, is the main function of the data center management: system monitoring, virtualization management, data backup, configuration management, identity management to Web Service way packaged into modules, call mature product the main functional components of system Center and the FIM, to achieve highly scalable systems management. In addition, IBM Tivoli, BMC Patrol, NetIQ and other manufacturers to integrate systems management software in the IT management process level by System Center Opalis and HP Open View, form a unified operation monitoring system. Give full play to the existing operational monitoring software functions into full play the original investment [9].
3.3 Construction of Teaching System Cloud Architecture In the cloud computing model, the first school to transform existing information systems and service-oriented packaging, building new applications and data center service model, build a support system of teaching cloud architecture.
Development and Implementation of Education Information …
619
Cloud computing Teaching Resource Integration program mode, all resources are as user “cloud services” provided to colleges and universities teaching resources, users can use the “cloud services”, at any time, any place, learn some aspects, open a terminal can be a mobile phone, PDA or laptop computers and any other access network. See your instant electronic lesson plans, teaching videos, books and a variety of electronic resources, at any time into the simulation environment simulation experiments particular aspect. All data is stored in the cloud, users can take advantage of these resources anytime, anywhere. Solving teaching resources between universities can not fully share. Solve the lack of resources, teaching resources uneven distribution problems, reduce resource construction of university teaching information and maintenance costs, improve utilization of existing educational resources, avoid duplication and the same resources [10], frame-based teaching system of cloud computing.
4 System Network and the Control Flow 4.1 Cloud Based Teaching System Required Software and Hardware 1. Hardware Configuration Required teaching system based on cloud computing hardware includes three physical servers, respectively, a SCDPM backup server and two SQL Server cluster [26]. Three are doing server management system; other 2 do clustered SQL Server, the last station to do DPM (Data Protection and Disaster Recovery), the mounting system and software configuration steps as follows: a. Use of a temporary PC, and Windows operating systems, with the establishment of a Hyper-V virtual machine; built Active Directory (AD) server on a virtual machine. b. 6 physical servers, install Windows Server OS operating system. c. Installed on two physical machines Microsoft SQL Database Server, and configure two SQL Database Server to create and configure the database Cluster; install DPM (Data Protection and Disaster Recovery) software package on another physical machine. d. Mounted on the other three physical machines Hyper-V, subsequent management software package to create the required virtual machine; and these three virtual machines is configured to Cluster. e. The Active Directory server migration from a temporary to a PC more than one management server. f. Install and configure the Domain Controller (DC), System Center, DDTK and other cloud management platform software package on the management server.
620
Q. Han
g. Created on the Virtual Machine Manager server for all modules, including SCCM, SCVMM, SCOM; installation DDTK set of development tools, Opalis, Service Manager, FIM safety systems, ISS and other packages. h. In the SCCM and the SCVMM module available, the user can set about establishing a virtual machine resource pool. 2. Software Configuration According to computing power and application of the scale of the program, configuration Table 1: Table 1 Software configuration Category
Product
Description
Cloud computing virtualization level station
Windows server 2008 R2 teach Yu client version
Management platform operating system
Windows server 2008 R2 teach Yu client version
Application platform operating system (Hyper-V server)
Application platform
SQL server 2008 R2 customer education User version
Management Platform
SCVMM 2008 server
Virtual host service, the client’s configuration management
SCOM2007 server
Provides server monitoring and management
SCCM2007 server
The system provides asset management, software distribution, patch the tubeReason
SCDPM2007 server
Provide automatic operating system, SQL server’s backup/restore
SMSE System management suite licensing education customers Version
contain: SCVMM, SCOM, SCCM, SCDPM Total grant access to four management platform licensing
SCOM2007 client management license
Monitor server access permissions
SCCM2007 client management license
Server configuration manager access permissions
SCDPM2007 client management license
Backup data access permissions
Development and Implementation of Education Information …
621
4.2 Cloud Computing Management Platform Deployment After the cloud computing platform to build phase is complete, each component of the cloud computing platform can work independently. But then cloud computing platform is still just out of a loosely coupled stage, there is no integration at all. To accomplish any of a simple business operations might take on a different platform, in a different way in the underlying transport manually, the call management system through the interface, the respective fragmented assembly together. Thereon a processing engine of business processes, the integration of a series of operations into a set of atomic business operation is completed, the operation such as the new virtual machine and the like. This series of actions will be integrated into a unified user interface, presented to administrators of cloud computing platform and end users. After authentication cloud computing platform, users can monitor and operate its authorized resources through this interface, complete. The administrator has a higher operating level, it can also, for the entire cloud computing platform under the resources to monitor, manage and aggregate information and other operations through this interface.
5 Summary The use of cloud terminal instead of the traditional PC as a network terminal classroom of students to complete the goals of higher education information construction industry, by virtue of lower cost, easy to deploy less time to complete access to the system. College network classroom students and teacher machine concentrated dryer, directly connected by one or more switches, the terminal can use pattern deployment cloud computer network classroom. Teacher play cloud server machine selects students with a machine selects cloud terminal, without changing the existing cabling system and network architecture, deployment, low cost and easy to implement. In addition, the cloud server using Windows family of operating systems, network classroom teaching project courseware are mostly Windows operating system-based design, simply install the appropriate educational software on the cloud server, the teacher machine, a large number of cloud users, you can independently access to courseware, teaching network structure more clearly uncertain, post management and maintenance is much easier.
References 1. Quan, Chen, and Deng Qian-ni. 2009. Cloud computing and its key techniques. Journal of Computer Applications 9: 2563–2566. 2. Feng, Deng-Guo, et al. 2011. Study on cloud computing security. Journal of Software 22 (1): 71–83.
622
Q. Han
3. Marston, Sean, et al. 2011. Cloud computing—The business perspective. Decision Support Systems 51 (1): 176–189. 4. Gubbi, Jayavardhana, et al. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems 29 (7): 1645–1660. 5. Low, Chinyao, Yahsueh Chen, and Mingchang Wu. 2011. Understanding the determinants of cloud computing adoption. Industrial Management & Data Systems 111 (7): 1006–1023. 6. Hashem, Ibrahim Abaker Targio, et al. 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems 47: 98–115. 7. Ercan, Tuncay. 2010. Effective use of cloud computing in educational institutions. ProcediaSocial and Behavioral Sciences 2 (2): 938–942. 8. Erl, Thomas, Ricardo Puttini, and Zaigham Mahmood. 2013. Cloud computing: Concepts, technology & architecture. Pearson Education. 9. Bodnar, George H., and William S. Hopwood. 2012. Accounting information systems. Upper Saddle River: Pearson. 10. Behrend, Tara S., et al. 2011. Cloud computing adoption and usage in community colleges. Behaviour & Information Technology 30 (2): 231–240.
Application of Information Processing Technology in Garment Enterprises Lu Miao
Abstract With the acceleration of the pace of information construction in garment enterprises, garment enterprises have more and more urgent needs for the management of garment information. Because of the fast updating speed of products and the distinct seasonal demand, the traditional management mode of garment enterprises is more and more difficult to adapt to the changes of modern market. Therefore, many domestic apparel enterprises have gradually realized that in the fierce market competition environment, they must completely get rid of the old management methods and management concepts, and introduce information management systems, especially systems, to improve production efficiency. The information management technology should be applied to the whole process of production and plan management in garment enterprises, so as to effectively implement production plan management, save manpower and material resources, reduce production costs and improve enterprise profits. Firstly, this paper briefly expounds the comparison and development trend of information processing technology at home and abroad, and analyses the main problems existing in the construction of garment enterprises’ information technology, and puts forward some measures and suggestions to improve the application of ERP in domestic garment enterprises. Keywords Information processing technology · Clothing enterprise · ERP · Application
1 Introduction In recent years, with the rapid development of computer technology in China, network information technology has also been developed with high quality. For a long time, as a traditional industry in China, garment industry has undergone tremendous changes [1]. Enterprise informationization is based on enterprise process reengineering, which uses computer technology, network technology and database technology in a certain L. Miao (B) Jilin Engineering Normal University, Changchun, Jilin, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_74
623
624
L. Miao
depth and breadth to control and integrate all information in the production and operation activities of enterprises, to realize the sharing and effective utilization of internal and external information of enterprises, so as to improve the economic benefits and market competitiveness of enterprises [2–4]. Provide accurate and effective data information and decision-making reference for enterprise leaders in time [5]. Specifically for an enterprise, informationization refers to the extensive use of computer and network technology in scientific research, production, marketing and office to realize the automation of production process, networking of management mode, intelligent decision support and electronic business operation, so as to reduce costs and costs, increase production and sales, and improve the economic efficiency of the enterprise [6–8]. In this paper, the main problems of garment enterprise information construction are analyzed, and the strategies of using ERP efficiently are put forward.
1.1 Comparisons and Development Trends of Information Processing Technologies at Home and Abroad Wherever Times is specified, Times Roman or Times New Roman may be used. If neither is available on your word processor, please use the font closest in appearance to Times. Avoid using bit-mapped fonts if possible. True-Type 1 or Open Type fonts are preferred. Please embed symbol fonts, as well, for math, etc.
1.1.1
Comparisons of Informatization Level at Home and Abroad
Clothing enterprises belong to labor-intensive enterprises [9, 10], the operation process is complex and cumbersome. Many clothing enterprises deal with hundreds of inventory units every day, and manage numerous styles, structures, customer identification and even more data. All of these have brought great difficulties to the realization of garment industry informatization. In this highly complex business management, accurate forecasting, material procurement management, production planning and distribution management are particularly important. Domestic garment enterprises are mainly small and medium-sized enterprises. According to statistics, the proportion of garment industry informatization is only 10%, which is far lower than other industries. The informationization level of garment industry in many foreign regions is over 50%. The application of information technology in production management has a lower proportion. At present, China is still in the transitional stage from traditional planned economy to market economy system. The development of market economy is not perfect, and the management methods and means of many enterprises are still relatively backward. Domestic apparel enterprises are mostly labor-intensive enterprises, although a few enterprises have implemented it, but overall, the level of
Application of Information Processing Technology …
625
information and automation of domestic apparel enterprises is not high, compared with developed countries abroad, there is a big gap.
1.1.2
Current Situation and Trend of Domestic Informatization Development
Since the twentieth century, garment enterprises have experienced the competition of product output, product quality and production cost. In the twenty-first century, the market competition of products has been transformed into the competition of garment enterprises’ response speed to the market, brand of garment products and technological innovation ability. The core of competition lies in apparel enterprises’ understanding and catching up with the era of knowledge economy. Apparel enterprises should focus on informatization. According to the survey, 93.4% of the large and medium-sized enterprises in China have access to the Internet, 44.7% have established their own websites, and nearly 68.2% have launched e-commerce, as shown in Fig. 1. Du Cuizhou, president of China Textile Industry Association, commented that once an enterprise uses information network to promote the optimal allocation of resources, it will give the enterprise a new vitality and creativity. In a sense, the Internet will become a platform for enterprises of all countries to compete in the twenty-first century. In contrast to the international competitiveness of domestic textile and garment industry, an important sign is whether we can base ourselves on this platform. Informatization will surely bring more backward advantages to domestic textile and garment enterprises. At present, domestic apparel enterprises are mainly private enterprises which have risen in recent ten years. There are still some defects in their management concept and mode. In the process of collecting and analyzing various data and information, scientifically forecasting market and consumer demand, material purchasing, production process planning and dynamic monitoring of storage and inventory control, as well as sales planning, implementation and control, the vast majority of garment enterprises are unfamiliar with information technology. 100.00% 80.00% 60.00% 40.00% 20.00% 0.00% Connected to the Internet
Founding website
Fig. 1 Current situation of informatization in China
Launch e-commerce
626
1.1.3
L. Miao
Current Situation and Trend of Domestic Informatization Development
Many large-scale garment enterprises in China are in fact typical “processing enterprises”. Its production capacity is relatively strong, design ability and marketing ability is relatively weak, belonging to the “olive” enterprise structure. This kind of enterprise pays more attention to production management and cost accounting, but because of its weak marketing ability, it is difficult to withstand large market fluctuations. At the same time, due to the lack of design capacity, it also limits the market development strategy of such enterprises. The structure of “olive” enterprises seems to be a dumbbell, with production development and production management in the middle, design and marketing at both ends. The operation of enterprises is like a dumbbell, holding the management in the middle to balance the ability of both ends. Only by enlarging and strengthening the production management ability in the middle, the strength of both ends can show the strength of enterprises. In this way, enterprises will have a strong comprehensive development ability and market competitiveness. Garment enterprises upgrading from passive market olive structure to active market dumbbell structure must be fully supported by corresponding information technology.
2 Major Problems in Information Construction of Garment Enterprises 2.1 Technical Issues As a whole planning, enterprise informatization includes three stages: establishing intranet, connecting to Internet and implementing e-commerce in an all-round way. During this period, the state needs to invest heavily in the construction of information infrastructure, especially network facilities. However, from the current situation, the state does not have sufficient funds to invest, which restricts the material and technological basis needed for enterprise informatization. The poor quality and slow speed of domestic network operation and the high cost of Internet access have seriously affected the popularization and development of e-commerce. In addition, the domestic information industry, especially in the software industry, has a weak foundation, and the domestic software can only meet a very small number of market needs. Domestic enterprise management software has just started, and most of them are transformed from traditional financial software. The applicability and competitiveness of products still need to be improved. Enterprise information software is a technical problem; once the enterprise adopts a series of information software, how to maximize its efficiency is also a technical problem. However, due to the lack of professional and technical guidance, many enterprises have resources in the process of information construction. At present, there are more than ten kinds of software
Application of Information Processing Technology …
627
which can be applied to garment enterprises. For each specific enterprise, how to choose the appropriate idle and waste phenomenon.
2.2 Management Problem Enterprises lack long-term strategic planning and clear target positioning. If enterprises do not formulate long-term development planning, then the strategy of informatization can not be discussed. Enterprises do not have their own orientation and development direction, and they do not have a good understanding of internal resources and environmental resources. They can not grasp the trend of market changes well. They have subjective factors in the face of major decisions such as investment, market development and product development, or the mentality of conformity, especially when the amount of information is insufficient, decision-making is often tolerated. Easy to follow blindly. Such enterprises either fail to see the Necessity of informationization or blindly implement without considering their own conditions. Enterprise informationization involves a series of problems such as business and management process, organizational structure, management system and so on. It is necessary for enterprises to establish a set of management system suitable for informationization. If the enterprise management method is outdated, the management thought is backward, the vested interests of fishing in troubled waters and the rigid and conservative fears will constitute the greatest resistance in the construction of information technology.
2.3 Talent Problem At present, an important reason for the low level of information technology in the national economy, the weak competitiveness of the information industry and the backward comprehensive information ability is that the number and quality of domestic information technology talents are not only small, but also low, which is related to the lag of domestic education system reform in the demand of economic development. Moreover, in recent years, some enterprises have not achieved good results, and the incentive policies for talents are not in place, resulting in the brain drain of some backbone talents in enterprise information construction. Clothing enterprises belong to the traditional industry enterprise category, the quality of employees is low, if you want to step into the ideal management information model, there are still great difficulties. Garment enterprises generally lack informationized talents, especially those who know business, management and information technology. However, the construction of enterprise management informationization usually involves all aspects of the enterprise, which requires the participation and coordination of different departments and professionals. This work involves almost all departments and personnel of the enterprise, and data acquisition work involves everyone. Nowadays,
628
L. Miao
many enterprises invest a lot of money to purchase information hardware facilities, and ask developers to develop information software, but they do not pay attention to the training of information talents, which causes difficulties in the use and maintenance of enterprise information software and hardware, and makes high information facilities unable to play its role. Lack of systematic understanding and grasp of information technology knowledge and skills of management, technology, execution personnel closely coordinated, information technology is still difficult to succeed.
3 Measures and Suggestions on the Application of ERP in High Domestic Garment Enterprises The promotion of informationization to enterprise operation is mainly manifested in the following aspects, as shown in Table 1. It can be seen from the Table 1 that enterprises not only have to compete internationally at home, but also have to compete directly or indirectly at the global level. Transnational operation has become an inevitable choice for domestic enterprises to survive and develop. With the help of modern information technology, such as the Internet, enterprises can extend their market, production and sales to every corner of the world, making it possible for them to conduct global operations throughout the development process of transnational operations of domestic enterprises. It is found that the implementation of enterprise information construction is accompanied by it. Enterprise informationization has become one of the necessary conditions for enterprises to realize transnational operation.
3.1 Choosing the Right ERP System For the diversified characteristics of product varieties and styles in garment industry, garment enterprises should fully consider their suitability when choosing customized ERP systems to meet the requirements of flexible and fast characteristics of garment Table 1 Impact of informatization on business operations
Serial number
The role of information technology in enterprises
1.
Broaden the survival and development space of enterprises
2.
Guarantee the international operation of the company
3.
Efficient rapid response system
4.
Promote the development of production management system
Application of Information Processing Technology …
629
enterprises, instead of using existing and universal ERP systems in the market as the needs of enterprises to choose and apply them to the business processes of enterprises. For example, the management system of foreign BAAN company is designed around garment enterprises, which has strong practicability. The production management idea of the system not only supports the design of production according to order, but also supports the production according to order and production according to inventory. It is a prominent feature of the method of reasonable application of customer order segment points.
3.2 Establishment of Networked Distribution System and Reorganization of Enterprise’s Existing Business Processes The establishment of networked distribution system can conform to the unstable characteristics of garment sales and effectively promote the flexibility of ERP system implementation. In view of the periodicity of unsalable season change of apparel products, the establishment of a network distribution system can not only timely grasp the sales situation of products, but also fine to the color and size of products, so that enterprises can timely judge and make decisive decisions to meet the market demand for supply and marketing. And through the application of statistical function of sales analysis, the unsalable goods can be quickly analyzed and counted out, and then targeted to take appropriate ways to deal with, to ensure the effective recovery and turnover of enterprise funds, and to restructure the existing business processes of enterprises. The key prerequisite for the successful implementation of ERP system in enterprises is that the leaders of enterprises support the enterprise from the aspects of capital, receiving advanced enterprise management concepts, and reorganizing the current business processes. Business process reorganization or thorough redesign is the necessary prerequisite for ERP system to be applied to its own business process. Only by strict implementation, can enterprises maximize their value-added as far as possible.
3.3 Strengthen the Long-Term Training of Compound Talents Compound talent team is the backbone of enterprises and also the dependence of economic benefits. To ensure the orderly operation of ERP system software in enterprises, it is necessary to have a group of compound talent team who are familiar with the system and know the garment production process. At present, garment enterprises mostly work by hand, and the knowledge level and information technology level of employees are generally low. Before the implementation of the application,
630
L. Miao
it is necessary to train the employees systematically in operation so as to realize their psychological identification with the new information system and improve their proficiency in operation and application of the system. In addition, the introduction of the system has changed the previous management mode, some employees will not keep up with the requirements because of their own quality, resulting in a sense of post crisis, and even touch on the vital interests of a small number of employees. In this case, if the attitude of enterprise leaders is not firm, these people will often adopt a slanderous attitude to hinder the smooth implementation of the project.
4 Conclusion After decades of development, the garment industry has greatly improved the automation of garment production, formed a large-scale production capacity, and provided the market with a large number of high-quality and low-cost garment goods. Information technology has played an important role in the prosperity of the garment industry. The application of computer technology in the garment industry has become the focus of attention of many garment enterprises. We have reason to believe that the application of computer information construction in apparel enterprises will have a very broad prospect. After decades of development, the garment industry has greatly improved the automation of garment production, formed a large-scale production capacity, and provided the market with a large number of high-quality and low-cost garment goods. Information technology has played an important role in the prosperity of the garment industry. The application of computer technology in the garment industry has become the focus of attention of many garment enterprises. We have reason to believe that the application of computer information construction in apparel enterprises will have a very broad prospect.
References 1. Vernon, P.A. 2018. Speed of information processing and general intelligence. Intelligence 7 (1): 53–70. 2. de Mel, S., D. Herath, D. Mckenzie, et al. 2016. Radio frequency (un)identification: Results from a proof-of-concept trial of the use of RFID technology to measure microenterprise turnover in Sri Lanka. Development Engineering 1: 4–11. 3. Errichiello, L., and A. Marasco. 2014. Open service innovation in smart cities: A framework for exploring innovation networks in the development of new city services. Advanced Engineering Forum 11: 115–124. 4. Luftman, J.N., P.R. Lewis, and S.H. Oldach. 1993. Transforming the enterprise: The alignment of business and information technology strategies. IBM Systems Journal 32 (1): 198–221. 5. Wei, P., J. Jiang, and L. Li. 2018. The application of image analysis technology in the extraction of human body feature parameters. EURASIP Journal on Image and Video Processing 2018 (1).
Application of Information Processing Technology …
631
6. Hou, L., L. Xue, S.N. Bui, et al. 2016. System sourcing and information processing capability in supply chains: A study of small suppliers. Information Technology and Management 17 (4): 379–391. 7. Tamblyn, R., A. Huang, and R. Perreault, et al. 2003. The medical office of the 21st century (MOXXI): Effectiveness of computerized decision-making support in reducing inappropriate prescribing in primary care. CMAJ: Canadian Medical Association Journal = journal de l’Association medicale canadienne 169 (6): 549–56. 8. Ma, M.Y., C.Y. Chen, and F.G. Wu. 2007. A design decision-making support model for customized product color combination. Computers in Industry 58 (6): 504–518. 9. Shkarlet, S., and L. Kasyanenko. 2017. Development of mechanism of enterprises economic stimulation to labor conditions improvement. Advanced Engineering Forum 22: 21–27. 10. Li, D., T. Tang, D. Hu, et al. 2017. The challenge to china’s enterprises from increasing labor costs: The product quality perspective. China Economic Journal 10 (1): 18–33.
Application of E-Commerce Network Security Technology Haixiang Li and Weixian Xue
Abstract The trend of economic electronization is deepening, and economic and technological exchanges among countries around the world are becoming more frequent. Under this background, the competition among various industries is becoming more and more fierce. This situation promotes the innovation of technology and business philosophy in many fields. E-commerce is gradually replacing the traditional business model in this period. However, because e-commerce needs to be realized through the Internet, its security has always been the focus of attention. In order to ensure the healthy development of e-commerce, effective measures must be taken to ensure the safe operation of the whole process of e-commerce. This paper will study the security of e-commerce information management system from the perspective of influencing factors and effective measures. Keywords Electronic commerce · Network security · Security technology
1 Introduction In the context of the information age, Internet technology has penetrated into many areas of the international community. In recent years, e-commerce based on the network has developed rapidly. This new business operation mode can help people trade and shop on the virtual platform built by the network, and complete online payment [1]. This convenient and fast business model has been widely welcomed by people. However, with the continuous development of information technology, the security of e-commerce information has been greatly threatened. In order to effectively deal with this problem and ensure the smooth development of e-commerce activities, we must strengthen the strength of network security management [2] (Fig. 1).
H. Li · W. Xue (B) School of Economics and Management, Xi’an University of Technology, Xi’an, China e-mail: [email protected] H. Li e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_75
633
634
Personal InformaƟon… Account password stolen
Viruses or Trojans
Phishing website
Mobile Malware
70% 61.20% 49.88% 60% 43.58% 50% 35.46%30.34% 40% 26.16%25.10% 30% 10.91% 20% 10% 0% Mobile Spam Message Harassing phone call Mobile phone fraud informaƟon
Fig. 1 Network security issues. Note The data are from “Research Report on Information Security of Chinese Netizen in 2018”
H. Li and W. Xue
Network security issues
2 Current Situation of E-Commerce Security Security management of e-commerce is a systematic project with wide coverage and complex technology. To build a perfect security system framework, we must formulate scientific strategies, apply appropriate technology and implement efficient management. Only with the effective coordination of the three, can we provide perfect security services for e-commerce. Fully meet the security needs of different links of e-commerce, and form a strict and perfect information security architecture. The purpose of constructing the security system of electronic commerce is to ensure the safe development of electronic commerce activities and to ensure that the security of information is not threatened. With the popularity of the Internet, computers, mobile devices and other terminal equipment, China’s e-commerce has developed rapidly [3]. The security strategy adopted includes the following contents: First, the information data with high importance must be encrypted in the process of transmission and storage. Secondly, establish a rigorous and perfect identity authentication and authorization mechanism. Thirdly, scientific and effective safety protection measures should be adopted. Fourthly, we should strengthen security audit and establish a security platform for unified management. Fifth, physical isolation between physical structure and network and logical isolation with internal LAN (Fig 2). The security architecture of e-commerce is an important guarantee for data security of e-commerce. It consists of five parts: encryption technology layer, transaction protocol layer, business system layer, security authentication layer and network service layer. The five layers are connected to each other to form a complete architecture, and the relationships among them are interdependent. Mainly through the incremental control technology to provide security for e-commerce [4]. Fig. 3 shows that 18.63% of the hot spots of online retail complaints in 2018 are information leakage and online fraud caused by network security. The purpose of constructing the security system of electronic commerce is to ensure the safe
Application of E-Commerce Network Security Technology
Fig. 3 Hot spot complaints of online retail in 2018. Data Sources www.100ec.cn
4.35% 5% 17.57%
14.12% 12.58%
9.23% 7.67%
2018
2017
2016
2015
2014
Transaction scale Trillion yuan 36 40 26.8 20.4 15.7 20 10.2 13.4 Amount of money 0 2013
Fig. 2 2013–2018 transaction scale of China’s e-commerce market. Data Sources www.100ec.cn
635
10.21% 9.12%
10.03%
Replacement of goods
Refund problem
Online selling
quality problem
False sale
Slow delivery
InformaƟon leakage
Internet fraud
AŌer-sale service
Other
development of electronic commerce activities and to ensure that the security of information is not threatened. The security strategy adopted includes the following contents: First, the information data with high importance must be encrypted in the process of transmission and storage. Secondly, establish a rigorous and perfect identity authentication and authorization mechanism. Thirdly, scientific and effective safety measures should be taken. Fourthly, we should strengthen security audit and establish a security platform for unified management. Fifth, physical isolation between physical structure and network and logical isolation with internal LAN.
2.1 Encryption Technology Layer The application of encryption technology is the main security measure adopted by e-commerce system. Encryption technology is widely used in e-commerce. Its principle is to transform important data information into irregular chaotic code by using
636
H. Li and W. Xue
corresponding technical means, so as to realize the encrypted transmission of information data. After receiving the data, the chaotic code can be restored by supporting technical means, so that the security of data information in electronic commerce can be effectively guaranteed [5].
2.2 Security Authentication Layer Although the application of encryption technology can guarantee the security of electronic commerce in the process of data information transmission, it can not protect the security of electronic commerce transactions. In order to ensure the security of transactions, identity authentication technology has begun to be widely used. Through this technology, the identity of the operator can be clearly defined, so that the security of e-commerce transactions can be guaranteed. In the security system of e-commerce, user identity information is composed of a unique set of data, so in the process of identity authentication, it is also aimed at the user’s digital identity [6]. In order to ensure the smooth development of e-commerce, the behavior of all parties must be strictly confirmed. The corresponding legal problems can be effectively avoided by time stamping the digital signature transactions. However, the user’s time is prone to change, so a third party is required to provide the relevant timestamp. In fact, time stamp is an encrypted document, which consists of three parts: the summary content of the stamped document and the digital signature of DTS when the DTS receives the document [7].
2.3 Transaction Protocol Layer On the basis of the application of security control technology, the effective development of e-commerce activities also needs perfect transaction security protocols. Among them, the protocols for credit cards include SSL, SET and so on. The protocols for checks include NetBill, NetCheque and so on. The protocols for cash include Nescash, Digicash and so on. The content of the transaction protocol layer mainly includes the following aspects: First, secure socket layer protocol. The most common e-commerce protocol of this kind, it connects the transport layer and the application layer, and can completely seal the application layer data install. The application of data encryption technology can ensure the security of data in the transmission process. Secondly, secure electronic transaction protocol. This transaction protocol is for credit cards online payment of e-commerce security protocols, mainly through the establishment of standards and Cryptography Technology the application of technology realizes the security of electronic commerce transaction. Thirdly, anonymous atomic trading protocol. The protocol can fully meet the requirements of atomicity and anonymity in electronic commerce [8].
Application of E-Commerce Network Security Technology
637
3 Analysis of Data Encryption Technology in Electronic Commerce Information Security Management System Data encryption refers to cryptography, which is based on encryption algorithm and encryption. The application of key realizes the transformation from plain text to cipher text, and decrypts the cipher text through decryption algorithm and decryption. The application of keys can be conversely transformed. It can be said that encryption technology is e-commerce letters. The basis of information security management. Through the application of data encryption technology, only user information and network bar can be used. If all the pieces are allowed, the original can be obtained by decryption algorithm or key. Data information, both sides of data transmission can be resolved by some agreed information. Secret, this particular piece of information is the key. Keys can be divided according to encryption algorithm There are two types of public key and private key [9].
3.1 Analysis of Symmetric Key Cryptosystem Symmetric encryption uses symmetric cryptographic encoding technology. Symmetry here means that both sides using this encryption method use the same keys when encrypting and decrypting. In this case, the encryption keys and decryption keys are the same. This is symmetric encryption. Although symmetric cryptosystem has better security effect, it is not open, easy to operate and difficult to decipher. Therefore, this cryptosystem is often used in closed systems, in which users have good trust and can effectively prevent external intrusion [10]. Among them, the types of passwords include the following two kinds: First, sequence password. Encryption of sequence cipher is carried out step by step according to plaintext sequence and key sequence, so decryption also needs to follow the same procedure. At present, the design methods of stream cipher mainly include system theory, complexity theory and randomization. In the process of encrypting plaintext, the encryption unit of sequence cipher is the bit of plaintext. A pseudorandom sequence similar to noise and plaintext sequence modulus 2 can be added as the ciphertext sequence. Therefore, after encrypting, random noise will appear as a random stream. After receiving the information data, the plaintext sequence can be recovered using the same random sequence and ciphertext sequence module 2. Second, block cipher. The ciphertext obtained by encryption is closely related to the corresponding cryptographic algorithms and keys, but it has nothing to do with the position of the plaintext data segment in the whole plaintext. This cryptosystem is called block cipher system. In the process of using block cipher to encrypt, the plaintext that needs to be encrypted must be divided into blocks of the same length, and all data blocks must be encrypted simultaneously. After receiving the ciphertext, all data blocks must be decrypted and the plaintext blocks can be reorganized in the correct order to obtain the complete plaintext.
638
H. Li and W. Xue
Symmetric key cryptosystem also has some problems, because both sides of data transmission use the same key. Before data transmission, they must complete the key distribution. There are certain risks in the key distribution, so it must be difficult to ensure the safe development of this work, so as to manage the information security of electronic commerce. It has a certain impact.
3.2 Asymmetric Cryptosystem In order to effectively eliminate this drawback, a key exchange protocol different from symmetric cryptosystem has been developed, which greatly improves the openness of information exchange. Therefore, asymmetric key cryptosystem is also called public key cryptosystem. Compared with symmetric encryption algorithm, asymmetric encryption algorithm needs to use two kinds of keys, namely public key and private key. Public keys and private keys exist in pairs. After encrypting plaintext with a public key, the corresponding private keys must be used to decrypt the ciphertext, and vice versa. In asymmetric encryption algorithm, the keys used by both sides of information and data transmission are different. Therefore, when transmitting information, encoding and decoding adopt two different keys. There is no strong connection between encryption and decryption, and one of the two keys must be disclosed. Users can choose which keys to use according to their own needs. The specific procedures of using asymmetric encryption algorithm for information exchange are as follows: Firstly, Party A generates a pair of keys and sets one of them to public key. Secondly, Party B who obtains the public key can use the public key to encrypt the information data and then transmit it to Party A. Finally, Party A uses private key to decrypt the received information data. Common asymmetric key algorithms include knapsack algorithm, RSA algorithm, etc. At present, elliptic curve public key algorithm has attracted extensive attention of the international community.
3.3 Hash Function Hash function is a method of creating small digital fingerprints from data. It can scramble and mix data to create a fingerprint called hash value. Hash values are generally composed of disordered letters and numbers. It is difficult for high quality hash functions to produce hash conflicts in input fields. Hash function En has the following characteristics: First, a function can contain two different hash values, which are different in the initial input process has been determined, which promotes the formation of deterministic results. Therefore, input and output are not the only corresponding relations of hash functions. In the case of two identical hash values, two identical input values will appear. However, in the case of inconsistent input values, hash collision will occur, which is caused by the
Application of E-Commerce Network Security Technology
639
difference in the length of hash values. Therefore, the calculation of hash values should be obtained when some data is input, and then some input values can be changed appropriately.
4 Summary In summary, in the process of e-commerce development, the security protection of e-commerce information system has always been an important issue. The scientific application of encryption technology can effectively guarantee the security of information in the transmission process. This paper mainly introduces the composition of e-commerce security system, and makes a deep study of the corresponding encryption technology, hoping to provide some reference for the security of e-commerce.
References 1. Yang, S., J. Han, J. Li, et al. 2018. Identity-based undetachable digital signature for mobile agents in electronic commerce. Soft Computing 22: 1–15. 2. Al-Jaljouli, R., J. Abawajy, M. M. Hassan, et al. 2016. Secure multi-attribute one-to-many bilateral negotiation framework for e-commerce. IEEE Transactions on Services Computing 11: 1–1. 3. Farash, M. S., S. A. Chaudhry, M. Heydari, et al. 2017. A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems 30 (4): n/a-n/a. 4. Alsaad, A., R. Mohamad, and N.A. Ismail. 2017. The moderating role of trust in business to business electronic commerce (B2B EC) adoption. Computers in Human Behavior 68: 157–169. 5. Zhang, Sheng-fu. 2017. Electronic commerce commodity entity identities based on hierarchical probability model. Cluster Computing. 6. Hartono, E., C.W. Holsapple, K.Y. Kim, et al. 2014. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems 62 (1246): 11–21. 7. Yoon, H.S., and L.G. Occeña. 2015. Influencing factors of trust in consumer-to-consumer electronic commerce with gender and age. International Journal of Information Management 35 (3): 352–363. 8. Djuric, Z., and D. Gasevic. 2015. FEIPS: A secure fair-exchange payment system for internet transactions. Computer Journal 58 (10): 25–37. 9. Wang, J., W.M. Deng, and X.Y. Yin. 2016. Electronic commerce recommendation mobile crowd system based on cooperative data collection and embedded control. EURASIP Journal on Embedded Systems 2016 (1): 3–9. 10. Royan, B. 2013. Electronic commerce and the Scottish cultural resources access network. Vine 30 (3): 41–43.
Construction and Analysis of a Foreign Language Learning Model Based on the Classroom Network Environment Jing Li
Abstract The network environment in the classroom is the product of the high development of the Internet. It has its own obvious characteristics, such as vulnerability, suddenness, infinity and so on. The traditional way of foreign language learning is relatively simple, but the way of foreign language learning in the classroom environment is more complex. It can be seen that it needs to adopt a new way of learning foreign languages in the classroom network environment. And it is particularly important to use innovative network classroom learning methods to analyze them quickly, efficiently and in time. Based on this, this paper proposes a foreign language learning model based on classroom network environment. Through research and analysis, we find that this model has better real-time performance and prediction performance. Its real-time and scalability are more practical for foreign language learning in the network classroom environment. Keywords Classroom network environment · Innovation · Foreign language learning · Internet
1 Introduction With the continuous progress of human society, science and technology have also made great strides. In particular, emerging technologies based on the Internet of Things, large-network classrooms and cloud services are emerging one after another, and the development of their application models is more and more advanced and complex [1]. The corresponding application platform deployed a lot of software systems, with the characteristics of the Internet (open, difficult to control, uncertain) as the basis, is moving in the direction of classroom network. Classroom network environment is a highly developed product of the Internet, which has its own distinct characteristics, such as vulnerability, suddenness, infinity and so on [2]. The traditional way of large-scale online classroom foreign language learning is relatively simple, and the classroom network environment for foreign language learning is more complex J. Li (B) School of Foreign Language, Anhui Xinhua University, 230088 Hefei, Anhui, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_76
641
642
J. Li
way. Therefore, we need to adopt a new approach of foreign language learning in the classroom network environment. It is very important to adopt an innovative foreign language learning model to analyze it quickly, efficiently and in a timely manner. It is necessary to study taking the classroom network environment as the core. Through the construction and analysis of the foreign language learning model, this way of using the Internet for foreign language learning is called the foreign language learning mode under the network classroom environment. It adopts the corresponding model to carry on the corresponding foreign language study to the network classroom flow, thus looks for the best balance between accuracy and the real-time nature. In many current scenarios, it is the most suitable [3]. It is a foreign language learning method for classroom network environment. Currently, in this area, there has been a whole new way, and this method is called as NDS-TLM (Normalized dual mean single task learning method) by the industry [4]. The method is based on the convex function optimization. Based on the iterative method, the average of the gradient of the loss function is calculated accordingly, which can effectively reduce the complexity, so that the weight vector can be updated in real time. This method is widely used in the field of single task foreign language learning [5]. Regarding the foreign language learning model, relevant scholars put forward corresponding methods to speed up foreign language learning, such as the conventional duality average foreign language learning framework. On the basis of this framework, we also analyze the accelerated branch accordingly. In addition, some researchers also proposed random optimization of foreign language learning, and the use of the method is called accelerated gradient descent method [6]. In the construction and analysis of these models, the conditions that can be met by the parameters often decide the effect of acceleration, and the optimal efficiency O 1/T 2 is usually obtained in extreme cases. At the same time, the acceleration effect is achieved in the way of building and analyzing the single task foreign language learning model [7]. Based on the Internet technology and conventional classroom teaching methods, this paper presents a different style of foreign language learning model. The method of building and analyzing the model with the characteristics of the classroom network environment is not only efficient but also accelerated. The computational expressions based on iterative updating weights and the derivation processes of model-based efficiency analyzes are relatively complete [8]. The foreign language learning model can be effectively applied in the classroom network environment. Experimental studies show that it can effectively improve real-time and scalability, which is a powerful weapon for foreign language learning in the classroom network environment [9].
Construction and Analysis of a Foreign Language …
643
2 Construction and Analysis of Foreign Language Learning Model 2.1 Problem Description of Foreign Language Learning Definition 1 LCNE (Learning in the classroom network environment). Assuming that the total amount of assignments is Q and all online classes come from the same space X × Y . In the expression, X ⊂ Rd , Y ⊂ R. Assuming that there is Nq online classroom point in any of the corresponding online classrooms q q q Nq , these online classroom point sets is sampled from the Dq = z i = xi , yi i−1 contribution Pq in space X × Y , however, the tasks are not the same in Pq , but are related with each other. In foreign language learning in a classroom environment, the q goal is to learn about Q functions f q : Rd → R, q = 1, 2, . . . , Q, so that f q xi q estimates yi . If Q = 1, it is a single-task learning problems. The target of foreign language learning in the classroom network environment is the weight matrix W . Foreign Language Learning in Classroom Network Environment accomplishes the goal of learning weight matrix W in two ways [10]. The first is to minimize the empirical risk, and the second is to normalize the weights. If the optimization method is a batch training method, the foreign language learning objectives W under the classroom network environment can be expressed as follows: Nq Q 1 q q l W·q , z i + Ωλ (W ) min ϕ(W ) = W Nq i−1 q−1
(1)
In this study, we will make the corresponding setting on loss function, as a strong convex function (the characteristic is smooth and derivable), and use the following expression: l(w, z) =
2 1 y − wT x 2
(2)
If the construction and analysis of foreign language learning models are based on the dual mean method, the flow computation mode adopted is direct network classroom foreign language learning, and for the learning objectives W of the classroom network environment, we can take the following expression as optimization way: min φ(W ) = w
βt G t , W + Ωλ (W ) + h(W ) t
(3)
In the loss function in the formula (2), for the calculation of a single task partial gradient, we can use the following expressions: ∂lt (w) = ∂l(w, z t ) = w T xt − yt xt
(4)
644
J. Li
2.2 Selection of the Characteristics of the Network Environment in the Classroom On the basis of predecessors, combined with the own research (mainly literature research and experiment), we proposed the dual average network environment characteristics selection, and set up the learning model of foreign language. The foreign language learning framework they put forward is the most typical in the industry. This learning framework is described in this article in the construction and analysis of the model. In the model, ·F refers to the Frobenius norm of the matrix. For the selection of Ωλ (W ) (selection of the normal term), we can take the mixed norm L 1/2, 1 of the matrix W , which is composed the linear combination of the L 1, 1 norm
weight
T
W j · and L 2, 1 norm W jT · of W . 1
2
Ωλ (W ) = λ
d
c W jT · 1 + W jT · 2
(5)
j−1
In the above expression, c is a constant (mainly control of the sparsity of the task selection). L 1/2,1 is a mixed norm in Ωλ (W ). The hybrid norm has two functions, that is, the function of the task selection and the feature. For the formula (6), we can use the weight matrix W of model building and analysis l to update it, and update way can use formula (3),√ which could be obtained through making the input sequence of this formula βt = γ t. We use streaming computing mode to build and analyze its model. Online classroom can directly learn foreign language in memory, which requires that formula (6) should be simplified so that computing efficiency is higher. According to the formula (6), we can deduce the closed solution of the weight matrix W . Based on this, the time of W will become a constant. In the construction and analysis of the model 1, we can represent the complexity the iteration time as √ of O(d Q), and the efficiency rate can be expressed as O 1/ T . Model Construction and Analysis 1 For the selection of the characteristics of the classroom network environment, we can choose the learning framework of foreign language DA-MWFS. Input: W0 = argw min h(W ), h(W ) = Given constants λ > 0, γ > 0; Output: Wt+1 . Initialization: let W1 = W0 , G 0 = 0. for t = 1, 2, . . . , do
1 W 2F , 2
Construction and Analysis of a Foreign Language …
645
q
q
1. Q tasks appear in an example z i q = 1, 2, . . . , Q, in turn. The values gt = q by the formula (4), and a d × Q matrix is ∂l wq , z t arecalculated separately formed, G t = gt1 , gt2 , . . . , gtQ . 2. Calculating the average value of the partial gradient: Gt =
t −1 1 G t−1 + G t t t
3. Weight matrix Wt+1 for updating the next iteration is calculated based on G t : Wt+1 = argw minφ(W ), γ φ(W ) = G t , W + Ωλ (W ) + √ h(W ) t
(6)
end for.
3 An Analysis of the Foreign Language Learning Model in the Classroom Network Environment 3.1 Process of Foreign Language Learning in the Classroom Network Environment Based on the routine teaching method of foreign language, within the framework and effectively combined with Internet technology, this article proposes a foreign language learning model based on the classroom network environment (FLLMCNE), which is a novel effective method. Model Construction and Analysis 2 Accelerated foreign language learning framework FLLMCNE. Input: W0 = argw minh(W ), h(W ) = Given constant λ > 0; Output: Wt . Initialization: let U1 = W0 , G 0 = 0, α1 = 1. for t = 1, 2, . . . , do
1 W 2F , 2
646
J. Li q
1. In Q tasks, instance z t , q = 1, 2, . . . , Q, appear in turn, the value G t of Ut is calculated. G t−1 + 1t G t (the 2. The average value is calculated, and the formula is G t = t−1 t gradient average). 3. Output: 1 2 Wt = argw min φ(W, Ut ) = G t , W + Ωλ (W ) + W − Ut F 2
(7)
4. Update the input sequence: αt+1 =
1 + 4αt2 2
(8)
αt − 1 (Wt − Wt−1 ) αt+1
(9)
1+
5. Compute query point Ut+1 : Ut+1 = Wt + end for. By comparing the model construction and analysis 1 and the model construction and analysis 2, we will find that in the model construction and analysis 2, a query point Ut is added and its value is G t . We can use the formula (9) to adjust the query point, αt is the input series (generated by formula [8]), and the function of αt is to make the query point as close as possible to Wt . We need to point out that in the model construction and analysis 2, for the optimization formula (7), the strong convex function h(W ) has changed accordingly, from 21 W 2F to 21 W − Ut 2F . The reason is that in addition to optimizing the convexity of functions, it can also integrate 1 W − Ut 2F into the optimization goal of modeling and analysis of the model, so 2 that W is closer to the query point Ut , so as to obtain a necessary condition for continuous acceleration. It can be seen that the method used in the model construction and analysis 2 has better speeding effect, which is an improved micro batch method.
3.2 Theoretical Analysis of the Network Environment in the Classroom If we carry out some foreign language learning to minimization of the expected loss of the sample Z of the random classroom network environment, that is to say, add the normalization term Ωλ to this, then it becomes a foreign language learning model in a normalized stochastic classroom network environment, which can be expressed by the following expression:
Construction and Analysis of a Foreign Language …
min ϕ(W ) = E z l(W, Z ) + Ωλ (W ), w
647
(10)
In the above expression, ϕ(W ) refers to the target value (related to foreign language learning in a classroom network environment). In practice, the distribution of Z is usually hard to determine. In this case, we can replace E z l(W, Z ) (expected Nq Q q 1 q l W·q , z i , as shown in the formula (1). loss) with the empirical average Nq q−1
i−1
The expected loss of classroom teaching method based on the classroom network environment can be replaced by G t , W , as shown in the following expression: ϕ(W ) = G t , W + Ωλ (W )
(11)
Definition 2 For Efficiency in foreign language learning (EFLL), we can define the target value of foreign language learning ϕ(W ) as formula (12). If there is an optimal solution W ∗ to the problem of the construction and analysis of the model min ϕ(W ), w when the construction and analysis of the model runs to the T step, its effective rate is υT , as shown in the following expression: υT = ϕ(WT ) − ϕ W ∗
(12)
4 Experiment and Analysis In this section, we use the method of analysis and comparison to summarize the construction and analysis of the foreign language learning model FLLMCNE proposed in this paper, Construction and Analysis of Foreign Language Learning Feature Selection Model DANECS, Dual average task of foreign language learning (DATFLL) and Batch training learning model (BTLM). In the experiment, the environment used is 2.80 GHz CPU and the PC’s memory is 3.93 GB. The construction and analysis are all running on the Matlab.
4.1 Time Analysis of Foreign Language Learning Suppose there are Q tasks, each task has k d-dimensional samples, and the boundaries of BTLM (flops) are O(dk Q + d Q) = O(dk Q). Here, the training sample used is a network class flow, if a new sample appears, it needs to retrain. The corresponding storage cost boundary is represented by the following formula: O(d Q N )
(13)
648
J. Li
Fig. 1 Log-log logarithmic relation diagram of running time and training sample number
The difference is that worst time complexity of any iteration in the construction and analysis of foreign language learning model DANECS and FLLMCNE are O(d Q). The number of any sample is N , the total floating-point operands are expressed as follows: O(d Q N )
(14)
The corresponding storage cost boundary is represented by the following formula: O(d Q)
(15)
Comparing (13), (14) and (15), there is a certain relationship between the running time and the number of training samples for the construction and analysis of the four models. Fig. 1 shows the corresponding logarithmic relationship.
4.2 Effectiveness of Foreign Language Learning In Fig. 2, a comparative analysis of DANECS and FLLMCNE is carried out. With four network class sets, yeast, letters, digits and DMOZ as the basic object, 10 random tests are carried out to get the average effective time. We observe the graph 2, and find that the 4 network classroom collections of FLLMCNE are much smaller than DANECS, which proves the validity of model construction and analysis FLLMCNE.
Construction and Analysis of a Foreign Language …
649
Fig. 2 Comparison of the effective time between the FLLMCNE model and the DANECS model
Fig. 3 Comparison of the effectiveness of FLLMCNE model and DANECS model in yeast network classroom
The analysis of Fig. 3 shows that in the model building and analysis FLLMCNE, only 30 times are needed to tend the stability value. But in the model construction and analysis DANECS, it needs 120 times. Through analysis, we can find that, for the model construction and analysis methods FLLMCNE and DANECS, in terms of real time, FLLMCNE is obviously better than DANECS, especially NDS-TLM. The model construction and analysis FLLMCNE has better real-time performance, which determines that it is more suitable for the classroom network environment.
5 Conclusion In this study, the foreign language learning model, which is proposed based on the classroom network environment, is novel in the industry. The time complexity ofany iteration is all O(d Q), and the corresponding optimal efficiency is all O 1/T 2 . In this study, a comparative study of the construction and analysis of the batch training
650
J. Li
model and other models is carried out in a certain way. Through the research and analysis, it is found that the model FLLMCNE has more real-time performance and better analysis and prediction performance. The learning model, which is based on the classroom network environment, has a more extensive and practical value in foreign language learning. Acknowledgements This paper was supported by the Quality Engineering Teaching and Research Project of Anhui Provincial Education Department: Research on Mixed Teaching Reform of College English Based on “POA Teaching Method” (No. 2018jyxm1078).
References 1. Acar, E. 2015. Creating a supportive classroom environment with the textbooks for the social productivity in Turkish society. Peptides 72 (3): 179–185. 2. Alahmadi, B.H. 2016. Interface design theories of foreign language multimedia software: A hyper model of cognitive and software-engineering approach. Oncogene 19 (27): 3059–3068. 3. Aldon, G. 2011. Didactical interactions in Mathematics classroom in a digital environment: Construction and test of an analysis framework exploiting the notion of incident. International Journal of Gynecological Cancer 16 (453): 47–62. 4. Amdurski, G., M. Valdmanis, A. Stuart, G. Noble, K. Lam, and B. Li. 2010. Achieving a netzero lighting system for a classroom or lab environment. Journal of Quantitative Spectroscopy & Radiative Transfer 110 (14–16): 1566–1578. 5. Beyer, R., M. Franke, H.J. Schöpe, E. Bartsch, and T. Palberg. 2015. From nuclei to microstructure in colloidal crystallization: Investigating intermediate length scales by small angle laser light scattering. Journal of Chemical Physics 143 (6): 340–342. 6. Carlotto, T., and P.A. Jaques. 2016. The effects of animated pedagogical agents in an English-asa-foreign-language learning environment. International Journal of Human-Computer Studies 95: 15–26. 7. Choi, J.I., and H.S. Yong. 2015. Conceptual group activity recognition method in the classroom environment. Anticancer Research 21 (5): 351–358. 8. Kku, W. 2013. Teacher-students interaction and classroom learning environments: Its impacts on students’ attitude towards Science and Math classes. Experimental Physiology 99 (3): 586– 598. 9. Wang, Y., F.Y. Zhao, J. Kuckelkorn, D. Liu, L.Q. Liu, and X.C. Pan. 2014. Cooling energy efficiency and classroom air environment of a school building operated by the heat recovery air conditioning unit. Energy 64 (3): 991–1001. 10. Wang, Y., F.Y. Zhao, J. Kuckelkorn, H. Spliethoff, and E. Rank. 2014. School building energy performance and classroom air environment implemented with the heat recovery heat pump and displacement ventilation system. Applied Energy 114 (2): 58–68.
Reform and Practice of Advanced Mathematics Course in the Context of New Engineering Dongli Liu
Abstract The Advanced Mathematics course is a highly applied and closely related course to modern economics, finance, statistics, and management. This course provides the necessary foundation for students to learn professional knowledge. It has strong application and is also of great significance for the study of subsequent courses. Therefore, it is particularly important to improve the effect of teaching Advanced Mathematics course. This paper analyzes the necessity and importance of Advanced Mathematics teaching reform in private colleges and universities and points out the ways and methods of Advanced Mathematics teaching reform. Keywords New engineering · Teaching methods · Teaching means
1 Introduction In recent years, the development of national strategy has continuously generated new demands. The international competition situation is changing with each passing day [1, 2]. The state has higher and higher requirements for talents, so education and teaching reform is imminent. New engineering construction came into being in this context. The connotation of the new engineering department is to cultivate people with morality, taking the response to change and shaping the future as the construction concept [3–5]. It is necessary to inherit and innovate, cross and integrate, coordinate and share as the main way, in order to cultivate future diversified and innovative outstanding engineering talents. This determines that the new engineering construction will rely more on the teaching innovation of theoretical foundation courses such as Advanced Mathematics. Although in recent years, with the continuous deepening of the teaching reform of Advanced Mathematics, Advanced Mathematics teaching has greatly improved and improved in teaching content, teaching methods and means [6– 8], but there are still many shortcomings. It cannot meet the needs of talent training in the new engineering background. This paper relies on private universities to conduct D. Liu (B) Department of Information Engineering, Heilongjiang International University, 150025 Harbin, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_77
651
652
D. Liu
research on how to carry out all-round reform in terms of teaching content, teaching methods and means [9, 10]. It is necessary to give full play to the advantages of the Advanced Mathematics course in cultivating and improving students’ innovative ability and scientific quality, so as to promote the continuous improvement of the overall teaching level of the Advanced Mathematics course of private universities.
2 Current Status of Teaching Advanced Mathematics at Private Colleges 2.1 Students Have Varying Degrees of Mathematics Because the enrollment scope of private colleges and universities is “the third batch of undergraduates”, most students have a phenomenon of partiality, which leads to a serious two-level differentiation of students in the final exam: the high scores of 266 freshmen in a private college are now distributed. Analysis shows the following Fig. 1. Where the abscissa represents the grade (percentage), the ordinate represents the value of the normal distribution function, and the data label on the frequency histogram represents the number of people in this fraction (Table 1). From the distribution of achievements, the proportion of students failing is nearly 16%, indicating that the students’ interest in learning is not high, and they do not even master the basic theory of Advanced Mathematics.
Fig. 1 Distribution map of final achievements in higher Mathematics
Reform and Practice of Advanced Mathematics Course …
653
Table 1 Sampling table of student achievement Grade of achievement
90–100
80–90
70–79
60–69
1 forms an intelligent management strategy pool ζ = {S1 , . . . , SK }, different management methods meet the corresponding vector P(gen) = ( p1 (gen), . . . , p K (gen)), where pk (gen) is the probability of the first k strategy in the K gen generation, and satisfies pk (gen) = 1, ∀ gen: pmin ≤ pk (gen) ≤ 1. pmin k=1 can fully verify each basic small probability value, without being lost, it can implement the probability operation pk (gen),qk (gen) for the data information strategy of the basic quality qk (gen). The update operation is as follows: qk (gen + 1) = qk (gen) + α • [rk (gen) − qk (gen)]
(3)
In the formula, α is the adaptive law, and rk (gen) is the return value of the credibility distribution value of the k strategy in the gen generation. The calculation of rk (gen) is as follows: rk (gen) = ζk∗ (gen) = max ζkt (gen) t=1,··· ,|Tk |
(4)
Design and Application of Distribution Automation …
827
In the formula: ζkt (gen) is i relative fitness improvement value of the strategy K adopted in the gen generation.
ζkt (gen) =
⎧ ⎪ ⎨
f best f ct (gen)
∗ f pt (gen) − f ct (gen) i f
f t (gen) is better than f pt (gen) ⎪ ⎩ c 0 other wise
(5)
In the formula: as the real maximum function and value, f best can replace and calculate the mean value of different functions represented by f cs (gen), f ps (gen). After calculation, the effective adaptation of the improved value can be achieved |Tk | 1 by Tk (g) = ζk (g), . . . , ζk (g) as the set of relative fitness improvement values obtained by the k strategy in the gen generation, and |Tk | is the potential of Tk . The renewal probability of distribution automation system selection probability is as follows: ∗ qk (gen + 1) pk (gen + 1) = pmin + 1 − K ∗ pmin K qk (gen + 1)
(6)
k=1
The management strategy adopted in this paper constitutes the management choice strategy pool. ψ(σ ) = σ 2 ωa + σ ωb + ωc
(7)
In the formula:σ is generated based on the interpolation probability pinter , U [0, 2] i f rand ≤ pinter , and the definition of individual ωa , ωb , ωc is σ = U [2, 3] other wise as follows: ωa =
xc − 2xb + xa 2
ωb =
4xb − 3xc − xa 2 ωc = xc
(8)
In the formula (8), because xa , xb , xc is selected as the different subbody of the whole particle, the probability value of the whole particle will change with the change of the random amount. The intelligent power supply system management is used in the redundancy of the distribution automation system, and the Tchebycheff method is used to manage it. The mathematical expressions are as follows:
828
Q. Li et al.
ming − te x|λ, z ∗ = max λ j f i (x) − z ∗j 1≤ j≤m
(9)
In the formula, g−te is the Tchebycheff function, x ∈ Ωis the decision λ= variable, (λ1 , . . . , λm ) is the weight vector, and z ∗ = z 1∗ , . . . , z m∗ , z ∗j = min f j (x)x ∈ Ω , j = 1, . . . , m,m is the number of objective functions. The calculation of intelligent power supply system management for multiple data operation targets can achieve and mobilize the probability selection of the overall distribution automation system under the corresponding redundancy function, which can realize the operation of different frameworks within a certain number of management operations [5]. In the case of A>1, different distribution automation systems will make up the distribution automation system pool NSs to calculate the function value operation and the probability formula in the whole control process through the mutual components. pc,G =
Sc,g C Sc,g
(10)
c=1
In the formula G−1
Sc,g =
W − Sc,g
g=G−L P G−1
+ ε, (c = 1, . . . , C; G > L P) Wc,g
g=G−L P
When LP is set to a certain period of internship, Sc,g is set to improve the basic proportion of the c different distribution automation systems within LP to succeed in the selection of the next group. When the total number ratio of the overall optimal solution is realized by Wc,g distribution automation system, the mean value checking of the c distribution automation system in the above LP value can be calculated by the formula W − Sc,g , and the algorithm verification of the result probability can be realized [6].
3.2 Implementation of Algorithm Program Step 1: initialization of the program (1) Measure and calculate distances by different vectors. (2) Generate a random uniform distribution of the initial frame x 1 , . . . , x N based on the random way matter basic framework, whose frame is F V i = F x i ; (3) Initialize the data z ∗ = (z 1 , . . . , z m ), z j = min f j x i , j = 1, . . . , m with 1≤i≤N
the program.
Design and Application of Distribution Automation …
829
(4) Probabilistic analysis and calculation for different management strategies are carried out, the probability analysis is pk = K1 , and the basic parameter q = 0 is obtained. (5) Equal probability analysis and calculation for different distribution automation systems are carried out, the estimated value is p N S = A1 . Step 2: effective optimization of field probability; When the basic parameters cannot be realized, usually: (1) According to the different domain probability problem, we can realize the different domain probability T on the distribution power automation system through p N S , measure the different vector distance, realize the different weight vector i = 1, . . . , N , set up A(i) = {i 1 , . . . , i T }, and λi1 , . . . λi T is the nearest T weight vector of the distance λi ; (2) Determine the scope of management operation P : P = A(i), i f rand < ζ ; {1, . . . , N }, other wise (3) According to the basic probability pk , the application of management arithmetic in different strategy choices is achieved, so as to get a new solution y. And a new solution ym is realized on the basis of solving the problem. ym,d =
yd + ξd • ydU − ydL , with probabilit y pm yd , with probabilit y (1 − pm )
(11)
In the formula ξd =
1
i f rand < 0.5 (2 • rand) σ +1 − 1, 1 σ +1 1 − (2 − 2 • rand) , other wise
τ and pm are the total parameters of DE, and ydU and ydL are different variable information of d. (4) We can get the positive value of ym by using the relevant range function of different variable information. (5) Update the framework in z ∗ to achieve each j = 1, . . . , m, if f j (ym ) < z ∗j , then z ∗j = f j (ym ); (6) Framework update: set nr = 0. ➀If nr = N R or P is empty (that is, the parent solution is not updated), output P S : x 1 , . . . , x N ,P F : F x 1 , . . . , F x N . Otherwise, r j will be selected randomly fromthe P framework. If g − T ch ym λr j , z∗ ≤ g − T ch x r j λr j , z ∗ , then x r j = ym , F V r j = F(ym ), nr = nr + 1; ➁Get r j from P and return to ➀
830
Q. Li et al.
(7) When the Tchebycheff value of ym is superior to that of the previous generation, the formula (5) can be used to effectively calculate different values and values. The k data information is used to calculate the corresponding policy probability, and the effective return rk (g) is obtained in (4). Finally, the information data is updated q(g) by (3), and the probability pk (g) is determined in the (6).
g = g+1 For all N SS , update Wc,g and W−Sc,g , if mod(g, L P) = 0, the corresponding distribution automation system information can be selected by the formula (10) for a certain probability selection ( pc,g ), to make a new setting of Wc,g and W−Sc,g to ensure the determination of the relative probability values. Step thebasic the formula satisfies condition and environment, output P S : 1 3: when x , . . . , x N , P F : F x1 , . . . , F x N .
4 Simulation Analysis In this paper, the variable neighborhood multi-objective algorithm (VNM) is compared with the distribution automation system. A certain basic test value ZDT is selected to determine the overall function parameter value of the text, and the final precision of the test value is realized [7, 8]. Generally, the setting of function parameters includes: calculating the number of frames and the value of probability function by means of intelligent management calculation. N = 300 can be set. By setting the basic function probability CR = 1.0, the different values of F = 0.5 can be guaranteed, and the parameter mutation probability Pinter = 0.75 is realized under certain basic probability and value Pm = n1 , n is used as the basis function coefficient, and the maximum extreme value G max = 500 of different function parameters can be achieved by establishing variation and value parameter τ = 20. By using intelligent power supply system management, the basic parameter value α = 0.3 can be set, and the minimum probability of mutation and value parameters can be calculated, which is pmin = 0.05.Distribution automation system parameters: for the distribution automation system pool N SS = {60, 90, 120}, different values can be realized to the maximum value nr = 0.01• N . In the distribution automation system, we can set probability value ξ = 0.9 and set up LP = 50. The performance indicators in the relevant function information values and the VNM calculation method can be expressed as follows. From the corresponding numerical comparison in the Table 1, we can fully understand that in the general text process, different Pareto can be obtained to achieve the answer to the maximum value. In the process of Pareto, the final determination of probability value can be carried out, and multiple objectives can be effectively optimized (Fig. 2).
Design and Application of Distribution Automation … Table 1 Basic parameters and performance of IGD
831
Calculation method
Basic function
Sum of values
IPSSM
ZDT
3.26 × 10−5
1.81 × 10−2
10−3
6.16 × 10−6
3.14 × 10−4
0.83 × 10−5
7.56 ×
VNM IPSSM VNM
ZDT
Performance variance ratio
0.1956
1.58 × 10−4
Fig. 2 ZDT basic algorithm
The distribution automation system is applied to the information redundancy of the distribution automation control data and the basic monitoring data of the component unit in the management of the intelligent power supply system. In the text, a certain data sensor system and subsystem are set up for relevant subsystem data, so as to guarantee the complete reliable proof of the whole subsystem. According to the different parameter values of different component units, the basic threshold range can be set to determine the coefficient of the updated basic unit. The coefficient of decision can be set to 0.7 ≤ ri j ≤ 1, and the basic numerical parameter of the information system is 2 ≤ m i ≤ 5. For different basic values, parameter performance and total value analysis of probability data can be realized [9, 10] It can be analyzed from Table 2 that when the number of iterations is 300, the reliability of the system is greater than 0.9985. The influence of the number of iterations on the system depends mainly on the reliability and redundancy of the component units, and the redundancy is redundant, so the optimized component units between the redundancy and the reliability in the table are not the same (5 × 332). When the reliability of the redundancy is 0.708638167, the reliability of the components is 0.87424889. The reliability of the final component is only 0.7045235, which can prove that the operation mode in the general algorithm of the system can increase the overall security and reliability of the component unit.
Basic cost
10.78545
11.89654
12.24144
12.15565
12.78464
11.54628
12.89454
Systematicness
0.998283
0.998895
0.998523
0.998556
0.998486
0.998565
0.998781
0.878521
0.756665
0.815465
0.771896
0.816418
0.844155
0.848545
Component unit-1
0.816745
0.816789
0.954894
0.851567
0.851267
0.846517
0.934641
Component unit-2
0.819647
0.950561
0.719287
0.841567
0.811962
0.871568
0.851678
Component unit-3
Table 2 Basic cost and data redundancy system under system data information
0.916942
0.916943
0.932945
0.816745
0.941545
0.851687
0.919642
Component unit-4
3
5
4
4
4
3
4
Data redundancy
5
4
3
3
3
4
3
Data redundancy
3
3
3
4
4
4
3
Data redundancy
4
4
3
3
4
3
3
Data redundancy
832 Q. Li et al.
Design and Application of Distribution Automation …
833
5 Conclusion In this paper, the reliability of the distribution automation system managed by the intelligent power supply system is integrated, and the effective index test is carried out by using different VNM computing methods. Through the analysis of the comprehensive data and the index test, we can get that the IPSSM algorithm can achieve the balance of the function solution value in the Pareto process. By using the distribution automation system, the reliability and redundancy of the system can be optimized. The reliability and redundancy of the distribution automation system are optimized and allocated through the management of the intelligent power supply system [11]. It can fully realize the recognition of the system reliability and the detailed change rule of the system cost in the system framework.At the same time, the change curve of system reliability and cost is higher than the base value of 0, and the decision maker can choose its own redundancy structure and component reliability according to its own needs.
References 1. Gezer, D., and S. Uludag. 2013. An MV distribution automation system and its assessment in light of the smart grid vision. Fourth International Conference on Power Engineering, Energy and Electrical Drives. IEEE: 1116–1122. 2. Ronay, K., and C.D. Dumitru. 2016. An approach to intelligent road lighting system with renewable energy based power supply. Procedia Technology 22: 836–839. 3. Muttaqi, K.M., J. Aghaei, V. Ganapathy, et al. 2015. Technical challenges for electric power industries with implementation of distribution system automation in smart grids. Renewable and Sustainable Energy Reviews 46: 129–142. 4. Muttaqi, K.M., A.E. Nezhad, J. Aghaei, et al. 2014. Control issues of distribution system automation in smart grids. Renewable and Sustainable Energy Reviews 37 (3): 386–396. 5. Shin, I.J., D.S. Eom, and B.K. Song. 2016. The CoAP-based M2M gateway for distribution automation system using DNP3.0 in smart grid environment. IEEE International Conference on Smart Grid Communications. IEEE: 713–718. 6. AbGhani, M.R., W.N.S.E.W. Jusoh, S.H. Raman, et al. 2014. Remote Terminal Unit Developed for Distribution Automation System (DAS) using MPLAB Software. Applied Mechanics and Materials 699: 751–758. 7. Wu, X., L. Yang, and Y. Qi. 2009. Simple analysis of the application of distribution automation system in power supply enterprises. International Conference on Intelligent Human-Machine Systems and Cybernetics. IEEE: 368–371. 8. Sun, Q., and X. Dong. 2013. Discussion on intelligent distribution automation system construction mode. China International Conference on Electricity Distribution. IEEE: 1–6. 9. Wu, X., L. Yang, and Y. Qi. 2009. Simple analysis of the application of distribution automation system in power supply enterprises 2: 368–371. 10. Jian, L., S. Zhen, H. Cheng, et al. 2010. A current transformer feeding power supply for distribution automation systems. International Conference on Power Electronics and Intelligent Transportation System. IEEE: 105–109. 11. Du, J., G. Zhu, M. Hou, et al. 2015. Power supply restoration algorithm of multi-contact distribution network with distributed intelligent feeder automation system. Power and Energy Engineering Conference. IEEE: 1–5.
A Framework for Occupational Risk Assessment in Power Grid Using AHP Method Hualiang Li, Runzhong Liu, Li Li, Zhiting Liu, Shaoyan Lu, Lun Pan and Aihua Lin
Abstract This study developed a occupational risk assessment indicators system of power grid enterprise, including 5 first-level indicators, a total of 24 secondary indicators. 5 first-level indicators are as the list: Dust Factors, Physical Factors, Chemical Factors, Behavior Factors and Protective Measures Factors. After two rounds of experts’ consultation, the positive coefficient of experts were 95% and 100% respectively. The authority of experts coefficient was 0.90 on average. All experts coordination coefficient of two dimensions (significance and operability) range from 0.1379 to 0.8118, which is in statistically significance (P < 0.05). It indicated that there were well performance and high coordination on the evaluation for the indicators system. Afterwards, calculating the relative weight of each secondary indicators by AHP, according to the combined weights of the secondary indicators, the sequence of the first level indicators is as follows: Behavioral Factors, Dust Factors, Chemical Factors, Protective Factors, Physical Factors; The sequence of the Dust Factors, Physical Factors, Chemical Factors Behavioral Factors, and Protective measures factor were ranked. Keywords Framework · Occupational health · Analytic hierarchy · Power grid
1 Introduction According to China’s national energy administration [1], the safety situation of Electric power industry is generally stable in recent years, however, personal casualty accidents still happen yearly with more than 100 electrocution deaths resulted from mishandling failure, high falling, contacting overhead power lines with portable metal ladders, etc. Compared with the general enterprise, the workplace of power enterprises is changing dynamically and uncertainly, Staffs and workers who work H. Li (B) · L. Li Electric Power Research Institute of Guangdong Power Grid Corporation, Guangzhou, China e-mail: [email protected] R. Liu · Z. Liu · S. Lu · L. Pan · A. Lin School of Public, Health of Sun Yat-Sen University, Guangzhou, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_98
835
836
H. Li et al.
in the front-line are facing with noise, high temperature, toxic and harmful chemicals and harm of power frequency magnetic field and electric field, etc. [2]. The electrical accidents can causes not only high operational costs from business interruption, but also danger the employees and resulting in costly fines. It is reported that more than 30,000 workers have been injured in electrical-related accidents over the past decade, according to the ESFI reports (Electrical Safety Foundation International) [3]. The similar data can also be found in National Bureau of Labor Statistics reports [4]. All these cases illustrated that electricians have a higher risk of related illness and injury. The electrical-related accidents are tend to be more serious. There were greater number of workers injured or death, and claimants will most certainly seek more damages. However, no matter in China or US, there is few systematic assessments to evaluate the occupational risk for them [5–8]. Although China Southern Power Grid had a set of assessment (PES method: possibility, expose, consequence, F = P × E × S) for employees, we regard it as too arbitrary and unscientific without fully consideration about the specific characteristics of electric power production industry. The PES method is character of take many risk factors into account. However those factors are not common in power grids. The value is given subjectively. What’s more, all the factors are risk factor without protective one, such as personal protective equipment, health education, etc. Therefore, it is of great importance to scientifically assess the occupational risk of employee working in the power grids, identify the gap between risk control measurement and decisions of management in electrical industry so as to provide a decision-making basis for risk reducing planning, construction, and management in the future. There are many risk assessment techniques, but few of them can used perfectly in the power grids. In this paper, we proposed corrections overcome the problems that conception is not clear and the value is not standard. The occupational risk assessment index system for employees working in power grids is established, with Analytic Hierarchy Process (AHP), according to the actual workplace conditions after the field investigation and professional seminars.
2 The Analytic Hierarchy Process (AHP) The method is a structured multi-attribute decision method [9]. It can eliminate and inhibit the inconsistency of expert judgments. Beside, it also provides group decision by the geometric mean of the individual judgments. The AHP is probably helpful for decisions with multi-objective, multi-criterion, and multi-actor. Because it is assessment scales rather than measurement, it is capable of modeling under lack measuring circumstances. The decomposition of the structure, comparison of judgments, and hierarchical composition of priorities are three main principles. There are many papers reported the AHP methods [10–12]. Due to the sub-problems can be discussed independently, the researchers divided decision problem into sub-problems. Any factors of the decisions are consider in
A Framework for Occupational Risk … Table 1 AHP scale for combinations
837
Comparative judgment of T i and T j
Graded number
Equally important
1
Moderately more important
3
Strongly more important
5
Very strongly more important
7
Extremely more important
9
Both T i and T j represent the indicators. The scale 2, 4, 6, and 8 are used and represent compromises among the scale 1, 3, 5, 7, 9.
the hierarchy. Thus a numbers of alternatives are obtained (ai aj ). The experts should assigned a numerical scale for those alternatives. As can be seen in Table 1, we got the numerical scales by making comparisons. The factors has already been scheduled according the importance of the hierarchy. The aijk is the individual estimation of expert k which obtain by compared ai to aj . All expert judgments are created and computed by the formula (1), and then put data into the matrix D (2): aij =
n ai j1 × ai j2 × . . . × ai jn ⎡
a11 ⎢ a21 D=⎢ ⎣... an1
a12 a22 ... an2
⎤ . . . a1n . . . a2n ⎥ ⎥ ... ... ⎦ . . . ann
(1)
(2)
Matrix D is a comparison matrix, and its properties as following: aij > 0 aij = 1/a ji ∀ i where j = 1, 2, . . . , n.
(3)
Matrix D is considered as consistent when its factors meet condition (4) and condition (3): aij · aji = aik ; ∀i, j = 1,2, . . . , n.
(4)
The ordering of alternatives can be achieved by the approximation of matrix D and matrix P: ⎡
p11 ⎢ p21 P=⎢ ⎣ ... pn1
p12 p22 ... pn2
... ... ... ...
⎤ p1n p2n ⎥ ⎥ ... ⎦ pnn
(5)
838
H. Li et al.
The consistent judgments of factors in matrix P are presented in the form of weight ratios among alternatives: pij = pi / p j ; where i, j = 1, 2, . . . , n.
(6)
Pi is the weights of the alternatives of the order vector P: p = ( p1 , p2 , . . . , pn ) T
(7)
The formula of standardized order vector is showed as follows: p∗ = ( p1∗ , p2∗ , . . . , pn∗ )T where: p∗i = pi /
n i=0
pi
(8) (9)
The formula of the judgment matrices is showed in (10) by maximum eigenvalue method [13]. D · P = λmax p
(10)
where λmax is the maximum eigenvalue of matrix D. The inconsistency of the comparison matrix D must be less than 10% for reliable comparison. The condition (4) is not below 10%. The consistency of judgments is evaluated by the consistency ratio and consistency index. Consistency ratio = C R = C I /RC
(11)
Consistency index = CI = (λmax − n)/(n − 1)
(12)
As illustrated in Table 2, The random consistency index (RC) is calculated. Because of the columns are dependent in 1×1 or 2×2 matrices, the RC is 0. Thus the CR is calculated being infinity by formula 11. Firstly, the decision problem is divided into a hierarchy of sub-problems by the framework, each of which is independent and more easily comprehended. The factors of the hierarchy are selected on the basis of the safety risk in places of work. After the hierarchy building, the experts can compare the impact of the factors. They would selected a numerical scale to the higher level of the hierarchy. A priority index is determined by the evaluations of risks. Then, the numerical values are compared by the processed weights of the AHP. The risk are prioritized. The decision can be maked by the prioritization of risk. The most important and unimportant risk can be Identified. Hence, the management can determine the safety risk to invest. The decision makers can make a rational budget and a realistic goal.
A Framework for Occupational Risk …
839
Table 2 Normalize weight of risk items General objective
Sub-objective(Relative weight)
Criteria(Relative weight)
A. Estimated risk
B1. Dust (0.2538)
C1. Welding fume (0.1289) C2. Coal dust (0.0742) C3. Silica dust (0.0507)
B2. Physical factor (0.1482)
C4.Noise (0.0362) C5. High temperature (0.0360) C6. Illumination (0.0155) C7. Electromagnetic field (0.0225) C8. Welding arc (0.0224)
B3. Chemical factors (0.1854)
C9. Benzene (0.0338) C10. Formaldehyde (0.0236) C11. Carbon monoxide (0.0169) C12. Carbon dioxide (0.0266) C13. Sulphur hexafluoride (0.0311) C14. Toluene (0.0137) C15. Dimethyl-benzene (0.0137) C16. Pbs (0.0194) C17. Tannic oxide (0.0198)
B4. Control measures (0.2589)
C18. Night work (0.0556) C19. Aloft work (0.0602) C20. Overtime work (0.0432) C21. Shift work (0.0367) C22. Live line work (0.0634)
B5. Prevention measures(0.1537)
C23. Participating in education (0.0379) C24. Protective equipment (0.0375) C25. Protection measures (0.0371) C26. Regular checkups (0.0224)
3 Method We invited 20 experts to participate in the construction of the framework. All the experts were familiar with occupational health. The questionnaires were sent by email. The participants were required to reply in 2 weeks. After investigation, we identified a range of influence factors for occupational health and safety for electricians and held a seminar for the clarification of different influence factors, and finally designed a framework of 26 indicators within 2 levels. We prioritize the risk factors by the AHP, and developed the questionnaire for pair-comparison. The indicators were randomly ranked on a form. The experts were asked to rank the indicators in
840
H. Li et al.
an prior order. The weights of the indicators is calculated from the results of survey by AHP [14, 15].
4 Results A risk-based hierarchy was prepared as shown in Table 1, which is consisted of the potential risk threatening the occupational health of the worker in power grid. The hierarchy was comprised 5 criteria. Each criteria was further subdivided into a certain number of lower levels. There are 6 reciprocal matrices were established to help the expert making pairwise comparisons. The first pairwise comparison was made in the coefficients of the standard. In this level, different hazards were contrasted to determine the influence on the operational safety. The consistency ratios were calculated by the formula 14 and 17. “Behavioral hazard” was determined as the most significant risk category, followed by “Dust hazard” and “Chemical hazard” respectively. The similar processes were applied to the sub-standard to assign their impact on the main standard. The pairwise comparisons were made to determine the priority of the sub-standard. “Live line work” was identified that it is more affected than the other factors in the “Behavioral hazard” category. “Aloft work” was estimated to be second most major factor. In the “Dust hazard” category, the most important were ranked as “Welding fume”, “Coal dust”, and “Silica dust”. In the “Chemical hazard” category, the “Benzene” was assessed as a higher risk factors, and followed were “Carbon dioxide” and “Formaldehyde”. The standardizing weights of factors in the hierarchy were computed according to the experts’ professional understanding to the unsafe working situation. The overall prioritization were acquired by two rounds of calculation. The results showed that the weight of “Welding fume” is 0.1289, and was considered as the most significant. The following significant impacts were identified as “Coal dust”, “Aloft work”, and “Night work”. The weights are 0.074, 0.063, and 0.060, respectively.
5 Conclusions The electric power professionals are subject to a variety of occupational hazards. The electric shock and falling are the main reasons of injury [16]. The improper handling of tools and machine is other main reason to worker injury. A framework was proposed in this paper, which is used to assist electricians to assess the safety and occupational health risk in the management process. The frameworks decrease bias assessment, and assist consensus decision for the decision group. The AHP was used in this paper. It was applied to assist the superintendent assess the safety and occupational health risk in power grid enterprises. It can be used as a
A Framework for Occupational Risk …
841
effective method for ensuring and decreasing the inconsistencies of risk assessment. The decisions are decomposed into a comprehensible sub-problems of framework. It assigned distribution of weights between the standard and sub-standard. The AHP method is a very well way for ranking risks. This framework could help the superintendent to develop a realistic prevention strategy by ensuring the main risk. After realistic prevention strategy are taken, the risk would be improved according comparative rankings. Compared the less threatening risk (“Toluene”, “Dimethyl-benzene”, and “Illumination”), more precautions were improved to alleviate the more significant risk, such as “Welding fume”, “Coal dust”, “Aloft work”, and “Night work”. Electricians are always under the risk of lung disease, Karjalainen [17]’s study released that among 24 occupations, welders and flame cutters had the highest risk to develop asthma (RR, 2.34), in our study, “Dust” weights 0.2538, which means that experts are considering “Dust” as one of the important factors of occupational health and should be put into the evaluation system, with a relatively greater weight. Although “Physical factor” only weights 0.1482 in the whole framework, physical hazards are a common source of injuries in many industries [18]. There are a lot of evidences showing how the “Noise”, “High temperature” increased the occupational hazards [19–22]. The workers are exposed to a serious occupational hazard because of electrical current [23]. Moreover, compared with PES method, we firstly take protective factors into account, like “Prevention measures” which includes safety education and personal protective equipment [24] like wearing protective clothing and safety glasses to reduce these risks. In our paper, a method of prioritization risks is illustrated. It can assist the superintendent a reasonable plan for risk and hazard prevention. However, the framework provide the risk items, but without any assessment of its exposure/incident rate, which make it difficult to evaluate the consequence of the occupational risk. Thus, various studies are demanded to established a procedure for assessing the exposure of different risk factor so as to develop a more accurate method. Acknowledgements This research was supported financially by the China Southern Power Grind (Grant No. GDKJXM20180673 and GDKJXM20185761).
References 1. http://www.nea.gov.cn/. 2. Lu, J. etc. 2011. Research of electric power enterprise knowledge workers’ incentive based on fuzzy model. Procedia Engineering 16: 695–701. 3. http://www.esfi.org/. 4. http://www.bls.gov/. 5. Päivinen, M. 2006. Electricians’ perception of work-related risks in cold climate when working on high places. International Journal of Industrial Ergonomics 36 (7): 661–670. 6. Fung, I.W. etc. 2010. Developing a risk assessment model for construction safety. International Journal of Project Management 28 (6): 593–600.
842
H. Li et al.
7. Mitropoulos, P. etc. 2010. New method for measuring the safety risk of construction activities: Task demand assessment, pp. 30–38. 8. Hallowell, M.R., etc. 2009. Construction safety risk mitigation. Journal of Construction Engineering and Management 135 (12): 1316–1323. 9. Saaty, R.W. 1987. The analytic hierarchy process—What it is and how it is used. Mathematical Modelling 9 (3): 161–176. 10. Freivalds, A. 1987. Comparison of United States (NIOSH lifting guidelines) and European (ECSC force limits) recommendations for manual work limits. The American Industrial Hygiene Association Journal 48 (8): 698–702. 11. Padma, T. etc. 2007. Analytic hierarchy process to assess occupational risk for shoulder and neck pain. Applied Mathematics and Computation 193 (2): 321–324. 12. Fera, M. etc. 2009. Proposal of a quali-quantitative assessment model for the SMEs health and safety. Safety and Security Engineering 3: 117–126. 13. Saaty, Thomas L. 1990. How to make a decision: The analytic hierarchy process. European Journal of Operational Research 48 (1): 9–26. 14. Saaty, T.L. 1972. Operations research: Some Contributions to Mathematics Applied mathematics gets a new surge of life from techniques of operations research. Science 178 (4065): 1061–1070. 15. Saaty, T.L. etc. 1983. Projecting average family size in rural India by the analytic hierarchy process. Journal of Mathematical Sociology 9 (3): 181–209. 16. Hodgson, D.L. etc. 2011. Increasing electrical safety by reducing the risk of arc flash hazards. In Petroleum and Chemical Industry Conference (PCIC), 2011 Record of Conference Papers Industry Applications Society 58th Annual IEEE: IEEE. 17. Karjalainen, A. etc. 2002. Incidence of asthma among Finnish construction workers. Journal of Occupational and Environmental Medicine 44 (8): 752–757. 18. Byung, Y.J. 1998. Occupational deaths and injuries in the construction industry. Applied Ergonomics 29 (5): 355–360. 19. Lindgren, T. etc. 2000. Cabin environment and perception of cabin air quality among commercial aircrew. Aviation, Space, and Environmental Medicine 71 (8): 774–782. 20. Talbott, E. etc. 1985. Occupational noise exposure, noise-induced hearing loss, and the epidemiology of high blood pressure. American Journal of Epidemiology 121 (4): 501–514. 21. Zweers, T. etc. 1992. Health and indoor climate complaints of 7043 office workers in 61 buildings in the Netherlands. Indoor Air Journal 2 (3): 127–136. 22. Svedberg, U.R. etc. 2004. Emission of hexanal and carbon monoxide from storage of wood pellets, a potential occupational and domestic health hazard. Annals of Occupational Hygiene 48 (4): 339–349. 23. Malik, N. etc. 2010. Role of hazard control measures in occupational health and safety in the textile industry of Pakistan. Pakistan Journal of Agricultural Sciences 47 (1): 72–76. 24. Salvendy, G. 2012. Handbook of human factors and ergonomics. New York: Wiley.
Digital Media Copyright Protection Technology in the Age of All Media Yixin Chen, Xi Hu and Feng Xiao
Abstract With the development of technology in the information age, digital products are increasingly integrated into people’s lives. People enter a full-media era. However, digital media files are characterized by easy copying and rapid dissemination, resulting in a large number of Internet. Piracy and infringement issues, and even some documents involving confidential areas, have been stolen by lawless elements, seriously infringing on the intellectual property and economic interests of the file owners. This article briefly introduces what is digital media in the era of all-media, analyzes what is the key technology of digital copyright protection, and proposes a series of digital media copyright policy-keeping system architecture to protect the best interests of copyright owners. Keywords All-media era · Digital media protection · Technology · System architecture
1 Introduction Digital rights management is a systematic project involving all levels of technology, law and business [1, 2]. It provides a complete means of implementation for the commercial operation of digital media [3, 4]. Digital copyright protection technology is an emerging technology in the world that has been integrated into encryption, signature, abstract, PKI public key system, XML, metadata and electronic payment in recent years [5–8]. It is regarded as a feasible solution to copyright problems in the digital age. Program. Media objects protected by digital rights protection systems are very diverse, including games, ring tones, pictures, music, video, streaming media, Y. Chen · X. Hu (B) · F. Xiao School of Mathematics and Computer Science, Jianghan University, Wuhan 430056, China e-mail: [email protected] Y. Chen e-mail: [email protected] F. Xiao e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_99
843
844
Y. Chen et al.
and more [9–13]. Different digital copyright protection systems, although they focus on the protection objects, supported business models and technologies used, are the same, they are the same, they use digital licenses to protect digital content. copyright [14, 15]. After the user gets the digital content, he must obtain the corresponding digital license to use the content.
2 Digital Media in the Era of All Media 2.1 The Trend of Digital Copyright in the Era of All Media With the rapid development and widespread application of network technology and the arrival of the all-media era, a large number of multimedia products have been spread on the Internet. In the era of the all-media era, the pace of traditional media integration, transformation and innovation is getting faster and faster. “In-depth transformation, deep integration, and deep change” are becoming more and more conscious of multimedia. At the same time, on the road of media integration, more media are concerned about the synergy between content and technology, the integration of copyright and copyright protection. Network and multimedia have become an extremely important way for people to access information. This aspect has promoted the development of the Internet industry, and on the other hand has brought many problems. Since digital information is easily copied, modified, and then propagated, pirated information on the network is very embarrassing. In order to protect the interests of web content copyright owners, measures must be taken for digital rights management.
2.2 The Meaning of Digital Copyright Protection in the Era of All Media Digital copyright protection, in a nutshell, refers to the technology of rights protection, use control and management of digital content in the process of production, dissemination, sale and use. The goal of digital rights management is to use technology to curb piracy and illegal use, to ensure the smooth flow of sales channels in the digital product market, to protect the interests of authors, publishers, sellers and the legitimate rights of consumer users. With the increasing popularity of the Internet and the increasing awareness of copyright, digital copyright protection has entered a new era of development. It is necessary to protect the interests of copyright holders while copyright protection, and to be recognized by customers, thus realizing the digital copyright environment healthy growth. Digital media copyright protection technology is actually an intellectual property protection technology. It uses a series of computer technologies to protect the corresponding digital content. In fact,
Digital Media Copyright Protection …
Partner
publisher
Collector
845
Publisher
Retailer
user
Fig. 1. Digital media content value map
it requires users to use it legally to promote the spread of digital media and protect digital The rights of the media owner. The process of digital copyright protection is a dynamic process that involves all aspects of digital media resources. A typical digital media copyright protection value chain is shown in Fig. 1.
2.3 Necessity of Digital Copyright Protection in the Age of All Media In our daily life, we often encounter some piracy. In particular, film and television works, in addition to the platform licensed by copyright owners, often there will be a lot of piracy. Throughout the global video field, piracy usually occurs in two links: first, the process of filming content, the omission of film source in transmission, download, production, submission and other links, which may lead to the spread of film source; second, the illegal technology cracks the film after it goes online. Piracy products spread rapidly because of the ease of reproduction of film and television works. Audiences without discrimination will be confused by piracy, and even cheated by some illegal elements who use piracy for profit, resulting in unnecessary material and spiritual losses. This has also caused great troubles to the copyright party, which has caused unnecessary losses to the copyright party. For example, a TV play needs TV ratings and Internet clicks, and a movie needs box office. If piracy is rampant, people choose to see pirated movies and TV works, then it will inevitably affect the TV series ratings, broadcast volume and box office of movies. As a result, the whole media environment is not healthy enough, full of pirated products contrary to the law and morality, which will also have an impact on the creation. Therefore, it is necessary and imperative to study digital copyright protection.
3 Key Technologies of Digital Copyright Protection 3.1 Content Encryption and Decryption In the copyright protection of digital content, one of the most basic technical means is to encrypt the content itself. This kind of encryption is usually implemented by symmetric encryption algorithm. Symmetric cryptosystem is a traditional cryptosystem, also known as private key cryptosystem. In symmetric encryption, encryption
846
Y. Chen et al.
and decryption use the same key, because the encryption key is the same, both sides of communication must choose and save their common key, and each party must trust the other side not to leak the key, so that the confidentiality and integrity of data can be achieved. One of the key points of symmetric key system is how to give the key generated by one party to the other party safely. This is the basic requirement of symmetric key system communication, and also its main shortcoming. The security of symmetric cryptosystems depends on the following two factors. Firstly, the encryption algorithm must be strong enough to decrypt the information only based on the ciphertext itself. Secondly, the security of the encryption method depends on the secrecy of the key, not the secrecy of the algorithm. Therefore, we do not need to ensure the secrecy of the algorithm, but need to ensure the secrecy of the key. Symmetric key cryptosystem has the advantages of fast encryption speed and simple algorithm design. These characteristics of symmetric cryptosystem make it widely used.
3.2 Digital Signature The principle of encrypting documents only solves the problem of confidentiality of transmitting information, and other means are needed to prevent others from destroying the transmitted documents, and to determine the identity of the sender. This means is digital signature technology. Digital signature technology plays a very important role in electronic commerce security system. Through digital signature, the original message can be authenticated and verified, and the integrity, authenticity, confidentiality and non-repudiation of the sender can be guaranteed.
3.3 Digital Watermarking Technology Digital copyright protection incorporates digital watermarking technology into its technical system. When digital works are found to be illegally disseminated, the extracted watermarks can be used to prove their copyright ownership or to trace the illegal disseminators. Digital watermarking technology is an important branch of information hiding. It has a very practical research value for the protection of digital multimedia products. From the point of view of copyright protection of digital information, digital watermarking technology solves the problem of how to set authentication marks in digital media. Its working principle is to embed imperceptible information into images or video signals, so as to identify copyright owners and detect and track infringement and piracy. Digital watermarking technology can not directly prevent copying, but expose illegal copying and dissemination by verifying the ownership of products, and then punish them by legal means, indirectly eliminate pirates’ attempt to copy illegally, thus playing a role in protecting intellectual property rights.
Digital Media Copyright Protection …
847
3.4 Permission Expression Language REL Digital privilege management should first define and describe precisely who owns what privileges of digital information products, which privileges are granted to whom according to what protocols and trading methods. Sending some information must be described and marked in a standard open and computer-recognizable way, so that the digital media copyright holder system can automatically record, identify, parse and interpret the information and control the rights accordingly.
4 Digital Media Copyright Guarantor System Architecture 4.1 Server Centralized Control In order to reduce the difficulty of remote monitoring and the risk of cracking the protection system, media content can be centralized in server storage and management. Each time according to the request of paying customers, the server plays the media and transmits the content pages to the client, similar to the existing streaming movie mode. The complete content of the media is located on the server, and the result of the streaming page is obtained by the client. The advantage of this model is that it is easy to control the media. Because the complete content of the media is located on the server, the client acts as a one-way content receiver to obtain discrete content pages. The client only needs the browser and does not need to run the related cooperative control program. However, this model has at least four shortcomings. First, every time a client enjoys media content, the server needs to transfer the content page by page, which increases the burden of network transmission, especially large files such as movies. Limited by bandwidth and network speed, there will often be poor playback, affecting the use of customers or viewing effect. Secondly, servers need to install various players or heterogeneous content converters, and need to play their own designated media content for multiple online customers in real time, which increases the burden of the server, and even causes the server to be overwhelmed. Third, unreasonable for customers. In this mode, the paying customers only have the right to view the media, not the right to hold the media documents. Poor network transmission prevents users from gaining the same viewing or using effects as enjoying local media. Fourthly, this business model is acceptable for enjoyable media such as movies or music. For document media, it is difficult to meet the user’s needs of playback, page turning, jumping and paging printing, because this will further increase the pressure of server data caching and processing.
848
Y. Chen et al.
4.2 Client Centralized Control In this mode, the media content is encrypted on the server, then all relevant control programs and ciphertext content are encapsulated and packaged, and the package files are sent to the paying customers through the network or CD-ROM at one time. Customers play the media offline on their computer devices, and the package control program automatically resides in memory with the package files. The security of media content depends entirely on the authentication and effective control of the client by the control program in the package file. This model is similar to the traditional business model, which satisfies the convenience and habits of users in using media. Users feel that they are not forced to perform any additional operations when using media files as they did not take measures. Clients do not need network connections when using media, so users have a high acceptance of this mode. In this mode, the security and tampering resistance of the client are fragile because the media usage is recorded on the client. In addition, this model is also difficult to achieve digital goods based on micro-payment leasing and other consumption patterns. For the entire content of the media and the program that controls the playback are exposed to the client, the difficulty of cracking this system is greatly reduced.
4.3 Collaborative Control Between Server and Client The whole management and control task is decomposed into server and client, which are accomplished through network interaction. The client cooperates with the server to control the content of the program and encrypted media content encapsulation, forming an executable package file to transfer to the client. Every time a client opens a package file, he automatically requests the right license containing the content decryption key from the server. The obtained rights license is temporarily stored in the client and destroyed immediately after the media is played. This distributed management and control mode has four advantages. Firstly, it avoids large amount of real-time network transmission, and only needs to transmit lightweight rights license. Secondly, it not only realizes the server’s supervision over the whole life cycle of media content, but also gives customers the ownership of the media content they buy. Thirdly, because the client has shared the task of supervising and broadcasting media, the server is exempted from the burden of both content services and broadcasting services, and only needs to act as a management platform for the sale and use of digital goods. At the same time, the server can real-time understand and record the use status of media, prevent many people from using the same paid media at the same time, and establish credit blacklist violating the use rights. Fourthly, it increases the difficulty of the system being cracked.
Digital Media Copyright Protection …
849
5 To Sum Up In the context of all-media, Internet technology facilitates people’s access to information, but because it can be widely replicated, it also brings some security problems and social problems. Digital piracy and knowledge theft have greatly affected the publishing industry and copyright protection industry, as well as the interests of copyright owners and the sustainable development of the publishing industry. Acknowledgements This work is supported by PhD research startup foundation of Jianghan University (Grant No. 1008-06610001,1008-06680001).
References 1. Xu, XY, and Q. Wang. 2015. Design and implementation of geometric invariant zerowatermarking in digital copyright protection. Applied Mechanics & Materials 731: 187–192. 2. Tao, E.J. 2017. A picture’s worth: The future of copyright protection of user-generated images on social media. Indiana Journal of Global Legal Studies 24 (2): 617. 3. Amirmazlaghani, M. 2018. A novel contourlet domain watermark detector for copyright protection. arXiv preprint arXiv:1801.07023. 4. Xie, Y., and Y. Wang. 2016. Network-based Usage Monitoring and Rights Management of Digital Media. IEEE International Conference on Communication Software & Networks. 5. Khan, M., and T. Shah. 2015. A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Computing & Applications 26 (4): 845– 855. 6. Hou, J.U., D. Kim, W. Ahn, et al. 2018. Copyright protections of digital content in the age of 3D Printer: Emerging issues and survey. IEEE Access, PP(99): 1–1. 7. Gonge, S.S., and Ghatol, A.A. 2017. An enhancement in security and copyright protection technique used for digital still image. International Conference on Nascent Technologies in Engineering. 8. Sk, Ayesha, and V. Masilamani. 2018. A novel digital watermarking scheme for data authentication and copyright protection in 5G networks. Computers & Electrical Engineering: S0045790617319778. 9. Vaidya, S. Prasanth, and PVSSR Chandra Mouli. 2015. Adaptive digital watermarking for copyright protection of digital images in wavelet domain. Procedia Computer Science 58 (8): 233–240. 10. Singh, P., and S. Agarwal. 2017. A self recoverable dual watermarking scheme for copyright protection and integrity verification. Multimedia Tools & Applications 76 (5): 1–40. 11. Wang, X., Z. Yang, and S. Niu. 2017. Copyright protection method based on the main feature of digital images. In Advances in intelligent information hiding and multimedia signal processing, 141–147. Cham: Springer. 12. Yuliani, A.R., and D. Rosiyadi. 2017. Copyright protection for color images based on transform domain and luminance component. International Conference on Information Technology Systems & Innovation. 13. Gonge, S.S., and A.A. Ghatol. 2017. An integration of SVD digital image watermarking with AES technique for copyright protection and security of bank cheque image. International Conference on Contemporary Computing & Informatics.
850
Y. Chen et al.
14. PM, Neena, and Kamal Bijlani. 2015. Copyright protection for E-learning videos using digital watermarking. Fifth International Conference on Advances in Computing & Communications. 15. Uehira, K., M. Suzuki, Silapasuphakornwong, P., et al. 2016. Copyright protection for 3D printing by embedding information inside 3D-printed objects. International workshop on digital watermarking.
Realistic Dilemma and Breakthrough Path of “Innovation and Entrepreneurship” Education in Private Colleges and Universities Under the Background of Informatization Ying Chen Abstract Since in 2015, Guiding Opinions on Developing Maker Space and Promoting the Public to Innovate and Start Business and Implementation Opinions of General Office of the State Council on Deepening Innovative and Entrepreneurial Education Reform in Universities and Colleges have been successively issued. The Party and the country try every effort to guide and support the further implementation of the policy of “innovation and entrepreneurship” and the number of college students is increasing day by day. According to Investigation Report of Innovation and Entrepreneurship of College Students in China in 2017 issued by Center for China and Globalization (CCG) on September 26, 2017, “more than 60% college students have interest in innovation and entrepreneurship. Among them, the top three students come from engineering majors, management science and economics” [1]. The actual proportion of starting the business can not reach 5%. This data has a huge gap compared with entrepreneurship ratio in developed countries, such as America ([2] Yunhua in Journal of Wuhan University of Technology [Social Science Edition]:141–147, 2013). Keywords Innovation and entrepreneurship · Realistic dilemma · Breakthrough path · Informatization
1 Realistic Dilemma of “Innovation and Entrepreneurship” Education in Private Colleges and Universities Private colleges and universities are an important component of higher education in our country. It is known that owing to the limitation from the private college and universities, human, physical and financial resources are very limited. They put more energy in academic level, which is to improve and cultivate talents. There are very less private colleges and universities focusing on the entrepreneurship education. Y. Chen (B) Wuhan Technology and Business University, Wuhan 430065, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_100
851
852
Y. Chen
Therefore, the innovation and entrepreneurship education in the private colleges and universities still need to take a longer and harder way to go compared with the innovation and entrepreneurship education in state-owed colleges and universities.
1.1 Difficulty of the Integration of “Innovation and Entrepreneurship” and the Traditional Education System Notice of Implementing the National College Students’ Innovation and Entrepreneurship Training Plan of the “Undergraduate Teaching Project” (JGH [2012] No. 5) has pointed out that “College students’ innovation and entrepreneurship training plan needs to enter talents’ cultivation scheme and teaching plan” and “the policy support should be given to course construction, the selection of students’ courses, examination, result ratification, credit identification, flexible student status management, etc.” To most private colleges and universities, owing to the limitation in school history and funds for running a school, the deposits of campus culture and education and teaching standards are waiting to be improved. Although in thinking, it focuses on innovative and entrepreneurship education, owing to too many limitations, it is difficult to promote it [3]. Most private universities do not form all-round innovation and entrepreneurship education instruction thinking and take the innovative education as the goal of university education. Therefore, in the setting of courses, it lacks the instruction from systematic educational theory and the planning of comprehensive curriculum. And the innovation and entrepreneurship education only occupies the second place in class. How to integrate entrepreneurship education and the traditional education must pass through long-term exploration and practice and be completed through the creativity from the whole society.
1.2 Lack of “Innovation and Entrepreneurship” Education Resources in Private Colleges and Universities It is difficult to set the entrepreneurship project by relying on the majors. In recent years, with the implementation of “innovation and entrepreneurship” education, part state-owned colleges and institutes promote the transition of the result of entrepreneurship by relying on teachers’ scientific research projects and provide the land for college students’ innovation and entrepreneurship through academy of sciences, industrial parks and the entrepreneurial incubation base [4]. Due to the limited site of running a school and unitary fund source of running a school, the accumulation of social resources is less. Due to the short time of running the school, the main energy of schools mainly focuses on regulated teaching and education, with less scientific research achievements. Even if the students in the private universities
Realistic Dilemma and Breakthrough Path …
853
and colleges have very high entrepreneurial enthusiasm, the projects, which lack scientific and technological content, can only stay in the low level. It is difficult to develop the sound interaction and interpenetrating mode between entrepreneurial and innovative education and the professional education. They can only conduct the low-level pioneering work, for they break away the majors. Lacking professional theoretical course of innovation and entrepreneurship is the common phenomenon the national private colleges and universities face when they conduct the entrepreneurship education. Owing to the lack of the development and research of professional courses, the entrepreneurial courses are very insufficient and there are even less practice courses. This needs the private universities and colleges to conduct course reform to a certain extent and construct and set the courses with more entrepreneurial features and form the course structure, which is featured with many layers, many structures and the connection of elective courses and compulsory courses. Similarly, the private universities and colleges need to construct a vivid and active entrepreneurial education atmosphere. Compared with other options, such as the setting of courses and providing practice training, the entrepreneurial atmosphere occupies the highest proportion, which shows that the contemporary college students urgently need an entrepreneurial atmosphere. However, this entrepreneurial atmosphere can not be available [5].
1.3 Insufficient Teacher Team of “Innovation and Entrepreneurship” Major Establishing the professional teacher team is the key of the development of entrepreneurial education. The private universities and colleges mainly see young teachers. They just graduate from universities and then start their teaching career in the universities. They have very poor social experience. The young teachers have just completed the transition of roles from a student to the teacher. It requires a process for them to give a lecture in the class at leisure. Cultivating the teacher team, which is qualified for the education of “innovation and entrepreneurship”, has a high requirement on the practice ability and professional level of current teachers. Therefore, currently, the “innovation and entrepreneurship” education of private universities and colleges stay in the unordered stocking period. The professional teachers ate tired of completing the teaching task and have no energy and lack corresponding capacity to help and instruct students. The “innovation and entrepreneurship” education in the private universities and schools just provide a site and let students start a business on their own. They receive very limited professional instruction and the result is very poor [6].
854
Y. Chen
1.4 “Innovation and Entrepreneurship” Education Lacks Effective Implementation Institutes The private universities and colleges do not set up an institute, which is professionally taking charge of implementing the entrepreneurial work. In the domestic, except several pilot institutions, most private universities and colleges all lack professional institutes to take charge of systematically implementing the entrepreneurship education. This has led to the entrepreneurial mechanism of college students not comprehensively blossoming and developing. Due to lack of specific organs, many institutes have suffered the embarrassing situation when they develop the college students’ entrepreneurial mechanism that that they think they have nothing to do about this and take themselves as the outsiders, which leads to fragmented, intermittent and disorderly development [7]. Besides, owing to the fact there are no specific institutes to take charge of the entrepreneurial education, this leads to the lack of experience and communication between the entrepreneurial education and sister colleges and not systematical, persistent and overall organization and implementation [8]. In fact, the entrepreneurial education overturns the traditional education mode. We need to walk out from books and the campus and face the society. As an educational system, it is a supplementation to the traditional mode. It requires all personnel in all fields and in the whole society to work together and complete. Therefore, if we want to truly improve and implement the entrepreneurial education, it is an impossible social task without a specific responsible organ.
2 Outlet of “Innovation and Entrepreneurship” Education in the Private Colleges and Universities According to the implementation suggestions from the State Council on deepening the entrepreneurial and innovative education reform in universities and colleges, entrepreneurial and innovative education is put on the strategic height about “what kind of people should we cultivate and how to cultivate talents”. Besides, very clear goals and specific requirements are put forward. This may perhaps point out a clear road for the “entrepreneurial and innovative” education for the private colleges and universities.
2.1 Promote the Reform of the Course System of “Entrepreneurial and Innovative” Education Private colleges and universities need to sufficiently analyze the features of the major, sets up the goal of cultivating the applied “entrepreneurial and innovative” talents, innovates the cultivation mode of “entrepreneurial and innovative” talents and realize
Realistic Dilemma and Breakthrough Path …
855
diversified talent cultivation. Developing the “entrepreneurial and innovative” education should break through the limit of traditional education, control the scale of the major, regulate the professional management, optimize the resource allocation, develop the targeted entrepreneurial education activity, promote the integration of the speciality and entrepreneurship, so as to make the construction of the major to match the realistic need. Let the participation entrepreneurial education fully integrate the education system and establish comprehensive course system. By relying on the industry and their own resources, the courses should be set by connecting the theory class and the practice, so as to realize the diversified entrepreneurial courses, broaden the direction of the major and realize the effective innovation [9].
2.2 Set Up the Implementation Platform of “Entrepreneurial and Innovative” Education Through Multiple Channels Firstly, private colleges and universities should strengthen the communication and cooperation between the government and enterprises, conduct the rich and diversified entrepreneurial and innovative practice activities, establish the perfect academic competition system and explore the long-term mechanism of academic innovative competition, construct the new entrepreneurial and innovative implementation platform from policy, public opinions, funds, technology, and other aspects. By means of the guidance of public opinion, activate college students’ innovation spirit and entrepreneurship enthusiasm, issue the political measures and give help in fund and technology and encourage college students to courageously start a business. Secondly, explore college students’ incentive mechanism in entrepreneurship and innovation. By means of analyzing the feasibility and conducting preliminary market investigation, provide the support for the entrepreneurial and innovative project and can produce social benefit, establish and perfect the entrepreneurial and innovative incentive of college students, give certain physical or spiritual reward to the members of the project and academic advisers and schools, lead more and more college students to taking part in entrepreneurial and innovative activities, so as to produce more social and economic benefit and form the benign cycle. In the end, form the good entrepreneurial and innovative atmosphere. The government is the animateur of entrepreneurial and innovative activities, colleges and universities are the implementer of entrepreneurial and innovative activities and the society is the provider of entrepreneurial and innovative activities. Good entrepreneurial culture can activate the courage of college students’ starting a business. At the same time, collages and universities should establish all kinds of cultural bases of makers, conduct the entrepreneurial and innovative lectures, implement the plan of college students’ entrepreneurship and innovation plan, provide multi-channel entrepreneurial and innovative platform and cultivate college students’ innovation spirit [10].
856
Y. Chen
2.3 Strengthen the Construction of “Entrepreneurial and Innovative” Teacher Team The fundamental key of “entrepreneurial and innovative” quality is the teacher. Establishing a high-quality “entrepreneurial and innovative” teacher team is the key of improving the quality of “entrepreneurial and innovative” education. Firstly, promote the professional entrepreneurial and innovative teacher team, improve the identification of teacher qualification, encourage teachers to take a temporary post and practice in the enterprise, and improve their own entrepreneurial quality by means of taking part in the mature entrepreneurial project. At the same time, strengthen the construction of excellent entrepreneurial and innovative teacher group, improve their entrepreneurial quality by means of taking part in mature entrepreneurial project and at the same time, strengthen the work of constructing excellent entrepreneurial and innovative teacher group. According to the categories and requirement of subjects, establish the across-subjects and across-schools teaching group. By means of the interdisciplinarity, conduct the collaborative innovation, co-create the new entrepreneurial and innovative education and improve the quality of education. Secondly, strengthen the qualification training of entrepreneurial and innovative teachers. Orderly organize teachers to take part in the training of “entrepreneurial and innovative” teachers all levels of governments set and actively take part in the identification of teacher qualification in every technique post to the teachers. Secondly, colleges and universities should actively broaden the selection channel of entrepreneurial teachers. Select talents in multiple directions and channels, conduct entrepreneurial and innovative education lecture regularly, guide students with their experience, help them improve their understanding to the entrepreneurship and provide relevant consultation. These employees not only have macroscopic knowledge, but also have the actual entrepreneurial experience. They can impart policy knowledge and entrepreneurial experience in different fields and industries, which can open a new channel for students’ employment as they master entrepreneurial and innovative knowledge.
2.4 Teaching Management Department Should Become the Implementation Unit of “Entrepreneurial and Innovative” Education By means of reforming the mode of cultivating talents and constructing the course system of “innovative and entrepreneurial” education, “entrepreneurial and innovative” education can not just stay in the second class, but should truly walk in the first class. Private colleges and universities should fully develop the feature of flexible system and mechanism. And education administration department should fully consider to reasonably set and plan the entrepreneurial education course and vocational guidance courses. This requires all educational units to integrate the market, connect
Realistic Dilemma and Breakthrough Path …
857
with enterprises and rectify the project, realize the zero contact of campus culture and enterprise culture, as well as the seamless joint of teaching standard and production standard. At the same time, it is very necessary to set up the research methods, the academic cutting edge, entrepreneurial foundation, employment and entrepreneurial instruction, etc. Secondly, teaching administration department should implement the course standard and regulation of “entrepreneurial and innovative” courses and integrate the “entrepreneurial and innovative” education into the estimation system of teaching quality and employment quality. By means of holding the entrepreneurial and innovative competition, discipline competition purposefully at regular period, founding the innovation and entrepreneurship club and developing the entrepreneurial saloon activities, students’ insight in the communication should be improved. It stimulates teachers to take students into their scientific and research project and integrate the academic development and practice experience into science and research, so as to let students know about the cutting-edge knowledge, explore in the experiment, improve students’ manipulative ability and lay the foundation for entrepreneurship and innovation.
3 Conclusion To the private universities and colleges, the root cause for the ideal effect of the educational effect of “innovation and entrepreneurship” is that the private colleges and universities in our country has a very late beginning and the conditions of running a school are very harsh. Private colleges and universities should actively face the dilemma of the reform of “innovation and entrepreneurship” education and transit the ideas to follow the requirement of the development of times in time. The “innovation and entrepreneurship” is transmitted into the specific measures. By closely following the step of the reform of the education of “innovation and entrepreneurship”, the substantial development in the private colleges and universities should be realized.
References 1. http://www.ccg.org.cn/Event/View.aspx?Id=7577. 2. Yunhua, Li. 2013. Empirical study on college students’ entrepreneurial consciousness–Taking 11 universities in Guangdong province as examples. Journal of Wuhan University of Technology (Social Science Edition) 02: 141–147. 3. Chunhua, Zuo. 2012. Study on the problems and countermeasures of entrepreneurship education in private colleges and universities–Take SW private college in Hunan province as an example. Changsha: Hunan Normal University. 4. Yao, Yixia, Wenshun Zhang, and Jiudian He. 2018. Problems and reflections on the construction of first-class undergraduate teaching staff from the perspective of “double first-class” strategy. Journal of Jiangxi Normal University (Philosophy and Social Sciences Edition) (3): 127–133.
858
Y. Chen
5. Ning, Chuanfeng, Ke Wang, and Dong Wang. 2018. Entrepreneurship and innovative education in the universities and colleges in our country: Dilemma, exploration and outlook—Vision based on the practitioner of entrepreneurial education. Education Modernization (04): 36–38. 6. Yuyun, Zeng. 2018. Dilemma and countermeasures of the construction of teacher team of innovation and entrepreneurship education. Discussion and Practice of Education and Teaching Method 7: 241–242. 7. Weihui, Mei. 2016. Organizational model of entrepreneurship education in Chinese colleges and universities: Causes of convergence and dissolution of reality. Research on Education Development 13: 29–34. 8. Zuo Zelin, and Ping Luo. 2018. The difficulties and countermeasures of the organization and operation of entrepreneurship education in colleges and universities in China–Based on the experience and inspiration of 12 American entrepreneurship centers. Educational Development Research (19): 78–84. 9. Huang, Zhaoxin, and Dan Tan. 2016. Research on university support system for college student’ entrepreneurship. Research on Higher Engineering Education’s (5): 49–52. 10. Yuanyuan, Zeng, and Luo Qiulan. 2017. Current situation and development strategy of innovation and entrepreneurship education in colleges and universities. Guangxi Social Science 04: 215–217.
Construction of Foreign Language Curriculum Resources Under the Background of Big Data Yanxia Hou
Abstract With the advent of the Information Age, the informatization, digitization and networking of teaching resources for higher education have become an inevitable trend. Under the background of big data, this paper firstly analyzes the opportunities brought by the big data era for the construction of foreign language curriculum resources on the basis of defining the important concepts of “big data” and “curriculum resources”, and then probes into a new idea on curriculum resource construction that setting up an integrated curriculum resource platform by multi-party cooperation. In order to solve the problems existing in the current curriculum resource construction, supporting measures like system construction, financial and technical support and teacher training programs should be taken to guarantee the effective construction of foreign language curriculum resources. This research is expected to offer some insights for the language educators so as to achieve the purpose of keeping pace with the Information Age and improving the quality of foreign language education. Keywords Big data · Curriculum resource construction · Supporting measures
1 Introduction With the rapid development and wide spread of computer technology and network communication, human has entered a new stage—the Era of Big Data. Data has become a new resource. The speed and efficiency of information dissemination are further improved through the transformation of big data, cloud computing and Internet and the application of various mobile terminals, which has injected new vitality and provided more convenience for education industry. The Outline of the National Medium- and Long-Term Education Reform and Development Plan (2010–2020) has a clear statement: “Information technology has a revolutionary impact on the development of education, and must be given high priority… to integrate educational informatization into the overall strategy of national information development [1]”. Y. Hou (B) Nanchang Institute of Technology, Nanchang 330099, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_101
859
860
Y. Hou
The advent of the Big Data Era has broken the general teaching concept “Foreign language teaching is just learning textbooks” in traditional foreign language education [2]. It completely abandons the lagging view of foreign language teaching that learning cannot go out of class and learners cannot think without teaching materials instead of incorporating foreign language teaching into the students’ colorful life and practice. An important task in the instructional reform of foreign language is to strengthen the awareness of building curriculum resources, improve the understanding of curriculum resources, and rationally develop and utilize various curriculum resources to meet different needs. Therefore, the foreign language teaching in the Information Age should adhere to the principle of using textbooks as a guide and broadening students’ learning spaces in an all-round way, strive to promote the integration of foreign language teaching and students’ daily communication, and realize the comprehensive development and organic utilization of various curriculum resources.
2 Important Concepts 2.1 The Concept and Characteristics of Big Data As for the meaning of “big data”, the generally accepted definition has not yet formed currently. In 2015, the International Telecommunication Union first interpreted the meaning and characteristics of big data in the “Cloud-based Big Data Needs and Capabilities Standards”. It considered “big data” to be “a kind of mode which gives permission for collecting, storing, managing, analyzing, and visualizing large data sets with heterogeneous characteristics under real-time constraints.” In September 2015, the State Council issued the “Outline for the Promotion of Big Data Development”, which stated that “big data” refers to “a data set with the feature of large capacity, multi-type, fast access and high application value” [3]. The Era of Big Data means the advent of the Information Age with data explosion. The core is big data, and the big data era means all walks of life should be aware of the enormous impact that data can have on the public. Big data is concerned with its large capacity, diverse types, fast access and high application value. It is widely used in modern society. Big data era makes data become an important strategic resource to promote social development after energy and materials do. Resources play an vital role in all aspects of human life.
Construction of Foreign Language …
861
2.2 Curriculum Resources Curriculum resource is a concept put forward during curriculum reform. The content of curriculum resources is extremely rich. It refers to the sum of all human, material and natural resources available in the curriculum development process such as curriculum design, implementation and evaluation [4]. Language teaching should attach great importance to the development and utilization of curriculum resources. This is the renewal and improvement of curriculum concepts, and it is also the inevitable result of the development and deepening of teaching reform. There are three points of view of curriculum resources: I. Resources of learning environment and technologies provided to all learners. II. Teaching resources that support teaching to achieve expected functions and purposes. III. Material resources throughout the teaching process. Generally speaking, there are two types of resources, namely tangible resources and intangible resources [5]: tangible resources include textbooks, teaching materials, appliance and equipment, etc.; intangible resources refer to the abilities and experience of teachers, the knowledge and learning ability of students, parental attitude, school support, etc. Therefore, the curriculum resources don’t equal to textbook, but the sum of all things, man and objects that can serve the teaching activities.
3 The Opportunities Brought by Big Data Era for the Construction of Foreign Language Curriculum Resources 3.1 Enrich the Curriculum Resources Under the background of Big Data, the curriculum resources have become more abundant, mainly reflected in the three aspects of type, space and construction subject [6]. From the perspective of the types of curriculum resources, they are more diverse such as teaching applications (APP), multimedia courseware, MOOC, micro-lecture, etc., which have become a powerful complement to the textbooks. From the spatial distribution of curriculum resources, students have a wider range of time and space to obtain curriculum resources, and they can use curriculum resources anytime and anywhere. The off-class learning supplements on-class learning, the online learning supplements offline learning, and virtual resources supplement real ones. The space for students to acquire course resources has been expanded. In terms of construction subject, all sectors of the society have joined the Internet-based curriculum resource development, which becomes a multi-party cooperation.
862
Y. Hou
3.2 Promote the Sharing of Curriculum Resources with High Quality Sharing is the feature of Information Age. Technologies such as big data, cloud computing, and mobile internet have created a resource-sharing environment for education. The sharing spirit and technology in the Era of Big Data play an important role in the construction of high-quality curriculum resources, specifically in promoting sharing of resources with high quality between teachers and students from different regions and schools, avoiding “resource islands” and idle resource [6].
3.3 Make the Integration of Curriculum Resources Come True Cloud computing technology plays a vital role in the integration of curriculum resources. It can link curriculum resources together and integrate the curriculum resources of different disciplines under different subjects, online and offline, to achieve better implementation. The rational allocation of curriculum resources is convenient for teachers to find and use, so as to maximize the function of curriculum resources and enhance the rate of utilization. Under the background of Big Data, the subjects from on-campus, off-campus, domestic and overseas, different fields and different occupations have gathered in Internet, which makes the original scattered curriculum resources be integrated.
3.4 Improve the Level of Curriculum Resource Construction At present, many colleges have started the job of curriculum resource construction responding to the strong advocacy of the government, the Education Bureau, and the teaching administration. On the one hand, big data technology can not only accurately collect and analyze students’ curriculum resource requirements, but also calculate what curriculum resources students may use in the future learning, and ensure the continuous update of curriculum resources. Feedback on curriculum resources can also be collected in time for the adjustment and optimization of resources. On the other hand, big data technology can track the trajectory of Internet resources. Once new curriculum resources appear, the system will promptly inform the curriculum resource builders in order to guarantee the sustainable evolution of the curriculum resource system. In addition, big data analysis technology can also be used to choose curriculum resource intelligently, eliminate low-quality resources, and ensure the high quality of curriculum resources [6]. We can reach a conclusion from the above statements that if foreign language teachers can make full use of these opportunities to construct curriculum resources,
Construction of Foreign Language …
863
the quality of foreign language curriculum resources will be undoubtedly improved to a large extent. However, the current construction of foreign language curriculum resources only relies on the model of quality curriculum at state, province or college levels. Relevant people have not changed their concepts and awareness, let alone make full use of the opportunities brought by the Era of Big Data. The primary problems are: I. The construction of curriculum resources lays stress on the form rather than the content. Financial and technical support is not guaranteed [7]. II. People involved in the construction of curriculum resources lack property awareness, and the phenomenon of “taking from others” is serious [6]. III. The utilization rate of curriculum resource is low because of its low quality, slow update and lack of applicability. IV. The actual needs of teachers and students are not reflected in the curriculum resource construction. V. The breadth and depth of curriculum resource sharing is not enough in addition to the repetition of similar courses [7]. In view of the above problems, the author is exploring new ideas and supporting measures for the construction of foreign language curriculum resources based on the background of the Big Data Era.
4 Ideas on the Construction of Foreign Language Curriculum Resources Under the Background of Big Data 4.1 Identify Talent Training Objectives and Course Content Under the background of the Information Age, the curriculum construction takes the demand of talent market as premise, the opinions and suggestions from government, education authorities and enterprise as basis, combining with the actual situation and professional characteristics of the students. Professional training plan should be revised after broad investigation and serious discussion for elaborating the teaching objectives and main content of each course clearly. The content of the course serves for its objectives, and it is necessary to match the teaching objectives with the graduation requirements and then gain high achievement.
4.2 Participants in the Construction of Curriculum Resources For a long time, the builder of foreign language curriculum resources is relatively simple, just the teacher. Although some teachers are experienced and have accumulated a certain amount of teaching materials, they usually have limited time or energy or technology in curriculum resource construction, which leads to the low quality of the resources. It is not feasible that the construction of curriculum resources relies on the course participants only. It must cover a higher level and a wider field. So the
864
Y. Hou
Fig. 1 Participants in the construction of curriculum resources
author designed a model of multi-party participants in the construction of curriculum resources (as shown in Fig. 1). The participants of curriculum construction mainly include four parties: college, teachers, students and enterprises [8]. Taking the school-enterprise cooperation as an opportunity, college formulates standards and provides policy support with reference to the needs of enterprises in curriculum resource construction; teachers and enterprises cooperate with each other to produce curriculum resources and teachers update curriculum resources from time to time based on students’ feedback; students make use of curriculum resources to conduct course learning and give feedback on learning content and effects through an interactive platform. College, teachers, students and enterprises participate in the whole construction process and improving curriculum resources together. The big data analysis tools help teachers to have a comprehensive understanding of the student’s learning situations so that they can carry out targeted teaching. In the Internet environment, curriculum resource platform and multi-party participation can effectively promote students’ autonomous learning ability, improve the teaching quality of teachers, and enhance the passion of enterprises to participate in language education. That is multi-win.
4.3 The Content of Curriculum Resources The foreign language education is a comprehensive system. In addition to the five skills of listening, speaking, reading, writing and translating, it also includes the improvement of humanistic literacy, the enhancement of autonomous learning ability, and the development of comprehensive abilities in language use.
Construction of Foreign Language …
865
Fig. 2 Model of curriculum resource platform
Under the premise of investigating and analyzing the needs of enterprises, college, teachers, students, etc., the curriculum resource platform is designed into three sections: teaching resources [9], interactive platform and curriculum evaluation. And each part is a large collection of many elements (as shown in Fig. 2). I. Teaching resources In view of the natural connection between foreign languages and the international community, foreign language curriculum resources must have the powerful capacity like the sea. The teaching resources such as electronic textbooks, materials, syllabus, PPT, lecture notes, course videos, assignments, teaching reflections, etc. created by the instructors constitute the basic content of the teaching resources; in addition, the network resources should be fully utilized. Creating or sharing the course-related MOOC or micro lectures brings convenience to learners for online learning, and course-related network links are also provided to learners to browse the network information. Through the cloud service platform, it is very easy and convenient to obtain internet information and store data and resources. Practice resource is also an indispensable part. By making full use of the practice base, training workshop or virtual platform, the students know how to apply what they have learned in practice. Besides, the classic cases and industry materials provided by cooperative enterprises are also a valuable asset for the cultivation of application-oriented talents. II. Interactive platform Students are also participants in the construction of curriculum resources. Setting up an interactive platform is to facilitate information exchange and teacher-student communication. This section contains BBS, forum and online questionnaires, etc. which can not only issue notices, but also deliver messages left by students to teachers. In the forum, Students exchange ideas, or directly communicate with the curriculum instructor to solve the problems immediately. Online questionnaires can be designed
866
Y. Hou
according to the needs of course study, resource construction and update. It is online filling, submission and data analysis to provide a basis for the optimization of curriculum resources. In short, the interactive platform provides students with a window of post-school feedback, which is also convenient for teachers to understand the students’ traits and needs and then make an adjustment in the construction of curriculum resources. III. Curriculum evaluation The curriculum evaluation consists of two parts: formative evaluation and summative evaluation. In order to meet the needs of curriculum evaluation and reduce the burden of the teacher, the curriculum evaluation can be divided into three parts: job correction and feedback, item bank, and online test. The common forms of foreign language assignment are word dictation, translation, composition, papers, etc. which take the teachers a lot of time and effort. That is also a key reason why some foreign language teachers are reluctant to arrange homework. The development of the job correction and feedback section requires students to submit their assignments online. After the teacher inputs the reference answers, the system automatically corrects and gives feedback, which greatly saves labor. Self-evaluation, mutual evaluation, and group evaluation can also be applied in this section to allow students to take part in the evaluation process, which will encourage them to be more responsible for their work as well as benefit from the evaluation. Questions in the foreign language test are much more than other courses, making the test design difficult and cumbersome. The construction of item bank eliminates this problem right away. Curriculum evaluation can also be conducted through online testing, and this system provides relevant data for teachers to analyze test results and propose improvement measures.
5 Supporting Measures for the Construction of Foreign Language Curriculum Resources 5.1 Policy Support The lack of meticulous organization and sophisticated system in the construction of curriculum resources will greatly lower the level and utilization efficiency and influence the sustainable development of curriculum resources construction. Therefore, it is imperative to improve and perfect the curriculum resource systems and strengthen the institutionalization, standardization and rationalization of curriculum resources construction. The system construction includes the following aspects: First, the college curriculum resource management systems, from the policy formulation to the operation, ensure that the responsibilities of curriculum resources construction are clear and go smoothly. The second is the curriculum resource screening system which determines the screening criteria. Materials that can build high-quality curriculum resources are
Construction of Foreign Language …
867
preferred. The third is the curriculum resource evaluation system. Appropriate evaluation can provide a lot of feedback to help judge the strengths and weaknesses of the previous round of curriculum resources construction, and provide more guidance for the follow-up construction. Specific measures include: College formulates commendation system, commending and rewarding the individuals or teams who make great contribution to the construction of curriculum resources; regular selection of high-quality curriculum resources; and third-party evaluation.
5.2 Financial Support The construction of curriculum resources is a long-term and complicated project. Whether the curriculum resource is effective and high-quality is inseparable from the investment of funds. The construction of curriculum resources requires abundance of instruments and equipment. It is necessary to improve the infrastructure construction of the college, introduce experts and technicians, and conduct teacher training. These measures make the construction funds remain high. Therefore, establishing a funding mechanism raising funds through multiple channels is the key to solve the problem. Firstly, the college should increase the investment into the construction of foreign language curriculum resources, which is the main source of funding. Nowadays, the government, the Ministry of Education and the college have gradually recognized the value of building curriculum resources online under the background of Big Data, and have also introduced various policy incentives. However, the college faces up with the problem of insufficient funds, so it requires the government and educational management departments continuously strengthen financial allocation to support the program of curriculum resource construction. Secondly, if the college maintains a good reputation and gains recognition from all walks of the society, it can attract more social capital investment. That means college should improve its education quality and then make fund-raising an easy job. By attracting enterprise investment, community resources and other channels to update and expand existing curriculum resources can meet the basic requirements of curriculum resources construction in the Era of Big Data.
5.3 Technical Support The college can take advantage of the professional department—Network Information Center to provide technical support for the construction of curriculum resources: Based on intelligent information technology such as cloud computing, big data and Internet, curriculum resources will experience the people-oriented digital transformation. First, the application of big data high-speed processing technology completely eliminates the accumulation and access problems of curriculum resources, make it
868
Y. Hou
possible to rapidly process different types of resources like graphic images, release the pressure on the uploading and downloading of curriculum resources and accelerate the update of curriculum resource. Big data high-speed processing technology can also quickly collect data on students’ learning patterns, track their learning behavior, analyze their strengths and weaknesses, pay attention to individual differences, and build more targeted curriculum resources for students according to their needs. Second, cloud computing can be used to realize the virtual transformation of resources such as online courses, sharing platforms and excellent cases from different disciplines, categories, regions and subjects, and aggregate them into virtual education resources of different sizes as “Cloud package”, thereby realizing centralized management of resources and promoting its co-construction and sharing. Third, mobile Internet technology is applied to achieve seamless connection of all hardware, software, servers and equipment on campus, providing the possibilities for real-time communication between teachers and students, and for obtaining resources anytime and anywhere. Many technologies in the Era of Big Data can bring a lot of convenience to the construction of curriculum resources. As long as they are fully utilized, the deep integration of the Internet and curriculum resources will be realized, and the curriculum resources of the real Big Data Era will be built.
5.4 Teacher Training Teachers are the principal builders and basic strength of curriculum resource construction. Teachers’ concepts and abilities have great impact on the construction of curriculum resources [10]. The college should actively carry out teacher training programs according to the levels of teachers in response to the requirements of the Big Data Era. Conceptually, the college can adopt flexible and varied ways of training to help teachers establish the correct concept of curriculum resource construction through special training, teaching and research activities, teaching competitions, scientific research lectures, etc. so as to improve the teachers’ ability of Internet technology application and guide them to combine the Internet with curriculum resource construction. In terms of knowledge, the college should urge teachers to continuously enrich their knowledge, not only being proficient in major, but also mastering other relevant skills so as not to be overwhelmed by the wave of Big Data. From the point of ability, the college should provide teachers appropriate technical training and guidance, improve their media and information literacy, enhance their ability to acquire and screen information, understand and use data, create and evaluate resources. Emotionally, teachers should understand the opportunities for education brought by Big Data, experience the benefits of Internet technology for teaching, accept modern educational technology, and cultivate the deep affection for information technology [6].
Construction of Foreign Language …
869
6 Conclusion The development of information technology, especially the development of mobile Internet, big data and cloud computing, has changed the traditional education and instruction mode to a certain extent. The construction of curriculum resources must also follow the development of technology to adapt to new changes. Big data has built a high-quality technology platform for the entire education community, including foreign language education. This platform is promising in language teaching for its important role in cultivating students’ language ability, communicative ability and comprehensive quality, and it is also an indispensable part of modern foreign language teaching system. Based on this, the construction of foreign language curriculum resources has received more and more attention and has made great progress. The construction of foreign language curriculum resources with high quality is a long-term and systematic project. It requires not only multi-party cooperation and sharing of resources, but also a team of foreign language teachers who have the courage to try information technology and have passion for curriculum construction. It is a challenge for every language educator that How to realize the resources integration by combining the objectives of foreign language education with the characteristics of language learning from the actual situation of each college, so as to effectively improve foreign language education and keep up with the development of education modernization. At the same time, college and relevant education departments should give strong support like policy, materials, funds, equipment, places, etc., in order to encourage teachers to devote themselves to the construction of curriculum resources, and to gain the effectiveness of curriculum construction as soon as possible. Acknowledgements This research was supported by Jiangxi Educational Science Project during the 13th Five-Year Plan Period (project number: 19YB238), and Instructional Reform Project of Jiangxi Educational Commission (project number: JXJG-15-18-7).
References 1. Outline of the National Medium and Long-Term Education Reform and Development Plan of the State Council (2010–2020). People’s Publishing House (2010) (in Chinese). 2. Qin, Guojun. 2016. Problem-centered Study: The Course Design of College English Course in Chinese Exquisite Open Sharing Courseware System. Sichuan International Studies University (in Chinese). 3. Zhou, Li. 2018. Research on the Strategy for Open Government Data under the Background of Big Data. Southeast University (in Chinese). 4. Fan, Zhaoxiong. 2002. Introduction to curriculum resources. Beijing: China Social Sciences Press (in Chinese). 5. Hao, Linxiao. 2010. Creation and integration of English course resources in condition of modern technology. Journal of Longyan University (4): 53–56 (in Chinese). 6. Chu, Jun. 2018. Research on the construction of school curriculum resources in the “Internet+” era. Tianjin Normal University (in Chinese).
870
Y. Hou
7. Yu, Yi, and Wei, Feng. 2016. Research on the problems in the construction of sharing courses for college Foreign language resources based on moodle platform and the countermeasures. The Science Education Article Collects (7): 161–162 (in Chinese). 8. Li, Yuefeng. 2018. Research on the construction of curriculum resource platform and its application in the “Internet+” era. Computer Education (9): 73–75, 79 (in Chinese). 9. Ma, Guohong. 2018. Practical research on the construction of specialized course teaching resources under the background of big data—Taking “Robot application and maintenance” as an example. Education Modernization 5 (46): 331–332 (in Chinese). 10. Shi, Guangxiao, and Jiaxin Zou. 2013. Strategies in the optimization of Foreign language information resources at Chinese Universities. CAFLE (5): 54–58 (in Chinese).
Intelligent Computation of Bubble Group Motion in Mesoscale Simulation Bingbing Liu, Mingyu Wang, Fulin Yu and Shaojun Zhang
Abstract In the pump-free lithium bromide absorption refrigeration system, the two-phase flow pattern in the lift tube of the bubble pump has a decisive influence on the lift performance of the bubble pump. The heat and mass transfer between two phase interfaces can be accurately described by mesoscale method,In order to explore the working mechanism of lithium bromide solution bubble pump, the improved lattice Boltzmann method combine lattice Boltzmann heat transfer model are adopted to simulate The rising process and coalescence behavior of multiple bubbles in lithium bromide solution in a vertical bubble pump with gas-liquid density ratio of 2778. The density field and velocity vector distribution of multiple bubbles under different initial conditions were obtained. The critical coalescence distance of water vapor in lithium bromide solution with double bubbles and 3 bubbles is obtained. The motion process of 4 bubbles with different initial settings is simulated. The influence of the number of bubbles on the critical coalescence distance is discussed. That results provide a great reference value for the study of the transition mechanism between flow patterns. Keywords The improved lattice Boltzmann method · Intelligent computation · Bubbles motion
1 Introduction The solution circulation between the generator and absorber in the traditional lithium bromide absorption refrigeration unit is realized by the solution pump, and the operation of the solution pump must rely on high quality electric energy, that is, the absorption refrigeration cycle with pump cannot completely get rid of the dependence on high grade energy. The use of bubble pump instead of the traditional solution pump in absorption refrigeration can not only achieve the role of solution pump in absorption refrigeration cycle, but also use low-quality heat (such as waste heat of industrial B. Liu · M. Wang · F. Yu · S. Zhang (B) College of Naval Architecture and Marine Engineering, Shandong Jiaotong University, Weihai, Shandong 264310, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_102
871
872
B. Liu et al.
waste gas) as a heat source to drive [1], so the study of pump free has attracted more and more people’s attention [2]. The performance and efficiency of bubble pump are mainly determined by the flow pattern and transformation characteristics of two-phase flow in lithium bromide solution. For the study of bubble dynamics, scholars have done a lot of work in theoretical analysis, experimental research and numerical simulation. Hartunian and Seara [3] studied the stability and behavior of bubbles in different liquids, Walters and Davidson [4] discussed the formation mechanism of bubbles in non-viscous liquid and the movement of bubbles after formation. Li et al. [5] studied the influence of flow channel size on bubble movement behavior. Ju et al. [6] conducted an experimental study on the motion characteristics of rising bubbles along inclined walls in standing water with the help of high-speed camera technology. The above research can be regarded as an effective theoretical research method, but the bubble movement behavior will vary greatly under different experimental conditions. Due to the complexity of experiments, it is very important to study bubble movement behavior by numerical simulation. Dijkhuizen et al. [7] used Front Tracking method to conduct special model experiment and numerical simulation research on the rising force acting on a single bubble. Rabha et al. [8] conducted a numerical simulation study on the ascending motion characteristics of single bubbles and group bubbles in shear liquid and the effect of buoyancy on bubble motion in high viscosity liquid and low viscosity liquid. Gong et al. [9] used the VOF model to simulate the movement of single and double bubbles in the rectangular flow passage, and analyzed the phenomenon of coalescence of bubbles distributed up and down. Peng et al. [10] used the VOF model to simulate the movement process of bubbles with different initial speeds and different initial diameters in slurry with different densities, and found that with the increase of slurry density, the optimal size of floating bubbles decreases. Wang and Lin [11], based on the radial vibration model of spherical bubbles under the influence of acoustic radiation from adjacent bubbles, numerically simulated the radial vibration and dynamic rules of two bubbles of different sizes in the plane acoustic field. He et al. [12] used the level-set method to numerically simulate the rising motion of a single bubble under the action of buoyancy, and discussed the influence of the initial shape of the bubble on the deformation and rising speed of the bubble and the growth process of the bubble in different viscous liquids. The above simulation studies mainly focus on the effect of the size and number of bubbles on the rising motion of bubbles in solution. The coalescence behavior of multiple bubbles can significantly change the structure of flow field and the gas-liquid two-phase interface. And profoundly affect the characteristics of the whole system, Especially the study on the two-phase interaction between lithium bromide aqueous solution with high density ratio and water vapor bubbles is of great significance to improve the performance of the bubble pump. This paper for studying the characteristics of the movement of bubbles in lithium bromide aqueous solution, and then explore the working mechanism of lithium bromide solution bubble pump, using the free energy of lattice Boltzmann model, studies the side by side more than the rising process and the coalescence behavior of bubbles, side by side double bubble water vapor in lithium bromide solution are given, three bubble bubble critical and distance,
Intelligent Computation of Bubble Group Motion …
873
to simulate the different initial set of 4 air bubbles, 6 bubbles and bubbles movement process, the number of bubbles on critical and the influence of the distance, to the research of flow pattern transformation mechanism between provides great reference value.
2 Numerical Method The Inamuro [13] lattice Boltzmann free energy model with high density ratio was improved. In the distribution function of simulated phase transition, the difference term controlled by parameters was introduced, and the spatial adjacent point was replaced by time adjacent point. In the interface definition, the error caused by manual shearing was reduced, and the model could be improved to the second order accuracy with appropriate parameters. f i (x + ci x, t + t) = f i (x, t) + (1 − q)[ f i (x + ci x, t) 1 − f i (x, t)] − [ f i (x, t) − f ic (x, t)] τf
(1)
Among them q = 1/(τ f + 0.5) As for the velocity distribution function gi , the last term in the evolution equation takes bubble buoyancy into account, and the last term in Eq. (2) introduces buoyancy into the governing equation of the distribution function: 1 [gi (x, t) − gic (x, t)] τg 1 ∂ ∂μβ ∂μα {μ( + )}]x + 3E i cia [ ρ ∂ xβ ∂ xα ∂ xβ
gi (x + ci x, t + t) = gi (x, t) −
(2)
where, f ic and gic are the particle equilibrium distribution function, τ f and τg are the dimensionless relaxation time, x is the spacing between grids, t is the time step. Sequence parameters used to distinguish two phases and fluid prediction velocity can be calculated by the following formula: ϕ=
15
fi
(3)
ci gi
(4)
i=1
u∗ =
15 i=1
874
B. Liu et al.
The equilibrium distribution function f ic and gic the following formula: f ic = Hi ϕ + Fi [ p0 − κ f ϕ
κ f ∂ϕ 2 ∂ 2ϕ − ( ) ] 2 ∂ xα 6 ∂ xα
+ 3E i ϕciα u α + E i κ f G αβ (ϕ)ciα ciβ
(5)
3 9 3 1 ∂u β ∂u α gic = E i [1 + 3ciα u − u α u α + u α u β + (τg − )x( + )ciα ciβ ] 2 2 2 2 ∂x ∂x κg (6) + E i G αβ (ρ)ciα ciβ ρ To improve the accuracy of the difference scheme is an effective method to improve the numerical stability of the model. Using the second-order upwind difference to solve the first-order partial derivative, the scheme can obtain a more accurate solution with second-order accuracy error and absolute stability. On the basis of the original model, the 14-point difference scheme is used to solve the second partial derivative, which improves the adaptability of simulating the multiphase flow with large density ratio. ∂f = ∂ xα
[3 f i (xα ) − 4 f i (xα − x) + f i (xα − 2x)]/2x f or ciα > 0 [−3 f i (xα ) + 4 f i (xα − x) + f i (xα − 2x)]/2x f or ciα < 0
∂ 2λ 1 = [ λ(x + cx) + λ(xα + cx) − 24λ(xα )] α ∂ xα2 6(x)2 i=2 i=1 ⎧ ⎪ ≤ φG∗ , ⎨ ρG , φ φ−φG∗ ρ = φ ∗ −φ ∗ (ρ L − ρG ) + ρG , φG∗ ≤ φ ≤ φ L∗ , ⎪ ⎩ L G ρ L , φ > φ L∗ , 15
(7)
6
h in (x + ci x, t + t) = h in (x, t) − p n+1 = ρ0 c2
t n 1 ∂u ∗ eq (h i − h i ) − E i α x τh 3 ∂ xα 15
(8)
(9)
(10)
h in
(11)
u − u∗ ∇p =− t ρ
(12)
i=0
Sh
The model numerical solution process can be divided into the following nine steps: (1) Initialization, given the initial distribution of each point, and calculate the equilibrium state distribution functions that corresponding with each velocity distribution function;
Intelligent Computation of Bubble Group Motion …
(a)
875
(b)
Fig. 1 Comparison of single bubble shape [14]
(2) Using the obtain equilibrium state distribution functions to compute f i (x, t + t) and gi (x, t + t); (3) Bring f i and gi in Eqs. (3) and (4) to obtain φi (x, t + t)\ and the predicted velocity of the two phase fluid without a pressure gradient ui∗ (x, t +t), compute density ρi (x, t + t) using Eq. (9); (4) Using Eqs. (10) and (11) iterative compute pressure pi (x, t + t), the pressure at each time step can be calculated to convergence; (5) Using Eq. (12) compute ui (x, t + t); (6) Using the last obtained density, pressure and velocity to compute the equilibrium state distribution functions of new time step; (7) Return to step (3) and compute the flow parameters of next time step. To test to improve the effectiveness of the large than the free energy density model program, this paper simulates the literature [14] the final shape and flow field distribution of the single bubble, as shown in Fig. 1 for the final shape of the single bubble rising density contours and the velocity vector diagram and literature figure (a) (b) the comparison, the same situation in other calculation parameters, since the literature [14] only give vent fluid viscosity ratio, did not give vent fluid viscosity values, the viscosity parameters determined by the authors themselves, so the two slightly different, but the results broadly similar enough to prove that the program is effective.
876
B. Liu et al.
3 Numerical Results and Analysis 3.1 Side-by-Side Double Bubble Motion Process Two side-by-side bubbles attract and repel each other. Two horizontal side-by-side bubbles with the same size and initial diameter of 12 are set, and the initial distance between the center of the circle is 16. As shown in Fig. 3, in the process of rising, the double bubbles appear two stages of first approaching and then separating. In the first stage, when the two bubbles rise at the initial stage, the low pressure zone between the bubbles makes the two bubbles close to each other, and the interaction between the two bubbles is gravity. In the second stage, as the two bubbles rise, two vortices will appear in the flow field on the left and right sides of the bottom of the bubbles during the rising process. The distance between bubbles gradually decreases, while the speed of the double bubbles continues to increase. At this time, the vortex on the bubble surface starts to play a leading role, and the vortex direction between the two bubbles is opposite, causing the two bubbles to separate from each other. As is shown in Fig. 2, Textile mill air conditioning system consists of frequency-conversion fan and spray-chamber (air conditioning system’s core, including circulating water pump, the sink, nozzle, electric three way control valve, chiller, etc.), all air is handled by spray-water washing to meet needs of workshop temperature and humidity. When the initial bubble diameter is 10 and the initial distance between the center of the circle is 12, the motion process is shown in Fig. 3: First, the two bubbles are
Fig. 2 Side-by-side double bubble rising separation density and velocity vector distribution
Fig. 3 Side-by-side double bubble rising coalesce density and velocity vector distribution
Intelligent Computation of Bubble Group Motion …
877
close to each other when rising, and then they come into contact, and then an air bridge is formed between the horizontal bubbles, and the two bubbles are connected as a whole. Finally, the air bridge expands rapidly in the vertical direction, and the two bubbles become one. After fusion, the length of the bubbles gradually decreases to a flat disc. As can be seen from the velocity vector distribution, the flow fields around the two side-by-side double bubbles repel each other in the horizontal direction, no matter they finally converge and separate.
3.2 Side-by-Side 3 Bubble Motion Process To study the rising process of three bubbles, three round bubbles with the same size and diameter of 6 and the initial distance between bubbles of 16 are set in Fig. 4. In this case, the three bubbles rise independently, and their morphological changes during the movement are similar to those of single bubbles. However, in the process of rising, the bubble does not move in the horizontal direction and does not change its initial horizontal position. This happens because the initial bubble diameter is small and the initial horizontal distance is large, so the flow field between bubbles has little influence. The three bubbles are placed symmetrically, and the influences of the left and right bubbles on the flow field of the middle bubbles cancel each other, thus the process of 3 bubbles rising side by side and independently appears. Figure 5 set the same size diameter of 10, the initial distance between bubble three round bubble is 12, in this case, the bubble rising process in the collision and
Fig. 4 Three bubble independent motion density and velocity vector distribution
Fig. 5 Three bubble coalesce density and velocity vector distribution
878
B. Liu et al.
(a) 4 bubble motion fusion process
(b) 4 Bubble rising collision process Fig. 6 4 Bubble rising motion
fusion, bubble rising in the early three bubble deformation occurred at the same time, become a ellipsoid model, and the middle bubble level remains unchanged, but the two sides of bubble respectively to the middle, with the collision between bubbles, no broken, but three bubble fusion, fused into a big flat long bubble continues to rise.
3.3 Symmetrical Placement 4 Bubble Motion Process Set up four bubbles symmetrical placed with the same size, if the initial bubbles smaller (Fig. 6a), four bubbles in the process of movement, two bubbles will occur at the bottom of the fusion, the above two bubbles to the left and right movement respectively, and then four bubble collisions connection, merging into an elongated bubble, then dispersed into two small bubbles, from each other. When the initial bubble diameter is large (Fig. 6b), the bottom two bubbles collide first, and the top two bubbles fuse with each other. At this time, the conformal ability of the two large bubbles is very weak, and the flow field is very unstable.
4 Conclusion An improved lattice Boltzmann method is adopted to simulate the rising process and coalescence behavior of multiple bubbles in lithium bromide solution in vertical
Intelligent Computation of Bubble Group Motion …
879
tube of bubble pump under experimental conditions. The following conclusions are drawn: (1) in Inamuro [13] big density than the free energy of lattice Boltzmann model of two phase flow, the adjacent alternative space adjacent points in time, introduce the difference of parameter control of the phase change of the distribution function, the use of second-order difference scheme to solve a first order partial derivative to the wind, ten to four difference scheme to solve the second order partial derivative, first the model can simulate the two-phase flow density ratio increased from 1000 to 3000. (2) in the process of rising, bubbles disturb the surrounding flow field and attract and repel other bubbles, which is related to the size of bubbles in the bubble group and their initial positions. (3) with the increase of bubble diameter, the critical distance of coalescence decreases, because the increase of bubble diameter will lead to the increase of flow field structure and spatial steric resistance, making it more difficult for bubbles to coalesce. (4) with the increase of the number of bubbles, the interaction between bubbles increases, making the repulsive force between the whirlpools at the bottom of bubbles decrease, which is more conducive to bubble coalescence, that is, with the increase of bubble diameter or number of bubbles, the critical distance between bubbles coalescence decreases. Acknowledgements This work was funded by National Natural Science Foundation of China (project number: 51609131); Shandong Provincial Natural Science Foundation, China (project number: ZR2017MEE031); Shandong Jiaotong University Doctoral Research Initiation Fund, and Shandong Jiaotong University “Climbing” Research Innovation Team Program. Shandong Provincial Key R&D plan (project number: 2018GGX105002).
References 1. Hoffmann, L., I. Greiter, A. Wagner, et al. 1996. Experimental investigation of heat transfer in a horizontal tube falling film absorber with aqueous solutions of LiBr with and without surfactants. International Journal of Refrigeration 19: 331–341. 2. Benhmidene, A., B. Chaouachi, and S. Gabsi. 2010. A review of bubble pump technologies. Journal of Applied Sciences 10 (16): 1806–1813. 3. Hartunian, R.A., and W. Sears. 1957. On the instability of small gas bubbles moving uniformly in various liquids. Journal of Fluid Mechanics 3 (1): 27–47. 4. Walters, J., and J. Davidson. 1963. The initial motion of a gas bubble formed in an inviscid liquid. Journal of Fluid Mechanics 17 (3): 321–336. 5. Li, W.Z., D.Y. Zhao, and G.J. Chen. 2006. A numerical simulation on effects of vertical channel wide on deformation and heat transfer of a rising gas bubble. Chinese Journal of Computational Mechanics 23 (2): 196–201. 6. Ju, H., G. Chen, G.D. Li, et al. 2011. Experimental study on motion behavior of single bubble rising along inclined plane in still water. Chinese Journal of Hydrodynamics 26 (3): 327–332.
880
B. Liu et al.
7. Dijkhuizen, W., S.A.M. Van, and J.A.M. Kuipers. 2010. Numerical and experimental investigation of the lift force on single bubbles. Chemical Engineering Science 65 (3): 1274–1287. 8. Rabha, S., and V. Buwa. 2010. Volume-of-fluid (VOF) simulations of rise of single/multiple bubbles in sheared liquids. Chemical Engineering Science 65 (1): 527–537. 9. Gong, D.X., S.F. Huang, K. Wang, et al. 2014. The study on mechanism of bubble motion in rectangular channel by CFD. Nuclear Power Engineering 35 (3): 111–116. 10. Peng, X.Q., S.C. Chen, Y.P. Song, et al. 2013. Numerical simulation of flotation bubble motion in suspension fluid. The Chinese Journal of Nonferrous Metals 23 (11): 3232–3237. 11. Wang, C.H., and S.Y. Lin. 2011. The coupled motion of bubbles in ultrasonic field. Acta Acustic 36 (3): 325–331. 12. He, D., Y.P. Li, and Y.Y. Liu. 2011. Effect of initial bubble shape on dynamics of a buoyancydriven bubble. Journal of XI’an Jiaotong University 45 (1): 43–47. 13. Inamuro, T., T. Ogata, S. Tajima, et al. 2004. A lattice Boltzmann method for incompressible two-phase flows with large density differences. Journal of Computational Physics 198: 628– 644. 14. Inamuro, T., T. Ogata, and F. Ogino. 2004. Numerical simulation of bubble flows by the lattice Boltzmann method. Future Generation Computer Systems 20 (6): 959–964.
Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud Rongna Xie, Yazhe Wang, Guozhen Shi, Lin Yuan and Quanqi Li
Abstract With the increase of information resources, resources are uploaded to different cloud services in different domains. In order to facilitate cross-domain access, it is necessary to grant access authority to the subject before cross-domain access. Therefore, it has gradually become a necessary trend to apply pre-authorization access control mechanism in cross-domain. However, in this cloud service mode, pre-authorization for cross-domain access still has some problems, such as illegal access to resources, high cost of attribute mapping, easy disclosure of privacy, etc. The above problems bring a series of new requirements for cross-domain access control in cloud, such as fine-grained pre-authorization access control, privacy protection and reducing mapping cost. In order to meet these requirements, a pre-authorization usage control mechanism for attribute update in access execution (UCONpreA2 ) is proposed in this paper, and formally described. And then, the global attribute is divided into static attribute and dynamic attribute, and using local attributes for mapping. Our case analysis shows that the access control mechanism can meet the above series of requirements. Keywords Pre-authorization · Cross-domain access · Attribute mapping
1 Introduction In recent years, more and more users join the cloud environment and need to share more resources. Cross-domain access has become an indispensable data exchange method in cloud. However, how to break through the limitations of the local domain access control mechanism and make maximum and safer resource sharing with foreign domain resources and users has become particularly important. Therefore, the paper proposes a set of secure and flexible pre-authorization access control mechanism to support cross-domain access, which becomes an important support to ensure the maximum sharing of resources and system security in multi-domain environment. R. Xie · Y. Wang (B) · G. Shi · L. Yuan · Q. Li Beijing Electronic Science and Technology Institute, Fengtai District, Beijing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_103
881
882
R. Xie et al.
With the standardization and systematization of data resource management in cloud, the subject may need to access the object through cross-domain, so it is necessary for the subject to pre-authorization before the access. Only the legitimate subject has the right to access the object. Therefore, it is necessary to authorize the legitimacy of the subject before access, only the legitimate subjects have rights to access. According to this, some researchers have designed the single-authorization access control mechanism before ABAC access. However, with the execution of the access, the subject and the object attributes will change, so ABAC cannot meet the requirements of dynamic scheduling and allocation of resources in complex multi-domain cloud computing environment. In terms of the cross-domain attribute mapping, in the traditional cross-domain access security authentication mechanism, frequent information interaction will result in a large delay in cross-domain access communication, and it is not conducive to the privacy protection of the subject and cannot control the anonymity of the identity of the subject. The complex multidomain cloud computing environment has problems of high cost, decision changes brought by the change of subject and object attributes, and privacy leakage caused by the cross-domain attribute mapping. These problems bring many new requirements for access control mechanisms in cloud: (1) Pre-authorized access control. The access decision may change with the change of the subject and object attributes during the access process. Using the preauthorization usage control mechanism, the system can re-determine whether the subject satisfies the access control policy before each access is performed; (2) Attribute mapping. The global attribute is divided into static attribute and dynamic attribute. Compared with the global attribute mapping, the local attribute mapping can reduce the cost of attribute mapping and prevent the privacy leakage caused by the malicious behavior of the subject. Researchers have proposed different access control mechanisms based on the existing traditional access control model, but the complexity, randomness and dynamics of the system have not been considered. Usage Control mechanism (UCON) covers these areas in a systematic way, it provides a universal and unified framework for protecting digital resources. And it supports the variability of the subject and object’s attributes. Before each access, we can judge whether to authorize the subject or not according to the attributes of the subject and object, so as to meet the dynamic and fine-grained authorization decision and solve the problem of security interoperation in the cross-domain process, which is more suitable for the current cloud computing environment. According to the three decision components of authorizations, obligations and conditions, and the update of attributes in different time periods, the classical UCONABC model can be divided into several sub-models which are suitable for different scenarios. In the cross-domain access control mechanism of this paper, the access control mechanism is added with more fine-grained attributes, such as introducing the credit degree of the user, and compare with the pre-set credit threshold set by the object before each access authorization. It requires calculating the credit of the user through the legal and illegal access behavior of the statistical entity in the process of accessing the cloud service resources. Therefore, this paper
Pre-authorization Usage Control Mechanism for Cross-Domain …
883
adopts the pre-authorization usage control mechanism for attribute update in access execution (UCONpreA2 ), so as to achieve more fine-grained access control. The main contributions of this paper are as follows: (1) The pre-authorization usage control mechanism for attribute update in access execution (UCONpreA2 ) is proposed to implement cross-domain access control for subjects in the cloud computing environment. The study shows that the proposed access control mechanism can solve the above requirements. (2) By dividing the global attribute of the subject into subject static attribute and subject dynamic attribute for local attribute mapping, the local domain directly sends the user roaming authorization information, and the user generates the roaming authentication message and sends it to foreign domains, which shortens the length of the subject authentication message and reduces the number of rounds of information exchange. In this way, we can reduce the cost of the attribute mapping and enhance the privacy protection of the subject.
2 Related Works This section will discuss the research progress on cross-domain access control mechanism and secure roaming authentication.
2.1 Cross-Domain Access Control Mechanism Scholars have proposed different access control mechanisms for cross-domain scenarios in certain environments. ABAC single-authorized access control mechanism before access is proposed in reference [1], but it cannot meet the requirements of dynamic scheduling and allocation of resources in the complex multi-domain cloud computing environment with the change of subject and object’s attributes. Sandhu [2] proposed UCONABC usage control model, which can support dynamic and fine-grained authorization decisions and it can solve the problem of security interoperability in cross-domain process. However, further research is needed in the specific implementation of the attribute mapping, boundary defense and other modules, as well as the security of the model. The difficulty of cross-domain access research is still the cross-domain authorization problem. Reference [3] proves that the security problem of the general PreUCONA model is undecidable. In previous study, according to the attribute update time, the pre-authorization sub-model was divided into pre-authorization model (UCONpreA0 ) with no attribute update(0), preauthorization model (UCONpreA1 ) for attribute updates in access pre-execution(1)
884
R. Xie et al.
and pre-authorization model (UCONpreA3 ) for attribute updates in access postexecution(3). They are applicable to different application scenarios, such as traditional access control, MAC, DAC, RBAC, etc., which may belong to the preauthorization model (UCONpreA0 ) with no attribute update(0); The pre-authorization model (UCONpreA1 ) for attribute updates in access pre-execution(1) can be applied to the mobile phone SIM card scenario that is required by the mobile phone operator to be prepaid each month. The pre-authorization model (UCONpreA3 ) for attribute updates in access post-execution(3) can be applied to the club’s membership card measurement payment scenario [1]. However, the above model does not take into account the problem that when the subject access the object, the subject is insufficient to access the object due to the constant cost of the access.
2.2 Secure Roaming Authentication In essence, home domain security roaming can be used for cross-domain access control, cross-domain identity authentication, user privacy protection, etc. Researchers at home and abroad have conducted extensive research on roaming authentication protocols. Reference [4] proposed an identity-based multi-trust domain authentication scheme, but its computational complexity is large and its promotion is poor. Reference [5] proposed an anonymous authentication and key agreement protocol under heterogeneous wireless networks, introducing the user’s temporary authentication identity and temporary communication identity to realize the anonymity of the user. Reference [6] abstracts the heterogeneous network communication entities and establishes a universal access authentication model. Reference [7] proposes an anonymous roaming protocol for heterogeneous wireless networks. The protocol flow is simplified and has strong anonymity. In [8], under the mobile Internet, a cross-domain service access mechanism for trusted mobile platforms is proposed to realize service access and cross-domain application of trusted mobile terminals in a trusted computing environment. Reference [9] proposed a combined secure wireless roaming protocol which realizes the lightweight identity authentication of roaming, and protects the privacy of roaming nodes. Reference [10] proposed an anonymous authentication protocol against attacks under wireless networks. This protocol not only resists existing attacks, but also has high execution efficiency and can be applied to battery-powered wireless communication systems. In references [4–10], the traditional roaming authentication mechanism requires two rounds of message interaction between the subject and the remote domain, and the remote domain and the home domain to complete the roaming access of the subject. Therefore, they cause a large communication delay, a heavy computing load, and the malicious behavior of the subject, resulting in uncontrollable identity information and weak security. In cloud environment with a large amount of data information, the above literature does not achieve the flexibility and fine-grained of pre-authorization cross-domain
Pre-authorization Usage Control Mechanism for Cross-Domain …
885
access. At the same time, the security issues of cross-domain access control and crossdomain authorization remain to be solved. Therefore, the pre-authorization usage control mechanism is combined with roaming authentication mechanism, and the global attributes are divided into static attributes and dynamic attributes for mapping. While implementing pre-authorization cross-domain access control, it reduces the execution load and communication delay of participants in attribute mapping and has controllable anonymity, which is the focus of this paper.
3 Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud 3.1 Cross-Domain Access Data Flow Model in Cloud The interaction of various data flows generated by random access of different subjects in different domains and mapping of attributes between different domains in the cloud environment is shown in Fig. 1, including multiple domains (D). In this paper, we divide them into local regions and foreign regions. The domain includes the Object (O), such as the server which stored information resources, Center Authorized (CA), which stored the subject static attributes in this domain, and evaluate and authorize the registration, access and cross-domain access of the subjects by using the established access control policy; The external of the domain include the Subject (S), such as the user’s mobile phone and computer, and the Attribute Repository (AR).
Local domain
roaming authorization message
Foreign domain
roaming authentication message Attribute repository
Foreign domain
Fig. 1 Data flow diagram of cross-domain access in cloud
886
R. Xie et al.
Definition A cross-domain system in cloud environment includes the set of domain D = {Di |i ∈ N ∗ }. Each domain contains binary < Di .O, Di .ca >, in which the set of object Di .O = {Di .o j | j ∈ N ∗ }, Di .ca is responsible for providing authorization services for the resource access of domain Di according to the subject attributes. The external of the domain which includes the set of subjects Di .S = {Di .s j | j ∈ N ∗ }, and RA is responsible for storing the subject dynamic attributes as well as the system attributes. The accessing subject can access the object of the local domain or the foreign domain, and the data is propagated between the subject and the object, between the AR and the object through the CA. The subject sends the static attribute to the local domain center authorization for registration and then returns a roaming authorization information, and generates the roaming authentication information by the user. When accessing the object of the local domain, the central authorization is judged by accessing the dynamic attributes and object attributes of the subject in the attribute repository, and the subject is allowed to access the local domain after authorization. When accessing the object of a different domain, the central authorization is judged by the dynamic attributes and object attributes of the subject of the attribute repository and the roaming authentication information sent by the subject, and allows the subject to access the resources of the different domains after authorization. The updated subject dynamic attributes are reassigned to the attribute repository at the end of the access.
Pre-authorization Using desicion
Subject(S)
Right
Subject attribute
Fig. 2 Pre-authorization usage control model diagram in cloud
Object(O)
Object attribute
Pre-authorization Usage Control Mechanism for Cross-Domain …
887
3.2 Pre-authorization Usage Control Mechanism for Attribute Updates in Access Execution (UCONpreA2 ) The UCONpreA2 access control model is shown in Fig. 2, it is composed of six elements: subject, subject attribute, object, object attribute, right and authorization. Among them, pre-authorization is the decisive factor of use decision: preauthorization is a decision made before access based on subject and object attributes, which can be changed according to the changes of subject and object attributes before each access request. This is one of the prominent features of UCON model, that is, the authorization decision of access control is also dynamically changed due to the variability of attributes. In the cloud environment, which has massive resources, the paper selects the pre-authorization usage control of attribute update in access execution, that is, UCONpreA2 , by studying several sub-models of UCONABC model. Before the users access the resources, the cloud service provider gives the user a pre-authorization by the user submit the access request and its own attributes, and updates its attributes such as deduction of fees during the user’s access until the end of the access. The formalized UCONpreA2 is defined as below: Definition 1 – S, O, R, SAtt, OAtt, PreA means subject, object, right, subject attribute(SAtt), object attribute(OAtt), pre-authorization, respectively. Among them, the subject attribute is divided into the subject static attribute (SSAtt) and the subject dynamic attribute (SDAtt); – Allowed(S,O,R) => preA(SSAtt, SDAtt, OAtt, R); – OnUpdate(SDAtt, OAtt) Definition 2 SS Att = {ssatt i |ssatt i ∈ SS Att I } is a set of subject attributes that do not change normally, and SS Att i represents the set of user’s identity attributes, including its name, address, etc. c a A l Definition 3 S D Att = sdatt a , sdatt l , sdatt il , sdatt |sdatt ∈ S D Att , sdatt L il IL c C ∈ S D Att , sdatt ∈ S D Att , sdatt ∈ S D Att is a set of attributes that change according to the process of access, where sdatt a represents the user’s account assets, sdatt l represents the user’s legal access time in the domain, and sdatt il represents the user’s illegal access time in the domain.sdatt c represents the credit of the user based on the user’s legal and illegal access. PreA is a function judgment, which makes use of SAtt, OAtt and R to judge the using decision. According to the specific access control strategy, it decides whether to allow the request of the subject to access the object before the subject executes the access. We give subject the right to access object through Allowed (S, O, R); OnUpdate(SDAtt, OAtt) means to update attributes during the process of access execution. During the execution of access, attribute update can be timely updated according to the state of access of the subject, so as to make the access control decision more fine-grained.
888
R. Xie et al.
3.3 Attribute Mapping Mechanism One of the core problems of cross-domain access control is to solve the attribute mapping between foreign domains, at present, many literatures use attribute-based access control mechanism to achieve cross-domain access control in cloud. When the subject needs cross-domain access, it is necessary to map the global attributes of the subject between domains. This will not only lead to complex mapping relationships, high mapping costs, but also have malicious behavior of the subject, which lead to subject privacy disclosure and other problems. Attribute mapping mechanism has not been well solved in terms of cross-domain access. In order to solve the above problems, this paper divides the attributes into system attributes, OAtt, SSAtt and SDAtt. When the subject registers the local domain, it send the subject static attributes to the local domain for authorization, and then returned a roaming authorization information. When performing cross-domain access to foreign domains, the roaming authorization information is transformed by the subject of the user platform through the attribute mapping function into a roaming authentication message, and sent it to foreign domains. At the same time, The results of the subject attribute mapping need to be updated in the AR. Through the way of inter-domain mapping of subject static attributes, the overhead of attribute mapping and the privacy protection of subject attributes is transformed into the problem of how to formulate the attribute mapping relationship. By mapping the subject static attributes, there is no need to map the global attributes of the subject, so as to improve the efficiency of the mapping of the subject attributes, reduce the overhead, and avoid the privacy disclosure of the subject attributes in the mapping process. When the identity of the subject is verified by foreign domains, the subject dynamic attributes are extracted through the AR to further determine whether the user satisfies the access control policy and conduct access authorization.
4 Deployment and Implementation of Cross-Domain Access Control in Cloud 4.1 Deployment of Cross-Domain Access Control in Cloud The deployment of cross-domain control mechanism in multi-domain environment is mainly composed of user platform (UP), AR, local domain and foreign domain. Figure 3 shows the deployment diagram of cross-domain access control mechanism in cloud environment, in which the terminal devices used by user platform can be mobile phone, computer, tablet, etc. AR is a centralized service that stores subject dynamic attributes and system attributes and interacts with the PDP. Local and different domains are relative, mainly determined by the user’s domain. Object attributes are stored in the usage monitor (UM) for each domain.
Pre-authorization Usage Control Mechanism for Cross-Domain …
UM Gate
registration and access requests SSAtt
PEP
attributes
Local domain
PDP
roaming authorization message
access request roaming authentication message
889
UM Gate
PEP
attributes
SDAtt
(User Platform, UP)
Foreign domain
PDP
SDAtt
Attribute Repository,AR
Fig. 3 Deployment of cross-domain access control in cloud
The access process in cloud computing environment is divided into two types, local access and cross-domain access, which work in the following ways.
4.2 Implementation of Local Access Control The implementation steps for the subject to access the object in the local domain are as follows: (1) The subject completes the registration application from UP, and generates an access request with SSAtt, which submits to the local domain; (2) The local domain uses the client agent authorized by the center to push the subject static attribute to the PDP, which verifies whether the subject is legitimate or not; (3) If it is legitimate, PDP collects the SDAtt, system attributes and OAtt from the AR and UM, and make the authorization decision according to these information; (4) If the authorization is passed, the subject is allowed to access the relevant resources in the local domain, which is executed by the policy enforcement point (PEP); (5) As a side effect of the access result, the updated subject attribute, system attribute and object attribute will be sent back to the AR and the UM by PDP, respectively. In this way, a local access is completed.
890
R. Xie et al.
4.3 Implementation of Cross-Domain Access Control The implementation steps of the subject’s cross-domain access to the object of foreign domains are as follows: (1) The legitimate subject generates a registration request with static attributes to the local region from the user platform to obtain a roaming authorization information; (2) Based on the roaming authorization information, the user generates the roaming authentication information and sends the access request with the roaming authentication information to the foreign region; (3) The foreign domain uses the client agent authorized by the center to push the roaming verification information to the PDP, which verifies whether the subject is legitimate or not; (4) If it is legitimate, PDP collects the subject dynamic attributes, system attributes and object attributes from AR and UM respectively, and make the authorization decision according to these information; (5) The execution of access and attribute updates are performed in the same way as in the local domain. In this way, a cross-domain access is completed.
5 Use Case and Performance Analysis With the rise of open pedagogy, a large number of educators adopt the curriculum structure of MOOC and host their own large-scale open online courses in countries all over the world. For MOOC, the MOOC course resources in each country can be regarded as uploading to the same domain in the cloud environment, so that the MOOC resources in China and the United States are published in two different domains of cloud environments. In this section, we demonstrate cross-domain access to MOOC resources which are stored in a cloud environment. A MOOC system in a cloud environment consists of all users of MOOC and MOOC resources which are published on cloud servers. The formal description of this example is as follows: The static properties of Chinese university MOOC course users (UCON access subjects) in cloud environment, SS Att = {ssatt i |ssatt i ∈ SS Att I }, and SS Att i represent the set of identity identification attributes of users when they register on Chinese university MOOC network, including the name and address of users. The subject dynamic attribute of Chinese MOOC course users (subject) in the cloud environment, S D Att = sdatt a , sdatt l , sdatt il , sdatt c , |sdatt a ∈ S D Att A , sdatt l ∈ S D Att L , sdatt il ∈ S D Att I L , sdatt c ∈ S D Att C , where sdatt a represents the user’s account balance, sdatt l represents the legal access time of the user on the website, and sdatt il represents the illegal access time of the user
Pre-authorization Usage Control Mechanism for Cross-Domain …
891
on the website. sdatt c represents the credit based on the legal and illegal access of the user. Attribute of the cloud server (object) which stored MOOC resources in the cloud environment, O Att = {oatt t , oatt a , oatt n , |oatt t ∈ O Att T , oatt a ∈ O Att A , oatt n ∈ O Att N }, where oatt t represents the pre-set credit threshold of the cloud server, oatt a represents the account assets of the cloud server and oatt n represents the number of cloud servers. If authorization is granted, then: –
Allowed(S, O, R) ⇒ Pr e A(SS Att, S D Att, O Att, R) ⇒ (ssatt i ∈ Di ∪ sdatt a ≥ 0 ∪ sdatt c ≥ oatt t );
– OnU pdate(ssatt i , sdatt p , sdatt l , sdatt il , sdatt c , oatt t , oatt a , oatt n ) In this example, the specific attributes of the logical description are given. In the process of performing the access, the user’s account asset attributes are updated in real time. As the access proceeds, the user account balance decreases and the server account asset increases. According to the legal or illegal feedback given by the access behavior, the time of the user’s legal or illegal access is counted, and the trust value of the user is estimated, which can be used as the basis for the next access judgment. To sum up, the scheme in this paper can update attributes timely, and the access control strategy of pre-authorization is more flexible and fine-grained. The global attribute is split and mapped, so as to prevent attribute leakage, which has strong security. In terms of attribute maintenance and mapping, it reduces the length of the subject attribute verification message and the number of rounds of information exchange with a small overhead, so as to meet the cross-domain access requirements under the current cloud environment.
6 Future and Prospect By combining the pre-authorization usage control mechanism for attribute updates in access execution (UCONpreA2 ) with the attribute mapping scheme in this paper, the basic cross-domain access requirements in the current cloud environment are met. In the future, the mechanism and policy formulation of cross-domain access without authorization center in cloud will be further discussed. Acknowledgements This research was supported by the National Key Research and Development Program of China (Grant No. 2017YFB0801803).
892
R. Xie et al.
References 1. Jiang, Z.T., L. Xie, Q. Wang, and W.H. Zhang. 2017. A cross-domain access control model for cloud computing environment. Microelectronics and Computers 34 (3): 65–69 (in Chinese). 2. Park, J., and R. Sandhu. 2004. The UCONABC usage control model. ACM Transactions on Information & System Security 7 (1): 128–174. 3. Zhang, X., R. Sandhu, and F. Parisi-Presicce. 2006. Safety analysis of usage control authorization models. In ACM symposium on information. ACM. 4. Peng, H.X. 2006. An id entity-based authentication model for multi-domain. Chinese Journal of Computers 29 (8): 1271–1281 (in Chinese). 5. Hou, H.F., X.S. Ji, and G.Q. Liu. 2011. Identity-Based anonymity authentication protocol in the heterogeneous wireless network. Journal on Communications 32 (5): 153–161 (in Chinese). 6. Hou, H.F., X.S. Ji, G.Q. Liu, and Q.W. Zhang. 2009. Provable security authentication scheme based on public key for heterogeneous wireless network. Journal of Electronics & Information Technology 30 (10): 2385–2391 (in Chinese). 7. Jiang, Q., J.F. Ma, G.S. Li, and H.Y. Liu. 2010. Identity-based roaming protocol with anonymity for heterogeneous wireless networks. Journal on Communications 31 (10): 138–145 (in Chinese). 8. Wu, Z.Q., Y.W. Zhou, and Z.R. Qiao. 2010. Access mechanism of trusted mobile platform under mobile network. Journal on Communications 31 (10): 158–169 (in Chinese). 9. Wang, L.M., S.R. Jiang, and Y.B. Guo. 2012. Composable-secure authentication protocol for mobile sensors roaming in the Internet of things. Scientia Sinica (Informationis) 42 (7): 815– 830. https://doi.org/10.1360/112011-1081 (in Chinese). 10. Yoon, E.J., K.Y. Yoo, and K.S. Ha. 2011. A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering 37 (3): 356–364.
Situation and Suggestion of Geology and Mineral Resources Standardization Qing Xu
Abstract Geology and mineral resources work is an indispensable basic and pioneering work for national economic and social development. Standardization is an important means to promote the high-quality development of geology and mineral resources work. This paper systematically combs the domestic and foreign standardization work situation of geology and mineral resources. The policy situation of geology and mineral resources industry in relevant provinces in China is analyzed. On this basis, specific suggestions on standardization of geology and mineral resources in China are put forward. Keywords Geology · Mineral resources · Standardization
1 Introduction Geology and mineral resources work is an indispensable basic and pioneering work for national economic and social development. Chinese government has always attached great importance to geology and mineral resources work. Mao Zedong once vividly metaphorically said, “If geology work is not done well, one road will stand in the way and ten thousand horses will not go ahead”. Xi Jinping’s discussions on geology work in the report of the nineteenth national congress have clear directions and clear guidances. Such as ‘Speeding up the reform of eco-civilization system and building beautiful China’, ‘Establishing and practicing the concept of Green Water and Green Mountain’, ‘Constructing ecological civilization is the millennium plan for the sustainable development of the Chinese Nations’, ‘Strengthening prevention and control of geological hazards’, ‘Strengthen the overall design and organizational leadership of the construction of ecological civilization, and set up state-owned natural resources assets management and natural ecological regulatory bodies’ and so on. There are not only the elaboration of new ideas, but also the arrangement of practical operation. It points out the direction for geology work. Geology work is also the Q. Xu (B) China National Institute of Standardization, No. 4 Zhichun Road, Haidian District, Beijing 100191, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_104
893
894
Q. Xu
foundation of the construction of ecological civilization and runs through the whole process of the construction of beautiful China. Grasping the present situation and evolution law of geological environment is the premise of the construction of ecological civilization. The construction of ecological civilization can not be separated from the support of geological science and technology. We should not only adjust the supply-side structure, enhance the ability and transform the development of geology work according to the requirements of ecological civilization construction, but also do geology work well in accordance with the natural law and support the construction of beautiful China in an all-round and whole process. Standards are the technical support for economic activities and social development, and the basic system for the modernization of national governance system and governance capacity [1]. Standard system of geology and mineral resources were built in 1998, which included basic standards of geology and mineral resources, general standards of geological and mineral exploration, standards of geological exploration technology and so on [2]. Standardization of geology and mineral resources is an important means to guarantee high quality development of geology and mineral resources. Standardization of geology and mineral resources is the basic work of Mining Administration and the extension of government functions. The Geology and mineral resources work is the need to implement the laws and regulations of mineral resources, and is also an important way to carry out administration according to law and improve management level.
2 Status of Standardization of Geology and Mineral Resources at Home and Abroad 2.1 Domestic Situation 2.1.1
Organizations of Standardization Technology
At present, the technical committee responsible for Standardization in the field of Geology and mineral resources in China is the National Technical Committee for Land and Resources Standardization (SAC/TC93) [3]. SAC/TC93 is responsible for the standardization of geological, mineral and land resources in China. SAC/TC93 is prepared and directed by the Ministry of Natural Resources and the Secretariat is the Chinese Academy of Land and Resources Economics. At present, it is the third session. SAC/TC93 has 10 sub-technical committees.
Situation and Suggestion of Geology …
2.1.2
895
Standards
At present, there are 70 national standards related to geology and mineral resources in China [4]. There are 545 industry standards for geological and mineral resources (DZ) [5] and 50 local standards for geological and mineral resources [6]. There are 13 association standards related to geological and mineral on National Association Standard Information Platform, and 13 social organizations related to geological and mineral registered through the National Association Standard Information Platform [7].
2.2 Overseas Situation The counterpart standardization technical committee of SAC/TC93 is ISO/TC82 Technical Committee on Mining [8]. ISO/TC82 has published 48 international standards. And 8 international standards is developing. ISO/TC82 has 22 P members and 23 O members. The Secretariat is located in the German National Standards Agency (DIN). China participates in the work of ISO/TC82 as a P member [9].
3 Relevant Policies of Geology and Mineral Industry in China 3.1 Jiangsu Province Jiangsu Province put forward the platform of “Cooperative Innovation Center for Safety Guarantee of Major Infrastructure in Jiangsu Province” in the Outline of the 13th Five-Year Development Plan of Jiangsu Geological and Mineral Exploration Bureau [10]. It is encouraged to participate in the compilation of relevant national, industrial and local technical standards, norms and regulations. Developing Green Economy and Serving the Construction of Ecological Environment is also pointed out. It is encouraged to actively participate in the research and formulation of relevant norms and industry standards in the field of green mines and land consolidation. Organizations are encouraged to participate in the compilation of national and industrial standards and norms.
896
Q. Xu
3.2 Qinghai Province Qinghai Province emphasizes in the “Green Exploration Management Measures (Trial Implementation) of Qinghai Geological and Mineral Exploration and Development Bureau” that “the construction of green exploration standardization should be actively promoted. It is encouraged to strengthen the green exploration work, to upgrade the level of green exploration and to gradually improve the level of green exploration”.
4 Suggestions on Standardization of Geology and Mineral Resources 4.1 Establish an Applicable Standard System of Geology and Mineral Resources to Support the High-Quality Development of Geology and Mineral Industry The current international standards of Geology and mineral resources, national standards, industry standards, local standards, association standards and enterprise standards should be systematically combed. Key areas of geology and mineral standardization shall be strengthened, such as basic standards, planning standards for geology and mineral resources, technical standards for geology exploration methods, evaluation standards for resource exploration. A scientific, systematic and suitable standard system for geology and mineral resources in China should be structured and researched.
4.2 Carrying Out the Standardization Work of Geological and Mineral Associations to Inspire the Role of Associations Within the scope of basic, general and public welfare, the government should take the lead in developing mandatory and recommended standards. In terms of underground corridor, urban space multi-conformity, geological survey, selenium-rich products, role of social organizations in the field of Geology and Minerals should be inspired. Social organizations shall independently develop association standards according to market demands.
Situation and Suggestion of Geology …
897
4.3 Participating in or Leading International Standardization Activities in the Field of Geology and Mineral Resources Actively and Enhancing the Voice and Influence of International Standards in the Field of Geology and Minerals in China The international influence of China’s standards in the field of geology and mineral resources is limited. With the advance of the “one belt and one way” initiative, China’s geology and mineral resources sector should take an active part in international standardization activities. The study of international and foreign geological and mineral standards should be strengthened. Advanced experiences of geology and mineral standardization in developed countries shall be drawed actively, in order to enhancing China’s voice and influence in the field of international standards for geology and mineral resources.
4.4 Making Strategic Planning for Standardization of Geology and Mineral Resources According to the requirements of the Party Central Committee and the State Council for high-quality development, a strategic plan for the standardization of geological and mineral resources suitable for China’s economic and social characteristics should be studied and formulated. Significance and strategic opportunities shall be put forward in the strategy. The foundation of development and existing problems shall be analysed. The next 5–10 years, the strategic orientation, macro vision, key areas, strategic initiatives and overall requirements of standardization development shall be clear. Acknowledgements This research was financially supported by Standardization Administration of the People’s Republic of China project ‘Research on Chinese and foreign standardization system architecture’ (Project Number: 572018B-6575).
References 1. Xingang, Zhang, Chunhua Yuan, and Jiuxi Han. October 2018. Comparative research on Chinese and foreign geological survey technical standards. China Mining Magazine 27: 23–26. 2. Mei Ma, Jinming Yan, and Fangzhou Xia. April 2015. Land and resources standard system: Past and future. Science Economy Society 33: 87–92. 3. http://std.samr.gov.cn/org/orgTcQuery (20190708). 4. http://www.gb688.cn/bzgk/gb/index (20190708). 5. http://hbba.sacinfo.org.cn/stdList (20190708). 6. http://std.samr.gov.cn/db/dbQuery (20190708).
898
Q. Xu
7. http://www.ttbz.org.cn/ (20190708). 8. http://std.samr.gov.cn/search/orgDetailView?data_id=5DDA8BA4002318DEE05397BE0A0A95A7 (20190708). 9. https://www.iso.org/committee/50164.html (20190708). 10. http://jsdk.jiangsu.gov.cn/ (20190708).
Commodity Sales Data Analysis Based on Qoo10 Platform Yunle Yang, Hailan Pan and Jiaqi Xiang
Abstract In recent years, many traditional trade practitioners have embraced electronization and digitization and enjoyed the convenience brought by technology. This paper takes Singapore as an example in the emerging Southeast Asian e-commerce market, based on the local mainstream e-commerce platform qoo10 to provide operational strategies for new commodities. Emphasis is laid on the monthly explosive Germa mini-dehumidifier as an example to study the operation strategy of commodity on-line initial stage, fierce competition period, heat cooling period, and provide data for the corresponding period as support. Finally, it gives suggestions for the new and old businesses and platform practitioners of qoo10, and summarizes the experience and lessons of the operation process. Keywords Cross-border e-commerce · Qoo10 · Data analysis · Conversion rate · Click-through rate (CRT)
1 Introduction The east wind of mobile Internet and modern logistics has weakened the space-time boundary of trade and awakened the huge market of cross-border e-commerce. The upsurge of cross-border e-commerce has spread from Europe, America and East Asia to Southeast Asia and Africa. According to different markets and cultures, merchants need to choose suitable platforms and commodities, and carefully carry out the operation planning of commodities [1, 2]. Singapore is an important market for e-commerce in Southeast Asia. The purpose of this paper is to study the new commodity operation planning of Singapore e-commerce platform qoo10, and to provide ideas and suggestions for the new and old businesses of qoo10 [3]. H. Pan (B) Research Center of Resource Recycling Science and Engineering, Shanghai Polytechnic University, 2360 Jinhai Road, Pudong, Shanghai, China e-mail: [email protected] Y. Yang · H. Pan · J. Xiang School of Economics and Management, Shanghai Polytechnic University, 2360 Jinhai Road, Pudong, Shanghai, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_105
899
900
Y. Yang et al.
2 Current Situation of Cross-Border E-commerce in Singapore Singapore is the most economically developed island country in Southeast Asia. With its geographical location, policy, economy, infrastructure and other advantages, it has laid a bright road for cross-border e-commerce. Located at the southern end of the Strait of Malacca, Singapore is the only way for Europe and Africa to travel eastward to Asia and Oceania [4, 5]. As a free trade port, it has established bilateral free trade relations with many countries. Superior economic strength and infrastructure are also favorable conditions for the development of e-commerce in Singapore. In recent years, Singapore’s “single window” system of international trade has greatly shortened the time limit for businesses to receive regulatory feedback, from 4 to 7 working days to 10–15 min. Tariff payment links can be transferred electronically, and the cost of declaration has also been reduced from an average of 10 new coins to 3 [6], which greatly facilitates the trade process.
3 Qoo10 Brief Introduction and Common Promotion Tools Qoo10 is the most visited e-commerce platform in Singapore, which mainly deals in fashion, digital, home, mother and child products. It is estimated that the average age of qoo10 users is 27 years old, with 75% of female users. The platform has available coupons every day, and weekend discounts are stronger, and users’shopping enthusiasm is higher than usual [7, 8]. Qoo10 provides promotional tools for businesses. Charges such as keywords, time-limited discounts, today’s promotions, etc. Key words are preferential and accurate. Time-limited preferential display location is the best and the price is the highest. Non-fee but high-volume promotional tools include planning exhibition, EDM, bestseller and so on [9]. Converted goods can be reported to EDM, planning and Exhibition activities. Bestseller is a free showcase for popular goods.
4 Operation Planning of Dehumidifier in Qoo10 The following will focus on the operation of Delma mini-dehumidifier, commodities as shown in Fig. 1. The basis of selection includes the following three points: brand heat of millet ecological chain, monthly sales of other types of dehumidifiers and better conversion of the product after shelving.
Commodity Sales Data Analysis Based on Qoo10 Platform
901
Fig. 1 Delmar mini dehumidifier
4.1 Selection Suggestions Here are some Suggestions: (1) Rubbing heat. Refer to qoo10 Home Page Hot Selling, Main Promotion Goods, such as Time Limited Second Kill, Today’s Preferences, Group Purchase and other Activity Goods. In addition, it can also be collected from the hot sales of lazada, shopee, Taobao and other platforms. (2) Follow the big businessmen. Pay attention to the stores of big businessmen and sell their best-selling products. (3) Brand power. Famous brand goods are more guaranteed in quality and aftersales, especially for new businesses. For non-brand goods, we can adopt the strategy of buying advertisements and losing money. (4) To grasp the advantages in many aspects. This means lower prices, faster logistics and differentiated services than peers. In logistics, foreign businessmen may consider importing goods into Singapore warehouses. In the aspect of differentiated services, we should consider whether we can provide practical gifts, price increase, self-service and so on.
4.2 Operational Planning (1) Operational objectives In the short term, focus on resources to create explosives, rapidly improve the natural ranking of commodities; in the latter period, stabilize the ranking, and produce stable, leading sales. (2) Platform competitiveness analysis
902 Table 1 Competitiveness comparison of two dehumidifiers
Y. Yang et al. Dehumidifier 1
Dehumidifier 2
Initial price
26.9SGD postage included
19.9SGD postage included
Point of origin
Guangdong
Singapore
Differentiated service
Optional socket
Self pickup by customer
The dehumidifier operated according to the strategy advocated by this research institute was put on the shelf on March 4, 2019. At this time, no commodity of the same type was on sale. It was priced at NT 26.9, hereinafter referred to as dehumidifier 1. On March 11, another merchant launched the same item at the price of S$19.9, hereinafter referred to as dehumidifier 2. The competitiveness pairs are shown in Table 1. (3) Operational priorities ➀ Pricing of commodities. Keep an eye on peer pricing and recommend no higher than peer pricing. When the dehumidifier 2 was priced at NT 19.9, the dehumidifier 1 was reduced to NT 19.9. Since then, the dehumidifier 2 has dropped to S$16.9 and the dehumidifier 1 to S$16.8. Keeping a low price during the period of vigorous exposure will lead to a large amount of data accumulation. ➁ Differentiated services. Dehumidifier 1 provides the selection of plugs. Buyers are in great demand for standard plugs, and dehumidifier 2 is shipped from Singapore and provides self-service. As shown in Fig. 2 the demand is less than 10%. ➂ Key words. The precise key word of dehumidifier is dehumidifier, which needs to be purchased for a long time. Key words with potential demand, such as humidifier and purifier, should be purchased according to the heat.
Fig. 2 3.18–3.25 socket purchase situation
Commodity Sales Data Analysis Based on Qoo10 Platform
903
Fig. 3 Conversion rate of dehumidifier 1
➃ Charge advertising. The conversion rate of dehumidifier 1 is stable in the initial stage of commissioning, as shown in Fig. 3. So buy ads on the site to increase exposure and sales. Website traffic: weekend > working day, night > day. ➄ EDM or planning exhibition. Submit commodities to the platform operator, and the platform will give opportunities to display commodities according to their performance.
4.3 Results Analysis The following will be dehumidifier 1, dehumidifier 2 in the period of March-April sales analysis. (1) Price of dehumidifier 1 prevails before March 25. During the critical period from March 18 to March 25, the price of dehumidifier 1 is S$16.8 and that of dehumidifier 2 is S$16.9. In some days after March 25, the price of dehumidifier 1 Rose briefly (Fig. 4). (2) The display of March 11–March 25 is shown in Table 2. Due to the advance report of EDM activities on March 18, a large number of exposure periods are scheduled for the week of March 18. (3) During the period from March 18 to March 25, the amount of clicks on dehumidifier 1 increased sharply, up to nearly 100 times. In addition, the advantage of price makes the sales of dehumidifier 1 steadily gain the upper hand, once becoming explosive products; at the same time, the relatively higher conversion rate is also satisfactory.
904
Y. Yang et al.
Fig. 4 Price trend of dehumidifier 1
Table 2 3.11–3.25 presentation
After March 25, the conversion rate of dehumidifier 1 was overtaken by rivals. However, due to the accumulation of previous data, the exposure and sales volume have been stabilized (Figs. 5, 6, 7). (4) Operation summary. During the period of 3.18–3.25, high flow and high conversion were achieved to accumulate data rapidly in the short term. The outbreak of dehumidifier 1 is inseparable from market demand and its own advantages. Therefore, it is important to recognize the market potential of commodities in
Commodity Sales Data Analysis Based on Qoo10 Platform
905
Fig. 5 CRT comparison of desiccant
Fig. 6 Order quantity comparison of desiccant
advance. In addition, natural ranking is a determinant of the starting line. Maintaining a high natural ranking helps lead the sales of goods [10]. Sustained leadership needs to grasp the flow and transformation, and test the efficiency of advertisement delivery and content production ability of the merchants.
906
Y. Yang et al.
Fig. 7 Conversion rate comparison of desiccant
5 Proposal Combined with the above analysis, the following Suggestions are given. (1) Operation of docking platform. Platform operation grasps competing data and activity resources. Timely reporting of converted goods, while providing activity prices, stable supply, good after-sales and so on. (2) Select the right amount of drainage. Drainage money speeds up shop growth. Businessmen should be prepared to make a good profit by losing money in the early stage. High sales drive the store upgrade speed. Higher grades mean lower handling rates and better rankings. (3) Advertising input. Some businessmen are stingy about advertising investment. Advertising is a means to shorten the growth cycle of stores. Refer to the suggestions of platform operation, so that advertising costs are valuable, pay early harvest.
6 Conclusion This paper expounds the growth process of new commodities from the aspects of investigation, content and operation. To do a good job of a commodity, flow and transformation are indispensable. Every decision of a business has an impact on the transformation of data. Therefore, find the right way to operate rationally, do not take chances, pay the ultimate harvest.
Commodity Sales Data Analysis Based on Qoo10 Platform
907
Acknowledgements The paper is supported in part by Gaoyuan Discipline of Shanghai–Environmental Science and Engineering (Resource Recycling Science and Engineering), Discipline of Management Science and Engineering of Shanghai Polytechnic University (Grant No. XXKPY1606).
References 1. Yin, Fei, and Yun Feng. 2015. Experience and inspiration of Singapore’s “single window” system for international trade. China Economic and Trade Guide 18: 27–29 (in Chinese). 2. Garrod, Aran, Amber D. Fandel, Jessica E. Wingfield, Leila Fouda, Aaron N. Rice, and Helen Bailey. 2018. Validating automated click detector dolphin detection rates and investigating factors affecting performance. The Journal of the Acoustical Society of America 144 (2): 931. 3. Lourdes, Cubero-Rego, Ricardo-Garcell Josefina, Corsi-Cabrera María, Cruz-Martínez Rogelio, Rebolledo-Fernández Carlos, Otero-Ojeda Gloria, and Harmony Thalía. 2017. Improving the efficiency of Auditory Brainstem Responses in newborns, using a 60clicks/s stimulation rate. Journal of Clinical Neuroscience 45: 299–304. 4. Bai, Xiuyan. 2014. Research on cross-border e-commerce conversion rate based on third-party platforms. E-Commerce 12: 45–46 (in Chinese). 5. Burkard, Robert F., James J. Finneran, and Jason Mulsow. 2017. The effects of click rate on the auditory brainstem response of bottlenose dolphins. The Journal of the Acoustical Society of America 141 (5): 3396. 6. Nebbioso, A., and P. Mazzei. 2016. Rate of a click Chemistry reaction under catalysis by traceamounts of copper as evaluated by NMR spectroscopy. Magnetic Resonance in Chemistry 54 (12): 937–940. 7. Xuefeng, Xu and Jianfeng Zhu. 2017. Research on the influencing factors of user experience on network shopping decision. Journal of Fuyang Normal University (Natural Science Edition) 34 (2): 74–78 (in Chinese). 8. Zhang, Yuefan, and zhe Ma. 2015. Analysis on innovation path of high conversion rate in online advertising design. News Front (8): 66–67 (in Chinese). 9. Anis, BenHajyoussef, Ezzedine Tahar, and Bouallègue Ammar. 2017. Gradient-based preprocessing for intra prediction in high efficiency video coding. EURASIP Journal on Image and Video Processing 1: 1–13. 10. Tao, Zeng, Zhang WanWei, XiangTian Yu, et al. 2014. Edge biomarkers for classification and prediction of phenotypes. Science China Life Sciences 57 (11): 1103–1114 (in Chinese).
Design of Temperature Detection Systems Based on Wireless Transmission Weiqing Wan
Abstract Temperature detection is widely used in agriculture, industry, intelligent detection and other fields. Real-time detection of temperature data can improve the output and quality of agricultural products in agriculture. Based on wireless transmission technology, data acquisition and processing technology and interface display technology a temperature online detection system based on wireless signal transmission is designed, the overall structure of the whole system is given, and the hardware circuit of the system’s temperature acquisition subsystem and temperature collection subsystem is designed in detail. The structure flow of the system’s upper computer software, lower computer software and wireless communication protocol are introduced emphatically. Finally, the system is integrated. The actual operation of the system shows that the system is stable, can realize real-time temperature detection, real-time alarm for ultra-high temperature, effectively reduce the risk of agricultural accidents, improve the output of agricultural products, and has good economic value. Keywords Temperature detection · Data acquisition · Wireless transmission
1 Introduction China’s industry and agriculture are in a period of rapid development. Because China is a country with a large population, the demand for agriculture is quite large. Therefore, the quality of agriculture directly affects the living standards of the people. The collection and monitoring of temperature can be more conducive to understanding the growth of various agricultural products, so that different seeding and treatment methods can be adopted according to different agricultural products. By collecting the growth environment that is suitable for the growth of agricultural products, it is possible to plant different agricultural products in different seasons according to the environmental temperature conditions required for the growth of different agricultural products to meet the demand for agricultural products in different seasons [1]. However, in a greenhouse environment such as an agricultural greenhouse, it W. Wan (B) Jiangxi University of Engineering, Xinyu 338029, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_106
909
910
W. Wan
is not an easy task to effectively detect and control the temperature in the greenhouse. If you want to adjust the temperature inside the greenhouse manually, it will not only greatly improve the greenhouse agriculture [2, 3]. The production cost will also reduce the efficiency of environmental regulation and management in the greenhouse [4]. Therefore, by using intelligent technology, a temperature detection and wireless transmission system based on single-chip microcomputer can be developed, so that the temperature data can be transmitted to the corresponding device by collecting the ambient temperature in the greenhouse and then transmitting the data through the wireless transmission technology [5–7]. In order to ensure that the ambient temperature in the greenhouse can be known at any time, effective monitoring and management can be carried out to achieve technicalization and intelligence.
2 System Structure The temperature detection system based on wireless transmission is shown in Fig. 1. The whole system mainly includes monitoring terminal, monitoring node, wireless transmission module [8], temperature detection module, buzzer prompt module, LCD12864 display module. The software design part is mainly designed by the upper computer software, collecting ambient temperature data, LCD12864 screen control, 2.4 GHz wireless module control and buzzer prompt control, etc. In addition to hardware design and software design, In addition to hardware design and software design, the design of the entire system also includes the development of system
Power Module LCD Display Module
LCD Display Module
Monitoring Node
Monitoring Node Buzzer Prompter
NRF24L01 of 2.4 GHz
Host Computer Display Interface
Monitoring Terminal
Temperature Detection Module
Fig. 1 The temperature detection system based on wireless transmission
Monitoring Terminal Buzzer Prompter
Design of Temperature Detection …
911
solutions, the selection of single-chip microcomputer and the selection of other electronic materials. The design of the whole system also includes the formulation of the system scheme, the selection of the single-chip microcomputer and the selection of other electronic materials, and the circuit schematic design of each hardware module of the system. Corrosion and fabrication of PCB circuit boards, soldering of electronic components of various hardware modules, debugging of hardware boards by oscilloscope, software code flow chart design and code writing, system integration debugging, etc. As one of the core controllers of the whole system, the single chip microcomputer controls each submodule through the single chip microcomputer. The data acquisition terminal collects the ambient temperature data by controlling the temperature acquisition module, and then through the related operations and processing, on the one hand, the processed data is displayed on the display LCD12864, and the data is uploaded to the upper computer interface through the serial port to display, and the other is displayed. On the other hand, the processed data is transmitted to the monitoring node through the 2.4 GHz wireless transmission module NRF24L01, and the monitoring node displays the received data through the LCD12864 display. Throughout the entire process of data transfer, it is done automatically. After the data collection terminal processes the temperature data, it automatically sends the data to the monitoring node. After the monitoring node successfully receives the data, the data is displayed on the LCD12864 display. The system is also equipped with a buzzer prompt circuit for prompting data transmission and reception. The whole system realizes the detection, display and automatic wireless transmission function of the ambient temperature in the greenhouse, and has certain application value in agricultural development.
3 Design of Hardware Circuit 3.1 STC89C52 Minimal System Design of Single Chip Microcomputer As is shown in Fig. 2, The minimum system of the single chip microcomputer. In general design requirements, many developers will consider the STC89C52 microcontroller, including the crystal oscillator circuit and reset circuit.
3.2 Wireless Communication Module Design As is shown in Fig. 3, is a circuit diagram of a 2.4 GHz wireless communication module. The wireless module uses the 2.4 GHz NRF24L01 chip. The required working voltage of the chip is 1.9 V~3.6 V. If the power supply voltage is too low, it will not work. If it is too high, the NRF24L01 chip may be burnt out. Therefore, the power
912
W. Wan
Fig. 2 STC89C52 Minimal system design of single chip microcomputer
Fig. 3 2.4 GHz wireless communication module circuit diagram
supply voltage of the NRF24L01 chip must be constant. However, the core controller STC89C52 used in this project is powered by 5 V, so it is necessary to convert the 5 V voltage to 3.3 V to supply power to the NRF24L01 chip. NRF24L01 communication mode is SPI, which can realize communication between master and slave devices by setting the relevant address of master and slave devices through software. After the monitoring terminal collects and processes the ambient temperature, the data is transmitted to the monitoring node through the wireless module NRF24L01, and the data is effectively transmitted.
Design of Temperature Detection …
913
Fig. 4 DS18B20 temperature detection module
3.3 LCD Display Module Design The LCD display module is an important part of the design system of this thesis. The LCD12864 display also uses 5 V power supply, so it can communicate directly with the STC89C52 microcontroller, No need to perform voltage conversion. Among them, the LCD12864 display also has a font library and no font library. The LCD12864 display with font library is relatively simple in software encoding, and the code amount is greatly reduced. The LCD12864 display can display the words numbers, letters and Chinese, as well as the mixed display function of text and graphics, free cursor setting, shift display and vertical display. Provides a friendly human-computer interface.
3.4 Temperature Detection Module Design Considering the overall layout size of the hardware circuit diagram, the DS18B20 temperature sensor used in this project is 3 pins. When designing the hardware circuit diagram, the volume of the hardware control board can be reduced, and the PCB board layout is also facilitated. Because the DS18B20 temperature sensor has strong antiinterference ability. Figure 4 is a circuit diagram of the DS18B20 temperature sensor detection module.
4 Design of System Software 4.1 Lower Computer Software Design The lower computer software part mainly includes sub-programs such as temperature acquisition subroutine, wireless transmitting module main program, serial communication subroutine, temperature display and alarm. The focus here is on the design of the temperature acquisition subroutine and the main program of the wireless transmitter module.
914
W. Wan
(1) Temperature detection main program design The communication method adopted by STC89C52 single-chip microcomputer and DS18B20 temperature sensor is single bus mode. The STC89C52 single-chip microcomputer sends the relevant control signal to the DS18B20 temperature sensor by controlling the relevant pin, so that the DS18B20 working mode is switched from sleep to startup mode. Once the DS18B20 starts working, the temperature in the environment will be automatically detected, and then the STC89C52 MCU will be controlled according to the relevant control. The data collected by the pin is processed and the temperature value is displayed on the LCD12864 display. (2) Wireless communication main program design The wireless module NRF24L01 is a bridge for data transmission between the monitoring terminal and the monitoring node of the system. Among them, the communication mode between NRF24L01 and STC89C52 of 2.4 GHz module adopts SPI mode, STC89C52 MCU uses P2 port to communicate with NRF24L01, and NRF24L01 communicates with STC89C52 MCU, it is necessary to pay attention to the address configuration of monitoring terminal and monitoring node, only address configuration Correspondingly, to ensure that the data can be successfully transmitted.
4.2 Upper Computer Software Design The design of the host upper computer software uses Visual Studio as the development platform and C# as the development language. The upper computer is used for local and remote temperature data monitoring, and its software mainly includes communication module, data storage module and data display module. When the temperature acquisition module of the lower computer collects the upper limit temperature, it will send a connection signal to the data monitoring center of the upper computer. The communication module is mainly responsible for receiving the connection signal and receiving the data according to the communication protocol. Whenever the communication module receives the data, the data storage module stores the data in a database in the Flash for saving, and the saved information includes temperature data, the received time, the data collection terminal number, and the sensor number on the terminal. The real address corresponding to the path data is simultaneously saved in the data storage module to print the report. The data display module displays the temperature of each sensor point at the current time. Whenever the data memory is updated, the data display module is also updated at the same time, so that the user can easily understand the current operating state of each capacitor temperature data collection point.
Design of Temperature Detection …
915
5 System Integration and Implementation 5.1 Monitoring Platform Based on Single Chip Microcomputer The monitoring terminal and monitoring node designed by this subject all adopt STC89C52 single chip microcomputer as the core controller, and the monitoring terminal integrates functions such as control, data acquisition processing and display. The ambient temperature data is collected using the DS18B20 temperature sensor, and the data display module uses an LCD12864 display with a font. The STC89C52 single-chip microcomputer controls the DS18B20 temperature sensor through the relevant I/O port, obtains the current ambient temperature data, and then performs related processing operations, and finally displays the temperature value to the LCD12864 display. Figure 5 is the console main interface.
5.2 Wireless Communication Test The design of this problem uses STC89C52 single chip microcomputer as the main controller, and the data transmission between the monitoring terminal and the monitoring node is performed by the wireless module NRF24L01. Figure 6 is a wireless communication test display interface. The wireless communication test operation steps are as follows: First, the monitoring terminal collects the ambient temperature and performs related arithmetic processing, and displays the processed temperature value on the LCD12864 display, The second is the communication between the monitoring terminal and the monitoring node. The communication between the monitoring terminal and the monitoring node adopts the NRF24L01 of the 2.4 GHz module, and the monitoring node is in the receiving state by default. If the monitoring terminal needs Fig. 5 Console main interface
916
W. Wan
Fig. 6 Wireless communication test interface
to send data to the monitoring node, then the monitoring terminal needs to work in the sending state, and the monitoring terminal is in the sending state by default. Therefore, when the system is powered on, the monitoring terminal will collect the collected ambient temperature data on the LCD12864,Displayed on the display. On the other hand, the data is sent to the monitoring node, and the monitoring node displays the data on the LCD12864 display, and also sets the buzzer as a prompt.
5.3 Upper Computer Communication Test The upper computer software designed in this project has the functions of data receiving, data transmission and clearing. In addition, it also provides multiple serial port selection and multiple baud rate setting functions, which can meet the needs of various application sites. When you need to upload data to the upper computer interface display, you first need to set the serial port number, baud rate, parity bit, data bit and stop bit related parameters. In particular, the baud rate setting must be correct, otherwise the data will fail to upload, or the received data may be garbled. This topic uploads the ambient temperature data to the upper computer interface for display. Firstly, the monitoring terminal collects and processes the ambient temperature data, and then uploads the data to the upper computer interface through the serial port. By viewing the display interface of the upper computer, it can be very clear. Knowing the current ambient temperature provides a friendly human-machine display interface.
Design of Temperature Detection …
917
6 Conclusion This paper designs a capacitor temperature online detection system based on wireless signal transmission, gives the overall structure diagram of the system, designs the hardware and software structure of the system in detail, and finally integrates the system, from the actual operation of the system. It can realize real-time detection of temperature, and can alarm in real time for ultra-high temperature, which effectively reduces the risk of agricultural accidents, improves the output of agricultural products, and has good economic value.
References 1. Xu, G., X. Yang, Q. Yang, et al. 2016. Design on magnetic coupling resonance wireless energy transmission and monitoring system for implanted devices. IEEE Transactions on Applied Superconductivity 26 (4): 1–4. 2. Gui, F., and X.Q. Liu. 2011. Design for multi-parameter wireless sensor network monitoring system based on Zigbee. Key Engineering Materials 464: 90–94. 3. Mo, K., Q.L. Sun, H. He, et al. 2011. The wireless system of data-acquisition of temperature based on radio frequency. Key Engineering Materials 474–476: 919–923. 4. Jia, Z., G. Yan, and B. Zhu. 2015. Design of a telemetry system based on wireless power transmission for physiological parameter monitoring. AIP Advances 5 (4): 041320. 5. Yang, Y., G. Xie, X. Xu, et al. 2011. A monitoring system design in transmission lines based on wireless sensor networks. Energy Procedia 12 (39): 192–199. 6. Rui, Y., S. Kai, L. Feng, et al. 2017. Efficient simulation of temperature evolution of overhead transmission lines based on analytical solution and NWP. IEEE Transactions on Power Delivery (99): 1–1. 7. Zhang, M., Y. Xing, Z. Zhang, et al. 2014. Design and experiment of FBG-Based icing monitoring on overhead transmission lines with an improvement trial for windy weather. Sensors 14 (12): 23954–23969. 8. Jia, Z.W., G.Z. Yan, Y. Shi, et al. 2012. Optimization design of transmitting coils in the wireless power transmission based on human tissue safety. Journal of Shanghai Jiaotong University 46 (7): 1127–1131.
Status Quo and Countermeasures of Students’ Learning Behaviors in Higher Vocational Colleges Under the Internet Age—Based on the Questionnaire Survey of 1248 Vocational College Students Baiqing Cheng, Xiang Gao and Li Ge Abstract Based on the contemporary social Internet and the rapid development of education in China, this paper conducts a random sample survey of 1248 students in higher vocational colleges, and analyzes the current status of students’ learning behaviors in higher vocational colleges. Comprehensive use of Internet resources, technology and platform to help higher vocational college students improve their learning habits, re-establish educational groups, improve the scientific nature of real-time interaction between the subject and object of education, and help higher vocational students develop from professional standard to full quality. Keywords Internet age · Students in higher vocational colleges · Current situation of learning behavior · Countermeasures
1 Introduction The Internet has developed rapidly in China and is widely used. China has entered the Internet era. With free, equal, and rapid information transfer technology, the Internet is profoundly changing people’s interactions, work, and lifestyles, and has caused widespread and profound changes in social structure [1]. The social structural changes brought about by the development of the Internet are intertwined with the current multi-levels of education in China, which constitute the complex form of education in China, and the tension between the subject of education and the object of education is increasing. As a specialist education group, vocational college students have different characteristics from the undergraduate level. This paper studies the random sample survey of 1248 students in higher vocational colleges.
B. Cheng (B) · X. Gao · L. Ge Nanjing Polytechnic Institute, Nanjing 210000, Jiangsu, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_107
919
920
B. Cheng et al.
2 Internet Age Learning Characteristics The interpretation of behavior in the modern Chinese dictionary is: an activity that is manifested by thoughts, and an activity is an action taken to achieve a certain purpose. As a kind of behavior, students’ learning behavior refers to the purposeful learning activities of individual students under the influence of the environment, and is the product and expression of the interaction between human and environment [2]. The environment here consists of two parts: the personal inner environment and the external environment. The internal environment of the individual includes curiosity, the drive of inquiry, and the need for self-growth. The external environment includes various purposes for further study, needs for life, changes in work needs, social development, behavior of surrounding groups, and requirements for school organization. Generally speaking, it is influenced by three major directions: individuals, groups and organizations.
2.1 The Difference Between the Environment of the Internet Society and the Traditional Era Social technology is rapidly and violently developing, especially Internet technology, and its impact involves all aspects of society. The Internet has become a necessary environment for modern social life, just like the “necessities” of water, electricity and gas in life. Modern communication, socializing, shopping, traveling, and learning are all inseparable from the Internet. These are very different from the behaviors before the Internet prevailed. The past stage of the Internet society is based on the kinshipbased group society, the organization society based on the interest relationship, and its future trend is a combination of free people based on interest [3], the Internet is human beings, people and things, people and The society provides an interactive medium for communication, communication, and communication that facilitates timely, cross-spatial, and breaks through the relationship of old people.
2.2 The Internet Environment Has Injected New Features and New Advantages into Learning The first is electronic data. A large amount of book materials, in addition to paper texts, are gradually available in electronic form, and students can download and purchase, view and collect them through the Internet. People can also quickly organize, analyze, summarize, etc. through some software. Some new online literature, e-magazines and even direct electronic publishing. Second is the great richness of learning content. Since the information is stored on the network, compared with the traditional library collection, the Internet is almost
Status Quo and Countermeasures of Students’ Learning Behaviors …
921
free from the physical environment such as the size of the book space and the conditions of the book collection, providing people with a huge amount of knowledge and content. A variety of books, documents and materials at home and abroad are presented on the Internet, and some content updates are also available in a timely manner. In addition, there are various online learning courses, reading clubs, etc., students can learn the knowledge and content they want to learn. Finally, the learning environment presents an open shared state. Due to the abovementioned limitations of the Internet without time and space restrictions and the presence of real people, the learning environment has gradually moved toward an open and shared state by the relatively traditional closed ivory tower. Various online learning platforms, mooc classes, and open classes are emerging. The learning partners are not limited to students in the same school. They have never met friends who are not familiar with each other and of different ages. Due to common learning purposes and the same interests, they can also Become a “classmate” and form a learning partner.
3 The Status Quo and Characteristics of Students’ Learning Behavior in Higher Vocational Colleges 3.1 The Status Quo of Students’ Learning Behavior in Higher Vocational Colleges In November 2018, students in vocational colleges and universities were randomly selected to conduct questionnaire surveys. The surveys were distributed through electronic questionnaires and data collection. Students used computers or mobile phones to fill out questionnaires. The total number of valid questionnaires collected was 1248. The high-level students who participated in the survey covered the three major categories of liberal arts, science and engineering, and art, with a total of 36 professional directions. Among them, 549 were first-year students, accounting for 43.99%; 575 were second-grade students, accounting for 46.07%; and third-year students were 124, accounting for 9.94%.
3.1.1
Students Attend the School to Participate in the Purpose of Learning
The most important thing for students to learn from the school is to “learn professional knowledge and find a related job in the future”, which accounts for 79.33%. “Opening the horizon, reaching more people and things” accounted for 12.42%; “Resolving diplomas, re-determining work, going to school with the big stream” accounted for 8.35% less. This shows that professional courses and knowledge are still of paramount importance to students (Fig. 1).
922
B. Cheng et al.
Fig. 1 Going to school for the purpose of learning
Fig. 2 Attitude towards curriculum learning
3.1.2
Attitude Towards Curriculum Learning
For the course study, 59.21% of the students are more serious in their study. They choose “no matter what course, they can listen and treat carefully, 32.61% of the students will be serious about the content they are interested in”, which also explains this. Some students have a certain degree of preference or subjective judgment, and are not necessarily arranged and framed by the school curriculum. “There is a greater correlation between teachers and professors” and “indifferent”, accounting for 8.17% (Fig. 2).
3.1.3
The Main Way of Learning
The learning path is a multiple-choice question,95.59%of students choose “classroom lectures”, and the other channels are “library paper books, magazine materials, etc.” accounting for 63.62%, and “e-books and electronic materials” account for 52.32. %. The selection of the new media “WeChat public number, Weibo” accounted for 30.45%, the “network course report class” was 26.84%, and the extracurricular training class reported 10.58%.
Status Quo and Countermeasures of Students’ Learning Behaviors …
923
Fig. 3 Main ways of learning (multiple choice questions)
In general, the learning path of students is still biased towards traditional classrooms and books and materials, and learning through new media and extracurricular newspapers are the means of learning aids (Fig. 3).
3.1.4
Learning Inside and Outside the Class
Students’ attention in the classroom is mainly concentrated on “teacher teaching”, accounting for 85.18%; 10.34% of students’ attention is mainly on “electronic devices such as mobile phones.” The rest are “sleeping, playing games, thinking about things”. For extracurricular learning, only 17.31% of students will spend “many” time, while 80.85% of students choose “general and occasional”. For the classroom learning approach, how to learn, “teacher board book PPT teaching” and “extracurricular real practice” two options, were selected 76.6 and 70.27%. “Combining electronic devices, new media, such as Weibo and WeChat” accounted for 69.63%, while “Computer Multimedia Teaching” had the lowest selection rate of 64.34%. From this point of view, the learning in the classroom is the main learning time period for the students of higher vocational colleges, and the teaching method of listening to the teacher’s board PPT and combining the extracurricular real practice is the main habit and tendency of the students (Figs. 4 and 5).
3.1.5
Learning Autonomy
For the learning process, 56.33% of the students hope to “have certain planning and guidance, some can arrange it themselves”, and “12.12% of students who choose the course content and progress flexibly”, and “follow the teacher’s teaching plan arrangement is good” The number of people only accounts for 21.55%. In other words, the traditional way of following the overall arrangement of school teachers is not in line with the needs of students in higher vocational colleges, even if such teaching plans have been carefully considered and designed.
924
B. Cheng et al.
Fig. 4 Learning attention in the classroom
Fig. 5 Classroom learning path (multiple choice questions)
For the supervision of learning, 35.82% of the students choose to “supervise according to the needs”, 33.81% of the students hope to “occasionally urge”, as for “someone urges” and “do not need to supervise”, the two ends account for 20.67 and 9.7%. Students want to have some autonomy and flexibility in controlling the whole learning process. If you want to learn and how to learn, you need to have your own subjective considerations and choices. However, at the same time, teachers are expected to be able to supervise them according to their needs or occasionally. This reflects some of the subjective characteristics of student learning, and the autonomy of learning is still weak (Fig. 6).
3.1.6
Network Self-Study Learning Situation
76.52% of students who have experienced self-learning knowledge through network and electronic devices, 23.48% of students who want to try and “have no experience”. Prove that most of the students have known or used the network for self-study.
Status Quo and Countermeasures of Students’ Learning Behaviors …
925
Fig. 6 Learning autonomy
3.1.7
Classroom Information Learning Effect
Classroom information teaching has been carried out to a certain extent in higher vocational colleges in the past 2–3 years. Students accounted for 85.26% of the “information-based teaching methods”, but “I think that the improvement of their learning effect is obvious” is only 26.97%, and 72.18% of the students feel that the improvement of their learning effect is “general.” This item indicates that informatization teaching has been basically carried out in higher vocational colleges, and there is still a certain improvement in the connotation construction.
3.1.8
Learning Method Selection
Students choose “mainly arranged by schools and educational institutions, combined with self-study outside the classroom”, which accounts for the highest proportion of 48.64%. “According to their own needs, they arrange their own learning”, followed by 33.73%, “With the school, The arrangement of educational institutions is the lowest, at 17.63%. The selection trend of this learning method is consistent with the student’s treatment of the course, indicating that the student is interested in learning and hopes to have his own active part.
3.1.9
Learning Difficulties
For the biggest obstacles on the road of self-learning, the most choices for students are “poor learning habits and weak self-learning ability”, accounting for 37.26%, “no learning goals and motivation” accounted for 24.6%, “energy attention is being used by various electronic devices”. “Distributed computer games” accounted for 16.91%, “less learning channels” accounted for 14.18%, “no good teachers’ teaching guidance” accounted for 7.05%.
926
B. Cheng et al.
Fig. 7 Learning Disability
Although high vocational college students have higher hopes for independent learning, their own learning habits and abilities have insufficient support for independent learning. The negative impact of electronic devices on student learning should receive attention (Fig. 7).
3.2 Analysis of the Characteristics and Causes of Students’ Learning Behaviors in Higher Vocational Colleges A better result. Due to the screening of the college entrance examination, the students’ self-study reflects the students’ previous learning status and study habits. Some studies have shown that the proportion of high-efficiency students in higher vocational colleges is lower [4]. There are not many students with good study habits, strong initiative, and good acceptance among middle school students in higher vocational colleges. The good learning atmosphere is relatively weak. Therefore, although the students of higher vocational colleges have the heart to learn on their own initiative and grasp the state of learning, rhythm and progress, but they are driven by the inertia of their own habits, there are fewer excellent objects that students can refer to each other, and the good learning atmosphere is weak. I don’t know how to change, and the lack of effective methods and paths have hindered the development of students to some extent.
4 Thinking and Countermeasures Aiming at the current status of students’ learning behaviors in higher vocational colleges, it is related to the individual factors of students, the group in which they live, and the environment in which they live. It shows the state of interaction between individual behavior and environment. Based on the current environment, resources,
Status Quo and Countermeasures of Students’ Learning Behaviors …
927
platforms and technology development of the Internet, think about the following aspects of countermeasures.
4.1 Enhance Learning Motivation, Improve Self-Learning Ability, and Use Internet Resources to Learn and Develop Good Habits The level of learning motivation is high and low, which directly affects the state and persistence of students’ learning activities [5]. Before entering the university, higher vocational students often take the university as the main motivation for learning. However, after entering the university, they will lose their motivation and become confused, which leads to inefficient learning activities. School management and curriculum arrangement in higher vocational colleges are very different from those in primary and secondary schools.
4.2 Rebuilding the “Organic Solidarity” Education Group by Using the Internet Durkheim used “mechanical solidarity” and “organic solidarity” to describe the social cohesion and form of ancient society and modern society. The traditional education group cohesion method often falls into different levels, different geographical schools and different professions through the college entrance examination, which is relatively a kind of “mechanical unity” with inelasticity. At present, most of the object objects facing classroom teaching are class students formed by “mechanical unity.” Therefore, in the process of education development and implementation, the education subject will inevitably use the fuzzy “average” level of the educational object as an anchor point.
4.3 Combining Internet Technology to Improve the Rational Science of Real-Time Interaction Between the Subject and Object of Education Different from the traditional education school represented by Herbart and the teacher of education as the center, and the “modern education” group represented by Dewey, which is advocated by the education object students, the current education mode emphasizes the subject of education. Interaction, synergy, democracy, equality. It is influenced by the differences between teachers and students, the constant uncertainty and dynamics in the education process, and the higher teacher-student ratio.
928
B. Cheng et al.
The subject or object of education often forms a strong position on one side, while the other has a tendency to be weak and marginalized. It often makes the interaction of education fall into a process of subjective, spontaneous, blind exploration, and lack of science [6]. Internet technologies, such as evidence-based teaching, can form relatively full-time, procedural educational big data through the “concomitant” collection of relevant data in teaching. Such data can provide better information feedback for both the subject and the object of education, which is conducive to the weak side of the teaching from marginalization to marginalization, strengthen the equality of education, and ensure the synergy between the subject and the object of education. Guide the educational practice activities well and continuously improve the scientific nature of the real-time interaction of educational activities [7]. The different family environments and learning experiences of students in higher vocational colleges have created different learning habits for individuals. Because of the lack of understanding of learners’ own academic abilities, students’ backgrounds of knowledge cognition, traditional teachers’ artificially formulating learning programs or layered teaching for learners, to a certain extent, can not fully satisfy the students’ individualized need. It is difficult for teachers to fully understand in a traditional way [8]. Internet technology can not only fully, real-time, peer-to-peer record and analysis of students’ learning. Teachers can use artificial intelligence technology to even push learning content personally, which largely satisfies students’ individualized learning. It is required to coordinate the teaching and learning through technology, so as to develop a good study habit of the students.
4.4 From a Single Professional Standard to a Comprehensive Education Learning Environment for Building a Comprehensive Quality With the advent of the Internet age, learning situations have changed dramatically. The students’ learning objectives and learning paths are more and more diversified. The cross-analysis of the data through the questionnaire shows that the proportion of learning to find a good job is decreasing with age, and learning is to solve the diploma and suspend the proportion of the work direction [9]. It is getting higher and higher. With the deepening of professional study, the employment orientation of students in higher vocational colleges is more and more uncertain. This is inconsistent with the training and positioning of high-skilled talents in higher vocational colleges. On the other hand, school classroom teaching is no longer the only requirement of students. Real practice and electronic information reading are important sources of learning. As students grow older, their dependence on classroom learning is getting weaker (Fig. 8). As an education provider, if only a single linear vertical setting is made according to professional requirements, it does not meet the trend of students in higher vocational colleges. Combining the characteristics of the status quo of higher vocational colleges, using the Internet to enrich educational resources, combined with
Status Quo and Countermeasures of Students’ Learning Behaviors …
929
Fig. 8 Trends in student age and overall learning dependence in the classroom
various technical means, to build a three-dimensional integrated education, from the professional-based to the comprehensive education of “full literacy” [10].
5 Conclusion The Internet has developed rapidly, affecting all aspects of life and learning. The Internet has brought a broader and richer resources, platforms and advanced technical means. Students in higher vocational colleges can make up for their own inadequacies through scientific and rational use of the Internet, improve their own learning and self-improvement [11]. Acknowledgements This research was supported by 2017 Jiangsu University Philosophy and Social Science Fund Project 2017SJB0628; 2016 Nanjing Polytechnic Institute Humanities and Social Sciences Teaching and Research Project NJCC-2016-YB-15; 2018 Jiangsu University Philosophy and Social Science Research Fund Project 2018SJA0630.
References 1. Liu, Shaojie. 2012. The change of social structure in the era of network. Academic Monthly 10: 14–23. 2. Peng, Wenhui. 2012. Analysis and modeling of online learning behavior. Doctoral thesis of Huazhong Normal University. 3. Zhao, Jin, and Hongling Chen. 2018. Internet society and the new axis age. Journal of Beijing University of Technology 1: 50–55. 4. Luo, Jianping, and Ma Luting. 2013. Relationship between student types and learning behaviors in colleges and universities. Journal of National Academy of Educational Administration 8: 78–83.
930
B. Cheng et al.
5. Yuan, Guiren. 2005. Theory and practice of values, 399–400. Beijing: Beijing Normal University Press. 6. Li thickening. 2015. Preface with big data. Shanghai: East China Normal University Press. 7. Duan, Chunyu, and Jiandong Cai. 2016. Research on knowledge mapping in international ubiquitous learning fields. Modern Distance Education Research 1: 85–95. 8. Li Manli, Xu, and Sun Mengxi Weiping. 2015. Analysis of learning behavior of MOOC learners. Open Education Research 21 (2): 36–69. 9. Jiang, Zhuoxuan, Yan Zhang, and Li Xiaoming. 2015. Analysis and prediction of learning behavior based on MOOC data. Journal of Computer Research and Development 52 (3): 614–628. 10. Yao, Chunzhen, Jianrong Mi, and Hongcheng Wang. 2009. A review of research on “learning behavior” at home and abroad. Teaching and Management 30: 48–50. 11. (US) David Myers. 2006. Social Psychology. Hou Yubo, Le Guoan, Zhang Zhiyong, et al. Translation, 97. Beijing: People’s Posts and Telecommunications Press.
Structural Design of Snapping Machine of Brittle Materials and Its Virtual Development Wenjun Kou, Xiang Chen, Qiangqiang Wu and Liang Shen
Abstract Based on the ideology of concept design, according to the mechanical model of snapping bar, reference matrix crack fracture theory, using the force closure method of clamping bar, design for the snapping mechanism of brittle materials. Then, using virtual simulation software PRO/E to establish some virtual model of parts, and virtual assembly for virtual model of parts, verify the reasonableness of the structure of snapping machine of brittle materials. Hereafter importing virtual model of snapping machine of brittle materials into dynamic simulation software ADAMS, obtaining the motion curve of the key parts. At last, the feasibility of snapping machine of brittle materials was demonstrated. Keywords Stress fracture · Snapping machine · Matrix crack · Virtual development
1 Introduction Blanking is the first process of mechanical processing. The existing blanking methods generally have the problems of high energy consumption, low efficiency, large material consumption and poor blanking quality, etc. Therefore, seeking a blanking method with high quality, low consumption, high efficiency and low energy consumption has become a new target in this industry. With the development of cracking technology, a blanking method based on stress state characteristics and notch effects has been proposed, called “stress blanking” [1]. Some achievements have been made in the research of stress blanking equipment, among which the equipment used for brittle metal material blanking mainly includes bending-limited stress blanking machine, buckling stress blanking machine and hydraulic bar breaking machine [2]. Among them, bending-limited and buckling stress blanking machines share the defects of complicated structures and need a lot of accessories (e.g. notch-cutting mechanisms, etc.), with a long processing cycle and complicated processes (notches need pre-cutting). Though with a simple structure, W. Kou (B) · X. Chen · Q. Wu · L. Shen Experimental Teaching Department, Northwest Minzu University, Lanzhou 730030, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_108
931
932
W. Kou et al.
the hydraulic bar breaking machine is easy to get out of control if the bar breaks while the external force has not been removed, and it still needs to pre-cut a notch. Brittle material blanking equipment based on cold snapping has the advantages of simple structures, simple processes (no need of pre-cutting), short processing time and the like compared with other blanking equipment, and has high research value. In this paper, a brittle material snapping machine was designed based on the idea of stress blanking, the mechanical model of bar snapping, the matrix crack fracture theory and the method of clamping bars by force closure. Then, by means of virtual product development technology, the rationality and feasibility of the designed model were analyzed, and improvement suggestions were put forward, which provides a powerful reference for the actual production and application improvement of the bar snapping machine, and saves both time and money [3, 4].
1.1 Structure Design Process of Brittle Material Snapping Machine The brittle material snapping machine consists of a basic machine, a power system and a control system, wherein the basic machine is an innovative mechanism, and a reasonably designed structure is the core of the brittle material snapping machine. The design process was as follows. Firstly, an overall plan was designed based on the idea of stress blanking, the mechanical model of bar snapping and the processes of bar snapping. Secondly, according to the layout of the overall plan, by drawing on the matrix crack fracture theory and using the method of clamping bar by force closure, the plan of each component mechanism of the brittle material snapping machine was designed. Then, according to the size range of the processed bar, the strength of parts, especially key parts, was designed, to avoid the loss of bar snapping precision caused by stress failure of parts. Finally, under the condition of meeting the requirements of part strength, the size of parts was drawn up. According to the plan of each mechanism and the size of parts, an assembly diagram was drawn. The power system, as another core of the brittle material snapping machine, mainly involved the hydraulic cylinder selection and the hydraulic system diagramming [5, 6].
1.2 Theoretical Basis of Bar Snapping Design The matrix crack fracture theory was first proposed by Prof. Li Youtang who studied the stress field strength and stress singularity of matrix crack and provided new manufacturing methods to form matrix cracks with different materials, further developing and expanding the crack technology theory [7]. In engineering practice, the use of artificial V-notch to achieve efficient fractures of solid materials has been widely used in engineering. However, the added process of V-shaped notch pre-cutting reduces
Structural Design of Snapping …
933
Fig. 1 The definition of matrix cracking
the efficiency of material cutting, while matrix cracks formed with different materials can realize efficient and rapid fractures of materials. Matrix crack is a new type of crack as shown in Fig. 1. The two materials (Materials 1 and 2) have different physical properties. They are connected together in a certain way. An artificial Vshaped notch is formed on the interface of the two materials. A load is imposed in a sensitive stress state caused by an appropriate loading mode. Depending on the stress singularity of matrix cracks formed by an artificial notch, the cracks at the tip of the artificial notch are expanded. In this way, rapid and regular separation on the continuous interface of solid materials is realized [8]. In practice, cuts have two main shapes, V and U. In the fracture design, V-shaped cuts are usually used for bar materials, because the sharpness effect of V-shaped cuts is relatively more significant. The existing literature has neither raised any further doubts about the shapes of notches when studying the impact of notches on the fatigue performance of a sample, and nor tried to find a more favorable shape for fractures. In this paper, an idea of semi-V-shaped notches was put forward after comparing the characteristics of cracks and V-shaped notches [9]. The idea of artificial semi-V-shaped notches formed by matrix cracks came from the matrix crack thought and referred to the semi-V-notch effect. As shown in Fig. 2, 1 is an artificial semi-V-notch formed by matrix cracking, 2 is a clamp for forming matrix cracks, and 3 is a broken bar. Fig. 2 Artificial semi-V-notch formed by matrix cracking
934
W. Kou et al.
1.3 Structural Design According to the mechanical model of bar materials, the idea of matrix cracking and the mechanical clamping method, matrix cracks were formed. By using the forceclosed clamping method, a snapping machine suitable for bar snapping was designed. According to the entire processing process of bar materials and considering the operating principle of snapping mechanisms, it can be divided into two steps, which are to clamp the bar materials first and snap the bar materials second. Hence, a brittle material snapping machine that includes feeding mechanism, clamping mechanism and snapping mechanism should be designed. The structure diagram is as below, as shown in Fig. 3. (1) Lathe bed (2) Feeding mechanism (3) Clamping mechanism (4) Snapping mechanism. The working process can be seen from Fig. 4. The force application mechanism acts on the pressing block 1, repeats the working process in Fig. 5, and clamps the bar 4. Due to the use of the force-closed clamping mode, when the bar is clamped, Fig. 3 The structure of the snapping machine
Fig. 4 The mechanism diagram of bar snapping
Structural Design of Snapping …
(a) Lathe bed
935
(b) Die body
(c) Upright
(d) Pushing block
(e) Clamping block
(f) Cutting edge
(g) Shaft
(h) Bearings
Fig. 5 The virtual model of typical parts of the snapping mechanism
936
W. Kou et al.
Fig. 6 The virtual model of typical parts of the clamping mechanism
(a)Upper clamping block
(b)Lower clamping block
the load is gradually greater than the elastic force of the return spring 8, and due to the constraint of the shaft 3, the whole mechanism can only rotate around the shaft and the bar is subjected to bending moment. As the force application mechanism continues to load, the bar will be broken off.
2 Virtual Development of Brittle Material Snapping Machine 2.1 Establish a Virtual Model of Brittle Material Snapping Machine 2.1.1
Establish Part Models
With the Pro/ENGINEER as a platform to build part models and based on the 3D concept, 3D solid models of product parts were built. The 3D feature-based modeling design and parametric part design were realized. During the creation process, considering that there are many parts in the brittle material snapping machine, typical parts such as tension pieces and shaft (rotating) parts were selected, as shown in Figs. 5–7. Fig. 7 The virtual model of typical parts of the feeding mechanism
(a) Pulley
(b) Box
Structural Design of Snapping …
2.1.2
937
Virtual Assembly of Part Models
After part models were established, the bottom-up assembly method was adopted. Firstly, the machine body was placed in the default geodetic coordinate system of the Pro/E program, and then parts were added to the lathe bed one by one, and the constraints with adjacent parts were added. This was like building a pyramid, from low to high, piling up layer by layer. With this method, the snapping, clamping and feeding mechanisms were assembled one by one from difficult to simple. This mode of assembling was adopted in all components, expect for the hydraulic cylinder of the snapping machine. At the end of assembling, hydraulic cylinder was added into the snapping mechanism and clamping mechanism. Top-down assembling mode, which generated the distribution relation of assembly parts and then generated assembly parts according to this relation, was adopted, as shown in Fig. 8.
2.2 Dynamic Analysis of Brittle Material Snapping Machine ADAMS software is the best dynamic simulation software for mechanical systems developed by U.S. Mechanical Dynamics Inc., and is currently the most authoritative software in the world. ADAMS, advanced CAD software (Pro/E) and CAE software (ANSYS) can exchange files with each other through computer graphics exchange formatting to maintain data consistency. Using this advantage, the virtual model of the snapping machine was imported into ADAMS for dynamic analysis [10]. Before the import, it’s necessary to make simplification on model parts, such as bearings, bearing end caps and bolts. Such simplification will not have a significant impact on the whole system during the motion simulation, but if these parts are added, the complexity of the whole system will increase, resulting in an increased computational load during motion simulation and an increased probability of calculation errors. After successfully importing into ADAMS, firstly add constraints to the model. The basic machine is fixed and can be directly fixed on the Ground. Add springs and forces to Maker points imported in advance. Simulation process parameter: End Time 0.2, Steps 50. The core of motion analysis of brittle material snapping machine is the motion characteristics of the snapping mechanism. The load applied to the snapping mechanism acts on the left and right pushing blocks respectively through the left and right uprights, thus pushing the clamping block upwards. When the applied load continues to increase and exceeds the supporting force of the lower spring, the left and right uprights, the left and right pushing blocks and the clamping block will rotate along the shaft with the die body. Therefore, displacement, velocity and acceleration changes of the upright, the pushing block and the clamping block are the key to the dynamic analysis of brittle material snapping machine (the left and right uprights share the same structure and load with the left and right pushing blocks, so the left upright and the left pushing block were selected respectively as examples for demonstration).
938
W. Kou et al.
(a) Snapping mechanism
(b) Clamping mechanism
(c) Feeding mechanism
(d) Brittle material snapping machine Fig. 8 The virtual assembly model of brittle material snapping machine
Figure 9 showed the displacement (red), velocity (blue) and acceleration (pink) curves of the upright, the pushing block and the clamping block, respectively. Analysis of acceleration curves: It can be seen from the figures that with the change of time, the acceleration in (a), (b) and (c) gradually decreased to zero when it was about 0.03s, then reversely increased to the maximum value, and finally approached zero after 0.2s. Theoretical analysis: F resultant force=F applied force—F elastic force, the die body moves along the negative direction of the Y axis. F elastic force gradually increases, F applied force keeps unchanged and F resultant force decreases, so the acceleration also decreases. When F elastic force=F applied force, and F resultant force=0, the acceleration is also zero. Due to inertia, the die body still moves along
Structural Design of Snapping …
(a) Displacement, velocity and acceleration curves of the upright
(b) Displacement, velocity and acceleration curves of the pushing block
(c) Displacement, velocity and acceleration curves of the clamping block Fig. 9 Displacement, velocity and acceleration curves of key parts
939
940
W. Kou et al.
the negative direction of the Y axis. At this time, F elastic force > F applied force, and F resultant force is negative, the acceleration increases and reaches its reverse maximum when the spring reaches its maximum displacement, and F elastic force also gets its maximum. Under the action of F elastic force, the spring moves upwards and F elastic force decreases. When F elastic force=F applied force, the acceleration becomes zero. It can be seen that the simulation results of acceleration were consistent with the theoretical analysis. Analysis of velocity curves: it can be seen from the figures that the velocity, along the negative direction of the Y axis, gradually increased from zero and reached its maximum at 0.03s. Then it gradually decreased along the reverse direction and approached zero at 0.2s. Theoretical analysis: Though the acceleration values have been decreasing from 0 to 0.03s, the direction has not changed and it is still accelerating, so the speed has been increasing. At 0.03s, the acceleration is zero and the speed reaches the maximum. At 0.03~0.045s, the acceleration increases reversely and makes deceleration movements. Therefore, the speed gradually decreases. At 0.045~0.2s, the acceleration decreases reversely and still makes deceleration movements. Therefore, the speed is gradually decreasing and the degree of change is slowing down. It can be seen that the simulation results of velocity were consistent with the theoretical analysis. Analysis of displacement curves: It can be seen from the figures that the displacement increased with the increase of time and tended to be stable at 0.2s. Theoretical analysis: At 0~0.03s, with the gradual increase of the velocity, the displacement increases and the degree of the increase also speeds up. After 0.03s, the velocity gradually decreases and the direction keeps unchanged. Therefore, the displacement still increases, but the degree of the increase slows down. Figure 10 showed the deformation (Fig. 10a), deformation speed (Fig. 10b) and elastic force changes (Fig. 10c) of the large spring. Deformation analysis of the large spring: According to the figures, the deformation curve of the large spring increased with time from 0s to about 0.15s. From 0.15s to 0.2s, the deformation amount of the large spring stops increasing and reaches its maximum. We know that when a spring is compressed, the deformation of the spring is very fast at first, and when the limit position is reached, the spring will no longer deform. This fact proves the deformation correctness of the large spring. Deformation speed analysis of the large spring: From the figures, it can be seen that the deformation speed of the large spring first gradually increased from zero and reached the peak, then gradually decreased and finally became zero. According to the change law of the deformation curves of the large spring, the deformation speed correctness of the large spring was verified. Elastic force analysis of the large spring: From 0s to about 0.15s, the elastic force of the large spring had been increasing with time. From 0.15s to 0.2s, the elastic force of the large spring reached the maximum stable value. Theoretical analysis: According to Hooke’s law F = −kx, where k is a constant, representing the stiffness coefficient of the spring, and x represents the amount of deformation. According to the formula, the size of F is equal to k times of x, and the direction of F is opposite to the direction of x. The simulation results were in good agreement with the theoretical analysis.
Structural Design of Snapping …
(a) The deformation curve of the large spring
(b) The deformation speed curve of the large spring
(c) The elastic force curve of the large spring Fig. 10 Deformation, deformation speed and elastic force curves of the large spring
941
942
W. Kou et al.
3 Conclusion (1) Brittle material snapping machine is an innovative structure. According to the mechanical model of bar snapping, the matrix crack fracture theory and the force-closed clamping method, a blanking machine suitable for bar snapping was designed. (2) The brittle material snapping machine consists of three parts: feeding mechanism, clamping mechanism and snapping mechanism. They realized the automation of the feeding-clamping-snapping production process. (3) Based on Pro/E and ADAMS software, the virtual development of brittle material snapping machine was completed. The 3D CAD solid modeling function of Pro/E and the kinematics simulation analysis function of ADAMS were used to combine the modeling and dynamic analysis of brittle material snapping machine together. They provided visual inspection data for the movement law of the brittle material snapping machine, and the simulation results and theoretical analysis proved that this method is feasible. Finally, this paper provides a powerful reference for the actual production of brittle material snapping machine. Acknowledgements This research was supported by the Special Funds for Basic Scientific Research Business of Central Universities in 2016 (Item number: 31920160074). Research project of innovation and entrepreneurship education teaching reform in Colleges and universities of Gansu Province in 2019.
References 1. Li, Youtang, Fuyuan Lang, Qingtong Wei, and Yaobing Wei. 1993. Several questions of stress shearing blanking. Chinese Journal of Mechanical Engineering 29 (3): 17–21. 2. Liu, Bo. 2006. Basic principle and virtual development of bar breaking mechanism. Master’s thesis, Lanzhou University of Technology. 3. Xiong, Guangleng, Bohu Li, and Xudong Chai. January 2001. Virtual prototyping technology. Journal of System Simulation 13 (1). 4. Wang, Guoqiang, Jinping Zhang, Ruodin Ma, et al. 2002. Virtual prototype technology and its practice in ADAMS. Xi’ an: Northwestern Polytechnical University Press. 5. Zhao, Bangjie, Qingtong Wei, Fuyuan Lang, et al. 1988. Basic principle of crack technique and research progress in application. Progress in Mechanics 18 (3): 343–352. 6. Li, Youtang, Huanxin Yu, and Yaobing Wei. 1996. Brittle fracture design of stress blanking. Journal of Gansu Sciences 8 (4). 7. Compiled by Fan Tianyou, Fundamentals of Stress Fracture Dynamics. Beijing: Beijing Institute of Technology Press, 1992. 8. Zhang, Hui. May 2004. Research on fracture design of bar materials and its key problems. Doctoral dissertation, Shanghai Jiaotong University. 9. Xu, Yong. May 2001. Matrix crack fracture theory and its feasibility in artificial notching. Master’s thesis, Lanzhou University of Technology. 10. Jayaram, S., H. Connacher, and K. Lyons. 1997. Virtual assembly using virtual-reality techniques. Computer Aided Design 8 (29): 575–584.
Design Idea of Professional Talent Evaluation System Based on Mobile Internet Ping Yang and Hongjiao Xue
Abstract With the development of whole society informatization application and popularization, the use of modern information technology, based on mobile internet,in the form of online learning and assessment, guiding students to reasonable use of learning time, using the Internet education thought and advanced online teaching platform system architecture, to realize of teaching and learning, exam, management and other multiple functions, which has become an important means of teaching of higher vocational colleges. Professional talents evaluation system based on mobile Internet is using big data and AI technology, through online teaching platform system realize quantitative statistics to the students’ learning situation, and help build professional talents evaluation system, to establish a multi-dimensional assessment report, so as to provide the recommended basis for students’ future employment. Through the analysis of the reliability and security of the professional talent evaluation system and introduce the comprehensive test method of the system performance, form the design conception of the professional talent evaluation system. In the near future the vocational talent evaluation system will be further developed and used, which will play a great role in the professional education of higher vocational schools. Keywords Mobile internet · Professional talent · Evaluation system · Information sharing · Software testing
1 Introduction With the promotion and popularization of the application of informatization in the whole society, use modern informatization technology, provide students with practical and diverse course resources, more and more higher vocational colleges are carrying out education with improving students’ professional ability and comprehensive quality as the main content. Through online learning and assessment, it guides students to make rational use of their learning time, and uses Internet education thinking and advanced online teaching platform system architecture to realize P. Yang (B) · H. Xue Beijing Polytechnic, Beijing 100176, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_109
943
944
P. Yang and H. Xue
teaching, learning, exam, management and other functions, so as to build a unified and standard, fast and convenient learning and examination management platform for student education. Big data technology and AI technology are used to conduct quantitative statistics on students’ learning conditions, to help build a professional talent evaluation system and establish multi-dimensional talent evaluation reports, so as to provide data support for students’ employment competition. Vocational talent evaluation system can be built based on the long-term, highlight the professional, so that students have the motivation to learn, to harvest, to apply, to promote learning, improve teaching quality, for students employment work wide coverage, high efficiency to provide information support.
2 Design and Composition of Professional Talent Evaluation System With the purpose of studying the construction of rail transit vocational education examination and training system platform, through talent assessment further promotes the professional training of talents, and provides the basis for students to find jobs in enterprises. By building the distributed network information sharing platform, which can realize series of functions such as the examination question bank system management, intelligent questions set volume, automatic generation of test paper, online examination and automatic scoring, and get through offline training equipment data interface, through big data, AI technology, automatic generation of set theory knowledge level and practical ability of multidimensional professional talent assessment report [1]. The professional talent evaluation system consists of seven modules: user center, learning center, resource center, teaching center, management center, data center and system service [2]. (1) User Center It includes login and registration, personal homepage, archives of students, account management and personal settings, mainly to achieve the function of basic information and account management of the role’s personal Settings. The personal profile contains all individual exams, details of courses and training, while the archives of students contain all personal training records. The user center contains all the basic information and training information for the convenience of users to carry out basic information management and training dynamic management. (2) Learning Center It includes learning tasks, online learning, online examination and practical training examination projects, mainly to realize the function of students’ online vocational training, learning courses and practical training examination. Learning tasks are initiatively initiated by training organizers. Administrators directly assign vocational
Design Idea of Professional Talent …
945
training plans to training teachers, who then assign specific learning tasks to students, including learning courses, conducting examinations or training. Online learning is a self-directed vocational training course for students, which can also expand their personal career scope and take other vocational courses. Online test is a module for students to complete the test issued by the training teacher or to conduct online independent test. After the completion of the test, the system automatically marks, scores and collects data. Students can query the details of the test and analyze wrong questions to test the quality of learning and improve learning efficiency. The practical training project is that students receive the practical training invitation from the training teacher, and after completing the offline practical training, they record the practical training, inquire the results and give feedback on the practical training. The practical training study carries on the comprehensive grasp and the emphasis study. (3) Resource Center It includes my teaching resources, curriculum database, question database, examination paper database and knowledge base, mainly including training organizers or training teachers to create and manage their own teaching resources and all the training resources, curriculum database, question database and examination paper database. My teaching resources are mainly personal teaching resources that teachers can efficiently create, edit and manage courses, question Banks and examination papers. The course database, question database, examination paper database and knowledge base are excellent learning resources provide for all roles to meet different role needs and learning resource needs. Audio, video and other multimedia teaching materials and examination data input, realize the multi-media resource database. (4) Teaching Center It includes teaching tasks, examination management, teaching management, training class management and practical training management, mainly including the management of all teaching processes such as examination, course and practical training. The teaching task is the teaching plan made by the training organizers, such as creating different teaching resources, organizing examinations, training classes or practices, and maintaining courses, so as to facilitate the training organizers to plan and implement the learning plan, and actively promote and complete the learning plan. Examination management is train teachers to manage the whole examination process, select test questions from the examination database, organize examination papers intelligently, manually or by import ways, invite relevant students to take examinations, make statistics and archive the examination results, and master student’s learning situation and quality. Teaching management is to train teachers to carry out comprehensive management of the teaching process, such as the compilation of lecture notes and course details, tracking and feedback of course learning, management of course announcements and the issuing of course tests and exams. The management of training classes provides different training classes for different teaching contents and students, organizes course groups, issues class announcements and tracks the class learning situation. Practical training management means that training teachers
946
P. Yang and H. Xue
release practical training announcements, students conduct offline practical training and track and feedback the practical training situation. (5) Management Center It includes organizational structure management, user management, authority management, training resource management, training task management and statistical analysis chart, which is mainly the basic management of the whole talent evaluation system by the administrator. Organizational structure management is the division and formation of different department functions and the relationship between the superior and the subordinate, which facilitates the division and effective management of functions. User management is the general manager and the super administrator role to all users of information management, the role list and edit details, search, query, delete, ban and real-name certification, as well as create roles and send verification E-mail, SMS, and reset user passwords, etc., in view of the students role, account information, student enrollment files, learning tasks carry out basis management. In view of training teacher’s role, management of teachers’ teaching resources, teaching task and teaching feedback, achieve efficient user management. Training task management means that training organizers make training plans, assign teaching tasks to training teachers or assign learning tasks to students, and take the initiative to promote training plans. Statistical analysis chart is the data statistics and analysis of all user data, courses, exams and training conducted by the administrator to form an intuitive data analysis report, reflect the training effect and modify the training plan. (6) Data Center The data center makes statistical analysis on the effect of the implementation of students’ learning plan, and controls the actual results through data, so as to provide data support and decision-making support for the competition of professional talents. The comprehensive evaluation results of training effect and examination effect of students in the data center focus on the data statistics of theory, practice and operation and other five aspects, comprehensive automatic data evaluate student’s ability, and support a button to download and print evaluation report, for the convenience of school to file. (7) System Service Include messages, announcements and information management, logging services, interface services and customer services, mainly for the operation and management of the whole system. The system block diagram is shown in Fig. 1.
Design Idea of Professional Talent …
947
Fig. 1 Structure diagram of professional talent evaluation system
3 System Function Analysis Platform and application system software must be developed by Java programming language and server-side Java [3] technology. Business application system and data integration platform shall be based on MySQL database, and a reasonable security architecture design shall be designed according to the security requirements. (1) Optimize the model design. Good model design can reduce the loading and retrieval of redundant data and the inter-table correlation retrieval, which can greatly improve the response time of system data. (2) Effectively utilize the cache function of the database. For frequently accessed data, data can be cached in the database to reduce IO. (3) Make full use of CPU, memory and other hardware resources of each host by making use of cluster function, reasonably distributing load, processing thread pool during single machine deployment. (4) Optimize the application architecture design, adopt necessary message queue processing as appropriate, accelerate user response, and provide convenience for the wrong peak of system data processing. (5) Make full use of the cache function of the system and arrange data extraction to non-peak hours. The system data services are classified and managed, and different data extraction and read-write strategies are planned according to different access and usage conditions, so as to make full use of the system’s caching function for queries and reduce real-time access to data sources. The platform has many advanced and mature characteristics: • Adopt mature underlying service frameworks and technologies.
948
P. Yang and H. Xue
• The server—side system adopts multi—level and hierarchical optimization measures. • JSON data transfer. By building the distributed network information sharing platform, realizes the question bank management system, examination questions, smart group paper, automatic generation of test paper, online examination and series of functions such as automatic scoring, and get through offline training equipment data interface, through big data, AI technology, automatic generation of set theory knowledge level and practical ability of multidimensional professional talents evaluation report. The functions of the vocational talent evaluation system are mainly completed by the following three centers [4]. (1) Statistical management center Main functions: Statistical learning, Test statistics, and Results statistical (2) Talent assessment data center Main functions: Talent assessment report (3) Data security center Main functions: Data recovery and Data backup [5].
4 System Reliability and Security The data backbone of the platform comes from the rail transit information system. These data are accessible, and some data are generated during the operation of the platform itself, as well as the relationship data between some platforms and other systems [6]. With this data and the data expiration mechanism, it is recommended to configure more than 2 TB of data capacity space. In terms of reliability, each functional node in the architecture is designed with redundancy to ensure that the system does not have a single failure point and meets the requirement of providing 7 × 24 uninterrupted services with an average failure free probability of 99.9%. If necessary, the system architecture of load balancing is adopted, so that the maintenance, system expansion, upgrade, system performance statistics, analysis, optimization and component replacement of the host system can be completed without affecting the function of the application system. All the key components provide hot swap capability without interrupting data sharing services. In the modular design of the system, the fault-tolerant design scheme is properly considered to make the system safer. In terms of external security, server firewall can provide a safe operating environment for the system. The control platform is located in the internal network, which cannot be accessed by the external network, and is isolated layer by layer by firewall and other security protection measures.
Design Idea of Professional Talent …
949
Fig. 2 Authentication
In the system interior, because this system user is numerous, and the role, authority is each not identical, because this must have higher security, prevent a user to exceed authority access and steal data. Each action of the user must be authenticated, and the user can continue to perform other operations only when the identity and permissions match, so that the security goal can be effectively achieved. The mobile platform has built-in authentication agent service, which routes and forwards the authentication request of the client to the authentication server of the user’s school, and completes the authentication process by logging in the mobile phone number, teacher number and student number, as shown in Fig. 2. Operation authorization: for different use and authorization department use the product, and the different levels of users to use the product functions authorized by the system administrator classification authorization, the authorization information in the database, Each operation of users’ needs system authorization, which further standardizes the information and business use of platform users under the unified security system of enterprise information system [7].
5 Professional Talent Evaluation System Test Testing is a compulsory work to improve software quality. Different testing methods can effectively improve software quality by complementing each other at different stages of the project. We used the following test methods for different levels of testing [8].
950
P. Yang and H. Xue
(1) Unit Testing Because of the test-driven development method, all the codes in the software development process are matched with the development of specific unit test scripts, and all scripts can be automatically run and provide the statistics of test results. Use the xUnit series of automated testing frameworks to complete unit testing. Unit testing ensures that all developed code is covered by tests and plays an important role in reducing the problem of detail correlation caused by later code refactoring and adjustment. At the same time, because unit testing is automated, testing is performed all the time, avoiding the problem of accumulated software defects caused by incomplete human test coverage. (2) Functional Test When the project is completed and in the test phase, it mainly conducts Functional testing, also known as behavioral testing. According to product features, operation descriptions and user schemes, the characteristics and operational behaviors of a product are tested to ensure that they meet the design requirements. A functional test of localized software that verifies an application or website works correctly for the target users. Use appropriate platforms, browsers, and test scripts to ensure that the target user experience will be good enough, as if the application were developed specifically for that market. Functional testing, also known as black box testing or data-driven testing, only considers the various functions, not the internal structure and code of the entire software. Generally, starting from the interface and architecture of software products, test cases are written according to requirements, input data are evaluated between expected results and actual results, so as to make the products meet the requirements of users. (3) Pressure Test Performance is another concern in project testing, and assessing system performance and resolving performance bottlenecks requires stress testing to expose and resolve performance problems. Stress testing is an essential quality assurance activity that is part of every significant software testing effort. The basic idea of stress testing is simple: instead of running manual or automated tests under normal conditions, run tests with fewer computers or with fewer system resources. Resources that are typically stress-tested include internal memory, CPU availability, disk space, and network bandwidth. Concurrency is commonly used for stress testing. (4) Test Drive Different from the general design, which starts to plan at the early stage of the project and starts the test work at the later stage of the project, the test-driven test work runs through the whole development process. Test-driven development is a kind of modern computer software development method. Use tests to drive the design and implementation of software programs. Test drives became popular in the 1990s. Test-driven development (TDD) is the
Design Idea of Professional Talent …
951
programming method advocated in extreme programming. The method is to write test programs first, and then code them to pass the test. The purpose of test-driven development is to get quick feedback and to build the program using the “illustrate the main line” approach [9].
6 Conclusion This paper puts forward a design idea of professional talent evaluation system. Through the construction of distributed network information sharing platform, realize the series of functions such as question bank system management, online examination and automatic scoring, and integrate the data interface with offline training equipment [10]. Through big data and AI technology, automatically generate the multi-dimensional evaluation report of professional talents with theoretical knowledge and practical operation ability. Through the performance analysis of the professional talent evaluation system, form the design conception of the professional talent evaluation system. In the near future, the vocational talent evaluation system will be further developed and used, which will play a great role in the professional education of higher vocational schools and have a bright future.
References 1. Xiao, Zhihui. 2009. Research review on mobile Internet. Telecommunications Science (10): 30–36. 2. Chen, Haiming, Li Cui, and Kaibin Xie. January 2013. Comparative study on Internet of things architecture and implementation methods. Journal of Computer Science. 3. He, Shuiyan. 2016. Java programming. China Machinery Industry Press. 4. Xiang, Wenjie. 2009. Review and prospect of the development of mobile Internet. Telecommunication Technology (1): 66–69. ITU Internet Report 2005: The Internet of Things. 2005. 5. ITU Internet Report 2005: The Internet of Things. 2005. 6. Craig, Skibo, Young Marc, and Johnson Brian. 2008. Working with microsoft visual studio 2005, World Book Publishing Company. 7. Lars Powers and Miko Snell: Microsoft Visual Studio 2005 Unleashed Visual Studio 2005. 8. Reliability and maintainability management of computer software GB/T 14394-2008. 9. The definitive guideto mysql5, Apress, 1998. 10. Tang, Hanming, Zhenxing Zhai, Baojun Guan, Hongquan Wang, and Xiao Huang. January 2014. MySQL, people’s posts and telecommunications publishing house.
Research and Practice on Diagnosis of Civil Engineering Majors Based on EFQM Excellence Model Analysis Aimin Wei
Abstract Because of vigorous development of infrastructure construction in recent years, civil’s cultivation engineering majors is of vital importance to China’s infrastructure construction. Combining the characteristics of civil engineering majors, through the research of professional diagnosis and improvement, we will guide the transformation of civil engineering students from research type to application type, and improve students’ self-learning ability and comprehensive application solve problems of engineering. It is of practical significance to cultivate high-quality civil engineering professionals. At present, many scholars are getting more and more in the field of civil engineering, and diagnosis and improvement are important means to improve professional quality. From the aspects of the demand for talents in civil engineering, the formulation and implementation of talent training programs, the construction and protection of professional conditions, and the satisfaction of personnel training, the existing problems are analyzed and improvement measures are proposed. In order to solve some problems of civil engineering, this paper built a quality evaluation model based on the EFQM, and uses the fuzzy method to establish a quantitative analysis framework for the quality of civil engineering. It has certain guiding opinions to guide the diagnosis and improvement of civil engineering majors and to promote the improvement of the quality of civil engineering professionals. Keywords Civil engineering major · Diagnostic improvement · EFQM model · Fuzzy evaluation
1 Introduction Since entering the twenty-first century, China’s infrastructure has entered a period of rapid development in terms of quantity and scale, and the civil engineering profession is the cradle of cultivating infrastructure talents. At present, the teaching of civil engineering in China relies too much on the teaching of knowledge systems in various disciplines, and the inheritance teaching is placed at the center, while A. Wei (B) Guangzhou City Construction College, Guangzhou 510925, Guangdong Province, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_110
953
954
A. Wei
the teaching of research-based civil engineering is often overlooked or marginal. Especially for students of civil engineering subjects. Therefore, the students trained under the traditional civil engineering professional teaching mode will inevitably be “on the paper”, difficult to become “talent”, and more difficult to call “innovative talents.” The traditional civil engineering teaching model must be diagnosed and the existing teaching model reformed into a research model. The focus of research teaching is to change the way students learn. The teaching ideas, teaching strategies and teaching methods have transformed teachers from instructors and indoctrines into organizers, instructors, helpers and promoters of active learning. The so-called improved teaching is to combine in-class teaching with extracurricular practice, teacher guidance and student self-study, teaching materials and reading to achieve complete, harmonious and unified teaching [1–3]. The main purpose of teaching research is to improve students’ interest in learning and problem solving [4]. Explore new knowledge and develop students’ ability to creatively analyze problem-solving [5, 6]. Research teaching is mode that overcomes the shortcomings of traditional teaching models and cultivates innovative talents [7]. The theoretical basis of the research teaching model is the “discovery learning model” of Bruner in the United States and the “cognitive development doctrine” of Piaget. The basic idea of these theories is that the process of student learning is intrinsically consistent with the process of scientist research. Therefore, educators should establish a suitable system and adopt a suitable model to motivate, guide and help students to take the initiative. Discover problems, analyze problems and solve problems, and acquire knowledge, training skills, develop abilities, and develop individuality in such an “exploration” process. The research teaching model takes students and their inquiry-based learning as the main body, and aims to cultivate and improve their research and innovation abilities. It embodies the combination of guidance and autonomy, regulation and openness, unity and diversity, and theory and practice. Dialectical and unified educational guiding ideology [8, 9]. It is essentially the transformation of teaching theory, and it is also accompanied by the transformation of teaching techniques [10, 11]. At present, the state has introduced internal diagnosis and improvement plans and guidance programs for talent training quality, and various provinces have also introduced implementation plans. The schools have combined their own realities, drawing on advanced quality management concepts and experiences at home and abroad, and also trying to develop internal quality management plans for schools [12–14]. The EFQM Excellence Model is an open tool for quality management evaluation of the European Quality Award, one of the world’s three quality awards. After nearly 30 years of use and improvement, it has been used and promoted in organizations such as enterprises and education [15, 16]. The EFQM Excellence Model is a tool for self-evaluation and quality improvement. Therefore, this paper is based on a series of problems existing in the current civil engineering profession, and proposes the EFQM excellent model for analysis, which provides theoretical guidance for the reform of civil engineering.
Research and Practice on Diagnosis of Civil Engineering …
955
2 Model Establishment and Analysis 2.1 Evaluation Model Based on EFQM Excellent Model The EFQM Excellence Model is a performance assessment tool of the European Quality Management Foundation. It uses the RADAR scoring matrix to score 9 components of the EFQM model, including 5 capabilities and 4 results, and 9 components. The highest score of the indicator represents the weight of the EFQM model. Kristensen et al. believe that the EFQM model has a complete set of evaluation meanings, model structure and process methods, which can be derived into an excellent enterprise management performance evaluation tool. Based on the EFQM Excellence Model developed by the European Quality Management Association, this paper will establish an evaluation model for the research and practice of diagnostics improvement in civil engineering. The model is a nonhardened total quality management framework that combines the EFQM Excellence Model into nine elements, including five “Enablers” elements and four “Results” elements, as shown in Fig. 1. The “start-up” principle guides the civil engineering profession on how to do it. The “results” principle guides the civil engineering profession to achieve specific goals. “Startup” leads to “results” and feedback from “results” helps to further “start”.
start up
ability
result
Students, knowledge and skills
Civil engineering professional diagnosis and reform
Diagnosis and reform strategy
Diagnostic program
Diagnosis and reform results
Diagnosis and reform effectiveness
Reform measures
Diagnosis and reform
Fig. 1 Evaluation model for civil engineering professional diagnosis based on EFQM excellent model analysis
956
A. Wei
The model has a total of seven evaluation criteria. Among them, there are five “starting” and “capacity” aspects, namely “Diagnostic and Reform of Civil Engineering Majors”, “Diagnosis and Reform Strategy”, “Student, Knowledge and Skills”, “Diagnostic Procedures” and “Reform Measures”; There are two “results”, namely “diagnosis and reform results” and “diagnosis and reform effectiveness”.
2.2 Quantification Fuzzy multi-criteria decision-making refers to decisions that are made in a finite (infinite) scheme with conflicting and incompatibility. In 1965, Za-deh proposed fuzzy theory. In 1970, Bellman and Zadeh introduced fuzzy set, and proposed the concept and model of fuzzy decision analysis to solve the uncertainty problem in practical decision-making. The fuzzy multi-criteria decision-making method can be used to evaluate the comprehensive influence of factors on research items and to select the program. This paper will use the method of triangular fuzzy numbers to quantitatively analyze the above models. Specific steps are as follows: The first step: to establish a triangular fuzzy matrix. There are m evaluated objects (A1 , A2 , A3 . . . Am ), n experts (D1 , D2 , D3 . . . Dn ) participate in the evaluation, and k indicators (C1 , C2 , C3 . . . Ck ). For the object Ai to be evaluated, the i-th expert gives an evaluation of li j , m i j , h i j , li j is the most conservative evaluation given by the expert to the index Cj , mi j is the most likely evaluation given by the expert to the index Cj , and h i j is given by the expert to the index Cj . The most optimistic evaluation. Thereby a triangular fuzzy initial evaluation matrix is formed. ⎧ ⎫ ⎨ [l11 , m 11 , h 11 ] [l12 , m 12 , h 12 ] . . . [l1k , m 1k , h 1k ] ⎬ R = [l21 , m 21 , h 21 ] [l22 , m 22 , h 22 ] . . . [l2k , m 2k , h 2k ] ⎩ ⎭ [ln1 , m n1 , h n1 ] [ln2 , m n2 , h n2 ] . . . [lnk , m nk , h nk ] The second step: Build a review set in a degree language and turn the comment set into a triangular fuzzy number. The triangular fuzzy numbers corresponding to the weights of the indicator reviews are as follows:
Indicator weight review
Weight fuzzy number
Indicator review
Evaluation of fuzzy numbers
Very low(VL)
(0.0,0.0,0.1)
Very poor(VP)
(0.0,0.0,0.1)
Very low(L)
(0.0,0.1,0.3)
very bad(P)
(0.0,0.1,0.3)
Low(ML)
(0.1,0.3,0.5)
Difference(MP)
(0.1,0.3,0.5)
The same(M)
(0.3,0.5,0.7)
General(M)
(0.3,0.5,0.7)
High(MH)
(0.5,0.7,0.9)
it is good(MG)
(0.5,0.7,0.9)
Very high(H)
(0.7,0.9,1.0)
very good(G)
(0.7,0.9,1.0) (continued)
Research and Practice on Diagnosis of Civil Engineering …
957
(continued) Indicator weight review
Weight fuzzy number
Indicator review
Evaluation of fuzzy numbers
Extremely high(VH)
(0.9,0.9,1.0)
Excellent(VG)
(0.9,0.9,1.0)
The third step: convert the triangular fuzzy number into a clear value. For the clear number, the expected value is calculated using the formula (1); for the fuzzy number, the fuzzy function expectation value is calculated using the membership function (2)
µ(x) =
⎧ ⎨ 1
x b 0 b−x b−a
(1)
a is the interval minimum and b is the interval maximum. I (u i ) = (li + 2m i + u i )/4
(2)
The fourth step: form a weighted judgment matrix. T = R ∗ W = ( f i j )m ∗ n
(3)
3 Conclusions and Conclusions 3.1 Conclusion The EFQM Excellence Model is suitable for all levels of organization. Organizations are collectives established in accordance with certain purposes and systems. The major is the grassroots teaching and research organization of colleges and universities, with important functions of teaching, scientific research and social services. From the scope of application, the EFQM Excellence Model is mainly applicable to three categories: large enterprises, public sectors, and small and medium enterprises. The public sector refers to the entire organization or part of the people providing services. It is generally maintained by state taxation and is a non-profit organization. Colleges and universities are public utility organizations that train talents and develop science and technology and society for the country and society. Public universities are public sectors. The EFQM Excellence Model has been used in schools and has achieved significant results. The EFQM Excellence Model is a tool for selfevaluation and quality improvement, requiring schools to conduct teaching diagnosis and improvement in accordance with the “demand-oriented, self-assured, multidiagnosis, and improvement” guidelines. The EFQM Excellence Model requires
958
A. Wei
Fig. 2 The use of EFQM models in colleges and universities in the past 20 years
attention to the interests of interested parties and organizes self-evaluation, diagnosis and improvement in accordance with RADAR logic. Its nine major elements involve all aspects of the organization, which is conducive to the implementation of the “complete and relatively independent self-quality assurance mechanism at different levels of schools, majors, courses, teachers and students” proposed by the Ministry of Education, which is conducive to the formation within the school. Modern professional quality assurance culture (as shown in Fig. 2, the use of EFQM models in colleges and universities in the past 20 years). From the figure, we can see that more and more colleges and universities in the past few years have used the EFQM excellent model to diagnose and reform their profession to ensure their professional quality. Professionalism and quality assurance are in a certain social and economic environment. Universities serve economic and social development, especially in higher education institutions. The state explicitly requires them to serve regional economic and social development. In addition, higher education is mainly for local schools. The funds for running public universities mainly come from local governments. To ensure sustainable development, colleges and universities must base themselves on the needs of regional economic and social development and ensure that they can continue to meet and track regional economic and social development needs. The matching between professionalism and the local economy and industry, and the contribution to the political and economic development in the region is an important guarantee for local support and a driving force for professional sustainable development.
3.2 Summary The concept and elements of the EFQM Excellence Model and the logic of RADAR are a whole. They should be considered comprehensively in practice and should not be biased. The concept is the command, and it needs to penetrate into every
Research and Practice on Diagnosis of Civil Engineering …
959
link and element of professional construction before it can have an effective effect. The key is the support of professional construction, it is the grasp of the hand, and the implementation of the concept needs to be based on the elements. The logic of RADAR is the path, which is a bridge between professional construction elements and elements, and is the main line of professional construction and quality assurance. In order to improve the objectivity of model evaluation, this paper uses the triangular fuzzy number method to quantitatively analyze the model. The research results of this paper will help to improve the quality evaluation of civil engineering professional diagnosis and reform. Acknowledgements This article is supported by the National Study Abroad Fund “2016 Higher Education Teaching Law to study abroad project” (project number: stay blonde [2016] 5054), Guangdong Brand Specialty Construction Subsidy Project (Grant No. 2016gzpp016), Guangzhou City Construction College Key Project in 2017 “Research and Practice on Diagnosis of Civil Engineering Majors Based on EFQM Excellence Model Analysis” (Grant No. ZD201701).
References 1. Moosazadeh, M., Sergey Kharkovsky, Joseph T. Case, and Bijan Samali. 2017. Antipodal vivaldi antenna with improved radiation characteristics for civil engineering applications. IET Microwaves, Antennas and Propagation 11 (6): 796–803. 2. Gutierrez Soto, Mariantonieta, and Hojjat Adeli. (2018). Vibration control of smart baseisolated irregular buildings using neural dynamic optimization model and replicator dynamics. Engineering Structures 156: 322–336. 3. Ravi, V., A.H. Gao, N.B. Martinkus, M.P. Wolcott, and B.K. Lamb. 2018. Air quality and health impacts of an aviation biofuel supply chain using forest residue in the northwestern united states. Environmental Science and Technology 52 (7): 4154–4162. 4. Boubrima, A., Walid Bechkit, and Herve Rivano. 2017. Optimal WSN deployment models for air pollution monitoring. IEEE Transactions on Wireless Communications (99): 1–1. 5. Raina, A. K. 2019. Influence of joint conditions and blast design on pre-split blasting using response surface analysis. Rock Mechanics and Rock Engineering: 1–14. 6. de Ornelas Maia, Ana Claudia Corrêa, Jenny Sanford, Hannah Boettcher, Antonio E. Nardi, and David Barlow. 2017. Improvement in quality of life and sexual functioning in a comorbid sample after the unified protocol transdiagnostic group treatment. Journal of Psychiatric Research 93: 30. 7. Abel, G., C.L. Saunders, S.C. Mendonca, C. Gildea, S. Mcphail, and G. Lyratzopoulos. 2018. Variation and statistical reliability of publicly reported primary care diagnostic activity indicators for cancer: A cross-sectional ecological study of routine data. BMJ Quality & Safety 27 (1): 21–30. 8. Barbaro, J., and C. Dissanayake. 2017. Diagnostic stability of autism spectrum disorder in toddlers prospectively identified in a community-based setting: behavioural characteristics and predictors of change over time. Autism 21 (7): 830–840. 9. Acharya, B., Madhur Basnet, Pragya Rimal, David Citrin, Soniya Hirachan, Sikhar Swar, et al. 2017. Translating mental health diagnostic and symptom terminology to train health workers and engage patients in cross-cultural, non-english speaking populations. International Journal of Mental Health Systems 11 (1): 62. 10. Liu, Yung-Lun, and Pen-Fa Ko. 2017. A modified EFQM excellence model for effective evaluation in the hotel industry. Total Quality Management & Business Excellence (2): 1–14.
960
A. Wei
11. Su Mi, Dahlgaard-Park, Lidia Reyes, and Chi-Kuang Chen. 2018. The evolution and convergence of total quality management and management theories. Total Quality Management & Business Excellence 29 (3): 1–21. 12. Nagyova, A., and H. Pacaiova. 2018. Maintenance evaluation based on the EFQM model excellence. IOP Conference Series Materials Science and Engineering, 393. 13. Xie, Q., Ji-Qin Ni, and Zhongbin Su. 2017. Fuzzy comprehensive evaluation of multiple environmental factors for swine building assessment and control. Journal of Hazardous Materials 340: 463. 14. Yang, W., Kui Xu, Jijian Lian, Lingling Bin, and Chao Ma. 2018. Multiple flood vulnerability assessment approach based on fuzzy comprehensive evaluation method and coordinated development degree model. Journal of Environmental Management 213: 440–450. 15. Mallick, J., Ram Karan Singh, Mohammed A. AlAwadh, Saiful Islam, Roohul Abad Khan, and Mohamed Noor Qureshi. 2018. Gis-based landslide susceptibility evaluation using fuzzy-ahp multi-criteria decision-making techniques in the abha watershed, saudi arabia. Environmental Earth Sciences 77 (7): 276. 16. Xu, Y., P. Du, and J. Wang. 2017. Research and application of a hybrid model based on dynamic fuzzy synthetic evaluation for establishing air quality forecasting and early warning system: a case study in china. Environmental Pollution 223: 435–448.
Application of Network Score System for Sports Achievements Huihui Du
Abstract The management of sports scores of college students is a work that is heavy, complicated and error-prone. This paper applies the sports score network scoring system, and the three scoring items of student self-assessment, student mutual evaluation, and solidarity evaluation are completed by the network. This improves the level of participation and privacy of the students and ensures that the scores are comprehensive and objective. The teacher’s grade entry is also completed by the network, and the total score evaluation and uploading of the Academic Affairs Office are automatically completed by the system. The results show that the application of the network scoring system makes the management of sports performance more accurate and reliable. Keywords Online rating · Sports scores · Score management
1 Introduction The physical education scores of college students are comprehensively assessed by the students’ individual sports scores, sports achievement scores and usual scores according to a certain proportion [1]. The scores of individual sports assessments are determined according to the examination standards of the syllabus, and the sports achievement scores are assessed according to the National Physical Training Standards score scale [2]. The usual grades are given by the physical education teachers according to the performance of the students’ physical education [3]. Therefore, the calculation of sports scores is relatively complicated compared to other courses. In addition, physical education is a public-wide public compulsory course, and the number of students taught by physical education teachers is relatively large [4]. Due to the relatively complicated calculation of students’ sports scores and the large number of students, the calculation of college students’ sports scores is very large and the management is more complicated. H. Du (B) Sports and Health College, Aba Teachers University, Sichuan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_111
961
962
H. Du
At present, computers are relatively less used in physical education and management [5]. Most physical education teachers use manual methods to calculate and manage their achievements. Due to the complicated calculation and management of sports performance and the heavy workload, manual calculation is easy to make mistakes, and management is not convenient for statistics and inquiry. The traditional manual score management is difficult for students to fully participate [6]. With the continuous expansion of the school’s school scale, the number of students is increasing, and the level of running schools is increasing [7]. The original score management model has not met the requirements of teachers and students [8]. Based on this, this paper applies the sports achievement interactive network scoring system to complete the student’s score management through the network-based application software. The three scores of student self-assessment, student mutual evaluation and solidarity collaboration are carried out by the students through the network. The student’s participation and privacy are improved, and the score is comprehensive and objective. The teacher’s score entry is also completed via the network. The overall evaluation and uploading are automatically completed by the system, which is accurate and reliable.
2 Application Computer to Calculate and Manage Sports Scores Using computer to calculate and manage students’ sports performance can not only greatly reduce mistakes, but also quickly and accurately sort, find, screen, and count results, and can intuitively reflect the distribution of grades of professional and individual training programs in all grades [9]. Therefore, the physical education teachers have an intuitive and comprehensive grasp and understanding of the situation of each grade, each major, and each single training program.
2.1 Method of Using Computer to Calculate and Manage Student Sports Performance Specially compiled statistical software can be used to write and manage sports scores using common database management software. A dedicated physical education management software system can be purchased as needed. The specialized physical education management software system should include the calculation and management functions of sports performance [10]. However, the specialized physical education management software system may not be in good accordance with the teaching characteristics and requirements of physical education in various universities [11]. In addition, there are currently very few such software systems, and the investment for purchase is also large.
Application of Network Score System for Sports Achievements
963
In addition, some procedures for meeting the physical education requirements of the school can also be compiled [12]. However, this requires more time and effort, which is difficult for ordinary physical education teachers. Excel, Access, FoxPro, etc. are common and easy to grasp application software. Using the above software to compile and calculate the management and performance of college students is very effective and easy to master. The following takes Excel as an example to introduce the method and process of preparing the calculation program for sports performance.
2.2 Application of Excel to Realize the Calculation and Management Method of College Students’ Sports Achievements Now we take the second-grade women’s public physical education class as an example to calculate student sports performance. Public physical education grades include individual sports subject scores, sports achievement scores, and usual grades. The scores of each individual physical education subject are determined according to the examination standards of the syllabus. The individual sports subjects specified in the semester’s syllabus, including four subjects: volleyball, high jump, skill, and Tai Chi. For example, volleyball scores include serve scores, pass scores, skills, and Tai Chi Chuan. The scores of individual sports subjects accounted for 70% of the total scores. The average scores of the above four individual items were taken as the comprehensive scores of individual sports subjects. Excel can be used to easily implement functions such as query and statistics, and can generate intuitive graphics and upload the network.
3 Sports Performance Network Scoring System The design of the scoring system adopts a modular design idea. The system basically includes all the requirements of the current scoring, and the system has good scalability. It can adjust and increase the function of the system according to the change of the scoring development. According to the actual situation of a university, an online scoring management system based on the online scoring system is established, as shown in Fig. 1. The system has clear structure, clear responsibilities and diverse functions. Students and teachers can browse courses, score independently, and enter grades through any networked computer. Teaching administrators can monitor and view students’ self-scoring scores and grades of teachers’ grades at any time. Situation, timely understanding of teachers and students; able to control the entire score, entry process, open
964
H. Du Search
grading system
Students Score
Teaching management staff
Academic Affairs Office
Search
Web server
Teachers
Grade filing
Entry
Fig. 1 Structure of the sports performance network scoring system
and close the scoring system; the system can automatically count the results of the score entry and score, provide a list of students, transcripts and printing functions. In terms of systemicity, the scoring system can quickly process a large number of students’ query and scoring operations and ensure the safety of student scoring data and prevent malicious attacks; the interface is beautiful, the operation is simple and concise prompts, the system is easy to maintain, and the scalability is strong. The functional structure of the sports performance network scoring system is shown in Fig. 2. Sports score network scoring system
Teacher rating module
Information modification
Grade entry
Information modification
Scoring management
Select identity entry
Administrator management module
Student management
Teacher management
Student scoring module
Information modification
Online rating
Grade management
Fig. 2 Functional structure of the sports performance network scoring system
Search information
Application of Network Score System for Sports Achievements
965
4 Student Online Rating Implementation 4.1 System Maintenance Course management is the most versatile and flexible module in the whole system. It provides a favorable management method for users to manage the whole system. The function of student online scoring can also be closely related. The module can be generally divided into 3 major parts. Part 1 is the confirmation and setup of the administrative user. In addition to legal confirmation of the user identity when the user logs in, it also provides the function of modifying the confirmation information for the management user. The second part is the course management part. The system needs to have the function of course planning. The original data of the course is directly imported from the educational system database. Before entering the results, the system administrator needs to do all the preparatory work, including the score entry group. The setting of the score entry time, determines the student’s grade type, the weights of each grade, and the time limit for the entry of teachers and students, and the scores of the grades. The system will prompt teachers and students to enter and evaluate the scores in a time period. Teachers and students should be entered. The time is completed before the deadline, otherwise the system will automatically submit. In addition, it must provide users with information prompts to tell the user the current status or completed work to prevent errors or unnecessary repetitive work. The third part is the management part of the student file. The student data and the raw data of the list are directly imported from the educational system database. No student has the right to modify their own information to prevent malicious damage, but can modify their login password. The system provides management users with a management function for the student list, mainly to add or delete the student list.
4.2 Evaluation of Results, Entry The system adopts the teacher and student to log in to the management system through the browser, and enters and evaluates the score pattern online. Before the end of each semester, the teacher must enter the scores of the teaching courses. The students should cooperate with each other in the course of the semester. The evaluation and student mutual evaluation 3 are graded. The input method provided by the system is the online submission mode. After the teacher and student enter the system selection course, the system will automatically list all the students in the course. The teachers and students fill in and evaluate each one by one. The administrator can maintain the list before the entry and the scores after the entry. The student list can be added or deleted. In addition, once the teacher and student submit the grade, the system will not support the modification. If there are changes, the system administrator needs to perform maintenance such as performance modification, addition and deletion.
966
H. Du
It adds a more reasonable management method in the scoring system. This system management method allows students to start from any physical education program or any classmate when scoring. However, among the three scoring items, only all the students in the class are united. The two scoring projects of collaboration and student mutual evaluation will be scored and submitted to the system before the student selfassessment will be scored. If all the scores of the first two items are not completed, the system will prompt the students to score. If the score has been completed, the system prompts the score to be successful, and prompts the students to score the self-evaluation project. This will prevent some irresponsible students from scoring only the self-assessment of the student. The page planning part is an important part of the system. The key of this module is the processing of student information. Therefore, the main function of the module page is to receive the student information. The design idea is based on the curriculum of the Academic Affairs Office. The form of the list is provided to the students, so that the students can select personal information accurately and quickly, and complete the scoring. In addition, formatting some information can also facilitate the implementation of the functions of the subsequent modules. The list form is presented to the student. Project information and actual needs are not fully consistent. Therefore, an “other item” has been added to the list in order to have a new rating item added to require the student to score, but the processing of the student information remains unchanged.
4.3 Statistics and Inquiries of Results It adds the score statistics function in the teacher module. After the teacher fills in the technical assessment and theoretical test scores, the system will automatically calculate the scores in proportion to get the total score. This will enable teachers to get rid of the manual method to collect various scores. Statistical work improves the efficiency of work and the accuracy of the overall evaluation. In the process of reporting the results, through the docking with the performance management system of the Academic Affairs Office, the data is imported to complete the report. In addition, the system query function can meet the user’s various requirements. According to the grades of each grade and each semester, the system provides the scores of each course. After the students log in, they may query the scores and total scores of each subject.
5 Summary The management of sports performance in colleges and universities is a very important task. In this paper, the evaluation of student self-assessment, student mutual evaluation, and solidarity and cooperation is completed by the students through the
Application of Network Score System for Sports Achievements
967
network, which improves the participation and privacy of students, and ensures the comprehensive and objective score. The technical assessment and theoretical examination scores are entered by the teacher through the network platform, which is convenient and quick. The total score and the results of the uploading of the Academic Affairs Office are automatically completed by the system, which improves the work efficiency, accuracy and reliability.
References 1. Maxwell, S., T. Christensen, and L. Widstrom. 2017. Online pre-race education improves test scores for volunteers at a marathon. The Physician and Sportsmedicine 98: 44. 2. Balta, N., V.H. Perera-Rodríguez, and C. Hervás-Gómez. 2017. Using socrative as an online homework platform to increase students’ exam scores. Education & Information Technologies 23: 1–14. 3. Dore, K.L., H.I. Reiter, and S. Kreuger. 2017. CASPer, an online pre-interview screen for personal/professional characteristics: Prediction of national licensure scores. Advances in Health Sciences Education 22: 327–336. 4. Bird, S.B., A. Blomkalns, and N.M. Deiorio. 2018. Beyond test scores and medical knowledge: The standardized video interview, an innovative and ethical approach for holistic assessment of applicants. Academic Medicine Journal of the Association of American Medical Colleges 93: 151. 5. Miyamoto, N., K. Hirata, and N. Kimura. 2017. Contributions of hamstring stiffness to straightleg-raise and sit-and-reach test scores. International Journal of Sports Medicine 39: 110–114. 6. Thorborg, K., S. Branci, and M.P. Nielsen. 2017. Copenhagen five-second squeeze: A valid indicator of sports-related hip and groin function. British Journal of Sports Medicine 51: 594– 599. 7. Malina, R.M., M.J. Coelho-E-Silva, and A.J. Figueiredo. 2017. Tanner-Whitehouse skeletal ages in male youth soccer Players: TW2 or TW3? Sports Medicine 48: 1–18. 8. Atkinson, G., and A.M. Batterham. 2017. The impact of random individual differences in weight change on the measurable objectives of lifestyle weight management services. Sports Medicine 47: 1683–1688. 9. Lerum, Ø., E. Aadland, and L.B. Andersen. 2017. Validity of noninvasive composite scores to assess cardiovascular risk in 10-year-old children. Scandinavian Journal of Medicine and Science in Sports 27: 865–872. 10. King, E., A. Franklynmiller, and C. Richter. 2018. Clinical and biomechanical outcomes of rehabilitation targeting intersegmental control in athletic groin pain: prospective cohort of 205 patients. British Journal of Sports Medicine 52: 1054–1062. 11. Filbay, S.R., E.M. Roos, and R.B. Frobell. 2017. Delaying ACL reconstruction and treating with exercise therapy alone may alter prognostic factors for 5-year outcome: An exploratory analysis of the KANON trial. British Journal of Sports Medicine 51: 1622–1629. 12. Whittaker, J. L., N. Booysen, and S. de la Motte. 2017. Predicting sport and occupational lower extremity injury risk through movement quality screening: a systematic review. British Journal of Sports Medicine 51: 580.
Forecast and Model Establishment of Urban Rail—Transit Passenger Flow Dandan Zhang and Zhiyuan Liu
Abstract With continuous development of urban construction, the city’s economic level has grown, and the traffic of residents’ lives has also changed. More and more people have entered the well-off level, and the family-to-vehicle ratio has gradually increased, resulting in an increase in urban traffic vehicles, and the city’s rail transit passenger traffic has also expanded. Solving the problem of traffic passenger traffic has become a top priority. Nowadays, there are few researches on the prediction and solution of traffic passenger flow (PF). The main goal of this paper is to predict the PF of urban traffic and to study the establishment of its model. In this paper, the gray model method and the artificial neural network prediction are used to predict PF. According to the influence of factors of the choice of travel mode, it is concluded that the people with high income in the middle and young ages generally prefer the mode of travel to the car. Keywords Rail-transit · Passenger flow (PF) · Artificial neural network (ANN)
1 Introduction In this years, the problem of urban rail-transit PF has gradually become a hot issue. The way of transportation is more diversified, and the traffic congestion problem that comes with it is more serious. The key to solving the traffic problem is to increase efforts to build more convenient, fast and wide urban rail-transit. Therefore, the development of urban rail-transit has become a key project in urban construction. The road network planning and construction layout of urban rail-transit depends on the number of PFs. The urban rail-transit PF forecast is extremely important in the research of urban rail-transit construction. PF forecasting is an important basis for urban rail-transit planning, design, and construction. However, according to the traffic flow of many urban rail-transits, there is a general problem that the actual D. Zhang (B) · Z. Liu Zhengzhou Technical College, Zhengzhou 450121, China e-mail: [email protected] Z. Liu e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_112
969
970
D. Zhang and Z. Liu
PF is significantly different from the predicted PF. However, the difference between the actual PF and the predicted PF has brought great resistance to the subsequent development of rail-transit. Therefore, the research on the more accurate forecasting method for the passenger traffic forecasting method is an urgent problem for the construction of modern cities. With the emphasis on traffic management construction, many researchers have conducted research on urban rail-transit PF forecast in recent years. In 2017, Bao [1] used the establishment of the gray model and the Markov chain to calculate and investigate the actual passenger traffic of the station in order to solve the data statistics problem for the passenger traffic of each station, and obtain the actual PF of the next station. The result of the quantity. In 2017, Yuan et al. [2] and so on, in order to solve the problem of uneven distribution of the entire network PF caused by the rapid changes in the passenger load of urban traffic network, use the two dimensions of time and space to analyze the distribution of urban rail passenger traffic. The characteristics are compared with the actual forecast of the passenger traffic at a specific point based on the Bayesian network traffic forecasting method, and a more accurate passenger traffic forecasting method is obtained. In 2017, Li et al. [3] used the weighted historical average autoregressive model, ARIMA model and wavelet neural network model to predict and compare the accuracy of the combined model for urban rail-transit PF prediction. The combined model is of great significance in high-precision PF forecasting. In 2017, Tang et al. [4] in order to solve the problem of resource waste and low efficiency caused by inaccurate passenger traffic prediction, use BP network to implant GSO algorithm, optimize the initial weight and threshold of the network, and explore a more A new GSO-BPNN method with high prediction accuracy. In 2018, Lu et al. [5], in order to better study the model with less error, the PF change of Tianjin No.1 subway was taken as the research object, and the autoregressive moving average time series model was used to predict the PF. The design and operation management of urban traffic tracks provides a data basis. In 2018, Yao et al. [6] in order to solve the problem of large traffic flow fluctuations in traffic stations, using the improved K-nearest neighbor nonparametric regression prediction method, based on the correlation of land location, through cluster analysis of its mapping relationship, An improved nonparametric regression algorithm with good accuracy. In 2018, Cheng et al. [7] used the OD matrix to analyze the coefficient model of the peak PF in order to determine the parameters of the one-way maximum section PF forecast during peak hours, and obtained the peak segment coefficient model. Excellent conclusion. In 2019, Qiu et al. [8] used the relevant correlation vector machine method to predict the sudden PF of rail-transit in order to solve the uncertainty of rail-transit PF, and adopted the genetic algorithm to the kernel. The function and kernel parameters are optimized, and the results show that the accuracy of the traffic prediction is greatly increased. For the prediction of passenger traffic, establishing a predictive model is an extremely important method. In 2017, Lu et al. [9] used the definition of network topology and PF demand to establish a control integer linear programming model in order to solve the problem that the rail-transit route is difficult to give full play to passenger transportation capacity, and finally obtain the optimal solution. With the
Forecast and Model Establishment …
971
time-phase PF control scheme, the deviation of the total passenger turnover and the average value of the line passengers under different station waiting times is effectively reduced. In 2017, Li and Dong [10] used the ARIMA-BPNN hybrid model to establish a distributed processing platform based on Spark, established an ARIMA time series model, and effectively studied and realized its operational efficiency. It shows that the model has obvious advantages for processing large amounts of data [11]. In 2017, in order to develop a reasonable urban rail-transit train plan, the Zhengzhou Metro Line 1 was used as the experimental object, and the unbiased gray Markov model was used to predict the PF. The results showed that the Markov model was more unbiased gray model. The forecasting accuracy of passenger traffic is high and in line with the actual rail-transit situation. In 2017, Gao [12] used the partial least squares regression method to establish a model comparison with the ridge regression method in order to study the PF prediction based on the PLS model. The results show that the model established by the partial least squares method has higher prediction accuracy and less relative error. In 2017, Zhang [13] used the nonlinear Levenberg-Marquardt equation to construct the traffic PF dispatching parameter input and output model and establish the control objective function of the traffic PF dispatching. Based on the multi-ship technology, the PF scheduling model is more effective in improving the throughput of PF and avoiding blockages and conflicts. In 2017, Jiang [14] took the Spring Festival of Guangzhou as an example. In order to improve the orderly and efficient operation of the Spring Festival travel traffic, the ARIMA model and the BP neural network model were established. The results show that the number of passenger traffic in the Spring Festival will gradually increase. In 2018, Qi et al. [15] took the Chicago International Airport as an example. In order to study the optimization of airport security checkpoints, a multi-objective optimization mathematical model was established to achieve the minimum total security time and the minimum security time variance. The minimum goal of the measure. In 2018, Zhao et al. [16] for the prediction of urban and urban slow traffic demand, regression analysis between flow and morphological analysis variables, establishing slow traffic and morphological analysis variables and slow-moving friendliness The fitting relationship of the indicators is used to predict the traffic flow of other road sections of the road network, which makes the prediction more accurate. In this paper, the gray model method and the artificial neural network prediction method are used. Different choices of travel modes are adopted for different stages of age and income [17]. It is concluded that people with younger ages and higher access are more comfortable and convenient for the choice of travel modes car.
972
D. Zhang and Z. Liu
2 Method 2.1 Grey Model Method In 1979, Professor Deng Julong proposed the Grey System theory, which proposed a system between white and black. Since then, the grey system theory has been gradually applied to many fields such as transportation, humanities, economy, agriculture, market and ecology [18]. A grey model is a method of constructing a mathematical model based on less and incomplete data and using it for prediction. The gray model is also called the first-order unary gray model, because the gray prediction model is based on ddtx +ax = u and is recorded as GM(1,1). The following describes the modeling principle of GM(1,1): Record the original data series x (0) as: x (0) = x (0) (1), x (0) (2), . . . , x (0) (k) Do an accumulation of the original sequence and get the generated number x (1) as: x (1) = x (1) (1), x (2) (2), . . . , x (1) (k) among them, x (1) (k) =
k
x (0) ( j)
(1)
j=1
Let x (1) satisfy the first order ordinary differential equation d x (1) + ax (1) = u dt
(2)
where a represents the development coefficient and u represents the amount of gray action. Solve the gray differential equation and get its general solution as: c u x(k + 1) = − e−ak + a a
(3)
where C is the integral constant. In the traditional predictive model, the initial values are assumed to be: (1)
x
(k + 1) = x
(1)
(1) −
u
a
e−αk +
u
α
(4)
Forecast and Model Establishment …
973
where k = 1, 2, … Equation 4 is the solution of Eq. 2. Remember
U = [a, u]T = (B T B)−1 B T y
(5)
among them, ⎡
⎤ 1 (1) X (2) + X (1) (1) ⎢ ⎥ 2 B=⎣ ⎦, 1 (1) − X (N ) + X (1) (N − 1) 2
T y = X (0) (2) + X (0) (3), . . . , X (0) (N ) . −
The prediction formula is x (0) (k + 1) = x (1) (k + 1) − x (1) (k)
(6)
where k = 1, 2, … The establishment of any model has certain limitations, and it has its applicable conditions. The choice of GM(1,1) is closely related to the development of gray number a. Only when |a| 1, i ∈ U1
(2)
So the continuous data must be discretized first. For the discretization method of continuous variables, it can be divided into supervised discretization method and unsupervised based on equal frequency interval method and equal size width interval method. Definition 2 Knowledge system. It is a basic knowledge structure that comprehensively describes all the knowledge in a domain and is organized according to the characteristics of the domain. In this knowledge structure, the basic unit is the knowledge element. New knowledge element, new knowledge can be added organically. The average depth of the generated tree is small, so it has a faster classification speed. However, there is an internal bias in the information gain metric, which has more value attributes [5]. On this basis, Quinlan complements and improves the ID3 algorithm, puts forward a more advanced C4.5 method, and puts forward the attribute measurement method of information gain rate. There are several ways to choose the split method, but the purpose is consistent: the best segmentation is made for the target class. There may be a two-pronged or multi-pronged. The measurement of each node: the path of the classification if it is a leaf node; and the proportion of the correct classification of the leaf node. For the object discussed, it can be considered that the system is composed of finite components according to a certain law. If the components that make up the system are called element E, and the connection between elements is called contact L, then
1060
X. Zhao and L. Wu
the system composition can be abstractly defined as S = (E, L) for complex systems, that is, the high-level elements can be decomposed into low-level element sets. Only rules with high confidence are more reliable rules. Therefore, only the rules with high degree of support and confidence are valuable rules. In general, association rules can provide us with a lot of valuable information. When the association rules are mined, it is often necessary to specify the minimum degree of support and minimum confidence in advance. Association rule mining actually reflects the knowledge discovery in the data. We first introduce several concepts: information: if the transaction to be classified may be divided into multiple categories, the symbolic information is defined as formula 3, where the probability of d selecting the classification is the probability of selecting the classification. Shannon entropy (abbreviated as entropy): the expected value of information. In order to calculate entropy, we need to calculate the expected information contained in all possible values in all categories [6]. di1 i2 ...i M (l) =
M
gis−1 is (l)
(3)
s=2
The samples (corresponding root node) or sample subset (corresponding sub tree) that need to be processed are sorted according to the size of continuous variables from small to large. Assuming that there are a total of N different attribute values corresponding to the attribute, then there are a total of N ≤ 1 to maximize the information theory criteria mentioned above.
3 Mining Method of Association Rules in Decision Tree Classification Evaluation and explanation: the results of data mining are evaluated, the optimal model is selected, the evaluation is applied to practical problems, and the results should be explained in combination with professional knowledge. The above steps are not completed at one time, and some or all of them may have to be repeated. If all the non-omitted sets of attributes in the note are referred to as cores, then all reductions are equal to the core, that is, the core [7]. The meaning of the formula is that not only the relation between the kernel and all the reduction is directly reduced, but also the kernel is the most important part of the knowledge base, which is the knowledge that cannot be deleted in the process of knowledge reduction. In the order information system, a and b, let the conditional attribute set, the weight of the attribute is c, where V is W. If there is no decision attribute in the order information system, the weight of the attribute is shown by Eq. (4).
Classification and Pruning Strategy …
1061
mi = 3
yi 4
(4) yi
i=1
The classification process of the classification is a first order for each data sample to be represented by Bayesian classification will classify this record as a class of Ci. Uncertain decision is the decision when the natural state is uncertain. The decisionmaking methods are divided into maximum method, minimax method, coefficient method and equal possibility method. The maximum (max) method is an optimistic decision-making method. This method first selects the best consequences from each scheme, and then selects the best consequences from these best consequences. The supervised discretization method of continuous variables is global discrete method and local discrete method [8]. It is Chi-square statistical variable as the Chi-combining method, Chi2 method, etc. The global discrete method considers the conditional attribute group in the discrete process, for example, a global clustering method is constructed by adopting the termination criterion based on the rough set theory. Definition 3 The body of numerical knowledge meta. The numerical knowledge element in this paper is a six-tuple. Distance-based metrics. This metric defines a distance dimension between data divisions. The effect is close to the measure effect of the information gain rate. In addition, the scholars have also proposed a variety of attribute measurement methods such as the Relief measure, the J-measure, the G-statistic, the X2 statistic, and the minimum description length (MDL). The research and comparison of these measurement methods have found that there is no measure method to take an absolute advantage in the problems such as attribute selection and processing noise [9]. Definition 4 For knowledge base K = (U, P) and K 1 = (U, Q), when ind (P) = ind (Q), P (K) knowledge is more precise than Q (K 1), or Q is rough. At the same time, when P is less than Q, P is called Q, and Q is the generalization of P. Characterization is the feature of a given class of samples, and comparison is to distinguish different classes, and comparison is often called mining class comparison. Such as credit card fraudsters and non-fraudsters, the comparison of these two types of credit card holders. Class comparison is usually compared between a specified class and one other class, or several other classes. The basic method of class comparison is to first find features on the target class, and then generalize synchronously on the contrast class, so that class comparisons can be excavated.
1062
X. Zhao and L. Wu
4 Classification and Pruning Strategy of Knowledge Data Decision Tree Based on Rough Set The algorithm is considered to be one of the higher longitude algorithms in the current decision tree post-cutting algorithm. First, the PEP algorithm is the only use of the Top-Down cutting strategy, which results in the same problem as the first cutting. In addition, the PEP method will fail to cut branches. Attribute reduction and attribute value reduction in a decision system, there is often a certain degree of dependence or correlation between the conditional attributes. Reduction can be understood as the simplest representation of the dependency and association of the conclusion attributes of the decision system to the conditional attribute set without losing information. The inventors of c4.5 have long found this problem. Based on the code information table of domain expert knowledge, of course, the experience of experts can give a reasonable division point than the automatic discrete method, but sometimes because of the lack of expert supervision or the inclusion of updated indicator factors in the model, we must resort to the automatic discretization method. In this paper, a supervised local discretization method, the minimum entropy method, is used to discretize the data [10]. The minimum entropy technique is an objective method to discretize the data into the required interval number without relying on the expert. By comparing the definitions of relative reduction and general reduction, we can find that the former is the reduction of feature attribute set without changing the decision attribute, while the latter is the reduction of feature attribute set without changing the resolution ability of objects in the domain, as is shown by Eq. (5). W (Y, k) =
i j ∈Y
wj +
k−q
wr j
(5)
j=1
The method comprises the following steps of: extracting time, an index, a predicate and a numerical value from each sentence group according to a given mode, and forming a 5-tuple numerical knowledge element library by a unit. then, the main body of the five-tuple numerical knowledge element is automatically extracted, the main body comprises three types of regions, industries and institutions; the knowledge element main body extracts a rule-based machine learning algorithm to continuously learn and adapt to various training data and learn under the manual supervision, So that the support degree and the confidence level of the extraction rule in the training text reach a high level. The ID3 algorithm is limited to only the attributes of the discrete values. In order to eliminate this limitation, the information gain rate discrimination method can be used for the discretization of the continuous attribute. The specific processing is divided into two steps: (1) the order of the instances is first, all the instances at the judgment node are arranged in ascending order of the continuous attribute V to obtain
Classification and Pruning Strategy …
1063
the value sequence (vi, vx, … vk), (2) to generate the candidate segmentation point, any v, and v,. Any value between the instances can be grouped into two parts. One of the most important advantages of the learning algorithm based on the decision tree is that it does not require a user to know a lot of background knowledge during the learning process (which is also its biggest drawback), so long as the training example can be expressed in an attribute-conclusion manner, the algorithm can be used to learn.
5 Conclusion This paper analyzes the information theory property of the database decomposition method in detail. It is proved that the attribute set selected by the rough set information measure is a reduction of the original decision-making system, and the computational time complexity of this decomposition method is far less than that of the classical rough set reduction algorithm. From the point of view of attribute construction, an attribute decomposition method is analyzed to identify the middle concept level in the data table and establish a multi-level classification model.
References 1. Banko, Michele, Michael J. Cafarella, et al. 2017. Open information extraction from the web. Proceedings of the 30th International Joint Conferences on Artificial Intelligence, 100–108. 2. Xiaisheng, Wang, and Wu Shunxiang. 2015. A comparative study of several theories dealing with uncertain information. Computer Engineering and Application-December, 51–55. 3. Liu, B., and W. Hsu. 2014. Integrating classification and association rule mining. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining, ed. R. Agrawal, P. Stdorz, and G. Piatetsky, 80–86. Menlo Park: AAAI Press. 4. Pasca, Marius, De Kang Lin, et al. 2016. Organizing and searching the world wide web of facts-step one: The one-million fact extraction challenge. Proceedings of the 21st National Conference on Artificial Intelligence, 25–36. 5. Huang-lin, Zeng. 1996. Rough set theory and its application, 230–240. Chongqing: Chongqing University Press. 6. Qining, Lin. 2013. Decision analysis tutorial, 560–580. Beijing: Tsinghua University Press. 7. Songde, Ma., and Yu. Wang. 2014. Intelligent information processing and knowledge mining. World Scientific and Technological Research and Development 21 (6): 16–23. 8. Di, Zhou. 2008. A comparative study of grey system and rough set, 12–16. Wuhan: Wuhan University of Technology. 9. Yi, Chen. 1997. Decision analysis, 400–420. China: Science Press. 10. Stefanowski, J. 2011. Classification support based on the rough set theory. In Proceedings IIASA Workshop on User-Oriented Methodology and Techniques of Decision Analysis and Support, 78–95, Serock.
Teaching Strategies of Literature Courses in the New Media Technology Environment Mingxiu Ding
Abstract The development of new media technology in the new era has a great impact on education. Literature, as an indispensable part of university education, should make full use of the new media technology to innovate course teaching, realize the modernization of teaching and enhance students’ interest in learning literary knowledge, so as to make literature courses develop in a higher level. Based on the analysis of the current situation of literature course teaching, this paper elaborates the opportunities and challenges brought by the development of new media technology for teaching, and puts forward relevant course teaching development strategies, so as to realize the research purpose of literature course developing in a more professional direction under the new media technology environment. Keywords New media technology · Literature courses · Teaching mode
1 Introduction Literature courses play an important educational role in cultivating students’ humanistic literacy. However, according to the current teaching situation, the content and teaching methods of literature courses still lag behind. Its traditional teaching mode has been unable to meet the needs of students in the new era [1]. Therefore, the literature courses should face up to the impact of new media technology on traditional teaching mode, make full use of the advantages of new media technology to carry out teaching innovation, explore innovative teaching paths suitable for students’ development in the new media environment, and make the course content of literature specialty more in line with the learning and inner needs of contemporary youth.
M. Ding (B) Jilin Engineering Normal University, Northeast Normal University, Changchun, Jilin, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_124
1065
1066
M. Ding
2 Analysis of the Current Situation of Literature Course Teaching 2.1 The Practicability of Teaching Content Based on Theoretical Courses Is Low At present, the teaching of literature courses is still based on traditional plane knowledge, which pays too much attention to the simple indoctrination of theoretical knowledge, making the teaching content too single and less practical. Literature course content is complex and logical, which requires students to have a strong ability to distinguish and explore. However, the traditional single teaching mode makes it relatively difficult for students to master theoretical knowledge, and ignores students’ subjective feelings, which makes it difficult for students to understand the course content. The backwardness of traditional teaching content can not effectively tap students’ literary potential. Students receive knowledge passively for a long time in the classroom, so that their individual autonomous understanding can not be effectively dispersed. In addition, there are many text obstacles in the content of literature teaching. Teachers lack systematic and holistic thinking in the course content setting, so that students’ comprehensive ability can not be trained. In this solidified teaching mode, students have less opportunities to participate in the discussion and exchange of classroom content, which leads to the teaching of courses failing to achieve the desired results. Nowadays, the society in the new era needs more comprehensive and diversified talents. The teaching content of traditional theoretical courses hinders the comprehensive development of students majoring in literature. This kind of teaching content with low practicability is out of line with the social needs of the new era, lacking of course content innovation, which can not meet the needs of society for literary professionals, thus restricting the diversified development of students’ literary knowledge. If the teaching content of literature course no longer considers the influence of the media environment factors in the new era, it will cause a crisis in the development of literature teaching, which will gradually be replaced by the new media culture [2].
2.2 The Content of Teaching Neglects the Development Needs of Students The teaching content and means of literature courses are relatively outdated, and the related innovative teaching research is less. As a result, the teaching content of literature courses can not keep pace with the development of the times and can not meet the psychological development needs of students. Most of the experienced teachers in literature specialty are in the early stage of the development of new media. They do not have innovative perception under the new media, so that the teaching
Teaching Strategies of Literature Courses …
1067
content does not have the characteristics of the times. The lag of teachers’ teaching content and teaching means restricts the divergence and expansion of students’ creative thinking, which not only fails to meet the needs of students’ learning, but also ignores the needs of students’ future development. Traditional teaching content attaches too much importance to the transfer of theoretical knowledge, ignoring the space for students’ future development after graduation. It is believed that as long as the content of curriculum textbooks is fully imparted, students will have higher professional achievements, which is the effective completion of teaching tasks. In fact, the problem of students’ development after they leave school is the most important teaching task to be considered in teaching. Although students majoring in literature have a wide range of employment, the backwardness of course content makes students’ theoretical knowledge divorced from practice, so that the students do not have confidence for the professional development in the future, and students’ abilities can not meet the needs of the employment market, which leads to students turning to positions in other disciplines, ultimately leading to the loss of literary professionals. In addition, the society’s demand for literary talents is decreasing year by year, which makes the students majoring in literature have a strong competitiveness in employment. Invisibly, it also creates a certain degree of pressure on the future development of students majoring in literature, thus further restricting the development of students majoring in literature.
3 Opportunities and Challenges of the Development of New Media Technology to the Teaching of Literature Courses 3.1 Opportunities for the Development of Literature Course Teaching in the New Media Technology Environment New media technology is a new form of media communication supported by network technology. Compared with traditional media such as newspapers and broadcasting, it has the advantage of timeliness of digital technology communication, which provides more epochal information to audiences through new media communication platforms such as Microblog, WeChat, e-book, etc., which makes great changes in the way and speed of people receiving information, and brings changes to people’s lives as well as opportunities for the development of education [3]. Firstly, the timeliness of new media technology provides more convenient ways for students to access information resources. The development of the Internet has made the application of mobile devices gradually become widespread. Students break the time and space limitations of traditional access to information and knowledge, and use computers or smart phones to achieve the acceptance and distribution of information. With the development of new media technology, Internet and mobile network can be interoperable. This new form of network connection enables information to be transmitted to the recipients of different network nodes, makes it more convenient to enjoy
1068
M. Ding
the resources which are difficult to obtain, and realizes the sharing of information resources through the online platform of network. The richness of network resources has brought wider choice space for college students’ literature reading, and wider coverage of students’ reading content, achieving the diversification of literary knowledge acquisition [4]. The application of the network platform is not limited by time and space, so students can also become publishers of literary information. On the one hand, it is conducive to the real-time mass release of literary content. On the other hand, it has a positive impact on students’ literary writing, bringing convenience for students to better learn literary knowledge. Secondly, the development of new media technology provides students with opportunities for literary interaction. Network technology is interactive, and its main feature is the multi-directional information transmission, so that information transmission and feedback can be carried out at the same time, reducing the difficulty of students’ interactive communication [5]. The development of new media technology enables students to carry out literary dialogue on the network platform, to express their own opinions while receiving other literary information, to share their own opinions in the process of communicating and interacting with others, and to accept other people’s suggestions and evaluations. This effective form of communication enables the students majoring in literature to deeply understand the composition of literary theory knowledge and promotes the students to grasp the content of literary theory at a higher level.
3.2 Challenges of New Media Technology to the Teaching of Literature Courses With the development of new media technology, students are more willing to use mobile devices such as mobile phones or computers to obtain information resources, which has become the main form of learning for contemporary students. The convenience of this network brings certain challenges to the traditional teaching mode of curriculum imparting. Firstly, the wide application of new media technology makes the bad information in the network produce wrong orientation to students’ learning. The complexity of network information resources makes students vulnerable to the influence of bad information in the network environment [6]. Due to the lack of effective supervision in content publishing and production of network platform, many bad and unreal information is disseminated in the network. In addition, the students’ self-control and discrimination ability are weak, which makes the chaotic network negative information easy to produce certain harm to students. For example, students use the network engine to search for literature. The diversity and richness of literary knowledge and literary works on the Internet can easily lead to wrong understanding of literary knowledge, such as the spoof portrait of Du Fu on the internet, Lu Xun’s famous saying and so on, if we do not distinguish them concretely. Its wide spread easily leads to wrong orientation of students’ understanding of literature, makes students have wrong understanding and knowledge structure,
Teaching Strategies of Literature Courses …
1069
and is not conducive to the healthy development of literature course. Secondly, the rapid acquisition of knowledge by new media technology restricts the development of students’ ability to think independently. While enjoying the convenience of using the network to finish their study, students are lazy in exploring knowledge, and their desire for exploring new knowledge and new problems is reduced. The convenience for students to acquire knowledge through the Internet has gradually increased the resources available to students. Many students can not think independently when they encounter learning difficulties. Instead, they directly search for answers in the network and use the form of copying to answer questions. This learning pattern makes students lazy in exploring problems and knowledge, which is not conducive to students’ good learning. In addition, the richness of network resources enables students to piece together the network content for the learning tasks assigned by the teacher, which is not conducive to the consolidation of curriculum knowledge and the formation of students’ literary professional quality.
4 The Innovative Path of Literature Course Teaching Under the New Media Technology Environment See Fig. 1.
Teaching model
Innovation
Virtual + Reality
Path
Major courses New Media
Platform construction Online Interactive Platform
Fig. 1 Path diagram of literature course teaching innovation in the new media technology environment
1070
M. Ding
4.1 Constructing the Innovative Teaching Model Combining Virtual and Reality in the New Media Environment In school education, classroom teaching activities are the main channel for students to acquire knowledge, and the teaching content and mode have an important impact on whether students can effectively master knowledge. Therefore, teachers should realize the importance of teaching innovation mode, face the development of the real society to provide the infinite possibilities for education, seize the opportunity of teaching innovation development, and rationally apply multimedia technology to expand teaching content, so as to make teaching content more in line with the learning needs of contemporary young students. Due to the multi-meaningful content of literary knowledge, the course can adopt the teaching method of flipped classroom, give full play to the spirit of students’ self-learning and exploration, let students use the network for self-learning after class, and make full communication between teachers and students in class to achieve problem-solving, so as to help students internalize literary knowledge better. This new teaching mode needs to use the network platform to develop relevant learning software and courses. Teachers integrate pictures, videos and animations related to courses on the network, and make web-based learning courseware to publish on the online platform, so as to facilitate students to understand more intuitively the knowledge points and difficulties of course learning, and meet the needs of fragmentation learning of students after class. In addition, the development of online learning system should be emphasized in the flipped classroom teaching mode. Mobile communication and online learning platform should be combined so that students can complete the course at any time and anywhere without the restriction of the network environment. The literature resources and information can be pushed through WeChat official account or Microblog account to create a healthy network learning environment for students, actively guide students to study independently under the flipped classroom mode, improve the availability of network resources, and realize the teaching mode of joint education of virtual network and real curriculum under the county media environment [7].
4.2 Establishing Professional Courses of New Media Literature The development of network technology has an important impact on students’ learning needs. The construction of network platform provides an important way for students to express their emotions, so that students can use network learning to get self-satisfaction. The development of education should focus on new media technology and set up relevant courses of new media literature to meet students’ online learning needs [8]. Students majoring in literature have strong ability of writing, reading, and language. Applying new media technology to teaching literature courses
Teaching Strategies of Literature Courses …
1071
should attach importance to the cultivation of students’ ability, expand teaching content on the basis of continuing students’ ability, add new media courses such as new media literary language and network application technology, and allows literary knowledge to merge with new media technology to achieve the teaching form of common education. Setting up the new media literature course can not only enable students to grasp the theoretical knowledge of literature more effectively, but also systematically understand the new media technology, which is conducive to students’ comprehensive development in the new media era [9]. With the development of new media technology, the social demand for students majoring in literature is not confined to the content of literary creation or literary writing. The society pays more attention to the development of students’ abilities. The setting of multimedia courses provides more comprehensive education for students’ development, and enables students to understand more about the needs of talents in today’s society, so as to make innovations in learning. Literature course development should go out of the closed development environment, accommodate more new teaching modes with an open educational mind, guarantee the basic status of literature, make teaching more close to the real society, and make literature course more in line with students’ expectations for learning, so as to achieve higher educational results in the new media environment.
4.3 Building a Platform for Online Interactive Learning The development of new media technology promotes the transformation of the relationship between students and teachers, makes the communication between teachers and students more equal, and gradually transforms from one-way face-to-face communication between teachers and students to online multi-directional communication between teachers and students [10]. Literature teaching should recognize the convenience of network development for teaching communication, and actively explore the new mode of online interactive learning under the new media environment, so that students can be actively guided by teachers in learning, so as to better complete learning tasks and objectives. On the one hand, teachers can set up discussion forums for students on literary websites, so that students can regularly show the results of self-learning, complete the learning content through discussions with teachers, and gain learning experience and profound insights. On the other hand, teachers can use network software to establish a collective discussion area, so that all students can participate in learning and discussion activities, use different students’ innovative ideas to improve their own learning methods, and also use experts in the field of literature on the network to explain courses for students, so that students can enrich their knowledge system indirectly through the experience of experts, so as to achieve more efficient online self-discussion learning.
1072
M. Ding
5 Conclusions The development and progress of the network era have a profound impact on people’s way of life and learning. Literature courses should seize the opportunity of development under the new media technology environment. On the basis of respecting the development of the content of literature courses, the teaching mode should be improved so as to make the content of literature courses more in line with the learning needs of the new media era, and realize the sound development of literature major in the new era.
References 1. Juan, Cai. 2019. Research on the development of Chinese language and literature in the new media environment: A review of media and literature—An introduction to media literature and art theory. Journalism Lovers (4): 113 (in Chinese). 2. Jun, Cheng. 2019. Path innovation of literary classics reading education for college students in the new media era. Journal of Hebei University of Technology (Social Sciences Edition): 1–12 [15 June]. https://doi.org/10.14081/j.cnki.cn13-1396/g4.000130 (in Chinese). 3. Wenqi, Tan. 2019. Research and practice on the integration of new media and course teaching: A case study of the course teaching of Chinese language and literature. Journal of a Ba Teachers University 36 (1): 106–110 (in Chinese). 4. Chunmei, Huang, and Wu Yongna. 2018. The way of effective integration of new media technology and classroom teaching of liberal arts in colleges and universities: Taking the teaching of “ancient Chinese literature” as an example. Journal of Jiangxi Vocational and Technical College of Electricity 31 (10): 72–73 (in Chinese). 5. Chunmei, Huang, and Li Supping. (2018). Teaching strategies of liberal arts classroom in higher vocational colleges under the new media technology environment: Taking The teaching of “ancient Chinese literature” as an example. Journal of Guangzhou Open University 18 (5): 35–39 + 109 (in Chinese). 6. Peihua, Shao. 2017. Research on the development of contemporary literature in the context of new media: A review of media ecology and contemporary literature. News and Writing (10): 115 (in Chinese). 7. Siyang, Gu. 2017. Research on the teaching reform of Chinese language and literature from the perspective of new media. Comparative Study of Cultural Innovation 1 (15): 99–100 (in Chinese). 8. Jin, Ge. (2019). A brief discussion on the influence of new media on the creation of literature of theatre film & television. Intelligence (11): 201 (in Chinese). 9. Qixiang, Wang. 2019. A probe into the dilemma of the development of Chinese language and literature in the new media environment. Policy & Scientific Consult (Technology and Management) (4): 127 (in Chinese). 10. Die, Liu. 2019. Research on the teaching reform of writing course for Chinese language and literature major in the new media age. Journal of Hezhou University 35 (1): 107–110 (in Chinese).
On the Teaching Reform of Mathematics Course in Independent Colleges Yong He
Abstract This paper summarizes the teaching reform of mathematics courses carried out by our higher mathematics teaching team in view of the work carried out and experience gained in recent years. Mathematics teachers in colleges and universities should change their educational concepts, incorporate the idea of mathematical models, Encourage and guide students to participate in mathematical model competitions for college students, adopt a mixed teaching mode of online and offline, innovate and turn over the teaching form of the classroom, make micro-classes and develop online teaching platforms, and strengthen the construction of Resource pool. These are effective ways to improve the mathematics level and ability of our students. The cultivation of students’ innovative spirit and ability should be put in the first place in mathematics teaching. Keywords Teaching team · Teaching reform · Resource construction · Hybrid teaching mode · Flips classroom
1 Introduction Our school focuses on cultivating application-oriented talents at the undergraduate level. The application-oriented colleges and universities are a new teaching level, which is between undergraduate teaching and vocational skills teaching [1]. Students should not only master the theoretical knowledge of undergraduates, but also the applied knowledge of vocational skills. How to complete the teaching of applied technology undergraduates within the limited teaching hours has become an important task of talent cultivation and teaching reform in applied universities. Higher mathematics is an important basic course for undergraduates [2]. It is characterized by many teaching contents, great difficulty, strong skills and abstract thinking. It is the key and difficult point in undergraduate teaching and also the most headache course for undergraduates. Y. He (B) Wuhan Donghu University, Wuhan 430212, Hubei, People’s Republic of China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_125
1073
1074
Y. He
The high-level mathematics teaching team of our school is a teaching backbone team that has been tempered for many years, with excellent professional quality, outstanding teaching results and strict style. In recent years, it has made major breakthroughs in teaching and scientific research. The teaching team is motivated and innovative, and the team carries out the following tasks in daily work: continuously update the teaching concept, reform the traditional teaching mode, actively explore teaching methods, carry out collective lesson activities and teaching research, develop and update teaching [3]. Resources, carry out teaching experience exchanges and teaching seminars, formulate teaching plans and organize implementation of teaching plans on time, and promote the integration, teaching and dissemination of the old, middle and young.
2 Team Settings and Course Features The teaching team has Professor Zheng Lie (Hubei Famous Teacher), Professor He Wenxuan, Associate Professor Zhu Xingping, Associate Professor He Yong, Associate Professor Peng Xuemei, Associate Professor Ming Jiexiu, Associate Professor Ma Lijie, Academician Liu Wei, Dr. Zhang Bo, etc. They are experienced teachers who have a certain influence among teachers and students. The course that the team is responsible for is a public basic course that belongs to general education, and is the basis for students to follow the follow-up professional courses. The main courses offered are: Advanced Mathematics, Linear Algebra, Probability Theory and Mathematical Statistics. Among them, advanced mathematics and linear algebra are school-level boutique resource sharing courses, and are building and perfecting corresponding boutique online open courses. Higher Mathematics (Technology) uses the textbook of Tongji 7th Edition. Higher Mathematics (Management Edition) uses the third edition of Tongji University’s economic management textbook. Linear algebra and probability theory and mathematical statistics use self-edited textbooks. The three courses have corresponding question banks according to the chapters. The questions are consistent with the final exam questions. They have been uploaded to the basic course website for students to download and use, and we update the contents of the question bank every year. In order to promote and test student’s learning effects and teacher’s teaching effects, organize students to participate in the school-level college students’ mathematics competition every year, organize the award-winning students of the school to participate in the mathematics competition of Hubei University students, and provide special training and counseling for students who have obtained the provincial awards to participate in the national college students’ mathematics competition. In order to improve student’s interest in mathematics courses and the ability to solve problems using mathematics, students are organized to participate in various mathematical modeling competitions every year, including school-level digital model competition (referred to as school competition) and Central China University Students Mathematical Modeling
On the Teaching Reform of Mathematics Course …
1075
Invitational Tournament (referred to as Huazhong League), National College Students Mathematical Modeling Competition (referred to as the National Competition), American College Students Mathematical Modeling Competition (referred to as the US competition).
3 Innovative Reform Measures Based on the characteristics of students, the team aims at the teaching reform of higher mathematics curriculum, and cultivates the students’ comprehensive use of mathematics knowledge analysis and problem-solving creative thinking ability. The combination of domestic excellent teaching materials and self-edited teaching materials promotes the reform of teaching content. Promote the reform of teaching methods by implementing micro-courses, mixed teaching modes and flipping classrooms [4].
3.1 Transformation of Educational Philosophy The teaching team abandoned the traditional educational concept of “teaching materials as the core, teachers as the core, and classroom as the core”, and truly established the modern education concept of “taking students as the core”, using a combination of online and offline teaching methods. According to different mathematics courses, we can create micro-courses and develop online teaching platform, which is convenient for students to arrange time and flexibly and freely conduct offline online learning, so that teaching activities are no longer in the form of teaching links, but become a way to cultivate students’ ability development. In order to promote the overall development of students.
3.2 Integrating Mathematical Modeling Ideas and Increasing Mathematics Practice Projects Due to the limited time available, the mathematics experiment course mainly introduces students to the basic operation of mathematics software, while ignoring the practice. In the summer training of mathematics modeling in our school, team members tried the following [5]: 1. Design principles: Our mathematics experiment course is based on the principle of project-oriented. We set up unit projects in each chapter and set up comprehensive projects in practice. The purpose is to train our students’ hand-on ability
1076
Y. He
to solve practical problems using mathematics thought, mathematics knowledge and mathematics software. 2. Design ideas: taking into account the professional characteristics, using the mathematics knowledge, with the help of mathematical software to solve open problems, diverging students’ thinking, and avoiding the same method of problem-solving. 3. Organizational form: Free combination of students, group-based, division of labor within the group, combined within and outside the class, and completed together within the specified time. 4. Form of assessment: Each group provides a seminar report (WORD) and a communication material (PPT), and the teacher scored according to the supporting materials submitted by each group.
3.3 Innovating the Teaching Mode of Flipping Classroom It is mainly reflected in the transformation of the teacher’s role and the student’s role. In this process, the student is truly the master of learning. This change does not mean the weakening of the status and value of teachers. On the contrary, the role and responsibility of teachers is becoming more and more important, and higher requirements are placed on teachers. The role of the teacher has changed from the organizer of the teaching and the transfer of knowledge to the instructor and consultant in the learning process [6]. The teacher’s “teaching, evangelism, and confession” is only an external cause. Through the internal factors of students’ subjective initiative, combined with our online teaching platform and network resources, we realize and complete our teaching process. In the course of “Advanced Mathematics”, the team members send the videos recorded in our advanced mathematics courses to the student class group during the teaching process of double, triple, curve and surface integration. Watching the video while teaching online, using the teaching mode of flipping the classroom, promoting the interaction between teachers and students, such as the use of knowledge, answering questions and so on, thus achieving a good teaching effect.
3.4 Implementing Case-Driven Teaching Methods to Improve Teaching Effectiveness In the classroom teaching, in order to improve the teaching effect, the teaching mode such as “Task Driven”, “Project Guidance” and “Case Teaching” is adopted. Combining the actual life and professional background, the vivid teaching case is designed to deepen the students’ understanding of the basic knowledge. And mastery.
On the Teaching Reform of Mathematics Course …
1077
With the project inspection teaching and project to promote teaching, it fully reflects the teaching characteristics of “teaching, learning, and integration”.
3.5 Promote the Development of “Online and Offline” Teaching Methods with the Support of Networked Teaching Construction The teaching team members developed some network-assisted teaching platforms, implemented teaching courseware sharing, online answering test, online learning discussion, online Q&A and other means to assist students in offline learning, and preparatory work for the smooth implementation of teaching reform to strengthen practical ability. Team members use modern teaching gradually multimedia teaching methods for teaching [7], can be fully broaden teaching content, geometry and physics background meaning of mathematical concepts can be visually displayed through animation, graphics, for some of the more complex graphics can make use of mathematical software Clearly expressed, enhance students’ interest and enthusiasm for learning, making the teaching effect better.
3.6 Transformation of Assessment Methods The assessment method can be combined with closed volume and open book. The open book allows students to complete a small essay and adopt an open-ended answer. The purpose is to cultivate students’ ability to comprehensively apply knowledge (including writing) and to independently analyze problems and solve problems, and truly implement quality education in higher mathematics teaching.
4 Resource Construction 4.1 Construction of Micro-curricular Resource Library According to the new situation and new requirements of the current educational informatization development, in order to integrate and develop the teaching resources suitable for our school [8], fully tap the teacher’s own value, and lay a good foundation for further implementation of the flipping classroom, the team members independently recorded the advanced mathematics and linear algebra micro-courses Video, allowing students to watch and complete learning tasks anytime, anywhere.
1078
Y. He
4.2 Teaching Material Construction Teaching materials are the basic tools for teaching, and also an important guarantee for improving the quality of teaching and deepening the reform of education and teaching. In order to further improve the quality of teaching, according to the actual teaching experience, team members have edited and edited more than 8 textbooks based on the accumulated experience of many years of teaching. Among them, the “Probability Theory and Mathematical Statistics” textbooks have been used in our school since 2009, re-edited in 2012. “Probability Theory and Mathematical Statistics” textbooks have been used in our school since 2016. “Linear Algebra” has been used in our school since 2009 and has been re-edited in 2015. These textbooks have used tens of thousands of students who have benefited so far. At the same time, they have compiled electronic teaching plans for Advanced Mathematics, Linear Algebra, and Probability Theory and Mathematical Statistics.
4.3 Online and Offline Course Resources Construction In the “Internet + under” background, in order to reflect the results of reform teaching, team members according to my school personnel training programs, teaching objectives, cognitive law student, academic characteristics, etc., since 2010 since, presided over the construction of the “higher mathematics” and “Linear Algebra” The two-level high-quality resource sharing course transforms the learning center into a lifelong learning platform, exploring online and offline integration, and forming a diversified evaluation model, which significantly improves the teaching effect.
4.4 Construction of Courseware Resource Library In order to make up for the shortcomings of traditional teaching in terms of threedimensionality, intuitiveness and dynamic sense, team members made self-contained multimedia courseware according to the characteristics of the course. 100% of the courseware in each course is self-made courseware, and the update rate is more than 80%.
4.5 Boutique Online Open Courses and Question Bank In order to better enhance the interaction between teachers and students, provide students with independent learning resources, make better use of fragmentation time,
On the Teaching Reform of Mathematics Course …
1079
and promote the full complementarity of teaching and learning, teaching and teaching, learning and learning, team members fully use the network learning space [9]. The platform provides course-assisted teaching, and establishes online open courses and question banks of “Advanced Mathematics”, “Linear Algebra”, “Probability Theory and Mathematical Statistics”, which provides convenience for teachers’ teaching and student learning, and the students’ performance is significantly improved.
5 Conclusion The application of these measures has improved the teaching effect in an all-round way. With the unremitting efforts of all members of the teaching team, we have achieved gratifying results in recent years. Mr. Ming jiexiu and Mr. Zhou xue were approved for two provincial-level teaching and research projects. The team members published more than 10 high-level papers, applied for more than 10 utility model patents, and tutored students to win mathematics prizes: one provincial first prize, two provincial second prizes. Project, four provincial third prizes, tutoring students to participate in the mathematics modeling competition of the whole college students: one national first prize, two provincial first prizes, four provincial second prizes, and more than 10 provincial third prizes.
References 1. Yong, He. 2013. Textbook construction and reform of mathematics course in independent college. Proceedings of Wuhan Donghu College, 300–303. 2. Yong, He. 2014. Problems and countermeasures in the teaching of advanced mathematics in independent colleges. Proceedings of Wuhan Donghu College, 138–139. 3. Yong, He. 2016. Research on the application of technical undergraduate advanced mathematics teaching reform. Urban Tutor, 183. 4. Sun, xiaoying, and chongkun Xu. 2016. Research on the teaching of advanced mathematics into the idea of mathematical modeling. Proceedings of 2016 4th International Conference on Management Science, Education Technology, Arts, Social Science and Economics, 367–372. 5. Liu, Xiaobo. 2016. Driving system of university mathematics practice teaching system I: View of teacher. Proceedings of 2016 2nd International Conference on Education, Social Science, Management and Sports, 518–523. 6. Meng, HuiFang, and Fangjian Fu. 2017. The Infiltration of mathematical modeling thought in advanced mathematics teaching. Proceedings of 2017 4th International Conference on Education, Management and Computing Technology, 542–545. 7. Fan, Linyuan. 2017. Study on teaching reform of higher mathematics in economics and management specialty. Proceedings of 2017 International Conference on Sports, Arts, Education and Management Engineering, 468–472.
1080
Y. He
8. Guangqian, Dong. 2018. Discussions on the teaching reform of college mathematics curriculum based on the training of applied talents. Proceedings of 2018 International Conference on Social Sciences, Education and Management, 598–602. 9. Fengling, Tang. 2019. Research on the reform path of higher mathematics teaching method based on the embedding of mathematics history. Proceedings of 2019 5th International Workshop on Education, Development and Social Sciences, 440–444.
Adaptive Sliding Mode Control for Unmanned Surface Vehicle with Fuzzy Switching Renqiang Wang, Keyin Miao, Jianming Sun, Hua Deng and Yue Zhao
Abstract In view of the universal approximation performance of the continuous function for the fuzzy system, with the problem of the state function and control input gain uncertainty in the USV motion model and the problem of unknown external disturbance, three fuzzy approximators are designed to estimate the above three unknown functions. The heading control law is designed by using the fuzzy switching method on the basis of Lyapunov stability theory. The simulation confirms the truth of the effectiveness of the algorithm. Keywords USV · Motion control · Fuzzy control · Sliding model control
1 Introduction Due to the state function and control input gain uncertainty in the Unmanned Surface Vehicle (USV) motion model, and the external interference unknown, the conventional PID control chattering situation is more serious [1], the effectiveness is not satisfactory. To this end, on the basis of Lyapunov direct method [2, 3], sliding mode control [4, 5] with Backstepping [6, 7] has been applied in USV heading control designing. In view of the fact that the core of the above control method is to construct a switch function, the system feedback error is infinitely close to the origin along the switching plane. The disadvantages are mainly due to the uncertainty of state function and control input gain, and due to the external disturbance, resulting in the switching chatter of control input. In view of the universal approximation performance of continuous functions for fuzzy systems [8], for the state function and control input gain uncertainty in USV motion model, and the unknown external disturbance problem, three fuzzy approximators are designed to perform the above three unknown functions. It is estimated that the heading control law is designed by using the fuzzy switching method R. Wang (B) · K. Miao · J. Sun · H. Deng · Y. Zhao School of Navigation, Jiangsu Maritime Institute, Nanjing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_126
1081
1082
R. Wang et al.
with Lyapunov theory, and the chattering problem of precise control will be solved effectively.
2 USV Plane Motion Model The mathematical model with uncertainty and disturbance of USV is described as follows,
x (n) = f (x) + g · u + dt y=x
(1)
In the expression, f (x) and g are both the internal uncertainty function of the system, dt is outside interference, and |dt| ≤ D.
3 Designing Adaptive Sliding Mode Control of USV Based on Fuzzy Switching 3.1 Designing Sliding Mode Switching Function Defining the switching function as following, s = k1 e + k2 e˙ + · · · kn−1 e(n−1) + e(n−1) = ke
(2)
T In the expression, e = e, e, ˙ . . . , e(n−1) , ki > 0, i = 1, 2, . . . , n − 1. The control law is designed as formula (3), n−1 1 (n) (i) u= ki e + xd − u sw − f (x) − g i=1 where, u sw = ηsgn(s), η ≥ D. It can be inferred formula (4) by the differential formula (2), s˙ =
n−1
ki e(i) + e(n)
i=1
=
n−1 i=1
ki e(i) + x (n) − xd(n)
(3)
Adaptive Sliding Mode Control …
=
n−1
1083
ki e(i) + f (x) + gu + dt − xd(n)
(4)
s · s˙ = ds − η|s| ≤ 0
(5)
i=1
It can be obtained that,
3.2 Sliding Mode Adaptive Control Design Based on Fuzzy Approximation As can be seen from the foregoing, the internal functions of the system are unknown, so the above control law does not apply. To this end, fˆ, gˆ and hˆ is the output of fuzzy system as formula (6), which will be used to respectively replace f , g and η sgn(s). ⎧ ⎪ fˆ = θTf · ψ(x) ⎪ ⎨ gˆ = θgT · ψ(x) ⎪ ⎪ ⎩ ˆ h = θhT · (s)
(6)
where, ψ(x) and (s) are fuzzy vectors, θTf , θgT and θhT are updated by formula (7), ⎧ ˙ ⎪ ⎨ θ f = r1 sψ(x) θ˙g = r2 sψ(x)u ⎪ ⎩ ˙ θh = r3 s(s)
(7)
where, r1 , r2 and r3 are both positive real numbers. So, the control law becomes formula (8), n−1 1 (n) ˆ ki e(i) + xd − h(s) u= − fˆ − gˆ i=1
(8)
Defining the following optimal parameters,
⎧
⎪ ∗
⎪ θ f = arg min sup fˆ − f (x)
⎪ ⎪ ⎪ θ f ∈Ω f ⎪
⎪ ⎨
∗
θg = arg min sup gˆ − g
⎪ θg ∈Ωg ⎪
⎪ ⎪
⎪ ∗ ⎪
ˆ ⎪ θ h − u sup = arg min sw ⎩ h
θh ∈Ωh
(9)
1084
R. Wang et al.
where, Ω f , Ωg and Ωh is the collection of θ f , θg and θh respectively. Further, making the following settings, ⎧ ⎪ ⎨ ⎪ ⎩
hˆ = η sgn(s) η = D + η, η ≥ 0 |dt| ≤ D
(10)
Defining the approximation minimum error of the fuzzy system, ω = f (x) − fˆ + g − gˆ u
(11)
In the expression, |ω| ≤ ωmax . It can be obtained formula (12), s˙ =
n−1
ki e(i) + f (x) + gu ˆ + g − gˆ u + dt − xd(n)
i=1
= f (x) − fˆ − hˆ + g − gˆ u + dt = fˆ x θ∗f − fˆ − hˆ + dt + ω + gˆ x θ∗g − gˆ u + hˆ − hˆ s θ∗h
= θ˜ Tf ψ(x) + θ˜gT ψ(x)u + θ˜hT (s) + dt + ω − hˆ s θ∗h
(12)
where, θ˜ f = θ∗f − θ f , θ˜g = θ∗g − θg , θ˜h = θ∗h − θh . The Lyapunov function is Constructed that, 1 1 1 1 2 T T T ˜ ˜ ˜ ˜ ˜ ˜ s + θ f · θ f + θ g · θ g + θh · θh V = 2 r1 r2 r3 So, 1 1 T 1 T 1 T V˙ = s 2 + θ˜ f · θ˜ f + θ˜ g · θ˜ g + θ˜ h · θ˜ h 2 r1 r2 r3 1 ˜ T ˙˜ 1 ˜ T ˙˜ 1 ˜ T ˙˜ = s s˙ + θ f · θ f + θg · θg + θh · θh r r2 r3 T 1 T T = s θ˜ ψ(x) + θ˜ ψ(x)u + θ˜ (s) + dt + ω − hˆ s θ∗ f
g
h
h
1 ˜ T ˙˜ 1 T 1 T θ · θ f + θ˜ g · θ˙˜ g + θ˜ h · θ˙˜ h r1 f r2 r3 1 T 1 T T T T = s θ˜ f ψ(x) + θ˜ f · θ˙˜ f + s θ˜ g ψ(x)u + θ˜ g · θ˙˜ g + s θ˜ h (s) r1 r2 ∗ 1 ˜ T ˙˜ + θh · θh + sω + s dt − hˆ s θh r3 +
(13)
Adaptive Sliding Mode Control …
1085
1 T 1 T 1 ˜T θ f r1 sψ(x) + θ˙˜ f + θ˜ g r2 sψ(x)u + θ˙˜ g + θ˜ h r3 s(s) + θ˙˜ h r1 r2 r3 1 ˜T + sω + s dt − (D + η)sgn(s) ≤ θ f r1 sψ(x) + θ˙˜ f r1 1 ˜T 1 T + θg r2 sψ(x)u + θ˙˜ g k4 + θ˜ h r3 s(s) + θ˙˜ h + sω − η|s| (14) r2 r3
=
Make the following settings, ⎧ ˙ θ˜ = −r1 sψ(x) ⎪ ⎪ ⎨ f θ˙˜g = −r2 sψ(x)u ⎪ ⎪ ⎩ ˙ θ˜h = −r3 s(s)
(15)
It can be acquired formula (16), V˙ ≤ ωs − η|s|
(16)
The minimum error ω → 0, so V˙ ≤ 0.
4 Simulation 4.1 Simulation Object In this paper, the unmanned boat “Blue Letter” is used for simulation test, the parameters [9] of the Nomoto mathematical model with speed at 8.5 kn of which is:K = 1.50226, T = 0.90503, α = 0.001, and the system function is: f (x) = 1/T x2 + αx23 , g = K /T .
4.2 Condition Setting A tracking signal is selected with a mathematical model represented an actual performance requirement as follow [10], φ(i + 2) + 0.1φ(i + 1) + 0.0025φ(i) = 0.0025φr (i)
(17)
where, φ(i) is the ideal system performance of the ship, and φr (i) = (sign(sin(π · i/600)) + 1)π/7.2, it is a processed input signal with a range of 0°–50° and a period of 600 s.
1086
R. Wang et al.
4.3 Simulation Results and Analysis The above model was tested on the MATLAB software platform. The results of simulation for heading control of USV are illustrated in Figs. 1, 2, 3, and 4. It is not
Fig. 1 The output of the course of USV
Fig. 2 The input of the rudder angle of USV
Adaptive Sliding Mode Control …
1087
Fig. 3 The state function of the USV’s motion model and its estimation
Fig. 4 The control input gain of the USV’s motion model and its estimation
difficult to find that the fuzzy adaptive control described in this paper can make the ship’s heading stably track the expected heading, the control input is smooth, and there is no obvious chattering phenomenon.
1088
R. Wang et al.
5 Conclusion In view of the universal approximation performance of the continuous function for the fuzzy system, for the uncertainty of the state function and control input gain and the unknown external disturbance problem in the USV’s motion model, three fuzzy approximators are designed to estimate the above three unknown functions, and then, the heading control law is designed by using the fuzzy switching with Lyapunov theory. The simulation results verify the algorithm is effective. Acknowledgements This research was supported by Natural Science Research Project of Jiangsu Province (Grant No. 18KJB580003), and Innovation Fund of Science and Technology of Jiangsu Maritime institute (Grant No. KJCX1811).
References 1. Sun, Jianming, and Renqaing Wang. 2017. Application of genetic algorithm and neural network in ship’s heading PID tracking control. Advances in Intelligent Systems and Computing 691: 436–442. 2. Wang, Renqiang, Yuelin Zhao, Keyin Miao, and Jianming Sun. 2017. Intelligent steering control based the mathematical motion models of collision avoidance for fishing vessel. Advances in Intelligent Systems and Computing 686: 27–35. 3. Wang, Aihui, Qiang Zhang, and Dongyun Wang. 2015. Robust tracking control system design for a nonlinear IPMC using neural network-based sliding mode approach. International Journal of Advanced Mechatronic Systems 6: 269–276. 4. Benslimane, Hocine, Abdesselem Boulkroune, and Hachemi Chekireb. 2018. Adaptive iterative learning control of nonlinearly parameterised strict feedback systems with input saturation. International Journal of Automation and Control 12: 251–270. 5. Wang, Yang, Chen Guo, and Fuchun Sun. 2015. Dynamic neural fuzzified adaptive control of ship course with parametric modelling uncertainties. International Journal of Modelling, Identification and Control 4: 251–258. 6. El Yakine, Nour, Mohamed Menaa Kouba, Mourad Hasni, and Mohamed Boudour. 2016. Design of intelligent load frequency control strategy using optimal fuzzy-PID controller. International Journal of Process Systems Engineering 4: 41–64. 7. Renqiang, Wang, Zhao Yuelin, and Sun Jianming. 2016. Application of optimized RBF neural network in ship’s autopilot design. Proceedings of Advanced Information Management, Communicates, Electronic and Automation Control Conference, 1642–1646. 8. Wang, Renqiang, Yuelin Zhao, and Keyin Miao. 2016. Application of neural network minimum parameter learning algorithm in ship’s heading tracking control. Proceedings of International Symposium on Computational Intelligence and Design, 135–139. 9. Wang, Renqiang, Hua Deng, Keyin Miao, Yue Zhao, and Du Jiabao. 2017. RBF network based integral backstepping sliding mode control for USV. Matec Web of Conferences 139: 143–146. 10. Wang, Renqiang, Yuelin Zhao, and Keyin Miao. 2016. Application of neural network minimum parameter learning algorithm in ship’s heading tracking control. International Symposium on computational Intelligence and Design 8: 135–139.
Application and Strategy of Internet of Things (IOT) in College Education Informationization Chaohu He and Changcheng Xin
Abstract The Internet of Things (IOT) plays an active role in the development of society as a brand new strategic industry, and the technology of IOT has a profound impact on the modern education system. This paper introduces the basic concepts of university information construction and IOT technology firstly, analyses the application mode of university education information construction under the background of IOT, probes into reasonable strategies and schemes to apply IOT to university education information finally, which is conducive to promoting the development process of IOT and IOT in University campuses, with a view to providing reference for relevant personnel. Keywords Internet of Things(IOT) · College education · Informatization
1 Introduction The application of Internet in various fields has become a modern demand. How to improve the current situation of higher education in China by virtue of the role of the Internet has become a research topic [1]. With the application and development of intelligent technology, IOT has become the hot words in recent years [2]. The IOT will change all activities and objects. Besides the fields of commerce, transportation, energy, medicine and agriculture, the IOT is also of huge significance in the field of education [3]. The IOT describes a new environment in which public objects can be uniquely identified and accessed through the Internet. Many traditional universities and colleges have found the benefits of deploying IOT technology on their campuses [4]. With the development of IOT, the concept of intelligent university has become a
C. He Yunnan Technology and Business University, Kunming 651701, Yunnan, China Cavite State University, Indang 4122, Cavite, Philippines C. Xin (B) Jose Rizal University, Manila 1552, Philippines e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_127
1089
1090
C. He and C. Xin
hot topic [5]. The development of big data algorithms using the next generation Internet, the so-called “IOT”, has led to a comprehensive personalized learning method for different target groups [6]. With the development of mobile Internet technology and the popularity of smart mobile terminals, the data traffic load of mobile client users on smart campus network platform has increased sharply. [7]. IOT describes a new environment in which public objects can be uniquely identified and accessed through the Internet. Informatization involves intensive use of information in various fields of society, and has great social and economic impact [8]. The construction of university informationization also develops from digital campus to intelligent campus. Intelligent campus involves new technologies such as big data, cloud computing, IOT, mobile internet, etc., including large data sharing and exchange platform, unified identity management and authentication, one-stop personalized integrated management service system, mobile intelligent campus, security design, etc. [9]. Standardizing and optimizing the teaching process is an important means to ensure the quality of teaching. Some research scholars have developed a teaching management system in universities and colleges by using IOT technology. Through data acquisition equipment, a large number of data generated in the teaching process are managed, such as attendance rate, classroom performance, homework, examination results etc., which improves the credibility and controllability of the data [10]. It is the trend of university information management to make use of the IOT to comprehensively manage all kinds of teaching resources and activities in order to make the campus network intellectualized on the IOT platform. However, there is no ready-made mode and path to follow in University informatization. Therefore, it is necessary to establish a set of application mode of university informatization based on IOT technology.
2 Research on University Education Informatization and IOT Technology 2.1 The Concept of Informatization of Higher Education With the continuous development of the information and network technology, they are applied in the development of the various walks of life in the society. The development and construction of universities and colleges are also speeding up the development of information technique because of the close integration of information technology. After China put forward the great strategy of using informationization to drive the four modernizations, the Ministry of Education also put forward the grand goal strategy of “innovating education to promote education modernization and realize leap-forward development of education”. The informatization of college education is an inevitable combination of the continuous application of information technology and the development of universities and colleges. It is also the problem of solving
Application and Strategy of Internet of Things …
1091
problems in the development of universities and colleges through informationization. This is an important strategy for national informationization and a requirement for education modernization. The informatization of college education has transformed colleges from a traditional education model into a diversified education model. It is an indispensable element for colleges to improve the quality of education and cultivate modern composite talents. In the same way, the informationization of college education can make the development of universities and colleges become rational and scientific, thus improving the management and office efficiency of universities and colleges. Informatization of universities and colleges is an indispensable factor to enhance the core competitiveness and international influence of universities and colleges.
2.2 IOT Technology The IOT is a network based on the Internet but different from the Internet. It combines sensing technology, information technology, and intelligent processing. It collects corresponding information through “sensors” according to the different needs of different users. The collected mass information is analyzed and processed by various modern information technologies such as pattern recognition and cloud computing, and the processing results are returned to the user, thereby realizing real-time control and supervision. The essence of information exchange between objects and objects in the IOT is to use technology to realize automatic identification and information exchange of objects through network information transmission. Due to the connection with the Internet, the information transmission of the IOT must comply with the Internet protocol. The IOT realizes the digitalization of the real world, narrows the scattered information, enhances the connection between people and people, people and people, things and things, improves the utilization rate of resources, and makes life more convenient. The application of the IOT in the field of education can effectively connect people and people, and realize the intelligent and visual management of students, and promote the development and upgrading of smart campuses.
3 The Application Status of IOT in the Informationization of University Education The IOT is an important part of a new generation of information technology. The research and application of IOT in China’s universities and colleges has achieved initial success, from the opening of IOT related courses, the establishment of the IOT laboratory, to the construction of the IOT intelligent library, to the effective management of students through the IOT. and finally the use of things to build a safe campus. The application of IOT technology in universities and colleges has changed
1092
C. He and C. Xin
the way students go to class. The application of IOT technology has gradually begun in universities and colleges.
3.1 University Teaching Informationization Based on IOT Technology The core of information construction in universities and colleges is the construction of educational informationization. The use of the IOT can connect all kinds of equipment, classrooms, resources and other objects on the campus to the network, making the teaching resources digital and intelligent, forming a comprehensive, full-featured, a full-course teaching environment. The most important influence of IOT technology in universities and colleges is to change the teaching work of teachers. The previous teaching relies on the teacher to impart knowledge. After the emergence of IOT technology, it can be taught through micro-courses and other methods. The teachers can make the students and teachers communicate with each other in the teaching process by using the advanced IoT teaching tools, which make the students accept the knowledge imparted by the teachers much better. It also helps the teachers for understanding the students’ learning situation and adjust the teaching based on the student interaction feedback system in time. Through the IOT, experimental equipment, machines, experimental tools, etc. can be virtualized to the server. Students can set up an experimental environment remotely on the platform, and simulate the experimental results. The data or results generated during the experiment are collected in real time, and the results are provided to the network, the experimenter or the teacher.
3.2 Intelligent Library Based on IOT Technology With the continuous expansion of the scale of universities and colleges, the collection of books in the library has increased many years. The traditional book barcodes make the collection, sorting and searching of books become quite cumbersome and waste a lot of time. IOT is another core technology, radio frequency automatic identification technology, has become more and more popular in college intelligent library applications. Some universities and colleges have used the IOT technology to build college intelligent libraries. Nowadays, some universities and colleges use the IOT technology to build an intelligent management system for college libraries. Through the application of IOT technology, a label is placed on each book in the library, and the library staff only needs to bookmark the book information into the library intelligent management system, and then paste it on the back of the book according to the type of the book. The electronic tags placed in the books, so that the library staff can easily complete the book induction and future finishing work. Similarly, the
Application and Strategy of Internet of Things …
1093
faculty and students of universities and colleges can quickly find the location of the book through the retrieval function of the library intelligent management system, and then complete the borrowing and returning operation through the self-service system of the library intelligent management system. All the books borrowed through the self-service system. Can successfully pass the library’s secure access control system to complete the self-service lending and return function.
3.3 Information Management Based on IOT Technology The main objects and contents of teaching in universities and colleges are the attendance management of all students and the teachers, the management of various books and teaching materials, and the curriculum arrangement of various subjects. The application of the IOT technology can establish a complete automated attendance system by using credit card or face recognition technology, which improves the attendance efficiency to a certain extent. In the process of managing student attendance, each student’s specific attendance can be transmitted to the database. In the management of various books and textbooks, the use of electronic tags to record or query related information makes the entire management process very convenient. IoT technology can also be applied in laboratory management to provide effective data support for those who use experimental equipment. Fundamentally, the management of laboratories tends to be more standardized, informationized, and networked. It can improve the management efficiency and quality of laboratory equipment effectively.
4 Application Strategy of University Informationization Based on IOT Technology The current application of IOT technology in the construction of information technology in universities and colleges is still in its infancy. The application of IoT technology requires the support of modern information technology, Internet and cloud computing, but the integration and application between these three are very few. The survey is conducted by investigating the situation of teachers and students to understand cloud computing or the IOT. The results of the analysis are shown in Fig. 1. This fully demonstrates that the importance of informationization and information construction in universities and colleges is not enough. In the daily construction process of universities and colleges, the IOT should pay attention to the strategies of campus infrastructure construction, teaching application system construction, information education, management system construction and security.
1094
C. He and C. Xin
Fig. 1 Analysis of college teachers and students ‘understanding of the new generation of information technology
4.1 Build an Information Environment for Universities and Colleges Based on IOT Technology Vigorously The information construction of college education is a complicated and huge system engineering. Detailed planning, careful arrangement, and reasonable distribution are all indispensable conditions for ensuring the sustainable and healthy development of university information. In the process of building an information environment in universities and colleges, we should ensure the balance of hardware facilities and software facilities. The main implementation measures are as follows: (1) The construction of university hardware facilities is the infrastructure construction of the university’s information environment construction, and the hardware facilities are built for the software environment. (2) Software facility construction is a software infrastructure environment for colleges to realize education informationization and scientific research informationization. The software environment requires hardware support. (3) Strengthen the construction of wireless networks based on IOT technology, break through the restrictions of wired network nodes and the number of Internet users on a node, and enhance the convenience and flexibility of university networks. It provides an excellent network environment for students and teachers to acquire network teaching resources in a timely and flexible manner and realize the application of new generation information technology in universities and colleges. Universities and colleges must use software and hardware facilities to effectively integrate the received information, as shown in Fig. 2. Realizing the good communication between students and teachers, between devices and devices to support specific applications and ultimately make the information management of the entire university more intelligent.
Application and Strategy of Internet of Things …
1095
Fig. 2 Logical structure of campus network security protection system
4.2 Vigorously Strengthen the Construction of Educational Information Based on IOT Technology Universities and colleges should strengthen teachers’ basic information technology, multimedia software technology, and network application skills, and enhance information technology capabilities and information technology literacy. (1) Teachers can use multimedia technology to produce multimedia teaching courseware, video (audio) frequency teaching, etc., so as to improve students’ initiative in learning. University teachers can also establish teachers’ personal platform and teaching resource sharing platform through simple network technology application. Share teaching information resources for students. (2) Students can answer questions by mobile phone or computer. At the same time, they can perform the scoring of the teacher’s teaching. (3) You can use the electronic platform, electronic whiteboard, computer, etc. to master the student’s learning situation and adjust the teaching in time; (4) Using the terminal in the IOT technology to send the knowledge points set in advance to the student’s computer, the computer can randomly select the questions from the database, and judge the students by how long the students use and the error rate. Degree of acceptance;
1096
C. He and C. Xin
(5) Using the IOT technology can simulate virtual situations, making students feel immersive and easy to accept knowledge.
4.3 Strengthen Personalized Services Based on IOT Technology Vigorously Universities can use the IOT technology to provide teachers and students with a variety of personalized and personalized services, and to meet individual needs, covering learning and life and other aspects. (1) Collect various learning indicators through IOT technology and give some reasonable suggestions to improve the quality of students’ learning and life. (2) We can understand the learning situation of teachers and students and carry out corresponding evaluation and summarization in the process of analyzing big data, and also give certain feedback through corresponding measures. (3) IOT technology can also provide a variety of support resources sharing and collaborative learning, so that students can conduct long-distance experiments and achieve cross-regional and cross-school collaboration, so that students can choose their favorite according to their own interests. Activities to meet their individual needs. Under this kind of learning environment based on IOT technology, students can gradually acquire some new knowledge and skills in the process of interaction and practice.
5 Conclusion The IOT can be continuously developed and improved on the basis of the Internet and computers, and it has a huge room for growth in the future. The application of the IOT in the field of education has also promoted the development and upgrading of smart campuses, which can effectively connect people and people, and realize intelligent and visual management of students. It can provide teachers and students with a comprehensive and systematic intelligent awareness environment, and also enhance interaction and communication between teachers and students.
Application and Strategy of Internet of Things …
1097
References 1. Zhang, Bing, and Pan Peng. 2017. Research on the development of education resources for the internet plus universities in the national health field. Eurasia Journal of Mathematics Science and Technology Education 13 (8): 5085–5093. 2. Quan, Yuan, and Cao Lei. 2019. Use of the internet technology in the intelligent library services of universities and colleges in the big data era. In International Conference on Application of Intelligent Systems in Multi-modal Information Analytics, 118–123. Springer, Cham. 3. Ca¸ta˘ , M. 2015. Smart university, a new concept in the Internet of Things. In Roedunet International Conference-networking in Education & Research. 4. Campbell, Wendy. 2018. The impact of the Internet of Things (IoT) on the IT security infrastructure of traditional universities and colleges in the state of Utah. In The Internet of People, Things and Services, 132–153. Routledge. 5. Jinglu, Z., and W. Yanxia. 2016. An intelligent college network design based on cloud IOT technology. In International Conference on Intelligent Transportation. IEEE Computer Society. 6. Lenz, L., A. Pomp, T. Meisen, and S. Jeschke. 2016. How will the Internet of Things and big data analytics impact the education of learning-disabled students? A Concept Paper. In MEC International Conference on Big Data & Smart City. IEEE. 7. Xu, X., D. Li, M. Sun, S. Yang, S.J. Yu, and G. Manogaran, et al. 2019. Research on key technologies of smart campus teaching platform based on 5G network, 1–1. IEEE Access. 8. Jianguang, Z., and Z. Jianming 2016. A comparative study of China and the world’s informatization development. In International Conference on Information Society. IEEE. 9. Cao, Jianmei, Zhuoyue Li, Qiang Luo, Qingshui Hao, and Tongjun Jiang. 2018. Research on the construction of smart university campus based on big data and cloud computing. In 2018 International Conference on Engineering Simulation and Intelligent Control (ESAIC), 351–353. IEEE. 10. Wang, J. 2015. The design of teaching management system in universities based on biometrics identification and the Internet of Things technology. In International Conference on Computer Science & Education. IEEE.
Influence of Inductance Parameters on Intelligent Control of Buck Converter Yutong Li, Nuo Zhou and Hongmei Xu
Abstract Voltage-controlled step-down converter is the core unit of the control system, which is composed of capacitors, inductors and other components, showing non-linear characteristics. With the rapid development of artificial intelligence, the requirement for the performance of the converter becomes higher and higher. The bifurcation characteristics and chaotic behavior of the system are verified by building Simulink model. The output characteristics of the system with inductance as a parameter are revealed. The change of the intersection point between the reference voltage waveform and the output voltage waveform is analyzed in the time domain. The evolution process of the system from steady state to periodic state to chaotic state is observed in the phase diagram, which verifies the rationality and feasibility of the research method in this paper, and provides theoretical basis and reference value for the research methods and control strategies of other types of switching converters. Keywords Artificial intelligence · Buck converter · Simulink · Inductance · Chaos
1 Introduction Switching converters have been widely used in various industries. With the rapid development of artificial intelligence, higher requirements are placed on the efficiency, accuracy, stability and applicability of the switching converter [1, 2]. Many control schemes have been proposed at home and abroad. Traditional PID is widely used in most industrial fields owing to their simple operation, good control robustness and high reliability [3]. However, they face many shortcomings in the field of complex control [4]. The selection of its control parameters requires a complicated calculation process, resulting in a long adjustment period and high requirements for the operator’s tuning skills and experience, especially in the high-precision control field of scientific frontiers [5, 6]. In this paper, the voltage-controlled Buck converter is used. For example, the Simulink simulation model is constructed, and the operating characteristics of the Y. Li · N. Zhou · H. Xu (B) Institute of Engineering, Yanbian University, Yanji, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_128
1099
1100
Y. Li et al.
inductor as a parameter are obtained through the two angles of the time domain waveform diagram and the phase diagram. The analysis method is quick and straightforward, and the simulation results are intuitive [7]. It is in accord with previous theoretical analysis and research results [8]. It can be used in the selection of other types of DC-DC converter parameters and the control strategy research [9, 10].
2 The Basic Principle of Buck Converter The schematic diagram of the Buck converter is shown in Fig. 1. The circuit consists of a power supply Vin, a switching transistor S, a filter capacitor C, a storage inductor L, a diode VD , and a load resistor R. The function of stepping down the input voltage Vin to the output voltage U is completed. Analysis of the working process of a Buck converter: When the parameters of input voltage and load resistance change in a wide range, the voltage-controlled Buck converter can work in both CCM mode and DCM mode. Therefore, the Buck converter can have two different switching states and two different circuit topologies in one switching cycle. As showed in Figs. 2 and 3, the switching rules and the changes of inductance current and output voltage are as follows. Fig. 1 Buck converter schematic
L
S
Vf Rx
Vin
C
VD
R Ry
Vco
+ -
driver
+ -
Vref
Vramp
L
Fig. 2 Switch S on, D off
+ Vin
C
R
Vo -
Influence of Inductance Parameters on Intelligent … Fig. 3 Switch S off, D on
iin=0
1101
S
L +
Vin
C
R
Vo -
(1) Switch state 1: Switch S is turned on, and diode VD is turned off. The inductor current increases linearly, the capacitor C phase load R discharges, and the output voltage Vo are positive and negative, as showed in Fig. 2. (2) Switch state 2: Switch S is disabled, and diode VD is turned on. The inductor current resonates, and the capacitor is in the discharge state, which is useful for maintaining I(o)and V(o), and the output voltage is lower than the power supply voltage, as showed in Fig. 3. According to the schematic diagram Fig. 1, the working process can be obtained: the output voltage is obtained by comparing the sampled value Vf(t) acquired by the sampling resistor with the reference voltage Vref to get Vco(t), Vco(t) and the ramp signal Vramp(t), and then the driver is driven. A series of pulses with different duty cycles are output to control the on and off of the S to achieve a stable output voltage. When Vco(t) is greater than the ramp voltage Vramp(t),the switch S is turned off, and the freewheeling diode VD is turned on; When Vco(t) is less than ramp voltage Vramp(t), the switch S turns on. The flow diode VD is turned off.
3 Simulation Model of the Buck Converter In this paper, the difference between Vco(t) and Vramp(t) is selected Control signal as S-switch and the difference is connected to its control end, which is connected to this part when Vbe is turned on and not when turned off. When Vco(t)-Vramp(t) > 0, access Vin (S), and when Vco(t)-Vramp(t) < 0, zero constant access, that is, no access to Vin (S).In this paper, the circuit parameters are selected as follows: Vin (S) = 22 V, Vo(s) = 12 V, L = 20 mH, C = 47 µF, R = 22 , f = 2.5 kHz. In this paper, the ode45 algorithm is selected to model the modules according to their characteristics and functions. The simulation time is set to 0.04 s, the module is assigned and the related functions are compiled. Figure Buck converter model diagram is shown in Fig. 4.
1102
Y. Li et al.
Fig. 4 Simulation model of voltage-controlled Buck converter
4 Analysis of Simulation Results Due to the inherent complexity of the nonlinearity of the circuit, numerical methods are used to obtain quantitative results and the results are displayed in the phase diagram and time domain map. Figures 5 and 6 display phase diagrams of oneperiod, two-period and chaotic states with inductance as parameter variables. It can Fig. 5 Steady-state phase diagram
0.62 0.6 0.58
I/A
0.56 0.54 0.52 0.5 0.48 11.88 11.9 11.92 11.94 11.96 11.98
U/V
12
12.02 12.04 12.06
Influence of Inductance Parameters on Intelligent … Fig. 6 Vramp(t) and Vco(t) waveform
1103
10 9
Vramp
8
Vco
Vramp&Vc o
7 6 5 4 3 2 1 0 0.035 0.0355 0.036 0.0365 0.037 0.0375 0.038 0.0385 0.039 0.0395 0.04
t/s
be observed as the inductance decrease. The process of working with the state transition from the stable state to period doubling state to a chaotic state. Similarly, the corresponding process, serving state transformation can be observed in the time domain diagram. When the inductance is 20 mH, the phase diagram is a closed ring. The time domain diagram can be utilized to see Vco(t) and the reference voltage Vramp(t) uniform intersection during the switching period, i.e. the circuit is in steady state. With the decrease of the inductance value of the parameter variable, the circuit gradually changes from steady state to periodic state. When the inductance is 16 mH, the phase diagram is no longer a closed ring, but an obvious inner loop appears. The intersection points of Vco(t) and reference voltage waveform in the time domain waveform are no longer fixed. It can be seen from Figs. 7 and 8 that the fluctuation range of Vco(t) increases obviously at this time, resulting in a small decrease in Fig. 7 Two cycles phase diagram
0.8 0.75 0.7 0.65
I/A
0.6 0.55 0.5 0.45 0.4 0.35 11.4
11.6
11.8
12.2
12
U/V
12.4
12.6
12.8
1104 Fig. 8 Vramp(t) and Vco(t) waveform
Y. Li et al. 10
Vramp
9
Vco
8
Vr amp&Vc o
7 6 5 4 3 2 1 0 0.035 0.0355 0.036 0.0365 0.037 0.0375 0.038 0.0385 0.039 0.0395 0.04
t/s
Vco(t). Amplitude oscillation and the reference voltage intersect twice, that is, the circuit is in a two-cycle working state. With the further reduction of inductance, the circuit gradually enters a disordered state, which is in line with the transformation process presented in the bifurcation diagram. When the inductance decreases to 10 mH, it can be observed in Figs. 9 and 10 that the phase diagram presents a chaotic state as a whole. The internal curve of the phase diagram has many cycles and is close but not coincident. The results are consistent with the changes of Vco(t) waveforms in the time domain diagram, and Vco(t) and sawtooth waveforms are more in some reference voltage cycles. Secondary intersection, but only one intersection point in other cycles. At this time, the turn-on and cut-off of the circuit enter a random state, that is, the circuit works in a disordered state. Fig. 9 Chaotic state phase diagram
1 0.9 0.8
I/A
0.7 0.6 0.5 0.4 0.3 0.2 11.2
11.4
11.6
11.8
12
12.2
U/V
12.4
12.6
12.8
13
13.2
Influence of Inductance Parameters on Intelligent … Fig. 10 Vramp(t) and Vco(t) waveform
1105
12
Vramp
Vco
10
Vramp&Vco
8 6 4 2 0 -2 0.035 0.0355 0.036 0.0365 0.037 0.0375 0.038 0.0385 0.039 0.0395 0.04
t/s
5 Conclusion The simulation model of the voltage-controlled Buck converter is built with Simulink as the background. Through this model, comparison of sawtooth signal Vramp and Vco waveforms in oscilloscope can be observed intuitively, and modify the position of the intersection of the two waveforms to the switch. Through the influence of the change of the intersection position of two waveforms on the cut-off of the switch tube, the transformation of the working state is analyzed. According to chaos theory, the switching converter circuit is studied. The Buck converter model is built with Simulink as the background. The phase diagram of the inductance as the bifurcation parameter can be achieved. Thus, the changing process of the Buck converter from one-period to multiple periods of chaos is analyzed in detail. The modelling method lays a foundation for parameter tuning, chaos analysis and control of the converter, and also provides a theoretical basis for eliminating chaotic phenomena in the work of the converter.
References 1. He, L., Z. Zheng, and D. Guo. 2018. High step-up DC-DC converter with active soft-switching and voltage-clamping for renewable energy systems. IEEE Transactions on Power Electronics 33 (11): 1–1. 2. Kajiwara, K., H. Maruta, Y. Shibata, et al. 2018. Stability characteristics of digital peak current control DC-DC converter under input voltage fluctuation. IEEE International Conference on Renewable Energy Research & Applications. IEEE 46 (2): 149–161. 3. Mahanta, Chitralekha Nizami, and Tousif Khan. 2016. An intelligent adaptive control of DCDC buck converters. Journal of the Franklin Institute 353 (12): 2588–2613. 4. Yu, Lei, Jae Gyoung Lim, and Shumin Fei. 2017. An improved single neuron self-adaptive PID control scheme of superheated steam temperature control system. International Journal
1106
Y. Li et al.
of System Control and Information Processing 2 (1): 1–13. 5. Liu, H., Y.Z. Li, Y.X. Zhang, Y.F. Chen, Z.H. Song, Z.Y. Wang, S.X. Zhang, and J.Q. Qian. 2018. Intelligent Tuning Method of PID Parameters Based on Iterative Learning Control for Atomic Force Microscopy 10 (4): 26–36. 6. Wang, Q., K. Liu, and J. Feng. 2018. Scheme based on buck-converter with three-phase Hbridge combinations for high-speed BLDC motors in aerospace applications. IET Electric Power Applications. 12 (3): 405–414. 7. Ookar Abubakkar, Sheik Fareed, Nor Farahidah Zabah, Yusof Abdullah, Dhiyauddin Ahmad Fauzi, Norasmahan Muridan, and Nurul Fadzlin Hasbullah. 2017. Effects of electron radiation on commercial power MOSFET with buck converter application. International Islamic University Malaysia 28 (2): 27–31. 8. Bendaoud, Kaoutar, Salah-ddine Krit, Jalal Laassiri, and Lahoucine El Maimouni. 2017. Modelling and simulation DC-DC power converter buck for mobile applications using MATLAB/Simulink. International Journal of Intelligent Enterprise 4 (1–2): 76–87. 9. Abdissa, Chala Merga, and Kil To Chong. 2017. Stabilization and voltage regulation of the Buck DC-DC converter using model predictive of laguerre functions. Studies in Informatics and Control 26 (3): 315–324. 10. Cen, Zhaohui, and Paul, Stewart. 2017. Condition parameter estimation for photovoltaic buck converters based on adaptive model observers. IEEE Transactions on Reliability 66 (1): 148– 160.
Research and Development of Remote Monitoring System for High-Speed Rail Protective Fence Gate Li Qiao, Yu Fan and Bingbing Wu
Abstract This article discusses the necessity of developing High-speed Rail protective fence gate remote monitoring system, explains the working process of the system and working principle, and introduces the design scheme of the system. The actual proof that the system is practical, reliable, and can effectively reduce or avoid the traffic safety hidden trouble caused due to personnel illegal entry into the protective net. Keyword High-speed rail protective fence gate · GSM communication · SIM900A
1 Introduction Railway protection net is an important driving equipment, and also is an important barrier to ensure the safety of railway transportation [1]. The Work department regulates that except high-speed rail construction and maintenance workers, others are strictly prohibited from entering the protective net, and any operator of high-speed rail construction, maintenance and on-site inspection is strictly prohibited from entering the net outside the sunroof time. At present, China Railway Shenyang Bureau Group Co., Ltd. has more than 400 high-speed rail fences in the Harbin-Dalian line. They are managed by the high-speed rail engineering department. Most of the fence gates are located along the line section, which is relatively remote, and the number of entrances and exits is usually small. Some fence gates will be entered once every six months or even longer, and it is difficult to obtain effective protection for daily safety L. Qiao · B. Wu Liaoning Equipment Manufacturing and Professional Technology Institute, Shenyang Liaoning 110161, China e-mail: [email protected] B. Wu e-mail: [email protected] Y. Fan (B) Shenyang Railway Bureau, Science and Technology Research Institute, Shenyang Liaoning 110013, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_129
1107
1108
L. Qiao et al.
management, which leaving a safety hazard for the normal operation of high-speed rail. Therefore, timely and accurate understanding of the opening and closing state of the fence gate of the protective net is an effective means to reduce or even avoid the hidden dangers caused by the violation of regulations into the protective net. By analyzing the current status of high-speed rail fence gate supervision, it is necessary to develop a new type of remote monitoring system with simple structure, perfect function, low equipment and construction cost, adapting to various types of fence gates. And also is necessary to further strengthen the monitoring and management of high-speed rail fence gates.
2 System Design 2.1 Design Plan By analyzing the status quo of domestic high-speed rail protection fence control technology, summarizing the advantages and disadvantages of various schemes, field tripping, understanding the process of entering and leaving the fence, then combined the existing feasible technical means to determine the design scheme as follows: (1) The system consists of gate status monitoring device, transmitting module, receiving module, power supply module, server and monitoring management software. The system uses electromagnetic, stroke and other technical means to monitor the status of different types of fence gate switches. (2) The system uses GSM short message mode for remote communication, and selects low-power processor combined with SIM900A communication module to build hardware platform. (3) The system uses low-temperature lithium batteries or solar cells for the power supply. (4) In addition to the basic monitoring functions, the PC software is also designed with the information of the gate entry and query function. It can automatically enter the skylight time, work location, job content and other information of the day when entering and exiting the fence gate according to the daily work schedule of the shop, and can be used for inquiring history record. Figure 1 is a working principle diagram of the remote monitoring system for High-speed Rail protective fence gate. As shown in Fig. 1, when the fence gate is closed, the transmitting module is in a low-power sleep state, the operating current is very low, and only the minimum system function is maintained. When the fence gate is opened, the trigger gate state monitoring device installed on the fence gate operates, and transmits the gate opening signal to the transmitting module. The transmitting module activates from the sleep state immediately after receiving the gate open signal, and transmits a gate open warning message GSM short message. After receiving the short message, the remote
Research and Development of Remote Monitoring …
1109
Fig. 1 Schematic diagram of system operation
receiving module analyzes and judges the content, and then starts to flash the warning light corresponding to the fence gate in the server monitoring interface, and performs voice prompting. Similarly, after the fence gate is closed again, the transmitting module will transmit a gate closing GSM message, and then re-enter the sleep state, and the warning light in the monitoring interface will stop flashing after the receiving module receives it. The system supports network functions, so other computers can access through the Internet (office network), and the server sets corresponding access rights for different users.
2.2 Research and Design of Gate Condition Monitoring Device According to the site environment, the high-speed rail fence gates can be roughly divided into the following three types. Each fence gate is designed with corresponding monitoring means. (1) Folio fence gate This gate has a simple structure. The gate shafts on both sides can be rotated by 180 degrees, and can be double-opened in two directions. The gate itself does not
1110
L. Qiao et al.
Fig. 2 The magnetic barrier mode test of the folio fence gate
have a locking function, and is locked by an iron lock or an iron chain lock. This structure was first tested by magnetic induction in the Tieling West High-speed Railway comprehensive maintenance base. The permanent magnet is installed on the left side of the gate slit, and the right side is an integrated detection and emission device. The sensing element is a reed switch, which is fixed inside the integrated device and close to the side of the permanent magnet. It has been found through experiments that the folio fence gates have certain mobility in the closed state, and it is difficult to maintain a fixed opening gap between the gates. Moreover, due to human or natural factors, the gaps are usually large and sometimes exceed the magnetic induction range, and even cause the detection device failing to make a correct judgment. In order to increase the magnetic induction distance, the number of reed switches is increased from the original one to four, thereby the magnetic induction longitudinal distance is increased to 120 mm, and separating the detecting device from the transmitting device can reduce the volume of the device on the gate, as shown in Fig. 2. After testing, the actual effect is obviously improved, and the false alarm rate is reduced by 40%. However, since the longitudinal magnetic induction distance is only increased and the lateral magnetic induction distance is not changed, there is still a false alarm phenomenon. Finally, it is decided to abandon the open-type fence gate magnetic induction scheme and change to the stroke switch scheme, as shown in Fig. 3. In Fig. 3, the limit switch is a universal protection type automatic reset stroke switch. When the bending angle of the spring contact reaches the threshold value, the trigger node action is triggered. A sliding guide is installed on the left side of the gate slit, so that even if the gate gap is large, the spring contact can be normally stressed and is not affected by the inner opening or the outer opening. After testing, the limit switch mode is easy to install, highly reliable, and no false alarms are found. It is suitable as a check valve for the open gate state.
Research and Development of Remote Monitoring …
1111
Fig. 3 The limit switch mode test of folio fence gate
(2) Dark lock fence gate The dark-locked fence gate is more common, and the gate has its own hidden lock, so the airtightness when closing the gate is much better than the folio fence gate, and it will not shake. The same type of dark-locking gate located in Huanggutun Station was selected and tested by magnetic induction, as shown in Fig. 4. After testing, the magnetic induction scheme has a good detection effect and is suitable as a dark lock type gate state detecting device. (3) Push-pull fence gate The push-pull fence gate relies on the upper and lower gate frame slides to freely push and pull, and to realize the opening and closing of the gate, the gate itself has no locking device, and is locked by the iron chain. Since the push-pull fence gate has good sealing performance when the gate is closed, the design is tested by
Fig. 4 Dark lock type gate magnetic induction test
1112
L. Qiao et al.
magnetic induction. A magnetic induction device is mounted on the top of both sides of the gate, so that it can be detected regardless of which side gate is opened. After testing, the magnetic induction scheme has a good detection effect and is suitable as a push-pull gate state detecting device.
2.3 Design of Transmitting Module and Receiving Module Wireless remote transmission and reception data is the core technology of this system. In consideration of various factors such as communication distance, equipment cost, forming technology and number of fence gates, the GSM short message method is used to realize the remote transmission and reception of the gate state. GSM is a mobile communication technology standard originated in Europe and is the second generation mobile communication technology [2]. The GSM system includes several frequency bands such as GSM-900: 900 MHz, GSM-1800: 1800 MHz, and GSM-1900: 1900 MHz. This design selects the SIM900A module with mature technology and wide application [3]. This module is a 2-band GSM module designed for the Chinese market. Its working frequency range is EGSM 900 MHz and DCS 1800 MHz. It has the characteristics of small size, low power consumption, wide power supply range and flexible development [4]. The transmitting and receiving modules are designed to control the SIM900A module by the ultra-low-power MSP430 series MCU [5]. The hardware block diagram is shown in Fig. 5. The whole hardware circuit is mainly composed of MSP430 MCU, SIM900A module, communication module and SIM card interface [6]. The MCU is connected to the SIM900A through the serial port, communicates with the SIM900A through the AT command, and also includes a serial port connected to the PC for downloading and debugging the program [7]. The SIM card is connected to the SIM900 via a 6-pin card slot. The power supply system should provide both 3 V and 4 V voltages. 3 V is used to power the microcontroller, and 4 V is used to power the SIM900. The hardware design of the receiving module is consistent with the sending module, and communicates with the host computer through the serial port [8]. The workflow is entered into the AT command receiving state after initialization, and is read Fig. 5 Block diagram of the transmit/receive module hardware
Research and Development of Remote Monitoring …
1113
when the short message is received. Then the short message content is sent to the upper computer for judgment and storage.
3 Design of PC Software The upper computer software is compiled with Visual Basic and database. The main interface is shown in Fig. 6 [9]. The main interface is mainly composed of the Harbin line area map and the real-time status list of the fence gate. When the gate open/close message is received, the color of the section line of the fence gate changes (it is red when the door is opened, it is blue when the door is closed) and a voice prompt is displayed for the fence gate detailed mileage and opening/closing time in real-time status list. The software can perform real-time display of fence gate status data, historical data query, and information entry. Through the daily work schedule and work plan approval form daily issued [10], detailed information such as the gate position, the sunroof time, the job owner, and the work content can be automatically entered into the software, which reduces the workload of information entry. The software also supports the network function. Users can use the office network to log into the server, access the server according to their respective permissions, and obtain the required fence gate status information, which greatly expands the system function.
Fig. 6 The main interface of the host computer software
1114
L. Qiao et al.
4 Conclusion The actual application proves that the high-speed railway protection fence gate remote monitoring system has simple structure, convenient installation, economical and practical complete functions. It can accurately grasp the opening and closing state of the fence door of the protective net, which is an effective means to reduce or even avoid the hidden dangers caused by personnel entering the protective net in violation of regulations. It has a good prospect of popularization and application.
References 1. Yimin, Huang. 2015. Problems in the installation and construction of railway line protection fences and countermeasures. Railway Construction Technology (6), 76–79 (in Chinese). 2. Douding network: D-scdma_ skill [information][DB/OL]. https://www.docin.com/p1550544073.html (in Chinese). 3. Yan, Ciao, Tian Kai, and Wang Zhaoping. 2015. Design of home burglar alarm circuit based on GSM short message module. Experimental Science and Technology (3): 20–22 (in Chinese). 4. Xueyong, Chen. 1996. Electrical engineering electrical equipment manual 2 electrical secondary section. China Electric Power Press, BeiJing (in Chinese). 5. Shusong, Pang. 2015. Low power and easy to expand networked liquid level monitoring system. Ocean University of China, Qing Dao (in Chinese). 6. Yinsheng, Zhang, and Shan Huiling. 2009. Design of a wireless temperature alarm system. Journal of Wuhan University of Technology (Information and Management Engineering Edition) (2): 232–235 (in Chinese). 7. Huixia, Zhang. 2016. Railway inverted tree early warning system based on 3G network. Zhengzhou University, Zheng Zhou (in Chinese). 8. Kewu, Zhu. 2018. Experimental design of GPS/Beidou positioning system based on MC20 module. Modern computer (32): 83–86 (in Chinese). 9. Xiefeng, Cheng. 2013. Development and implementation of a multifunctional industrial production control system. The 24th Annual Meeting of the Society of Circuits and Systems of the Chinese Institute of Electronics (in Chinese). 10. Yangxu. 2011. Ship enterprise workshop operation planning method and system. Harbin: Harbin Institute of Technology (in Chinese).
Integration of Information Technology and Three-Dimensional Teaching Mode Yanmin Liang and Yao Wang
Abstract The application of information means is scarce in the traditional teaching mode, and its success that has exerted an influence in the traditional teaching mode mainly embodies in the change of the modern “teacher-student” teaching mode. There are many problems in the development of higher education mode at the present stage. The traditional teaching mode cannot be fully applied to the current social environment of colleges and universities because of its lagging ideas and unsatisfactory effects. This paper proceeds with the basic concept of information technology to combine with the problems existing in current three-dimensional teaching application in environmental design, and after the comprehensive analysis, strives to propose application methods of information means in the three-dimensional teaching in environmental design. Keywords Information technology · Three-dimensional · Integrated approach
1 Introduction In China, there are many colleges and universities, and they have been committing themselves to explore teaching models. And after the exploration in recent years, it has been discovered that information means can significantly enhance the quality of teaching and the degree of discipline construction. Western countries have applied information means to teaching in earlier years, and have made prominent effects. However, subject to present national conditions in China, the application of information means has confronted with a variety of problems, such as sluggish implementation, lagging methods, and surface engineering, etc. [1]. Therefore, it is important to take information means as a way to strengthen school-enterprise exchanges, promote the construction of talent training programs, enhance students’ experimental learning Y. Liang College of Art, Guilin University of Technology, Guangxi 541000, China Y. Wang (B) College of Art, Guilin University of Technology, Guangxi, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_130
1115
1116
Y. Liang and Y. Wang
effects, and finally achieve the effect of perfecting the three-dimensional teaching mode [2].
2 Overview of Information Technology Concepts In the 1950s, the world ushered in a wave of information technology, whose main carrier was computers and key manifestation was creation and intellectual development. The development and dissemination of digital information technology has promoted the development of social economy and culture, and the characteristics of information technology itself have been keeping in step with the development requirements of higher education today, namely sharing, opening and integrating. The application of information technology in college education will maximize the utilization rate of teaching resources of various professions, optimize the allocation of network resources and physical resources, and realize the horizontal and vertical sharing of resources. VR, AR, digital teaching resource library, student internship automatic supervision platform and other means in information technology help promote the level of teaching in colleges and universities, and further exploit the characteristics and advantages of various disciplines and majors.
3 Main Problems in the Three-Dimensional Teaching in Environmental Design 3.1 Teacher Construction Method in Traditional Model Falling Behind Social Development The construction of colleges and universities cannot be separated from the teaching ability of teachers. In the past, the “school-based training” model was generally adopted for the cultivation of teachers. However, this model is circumscribed because it usually adopts the limited resources of the school as a premise, and after such a model of limited resources and management, the gap of personal qualities among teachers is a point waiting to be filled. Teachers in environmental design major not only need to teach theoretical knowledge in the textbooks, but also have to carry out all-round and three-dimensional teaching, as design profession itself has a portrait of contemporaneity.
Integration of Information Technology …
1117
3.2 Insufficient Links Between Universities and Enterprises In the three-dimensional teaching process in environmental design, communication with enterprises is the top priority in practical teaching. But the teaching environment of colleges and universities is relatively closed so that students and teacher usually fail to keep close contact with enterprises in the front line of society. This has thus resulted in the inability of teachers to convey to students about the latest trends in this major and some emerging design strategies and design concepts. For students in this major, they should learn a lot about temporal knowledge of materials, construction technology, engineering technology, budget, bidding, etc. while the current teaching mode focuses more on repetitive learning and application of the basic knowledge of design theory [3].
3.3 Absence and Dismal Effect of Evaluation Mechanism in the Internship Process Apart from the completion of theoretical and practical credit hours, students in environmental design also need to accomplish the graduation internship, which is of vital importance for the enhancement of students’ ability and social fitness. In the process of propelling current three-dimensional teaching mode, the supervision and evaluation of the students’ internship are sometimes neglected, and few students will actively communicate with their instructors. Students are often unable to send feedback due to their floating internship locations, and their instructors thus cannot carry out real-time tracking to follow up the student’s internship status and ultimately fail to make valid appraisal and evaluation on the internship.
3.4 Insufficient Satisfaction for Students Under modern teaching system in colleges and universities, it is a key point in the three-dimensional teaching process and also a supplement to personnel cultivating program to introduce major-related resources of enterprises and institutions. The traditional teaching process has, to some extent, met the demand, since it has helped take students as the main body and consider what students need to learn, but such development still has certain limitations because it is not the three-dimensional teaching. For example, colleges and universities may introduce some enterprises, but the enterprise resources are just superficial with a small number of student participants, and this will finally cause a decline of interest among students. In the major of environmental design, it is essential to conduct practical project operation and study in design-related enterprises and institutions with specific performance of participating in the measurement, construction site and design process, etc [4]. However, due to the
1118
Y. Liang and Y. Wang
limited research area for interior design direction in environmental design major, it is impossible for students from the same class and even the same major to participate simultaneously, and for students in the landscape design direction, a major problem also lies in the journey cost since the research site is usually far from the campus.
3.5 Inadequate Cognition of Teachers Toward the Three-Dimensional Teaching Three-dimensional teaching is quite beneficial to the development of professional teaching, but college teachers have insufficient understanding of the modes and methods amid its popularization among colleges and universities in China. In environmental design, many teachers have raised the problem of application of three-dimensional teaching, and some teachers with more traditional teaching concepts find it difficult to accept the three-dimensional teaching mode.
3.6 Waste of Three-Dimensional Teaching Resources Colleges and universities have some teaching laboratories in various disciplines to assist the traditional classroom teaching methods to jointly promote the quality of teaching and the all-round development of students, and environmental design majors generally have some laboratories of virtual simulation and 3D model [5]. However, the research has indicated a low rate in terms of the actual usage. Some laboratories will be opened and used by students only when the courses require, and due to the large number of students and the concentration of time, it is sometimes difficult for the management laboratory staff to assist each student to complete the experimental process [6]. In summary, the environmental design major still has many problems in the threedimensional teaching process, and this has seriously retarded the development of professional teaching. Therefore, this paper will explain in the following paragraphs how to apply information means to solve or alleviate such problems.
Integration of Information Technology …
1119
4 The Application of Information Means in the Three-Dimensional Teaching Process in Environmental Design Major 4.1 Strengthening the Connection Among Colleges and Universities, as Well as Their Connection with Enterprises, to Exchange Resources and Information and Jointly Build a Teaching Resource Library The connection between colleges and enterprises and the exchange of resources and information can significantly help enrich educational resources in colleges and universities, and enable students and teachers to learn more about the latest design concepts and design methods. The teaching resource library is a type of “cloud resource library” being established by various colleges and universities, where students and teachers can type keywords to search related information in the form of texts, pictures and audio/video to conduct self-directed learning [7]. Currently, few resources can be available for environmental design majors in the teaching resource library and are limited to some networks and books, so it is necessary to carry out resources exchanges with other universities and enterprises. Meanwhile, it is also crucial to pay attention to the construction of universities and enterprises from different points of view in the process of construction, where colleges and universities should focus on design methods and theories and enterprises lay more emphasis on such aspects as construction technology, materials and cost. The construction of the teaching resource library can offer students the opportunity to learn independently, that is, students can find out what kind of knowledge they can learn by themselves, and teachers, after learning about the overall weak points of students by analyzing the data in background search, can conduct more specific lessons.
4.2 Enhancing Teaching Level by Information Means College teachers generally possess abundant teaching experience and solid foundations of basic theories, but they are also slow in grasping new teaching resources or methods for a lack of communication with the society and long-term teaching and research on campus. Therefore, the information technology is an effective method to fill the gap. For example, teachers can learn about latest information on environmental design direction and carry out targeted learning on specific courses through the network information platform built by colleges and universities, so as to better cultivate their students. The improvement of comprehensive quality level of teachers is in line with the requirements of social development and an important path to
1120
Y. Liang and Y. Wang
promote the improvement of colleges and universities and the level of education in China [8].
4.3 Improving the Internship Platform Mechanism and Supervision Measures As stated above, students in colleges and universities must complete the graduation internship in order to meet the graduation requirements. At present, it is difficult to accurately evaluate the level of graduation internship in the absence of effective management and supervision methods. Hence, in the current information age, the application of information technology can effectively solve these problems. Colleges and universities can establish an internship management platform, in which the instructor, the university, and the enterprise can jointly complete the internship management process. Students can make record of the internship process in the platform and describe problems encountered in all aspects such as study, work and life, and then the instructor can conduct remote answering and the enterprise can make its evaluation. And finally, the tutor and the enterprise can jointly present internship accreditation [9]. In the internship management platform, instructors and colleges can keep current on the latest developments and security of students.
4.4 Improving Requirements in Major Practice by Combining Virtual Technology with Teaching Laboratory AR and VR are emerging technologies by using virtual technologies to create virtual scenes. Users can enter the scene through the device to carry out the observation in 360°, just like in the real scene. This technology is amicably suitable for students from environmental design, for it enables students to use virtual technology to supplement their problems of learning without practicing, and to make up for the absence of practice teaching venues for colleges and universities. Teachers can emulate teaching cases and the actual cases of some enterprises through the virtual aided design software (MakeVR and Medium), so that students can engage themselves on learning in a more realistic scene [10].
Integration of Information Technology …
1121
5 Summary The application of information means to the three-dimensional teaching in environmental design majors can transform the traditional teaching mode, enhance allround development and learning efficiency of students, break through the limitations of teaching venues, contents and methods, and ultimately further promote the development of education in colleges and universities. Acknowledgements This article is a phased research achievement of Research and Practice on the Three-Dimensional Teaching Mode of Environmental Design Major in the Context of “Internet +” (project number: 2018JGB200) in the education reform project of Education Department of Guangxi, and Research and Practice on the “Dual System” Collaborative Education Mode of Environmental Design Major under the Background of New Engineering (project number: 2019B33) in the teaching reform project of Guilin University of Technology.
References 1. Jin, Xi. 2018. Application research of information technology in college student affairs management. Journal of Wuhan Institute of Shipbuilding Technology 04: 9–11 (in Chinese). 2. Huannian, Meng. 2019. Research on the construction of application-driven digital teaching resource base in colleges and universities. University Education 06: 188–190 (in Chinese). 3. Lipeng, Wang. 2019. Study on modern apprenticeship teaching environment for interior design specialty. Ability and Wisdom 14: 79 (in Chinese). 4. Guanyu, Bian. 2018. Using information means to deepen the reform of modern apprenticeship system—taking environmental art design major as an example. Journal of Suzhou Art & Design Technology Institute 02: 33–36 (in Chinese). 5. Xiao, Ge. 2018. Design and implementation of measurement virtual laboratory based on unity3d. China CIO News 05: 31 (in Chinese). 6. Xu, Lan. 2019. Research on open teaching management in university laboratory. Modern Business Trade Industry 17: 187–188 (in Chinese). 7. Anxing, Wang, and Meng Qing. 2016. Research and practice of effective application of network teaching resource database. Logistics Technology 11: 170–172 (in Chinese). 8. Lili, Lian, and Li Dongpeng. 2017. Ways to improve the quality of professional teachers in colleges and universities in the new era. Journal of Jilin Institute of Chemical Technology Modern Decoration (Theory) 12: 46–48 (in Chinese). 9. Zhu, Li, and Chai Xiaoyan. 2016. Research on training mode of environmental design practice base. Modern Decoration (Theory) 04: 281 (in Chinese). 10. Zhu, Liu. 2016. Research on teaching reform and practice of design composition course based on the demand of vocational post group—taking environmental art design as an example. The Mass of Literature and Art 20: 238–239 (in Chinese).
Research and Practice of Laboratory Safety Management Mode Bo Hu and Baoxin Tai
Abstract In the process of laboratory management, many problems will inevitably be encountered. In view of the problems in the laboratories of contemporary colleges and universities, a “three-level interaction” management model with modern characteristics has been developed by combining with the requirements of modern education for laboratory management. In this management mode, the student-centered management and teaching work are carried out from the aspects of practical teaching ideas, design of experimental content, experimental teaching methods and experimental teaching management, we can find from the study of the results of practice that the management model can greatly improve students’ practical ability, innovation ability, cooperation ability and management ability. In addition, the laboratory equipment has been well maintained to a certain extent, ensuring the normal operation and application of the laboratory. Keywords Laboratory · Safety management mode · Research and practice Laboratory is an important basis and material condition for running a university nowadays. With the continuous improvement of education level, laboratory has become an important part of the modern education system. The application of laboratory in education can effectively help students develop their own thinking, improve their practical ability, and deepen students’ understanding of the knowledge learned in the classroom. For college students, the application of laboratory means that students have a platform to realize their own ideas and to develop their independent research ability to a great extent. With the continuous advancement of educational reform in colleges and universities, the development of laboratory management in colleges and universities is facing new challenges that the existing laboratory management system is not suitable for combining with specific practical teaching, which is not conducive to helping schools cultivate modern excellent practical talents with certain practical ability. In this paper, the research and practice of laboratory safety management model are discussed. B. Hu (B) · B. Tai Wuhan Donghu University, Wuhan 430212, Hubei, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_131
1123
1124
B. Hu and B. Tai
1 Problems in Laboratory Management For today’s laboratory management, there will be some differences with different management focus and management problems of management objects. For the laboratory management in the middle school education stage, it is mainly for the management of toxic and volatile drugs in the laboratory, and regular inspection is enough. As far as the current education model of our country is concerned, in the process of using the laboratory, the students in the middle school education stage or even in the primary school education stage mainly recognize the experimental instruments and complete the specific experimental process with the help of teachers. For university laboratories, students are the main applicants of laboratories, and teachers only point out students at some key points, or answer the problems that students encounter in the process of experiment. Therefore, in the process of laboratory management, a series of problems will inevitably arise. As far as the management of university laboratories in China is concerned, there are two main problems:
1.1 The Management Model Is Lagging Behind, and the Management System Is Flawed For laboratory applications in modern universities, the design of experimental courses is determined based on the student’s major and the specific amount of the course. The overall design of the laboratory is also set up according to the requirements of the school syllabus. But such a setting would have a serious waste of resources. There are great differences between different majors, but there is a certain similarity between majors. The similarity of this part motivates different professions to use the instruments in the same laboratory. However, in the process of actual construction, the faculties in the university are independent of each other, and there will be the same type of laboratory or experimental equipment for multiple purchases, resulting in waste of resources [1]. In addition, the laboratory management system has a strong correlation with its own operating mechanism. On the one hand, it emphasizes mutual connection; on the other hand, it emphasizes relative independence. Based on this level, the management of modern university laboratories mainly emphasizes the process of target management and quantitative management, and has low correlation with subject professions and curriculum construction. As a result, the main role of laboratories is only to certify some theories, instead of to promote students’ independent innovation ability. Moreover, in order to better manage the laboratory, the general laboratory management personnel and the specific teaching teachers belong to two departments, whose personnel cannot communicate with each other. Therefore, the specific operation effect and management efficiency of the laboratory are limited [2].
Research and Practice of Laboratory Safety …
1125
1.2 The Laboratory Has Certain Safety Hazards, and the Specific Health Conditions Are Poor Since the laboratory is mainly set up for experimental classes, the safety management of many university laboratories is carried out under the premise that students need to use the laboratory. All that can be done is prevention. When a real accident occurs, safety performance cannot be guaranteed. For example, for the laboratories of the School of Chemical Engineering, a variety of different fire-fighting devices are generally set up to ensure that appropriate ways can be selected to extinguish fires in a suitable manner in the face of fires caused by different reagents, greatly protecting the lives of students and teachers. However, the school’s training of students and teachers is only based on how to use fire-fighting equipment. There is no explanation for the specific fire-fighting methods and how to use the correct fire-fighting methods in time. This leads to a panic of students when real events occur. Teachers know the specific fire-fighting means, but they can not find the appropriate fire-fighting equipment [3]. In addition, in the past ten years, the number of enrolled students in colleges and universities in China has been increasing steadily, especially in recent years. The recruitment of students on such a large scale has led to the situation that the equipment originally established by the school is not enough. Besides, students’ self-management ability and self-discipline ability are poor. During the experiment, the experimental instruments and reagents are often placed at random, and cannot be correctly executed according to laboratory requirements. Furthermore, with the existence of certain loopholes in laboratory management and the limited number of specialized cleaning personnel in the laboratory, the laboratory environment in many universities is extremely dirty. Some of the sterile environments needed for experiments can not meet the experimental standards completely, and the final experimental results are affected [4].
2 Objectives of Laboratory Management In the process of laboratory management, efforts should be made to firmly grasp the principle that the work content is consistent with the disciplines and curriculum construction requirements. It is mainly to strengthen students’ self-motivation ability through the laboratory, and to cultivate students’ creative ability, cooperation ability and management ability, so that students can truly become users of the laboratory instead of a bystander. In order to better complete the management of the laboratory, the following objectives are proposed for the management of the laboratory [5].
1126
B. Hu and B. Tai
2.1 Standardization of Management System The management of any laboratory requires not only an appropriate and reasonable management objective, but also specific task content and requirements. Only in this way can the laboratory management work be completed effectively. The traditional laboratory management mainly explains the safety during the experiment and the matters needing attention. The overall content is too general. During the experiment, although the students must conduct safety education in advance, there will always be some students who just remember at that moment and follow their own feelings in the process of concrete experiment, which increases the safety hazards out of thin air. In order to better carry out laboratory management work, it is necessary to scientifically define each part of the laboratory in detail. For example, for the laboratory’s instructors, a series of criteria should be formulated for the use of teachers; a series of criteria should be formulated for the use of teachers for students and even for cleaning personnel. It should be posted be checked regularly. For students who have violated the rules during the experiment, the warning should be given at the first time, and students should be out of the laboratory directly if it happens at the second time and are not qualified for the experiment, and determine the unqualified in the corresponding score column [6].
2.2 Daily Safety Management The so-called safety management routine means that the laboratory should conduct safety emergency drills frequently during the use process. Exercises are conducted according to different accidents, and summaries are made after the drills. In particular, fire exits and emergency access roads should be careful not to pile up debris, and should be cleaned regularly. In addition, in the laboratory, relevant notices should be posted on how to deal with them in an emergency. Students are organized to conduct specific practical exercises to be accustomed to facing “disasters”. When the real situation occurs, students can calmly deal with them to better ensure their own lives.
2.3 Electronic Management of Laboratory Equipment No matter what kind of laboratory, there must be many different experimental instruments in the laboratory. These experimental instruments have different conditions of placement and use. In the process of use, there will be some damage due to frequent use and difficulty of use. In order to better complete the laboratory management, we should adopt modern management mode for the management of laboratory equipment. By combining modern computer network technology, the experimental equipment is numbered and registered, and maintenance and repair conditions are
Research and Practice of Laboratory Safety …
1127
regularly recorded in the corresponding documents. In this way, the problem of waste of resources can be avoided to a great extent, and more funds can be freed up to create a better environment for students. Moreover, this part of the extra funds can be used in the process of equipment replacement to ensure that students can still get the appropriate equipment for experiment after the instrument is damaged, and complete the specific experimental content. In addition, some students who have their own ideas can apply for funds from the school’s innovation committee, and engage in their own research and research to greatly enhance their innovative ability [7].
2.4 Networking of Experimental Teaching Content Management Modern society is a society of computer network technology. The highly developed computer network technology provides unlimited possibilities for people’s daily life. For laboratory management, especially for university laboratory management, the combination of computer network technology is not only a promotion of university laboratory management mode, but also the best way to save resources and time. First of all, in view of the experimental content in the experimental teaching, teachers can publish to students through the experimental website of the school, requiring students to do a good job of preview before the experimental process, to ensure that students can complete the experiment quickly and efficiently when they carry out the experiment. Secondly, for the rental work of the laboratory, both teachers and students can make an advance booking of the laboratory on the relevant laboratory website. Besides, when making an appointment, you need to specify in advance the days you need to use and the people in the lab. In this way, we can not only help the laboratory management work to be completed faster and better, but also mobilize students’ enthusiasm and cultivate their innovative thinking [8].
3 Conclusion The practice and research of laboratory safety management needs to start from the students and regard the students as the main body and service object of the laboratory [9]. In the specific use, students often read the safety norms proposed by the school. However, the safety awareness of students can be greatly enhanced through the use of laboratory rules at the laboratory wake-up points, and how to deal with dangerous situations, coupled with daily safety drills. In addition, the open use of the laboratory not only enhances students’ ability to innovate and cooperate, but also eliminates students’ strange feelings about the laboratory during the process of continuous use of the laboratory. At that time, students can handle it calmly, so that the safety
1128
B. Hu and B. Tai
management of the laboratory can be truly achieved, and students and teachers can safely escape from dangerous areas when an accident occurs [10].
References 1. Wei, Zheng. 2009. Construction of a “Firewall” for the safety management of university laboratories. Science and Education Literature Collection (first issue), (11). 2. Qingmin, Liao. 2010. Reflections on the safety management of university laboratories. Laboratory Research and Exploration (1). 3. Yongqi, Wen, and Qin Huajun, Ouyangjin. 2010. Construction of a people-oriented laboratory security system. China Modern Educational Equipment (3). 4. Lihua, Zhou. 2010. Research on the construction of safety culture in university laboratories. Science and Education Literature Collection (late issue) (2). 5. Guo, Zhang. 2010. Discussion on the safety management of university laboratories. China Modern Education Equipment (11). 6. Shuangshuang, Liu. 2010. Reflections on strengthening the safety construction of university laboratories. China Higher Medical Education (8). 7. Zhenqi, He. 2005. To strengthen safety awareness and do a good job in laboratory safety management. China Modern Education Equipment (9). 8. Xiuping, Liao, Chen Jixin, and Xu Yehe. 2010. Change the concept, develop and innovate, and actively promote the construction of laboratory safety management in universities. Laboratory Research and Exploration (8). 9. Buyang, Cai. 1995. Discussion on the standardized management of laboratory safety. Experimental Technology and Management (2). 10. Ping, Yang, Chen Yanling, and Huang Jianping. 2008. Establishing laboratory safety assurance system to ensure safe operation of laboratories. Experimental Technology and Management (9).
Dynamic Model Average for Stock Index Return Qingyu Meng
Abstract The classical AR, MA, ARIMA, ARCH and GARCH models only carry out modeling and prediction on a single time series variable, ignoring the influence of other exogenous variables. It usually results in a large deviation of the prediction results. In view of the above problem of the models, this paper considers the effect of exogenous variables on the basis of the autoregressive model to make the model more practical. For the model uncertainty, this paper introduces in detail an efficient dynamic model average based on DMA, which adds the grid search of parametric forgetting factor, so as to make eDMA prediction more accurate. In the empirical part, the influence of macroeconomic factors and economic policy factors on the stock market is comprehensively considered for modeling and use eDMA method for parameters estimation comparing it with the results of OLS and BMA. Model average method fitting results are better than the result of a single linear model, and the eDMA with out-of-sample prediction performance is better. Keywords Model uncertainty · Dynamic model average · Economic policy
1 Introduction The Shanghai (securities) composite index reflects the changes in the prices of the stocks listed in sample on the Shanghai stock exchange. Since then, many scholars have conducted theoretical research, empirical analysis and out-of-sample prediction on the Shanghai composite index. Until now, the index prediction is still a highly concerned issue among scholars, securities practitioners and investors. A large number of studies indicate that stock market returns are affected by economic factors. China’s stock market is highly sensitive to government policies. Since 2018, the Sino-US Trade Dispute caused a huge shock to stock market. It is obviously that national economic policies have a significant impact on the stock market. However, few scholars conduct quantitative analysis on the uncertainty of economic Q. Meng (B) Shanghai University, Jiading, Shanghai, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_132
1129
1130
Q. Meng
policies and use this factor as an predictor [1–3]. Therefore, it is necessary to study the impact of economic policy uncertainty on China’s stock market. There are two difficulties in forecasting work, the model uncertainty and the parameters uncertainty. BMA method can only reduce model uncertainty [4]. In recent years, the DMA provide a original idea [5, 6]. The strategy considers all of the models at every particular time, and according to the posterior probability weighted average all possible models. The eDMA used in this paper adds the grid search of parametric forgetting factor on the basis of DMA [7].
2 eDMA Framework The classical time series models only modeled the characteristics of a single factor without considering the influence of other exogenous variables, so two aspects of improvement were considered in the modeling: (1) Time-varying regression coefficients; (2) Enhance AR model with exogenous prediction variables. As a result, the following economic model is obtained: yt = θ1t + θ2t yt−1 + θ3t yt−2 + θ4t xt + · · · + θnt z t + εt , εt ∼ N (0, Vt ).
(1)
2.1 DMA Framework Firstly, Eq. 1 is rewritten as DLM (dynamic linear model). Make T , Ft = (1, yt−1 , yt−2 , xt , . . . , z t )n×1
Ft(i) indicates column vector of variables in the ith model at time t. The DLM is obtained [8]: T yt = Ft(i) θt(i) + εt(i) , εt(i) ∼ N 0, Vt(i) ,
(2)
(i) θt(i) = θt−1 + ηt(i) , ηt(i) ∼ N 0, Wt(i) ,
(3)
T (i) where, θt(i) = θ1t(i) , . . . , θ pt is the regression parameter of the ith model at time t; Vt(i) is the conditional variance of residual error εt(i) in equation observation Eq. 2; Wt(i) is the conditional variance of the residuals ηt(i) in state Eq. 3. In DMA, we need consider all possible combinations of models at each point in time and average the different combinations using a recursive update based on prediction probability. Prediction likelihood measures the prediction ability of the
Dynamic Model Average for Stock Index Return
1131
model. Models including important prediction indicators obtain high prediction likelihood value, which means that they obtain relatively high posterior weight in the average process. In order to solve the time-varying parameters, DMA gives a parameter forgetting factor, 0 < δ ≤ 1, for Wt(i) , so that it is not necessary to specify the value Wt(i) for all models at each moment, but the Kalman recursive equation completes the estimation. Assuming: Rt(i) , the prediction variance of θt(i) ; Ct(i) the estimator for the covariance (i) (i) + Wt(i) as Rt(i) = Ct−1 /δ matrix of θt(i) . Then, using δ, we can rewrite Rt(i) = Ct−1 (i) (i) (i) [9], and get Wt = (1 − δ)Ct−1 /δ. It is clear that δ and Wt are negative correlation, which means that the market is hit by a relatively larger impact in the case of an empirical analysis when δ is smaller. Given δ, the DMA probability of model Mi conditional on the current information at time t, Ft , is then defined as: p(Mi |Ft ) =
p(yt |Mi , Ft−1 ) p(Mi |Ft−1 ) , k p(yt |Ml , Ft−1 ) p(Ml |Ft−1 )
(4)
l=1
where p(yt |Mi , Ft−1 ) is the predictive likelihood of model Mi evaluated at yt , p(Mi |Ft−1 ) =
p(Mi |Ft−1 )α , k α p(Ml |Ft−1 )
(5)
l=1
where 0 < α ≤ 1 is the forgetting factor for the entire model chosen by the practitioner. Clearly, the lower the value of α, the lesser weight is given to past performance. The estimation of Vt(i) is relatively complex, we can make things easy for conjugate analysis by assuming Vt(i) = V (i) at any time. At time t = 0, we specify a Normal prior on θ0(i) and an inverted-gamma prior on V (i) . Then, the posterior of V (i) follows an inverted-gamma distribution with parameters, St(i) , n (i) t , where the time t point estimate of V (i) , St(i) , is given as: St(i)
=
(i) St−1
+
St(i)
n (i) t
et(i)
2
Q (i) t
−1 ,
(i) (i) (i) ˆt(i) , Q (i) Rt(i) Ft(i) + Vt(i) . A parameter forgetting n (i) t = n t−1 + 1, et = yt − y t = Ft (i) factor, 0 < β ≤ 1, is introduced to make n (i) t = βn t−1 + 1, which change the shape (i) of the inverse gamma distribution. In this way, Vt is updated with new data and forgot about the past to reflect changes in volatility. T
1132
Q. Meng
2.2 eDMA Framework Based on DMA, eDMA adds grid search for parametric forgetting factor δ. Suppose Mi is one of all possible models, and δ j represents the specific value selected from the grid value {δ1 , δ2 , . . . , δd }. Therefore, at a given time, the joint posterior probability of forgetting factor and model is given as p(Mi , δ j |Ft ) = p(Mi |δ j , Ft ) p(δ j |Ft ). In order to obtain p(Mi |Ft ) we can use the relation p(Mi |Ft ) =
d
p(Mi |δ j , Ft ) p(δ j |Ft ).
(6)
j=1
Where in Eq. 6, p(Mi |δ j , Ft ) =
p(yt |Mi , δ j , Ft−1 ) p(Mi |δ j , Ft−1 ) k
.
(7)
p(yt |Ml , δ j , Ft−1 ) p(Ml |δ j , Ft−1 )
l=1
Where in Eq. 7, p(Mi |δ j , Ft−1 ) =
p(Mi |δ j , Ft−1 )α . k α p(Ml |δ j , Ft−1 ) l=1
Where in Eq. 6, p(δ j |Ft ) =
p(yt |δ j , Ft−1 ) p(δ j |Ft−1 ) . d p(yt |δl , Ft−1 ) p(δl |Ft−1 )
(8)
l=1
Where in Eq. 8, p(δ j |Ft−1 ) =
p(δ j |Ft−1 )α . d α p(δl |Ft−1 ) l=1
At time t = 0, it is generally considered that the prior probabilities of all models and δ j are equally, p(Mi , δ j |F0 ) = 1/(k · d), p(δ j |F0 ) = 1/d. After that, when the new observation values are observed, the probability of the model is updated.
Dynamic Model Average for Stock Index Return
1133
2.3 Output of eDMA Compared with complex iterative operation of eDMA, we are more concerned about what kinds of results can be obtained. This paper examines the following results: (1) The predictive mean of yt+1 denote by yˆt+1 conditional on Ft . That is yˆt+1
k d (i)( j) = E yt+1 |Ft p Mi |δ j , Ft p(δ j |Ft ), j=1
i=1
(i)( j) where, E yt+1 |Ft indicates the estimate of yt+1 conditional on Mi model and (i)( j)
δ j , which is calculated by substituted θt get from Mi at time t into Ft . (2) Posterior inclusion probabilities of the predictors. At every time, we can calcuk late 1(i⊂m) p(Mi |Ft ) to get posterior inclusion probabilities of the predictors, i=1
where 1(i⊂m) is a indicative function taking the value of either 0 or 1, where m (m = 1,…, n) is the mth predictor. (3) Posterior weighted average of δ, δ = dj=1 δ j p(δ j |Ft ), t = 1, 2, 3, . . . , T . The trend of this value reflects the volatility of the market. (4) Posterior weighted average estimates of θt for eDMA.
k d (i)( j) E[θt |Ft ] = E θt |Ft p Mi |δ j , Ft p(δ j |Ft ), j=1
i=1
(i)( j) where E yt+1 |Ft indicates the estimate of θt conditional on Mi model and δj.
3 Empirical Analysis 3.1 Predictor Selection and Model Establishment In the Empirical, the monthly data of January 2014 to September 2018 is in-sample, and October 2018 to March 2019 is out-of-sample. By studying existing literature, the following predictor are selected for modeling. IdxMonRet: Shanghai composite index monthly rate of return; GDP: transform quarterly gross domestic product to monthly data by binomial interpolation; EPU: economic policy uncertainty index [10]; SHIBOR: Shanghai interbank borrowing rate; CPI: consumer price index; M2: broad money; CCI: consumer confidence index.
1134
Q. Meng
In order to ensure the stability of data and eliminate possible and deterministic trends, the rate of change in GDP, EPU, M2 and CCI is used as experimental data. All the variables passe the Augmented Dickey-Fuller Test and the Ljung-Box Test, ensuring that they stable and non-white noise sequence. Meanwhile, considering the problem of autoregression, then model is constructed: I M Rt = θ0,t + θ1,t I M Rt−1 + θ2,t I M Rt−2 + θ3,t I M Rt−3 + θ4,t G D Pt + θ5,t E PUt + θ6,t S H I B O Rt + θ7,t C P It + θ8,t M2t + θ9,t CC It + εt .
(10)
3.2 Experimental Result In the experiment, it was found that the log-predictive likelihood of the model was the largest, which is 56.821, when α = 0.99, β = 0.73, and we set step size 0.01. As excepted, in Fig. 1, the IndMonRet lagged one period, GDP and CPI keep high posterior probabilities in the all sample period, and the posterior probability of EPU increased rapidly to round 0.4 in 2018, the period coincided with the trade dispute between China and the United States, economic policy uncertainty had been rising. The result shows that EPU will be a good predictor in our model. As is shown in Fig. 2, the coefficient of EPU shows a downward trend and is significantly negative, indicating that the uncertainty of economic policy has a great negative impact on the stock market. In addition, GDP, SHIBOR and CCI is positive correlation with IndMonRet in almost every periods, and it is obviously that CCI is the one of most important predictors. Usually, the value of δ is directly related to the business cycle. It is closer to 1.00 when the economy is developing smoothly, and falls when the economy is under severe shock. The two sharp declines of δ in Fig. 3 are caused by the stock market crash in 2015 and Sino-US trade dispute since 2018. The δ trend to estimate the direction of the stock market, in January 2018 the two countries in terms of trade have already begun to friction, until the end of August 2018 trade frictions escalating, in December 2018 the both side still have no unified intention, during which δ value is on the decline. Until March 2019, there is no sign of recovery, therefore the domestic stock market will be in a state of volatility (Fig. 4). In this paper, RMSE is used to represent the performance of model fitting which is given as RMSE =
E(X − E X )2 . n
The in-sample RMSE of the eDMA is 0.074, and the RMSE of predicting the rate of return in six periods outside the sample is 0.0635.
Dynamic Model Average for Stock Index Return
1135
Fig. 1 Posterior inclusion probabilities of the predictors
3.3 Comparison of Results In addition eDMA method, we also use OLS and BMA to estimate coefficients. The results show that the EPU is significant and negative correlation with IndMonRet. Table 1 shows the RMSE of three methods for our model. Through comparative analysis, in this experiment, in-sample prediction of BMA is better than eDMA, while out-of-sample prediction of eDMA is better than BMA, and the prediction effect of model average method is better than OLS in both in and out of sample.
1136
Fig. 2 Filtered estimates of the regression coefficients
Fig. 3 Posterior weighted average of delta
Q. Meng
Dynamic Model Average for Stock Index Return
1137
Fig. 4 Point estimation value and residual diagram
Table 1 The results of three methods comparing
Method
In-sample RMSE
Out-of-sample RMSE
OLS
0.0855
0.0803
BMA
0.0604
0.0651
eDMA
0.074
0.0635
4 Conclusion Through the posterior probabilities of predictor calculated by BMA and eDMA, Monetary policy and interest rate policy is ineffective in regulating the stock market. Economic policy uncertainty and investor confidence have a great impact on the China’s stock market. Model Average is better than single linear model. The difference between eDMA and BMA is that the former is the model average of dynamic linear model, and the time-varying characteristics of parameters are constructed by state equation. The dynamic model is closer to the “real” situation, but it leads the model complex. Because the coefficients of the same variable may have positive and negative values at different times, it is more difficult to interpret. The parameters of the model affect the amplitude of the change of the model coefficients, so the setting will directly affect the prediction ability.
References 1. Holtz-Eakin, Douglas. 2017. Policy uncertainty and the economic outlook. Business Economics 52 (3): 168–169. 2. Gholipour, Hassan F. 2019. The effects of economic policy and political uncertainties on economic activities. Research in International Business and Finance 48: 210–218. 3. Pastor, Lubos, and Pietro Veronesi. 2016. Uncertainty about government policy and stock prices. The Journal of Finance 67 (4): 1219–1264.
1138
Q. Meng
4. Forte, Anabel, Gonzalo Garcia-Donato, and Mark Steel. 2018. Methods and tools for Bayesian variable selection and model averaging in normal linear regression. International Statistical Review 86 (2, Nov): 237–258. 5. Raftery, A.E., M. Kárny, and P. Ettler. 2010. Online prediction under model uncertainty via dynamic model averaging: Application to a cold rolling mill. Technometrics 52 (1): 52–66. 6. Naser, H., and F. Alaali. 2017. Can oil prices help predict US stock market returns? Evidence using a dynamic model averaging (DMA) approach. Empirical Economics 55 (4): 168–169. 7. Catania L., and N. Nonejad. 2018. Dynamic model averaging for practitioners in economics and finance: The eDMA package. Journal of Statistical Software 84(11): 1–39. 8. Kowal, D.R., D.S. Matteson, and D. Ruppert. 2017. A Bayesian multivariate functional dynamic linear model. Journal of the American Statistical Association 112 (518): 733–744. 9. Prado, R., and M. West. 2010. Time series: Modeling, computation, and inference. Boca Raton: CRC Press. 10. Baker, Scott R., Nicholas Bloom, and Steven J. Davis. 2016. Measuring economic policy uncertainty. The Quarterly Journal of Economics 131 (4): 1593–1636.
Challenges and Countermeasures of Intellectual Property Rights in Network Environment Ping Ma
Abstract With the rise of the network age, the Internet has penetrated into various industries. While facilitating the dissemination of knowledge within and between industries, it has also brought a lot of challenges to the protection of intellectual property rights. In order to better protect intellectual property rights under the network environment, reduce disputes and maintain a healthy network cultural environment, this work started from the challenges faced by intellectual property rights under the network environment and put forward some suggestions, such as building a network protection system, legislative protection and administrative protection, improving the awareness of intellectual property protection and providing technical protection. These measures are conducive to providing reference for relevant network intellectual property protection. Keywords Intellectual property rights · Network environment · Challenges · Countermeasures
1 Introduction As a result of human civilization, intellectual property rights is a valuable resource to promote technological progress and human well-being. It also has the civilized character of spreading and sharing. The network intellectual property rights vary from the traditional ones, such as patents, trademarks, copyright, web sites and domain names [1]. Nowadays, more and more enterprises and institutions are beginning to realize the economic benefits that these intangible assets can produce [2]. The emergence of network communication, a new mode of communication, has brought great changes to people’s way of life. How to protect the legitimate rights of network intellectual property rights and improve the legal protection mechanism of intellectual property rights has become an important problem to be solved as soon as possible. P. Ma (B) College of Trade and Economics Jilin Engineering, Normal University Changchun, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_133
1139
1140
P. Ma
2 Challenges of Intellectual Property Rights in the Network Environment 2.1 The Author Are Unaware of Information Embezzlement and Infringement by Using Network Technology With the rapid development of network transmission technology, the network scope is more and more extensive. Therefore, in many cases, even if the phenomenon of network infringement occurs, the owner of the book often has no way to know, leading to many people taking risks to use the network information falsely. The most common case is the reprinting of articles [3]. The public can often see the appearance of the same article on different carriers, especially after the emergence of WeChat official account, the infringement caused by reprint is more common. In most cases, the parties do not know that their actions have constituted infringement, while others do this deliberately, knowing that they have constituted infringement. Due to the traffic problem of self-media, it is often impossible for authors to know that their knowledge and achievements have been abused. With the rapid development of network technology, many things need to be stored and transmitted with the help of the Internet, which provides an opportunity for many illegal elements to carry out knowledge infringement. For instance, people often download knowledge spontaneously and transfer it to another storage carrier without the permission of intellectual property owners. This undesirable phenomenon makes it easy for them to acquire the knowledge of other people’s hard work [4].
2.2 The Identification of Intellectual Property Rights Infringement Is More Difficult, the Harm of Crime Is Greater and the Difficulty of Protection Is Increased At present, the infringement of intellectual property rights in the network environment is mainly manifested in three aspects: network copyright infringement, network patent infringement and network trademark infringement. Because the names of many message publishers on the Internet are nicknames or anonymity, some illegal elements have no worries and maliciously infringe on the intellectual property rights of others, which brings great difficulties for future investigation, evidence collection and criminal information tracking [5]. According to the current law, the main basis of the judgment is the amount of illegal income and the harm caused, thus lagging laws have brought obstacles to tort determination. Due to the openness of the Internet, the dissemination of information between the network is more influential. With the help of modern network technology, tort crime has brought unprecedented impact to property rights owners. Due to the basic literacy and moral consciousness of netizens are uneven, it is unrealistic to require everyone to avoid the infringement of
Challenges and Countermeasures of Intellectual …
1141
network intellectual property rights. Therefore, It is unrealistic to protect the owner of property rights in the near future [6].
2.3 Lack of Laws and Weak Awareness of Intellectual Property Protection In many cases, due to the influence of the network environment, the lack of objective evidence often leads to the difficulty of safeguarding intellectual property rights. According to the existing intellectual property protection law, the relevant evidence is also difficult to provide, which makes it difficult to establish the ownership of knowledge and to investigate the infringers. The lack of this legislation leads to the low cost of intellectual property violations, making the relevant departments unable to curb the occurrence of knowledge infringement. Many people think that knowledge is to be used and the function of knowledge achievement is to promote the progress of society. However, due to knowledge is the hard income of workers, people can not ignore the efforts of knowledge owners because of their own convenience. Moreover, in many cases, the infringers of knowledge achievements not only use knowledge for personal dissemination, but also publish knowledge results to gain fame and money income, which further damages the rights of knowledge owners. Knowledge should be acquired through legitimate channels instead of illegal channels and knowledge owners should also constantly strengthen their awareness of intellectual property rights protection.
3 Countermeasures of Intellectual Property Rights in Network Environment 3.1 Build Network Protection System Firstly, the relevant departments should improve the management mechanism of Internet enterprises and implement the functions of protecting the intellectual property in Internet. Secondly, the government should set up third-party public welfare protection institutions on the Internet. Institutions issue detailed rules for the protection of intellectual property rights, strengthen the examination and approval of intellectual property rights entering the network, objectively supervise the use of intellectual property rights on various network platforms and deal with intellectual property disputes as soon as possible [7]. Finally, it is necessary to strengthen the popularization of citizens’ intellectual property knowledge, especially the popularization of network intellectual property knowledge, in order to improve citizens’ awareness of legal protection. These measures are conducive to promoting the legal protection and system construction of network intellectual property rights in China.
1142
P. Ma
3.2 Legislative Protection Legislative protection includes the protection of criminal legislation, civil legislation, administrative legislation and other legislation. At present, the legal protection system of the copyright under the network environment of China has been basically completed based on the international treaties added into the relevant judicial interpretation, including the Copyright Law, the Trademark Law, the Patent Law and the Protection Regulations for Right of Communication in the Information Network. From the perspective of legislation, the purpose of the legislation is to achieve a balance among the obligee of intellectual property right, the interests of the propagators and the interests of the users. The balance of interest is the core goal of legislative protection. How to both realize the legitimate interests of the obligee with intellectual property right in the process of legislation and realize the interests of the propagator under the network environment is important, so that the promotion scale can be expanded. It also enables the public to receive good works in a timely manner, to seek rational and maximized social interest and to achieve the limitation of rights and the harmony and unity of protection and regulation. In the legislative work, these problems have become the problem to be solved in the network environment, and also the problem that the legislators have to consider.
3.3 Administrative Protection It is necessary for the government to protect network intellectual property rights by means of administrative law enforcement. If the infringement of intellectual property rights does harm to the public interest at the same time, it can be stopped by the intellectual property administrative department, which can confiscate the illegal proceeds, confiscate and destroy the infringing copies, and impose a fine [8]. If the circumstances are serious, the intellectual property administrative department may also confiscate the materials, tools and equipment mainly used for making infringing copies. Intellectual property right is an important civil right enjoyed by civil subjects according to law. When the legitimate rights and interests are infringed, the obligee can apply to the court for civil and criminal protection. For the infringement of copyright that disrupts the normal social order and infringes on the interests of the state and the public, the obligee can also apply for administrative protection from the administrative organ. The infringer will bear not only the civil liability but also the administrative liability.
Challenges and Countermeasures of Intellectual …
1143
3.4 Raise Awareness of Intellectual Property Protection To a great extent, the legal consciousness of the whole society will have an important impact on legislation. Improving the legal consciousness of intellectual property protection in the whole society is the foundation of perfecting the protection of intellectual property rights [9]. On the one hand, law enforcers should strengthen the legal awareness of intellectual property rights and increase the intensity of cracking down on the illegal acts of intellectual property rights; on the other hand, government can use typical cases and educational propaganda to popularize the law education for the general public, in order to improve the ordinary people’s attention to intellectual property rights [10]. Only if the broad masses of the people pay more attention to the protection of intellectual property rights can the problem be fundamentally solved.
3.5 Technical Protection Measures Technical protection measures are necessary to strengthen the protection of network intellectual property rights. The common technologies are encryption technology, firewall technology and installation monitoring system. Nowadays, society should strengthen support for network protection, increase policy support and investment in funds, raise the overall level of protection technology, constantly train high-tech talents and accelerate the development of network intellectual property protection technology. As a result, the level of intellectual property technology protection in China can be improved constantly.
4 Summary In the recent network environment, the transmission of information is too fast, so we should pay more attention to the protection of intellectual property rights. Innovation is the driving force of human development. For the sake of fundamentally managing the problem of network intellectual property rights, it is necessary to take the legal consciousness and morality of citizens as the foundation, take technical measures as the premise and take the law as the means. Only when the relevant departments strictly abide by their duties and deal with the crimes of infringing intellectual property rights according to law, can we create a new situation of network intellectual property protection. This work summarized the challenges faced by the intellectual property in the network environment and put forward a feasible coping method. These useful references are conducive to constructing the intellectual property protection system under the network environment in the future.
1144
P. Ma
References 1. Mengyao, GCui. 2017. Intellectual property protection in the network environment. Estate and Science Tribune 16 (4): 40–41. 2. Qiongyuan, Du. 2018. Discussion on the protection of intellectual property rights in the network environment. Telecommunications 1: 34–35. 3. Yanfei, Kang. 2018. Analysis of the common tort form and the legal protection on the copyright under the network environment. Legality Vision 16: 78–79. 4. Jiayue, Li. 2018. The present situation and protection countermeasures of intellectual property rights under the network environment. Staff and Workers’ Law World 9: 23–23. 5. Jingming. 2018. The impact and response of the network intellectual property administrative law protection system. Legality Vision (04): 168. 6. Roufei, Lu. 2017. Legal thinking on intellectual property protection under network environment. The Farmers Consultant 22: 314. 7. Peng, Yan. 2017. Research on the legal protection of intellectual property rights under the network environment. Journal of Jiamusi Vocational Institute 12: 197. 8. Qiongyuan, Du. 2018. Discussion on the protection of intellectual property rights under the network environment. Telecommunications 01: 34–35. 9. Sangsang, Wang. 2017. Analysis on the cognizance and protection strategy of intellectual property infringement under the network environment. Legality Vision 06: 176. 10. Jianyong, Fan. 2017. Problems and countermeasures of intellectual property rights in the internet age. Science & Technology for Development 13 (03): 169–174.
Personalized Distribution Recommendation Model of Dormitory Based on Deep Learning Weiwei Guo and Feng Liu
Abstract There are a large number of colleges and universities, and the tasks of assigning jobs in the dormitory are large. How to meet the diverse needs of students for the allocation of dormitory is a subject worth studying. In order to meet the individual needs of students, a deep learning model is first constructed, and the collected data is analyzed and transformed in the model. Secondly, the Pearson coefficient is used to determine the similarity between students, and the student recommendation list is constructed. Finally, the experimental data is used. Verification, the proposed model can effectively improve the accuracy of students’ personalized recommendations. Keywords Deep learning · Recommendation system · Machine learning
1 Introduction In recent years, the university has continuously expanded enrollment, and the number of students has also increased. University life is an important part of student growth, and students spend nearly half of their time in college life in student residences. The main place for students to teach, at this stage, the personality habits and values of college students are diversified and complex. The behaviors, lifestyles, hobbies, national characteristics and other factors of each student in the dormitory will affect the growth of students, so part of it In addition to the high requirements of the dormitory itself, students also have certain requirements for their roommates, that is, students are required to have personalized needs when arranging the dormitory [1]. At present, most colleges and universities use the traditional method of distribution when assigning student residences. When students enter the journal, they are directly assigned according to the order of the student number or the order of registration. The adoption of this traditional method of distribution does not fully take W. Guo (B) · F. Liu Department of Electrical and Information Engineering, Heilongjiang University of Technology, Jixi, China e-mail: [email protected] F. Liu e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_134
1145
1146
W. Guo and F. Liu
into account the individual characteristics of students’ national characteristics, living habits, learning styles and hobbies, and the efficiency is very low. Therefore, constructing a highly efficient personalized dormitory recommendation system model is of great significance to students’ college life [2].
2 Existing Research Work In foreign countries, there may be multiple races in a country. Therefore, in the process of dormitory allocation, the first consideration is the interpersonal relationship between students. Scholars through research, students of different ethnicities in one dormitory may have other roommates. There are certain differences in emotions or in cognition. These differences will affect students’ learning and future life. Therefore, a reasonable dormitory allocation plan is very important [3]. In China, most universities still use the most primitive methods for dormitory allocation. As of May 25, 2019, searching for “dormitory allocation” keywords on China Knowledge Network, you can get 151 items about dormitory allocation, “Personalized dormitory” can be matched as a key word, and 5 pieces of information can be obtained. This data shows that the problem of dormitory allocation has been excessive from the traditional manual distribution method to the personalized recommendation distribution method, and there has also been a certain breakthrough. In the course of college students’ registration in 2018, Beijing Institute of Technology and Nankai University have opened a network platform. Students can collect their hobbies, family information, living habits and other content through the platform before reporting, and analyze the collected data. Content, assigning dormitory to students. For the problem of student dormitory allocation, it belongs to a multi-constrained resource allocation problem. This allocation problem is actually to allocate a resource to a set of user requirements with multiple constraints. There are many distribution schemes generated, but the enumerated schemes are not necessarily the best allocation scheme, but rather a relatively reasonable allocation method relative to these schemes [4]. Many scholars at home and abroad are constantly studying the methods for this distribution problem. In Reference 2, Chen Zhongwei of Wuhan University proposed a personalized dormitory allocation algorithm, which takes into account the student’s family location, economic situation, living habits, hobbies, and communication skills. The algorithm uses java. The language is designed to combine various factors among students, thus obtaining personalized distribution and automatic recommendation of student residences, and achieving an optimal distribution plan. Wang Qiaoqiao of Guangxi Normal University proposed a system of student dormitory allocation based on greedy algorithm. Firstly, a distribution principle was constructed in the system. Firstly, the professional situation of the students was considered, so that the students with the same profession were given priority in one room, and secondly Students’ class situation, students in the same class should be arranged in one dormitory as much as possible. The third consideration is the problem of the same floor. Try to arrange the
Personalized Distribution Recommendation …
1147
same professional or class on one floor or close to each other. The fourth is to take into account the interest of students. With the hobbies, as well as the schedule of work and other issues; through the principles of design, not only achieve the personalized distribution of the dormitory, but also fully consider the overall management of the students [5]. Sun Can of Tongji University proposed a dormitory allocation scheme to improve greedy algorithm. In the scheme, students’ hobbies, living time and living habits are used as conditional items for dormitory allocation, and different permission factors are set for different condition items. This makes each project occupy a certain proportion in the allocation of dormitory, thus achieving a personalized distribution plan [6]. Although many scholars have made some research in the distribution work of the dormitory, and have achieved certain results, the dormitory allocation schemes built by these scholars all set different weights through different condition items, and then Students are assigned, this method of distribution is relatively fixed, how to deal with different distribution situations, does not meet the individual needs of students, the administrator also needs to make a second assignment, increasing the difficulty of the administrator’s work, the program has not yet formed Intelligent, so designing a smart dormitory allocation recommendation is significant.
3 Deep Learning Model Construction 3.1 Artificial Intelligence In the personalized recommendation recommendation model constructed, how to realize the intelligent management in the recommendation process requires the introduction of artificial intelligence related technologies. Artificial intelligence is a branch of computer science that attempts to understand the essence and core content of intelligence and produce a new kind of intelligent machine that can react in a way similar to human intelligence. Research in this field includes robotics and language recognition, image recognition, natural language processing and expert systems. Since the birth of artificial intelligence, the theory and technology have become more and more mature, and the application field has been expanding. It is conceivable that the technological products brought by artificial intelligence in the future will be the “container” of human wisdom. Artificial intelligence can simulate the information process of human consciousness and thinking. Artificial intelligence is not human intelligence, but it can be like human thinking, and it may exceed human intelligence [7].
1148
W. Guo and F. Liu
3.2 Deep Learning To understand deep learning, you must first understand what is machine learning. Machine learning is a discipline that specializes in how computers simulate or implement human learning behaviors to acquire new knowledge or skills and reorganize existing knowledge structures to continuously improve their performance. Deep learning is a new field in machine learning research. Its motivation is to build and simulate a neural network for human brain analysis and learning. It mimics the mechanism of the human brain to interpret data such as images, sounds and texts. Deep learning is one of the technical and research fields of machine learning, and belongs to the category of artificial intelligence. Deep learning implements artificial intelligence in computing systems by building artificial neural networks with hierarchical structures. Because in the neural network with hierarchical structure, the input information can be extracted and filtered layer by layer, deep learning has the ability to characterize learning, so deep learning can achieve deep training under supervision and unsupervised. Training further aligns the structure with the way the human brain thinks about problems. Deep learning has broad application prospects. Deep learning is often used to train and study high-dimensional data of complex structures and large samples. It can be used in computer vision processing, natural language processing and automatic control, and in image recognition, human Face recognition, automatic control and driving have achieved some success [8].
3.3 Model Building The deep learning model constructed is shown in Fig. 1. The construction of the model can be divided into five steps: The first step is to collect student information first. The collection process can be collected through the website before the students enter the school. The collected information mainly includes the students’ gender, family location, ethnicity, profession, hobbies, living time, etc. These contents are not fixed or can be along with the eigenvalues. Fine division, appropriate addition, modification and editing; The second step is the feature analysis center. The feature analysis center mainly analyzes and processes the collected student feature information, classifies the collected information, and extracts the main feature information value of the student; The third step is the weight distribution. Different skill values are assigned to different weight coefficients according to different feature information provided by the students and analyzed by the deep learning model, and the sum of the weight coefficients is 1; The fourth step is the Deep Learning Training Center. The constructed feature values and the corresponding weight coefficients are sent to the deep learning training center for setting training, and the training parameters are repeatedly adjusted during the training process, and the formed results are sent to the recommended program
Personalized Distribution Recommendation …
1149
Fig. 1 Deep learning model
column of the fifth step; and recommend the result to the student. If the student is not satisfied with the result of the training, the model can feed the information back to the deep learning training center. After receiving the information, the deep learning training center promptly sends an instruction to the weight distribution module. Go back to the third step, re-adjust the weight distribution, and then re-run the fourth step of deep learning. The fifth step is to build a list of recommended solutions. Through training, a personalized distribution plan recommended to students is formed. The learning and training process of the whole model requires a large amount of computing resources. Therefore, grid computing can be introduced in the model operation process, and resources can be allocated reasonably under the grid platform, which can greatly improve the computational efficiency.
4 Design of Recommendation Model for Dormitory Personalization On the basis of constructing the deep learning model, we can design the personalized distribution model of the student dormitory. In the process of distribution, we must consider how to determine the number of students in a dormitory, and identify the students. We have determined the allocation plan for the dormitory, so we introduce the concept of similarity here. How the similarity between the two students is very
1150
W. Guo and F. Liu
high, then it shows that there are many commonalities among the students, so you can Several students were assigned to a student residence.
4.1 Similarity At present, there are many methods for calculating similarity, such as Euclidean distance, Pearson coefficient, Manhattan distance, cosine similarity, Tanimoto coefficient, etc. The existing basic methods are basically vector-based. In essence, the similarity is calculated by calculating the distance between two vectors. The closer the distance is, the greater the similarity. In the recommended scenario, the similarity between the user and the user can be calculated according to the user and the user’s scoring two-dimensional matrix of the project. In the recommendation process of the student dormitory, we can regard each student as a user, and the collected student feature value is regarded as one of the items. Through this information, a two-dimensional matrix can be constructed. There are many ways to calculate the similarity. Which similarity method we choose to calculate the similarity between students and students. By comparing the above similarity calculation methods, after fully analyzing the advantages and disadvantages, we choose the cosine similarity calculation method as the similarity calculation method in the personalized distribution recommendation model [9].
4.2 Pearson Coefficient Pearson correlation, also known as product-related correlation (or product-matrix correlation), is a method of calculating linear correlations proposed by British statistician Pearson in the twentieth century. The Pearson correlation coefficient is generally used to calculate the closeness of the relationship between two distance variables, and its value is between [-1, +1]. If we have a continuous linear relationship between the two quantities, or if the population of the two variables is normally distributed, it is closer to a normal single-peak distribution, or the observations of the two variables are paired, each pair The observations are independent of each other, so the Pearson coefficient is defined. The specific definition is as shown in Eq. 1 [10]: p ra, p − ra r b, p − r b sim(a, b) = 2 2 r − r a, p a p p r b, p − r b
(1)
where rb represents the average score of student b for all eigenvalues, and ra represents the average score of student a for all eigenvalues.
Personalized Distribution Recommendation …
1151
4.3 Feature Analysis and Matrix Construction When calculating the Pearson coefficient similarity, we must first give relevant data, so we need to extract and transform the collected data information. We can define the students of the dormitory to be recommended as the student data set, using the set S = {s1 , s2 , · · · sn }, each item in the collection can be represented as a student; using the set R = {r1 , r2 , · · · rm } to represent the characteristic value of each student, that is, the collected student’s living time and economic status, hobbies and other information, and then construct a two-dimensional matrix of students and features, when constructing the matrix, we transform each student’s feature information into corresponding scores, the scores are between 0–5, and then get The representation of the two-dimensional matrix is ri, j , where i = 1, 2, · · · n,j = 1, 2, · · · m,if a student i has corresponding feature information j, then ri, j to indicate the degree of student i’s feature j, if there is no corresponding feature, then 0 is used to represent the corresponding value in the matrix.
5 Experimental Design and Analysis In order to be able to model better, we selected the characteristics information of 8 students for analysis. When analyzing, because the fixed information such as gender, family location, ethnicity, and profession can be discharged through screening, it is in experimental design and at the time of analysis, only the eigenvalues of the students’ needs to be transformed are considered. The eigenvalues of the eight students with the same gender are given below, and the specific collected information is shown in Table 1. According to the information provided in Table 1, we can’t calculate the similarity. We need to re-transform the data in Table 1 and transform these feature values into corresponding scores, as shown in Table 2. If you want to calculate the similarity between the first student and the second student, you can divide it into three steps: The first step is to calculate the average score of the first student for all the feature information rstudent 1 , which can be obtained by calculation rstudent 1 = ra = (5 + 5 + 4 + 4 + 3 + 4)/6 = 4.16 The second step is to calculate the score of the second student for all the feature information rstudent 2 , which can be obtained by calculation rstudent 2 = rb = (3 + 4 + 3 + 3 + 5 + 5)/6 = 3.83 In the third step, the similarity between the student 1 and the student 2 is obtained by bringing the value calculated in the first step to the second step into the formula 1. (5 − ra ) ∗ (3 − rb ) + (5 − ra ) ∗ (4 − rb ) + · · · (4 − ra ) ∗ (5 − rb ) (5 − ra )2 + (5 − ra )2 + · · · (3 − rb )2 + (4 − rb )2 + · · · = −0.4954
sim(s1, s2) =
1152
W. Guo and F. Liu
Table 1 Student characteristics information table No
Be quiet
Sports
Film
Song
Wake up time
Sleeping time
1
Be quiet
Basketball
Love
Love song
6:00–7:00
After 22:00
2
Sound is not too big
Pingpong
Action
Rock
5:00
Around 21:00
3
Does not matter
Badminton
Comedy
Lyrical
Sleep until you wake up
Sleepy and sleep
4
Be quiet
–
Plot
All
7:00–7:30
After 22:30
5
Does not matter
Swim
Plot
Rural
6:00–6:30
21:30
6
Loud volume
–
Action
Jazz
Sleep until you wake up
After 23:30
7
Be quiet
–
Action
Both
8:00–8:20
Sleepy and sleep
8
Does not matter
Rope skipping
Science fiction
Rock
6:00–7:00
After 22:00
Table 2 Student characteristic information score table No
Be quiet
Sports
Film
Song
Wake up time
Sleeping time
1
5
5
4
4
3
4
2
3
4
3
3
5
5
3
4
4
4
4
0
1
4
5
0
5
5
2
3
5
4
3
5
4
4
5
6
1
0
3
4
0
2
7
5
0
3
5
1
1
8
4
4
2
3
3
4
Using the same method to bring the feature information data into Eq. 1, the similarity between the first student and other students can be obtained. The similarities are: sim(s1, s3) = 0.7481, sim(s1, s4) = −0.042, sim(s1, s5) = −0.4117, sim(s1, s6) = −0.1084, sim(s1, s7) = 0.1838, sim(s1, s8) = 0.5423. The similarity obtained by the Pearson coefficient ranges from -1 to 1. If the absolute value of the obtained coefficient is larger, the correlation is greater, so the above data can be recommended for the first student. The order of distribution is: third, eighth, second, fifth, seventh, sixth, and seventh.
Personalized Distribution Recommendation …
1153
6 Conclusion The model is built in the deep learning training mode, and the Pearson coefficient is used to calculate the similarity between students. It can effectively establish the list order of the dormitory allocation scheme for each student, thus realizing the personalized distribution recommendation scheme. The recommended model is only combined with a similarity calculation method. If other similarity calculation methods can be incorporated into the model and the correlation coefficient is set reasonably, the accuracy of the recommendation can be further improved. Acknowledgements This research was supported by the project of Nature Scientific Foundation of Heilongjiang Province (F2016038).
References 1. Yimei, Yu. Wen Jie, Tian Peng, et al. Research on resource integration and collaborative management of university students’ dormitory. Laboratory Technology and Management 28 (175 [04]): 236–239. 2. Hao, Hao, and Lu Meixiu. 2016. Research on personalized dormitory allocation algorithm for college students. Information and Communication 2016 (5): 153–154. 3. Qilin, Yu. 2017. Research on the allocation management system of college apartments considering students’ preference. 4. Xuexue, Cao. Design and implementation of dormitory allocation management system based on student personality. 5. Qiaoqiao, Wang, and Wei Wei. 2013. Design and implementation of student dormitory distribution system based on greedy algorithm. Computer CD-ROM Software and Application 10: 147–148. 6. Can, Sun, and Miao Nannan. 2014. Application of improved greedy algorithm in intelligent dormitory distribution system. Information and Communications 9: 49–49. 7. Linghao, Cai, Fan Ling, Lai Wenbo, et al. 2018. Definition, application and influence of artificial intelligence from the perspective of design. Landscape Design 6 (032 [02]): 58–65. 8. Liu, Feng, Weiwei Guo. Research on algorithm of personalized recommendation system based on deep learning. 9th International Conference on Management and Computer Science, 162– 168. 9. Guo, Weiwei, Feng Liu. 2019. Research on collaborative filtering personalized recommendation algorithm based on deep learning optimization. International Conference on Robots & Intelligent System. 10. Liu, Feng, and Weiwei Guo. 2019. Research on recommendation system algorithm based on deep learning mode in grid environment. International Conference on Robots & Intelligent System.
Time-Limited Tour Planning Based on Ant Colony Optimization Algorithm Han Liu, Zhujun Yu, Wenhui Zhang and Zhihong Ma
Abstract In this paper, Ant Colony Optimization algorithm is updated with multiple rules to solve the Time-limited tour planning problem. The precision of entertaining time in each sight can significantly increase the time complexity of an algorithm. With tourist attractions opening hour varies from one another, the shortest path will no longer suit the maximum entertaining time. In order to obtain the comprehensive optimal result of both travel time and travel length, the problem is divided into two major steps. The idea of crossover in Genetic Algorithm is introduced here to jumping out of the local loop of solution. Then, the local optimization of time planning is carried out for reducing the time complexity. Time optimizing values are then embedded into an overall travel distance optimization algorithm to acquire final results. By using the method of traversal, the results are verified which are identical to the traversal answer. To test our model, take Pan An Lake scenic spot, Xuzhou, China as an example to give specific results. Keywords Ant Colony Optimization · Tour planning · Travel salesman problem
1 Introduction Travel Salesman Problem (TSP) has been widely concerned by the academic due to its extensive application in real life. As a result, there is a large group of TSP problemsolving models. However, one TSP problem varies greatly from another. Therefore, H. Liu College of Food Science and Bioengineering, Tianjin Agricultural University, Tianjin, China e-mail: [email protected] Z. Yu · W. Zhang · Z. Ma (B) College of Basic Sciences, Tianjin Agricultural University, Tianjin, China e-mail: [email protected] Z. Yu e-mail: [email protected] W. Zhang e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_135
1155
1156
H. Liu et al.
it is necessary to update the solution to different problems. Heuristic algorithms are popular among solutions towards TSP problem. Artificial bee colony (ABC), Ant colony optimization (ACO), Genetic algorithm (GA) are the most commonly used ones [1–5]. Tour planning as a variant of the TSP problem, it has two major issues, one is the maximum entertaining time the other is the minimum travel length. However, most are put their eye on minimum travel length finding [6–8]. Thus, to fulfill the satisfaction of the tourists, finding a way to maximize entertaining time and minimize the travel length is necessary. Multi-optimization examples are problems related to transportation such as dual minimization of the total travel distance and total travel time at various traffic flow condition [9], dual consideration of customer preference and minimum travel time [10]. It mainly talked about the time cost (waiting time) when we want to choose a shorter path. And transportation problem does not have the answer of time recommendation which is the key factor towards tour planning. This paper tackles the tour planning problem mainly around planning a tour in maximum entertaining time and shortest route at the same time. The place has been chosen have varies sights and each attraction has different opening time range which is closely related to reality. By using the model built in this paper, visitors can go through all the tourist attractions at once with optimal entertaining time recommended.
2 Shortest Path Specification Model Based on Ant Colony Optimization Algorithm There are multiple algorithms for discovering the shortest path, such as Dijkstra algorithm and Hamiltonian algorithm. The Ant Colony Optimization algorithm are chosen here for its plasticity. However, Ant Colony Optimization algorithm is easily misleading by locally optimal solution. As a result, the idea of crossover in genetic algorithm is introduced here to remedy this problem.
2.1 Model Principle The ant will choose the path according to the pheromones left by previous passengers when it moves forward. The probability of choosing the next place to visit is directly related to pheromone concentration. Therefore, the collective behavior of a large group of ants has positive feedback of learning information: if we have fixed time and ant moving speed, then every route has the same probability to be the next choice. The shortest one will leave most pheromone. And then every ant will know which route is the optimal option. But to speed up the algorithm, we refresh the pheromone manually (find the shortest path each time, and increase the pheromone by formula [1]).
Time-Limited Tour Planning Based on Ant …
1157
2.2 Modification Restricted by the initial number of ants, the algorithm is easily misled to the local optimal solution. To solve this problem, a random indicator is needed. In this paper, we introduced the idea of crossover to Ant Colony Optimization algorithm. And the result is joyful. Ant Colony Optimization algorithm is based on the pheromone concentration Pkij (t), where i, j is sight i and sight j. dij (i, j = 1, 2, . . . , n) is the distance between two sights. The number of ants is n, and the number of sights is m. Pkij (t) is the total amount of pheromone at time t, while τij (t) is the pheromone created at time t. As a result, τij (0)=τ0 . And the k represents the kth ant. The formulation is shown below: Pkij (t) =
⎧ ⎨ [τij (t)]α ·[ηij (t)]β ⎩0
α β s∈allowk [τis (t)] ·[ηis (t)]
,j∈ / allowk j∈ / allowk
(1)
In this mathematical formulation, ηij (t) is a heuristic function, representing the expectation of the ant move from i to j. allowk k = 1,2 . . . , m is the available sights set for ant k. In fact, the pheromone made by passing ants is disappearing with time in the way of volatilization. To depict this feature, ρ(030 min
9:00–21:30
accurate to one decimal point which largely increased the time complexity of the algorithm, local optimization of entertaining time is carried out before global solution which greatly reduces the time complexity of this model. The constraints of this case can be divided into four parts: • • • •
The overall entertaining time cannot exceed 330 min. The entertaining time at sight 8 lasts at least for 30 min. It takes no more than 230 min to reach sight 2. It must take multiples of 30 min to reach sight 4.
To analyze these four constraints, it can be found that restriction 1 and restriction 2 are the same. Because sight 8 has to be the last place to visit. As a result, we have three restrictions to deal with. • For restriction one With the optimization route matrix generated by the first model, 50 entertaining time vector (1 × n) within the entertaining time range are generated for each route. Calculate whether the sum of each entertaining time vector and the walking time of the corresponding route exceeds 300 min. Keep the entertaining time vectors that meet the condition. If none of the 50 vectors meet the restriction condition, then, sum all the extra time for each sight, and subtract the extra (the time will always be 300 min, in this case, meaning, spend 300 min to reach the sight 8). Then, chose the maximum entertaining time vector. • For restriction two Based on the entertaining time vector from restriction one, verify whether it meets the restriction two. If not then subtract the extra time to make it fulfill restriction two. • For restriction three Based on the entertaining time vector from restriction two, verify whether it meets the restriction three. If not then take the remainder of the time vector. And subtract the extra time to make it fulfill restriction three as well.
Time-Limited Tour Planning Based on Ant … Fig. 3 Model 2 flow chart
1161
Initial the paramters Initial route matrix by MODEL 1; Generate the corresponding local optimal entertaining time vector to each route in initial route matrix; Memorize the optimal time and route;
Iteration =? Maximum iteration
result
Fig. 4 Maximum entertaining time
After the optimization of three restrictions, the entertaining time vector corresponding to each route can be obtained, and the entertaining time vector is locally optimal. Then, the shortest path selection before is changed to the longest entertaining time for iteration. At last, the optimal route and the corresponding longest entertaining time is obtained (Fig. 3). Take Pan An Lake scenic spot, Xuzhou, China as an example to calculate the results. The optimal result is shown in Fig. 4. The maximum entertaining time obtained is identical to the traversal answer. Note that sometimes the result could be 269.9 which is 0.1 from the best answer.
1162
H. Liu et al.
4 Conclusion A solution to a large range of time TSP problem is given here. Shortest route solution is proposed as well as the longest entertaining time for tour planning. It can give the tourists an advisable option to plan their tour within a specific attraction. A tour plan to a special case in Pan An Lake scenic spot, Xuzhou, China has been shown as an example, which the result is rather good. It indicates that the idea of dealing time restriction respectively and stepwise continuously may apply to other attractions as well. Ant Colony Optimization (ACO) is a typical approach to TSP problem. Based on its plasticity, ACO is a potential algorithm to be supervised and cooperated for a better result. Here, the idea of the genetical algorithm is introduced. For better efficiency the group of ants can be trained to do things orderly as well, meaning, inducing the idea of Artificial Neural Network can also be considered as other future enhancements towards ACO.
References 1. Eskandari, L., A. Jafarian, P. Rahimloo, and D. Baleanu. August 2018. A modified and enahanced ant colony optimization algorithm for traveling salesman problem. In Mathematical methods in engineering, vol. 23, 257–265, https://doi.org/10.1007/978-3-319-91065-9_13. 2. Halim, A., and I. Ismail. April 2019. Combinatorial optimization: Comparison of heuristic algorithms in travelling salesman problem. Archives of Computational Methods in Engineering 26 (2): 367–380, https://doi.org/10.1007/s11831-017-9247-y. 3. Long, J., Z. Sun, Y. Hong, S. Zhang, and C. Li. April 2019. A hybrid multi-objective genetic local search algorithm for the prize-collecting vehicle routing problem. Information Science 478: 40–61, https://doi.org/10.1016/j.ins.2018.11.006. 4. Saxena, R., A. Kumar, V. Jain, and T. Sadana. February 2019. An improved genetic algorithm based solution to vehicle routing problem over openmp with load consideration. Advances in Communication, Devices and Networking 537: 285–296, https://doi.org/10.1007/978-981-133450-4_32. 5. Khan, I., and M. Maiti. Feburary 2019. A swap sequence based artificial bee colony algorithm for traveling salesman problem. Swarm and Evolutionary Computation 44: 428–438, https:// doi.org/10.1016/j.swevo.2018.05.006. 6. Mei, Y. October 2018. Study on the application and improvement of ant colony algorithm in terminal tour route planning under android platform. Journal of Intelligent and Fuzzy Systems 35: 2761–2768, https://doi.org/10.3233/jifs-169628. 7. Afriani, A., H. Saleh, and M. Gamal. Feburary 2019. An application of goal programming: The best route to discover a wonderful west sumatera. International Journal of Management and Fuzzy Systems 5: 9–13, https://doi.org/10.11648/j.ijmfs.20190501.12. 8. Huang, W. and B. Shuai. June 2018. Approach and application on high-speed train stop plan for better passenger transfer efficiency: the China case. International Journal of Rail Transportation 7: 55–78, https://doi.org/10.1080/23248378.2018.1489741. 9. Hameed, I. March 2019. Multi-objective solution of traveling salesman problem with time. International Conference on Advanced Machine Learning Technologies and Applications, vol. 921, pp. 121–132, https://doi.org/10.1007/978-3-030-14118-9_13. 10. Ghannadpour, S. 2019. Evolutionary approach for energy minimizing vehicle routing problem with time windows and customers’ priority. International Journal of Transportation Engineering 6 (Winter): 237–264, https://doi.org/10.22119/ijte.2018.55929.
Fungus Bacteria Bag Density Detection System Based on Image Processing Technology Chunyu Mao, Zhuojuan Yang, Xirui Sun and Xiaodong Yang
Abstract The density of Fungus Bacteria bag is the main factor for the growth of fungus. In order to accurately measure the density of Fungus Bacteria bag, the image processing technique was used to measure the density of the bacteria bag. The resolution of CCD is 1280 × 720. The median filtering is used to remove the inevitable noise in the image. The image binarization method is effective to segment the image. Finally, the four-neighbor corrosion method is used to extract the edge of the bacteria bag. The volume of the bacteria package is detected, and finally the density of the bacteria package is calculated based on the detected quality information. The absolute error of the test bag density accuracy is less than 0.015, which meets the engineering needs. Keywords Fungus bacteria bag · Image processing · CCD · Median filtering · Image binarization
1 Introduction With the improvement of people’s living standards and the improvement of dietary structure, edible fungi products have become one of the main foods for consumers at home and abroad. The World Health Organization and FAO have identified edible fungi products as “green, nutritious and health-care” green foods. The State Council of China has also listed edible fungi as a sunrise industry in the twenty-first century. C. Mao · Z. Yang (B) · X. Sun · X. Yang School of Mechanical Engineering Jilin Engineering, Normal University, 3050 Kaixuan Street, Changchun 130052, People’s Republic of China e-mail: [email protected] C. Mao e-mail: [email protected] X. Sun e-mail: [email protected] X. Yang e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_136
1163
1164
C. Mao et al.
Black fungus is the most representative of edible fungi. It ranks first among the four most famous edible fungi in the world. It has the effects of delaying aging, lowering blood fat and blood sugar, nourishing blood and promoting blood circulation, clearing lungs and lungs, promoting digestion and treating constipation. Black fungus is not only sold in major domestic markets, but also recognized by consumers in many countries around the world. Black fungus can be seen on almost every table in the world. Due to the general improvement of the society’s awareness, the consumption of black fungus is becoming more and more active [1, 2]. The Fungus Bacteria bag is the body of the fungus growing. The quality of the Fungus Bacteria bag determines the yield, cost and quality of the fungus. How to detect the quality of Fungus Bacteria bag is a technical problem that plagues the producers of fungus. The material of Fungus Bacteria bag can be made according to the fixed experience and formula, but the factor of Fungus Bacteria bag is the density of Fungus Bacteria bag. The density also plays a key role in the production of fungus. In this thesis, a Fungus Bacteria bag density detection technology based on image processing technology is designed.
2 Fungus Bacteria Bag Density Detection System The Fungus Bacteria bag density detection system block diagram is shown in Fig. 1.
Fig. 1 Block diagram of the fungus bacteria bag density detection system
2.1 Fungus Bacteria Bag Mass Measurement System The Fungus Bacteria bag mass measurement system is shown in Fig. 2. (1) Pressure detection system: On the measuring panel, the quality of the bacteria package is proportional to the pressure. The higher the pressure, the higher the quality. According to the mass range of the bacteria package, we choose the DYHW-3 pressure sensor. The external dimensions are shown in Fig. 3, D = 30 MM. Measurement accuracy ± 0.1 g%, working voltage: DC 24 V.
Fungus Bacteria Bag Density Detection System …
1165
Fig. 2 Fungus bacteria bag quality inspection system block diagram
Fig. 3 Pressure sensor outline drawing
(2) Limiting digital filtering: According to experience, the pressure sensor detects the approximate value of the quality of the fungus, and determines the maximum deviation value of the two detections (set to A). Each time a new value is detected, it is judged: if the difference between this value and the previous value is A, the current value is invalid. The current value is discarded and replaced with the last value. The advantage of the limited digital filtering method is that it can effectively overcome the pulse interference caused by accidental factors. The disadvantage is that it can not suppress the periodic interference and smooth the line difference [3].
2.2 Digital Image Processing Technology Digital image processing is an emerging technology. With the development of computer hardware, real-time processing of digital images has become possible. Due to the emergence of various algorithms for digital image processing, the processing speed is getting faster and faster, and it is better for people. service. Digital image processing is a technique for processing graphic images by a computer using a certain algorithm. Digital image processing technology has been widely used in various fields [4–6]. (1) Image measuring system: The image measuring system is mainly composed of a lighting system, a CCD camera, an image acquisition card, a computer, and corresponding image processing software, as shown in Fig. 4. The specific working process is that the CCD camera captures the image of the bacteria package before the controlled bacteria package is placed under the controllable
1166
C. Mao et al.
Fig. 4 Image measurement system block diagram
background of the uniform illumination as possible, and the image data is collected into the computer memory through the image card, and the developed bacteria package image is utilized. The processing and measurement software realizes the measurement of the geometric parameters of the bacteria package, and finally the measurement result is output by the corresponding output device.
2.3 Image Processing (1) Pressure detection system: Since noise is inevitably present in the image, noise must be filtered out during image preprocessing [7]. Median filtering is a better nonlinear filtering method, which can effectively keep the outline of the image clear while removing image noise. Let G(x, y) denote the gray value of the original image at (x, y), choose N × N square window (N generally takes 3 or 5), F(x, y) denotes the filtered image at (The gray value at x, y), Med{} means to find the median value of the window, then the output of the median filter can be expressed as [8, 9]: F(i,j) = Med{G(x + n,y + m)(1 − N)/2 ≤ n, m ≤(N − 1)/2}
(1)
(2) Binary image: The binary method is a simple and effective image segmentation method. It uses one or several thresholds to divide the gray level of an image into several parts, and considers that the pixels belonging to the same part are the same object. In the image of the bacteria package, there is only one target and background, and the gray distribution of the target and the background is relatively uniform. Therefore, a certain threshold T can be selected to divide the pixels of the image into pixel groups (targets) larger than T and pixels smaller than T. Group (background) two parts. Let B(x, y) denote the output of the image binarization, i.e.: B(x, y) =
1 F(x, y) > T ··· 0 F(x, y) ≤ T
(2)
Here, image binarization sets the gray value of the target point to 1, and the gray value of the background point to 0. The calculation method of the threshold T generally includes a P-tile method, a bimodal method, an Otsu method, a minimum error method, and a maximum entropy method.
Fungus Bacteria Bag Density Detection System …
1167
(3) Edge contour extraction: There are many algorithms for image edge extraction. Commonly used are edge operator detection, edge tracking and mathematical morphology [10–12]. In this paper, using the four-neighbor corrosion in the mathematical morphology method, we can get the image edge E(x, y) of a single pixel width, namely: IF B(x,y - 1) = 1 and B(x, y + 1) = 1 and B(x - 1, y) = 1 and B(x + 1, y) = 1 THEN E(x, y) = 0 ELSE E(x, y) = B(x, y)
(3)
2.4 Measurement of the Geometrical Dimensions of the Bacteria Package (1) Determination of the bottom radius of the bacteria package and the height of the bacteria package: Perform a point-by-point search in the binarized image to find all the pixels with a gray value of 1, which is the target point [13]. The abscissa value xi and the ordinate value yi of all the target points are respectively accumulated, and then divided by the number of pixel points n included in the target as the approximate geometric center (x0, y0) of the bacteria package, and the calculation formula is: Hx =
n
xi
(4)
yi
(5)
i=1
Hy =
n i=1
x0 =
Hx n
(6)
y0 =
Hy n
(7)
(2) The upper method is generally called the center of gravity method. The approximate geometric center calculated by the centroid method is taken as the center of the coordinate, and the pixel points with the gray value of 1 are searched in the edge image along the positive x, negative x and positive y, negative y directions, respectively. The searched point must fall on the bacteria package. On the inner and outer edges (the center hole contour of the bacteria package and the bacteria package profile). First use the four pixel points on the inner edge of the search to determine the approximate radius value of the center hole of the bacteria package (actually one of the points can be used to determine an approximate radius value), where four points are used for approximation
1168
C. Mao et al.
Relatively good, with this radius, the inner and outer edges can be separated to obtain the inner edge pixel point column and the outer edge pixel point column of the bacteria package. For each pixel in the inner edge point column, the pixel that is the farthest from the point in the outer edge point column is the point on the top circle, and the nearest pixel is the point at the bottom edge of the bacteria package. All the farthest points of the obtained bacteria are half of the pixel point column, and all the nearest points are composed of the root circle pixel point column, and the number of pixels included is equal to the number of pixels included in the inner edge. The bottom radius of the bacteria package and the height of the bacteria package were obtained by the circle fitting of the least squares algorithm for the inner edge pixel dot column, the tip circle pixel dot column and the root circle pixel dot column respectively [14]. r=
x02 −2x ◦ x0 + y02 −2y ◦ y0 + x 2 + y 2
(8)
3 Experimental Results and Analysis Table 1 gives a comparison of the measured values of the bacterial pack density with the measured values of the automated system. The experiment uses an image measurement system consisting of a 1280 × 720 × 8 bit CCD camera and a black and white image acquisition card and an industrial control computer. Lighting is illuminated with LED lights. The image of the bacteria package taken after the calibration and calibration of the measurement system is shown in Figs. 5, and 6 is Table 1 Manual measurement and automatic system measurement comparison table Number of parameters
Frequency 1
2
3
4
5
6
Manual measurement
0.758
0.767
0.758
0.766
0.767
0.766
Automatic system measurement
0.747
0.753
0.745
0.777
0.757
0.778
Absolute error
0.011
0.014
0.013
0.011
0.010
0.012
Fig. 5 Original bacteria package phot
Fungus Bacteria Bag Density Detection System …
1169
Fig. 6 Processed image
the edge image output by the original image after median filtering, binarization and four–neighborhood etching. The distance between the CCD camera and the surface of the tested bacteria package was changed. The experimental results of multiple measurements showed that the absolute error of the measured values was less than one pixel. The factors that cause measurement errors are: (1) Error in the hardware system. In theory, the measurem‘ent accuracy of a digital image measuring system depends mainly on the resolution of the CCD camera. That is, the higher the number of pixels of the CCD image pickup apparatus used and the smaller the size of the object to be measured, the smaller the actual size represented by one pixel in the measurement, and the higher the measurement accuracy. In addition, the uneven illumination of the image caused by the shadow unevenness along the edge of the image; the imaging plane of the CCD camera and the surface of the measured part cannot be completely parallel to produce non-parallel measurement error; the lens distortion can not be completely accurately corrected to cause image nonlinearity. Distortion error. The error of the quality measurement of the bacteria package is as long as the measurement accuracy of the pressure sensor and the position of the placement of the bacteria package are positive. (2) The error of the software algorithm. In the measurement algorithm, the center of the center hole of the bacteria package is the basis for the calculation of each geometric parameter, and the center of the center hole of the bacteria package is obtained by fitting the edge point of the center hole and fitting by the least squares method. The algorithm itself has certain error.
4 Conclusion The pressure sensor was used to detect the quality of the bacteria package. The digital image processing technology was used to measure the volume of the bacteria package. The measurement algorithm for measuring the bottom circle radius and the height of the bacteria package was established. The measurement experiment of the bacteria package was carried out using a 1 280 × 720 CCD camera, and the absolute
1170
C. Mao et al.
error was less than 0.015 compared with the manual measurement value. Meet the requirements of the measurement system. Acknowledgements This study was supported by Jilin Province Science and Technology Development Plan Item (No. 20190302045GX), Jilin Provincial Department of Education (No. JJKH20180495KJ), Program for Innovative Research Team of Jilin Engineering Normal University.
References 1. Yu, Yang, et al. 2019. Survival factor 1 contributes to the oxidative stress response and is required for full virulence of Sclerotinia sclerotiorum. Molecular Plant Pathology 20 (7): 895–906. 2. Muhammad, Ayub, et al. 2019. Evaluvation of various biocontrol agents (Plant Extracts) on linear colony growth of the fungus Fusarium Oxysporum causing onion wilt. International Journal Environmental & Agricultural Science 3: 023. 3. BR, SHARATH KUMAR, KUOCHEN WANG, and SHI-MIN SHEN. 2019. Corpus-based topic derivation and timestamp-based popular hashtag prediction in twitter. Journal of Information Science & Engineering 35 (3). 4. Jensen, John R., and Kalmesh Lulla. 1987. Introductory digital image processing: a remote sensing perspective, 65–65. 5. Abràmoff, Michael D., Paulo J. Magalhães, and Sunanda J. Ram. 2004. Image processing with ImageJ. Biophotonics International 11 (7): 36–42. 6. Widodo, S., and M. Kalili. 2018. Quality evaluation of melinjo seeds (Gnetum gnemon L.) using digital image processing. Jurnal Teknik Pertanian Lampung 7 (2): 106–114. 7. Suwannakhun, Sirimonpak, and Patasu Daungmala. 2018. Estimating pig weight with digital image processing using deep learning. In 2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 320–326. IEEE. 8. Gan, Yeouwei, R.A. Hamzah, and NS Nik Anwar. 2019. Local stereo matching algorithm based on pixel difference adjustment, minimum spanning tree and weighted median filter. In 2018 IEEE Conference on Systems, Process and Control (ICSPC). IEEE. 9. Agarwal, Saurabh, and Satish Chand. 2019. A content-adaptive median filtering detection using markov transition probability matrix of pixel intensity residuals. Journal of Applied Security Research, 14 (1): 1–18. 10. Mori, Ken-Ichi, et al. 2018. Design of a local parallel pattern processor for image processing. Special Computer Architectures for Pattern Processing, 197–210. CRC Press 11. Lee, Seung-Jun, Kye-Shin Lee, and Byung-Gyu Kim. 2018. Binary image based fast DoG filter using zero-dimensional convolution and state machine LUTs. The Journal of Multimedia Information System 5 (2): 131–138. 12. Zhang, Fang, et al. 2019. Reversible data hiding in binary images based on image magnification. Multimedia Tools and Applications, 1–25. 13. Dubey, Shiv Ram, Satish Kumar Singh, and Rajat Kumar Singh. 2016. Multichannel decoded local binary patterns for content-based image retrieval. IEEE Transactions on Image Processing 25 (9): 4018–4032. 14. Mohan, V.M., R.K. Durga, S. Devathi et al. 2016. Image processing representation using binary image; grayscale, color image, and histogram. In Proceedings of the Second International Conference on Computer and Communication Technologies, pp. 353–361. Springer, New Delhi.
Application of Information Technology in Clinical Education Na Wang, Qitong He, Rui Wang and Qun Li
Abstract Purpose: This paper expounds the advantages of applying information technology to optimize the teaching effect of clinical medicine, analyzes the problems existing in the optimization of clinical medicine classroom teaching. Methods: The medical teaching purpose is to cultivate the international excellent medical talents. The technology research of medical education should be on the base of scientific planning, practical application, associated with the basic concept of innovation. Results: This paper presents an ultimate targeted education informationization, which points to the development of the people and cultivates people-oriented thoughts throughout the course of information construction of the university. Conclusion: It probes into the strategies of using information technology in classroom teaching, so as to improve the teaching efficiency and teaching quality. Keywords Information technology · Clinical education · Medicine · Teaching ability
N. Wang Department of Anesthesiology First Hospital, Jilin University of Changchun, Changchun, China e-mail: [email protected] Q. He Department of Gastrointestinal Surgery First Hospital, Jilin University of Changchun, Changchun, China e-mail: [email protected] R. Wang Department of Computer Science, Jilin Business and Technology College of Changchun, Changchun, China e-mail: [email protected] Q. Li (B) Department of Thyroid Surgery First Hospital, Jilin University of Changchun, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_137
1171
1172
N. Wang et al.
1 Introduction Medical education must be implemented on the base of the network and simulation technology. In addition to medical discipline itself, the current medical education faces several specific problems [1]. First of all, from a legal point of view, the patients can’t be treated as a learning tool. Secondly, from the perspective of time, operational details of learning often become a problem, no time to think about the basis of each operation [2]. Thirdly, from the perspective of risk, no mistakes are allowed in clinical work, which limits the accumulation of experience and the maturity of students’ clinical thinking. According to the last point and the perspective of talent demand, the practice environment of medicine is bad, hospitals and departments need experienced intern doctors [3]. Therefore, medical education and simulation teaching with the help of educational technology are very necessary and important. It not only helps to solve the above problems, but also maximizes the quality of medical teaching. Information technology has been integrated into medical education and is inseparable from medical education [4].
2 Suggestions 2.1 Comprehensive Integration of Teaching Informatization and Teaching Process • Cultivating concept of students’ lifelong learning. At present, all the public and basic medical courses in the school have realized the course network, and follow the principle of information technology enters the classroom and teaching goes out of the classroom. Teachers’ teaching methods and teaching methods have been greatly changed, with more emphasis on the application of heuristic, inquiry-based, discussion and participatory teaching methods and means [5]. Learners can carry out lifelong, multi-aspect and on-demand learning activities. Driven by the development of new media technology, the construction of mobile learning environment enables students to access teaching and learning resources on international platforms anytime and anywhere, which not only changes students’ learning methods, but also broadens students’ international vision [6, 7]. • At present, the three-semester system is widely implemented, and one of its purposes is to strengthen practical teaching. The school has built virtual anatomy, functional laboratory, digital simulation laboratory, digital clinical synchronous teaching imaging laboratory [8]. The synchronous teaching imaging laboratory is also connected with the PACS of the hospital to transmit the latest clinical imaging information of the hospital to the teaching laboratory in real time. Students can independently read the videos online, making the teaching process closer to medical practice. A clinical teaching simulation center was established to carry out simulation teaching [9]. The series of audio-visual teaching materials for simulated
Application of Information Technology in Clinical Education
1173
human operation training, teaching materials for expert clinical demonstration teaching, and teaching materials for clinical teacher training have improved the clinical skills and operational ability of medical students, as well as their clinical comprehensive diagnosis thinking ability [10]. • Cultivation of medical students’ professional ethics. Through information technology, the school has implemented a series of measures to help medical students to cultivate their characteristics [11]. From the entrance education, military education, education theory and practice of medical ethics, both inside and outside classroom lecture, all kinds of cases, all kinds of aspects such as manpower, the use of information technology to store high quality teaching resources, formed the medical ethics of network with Chinese characteristic curriculum system, through the network learning, improve students’ comprehensive quality [12]. • Improvement of teachers’ ability. Emphasis should be placed on the re-cultivation of teachers, and the development of teachers’ information literacy should be promoted through strengthening training, cooperation and exchange, and projectdriven development. In terms of the cultivation of clinical teachers and threedimensional teaching construction, the teaching enthusiasm, teaching consciousness and teaching ability of teachers in the teaching base can be improved by using educational technology to assist traditional teaching methods, so as to ensure the quality of medical students’ practice teaching [13].
2.2 Stimulation of Students’ Interest in Learning First of all, classroom teaching should make students feel that there is fun in learning and focus on the cultivation of interest. Creating a classroom teaching and learning atmosphere with strong interest is the premise and guarantee to attract students to participate [14]. Information technology chart, text, sound, like together, the Internet provide very rich that is associated with clinical medical disciplines knowledge of extra-curricular knowledge, a variety of software for clinical teachers’ teaching resources and stimulating the enthusiasm of students’ learning initiative and inspiration, teachers in the classroom teaching can make use of the powerful features of the multimedia resources, enhance classroom novelty, will discipline teaching content to show the vivid way [15]. Before students, teaching model of creating teaching situation to activate students’ background knowledge and interest in learning can’t only fully arouse the enthusiasm of students, but also let students mastery of knowledge is more intuitive, tightly solid, so that the students in the vivid, illustrated, movement and lining affection experience the fun of learning in the scene, active participation in the pleasure of learning atmosphere and teaching activities, mobilize the students’ senses, guides the student to freedom, and the main development, to achieve the purpose of improving teaching quality, optimizing the teaching [16].
1174
N. Wang et al.
3 Problems and Analysis of the Application of Information Technology in Clinical Teaching 3.1 Ignorance of Students’ Initiative In the teaching activities in the process of using information technology organizations, almost all of the clinical teachers are in the classroom teaching activities before the courseware design, in the teaching process, to use dynamic view of the development of the classroom teaching, this kind of behavior in the teaching situation, just according to the mechanical teaching courseware content is set in advance, it is difficult to synthesis [17]. Considering the learning situation of students, ignoring the students’ ability to accept and learning enthusiasm is discouraging. The activities of the whole class are limited by the courseware. In the process of teaching, there is little interaction between teachers and students, and there is a lack of effective measures to cultivate students’ creativity, self-learning ability and personality development, which will directly affect clinical medical students’ understanding and mastering of the basic theoretical knowledge and clinical operation skills of the subject. In this case, instead of giving full play to its own advantages, information-based teaching will rigidly limit students and limit teaching contents with pre-set goals, which is not conducive to deeper teaching exploration by teachers and students [18]. The role of information technology in teaching is to apply modern technical means to stimulate and mobilize students’ positive thinking. Teachers and students have a good interaction, and the initiative of students is got attention, so that there is a life of learning vitality.
3.2 Improvement of Clinical Teachers’ Information Literacy The reasonable application of information technology in classroom teaching depends on the recognition and participation of teachers and students. It is very important to improve the information literacy of both teachers and students. In clinical teaching, most young teachers are skilled in the operation and application of information technology and can recognize the importance of multimedia technology in teaching. From the perspective of practical teaching application, this consensus can’t be translated into teaching behavior, so the teaching information processing ability is limited [19]. However, due to their weak awareness of information, many older teachers can’t make good use of it. By using computer and simulation software to simulate the experimental environment and process, a clinical teaching simulation center based on audio video technology, satellite communication technology, computer multimedia technology and network technology was established. To form a clinical experiment, intelligent simulation of patients, standardized patients and clinical practice and other clinical
Application of Information Technology in Clinical Education
1175
skills training unity. Strengthening practical teaching and paying attention to application is necessary. More than half of the courses in medical education are conducted in experiments and practices.
3.3 Construction of Teaching Network Resources Construction of network teaching resources gives full play to the high-quality clinical medical education resources. Online teaching resources construction plays an important role in the clinical medicine teaching effect and information technology optimization. The builders of required resources use the various functions of information construction in the knowledge information and provide students with a more help to build your own personality and psychological characteristics of the teaching of knowledge [16]. For teachers, they also need to collect information through network resources and distribute it to students to prepare questions and assign homework. The examination system is also gradually promoted on the base of the network, and the school has gradually formed a set of student self-assessment system. In order to promote the development of students, efforts should be made to build a diversified learning environment, strengthen the construction of informal learning space, and make learning no longer limited to schools and classrooms. Adhering to the student-centered point, the school actively carries out PBL, TBL and CBL teaching to encourage students to take the initiative to learn. In the course teaching, students are required to learn independently based on the problems, tasks and cases assigned by teachers in advance [19]. With the help of the network and information platform, students can master relevant learning resources before teaching. After class, teachers should raise questions online for extension of learning.
4 Conclusion With the implementation of the teaching quality reform project, the integration of information technology and curriculum has become an irresistible trend in the field of education reform. According to the above analysis, it is believed that the integration of information technology and curriculum should be on the base of the actual situation of the curriculum, so that the integration of information technology and curriculum can’t overstate the role of information technology, or ignore the reasonable application of information technology. In the integration of information technology and curriculum, we should pay attention to improve the relationship of teachers and students and the application level of information technology. While strengthening the construction of high-quality teaching resources, colleges and universities should establish a set of
1176
N. Wang et al.
corresponding incentive mechanism for the construction and sharing of resources, and link the construction effect of high-quality teaching resources with teachers’ bonuses and evaluation, so as to guarantee the quality of teaching resources. Acknowledgements This research was financially supported by the First Hospital of Jilin University.
References 1. Stansbury, Meris. 2012. A first-hand look inside a flipped classroom. http://www.eschoolnews. com/2012/02/09/a-first-hand-look-inside-a-flipped-classroom/. 2. Williamson, B. 2013. The future of the curriculum: School knowledge in the digital age. 3. Koehler, M.J., and Mishra, P. 2009. What is technological pedagogical content knowledge? Contemporary Issues in Technology and Teacher Education 9 (1): 60–70. 4. Voss, Joel L, Brian D. Gonsalves, Kara D. Federmeier, Daniel Tranel, and Neal J. Cohen. 2010. Hippocampal brain-network coordination during volitional exploratory behavior enhances learning. Nature Neuroscience. 5. Musallam, Ramsey. 2012. Should you flip your classroom? http://www.edutopia.org/blog/ flipped-classroom-ramsey-musallam. 6. Dunn, Jeff. 2013. Survey results: 67% educators report flipped classroom improves test scores. British Journal of Educational Technology (4). 7. R., Talbert. 2012. Inverting the linear algebra classroom. http://prezi.com/dz0rbkpy6tam/ invering-the-linear-algebra-classroom. 8. J., Gerstein. 2011. The flipped classroom model: A full picture. http://usergenerateduducation. word-press.com/2011/06/13/the-flipped-classroom-model-a-full-picture. 9. Shih, Ru-Chu, Chunyi Lee, and Tsai-Feng Cheng. 2015. Effects of english spelling learning experience through a mobile LINE APP for college students. Procedia—Social and Behavioral Sciences 174: 2634–2638. 10. Vandeyar, Thirusellvan. 2015. Policy intermediaries and the reform of e–education in South Africa. British Journal of Educational Technology 46 (2): 344–359. 11. Ay, Yusuf, Engin Karada, and M. Bahaddin Acat. 2015. The technological pedagogical content knowledge-practical (TPACK-Practical) model: Examination of its validity in the Turkish culture via structural equation modeling. Computers & Education 88: 97–108. 12. Ting, Ya, and Carolyn Yang. 2015. Virtual CEOs: A blended approach to digital gaming for enhancing higher order thinking and academic achievement among vocational high school students. Computers & Education 81: 281–295. 13. Margaryan, Anoush, Manuela Bianco, and Allison Littlejohn. 2015. Instructional quality of massive open online courses (MOOCs). Computers & Education 80: 77–83. 14. Wu, Wen-Chi Vivian, Emily Petit, and Ching-Huei Chen. 2015. EFL writing revision with blind expert and peer review using a CMC open forum. Computer Assisted Language Learning 28 (1): 58–80. 15. Cho, Hyesun. 2016. Under co-construction: An online community of practice for bilingual pre-service teachers. Computers & Education 92: 76–89. 16. Yaghoobi, Mehdi, and Ayatollah Razmjoo. 2016. The potentiality of computer-assisted instruction towards ameliorating iranian EFL learners’ reading level. Computers in Human Behavior 59: 108–114. 17. Whyte, Shona, Euline Cutrim Schmid, Sanderin van Hazebrouck Thompson, and Margret Oberhofer. 2014. Open educational resources for CALL teacher education: the iTILT interactive whiteboard project. Computer Assisted Language Learning 27 (2): 122–148.
Application of Information Technology in Clinical Education
1177
18. Cheung, Alan C.K., and Robert E. Slavin. 2013. The effectiveness of educational technology applications for enhancing mathematics achievement in K-12 classrooms: A meta-analysis. Educational Research Review 9: 88–113. 19. Roblyer, M.D., Jack Edwards, and Mary Anne Havriluk. 2009. Integrating educational technology into Teaching.
Optimization of Fermentation Medium of Camphor Lucidum Based on Artificial Neural Network and Genetic Algorithm Ming Zheng and Haixiao Gong
Abstract The complex fermentation process of medicinal filamentous fungus Cinnamomum camphora was modeled by optimization model, and the optimal fermentation medium composition was obtained. The morphological changes in the fermentation process of Anoderma camphora were observed. Artificial neural network (ANN) and response surface methodology (RSM) were used to model the fermentation process of Anoderma camphora, and genetic algorithm (GA) was used to optimize the composition of fermentation medium. The results showed that the ANN model had better fitting ability and predictive ability than RSM model, and the theoretical maximum value of biomass of Cinnamomum camphora was 6.2 g/L by GA algorithm. The optimization method based on ANN-GA can be used to optimize the complex fermentation process of other filamentous fungi to obtain biomass or active metabolites. Keywords Anoderma camphora · Artificial neural network · Response surface method · Genetic algorithms
1 Introduction Cinnamomum camphora [1], also known as Camphor Mushroom and Cinnamomum camphora, is a medicinal filamentous [2] fungus growing on the rotten inner wall of Camphor Tree in Taiwan. Studies have shown that Cinnamomum camphora has good biological activities such as anti-tumor, liver protection, anti-inflammation, immune regulation and so on [3]. Because the natural yield of Camphor Zhi is very low and the artificial cultivation technology of fruiting body has not been industrialized, the fruiting body of Camphor Zhi is very expensive in recent years. So the main method M. Zheng · H. Gong (B) Guangxi Colleges and Universities Key Laboratory of Professional Software Technology, Wuzhou University, Wuzhou, China e-mail: [email protected] M. Zheng e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_138
1179
1180
M. Zheng and H. Gong
to obtain fermentation products of Camphor Zhi by liquid culture with biotechnology is at present. Some scholars have optimized the fermentation conditions of Cinnamomum camphora with biomass or yield of active substances as indicators, but the fermentation conditions and yield characteristics of Cinnamomum camphora reported in different studies are quite different. The differences of fermentation scale, strains and inoculation methods, fermentation conditions and fermentation process control strategies may be the main reasons for the obvious differences in different research results. The fermentation process of filamentous fungi is characterized by many factors, high nonlinearity and complexity. Artificial neural network (ANN) [4, 5] provides a powerful solution for the study of non-linear problems. Unlike the regression equation, which requires a pre-defined function, ANN is a mathematical model which reflects the intrinsic relationship of experimental data and has strong non-linear processing ability. Genetic algorithm (GA) [6] is a global optimization algorithm based on natural selection and population evolution mechanism. GA can train ANN model globally and finally get the best scheme. ANN-GA [7] technology has been applied in many industries, such as fault diagnosis, biological behavior imitation, wastewater treatment and so on, but it has not been reported in the field of filamentous edible fungi fermentation. In this study, the spore germination, growth and sphere formation of the model strain of Anoderma camphora [3] were studied. Meanwhile, the effect of spore concentration medium composition on the biomass of C. camphora was investigated by rotating center combination design (RCCD) [8]. The effects of ANN and Reflection surface method (RSM) [9] on the modeling of the fermentation process of Anoderma camphora were further compared, and the ANN model was optimized by GA to obtain the optimum medium composition [10].
2 Materials and Methods Inclined medium: potato, glucose, agar. Fermentation medium: Glucose concentration, peptone concentration and soybean flour concentration according to experimental design values. Preparation of spore inoculum: The mycelium of Anoderma camphora was transferred from inclined plane to flat plate with inoculation shovel and cultured for 21 days. 10 mL aseptic fermentation medium was used to wash the spores on the plate, count and dilute the spores on the blood cell counter plate, and then used as seed liquid for fermentation experiment. Fermentation method: 500 mL triangular flask was filled with 100 mL fermentation medium. After sterilization, a certain number of Camphor Spores were added and cultured for 8 days at 100 r/min and 26 degrees. The fermentation product of Camphor lucidum was filtered with 6 layers of gauze to get the bacterial ball. After washing with deionized water, it was freeze-dried, weighed and calculated the biomass. Previous single factor experiments showed that carbon source, nitrogen source, C/N ratio and spore inoculation concentration were significant factors affecting the
Optimization of Fermentation Medium of Camphor …
1181
biomass of C. camphora. In order to determine the optimum medium composition for the fermentation of Camphor lucidum, four factors and three levels of revolving center combination experiment design was selected in this experiment. By fitting quadratic polynomial equation with least square method, quadratic regression model is established as Eq. (1): Y = β0 +
4 i=1
βi X i +
4 i< j=1
Xi X j +
4
βii X i2
(1)
i=1
Previous single factor experiments showed that carbon source, nitrogen source, C/N ratio and spore inoculation concentration were significant factors affecting the biomass of C. camphora. In order to determine the optimum medium composition for the fermentation of Anoderma camphora, four factors and three levels of rotating center combination design was used in this experiment. Among them, Y is the response value (biomass), beta 0, beta i, beta iii and beta ij are the coefficients of the equation, and Xi and Xj are the coded values of independent variables. The fitting accuracy and generalization ability of polynomial model equation are characterized by regression coefficient R2. In this experiment, four factors, spore concentration, glucose content, peptone content and soybean flour content, were simulated by ANN in the range of their respective values by floating-point coding, and the fitted value of the model was used as the adaptive function of genetic algorithm to select, mutate and exchange. The higher the biomass, the higher the adaptability. The program is written by MATLAB 7.6 software and its attached GA genetic algorithm toolbox.
3 Results and Analysis The morphological changes of spores, mycelia, mycelia and spheres during the fermentation of Camphor lucidum and the inhomogeneity of the spheres all explain the complexity of the fermentation system of Camphor lucidum. A non-linear processing tool is needed to model the fermentation process of Camphor lucidum. The experimental data are used as training samples of the neural network. The results of the neural network are designed according to the number of experimental factors and the number of optimization indicators. Then the neural network is trained with the experimental data. In order to prevent over-fitting, the number of hidden layer nodes is as small as possible when the training accuracy is satisfied. The number of hidden layer nodes selected in this experiment is 6. The experimental results show that the sample training can converge quickly. The fitting degree between the simulation results and the experimental values is good, and the relative error between them is less than 5%. This shows that the established neural network has good performance and no training samples need to be added. The model does not need to give a function beforehand as regression equation does, but a mathematical model reflecting the internal relationship of experimental data
1182
M. Zheng and H. Gong
Fig. 1 The result of the algorithm proposed in the paper
obtained by finite iteration based on experimental data, which has strong non-linear processing ability. Therefore, the ANN model is finally used as a moderate value function for GA optimization to find the best combination of various factors. Genetic algorithm is a random search algorithm based on natural selection and population evolution. It has been applied in many fields with its advantages of high efficiency, self-adaptation and global search. It has a wide range of searches and fast searching speed. The results obtained can approach the global optimal solution with a more probable rate. It shows that the medium composition predicted by ANN-GA has a good experimental effect as Fig. 1.
4 Conclusion The diversity of morphological changes in the growth process of Anoderma camphora illustrates the complexity and nonlinearity of its fermentation process. In the system studied in this paper, the relationship between the fermentation medium and biomass of Camphor lucidum was successfully described, and the optimal biomass and medium formulation were predicted by this model. ANN-GA method can not only effectively improve biomass and significantly reduce the cost of culture medium, but also greatly reduce the tedious experimental workload and shorten the research cycle. It also provides a method for optimizing the complex non-linear fermentation process of other filamentous fungi.
Optimization of Fermentation Medium of Camphor …
1183
Acknowledgements This work was supported by grants from The National Natural Science Foundation of China (No. 61862056), the Guangxi Natural Science Foundation (No. 2017GXNSFAA198148) foundation of Wuzhou University(No.2017B001) and Guangxi Colleges and Universities Key Laboratory of Professional Software Technology, Wuzhou University.
References 1. HSEU, Y.-C., G.-R. CHANG, J.-Y. PAN, et al. 2019. Antrodia camphorata inhibits epithelialto-mesenchymal transition by targeting multiple pathways in triple-negative breast cancers. Journal of Cellular Physiology 234 (4): 4125–4139. 2. BADALYAN, S.M., O.S. SISIKHUEMHEN, and N.G. GHARIBYAN. 2008. Antagonistic/antifungal activities of medicinal mushroom Pleurotus tuberregium (Fr.) singer (agaricomycetideae) against selected filamentous fungi. International Journal of Medicinal Mushrooms 10 (2): 155–162. 3. Ma, X., Z. Hu, J. Mao, et al. 2019. Synthesis of cocoa butter substitutes from Cinnamomum camphora seed oil and fully hydrogenated palm oil by enzymatic interesterification. Journal of Food Science and Technology-Mysore 56 (2): 835–845. 4. Baertschi, P., C. Galloni, C. Lange, et al. 2019. Reconstruction of tau lepton pair invariant mass using an artificial neural network. Nuclear Instruments & Methods in Physics Research Section a-Accelerators Spectrometers Detectors and Associated Equipment 929: 29–33. 5. Kim, Z., Y. Shin, J. Yu, et al. 2019. Development of NOx removal process for LNG evaporation system: Comparative assessment between response surface methodology (RSM) and artificial neural network (ANN). Journal of Industrial and Engineering Chemistry 74: 136–147. 6. Pereira, R., and L. Aelenei. 2019. Optimization assessment of the energy performance of a BIPV/T-PCM system using genetic algorithms. Renewable Energy 137: 157–166. 7. Unni, S., A.A. Prabhu, R. Pandey, et al. 2019. Artificial neural network-genetic algorithm (ANN-GA) based medium optimization for the production of human interferon gamma (hIFNgamma) in Kluyveromyces lactis cell factory. Canadian Journal of Chemical Engineering 97 (4): 843–858. 8. Kim, J.Y., and W.H. Lee. 2019. Walking simulation for VR game character using remote sensoring device based on AHRS-motion recognition. Ieee Access 7: 19423–19434. 9. Bloot, R., T.A. Coimbra, J.H. Faccipieri, et al. 2018. Common-reflection-surface method in weakly anisotropic vertical transverse isotropic media. Geophysics 83 (3): C99–C113. 10. Eswari, J.S., M. Anand, and C. Venkateswarlu. 2016. Optimum culture medium composition for lipopeptide production by Bacillus subtilis using response surface model-based ant colony optimization. Sadhana-Academy Proceedings in Engineering Sciences 41 (1): 55–65.
Design and Implementation of Speech Recognition System Based on Gesture Control Zuliang Wang, Chuangle Cao and Suying Zhang
Abstract Gesture is a basic human characteristic and an indispensable part of interpersonal communication. Gesture recognition voice playback system is designed for deaf and mute people, which can help them communicate with normal people more conveniently. The system is divided into hardware part and software part. The hardware part includes data acquisition and analysis. The raspberry pie system is adopted. The raspberry pie system mainly includes three hardware modules: camera module, wireless network card module and serial communication module. The software part uses Python language to program the raspberry pie, and PyCharm is used as the programming software. The gestures made by deaf-mute people can be converted into text information through this system and displayed on the display screen. At the same time, the voice can be played, so that the normal people and deaf-mute people can understand each other. The experimental results show that the speech recognition system based on gesture control can achieve the function of gesture acquisition, and can play gesture information through loudspeakers, and display gesture information on the screen, which provides a convenient communication between deaf and mute people and normal people. Keywords Gesture recognition · Camera module · Voice playback · Serial communication
1 Introduction With the development of science and technology, the application of gesture recognition technology has gradually penetrated into people’s daily life, and gesture recognition technology is now one of the hot research directions [1]. In addition, the in-depth study of gesture recognition is of great significance. In real life, the deaf-mute can only communicate with others by gesture language. In order to help the deaf-mute and normal people communicate better, the gesture information of the deaf-mute can Z. Wang (B) · C. Cao · S. Zhang Xijing University, Xi’an Shaanxi 710123, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_139
1185
1186
Z. Wang et al.
be displayed or broadcast in real time, so that the normal people can easily understand what they want to express, which is of great significance to society [2]. In China, gesture recognition research mainly lies in universities and colleges. Some professors of Tsinghua University have proposed a new method of motion estimation based on motion segmentation, which can realize the experimental system of online recognition of more than a dozen gestures and the recognition rate is more than 90%. This method can unify the movement track and shape of gesture for gesture recognition, and they also use relevant algorithms and professional matching for real-time gesture recognition. For static gesture, the camera can detect and recognize gesture in real time or through existing video to recognize gesture [3]. After that, a more advanced optical flow matching method is used to recognize the dynamic gesture [4]. The experimental gesture recognition rate is relatively high, but it still needs to be improved.
2 Basic Principles of Speech Recognition System Based on Gesture Control 2.1 System Hardware Circuit Design The system is mainly divided into three parts: data acquisition part, gesture detection; data processing part, reasonable analysis of the collected data, get a correct gesture meaning; voice and display part, voice playback of the recognized gesture meaning and display the recognized gesture meaning on the display screen. The system schematic diagram is shown in Fig. 1.
2.1.1
Data Acquisition Section
Image acquisition is to record gestures within the visual range of the camera by using an external USB camera. Gesture localization is to scan the image in rows and columns [5, 6]. The preprocessed images are all gray images. The region of gesture is determined by scanning, and the detection range is determined by gesture in the image. Gesture analysis is to determine the area of visual gesture accurately by gray stretching, gray scale, edge and other processing methods after the gesture part of the image is framed out.
Design and Implementation of Speech Recognition … Data acquisition
1187 Data processing get gestures
image acquisition gesture recognition gesture localization
huodeshouGesture analysis
voice announcements
text display
Fig. 1 System schematic diagram
2.1.2
Data Processing Section
Gesture recognition is to extract the features of the analyzed gestures, and then match the reference gesture forms and meanings defined in the database template to identify the input gesture images and determine their meanings. The collected data are retrieved, the effective data are selected, and the corresponding expression meanings are matched according to the different gestures, and the results are obtained.
2.1.3
Voice and Display Part
The image information collected by hardware devices and cameras will be transmitted to the real-time display screen, in order to display the text information on the display screen to the people who need it [7–9]. The other part is to play the voice, through the speaker of the voice module to play out the content of text display, that is, the corresponding meaning of gestures [10–12].
2.2 System Software Design The system uses raspberry pie module, which is mainly the data processing part, including the acquisition and analysis of gesture data [13]. Firstly, the color image is converted into gray image, and then the resolution is changed to 128*128. Then,
1188
Z. Wang et al.
the neural network is designed. The input layer of the neural network is 128*128 matrix, and the output layer is 1*7 matrix. The hidden layer is divided into three layers: 2000-dimensional matrix, 1500-dimensional matrix and 1000-dimensional matrix [14, 15]. Next, we need to train the neural network. After training, we input the image from the camera to the neural network for recognition.
3 Training Results and Analysis of Neural Network 3.1 Training Process of Neural Networks Results After configuring the neural network model, the neural network is trained, as shown in Fig. 2. From the training results, it can be seen that after 1900 training sessions, the correct rate reached 90%. Fig. 2 Training results of neural networks
Design and Implementation of Speech Recognition …
1189
Fig. 3 Experimental results
3.2 Results and Analysis Start the raspberry pie, connect each part to the corresponding interface, and use the camera to detect and identify the range and gesture, which is displayed on the screen. The experimental results are shown in Fig. 3. In Fig. 3 the gesture information gesture shape B and C are detected, and the gesture meaning is displayed in the upper left corner of the screen, and the corresponding voice playback is performed.
4 Conclusions The system trains and stores the collected gesture information through the method of neural network training, compares the real-time collected gesture information with the stored information, identifies the corresponding gesture information, and carries out voice broadcast and display, which facilitates the communication between deaf and mute people. The experimental results show that the accuracy of the system reaches more than 90% and has a good application price. value. Acknowledgements This study was funded by Key Research and Development Plan Project of Shaanxi Provincial Science & Technology Department (Program No. 2018ZDXM-NY-014).
References 1. Xiujuan, Chai, and Wang Kongqiao. 2016. Gesture recognition based on partial local texture description. High-tech Communication 20 (5): 487–492. 2. Hua, Liu, Tian Zhansheng, and Feng Yufei. 2018. Intelligent home voice control system based on raspberry pie. Manufacturing Automation 40 (10): 128–131.
1190
Z. Wang et al.
3. Gaofeng, Chen Xiong, and Chen Wanqiu. 2016. Video detection and tracking system based on raspberry B + microprocessor. Television Technology 39 (19): 105–108. 4. Youshu, Hu. 2015. Summary of gesture recognition technology. China Science and Technology Information 1 (2): 41–42. 5. Bo, Yuan, and Cha Chendong. 2018. Current situation and prospect of gesture recognition technology. Scientific and Technological Innovation 32 (09): 22–26. 6. Zhensen, Gao, Wang Lei, Meng Fanqiang, and Liu Mingmin. 2018. Gesture recognition system based on FDC2214 capacitance sensor. Electronic Technology 10 (21): 65–71. 7. Yuheng, Luo, Wang Yang, and Liu Wei. 2018. A non-contact gesture recognition device. Science and Technology and Innovation 21 (10): 15–18. 8. Ziyang, Liu, Liu Zhongfu, Zhao Hongyu, Liu Guanchu, Guo Xin, and Wu Yi. 2018. Intelligent old and disabled assistance system based on speech and gesture control. Shanxi Electronic Technology 15 (05): 25–28. 9. Xiaoyan, Zhou. 2018. Research on gesture recognition algorithm for interactive teaching interface, 12–19. Jinan: Jinan University. 10. Wan, Zhou. 2016. Acoustic modeling of speech recognition based on deep neural network, 04–13. Anhui: China University of Science and Technology. 11. Talking about genealogy. 2016. Application of gesture recognition and human-computer interaction based on fingertip information, 11–21. Beijing Jiaotong University. 12. Xuewen, Yang. 2015. Research on real-time search method of user basic gestures oriented to interactive semantics, 23–26. Jinan: Jinan University. 13. Chao, Wang. 2016. Interactive gestures for mobile applications, 10–15. Beijing: Beijing Institute of Fashion. 14. Jiasheng, Yu. Application of gesture recognition technology in software. Electronic technology in software. 15. A Study of Shi Mengchu. 2017. Python Language. China New Communications 22 (07): 24–28.
Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective Yuzhong Liu, Zhiqiang Lin, Li Li, Hualiang Li and Yali Shen
Abstract The article gives an overview of effects occurred with extremely low frequency electromagnetic fields(ELF-EMF) exposure in an informationalized perspective and concludes that reasonable suspicion of any health consequences does not exist based on current evidence of effects at ambient relevant levels, with which, limited exposures regulated by national safety standards and guidelines for habitable areas adjacent to all power lines may not reasonably be presumed to result in relevant adverse impacts and calls for additional multiple effects detecting means of informational techniques. And all special precautions and protective measures should be taken into action to reduce the exposure to electromagnetic fields in aspects of both intensity and frequency as low as reasonably attainable, no matter the effects of electromagnetic fields be as trivial as reasonably negligible. Traditional detecting means show that concrete evidence of electromagnetic fields pathophysiology such as chemical, morphological, and electrical alterations remains uncertain. Nevertheless, in the present information era, mankind is exposed to exceedingly multiple surrounding threats simultaneously, e.g., varied electromagnetic fields and air pollutants, and each combination or the stand-alone risk could potentially have beneficial or harmful effects, thus the definite evidence is far from been founded unless more detailed and large population based trials are to be done and multiple effects detecting means of informational techniques such as image recognition, speech recognition and motion recognition are to be further studied and deployed. Keywords Electromagnetic fields · Extremely low frequency electromagnetic fields · Radiofrequency electromagnetic fields · Power lines
Y. Liu (B) · L. Li · H. Li · Y. Shen Electric Power Research Institute of Guangdong Power Grid Corporation, Guangzhou, China e-mail: [email protected] Z. Lin Jingzhou Central Hospital, Jingzhou, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_140
1191
1192
Y. Liu et al.
1 Introduction With the booming development of economy and informatization, the demands of various kinds of power equipment are on the increase day by day with the power load mounting up rapidly, and the scale of the power grid expands to large scale, high-voltage transmission lines and substations come into being more and more often. The alternating electromagnetic field generated by high voltage, ultra-high voltage transmission and distribution lines, substations and power transformers will give rise to electromagnetic environment in the near field. The electromagnetic environment is the sum of all electromagnetic phenomena that exist in a given place, including natural and man-made, active (direct) and passive (reflected), static and dynamic ones, and consists of electric and magnetic fields of different frequencies. Changing electric and magnetic fields travel alternately in space. When the frequency is greater than 100 kHz, electromagnetic waves travel out of the conductor through the space in which electromagnetic energy is named electromagnetic radiation. When the intensity of electromagnetic radiation exceeds the allowable range, electromagnetic radiation pollution is formed.
1.1 Research on Effects of Electromagnetic Field Exposure The Disputes and conflicts over whether exposure to various types of electromagnetic fields is likely to have adverse health effects have had significant economic consequences in some countries, and the United States alone spent about $1 billion a year in the 1990s to address EMF related health problems. As a specialized agency for global public health affairs under the United Nations, in May 1996 World Health Organization established an international project involving more than 60 countries and 11 international authoritative organizations, focusing on the comprehensive assessment of health risks of electromagnetic environment [1]. The project is the “International Electromagnetic Field Project”, brought together various countries around the world and a large number of international organizations and research institutions, of which all the scientific research results in the recent 20 years has released (including epidemiological studies, lab cell research, animal studies, human studies and mechanism research, etc.), were utilized to carry on the comprehensive risk assessment according to the WHO “evidence-based” principle. The purpose of the International Electromagnetic Field Project is to assess the scientific literature on the biological effects of EMF exposure, to identify gaps in knowledge needed to improve health risk assessment, to establish a centralized schedule for high-quality EMF research, to arrive at formal assessment of the health risks of
Effects of Extremely Low Frequency …
1193
EMF exposure after the completion of the required studies, to promote the development of internationally acceptable uniform standards, and to make recommendations to national plans and non-governmental organizations. The conclusions of risk assessment are as follows. (1) Effects of extremely low frequency electric field: following the standard health risk assessment procedures, WHO declared that exposure to levels of commonly electric fields will cause no actual health problems. (2) Short—term effects of extremely low frequency magnetic field: For the short-term effects of high level magnetic field exposure (above 100 μT) on the biological effects, the high field intensity exposure will lead to nerve and muscle stimulation, and cause the changes in the excitability of nerve cells in the central nervous system. (3) Potential long-term effects of magnetic field exposure. The classification was based on meta analyses of epidemiological studies, which showed a consistent association between the average exposure of an industrial frequency magnetic field to more than 0.3 ~ 0.4 T residentially and the 2fold increase in the prevalence of childhood leukemia. The conclusion is that no other studies ever since have been able to change the classification. However, epidemiological evidence has been weakened by methodological problems, such as potential selective bias. And there is also no acceptable biophysical mechanism for low levels of exposure to relate cancer. In addition, the results of animal studies are mostly negative. Therefore, in overall balance, the evidence associated with childhood leukemia is not sufficient to establish a causal relationship. (4) Overall conclusion: international exposure guidelines and standards (ICNIRP and IEEE/ICES) can protect workers and the public from the harmful health effects of electromagnetic fields and there is no need to lower exposure limits or implement policies of lower exposure limits arbitrarily.
1.2 Biological Effects of Electromagnetic Field Exposure The biological effects of electromagnetic field exposure have always been a hot topic of research, at the levels of animals or people whose harm is reflected in many aspects. The harmful effects is mainly divided into acute (such as temporary headache, general discomfort, vertigo, sleep disorder, unstable blood pressure and pulse, paroxysmal tachycardia, etc.) and chronic ones which are mainly the damage of nerves, cardiovascular system, endocrine system, digestive function, blood system, immune function, reproductive function, lens, cornea, retina and ear. The biological effects of electromagnetic exposure can be divided into thermal effect, non-thermal effect and cumulative effect. Various experimental methods, including epidemiological studies, animal studies, pathology studies, laboratory cell studies and volunteer studies, have been used in this study. As the main sensitive target organ of electromagnetic radiation, the nervous system has serious effects on learning and memory, behavior, brain blood flow, electroencephalogram, neurasthenia syndrome and so on. Human memory and cognition function are the main biological functions of human brain. Therefore, the influence
1194
Y. Liu et al.
of electromagnetic radiation on the memory and cognition ability of human brain has become the main research direction of scholars all over the world. Extremely low frequency electromagnetic field exposure affects neural mental behavior in two ways: one is the direct stimulation effect of external peripheral nervous system and central nervous system and the other is the effect of sensory stimulation and perception about the central nervous system function. All these effects can be evaluated by electrophysiological analysis based on brain electrical activity, cognitive ability test, spirit, and mood and behavior assessment. Based on the existing research results, relevant literatures are summarized as follows.
2 Epidemiologic Studies 2.1 Association with Neurodegenerative Disease Extremely low frequency electromagnetic field exposure increases the risk of Alzheimer’s disease. Johansen et al. [2] conducted a retrospective epidemiological study on 30631 employees of Danish electric power company from 1900 to 1993, and found an increased risk of Alzheimer’s disease. Extremely low frequency electromagnetic field exposure may be associated with Parkinson’s disease. Noonan et al. [3] found that Parkinson’s disease was positively correlated with magnetic field exposure patterns, and the maximum OR value of occupational exposure was 1.5 (95% CI = 1.02 ~ 2.19). However, Johansen et al. [2] found no correlation between the incidence of Parkinson’s disease and low frequency electromagnetic field exposure. Hakansson et al. [4] employed the cohort method to study the risk of Alzheimer’s disease in 537,692 men and 180,529 women who were exposed to 1 ~ 100 kA in Swedish professional workers. There is no evidence that the risk of Parkinson’s disease and multiple sclerosis increased in the study objects. Extremely low frequency electromagnetic field exposure may be associated with amyotrophic lateral sclerosis (ALS). Noonan et al. [3] found that ALS was related to the history of electromagnetic exposure with the OR value of (95% CI = 1.29 ~ 4.09), from the data records of male deaths in Colorado between 1987 and 1996.
2.2 The Effect on Mental Behavior No consistent results of various studies have been met on the effect of low frequency electromagnetic field on sleep quality have not been. Sher et al. [5] believed that the artificial electromagnetic field had an impact on people’s normal sleep. Li C Y et al. [6] took 5078 married women aged 20–59 in northern Taiwan with exposure to 2 mG of environmental magnetic field intensity as the research object, and found that the incidence rates of three types of sleep disorder, sleep maintenance disorder and early
Effects of Extremely Low Frequency …
1195
morning wakefulness, were 29.5, 38.17 and 2.02%, respectively. The incidence of sleep disorders was associated with bedroom magnetic field exposure with OR of 1.20 (95% CI = 1.02 ~ 1.40), and the incidence of sleep maintenance disorders was higher with OR of 1.28 (95% CI = 1.04 ~ 1.56) in women with 2 mG background exposure. A large number of occupational health evaluation reports on ultrahigh-voltage transmission lines and substations at home and abroad have shown that neurasthenia and memory impairment are the most common symptoms of low-frequency electromagnetic field exposure, but there is only inconsistent and non-conclusive evidence of depression or suicide caused by extremely low-frequency electric field and magnetic field exposure. Trimmel et al. [7] investigated the influence of low-frequency electromagnetic fields on factors, and the results showed that when exposed to the electromagnetic environment of 50 Hz and 1 mT, the memory, understanding and attention of interviewees would be reduced, and some subjective discomfort reports were reported. Edwin et al. [8] studied the suicide behaviors of workers in power companies, and the data obtained show that the correlation between occupational electromagnetic field and suicide behaviors need further study. Thornton et al. [9] found that electromagnetic field exposure may affect the development of mirror neurons in infants, which may be potentially related to autism. Zamadian et al. [10] investigated the emotions of employees of a gas power plant (exposure intensity was 0.087 mt) and found that it may have an impact on the prevalence of mental disorders. Wei Wei [11] took 285 male electricians with service year over 15 and age over 40 as the research objects, and took the general males of the same age group in the same area as the control group, and used the scale to investigate their quality of life. It was found that there was no significant difference in the quality of life between the object and the control group, suggesting that the power frequency electromagnetic field may have no effect on the quality of life. Li li [12] researched 364 cases of professional workers as exposed group and 346 cases as control group in the 220 kV and 500 kV voltage class distribution circuit system, found no difference in memory recognition, visual discrimination, short-term memory, cognitive ability of the exposed group. A large number of researches on radar electromagnetic radiation and cell phone base station electromagnetic radiation can also be used for reference to the health effects of extremely low frequency electromagnetic field exposure. Chen Qidong [13] et al. investigated the electromagnetic radiation epidemiology of 1216 employees in a military telecommunications unit, and found that the self-assessment depression scale (SDS) score was 41.58 + 10.80, and the detection rate of depression was 23.9%, which was higher than the depression detection rate of soldiers stationed on an island (11.3%). Matthew [14] investigated military operations, such as high exposure and the none exposure group and found that exposure to electromagnetic area maximum output power was 2500 W, the average power density was 1.1 ~ 21.2mW/cm2 , the cumulative exposure dose in a day was (4.95 ~ 95.4) mW/cm2 , far higher than the national 8 h standards of 50 μW/cm2 , scores of nervous anxiety, fatigue inertia, the confusion in the exposed group were higher than that of none exposed group. He Puying [15] etc. found the average power density was 0.2 ~ 2.6 mW/cm2 at mobile base station in a survey, higher than the national 8 h standards of 50 μW/cm2 , by
1196
Y. Liu et al.
conducting neurobehavioral test, scores of tension, fatigue, anger in the exposure group was significantly higher than the control group (P < 0.01), and positive emotional states also scored lower in the exposure group (P < 0.05). Deng Zhaohui [16] et al. studied the neural behavior and emotional state of radar operators, and found that the power density of each work site was between 1.4 ~ 9.5 μW/cm2 , and the visual fatigue of the radiation group was obvious. Wang Huaizhong et al. [17] compared the neural function of 78 telecommunication paging personnel, (8 μW/cm2 ), with college students, and found that the frequency of negative state, dizziness and headache of telecommunication paging personnel were significantly higher than that of the performance symptoms of college students. A number of studies have strongly demonstrated that electromagnetic radiation may cause depression, tension, anger, negative emotions and other hazards, and that people exposed to high electromagnetic radiation are more prone to fatigue and other symptoms. Electromagnetic field exposure has been proved to have certain influence on the action behavior of the crowds. The total and correct points of the target tracking test in the high-intensity electromagnetic field group (0.2 ~ 2.6 μW/cm2 ) were lower than those in the control group [15]. The correct points, total points and digital decoding scores of target tracking were lower than those of non-exposed groups. In the study of microwave’s effect on the function of human central nervous system, it was found that the hand-carried dexterity of the exposed group (17.91 ± 13.16) was lower than that of the control group (P < 0.05).
3 Volunteer Studies Some literatures related to volunteer studies show that [18–20], low-frequency electromagnetic field exposure has only a slight and transient effect on brain electrical activity, recognition ability, sleep, emotion and other neuropsychiatric activities, and it is difficult to determine the specific conditions for reaching relevant conclusions at present. So the evidence is insufficient and insufficient. Ghion et al. [18] exposed 40 healthy male volunteers to 50 Hz, 40 μT or 80 μT electromagnetic environment for 90 min, and observed their brain electrical α activity, tooth pain threshold, blood pressure and heart rate. It was found that when exposed to 50 Hz and 80 μT magnetic field environment α activity almost doubled than the activity of the control group. The pain threshold of teeth was significantly lower than that of the control group when exposed to 50 Hz and 40 μT magnetic field environment, but no significant effect was found on blood pressure and heart rate.
Effects of Extremely Low Frequency …
1197
4 Animal Studies 4.1 Effects on Cognitive Function and Behavioral Changes Some studies show that the exposure of the power frequency electromagnetic field has no effect on cognitive function, but some studies suggest that the exposure of the extremely low frequency electromagnetic field may have an impact on behavioral change. It has been reported that when magnetic induction intensity was 8 mT (frequency was 50 Hz) and acute exposure duration was 20 min, the spatial memory ability of the rats was impaired, indicating that the latency of evading electric shocks was prolonged. When magnetic induction intensity was 2 mT (frequency was 50 Hz) and acute exposure duration was 20 min, there was no significant change in spatial memory ability in rats. When the intensity of magnetic induction was 500 μT (frequency was 50 Hz) and the duration of acute exposure was 20 min, only some discomfort was caused to the animal, and its social and territorial behavior was significantly changed. However, when exposed for a long time (the duration of exposure was extended to 28 days or 42 days), the anxiety level of the rats was significantly increased, and the content of amycin in brain tissue increased. Other studies have shown that exposure to ultra-low frequency electromagnetic fields (frequency was 50 Hz, magnetic induction intensity is 400 μT, and exposure duration was 60 d) resulted in delayed growth rate of mass, cognitive dysfunction, hippocampal structural damage, and decreased nisfree content in rats. Mario [21] exposed adult male rats and mice of the same species to an electromagnetic environment of 60 Hz and 1 mT for 2 h/d, 9 days, observed their social behavior and short-term memory, and found that the memory of adult male rats was enhanced. Janac et al. [22] exposed experimental rats to the electromagnetic fields of 50 Hz and 0.5 mt for 7 days, and observed spontaneous movement and rigid activities. The results showed that lowfrequency electromagnetic field exposure might affect different types of behaviors. Lei [23] divided laboratory mice into, the experimental group exposed to the electromagnetic fields of 20 Hz (1.80 mT, 60 min/d), the experimental group exposed to the electromagnetic fields of 50 Hz (2.20 mT, 60 min/d), and blank control group for 12 days, observing the condition of rats location preferences, found that the electromagnetic field exposure may be associated with the morphine induced place preference behavior of experimental rats, indicating that low frequency electromagnetic field may enhance of morphine induced conditioned behavior. Prolic et al. [24] exposed rats to the electromagnetic environment of 50 Hz and 0.5 mt for 7 days and observed their spontaneous activity, and found that compared with the control group, the spontaneous activity of rats in the open field did not change. Liu Tong et al. [25] observed the emotional state of adult rats in the extremely low-frequency magnetic field, and found that anxiety in experimental rats was related to exposure time and illumination, while there was no significant difference in neural behavior in rats. Yokus et al. [26] exposed the experimental mice to the low-frequency electromagnetic environment of 60 Hz, 1.5 mT, 12 h/d for 5 consecutive days, and observed the normal circadian rhythm of the pain threshold of the mice. The results
1198
Y. Liu et al.
showed that the low-frequency magnetic field affected the circadian rhythm of the pain threshold of the mice by affecting the system related to the environmental lightdark cycle. Sudakov [27] and other former Soviet scholars also found that the long time exposure to electromagnetic waves with a frequency of 50 Hz, ranging from 100 to 200 V/m, would change neural behavior in rats, mainly in the aspects of conditioning feeding experiment and defense reaction experiment. Zhao et al. [28] exposed ICR mice to the Helmholtz coil magnetic field of 50 Hz-1.0 mT, studied the recognition memory of animals and morphological changes of hippocampal neurons, and the results showed that there was no corresponding change in spontaneous autonomic activity, and the density of hippocampal dendritic spine decreased. Liu Xiao et al. [29] exposed healthy Wistar rats to an electromagnetic field of 50 Hz0.4 mt-60d. It was observed that the average evasive latency of cognitive behavior was significantly prolonged and the body mass increased. Foroozandeh et al. [30] found that the memory consolidation ability of mice exposed to the electromagnetic field of 50 Hz-8 mt-4 h decreased.
4.2 Effects on Cell Viability The results of studies on the effects of cell viability were inconsistent. Akdag et al. [31] exposed rats to an environment with intensity of 100 μT and 500 μT and 2 h/d for 10 consecutive months. Apoptosis and oxidative stress in brain cells were detected, and the results showed that there was no significant difference between apoptosis level and myeloperoxidase concentration. Piacentini et al. [32] exposed rats to the low-frequency electromagnetic environment of 50 Hz and 1 mT, and found that the activity of rat nerve cells decreased and the amount of cell differentiation decreased significantly. Di Loreto et al. [33] exposed rats to the low-frequency electromagnetic environment of 50 Hz and 0.1-1.0 mT, and found that the low-frequency magnetic field exposure affected the activity of rat neurons and decreased their apoptosis.
5 Conclusions and Suggestions At present, the effect of low frequency electromagnetic field exposure on neuropsychiatric behavior has become one of the hot topics. A large number of scholars have carried out a large number of studies in epidemiology and laboratory research. Epidemiological studies have shown that low-frequency electromagnetic field exposure may be associated with or have negative effects on neurodegenerative diseases, cognitive impairment, sleep quality, mental behavior and quality of life, but the results have not yet been consistent, and there has not been stronger biological and epidemiological evidence to confirm this association. From the perspective of hazards association with health effects, the epidemiological investigation and study is credible scientific evidence of extremely low
Effects of Extremely Low Frequency …
1199
frequency electromagnetic field exposure hazards, but the research so far is still unable to make a definite conclusion with the main reason that the sample size of the research implemented is small, and the target effect group of extremely low frequency electromagnetic field exposure is more difficult classified, confounding factors are more complex, including selection bias which affects the reliability of the research conclusion bias. On the other hand, as the mechanism of the biological effects of electromagnetic field has not been defined clearly, it is difficult to determine the unified, specific and prone-to-study parameters of biological effects caused by extremely low frequency electromagnetic field exposure. Based on the above limits, Due to the sensitivity and particularity of the fetus and infant and, World Health Organization recommends more and further studies the effects of low-frequency magnetic field exposure on the nervous system before and after birth which may affect cognitive function development, and suggests to carry out research based on effects of low frequency electromagnetic field exposure on human cognition and electroencephalogram changes, including children and adults in occupational exposure. At the same time, it is also considered that studies by conducting methods of brain slices or cultured neurons on effects of extremely low frequency electromagnetic field exposure and induction electric field on the growth of nerve cells are beneficial supplements to the above studies. Acknowledgements This research was supported financially by the China Southern Power Grind (Grant No. GDKJXM20180673 and GDKJXM20185761).
References 1. World Health Organization. 2007. The international EMF project [DB/OL]. Geneva, Switzerland. 2. Johansen, C. 2001. Exposure to electromagnetic fields and risk of central nervous sys diseases among employees at Danish electric companies. Ugeskrift for Laeger 164 (1): 50–54. 3. Noonan, C.W., J.S. Reif, M. Yost, et al. 2002. Occupational exposure to magnetic fields in casereferent studies of neurodegenerative diseases. Scandinavian Journal of Work, Environment & Health 28 (1): 42–48. 4. Hakansson, N., P. Gustavsson, C. Johansen, et al. 2003. Neurode—Generative diseases in welders and other workers exposed to high levels of magnetic fields. Epidemiology 14 (4): 420–426. 5. Sher, L. 2000. The effects of natural and man-made electromagnetic fields on mood and behavior: The role of sleep disturbances. Medical Hypotheses 54 (4): 630–633. 6. Li, C.Y., P.C. Chen, F.C. Sung, et al. 2002. Residential exposure to power frequency magnetic field and sleep disorders among women in an urban community of Northern Taiwan. Sleep 25 (4): 428–432. 7. Trimmel, M., and E. Schweiger. 1998. Effects of an ELF (50 Hz, 1 mT) electromagnetic field (EMF) on concentration in visual attention, perception and memory including effects of EMF sensitivity. Toxicology Letters 96: 377–382. 8. Edwin Wijngaarden, E., D.A. Savitz, R.C. Kleckner, et al. 2001. Exposure to electromagnetic fields and suicide among electric utility workers: A nested case-control study. Occupational and Environmental Medicine 57 (4): 258–263.
1200
Y. Liu et al.
9. Thornton, I.M. 2006. Out of time: A possible link between mirror neurons, autism and electromagnetic radiation. Medical Hypotheses 67 (2): 378–382. 10. Zamanian, Z., S. Gharepoor, and M. Dehghani. 2010. Effects of electromagnetic fields on mental health of the staff employed in gas power plants, Shiraz, 2009. Pakistan Journal of Biological Sciences: PJBS. 13 (19): 956. 11. Wei, Wei. 2009. Life quality survey of Guangzhou industrial frequency electromagnetic field operators. Guangdong Medicine 30 (7): 1147–1149. 12. Li, L., D.F. Xiong, J.W. Liu, et al. 2014. No effects of power line frequency extremely low frequency electromagnetic field exposure on selected neurobehavior tests of workers inspecting transformers and distribution line stations versus controls. Australasian Physics Engineering Science Medicine 37 (1): 37–44. 13. Qidong, Chen, Pan Xiangrong, Chu Qingya, et al. 2008. Epidemiological studies on depression and influencing factors in telecommunication workers. Journal of the Third Military Medical University 30 (12): 1186–1188. 14. Maffei, Xiong Hongyan, Zhang Yao, et al. 2004. Epidemiological investigation on the effects of high intensity electromagnetic radiation on neurobehavioral function in military working population. Journal of the Third Military Medical University 26 (22): 2048–2050. 15. Hepuying, Wang Zhengsong, Zhou Hailong, et al. 2007. Effects of urban high-intensity electromagnetic radiation on neurobehavioral function in working populations. Laboratory Medicine and Clinical Practice 4 (6): 568–569. 16. Deng Zhaohui, Gong Zefen, Yu Zhengping, et al. 2008. Effects of electromagnetic radiation from radar units on the neurobehavioral function of operators. Radiation Health in China 17 (2): 136–137. 17. Huaizhong, Wang, and Li Guoning. 2002. Effects of paging on neurobehavioral function. Occupational and Health 18 (5): 27–29. 18. Cooper, A.R., E. Van Wijngaarden, S.G. Fisher, et al. 2009. A population-based cohort study of occupational exposure to magnetic fields and cardiovascular disease mortality. Annals of Epidemiology 19 (1): 42–48. 19. Ghione, S., C.D. Seppia, L. Mezzasalma, et al. 2005. Effects of 50 Hz electromagnetic fields on electroencephalographic alpha activity, dental pain threshold and cardiovascular parameters in humans. Neuroscience Letters 382 (1): 112–117. 20. Barth, A., I. Ponocny, E. Ponocny-Seliger, et al. 2010. Effects of extremely low-frequency magnetic field exposure on cognitive functions: Results of a meta-analysis. Bioelectromagnetics 31 (3): 173–179. 21. Mario, S., L. Bonhomme-Faivre, F. Forestier, et al. 2003. Effects of electromagnetic fields on the immune systems of occupationally exposed humans and mice. Archives of Environmental Health: An International Journal 58 (11): 712–717. 22. Janac, B., N. Pesi, A. Melenkovic, et al. 2005. The effects of chronic exposure to ELF magnetic field on spontaneous and amphetamine-induced locomotor and stereotype activities in rats. Brain Research Bulletin 67 (6): 498–503. 23. Liu T., Lei Y., Wilson F.A.W., et al. 2005. Effects of extremely low-frequency electromagnetic fields on morphine-induced conditioned place preferences in rats. Neuroscience Letters 390 (2):72–75. 24. Proli´c, Z., B. Jana´c, V. Peši´c, et al. 2005. The Effect of extremely low-frequency magnetic field on motor activity of rats in the open field. Annals of the New York Academy of Sciences 1048 (1): 381–384. 25. Tong, Liu, He Lihua, Ye Kangping, Xu Yingchun. 2010. Effects of chronic exposure to the power frequency magnetic field on neural behavior in rats. Journal of Peking University (medical edition) 42 (3): 351–355. 26. Yokus, B., D.U. Cakir, M.Z. Akdag, et al. 2005. Oxidative DNA damage in rats exposed to extremely low frequency electro-magnetic fields. Free Radical Research 39 (3): 317–323. 27. Freude, G., P. Ullsperger, S. Eggert, et al. 2011. Effects of microwaves emitted by cellular phones on human slow brain potentials. Bioelectromagnetics 19 (6): 384–387.
Effects of Extremely Low Frequency …
1201
28. Zhao, Q.R., J.M. Lu, J.J. Yao, et al. 2015. Neuritin reverses deficits in murine novel object associative recognition memory caused by exposure to extremely low frequency (50 Hz) electromagnetic fields. Scientific Reports 5: 11768. 29. Xiao, LIU, ZUO Hongyan, WANG Dewen, et al. 2013. Effects of occupational exposure to electromagnet field on hematologic parameters. High Voltage Engineering 39 (1): 156–162. 30. Foroozandeh, E., P. Derakhshan-Barjoei, and M. Jadidi. 2012. Toxic effects of 50 Hz electromagnetic field on memory consolidation in male and female mice. Toxicology and Industrial Health 29 (3): 293–299. 31. Akdag, M.Z., S. Dasdag, E. Ulukaya, et al. 2010. Effects of extremely low-frequency magnetic field on caspase activities and oxidative stress values in rat brain. Biological Trace Element Research 138 (1–3): 238–249. 32. Piacentini, R., C. Ripoli, D. Mezzogori, et al. 2008. Extremely low-frequency electromagnetic fields promote in vitro neurogenesis via upregulation of Cav1-channel activity. Journal of Cellular Physiology 215 (1): 129–139. 33. Di Loreto, S., S. Falone, V. Caracciolo, et al. 2009. Fifty hertz extremely low-frequency magnetic field exposure elicits redox and trophic response in rat-cortical neurons. Journal of Cellular Physiology 219 (2): 334–343.
Digital Watermarking Hiding Technology for Copyright Information Yixin Chen, Xi Hu and Feng Xiao
Abstract With the wide application of information technology and the gradual development of army informationization construction, especially with the development of computer network communication technology, data exchange and transmission has become a relatively simple process, people can easily transmit data through various devices; however, the security problem of information transmission has arisen. Digital watermarking technology emerged in the 1990s as an important branch of information hiding technology. It determines the ownership of digital products or verifies the primitiveness of digital information content by embedding perceptible or imperceptible watermarking information in digital products. Firstly, this paper expounds the basic theory of information hiding and related theories. On this basis, it introduces the general classification of digital watermarking technology, and puts forward various forms of digital copyright information. Keywords Digital watermarking · Copyright protection · Watermarking shaping · Hiding technology
1 Introduction As a new subject, information hiding has not been put forward for a long time, but its thought has a long history [1]. It is generally believed that information hiding technology originates from steganography and is usually interpreted as hiding secret information in other carriers [2–4]. The purpose of steganography is to hide important information and achieve the effect of transmitting information safely without
Y. Chen (B) · X. Hu · F. Xiao School of Mathematics and Computer Science, Jianghan University, Wuhan 430056, China e-mail: [email protected] X. Hu e-mail: [email protected] F. Xiao e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_141
1203
1204
Y. Chen et al.
causing people’s attention [5–7]. The carrier with secret information can be transmitted publicly. No one knows that there are other information hidden in the carrier with secret information except the concealer and the legitimate recipient [8–10]. The application of steganography has shifted from the traditional analog field to a variety of digital media, including digital still images, audio and video [11, 12]. The information hiding technology discussed nowadays mainly refers to the information hiding technology in the era of index words, which is the development of traditional steganography [13]. A technology different from traditional cryptography has been gradually applied, which secretly hides confidential information in ordinary files, and then transmits it through the network [14]. In this way, the hidden secret information intercepted by the illegal interceptor from the network is not a pile of random code like the traditional encrypted files, but looks like other non-confidential information, so it is very easy to deceive the illegal interceptor.
2 Basic Principles of Information Hiding 2.1 Information Hiding Model The emphasis of information hiding technology is different from that of traditional cryptography. The former focuses on hiding an important information secretly in the public information (carrier), and using the secret public information (carrier) to transmit confidential information. That is to say, information hiding technology is a method of hiding secret information in carrier information (such as image, sound, video, etc.) by using the information redundancy of multimedia itself and the visual (auditory) redundancy of human sensory organs (eyes, ears) to some information. For it, it is difficult for potential detectors or illegal interceptors to judge the existence of secret information from public information, to intercept secret information or recover secret information, so as to ensure the security of secret information.
2.2 Classification of Information Hiding Technology Information hiding includes many branches. At present, the research field mainly focuses on information security hiding, detection and copyright protection of digital media. The first is the digital image scrambling technology: through the transformation of the position or gray level of the digital image, so as to achieve the purpose of information hiding. The second is digital image sharing technology: a digital image is decomposed into several sub-images according to a certain mathematical method, and then the original image can be restored by using at least a few sub-image networks in the decomposed image. The third is steganography: the technology of hiding one secret information in another carrier information. The fourth is digital
Digital Watermarking Hiding Technology for Copyright Information
1205
watermarking technology: embedding the copyright information of digital works into the data of works to play the role of copyright protection and product identification. Steganography and digital watermarking require that secret information be hidden in another public information (carrier). When transmitting, only the public information as carrier is required to be transmitted.
2.3 Specific Application of Information Hiding Data confidentiality. Information hiding technology can be used to protect information exchanged on the Internet, such as sensitive information in e-commerce, secret agreements and contracts between negotiating parties, sensitive data information in online banking transactions, digital signatures of important documents and personal privacy. In addition, information hiding can be used to hide and store some content that is not known to others; data can not be repudiated. We can use the watermarking technology in information hiding technology to add the respective feature markers to the transmitted information in the form of watermarking when either party of the trading system sends or receives information. This watermarking should not be removed at will to confirm its behavior. Copyright protection of digital works. Network digital services provide digital works, which are easy to modify and duplicate. Nowadays, it has become an urgent practical problem to solve; anti-counterfeiting. The anti-counterfeiting of all kinds of bills in business activities is also the application field of information hiding technology. Hidden watermarks in digital bills still exist after printing, and anti-counterfeiting watermarks can be extracted by scanning back to digital form, thus verifying the authenticity of bills and the integrity of data. Data integrity verification is to confirm that data is not tampered with in the process of transmission or storage on the Internet. Once the media protected by fragile watermarking technology is tampered with, the watermarking will be destroyed and easily recognized.
2.4 Information Hiding Characteristics Information hiding is different from traditional encryption. Its purpose is not to restrict normal data access, but to ensure that hidden data is not infringed and valued. In addition, information hiding must consider the ability of hiding information to avoid damage after experiencing various environments and operations. Therefore, information hiding technology must consider the threat of normal information operation, so that confidential information has immunity to normal data operation technology. The key to this immunity is to make the hidden information part not easily destroyed by normal data operations such as signal transformation or data compression.
1206
Y. Chen et al.
3 Classification of Digital Watermarking Technology 3.1 Watermarking Classification on Vectors Still image watermarking. Static image watermarking mainly uses redundant information in the image and human visual characteristics to carry watermarking; video watermarking. Video watermarking can be studied from two perspectives. On the one hand, video data can be seen as multiple still image frames. Therefore, the watermarking algorithm for still image can also be used for video watermarking. On the other hand, it can directly start with video data to find out the insensitive parts of video data to human vision. Because of the large amount of video data, the latter algorithm is usually used; audio watermarking. Watermarking loaded on audio media can protect audio digital products, such as the content of radio programs. Audio watermarking also uses redundant information of audio files and human auditory characteristics to load watermarking; software watermarking. Software watermarking is a kind of module or data embedded in software, which is different from the previous carriers. Software watermarking can be divided into static watermarking and dynamic watermarking according to the time when the watermarking is generated and the location where it is stored. Static watermarking does not depend on the running state of the software. It can be added directly when the software is compiled or after the software is compiled. Dynamic watermarking depends on the running state of the software. It is usually generated under a special kind of input. Watermarking verification can be completed at a specific time. Software watermarking is proposed and studied in recent years; document watermarking. Document watermarking basically makes use of all the characteristics of the document, and completes coding by adjusting the line spacing, text characteristics, such as fonts and other structures in the document. The algorithm used in document watermarking is generally only applicable to document image class.
3.2 Watermarking Classification on Loading Method Spatial domain watermarking and transform domain watermarking. Watermarking is directly loaded on the carrier data, such as the least significant bit method, the patchwork method and the document structure fine-tuning method. Among them, the least significant bit method uses the lowest bit of the original data to hide information. The advantages of this method are fast calculation speed, no need for the original image to extract and verify the watermarking. The disadvantage of this method is that the embedded watermarking is fragile and can not resist attacks. In the technology of hiding specific binary information in general document images, the watermarking information can be encoded by slightly adjusting the line spacing, word spacing and character characteristics of the document. This kind of watermarking can resist document operations such as photographic copy and scanning copy, but it is also easy to
Digital Watermarking Hiding Technology for Copyright Information
1207
be destroyed; transform domain watermarking. This kind of watermarking is generally based on discrete cosine transform, wavelet transform, Fourier transform. One transform, this kind of watermarking will not cause sensory awareness, and usually has better robustness. In recent years, domestic research on digital watermarking technology based on transform domain is in a guiding position.
3.3 Classification from Watermarking Characteristics According to the characteristics of watermarking, digital watermarking can be divided into robust watermarking and fragile watermarking. Robust digital watermarking is mainly used to identify copyright information in digital products, such as author, work serial number, etc. Digital watermarking studied in a large number of literatures is basically robust digital watermarking. Fragile watermarking is mainly used for integrity protection. Contrary to robust watermarking, fragile watermarking must be sensitive to signal changes. Fragile watermarking is usually used to prove the authenticity of the image, detect or determine changes in the content of the image.
4 Rms of Digital Copyright Information Randomization of 4.1 Digital Watermarking Because of the diversity of digital watermarking embedding technologies, even if all of them are digital watermarking in time-space domain, their embedding positions and methods are different, which also leads to different statistical characteristics of copyright information to adapt to different embedding locations and embedding technologies. The copyright information is scrambled and randomized. There are many ways to randomize copyright information, such as scrambling technology in image processing is a good choice. Scrambling technology in image processing is a common image encryption technology developed with the increasing importance of information security and confidentiality. In the early stage, image scrambling technology replaced the location space of analog images, which can be seen as an extension of the single-table system in classical cryptography. For digitized images, the scrambling process can be carried out not only in the spatial domain of digital images, but also in the frequency domain of images. Digital image scrambling is an encryption method for digital image. It enables legitimate users to freely control the selection of algorithms, parameters and the use of random number technology, so as to achieve the purpose that illegal users can not decipher image content. We use scrambling technology here not to encrypt, but to randomize related content through scrambling technology.
1208
Y. Chen et al.
4.2 Digital Watermark Amplitude Shaping The above randomization process makes the statistical characteristics of copyright information and protected information similar. In addition, because human visual or auditory systems have many shielding effects, the stronger the signal of the protected information is in the time-space domain, the stronger the watermarking signal can be embedded under the condition of imperceptibility, and the more robust the watermarking is correspondingly. So we also need to shaping the watermarking signal in magnitude in order to make better use of the hidden characteristics of the protected information. One of the easiest ways to shape the amplitude is to change the strength of the watermarking signal with the strength of the protected information.
4.3 Digital Watermarking Whitening Filter In the case where the spectrum of the copyright watermark signal and the spectrum of the audio signal are similar, the error of the filter is the largest, that is, the ability of the copyright watermark signal to resist the filtering attack is maximized. However, as a result of spectrum shaping, the copyright watermark signal also loses the random signal with double-value correlation, which makes it difficult to use the correlation detector for watermark detection. Therefore, the watermark scheme proposed in some literatures must be here. Compromise between the two. In order to overcome this contradiction, some scholars have proposed to use a low-pass filter to filter the watermark to perform spectrum shaping. Before the digital watermark detection, the whitening filter corresponding to the low-pass filtering of the digital watermark signal is used. Whitening filtering improves the watermark detection performance. Because of the fixed coefficient filter, the shaping adaptive ability is not enough. If we use spectrum shaping technology, the design of the whitening filter is more difficult. The linear prediction adaptive frequency domain shaping technique proposed in the previous section can easily determine the whitening filter coefficients.
5 To Sum Up In recent years, the rapid development of digital technology and the Internet has not only broadened the scope of interests of the obligee to the greatest extent, but also brought about the crisis of copyright. The precise, cheap, large-scale replication function of digital technology and the global dissemination ability of the Internet have brought unprecedented impact to the existing copyright system. Copyright protection of digital works has become a problem that troubles governments, legal circles, art circles and computer scientists.
Digital Watermarking Hiding Technology for Copyright Information
1209
Acknowledgements This work is supported by PhD research start-up foundation of Jianghan University (Grant No. 1008-06610001,1008-06680001).
References 1. Chandran, S., and K. Bhattacharyya. 2015. Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography. International Conference on Electrical. 2. Meng, Z., T. Morizumi, S. Miyata, et al. 2018. Design scheme of copyright management system based on digital watermarking and blockchain. IEEE Computer Software & Applications Conference. 3. Basu, A., S.S. Roy, and A. Chattopadhyay. 2017. Implementation of a spatial domain salient region based digital image watermarking scheme. Second International Conference on Research in Computational Intelligence & Communication Networks. 4. Rajput, U., and N. Tiwari. 2015. A novel technique for RGB invisible watermarking based on 2-DWT-DCT algorithm. Communication Technologies. 5. Kumar, A., S.P. Ghrera, and V. Tyagi. 2016. A new and efficient buyer-seller digital watermarking protocol using identity based technique for copyright protection. Third International Conference on Image Information Processing. 6. Jiang, L., and M. Hou. 2016. Research on 3D digital watermarking for cultural relics. International Workshop on Earth Observation & Remote Sensing Applications. 7. Hsu, Pai-Hui, Chih-Cheng Chen. 2016. A robust digital watermarking algorithm for copyright protection of aerial photogrammetric images. Photogrammetric Record 31 (153): 51–70. 8. Sharma, P.K., P.C. Sau, and D. Sharma. 2016. Digital image watermarking: An approach by different transforms using level indicator. Communication, Control & Intelligent Systems. 9. Rohith, S., K.N.H. Bhat, and B.K. Sujatha. 2015. A secure and robust digital image watermarking scheme using repetition codes for copyright protection. International Conference on Advances in Electronics. 10. Taranovsky, D. 2016. Security imaging: Data hiding and digital watermarking. Handbook of visual display technology, 593–605. 11. Basu, A., S. Talukdar, N. Sengupta, et al. 2015. On the implementation of a saliency based digital watermarking. In Information systems design and intelligent applications, pp. 447–455, Springer, New Delhi. 12. Moosazadeh, M., and Andalib A. 2016. A new robust color digital image watermarking algorithm in DCT domain using genetic algorithm and coefficients exchange approach. Second International Conference on Web Research. 13. Singh, P., and S. Agarwal. 2016. A self recoverable dual watermarking scheme for copyright protection and integrity verification. Multimedia Tools & Applications 76 (5): 1–40. 14. Singh, G., and S. Kad. 2016. Comparative study of watermarking an image using GA and BFO with GA and HBO technique. International Conference on Information & Communication Technology for Competitive Strategies.
English Teacher Information Resource Affordances in the Context of Big Data Guotai Luo
Abstract The focus of research on educational information resources in the past ten years in China lies in the design, development, application and sharing of resources, the construction of an information-based teaching environment, and the learning methods, learning concepts and learning of learners in an information environment. Behavioral analysis is the main focus, and few studies focus on teachers’ research on the psychological characteristics and application behavior of information resources. Therefore, the focus of this study is on the supply of information resources by foreign language teachers in colleges and universities in the context of big data. From the perspective of teachers’ perception and supply of information resources, this paper explores the key factors and influence mechanisms that affect teachers’ use of foreign language information resources, and provides suggestions for policy formulation and professional development of foreign language teachers. Keywords English teacher information resource · Affordance · Big data
1 Introduction With the development of the information age, big data is gradually integrated into all walks of life. Big data is a resource that cannot be ignored in the information age. Big data brings change and development to various industries and fields. In June 2016, the Ministry of Education issued the “Thirteenth Five-Year Plan for Education Informationization”, which first proposed the comprehensive application of big data technology in information-based teaching to improve the quality of teaching management [1]. The construction of education informatization in China is mainly based on digital education resources. Experts in the education have conducted indepth research on educational resources and big data in response to the development of educational informationization. Specifically, it covers the comprehensive integration of educational resources, educational resource organization model, educational resource sharing, educational resource platform construction, educational resource G. Luo (B) Nanchang Institute of Technology, Nanchang 330099, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_142
1211
1212
G. Luo
evaluation parallel, and educational resource balance in the context of big data. It is hoped that the digital education resources and big data will be fully integrated to provide high-quality digital education resources for China’s education. The digital education resources focus on resource construction and gradually transform into user-centered resource application characteristics. The digital education resource construction institutions comprehensively focus on the needs of users, and strive to enhance the quality of educational resources construction, balance the distribution of educational resources, and promote educational resources, improving the utilization of educational resources, and creating a better and more suitable digital education resource brand for China. With the promulgation and implementation of the National Education Ten Year Development Plan (2011–2020) and the comprehensive and in-depth integration of information technology and foreign language teaching, the importance of foreign language information resources is becoming more and more obvious. In the era of big data, foreign language teaching promotes the deep integration of technology, resources and foreign language teaching. It is a technology and resource-driven foreign language learning. The rapid development of new educational information resources plays a vital role in the reform of foreign language teaching. Under the unique social and cultural background in China, especially in the foreign language learning environment lacking the real context, it is particularly important and significant to study the foreign language teachers’ adoption of information resources and its influencing factors [2].
2 Important Concepts 2.1 The Concept and Characteristics of Big Data Big data is “a massive, complex collection of data that cannot be extracted, stored, searched, shared, analyzed, and processed with existing conventional software tools at the time allowed” [3], which has the four characteristics of massive data size, rapid data flow, diverse data types and low value density [4].
2.2 Information Resource Information resources are formed by the integration of the two concepts of information and resources, and are the products of the resourceization of various information elements. The extension to foreign language teaching can be defined in two levels: broad and narrow. Broadly speaking, foreign language information resources refer to anything that supports digital teaching. In a narrow sense, it only refers to digital teaching materials, and it is also a digital learning resource in the usual sense, that
English Teacher Information Resource Affordances …
1213
is, processed by digital technology, editing various learning contents according to certain specifications, and can be operated by a learner in a multimedia computer or network environment, which can share learning materials [5]. However, this study draws on the broad and narrow aspects and proposes a comprehensive information resource concept, including hardware resources and software resources. Therefore, the foreign language information resources in this study are hardware resources such as teaching facilities, teaching equipment, learning tools, and digital video, digital audio, multimedia software, CD-ROM, website, email, online learning management system, computer simulation, online discussion, and software resources such as data files and databases.
2.3 Affordance The concept of “affordance” is defined in this study as: all possibilities that exist in the information resource environment to provide instructional support services for foreign language teachers. The implementation path needs to be actively perceived by the teacher, interact with various elements in the resource environment, actively use in the teaching process, and improve and optimize the resources under the necessary conditions to finish the teaching mission and achieve the teaching goal [6].
3 Analysis of the Characteristics of the Foreign Language Teaching in Colleges and Universities in the Era of Big Data Due to the impact of education and learning environment, the transformation of teachers and students, the richness of learning materials, and educational evaluation, online education brought about by the era of big data is becoming more and more important, and online videos and courses will also be promoted. Teachers are no longer just the imparters of knowledge; they become the organization and planners of the classroom. Then, as a foreign language teacher in colleges and universities, we must recognize the characteristics of contemporary foreign language teaching in order to conform to the development and requirements of the times. In the era of big data, foreign language teaching in colleges and universities will usher in a new revolution. The teaching objects, teaching media, teaching forms and methods, teaching resources, teaching evaluation, etc. will present complex and ever-changing characteristics, impacting the existing college teaching environment. The teachers’ functions and roles have changed, and the students’ learning styles and habits have also become personalized and autonomous. At the same time, big data brings a huge amount of teaching resources, and all kinds of information grow at an explosive rate. The foreign language teaching environment in the era of big data will
1214
G. Luo
become more intelligent, and the highly intelligent Internet will change the basic framework of school operation, breaking the fixed classroom, fixed textbooks, fixed teachers, and fixed-time teaching forms. In order to adapt to foreign language teaching in the era of big data, the construction of foreign language teaching information environment is very important. The Internet provides a virtual world for students to learn, invisible, inaccessible, without border restrictions, free to explore, imagine, participate, and interact. The virtualization of the learning environment makes the learning resources extremely rich, the learning activities are interactive and autonomy, and the connotation and extension of learning are greatly changed. The learning environment is gradually characterized by humanization, intelligence and immersion [7]. The construction of teaching resources base is moving from closed to open, promoting the efficient transference and utilization of teaching resources, and forming the globalization of teaching resources. The cloud technology teaching resource sharing platform fully integrates the existing resources, provides an open and equal super-large-scale teaching resources sharing platform for the learners, promotes the efficient transference and utilization of teaching resources, and makes the relatively independent teaching resources of each university from closed. Openness enables users to achieve barrier-free transmission and acquisition of teaching resources, which greatly promotes educational equity.
4 Information Resources and Foreign Language Teachers in the Era of Big Data Some studies have found that the rational integration of information technology and foreign language courses will enrich the content of the classroom, inject vitality into the classroom, provide opportunities for interaction between teachers and students, provide real language scenarios for learners, and make learners better. It brings into the classroom and improves the teaching effect. However, to achieve this effect requires teachers to make full use of information technology and choose a scientific method of applying information technology in the classroom. The enthusiasm of foreign language teachers for using information resources is not high, the use of technology is excessive or low-value, and the lack of innovation still exists. As a key factor in the reform of foreign language teaching, teachers’ perception of information resources (potential teaching function) and use of support (actual teaching function) are directly related to the success of technology and curriculum integration. In the process of comprehensive integration of foreign language information technology and foreign language courses, teachers play an important role. Teachers’ perception of information resources, willingness to use information resources and application of information resources to foreign language teaching will affect foreign language teaching and information technology. Teachers should select resources and
English Teacher Information Resource Affordances …
1215
technical methods that meet the teaching needs in a large amount of information resources and advanced information technology. Information technology should be fully selected in combination with teaching content. Information technology should not be used excessively or not. The use of information technology has affected the teaching effect. The rational use of information technology is an urgent problem in the current foreign language teaching. Therefore, we should conduct in-depth research on the attitudes of foreign language teachers towards information resources and the use of information resources [8]. At present, foreign language teachers in colleges and universities cannot fully integrate foreign language course teaching and information technology, which makes the foreign language teaching and related policy requirements inconsistent. This paper deeply analyzes the reasons that hinder foreign language teachers from using information technology and accepting information resources, and finds targeted reasons. Out of the solution, I hope to improve the understanding of foreign language teachers on information resources, transform the concept of foreign language teachers, make them happy to accept information resources, and actively apply information resources in teaching to promote the comprehensive level of professional and personal skills of foreign language teachers. At the same time, the research in this paper will also bring theoretical reference to the development of foreign language teaching policies in colleges and universities, and help universities to innovate foreign language teaching paradigms. In the era of big data, the Ministry of Education has to re-adjust its own development strategy in the face of rapid development of information technology. He Kekang (2002) believes that the current teaching model of higher education in China can no longer meet the needs of social development for talents. In the information age, the society needs a large number of high-level talents with innovative and information capabilities. At present, the teaching of colleges and universities in China adopts the class teaching method, and the teacher is the leader of teaching. This backward teaching mode is difficult to keep up with the pace of the times and can not improve the quality of teaching; although this teaching mode highlights the function of teachers, it has curbed students’ subjective initiative, creativity, and thinking ability are born. Therefore, educators believe that in the face of the information age, it is necessary to adopt a new teaching model and attach importance to cultivating students’ individualization and cooperation ability. Teaching should be closely focused on the needs of students. Information technology is catering to this goal [9]. These problems also exist in the field of foreign language education. The state has issued corresponding policies for the integration of foreign language courses and information technology. However, the survey found that the use of information technology and information resources in the process of foreign language teaching in colleges and universities is contrary to policies. For example, most foreign language teachers cannot actively treat information technology and foreign language courses. The teachers obviously lack the awareness of innovative use of information technology, and the method of using information technology is too backward, which reflects the actual teaching situation. The relevant policies cannot be implemented well.
1216
G. Luo
The problem of mismatch between relevant policies and actual teaching needs wants to be well resolved. Most scholars believe that focusing on the development, construction, and sharing of information resources, gradually improving information technology, and optimizing classroom teaching design, with the help of advanced technology, powerful functions, rich teaching resources, and exquisite teaching resources, teachers will be able to make good use of various information technologies in classroom teaching. However, it is undeniable that this approach does improve the use of information technology. However, there is still a mismatch between information technology and foreign language courses, so this method is not sustainable and effective.
5 Analysis of English Teachers’ Information Resources in the Era of Big Data In recent ten years, domestic scholars have paid more attention to resource design, resource development, resource application and resource sharing in the research of educational information resources, focusing on the construction of information-based teaching environment. There are many concerns about learners’ learning methods, ideas and behaviors in the information environment, but there is a lack of in-depth research on teachers’ application of information resources and teachers’ attitudes toward information resources. This research object is the foreign language teacher in colleges and universities. It conducts an in-depth investigation on the behavior of its application of information resources and how to treat information resources. It is hoped that this research will help build high-quality curriculum resources, help mechanics and professional construction. The education and teaching support provided by educational information resources, social support and technical support play an extremely important role in the effective use of resources by learners or educators. Especially for language teaching, whether information resources can promote the effect of language teaching, increase the opportunities for interaction between teachers and students; improve the efficiency of research and teaching, etc. It should be an important factor in teachers’ intentions and actual behaviors of using information resources. In other words, teachers perceive the teaching supply, social support and technical support provided by information resources, which is the premise of teachers using educational resources in teaching practice. As long as these feedings are fully perceived, it may lay a solid foundation for teachers to use them effectively. And universities, how do they perceive the value of these information resources, and how do they use these information resources in actual teaching? Through investigations, the study found that the main channels for teachers to obtain resources are still mainly search engines, followed by professional teaching websites and video websites. Self-media (such as Microblog and WeChat public account) are also the
English Teacher Information Resource Affordances …
1217
main resources for teachers to obtain resources. The survey found that some foreign language teachers began to use professional resources such as corpus. In the aspect of perceptual teaching and feeding, college teachers generally believe that foreign language information resources play an important role in improving students’ interest in learning, supplementing teaching content and extending classrooms, and retaining opinions on improving students’ academic performance. In terms of perceptual language ability, teachers believe that Information resources can help students improve their ability to express and communicate in speech, tone, listening, speaking, cross-cultural communication and multi-literal reading, while their ability to write, grammar, reading, translation, test-taking, vocabulary and pragmatics is implicit. In terms of use and feeding, information resources are mainly used in the design of teaching activities in the implementation phase of the curriculum, and the use of contexts is mainly based on classroom-assisted teaching and extra-curricular supplementary teaching. In the survey of the open part of the questionnaire, the researchers found that most teachers believe that organizational intervention is the main factor affecting the use of their information resources, especially the lack of administrative support and training opportunities. The reason for the limitation is due to the lack of necessary hardware and software facilities and corresponding technical guidance in the school environment. In addition, respondents also believe that teachers’ own information literacy and information capabilities are also the main factors affecting the use of support [10]. According to the clustering analysis of the factors of feeding transformation, the results showed that there are three groups of different characteristics of the feeding group, namely: active converter, conversion explorer and negative converter, among which the conversion explorer the highest proportion. Among all the variables affecting behavioral intentions, the effects of self-efficacy and teaching feeding perception are very important, which indicates that improving the self-efficacy of teachers’ information resources and improving the teaching of feeding resources is crucial for teachers to use their feeding intentions. The most influential effect on the behavior of feeding use is the behavioral intention, which indicates that improving the willingness of teachers to use and feeding behavior can directly affect the teachers’ feeding behavior. In addition, the impact of selfefficacy and convenience on behavior is also very large; indicating that to increase teacher support behavior should first enhance the teachers’ self-efficacy and provide an external environment for the use of information resources. Big data provides important conditions for building and integrating high-quality English digital resources. It also brings convenience to resource circulation and resource sharing, and will effectively promote the utilization of digital education resources in China. Teachers and learners can harvest a large amount of teaching resources and learning resources on the intelligent resource platform, and managers can also intelligently manage English digital resources on the intelligent resource platform. The new ecology of creating English digital education resources should focus on the following aspects: (1). In-depth study of data mining and intelligent algorithms and other technical operations to provide technical support for the indepth integration of big data and English education resources; (2) to encourage all
1218
G. Luo
sectors of society to participate in the practical research of educational resources big data, and make suggestions for the construction of English resources; (3) to improve the standards for digital education resources construction, and gradually improved the quality of digital education resources; (4) to standardized data collection services for English resources and English resources management application systems.
6 Conclusion Big data provides a huge amount of information resources for foreign language teaching in colleges and universities. How to choose and find the most suitable teaching materials for students will be a difficult problem for the instructors. As the organizer and guide of classroom teaching, we must have a clear understanding of the learning methods and study habits of the teaching objects, and even the personality characteristics of the students. At the same time, we must be familiar with the teaching materials and provide corresponding material for the students according to the above relevant elements. To promote the acceptance and use of information resources for foreign language teachers, it is necessary to enhance the use of information resources of teachers and improve the convenience conditions to promote the use of behavior. In addition, teachers’ self-efficacy, teaching support perception and community impact should be improved to promote teachers’ resource use intentions and indirectly promote resource use behaviors. Therefore, according to the above analysis, the key to promoting the use of information resources is to enhance teachers’ teaching awareness, self-efficacy, community impact and improvement of convenience conditions for information resources. Acknowledgements This research was supported by Jiangxi Educational Science Project during the 13th Five-Year Plan Period (project number: 19YB238).
References 1. Yao, Xiao, and Zhang Xuebin. 2015. Resources and construction of teacher education integration course. Educational Research 8: 112–113. 2. Chuxin, Huang, and Wang Dan. 2015. What does “Internet +” mean—a deep understanding of “Internet+”. News and Writing 5: 5. 3. Hanbing, Yan. 2005. Learning process design—information technology and curriculum integration perspective, 127. Beijing: Education Science Press. 4. Xing, Wang. 2015. Research on the strategy of transformation and upgrading of national excellent courses in the Perspective of open education. Modern Educational Technology 1: 93. 5. Linhai, Wang, Zhang Qing, and Ma. Lan. 2014. Analysis of the integration of modern information technology and college english curriculum from the perspective of educational ecology. Foreign Languages Electrotechnical Teaching 6: 46–51.
English Teacher Information Resource Affordances …
1219
6. Shouren, Wang, and Wang Haixiao. 2011. Investigation on the current situation of college english teaching in china and the reform and development direction of college english teaching. Chinese Foreign Language (5): 4–11, 17. 7. Xia, Feng, and Chen Jianlin. 2012. Research on the construction and utilization of foreign language Information resources in colleges and universities. Modern Educational Technology 6: 65–70. 8. Bingbing, Chen. 2014. Research on the construction and optimization of foreign language education information resources in independent colleges—taking three independent colleges in zhejiang province as an example. Modern Educational Technology 10: 55–60. 9. He, Kekang. 2002. Research on the construction and management of basic education network resources. China Educational Technology 10: 45–47. 10. Jianlin, Chen, and Zhang Di. 2014. Integration and optimization of foreign language information resources—A survey based on the construction of information resources in some universities. Foreign Languages Journal 5: 95–100.
How Does SEW Drive Innovation in an Internet Family Firm? Min Zhao, Yiyi Wang and Xin Yao
Abstract Innovation is an important endogenous power to ensure the survival and development of enterprises, especially for the family firms in the internet industry. As an important link of organizational governance, innovation decision-making is of great significance. This paper discusses the heterogeneous influence of SEW (social emotional wealth) on internet family firms innovation. In previous studies on the concept of SEW and innovation, the empirical results were often divergent, because the heterogeneity of SEW intention was ignored. According to the classification of SEW, the paper studied the impact of SEW on internet family firm innovation from the perspective of extended SEW and constrained SEW. This thesis more truly reflects the subjective influence of SEW on the innovation decision-making of internet family firms. Keywords Internet · Family firm · SEW · Innovation
1 Introduction Due to the characteristics of the internet industry, innovation is of great significance to internet family firms. Therefore, the research on SEW as the driving mechanism of innovation in the field of internet family firms is more meaningful. SEW was known as “social emotional wealth”. SEW was first proposed by Gomez Mejia and other scholars. The theory holds that family members have the identity of business owners, decision makers, and managers, pursuing family-centered noneconomic goals and gaining emotional utility in the process. Family SEW gains and
M. Zhao (B) China National Institute of Standardization, Beijing 100191, China e-mail: [email protected] Y. Wang Tsinghua University, Beijing 100083, China X. Yao CCPIT Commercial Sub-Council, Beijing 100801, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_143
1221
1222
M. Zhao et al.
losses are an important reference to make strategic decisions and management [1], which is a subjective influencing factor affecting internet family firm innovation. SEW is a complex multi-dimensional concept,because it is a combination of families acquiring various emotional effects from firms [2]. If it is measured without classification, the difference in effect of different SEW on innovation input will be covered up. In the past research process, the results of research often differed due to the lack of heterogeneity analysis. According to Gomez Mejia classification of SEW, the paper studied the impact of SEW on internet family firm innovation from the perspective of extended SEW and constrained SEW [3]. Based on this, this paper will carry out a heterogeneous study on the effect of SEW on internet family firm innovation, with a view to solving the problems of previous research conclusions.
2 Theoretical Research 2.1 SEW SEW was first proposed by Gomez Mejia. SEW gains and losses are an important criteria for internet family firm decision-making and management. Gomez Mejia argues that SEW includes emotion, cultural values and altruism. First, the family controls the internet family firm to maintain the family and corporate image, reputation, and meet their emotional needs, with the family as the external image and symbol of the firm; secondly, the family implants its own values and family culture into the firm, and the family completes the transmission and inheritance of the family culture as the carrier; finally, the family members have an altruistic tendency and have a strong desire to seek family welfare, and pay more attention to the interests of other members of the family than their own returns. The application of SEW theory mainly focuses on agency contracts, intergenerational inheritance, management specialization and risk perception.
2.2 SEW and Internet Family Firm Innovation SEW’s influence mechanism on internet family firms is similar to that of family firms, and SEW has a greater impact on Internet family firms due to their greater demand for innovation. The unique behavior of the family firms can be attributed to the willingness of families to maintain their emotional endowments through non-economic desires [4]. The non-economic will and emotional endowment promote the development and the pursuit of SEW [5]. As a result, family firms struggle to maintain family SEW and even evade the loss of SEW by engaging in risky behaviors and implementing
How Does SEW Drive Innovation …
1223
unique strategies [6]. Therefore, the non-economic will of the controlling family can affect the firm’s innovation activities. The willingness through family involvement are important sources of family heterogeneity. SEW is a combination of various emotional effects and it is a multidimensional concept. Gomez Mejia introduced the Mixed Gamble model proposed by Bromiley, who believes that innovation can affect the SEW in both loss and gain ways, and decision-makers should make a choice between profit and loss. The mixed gambling model dissipates the conflicts of different SEW in the trade-offs of decision makers, while different SEW tendencies lead to different strategic decisions. Miller conducted a heterogeneity analysis of will, arguing that constrained SEW focuses on family control and tend to short-term non-economic benefits. This pits family interests against external stakeholders. As a result, the firms choose to avoid and ultimately miss the long-term benefits brought by innovation [7]. Extended SEW was the opposite, emphasizing the long-term benefits. It makes high risk tolerant to innovation, and the positive attitude towards innovation, which makes internet family firms more inclined to make innovative decisions. Maintaining family control is the core and foundation. Constrained SEW emphasizes decision-makers have absolute control in the firms. The control-oriented will is popular in the context of China’s defensive culture [8]. Constrained SEW is based on family control willingness. On the one hand, the demand for the introduction of external investors may weaken the family’s control. On the other hand, the need for the introduction of external expertises may undermine family’s control too [9]. Therefore, constrained SEW decision makers tend to be negative about innovation activities. Extended SEW focuses more on family long-term benefits, and intergenerational inheritance is the core. The internet family firm’s evasion of innovation is not due to the internet family firm’s dislike of uncertainty and high risk of R&D activities, but from the avoidance of SEW loss contingencies. Innovative activities can bring SEW loss or gain contingencies. Intergenerational family control can benefit from innovation activities, because innovation activities can help firms to obtain competitive advantage and improve future adaptability. Chrisman found that internet family firm innovation activities in intergenerational inheritance are more active [10]. Numerous studies have shown that internet family firms with extended SEW and the intention of intergenerational succession are more concerned about long-term profits and more inclined to innovation [11].
1224
M. Zhao et al.
3 Empirical Research The heterogeneity of the two types of SEW and internet family firm innovation is demonstrated by empirical studies.
3.1 Measurement of Main Variables The data in this chapter comes from the national private firm sample survey database. This paper selects the data of family firms engaged in Internet industry in the database. Independent variables are family control intention variable (FCI) and family inheritance intention variable (FSI). The FCI stands for constained SEW and the FSI stands for extended SEW. The main variable codes, measurement indicators and coding conditions are shown in Table 1. FCI and FSI are coded according to the data obtained from the questionnaire questions.
3.2 Model Analysis and Estimation Methods The regression results are shown in Table 2. Model 1 is the basic model and model 2 adds the independent variables FCI and FSI. In model 1, education level (coefficient 0.017, P < 0.01), assets and values (coefficient 0.019, P < 0.01), and board involvement (coefficient 0.244, P < 0.05) are significantly positively correlated with internet family firm innovation. Equity involvement (coefficient −0.001, P < 0.1) has a certain inhibiting effect on innovation. Model 2 results are shown that FCI (coefficient −0.002, P < 0.1) is negatively correlated with innovation and FSI (coefficient 0.034, P < 0.05) is significantly positively correlated with innovation. The empirical results are consistent with the above theoretical analysis.
4 Summary Due to the characteristics of the Internet industry, innovation is of great significance to Internet family firms. Therefore, the research on SEW as the driving mechanism of innovation in the field of Internet family firms is more meaningful. This paper discusses the effect of constrained SEW(FCI) and extended SEW(FSI) on internet family firm innovation. Both theoretical analysis and empirical evidence show that SEW has a heterogeneous effect on internet family firm innovation. In the previous studies on SEW and innovation, the empirical results were mostly different because the heterogeneity of SEW effect was ignored. To some extent, the empirical research
How Does SEW Drive Innovation …
1225
Table 1 Variable definition Types
Variable
Code
Measurement indicators and coding
Dependent variable
R&D intensity
RD
Ratio of R&D investment to sales revenue
Independent variable
Family willingness to control (constrained SEW)
FCI
“Do you agree that the family should have a concept that the company has more than 50% of the equity?”. 6 items code value take sum
Family willingness to inherit (extended SEW)
FSI
“Have you ever considered succession?” and “Is your child willing to take over?”. 2 items code value take sum
Age
AGE
Age of entrepreneur
Gender
GENDER
The gender of the entrepreneur, the male is recorded as 1, the female is recorded as 0
Education level
EDU
The educational level
Business life
F_AGE
Before 1989, 1990–1995, 1996–2000, 2001–2005, and after 2005, the codes were 1–5
Business scale
SIZE
0–100 million, 100–500 million, 500–100 million, 1000–50 million, 50 million–100 million, more than 100 million, sequentially encoding 1–7
Assets and liabilities
LEV
No debt, less than 10%, 10–20%, 20–50%, 50% or more, in order code 1–5
Diversification
DIVER
The number of firms entering the industry, in order code 1–3
Net profit
NT
Corporate net profit for the year
Equity involvement
FO
Total family equity
Board involvement
FB
The proportion of family members on the board
Ownership
FT
Limited liability company or limited company, recorded as 1, otherwise 0
Industry dummy variable
Into
Industry type, represented by dummy variables
Control variable
1226
M. Zhao et al.
Table 2 Results of regression analysis Model 1 Equity involvement
−.001*
Model 2 (−.103)
−.001*
(−.027)
Board involvement
.244**
(2.492)
.188**
(1.877)
Management involvement
−.037
(−1.292)
−.048
(−1.670)
Ownership
.018*
(.553)
.020*
(.655)
Age
.003*
(2.170)
.002*
(1.477)
Gender
−.009
(−.342)
−.013
(−.515)
Education level
.017***
(1.771)
.011***
(1.141)
Opening time
.002
(.169)
.002
(.151)
Business scale
−.017
(−1.882)
−.017
(−1.876)
Assets and liabilities
.019***
(3.274)
.016***
(2.686)
Diversification
−.018
(−1.616)
−.019
(−1.713)
Net profit
−.000
(−.513)
−.000
(−.064)
−.002*
(−1.259)
FCI FSI (1.296)
.034**
(1.706)
.051
(.335)
Constant
.185
R
.227
.284
F
2.173
2.269
Note ***P < 0.01, **P < 0.05, *P < 0.1, the number in the right column is t value
in this paper confirms the reasons for the divergence of empirical results in the past. At the same time, in this paper, FCI and FSI are taken as variables to more truly reflect the subjective influence of SEW on internet family firm innovation. In future research, further breakthroughs should be made in the breadth, accuracy and timeliness of data selection. Acknowledgements This research was supported by Dean Foundation of China National Institute of Standardization (572019Y-6773).
References 1. Gomez Mejia, L.R., C. Cruz, P. Berrone, and J. De Castro. 2011. The bind that ties: Socioemotional wealth preservation in internet family firms. Academy of Management Annals 5: 653–707. 2. Berrone, P., C. Cruz, and L.R. Gomez Mejia. 2012. Socioemotional wealth in internet family firms: Theoretical dimensions, assessment approaches and agenda for future research. Family Business Review 25: 258–279. 3. Gomez Mejia, L.R., J.T. Campbell, G. Martin, R.E. Hoskisson, M. Makri, and D.G. Sirmon. 2014. Socioemotional wealth as a mixed gamble: Revisiting internet family firm investments with the behavioral agency model. Entrepreneurship Theory and Practice 38: 1351–1374.
How Does SEW Drive Innovation …
1227
4. Habbershon, T.G., M. Williams, and I.C. MacMillan. 2003. A unified systems perspective of internet family firm performance. Journal of Business Venturing 18: 451–465. 5. Gomez Mejia, L.R., K.T. Haynes, K.T. Nunez Nickel, K.J. Jacobson, and J. Moyano Fuentes. 2007. Socioemotional wealth and business risks in family-controlled firms: Evidence from Spanish olive oil mills. Administrative Science Quarterly 52: 106–137. 6. Gomez Mejia, L.R., M. Makri, and M. Larraza Kintana. 2010. “Diversification decisions in family controlled firms. Journal of Management Studies 47: 223–252. 7. Miller, D., and I. Le Breton Miller. 2014. Deconstructing socioemotional wealth. Entrepreneurship Theory and Practice, Vol.38: PP713–720. 8. Chen Ling, and Wu Bingde. 2014. Marketization level, education level and investment in research and development of internet family firms, Scientific research management. 9. Ashwin, A.S., Rishikesha T. Krishnan, and Rejie George. 2015. Internet family firms in India: family involvement, innovation and agency and stewardship behaviors. Asia Pacific Journal of Management 32: 869–900. 10. Chua, J.H., J.J. Chrisman, L.P. Steier, and S.B. Rau. 2012. Sources of heterogeneity in internet family firms: An introduction. Entrepreneurship Theory and Practice 36: 1103–1113. 11. Lumpkin, G.T., and K.H. Brigham. 2011. Long-term orientation and inter-temporal choice in internet family firms. Entrepreneurship Theory and Practice 35: 1149–1169.
Construction and Application of Information Management System in Road and Bridge Engineering Construction Shufang Li
Abstract China’s road and bridge engineering construction plays an important position in the national economy. Roads and bridges play an important role and have a close relationship with national life. Judging from the current project construction management work, China’s engineering construction departments generally have problems such as low technology level, imperfect information management system and lack of professional talents. The popularization and development of information technology provides an important technical approach for the scientific management of engineering construction. This paper first expounds the concept and characteristics of the way and bridge engineering construction management information system, and analyzes the current situation and existing deficiencies of the way and bridge engineering project management information construction. On this basis, the paper proposes to construct an engineering construction information management system that conforms to the characteristics of road and bridge engineering. The research and development of way and bridge management information management system will greatly accelerate the renewal of way and bridge management concepts, so it is of great significance. Keywords Road and bridge construction · Information management system · Perfect
1 Introduction The construction of the way and bridge projects is closely related to people’s lives. People’s daily travel, production and transportation of all walks of life are not developed by the road and bridge transportation network. With the accelerated development of the social economy and the acceleration of the urbanization process and the improvement of the level of science and technology, the number of project projects that need to be built in China is increasing. The road and bridge engineering construction system also has complete technical and financial support as a strong backing S. Li (B) Chongqing Vocational Institute of Engineering, Chongqing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_144
1229
1230
S. Li
for the development of the industry [1]. The road and bridge information system is a bridge management technology based on computer technology. By developing a road and bridge inspection and evaluation system, the researchers have established a database, and at the same time formulated corresponding evaluation methods, standards and optimized maintenance sequencing models, which can accurately understand the damage of roads and bridges, and achieve limited maintenance funds and the most need for maintenance. The best match between the road bridges. However, the support of technology and capital is only an external factor, and it does not represent the whole development of the industry. The process management of way and bridge engineering construction is the internal driving force for the development of the industry. In order to satisfy the requirements put forward by the market and adjust to the competition of the market, to build a way and bridge engineering construction management information system that meets the needs of today’s information age [2]. Because of the construction and application of the information management system, it can not only effectively improve the efficiency of the work in the process of project construction, but also make full use of information and efficient management.
2 Theoretical Research on Information Management System of Way and Bridge Engineering Construction 2.1 Concept of Way and Bridge Engineering Project Information Management System The way and bridge information engineering management system is a tool and management method for optimizing the available resources of way bridges through information collection, information analysis and program decision-making, and finding the best investment allocation plan for road and bridge managers, reflecting the road and bridge management. Thoughts combined with modern science and technology [3]. Under the premise of considering political, economic, social and technological factors, and based on the theory of system theory, through the comprehensive utilization of economics, operations research, engineering technology, computer technology, database technology and system analysis technology, the road is established. The bridge information management system effectively coordinates the road and bridge management work and systematically manages the roads and bridges.
2.2 Supporting Technology for Engineering Construction Information Management The realization of information management of way and bridge engineering construction is the establishment of a management system integrated by the above multiple
Construction and Application of Information Management …
1231
subsystems, and its application scope covers almost all aspects related to engineering construction and management. Its implementation includes two phases of system design and system implementation. The first task in the system design phase is to understand the key technologies related to the system [4]. The key technologies mainly include the following categories: data standardization, integration technology, database technology and communication technology.
2.3 Characteristics of Road and Bridge Engineering Construction Information Management System (1) Information flow plays a major role in project construction management Road and bridge engineering construction projects mainly include workflow, logistics, capital flow and information flow. The information flow will project the workflow and capital flow, and combine various management functions and project organizations to integrate the project with the environment. It not only reflects and controls and directs the flow of workflow, logistics and capital, but also interacts with each other, interdependence and mutual influence, which together constitute the general process of project management. (2) Comprehensiveness of management information of engineering construction projects The information flow in the road and bridge engineering construction project includes two main information exchange processes. The first is the exchange of information between the road and bridge engineering construction project and the outside world, including information input by the outside world, such as price changes information, market situation information, and instructions from external systems (such as enterprises and government agencies) to the project, and interventions on the project [5]. At the same time, there are information that the engineering construction project outputs to the outside world, such as report, request, request, etc. of the project status. The second is the information exchange within the road and bridge engineering construction project, that is, the large amount of information generated by the project organizer during the construction of the project, mainly including the basic information of the project; the actual engineering information of the road and bridge site, such as the actual construction period, Cost, quality information, etc.; various instructions, decision-making information; external access to environmental information of engineering projects. (3) Complexity of project construction project management information Road and bridge engineering construction project information has many forms of expression, many users, scattered collection sites and complicated processing [6]. Information on road and bridge engineering construction projects is usually provided by different project participants. The time when the project participants are involved
1232
S. Li
in the project, the internal organization and the way of information communication are likely to cause disorder of information organization to a certain extent, which makes the communication of road and bridge projects poor, which affects the smooth implementation of the project. In addition, the information provided by a certain stage or a certain party is usually used by subsequent stages or other participants, and the channels and methods for information acquisition and processing of different participants are different, resulting in a large number of repeated entries and distortions of information, which seriously hinder the smooth transfer, sharing and appreciation of information. (4) Lag of engineering project management information Information is generated during the construction and management of road and bridge projects. Information feedback generally needs to be processed, delivered, and then reached in the hands of decision makers, often later than logistics, feedback is not timely, and it is easy to affect the timely use of information to cause errors. The essence of engineering project information management is to organize information communication according to the characteristics of information to ensure timely and accurate access to the required information to achieve the purpose of correct decisionmaking [7]. To this end, we must grasp all aspects of information management, including the source of information, the classification of information, the establishment of information management systems, and the correct application of information management tools (see Fig. 1).
3 The Status Quo and Problems of Information Management Development in the Construction of Road and Bridge Engineering in China 3.1 Informatization Management System Function Is Not Comprehensive At present, China’s way and bridge engineering project construction information management system is still in a relatively low-level stage, only staying at the level of web page data collection, the development and use of system resources is relatively closed, and the quota and indicator system of way and bridge engineering project construction is not uniform. Rules and coding [8]. The construction of way and bridge engineering project needs to sort out some comprehensive information, and does not form a complete intelligent database and the physical quantity list, which seriously affects the accuracy of project recruitment and bidding.
Construction and Application of Information Management …
1233
Fig. 1 Characteristics of engineering construction management information system
3.2 Information Release and Update Are not Timely Based on the construction information website in some places, there is no effective organic combination with the local intelligent database [9]. The road and bridge construction information released by various departments and regions has locality and lag, and can only be timely in the local area. It is seen that it is not conducive to the collection and arrangement of information, and the horizontal and vertical comparison of comprehensive price information between regions cannot meet the needs of way bridge construction project bidding and bidding for material price procurement and settlement.
3.3 Road and Bridge Engineering Project Construction Management Personnel Cannot Adapt to the Requirements of Informationization The way and bridge engineering project construction information system is a manmachine dialogue system that completes the functions of data collection, processing,
1234
S. Li
transmission, preservation and maintenance of engineering cost through computer [10]. With the wide application of Internet networks and the more specialized and scientific information system preparation, the input, processing, operation, maintenance and use of information system data need to be equipped with more professional computer and engineering construction management compound personnel. For a long time, the information management personnel of way and bridge engineering project construction are insufficiently equipped, focusing on the updating of knowledge and skills of way and bridge construction, and the lack of information technology training, which hinders the way bridge construction information management system from playing its due role.
4 Construction and Application of Way and Bridge Engineering Construction Management Information System Way and bridge engineering project construction information management system is to apply computer information system to road and bridge engineering project construction management. Way and bridge engineering project construction management information and computer processing are organically combined, through sub-modules such as collection, transmission, processing and maintenance. The way and bridge engineering project construction management data and data to predict and analyze the future changes and development trends of the project way and bridge engineering construction, satisfied with the purpose of accurate and effective data control.
4.1 Establishment of Indicators for Information Management System of Way and Bridge Engineering Construction According to the characteristics of the road and bridge engineering project management system, it is recommended to use the analytic hierarchy process to evaluate the project administration content, benefits, value, technology and operational performance involved in the information system. Recorded as t1 , t2 , t3 , t4 , t5 . Among them, project management content evaluation is divided into: scope administration, schedule administration, expense management, position management, quality administrationt, communication administration, procurement management, risk management and integrated administration evaluation, which are recorded as t11 , t12 , M, t15 . The evaluation of the effectiveness of information systems can be divided into: direct economic profit, indirect economic profit and social profit, which are recorded as
Construction and Application of Information Management …
1235
t21 , t22 , t23 . The value evaluation is divided into: scientific evaluation of user satisfaction, system utilization and management, which are recorded as t31 , t32 , t35 . The technical evaluation is divided into: software quality, response time, functional resource matching, and external storage capacity evaluation, which are sequentially recorded as t41 , t42 , t43 and t44 . Operational performance evaluation includes: input standardization, output standardization, operational safety and reliability, document completeness, and interface friendliness and convenience evaluation, which are sequentially recorded as t51 , t52 , t55 (Fig. 2).
Fig. 2 Integrated system of engineering project information management system
4.2 Establishment of a Comprehensive Model of Engineering Construction Management Information System Assume that the indicator factors to be evaluated are generally W and the first-level indicators are recorded as t1 , t2 , . . . , ti etc., and there is no intersection between each level of indicators. Let the first-level indicator ti contain h secondary indicators, which are recorded as t1i , t2i , thi . Proceed as follows: Using the analytic hierarchy process, through the pairwise comparison between the indicators of the same level, the weight matrix is obtained, and the weight of each
1236
S. Li
indicator is calculated. Construct a judgment matrix: ⎡
t11 t12 ⎢ t21 t22 P=⎢ ⎣... ... ti1 ti2
... ... ... ...
t1i t2i ... tii
(1)
where: tii delegates the relative importance coefficient of the ith to jth in the sibling index. The trait vector W corresponding to the maximum eigenvalue λmax of the matrix is solved. The eigenvector W obtained is normalized, which is a weight vector. Then the consistency check is performed on the determine matrix: D P is the consistency index of the determine matrix, D P = (λmax − n)/(n − 1)β + (μi + π )max
(2)
D I is also a random consistency indicator, which can be obtained by looking up DI the table; D P is the random consistency ratio of the determine matrix, DP = DR When |DP| < 0.1 or λmax = n and C I = 0, the judgment matrix P is considered to have good consistency. The road and bridge engineering construction information system does not have the right to store, retrieve, and query the project management information database, and the engineering management tools must reflect the corresponding management ideas and the inter-departmental working relationship between different and user groups. The dependence of the data in each part of the system reflects the collaborative work of various departments. The construction process of the project information system is not only the process of Internet software development, but also a process of continuous development and improvement.
4.3 Application of Construction Project Management Information System (1) Establish and improve the working mechanism of engineering construction management information system In order to increase the establishment of the engineering project construction management information system and ensure the correctness and timeliness of the information data, first of all, it is necessary to construct departments and institutions that can independently supervise and manage the information system, arrange special personnel to be responsible for information release, data update and resource development. Comprehensive management and supervision; Secondly, it is necessary to establish a sound working mechanism, and introduce a series of management information system information inquiry and management systems and methods related
Construction and Application of Information Management …
1237
to project cost, and establish perfect personal information for information management personnel, such as vocational training invitations and work rights, performance appraisal, departmental complaints and other mechanisms. (2) Improve the database of engineering construction information system The establishment of way and bridge engineering project construction information system is not only the simple establishment of modules, the collection and accumulation of raw data, but also the deep processing and processing of data to improve the utilization of information. Therefore, on the basis of the original data collection and storage of way and bridge engineering project construction, the dynamic data should be extracted and analyzed, the relevant information resources in the field of project cost construction should be continuously updated, and the content and use level of the database should be enriched and enriched, and the country should be rationally It is linked with the local government’s legal norms and related policies and databases, and continuously processes the information to meet the needs of users of different levels of information on way and bridge construction information. (3) Strengthening the training of information quality of engineering construction management personnel Cultivating the information quality of way and bridge engineering project construction management personnel is not only the requirement for improving the information quality of engineering construction management personnel, but also an important way for the smooth promotion of way and bridge engineering project construction information systems. Therefore, it is necessary to establish relevant mechanisms and adopt various effective forms to strengthen the existing informatization knowledge training for way and bridge engineering project construction management personnel, such as continuing education, short-term training, various information technology training courses, off-campus learning, and rounds. Train training and other methods, cultivate a team of talents who understand both way and bridge engineering project knowledge and information technology to promote the establishment, application and promotion of way and bridge engineering project construction information systems.
5 Conclusion The importance of way and bridge construction for social production and life is undoubted. It is the hub of China’s transportation system. Without the guarantee of ways and bridges, all transportation activities will be lost. The management of way and bridge engineering projects is a long-term task in China’s engineering construction. Strengthening the management of way and bridge engineering construction projects in China is very important in China’s road transportation infrastructure construction. China’s road and bridge construction is in a period of rapid development, not only to achieve a quantum leap, but more importantly, to upgrade quality management to a new level, which requires considerable practical experience and long-term
1238
S. Li
exploration and research. Improving the systematization of engineering construction information management is an effective way to ensure the quality of construction. Therefore, for the management of bridge engineering construction projects, it is necessary to explore practice and time. In the ever-evolving modern society, the information management of road and bridge engineering construction projects has become a key part of the success of a company and a construction project.
References 1. Tah, J.H.M., and V. Carr. 2014. Information modelling for a construction project risk management system. Engineering Construction & Architectural Management 78: 49–51. 2. Li, B., F. Wang, and Z. Ming. 2015. Application of geographic information system (GIS) in urban rail transit construction safety and operation monitoring. Applied Mechanics and Materials 743: 692–697. 3. Dan, D., Yanyang Chen, and Rong Xiao. 2014. Dynamic properties analysis of a stay cabledamper system in consideration of design and construction factors. Earthquake Engineering and Engineering Vibration 13: 317–326. 4. Akanmu, A., and C.J. Anumba. 2015. Cyber-physical systems integration of building information models and the physical construction. Engineering Construction & Architectural Management 22: 516–535. 5. Tai, Y.T., C.H. Huang, and S.C. Chuang. 2016. The construction of a mobile business application system for ERP. Kybernetes the International Journal of Systems & Cybernetics 45: 141–157. 6. Chou, S., and Z. Dai. 2016. Construction and application of specialty-term information for document re-ranking. Online Information Review 40: 1054–1070. 7. Shao, H., Z. Fang, Z. Qin, et al. 2017. Research on an exponential distribution reliability function model based on multi-source heterogeneous data supplements. Grey Systems: Theory and Application 7: 329–342. 8. Motawa, I. 2017. Spoken dialogue BIM systems—An application of big data in construction. Facilities 35: 787–800. 9. Dang, C.N., L.H. Long, S.Y. Kim, et al. 2017. Identification of risk patterns in Vietnamese road and bridge construction. Built Environment Project & Asset Management 77: 9–72. 10. Zeng, F., L.I. Mingguang, J. Chen, et al. 2017. Development and application of a system for dynamic and synchronous analysis of both monitor data and construction information in foundation Pit groups. Journal of Shanghai Jiaotong University 51: 269–276.
Control Mechanism of Network Public Opinion on Emergencies in Big Data Era Baozhi Wang
Abstract Big data, as a new way to improve the government governance ability, will effectively improve and enhance the traditional public opinion early warning, monitoring and control mechanism. In addition, it will promote the monitoring, evaluation and control of network public opinion (NPB) to enter the stage of high efficiency and precision. In big data era, the NPB on emergencies is characterized by the pluralistic fission of network information, the complexity of public psychology and the diversity of public views. Therefore, the control mechanism can be optimized from two aspects: the horizontal dimension of improving the government’s decisionmaking ability and the vertical dimension of the precise management and control of NPB cycle. Keywords Big data era · Emergencies · Network public opinion · Control
1 Introduction The new generation of information technology continues to merge, making the world enter the “big data era”. Big data has become the internal demand and inevitable choice to promote the modernization of government governance ability [1]. With the popularity of the Internet, people are becoming more and more inclined to use the Internet to express their personal opinions considering the convenience and efficiency. Big data will effectively improve and upgrade the traditional public opinion early warning, monitoring and control mechanisms, and will promote the NPB monitoring, evaluation and control into a high-efficiency and precision stage [2].
B. Wang (B) Hunan Judicial Police Vocational College, Changsha 410131, Hunan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_145
1239
1240
B. Wang
2 Emergencies in Big Data Era Natural disasters, accident disasters and public health events are divided into four levels according to the degree of social harm and the scope of influence [3]. The interaction of different ideology and culture makes it show pluralistic, diverse and changeable characteristics, and the social situation, public opinion and the ideological dynamics of the public can be reflected quickly and centrally on the network. To some extent, public opinion is the concentrated embodiment of people’s feelings, people’s wisdom, people’s power and public opinion. Because emergencies mostly involve the vital interests or concerns of the public, the relevant information will often spread to the network within a short period of time, thus forming a situation of public concern, comments and even direct participation. As a result, this become different from the traditional social public opinion of the NPB [4].
2.1 The Representation of Network Public Opinion on Emergencies in Big Data Era 2.1.1
Pluralistic Fission of Network Information
In real life, the constant occurrence of natural disasters affect the public’s nerves, especially the popularization of 4G technology. The public does not have to stay in front of the computer to access instant messages through mobile phones. In the era of media information explosion, and once emergencies occur, they often log on to all kinds of media quickly, and the abundant information quickly occupies Weibo, WeChat, post bar and various forums, attracting the attention of the public and stimulating the nerves of the public. At the same time, event witnesses often upload text, pictures, audio, video and other information to the Internet at the first time. Moreover, this transmits information to the public. Therefore, after the emergency, the network public opinion is formed rapidly, and the network information shows the trend of pluralistic fission due to the diversification of information [5].
2.1.2
Public Psychology Is Complex
In emergencies, some members of the public can achieve objective discrimination and rational analysis, but there are also a considerable number of public rumors, ballads, rumors, thus increasing the difficulty of dealing with the network public opinion of emergencies. The reason for this kind of rumor, ballads and rumor is that some of the public have the psychology of seeking difference, which leads to their indistinguishable or even wanton spreading of rumors on the network information. This complex psychology aggravates the degree of public emotional fermentation and differences of attitude and views, which makes the network public opinion appear
Control Mechanism of Network Public Opinion …
1241
bad tendency, and then increases the difficulty of controlling the network public opinion of emergencies.
2.1.3
Public Opinion Is Diverse
When emergencies occurred, the public was objectively subjected to “information bombing”, coupled with complex psychological states and pluralistic values, resulting in some members of the public often holding different views and attitudes in the face of the same incident. This trend of freedom and pluralism is particularly rapid in the “self-media era”. Different voices represent different emotions, views and attitudes, as well as different value orientations. Different emotions, attitudes and views often lead to the event showing a “roller coaster” development trend, bringing the network public opinion to the inflection point [6]. In the case of diverse public views, network public opinion often presents multi-voice, multi-inflection point representation.
3 The Control Mechanism of Network Public Opinion on Emergencies in Big Data Era 3.1 Horizontal Dimensions—Improve Government Decision-Making Capacity First, strengthen the scientific decision-making consciousness. The decision-making consciousness of individual local governments lags behind the development speed of the Internet, which leads to the continuous fermentation of network public opinion in the process of controlling many emergencies. Moreover, it has a negative impact on the credibility of the government. In this regard, the government should fully understand the characteristics of network public opinion of emergencies in big data era, and make clear the importance of network public opinion in dealing with emergencies. After the emergency, the public is particularly concerned about the government’s position and emergency response plan. Therefore, the government should abandon the traditional decision-making consciousness such as “covering, sealing” and effectively protect the right to know, etc. Second, improve the technical support for scientific decision-making. In the event of an emergency, the government should quickly collect and store the massive network data and constantly monitor the changes of the data. On this basis, the relevant technology of big data should be used to clean and integrate the massive data [7]. Combined with text mining technology, a large number of low value density data will be screened, so as to obtain the high value data related to the public opinion of the emergency network. It is different from the previous network public opinion
1242
B. Wang
control in the following aspects: using big data to realize the massive data concentration and extraction, and showing the social relationship structure behind the data, and effectively resisting the data explosion and realizing the value added of public opinion information. Therefore, in the face of the public opinion of the network of emergencies, we should further improve the scientific decision-making ability of the government, improve the precision of the government’s management and control of the network public opinion, and reduce the harm caused by the network public opinion on social security [8]. Third, adopt scientific working methods. When the government faces the network public opinion of emergencies, in addition to the two main elements of scientific decision-making consciousness and technical support, the government should also scientifically analyze and judge the object elements involved in the network public opinion of emergencies. The media is the mouthpiece of the Party and the government. The media should take the initiative to bear the social responsibility of information release and dissemination and strictly abide by the industry self-discipline standards. In addition, in the Internet, the attitude and views of scholars, entrepreneurs and independent commentators also greatly affect the trend of network public opinion. In this regard, the government should do a good job of communication, and guide it to publish and disseminate positive public opinion.
3.2 Vertical Dimension—Accurate Control of Public Opinion in the Network First, it is the incubation period–the golden period of crisis early warning research. The incubation period of network public opinion often occurs at the beginning of an emergency, and netizens are still in the stage of understanding the basic information and context of the incident. This stage is usually only a few hours, and it is the government’s analysis of the nature of the crisis. During this period, the government should make full use of big data technology to adjust and compare the handling of public opinion in the previous cases in the database of emergency cases, and promptly study and judge the tendency of public opinion that may occur in emergencies, and make preventive decisions, so that to guide the healthy development of public opinion [9]. Second, it is the explosive period–the key period of network public opinion analysis. A few hours after the emergency, the network presents a large number of public opinion information. Namely, it is the outbreak period of network public opinion. The government should quickly carry on the information extraction and the information value analysis; at the same time, they should start the network topic monitoring system, pay close attention to the network public opinion trend, and grasp the network public opinion control initiative. Behind a large number of technical work, the government should also carry out the analysis of the tendency of network public opinion; namely, they should analyze the public psychology and emotion that may
Control Mechanism of Network Public Opinion …
1243
be involved in the network public opinion of this emergency and consult experts and scholars [10]. Third, it is the diffusion period—the critical period of network public opinion control. The public opinion will further spread from the network public opinion to the social public opinion. Therefore, the government should further sort out the public opinion information of the two branches online and offline and collect it, so that to integrate the public opinion data during the explosive period. As a result, they can analyze the effect of the previous decision and eliminate the inappropriate contents of the previous decision in a timely manner. At the same time, the network and social public opinion should be targeted, so that to guide to avoid the expansion or out of control of the situation [11]. Fourth, it is the recession period–the end and summary of network public opinion information. After the diffusion period, the network public opinion of emergencies gradually entered the recession period, and the attention of netizens decreased. This stage is a period for the government to sum up, summarize and file the events. The relevant government departments should sort out the control process of network public opinion in time, sum up the experience and lessons in the process of network public opinion control, and provide reference for the control of emergency network public opinion in the future.
4 Summary With its technical advantages, big data can collect huge amounts of data at high speed and clean them, screen them, eliminate low-density and worthless information, so that to integrate high-value information. This provides technical support for the government to monitor, assess and control emergency network public opinion. Therefore, on the basis of fully understanding the new characteristics of network public opinion in big data era, the government should constantly improve the ability of network public opinion control from both horizontal and vertical aspects.
References 1. Lin Zhen. 2019. The orientation and approach of network public opinion governance in public emergencies. Journal of Intelligence (04): 119-124. 2. Yuexin, Lan, Liu Bingyue, Zhang Peng, Xia Yixue, Liu Mo, and Lian Zhixuan. 2018. Research on the transfer model of netizens’ attention based on big data public opinion. Modern Intelligence 38 (10): 10–15. 3. Tang Mingwei, Su Xinning, and Zhang Yanqiong. 2018. Big data emergency Internet of Things intelligence collection. Intelligence Science 36 (3): 46–50+69. 4. Xia Yixue, Lan Yuexin, and Zhao Yumin. 2018. Research on alienation control model of network public opinion information under the background of big data. Modern Intelligence 38 (2): 3–11.
1244
B. Wang
5. Mao Yufeng. 2017. A study on the butterfly effect mechanism of network public opinion in colleges and universities from the perspective of new media. Jiangsu Higher Education (12): 82–85. 6. Lan Yuexin, Xia Yixue, Liu Bingyue, Gao Yang, and Li Zeng. 2017. Research on emotional evolution mechanism and trend prediction of internet users for public opinion big data. Journal of Intelligence 36 (11): 134–140. 7. Tang Kailin, and Li Shiyue. 2017. Ethical dilemma and order reconstruction of network public opinion in emergencies. Journal of Xiangtan University (Philosophy and Social Sciences Edition) 41 (6): 148–152. 8. Xia Yixue, Lan Yuexin, Liu Bingyue, and Qu Zhikai. 2017. Research on network public opinion information interaction model under big data environment. Modern Intelligence 37 (11): 3– 9+16. 9. Zhu Jiewang, and Zhu Lingling. 2017. Research on network public opinion early warning of emergencies based on big data analysis. Intelligence Theory and Practice 40 (8): 61–66. 10. Wang Zhiwei, Xing Yunfei, Zhang Liu, and Li Shimeng. 2017. Research on the development trend and trend of network public opinion at home and abroad under the environment of social media. Intelligence Work (4): 6–14. 11. Ding Xuejun, Fan Rong, and Yang Jinyi. 2017. Research status and review on network public opinion of public health emergencies. E-government (6): 47–56.
Decision-Making Analysis of Prognosis of Renal Transplant Recipient on the Base of Data Mining Yunhai Yu, Jinguo Wang, Xige Yang and Na Wang
Abstract The survival rate, living status and follow-up status, long-term and shortterm prognosis, acute rejection and rejection prognosis of renal transplant recipients were analyzed by decision tree. This study introduced large sample data of kidney transplantation into the decision tree, which was a statistical model to predict the prognosis of renal transplant recipients, and realize the visual expression of the various factors affecting and prioritization, and provide reliable basis for clinical practice. The integration of the renal transplantation with the software, database and decision-making tree model can realize dynamic growth of model to realize the possibility of personalized medicine for patients. Keywords Decision-making analysis · Prognosis · Renal transplantation · Recipient · Data mining
1 Data Mining Can Help Find New Prognostic Factors In recent years, kidney transplantation has become the most ideal treatment for end-stage renal disease. However, many factors such as medication and reexamination after renal transplantation may lead to unsatisfactory postoperative treatment compliance and often lead to adverse consequences [1].
1.1 Conventional Prognostic Factors Postoperative treatment compliance of renal transplantation patients is generally good, and most patients can take antibiotics on time after surgery to take immunosuppressants on time according to medical advice, but the coordination degree of Y. Yu · J. Wang Department of Urology, First Hospital of Jilin University, Changchun, China X. Yang · N. Wang (B) Department of Anesthesiology, First Hospital of Jilin University, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_146
1245
1246
Y. Yu et al.
active reexamination of blood, urine routine, liver and kidney function and antirejection drug concentration is relatively low, and their bad living habits are not strictly controlled [2]. Therefore, after the renal transplant patient is discharged from the hospital, the medical staff should still remind the patient of the timely review by telephone regularly, and the review items should not be limited to the anti-rejection drug concentration and the presence or absence of infection [3]. In addition, is to be improved before discharge in patients with follow-up of health education, including the recent should avoid as far as possible in public places, reducing frequency of staying up late, avoid excessive overworked, pay attention to diet and give up smoking and drinking warm situation, through effective self-management develop good habits, not because of the improved and negligence, cause irreversible consequences [4].
1.2 Problems Discovered by the New System The classical influencing factors include immune factors, non-immune factors and psychological factors. The rejection mediated by neon-specific antibodies such as ABO antibodies and HLA antibodies are important factors affecting the long-term prognosis of renal transplantation. Although there is a standardized procedure for ABO incompatibility kidney transplantation, there is still a risk of kidney transplantation associated with ABO incompatibility [5]. Therefore, some studies suggest that DSA intensity is of great significance to the immune risk stratification and clinical management of sensitive patients. In addition to immune factors, the prognosis of renal transplantation is also affected by many physiological factors, such as cardiovascular disease, obesity, and advanced age infection history. The psychological factors of xian transplantation mainly include compliance, mental state, economic family and social support [6, 7]. With the development of science and technology and the accumulation of clinical experience, the factors that have not been paid enough attention or have no technical ability to identify may have an important impact on the prognosis of renal transplantation, and there are new understandings of the existing factors [8].
2 Data Preprocessing In the process of data export and sorting, it is found that there are some problems such as clutter, repetition and incomplete in the original data. Therefore, data preprocessing is required, that is, the extracted original data is pre-processed before decision tree analysis to meet the analysis needs [9]. Common data preprocessing methods mainly include data cleaning, data integration, data transformation and data reduction. Data cleaning is the process of dealing with faulty data, redundant data, and data noise, which is a combination of data that has been created by different and incompatible
Decision-Making Analysis of Prognosis …
1247
rules [10]. Data integration combines multiple files or processes the original data obtained from the operating environment of multiple databases. It mainly involves data selection, data conflicts and inconsistent data processing. It is often necessary to conduct the aforementioned data cleaning on redundant data. Data transformation is to find the characteristics of data and convert the data into suitable forms for data mining, which mainly includes normalization, protocol, switching, projection, smoothing, aggregation, data generalization processing, attribute construction and other operations [11].
3 Design of Temperature and Humidity Auto-Control System 3.1 Data Reduction Data reduction is to search for data features on the basis of a full understanding of the content of data itself, and to compress data through aggregation, deletion of redundancy and other methods without affecting data mining results, so as to improve the efficiency of mining and analysis. There are two main approaches: attribute selection and data sampling [12].
3.2 Data Cleaning Missing values and outliers should be detected. For the missing values in the original data, corresponding processing methods are adopted according to the actual situation. The absence of primary diagnosis of receptor, pathological diagnosis of receptor, renal artery and aorta connection and other information is reasonable and shall not be dealt with. Other missing data were verified by telephone follow-up except physical examination and test information. Redundant data should be deleted [13]. For outliers, check them in the original database and correct them if there is an input error; otherwise, correct them if there is an error during telephone follow-up.
3.3 Data Transformation The sorting variables are assigned. The derived and sorted continuous variables are tested for distribution. If the results are not normally distributed, they are converted to normal distribution by means of logarithmic transformation.
1248
Y. Yu et al.
3.4 Decision Tree Analysis of Renal Transplant Recipient Survival The survival status and follow-up status of the recipient were taken as the target variables, and the donor information, recipient information, matching information, surgical information, drug information and short-term and long-term follow-up information were taken as independent variables for decision tree analysis [14]. A retrospective analysis of 294 cadaver kidney transplantation cases was performed. The overall survival rate was 81.7% and the rate of acute rejection was 20.7%. A retrospective analysis of 44 cases of pediatric kidney transplantation conducted from 2002 to 2011 showed that the GFR 3 years after surgery was 59.3 soil 11.5. A retrospective analysis of 637 kidney transplantation patients from 1990 to 2003 showed that 43.1% of them were diagnosed with CAN within 10 years [15]. A cohort study of 395 renal transplant recipients showed a malignant tumor incidence of 5.8%. However, due to the serious lack of early data in the database, although it does not affect the results of decision tree analysis, it will cause the deviation of basic data statistics. The followup entry was not timely [16]. Only enter positive results, etc. The management of database entry should be standardized in the future.
3.5 System Application The user can download the APP to the phone in the android APP market, register and log in, enter the main interface, and click the check single query option to enter the query interface. The user can see the query options in the query interface. The outpatient user needs to input the user name and outpatient examination document number, and the ward user needs to input the user name and hospitalization number, so as to find the results of individual examination report, and store the examination report data in the software [11]. Check for the storage of data, we analyzed the automatic sorting functions in software Settings, can be the result of each report trend chart, each index of the time, data, convenient user and see the doctor, the more clear understanding of the change of the test index, is adjusted according to the result of more targeted drug use, convenient for retrospective analysis. We set the reference value range in the trend chart, and the abnormal indicators will show, so that users can understand the result changes more clearly and communicate with doctors about the changes of the disease more pertinently.
4 Conclusion All existing studies on prognostic factors of renal transplant recipients have a common shortcoming, which is the lack of organization and systematicity. Due to the messy
Decision-Making Analysis of Prognosis …
1249
and real-time results in literature review, the conclusions drawn from the primary data statistics cannot be combined with the subsequent sample increase, which greatly reduces the significance of clinical practice guidance. The main reason is the lack of sufficient sample size and appropriate statistical tools, while data mining is just a method to mine valuable laws from large sample data, and decision tree analysis is one of the tools. By connecting the decision tree analysis algorithm with the kidney transplantation follow-up database, the dynamic growth of the model can also be achieved, which is particularly important in the current trend of big data. Acknowledgements This research was supported by the First Hospital of Jilin University.
References 1. Atthobari, Jarir, Auke H. Brantsma, Ron T. Gansevoort, Sipke T. Visser, Folkert W. Asselbergs, Wiek H. van Gilst, Paul E. de Jong, and Lolkje T.W. de Jong-van den Berg. 2006. The effect of statins on urinary albumin excretion and glomerular filtration rate: results from both a randomized clinical trial and an observational cohort study. Nephrology Dialysis Transplantation: official publication of the European Dialysis and Transplant Association—European Renal Association. 2. Weimert Nicole, A., and R. Alloway Rita. 2007. Renal transplantation in high-risk patients. Drugs 3: 222–224. 3. Melab, Nordine. 2001. Data mining: A key contribution to E-business. Information & Communications Technology Law 10 (3): 535–539. 4. Shu, Wanneng, and Lixing Ding. 2011. ECOGA: Efficient data mining approach for fuzzy association rules. Journal of Software 1: 312–315. 5. Zaher Al Aghbari. 2004. Array-index: A plug&search K nearest neighbors method for highdimensional data. Data & Knowledge Engineering 3: 327–331. 6. Shepherd, James, John J.P. Kastelein, Vera Bittner, Prakash Deedwania, Andrei Breazna, Stephen Dobson, Daniel J. Wilson, Andrea Zuckerman, and Nanette K. Wenger. 2007. Effect of intensive lipid lowering with atorvastatin on renal function in patients with coronary heart disease: the Treating to New Targets (TNT) study. Clinical Journal of the American Society of Nephrology: CJASN 3: 432–437. 7. Cerrito, Patricia B. 2007. Choice of antibiotic in open heart surgery. Intelligent Decision Technologies 1: 12–15. 8. Yang, Wan-Shiou, and San-Yih Hwang. 2005. A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications 1: 31–35. 9. Phatak, Hemant M. 2005. Retrospective detection of potential medication errors involving drugs with similar names. Journal of the American Pharmacists Association 45 (5): 622–627. 10. Visentin, Jonathan, Mélanie Marroc, and Gwendaline Guidicelli. 2015. Clinical impact of preformed donor-specific denatured class I HLA antibodies after kidney transplantation. Clinical Transplantation 29 (5): 631–633. 11. JH Hsu, CS Tseng, and SC Chen. 2001. A methodology for evaluation of boundary detection algorithms on breast ultrasound images. Journal of Medical Engineering & Technology 4: 529–534. 12. Pinto, Duane S., Paul D. Frederick, Anjan K. Chakrabarti, Ajay J. Kirtane, Edward Ullman, Andre Dejam, Dave P. Miller, Timothy D. Henry, and C. Michael Gibson. 2011. Benefit of transferring ST-segment–elevation myocardial infarction patients for percutaneous coronary intervention compared with administration of onsite fibrinolytic declines as delays increase. Circulation 124 (23): 3127–3132.
1250
Y. Yu et al.
13. Di Mario, Carlo, Dariusz Dudek, Federico Piscione, and Waldemar Mielecki. 2008. Immediate angioplasty versus standard therapy with rescue angioplasty after thrombolysis in the Combined Abciximab REteplase Stent Study in Acute Myocardial Infarction (CARESS-in-AMI): An open, prospective, randomised, multicentre trial. The Lancet (9612): 8372–8375. 14. Kute, V.B., A.V. Vanikar, and H.V. Patel. Outcome of renal transplantation from deceased donors: Experience from developing country. Renal Failure 36 (8): 1215–1220. 15. Warejko, J.K., and S.P. Hmiel. 2014. Single-center experience in pediatric renal transplantation using tiiymoglobulin induction and steroid minimization. Pediatric Transplantation 18 (8): 816–821. 16. Boratynska, M., A. Wakulenko, M. Klinger, and R. Szyber. 2014. Chronic allograft dysfunction in kidney transplant recipients: Long-term single-center study. In Transplantation proceedings, 2673–2677.
Application of Virtual Technology in the Management of Computer Laboratories in Multi-campus Colleges and Universities Xudong Zhang
Abstract With the popularization of digital campus construction and the increasing demand for practical and applied talents in society, the importance of computer practical teaching in Colleges and universities has become increasingly significant. As an important place for practical teaching, the management of computer laboratories should also be highly valued. This paper briefly introduces the advantages of using information technology to serve the construction and management of computer laboratories in Multi-campus Colleges and universities, and the application of virtual technology in the management of Multi-campus laboratories. Keywords Virtualization technology · Computer laboratory management · Desktop virtualization technology · Application
1 Introduction With the arrival of the era of big data and the deep integration of information technology and curriculum, the equipment of computer laboratory increases and the scale of management becomes larger and larger, with which the drawbacks of traditional management mode become increasingly prominent [1–3]. For the training of colleges and universities, computer laboratories can train excellent computer professionals and contribute to the development of science and technology in society [4–7]. Especially in today’s information society, computer technology, Internet technology and network technology are the professional skills that computer professionals need to master [8–10]. However, there are some problems in the construction and management of computer laboratories in Colleges and universities. It is necessary to introduce virtual cloud technology to promote the construction and management of computer laboratories in Colleges and universities [11–13]. In this paper, information technology is used to serve the construction and management of computer laboratories in Multi-campus universities. The application of virtual technology can make X. Zhang (B) Education Technology and Network Center, Jilin Engineering Normal University, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_147
1251
1252
X. Zhang
up for the shortcomings in the construction and management of computer laboratories in Colleges and universities. [14, 15] To improve the level of construction and management of computer laboratories in Colleges and universities, we can start with the establishment of experimental platform and virtual desktop.
2 Application of Virtualization Technology in Computer Laboratory 2.1 Virtualization Technology Virtualization technology is a technology of abstract resource management, which abstracts physical resources into logically manageable resources, centralizes distributed application resources and manages them in a unified way, builds hardware resource pools, realizes flexible allocation on demand and dynamic management, and achieves the goal of maximizing resource utilization. Virtualization is transparent from the perspective of user experience, and user usage is no longer limited to the physical upper limit of hardware. Virtualization can be divided into storage virtualization, server virtualization, desktop virtualization, network virtualization and so on. Virtualization technology has the following advantages: fast installation, easy backup, high integration, isolation, easy transplantation, easy management, support for running a variety of operating systems, strong disaster tolerance, low cost of equipment purchase and maintenance, high resource utilization, and promote resource sharing.
2.2 Virtual Machine Software On the experimental platform based on VMware virtual machine, a physical machine supports multiple operating systems running at the same time and isolated from each other. Each virtual machine system is encapsulated as a file on the host hard disk. From the management point of view, it can rapidly deploy the new experimental environment, and is easy to backup and transplant. Therefore, VMware virtual machine can solve some problems in computer experiment teaching and management to a certain extent: in management, software installation in network simultaneous transmission mode, some software needs to be activated and run one by one after the end of simultaneous transmission to obtain relevant hardware information before it can be used normally, and these software can be installed in virtual operating system, and then through simultaneous transmission of virtual machine. This problem can be solved. In terms of teaching, students can practice installing operating system and BIOS settings on the virtual machine, which can not be completed on the host, and the experimental results can be saved by copying the virtual machine files. In addition,
Application of Virtual Technology in the Management …
1253
some courses, such as embedded system and operating system, need to be carried out under Linux operating system. Computer network courses need more than one device to complete. The operation of computer security courses may endanger the host security, which can be solved on the virtual experimental platform.
2.3 Desktop Virtualization Technology When all conditions permit, we can consider using desktop virtualization technology to build a virtualization experimental platform. Desktop virtualization refers to the virtualization of the desktop operating system used by the end user, which is separated from the physical computer by the virtual desktop. Through virtualization technology, a large number of virtual machines are generated on demand by the remote server and delivered to the end user through the remote desktop protocol. Because the computing processing is undertaken by the server, the requirement of terminal computer configuration is very low, and mobile device access is supported, which enables users to break the time and space constraints and experience desktop operating system like traditional computers. Computer experiment teaching mainly includes public basic experiment teaching and professional experiment teaching. Professional experiment teaching can be classified according to different majors, so desktop virtualization can be classified according to this. Firstly, server virtualization technology is used to integrate existing servers and form resource pools. Task-driven virtual servers are separated into independent virtual servers responsible for different tasks. Then, virtual machines are allocated according to the professional categories, and corresponding teaching software is installed, so that public foundations and various specialties can be allocated to dedicated virtual machines. Finally, the virtual machine is delivered to the students of the corresponding laboratory through desktop virtualization technology.
3 Advantages of Virtualization Technology in the Management of Computer Laboratories in Multi-campus Universities 3.1 Improve Management Efficiency With the introduction of virtualization technology into the management of computer laboratories, the management efficiency of laboratory managers has made a qualitative leap, not only saving manpower and material and financial resources, but also bringing better services to students and teachers, so as not to affect students’ learning and teachers’ teaching because of the management problems of laboratories. Management efficiency is mainly improved through the following aspects. The first is to
1254
X. Zhang
install the system, which can install the virtualized desktop on the computer and copy it to the user. Secondly, even if the computer in the laboratory is upgraded or antivirus, the computer can still operate. Thirdly, if the user’s computer can not be used after virtualization, the updated virtualized desktop will be released to the user. Finally, due to the differences in user disciplines and research fields, different applications need to be installed on the desktop. Managers can install different applications and settings according to users’ needs and publish them on users’ computers.
3.2 Reducing Management Cost The emergence of virtualization technology has made many IT personnel and department leaders realize that it is an opportunity and way to save IT costs. At present, virtualization technology has broken the previous two major items of virtual memory and server virtualization. It has developed network virtualization, file virtualization storage virtualization and microprocessor virtualization and other fields. Using virtualization technology, PC and data are virtualized. It is proposed that the current computing power can be greatly improved, and managers can run a lot of virtual machines on a single resource, so as to achieve the goal of reducing costs, saving energy and reducing emissions.
3.3 Management and Maintenance Work The introduction of virtualization technology into the management of computer laboratories in Colleges and universities has brought great convenience to the daily management of managers. Managers can use virtualization to arrange the computer and other equipment in the laboratory in advance according to the needs of users. Managers can use previous experience and virtualization technology. It takes only a few minutes to deploy the Windows system to work. At the same time, managers can use some of the functions to restore and clear the desktop and environment used by users; and also use virtualization technology to meet the needs of different systems and equipment, and the workload is much smaller in the management of various devices, which greatly improves the efficiency of system equipment management. And because of virtualization technology, managers do not need to install and manage each computer, but only need one computer, set up a virtualized desktop, deploy other computers and set up read-only.
Application of Virtual Technology in the Management …
1255
3.4 Unified Desktop Environment Desktop virtualization technology can provide a unified operating system desktop environment for terminal devices, and the performance requirements of terminal devices are very low. Regardless of the configuration of the laboratory computer, as long as it can meet the minimum configuration requirements of software operation, it can run a unified desktop application environment according to the needs. Because the processing of desktop data is carried out on the server, the terminal device only displays virtual desktop image and transfers operation commands. When the software is installed or the operating system is upgraded, the administrator only needs to perform super-privilege operation on a virtual desktop to synchronize immediately to other terminal devices.
3.5 Data Information Security Desktop virtualization data information is stored on servers and networks, and the recovery of user data will not be affected by the replacement of terminal devices or the failure of terminal devices. As long as the virtual desktop image in the server is non-destructive, it can ensure the normal use of virtual desktop in the network terminal equipment, and ensure the smooth progress of experimental teaching.
3.6 Software Compatibility No Longer Limited Desktop virtualization technology can generate virtual hardware ID number by dividing virtual machine resources, which can effectively solve the problem of binding hardware ID when software registration, and thus solve the problem of dependence of various application software and management software on terminal hardware device parameters.
4 Application Exploration and Practice of Desktop Virtualization Technology In order to solve the problems of repeated construction, low utilization rate and high cost of operation and maintenance management of school laboratories, realize the goal of cultivating applied talents in multi-campuses of colleges and universities, and meet the practical needs of the development of educational informatization and information technology, it is necessary to establish computer laboratories by
1256
X. Zhang
constantly exploring the application of desktop virtualization technology in the construction and management of specific computer laboratories. The computer room is managed in a new way, which improves the work efficiency and guarantees the effective development of school experimental teaching.
4.1 Desktop Virtualization Technology Virtualization is a broad term. In computer, it usually refers to computing elements running on a virtual basis rather than on a real basis. Virtualization technology can expand the capacity of hardware and simplify the process of software reconfiguration. Virtual Desktop Infrastructure is a server-based computing model, and borrows the traditional thin client model. But it allows administrators and users to gain the advantages of two ways at the same time: desktop virtualization technology separates the running and storage of data from the desktop, and all users’ desktop virtualization manages and manages the data center through desktop virtualization. The technology generates a large number of independent desktop operating systems. All user terminals can access the personalized desktop anytime and anywhere through the campus network by inputting user names and passwords through the proprietary virtual desktop protocol, thus enabling users to obtain a complete PC experience.
4.2 Framework of Desktop Virtualization Technology Desktop virtualization technology framework mainly includes client device, desktop virtualization client, desktop virtualization connection server and Desktop Virtualization Server cloud. Figure 1 shows the composition of the main components in the desktop virtualization technology framework and their relationships. Fig. 1 Desktop virtual technology framework
Application of Virtual Technology in the Management …
1257
4.3 Application of Desktop Virtualization Technology in Computer Laboratory Construction In order to enable students of different campuses and their majors to master the applied skills of using audio and video processing, large-scale image processing, network experiment, web page production, mathematics teaching, office application, database, programming language, statistical software, etc., it is required that the new laboratory platform should be able to dynamically and rapidly build a large number of high-complexity shared experimental environment, and better. Satisfy and support the experimental and practical teaching of various subjects in schools. Platform technology architecture should be simple and open. By building a dynamic resource base platform, we can achieve the goals of integrating computing resources, improving equipment utilization, reducing application complexity, enhancing the sharing ability of storage resources and saving energy consumption. It is important to be able to meet the teaching requirements that vary with the needs, while being easily deployed, managed and maintained.
5 Summary Virtual cloud technology plays an important role in the construction and management of computer laboratories, which makes up for the shortcomings of the construction and management of computer laboratories under the traditional mode and effectively reduces the cost of construction and management. It can establish a virtualized computer experimental platform to provide access to desktops anytime and anywhere, improve the environment of computer experiments, and enhance the construction and management of computer laboratories. The level.
References 1. Joly, M., R. Rocha, L.C.F. Sousa, et al. 2015. The strategic importance of teaching Operations Research for achieving high performance in the petroleum refining business. Education for Chemical Engineers 10: 1–19. 2. Witherington, D.C. 2016. The explanatory significance of wholes: How exclusive reliance on antecedent-consequent models of explanation undermines the study of persons. New Ideas in Psychology 44: S0732118X16301593. 3. Minervini, M., H. Scharr, and S.A. Tsaftaris. 2015. The significance of image compression in plant phenotyping applications. Functional Plant Biology 42 (10): 1–43. 4. Kihana, T., H. Tsuda, S. Teshima, et al. 2015. Prognostic significance of the overexpression of c-erbB-2 protein in adenocarcinoma of the uterine cervix. Cancer 73 (1): 148–153. 5. Lan, D., X. Zhang, R. He, et al. 2015. MiR-133a is downregulated in non-small cell lung cancer: A study of clinical significance. European Journal of Medical Research 20 (1): 50.
1258
X. Zhang
6. Rancés, B., D. Elizabeth, M. Orlando, et al. 2015. Prognostic significance of N-Glycolyl GM3 ganglioside expression in non-small cell lung carcinoma patients: New evidences. Pathology Research International 2015 (1): 1–12. 7. Vassiliadis, V., C. Chalios, K. Parasyris, et al. 2016. Exploiting significance of computations for energy-constrained approximate computing. International Journal of Parallel Programming 44 (5): 1078–1098. 8. Dinesh, M., and K. Sudhaman. 2016. Real time intelligent image processing system with high speed secured Internet of Things: Image processor with IOT. International Conference on Information Communication & Embedded Systems. 9. Bhunia, A.K., A.A. Shaikh, and R.K. Gupta. 2015. A study on two-warehouse partially backlogged deteriorating inventory models under inflation via particle swarm optimisation. International Journal of Systems Science 46 (6): 1036–1050. 10. Oliver, D., O. Ciaran, C. Alison, et al. 2015. A longitudinal study of the feline faecal microbiome identifies changes into early adulthood irrespective of sexual development. PLOS One 10 (12): e0144881. 11. Li, S., D.X. Li, and S. Zhao. The internet of things: A survey. Information Systems Frontiers 17 (2): 243–259. 12. Bonino, D., M.T.D. Alizo, A. Alapetite, et al. 2015. ALMANAC: Internet of Things for smart cities. International Conference on Future Internet of Things & Cloud. 13. Al-Fuqaha, A., M. Guizani, M. Mohammadi, et al. 2015. Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials 17 (4): 2347–2376. 14. Blank, M., S. Brunner, T. Fuhrmann, et al. 2015. Embedded Linux in engineering education. Global Engineering Education Conference. 15. Saari, M., P. Sillberg, P. Rantanen, et al. 2015. Data collector service—Practical approach with embedded linux. International Convention on Information & Communication Technology, Electronics & Microelectronics.
Construction of a New Home Decoration Design Network Sharing Platform Nuan Sun
Abstract Informatization construction of decoration platform is a complex system engineering. Its purpose is to reduce costs, reform the management mechanism, improve the organizational structure and enhance the core competitiveness of the platform. Modern platform management needs information technology. Platform information management is the only way for the survival and development of the platform. Nowadays, the platform for sharing Chinese home furnishings has made the experts of China Interior Decoration Association present and the big cafes of the national home furnishing industry fresh, aroused great attention of the industry and completely overturned the previous cognitive boundary, even if it was a revolution of the home furnishing industry. More importantly, sharing also relieves the pain of household decoration consumption. This paper first introduces what is the network sharing platform of new home decoration design. Through the implementation of home decoration sharing platform, consumers can liberate the pain of home decoration consumption and maximize the interests of consumers. Finally, how to build a new home furnishing design network sharing platform, so that home furnishing design sharing platform has a better development trend. Keywords New home decoration · Design · Sharing platform · Platform construction
1 Introduction In the era of new home decoration in the Internet, users get all two of the home improvement industry. One is the online Internet home improvement platform, and the other is the offline decoration site. The home improvement company is just a place to talk about it [1, 2]. The user’s acquisition of the dual structure of the home improvement service has led to an inexperienced online experience, which ultimately leads to too much difference from the actual construction. The construction under the line is too random, and eventually the user’s home improvement experience continues to be low [3, 4]. Entering the new era, the reconstruction of the place will solve such N. Sun (B) Jilin Engineering Normal University, Changchun 130052, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_148
1259
1260
N. Sun
a pain point and dilemma [5]. The online decoration platform can make the original flat experience scene more stereoscopic and immersive through the new technology of VR and AR. The user’s online decoration platform is no longer just a PS-processed image, but The reality is to reproduce the actual situation of the decoration site, even if the user is not in the messy decoration site, the user can still feel the real situation of the decoration site [6–8]. This paper mainly introduces the construction mode of the new home decoration design network sharing platform.
2 New Home Decoration Design Network Sharing Platform 2.1 Definition of New Home Decoration Design Network Sharing Platform In today’s society, the fast-paced information age is an era in which a huge amount of information is collected, sorted and disseminated rapidly. Traditional information visualization has been unable to meet the needs of people for the rapid presentation and transmission of information nowadays. Promoted by the era of big data, information accessibility and rapid dissemination and sharing become an inevitable choice. The network sharing platform of new home decoration design is an interdisciplinary field. It attempts to study the visual presentation of large-scale home decoration design data information. It helps people quickly find, understand and analyse home decoration design information by using visual presentation technology and methods of graphics and images. It completes a presentation process from abstract data to visualization. By studying human visual perception ability and cognitive psychology, it studies how to transform and convey abstract data in an intuitive, easy-to-read and easy-to-query way of visual presentation, so that the audience can quickly understand the meaning conveyed by information through sensory experience. The network sharing platform of home decoration design is based on the information visualization under the discipline of information design. It integrates the theories and research methods of semiotics, logic, Gestalt principle, cognitive tun, science, image processing technology and other disciplines. The purpose is that, after collecting, sorting out and summarizing information, the designer symbolizes the information on the information carrier to save time for the audience to query and consult information.
2.2 New Home Decoration Design Network Sharing Platform Features Intuitive. Intuitiveness is the biggest feature of the home improvement design network sharing platform. Its purpose is to make the home decoration design more intuitive,
Construction of a New Home Decoration …
1261
so that users can find the required information quickly and clearly. Based on the study of cognition, graphic information is more acceptable to people’s visual nervous system than text information and data information, and is more easily accepted and processed by the brain; timeliness. The booming and widespread popularity of the Internet has accelerated the update of information. In such an era, the update level of design samples has not kept pace with the demand for information, but the medium for data platforms can be extended to New media, networks, etc., are more effective than traditional data processing, and can be updated and fed in real time; fun. When the data sharing platform presents the information resources, it also fully considers the user’s interest and sensory experience in design, and attracts the audience’s interesting visual experience through the design of graphics, color selection and dynamic processing. The attention of the public.
2.3 The Influence and Role of the New Home Decoration Sharing Platform First of all, the designer shares the real solution to the network platform, and gives free reference to all the owners of different types of homes. The owner likes to purchase the solution and service with one click, or customize the new solution. In other words, the designer In the past, only one customer saw a solution. At present, at least one hundred customers of the same type want to buy it. Sharing innovation meets the most concern of the owner is to find a real solution that suits him. Second, the material supplier shares the real product model into the excellent design software of the court, so that the real image design made by the designer is true household type, real effect, real drawing, real product, real quote, real merchant, the owner can In the program, one item is purchased at one click, and the sharing finally realizes the product that the owner wants most and the design plan that he wants. Third, the loading company and the foreman will share their quotation library in the platform in advance, and the owner can select a real image design to click on the construction party, and the construction party will get the total cost of the plan in one second. The owner can compare the bids of multiple construction parties with one click. You can view the details of each project, the brand of the materials, the technical standards, and compare the transaction volume, customer evaluation and other data, and you can commission the construction with one-click orders. Constructed a powerful project management artifact for the owners, including intelligent schedule control, batch settlement, material integration, etc., allowing the owners to easily control the whole process of home improvement, sharing the depth to solve the consumer’s most fear of being cheated, transparent control of the whole process. At the same time, it also brought a large number of customers and intelligent management tools to the construction party.
1262
N. Sun
3 The Realization of the New Home Improvement Network Sharing Platform 3.1 Disadvantages of Traditional Home Improvement Under the current fashionable package purchase, under the condition of losing individual demand, it can only partially solve the above problems. It is still impossible to restore the effects in the drawings, and it is impossible to provide the platform’s real transaction, quality, service and other evaluation data for consumption. Decisionmaking, the inadequacies of traditional home improvement, traditional home decoration, the owner spends a lot of energy and financial resources to see one or two of their own home design, and then according to the program to match materials, estimate the cost, with furniture soft. Under this model, consumers are not in the stage of completion. In fact, it is difficult to really know the decoration effect of their home, the accurate decoration cost, and the integrity and service of the practitioners entrusted. Why? The root cause is that the current designer’s renderings or the material models in the VR diagram are mostly fake products downloaded from the Internet. The designer does not know what brand model, how much, and where to buy it. The renderings are only schematic diagrams. Owners and designers go looking for the selection of these hundreds of products, often only a small part can be restored, this is the root cause of the difference between the home improvement effect picture and the real photo. Imagine that the product model is fake and the effect can be true. Is it? Can the cost be accurate? This often leads the owners to mistakenly think that they have been deceived, which is actually caused by technology and business models.
3.2 The Necessity of Building a New Home Improvement Design Network Platform In the process of home decoration design, designers need to use elements, materials such as modeling, color, media, sound and light, and ingeniously integrate twodimensional, three-dimensional, four-dimensional design methods to scientifically plan and implement information. The most important part of the display design is how to arrange the information in the presentation space reasonably. In the display design, the home improvement designer must combine the space and the information displayed, and the different display information has corresponding display forms and spatial divisions. According to the primary and secondary relationship of the information, logically sorting the displayed information content, rationally planning the exhibition area to be presented by the information, and prescribing the most effective location of the location as the premise of the audience, and reasonably dividing the spatial location of the exhibition area. In addition, the main body of
Construction of a New Home Decoration …
1263
the exhibition space is the person, and the visiting subject has strong liquidity in the exhibition space. Therefore, before the design, the home improvement designer needs to carefully analyze the psychological direction and activity of the visitors, and adapt the shape and size of the exhibition space to the human scale with a scientific attitude to ensure the comfort of the visiting subject in the exhibition space. At the same time, it is necessary to arrange the visit stream of the main body in the most reasonable way, adopting a dynamic, orderly and rhythmic space display form, so that customers can obtain information during the visit, and at the same time can feel the display space flow line. Design charm.
3.3 Construction and Management of Information Sharing System In order to further strengthen the exchange of information and data within the enterprise, regardless of geographical and time constraints, the company proposed a B/Sbased information sharing solution and developed the company’s information sharing system. Our system users can at any time. Any place that can be connected to the Internet can be logged into the system through a browser using a valid user ID and verification code. Through the functions provided by the system, legitimate users can view and download information and documents sent by other users, and can also use the document. And the information is sent to the system, that is, any one or more users within the enterprise. In this way, the exchange of information and data within the enterprise is not limited to the local area network, and the exchange of information and data of the enterprise extends to any place where the Internet can be accessed.
4 New Home Decoration Design Network Sharing Construction According to the product life cycle theory, China’s home improvement industry has experienced rapid development from intangible to tangible, from disorder to order, industry management has gradually standardized, the market has gradually matured, and is currently in the stage of transition from maturity to maturity. The main features of this stage of the home improvement industry are shown in Fig. 1. From Fig. 1. Using the product life cycle theory analysis, it can be seen that today, the home improvement industry is in the middle of growth and maturity.
1264
Lead-in period
N. Sun
Growth period
Maturity
Recession
Sales volume
Fig. 1 The transition of the home improvement industry to maturity
4.1 Strengthening the Understanding of Information Construction in the New Decoration Sharing Platform Improve the understanding of the building decoration sharing platform for informatization construction and ensure the participation of all members. The main body of sharing platform information is sharing. The sharing platform should truly understand the significance of informatization and seriously study the benefits that informationization can bring to the sharing platform itself. Of course, the information sharing construction of the decoration sharing platform is not a matter of any person or department, but the whole process of decision-making, command and participation by the management of the shared platform. The construction and implementation of information sharing of the sharing platform requires the participation of all personnel of the enterprise, especially the leaders should pay sufficient attention. Overall planning, step by step implementation. The policy of sharing platform information should start with “overall planning and step-by-step implementation”. The decoration sharing platform must seek truth from facts when formulating informatization planning. According to its own situation, it should be reasonably analyzed, reasonably planned, and rationally formulated. It should comply with the two principles of meeting the needs of enterprises and complying with industry regulations and standards, and ensure that the information platform of the shared platform can be built around the enterprise. Overall strategic goals. On this basis, it is necessary to implement the informationization of the building decoration sharing platform step by step. First, realize informationization in the production process, lay the foundation for the informationization of management and decision-making; secondly, informationization of data processing, and develop or purchase the corresponding system software from the perspective of use, and process the data of all important departments of the enterprise.
Construction of a New Home Decoration …
1265
4.2 Establishment of LAN and External Promotion Website of the Platform Make use of the network to improve the information construction and pay attention to the utilization rate of funds. Establish and improve the information resources development and utilization system, give full play to the role of information development and utilization in saving resources and improving efficiency, to meet the needs of the decoration platform itself. Decoration platform must carry out information cost assessment, not blindly build, the pursuit of a large and comprehensive model, but to combine the actual platform itself, reasonable expenditure and allocation of information funds. Pay attention to the utilization rate of funds to maximize information benefits. However, the platform promotion information construction is different in different types and scales of platforms. And mature application areas are more focused on qualitative and quantitative platforms with clear business scope, such as production platforms with fixed product production and operation mode, mature sales network system and management mode. Decoration platforms are different, especially for companies that focus on design types. Different companies have their own specific practices. Therefore, from the perspective of the characteristics of home decoration platform, an efficient and low-cost platform for information exchange is established, which will play a bridge role in the management and sustainable development of the platform as shown in Fig. 2. It will not become a drag on platform operation because of its relatively high cost and maintenance costs. 6 5 4 3 2 1 0
management
Fig. 2 Effective management platform results
effectiveness
effect
1266
N. Sun
4.3 Developing Information Education to Train Information Talents At the same time of using information system, we should carry out information education and training, strengthen information concept and strengthen training. It can not only improve the platform personnel’s awareness of informationization, but also improve their enthusiasm and creativity in using information systems. It can also increase employees’ awareness of the platform and their sense of responsibility, as well as their affirmation of self-worth. Building decoration platform should also establish a special talent training system. Encourage all kinds of professionals to master information technology and train compound management talents. In the process of informationization, the building decoration platform should establish a special information management department to promote the informationization process of the platform and enhance the core competitiveness of the platform.
5 Conclusion In the era of big data, the construction of home furnishing design network sharing platform has become an effective means of disseminating massive home furnishing design information and plays an extremely important role in the audience. The pursuit of high efficiency is the symbol of entering the information age. On the one hand, people put forward high requirements for efficient processing of information and timely completion of information dissemination. On the other hand, they expect the content, interestingness and interaction of information presentation. The construction of home decoration design network sharing platform conforms to people’s needs.
References 1. Chen, Q., S. Sun, and M. Deng. 2015. Design and construction of the provincial geo-spatial information sharing platform in China. Journal of Coastal Research 73: 614–619. 2. Xiaojun, W., S. Xu, H. Zhe, et al. 2017. Research on the construction of resource sharing platform based on microservice. International Conference on Smart Grid & Electrical Automation. IEEE Computer Society. 3. Tan, M.Z., S.P. Yi, R. Zeng, et al. 2015. Construction of a cloud manufacturing platform for service sharing in manufacturing industry park. Applied Mechanics and Materials 789–790: 1258–1263. 4. Chen, J., and Y. Li. 2016. The road to MOF-related functional materials and beyond: Desire, design, decoration, and development. The Chemical Record 16 (3): 1456–1476. 5. Loganina, V.I., S.N. Kislitsyna, and Y.B. Mazhitov. 2018. Development of sol-silicate composition for decoration of building walls. Case Studies in Construction Materials 9: e00173. 6. Faraoun, Mohamed K. 2017. Design of a new efficient and secure multi-secret images sharing scheme. Multimedia Tools and Applications 76 (5): 6247–6261.
Construction of a New Home Decoration …
1267
7. Jia, J., J. Sun, Z. Wang, et al. 2017. The construction of BIM application value system for residential buildings’ design stage in China based on traditional DBB mode. Procedia Engineering 180: 851–858. 8. Li, M., Y. Wang, P. Tang, et al. 2017. Graphene with atomic-level in-plane decoration of h-BN domains for efficient photocatalysis. Chemistry of Materials 29 (7): 2769–2776.
Dimension Reduction Algorithm of Big Data Based on Deep Neural Network Jianye Zhang, Jia Shen, Tianjun Wang, Kun Liu and Jinhu Li
Abstract Dimensionality reduction refers to mapping data from high-dimensional space to a low-dimensional space, which is the main method of high-dimensional data mining. The restricted Boltzmann machine, the basic structure module of deep learning, is introduced and analyzed. The high-dimensional data reduction model based on restricted Boltzmann machine is established. At the same time, the validity has been verified theoretically and experimentally. It makes the depth model as compact and simple as possible without losing the precision, and the calculation speed is improved. Experiment results show that the model identification is of high accuracy. In particular, the depth model built by RBM based on the adaptive adjustment of hidden layer node units not only has high recognition accuracy, but also greatly improves the computing speed and saves the storage space. Keywords Deep learning · Restricted Boltzmann machine · High dimensional data · Dimension reduction
1 Introduction Based on the rapid development of computer technology, data dimension of largescale explosive growth. With the increase of data dimension, it becomes more and more difficult to choose the “parameter estimation” model for objective function optimization, which is called dimensional disaster [1–5]. Data dimensionality reduction can alleviate dimensionality disaster, which will be good for promoting the classification and compression for data. The mathematical description of data dimensionality N is a sample set in the D-dimensional space, reduction is as follows: (a) X = {xi }i=1 J. Zhang (B) State Grid Xinjiang Electric Power Co. Ltd., Wulumuqi 830000, China e-mail: [email protected] J. Shen · T. Wang · K. Liu State Grid Xinjiang Information and Telecommunication Company, Wulumuqi 830000, China J. Li State Grid Info-Telecom Great Power Science and Technology Co. Ltd., Fuzhou 350001, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_149
1269
1270
J. Zhang et al.
N and Y = {yi }i=1 is a data set in the d(d D) space; (b) dimensionless mapping M : X → Y, x → y = M(x), y is the low-dimensional representation [6–10]. For the problem of data dimensionality reduction, the traditional method is to assume that the data has a linear distribution of low dimensionality, Traditional dimensionality reduction techniques are usually very effective when dealing with data sets of lower dimensions, but it is difficult to obtain meaningful analysis for data sets of higher dimensions. In recent years, great progress has been made in theoretical research and technical application of dimensionality reduction technology. New dimensionality reduction technology has been put forward constantly. Different technologies have their own advantages and are suitable for different dimensionality reduction scenarios.
2 Deep Learning Method Theory 2.1 Feature Transformation Feature transformation denotes to transform the original data to a new data space for representation. Assuming that the original feature set X contains N features, and the new feature set Y obtained after selection contains n features, the relation is: X : {x1 , x2 , . . . , x N } → Y : {y1 , y2 , . . . , yn }
(1)
yi ∈ N , i = 1, 2, . . . , n; n < N The new Feature set obtained by Feature Extraction is different from Feature selection. It is a new feature set obtained by some kind of mapping relation. Assuming that the original feature set X contains N features, and the new feature set Y obtained by transformation contains M features, the relation is: X : {x1 , x2 , . . . , x N } → Y : {y1 , y2 , . . . , y M } (y1 , y2 , . . . , y M ) = f (x1 , x2 , . . . , x N )
(2)
In deep learning, the restricted Boltzmann machine is a process of feature transformation. The original data input from the visible layer is converted to the hidden layer to obtain a new feature representation. BM is composed of v ∈ {0, 1} D and h ∈ {0, 1} P . The energy in each state {v, h} is described as follows 1 1 E(v, h; θ ) = − v T Lv − h T J h − v T W h 2 2
(3)
Dimension Reduction Algorithm …
1271
where, θ = {W, L , J }, W, L and J represent the symmetric interaction terms from the visible layer to the hidden layer, from the visible layer to the visible layer and from the hidden layer to the hidden layer, respectively. This model is assigned to the vector v of the visible layer can be expressed as 1 p ∗ (v; θ ) = exp(−E(v, h; θ )) Z (θ ) Z (θ ) h exp(−E(v, h; θ )) Z (θ ) =
p(v; θ ) =
v
(4) (5)
h
where, p* is the irregular probability, Z (θ ) is the average function. Hidden layer and visible layer are ⎛ ⎞ D P p(h j = 1|v, h − j ) = σ ⎝ Wi j vi + J jm h j ⎠ i=1
m=1/j
j=1
k=1/i
⎛ ⎞ P D Wi j h i + L ik v j ⎠ p(vi = 1|v, h −i ) = σ ⎝
(6)
(7)
where, σ (x) = 1/(1 + exp(−x)). Parameter variations is defined as W = a(E Pdata [vh T ] − E Pr econ [vh T ]) L = a(E Pdata [vv T ] − E Pr econ [vv T ]) J = a(E Pdata [hh T ] − E Pr econ [hh T ])
(8)
where, a is the learning rate, E Pdata [•] is the probability distribution, and E Pr econ [•] is the expectation of the distribution defined by the model. By setting L and J in Fig. 1 to 0, Fig. 2 is Restricted Boltzmann Machines (RBM). In essence, an RBM can be seen as an Undirected Graph model. Where v is the visible layer for input of raw data to be processed, h is the hidden layer for output of converted data, which can also be used as a feature extractor, and W is the connection weight between the two layers.
2.2 Dimension Reduction By combining the dimension reduction structure of single-layer data, a multi-layer data dimension reduction model can be obtained. The output of the first singlelayer dimension reduction structure is the input of the second single-layer dimension reduction structure. A multi-layer depth data dimension reduction structure can be obtained by analogy. Figure 3 is the dimensionality reduction structure. The model
1272
J. Zhang et al.
J
Fig. 1 Boltzmann machines
h W
v
L
Fig. 2 Restricted Boltzmann machines
W
V Fig. 3 Dimension reduction model based on RBM
Dimension-reduced Data Dimension-reduced Data
RBM4
RBM2
Input
Output Data Dimension Output W4 W4T 500 hidden units W3 W3T 1000 hidden units RBM3 W2T W2 2000 hidden units W1 W1T Input Data Dimension RBM1 Original Data
Data Reconstruction
Dimension Reduction Algorithm …
1273
input is the original data, and the output is the feature transformation, that is, the data after dimension reduction. After the model is built, the training data is used to train it, and the weight between input and output is adjusted to minimize the error of the model, that is, to make the model have a good data dimensionality reduction effect as far as possible. After the model shown in Fig. 3 is built, the next task is to train the model. In the figure, the upward direction is the data dimensionality reduction process, and the downward direction is the data reconstruction process. The process of data dimension reduction can also be regarded as a process of data encoding, and the process of data reconstruction is a process of data decoding. At the same time, after repeated iterations of the whole process above, a multi-level perceptron can be obtained. In the global fine-tuning stage, the reverse propagation method is adopted to fine-tune the pre-trained structure of the whole structure. Calculate layer by layer from the original data input to the output of the last layer and then carry out the reverse reconstruction.
3 Dimensionality Reduction Model Based on DRBM Using the dimensionality reduction model established by RBM, the model has better learning accuracy, but it often requires a very large storage space and computing time. When the number of nodes in the hidden layer is small, the model has a simple network structure, but at the same time, its ability to process information is very limited, which is not enough to achieve the required accuracy. The selection of the number of hidden layers in RBM is always a problem to be solved. If the number is too large, it cannot achieve sufficient accuracy. If the number is too large, the required accuracy can be achieved, but it requires a lot of training time and reduces the efficiency. In order to meet the precision requirement and improve the training precision of the model, how to determine the number of hidden nodes better is very important. A restricted Boltzmann machine based on hidden layer adaptive was proposed. For the adaptive dynamic adjustment of hidden layer node units of RBM, denoted by (Dynamical RBM, DRBM), DRBM is a structural adjustment based on the strength of the output information of RBM. Firstly, the output information strength of hidden layer node is used to judge the activity of the node, and the node with strong activity is divided. Second, the connection weight of the RBM is adjusted according to the given rule. The output is used to calculate as A fi =
θi K
(9) θk
k=1
Among them, i = 1, 2,…, K. Af i is the activity of the ith node, K is the number of nodes, and A is the output. When Af i is greater than the activity threshold Afmax, the ith node is divided. When the activity of the ith node less than the activity threshold
1274
J. Zhang et al.
Afmin, the ith node is directly deleted from the structure. The join weight after splitting is: wi,l
Nnew wi θi − e = rl rl = 1 θi,l l=1
(10)
where r i is the allocation parameter of the i-th new node. θi is the output of ith node before structural adjustment. θi,l is the output of point i. wi is the connection weight of split ith node. And e is the output error of RBM before structural adjustment. After the above operation, the convergence of the model must be kept unchanged before and after the structural change, that is, the error cannot diverge. Only when the model after the change is still convergent, can the final performance not be affected. Therefore, the convergence analysis is carried out next (Fig. 4). Suppose that RBM has n nodes of hidden layer at time t, and the current error is en (t). If the hidden layer node unit i needs to be split and the number of new node units after splitting is Nnew , then the total number of hidden layer node units in RBM after splitting will be n + Nnew –1, and the error is: en+Nnew −1 (t) =
n+N new −1
wk θk (t) − yd (t)
k=1
=
n
wk θk (t) − wi θi (t) + ϕ(t) − yd (t)
k=1
Dimension-reduced Data Dimension-reduced Data
RBM4
RBM2
Output Data Dimension Output W4 W4T Set initial value of 500 and adjust dynamically W3 W3T Set initial value of 1000 and adjust dynamically RBM3 W2T W2 Set initial value of 2000 and adjust dynamically W1 W1T RBM1 Input Data Dimension
Input
Original Data
Data Reconstruction
Fig. 4 Deep structure based improved RBM
(11)
Dimension Reduction Algorithm …
1275
new ϕ(t) = Nj=1 wi, j θ j (t), yd (t) is the expected output value at time t. According to the parameter adjustment rules given in Eqs. 9 and 10, we can get: Nnew l=1
Nnew wi θi (t) − en (t) wi,l θl (t) − wi θi (t) = rl θl (t) − wi θi (t) = −en (t) θl (t) l=1
(12)
Then the model error after splitting is: (t) = en+N new −1
=
n
wk θk (t) − wi θi (t) + ϕ(t) − yd (t)
k=1 n
wk θk (t) − yd (t) − en (t)
k=1
=en (t) − en (t) = 0
(13)
The above analysis shows that after the structural adjustment of the model, the error e(t) is zero, which accelerates the convergence of the average error e and improves the performance of the model.
4 Simulation Experiment 4.1 Simulation Experiment In order to verify that DRBM can adjust the number and weight of hidden layer node units of RBM in real time during the training process, so as to make the whole structure more compact, experimental simulation was used to carry out experimental verification. Apply it to the handwritten digital reconstruction for verification. After training the model with 60,000 training images, 10,000 test images were used to test the model. The big data dimensionality reduction model based on RBM and DRBM are applied in handwritten digital recognition (Fig. 5). In the experiment, three three-layer depth models were constructed respectively, and the number of initial node units of the hidden layer was 2000-1000-500, 1000500-250 and 500-250-125, respectively. Then, in the training process, The model after the final training is more compact and has better data reduction and handwritten number recognition effect. Five experiments were carried out for each group of models, and the number of iterations for each experiment was 20. The performance was tested by identifying the accuracy and the final nodal unit number of hidden Fig. 5 Handwritten writing
1276
J. Zhang et al.
layers. All results are shown in Table 1. Improved Model means that the improved model is improved based on DRBM. The final number represents the number of hidden nodes. Index is the number of experiments. Train_acc represents the recognition error in the training process. Test_acc represents errors during testing.
4.2 Simulation Analysis As can be seen from Table 1, in the model with a small initial structure, the effect is not obvious, but the result will not be worse. When the initial structure size is large, the effect is very significant. Compared with the model with fixed structure of hidden layer, the model with adaptive adjustment and optimization of hidden layer has fewer hidden layer node units and maintains high accuracy and recognition rate for handwritten Numbers. Figure 6 shows the model experiment results with the number of node units in the initial hidden layer being 2000-1000-500. It can be found that after dynamic adjustment, the number of hidden layer nodes decreased significantly. At the same time, both in the training process and in the test, the accuracy of the model with a fixed number of nodes is still achieved in case of fewer nodes. The reduction of hidden nodes means the reduction of training time and storage space, which greatly improves the performance and efficiency of training and identification. Table 1 Classification results on handwritten digit recognition Model
Initial model
Improved model
Initial number
Index
Final number
Train acc
Test acc
Final number
Train acc
Test acc
2000-1000-500
1
2000-1000-500
99.952
98.470
1138-300-500
99.975
98.562
2
99.942
98.236
1168-296-418
99.982
98.510
3
99.958
98.413
1150-287-500
99.972
98.520
4
99.932
98.450
1074-328-486
99.979
98.480
5
99.958
98.412
1128-330-500
99.968
98.650
99.935
98.470
803-313-250
99.959
98.652
2
99.968
98.450
776-342-168
99.971
98.450
3
99.966
98.450
761-363-201
99.979
98.480
4
99.969
98.482
789-367-250
99.968
98.520
5
99.968
98.430
798-328-250
99.962
98.510
1000-500-250
500-250-125
1
1
1000-500-250
99.965
98.470
488-250-125
99.963
98.25
2
500-250-125
99.967
98.530
492-249-125
99.973
98.452
3
99.959
98.492
493-248-125
99.959
98.452
4
99.960
98.498
492-247-125
99.969
98.510
5
99.958
98.480
496-248-125
99.945
98.432
Dimension Reduction Algorithm …
(a)
(b)
Set initial hidden units as 2000-1000-500
2500
Initial Model Improved Model
2000
1500
1000
1
1.5
2
Set initial hidden units as 200-100-500
1200
hidden layer units of RBM2
hidden layer units of RBM1
1277
2.5
3
3.5
4
4.5
Initial Model Improved Model
1100 1000 900 800 700 600 500 400 300 200
5
1
1.5
2.5
2
(c)
(d) Set initial hidden units as 2000-1000-500
105 103
103
102
102
101 100 99
97
96
96 2
2.5
3
3.5
5
4
case
4.5
5
Set initial hidden units as 2000-1000-500
99 98
1.5
4.5
100
97
1
4
101
98
95
3.5
Initial Model Improved Model
104
train-acc (%)
train-acc (%)
105
Initial Model Improved Model
104
3
case
case
95
1
1.5
2
2.5
3
3.5
4
4.5
5
case
Fig. 6 Experiments of 2000-1000-500
Figure 7 demonstrate the model experiment results with the number of nodes of the initial hidden nodes as 1000-500-250. It can be found that after dynamic change and adjustment, but compared with the model of 2000-1000-500, it was slightly inferior. It can be concluded that this model has more obvious effect when the initial structure is too large.
5 Conclusion The depth model of dimensionality reduction of high-dimensional data based on RBM is constructed, and the adaptive optimization of hidden layer node unit is carried out on RBM. Then the depth model is built based on the adaptive RBM of hidden layer node elements. Finally, both of them are applied to handwritten numeral recognition for verification. Experiments show that the depth model based on adaptive adjustment of hidden layer node elements has better performance than that based on fixed structure.
1278
J. Zhang et al.
(a)
Initial Model Improved Model
1200 1100 1000 900 800 700
1
1.5
2
Set initial hidden units as 1000-500-250
550
1300
hidden layer units of RBM2
hidden layer units of RBM1
(b)
Set initial hidden units as 1000-500-250
1400
2.5
3
3.5
4
4.5
500 450 400 350 300
5
Initial Model Improved Model
1
1.5
2
2.5
case
(c)
(d)
Set initial hidden units as 1000-500-250
102
Initial Model Improved Model
3.5
4
4.5
5
Set initial hidden units as 1000-500-250
102
101
Initial Model Improved Model
101
100
test-acc (%)
train-acc (%)
3
case
99 98 97
99 98 97
96 95
100
1
1.5
2
2.5
3
3.5
4
case
4.5
5
96
1
1.5
2
2.5
3
3.5
4
4.5
5
case
Fig. 7 Experiments of 2000-1000-500
References 1. Chen, Jie, and Yousef Saad. 2009. Lanczos vectors versus singular vectors for effective dimension reduction. IEEE Transactions on Knowledge and Data Engineering 21 (8): 1091–1103. 2. Mo, Dengyao, and Samuel H. Huang. 2012. Fractal-based intrinsic dimension estimation and its application in dimensionality reduction. IEEE Transactions on Knowledge and Data Engineering 24 (1): 59–71. 3. Zhao, Y., and S. Zhang. 2006. Generalized dimension-reduction framework for recent-biased time series analysis. IEEE Transactions on Knowledge and Data Engineering 18 (2): 231–244. 4. Yan, Jun, Ning Liu, Shuicheng Yan, et al. 2011. Trace-oriented feature analysis for large-scale text data dimension reduction. IEEE Transactions on Knowledge and Data Engineering 23 (7): 1103–1117. 5. Sedlmair, Michael, Tamara Munzner, and Melanie Tory. 2013. Empirical guidance on scatterplot and dimension reduction technique choices. IEEE Transactions on Visualization and Computer Graphics 19 (12): 2634–2643. 6. Pellet, Victor, and Filipe Aires. 2018. Bottleneck channels algorithm for satellite data dimension reduction: A case study for IASI. IEEE Transactions on Geoscience and Remote Sensing 56 (10): 6069–6081. 7. Farrell, M.D., and R.M. Mersereau. 2005. On the impact of PCA dimension reduction for hyperspectral detection of difficult targets. IEEE Geoscience and Remote Sensing Letters 2 (2): 192–195.
Dimension Reduction Algorithm …
1279
8. Zhang, Rui, Du Tao, and Qu Shouning. 2018. A principal component analysis algorithm based on dimension reduction window. IEEE Access 6: 63737–63747. 9. You, Wenjie, Zijiang Yang, Mingshun Yuan, et al. 2014. Totalpls: Local dimension reduction for multicategory microarray data. IEEE Transactions on Human-Machine Systems 44 (1): 125–138. 10. Yang, Wanqi, Yinghuan Shi, Yang Gao, et al. 2018. Incomplete-data oriented multiview dimension reduction via sparse low-rank representation. IEEE Transactions on Neural Networks and Learning Systems 29 (12): 6276–6291.
Novel Method of Knowledge Database Data Mining by Association Rules Extraction Technology in Decision Tree Xiuying Zhao and Xiangkui Chen
Abstract The extraction method of association rules is to find frequent itemset pattern knowledge from a given dataset. In the decision tree method, the example set is regarded as a discrete information system, and its information is represented by information entropy. In this paper, the theory and algorithm of association rules in data mining technology and decision tree are systematically studied, the theoretical model is established, the corresponding association rules mining algorithms are designed, and the simulation experiments of these algorithms are carried out. The paper presents novel method of knowledge database data mining by association rules extraction technology in decision Tree. Keywords Association rules extraction · Decision tree · Data mining · Knowledge database · Attribute reduction
1 Introduction Knowledge base, which stores the domain knowledge needed for data mining, which it will be used to guide the search process of data mining, or it, is to assist in the evaluation of mining results. The user-defined threshold used in the mining algorithm is the simplest domain knowledge; the data mining engine, which is the most basic component of the data mining system, usually contains a set of mining function modules in order to complete the mining functions such as qualitative induction, association analysis, classification induction, evolutionary calculation and deviation analysis. The basic idea of applying rough set to control is to record some representative state of the control process and the control strategy adopted by the operator in these conditions, and then use the rough set theory to process the data [1]. What kind of control strategy should be taken by the operator to summarize a series of control rules. This method of obtaining a control strategy from observation data is commonly referred to as learning from an example. X. Zhao (B) · X. Chen Luoyang Normal University, Luoyang 471934, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_150
1281
1282
X. Zhao and X. Chen
Attribute reduction effectiveness calculation problem. In the process of knowledge reduction, how to deal with the problem of noise and loss of value in data, the problem of continuous attribute discretization, etc. The generalized error is the expected error of the model on the unknown record; A good model should not only fit the training data well, but also accurately classify the unknown samples. A good classification model must have low training and generalization errors. Because of a model with low training error, its generalization error may be higher than that with higher training error. When the decision tree is generated, the attributes with fewer values will not be inundated or the attributes with more and less attribute values will be reduced, and finally the decision tree will reduce the dependence on the attributes with more values, thus reducing the phenomenon that big data conceals small data as much as possible, and the improved algorithms are compared through experiments [2]. The experimental results show that the improved algorithm is effective. The main factors that affect the mining efficiency of association rules are the IO cost of database scanning, the requirement of memory, the time spent of CPU and so on. The current association rules mining algorithm still needs to be innovated or improved in these aspects. Therefore, we select the association rules mining algorithm for centralized research and implementation, and verify our new mining theory and accumulate the experience of developing data mining system through a series of algorithm design and implementation.
2 Research on Extraction Method of Association Rules Based on Data Mining The condensed method, also known as the bottom-up method, takes each object as a separate group, and then merges similar objects or groups one after another until all the combinations are one or one termination condition. The split method, also known as the top-down method, places all objects in a cluster, and in each step of the iteration, a cluster is split into smaller clusters. The classification algorithm is a theoretical and mature method, and is one of the most simple machine learning algorithms [3]. The idea of this method is that if a sample belongs to one of the most similar (i.e., the nearest neighbor in the feature space) of the feature space, the sample also belongs to this category. Definition 1 (frequent sequence mode) A given positive integer V is a support degree threshold, and if a minimum of V tuples in the database contains the series s, that is, support (s)> = V, the sequence S is called one (frequent) sequence pattern in the sequence database D. When these algorithms are used in the mining of very large databases in the real world, efficiency and scalability become a problem that needs to be paid attention to. Most decision tree algorithms limit the residence of training samples in main memory, which restricts the scalability of these algorithms. In order to solve this
Novel Method of Knowledge Database …
1283
problem, some scalable decision tree algorithms have been introduced one after another, as is shown by Eq. (1) [4]. X=
/J0
w˜ mT W˜ m + v˜ TJ V˜ J
(1)
j=1
The module helps the user communicate with the data mining system itself. on the one hand, the user submits the mining requirements or tasks to the mining system through the module, and provides the relevant knowledge required by the mining and search; and on the other hand, the system displays or interprets the result or the intermediate result of the data mining to the user through the module; In addition, that module can help the user to browse the content of the data object and the data definition mode, and evaluate the excavated pattern knowledge. A recursive process, so when does this recursion come to the termination condition to exit the recursion? There are two ways in which the first way is that if the samples covered by the branch of a node belong to the same class, then the recursion can be terminated, and the branch generates a leaf node. Still another way is to terminate the Tree-Growth if the number of samples covered by a branch is less than a threshold. For some issues, attributes have different degrees of importance, and when we construct a decision tree with an ID3 algorithm, it is possible to first use the data in the table to calculate the attribute importance of all attributes, and if not, they differ in classification capabilities [5]. The decision tree constructed based on rough classification method is compared with the decision tree constructed by ID3. First, the root node ID3 selects the methane base value, and ethane abnormal value is selected based on the rough classification method. Because the ID3 algorithm selects the attribute, the reduction of the attribute on the information entropy of the whole information system is considered, that is, the dependency of the attribute and the decision attribute, and the comparison of the attribute classification accuracy is lacking, as is shown by Eq. (2) [6]. μm (a(k)|Rk ) : =
p(k)s0 (k)β(k) + α(k)
k∈Rk
= βμs0 + α
(2)
Neural network is also a very useful pattern structure in predictive knowledge mining. However, because a large number of time series are non-stationary, their characteristic parameters and data distribution change with the passage of time. Therefore, only by training a certain section of historical data to establish a single neural network prediction model, it is impossible to complete the accurate prediction task. For this reason, people put forward the retraining method based on statistics and so on. L2 generation: 2-candidate sets are generated by L1 and their support numbers C2 = {(AB,3), (AC,3), (AD,2), (AE,1), (BC,4), (BD,3), (BE,3), (CD,2), (CE,2),
1284
X. Zhao and X. Chen
(DE,1)}; Select the project set of minsup _ count> 2 to make up 2-frequent itemsets L2 = {AB, AC, AD, BC, BD, BE, CD, CE}. Clustering can also be used to sort Web documents to find information. As a function of data mining, cluster analysis can be used as a stand-alone tool to obtain data distribution. Definition 2 The pattern sequence of the time series X is a sequence pattern consisting of a pattern segment consisting of adjacent elements, (1, i, i + l, and m). Time series compression. The time series compression time series X = transformation mode sequence without noise data is listed as; 3. Search for 1-frequent patterns. By generating and using the weighted distance of the meta-pattern, the class is grouped into a cluster set, and then the number of classes whose number is greater than the given threshold is searched in the class set [7]. The same method searches for 2-frequent patterns, 3-frequent patterns, until (N−1)-frequent patterns in search. There are two key ideas under the classification tree: the first is the idea of recurrent partition of independent variable space; the second is to pruning with validation data. In each pass database, a candidate sequence is generated with a large sequence generated at the time of last scan, and their support is calculated while scanning, and the candidate sequence satisfying the degree of support is used as a large sequence of the next scan [8]. In the first scan, a frequent sequence pattern with a length of 1 is used as the initial large 1-order sequence, as is shown by Eq. (3). (R n )k u (0) =
N i=1
αi λink ei +
M
αi λink ei
(3)
i=N +1
Two stages of the BIRCH algorithm: Phase 1: BIRCH scans the database and establishes a CF tree that is initially stored in memory. It can be regarded as multilayer compression of data to try to preserve the cluster structure inside the data. Phase II: BIRCH uses a clustering algorithm to cluster leaf nodes of CF tree. When the missing data is filled, the filled values may be incorrect and the data may be biased and not very reliable. However, the method uses most of the information of the attribute’s existing data to predict the missing value. When the missing value is estimated, the overall distribution state of the attribute is maintained by taking into account the overall distribution and frequency of the value of the attribute.
3 Application and Analysis of Tree Pruning Technology in Decision Tree Method Project growth is achieved through frequent project connections between suffix items and conditional FP trees. The FP-Growth algorithm converts the problem of discovering large frequent itemsets into recurrent discovery of some small frequent items,
Novel Method of Knowledge Database …
1285
and then connects suffixes. It uses the least frequent project suffixes and provides good selectivity. Generalized knowledge refers to the general description knowledge of category features [9]. According to the microscopic characteristics of the data, it is found that the general, higher-level concept, middle view and macro knowledge reflect the common nature of the same kind of things, which is the generalization, refining and abstraction of the data. The value of importance is (−%, +%). When the importance is 0, it is shown that A and B are mutually independent items, and there is no association between them; when the importance is greater than 0, it is shown that the probability that B occurs when A occurs; when the importance is less than 0, it is shown that when A occurs, the probability that B occurs will decrease. Removing duplicate attributes (in some analysis, the age and date of birth may be duplicate attributes, but in some instances they may be both necessary) 5 removal of the negligible field (most of the properties of the null value are generally not of value, if it is not possible to remove the data mining result which may cause the error)6 to select the association field reasonably (for a plurality of attributes with strong correlation, it is not helpful, only the part of which is selected for data mining, such as price, data, amount), the noise in the data is removed, the null value is filled, Missing values and processing inconsistent data. Reduce the size of the transaction set for future scans. If a transaction that does not contain a k-frequent phase set is deleted in the database traversal, the amount of transaction that is scanned can be reduced in the next cycle without affecting the level of support for the candidate set. Data summary is to use the broader (attribute) content of the data description attribute to summarize and describe it. The analyzed data can often be obtained by simple database query. For example, a brief summary of the lecturer situation in our school is carried out (a conceptual description is given). Data summary is usually represented by broader relational tables or feature description rules. Each non-leaf node represents an attribute, and the connection line between the parent and child nodes represents the value or range of the parent node attribute, and the leaf node represents the classification. The input object represented by the decision tree contains three attributes (age, student, reputation). The value of the age attribute is {green, middle and old}. The label to be classified is {buy, not buy}. Each of the paths in the path is the value of the property represented by its connected parent node. The parent node attribute may be discrete or continuous, as is shown by Eq. (4). pU |Z (u(x)|z(x)) = pz(x) (u(x)) =
e−u(x) u(x)z(x) , u(x) ≥ 0 z(x)!
(4)
In this tree, there is a table, 15 nodes and 28 links to be stored and managed. The database consists of only six project sets (an average of more than 3 items per project set). Therefore, the memory storage space of FP-Tree algorithm can not be underestimated in some cases, and this tree structure is a nonlinear structure, which
1286
X. Zhao and X. Chen
generally needs linked list and other forms of storage, which increases the additional cost of storing link information. Therefore, it is valuable to explore new improved methods. Definition 3 (temporal constrained association rule mining space) The mining space of association rules under temporal constraints is defined as W= (I, T, D, O, U, R), which means as follows: I is all items involved in W; T is the temporal interval lattice space described by 5 ≤ 1, that is, the temporal interval variable set and its operation based on a temporal interpretation domain. The user score is regarded as a vector on the n-dimensional project space. If the user does not score the item, the user’s score for the item is set to 0, and the similarity between the users is measured by the cosine angle between the vectors. Let the scores of user I and user j in n-dimensional space be represented as vectors, then the similarity between user I and user j. The customer identification customer 2id is used as the primary key and the time transaction 2time of the transaction occurs as the secondary key to order the database d, this step converts the original transaction database into the database of the customer sequence. (1) The frequent itemset phase is found to find all the frequent itemsets using the association rule mining algorithm [10]. (2) The conversion phase is in the already converted client sequence, Each transaction is replaced by a large set of items contained in the object, and if a sequence does not contain any large item set, this transaction should not be retained in the sequence that has been converted. Therefore, the clustering time complexity is O(n). After the hierarchy is established, the time complexity of query processing is O(g), where g is the number of the lowest layer grid cells. The disadvantage is that the cluster quality depends on the particle size of the lowest layer of the grid structure, and the size of the granularity will obviously affect the processing cost. In addition, the shape of its resulting cluster is isotheratie, i.e. all cluster boundaries are horizontal or vertical, with no diagonal boundaries. For a clustering task (you need to indicate that you should not indicate the number of classes according to the natural idea, and this problem is also a worthy topic for the current clustering task), first randomly select K cluster centers, and then repeatedly calculate the following procedure until all cluster centers do not change (cluster sets do not change): Step 1: For each object, calculate its similarity to each cluster center and classify it into the cluster that most similar to it. In the process of mining, a divide and conquer strategy is adopted. The compressed database DB is divided into a group of conditional databases Dn, each conditional database is associated with a frequent item, and each conditional database is excavated separately. And these conditional database Dn is much smaller than the database DB. Conceptual description is to describe the connotation of a certain kind of object and summarize the relevant characteristics of this kind of object. Concept description is divided into characteristic description and discriminant description, the former describes the common characteristics of a certain kind of object, the latter describes the difference between different objects. Generating a characteristic description of
Novel Method of Knowledge Database …
1287
a class only involves the commonness of all objects in this class of objects, which abstracts large task-related datasets from a lower conceptual layer to a higher conceptual layer.
4 Novel Method of Knowledge Database Data Mining by Association Rules Extraction Technology in Decision Tree First, the most discriminant factors are found out, and then the data is divided into multiple subsets, and each subset is further divided into the most discriminant factors until all subsets contain only the same type of data. Finally, we get a decision tree, which can be used to classify new samples. It is clear theory, simple algorithm, very practical value of the example learning algorithm. It is assumed that the data of the attribute x are arranged in a numerical increasing order. Imagine that we can pick some data points in order to divide the data distribution into a coherent set of equal size. These data points are called sub-digits. The quantile is a point at every interval taken from the data distribution and divides the data into a coherent set of substantially equal size. (We say “substantially” because there may be no data values of X that divide the data into exactly the same size of the sub-sets.) The condition for the algorithm to stop the recurrence operation is: (1) all samples of a node are of the same category. (2) if there is no attribute to be used in the sample set, the current node is marked as a leaf node with the principle of minority obedience to the majority principle, and marked as the category with the largest number of categories in the current sample set. (3) there are no samples to meet the conditions, Creates a leaf node and marks it as the category with the largest number of categories in the sample set contained in the current node. First, some possible rules are obtained by using the sampling data of the database, and then the rest of the database is used to verify whether these association rules are correct. Toivonen’s sampling-based association rules mining algorithm is quite simple, and can significantly reduce the IO price paid for mining. However, its biggest problem is the selection of sampling data and the resulting result deviation is too large, that is, the existence of so-called data distortion (data skew). Sampling is a technique often used in statistics, although it may not get very accurate results, as is shown by Eq. (5). c(α) =
ρ θ − ρ θ 3
((ρ )2 + (θ )2 ) 2
(5)
For all hierarchies, the same minimum degree of support is used. Thus, it is relatively easy for users and algorithm implementation, and it is easy to support the generation of association rules between layers. But it is obvious. First, the accuracy
1288
X. Zhao and X. Chen
of the problems may be different at different levels, and the user groups are different. For some users, it may be felt that the degree of support is too small, resulting in rules of too much interest. Most of the nearest neighbors of the target users are distributed in the clustering with the highest similarity with the target users, so it is not necessary to query the nearest neighbors of the target users in the whole user data space, but only need to query most of the neighbors of the target users in the clustering with the highest similarity with the target users. Because the clustering with the highest similarity with the target users is much smaller than the whole data space. If the first item that removes the sequence pattern S1 is the same as the last item that removes the sequence pattern S2, S1 and S2 can be connected, that is, the last item of S2 can be added to S1. Shearing stage: if a subsequence of a candidate sequence pattern is not a sequence pattern, the candidate sequence cannot be a sequence pattern, and it is deleted from the candidate sequence pattern. The sequence pattern L 1 with length 1 is obtained by scanning the sequence database, which is used as the initial seed set. According to the seed set Li with length I, the candidate sequence pattern Ci 1 with length I 1 is generated by connection operation and pruning operation, and then the support degree of each candidate sequence pattern is calculated by scanning the sequence database, and the sequence pattern Li 1 with length I 1 is generated, and Li 1 is used as the new seed set. Repeat the second step until no new sequence pattern or new candidate sequence pattern is generated. When mining association rules, it is necessary to consider the type of different fields. For the previously mentioned transaction databases, their corresponding items are a limited number of discrete problems. However, for a general relational database or data warehouse, numerical data is a problem that must be considered.
5 Conclusion This paper reduces the capacity of the target data set by filtering the database. The temporal interval fragments that may be generated due to filtration are merged into non-intersecting mining time zone sets through temporal interval merging, and the association rules are generated separately by memory calculation for each mining time zone. In this way, the size of the incoming memory set can be greatly reduced, thus enhancing the processing capacity of large databases.
References 1. Hong Jiarong, and Ding Mingfeng. 2015. A new decision tree inductive learning algorithm. Journal of computer Science 18 (6): 470–474.
Novel Method of Knowledge Database …
1289
2. Wu Chengdong, Han Zhonghua, and Pei Tao. 2016. Data mining method based on rough set and decision tree. Journal of Northeast University 27 (5): 481–484. 3. Hu Keyun, Lu Yunchang, and Shi Chunyi. 2013. Feature ranking in rough sets. AI Communications 16 (1): 41–50. 4. Yang Ming, and Zhang Zaihong. 2012. Research on decision tree learning algorithm ID3. Crisis Development (5): 6–9. 5. Toivonen, H. 2016. Sampling large databases for association rules. In Proceedings of the 22th international conference on very large databases, 1–12, Bombay, India. 6. Wang Xiaowei, and Jiang Yuming. 2011. Analysis and improvement of decision tree ID3 algorithm. Computer engineering and design, 121–135. 7. Mao Bingyi. 2012. A new Algorithm and Application Research for Association rules Discovery, computer Application and Engineering 22: 10–15. 8. Miao Qiaoqian, and Wang Yu. 2017. Construction method of multivariable decision tree based on rough set. Journal of Software 8 (6): 425–431. 9. Yang Ming, and Zhang Zaihong. 2001. Research on decision tree learning algorithm ID3. Microcomputer Development 5: 102–105. 10. Gao Jing, Xu Zhangyan, Song Wei, and Yang Bingru. 2008. A new decision tree algorithm based on rough set model. Computer Engineering, 34 (3): 15–19.
Influence of New Media Technology on the Transformation Path of Party Newspaper Liya Yao
Abstract With the rapid development of new media technology, the media industry has entered a new era of all media convergence. Party newspaper, as the authoritative media platform for the Party and the state to release information, has unique development advantages in the traditional media era. However, in the era of all media and the earth-shaking changes in the audience’s reading habits, and in the era of traditional paper media losing the audience on which they depend for survival, party newspapers must transform and develop. This paper mainly focuses on discussing the influence of new media technology on the transformation path of party newspapers. Keywords New media · Technology · Party newspaper · Transformation
1 Characteristics of Party Newspapers 1.1 Advantages of Party Newspapers The first is the wide dissemination. As the mouthpiece of the Party and the people, the party newspaper shoulders the important responsibility of publicizing the Party’s policy propositions and recording the historical development, which plays an irreplaceable role in the traditional media era. Whether government departments or institutions, state-owned enterprises or private enterprises, even ordinary citizens, will actively read party newspapers to obtain the latest and most authoritative information. In the traditional media era, the party newspaper has absolutely wide dissemination, and its circulation is incomparable with that of ordinary newspapers. This traditional advantage has not completely disappeared in the new media era. As a paper media, its circulation is still far ahead. As a traditional media, it is still active in the bookshops, enterprise and public institutions and government departments. As a way of information retention, it is still the best way of information retention and historical witness. L. Yao (B) Jilin Engineering Normal University, Changchun, Jilin, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_151
1291
1292
L. Yao
The second is authoritativeness of information. The party newspaper is the spokesman of the Party and the people. Its information and news must be authentic and authoritative, which can’t tolerate any falsehood, distortion or exaggeration, and must be credible. Therefore, for a long time, it has established absolute authority, and absolute political orientation, representing the image of the Party and socialist values. For the audience, any news released through the party newspaper is the proof of the authenticity of the information, and also the last step of the information confirmation in the general way. As an important way of propaganda of Party and state policies, its authority and credibility are absolute no matter what era it is. Authoritativeness is the cornerstone of the existence and development of the party newspaper, the embodiment of its absolute advantages, and the basic characteristics of the party newspaper. The third is the guidance of public opinion. In the final analysis, the party newspaper is the mass media and the mainstream media of the country. As an important media channel, its task is not only to publicize policies, but also to establish values and guide public opinion. In the current era of new media, values are pluralistic and speech is absolutely liberalized. In this era when everyone can publish information, public opinion has become an uncontrollable factor in many times, which has both advantages and negative effects. For example, it directly or indirectly leads to various kinds of network rumors and network violence, which requires correct guidance of public opinion to ensure the correctness of the direction of public opinion and to give young people correct values. As a government media, the party newspaper must shoulder such a heavy responsibility, give the society correct guidance of public opinion, expose false rumors, combat network violence, standardize the public opinion environment, and establish a correct value orientation for young people.
1.2 Disadvantages of Party Newspapers in the New Media Era Even though party newspapers have innate advantages that many other media can not match, they are still fatally impacted in the new media era. The reason for this is that we can not ignore the disadvantages covered by their innate advantages. The first is the old-fashioned ideas. Party newspapers are organ newspapers of political parties and tools for propagating party programs, lines and policies. In our country, it refers specifically to the organ newspapers organized by the CPC at all levels, such as the People’s Daily [1]. This is a general term for a kind of newspaper, which can be divided into all kinds of party newspapers at all levels from the central government to the local government. Although the main body of its business is not the same group of people, most of its development in the era of new media on the Internet is relatively slow due to the similar system and mode of operation. This is directly related to the similar system and backward ideas of this group. First, there is a lack of crisis awareness. As an organ newspaper of government agencies
Influence of New Media Technology …
1293
at all levels, the party newspaper enjoys the unique treatment that other media do not have. That is, the Publicity Department of the Party Committee shall uniformly assign tasks to the distribution of newspapers. Whether the audience likes it or not, no matter what the quality of the newspaper is, it has nothing to do with the staff. The editors neither care about it nor consider it. The advantage of this system is stability, and the disadvantage of this system is that it makes the editors lack the sense of crisis and it is difficult for them to bear the storm of the market [2]. With the advent of the Internet era and the change of audience’s reading style, party newspaper practitioners still do not realize the crisis. They do not realize it until the advertising volume becomes smaller and the circulation is blocked. At this time, they have obviously lost the market opportunity and can only be forced to change and transform. The pressure is not small. Even in the state of survival crisis, this kind of transformation and development is also greatly hindered. The fundamental reason lies in the practitioners’ attitude of seeking stability, refusing to change and sticking to conventions. In particular, some older leaders are difficult to adapt to new concepts and new technologies, which leads to difficulties in the overall transformation and development. Secondly, they lack Internet thinking. Most of the party newspaper practitioners are the elites who run newspapers, but they lack market awareness, do not understand the economy in the Internet era, are difficult to control the sharing of reading and sharing of economy, and use old thinking to run new media, which is difficult to adapt to the audience’s thinking, so that the audiences don’t buy it, thus greatly weakening the influence. The second is the backward technology. Party newspaper practitioners are mainly editors, while the new media under the Internet technology needs a large number of technicians who know how to operate computers. In this aspect, the party newspaper obviously does not have advantages. Internet new media technology is not a simple office software operation, but a computer technology operation that needs to use the Internet platform to maintain the web page and website, process back end, and construct mobile phone client. Therefore, talents who understand the operation and maintenance of computer software as well as media operation are extremely valuable. However, this kind of talent is very scarce. For party newspapers, because of its system limitations, it is difficult for young people who understand technology to join, which makes the new media technology of party newspapers far behind other media and restricts their own development. In addition to the lack of talent, there is a lack of equipment. Traditional party newspapers do not need high demand for new electronic equipment. However, new media, in addition to the basic computer, server, camera and other hardware equipment, also needs a large number of micro-video, AR, VR and other software equipment, which is lacking for most party newspapers.
1294
L. Yao
2 The Necessity of the Transformation and Development of Party Newspapers In 2014, “The Guidance on Promoting the Integrated Development of Traditional Media and Emerging Media” was released. The President Xi Jinping emphasized that efforts should be made to create a number of new mainstream media with diverse forms, advanced means and competitiveness, and to build several new media groups with strong strength and communication power, credibility and influence [3]. This is the fundamental task of the existence and development of party newspapers, and also a good opportunity to promote the transformation and development of party newspapers to new media.
2.1 Survival and Development Needs In the course of the development of the times, the inevitable law is the survival of the fittest. No matter how powerful things were in the past times, if they cannot adapt to the development law of the times, they will eventually disappear in the times. As a traditional media, the party newspaper can not violate the objective law of the development of this era, and its development has reached the key point of life and death. First of all, the amount of advertising has been greatly reduced. Because of the characteristics of Internet, such as high speed, wide range and low cost of advertising, the amount of advertisements in traditional newspapers has been significantly reduced. Even Party newspapers have also lost a lot of advertisements. In the traditional way of paper media operation, advertising revenue is the most important part of its income source. When advertisements are losing a lot, it already means that the party newspaper is hard to survive. Secondly, subscriptions have decreased significantly. The subscription of party newspaper is different from newspapers in other industries. Its subscription is mainly in the way of assigning tasks by government departments, which makes the reduction of the subscription of party newspaper much later than that of other newspapers, but this change is inevitable. Finally, the audience’s reading style changes [4]. In the era of new media and Internet, readers’ reading methods have undergone tremendous changes. Readers prefer to read fast-food culture, and prefer to use mobile phones, computers and other terminals to read, while the long-winded discourse on paper media is obviously unacceptable. Therefore, even if enterprises and institutions subscribe to party newspapers, most of them are put on the shelf, or even disposed of directly as garbage, so it is difficult to win readers. When advertisements are lost, subscriptions are reduced and readers are absent, the issue of survival is put naked in front of party newspaper practitioners. Therefore, the transformation is to solve the problem of survival and development first.
Influence of New Media Technology …
1295
2.2 Self Mission Responsibility The Internet era is an era of explosion of public opinion. Speeches can be published at any terminal and information can be published at any place. Therefore, information exists like “sea” on the Internet. This is a good phenomenon, which reflects of freed of speech, diversity of information and diversity of values. However, there are also negative effects, such as the rampant false statements, Internet rumors, even network violence, distorted values and so on, which pose a huge threat to social stability and healthy growth of young people. To deal with this Internet phenomenon, it is far from enough to rely solely on rigid network supervision, and it is also easy to arouse greater contradictions of public opinion, and even cause dissatisfaction, which requires the guidance of public opinion. The guidance of public opinion and the construction of values have always been the innate mission of the party newspaper, therefore, the party newspaper is indispensable in this link. At present, most party newspapers have been unable to undertake this mission because of their weak ability and small influence, which once led to the lack of guidance, and directly led to the chaos of network public opinion for a long time. Therefore, the transformation and development of party newspaper is not only a question of its own survival or death, but also related to the discourse power of the whole society and the construction of public opinion oriented values.
3 The Promoting Role of New Media Technology in the Transformation of Party Newspapers 3.1 The Role of Innovative Ideas New media technology is based on Internet thinking, which emphasizes connectivity, integration, openness and inclusiveness. This new way of thinking is obviously completely different from the old way of thinking for stability. Therefore, the primary task of the transformation and development of party newspapers is to change ideas. The innovation of this concept is not to change paper and pen into computer, but to thoroughly consider problems with Internet thinking, understand the economic principle of Internet sharing, learn to use the way of information dissemination on Internet, and better adapt to the timeliness of Internet information. The innovation of this concept is a thorough subversion of the previous way of collecting and editing. There is no time for editors to review, print and distribute edited articles after the interview, but to rebroadcast them within a few minutes or even at the same time, so that more people can read them. In the Internet age, there is no long-winded nonsense, but a sharp criticism of the current disadvantages. Therefore, the first step of new media technology is to innovate the concept of party newspaper practitioners and make them more suitable for the development of the new era.
1296
L. Yao
3.2 The Role of Technological Innovation New media is the product of the combination of media and technology. In the new media era, text is only a means of expression of the media, while the synthesis of many new technical means such as images, audio, and video and text is the way of expression of new media. Therefore, the traditional technical means only for text editing are bound to be innovated. For example, People’s Daily has constructed a new development pattern of “one main newspaper, media convergence and multiplatform”, which has formed a media convergence “people’s media square” with full coverage of “paper media + website + client + official Microblog + self-media + generation of operating”, which covers 635 million users in the world, of which 199 million are clients of People’s Daily [5].
3.3 The Innovative Function of Operational Mode The traditional mode of operation is the way of paper publishing and subscribing, while the mode of operation of the Internet is obviously more diversified and comprehensive. For example, the more common “WeChat, Microblog and Client” mode of operation is to operate in the way of WeiChat, Microblog and client, which has a wider audience and higher technical requirements. In 2017, the first Top 100 Selection List of “WeChat, Microblog and Client” was released [6]. The list assesses the situation of WeiChat, Weibo and APP clients from ten aspects by means of voting by netizens. For each item, the top ten are selected, and party newspapers make the list in all five items in Table 1. However, it is not difficult to find that the local party newspapers have obviously lagged far behind in this round of competition. Table 1 The proportion of party newspapers in top 100 selection list of “WeChat, Microblog and Client” in 2017 List categories
Party newspaper proportion (%)
Party newspapers on the list
The influence of WeChat
20
People’s Daily and Xinhua News Agency
The influence of Microblog
30
People’s Daily, China Daily and Xinhua Perspective
APP influence
40
Xinhua News Agency, Guangming Daily, People’s Daily and Economic Daily
WeChat innovation
20
People’s Net and Xinhua Net
Innovative power of Microblog
10
People’s Net
Influence of New Media Technology …
1297
4 Ways for Party Newspapers to Adapt to the Development of New Media Technology 4.1 King Content The fundamental characteristic of the party newspaper lies in its authenticity and authority. This fine tradition must be adhered to and developed in the new era. In the Internet era, information exists like “sea”. To survive and develop on such a huge competitive Internet platform, party newspaper must be able to stand out. And its fundamentality lies in the readability and connotation of the content. It can be clearly seen from Table 1 that the People’s Daily is undoubtedly the biggest winner in this round of change, which is inseparable from the huge and excellent editing team of the People’s Daily. The authenticity, rapidity and reliability of its reports and the depth of its editorial content are all important factors in its stability to sit first.
4.2 Technical Support The integration and development of party newspaper and new media technology must strengthen technical support. New media party newspaper is not simply to move newspapers to the Internet, but a technological innovation. It is the most convenient method to use the third-party Internet platform for integration and development, such as the technology utilization of WeiChao and Microblog. This method has low requirement on Internet technology capability and wide audience, and can spread most quickly. The disadvantage is that the third-party platform which is always used is difficult to give full play to its own advantages. Therefore, developing client is another common way of new media technology. This way requires high technical requirements, requires the introduction of specialized personnel, and is more laborious to operate. At the same time, it is an important technical support for the construction of its own service terminal. Under the Internet thinking, the best sharing economy is multi-means linkage [7].
4.3 Structural Reform As far as party newspapers are concerned, the most fundamental bottleneck restricting their development is the system problem, so the system reform is imperative. The traditional party newspaper is a government organ newspaper, which does not need to consider its own operation. However, in the Internet era, transformation is the first step to survive. From Table 1, it can be seen that all the newspapers on the list have succeeded through this transformation [8].
1298
L. Yao
5 Conclusions In the new media era, the impact of the Internet makes the party newspaper have to make a choice, either to cling to incompleteness until death, or to adapt to the times to change. New media technology has innovated the concept of party newspaper practitioners, and changed the means and methods of communicating information. Through the transformation of new media technology, the party newspaper is gradually getting out of the old stereotyped impression of preaching, and is moving towards a more open, inclusive and grounded direction, such as the extensive use of its network language [9]. For example, its focus on current events has undergone tremendous changes. It is replacing preaching with entertainment that is closer to the network audience, which is a big credit to new media technology [10].
References 1. https://baike.so.com/doc/6141647-6354814.html. 2. Wang Xiaodan. 2018. Difficulties and breakthroughs in the transformation of new media in local party newspapers. News Front, November (in Chinese). 3. Gu Xueqiang. 2016. On the transformation of party newspaper in the context of new media. News World, October (in Chinese). 4. Wang Yan. 2018. Analysis of innovative reform strategies of local party newspapers under the background of new media. Journal of News Research, July (in Chinese). 5. Zhang Yong. 2018. Persistence and rebuilding: A preliminary study on the path of party newspaper’s transition in the all-media age. Party Newspaper Online, July (in Chinese). 6. https://news.qq.com/a/20180206/028021.htm. 7. Dai Jingxiao. 2018. Reflections on the way of transition and development of local party newspapers. Journalism Probe, March (in Chinese). 8. Xu Kexi. 2018. Establishing media think tank to realize the transformation and upgrading of city party newspapers. News World, November (in Chinese). 9. Wang Shuai. 2014. The conversion and promotion of party newspapers in the new media age. Today’s Massmedia, July (in Chinese). 10. Mi Na. 2016. Research on the transition path of People’s Daily under the trend of media integration, May. Hebei University of Economics and Business (in Chinese).
Application of NB Technology in IoT Chao Zhou
Abstract At present, the development of China’s IoT is relatively rapid. It mainly reflects in the application of the IoT and the analysis of the industrial chain. However, NB-IoT technology, as a newborn for IoT technology, has relatively little research at home and abroad, especially the application of NB-IoT technology in commercialization. Based on literature research, this paper analyzes and summarizes the specific application of NB-IoT technology in IoT in China, and puts forward relevant suggestions on the problems existing in the application of IoT based on the actual development status and development prospects of the IoT technology. Keywords Internet of Things · NB-IoT technology · Application analysis · Future prospect China’s IoT industry has developed relatively late compared to the foreign IoT industry, but the development of China’s IoT is extremely fast. In 2015, the proposal of the 13th Five-Year Plan provided a large platform for the development of China’s IoT, which made the development of China’s Internet of Things enter a new stage. NB-IoT refers to narrowband Internet of Things. As the representative of low power wide area in the IoT technology, NB-IoT has obvious advantages over other low power wide area IoT technologies. The current development trend of IoT in China makes NB-IoT technology more and more suitable for the development of China’s IoT industry. In 2017, China has widely promoted the application of NB-IoT technology in the IoT. However, there are still some shortcomings in the NB-IoT technology system. This paper analyzes the application of NB-IoT technology in the IoT and puts forward relevant suggestions on the factors affecting the development of China’s IoT.
C. Zhou (B) Beijing Economic-Technological Development Area Information Center, Beijing 100176, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_152
1299
1300
C. Zhou
1 Overview of the IoT The establishment of the IoT is based on the international standard communication protocol. The rise of the IoT is caused by people’s understanding of information technology, and it is slowly accepted by people [1]. The IoT is a kind of network information which is shared and transmitted between two objects byn taking the IoT technology as a medium. IoT technology involves many technologies, such as modern information technology, perception information technology, identification information technology and communication information technology, all of which are integrated with the IoT and the integration of information technology [2, 3]. Only by combining these technologies with the IoT can we recognize the IoT in our life and work, and this technology can make the IoT technology be promoted. It only took three years for NB-IoT technology to enter the market, but there is little research on NB-IoT technology in China [4]. However, some scholars have made in-depth research on NB-IoT technology. The role of Internet of Things technology is also simple. It uses Internet technology to integrate information technology and communication technology to build a communication platform between objects, and between people, on which information can be shared and transmitted. IoT communication technology has many advantages which are mainly embodied in management [5, 6]. That IoT can establish communication platform between people and between objects also makes it easier for managers to manage their work.
2 Application of NB-IoT Technology in Smart Manhole Cover At present, the supervision of manhole cover in many cities in China is still managed by traditional methods. The method that strengthening the manhole cover itself and using many patrol personnel to conduct regular inspections not only consumes manpower and material resources, but also easily causes waste of resources. In addition, it can not guarantee the safety of manhole cover through human monitoring, because human monitoring can not achieve real-time monitoring. Once a problem occurs, the patrol personnel cannot know the situation at the first time, and there may be leakage of groundwater or even more serious consequences [7]. However, the use of Internet of Things related technical means can solve these problems well. The monitoring system is installed on the manhole cover, including the sensor and NB-IoT module. There are many kinds of sensors on the manhole cover, which can monitor the internal temperature, pressure and some toxic gases [8, 9]. For the convenience of management, each manhole cover needs a separate password. The smart manhole cover with the use of NB-IoT is not only convenient for people’s management, but also consumes very low energy [10]. The traditional manhole cover monitoring
Application of NB Technology in IoT
1301
equipment can only be used for several months, but the intelligent manhole cover based on NB-IoT technology can work for many years, reducing the costs of energy. The intelligent monitoring technology for manhole cover using NB-IoT technology has been put into use in many cities. With the construction of smart cities in China, the application range of NB-IoT can be a wide range.
3 Application of NB-IoT Technology in Intelligent Streetlight The streetlight in the city and the people’s lives are inseparable. The streetlight in most cities in China use the traditional management methods of light control and clock control. The shortcoming of this management method is that it is easy to waste resources. When it is not needed to be lit, it also lights up. Sometimes it is considered as light interference, which affects people’s lives. Therefore, the street lighting control scheme of the ZIghbb/PLC protocol has appeared in the city [11–13]. Although this scheme avoids the waste of resources, the protocol is vulnerable to external attacks, has poor security and is not very wide in coverage area. In addition, this kind of solution requires additional network construction at a high cost. In terms of maintenance, it relies on manual troubleshooting. The use of NB-IoT technology in intelligent streetlight can solve this problem perfectly. The NB-IoT intelligent streetlight consists of four blocks, namely, power supply equipment; power calculation equipment; control module and NB-IoT technology equipment. The advantage of the streetlight controlled by NB-IoT technology is more obvious compared with the traditional streetlight control system. It reduces a lot of investment, and the NB-IoT intelligent streetlight does not need to build a network system, and can be used on the public network directly, which reduces the labor cost greatly. From the security point of view, NB-IoT technology is more stable in work, and the anti-interference ability to external factors is stronger than that from the traditional streetlight control system. The protective equipment is telecommunication-level, which is more safe and reliable. With the support of government policies, the application of NB-IoT technology in streetligh will have great development prospects.
4 Application of NB-IoT Technology in Smart Home Smart home is a core area in the application of the IoT, whose original intention is to use IoT technology to realize the linkage between household equipment to make people’s lives more comfortable [14]. The working principle of the application of NB-IoT technology in home is to connect all household devices through a common network platform, so that information of each smart home device can be transmitted
1302
C. Zhou
to each other, and the information will be transmitted to the home control center platform eventually that is used for the unified management and monitoring of the home. The NB-IoT technology enables intelligent linkage of home devices. However, at present, the development of smart home encounters a bottleneck, because the household equipment between different enterprises can not share the platform. In addition, there are still great problems in the compatibility of the control platform [15, 16]. But smart home will be widely popularized in the future, and the problem of compatibility will be solved. The main reasons are as follows: (1) With the continuous development of the social economy, people’s living standards are rapidly improving. People will pursue a higher quality of life in their lives, and home equipment is indispensable in their life. In the age of information technology, smart homes are widely used because they can maximize the convenience of people’s lives. (2) The concept of smart home has been proposed for a long time, and many followers have been accumulated in the social market. For example, smart door locks and smart curtains have been put into use, and the reputation is also very good. China has a large population, and these smart products are profitable. There are also certain solutions in the linkage between home equipment [17, 18]. For example, Haier’s U-home can link household equipment such as smart door locks and air conditioners. As these technologies are not mature enough, they cannot be made more devices to be linked. But with the rapid development of NB-IoT technology, the future of smart home is not far away.
5 Application of NB-IoT Technology in Intelligent Logistics The earliest application of IoT technology is the logistics industry, but the logistics industry has not been transformed with the rapid development of IoT technology. The implementation efficiency of logistics is still relatively low, and the quality of service cannot be guaranteed. At present, logistics industry in China has the following difficulties: (1) Valuables are easy to be stolen and adulterated in the course of transportation, and there are still shortcomings in monitoring. (2) It is inconvenient for the third party to add private monitors and it is difficult to obtain real-time data. (3) It consumes too much energy when using public network to send back, and can not support the complete monitoring of logistics cycle. (4) The information and data of cold chain logistics are not transparent enough, and the quality of food and drug can not be guaranteed. But NB-IoT technology offers new opportunities for logistics industry. The NBIoT IoT technology enables intelligent logistics to obtain basic information on vehicles, goods, people and routes, providing the logistics industry with a lot of useful
Application of NB Technology in IoT
1303
data which can help logistics companies and logistics personnel to monitor logistics. In the platform layer, the data management can be more convenient by building the IoT connection platform. At the terminal, the NB-IoT terminal module is composed of various sensors, which is applied in the management of logistics fleet. Compared with traditional physical systems, the application of NB-IoT technology in the logistics system can make the network connection simpler and energy consumption lower [19]. It does not require frequent battery replacement, and can realize real-time monitoring of the logistics cycle. In terms of construction, there is no need to install too many lines and the installation process is simple. In terms of positioning, NB-IoT technology can be combined with GPS system to make the accuracy of positioning be within 10 m, and logistics positioning can basically meet all customers.
6 Conclusion and Prospect This paper takes NB-IoT technology as t the breakthrough point, and summarizes the potential applications of IoT in China according to the practical application of NBIoT technology, including smart manhole cover, intelligent streetlight, smart home, and intelligent logistics. The reason why NB-IoT technology in China can develop rapidly is that it is inseparable from these application fields. Smart city is a trend in the future development of the IoT [20]. It can solve many problems in people’s lives and provide people with great convenience. Smart homes have great potential in the future market. As people’s living standards improve, people’s requirements for quality life will continue to increase. Therefore, the application of NB-IoT technology in smart homes is promising. With the continuous development of IoT in China, the industrial chain of IoT has a very clear pattern, and the commercial process of the IoT will continue to accelerate with the development of IoT technology. With the commercialization of IoT, it is more realistic to divide the specific application fields of the IoT technology according to different market standards.
References 1. Gao Xiaoming, Zhang Xingrui, and Wang Huahua. 2018. Application of NB-IoT technology in the Internet of Things: Take smart home as an example. Computer Fans, No. 91 (4): 36. 2. Wang Chunlong, and Li Heqiang. 2017. Key technologies of NB-IoT and their application in the agricultural Internet of Things. Electronic Technology and Software Engineering (16): 20–20. 3. Huang Tingbo, and Liu Runhui. 2017. Discussion on the development of the next generation Internet of Things based on NB-IoT technology. Guangxi Communication Technology No. 129 (4): 20–24.
1304
C. Zhou
4. Huang Wenchao. 2017. Current status and development trend of NB-IoT low rate narrow band Internet of Things communication technology. Electronic Testing (6). 5. Yan Yiqiang. 2016. Introduction of NB-IoT technology and its application in smart cities. Guangdong Communication Technology 36 (11): 6–8. 6. Sun Ke. 2017. To build smart community by using NB-IoT technology. China New Communications 19 (9): 95–96. 7. Lin Fang. 2017. Coverage enhancement technology of NB-IoT and its application in remote meter reading system. Electronic World (14): 124–124. 8. Lv Taohua. 2017. Discussion on the importance of NB-IoT deployment in the Internet of Things. China New Communications 19 (8): 78–78. 9. Hong Jiazhen. 2018. Current status and development trend of NB-IoT low rate narrow band Internet of Things communication technology. Electronic World, No. 544 (10): 44–45. 10. Zhu Weijue, and Yao Yuhua. 2017. Analysis of coverage enhancement technology for NB-IoT. Wireless Interconnection Technology (8): 28–29. 11. Zeng Zhongcheng. 2018. Performance and application of cellular-based narrowband Internet of Things (NB-IoT) technology. Information Recording Materials (5): 44–45. 12. Li Juan, Hu Xiaoling, and Li Zigang. 2016. Analysis of energy consumption test for NB-IoT. Telecommunications Network Technology (8): 65–67. 13. Zhu Hongjun, and Wu Huihui. 2017. Application and construction of NB-IoT technology. Modern Information Technology (6): 115–116. 14. Xu Dongdong. 2017. LoRa and NB-IoT technology have opened a new pattern of Internet of Things. Science and Technology Innovation (24): 116–117. 15. Deng Jian, and Chen Yanfang. 2017. Analysis of Internet of Things technology based on NBIoT network and its application scene. Jiangxi Communication Science and Technology (4): 12–14. 16. Song Aihui, Zhao Huilin, and Sun Xiangqian. 2018. Deep analysis of the evolution of NB-IoT and Emtc; key technologies of cellular Internet of Things. Communication World 777 (19): 34–36. 17. Zhang Zhifeng. 2018. Current status and development trend of NB-IoT low rate narrow band Internet of Things communication technology. Wireless Interconnect Technology, Vol. 15, No. 136 (12): 18–19. 18. Wang Rui. 2018. Analysis of key technologies and development of NB-IoT. Science & Technology Economics Guide, Vol. 26, No. 639 (13): 29. 19. Xiao Xiao. 2018. Depth interpretation of the application of Internet of Things NB-IoT and LoRa Technology in the field of access control: Interview with Huang Zhiyong, Marketing Director of Shenzhen Da Shi Information Technology Co., Ltd. China Security (4): 18–21. 20. Zhang Huiying. 2013. Application of Internet of Things technology in the construction of smart cities. Science and Technology Innovation (36): 151–151.
Implementation of Medical Disputes Information System Na Wang, Na Wei, Hongqin Li and Linghao Kong
Abstract On the base of the development of medical service in the new period, comprehensive summary of experiences and lessons in the process of the development of modern information system. We draw lessons from the advanced technology in modern informatization construction, make full use of advanced computer technology, on the base of medical disputes which have occurred. Medical disputes information data model was used for medical information management system. Through this system, the transmission, storage and use of medical information of medical institutions at all levels can be realized for ensuring the accuracy, integrity and consistency of patients’ medical information. Keywords Medical dispute · Information system · Database · Hospital
1 Introduction Health care has gradually become the most concerned issue, with the improvement of people’s lives. As the number of patients increases, a doctor-patient relationship is established between patients and medical staff [1]. What the patient hopes is to remove painful disease, what the patient asks is a doctor USES superb medical treatment technology to drive away ill disease. The responsibility and obligation of medical staff is to do everything possible to meet patients’ hopes and requirements, N. Wang Department of Anesthesiology, First Hospital of Jilin University, Changchun, China e-mail: [email protected] N. Wei The First Operating Room, First Hospital of Jilin University, Changchun, China e-mail: [email protected] H. Li Department of Urology, First Hospital of Jilin University, Changchun, China e-mail: [email protected] L. Kong (B) Medical Department, First Hospital of Jilin University, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_153
1305
1306
N. Wang et al.
which is the doctor-patient relationship, but also the doctor-patient contradiction. There are many reasons for the increasing number of medical disputes [2]. The increase of medical disputes will also bring considerable workload to hospitals. The search, statistics and analysis of medical dispute information take a long time, which wastes the time of medical staff and reduces the work efficiency. This requires a tool that can replace a lot of manual operation to improve the speed of medical dispute information retrieval and statistics [3]. With the development of computer technology, it is possible to complete a large number of operations on medical disputes through computers.
2 Medical Dispute Information With the continuous growth of patients’ medical information, the existing medical information management system is increasingly difficult to meet the growing needs of medical services. Most of the current popular medical information systems only focus on patient management and cost information, but ignore the effective management of patient medical information [4]. At present, there are still many problems to be solved in the hospital information system used in medical and health institutions at all levels. There is a lack of standardized procedures for recording and transmitting medical information of patients throughout the whole disease cycle. The decentralization and independence of medical institutions at all levels make it difficult for patients to transmit and exchange medical information [5]. Medical information system is the ability to collect, store, process, extract and exchange patient diagnosis and treatment information and administrative management information for each department of the hospital by using electronic computers and communication equipment, and to meet all functional requirements of all authorized users. Whether the management information system including the medical information system can be widely used in a country marks the modern scientific level of the country. Similarly, the establishment of computer-based management information system has become a strategic measure for modern enterprises, government agencies and other social organizations to improve their own quality and achieve organizational goals [6]. Nowadays, information technology and network technology have become an important part of society and an important factor affecting the sustainable development of various industries. Medical information system has increasingly become a powerful means of scientific management and improvement of medical service level in hospitals [7]. Whether a hospital has a sound information system and USES it effectively has become an important symbol to measure whether a hospital has a good social image and advanced management level.
Implementation of Medical Disputes Information System
1307
3 Existing Problems 3.1 Restrictions on Exchange of Information At present, the national capital investment in hospital information system is very limited, and the hospital information technology personnel is also very limited, so that the development of professional and technical personnel in this field is in short supply. Non-professional technical personnel lack an overall understanding of the integrity and systematicness of system development, and the design of information data structure is multifarious, resulting in more and more problems [8].
3.2 Short of Capital and Technology Investment Traditional hospital information systems all use a single LAN information system. The amount of information and the right to use provided by HIS are only limited within the hospital. The degree of informatization is relatively low. With the improvement of medical service quality, data exchange of medical information becomes more and more critical [9]. In order to realize the information construction in the third stage, the regional information pooling and sharing should be done first, and then the regional health information network should be improved step by step.
3.3 Non-standard Information System The direct consequence of Chinese national characteristics, such as the wide geographical distribution, uneven distribution of resources, unsystematic division of disciplines, and non-standard related laws and regulations, is the excessive liberalization and non-standardization of China’s hospital information system construction. Standards and related laws and regulations of information system are being drafted and revised at present. It is believed that a batch of relatively perfect standards and regulations will appear in the near future, which will change the current chaotic situation of information system. It can provide a reasonable and efficient collaborative environment for product design and manufacturing [10]. Based on computer technology, it optimizes the management of all information and processes related to product design and manufacturing.
1308
N. Wang et al.
4 Solutions and Suggestion 4.1 Unified Platform There is a certain gap between the domestic medical information system in both the breadth and depth of information technology application and the scale and level of development. At present, the domestic use most of the hospital information system software level is low, normally only realize patients diagnosis and treatment information and administrative management information storage primary things processing, such as the HIS system cannot fully cover patients in different times different medical departments exchange functions such as data acquisition, especially in recent years, the software of repeat development phenomenon is particularly serious. The resulting medical disputes are also increasing, often for some medical disputes between doctors and patients each side of the situation. Provisions in the regulations on the medical accident treatment in our country, an action of tort caused by medical behavior, by medical institutions are the results there is no causality between medical behavior and damage and there is no medical fault burden [11], this means that in the event of medical dispute, the burden of proof must be borne by the hospitals, health providers is necessary to submit evidence of no-fault, otherwise the medical disputes by hospital to undertake corresponding legal responsibility.
4.2 Combined with Practical Application The existing problems of HIS mainly lie on the fact that they cannot meet the actual needs in the aspect of medical dispute proof [12]. Therefore, combining the increasingly developed and mature network technology and information technology, the development of new medical information management system for the national medical reform and practical application is particularly important. Although we have made some remarkable achievements in the construction of hospital informatization, it is still rare to apply it to practical medical diagnosis, surgery and other medical work. Therefore, to accelerate the construction of medical informatization in China and establish a new medical information management system has become an inevitable choice for the in-depth medical and health reform in China.
5 Main Principles of Technology PDM technology has been widely used in many fields abroad. American CIMdata company conducted a survey on the implementation and application of PDM technology in enterprises, and the results showed that enterprises that successfully implemented PDM technology accounted for the vast majority of them. The technical core
Implementation of Medical Disputes Information System
1309
of PDM is to make the heterogeneous data related to the product freely Shared with all related personnel of the product design and manufacturing project in the whole life cycle of the product [10]. PDM technology developed rapidly, and PDM has been regarded as a Framework for enterprise information [13]. At present, more and more enterprises have taken it as the key technology to maintain and improve the market adaptability of enterprise competitiveness, and it provides key technical support in the aspects of restructuring business process, ISO9000 quality certification and concurrent engineering [14]. Product data management (PDM) on the whole through the computer aided system of product design and development to carry on the macroeconomic regulation and control, various information island by product data management (PDM), and based on the virtual model of products, and then complete the characteristic attributes of product, manufacturing process and related to the product produced by the process of various data described [14]. PDM is an organic combination of computer technology and information management system. Through the establishment of virtual model of products, the system can control all data information in the product design and manufacturing process quickly, conveniently and scientifically [15]. For most of the current medical information system, the nurse station, ward area, central control room etc. formed various information island, information transmission between each other is dependent on the hospital local area network (LAN), using PDM technology principle, in the design of medical information system, to link together the various decentralized information isolated island, and realize data sharing, transmission, etc. Furthermore, medical institutions in the region can be connected through the Internet to achieve medical information management in the region [16].
6 Conclusion This paper analyzes the structure of medical information management system according to the actual needs of hospitals, and then discusses the medical information model of doctor-patient disputes. Using the experience and research results of many researchers in the past, we analyze the concept and significance of the information management in PDM in the process of manufacturing, the concept and significance of the database are explained. Based on the PDM method, a medical information model based on actual medical records is proposed, and the design of the model is completed. Acknowledgements This work was financially supported by First Hospital of Jilin University.
1310
N. Wang et al.
References 1. Skalak, R. 1960. Subharmonic oscillations of a pendulum. Transactions of the ASME (American Society of Mechanical Engineers). 2. Hongmin, Zhang, Ma Xiwen, Xu Wei, and Wang Peizhuang. 1993. Design fuzzy controllers for complex systems with an application to 3-stage inverted pendulums. Journal of Information Science 2: 71–75. 3. van Eck, Nees Jan, and Michiel van Wezel. 2006. Application of reinforcement learning to the game of Othello. Computers and Operations Research 6: 431–433. 4. Yamakawa, Takeshi. 1989. Stabilization of an inverted pendulum by a high-speed fuzzy logic controller hardware system. Fuzzy Sets and Systems 1: 51–59. 5. Nguyen, V.B., and A.S. Morris. 2007. Genetic algorithm tuned fuzzy logic controller for a robot arm with two-link flexibility and two-joint elasticity. Journal of Intelligent and Robotic Systems 1: 36–39. 6. Watkins, Christopher J.C.H., and Peter Dayan. 1992. Technical note: Q-Learning. Machine Learning 3: 151–153. 7. Furut, K., T. Ochiai, and N. Ono. 1984. Attitude control of a triple inverted pendulum. International Journal of Control 6: 356–359. 8. Bradtke, Steven J., and Andrew G. Barto. 1996. Linear least-squares algorithms for temporal difference learning. Machine Learning 1: 31–36. 9. Peng, Jing, and Ronald J. Williams. 1996. Incremental multi-step Q-learning. Machine Learning 1: 54–59. 10. Horarik, M.M. 2003. Appraisal and the special instructiveness of narrative. Interdisciplinary Journal for the Study of Discourse (2). 11. Coffin, C. 2002. The voices of history: Theorizing the interpersponal semantics of historical discourses. Interdisciplinary Journal for the Study of Discourse (4). 12. White, P.R.R. 2003. Beyond modality and hedging: A dialogic view of the language of intersubjective stance. Interdisciplinary Journal for the Study of Discourse (2). 13. Page, R.E. 2003. An analysis of appraisal in childbirth narratives with special consideration of gender and storytelling style. Interdisciplinary Journal for the Study of Discourse (2). 14. Bucci, Giacomo, Andrea Fedeli, Luigi Sassoli, and Enrico Vicario. 2004. Timed state space analysis of real-time preemptive systems. IEEE Transactions on Software Engineering. 15. Singh, Satinder, Tommi Jaakkola, Michael L. Littman, and Csaba Szepesvári. 2000. Convergence results for single-step on-policy reinforcement-learning algorithms. Machine Learning 3: 133–136. 16. Cheng, Fuyan, Guomin Zhong, Youshan Li, and Zhengming Xu. 1996. Fuzzy control of a double-inverted pendulum. Fuzzy Sets and Systems 3: 125–129.
Research and Implementation of RSA IP Core Based on FPGA Boyang Liu
Abstract In the era of digital economy, users need to transmit key information such as identity, account, password and so on through the network. Once these information is leaked on the Internet, it will cause serious consequences such as economic loss, privacy disclosure and so on. RSA public key cryptography algorithm has been widely used in network security transmission schemes in the world because of its simplicity, security, effectiveness and maturity [1]. In this paper, the important role of asymmetric encryption technology was carefully analyzed, and the algorithm principle of RSA was introduced in detail. In view of the difficulty of division in hardware, Montgomery fast modular multiplication algorithm was adopted as the core part of RSA encryption algorithm. According to the top-down hardware design method, I first distinguished the functions of encryption module, and then used Verilog language to write the modules such as control, inverter, mod and divider. Finally, I simulated the control, mod_exp, inverter in Xilinx Vivado to verify their function. The simulation results showed that the Control module could encrypt and decrypt 256 bits of data in 120 clock cycles. At 500 MHz, the data throughput of the IP core can reach 512 Mbps. After Vivado synthesis, RSA IP core consumes 44 DSPs, LUT 2106 and FF 754 on the FPGA xc7vx485, which saves resources very much. Because the processing speed of IP core of hardware-based RSA algorithm is not as high as that of symmetrical encryption IP core in some key areas [2], finally I proposed four next steps to improve the RSA IP core. Keywords RSA · FPGA · IP core
1 Introduction In the era of digital economy, cryptography plays an increasingly important role. For example, our bank cards, mobile phones, e-mail, social accounts and so on, all need to use passwords to ensure information and property security [2]. The traditional encryption method is symmetrical encryption, that is, the sender and the receiver use B. Liu (B) Shandong University, Jinan, Shandong Province, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_154
1311
1312
B. Liu
the same password to encrypt and decrypt the information respectively [3]. The main problem of this method is that there are security vulnerabilities in key generation, storage, transmission and distribution. Especially in the network communication, a large number of users have doubled the demand for keys, and the distribution and secure transmission of these keys has become a difficult problem to solve [4]. In 1976, Duffy and Herman, two scholars of Stanford University, proposed the concept of public code cipher system [2], in which the two sides of information transmission use different codes in the process of cipher and decipher respectively. Cipher key (CK), cipher algorithm and decipher algorithm are all open, while decipher key (DK) determined by the CK should be kept secret can not be calculated according to the CK. In 1977, MIT Ron and Leonard jointly proposed RSA. RSA usually generates a pair of RSA codes. The user keeps one as the cipher key and publishes the other one as the public key. The sender can encrypt the transmitted information by using CK. After receiving the information, the receiver uses his DK to decrypt the information and get the plain texts [4]. RSA has been widely used in e-commerce, smart card, digital certificate and other fields. Generally, 1024-bit RSA keys are used to improve the security strength [5]. RSA has a long key and a large amount of computation, so its encryption speed is slow. The traditional symmetric encryption method has fast encryption speed and is suitable for encrypting long messages. RSA is usually used to encrypt key and information abstract, and symmetric encryption algorithms such as DES and AES are used to cipher and decipher a large number of transmitted information. Traditional software methods have some shortcomings in RSA encryption and decryption [4], such as long time-consuming and low efficiency, while FPGA has the characteristics of rich resources, short design cycle and fast operation speed. After deeply studying RSA algorithm and fast modular multiplication algorithm, this paper implements RSA encryption algorithm on FPGA with Verilog language. Through simulation and synthesis, this IP core can quickly implement RSA encryption algorithm.
2 RSA Algorithm RSA is an internationally public key cipher system. Because of its simple expression and strong confidentiality, RSA algorithm is very suitable for information security in the information age. In the past 30 years, RSA has experienced various attacks [6], and has been considered as one of the best open cipher algorithm. RSA guarantees information security based on number theory and computational complexity theory. Generally speaking, it is very easy to calculate two big primes, but it is difficult to find the prime factor of two large primes by decomposing the product of two large primes quickly [7]. So far, it is impossible to crack RSA in an acceptable time by current machines (Fig. 1). This paper briefly introduces the principle of RSA algorithm.
Research and Implementation of RSA IP Core Based on FPGA
1313
Fig. 1 Flow chart of RSA algorithm
RSA algorithm description: (1) Arbitrarily select two unrelated big prime numbers g and h to store them in secret. (2) Calculate L = G×H (open) and Euler function φ(L) = (G−1) × (H−1) (need to be stored confidentially). (3) A decipher key D is randomly selected to satisfy 0 < D < φ(L), and the maximum common divisor GCD(D,φ(L)) = 1 of D and φ(L) is required. (4) Cipher key E is calculated to satisfy 0 < E < φ(L), and DE ≡ 1(mod φ(L)) (public). (5) Cipher plain text: C = E(K) ≡ KE (mod L). (6) Decipher ciphered text: K = D(C) ≡ ED (mod L). Among them, K stands for plain text to be encrypted, C for cipher text to be encrypted, E for key to be encrypted, D for key to be deciphered, and L for module length [7]. The more difficult to divide the big number, the more secure RSA is. That is, the difficulty of decomposing modulus L. Once L is decomposed, RSA passwords are insecure. Generally, the selection of modulus L meets the following requirements: 1. The two prime factors G and H of N should be large enough. At present, the length of L is at least 1024 bits to defend against factor decomposition attacks, so the length of G and H should be bigger than 512 bits. 2. |G-H| should be large enough. If |G-H| is small, then it is easy to try to find G and H near n. 3. G and H are best strong prime numbers, so G−1 and H−1 have large prime factors [7]. In RSA algorithm, because the probability of reciprocal prime of any two integers is 60%, it satisfies GCD(D,φ(L)) = 1 when selecting E. If E is small, it will be very
1314
B. Liu
fast when encrypting, but this is not safe. Generally, E is 16 bits, which can not only prevent attacks, but also achieve faster encryption speed.
3 Montgomery Fast Modular Multiplication Algorithms In public key algorithms, it is usually necessary to calculate c mod K, c*d mod K, cˆd mod K, etc. Because the structure of division hardware module is complex and the operation is slow, and modular power operation can eventually be transformed into modular multiplication operation by fast modular power algorithm, many scholars have focused on fast modular power and fast modular multiplication algorithm [8]. Fast modular power algorithm mainly has the following several algorithms: binary algorithm, high-order algorithm, sliding window algorithm, power tree algorithm, addition chain algorithm. Fast modular multiplication algorithms mainly include Brickell algorithm, Karatsuba–Ofman algorithm, Booth algorithm and Montgomery algorithm [9]. Because Montgomery algorithm can transform modular operation into shift operation through reduction operation, which greatly improves the efficiency of modular multiplication and is more suitable for hardware implementation. Montgomery modular multiplication is the base of RSA algorithm [9] and it can be described in the following formula Algorithm(ZL-MontExp) Input: A base-j, 0≤c 70°. Improvement: The partial symptoms of the waist and the leg pain disappeared, and the function of the waist movement improved, and the straight leg elevation test > 30°–50º. Inefficiency: There is no improvement before and after the treatment. After the statistical treatment, the total effective rate of the two groups was significantly different (X2 = 8.5, P < 0.05), indicating that the treatment group was better than the control group. The lumbar traction is an effective method for the treatment of the lumbar disc herniation.
1452
Q. Wang
According to the size of the traction force and the length of the acting time, the traction is divided into the slow traction and the fast traction. The main clinical symptoms of the lumbar disc herniation are the lumbar and leg pain, so the treatment should be aimed at relieving the pain. In the past, the mechanism of the lumbago and the leg pain caused by the mechanical compression in the nerve conduit is widely accepted, so relieving the mechanical compression has become the main purpose of the treatment. Through a large number of the clinical tests, it is believed that the size of the prominent nucleus pulposus is not proportional to the clinical symptoms, and the mechanical compression of the prominent body is not the only cause of pain. The biomechanical imbalance of the local and surrounding tissues, the aseptic inflammation and the adhesion caused by the protrusion of the intervertebral disc are the real pathological factors causing the clinical symptoms. The symptoms and signs of most patients disappeared after the conservative treatment, and the prominent nucleus pulposus did not disappear. The nucleus pulposus, the annulus fibrosus and the cartilage plate of the intervertebral disc also change with the age. It is generally believed that after the age of 20, the intervertebral disc begins to degenerate, and the water content of the nucleus pulposus gradually decreases, and the elasticity and load-resisting ability of the intervertebral disc also decreases. In our daily life, the lumbar intervertebral disc is subjected to the repeated compression, the flexion and the torsion loads. It is easy to produce cracks from the inside to the outside of the posterior part of the fibrous ring where the force of the lumbar intervertebral disc is greatest. This kind of the change is accumulating and aggravating gradually, and the fissures are enlarging constantly, which makes the fibrous rings here become weak gradually. On this basis, the excessive weightbearing or the sprain of the lumbar spine, or even the increase of the intradiscal pressure caused by some daily activities, can further rupture the degenerative and the cumulative damaged annulus fibrosus, and the degenerated nucleus pulposus tissue is protruded from the weak or ruptured annulus fibrosus. The pain, tenderness and radiation pain secondary to lumbar disc herniation coincide with the following parts of the foot-sun bladder meridian and the Foot-Shaoyang gallbladder meridian. Therefore, Ashi acupoint, Shenshu, Huantiao, Weizhong and Chengshan were selected for the treatment. Ashi and Shenshu can regulate the lumbar meridian qi, invigorate the blood circulation and remove the blood stasis. The ring jump can remove rheumatism, smooth the dredge channels and collaterals, and benefit the waist and knee. In order to select the acupoints along the meridian, the Central Committee should abide by the idea of “the middle of the back committee” to dredge the bladder meridian qi, which is the key point for the treatment of the lumbar back pain. The electro-acupuncture therapy can promote the blood circulation and dissipate the blood stasis, promote qi and relieve pain, and dredge meridians and collaterals. The traction treatment enlarges the lumbar intervertebral space, enlarges the intervertebral foramen, reduces the adhesion between the protrusion and the nerve root by negative pressure, partially expands the intervertebral disc, and relieves edema, which is conducive to the elimination of the inflammation, the release of the facet joints, the correction of the facet joint disorder and the relief of the nerve root pressure. It can also relax the spastic muscles, further reduce the
Curative Effect Observation of the Computer-Controlled …
1453
pressure on the intervertebral disc, improve the local blood circulation and eliminate the tissue edema. Therefore, the electro-acupuncture combined with the traction is an effective method for the treatment of the lumbar disc herniation.
5 Conclusion The computer-controlled three-dimensional traction for the lumbar intervertebral disc herniation is an original patent technology with independent intellectual property rights in China, and has been patented by Germany, Japan and other patents. The results show that this technique has the advantages of the high curative effect, the fast action, the short course of treatment, the low cost, the simple operation, and the easy quantification and control, and it is worth popularizing. The technical maturity and the scope of application and safety: Through the observation of the mechanical parameters such as the traction distance, rotation and angle number, it was found that there was little difference in the curative effect under the slight change of parameters, and no dangerous or serious adverse reactions were found with the maximum treatment parameters.
References 1. Zhang, Xinggao, and Zhang Jilin. 2014. ZJL-2000-A three-dimensional spine-setting apparatus for the treatment of 831 cases of the lumbar disc herniation. Global Traditional Chinese Medicine (6): 459–461. 2. Zhu, Heqi, Wang Lei, and Wang Zunlai. 2011. 45 cases of the lumbar intervertebral disc herniation treated by Qiangtong method combined with the chiropractic massage. Journal of Clinical Acupuncture and Moxibustion (12): 9–10. 3. Wang, Cheng, and Qu Yujiang. 2016. Clinical observation of 60 cases of the lumbar disc herniation treated by the chiropractic combined with the abdominal massage. Xinjiang Journal of Traditional Chinese Medicine (1): 26–28. 4. Huang, Yuansheng. 2014. Therapeutic effect of the massage on the lumbar disc herniation. Massage and Rehabilitation Medicine (9): 60–61. 5. Long, Xin. 2012. Clinical analysis of the massage-based treatment for the lumbar disc herniation. Chinese Manipulation & Rehabilitation Medicine (2): 219–220.
Computer Simulation Generation of the Humanized Music Timbre Rui Wang
Abstract With the rapid development of the computer technology and the electronic technology, computers have been widely used and penetrated all areas of our lives. The computer music generation is an interdisciplinary subject of the information science and art. The computer recognition and the intelligent creation of music belong to the fundamental goal of the computer music, but our understanding and research on this aspect is still in the primary stage. With the emergence of the multimedia technology, the development of sound and music has been given new opportunities. Music is an indispensable part of people’s life, and the demand for music in our contemporary society is gradually increasing, but the traditional manual music generation methods have been difficult to meet the current social needs. It is a general trend to use computers to create new music. Keywords Music timbre · Humanization · Computer · Simulation generation Different humanized modulation techniques of computer music timbre can directly or indirectly enhance or improve the humanization of the timbre. Of course, there are different emphases in the practical applications [1]. For example, the envelope of the timbre plays an important role in the authenticity and aesthetics of the virtual timbre and the humanization of performances, and the humanized modulation of the effect of the virtual sound field not only enhances the authenticity of the timbre sound field, but also enhances the authenticity of the composite timbre. With the humanization of the timbre, there will be the humanization of melody and the humanization of computer music works.
R. Wang (B) Yancheng Teachers University, Yancheng, Jiangsu 224001, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_172
1455
1456
R. Wang
1 Production Technology of Timbre In the early days, people paid much attention to the spectrum of sounds in the authenticity of the timbre [2]. Later, it was found that the dynamic characteristics of sounds also played an important role in the humanization of sounds. Therefore, nowadays, there are basically the voice envelope modules which can adjust the dynamics and randomness of sounds.
1.1 From the Wave Meter Timbre to the Sampled Timbre From the point of view of the contemporary computer music, the synthesizer is actually the combination of the MIDI keyboard and the hardware sound source [3]. At that time, the music workstation was the combination of the MIDI keyboard and the hardware sound source and the hardware sequencer, so it cannot be called the computer music. With the development of technologies, the soft voice sources (collections of the virtual timbres stored in the physical data) begin to appear. In its early days, there is wingroov, VSC-88, S-YXG50 and other soft-wave meter sound sources, but at that time their use was limited to playing MIDI music and could not enter the field of the professional computer music production [4]. The soft sound source can basically satisfy the music creation and production based on the computer music system technically. It is no less than the hardware sound source in the timbre and even more than hardware in many aspects. Especially, the development and application of the timbre sampling technology make the timbre of the traditional acoustic instruments in the computer timbre have the most possible human characteristics [5]. For this kind of the timbre, although we are unlikely to use the traditional timbre classification method to define it and recognize its authenticity, many of its non-traditional timbres have the good timbre effect and the aesthetic feeling. In the contemporary music works, especially in film and television programs, people gradually accept this timbre, and think that they have the authenticity and humanization characteristics of the timbre.
1.2 From the Monotone Sampling to the Loop Sampling In the computer music, a timbre is a sample. It can be a single tone, a double tone or even a phrase. The loop (cyclic phrase) in the computer music timbre refers to a pre-set timbre segment in the sound source. It is usually the sampled phrase (without structural meaning in music). When it was played, the concert was played over and over again. The cyclic passages are usually rhythmic or harmonic, or they may be special phrases of some instruments, such as scales, arpeggio and chords. The cyclic phrases bring great convenience to our creation, and from the standalone phrases,
Computer Simulation Generation of the Humanized Music Timbre
1457
its performance is generally much humanized. We know that, due to the technical reasons, the sampled timbres are generally the monotone sampled nowadays. When these monotone timbres are composed of two tones or the melodies, there will be some humanization problems such as the lack of the coherence of the melody caused by the too hard header. And the loop sampling is a sampled timbre segment at a time. Because this segment is played by one-time people, it is more humanized than the timbre segment composed of the monotones. Especially when some special music clips or playing skills are special or difficult, loop can better reflect its humanized advantages. I believe that in the near future, the technique of using melody to sample monotones will be more widely used, and using melody to sample monotones is to let monotones come back from melody and to melody.
1.3 Acquisition of the Accompanying Noise In the acoustic instruments, there is also instrumental noise that accompanies the sounds. Even in today’s highly developed instrument manufacturing industry, beyond the timbre of the acoustic instruments themselves, such as the stringed frictional sounds and the wind-flow sounds, all exist, which is determined by its soundproducing principle. In the early stage of the timbre sampling, people thought that only one factor of the spectrum played a role in the timbre, such as synthesizing the flute with the sinusoidal wave and the stringed music with the saw-tooth wave. Later, they gradually realized that the starting time of the timbre, the intensity change of the continuity and reverberation, accompanied by the noise and other factors, were closely related to the timbre. Because of the early virtual timbre and technology, the simulation of the traditional instrument timbre is very “clean” and is considered “electronic” too strong. With the development of the technology, many sound sources and timbres have added the noise effectors. The appropriate noise has a very important effect on the humanized modulation of a particular timbre.
1.4 From the Single Playing Method to the Multiple Playing Methods Because of the presupposition of the timbre of the computer music and the limitation of the interaction and randomness in the performance process, besides enhancing the authenticity of the timbre of the computer music, the diversity of playing methods is also an important manifestation of the humanity. For example, it can directly reflect the randomness and dynamics of the timbre. The early computer music timbre playing method is not rich, and some timbres only have a few timbres such as legato and staccato. The latter can get some other timbres, but after all, it is not a real person’s performance, so their authenticity and humanization are greatly reduced. By
1458
R. Wang
presetting as many timbres as possible, it will bring abundant and real timbres for the instrumental performance, thus enhancing the authenticity of the timbre and directly promoting the humanization of the timbre performance. Of course, some of these timbres are the timbre of the same instrument and some are the timbre of the same kind of the instrument. They are used for the humanized production of the single and the multi-tone timbres respectively. True and diverse timbres of the playing methods can greatly enhance its humanized characteristics for the numerous and rich melodic timbres. Another technical means to enhance the personalized characteristics of the timbre performance is the random modulation of the timbre using the modulation module of the sound source. On the sound source or the sampler, most of them have the effect module of changing the timbre attribute. By adjusting, we can get more humanized timbre we need.
2 Application of the MIDI Controller 2.1 Software MIDI Controllers What I want to discuss here is the general data controller, excluding the MIDI instruments (i.e. the timbre playing tools, which will be discussed later). In the 1990s, with the widespread use of the software sequencers, this is really the era of the computer music that we are going to discuss. At that time, the more famous sequencer software was Cakewalk. At that time, there was no breakthrough in the hardware timbre and the software timbre, which could not enter the field of the professional music creation. However, the software sequencer greatly surpasses the hardware sequencer in the function of creation and production, and especially in the function of humanization. One of the most commendable is the emergence of 128 general MIDI controllers, which are the important means of making the computer music humanization technology until today.
2.2 Hardware MIDI Controllers Because the software controller is cumbersome in the operation and cannot be realtime input, the hardware MIDI controller came into being. It can operate the push, button and knob of the hardware controller to make the corresponding response inside the software. This can avoid the inconvenience of using the mouse to operate the software. More importantly, it can handle the real-time changes such as the volume and the expression. The music treated in this way is more humanized, and the operation itself makes people feel humanized. Today, MIDI is used more, such as the earlier Ezbus, and Uc-33 and Roland’s SI-24 commonly used nowadays.
Computer Simulation Generation of the Humanized Music Timbre
1459
2.3 Timbre Performance and Real-Time Control In a sense, the timbre playing tool belongs to a MIDI controller, but because it plays an important role in the computer music, it is specially discussed in this paper. In the traditional music, the live performance of music is the most humanized practice link of music. Later, with the invention of the tape and CD media, people can feel the atmosphere of the live performance from music even though they cannot see the live performances of the concert hall. There are also MIDI pipes, strings and percussions that can be played on the MIDI instruments. From the above development process, we can see that the MIDI instrument humanized performance technology has developed from the psychological feeling of simulating the timbre to the psychological and physiological feeling of performances. The combination of psychology and physiology is the performance characteristics of the traditional acoustic instruments. According to the author’s speculation, the MIDI keyboard may make breakthroughs in two aspects after experiencing the current MIDI controllability. First, the force perception of the keyboard is non-linear. For example, the starting, continuing and interpretation of the keyboard can be controlled in the real time by exerting different forces on the keyboard, and also can be said to be fully humanized after touching (of course, this requires the non-linear force of the timbre and the sound change of the timbre). The second is the mode control of the keyboard playing. For example, a MIDI keyboard also has the control functions of the MIDI stringed instruments, the MIDI wind instruments and the MIDI percussion instruments.
3 Virtual Playing Tool 3.1 Playing Detection Tools Another humanized technology of the timbre performance is the development of the timbre-specific virtual playing tools. Vienna Instruments is the latest product of the famous Vienna orchestral timbre material. Users of the Vienna Music Instrument Group can detect the corresponding playing methods in the real time and call the relevant timbre through the new playing detection tools. It automatically calls different timbres of the playing methods by detecting the information of the user’s playing speed, strength and connection status on the keyboard. Voice is considered to be the most expressive tone of the human emotions. Because of the factors of the writing, its performance (singing) is very complex. The humanization of the computer singing timbre is the biggest challenge to the humanization technology of the computer music timbre. But today’s computer music technology enables producers to have virtual singers who can be directed at their own discretion. Zero-g officially released Miriam, their female song synthesizer. This is a mature song synthesizer, using YAMAHA VOCALOID Singing Synthesis Technology. Miriam can synthesize women’s singing voice, with the standard English and professional quality. Miriam
1460
R. Wang
has a rich sound element, and you can make any song you need. Miriam also comes with the tremolo and breathing templates, so you can make a completely natural singing. Using Miriam to create the female songs is very easy and has a wealth of adjustable parameters, such as resonance, tremolo, and breathing sound and so on. A multi-dimensional vector synthesis technique called MVS is used to sample the timbre of the traditional Chinese national instruments. It supports the DEF dynamic expression and the PRF continuation mode and the multi-gravity layer, and can delicately express the human aspects of the musical instruments. With the development of the technology, more excellent human-based playing techniques and instruments will continue to emerge.
3.2 Application of the Humanized Effect Instrument The humanized effect instrument here refers not to the performance effect instrument of the single instrument mentioned above, but to the humanized effect instrument of the style of the whole computer music work (MIDI effect instrument), such as the early MIDI real-time effect plug-in Style enhancer micro 1.28 for cakewalk developed by Cakewalk, referred to as SEM11.28. From the previous comparison of the timbre of the computer music and the traditional music, we know that the development of the computer music makes the timbre more and more realistic and aesthetic, but the effect of playing is unsatisfactory, that is, not humanized as we once put it.
4 Conclusion The technological superiority of the computer music can also enable us to achieve a much humanized audio-visual effect which cannot be handled by the traditional methods (the audio-visual effect of the timbre is not based on the traditional auditory experience and habits, but on the subjective psychological feelings). In our real life, if we expect the appearance of a sound timbre and a sound to be very prominent, it will become our central sound audibly or we will turn to listen in the direction of the sound source. People’s auditory habit has become the basis for us to modulate the sound phase in the real time so that the sound has the characteristics of humanization in the sound phase. Acknowledgements Social Science Foundation Project of Jiangsu Province in 2017 (17YSC008).
Computer Simulation Generation of the Humanized Music Timbre
1461
References 1. Wen, Hailiang. 2009. New development of the computer music humanized production technology in the plug-in era. Beauty & Times (12): 20–25. 2. Yao, Qi. 2009. Generation and reasons of humanization of the computer music timbre. Art Education (7): 31–37. 3. Cheng, Ming. 2016. Research on the string source performance method conversion in the electronic music production. Music Communication (1): 24–30. 4. Zhang, Shiyang, and Jin Wang. 2014. Aesthetic trend of thoughts and dissemination of peking opera model opera. Journal of Shenyang Conservatory of Music (2): 15–19. 5. Jiang, Jinghong. 2012. Exploration of the new mode of opera music accompaniment—Application of the digital music technology in opera music. Journal of College Chinese Traditional Opera (2): 22–27.
Application of the Japanese Teaching Methods Based on the Network Multimedia Xia Wang
Abstract Based on the application of the network multimedia in the Japanese teaching method, under the guidance of the teachers, students can do their own work, search for the information, analyze and summarize, and draw conclusions, which is conducive to the realization of the individualized education in accordance with their aptitude. It can fully reflect the teacher-led and student-centered teaching idea, and promote the reform of the teaching methods and teaching modes. The multimedia teaching is conducive to the cultivation of the basic computer knowledge and the basic operating skills of teachers and students, to improve their qualities and abilities of educational technology, and to meet the requirements of the network information age. The implementation of the network multimedia teaching will also promote the construction of the teaching resources and teaching environment. The application of the multimedia network teaching will lead to the fundamental changes in the teaching process and profound changes in the educational and teaching ideas, concepts and theories. Keywords Network · Multimedia · Japanese teaching · Method application The multimedia teaching under the network environment is a new teaching mode that applies the multimedia and the network technology to achieve the educational and teaching objectives through the collection, transmission, processing and sharing of the multi-media teaching information [1]. The characteristics of the network multimedia teaching are: resource sharing, strong interaction and multi-task [2]. The advantages of the network multimedia teaching are: rich and vivid teaching resources, and friendly man-machine interface, which can fully mobilize students’ learning initiatives and enthusiasms, improve the students’ classroom learning efficiency, and improve the teaching quality and efficiency.
X. Wang (B) Mianyang Teachers’ College, Mianyang, Sichuan 621000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_173
1463
1464
X. Wang
1 The Application Background of the Japanese Teaching Method Based on the Network Multimedia The multimedia technology extends the information processed by computers from texts and data to graphics, images, animations, videos, languages, music and other forms. It is shown in vivid and dynamic forms, so that readers can enter into an information activity with the multiple levels of interaction, control and communication, which gives people a strong visual impact and leaves a deep impression [3]. Although the Internet provides us with a free, flexible, open, inexpensive and mutually reinforcing platform for the resource integration, the information on the Internet is vast and uneven, some good and some bad. The information used for our education is distributed among them, and it is difficult for schools to find the information they want. Combing the Internet information, coupled with their own professional development, it makes it easy for schools to obtain the teaching resources suitable for themselves [4]. Therefore, it is necessary to establish a relatively complete integration system of the educational resources. Whether it is the multimedia teaching or the network teaching, it is inseparable from a huge database of the information resources, so the resource design of the multimedia network teaching should mainly be the construction of the teaching resources, and the digital library of the school itself is a large database which integrates all kinds of resources [5]. With the application and development of the computer technology and the network technology, the library documents show a diversified trend on the storage carrier. With the development of the multimedia information technology, libraries have changed the traditional one-way information dissemination mode, realized the two-way information dissemination and the multi-way information dissemination, and provided a new direction for the development of libraries. How to fully develop and utilize these resources has become a problem that librarians pay close attention to. One of the important characteristics of our learning under the network environment is the autonomous learning of the learners. The main characteristics of the autonomous learning are that learners have independent subject consciousness, basic knowledge and access to help. In the autonomous learning, learners should start with the task analysis, then choose and use the media pertinently, and prepare for the autonomous learning. The evaluation of the autonomous learning aims at detecting leaks and filling gaps and strengthening certain exercises. The organizers and managers of the multimedia network education should strengthen the monitoring of the teaching process, strengthen the construction of the learning environment, and provide the perfect learning support services for learners. The biggest characteristic of the autonomous learning is the high degree of the autonomy of students. This kind of autonomy is manifested in the fact that students can choose their own learning contents and methods according to their own time arrangement and learning progress after setting their own goals. In such a learning process, besides acquiring knowledge itself, it can also cultivate the learning abilities.
Application of the Japanese Teaching Methods Based …
1465
By evaluating and comparing their learning process and learning effect, learners can find their own efficient learning methods. At present, most of the individual human-computer interaction courseware used in the multimedia teaching is based on the Windows platform, which requires students to be skilled in using Windows. Despite the basic knowledge of computers, if students fail to master it, there will inevitably be problems in the online classes, and once they always encounter these problems, students will lose interests in learning. If teachers are always going to help students solve these problems in online classes, how can teachers better solve students’ questions about the contents of this lesson? Therefore, the basic requirement of the network teaching for students is that they must be proficient in the basic operation of computers. In this way, students can concentrate on learning the contents of this lesson in class.
2 Advantages of the Network Multimedia in Japanese Teaching The multimedia can be widely used in various courses of the Japanese teaching. It will promote the qualitative change of the traditional teaching and make the Japanese teaching more colorful and attractive. In the Japanese intensive reading classes, teachers can make the slide courseware to assist the teaching. In the courseware, the key and difficult points of the teaching contents can be visually displayed, so as to facilitate students to understand knowledge, master concepts and help students consolidate their knowledge. In addition, teachers can display the relevant background knowledge and expand contents and so on to students more comprehensively and vividly, so as to stimulate students’ interests, broaden their horizons, deepen their understandings and improve students’ learning enthusiasms. For example, when explaining the Japanese traditional programs, teachers can insert the relevant photographs and the audio-visual materials into the courseware appropriately, showing the characteristics of the Japanese traditional programs vividly and comprehensively. In listening classes, teachers should change the traditional monotonous teaching mode of listening and recording so that students can answer questions. They can make full use of the multimedia classroom. Besides playing tapes, they can also let students record their own pronunciation, especially for lower-grade students. Students can practice while recording and then play out from their own listening, so as to implement the self-identification and self-feedback, find out the shortcomings, correct them in time, and improve the learning effect. At the same time, according to the actual level of the students in different grades, teachers can play some appropriate short films, animations and movies and so on, so that students can experience the use of the language in the actual scene, and change the boring situation of the listening classes with only tapes. In the conversation class, teachers should get rid of the current situation of the textbooks and adopt more flexible and vivid means to promote the daily teaching of
1466
X. Wang
conversation classes. On the one hand, we can use pictures to let students imagine the conversation exercises. On the other hand, we can play some short films to let students imitate the exercises. For language learners, imitation is very important. The multimedia devices can provide students with a realistic and vivid conversation scene, provide good imitation objects for students, and help to improve their conversational levels. Extensive reading is a course to improve students’ reading levels and broaden their horizons. It covers a wide range and is rich in contents. But if the classroom teaching is not handled properly, it will easily become a dull course. The advantage of using the multimedia is that it can avoid the monotonous and boring teaching mode of reading aloud and explaining. Teachers can insert the relevant pictures and the background materials in the courseware. Vivid and colorful pictures can stimulate students’ interests in learning, attract students’ attention, promote students’ initiatives in learning, and deepen students’ memory and understandings of the knowledge they have learned. The multimedia can also be used reasonably and appropriately in other courses. The multimedia equipment provides us with convenient teaching and learning tools, which enables students to learn in the interactive multimedia learning environment, to achieve the combination of pictures and texts, and sounds and emotions, and to use both visual and auditory. This kind of the information expression provides the vivid performance effect for our teaching, expands students’ perception depth and scopes of understanding, thus greatly improving the quality of the teaching. The teaching activities are more interesting. There are many factors in the multimedia materials that can arouse students’ interests and attention in learning, such as animations and sound effects and so on. They can stimulate students’ curiosity, stimulate students’ thinking and keep students active in the teaching activities. In short, the multimedia can play a great role in arousing students’ learning motivation and interests and promoting their active participation and creativity. Provide the perceptual materials to deepen the depth of perception. Many kinds of the multimedia can not only provide learners with various perceptual materials to present the shape, movement or process of things, but also provide the realistic scenes, which can make learners fully perceive and deepen their impressions. For example, it is impossible for students to perceive all situations in the Japanese society, but photographs, films and videos can help them learn. Promote the role of teachers to change. When students learn effectively through the multimedia, the role of the teachers in the teaching has also changed. Teachers have changed from the pure knowledge imparters to designers of the teaching process and instructors of students’ learning. It helps to improve students’ autonomy in learning. The multimedia application in teaching can not only improve students’ interests in learning, but also help to improve students’ autonomy in learning. The multimedia provides an interactive way of learning to support more effective teaching and learning. Students can effectively control their own learning, very flexible and convenient. This not only helps to teach students in accordance with their aptitude, but also provides each student with a suitable learning style and learning space.
Application of the Japanese Teaching Methods Based …
1467
3 Application Mechanism of the Japanese Teaching Method Based on the Network Multimedia The teaching activities are organized more rationally and scientifically. Welldesigned multimedia materials are the combination of teachers’ teaching experience and rich resources. Its design and organization will be richer and more reasonable, scientific and colorful. It will not only help teachers to teach the teaching contents in class, but also help students to understand and absorb the learning contents. At the same time, it has changed the monotonous and boring teaching mode in the past, making the teaching activities carried out orderly and scientifically in a new mode, which is conducive to improving the quality of teaching and learning.
3.1 Using the Multimedia to Innovate the Teaching System The multimedia is used in the Japanese teaching for Japanese majors and universities. The main teaching methods are the demonstration teaching, the simulation teaching and the individualized teaching. In the specialized comprehensive Japanese classes, the teacher changes the traditional teaching method from words to sentences to chapters, uses the multimedia means through the audio and video system of the language laboratory, and presents the teaching information to students in an all-round and three-dimensional way. Teachers display the course contents with the three-dimensional animations and output it on the screen by computers. Teachers are explaining and prompting. Because words, sounds and images act on students’ multiple senses at the same time and trigger their positive reactions to the cognitive structures, students quickly understand the contents of the articles, the logical connection, the meanings and the use of the key words, which speeds up the process of the internalization of the language information and improves the learning effect.
3.2 Make Full Use of the Multimedia Technology to Open up the Second Classroom The Japanese corner lecture specializes in the professional Japanese, the university Japanese, the Japanese exam-passing guidance, foreign teachers’ hotline questions and answers, Japanese song appreciation, poetry recitation, masterpiece reading, business card dialogue, entertainment and other programs, rich and colorful, to meet the needs of the Japanese learners of different majors and levels. The live broadcasting system of the Language Experiment Center can be used to broadcast the academic lectures, demonstrate the high-quality courses and organize the vocational skill training by using the live broadcasting system. Practice Japanese learning programs and Japanese business card appreciation and so on in a fixed period of time
1468
X. Wang
every day. Cooperate with the central work of the school, and broadcast the related programs such as the ideological and moral education, the humanistic education and the natural science education. At the same time, the system is used to test and play Japanese levels, and the sound is clear, and the effect is very good.
3.3 Using the Modern Information Technology to Develop the Networked Japanese Teaching At present, our school has tried to carry out the network Japanese teaching. Through the network, provide the learners with the rich multimedia information in the realtime and cross-regional manner, as well as the rich and colorful human-computer interaction interface, to provide a large-scale knowledge base and information base. Teachers will teach requirements, teaching contents and teaching evaluation materials into the web pages or other forms of the documents stored on the server, and students can achieve the learning purposes through browsing these pages. When students encounter difficult problems, they ask teachers by email and BBS and so on. Teachers then answer students’ difficult questions by email or BBS. Students and teachers can also communicate in the real time through the online conversation. In the process of our teaching, students can also read some reference materials provided by the teachers on the Internet, just as readers look for information in the school library. In addition, students can also carry out the research-based learning through the network, and express their views and research results.
4 Conclusion In order to build a multi-media teaching platform, we must take the contemporary educational thought and teaching theories as the guiding principle and take into account the subjective and objective conditions for the establishment of the platform. The system environment can provide the multi-functional and the omni-directional services, and provide a technical support platform for the modernization of the foreign language education and the realization of the educational purposes. The qualified Japanese talents should possess the strong Japanese language competence and certain communicative competence, which is the basic requirement of the foreign language professionals’ quality. The language competence refers to learners’ mastery of the rules of the language system, such as pronunciation, lexicon, syntax, semantics and rhetoric. The foreign language communicative competence is the communicative competence of using the language tools in our daily work and life.
Application of the Japanese Teaching Methods Based …
1469
References 1. Wang, Hui. 2015. The application of the corpus in the Japanese translation teaching. Time Education (13): 52–59. 2. Yan, Ping. 2016. Exploration of the application of the corpus in the Japanese audiovisual course. Journal of Jiamusi Education Institute (4): 356–357. 3. Ma, Yuanyuan. 2016. Inquiry into the teaching method of the performance and honorific words in the primary stage of Japanese teaching. Future Talent (8): 63–67. 4. Bai, Yu. 2014. Exploration on the teaching method of the acceptance performance and honorific words in the primary stage of Japanese teaching. Times Literature: Second Half of the Month (12): 88–91. 5. Piao, Nanying. 2015. A brief talk on the respect language teaching in basic Japanese teaching. Scientific Research (28): 164–169.
On the Network Security Prevention Under the Development of the Information Technology Heping Xi
Abstract With the development of the computer technology and the popularization of the network, computer has become an important product in people’s work and life. While the computer brings convenience to people, the problem of the network security has attracted more and more attention. The problem of the network security is becoming more and more serious, such as the network data stealing, the virus attack, the hacker attack and other hidden dangers of the network security affect people using computers safely. Therefore, strengthening the network security precautions and improving the security protection strategies have become a problem that the computer network information managers and users must pay attention to. The network security and prevention is a systematic project. We should formulate effective security precautions according to the security requirements of the system, solve these security problems regularly with various security technologies, maintain the network system, check and kill the virus frequently, and guard against hackers intruding into the computer network, so as to ensure the safe and effective operation of the network. Keywords Information technology · Development and application · Network security · Prevention mechanism The wide application of computers makes people’s life more convenient, and also challenged. Today, the network technology has been integrated into our work and study, and has become an irreplaceable existence in our life [1]. Nowadays, people depend more and more on the network, but the problem of the computer network security is gradually highlighted in daily life, which seriously affects people’s lives, so it is urgent to solve the problem of the network security.
H. Xi (B) Procuratorial Information Technology Department of Nanjing People’s Procuratorate, Nanjing, Jiangsu 210004, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_174
1471
1472
H. Xi
1 The Background of the Network Security Prevention Under the Development of the Information Technology With the rapid development of the computers and the information network technologies, the computer has been widely used in every field of our daily work and life, but with it, the computer network security is also under unprecedented threat [2]. Computer viruses are everywhere and hackers are rampant. The computer network not only facilitates people’s work and study, but also enriches people’s spare time. With the development of the computer network and the growing strength of the network system, the computer has affected all aspects of people’s work and life [3]. Therefore, the threat of the network security from the Internet also brings many unsafe factors to people’s work and life. Whether in WAN or LAN, the security of the network must be paid great attention to. Many security factors threaten people’s network. The natural and the artificial factors such as the cyber crime, the hacker attack and the virus attack have increased rapidly in recent years. The problem of the network security is becoming more and more serious [4]. Therefore, to strengthen the security precautions and ensure the network security is a problem that must be paid attention to and solved. The International Organization for Standardization defines the “computer information security” as the “security protection of the technology and management established and adopted for the data processing systems to protect the computer hardware and software data from being destroyed, altered and leaked for the accidental and malicious reasons” [5]. The above definition of the computer security includes two aspects: the physical security and the logical security. The contents of the logical security can be understood as the information security, which refers to the protection of the confidentiality, integrity and availability of the information. The meaning of the network security is the extension of the information security. That is, the network security is the protection of the confidentiality, integrity and availability of the network information. The specific meanings of the computer network security will change with the change of the users. Different users will have different understandings and requirements for the network security. From the point of view of the ordinary users, it may only be hoped that their personal privacy or confidential information will be protected when transmitted on the network, so as to avoid being eavesdropped, tampered with and forged. And the network providers should consider how to deal with the destruction of the network hardware caused by the sudden natural disasters, and the military strikes, and so on, in addition to caring about the security of these kinds of the network information, and how to restore the network communication and maintain the continuity of the network communication when the network abnormalities occur. Essentially, the network security includes the hardware, the software of the network system and the security of transmitting the information on the network, so that it cannot be destroyed by accidental or malicious attacks. The network security has both technical and management problems. Both of them complement each other and are
On the Network Security Prevention Under the Development …
1473
indispensable. The artificial network intrusion and attack make the network security face new challenges.
2 Current Situation of the Network Security Under the Development of the Information Technology Hackers and viruses are constantly changing their means of intrusion. The main security problem of the computer network is the virus intrusion, and with the development of the times, the means of the virus intrusion are constantly updated. In the use of computers, we can also find that those anti-virus software updates are much slower than the virus intrusion. Although the anti-virus software has its own large database of the virus samples, it can detect and solve the existing viruses, but hackers generally use those security tools that cannot detect the new means of intrusion. There are some security vulnerabilities in the security tools themselves. When our computer is used in the network, we often find some security tools to self-repair, which is to repair some security vulnerabilities. For the security tools, the existence of the vulnerabilities is unavoidable. Only in the process of use can we constantly find problems from them and solve them. There are various security vulnerabilities in the computer software itself. In our installed computer system, there are not only system vulnerabilities, but also various application software vulnerabilities, which we must install. These software vulnerabilities often occur more frequently than the system vulnerabilities. Using these vulnerabilities, malicious programs or viruses can be attached to their installation programs. Software vulnerabilities can be continuously remedied in the later maintenance, but this process still needs better security precautions. There are security problems in the external environment of the computer network. With the progress of the science and technology, there are many hidden dangers of the information leakage in our daily use of computers. What we see on the computer screen can be transmitted through the mode of the electromagnetic wave and so on. In our seemingly simple network, the information in the computer network can be leaked through the way of the electromagnetic signal. Even a power socket may have security risks. Today, with the rapid development of the science and technology, there will continue to be unheard of technologies that can easily leak our computer information network at any time. Many security mechanisms have some limitations. Although the existence of the security tools can avoid the security problems to a certain extent, these security tools themselves have certain limitations. Although the firewalls we often use, to a certain extent, can avoid the outside network intrusion into the Intranet, if there is the Intranet intrusion into the Intranet, the firewall often has no effect. And the security tools rarely detect the system backdoor intrusion. There are the security risks in the user unconscious information leakage. In our lives, there are many kinds of the information about our vital interests circulating in
1474
H. Xi
the network, and the subjective awareness of the personal information confidentiality is not strong. The information leakage is very common in the network. We generally believe that the network is a popular platform for our work, life and learning. While we are enjoying this platform, there may be unconscious leakage of our own information.
3 Common Network Security Strategies Under the Development of the Information Technologies At present, the widely used and mature network security prevention strategies mainly include the physical security, the access control, the information encryption, and the network security management and so on. The following four preventive strategies are analyzed.
3.1 Physical Security Policy The purpose of the physical security strategy is to protect the hardware entities and the communication links such as the computer systems, the network servers, the printers from the natural disasters, the man-made destruction and the wiretapping attacks, to verify the identity and the use rights of the users and prevent the users from operating beyond their authority, to ensure that the computer systems have a good working environment of the electromagnetic compatibility, and to establish a complete security management system to prevent the illegal entry into the computer control room and all kinds of the theft and sabotage.
3.2 Access Control Strategy The access control is the main strategy of the network security prevention and protection, and its main task is to ensure that the network resources are not illegally used and very accessible. It is also an important means to maintain the network system security and protect the network resources. It can be said to be one of the most important core strategies to ensure the network security. Next, we describe various access control strategies. Internet access control: The Internet access control provides the first layer of the access control for the network access. It controls which users can log on to the server and access the network resources, and controls the time allowed users to log on to the network and which workstation they are allowed to log on to. Network privilege control: The network privilege control is a security protection measure against the illegal operations of the network. Users and user groups are given certain privileges.
On the Network Security Prevention Under the Development …
1475
The network controls the directories, subdirectories, files and other resources users and user groups can access. You can specify what actions users can perform on these files, directories, and devices. The trustee assignment and the inheritance permission masking (IRM) can be used as two implementations. Directory level security control: The network should allow users to access directories, files and devices. The permissions specified by the users at the directory level are valid for all files and subdirectories, and the users can further specify the permissions for the subdirectories and files under the directory. The attribute security control: When using the files, the directories and the network devices, the network system administrators should specify the access attributes for files and directories and so on. The property security control can associate a given property with a network server’s files, directories, and network devices. The property security provides the further security on the basis of the privilege security. The network server security control: The network allows a series of operations to be performed on the server console. The network monitoring and locking control: Network administrators should monitor the network. Servers should record users’ access to the network resources and illegal network access. Servers should alarm in the form of graphics or texts or voices to attract the attention of the network administrators. Security control of the network ports and nodes: The ports of the servers in the network are often protected by the automatic callback devices and the silent modems, and the identity of nodes is identified in the form of the encryption. The automatic callback devices are used to prevent the counterfeiting legitimate users, and the silent modems are used to prevent hackers from attacking computers by the automatic dialing programs. Firewall control: Firewall refers to a combination of the software and the hardware devices, located between the enterprise or the network group computers and the external channels, restricting the external users’ access to the internal networks and managing the internal users’ access to the external networks.
3.3 Information Encryption Strategy The purpose of the information encryption is to protect the data, files, passwords and control information in the network, and to protect the data transmitted on the network. The commonly used methods of the network encryption are the link encryption, the endpoint encryption and the node encryption. The purpose of the link encryption is to protect the link information security between the network nodes, and the purpose of the endpoint encryption is to protect the data from the source to the destination users, while the purpose of the node encryption is to protect the transmission link between the source and the destination nodes. Users can choose the above encryption mode according to the network situation. According to the incomplete statistics, up to now, hundreds of encryption algorithms have been published publicly. These encryption algorithms can be classified into the conventional cryptographic algorithms and the public key cryptographic algorithms if they are classified according to the same key between the sender and the receiver. Conventional password: The recipient and the
1476
H. Xi
sender use the same key. That is, the encryption key and the decryption key are the same or equivalent. Its advantage is that it has the strong security strength and can withstand the test and attack of the time, but its key must be transmitted through a secure way. Public key cryptography: The key used by the recipient and the sender are different from each other, and it is almost impossible to deduce the decryption key from the encryption key. Its advantage is that it can adapt to the open requirements of the network, and the key management problem is relatively simple, and especially it can easily realize the digital signature and verification. Of course, in the practical applications, people usually use the conventional cryptography and the public key cryptography together.
3.4 Network Security Management Strategy The network security management strategy refers to the rules that must be followed to ensure a certain level of the security protection in a specific environment. The realization of the network security depends not only on the advanced technology, but also on the strict management and the authoritative law. The relationship between the three is like the three pillars of the platform, which are indispensable. The strategies of the network security management include: determining the level and scope of the security management, formulating the relevant rules of the network operation and management system of the personnel entering and leaving the computer room, and formulating the maintenance system and the emergency measures of the network system, and implementing the security management is the key to realize the network security.
4 Conclusion The network security is not only a technical problem, but also a security management problem. We must comprehensively consider the security factors, and formulate the reasonable objectives, technical programs and related supporting laws and regulations. We must attach equal importance to both the management and the technology. The security technology must be combined with the security measures, strengthen the computer legislation and the law enforcement, and formulate the corresponding safety standards. Of course, there is no absolutely safe network system in the world. With the further development of the computer network technology, the network security protection technology will inevitably develop with the development of the network applications.
On the Network Security Prevention Under the Development …
1477
References 1. Zhu, Jun. 2013. Wireless network security problems and preventive measures. Computer & Network (21): 71–73. 2. Zhang, Jie. 2015. Analysis of the computer network security problems and preventive strategies. Computer CD Software and Applications (1): 171–173. 3. Jin, Hai. 2014. Computer network security problems and preventive measures. Computer CD Software and Applications (8): 159–160. 4. Long, Cang. 2016. Brief analysis of the computer network security problems and preventive measures. Practical Network Security Technology (10): 12–13. 5. Wu, Wei. 2015. Research on the computer network security problems and effective preventive measures. Computer CD Software and Applications (2): 164–165.
Molecular Action Mechanisms of the Traditional Chinese Medicine in the Treatment of Rheumatoid Arthritis Based on the Computer Simulation Liang Yan and Wuyin Li
Abstract The rheumatoid arthritis (RA), also known as rheumatoid, is a chronic systemic inflammatory disease with unknown etiology. At present, it is recognized that the rheumatoid arthritis is an autoimmune disease. It may be related to endocrine, metabolic, nutritional, geographical, occupational, psychological and social environment differences, the bacterial and viral infections and the genetic causes. Chronic, symmetrical, polysynovial arthritis and extraarticular lesions are the main clinical manifestations and belong to the autoimmune inflammatory diseases. Based on the computer simulation, the molecular mechanism of the traditional Chinese medicine in the treatment of the rheumatoid arthritis is studied, which provides an important platform for extending the value of the computer simulation technology. Keywords Computer simulation research · Traditional Chinese medicine treatment · Rheumatoid · Arthritis The etiology and the pathogenesis of RA have not been fully clarified. The basic pathological features of RA are the synovitis and the vasculitis. The synovial vascularization and the pannus formation in joints lead to the synovial thickening and exudation, the secretion of various cytokines, the invasion of cartilage, and the bone damage [1]. The tendons, ligaments, tendon sheaths and muscles around the joints can also be invaded, thus affecting the stability of the joints, prone to the joint deformities and dysfunction, and the vasculitis can also invade the surrounding organs and tissues, forming a system disease.
L. Yan (B) Henan Province Hospital of TCM, Zhengzhou, Henan 450002, China e-mail: [email protected] W. Li Luoyang Orthopedic-Traumatological Hospital of Henan Province, Luoyang, Henan 471000, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_175
1479
1480
L. Yan and W. Li
1 Introduction The computer simulation usually takes many steps from the problem formation to the final model validation. Form problems and clarify the purpose and requirements of the simulation. Collect and process the data as much as possible [2]. Form a mathematical model and find out the components of the system, and describe the relevant variables (generally including the input variables, the state variables and the output variables) or the parameters of their states at all times. Determine the rules of the interaction and the influence among components, that is, the functional relationship between these descriptive variables [3]. When choosing the parameters and variables, it is also necessary to consider whether they can be identified or solved, and whether the model is finally suitable for the verification based on the real system data [4]. According to the collected data, the parameters of the model are determined or estimated, and the initial state of the model is selected. Design the flow charts of the logic or the information until a computer program is developed. The program validation checks the consistency between the programs and the mathematical model, and the rationality of the input. The simulation test is carried out and the program is executed on the computer for the given input [5]. The result data analysis collects and collates the test results and carries out the explanation. If necessary, the input quantity or part of the model structure can be changed and the experiment can be carried out again. The model validation verifies the consistency between the results obtained from the model and the performance data of the real system. This is a key issue related to the validity of the computer simulation. It depends on the level of testing the real system itself, whether enough observation data can be obtained and the criteria for identifying the consistency. The level of the model validity can be divided into: the re-existing validity, that is, the model can reproduce the performance of the real system; the prediction validity, that is, the model can effectively predict the future performances of the real system; and the formation validity, that is, the model can reflect the internal structure of the real system. Because the system itself varies with the time or has randomness, the comparison between the real system data and the model test results often requires the time series analysis or the statistical analysis. The rheumatoid arthritis (RA) is a chronic systemic autoimmune disease with the articular synovium as the main target tissue. The initial manifestation of RA is synovitis, which affects the articular cartilage and the subchondral bone, followed by the extensive inflammation of the connective tissues such as serosa, heart and lung, seriously affecting the quality of life and the life of patients. Because its pathogenesis is not fully clear, at present the western medicine mainly focuses on the non-steroidal anti-inflammatory drugs and the anti-rheumatic drugs to improve the condition, the glucocorticoids and the biological agents. However, due to the long course of the rheumatoid arthritis, the long-term use of the non-steroidal antiinflammatory drugs will lead to the gastrointestinal adverse reactions, and the antirheumatic drugs improving the conditions will lead to the liver and kidney function damage, and leucopenia and so on. Corticosteroids can cause the metabolic disorders
Molecular Action Mechanisms of the Traditional Chinese Medicine …
1481
of the substances and the water and salt, and the biological agents can cause infections and are expensive. Therefore, searching for the effective and safe new therapies and drugs for rheumatoid arthritis has become a research hotspot in the orthopaedics and traumatology. Previous studies have shown that the single-target drug therapy has limited effect on the complex diseases, so the mode of the drug development has shifted from the single-target to the multi-target. The mode of the combination therapy has been paid more attention to in the west, and people are trying to use the compound drugs to treat the complex diseases. The traditional Chinese medicine has the characteristics of the multi-component and the multi-target, relatively small adverse reactions, relatively low prices, suitable for the long-term use, rich resources, also shows good results in the treatment of the rheumatoid arthritis, and has attracted the attention of the foreign medical circles.
2 Study on the Molecular Action Mechanisms of the Traditional Chinese Medicine in the Treatment of the Rheumatoid Arthritis Based on the Computer Simulation Using the computer simulation method to study the multi-target effect of the traditional Chinese medicine for the rheumatoid arthritis, revealing its pharmacodynamic material basis and molecular mechanisms, is conducive to the discovery of the new drugs for the rheumatoid arthritis.
2.1 Material Science Tripterygium wilfordii, a traditional Chinese medicine for the rheumatoid arthritis, and Discovery Studio 4.0 simulation software developed by Accelrys Company, USA.
2.2 Experimental Method Molecular data setting: Download the chemical composition 3D structure of Tripterygium wilfordii from the PubChem database established by the National Institutes of Health of America. The chemical constituents of Tripterygium wilfordii were supplemented by literature, and the molecular model was built on Discovery Studio Standalone interface of Discovery Studio 4.0 (DS4.0) simulation software. Combining the above structures, a total of 90 compounds were synthesized, and a SD file
1482
L. Yan and W. Li
of the chemical constituents of Tripterygium wilfordii was established. MMFF force field was selected to optimize the interface of Ligand Minimization, and the molecular data set of Tripterygium wilfordii was obtained. Twenty-six drugs approved for the treatment of the rheumatoid arthritis were retrieved from Therapeutic Target Database (TTD). The 3D structure was downloaded from PubChem database and imported into DS4.0 software. The drug molecular data set was optimized according to the above methods. Chemical space comparison: Under the module of the quantitative structureactivity relationship of DS4.0 simulation software, in the Input Ligands column, input the SD files mentioned above, and select 40 descriptors of 1D, 2D and 3D, which are the carbon atom number, the oxygen atom number, the nitrogen atom number, the total heavy atom number, the molecular weight, the number of rings, the number of rotatable bonds, the number of hydrogen bond acceptors, the number of hydrogen bond donors, the molecular contact volume, and the molecular surface area. The total polar surface area, the total hydrophobic surface area and the lipid-water partition coefficient were used to calculate the multidimensional descriptor values of the Tripterygium wilfordii and the drug molecular datasets. The space formed by these descriptors is defined as the chemical space. The principal component analysis (PCA) was used to map the descriptor’s multidimensional data into the two-dimensional space, and the chemical space of the two molecular datasets was compared. The molecular docking and the network construction: According to the pathogenesis of the rheumatoid arthritis and TTD, 15 therapeutic targets of the inflammation and the blood stasis syndrome in the rheumatoid arthritis were identified. Except thromboxane A2 receptors related to the blood stasis syndrome that was obtained from the University of Houston, the rest were downloaded from the protein 3D structure database. The LigandFit module of the DS4.0 software is used to dock the molecular data set of Tripterygium wilfordii with the above targets. In the docking process, the active sites were determined by the original ligands contained in the protein after the solvent removal, the ligand removal and the hydrogenation treatment. The conformation of the molecular data set of the Tripterygium wilfordii was sampled by the Monte Carlo method, and the Dreiding force field was scored, while only the conformation with the highest score was retained. The docking between the ligand and the target is divided into the threshold, and the compounds larger than the threshold are regarded as the active compounds of the Tripterygium wilfordii. By introducing these compounds into the Cytoscape software, a compound-target interaction network model of the Tripterygium wilfordii was constructed, and the interaction between the compounds and the targets in the Tripterygium wilfordii was analyzed.
Molecular Action Mechanisms of the Traditional Chinese Medicine …
1483
2.3 Curative Effect Evaluation The standard is formulated according to the National Administration of Traditional Chinese Medicine Standards for Diagnostic and Therapeutic Effects of Traditional Chinese Medicine Diseases. Cure: Symptoms and signs disappeared, and the joint function activities were normal, and the laboratory tests were normal. Marked effect: Most of the symptoms and signs disappeared or alleviated, and the joint function activities were basically normal, and the laboratory tests were normal or basically restored to normal. Effective: Symptoms and signs were alleviated, and the joint function activities were improved, while the experimental indicators were improved. Ineffective: Symptoms, signs, and the joint function activities were not significantly improved, and there is no change in the test. Symptom and efficacy indicators: The number of the joint swelling and tenderness; the laboratory indicators: ESR, CRP, PLT, IL-18, TNF-α; The disease evaluation after treatment (4 weeks) and 3 months; and the quality of life observation: using VAS pain score.
2.4 Treatment Method The control group was given the routine treatment, leflunomide (Suzhou Changzheng-Xinkai Pharmaceutical Co., Ltd., national medicine standard word H20060034) 20mg each time, once a day, the total glycosides of the paeony capsules (Ningbo Lihua Pharmaceutical Co., Ltd., national medicine standard word H20055058) 0.6g each time, twice a day, the acetochlorfenac sustained-release tablets (Zhejiang Jianfeng Pharmaceutical Co., Ltd., national medicine standard word H20090011) 0.2g each time, once a day. The treatment group was fumigated on the basis of the control group, using the RA fumigation prescription [1]: notopterygium root 20g, Angelica 20g, radix sileris 15g, Cinnamon Twig 15g, Asarum 10g, Ligusticum wallichii 20g, futokadsura stem 30g, Cynanchum paniculate 30g, Curcuma 20g, Sapphire 20g, and Borneol 1g. Put the traditional Chinese medicine package of the fumigation prescription into the fumigation machine (Hangzhou Lixin), adjust the temperature setting (about 48 °C), middle strength, 20 min each time, once a day, 5 days for a course of treatment, interval of 2 days, continuous treatment of 4 courses for a total course of treatment.
2.5 Observation Index 2.5.1 The number of the tenderness and swelling were recorded before and after the treatment. 2.5.2 Laboratory indicators: ➀ The platelet count (PLT), the erythrocyte sedimentation rate (ESR), the C-reactive protein (CRP) were detected in the laboratory of our
1484
L. Yan and W. Li
hospital. ➁ The interleukin-18 (IL-18) and the tumor necrosis factor-alpha (TNF-α) were detected by ELISA in the laboratory of our hospital.
3 Discussion Rheumatoid arthritis (RA) is a systemic disease characterized by the inflammatory periostitis. It is symmetrical, invasive and multi-articular. In severe cases, it can be disabled by the joint deformity, which has a great impact on the quality of the life of patients. The immunosuppressive agents and the non-steroidal anti-inflammatory drugs are widely used in the clinical treatment of the rheumatoid arthritis, but they do great damage to the immune system of patients, and some side effects are obvious, which is not conducive to the improvement of the clinical therapeutic effect of the elderly or the less tolerant RA patients. The DS used in this experiment is an industry-recognized platform for the drug discovery and the calculation of the biological macromolecules. The MMFF module comes from the second force field of the initio calculation and the experimental data, and has been used to simulate the molecular set of the ligands such as THSWD. The QSAR module is a quantitative structure-activity relationship research tool and has been used to analyze the active properties of the compounds in the Chinese herbal medicines. The LigandFit module is based on the shape matching molecular docking software, and uses the simulated Monte Carlo method to sample the flexibility of the small molecules. It has been used to study the interaction of the molecular sets such as Duhuo Jisheng Decoction and Taohong Siwu Decoction with the osteoarthritis targets, and has also become a traditional Chinese medicine. The efficient and rapid virtual screening of the pharmacodynamic substances is one of the most common technologies. Because the traditional Chinese medicine is a complex molecular system, its mechanism of action is also very complex. The traditional research on the substance basis of the TCM efficacy is based on the close cooperation of chemistry to trace, separate and enrich the active ingredients, and then carry out the pharmacological research on them. Or, with the help of the body’s “extraction” function of drugs, the substance basis of TCM can be explored from the body fluid, blood and other samples. The separation and purification is a very arduous task. It is even more difficult to study the pharmacodynamics of the separated components from the animal experiments in the vivo and cell experiments in vitro. In this experiment, starting from the reverse approach of the “active ingredients to the traditional Chinese medicine”, the molecular data set and the chemical space of the Tripterygium wilfordii were established. A virtual pharmacological model was established based on the therapeutic target of the rheumatoid arthritis. With the help of the computer simulation platform, the pharmacodynamic basis of the Tripterygium wilfordii was studied, and the possible molecular mechanism of action was discussed, which could provide directions for its later experimental researches.
Molecular Action Mechanisms of the Traditional Chinese Medicine …
1485
4 Conclusion The computer simulation method visually shows that the drug substance base of the Tripterygium wilfordii is mainly composed of the alkaloids, epoxy diterpenoids and flavonoids. It can act on the target groups related to the inflammation, the immune response, and the cartilage and bone destruction, the blood stasis syndrome in the pathogenesis of the rheumatoid arthritis. It also reveals the multi-target-directed action of the drug substance base of the Tripterygium wilfordii in the treatment of the rheumatoid arthritis at the molecular use. In the future, the target of the rheumatoid arthritis will be further increased, and the virtual pharmacological model will be improved, and the key compounds screened will be verified by in vivo and in vitro experiments, which will provide the basis for the secondary development of the Tripterygium wilfordii. Acknowledgements Henan Province Chinese Medicine Science Research Special Project (Office Level), “Evaluation of Clinical Study of ‘Bone-Supplementing and Pulp-Filling’ Therapy for the Early Femoral Head Necrosis Based on the Image Fusion System”, No. 2018ZY2051.
References 1. Xin, Shandong, and Xiaobo Liu. 2013. Characteristics of the traditional Chinese medicine for the rheumatoid arthritis in Qingdao. Guangming Traditional Chinese Medicine (12): 2665–2666. 2. Ou, Xiaobo, Ganbo Huang, and Changsong Lin. 2016. Exploration of the arthralgia thought in “The Wings of the Golden Coffer”. Rheumatism and Arthritis (1): 47–50 3. Wang, Xiaocan, Rong Wang, and Yongxiang Gao. 2015. Discussion on the etiology and treatment of arthralgia. Guangming Traditional Chinese Medicine (12): 2544–2545. 4. Xie, Yan, and Yunpeng Guo. 2013. Tripterygium wilfordii in the treatment of the rheumatoid arthritis. Rheumatism and Arthritis 2(4): 72–75. 5. Tong, Ping, and Dongyi He. 2016. Research progress of the immune regulation mechanism of the Tripterygium wilfordii and its extracts on the rheumatoid arthritis. Modern Immunology (3): 250–252.
Design and Teaching Reform of Interactive Multimedia Courseware for Mechanical Drawing Lirong Yang
Abstract The multimedia courseware is helpful to reflect the spatial relationship, the projection relationship, and the cutting and intersection of mechanical manufacturing. At the same time, its good interaction can make good interaction between the teaching contents and the teaching strategy. The use of the multimedia courseware in our teaching improves the expression and interaction of the teaching media, promotes the overall optimization of the classroom teaching contents, teaching methods and teaching process, and improves the quality of our teaching. Keywords Mechanical drawing · Interactive · Multimedia courseware design · Teaching reform The development of the multimedia courseware is the basis and core of the multimedia assisted instruction. In order to improve the interestingness and interaction of the multimedia courseware, the author uses the control of the PPT courseware control and the corresponding VBA code to realize the design of the interactive mechanical drawing exercise courseware [1]. The courseware can automatically score students according to their operation, give out the comment and record the results in Excel students’ transcripts automatically. It has the good interactive and feedback functions.
1 Basic Preparation of the Interactive Multimedia Courseware for Mechanical Drawing 1.1 Applicable Tool Software There are many kinds of the software suitable for making the multimedia courseware. We choose PowerPoint as the production software to use, mainly because the PPT courseware has good adaptability, easy operation, and wide support of the audio and L. Yang (B) Mianyang Teachers’ College, Mianyang, Sichuan 621000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_176
1487
1488
L. Yang
video formats, which is suitable for the increasingly fast pace of our work and life [2]. We usually use Director and LASH to make the animation materials used in our teaching courseware.
1.2 Material Acquisition for the Courseware Use In today’s network era, making full use of the network resources and acquiring the teaching materials from the network can improve the speed of our courseware making [3]. In practice, we use the methods of self-production, network download and extraction of SWF, GIF and AVI animation to obtain the required materials. According to the requirements of the teaching contents and links, the PPT electronic teaching plan with distinct contents and levels is made, and the space and location of the animation and video playback are planned, so as to prepare for the insertion of the follow-up animation and video. Save to a specified folder [4]. The projection part of the point is suitable for use in the FLASH production. It can better control the flicker of the points, the extension of the projection lines, the generation of the intersections and other fine links [5]. The effect is real, clear and accurate. The contents of the cutting and intersecting parts are suitable for the use of the threedimensional animation production software. It can better reflect the change of the space structure and position of the body. It can intuitively carry out the cutting of the body, the real change of the intersection and the obtained structure, which is true and intuitive.
1.3 Necessary Ancillary Tools When hunting for the resources from the network, we need to use auxiliary tools to carry out the downloading, modification and format conversion and other work: the web SWF download tools. Using Flash Capture, Suoshi Flash Wizard and other software, the web SWF animation is downloaded. Sothink SWF Quicker is used to modify and edit the swf files to improve the production speed of the SWF animation. The swf is extracted from the PPT courseware. For the SWF animation embedded in the existing courseware, Flash Vampire and other software can extract all the swf format animation resources in PPT with the animation format conversion tool.
Design and Teaching Reform of Interactive Multimedia Courseware …
1489
2 Design Principles and Requirements of the Interactive Multimedia Courseware for Mechanical Drawing 2.1 Design Principles The interactive multimedia courseware is designed based on the principles of teaching, interaction, simplicity, scientificity, artistry and openness. The interactive teaching contents should present more important and difficult points which are difficult to demonstrate under the normal conditions. The interactive interface is friendly enough for learners to view and control. There are enough information feedback nodes in the courseware process to facilitate teachers to control the teaching rhythm and adjust the teaching contents.
2.2 Courseware Interactive Design
Interactive Mode The interactive multimedia courseware can be divided into the human-computer interaction and the human-human interaction according to the reference objects and ways. The human-computer interaction refers to the use of the courseware by people (teachers and learners) through the media of computers. The teachers’ teaching preparation and implementation and the learners’ knowledge acquisition are all realized through the courseware. The teaching resources are stored in the computer or the network server through the interactive design. Learners dynamically acquire the teaching resources through computers, learn the knowledge and skills through the interactive practice, and conduct the asynchronous self-inquiry learning. The human interaction refers to the direct or indirect communication between people, which exists between teachers, between teachers and learners, and between learners. Interaction Strategy The human-computer interaction in the interactive courseware can be realized through the design of the interface and the web page elements, such as the navigation menu, the site search, the interactive buttons and the texts, which belong to the technical level and is relatively easy to implement. The human-computer interaction design based on the human-computer interaction strategy is a research difficulty. (1) Everyone interacts in the classroom. The interaction between teachers and learners in the classroom teaching can be directly constructed by teaching, asking questions, answering questions, guiding, assignments, and project evaluation forms and so on, and learners can realize it by constructing the discussion groups. (2) Interaction strategy based on the network: Courseware internal integration. According to the needs of the courseware construction and the network situation, the system of the interactive multimedia courseware based on the network can integrate the short message,
1490
L. Yang
forum, real-time online communication and other functions to realize the human interaction. The short message in the station realizes the data exchange at the end of the station, which is simple to implement and has obvious effect. The forum is an important teaching method and learning way of the asynchronous teaching through sending and replying exchanges, which facilitates teachers and students to answer and ask questions. Third-party software support: In the courseware design, e-mail, instant messaging software, blog, and video conferencing system can be integrated with the courseware. They are powerful tools for the courseware interaction.
2.3 Courseware Design The courseware teaching is developed to achieve the teaching purposes. Therefore, the design of the courseware should use the educational theory and the computer technology synthetically, considering not only the teaching characteristics and functions, but also the rational use of various media such as voice, video and animation. Under the guidance of the teaching theory, the teaching design, the structure design, the interface design and the media design should be carried out so as to make the multimedia courseware scientific, educational, technical, interactive and artistic. According to the characteristics of the courses taught, the contents should be selected reasonably and the realization method should be determined. For example, when learning the plane drawing and the dimension labeling, students’ dimension labeling is prone to errors. Teachers can synchronously introduce the CAD drawing and the dimension labeling in the courseware making to help students improve their drawing and correct the common labeling errors. Many students lack spatial imagination in the intersection lines of combinations. Teachers can use Solidworks to make models to help analyze and understand the complex geometries, and increase intuition and interest by rotating observation. In learning the standard and the common courseware, because the number and database of the standard courseware in textbooks are few, teachers instruct students to use the existing standard courseware library in CAXA to find the relevant information to help teachers improve the courseware production, so as to enhance students’ learning initiatives and participation.
3 Design and Teaching Reform of the Interactive Multimedia Courseware for Mechanical Drawing 3.1 Teaching Reform of Mechanical Drawing Around the requirements of the teaching objectives, we should reasonably select the teaching contents and adopt the appropriate teaching modes and strategies. Teaching content design: In the mechanical drawing, the graphical expression of objects
Design and Teaching Reform of Interactive Multimedia Courseware …
1491
is drawn by three views. The forming process of the three views is the focus of this course. After understanding the knowledge of this link, it will lay a good foundation for the future drawing. Teaching mode design: The teaching mode uses the object animation demonstration as the center, carries on the comprehensive analysis, and finally draws the conclusion. Its characteristics are: analyzing relationships, connecting relationships, sublimating relationships and forming systems.
3.2 Design of the Interactive Multimedia Courseware for Mechanical Drawing
Structural Design The structural design is to design the organizational structure and expression of the courseware, as well as the interconnection and connection of various parts of the teaching contents, and to formulate the framework and the basic style of the courseware. When designing, we should give full play to the advantages of the computer multimedia technology such as intuition and interaction, and design the organization structure and the interaction of the courseware. Interface Design Principles of the interface design: The interface design of the courseware should follow the principles of consistency, clarity, aesthetics, ease of use and interaction. In the process of the interface design, the information of the texts, graphics, images, animations and sounds on the screen is processed not only to meet the teaching requirements, but also to highlight the layout of the system. In the design of the interface, the following problems are mainly considered: First, we should distinguish the primary and the secondary points and highlight the key points. Put the teaching contents in the most prominent position on the screen, and the secondary information such as the operation help in the secondary part of the screen. The second is to stimulate learners’ interests. Use audios, animations, images and other intuitive information to describe the teaching contents, and achieve the synchronization of the multiple kinds of the information. Third, rationally use colors. Attention should be paid to the matching of the foreground colors and the background colors, and the text colors and the background colors, and the color composition of each picture is reasonable. We should try our best to adopt harmonious and pleasant colors and take the principle of not distracting students’ attention. Fourth, be harmony and consistency, reflecting the overall style. In the interface design, the graphics format is uniform and the page switching style is uniform. The layout of various elements in the interface is orderly and distinct. The courseware provides learners with the choice of teaching contents through the main interface. The main interface uses the navigation buttons and the link titles to provide the choice of teaching contents. It is the general navigation of the multimedia courseware. The teaching
1492
L. Yang
interface is the screen for the multimedia courseware to carry out the teaching activities. It reflects certain educational ideas, teaching processes and teaching strategies, and reflects the logical relationship among the knowledge points. Therefore, it is the focus of the courseware design. Media Design According to the teaching characteristics of Mechanical Drawing, we should choose the teaching media information reasonably, make full use of the texts, animations, graphics, images, sounds and other media, and combine them organically in the courseware. Text design: The texts directly express the teaching information in the courseware interface, which is mainly reflected in the contents and attributes of the texts. The text contents are moderate, and the language is refined, concise and clear, highlighting the key points. The key to the text design of the courseware is to highlight the key points of the teaching or the key titles, concepts, conclusions and other words, to highlight different fonts or colors of the design and texts, or to make the key hints with the appropriate modifications. Animation design: Using the computer animation technology to reflect the teaching contents of the mechanical drawing courseware can give full play to its animation advantages. The animation is used in every learning link of the courseware. Although it increases the difficulty and workload of making the courseware, the animation can best represent the teaching process. The animation of “forming process of the three views” and the conclusion of “projection relationship” produced by the animation are divided into four parts from the knowledge structure. One is the “orthographic projection method”, and the other is “orthographic projection”, and the third is “forming three views”, while the fourth is “projection relationship”. In this way, it is convenient for the production of the courseware animation and the teaching use of the courseware, making the courseware systematic, scientific and easy for the teaching application. Graphic and image design: Graphics and images in computers are different. Graphics refer to the pictures drawn by the computer software. Images refer to the actual pictures collected by the computer peripherals and input into the digital images formed by computers. In the courseware of Mechanical Drawing, the image is applied to the design of the background map, and the machine-related image is selected for the artistic processing to form the courseware background. The format and the tone design of the background images mainly emphasize the text contents of the courseware, and play a role to foil the theme of the courseware, and do not use the background images which are inconsistent with the theme idea. Sound design: If the use of the sound is timely and reasonable, it can play a better effect, and otherwise it will form noise and affect the classroom teaching. In the courseware of Mechanical Drawing, the appropriate music, the effect sound and the explanation should be used. Commentaries can play a simple role in interpreting the animation in the process of the animation. Therefore, every sentence and word of the commentary is in accordance with the speed and contents of the animation. Moreover, in the whole courseware, the voice of the explanation is designed to turn off and open the voice, so as to facilitate the flexible control of the voice in the classroom teaching.
Design and Teaching Reform of Interactive Multimedia Courseware …
1493
4 Conclusion The multimedia courseware of Mechanical Drawing is a modern teaching method, which makes it convenient for students to acquire the all-round knowledge and skills of mechanical drawing. The original abstract and unimaginable things can be made into stereograms, animations and other more intuitive forms by means of the multimedia, which can make the classroom teaching vivid, intuitive and easy to understand. The aim is to cultivate students’ image thinking and spatial imagination. Through the continuous exploration, we have carried out a series of researches and practice on the production of the multimedia courseware for mechanical drawing, which has played a certain role in promoting the teaching quality and effect of the course.
References 1. Chen, Wen. 2013. The application of Photoshop in the making and development of the multimedia courseware. Electronic Technology & Software Engineering (12): 79–80. 2. Zhang, Zhiyong, and Jinping Zhao. 2014. Research and development of the teaching resources adapting to the structural change of the education system under the environment of the information technology—Case study of the research and development of the multimedia courseware resources. Vocational and Technical (6): 106–107. 3. Xie, Fan, and Suijuan Ding. 2014. Application and research of the multimedia courseware based on the multimedia technology—Taking Guangxi Medical University as an example. Electronic Technology & Software Engineering (12): 114–115. 4. He, Jingjing, Chaohan Luo, and Yuehui Wu. 2015. Design and production of the multimedia interactive courseware based on FLASH—Taking the design of the multimedia courseware for the appreciation of poems and lyrics in Rain Lane as an example. Computer Knowledge and Technology (12): 146–147. 5. Feng, Tianmin, Fengmei Yang, Xiaochun Liu, and Guifang Cheng. 2015. Research on the visual design of the PPT courseware based on the survey of students’ satisfaction with the PPT courseware in vocational colleges. Chinese Vocational and Technical Education (32): 77–78.
Design and Implementation of the News Practice Teaching Platform Based on JavaWeb Zhen Yang
Abstract Journalism is a practical and applied subject. Besides the theoretical teaching in the university classrooms, practice teaching is also an organic part of it. Practical teaching of journalism basically organizes the teaching according to the professional teaching plans. Practical teaching links mainly include experiments, course practice and graduation practice. Experiments are mostly offered in combination with the theoretical courses, and the experimental courses are only conducted within the time specified in the teaching plans. Most of the experimental methods are taught by teachers first, and students complete the experimental operation according to the teacher’s arrangement or the steps in the instruction book. In this mode, although we emphasize the cultivation of the experimental ability, the experimental ability is regarded as a skill and imparted in the form of “knowledge”, which leads to the lack of the cultivation of students’ creative application abilities. Keywords JavaWeb · News class · Practical teaching platform · Design · Implementation As the journalism and communication is an applied subject with strong practicality, the goal of the practical teaching cannot be achieved only in the classrooms, but we should establish an off-campus practice base in cooperation with the industry. Over the past year, with the support of schools, many stable practice bases have been established by the media and advertising companies in many cities throughout the country, initially providing necessary places for students to practice.
Z. Yang (B) Jianghuai College of Anhui University, Hefei, Anhui 230031, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_177
1495
1496
Z. Yang
1 The Design Background of the News Practice Teaching Platform Based on JavaWeb There is a common problem in the journalism education in China. That is, most teachers themselves do not have the practical experience in journalism [1]. This is a weakness of the journalism education in China. Facing this problem, the Department of Journalism of our university has adopted a series of feasible methods. One is to directly introduce senior editors and journalists with rich practical experience and strong practical ability to serve as the guest teachers [2]. These introduced senior media practitioners can directly participate in the classroom teaching, and change the situation of teachers who have no previous experience in journalism practice to teach more practical courses, and provide students with vivid contents of the journalism practice teaching [3]. Moreover, these senior media practitioners not only use the typical news cases to teach, but also organize and guide students’ professional practice activities [4]. It is not only conducive to the formation of students’ basic professional qualities, but also helpful to understand the new trend of social and media requirements for journalists, so as to adjust the strategy of training journalists in time, and to help journalists to practice better. Firstly, in terms of the teachers’ construction, training and management, a series of measures have been gradually taken to strengthen the training of teachers’ professional practical ability, and teachers have been organized to acquire the work experience in various ways in the news media and advertising companies [5]. At present, a remarkable feature of the news and advertising education is from theory to theory. Few teachers are really involved in the news and advertising industry and have practical experience, even from other majors to engage in the teaching. Their teaching methods are also from the book theory to the book theory, resulting in the fact that students have little practical experience. There are too few practical courses, which are also very monotonous. News and advertisement are highly practical industries, facing a lively reader, customer and market. They must have abundant practical abilities and customer experience. To cultivate students’ practical abilities, we must have a team of teachers with practical abilities. In recent years, many teachers have been sent to participate in the short-term training held by universities and industries. Many teachers have obtained the certificate of completion of the national advertising talents and journalism special ability training, which alleviates the short-leg problem in the structure of the professional teaching teachers to a certain extent. For the practical teaching of the journalism and communication specialty, the teaching equipment is important, but the problem of the insufficient equipment can be solved in a short time by increasing the economic investment, while the solution to the teaching staff needs to implement the medium and long-term construction strategy. At present, the journalism and communication education adheres to the principle of “walking on two legs” in the construction of the teaching staff. On the one hand, a large number of the graduates from master’s and doctor’s degrees are selected to enrich the teaching staffs. On the other hand, it is hoped that the highlevel elite talents can be introduced directly from the industry or the professional
Design and Implementation of the News Practice Teaching …
1497
practice ability and experience of the existing teachers can be trained by themselves. Because journalism and communication is a highly practical subject, the joining of practitioners can integrate their practical experience into the professional courses taught, and play a role of closely linking theory with practice.
2 Design Contents of the News Practice Teaching Platform Based on JavaWeb Explore and construct the practical teaching management mode of journalism and communication. Out of the restriction of the principle and objective conditions of the gradual development of students’ practical abilities, a phased practical teaching level has been established. A complete practical teaching system includes the professional investigation, the professional understanding practice, the professional practice and the graduation practice. At the same time, the practice base of journalism and communication is bound to be widely distributed in large and medium-sized cities throughout the province and the country, which requires the establishment of an effective model in the management of the practical teaching. During the professional practice in the summer holidays over the past years, the principle of the centralized practice in big cities was adopted. The interns of the two specialties in our college were concentrated in the media and advertising companies in some large and medium-sized cities or the urban agglomerations with relatively developed news and advertising industries. Teams were organized according to the principle of proximity, and the internship teachers were sent to give guidance at their stations. At the same time, the college also sent leaders to tour guidance. This kind of the matrix practical teaching management mode, which conforms to the actual situation of the industry and achieves the goal of practical teaching management, has achieved initial results. Prepare to set up a special construction for several years. In the shortest possible time, from college leaders to young teachers, one or more professional practical abilities and practical work experience in the industry are required. After the completion of this special construction, the structure of teachers and teachers’ practical teaching abilities will be fundamentally improved. This will greatly enhance the management level of the practical teaching system. It is also the construction of the off-campus practice teaching base group. Due to the objective conditions of the journalism and communication industry, the scattered off-campus base is not enough to meet the requirements of the professional training. In the aspect of establishing the communication and cooperation between running schools and the industry, we should continue to do a lot of work, and further improve the management mode of the practice and guidance for teachers and students.
1498
Z. Yang
3 Design and Implementation Mechanism of the News Practice Teaching Platform Based on JavaWeb The website news information publishing system, also known as the website information management system, centralizes and manages some frequently changing information on the web pages, such as news and new product publishing and industry dynamics, and classifies the information by some commonalities, and finally systematizes and standardizes the publication of the information to the website application. The website information is added to the database through a simple interface, and then published to the website through the existing web template format and audit process. The emergence of the website information management system greatly reduces the workload of the website updating and maintenance. Through the reference of the network database, the updating and maintenance work of the website is simplified to only input texts and upload pictures, thus greatly shortening the updating speed of the website and maintaining the activity and influence of the website at all times. The information management system of this system mainly realizes the browsing and adding management of the information contents.
3.1 Technical Introduction At present, the research of the wireless network testing system has been developed rapidly at home and abroad. The main research directions and current situations are illustrated by several representative examples and systems. Java Server Pages (JSP) is a web-based scripting technology, similar to Netscape’s server-side JavaScript (SSJS) and Microsoft’s Active Server Pages (ASP). JSP has better scalability than SSJS and ASP, and it is not exclusive to any vendor or a specific Web server. Although the JSP specification is formulated by Sun, any vendor can implement JSP on its own system. Java Servlet realizes the dynamic web pages by outputting the HTML statements. If Java Servlet is used to develop the entire web site, the integration process of the dynamic and the static pages is very tedious, so SUN launched JSP.
3.2 Basic Characteristics of JSP According to the statement that the scripting language is a language serving a subsystem, JSP should be regarded as a scripting language. However, as a scripting language, JSP is too powerful and can use almost all the Java classes in JSP.
Design and Implementation of the News Practice Teaching …
1499
3.3 JSP Runnin Environment JSP provides a unique development environment for creating the highly dynamic Web applications. According to Sun, JSP can adapt to 85% of the server products in the market, including Apache Web Server and IIS 4.0.
3.4 System Development Requirements With the development of the computer technologies, the network technology has become more and more important to our life and work. Especially in today’s highly developed information era, people’s demand for the latest information and their urgent need for timely release need timeliness. The dynamic interactive web pages just provide these functions. This system is an online interactive system that can realize the multi-user publishing, the multi-column management and the real-time behavior statistics and records on the Internet. The website information management system, also known as the news release system, is widely used in almost all websites, such as the large professional websites, the government websites, and the enterprise websites and so on. It is a website application program that centralizes the information such as news, information columns and industry dynamics to publish, manage and query. No matter where the enterprise website managers are, as long as they can access the Internet, they can update and maintain the website information. All operations can be done through the browsers, without the need to master other applications, and users do not need training. It is an indisputable fact to transform the traditional industries and improve the working efficiency by means of informatization. Then, the management information system of this system mainly solves the management problems of people, resources, information and business that the leaders of the enterprises and institutions are concerned about.
3.5 System Development Environment
System Development Platform The Browser/Server architecture is adopted, and the Microsoft Windows XP is used as the network operating system on the server side, while Tomcat 6.0 is used as the Web server software, and MySQL database is used as the database system. System Development Tool The Web-based system development tools should enable developers to use a variety of technologies to create the dynamic Web applications, and should be a visual
1500
Z. Yang
tool. We use Myeclipse 8.0 for the development, supporting the multiple databases, JavaScript and other database and scripting languages. System Operating Environment Requirements Over the running time, we can ensure the correctness, reliability, efficiency, integrity, being ease of use, maintainability, security, confidentiality, and portability.
3.6 System Analysis and Design
System Function Analysis There are several parts in the news release management system. If it is an ordinary user, they have only the rights of news browsing, news reading and news query, and if it is an administrator, he has the rights of news management in addition to the above rights. Front Page Design According to the needs of the website, various ways of insertion and automatic updating can be carried out. When making the dynamic web pages with the news article management system, corresponding codes can be inserted where needed. That is, columns or contents of the news articles can be displayed in various forms. We can see all kinds of news in the navigation bar above and we can click on the related news to see a list of all the news of this kind. Click on one of the records to display the details of the news. The front-end news can show the types and headlines of all kinds of news, and clicking on their categories can directly enter such types of news. Backstage Management Design The backstage management is divided into the news release, the news type management, and the user management and so on. These rights can only be implemented by administrators, while other common users can only query and browse these kinds of the news. After passing through the administrator’s identity, it enters the news management page. The page will display the login names and the current time. Entering the background can manage the categories of the articles and the news they want. Database Design The data can be managed automatically only by using the database. The structure of the data will affect the application of the entire management mechanism. The MySQL database is simpler and easier to operate than other databases. The database file in this news release system is a database of the MySQL type.
Design and Implementation of the News Practice Teaching …
1501
4 Conclusion There are problems existing in the exploration and construction of the practical teaching management system of journalism and communication science. As an advertising and journalism undergraduate school lacking the historical accumulation and experience, we still have many problems in the field of the practical teaching management of journalism and communication, some of which need to be solved urgently. Focusing on the field of the teaching staff, although teachers go out for training in recent years, teachers with professional practical abilities and industry working experience are still the short legs of the teaching staff, which greatly limits the level of the practical teaching and its management level. Acknowledgements Project Name: Research on News Practice Teaching Platform Based on SSH Framework and MVC Framework; Key Project of Natural Science Research in Universities and Colleges of Anhui Education Department, Project No. KJ2018A0623.
References 1. Huang, Dan. 2014. Overall transformation: Some ideas on current discipline construction of journalism and communication in China. Journalism Bimonthly (6): 1–8. 2. Zhao, Yawen, Yu Zhang, and Zhan Feng, et al. 2013. Analysis and research on the quality of the media personnel training in Chinese universities and colleges—Taking universities in Tianjin as an example. Journalism Bimonthly (6): 139–149. 3. Chen, Changfeng, and Yuqi Wang. 2015. Innovation and persistence: Exploration of domestic journalism education path under the American experience and the new environment. Journal of International Communication (7): 26–35. 4. Dai, Zhiguo. 2015. Research on the practical teaching of the network and new media specialty. Education for Chinese After-School (11): 518–522. 5. Chen, Yixiang. 2015. Construction of the practical teaching system for English majors in local universities. Science & Technology Vision (5): 55–60.
Research on Wi-Fi Signal Coverage and Quality of Urban Rail Transit Wenjie Yu
Abstract With the development of modern cities, traffic congestion has become a problem affecting the travel, which makes urban rail transit develop rapidly. However, it is an era of mobile interconnection. Because urban rail transit takes full advantage of underground space and high-speed transportation, it is difficult to use the convenient and fast wireless network. In fact, it is found that the existing Wi-Fi construction of urban rail transit is not complete and cannot meet the needs of passengers. Improving Wi-Fi construction of urban rail transit has great economic value, and can further enhance the competitiveness of urban rail transit in urban public transport. Keywords Wi-Fi · Throughput · Metro
1 Introduction Wi-Fi technology, a wireless LAN technology based on IEEE 80.2.11, was invented by CSIRO, an Australian research institute, in the 1990s and applied for a patent for wireless network technology in the United States in 1996. The two important components of Wi-Fi technology are wireless network card and access point (AP). Through AP, the wired network signal is converted into wireless signal, and the electronic terminals equipped with wireless network card in the effective range covered by Wi-Fi radio wave are connected to each other in wireless form, providing users with convenient and fast network [1]. The network structure of Wi-Fi includes: (1) Site: (station): The most basic part of the network. (2) Basic Service Unit (BBS): Sites can dynamically connect to basic service units, which are the most basic service units in the network. (3) Distribution System (DS): Used to connect different BBS and distribute the media used by the system. (4) Access Point (AP): Connect the user to the network system and have access to the allocation function. W. Yu (B) School of Information Engineering, Kunming University, Kunming, Yunnan 650214, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_178
1503
1504
W. Yu
(5) Portal: Used to connect different networks together. Wi-Fi has become a low-cost, high-bandwidth wireless network interface that can be used all over the world, because the bands used by Wi-Fi do not need to apply for any telecommunication license [2]. Wi-Fi plays an important role in home transportation, intelligent electrical appliances, remote control, medical treatment, security and other fields. Wi-Fi network construction is relatively simple, relatively low cost, easy to use, but it is undeniable that Wi-Fi technology does exist such as roaming, security, fees and other issues [3]. Once Wi-Fi’s interoperability, security, charging and other issues are solved, Wi-Fi will have broad prospects to complement the mainstream communication in some public services or some special areas [4].
2 Kunming Urban Rail Transit Operating Platform Kunming Metro Wi-Fi is operated by Southern Galaxy Valley, which is the largest Internet scene operator in China. Based on the flow of Metro Wi-Fi, Kunming Metro Wi-Fi diversifies its mobile Internet business, builds a huge number of high-quality mobile interconnection platforms, and provides a series of mobile Internet services with “Peanut Metro Wi-Fi” as the carrier. The main body that needs Wi-Fi coverage in urban rail transit is divided into two parts: station and carriage. Both are relatively long and narrow. Wi-Fi between stations is characterized by large user traffic, a certain requirement for the carrying capacity of AP, and the possibility of interference is relatively greater. Taking the Erji Road Station of Kunming Metro as an example, the Station is a double-decker structure. The first floor is ticket purchase and entrance passage, which is shown in Fig. 1.
Fig. 1 Layer 1 illustration of Erji station and AP distribution
Research on Wi-Fi Signal Coverage and Quality …
1505
It can be seen from the graph that the first two APs are diagonally distributed. Four points marked in the graph are selected and measured to get the data in Table 1. Roaming test between two adjacent points are shown in Table 2. By analyzing the relative position of the data and points in the two tables, we can get the following results: (1) The difference between the Wi-Fi intensity and the standard value is between = −65
>= −65
>= −65
>= −65
Gateway address
10.0.0.1
10.0.0.1
10.0.0.1
10.0.0.1
Time per request (ms)
21.851
12.417
14.789
11.105
Packet loss (%)
0
2
0
2
Maximum time consuming (ms)
176.942
147.805
208.458
126.337
Minimum time consuming (ms)
3.203
3.644
3.159
3.277
Same frequency AP test
Number of same frequency AP
1
0
1
1
HTTP browsing test
Visit website
www.baidu. com
www.baidu. com
www.baidu. com
www.baidu. com
Test time consuming (ms)
6237
2817
2728
2858
Average upload (Mbps)
3.68
7.365
2.475
20.25
Average download (Mbps)
5.27
8.48500
7.265
11.5650
RSSI
Ping test
Throughput test
1506
W. Yu
Table 2 Roaming test between two adjacent points Starting point
End point
Roaming
Drop out
Total packet dropout
Average delay (ms)
Total Ping Packet Number
Average RSSI (dBm)
Minimum RSSI (dBm)
1
2
No
No
0
22.752592
54
−73
−77
2
3
No
No
0
13.144
35
−65
−70
3
4
No
No
0
23.460001
81
−62
−69
(2) In Ping test, only 2% of the second locus lost packets, but the maximum time consumed was too long. (3) The same frequency AP of the station in this layer is less, and the interference to the signal in this layer is less. (4) The longest time delay of HTTP browsing test is 6 s, and there is obvious carton when it is used. (5) The maximum and average RSSI fluctuations in the path are smaller, and the received signal intensity transformation is smaller. In conclusion, because this layer is located on the second floor above ground, with roads on both sides and trees blocking around it, the attenuation of nearby Wi-Fi signal is larger when passing through trees, which causes less interference. According to Okumura model, we can know that tree vegetation can absorb wave. Vegetation attenuation depends on tree height, species, shape, distribution density, moderate air and other related factors. From this, we can know that the same frequency interference of Wi-Fi signals in this layer will change with seasonal weather changes; field observation shows that most people stay in this layer for less time and use less; wireless AP is diagonally distributed on both sides, with stairs and stairs separated between the two AP, diagonally distributed to overcome the building’s attenuation of radio signals, signal coverage is wide and there is no interference between them. The actual application of this layer is good (Fig. 2).
Fig. 2 Illustration of Layer 2 Erji station and AP distribution
Research on Wi-Fi Signal Coverage and Quality …
1507
The second AP and the first AP are symmetrically distributed. The data in the table are obtained by measuring five points in the waiting area at two diagonals. It can be seen from the graph that the first two APs are diagonally distributed. Four points marked in the graph are selected and measured to get the data in Table 3. Roaming test between two adjacent points are shown in Table 4. The results of analyzing the relative position of two tables data and points are: (1) The difference between the Wi-Fi intensity and the standard value is between = −65
>= −65
>= −65
>= −65
>= −65
Gateway address
10.0.0.1
10.0.0.1
10.0.0.1
10.0.0.1
10.0.0.1
Time per request (ms)
664.047
78.969
70.685
523.023
593.012
Packet loss (%)
74
2
0
62
38
Maximum time consuming (ms)
1560.144
1020.971
298.305
1051.835
1130.047
Minimum time consuming (ms)
270.153
3.037
4.002
10.28
123.016
Same frequency AP test
Number of same frequency AP
2
5
4
4
2
HTTP browsing test
Visit website
www.baidu. com
www.baidu. com
www.baidu. com
www. baidu.com
www.baidu. com
Test time consuming (ms)
Overtime
10014
5223
Overtime
Overtime
Throughput test
Average upload (Mbps)
0.07
0.335
0.335
0.16
1.155
Average download (Mbps)
0.375
1.160
1.410
0.075
0.235
RSSI
Ping test
5
1508
W. Yu
Table 4 Roaming test between two adjacent points Starting point
End point
Roaming
Drop out
Total packet dropout
Average delay (ms)
Total ping packet number
Average RSSI (dBm)
Minimum RSSI (dBm)
1
2
No
No
15
259.8942
72
−65
−71
2
3
No
No
25
354.37445
100
−63
−68
3
4
No
No
9
363.08572
37
−63
−67
4
5
No
No
28
599.7131
51
−66
−70
(2) Big packet loss rate and long delay in Ping test. (3) The same frequency AP of the station in this layer is more, and the interference to the signal in this layer is greater. (4) Three points in HTTP browsing test are timed out, while the other points have long latency. In Summary, The floor is relatively open, with a top of three to five meters and no enclosure around it; The nearby civil Wi-Fi equipment will cause greater interference to it. This floor is the waiting floor. Passengers pass through the first floor quickly and arrive at it and stay there for a certain time. Due to the large number of users, data delay and packet loss will still occur when the signal in this layer is good. During the test, it is also found that the signals fluctuate greatly when the train arrives or leaves the station. Considering the actual situation, there are many cables laid on the train track, and the traction current and control signal of the train change at the same time. It is inevitable that some harmonic components will interfere with the whole WiFi system (Fig. 3). The length of each carriage of the train is about 15 m. There is an independent AP in each carriage. However, through field measurements, it is found that as of April 17, 2019, Kunming Metro Lines 1 and 2 are in the testing stage, and There is no Wi-Fi signal available when the train passes through some stations or some sections.
Fig. 3 Illustration of cabin of Kunming Metro Line 1
Research on Wi-Fi Signal Coverage and Quality …
1509
Suggestions for improvement: after field investigation, it is found that Wi-Fi is more used to access the Internet in areas where users stay longer, and the maximum number of AP users in such areas should be larger than that in other areas. Compared with different stations, in order to avoid the interference of some other Wi-Fi devices around the station to the whole Wi-Fi system, the frequency of AP should be adjusted reasonably to reduce the interference of other signals to Wi-Fi. At present, the influence of Kunming Metro Public Wi-Fi signal on the safety of Metro is in the exploratory stage. Doppler effect and multipath effect of electromagnetic wave in high-speed Metro have a great impact on the stability and transmission rate of Wi-Fi. Only by avoiding these two points reasonably, can the stable and high-speed Wi-Fi signal be provided for the moving train.
3 Conclusion In this paper, the Wi-Fi signal of urban rail transit is measured and analyzed to a certain extent, and some suggestions for improvement are put forward. According to the current situation, the development direction of urban rail transit is deduced. The wireless communication technology will develop rapidly towards high broadband, intellectualization and multi-function. However, from the actual situation, Kunming Metro is still in the stage of construction and developing, the wireless communication technology in urban rail transit is not mature, the maximum number of AP access customers in each region is not complete, such as AP distribution, AP frequency and so on. Nowadays, with the rapid development of information, improving the Metro Wi-Fi system plays an important role in improving passenger satisfaction. A more perfect Metro Wi-Fi system can improve the added value of the Metro to a certain extent. Constantly improving the existing Wi-Fi system will provide better services for passengers.
References 1. Brik, V., S. Rayanchu, S. Saha, et al. 2008. A measurement study of a commercial-grade urban WiFi mesh. In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, 111–124. ACM. 2. Sommers, J., and P. Barford. 2012. Comparing metro-area cellular and WiFi performance. ACM SIGMETRICS Performance Evaluation Review: ACM 40 (1): 385–386. 3. Deshpande, P., X. Hou, and S.R. Das. 2010. Performance comparison of 3G and metro-scale WiFi for vehicular network access. In Proceedings of the 10th ACM SIGCOMM conference on internet measurement, 301–307. ACM. 4. Sommers, J., and P. Barford. 2012. Cell vs. WiFi: on the performance of metro area mobile connections. In Proceedings of the 2012 internet measurement conference, 301–314. ACM.
Design of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network Haonan Yuan
Abstract Establishing a scientific and reasonable evaluation system for the implementation effect of sunshine sports can objectively and impartially evaluate students’ participation in the extracurricular physical exercise, and give full play to its evaluation system’s functions in guiding, motivating, coordinating and managing. This paper is based on the investigation of the implementation effect of sunshine sports in six universities in Gansu Province and on the general principles of the index selection. This paper constructs the evaluation system of the implementation effect of sunshine sports in colleges and universities, determines the weight coefficients of each index in the evaluation system through the analytic hierarchy process, and carries out an example analysis of the comprehensive evaluation of the implementation effect of sunshine sports in colleges and universities based on the theory of the multi-level grey correlation analysis, which provides a decision-making reference for the development of the similar evaluation work in reality. Keywords Campus network · Colleges and universities · Sunshine sports · Fuzzy synthesis · Evaluation platform Under the background of the sunshine sports, the physical education and teaching in colleges and universities mainly evaluates teachers’ teaching effect by means of sports technologies, students’ physical fitness test indicators and the scores of their participation in sunshine sports [1]. The development of sunshine sports has been integrated with students’ physical fitness tests, and guided by the implementation of the “Standards” to effectively guide the development of sunshine sports. Through the physical health test of students, students can position themselves more comprehensively and objectively [2].
H. Yuan (B) Tianjin University Renai College, Tianjin 300000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_179
1511
1512
H. Yuan
1 Design Contents of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network 1.1 Evaluation of the Students’ Learning Under the background of sunshine sports, the evaluation of college physical education curriculum on students is essentially a process of testing the degree of students’ learning goals [3]. The evaluation of students’ learning is not only a positive factor for students to form the correct and positive sports consciousness and attitude, but also a negative factor for students to produce psychological pressure, become timid, withdraw or give up their ideas. Based on the educational concepts of “health first” and “human orientation”, the evaluation process should take the teaching purpose as the yardstick. The evaluation includes: firstly, inspecting the students’ understanding and memory of the knowledge they have learned. The knowledge contents include the students’ psychological development levels [4]. The evaluation contents should fully embody their ability of mastering and using the knowledge from low to high in the cognitive field. Secondly, technologies are to be investigated. We should consider the students’ personality differences, change the unified item of the monochrome “filter” and the unified standard scoring method, give the students the right to choose, and make them in the advantageous projects as far as possible in the evaluation of their own sports skills [5]. Thirdly, the quality assessment should be based on the “Standards of Students’ Physical Fitness and Health” to strengthen the students’ understanding and pursuit of the physical health quality and various factors that affect their lifetime health, so as to realize the connection and transition between the college physical education and the lifelong physical education under the background of sunshine sports.
1.2 Evaluation of the Teachers’ Teaching The evaluation of the teachers’ education often focuses on students’ achievements, while the evaluation of the teachers’ teaching effect and the extent to which the ultimate goal of the physical education curriculum has reached is often neglected or insufficient. The evaluation of teachers should be considered from the overall perspective of implementing or improving the syllabus. The evaluation of the teachers should focus on how to help teachers improve or perfect the teaching methods and means and the teaching process, so as to improve the teaching efficiency and achieve the curriculum objectives. Usually, there are two methods to evaluate the physical education teachers: the evaluation of the teaching effect and the evaluation of the teaching process, and there is anther way to combine the two methods. The evaluation of the teaching effect is a traditional type of the evaluation, which takes the final result
Design of the Fuzzy Comprehensive Evaluation Platform …
1513
of students’ learning as the main basis of the teacher evaluation. The evaluation of the physical education teachers should involve students. Although the evaluation of students cannot be used as the main basis for evaluating the teachers, the objective evaluation of the teachers by students cannot be ignored. At present, some schools evaluate the teaching effect of the teachers through the network of the Academic Affairs Office, which is an effective means to improve students’ evaluation of the teachers’ teaching quality or reliability. No matter who evaluates teachers’ teaching effect, however, teachers’ self-evaluation is always the most important and has the most long-term value. Every teacher should be the pursuer and evaluator of their teaching effect.
1.3 Evaluation of the Curriculum The evaluation of the curriculum usually includes the evaluation of the students’ learning performances, but the evaluation of the curriculum should focus on the overall evaluation of the curriculum rather than the evaluation of the single academic achievement. Because the evaluation results of the course should be fed back to the organization or the department involved in the course, not to the parents of the students, the curriculum evaluation may also include the evaluation of the teachers, but the evaluation of the teachers should focus on the success of the specific innovative teaching contents and the effective development and utilization of the curriculum resources. It is not the concrete expression of the teachers’ teaching. The scope of the curriculum evaluation is broader than that of the individual student evaluation or the teacher evaluation. Its main purpose is to promote the perfection and improvement of the contents of the curriculum objectives. It pursues the realization of the long-term objectives rather than the short-term harvest of the teaching activities.
2 Design Background of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network 2.1 Providing the Decision-Making Service for Sunshine Sports The information resources of sunshine sports serve the decision-making of colleges and universities mainly in the management of the sports government information related to sunshine sports in colleges and universities. With the help of the modern information technology and means, the sunshine sports management institutions in the physical education departments of colleges and universities carry out the information management and the resource allocation for students, venues, equipment and
1514
H. Yuan
teachers, strengthen the information management of the sunshine sports administration, realize the automation of the sunshine sports office and operation, continuously improve the working efficiency, and adopt a fast and intelligent information transmission and processing system to shorten the sunshine. The time of collecting, sorting out, communicating, feedback and updating the sports-related information ultimately makes the information serve for sunshine sports decision-making, and improves the accuracy and timeliness of the sports department management and decision-making.
2.2 Satisfying the Diversified Demand of the Students’ Participation in Sunshine Sports What the students’ physical health is and whether they have sports taboo symptoms, what aspects of the physical functions they should improve in terms of their interests and sports needs, when and where they can participate in sunshine sports events, whether the resources of venues and equipment can meet the needs of students, whether professional teachers provide the specialized guidance and other information resources are detailed, digitalized and intuitive. It can not only greatly facilitate students to make the personalized choices, but also meet the diverse needs of different groups of students.
2.3 Realizing the Optimal Allocation of the School Sports Resources The allocation of the sports information resources in colleges and universities is a systematic project, especially the allocation of sunshine sports related resources, which has the characteristics of large scale, comprehensive functions and many factors. In the process of the collegiate sunshine sports information resources allocation, we should not only take into account the daily operation of the sports departments such as the physical education and teaching, the physical fitness testing and the sports scientific research, but also combine with the overall work arrangement of the school educational administration and examination affairs. Therefore, the optimum allocation of the sunshine sports information resources must be guided by the theory of the system science. The goals, principles, system functions, operation mechanisms, benefit evaluation and other aspects of the allocation need to be studied and managed scientifically, in order to realize the optimum design, management and control.
Design of the Fuzzy Comprehensive Evaluation Platform …
1515
3 Design Thoughts of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network The fuzzy comprehensive evaluation refers to the general evaluation of things or phenomena affected by various fuzzy factors. The basic idea of the fuzzy comprehensive evaluation method is to use the principle of the fuzzy set transformation to describe the fuzzy boundaries of each factor by the membership degree on the basis of determining the evaluation factors, the evaluation grade standards and the weights of the factors, and to construct the fuzzy evaluation matrix. Finally, the evaluation object’s grade is determined by the multi-layer compound operation.
3.1 Fuzzy Comprehensive Evaluation Theory The fuzzy mathematics expands the range of the characteristic function {0, l} of the ordinary set to the range of the membership function of the fuzzy set [0, 1]. That is to say, the binary logic is extended to the fuzzy logic. In this way, we can overcome the shortcomings of using the traditional evaluation methods to evaluate the fuzzy things. The fuzzy evaluation method and steps are as follows: to determine the objectives, to determine the objectives according to the needs, and to select the indicators for different objects. Establish a set of the evaluation factors, according to the evaluation objectives, and through the expert discussion or the use of the past experience and other ways, clarify from which aspects to reflect this goal. In the factor set, the representative factors = the target number. Establish a set of the weight coefficients, and each factor has different importance to the measurement target, so we can assign a weight to each factor through the expert discussion or other ways. The larger the weight, the more important the first factor is to the target. The weight set is obtained, which satisfies the requirement. Establish the evaluation set, and set up the evaluation set for each factor, in which, = evaluation number, indicating the grade. That is to say, determine that each evaluation factor can be divided into several grades to distinguish.
3.2 Establishment of a Fuzzy Evaluation Matrix for Each Evaluation Objective of a Scheme After each evaluator evaluates all the evaluators, the evaluation results are counted, and the factor evaluation matrix of the evaluator is obtained. One evaluator corresponds to one factor evaluation matrix. The matrix rows correspond to the evaluation factors. That is, the first row represents the measurement of the first measurement
1516
H. Yuan
factor. The columns correspond to the evaluation results. That is, the first list represents the proportion of the raters who consider the ratings of a certain evaluation factor in the evaluation results. For example, in the evaluation of the first evaluation factor, it is considered that the ratings of the factors should be the ratings of the ratings accounted for separately. Therefore, the element in the factor evaluation matrix is the degree of the membership to satisfy.
3.3 Get the Result Set of the Evaluation Targets The weight set and the factor evaluation matrix are fuzzily calculated, and it is found that the most common choice is to take the largest or the smallest, that is, “to take the smallest value” and “to take the maximum value” and “to take the membership degree of yes”. Here we call it Model I. In fact, this calculation cannot synthesize the comprehensive membership of the reaction pairs, because only part of the information is selected and some important information is lost. In this paper, we adopt the improved algorithm (Model II): The matrix synthesis is calculated by multiplying first and then adding. In order to better handle the evaluation results, the elements in the evaluation are normalized. The purpose of this is to standardize the results. Obviously, at this time, we can get the standardized evaluation result set and assign a specific score to each evaluation grade according to some principle, so as to get the corresponding score set of the evaluation grade set. A specific value is obtained by the matrix operation, which indicates the score of the evaluation target after the evaluation. When the evaluation object is the multi-person, the quantitative results can be used to compare.
3.4 Several Key Problems in the Application of the Fuzzy Comprehensive Evaluation Method Scientifically and rationally formulate the evaluation index set. The evaluation results are closely related to the evaluation indicators. The indicators should reflect the overall situation of the multimedia classroom teaching as far as possible. Because the fuzzy comprehensive evaluation method cannot solve the problem of the duplication of the evaluation information caused by the correlation between the evaluation indicators, the meaning of each indicator should be clear and helpful for experts to understand, and the boundaries between the evaluation factors should be clear, and the degree of correlation between the evaluation indicators should be reduced as far as possible, to ensure the accuracy of the evaluation results. Generally, it is difficult to express the qualitative indicators by numbers. It can only be expressed by such vague concepts as “good”, “better”, “general”, “bad” and
Design of the Fuzzy Comprehensive Evaluation Platform …
1517
“poor”. The fuzzy comprehensive evaluation can be used not only for the comprehensive evaluation of the subjective indicators, but also for the comprehensive evaluation of the objective indicators, which can better solve the quantitative problems of the qualitative indicators. When using the method of the fuzzy comprehensive evaluation to evaluate the single index, special attention should be paid to the unification of the caliber of the qualitative and the non-qualitative indexes and the limitation of the evaluation scope before the experts scoring.
3.5 Management System of Sunshine Sports The management system of sunshine sports is the sum of the sunshine sports management system, the division of power and the responsibility and the operation mode. The management system of sunshine sports is the basic guarantee for carrying out activities and the symbol of the mature development of sunshine sports. At present, the development mode of sunshine sports is mainly composed of the school leaders in charge of the school sports. Its operating characteristics are as follows. First, establish the sports working mechanisms between the school’s relevant functional departments, colleges and institutions and the sports departments, solving the important problems in the school physical education work in an overall and coordinative way. Secondly, sports performances should be included in the evaluation sequence. The department of study and engineering is required to incorporate students’ physical education work into the important contents of the year-end assessment, to commend the units and individuals who have made outstanding achievements in the physical education work, to inform the department of the “Standard” test situation, and to vote against it in all the evaluation activities of the school.
4 Conclusion Although the fuzzy comprehensive evaluation method is scientific and rigorous in the evaluation procedure, the reliability of the evaluation conclusion depends on the authenticity and reliability of the evaluation data, and otherwise it will affect the authenticity and reliability of the evaluation conclusion. Therefore, it is necessary to ensure the authenticity and reliability of the basic evaluation data and files obtained. The computer aided processing model is studied and established. When the number of the evaluation courses and the evaluation indicators are large, the amount of the data processing is large. It is necessary to use the powerful computing functions of computers to ensure the accuracy of the calculation.
1518
H. Yuan
References 1. Yu, Feng, and Yi Wu. 2013. Research on the fuzzy comprehensive evaluation of sunshine sports in colleges and universities based on the legal power of the grey relational coefficient. Frontier (8): 109–110. 2. Gong, Jiangyong. 2010. Feasibility analysis of the evaluation system of the new physical education curriculum in colleges and universities based on the AHP fuzzy comprehensive evaluation. Journal of Zhejiang Business Technology Institute (4): 42–45. 3. Zhang, Hongxia. 2012. Investigation on the current situation of “sunshine sports” development of students in higher vocational colleges. China Education Innovation Herald (7): 210–212. 4. Wang, Li, Ling Yun, and Chongqi Xu. 2016. Application of the multi-level grey relational analysis in optimizing the green building design schemes. Industrial Safety and Environmental Protection (4): 93–96. 5. Wang, Li, Ling Yun, Chongqi Xu, et al. 2016. Highway green route selection based on the multi-level grey relational analysis. Highway Engineering (5): 28–32.
The Validity of Computer Technologies in Promoting College Students’ Entrepreneurship Education Based on the E-commerce Jinming Bai
Abstract In recent years, with the rapid development of the network technology, the related research on college students’ e-commerce entrepreneurship is continuously fermenting. However, while more and more attention has been paid, the relevant research has not made great breakthroughs. There is no certain induction, sorting out and research on the relevant policies issued by the state of e-commerce entrepreneurship for college students. There is no internal relationship between the e-commerce entrepreneurship for college students and the innovation entrepreneurship for college students. The mode and the thinking of the e-commerce entrepreneurship are mostly at the basic stage, and more or less imprinted with foreign experience and brand. The research lacks the profound theoretical basis, and in the current researches, there are few links between college students’ e-commerce entrepreneurship model and the entire college students’ education system and the Internet development system. There is a lack of internal linkages among various models. Keywords E-commerce · Computer technology · College students · Entrepreneurship education · Validity research Faced with the ever-changing development situation of the Internet, we need to put forward new ideas for the related researches of the e-commerce entrepreneurship and break the original bottleneck of development. We should not be self-confident, but should adjust the research contents. Combined with the reality of China’s social development, we should look forward to the global economic development environment, as well as the needs and aspirations of college students themselves, and absorb the relevant e-commerce from the western countries [1]. The essence of the entrepreneurial research is to carry out the theoretical innovation and provide the correct theoretical foundation for our university students to conduct the e-business practice.
J. Bai (B) Zhengzhou University of Science and Technology, Zhengzhou 450064, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_180
1519
1520
J. Bai
1 Validity Evaluation Direction of Computer Technologies Promoting College Students’ Entrepreneurship Education Based on the Electronic Commerce 1.1 Entrepreneur Evaluation First, the basic qualities of the entrepreneurs are relatively inadequate. Due to the limitations of the higher education model in China, the quality of the entrepreneurship is insufficient and defective, and especially the self-determination ability, the practical ability and the innovation ability are generally not strong, which has become a constraint factor for college students’ entrepreneurship [2]. Secondly, the entrepreneur market management concept is relatively weak. Most college students engage in the entrepreneurship activities, and the main purpose is to exercise their talents, followed by the profitability [3]. Many college students only pay attention to the leading and unique technology or products, but ignore the market space of technologies or products, and especially the target market positioning, the marketing mix and other important aspects have no concept at all. Thirdly, the business management experience of entrepreneurs is very scarce. College entrepreneurs lack the practical experience, the business innovation ability and the market expansion ability in the process of transforming from technicians to managers. As a result, there is no internal management system in the company, which cannot be implemented, and the external cooperation is difficult [4]. Finally, the goal orientation of entrepreneurs’ entrepreneurship is very vague. Undergraduate entrepreneurs are less exposed to the social reality, with a lack of the market research, relatively vague orientation of the entrepreneurship goals, the blindness of the entrepreneurship plans, and the poor operability, which eventually lead to failure or miscarriage of the entrepreneurship plans [5].
1.2 Evaluation of the Entrepreneurship Projects Firstly, the entrepreneurship projects have relatively low scientific and technological contents. At present, the technological content of college students’ entrepreneurship projects is relatively low, because a simple assumption is rushed to the horse, and finally because there is no core technology, there is no buffer barrier in the competition with other companies in the market, which leads to failure [6, 7]. Secondly, the distribution of the entrepreneurship projects is too centralized. In the product development and the production companies, the website construction and development companies, the product agency and service companies, the management consulting and service companies and other companies, a large number of the start-up companies of college students run websites without product design, production, and marketing and after-sales services. Finally, the evaluation system of the entrepreneurship
The Validity of Computer Technologies in Promoting College …
1521
projects is not perfect enough. Because there is no standardized evaluation system of college students’ entrepreneurship projects, there are some problems such as college students’ mental impetuosity, rash entrepreneurship plans, immature entrepreneurship technologies, and more importantly, the lack of the correct understanding of entrepreneurship by entrepreneurs and entrepreneurship teams has resulted in the low overall success rate of college students’ entrepreneurship, which has caused great losses to college students.
1.3 Entrepreneurial Environmental Assessment First of all, the traditional culture and the media public opinions are overburdened. At present, the social traditional cultural concepts make the social atmosphere of the entrepreneurship and the interpersonal relationship of the entrepreneurship burdened. Influenced by the traditional cultural concepts, the innovative and creative consciousness needed for the entrepreneurship is strangled, and many college students are at peace and do not want to make progress. In addition, many media are accustomed to killing college entrepreneurs who have failed for a while. Secondly, there is a lack of the material support and achievement transformation in colleges and universities. Most colleges and universities lack the stamina in deep support such as the achievement transformation. College students’ entrepreneurship often stays at the stage of an entrepreneurship plan. Thirdly, there is a lack of the financing channels. At present, the domestic venture capital mechanism is far from mature. There are many unsolved problems in a series of mechanisms, such as the business procedures, the equity liquidation and the equity withdrawal, which add many obstacles to students’ entrepreneurship. Finally, the policy support and the institutional environment are lagging behind. There is a lack of the mature entrepreneurship system environment and policy environment, and there are not many special policies for the entrepreneurs of college students. There is no perfect policy mechanism to encourage college students to start their own businesses and protect the interests of entrepreneurs. Especially, the enterprise system, the personnel system and the investment system are not inclined to the entrepreneurship of college students.
2 Validity Research Indicators of Computer Technologies Promoting College Students’ Entrepreneurship Education Based on the E-commerce For a long time, the evaluation of the entrepreneurship plans mostly uses the method of determining the evaluation items and their respective weights to weigh the average. The other part focuses on the entrepreneurship itself. There are basically two views. One is that the entrepreneurship is an effective way to promote the transformation
1522
J. Bai
of the scientific research achievements into the real productive forces, which should be vigorously supported and promoted. The other is that the entrepreneurship for college students is far from mature at the present stage. Considering the limitations of students’ knowledge, time and energy, the cost of the entrepreneurship is too high, so it should not be advocated.
2.1 Research on the Validity of Computer Technologies in Promoting College Students’ Entrepreneurship Education Based on the E-commerce There are few studies on the entrepreneurship evaluation. There are few direct studies on the entrepreneurship education in the field of the higher education. Many studies are too macro. Most of them discuss the significance of the entrepreneurship education. They are similar in many respects. Their understanding is hollow or too micro. Their evaluation lacks systematicness and is not suitable for the characteristics of the higher education and the evaluation system of the teaching practice of colleges and universities. In the specific practice of the entrepreneurship education, the lack of the scientific evaluation also affects the development of the education activities. Researchers attribute the current lack of the entrepreneurship education to the following points. First, there are errors in the cognitive concepts, which confuse the entrepreneurship education with other forms of the education, and many tasks remain on the surface. Second, the curriculum is unreasonable, and the content of the education is not clear, and the entrepreneurship education is not integrated into the school’s overall teaching system. Thirdly, there is a shortage of teachers, and especially there are few practical teachers, and the education has not been popularized. Most of the college entrepreneurship institutions and the student entrepreneurship associations are the elite organizations, and most of the college students cannot participate in them because of their own conditions. The emergence of the problem is synchronized with the development of the entrepreneurship education. The solution of the problem should also be solved in the development of the entrepreneurship education. The key to solving the problem is to establish a scientific and reasonable evaluation system of the educational effect.
The Validity of Computer Technologies in Promoting College …
1523
2.2 Effectiveness Index of the Computer Technologies Promoting College Students’ Entrepreneurship Education Based on the E-commerce First-level indicators: The talent score in the first-level indicators is higher than that of the inclusive and technical indicators, which shows that people are the active subjects. When the guidance of a certain atmosphere or their own level of understanding reaches a certain level, their potential will be greatly developed, and they will be the main objects of the e-commerce entrepreneurship education in colleges and universities. In addition, the scores of the inclusion and technology are equal, which also proves the important value of the inclusion in the 3T theory. Secondary indicators: The personal ability score of the talent level is also higher than that of the inclusive level of the hardware, the software system and the technology level of the education and management. On the one hand, it illustrates the importance of the human cultivation in the e-commerce entrepreneurship, and on the other hand, it illustrates that the hardware, software, education and management are equally important. Third-level indicators: Firstly, in the inclusive layer, the weights of the entrepreneurship platform and the entrepreneurship policy are the same, and the second are the entrepreneurship atmosphere and the resource abundance, and the final are the logistics platform and the entrepreneurship activities. This shows that the platform and policy support of the entrepreneurs is the same as that of the creative entrepreneurship industry parks in the creative cities. Creative entrepreneurs or entrepreneurs first need to gather in space. The benefits of clustering can bring the agglomeration economy, the economies of scale and the economies of scope. It can speed up the circulation of the entrepreneurial information, the entrepreneurial knowledge and the entrepreneurial technology in a short time, and reduce the internal transaction costs. The communication cost promotes and incubates the creation of the creative innovation under the coordination of good policies. Therefore, college students’ e-commerce entrepreneurship also needs such a gathering space and environment. Only in such a space environment can college students who carry out the e-commerce entrepreneurship can better carry out the information transmission and technical exchanges, stimulate the initiatives of the innovative thinking and competition, and implement the entrepreneurship in a sustainable, efficient and high-quality manner. Secondly, in the technical level, firstly, teachers’ attitudes and organizational management have the highest weight, and secondly, teachers’ level and guidance skills, and finally, the entrepreneurship courses, the entrepreneurship training and the psychological counseling. The qualitative description of the conventional entrepreneurship education research often focuses on teachers’ entrepreneurship skills and entrepreneurship curriculums, which belongs to a conventional thinking pattern. But the practical quantitative research breaks this stereotype thinking. In reality, the greatest resistance to the implementation of the entrepreneurship education comes from the teachers. The conservative thinking of teachers and the disapproval of
1524
J. Bai
the e-commerce entrepreneurship education often make the entrepreneurship education unable to be effectively implemented. The famous saying “Attitude decides success or failure” illustrates the importance of the teachers’ attitude in the e-commerce entrepreneurship education. The reasonable organizational management can not only stimulate the enthusiasms of the entrepreneurship students, but can also improve the efficiency and quality of the overall system operation. It is an important essence of management, as well as in the management of the e-commerce entrepreneurship education.
3 Computer Technology Based on the Electronic Commerce Promotes the Innovative Strategy of College Students’ Entrepreneurship Education 3.1 Take the Ideological Education as a Guide to Stimulate the Entrepreneurship Awareness For students, knowledge and skills related to the entrepreneurship are indispensable, but more important is to stimulate the potential entrepreneurial awareness and the strong entrepreneurial desire. Through various forms of the ideological education such as classes, lectures and meetings, students’ entrepreneurial awareness can be stimulated, so that students can have a deeper understanding of the connotation of the entrepreneurship from the perspective of the career planning, treat entrepreneurship as a possible career choice, be more rational in making entrepreneurial choices, be fully prepared for the psychological and knowledge in the entrepreneurship, and have a sense of risks, the integrity consciousness, the market consciousness and the team consciousness.
3.2 Promoting the Entrepreneurship Through the Extracurricular Activities To start a business, we must have the spirit of the entrepreneurship and the ability of the entrepreneurship. In the entrepreneurship education, by establishing the peopleoriented guiding ideology, taking students’ subjectivity as the driving force, and taking the practical activities such as the entrepreneurship contest and the scientific and technological works contest as the means of training, college students’ entrepreneurship can be promoted. Help students to set up the ambitious entrepreneurial ideals, with the spirit of hard work, perseverance and risk-taking, so that college students gradually understand the process and the risk of the entrepreneurship,
The Validity of Computer Technologies in Promoting College …
1525
enhance the self-confidence and the social responsibility, and become the successful entrepreneurs through learning and practice.
3.3 Taking the Base Construction as the Carrier to Strengthen the Entrepreneurship Ability Faced with the fierce market economy competition environment, as college students, only the entrepreneurial awareness and the entrepreneurial spirit are far from enough, but we should also do a lot of ability and knowledge preparation. The entrepreneurial ability is the basic quality of the entrepreneurs, a core competence, a necessary and sufficient condition for the successful entrepreneurship, and also a means to realize their life ideal. By establishing the training objectives of the entrepreneurship, establishing a training system that meets the requirements of the entrepreneurship, and strengthening the construction of the entrepreneurship base, college students can be trained to have the professional, methodological and social abilities, as well as certain entrepreneurship knowledge. The construction of college students’ entrepreneurial base, whether in the government-led model, the market-driven model or the mixed model, must combine with the characteristics of the school itself and adapt to the local economic development.
3.4 Correct Selection of the Entrepreneurship Project, Direction and Mode This is an essential part of the entrepreneurship, which to a large extent determines the success or failure of the entrepreneurship. The basis of the selection needs to be considered from the market development trend, the customer groups and their own professional fields. For example, for college students, many teachers and students of the consumer groups, with the limited funds, should not choose to sell the highconsumption goods. Relatively speaking, the low-cost and unique things will be more favored by teachers and students, and more likely to succeed in the business. At the same time, entrepreneurs should focus on the commodities that need to be developed in the investment market to make a difference.
4 Conclusion Evaluation is a kind of the technical activity that makes the value judgment on the basis of the objective description of certain object’s behaviors. Scientific and reasonable evaluation of the entrepreneurship education is the internal driving force for
1526
J. Bai
the continuous development of the entrepreneurship education. At present, part of the evaluation of college students’ entrepreneurship is aimed at the entrepreneurship plan. From the pedagogical, sociological and psychological disciplines, this paper draws nutrition, analyses the problems existing in the development of college students’ e-commerce entrepreneurship from different perspectives, and puts forward specific solutions, systematically and comprehensively combining the college students’ education system with the development of the Internet. Only by constantly innovating can the relevant research on college students’ e-commerce entrepreneurship be more practical.
References 1. Zhong, Runeng. 2015. Discussion on the innovation and entrepreneurship education in colleges and universities in the transitional period. Academic Exploration (4): 152–156. 2. Zhu, Donghua, Yi Zhang, Xuefeng Wang, et al. 2013. Research on the management method of the technological innovation under the big data environment. Science of Science and Management of S&T (4): 172–180. 3. Ma, Yongbin, and Zhe Bai. 2016. The ways to construct the course ecosystem of the innovative entrepreneurship education—A case study of the entrepreneurship education in Tsinghua University. Research in Higher Education of Engineering (5): 137–140. 4. Qiao, Yang, and Hongjuan Ma. Research on the construction of the practical teaching system for the e-commerce major in colleges and universities based on the innovation and entrepreneurship education. Electronic Commerce (4): 56–57. 5. Yu, Wendan, Zihui Yang, Duan Sun, et al. 2016. Exploration and analysis of the innovative thought and the entrepreneurship-oriented teaching reform of e-commerce for applied undergraduates. Knowledge Economy (9): 158–161. 6. Zhou, Qingyuan. 2018. Multi-layer affective computing model based on emotional psychology. Electronic Commerce Research 18 (1): 109–124. https://doi.org/10.1007/s10660-017-9265-8. 7. Zhou, Qingyuan, Jing Lou, and Yifeng Jiang. 2019. Optimization of energy consumption of green data center in e-commerce. Sustainable Computing: Informatics and Systems 23: 103–110. https://doi.org/10.1016/j.suscom.2019.07.008.
Application of Internet of Things Technology in Industrial Automation Control Liyuan Chang
Abstract With the introduction of the 12th Five-Year Plan, the topic of the Internet of Things has attracted public attention. The wireless communication technology has made some successful applications in the key links of sense, transmission, intelligence, use, transportation and management. Moreover, the trend of the wireless technology entering the field of the industrial control is becoming more and more obvious. With the rapid development of the Ethernet local area network (LAN), the wireless communication has gained the recognition of the specific market by making up for the shortcomings of the wired network with its own advantages, such as no wires and strong flexibility and so on. More and more users are willing to accept the field instruments and the automated products embedded with the wireless functions. Keywords Internet of Things technology · Industry · Automation control · Application strategy How to apply the technology of the Internet of Things to the industrial automation and production and life is a big test we are facing, because the Internet of Things can not only achieve the overall goal of the energy saving and the emission reduction in China, but also change and improve the production management mode, so we can only solve this problem in order to apply the Internet of Things technology to the field of the industrial automation with the high quality and the high efficiency [1].
1 Application Background of the Internet of Things Technology in the Industrial Automation Control The information perception, identification and location are the basic layers in the development and application process of the industrial Internet of Things [2]. In this process, the RFID technology, the sensing technology and the control technology play a major role in this process, which are the main technologies of this layer. In the L. Chang (B) Shandong Xiandai College, Jinan, Shandong 250104, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_181
1527
1528
L. Chang
process of the network access and the data and signal processing, it mainly depends on the existing communication and wireless network to realize the development and application of this technology, and uploads the received data to the Internet through the connection between various devices and communication network, so as to realize the network transmission process of the information data [3]. And in this process, the management of the data transmission, the data storage and the network information and other technologies are the main technologies in this layer. The third point is that the industrial Internet of Things (IOT) technology can provide more abundant, highquality and efficient specific services for the majority of users only after the above two technologies are processed. In this process, the processing of the data uploaded to the Internet is the main technology of this layer. The technologies involved in the process of the industrial automation of the Internet of Things include three layers: the information perception, identification and positioning, the network access and the data and signal processing, and the industry applications. Among them, the perception, identification and location of the information is the basic layer in the development and application process of the Internet of Things [4]. In this process, the RFID technology, the sensing technology and the control technology play a major role in this process, which are the main technologies of this layer. In the process of the network access and the data and signal processing, it mainly depends on the existing communication and wireless network to realize the development and application of this technology, and uploads the received data to the Internet through the connection between various devices and the communication network, so as to realize the network transmission process of the information data [5]. In this process, the data transmission, the data storage and the management of the network information are the main technologies of this layer. The third point is that the Internet of Things (IOT) technology can provide more abundant, high-quality and efficient specific services for the majority of users only after the above two technologies are processed. In this process, the processing of the data uploaded to the Internet is the main technology of this layer [6]. The identification technology of the Internet of Things: Everything exchanged in the Internet of Things has its own unique global identification code, which may be its unique identification code in a specific range. This identification code may be permanent, temporary, or there may be several different identification codes on a thing. The code of the same thing may be an ID or an IP. In the technology of the Internet of Things, in the process of the barter exchange, there must be fixed devices to identify these different identification codes. Sometimes, an object may consist of several different small objects, which requires that a device that can recognize the code of these small objects be installed on the large object itself. This device should build a framework for sharing the data rules with the Internet. The architecture technology of the Internet of Things: The so-called Internet of Things architecture technology, in fact, is a kind of the interoperability relationship between the service providers and the demanders in the heterogeneous information systems. There are many ways to achieve this relationship and the most direct and effective way is to establish a sharing mode of resources, information and data between them. Under the sharing mode, the service providers and the demanders are
Application of Internet of Things Technology in Industrial …
1529
effectively linked together. However, this sharing of the resources is a non-linguistic environment sharing, in order to ensure a more open operating space between the service providers and the demanders. The key to the design of the Internet of Things is that what we call “things” and their environments must be scalable and modular, with the features of scalability and interoperability and so on. Data and signal processing technology in the Internet of Things: In any field of the production, whether in the production process or in the sales process, the data and signal processing technology of the Internet of Things are integrated into it. In the era of the Internet of Things for the industrial automation, the production automation, the sales automation, the analysis and output differentiation of all the data through the network platform and so on, on the data and signal processing technology of the Internet of Things, we still have to comply with the semantic interoperability to process and analyze all the data and information through the intelligent application of the identification devices and the application of push technology of the structured information standards and so on. Internet of Things (IOT) technology faces the difficult problem of the industrial automation. Our research shows that the Internet of Things (IOT) technology faces some technical difficulties in the application of the industrial automation. One of the key technical problems is that when we study the new sensors and the sensor devices, we have higher requirements, that is, to do further research on the miniaturization and intellectualization of the sensor technology and the hardware system, so as to deal more closely with the energy acquisition technology. Thirdly, in the field of the industrial wireless network technology, in the application of the Internet of Things technology to the industrial automation, the most critical technology is the industrial wireless network technology, which mainly includes the communication technology, the networking technology, the network basic services and the network management and planning technology. It is mainly achieved through the information transmission, the information processing and the information application technology.
2 Application of the Internet of Things Technology in the Industrial Automation The Internet of Things (IOT) technology has been applied to the production process and the industrial restructuring of the manufacturing industries in China, and has played an obvious role in promoting the energy saving and the emission reduction, improving the production efficiency, improving the product quality, the safety in the production and improving the economic benefits of the production. Therefore, the application prospect of the Internet of Things technology in the industrial automation in China is extremely broad, and the application technology in this area has become a hot technology in the application field.
1530
L. Chang
2.1 Industrial Application Direction of the Internet of Things Technology On the basis of the existing human society and the integration of various applications, through the communication and integration of things in the new dimension, we can further expand the space-time and the application fields. This is another expression we call the Internet of Things today. The Internet of Things technology is a very systematic and wide-ranging technology. Its industrial application is not only to solve the problems of the wired and the wireless networks, but also to solve the problems of the wired and the wireless networks. It is necessary to solve the problems of the application system in an all-round way. The level of the industrial development represents the level of the productivity of a country. The improvement of the industrial automation level promotes the sustainable development of the industry. In the process of the industrial development, the application of the physical network technology not only effectively improves the level of the industrial automation and guarantees the safety of the industrial production process, but also improves the management level of the relevant managers. Therefore, the relevant enterprises should strengthen the application of the Internet of Things technology, enhance the quality and ability of the relevant personnel, improve the quality and efficiency of the industrial automation, and promote the sustainable development of China’s industries.
2.2 Application of the Internet of Things Technology in the Energy Saving and the Emission Reduction Nowadays, the Internet of Things (IOT) technology has been widely used in the power, the chemical industry and other industries with the high energy consumption and the high pollution, and has played an effective role in the energy saving and the emission reduction in the process of its application. In these industries, through the application of the Internet of Things technology, we can use the sensor devices to monitor and control the electricity consumption in the production process, thus effectively playing the role of the energy saving and the emission reduction. In addition, they also set up an automatic monitoring system of the pollution sources through the Internet of Things technology to control and real-time monitor the pollutant indicators emitted from the industrial production process, providing the important data basis for optimizing the purification system.
Application of Internet of Things Technology in Industrial …
1531
2.3 Application of the Internet of Things Technology in the Product Informatization The so-called product informationization means the management of the product informationization and the understanding of the product through the information, and the purpose of promoting the product informationization is to promote the product market-oriented and more intelligent. At present, the application of the Internet of Things technology in the industrial automation not only improves the performance and function of the products and improves the value of the products, but also implements the remote control through the Internet of Things, and conducts the real-time monitoring of the surrounding situation. At the same time, it can also promote the development of the industrial informatization through the information management and inject the new force into the industrial enterprises.
3 Application and Promotion of the Internet of Things Technology in the Industrial Automation Control The Internet of Things (IOT) technology has the broad application prospects in China’s industrial field. The application of the IOT technology promotes the unmanned factories, the mechanical management and the intelligent industries. The application and research of the IOT technology is the key factor to meet these three needs.
3.1 Application of the Internet of Things Technology in the Product Informatization Promote enterprises to apply the Internet of Things technology in the product informatization, connect the Internet of Things technology with the industrial products closely, apply it to the industrial production, improve the networking and intelligent degree of the production and management links, and promote the intelligent development of the Internet of Things technology in the industrial product informatization.
3.2 Application of the Internet of Things Technology in the Safe Production At present, the Internet of Things (IOT) technology has become an important technical means to ensure the safety in the production in various fields. In the process of
1532
L. Chang
the production, the equipment of the IOT technology is established to monitor the workers, the machines and the environment of the production, and the deployment of the personnel, the potential dangers of the fault diagnosis and the location and tracking of the personnel can be timely mastered and reported in time so as to eliminate the crisis in time, alarm in time, and rescue workers in crisis in the first time, so as to solve the crisis in the shortest time to reduce the personal safety and the economic losses.
3.3 Application of the Internet of Things Technology in the Production and Manufacturing The Internet of Things (IOT) technology is currently used in every link of the production and manufacturing in various industries. The production equipment of the IOT technology is installed to control the product quality and the raw material consumption through the data collection and the production testing. In this way, the industrial production and the mechanical production can be realized, and thus an unmanned factory can be established, so as to improve the level of the production automation, the production capacity and the production efficiency, and save more capital investment for enterprises. The purpose of setting up an industrial quality control technology project based on the Internet of Things is to meet the needs of the higher economic production and the safety in the production in the field of the industrial automation. Combining the Internet of Things and the Fieldbus technology, we have developed an industrial field diagnosis and management system based on the Internet of Things with the independent intellectual property rights and provided a complete set of solutions for monitoring, analysis, diagnosis and management of the production process and the equipment for the industrial site.
3.4 Application of the Internet of Things Technology in the Business Management The application of the Internet of Things technology in the business management is mainly used in the supply chain management and the production management. In these two links, the application of the Internet of Things technology can not only reduce costs, but also improve the efficiency of the relevant staff, and also improve the efficiency of the enterprise management and the level of the management intelligence. With the development of the science and technology and the rapid popularization of the network applications, the field of the industrial automation has gradually formed a development trend focusing on the intellectualization and integration. The wireless sensing, the network integration and the remote diagnosis management are the hotspots in the field of the industrial field diagnosis and the
Application of Internet of Things Technology in Industrial …
1533
management system. The Internet of Things (IOT) is a new field which integrates the sensor, the wireless communication, the embedded computing and the microelectromechanical technologies. It is widely used in the supply chain management, the process optimization, the process monitoring, the safety production and other fields. The application of the Internet of Things technology in the field of the industrial automation and the development of the industrial field diagnosis and management system based on the Internet of Things play an important role in improving the level of the industrial automation in China.
4 Conclusion The Internet of Things (IOT) technology can informationalize products in the industry, optimize the production process, and strengthen the information management and service by using the IOT technology and the equipment monitoring technology. It can clearly grasp the production and marketing process of the entire production line, improve the controllability of the production process, reduce the manual interference on the production line, collect the production line data timely and correctly, and arrange the production design reasonably and the production progress. On the basis of the automated chemical plants, the information management and services are strengthened by using the Internet of Things technology and the equipment monitoring technology, ultimately to maximize the use of the enterprise resources.
References 1. Tong Deyuan, and Hongtao Guo. 2014. Discussion on the industrial automation control. Heilongjiang Science & Technology and Information (8): 63. 2. Liu, Ming. 2014. Application of PLC in the industrial automation control. Jiangsu Science & Technology and Information (11): 40–41. 3. Ma, Aimin, Yueming Hu, and Guanyu Wang. 2013. Application and research of the Internet of Things technology in the industrial automation. Techniques of Automation and Application (6): 117–119. 4. Wang, Zheng. 2015. Application of the remote control and the Internet of Things technology in the industrial automation control. Modern Business Trade Industry 36 (12): 103–104. 5. Kun, Zheng, and Chen Fei. 2015. Application of the remote control and the Internet of Things technology in the industrial automation control. Urban Construction Theory Research (Electronic Edition) 5 (28): 3390–3391. 6. Zhou, Qingyuan, Jing Lou, and Yifeng Jiang. 2019. Optimization of energy consumption of green data center in e-commerce. Sustainable Computing: Informatics and Systems 23: 103–110. https://doi.org/10.1016/j.suscom.2019.07.008.
The Application of Transmission Technology in Information and Communication Engineering YaoZhi Chen
Abstract With the rapid development of science and technology, China is gradually stepping into the Internet era, information transmission technology is currently in the construction, education and other benefits have been applied. The speed of information transmission is obviously accelerated, and people’s lifestyle is gradually changed by the Internet. This paper discusses the transmission technology. This paper introduces its related concepts, development status and characteristics in detail, further explores the application of this technology in communication engineering, and summarizes several typical communication transmissions means. Keywords Internet · Information transmission · Communication engineering
1 Quote Traditional information is transmitted by paper, which is slow and inaccurate. The arrival of the Internet era can well solve this problem. The use of optical fiber and wireless LAN as information transmission carriers can effectively improve the speed of information transmission. In addition, the research and development of various types of electronic products can broaden the channels for users to obtain information [1]. At present, the application of this technology in the field of communication engineering has been gradually improved. It is believed that with the development of science and technology, the development of communication engineering will be better and better.
Y. Chen (B) Sichuan Vocational and Technical College, Suiningshi, SiChuanSheng 629000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_182
1535
1536
Y. Chen
2 A Comprehensive Interpretation of the Transmission Technology 2.1 Introduction to the Concept of Transmission Technology The process of classifying information through different channels and realizing information transmission is the embodiment of transmission technology [2]. Using this technology in communication engineering, the index to measure the use of technology is the degree of reliability and efficiency. The signal transmission efficiency is affected by the channel width. Compared with the telephone line, the optical fiber channel and the satellite channel are obviously widened, and the transmitted information is also diversified [3]. At present, science and technology update very fast, channel function to get the maximum development, effectively improve the transmission efficiency. Channel multiplexing is the latest research progress of transmission technology [4]. Frequency, time and level are all objects of channel multiplexing. The first two are often used in multiplex communication.
2.2 Channel Classification Wired and wireless are two common channels, the former can be subdivided into a variety of lines, the general overhead open line can withstand up to 12 lines, compared with the high frequency cable telephone lines up to 120, transmission capacity greatly enhanced [5]. The latter is transmitted by various wave bands, including ground wave, sky wave, microwave and so on.
3 The Type of Channel Determines Its Scope of Application Modulation technology is the core of information transmission. The signal source is modulated to the corresponding frequency range, and the channel multiplexing technology is adopted to realize the fast transmission of different frequency signals. Different channels are also responsible for different information transmission frequency, in order to ensure accurate information transmission, it is necessary to grasp the channel and frequency of the corresponding relationship [6]. Optical fiber communication may become the main means of information transmission in the future. In addition, mobile communication will become an auxiliary means of transmission. Mobile communication is not limited by cables and has high flexibility. At present, transmission technology has penetrated into all aspects of society, and it is used in industrial production, military and other fields [1].
The Application of Transmission Technology in Information …
1537
4 Introduction to the Characteristics of Transmission Technology 1. Diversified functions. Electronic products are the synthesis of various technologies, which are presented with diversified functions. By integrating multiple functions, the manufacturer can reduce energy consumption to some extent and make more profits in the sales process. 2. The size of equipment is getting smaller and smaller. For example, traditional desktop computers are bulky and inconvenient to carry. As new technologies are introduced, the inside of a computer requires only a thin circuit board, which is much smaller and more powerful. The appearance of notebook computer breaks the limitation of cable transmission and makes use of wireless LAN to realize the process of information transmission. Notebook is portable and people can communicate with each other anytime and anywhere. 3. All-in-one machine: the equipment integrating various technologies and equipment is an all-in-one machine, which is also the main transmission equipment used in China’s communication engineering [2]. By completing the integration of each device, the all-in-one machine can monitor the working status of all devices in real time. By monitoring the process of information transmission, the phenomenon of repeated transmission of information and leakage of information can be effectively avoided. In order to prevent the operation failure of the all-in-one machine, the standby system is also set in the equipment. When the signal frequency, channel transmission and other abnormal changes occur, the standby system will automatically start and continue to complete the subsequent transmission tasks.
5 Introduction of Communication Engineering Related Concepts The traditional division of information transmission is rather general, electronic information engineering in the past includes a variety of information transmission engineering, communication engineering also included. With the increasing variety of transmission technologies, the development of communication engineering is becoming more and more perfect. Therefore, it is gradually separated from the field of electronic information and becomes a separate discipline. As we all know, at present, China’s operators are divided into telecom, mobile and Unicom three categories, operators use a huge network system to achieve information transmission, this process is known as communication engineering. In this project, the role of transmission technology has been given full play. In addition to the use of transmission technology, operators also need to study digital, satellite and other means of transmission, and constantly expand the scope of communication engineering. Only
1538
Y. Chen
with the cooperation of all kinds of theoretical knowledge and transmission technology, can the established transmission network be more complete and the security of information transmission be improved. At present, China attaches great importance to the development of communication engineering, and relevant departments are still improving and optimizing the communication network.
6 The Transmission Technology Included in the Communication Engineering Is Introduced in Detail 6.1 PDH and SDH Transmission Technology Digital transmission technology is often used in communication network for information transmission. PDH refers to the quasi-synchronous digital system. The transmission network has multiple nodes, and clocks are set on each node to ensure clock accuracy within the same range [3]. Due to the slight error between clocks, there will be deviation in the actual data synchronization process, so it is called quasisynchronization. Traditional telecommunication network transmission often USES PDH equipment, which can accurately realize point-to-point information transmission. With the upgrade of telecommunication network, the transmission mode using PDH equipment is gradually eliminated. In view of the above, SDH digital synchronous system is developed, namely in the SDH equipment into a number of advanced intelligent technology, with the help of a large capacity of optical fiber quickly complete information transmission process, and transmission process easy and flexible, SDH equipment on the market at present the same bit rate, and the corresponding with the same interface standard, operators in the management of transmission network is very convenient.
6.2 WDM and ASON Transmission Technology WDM refers to the wavelength division multiplexing (WDM) system, which is installed in the transmission equipment to integrate signals of different band lengths and complete their transmission on the same optical fiber. In addition, optical fiber amplification system is also set in the WDM system, which can extend the distance based on the traditional optical transmission distance and realize the long-distance transmission of signals. The abbreviation of the automatic switching optical network is ASON. The optical transmission network is the most advanced information transmission means at present, with a high degree of intellectualization, which can complete the signal transmission, conversion and other processes spontaneously. There is also a recovery algorithm within the network system, which can realize the
The Application of Transmission Technology in Information …
1539
expansion of equipment functions. The intelligent algorithm can effectively coordinate all the branch systems together, and realize the flexible control of the information transmission process. ASON can directly communicate with the optical layer, and automatically set the channel width according to the signal category, while protecting the information transmission process.
6.3 Short-Distance Transmission Technology Considering the limitation of short distance transmission, backbone transmission network is used as the carrier of short distance transmission. Pipelines and cables are the key to information transmission, often buried deep underground with warning signs [4]. Small capacity is the main characteristic of backbone transmission, backup up more convenient, upgrade the network when the complexity of low, low cost of cable management and maintenance, and cable generally will not appear a major failure. Synchronous digital system is commonly used in backbone transmission network at present. With the assistance of this system, urban information transmission speed and accuracy can be greatly guaranteed. In order to further reduce the cost of backbone transmission, the main task of relevant departments is to improve the efficiency of optical fiber resources. It is generally found in long-term practice that the switching optical network technology is integrated into the transmission network, and at the current level of signal transmission, SDH and ASON are not highly integrated in the backbone transmission, which has a great impact on the transmission stability. In order to make the signal transmission process more stable, the degree of integration of the two technologies must be improved.
6.4 Long Distance Transmission Technology SDH system is the basis of long distance transmission and its wide coverage is the main characteristic of long distance transmission. In the traditional communication engineering, the long distance transmission network only USES SDH technology. To improve this situation, the WDM system is integrated into the long distance transmission network. The fusion of the two systems will not affect the signal quality even if the number of users increases. The core of the WDM system is the optical fiber amplifier, which can amplify the signal in the optical fiber cable and improve the signal transmission distance. ASON can also be combined with WDM system to improve the intelligence level of the system and speed up the widening of information transmission channel, so as to optimize the communication network.
1540
Y. Chen
6.5 Application of Transmission Technology in All-in-One Computers High degree of integration is the remarkable characteristic of the all-in-one machine, which not only integrates the communication equipment together, but also integrates all kinds of transmission technologies together to realize the overall control of the communication network. The advantages of integrating transmission technology into the all-in-one machine mainly include: 1. Integrate various types of single board machines together, and finally integrate new devices with diverse functions and easy management. It can change the single function defect of traditional communication equipment and reduce the size of equipment. 2. Easy to manage, all the equipment is under the real-time monitoring of the allin-one machine, and all the adjustment of functions and program switching are operated on the same panel. The operation interface has been optimized in the past, and the man-machine interaction is more fluent. 3. Convenient maintenance, late maintenance and maintenance of the all-in-one machine maintenance can be, due to the improvement of the degree of integration, equipment maintenance on the professional level of staff requirements is higher. In view of the above situation, the current communication department attaches great importance to the improvement of the comprehensive quality of employees, which to some extent also improves the security of information transmission.
7 The Future Development Direction of Transmission Technology Is Discussed 7.1 Development of Current Transmission Technology in the Future 1. With the improvement of intelligence, artificial intelligence will be integrated into the communication network in the future, and the device can automatically sort out the information content when transmitting the information. For the transmission of the fault, can be timely automatic repair, and has the ability to automatically avoid external signal interference. 2. The transmission speed is faster. At present, China’s communication network is under the control of three major operators, and 4G network is the fastest. It is believed that in the future development, 5G communication network with higher transmission speed will be developed. 3. The integration degree of SDH and ASON system is enhanced to effectively enhance the security degree of information transmission process, protect user privacy, and reduce hacker invasion and information leakage.
The Application of Transmission Technology in Information …
1541
4. The degree of integration of communication equipment is further improved, and technicians continue to study the integrated circuit board, which is expected to integrate more functions into the all-in-one machine. While increasing the function of the device, the volume of the circuit board is reduced, thus reducing the volume of the device [6]. Perhaps in the future of continuous development of science and technology, human only need a small chip, can achieve information transmission.
7.2 Exploration of Optical Communication Technology This technology USES the multiplexing dimension to complete the information transmission. The dimension can be divided into many types, such as time division, wave division, frequency division, etc. The 40G PON transmission system currently combines time division with wave division to form a two-dimensional transmission system. This kind of transmission technology is mainly used for broadband access at the present stage. This technology is expected to realize multi-dimensional transmission in the future, and the transmission speed of broadband access will be greatly improved. In terms of the research of receiving port, it is possible to complete transmission on one optical fiber at the same time with 1000 wavelengths in the future, the passive transmission distance is improved to 100 km, the access of T bits is realized, the quality of information transmission is improved, and the cost of operators is compressed at the same time. WSS is a module responsible for information integration in optical communication technology. In the future, there will be more and more transmission nodes in the network, and WSS module integration function will be optimized with fast integration speed. The optical network construction process will be more efficient and flexible, and information transmission will be smoother.
7.3 The Arrival of the Era of Big Data According to the scientific prediction, the world data volume will exceed 40ZB in 2020. The arrival of big data era is the result of the continuous advancement of information technology. The data volume keeps growing, the reasons include: the Internet gradually covers the whole world, e-commerce provides more digital services for users, the data sensor function is constantly optimized, and the storage amount of transmitted data in the cloud keeps increasing. Information implanted in many home products is purely chips. Almost everyone is exposed to data transmission in daily life. With a large population base, the data volume grows rapidly. In addition, in order to promote the research process of new technology, a large number of experiments are simulated in the calculation, and the amount of data generated by countless experiments is huge. All these factors will accelerate the arrival of the era of big data.
1542
Y. Chen
8 Conclusion To sum up, this paper introduces the application of transmission technology in communication engineering. Firstly, the concept, development status and characteristics of the technology are summarized, and the evolution process of communication engineering is briefly described. Secondly, the specific application of the technology in communication engineering is introduced in detail. Finally, focusing on the field of communication, the future development of transmission technology is prospected. It can be seen that in the transmission process of communication network, the core is the transmission technology. The advanced degree of this technology will be constantly improved, and the corresponding communication network will also be optimized.
References 1. Shen, Yixiao. 2017. The application of transmission technology to information and communication engineering. Information and Communication (2):232–233. 2. Gao, Aihui. 2016. Application analysis of computer information data transmission technology in communication engineering and office automation. Electronic Testing (13): 93–99. 3. Niu, Chao, Yifang Dong, and Bo Yan. 2016. Effective application of transmission technology in information and communication engineering. Information Construction (5): 377–381. 4. Liu, Bin, and Chuanhui Du. 2016. Application and development direction of transmission technology in communication engineering. Western Leather (14): 3–7. 5. Li, Yu, Chunxiang Wu, Chunzuo Hu, et al. 2017. Research on the application and development direction of wired transmission technology in communication engineering. Information Recording Materials (7): 109–110. 6. Wu, Yuanhui. 2016. Research on the application and future development trend of communication engineering transmission technology. Science and Technology Innovation (21): 179.
The Financial Data Prediction System Based on the Recurrent Neural Network Yixin Deng
Abstract This paper introduces the breakthrough achievements of the artificial intelligence in recent years, designs the system on the basis of RNN related technology, and then demonstrates the predictive effect of the system through the experimental group, and evaluates the predictive accuracy of the system by using the deep learning related evaluation algorithm. The experimental evaluation results show that the scheme of using the recurrent neural network to learn and analyze historical data and using its model to predict the future trend of the financial data has high reliability and accuracy. Therefore, the in-depth learning has great potential in the field of the financial forecasting. Keywords Recurrent neural network · Financial data · Prediction system · Research and application The financial forecasting aims at analyzing the financial historical data, constructing the forecasting models and predicting the future data trends [1]. The author systematically innovatively combines the latest in-depth learning results with the financial forecasting, and proposes a method of predicting the changes of the financial data by using the recurrent neural network.
1 The Connotation of the Recurrent Neural Network The recurrent neural network (RNN) is a kind of the recursive neural network, which takes the sequence data as the input, and conducts the recursion in the direction of the sequence evolution, and all the nodes (recurrent units) are linked by chain. The research on the recurrent neural networks began in the 1980s and 1990s, and developed into an important deep learning algorithm in the early 21st century. BiRNN and LSTM are the common recurrent neural networks [2]. Y. Deng (B) Central South University, Changsha, Hunan 410012, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_183
1543
1544
Y. Deng
The recurrent neural network has the characteristics of memory, the parameter sharing and the Turing completeness, so they can learn the non-linear characteristics of the sequences with the high efficiency. The recurrent neural network has the important applications in the natural language processing (NLP), such as the speech recognition, the language modeling, and the machine translation and so on. They are also used in various time series prediction or in combination with the convolutional neural networks (CNN) to deal with the computer vision problems [3]. The simple recurrent network (SRN) is a recurrent neural network consisting of only a set of the chain connections (single hidden layer). The recurrent units are connected by the Elman network and the closed-loop connection is the Jordan network.
2 Analysis of the Types and Characteristics of the Financial Data The financial data generally has the characteristics of “flow data”, which needs to be processed quickly in a short time [4]. Compared with other industries, the finance has the characteristics of the close logical relationship, the high real-time processing requirements, and the strong demand for display, and usually requires the following key technologies. The financial data can be divided into three categories: the structured data, the semi-structured data and the unstructured data [5]. The structured data sources come from the operational data warehouse (ODS) and the data warehouse (EDW) of financial enterprises. EDW provides analysis and decision-making services for enterprises. ODS mainly implements the data integration, sharing and quasi-real-time operation monitoring functions. The application of Hadoop and other components can migrate and save the historical data several months or even years ago. Under the distributed storage structure, the storage and calculation of the structured data can be greatly improved [6]. It can analyze the massive offline data offline, maximize the advantages of the offline data, and provide the most comprehensive data support for the financial users to create the three-dimensional user portraits. The data analysis technology includes the data mining, the machine learning and other artificial intelligence technologies, mainly used in the user credit analysis, the user clustering analysis, the user characteristics analysis, the product correlation analysis, and the marketing analysis and so on. The financial system requires the high security, stability and real-time performance, as well as the high computing and processing capacity for the big data. The data management technology includes the relational and the non-relational data management technology, the data fusion and integration technology, the data extraction technology, and the data cleaning and conversion technology. The financial industry requires the high real-time data processing capability, and needs the flexible data conversion configuration and the task configuration. The data processing technology includes the distributed computing, the memory computing technology, and the stream processing technology and so on. Through
The Financial Data Prediction System Based on the Recurrent …
1545
the new data processing technology, we can make more effective use of the hardware and the software resources, reduce the IT investment and the maintenance costs and the physical energy consumption of colleagues, and provide more stable and powerful data processing capabilities. The data presentation technology includes the visualization technology, the history flow display technology and the spatial information flow display technology, which is mainly used in the financial product health monitoring, the product development trend monitoring, the customer value monitoring, and the anti-money laundering anti-fraud early warning and so on.
3 Feature Extraction of the Financial Data Because the financial analysis has the characteristics of the huge data volume, the fast data change, the large window and the wide sliding range (referring to more data segments and longer intervals needed to be input in the training model process), it is necessary to use the LSTM technology for the data training instead of the traditional RNN.
3.1 Construction of the Decision Tree Because the attributes of the financial time series data (such as the stock and the securities index) considered in this paper belong to the discrete attributes, ID3 is used to construct the decision tree. The construction process is as follows. The first step is to divide the data into the training set and the test set. The training set is mainly used to analyze the data to generate the decision tree, and the test set is used to test the correctness of the decision tree. The second step is to calculate the information increment of all attributes, and select the attribute with the largest information increment as the root node. The steps for calculating the increment of the attribute information are as follows: The information expectation value I of the given training set classification data is calculated. The training set is denoted by D, which is divided into k categories, i.e. k subsets: D1, D2, D3… Dk. The d is the total number of the data in the training set, and di is the number of the data belonging to Di. The information expectation for the training set classification is I: The information expected for each value of the attribute Ai is I (A = aj), J = 1, 2, 3… M. Let A be an attribute of the data set, and the values of A are a1, a2,… am. The am represents a value. The dj is the number of the values contained in aj, and dij is the corresponding number belonging to the subset Di when A = aj. The conditional probability that the instance belongs to Class i (Di):
1546
Y. Deng
The information entropy (A) of the attribute A is calculated. Calculate the information gain (A) of the attribute A. The amount of the information provided by the attribute A for classification, called the information gain of attribute A, is denoted as Gain (A), then: Gain(A) = Entropy(A)-I The third step is to construct the decision tree based on the information gain. The decision tree is constructed by choosing the root node with the greatest information gain. Branches are established by the root node attributes under different conditions. The fourth step is to use the recursive method to select the attributes with the greatest information gain as the sub-nodes for the subsets of each branch. Through the fuzzy C-means clustering algorithm, the original data set is preprocessed, and the redundant data is filtered, and the fuzzy partition of the original data set is obtained. On this basis, the rules of the interest are obtained by using the fuzzy association mining algorithm, so as to realize the optimal data mining. The experimental results show that the proposed method has the good partitioning performance for different data sets, the low time complexity and the high mining accuracy.
3.2 Data Visualization Technology For the training process of the neural network, the visual graphics are made. The linear graphs are used to represent the original data, the training prediction data and the test prediction data respectively. The experiment uses the Python Data Analysis Library—Pandas for the data analysis, or the Web technology to visualize the data into the browser’s Canvas.
3.3 Data Crawler Technology The recurrent neural network model training is infinite. The internet finance will generate the new commodity prices, the transaction volume and other data every day. The system needs to update the historical data in the database regularly in order to achieve the better prediction results.
The Financial Data Prediction System Based on the Recurrent …
1547
4 Financial Data Prediction System Based on the Recurrent Neural Network The implementation of the RNN-based neural network requires loading the data crawled from the Internet and removing the invalid data. Before training, it is necessary to separate the training data from the simulation prediction data, as well as the window data and the prediction target data in the training process. Among them, the window data is a two-dimensional array and the target data is a one-dimensional array. In the evaluation model stage, the target array is compared with the prediction array, and the evaluation results are given.
4.1 Optimal Crawler Algorithm The crawler module adopts the optimal crawler algorithm, which requires that only the commodity data within the specified range can be crawled, so as to minimize the amount of the redundant data. Assuming that the data types and the data quantities have been standardized, the optimal crawler algorithm is used to select the specified commodities, the commodity attributes and their data types, and to crawl and store them. The following key codes are used to implement the algorithm: Read the database qualified goods. Define an array of objects: commodity []; Commodity [] = SQL query (select * from goods); Traversing commodity [] in commodities Data = waiting for execution: crawler (commodity); If (! Data | | Data. Length = 0) Skip the crawler; else waits for execution: save (data); Return, end; Implementation of the crawler function. Define the address: address = specify the optimal address; Definition function: asynchronous: crawler (commodity) Data = SuperAgent (address). query (commodity. API number). httpGet (); return data; SuperAgent appears in the algorithm as HTTP access tool of Node.js. and the SQL database query is driven by MySQL database.
4.2 Incremental Reptilian Strategy The crawler module adopts the incremental crawler, which requires that the duplicate data cannot be crawled. Therefore, it needs to implement a re-access strategy for the
1548
Y. Deng
crawler system, and it is incremental rather than reset the mode. To achieve the incremental data comparison, the key codes are as follows: Array: Local data volume = SQL query (“select count (*) as count) from futures where g_id=?order by date asc”, g_id); Array: API data [] = crawler (commodity); Variable: API data volume = API data [].Length; Variable: number of updates = 0; if (local data == API data) skips the crawler; else traversal data in API data[] If (the number of loops is less than or equal to the amount of the local data) skip saving; else waits for execution: save (data); Update the number of entries; End; In the above code, the amount of the API data and the local data is the integer data. If the two are equal, it means that the data in the local database has been updated and skipped the crawler. If the difference is found, the data will be inserted and the API data array will not be saved until the number of the iterations is greater than the local data, thus avoiding the data duplication. The algorithm can be summarized as follows: API data quantity - Local data quantity>0, Crawl API data volume - Local data volume0.05), and there was no statistical significance. In addition, 9 nurses participated in the nursing work [2]. All nurses were female, aged 20–42 years, with an average age of (28±2.3) years.
1.2 Methods The patients in the control group adopted the routine nursing management mode in our hospital, and combined with the nursing quality management standard specified in the “Nursing Work Management Standards” to carry out the quality control afterwards [3]. This mode is a typical and passive management mode to find out problems and solve problems [4]. The observation group adopted a new model of the nursing risk management, and implemented the corresponding nursing management according to the requirements of the nursing risk management in the new edition of “Nursing Management Standards” [5]. The first is to build a three-level quality control network, which needs to be combined with the specific conditions in the heart disease area. That is to say, the nursing group is mainly composed of the head nurses, the nursing team leaders and the responsible nurses. The first level is the responsible nurses, which implement the white control, and the second level is responsible for the supervision by the head nurses, while the third level is responsible for the supervision, and the third level is responsible for the implementation of the monitoring, so as to carry out the quality management mode, directly replacing the previous adopted full-time management with exclusive control. The second is to adopt PDCA to continuously improve and optimize the service process, strictly combine with the disciplinary procedures, and on this basis, combine PDCA to implement the quality management. Specifically, according to the plan, implementation, inspection and treatment of several steps, through such a cycle process, promote the continuous improvement and perfection of the level of the nursing quality. For example, formulate the appropriate instructions for the use of the high-risk drugs for patients, and in the process of the real use, adopt the double checking method to urge patients and nurses to conduct the double audits. Formulate the clear nursing risk indicators within the department, specifically for the drug use errors, the drug exosmosis and patients’ transfusion reactions, and falls and bleeding errors and other aspects. Thirdly, it is necessary to strengthen the training of the nursing staff’s professional skills, and to fully combine the differences of
Application of the Internet-Based Remote Monitoring …
1585
the nursing staff’s post level, responsibility and authority and so on, to formulate a number of different levels of the nursing capacity training programs specifically for this purpose, so as to effectively enhance the professional skills and quality control abilities of the nursing staff.
1.3 Criteria for Determination The incidence rate of the adverse events is assessed according to the basic nursing quality index, and the evaluation index of the nursing quality in the department is constructed to calculate the incidence rate of the adverse events, which is mainly handed over to the nursing staff on duty to fill in and make statistics. The satisfaction evaluation is mainly carried out according to the unified satisfaction scoring standards formulated by the department. The specific indicators include the operation level of nurses, their communication skills, their nursing service attitude and their basic nursing situation and so on, up to 30 items of the evaluation contents. The full score is 100 points, specifically by the head nurse on a monthly basis, with the good statistics of the average score of two groups of patients. The complaint rate of patients, mainly set up the corresponding registration form, specially used to accept patients’ opinions and suggestions on the nursing work, with thus the statistics of the total number of the nursing complaints of the two groups of patients.
1.4 Statistical Methods In this study, the SPSS 19.0 statistical software was used to process the data. The measurement data were expressed as “x±s”, and the t test was adopted. The counting data were expressed by the percentage (%) and the difference was statistically significant with P < 0.05 by the ×2 test.
2 Application of the Internet-Based Remote Monitoring in the Cardiac Nursing Patients With the development of the computer network and the modern communication technologies, the telemedicine has gradually moved from concepts to applications, from the theoretical research to the practical technology and the system research and development.
1586
Z. Huang and X. Li
2.1 Overview of the Internet-Based Remote Monitoring System The telemedicine monitoring system consists of two parts: the remote monitoring system and the telemedicine application system. The remote monitoring system includes the telemedicine desktop software and the medical monitoring equipment, as well as the zigBee wireless communication technology. The telemedicine application system includes several subsystems: the remote diagnosis, the remote consultation, the remote popular science education, the remote registration, the expert consultation, the information service, the online inspection, and the system management. This telemedicine application system adopts the B/S architecture. Use the ecommerce platform to integrate various systems, integrate the applications, with the single sign-on, and the unified access. Integrate the advanced network video conferencing system to provide the high-quality network video and audio for the remote consultation, the remote teaching, the remote medical consultation, the remote conference, the live operation, and the medical record discussion and so on. Video pictures are clear, delicate, smooth, full and real, with the video and audio synchronization, supporting the efficient desktop, the program sharing and the collaborative annotation. Integrate the PACs system, and realize the remote image access based on DICOM, to provide the strong support for the remote consultation. Integrate HIS, the electronic medical record, the physical examination and other systems, and the expert consultation can access patient’s inspection report, the electronic medical record, and the physical examination report and so on. Integrate the ECG system, and realize the remote ECG diagnosis, the multi-center supporting multiple centers and the sub-centers, with the way of education of one point to multi-point teaching. This telemedicine monitoring system breaks through the limitation that the original telemedicine system only has the function of the remote diagnosis and treatment, and integrates the function of the home monitoring. The home monitoring system is used to provide the home health care and the patient remote care services. It realizes the transmission of the high-definition voice, the video and the human physiological signal data. The acquisition of the physiological signal is completed by the sensor installed with the wireless zigBee module. This paper provides a simple system composition. The videophone, the physiological signal acquisition/transmission device, the video communication and the physiological signal transmission can share the same communication line at the same time. The telemedicine monitoring system is also composed of the remote monitoring desktop software and the medical sensor nodes connected with the zigBee communication module to form a miniature home monitoring network. The central processor in the sensor node controls and collects the data for the life indicator sensor that needs to be monitored. The data is transmitted to the ZigBee wireless communication module connected to the sensor through the RS232 serial port. The data is sent to the monitoring embedded terminals (or the PC devices) equipped with the remote monitoring software through the wireless module (the terminal device is also connected with a zigBee communication module outside the serial port or USB port). Block is
Application of the Internet-Based Remote Monitoring …
1587
responsible for receiving the data, and the monitoring terminal device can transmit the data to the telemedicine monitoring center through the Internet network or to designate the medical personnel’s mobile phones through the external 3G module of the terminals. Professional medical personnel can observe the data statistically and provide the necessary consultation services to realize the telemedicine monitoring and diagnosis.
2.2 Psychological Support Nurses should be good at the emotional communication with patients, establish “listening” with eyes, use “conversation” with understanding, often give patients care and bath for patients, foot massages, and back massages and so on, so as to enhance nurses’ and patients’ feelings, and timely observe the changes of the illnesses which cannot be shown by the monitor, so as to be early discover the needs of patients and solve them in time to alleviate the pain caused by the problems that cannot be solved but to lose confidence in the treatment and produce despair. This negative emotion will affect the recovery of the body. Explain that patients in the monitoring and treatment should use 3 to 5 kinds of the monitoring instruments and treatment equipment, and the whole body is constrained by many catheters and wires, so that patients have a feeling of the forced lie-in and binding, and their physical activities are limited to produce tension and pressure. Patients often complain that they dare not move and are afraid of the tube coming out. Although the monitoring circuit and the pipeline can not change the patient’s sleeping position, the nurses should master the knowledge about the use of the instrument and the matters needing attention, explain the necessity and safety of using the instrument to the patients, and reduce the pressure and anxiety of the patients. In addition, we should often help patients to change positions, which can help to reduce the discomfort caused by the monitoring equipment.
2.3 Respiratory Monitoring The respiratory system is one of the main complications after the open heart surgery under the cardiopulmonary bypass. The incidence of the respiratory system is about 15–60%. The incidence of children after the open heart surgery can reach 67.4%. It can become the main cause of death after the open heart surgery. The main measures to ensure the early recovery of patients are to instruct patients to carry out the respiratory training and strengthen the respiratory tract nursing. The early postoperative patients are not fully awake, and the ventilator is often used to assist their breathing to ensure the gas exchange. When necessary, 0.45% sodium chloride was used to humidify the airway. The sterile technical operation was strictly carried out during the sputum suction. When the patient is conscious, the circulation is stable, and the blood gas
1588
Z. Huang and X. Li
analysis results are satisfactory, the cough reflex is normal and the handshake is strong, the endotracheal intubation can be considered. After the extubation, raise the head of the bed by 30° and continue to inhale oxygen at low flow rate to guide the effective cough, expectoration and deep breathing training. Observe the oxygen saturation closely.
2.4 Nursing Care of Patients with the Ventilator After the Operation Adjustment of the ventilator parameters: All the 21 patients used the ventilator after the operation. Nurses adjusted the parameters of the ventilator according to the patient’s conditions, ages and severity. Adult range: the tidal volume 6–10 ml/kg body weight, inhalation to breathing: 1:1.5, the respiratory frequency 10–14 times/min, and the inhalation oxygen concentration 0.8–0.4. Children range: the tidal volume 10–15 ml/kg body weight, inhalation/expiration 1:1.6–1.8, the respiratory frequency 10–20 times/min, and the inhalation oxygen concentration 1.0–0.4. Observation points when using the ventilator are to observe whether the ventilator is synchronized with the patient. The range of the chest fluctuation, the color of the lips and the nail beds, the degree of the pulmonary relaxation and contraction were observed, and the signs of the brain hypoxia such as the irritability or the indifference of their expression were observed. Listen. The respirator will emit the rhythmic sounds in its work, such as the ventilator or the air bag leakage, the sputum accumulation in the trachea, the trachea pressure, the water accumulation in the ventilator pipeline, and the insufficient pressure of the ventilator air pump and so on. When malfunctions occur, the abnormal sounds and alarms will appear, which should be checked immediately and handled promptly. Closely monitor patients’ heart rate, blood pressure, breathing, electrocardiogram, central venous pressure, urine volume and regular blood gas analysis in order to adjust the ventilator parameters in time. The blood gas analysis should be carried out in time after 15 min of the mechanical ventilation and when the condition changes. The routine monitoring should also be carried out every 2–6 h when the condition is stable. Nursing care of the ventilator heating and humidification: Through the ventilator heating and the humidifying tank, the gas heating should be maintained at 32–36 °C, and the relative humidity should be above 60%, so as to protect the airway mucosa and reduce the body’s oxygen consumption. In addition, nurses should strengthen heating and humidifying tanks and the disinfection of the indoor air.
Application of the Internet-Based Remote Monitoring …
1589
3 Conclusion In the past, the conventional nursing management mode was used in the heart ward. This kind of the management mode is a typical one to find out the problems and solve them in time. In the entire management process, it seems too passive to cure the symptoms without curing the root causes, so the management effect is not very ideal. The application of the nursing risk management model is a brand new management model. Specifically, through the establishment of the corresponding supervision and the quality control standards, the implementation of the non-punitive adverse event reporting system, through the statistics of the adverse event reports, the specific causes and consequences of the whole event are summarized and analyzed. Then on this basis, the corresponding management measures are formulated to promote such problems to be fundamentally solved, and ultimately to achieve a significant improvement in the quality of the nursing. In this study, patients in the control group adopted the routine nursing management in our hospital, while patients in the observation group adopted the new nursing risk management model. The results showed that the incidence of the adverse events and the rate of complaints in the observation group were lower than those in the control group, and the satisfaction of the observation group was significantly higher than that of the control group, and the difference was statistically significant. In conclusion, the application of the nursing risk management in the management of the nursing quality indicators in cardiac wards has a very significant effect, so it is worthy of the clinical application and promotion. Acknowledgements Project of Henan Traditional Chinese Medicine Administration: Research on the Application Effect of the Acupoint Hypotensive Exercise Combined with Five-Element Music Therapy on the Community Mild Hypertensive Population, No. 2016ZY2096.
References 1. Xue, Yunying. 2016. Study on the application value of the psychological nursing in the prenatal fetal heart rate monitoring. Chinese and Foreign Medical Research 8: 69–72. 2. Xu, Fang, and Zhiling Zheng. 2016. Effect of the Internet+nursing care on the pregnancy outcome in patients with the hypertensive disorder complicating pregnancy. Nursing Practice and Research 24: 133–135. 3. Society of Perinatal Medicine, Chinese Medical Association. 2015. Expert consensus on the application of the electronic fetal heart rate monitoring. Chinese Journal of Perinatal Medicine 7: 486–490. 4. Wan, Xiaoqin, and Zhihua Liu. 2015. Clinical application of the remote fetal heart rate monitoring in the high-risk pregnancy. Chinese Journal of Birth Health & Heredity 1: 64–71. 5. Rubi, He, Yuntao Wu, Huazhang Miao, et al. 2016. Implementation and consistency evaluation of the mobile remote fetal heart rate monitoring based on the Internet. Chinese Journal of Women and Children Health 1: 5–11.
Design of the Innovative Teaching Platform for College English Linguistics Teaching Based on the Network Technology Qinyuan Hui
Abstract As a compulsory course for English majors in colleges and universities, English linguistics is of great significance to English majors in colleges and universities. However, as the English linguistics curriculum itself belongs to theoretical teaching, the teaching process requires the two-way interaction between teachers and students, so the teaching effect is not good. College English linguistics takes the cultivation of students’ comprehensive abilities to use English as the premise, and emphasizes the cultivation of students’ listening and speaking abilities to help students transmit the accurate written and oral information in the process of the social work and communication, thus improving students’ English levels and preparing for their future international communication. Keywords Network technology · College English linguistics · Teaching innovation · Teaching platform · Design and research As a compulsory course in the training program for English majors, English linguistics aims to stimulate students’ interests in the linguistic research and improve their English learning abilities by systematically imparting the modern English linguistic knowledge. It is closely related to phonetics, pragmatics, thesis writing and other disciplines, and provides the theoretical basis for other disciplines.
1 The Background of the Design of the Innovative Teaching Platform for College English Linguistics Based on the Network Technology According to the survey, the teaching situation of the English linguistics in colleges and universities in China is not optimistic nowadays. There are mainly the following aspects. Firstly, the teaching mode of teachers is rather stereotypical, and the content Q. Hui (B) Zhengzhou University of Industrial Technology, Zhengzhou 451100, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_189
1591
1592
Q. Hui
of the teaching is very single and the mode is fixed, the main teaching methods are outdated and lack the innovative consciousness, which makes students not interested in learning English. Secondly, the contents of the textbooks used by teachers need to be reformed. With the advent of the new curriculum reform, although the contents of the textbooks of English linguistics in colleges and universities have basically been improved, in fact, they still cannot meet the needs of students and our society, and the knowledge system is not perfect. Finally, the evaluation process is based on a single strategy, which only pays attention to the final students’ achievements but does not pay attention to the evaluation of students in the learning process [1]. As a result, the students are only studying dead, but their ability to use English is very poor and their knowledge is narrow. Teachers have one-sided knowledge and theory. In the past teaching process, teachers often pay attention to the level of the professional knowledge, the longterm neglect of the theory of education and the improvement of the psychological level. This is reflected in the actual teaching process where teachers always pay attention to the process of teaching English linguistics knowledge by themselves, ignoring students’ acceptance of the knowledge they impart, lacking communication and interaction between teachers and classmates, and failing to give full play to students’ autonomy [2, 3]. The practical knowledge has not been improved, and teachers have no sense of cooperation. In the daily teaching process of English linguistics in colleges and universities, there is a lack of communication between teachers and students, and the improvement of the English ability often depends on individuals, which has seriously hindered the renewal of the knowledge and the improvement of the classroom effect. Therefore, it is necessary to form a learning team in the process of the teaching and discuss the actual teaching process, which can also make the syllabus revised [4, 5]. The process of our teaching is not related to the reality, which violates the teaching objectives. The aim of training students’ learning abilities is clearly stipulated in the syllabus. In the actual teaching process, the strong theoretical nature leads to the expansion of the amount of the information in the teaching contents. Secondly, due to the limitation of the classroom time, teachers can only describe the theories abstractly in the daily teaching process, and cannot achieve the expected teaching objectives.
2 Design Value of the Innovative Teaching Platform for College English Linguistics Teaching Based on the Network Technology It is necessary to apply the network technology in the teaching of English linguistics. Through the network technology, we can actively arouse students’ interests in learning English linguistics, which to a certain extent promotes the improvement of students’ learning efficiency, enriching the teaching information and improving
Design of the Innovative Teaching Platform …
1593
the teaching effect. In the process of the teaching, linguistics teachers can actively mobilize students’ hearing and vision through the use of the network technology, which enriches the amount of the information they receive. At the same time, the use of this assistant teaching technology can also promote the realization of the teaching effect of English linguistics. Compared with the traditional “inculcation” teaching method, teachers can make full preparations for the teaching by making courseware in advance and collecting the relevant video data before using the network technologies. In the process of our teaching, teachers will release the knowledge points and videos prepared before, which will greatly improve the teaching efficiency. At the same time, they can also actively mobilize students’ interest in learning English linguistics, so that students can learn the relevant knowledge in a relaxed and pleasant classroom atmosphere. Stimulate students’ learning initiatives. In the process of the college English linguistics teaching, through the application of the multimedia, we can also actively mobilize students’ interest in learning, fully embody students’ subjectivity in the teaching process, and help students to cultivate their awareness of the English language learning, which is mainly embodied in the following points. First, through the network technology, we can more vividly teach the relevant knowledge. In the process of the teaching, teachers can output knowledge by means of texts, sounds and images, which are conducive to students’ understanding of the relevant knowledge points, mobilizing students’ enthusiasms in learning English linguistics, and promoting the cultivation of students’ habit of autonomous learning. Secondly, students can get the teaching materials used by teachers. In the process of the multimedia application, students can copy the courseware and the related materials used by teachers to facilitate the after-class learning, so that students can consolidate the classroom knowledge and practice after class, thereby further improving the efficiency of students’ learning and promoting the overall development of students. Enrich teachers’ knowledge system. Through the analysis, we find that English linguistics is not a relatively independent discipline. Its most prominent feature is its strong cross-cutting. English linguistics is closely related to other disciplines, especially in the development history, customs and cultural background of the Englishspeaking countries. From this we can see that the teaching of English linguistics requires more teachers. However, the fact is that some college English linguistics teachers have relatively narrow knowledge and little knowledge of the cultural knowledge involved in English linguistics, which is also one of the important factors that cannot improve the teaching quality of English linguistics. Through the application of the network technology, we can solve this problem. Teachers can make students accept the maximum amount of the information content, and especially deepen their understanding and mastery of the learning contents by collecting and sorting out all aspects of the knowledge before class and by combining the multimedia broadcasting and explanation in class.
1594
Q. Hui
3 Design of the Innovative Teaching Platform for College English Linguistics Teaching Based on the Network Technologies The emergence of the computer and the network technology makes this teaching method more operable. In today’s society, the use of computers and networks has been widely popularized, and the information technology has penetrated into the social life, and education is no exception. The computer and network technologies have greatly promoted the innovation of the educational ideas, the teaching methods, and the educational management mode and so on, and made many ideas of the teaching reform better realized. By using the opportunities brought by the development of the multimedia and the network technology, a new teaching mode is introduced to improve the original single classroom teaching mode, in which teachers mainly teach. In the new teaching mode, the modern information technology, and especially the network technology are adopted, which make the teaching interactive, individualized, active and free from the limitation of the time and the place.
3.1 Functions of the Network Teaching Platform The network teaching platform has the powerful functions, enabling teachers to effectively manage the courses, produce contents, generate homework and enhance interaction between teachers and students, thus assisting teachers to achieve important goals related to the teaching, communication and evaluation. Taking the blackboard teaching platform widely used in colleges and universities at home and abroad as an example, the platform provides solutions to various potential problems in the English teaching. First, support the teaching process in an all-round way. Through the network teaching platform, teachers can organize and manage the teaching contents, such as editing courseware contents, correcting homework, organizing the online learning, discussing and answering questions, and conducting the statistical analysis of students’ learning situations. Students can choose what they need to learn, arrange personal learning plans, complete and submit the homework, participate in the online assessment, and collaborate and communicate through the communication tools provided by the system. The second is the strong communication and cooperation functions. Through the network teaching platform, students can communicate with each other and cooperate with groups, which can effectively improve the teaching effect. As an online communication tool, the discussion area can be used to record and organize students’ conversation contents, and the conversation can be organized into a topic discussion. In the discussion area, the corresponding forums can be created for each course, and the multi-topic discussions can be realized.
Design of the Innovative Teaching Platform …
1595
3.2 Design of the Network Teaching Contents A good teaching network system platform is a powerful guarantee for the successful development and teaching effect of the network curriculum teaching. The network teaching platform of English linguistics designed by the author based on the actual situation of the university is closely related to the research-based teaching, namely the question-answering discussion area and the research-based teaching area. First, answer questions and discuss them. The activities of the teaching and learning extend from the classroom to the network platform, which is conducive to the construction of the student-centered education model and conforms to the learning law of students’ independent inquiry. The network course discussion breaks the traditional mode of the unbalanced dialogue between teachers and students, highlights the main role of the learners in the learning process, and makes teachers change from instructors to guides. In the online course discussion area, students can not only participate in the course discussion and express their learning impressions, but also ask the teachers questions by e-mail on the course-related issues. Because of the discussion carried out in the network, both teachers and students become participants in the discussion. They are in an equal position and interact with each other equally. This breaks the single model in the traditional classroom discussion that “teachers ask questions, and students answer”. In the process of the interactive communication, teachers can give full play to the role of the intermediary and guidance. Students can have two kinds of discussions in the course discussion area: the spontaneous discussion and the thematic discussion. The spontaneous discussion is mostly related to their own learning perception and experience. For example, many students talk about the experience or harvest of learning linguistics and reflect on the curriculum itself, learning contents and learning methods in the process of learning linguistics. These reflections of students are worthy of attention as the curriculum feedback. The thematic discussion is to supplement the classroom teaching contents by means of the integration of the network resources and participants’ experience, to further explore the theory learned, and to make the theory live by thinking about the practical problems, so that students can really feel the role of the knowledge learned in practice, thereby enhancing their interests in learning. First of all, compared with the traditional classroom teaching, the online discussion creates a real communication environment. Students enjoy a high degree of freedom on the platform of the online discussion, and can discuss topics of interests to them. This stimulates students’ communicative needs, so that they can participate in the teaching more actively. Secondly, the network platform creates a more relaxed learning environment, which makes up for the shortcomings of the traditional classroom discussion. At the same time, because students discuss topics of interests to themselves, discussion becomes the active learning. Under the guidance of the teachers, students actively communicate with others and use the existing knowledge independently, so as to realize the self-learning and build a new knowledge structure.
1596
Q. Hui
3.3 Focus on the Teaching Research and Innovation In this section, students participate in the teaching process in the form of the learning groups. They are required to participate in different teaching practices. These activities include that the teachers assign the information inquiry assignments. Under the guidance of the teachers, students collect information in different ways, such as from the academic databases or the web search engines in libraries, or arrange the information query assignments, such as looking for the background information of the literature authors, to find the relevant literature on a topic. Through the above work, students can not only grasp the inquiry method of the research materials, but also make up for the shortcomings of the introduction course of linguistics, and cultivate students’ ability to acquire the knowledge. Data collation: Students collect the information under the guidance of the teachers, and judge its value synthetically. The conclusions drawn from the judgment are discussed in groups. Paper writing: Teachers first design topics for each team, or let students participate in the topic design. Topics can be the unit topics or the English language topics of interests to students. After completing the thesis, the students communicate with each other in groups, review each other and share their writing experience. Subject research: Teachers should arrange some research topics according to the textbooks. The contents of the research should be based on the relevant theories they have learned to analyze the life language concretely. The research teams present the research results in the form of the courseware and submit a research report after the presentation.
4 Conclusion Our research-based teaching practice in English linguistics on the web-based teaching platform is based on the following understanding. The research-based teaching concept can fit in with the web-based teaching platform. The basis of this understanding is that the research-based teaching concept emphasizes the cultivation of learners’ critical thinking and creative thinking, and enables learners to master the ability of the independent thinking and the lifelong learning through a series of links such as raising, analyzing, discussing and solving problems, and reflecting on and evaluating problems.
References 1. Jing, Zhao. 2015. The construction of college students’ autonomous learning platform for foreign languages based on the information environment. Research and Exploration in Laboratory 4: 242–245. 2. Yin, Liang, and Peng Zhu. 2016. Research on the construction of the information platform for the practical teaching in colleges and universities. Fujian Computer 32 (10): 36–39.
Design of the Innovative Teaching Platform …
1597
3. Liang, Yuchun. 2013. Research on the English explicit pragmatic teaching model based on the information platform. Electronic Test 8: 188–189. 4. Yu, Wang. 2014. The practice of the hierarchical English teaching in colleges and universities from the student-based perspective. English on Campus 10: 41–47. 5. Wu, Yulun, and Zhe Li. 2010. On the cultivation of college English autonomous learning ability under the network environment. Journal of Shenyang Normal University (Social Science Edition) 1: 117–119.
The Application of Big Data Analysis in College Computer Education Zili Jiang
Abstract The big data analysis refers to the analysis of the large-scale data, searching for patterns, relevance and other useful information in the process of studying the large amounts of the data, which can help the demanders to better adapt to the changes and make more wise decisions. With the arrival of the era of the big data, colleges and universities begin to analyze and study the subject, which also brings great opportunities and challenges to the computer professional education. In order to cultivate more computer talents, the education mode of the computer specialty should be deeply reformed on the basis of the current situation in order to meet the needs of the social development. Keywords Big data analysis · University education · Computer education · Applied research With the rise and vigorous development of the information network technology represented by the Internet, human beings are entering a brand-new era—the era of the big data. So far, the application of the big data is increasing day by day. The production and growth of the massive data are accelerating day by day [1]. Seeking its values from the data has become one of the main technical points of the big data technology. The birth of the big data technology has brought tremendous changes to all areas of our society.
1 Big Data Characteristics With the rapid development of the era of the big data and the continuous innovation of the information technology, enterprises need computer professionals with excellent theoretical research abilities and practical application abilities [2]. Combining the viewpoint of the higher educational reform with the stage of the development, it decides the design of the teaching contents and the teaching method of the general Z. Jiang (B) Linyi University, Linyi, Shandong 276000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_190
1599
1600
Z. Jiang
undergraduate education, and cultivates students’ professional theoretical knowledge without neglecting the ability of the computer practice and application. In the era of the big data, the traditional teaching mode of the computer specialty based on teacher’s lectures can no longer meet the needs of the modern enterprises for talents [3]. Introducing the project-based teaching mode to effectively improve students’ comprehensive abilities is an important content of the teaching reform of the computer specialty in the era of the big data. The characteristics of the big data are usually expressed in 4V, which refer to the four distinct characteristics of the big data. The first is the volume of the data, mainly referring to the huge amount of the data and the integrity of the data [4]. The second is the data type. There are many and complex types of the data. The big data technology is to find the relationship between these complex data types. The third is the processing speed. The explosive growth of the data requires the fast processing speed, in order to make effective use of the data. The fourth is the value. The ultimate goal of the big data is to find the value relationship of the data time in the huge data and support the decision-making by finding the low-density data value [5]. The big data technology is not only produced in specific fields, but also in our daily life. Data on the social media such as Face-book, Micro-blog and We-Chat is the best example. The development of the big data brings opportunities and challenges to all fields of our society. As a new carrier of educating people in the information age, the university computer education cannot avoid this new environmental change. It has become a hot research topic to analyze the huge opportunities and severe challenges brought by the big data to the computer education in universities, to explore how to innovate the concrete measures of the computer education in universities in the era of the big data, and to provide useful guidance for the next development. The users of the big data analysis have the big data analysis experts and the ordinary users. Their basic requirement for the big data analysis is visual analysis, because the visual analysis can visually present the characteristics of the big data, let the data explain itself, and let the viewers see the results. The theoretical core of the big data analysis is the data mining. Various data mining algorithms based on different data types and formats can more scientifically present the characteristics of the data itself, and can process the big data more quickly. If it takes years to come to a conclusion using an algorithm, the value of the big data is beyond description. Visualization is for people to see, and the data mining is for machines to see. Clustering, segmentation, outlier analysis and other algorithms allow us to dig deep into the data to find values. These algorithms can not only deal with the big data volume, but also meet the speed requirement of processing the big data to a certain extent. Predictive analysis allows analysts to make predictive judgments based on the results of the visual analysis and the data mining. Because the diversity of the unstructured data and heterogeneous data brings new challenges and difficulties to data analysis, a series of tools are needed to parse, extract and analyze the data. Semantic engine needs to be designed to extract the information from documents intelligently, so that it can extract features from the big data, and predict the future data through the scientific modeling and input of the new data. The big data analysis cannot be separated from the data quality and the data
The Application of Big Data …
1601
management. The high quality data and the effective data management can ensure the authenticity and values of the analysis results.
2 Application Values of the Big Data Analysis in College Computer Education The big data will change the traditional design and implementation of the teaching mode according to the established teaching theory and teachers’ personal experience. With the help of the big data, teachers can observe and analyze students’ learning behaviors at any time, from which they can discover the teaching rules that traditional modes cannot find, and at the same time, they can provide students with the personalized online learning process by means of the information technology. Students no longer blindly learn according to their inherent habits, and they can discover their own characteristics and advantages by analyzing and reflecting on the data generated in their learning process, timely adjust the learning methods, and even adjust the professional directions, so as to be happier and better able to develop their abilities in learning.
2.1 The Perfect Integration of “Teaching” and “Learning”: Construction and Sharing of the Educational Information Resources The cloud education data service platform uses the information technology to provide a resource environment, break through the limitations of textbooks, give full play to the fast and complete advantages of the Internet to disseminate knowledge, expand the amount of knowledge in the teaching and enrich the contents of our teaching, which can broaden students’ horizons, broaden students’ thinking, shorten students’ cognitive process, realize the multi-level understanding of knowledge, and increase the amount of the information channels and the classroom teaching contents. In addition, through the cloud education data service platform, the access to information has been opened up. In the limited time, the amount of the knowledge and information has been increased to the greatest extent, and the focus of our teaching has been highlighted. Students’ interest in learning has been stimulated, and students’ autonomous learning and their innovative learning abilities have been inspired, and the teaching effect has been improved to the greatest extent. Meanwhile, teachers have been promoted to keep pace with the times and actively learn the new knowledge. New methods and new thinking have realized the perfect integration of “teaching” and “learning”.
1602
Z. Jiang
2.2 High Efficiency and Facility of “Teaching” and “Learning”: Construction of the Digital Teaching Environment With the rapid development of the information technology, the networked study rooms, the networked libraries and the networked teaching equipment are gradually popularized in colleges and universities. At the same time, we are in the era of the information resource explosion. It is extremely difficult to find the resources that match the course contents quickly in the ocean of the network resources. The cloud education data service platform is a platform specially designed for the teaching and communication according to the curriculum arrangement. The resources displayed on this platform are open to students. Each teaching resource displayed is carefully produced by teachers, reflecting the best level of teachers. Students can quickly find the best resources on this platform and quickly enter the state of the autonomous learning. Relying on the convenience of this platform, communication can be carried out instantly between teachers and between students and between teachers and students. Teachers can discuss teaching methods, and students can exchange learning experience, and teachers and students can answer questions and solve doubts, so that the classroom is suddenly broad, and the effect of “teaching” and “learning” is more obvious.
2.3 Mutual Assistance of “Learning” and “Learning”: Construction of the Digital Learning Environment The strength of a team is far greater than that of a person. The core of the team spirit is cooperation. Collaboration is the quality that students must possess when they go to any job in the future. Therefore, cooperation and mutual assistance are the basic qualities that college students must possess. Using the Internet technology, the cloud education service platform provides a place for answering questions, solving puzzles and communicating ideas between students and teachers. This place is not only confined to teachers and students of this class or school, but also can cross grades, majors, colleges and schools, and even integrate into the world. Students can communicate and make friends in the semi-real and the semi-virtual world, and continue to practice for the future, which greatly improves students’ communicative abilities and the speed of the integration into the world.
The Application of Big Data …
1603
3 Implementation Requirements of the University Computer Education in the Big Data Environment The real meaning of the big data is to collect, clean and collate the massive data, customize, analyze and mine the relationship between the data and data according to need, and find the underlying relationship or laws in the data. Starting from this concept, the analysis and use of the data in the traditional teaching platforms are far from meeting the requirements of the teaching data mining with the big data. We hope to be able to conduct the multi-dimensional customizable analysis of the data, so as to discover some new learning rules. Although the traditional teaching platforms have common analytical functions and can provide some basic data analysis for teachers and students, it is not enough for the instrument to have these basic analytical models. In addition, when learners are faced with many online course platforms and online courses, they need to screen, collect and analyze the characteristics of the course itself and the historical data of the previous courses used by learners according to the results of the large-scale data analysis, and choose courses that are suitable for their own characteristics and needs. However, the analysis function of a single platform often fails to achieve the cross-platform course analysis and evaluation. I think a better solution is to establish a platform for the learning data analysis independent of the curriculum platform, which requires the establishment of the data analysis standards, the introduction of the standardized data into several different platforms, the customization of different analysis models at any time according to the user needs, and the generation of various charts, in order to achieve the cross-platform curriculum analysis through comprehensive analysis of the different platforms of learning. According to the general data of eh learners, learners’ learning rules or the new teaching rules can be obtained. To achieve this goal, we need standardization, including the curriculum system standards, the curriculum standards, the academic description standards, and the learning analysis standards and so on. This standard is the description standard of the curriculum system, which provides a unified descriptive interface for different universities, institutions and organizations, so that they can identify each other’s curriculum system. In the future, the Internet course is no longer a scattered course, but a system. These curriculum systems will be described according to the above standard format. The curriculum contents and the curriculum elements should also be described according to the standards. Students’ learning abilities should also be described according to the standards. Each kind of the education should establish the corresponding analysis model, and the analysis model should also follow the standard to describe. On the basis of the standardization, learners’ information will include the standardized academic information, and the curriculum information will include the curriculum system, the curriculum elements and the corresponding academic qualifications. Records of the learning process will be in standard format. The information generated according to the standards can be used across platforms, and can also be imported into a special analysis platform for the multi-dimensional comprehensive analysis. In this way, we can meet the needs of the curriculum teaching, operation
1604
Z. Jiang
and services, and enable learners to truly have a personalized curriculum and the online learning environment.
4 Application Strategy of the Big Data Analysis in the College Computer Education With the continuous development of our society and the progress of the science and technology, the network technology has been applied in various fields. Under this environment, the computer education must keep pace with the times and improve the effect of the computer education through the network technology.
4.1 Strengthening the Construction of the Teaching Staff In the computer professional education, teachers are the guides. They should have solid professional knowledge and high comprehensive qualities, and strive to improve the teaching efficiency. Therefore, colleges and universities should strengthen the construction of teachers. On the one hand, they should actively carry out the training activities for computer teachers, introduce the advanced teaching methods and technologies, and broaden students’ horizons. On the other hand, they should update the existing teacher assessment system to stimulate the teachers’ potential.
4.2 Optimizing the Curriculum Setting of Subjects According to the nature of running a university, the curriculum of the computer specialty should take employment as its guiding goal. On the one hand, we should fully carry out the market research, understand the social needs, and combine it with the teaching to give full play to the professional characteristics of computers in colleges and universities. On the other hand, we should actively comply with the development requirements of the era of the big data, pay attention to training students’ professional skills, and formulate different curriculum plans according to students’ learning foundation, learning abilities, hobbies and personality characteristics. In addition, the curriculum should keep pace with the times, so that students can learn the courses and skills that are in line with the characteristics of the times and have practical values, and improve their employment competitiveness.
The Application of Big Data …
1605
4.3 Perfecting the Subject Teaching Methods Under the background of the big data and the “Internet+”, teachers’ teaching methods and means are constantly updated. First, use the big data to analyze the teaching contents and the knowledge points that students are interested in, and secondly, build the school teaching resource bank, carry out the construction of the mu-curricula, and use the online learning and other means to give full play to students’ autonomy. Thirdly, use the open network course and put some courses that are not currently offered in schools on the network, so that the interested students can learn independently. Fourth, develop the mobile phone applications, and use the big data to track and analyze students’ learning situations, and provide a basis for teachers to carry out the classroom teaching.
5 Conclusion The arrival of the era of the big data has brought challenges and opportunities to the computer education in colleges and universities. Only by seizing the opportunity, changing the contents of our education, strengthening the construction of the personnel team, and combining with the actual situation of the big data era, can we cultivate the computer professionals adapted to the development of modernization.
References 1. Chen, Chen. 2013. The construction of the personalized intelligence service system of libraries based on the big data. Information and Documentation Services 6: 77–78. 2. Chen, Lv. 2013. The change of the learning analysis technology to the teaching model in the background of the big data. The Chinese Journal of ICT in Education 24: 123–127. 3. Jie, Yao. 2014. Application of the learning analysis technology in the context of the big data era. Intelligence 15: 56–59. 4. Kaifeng, Wu, Wantao Liu, Yanhu Li, Yipeng Su, Zheng Xiao, Xubin Pei, and Songlin Hu. 2015. The power big data analysis technology and application based on the cloud computing. Electric Power 2: 142–147. 5. Fang, Qinwei. 2018. Investigation on the current situation and the effect of French learning of students in the Sino-French cooperation project—Taking Zhejiang institute of science and technology as an example. Journal of Zhejiang University of Science and Technology 4: 107–115.
Impact Model of the Brand Cross-Border Cooperation from the Perspective of the Big Data Kayi Jin
Abstract From the perspective of the big data, the cross-border cooperative thinking has become an important normal in the development of the times. With the development trend of the information technology and the maturity of the terminal equipment industry, more and more industries begin to use the big data to analyze and mine the data in order to provide users with more accurate and scientific experience. The big data makes the cross-border cooperation easy, improves the accuracy of the data, and reduces the error rate and the cost of the market analysis. Keywords Big data perspective · Brand · Cross-border cooperation · Impact model In the context of the development of the Internet, the cloud computing and the big data era, new thinking concepts such as the brand market, the enterprise products, the user needs and experience, and the product value are re-considered and reviewed.
1 The Background of the Brand Cross-Border Cooperation from the Perspective of the Big Data The way of thinking in the era of the big data is quite different from the traditional ways in the past. It has no limitations, which not only exists in the Internet enterprises and the Internet products, but also covers a wide range of the terminal devices to a great extent. In the new economy, it is not enough for enterprises to develop and grow only by improving themselves [1]. They must pay close attention to the relevant economic environment and its organizations, and create an open, resilient and coevolutionary business ecosystem with the relevant enterprises [2]. If the brand sides want to carry out the cross-border marketing of “walk-heart” IP, they need to have a comprehensive and in-depth understanding of the IP: Not only do they need to know the user portrait of the consumers and discuss the hotspots K. Jin (B) The Department of Business Administration, School of Economics and Management, China University of Geosciences, Wuhan, Hubei 430074, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_191
1607
1608
K. Jin
and the specific language to create a marketing integration that consumers like, but they also need to understand their social media behaviors and the KOL relationship to achieve more accurate touch. The era of the big data needs more than the data analysis [3]. Most of the machines that generate and analyze the data are good at mathematics and statistics, but they don’t understand the human world. In order to produce applications that can effectively solve the social problems, it is necessary to read the data with the human thinking [4]. In the era of the big data, we need better mathematicians, as well as scholars from all disciplines. The development of the science and technology makes every subject more and more subdivided and the research more and more in-depth. With the arrival of the era of the big data, people’s requirements should not only be more and more “specialized”, but also maintain a pluralistic thinking and an open mind, so that they can be more intelligent, and no matter what problems they face, they can find the right solutions [5]. Through the ability of the big data strategy to break the industry boundaries, we can mine, track and analyze the huge and complex user data, aggregate the different user groups, get a more complete model of the users or the user groups, create the personalized, precise and intelligent product marketing solutions, break the traditional indifferent and passive product service marketing mode with the personalized marketing and the active marketing [6]. We should respond quickly to the market changes. In the management and operation, we should operate dynamically, flexibly, quickly, situationally and informatively, adapt to the changes of the consumers, give consumers a sense of experience in time, and use the management means of the informationalized big data to support the promotion of the brand value. Grasp the new trend of the market: When the economy enters the platform, we should be de-centralized and provide a platform for the employees and the brand partners to communicate with each other, focusing on mobilizing the enthusiasms of all the employees and the win-win relationship between the brands and the employees.
2 Common Types of the Brand Cross-Border Cooperation from the Perspective of the Big Data 2.1 A Model Oriented by the Audience Perception In the aspect of the brand communication model, the first is the perception model. The brand holders send information to the consumers through the media. Consumers simply accept these kinds of the information, which involves three parts: brand, media and consumers. The classical representative of the perception model is the Shannon Weaver model. The DAGMAR model is derived from this. It holds that brands send the rational information to the consumers, and the consumers make judgments and actions based on the received information. These perceptual models can be regarded as different emphases under the same system. The famous AIDA communication
Impact Model of the Brand Cross-Border Cooperation …
1609
model is based on this theory. The early AIDA mainly focused on the measurement of the advertising effect, emphasizing that the information attracts the attention of the consumers, arouses their interest, produces consumers’ desire to buy, and then takes action. In the following decades, the AIDA model produced various variants, such as adding the concepts of M (Memory) or C (Conviction) or S (Satisfaction), and emphasizing the importance of the memory, trust and satisfaction in the brand communication.
2.2 Brand Communication Model from the Perspective of the Social Stakeholders Meyer’s social model of the brand creation takes full account of many factors such as the consumer’s personal experience, personality, preference, market experience, imagination and media. It holds that the brand communication is a process in which the consumers translate and recreate the marketing output through the adjustment and consultation. At the same time, the concept of the relationship marketing and the Stakeholder Theory emerged in the marketing circles, emphasizing that enterprises should consider the requirements of various stakeholders (including customers, governments, media and other social groups and organizations) when formulating the marketing strategies, in order to achieve the goal of the mutual benefit, the winwin situation and the common development. The practice and development of the market bring about the innovation of the theoretical model, and the development of the theoretical model promotes the development and transformation of the marketing communication mode. The two forms a mutually reinforcing development system. In recent years, experience has become a hot topic for scholars. This stage of the marketing model highlights the importance of the emotional experience for consumers, and the consumers often make decisions based on their instantaneous emotional experience. Therefore, some researchers believe that the emotion is the most critical factor to connect the consumers with the brands, and the highest level of the brand success is the brand love. The consumers’ passion and trust for the brands are largely generated by their experience.
2.3 Brand Community Communication Model At the beginning of the twenty-first century, the brand community is a new mode of the brand communication. Although the experience model has been put forward for a short time, with the development of the network economy, the brand community, a new mode of the communication, is not comprehensive enough. The brand community, also known as the brand community, is a new carrier of the consumer communication and interaction. Its marketing model and theoretical model have also
1610
K. Jin
become a new research hotspot. The concept of the brand community is defined by Muniz and Guinn as a special group without the geographical restrictions based on the relationship between the brand enthusiasts. The brand community links the consumers’ emotional interests to the brand. In the brand community, consumers, based on their special feelings for a brand, believe that the experience value and the image value advocated by this brand are in line with their own outlook on life and values, thus generating the psychological resonance. Upshaw and others believe that all the stakeholders related to the brand (such as employees, customers, suppliers, strategic partners and other stakeholders) should be included in the brand community. Mc Alexander and others believe that the brand community is a consumer-centered structure, in which there are various relationships and entities associated with the consumers.
3 Analysis of the Impact Model of the Brand Cross-Border Cooperation from the Perspective of the Big Data Looking back at the brand communication models at all stages, the core of the brand communication gradually shifts from the brand owners to the consumers. Therefore, for the brand community, there are still many specific issues to be further studied. The formation mechanism, the psychological characteristics, the members’ characteristics and the brand community differences of different commodity types or brands are all worth discussing. According to the three-dimensional model of the attitudes, attitudes are composed of three parts, namely, the emotional, cognitive and behavioral components. On the basis of the previous research results, the evaluation dimension of the cross-border synergistic effect of the brands is defined as the attitude preference (AP), the quality perception (QP) and the purchase intention (PI). Consistent with the internal consistency of the attitudes in the consumer behaviors, the consumer attitudes constituting the joint brand evaluation also have the internal consistency. In addition, based on the theory of the brand alliance and the existing researches, the main factors affecting the evaluation of the cross-border brand alliance effect are the consumer’s pre-attitude, the brand equity and the joint matching. Estimating a utility function for each consumer allows analysts to discover each consumer’s preference model. The consumers’ final decision-making is based on two factors. Firstly, the range of the difference between the maximum and the minimum utility values determines whether the consumers can make a clear preference ranking and choose which product (or product subset) they prefer most. Secondly, the distribution of the utility value in the above range will affect the consumer decision-making. The symmetric or the asymmetric distribution of the specified utility affects the product differentiation based on the preference level. Let δ(0≤δ≤1) be a parameter representing the difference between the maximum and the minimum utility values, which is subconsciously assigned to the tested product by the consumers.
Impact Model of the Brand Cross-Border Cooperation …
1611
According to the range of the utility value, we can define four different situations for the consumer behaviors. According to the incremental utility value, the products are sequenced continuously from 1 to n. In each case, consumers show different attitudes and preferences. Type 1: δ(0≤δ≤0.1). In this type, the consumers subconsciously assign the similar utility values to all the tested products. This means that the consumers expect the same level of utility from any final decision. They can’t differentiate products. By subconsciously giving all the products the same utility value, they show their reluctance to differentiate products. The preference ranking cannot get the preference product selection which is prominent in other products. Type 2: δ(0.1≤δ≤0.3). In this type, the utility values are more widely distributed. Consumers think that some products are more important than others, but their preference ranking still prevents them from choosing the most preferred purchase option. He or she can’t find great differences in different decisions. Again, consumers give all products very close utility values, expressing that it is difficult for them to classify their products into different preference levels. Type 3: δ(0.3≤δ≤0.6). In this type, consumers give products a clearer preference ranking. However, there is still no significant difference between the utility values of the products. Therefore, consumers show the relative reluctance to classify the products into the distinct price preference levels. Type 4: δ>0.6. This is probably the clearest case. In this type, the consumer classifies the product into different preference levels, and he or she shows a strong preference for the product. There are obvious differences in the utility values given to the products, which can eventually highlight some acceptable products and some unacceptable products. By considering the range value of the utility δ, consumers’ attitudes and decision-making models can be distinguished for the first time. We can analyze the utility distribution of each δ value and study the symmetry and the peak state of the distribution. The quality of the questionnaire is mainly tested by the reliability and the validity. This study mainly carries out the reliability analysis from the perspective of the internal consistency. The test results show that the α value of each variable exceeds 07 and the CITC value is greater than 05, which belongs to the credible coefficient. The purpose of the validity analysis is to examine the validity and correctness of the questionnaire, which includes the content validity and the structural validity. Because this study refers to the relatively mature and the validated scales in the domestic and the foreign research fields, it has high content validity, and the structural validity includes the convergence validity and the discriminatory validity. The load coefficients of the standardized factors of all the items are greater than 05, and are highly significant in the statistics (P value is less than 005), and the AVE value is greater than 05, and the CR value of the combination reliability is greater than 07, which indicates that the scale of the measurement in this study has the good convergence validity. The square root of the AVE value of any factor is larger than the correlation coefficient of other factors, which shows that the scale of this study has good discriminant validity. So far, the formal questionnaire has passed the reliability and validity analysis, followed by the hypothesis test of the research model.
1612
K. Jin
4 Conclusion From the perspective of the big data, the brand cross-border cooperation is an important demand to adapt to the new environment. Through the analysis, the consumer attitude A positively affects the quality perception and the attitude preference of the brand cross-border joint effect evaluation, but has no significant impact on the purchase intention. Therefore, this paper argues that the consumer’s previous attitude A positively affects the brand cross-border joint effect evaluation, and H1a has been partially verified. The consumer attitude B positively affects the three dimensions of the brand cross-border joint effect evaluation. That is, H1b is verified. Moreover, in terms of the joint matching degree, the market matching degree and the brand matching degree pass the main effect test, so this paper argues that the consumer perceived market matching degree positively affects the brand matching degree, and H3 is verified.
References 1. Liu, Shuang, and Yuting Hu. 2011. Cross-border marketing—New development of the cooperative marketing in the brand operation. China Business & Trade 30: 22–23. 2. Juan, Du. 2013. Analysis of the key points of the cross-border marketing cases for clothing brands. Art & Design Research 3: 31–34. 3. Hong, Zhang. 2014. Cross-border cooperative research on the fashion brands from the perspective of the rational consumption. Academic Exploration 8: 50–54. 4. Xiaotian, Shi, Jiannan Guo, and Weiming Zhu. 2013. Cross-border cooperation of the fashion and clothing based on the Maslow’s hierarchy of the demand theory—A case study of the crossborder cooperation between the brand H&M and VERSACE. Journal of Zhejiang Sci-Tech University 30 (2): 288–292. 5. Wang, Qiuyue. 2015. Analysis of the cross-border strategy of luxury brands. Education Teaching Forum 15: 64–65. 6. Zhou, Qingyuan, Zheng Xu, and Neil Y. Yen. 2018. User sentiment analysis based on social network information and its application in consumer reconstruction intention. Computers in Human Behavior. https://doi.org/10.1016/j.chb.2018.07.006.
Intervention Effect of Mindfulness Based Cognitive Therapy on College Students Dependent on Online Games in the Internet Era Ying Lei and En Zhang
Abstract Using SAS and MPAI scales, 60 subjects were selected from 820 subjects and randomly assigned to the experimental group and the control group for the experimental study. It is expected to intervene in the mobile phone dependence through mindfulness based cognitive therapy in order to reduce the degree of mobile phone dependence of college students. The results showed that the total score of mobile phone dependence, uncontrollability, abstinence and avoidance factors in the experimental group were significantly lower than those in the control group, and the mindfulness level was significantly improved after the group counseling training of mindfulness based cognitive therapy for 4 weeks and 8 times. The results showed that the effect of the mindfulness based cognitive therapy on the mobile phone dependence was obvious. The main ways in which the mindfulness works in this study are as follows. The attitude of acceptance reduces stress and anxiety, alleviates symptoms, strengthens the ability to concentrate and alleviates the influence of the symptom attraction. And the improvement of the mindfulness brings about the behavioral adjustment and changes. The group mindfulness based cognitive therapy can play a certain role in improving the obsessive-compulsive symptoms of college students. In the future, large sample randomized controlled study is needed to further explore the effect of this therapy. Keywords Internet age · Mindfulness based cognitive therapy · Online game · Dependence on college students · Intervention effect College students’ mobile phone dependence has become a widespread problem in colleges and universities, which has brought serious harm to their physiology and psychology [1]. The advent of the Internet era has changed the way people play games, created a new game platform for gamers, and provided gamers with a variety of games to meet the needs of people of different ages, genders and personalities.
Y. Lei (B) · E. Zhang Department of Humanistic Nursing, Shaanxi University of Chinese Medicine, Xianyang 712046, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_192
1613
1614
Y. Lei and E. Zhang
1 Objects and Methods 1.1 Grouping Conditions YBOCS score ≥10, and self-reported negative emotions such as compulsion, anxiety and depression have brought troubles to their life. There is no substance abuse or dependence, and no psychiatric symptoms [2]. After understanding the group settings, they can insist on participating for 8 weeks.
1.2 Diagnostic Criteria Young’s diagnostic scale for the Internet addiction was used for the diagnosis.
1.3 Psychological Intervention The cognitive therapy intervention uses the medical heart-related knowledge to understand the causes of the negative emotions, explain in details the harm of the excessive Internet use, improve patients’ awareness of the Internet addiction, eliminate tension and fear, and objectively analyze the Internet interpersonal communication, the Internet information and the online games with the Internet addicts, gradually changing the cognitive components of the Internet addicts’ infatuation and dependence [3]. The behavior therapy intervention relieves anxiety, worries and other emotional symptoms after stopping surfing the Internet through the progressive muscle relaxation exercises, the mind relaxation and the breathing relaxation. Assist the Internet addicts to leave the virtual world, transfer their focus on the internet, establish new life goals, restore their normal life, and guide them to achieve success and happiness in their real life [4]. Course of the treatment: The psychological intervention once a week, four times a month, with the statistical effect after 1 month and 6 months.
1.4 Observation Indicators The change of the score of the Internet Addiction Self-Rating Scale was measured by Young’s Internet Addiction Scale. There were 20 items in total [5]. There were 5 grades of almost no, occasionally, sometimes, often and always, corresponding to 1, 2, 3, 4 and 5 points. The scores of SAS and SDS were measured by Zung’s SAS and SDS. There were 20 items. In each item there are four grades of no or few, sometimes
Intervention Effect of Mindfulness Based Cognitive Therapy …
1615
had, most of the time had, and overwhelming majority, corresponding to 1, 2, 3 and 4 points.
1.5 Tool The Yale-Brown Obsessive Compulsive Scale (YBOCS) assessed the compulsive attitudes and behaviors of the subjects every week. There were 10 items in the scale, including 1–5 items of the compulsive thinking and 6–10 items of the compulsive behaviors. Each item was scored at 0 (no compulsive thinking behavior) to 4 (extreme weight) points. The Five Facet Mindfulness Questionnaire (FFMQ) was used to measure patients before and after the treatment and during the follow-up period. There are 39 items in the scale, which are divided into five sub-scales: observation, description, mindfulness action, non-judgment and non-response. Each entry is scored at a point of 1 (not at all) to 5 (always very well). The Self-rating Anxiety Scale (SAS) has 20 items, scoring from 1 “nonexistence” to 4 “persistence” points. The higher the total score, the higher the degree of anxiety will be. The Cronbach’s coefficient of SAS is 0.931. The Self-Rating Depression Scale (SDS) has 20 items, scoring from 1 “nonexistence” to 4 “persistence” points. The higher the total score, the higher the level of depression will be.
1.6 Research Method With the informed consent of the subjects, the average number of the treatments was 8, and the number of the treatments was slightly adjusted according to the actual progress of the subjects. The frequency of the treatment was about 60 min once a week. Three months after the end of treatment, a follow-up evaluation was conducted [6]. The intervention lasted for 8 weeks, 2 h a week, and was led by a mentor who had practiced mindfulness for many years in a consultation room. The treatment is divided into three stages. The first stage (the first time) is the psychological education, and the second stage (the second-fourth time) is the stage of the mindfulness practice, while the third stage (the fifth-eighth time) is to use what we have learned to cope with the future state of mind. Every meeting starts with filling in YBOCS, then reviews last week’s homework, understands the feeling of the exercise, answers the questions in the exercise, then comes the formal treatment, and finally discusses with the patient to determine next week’s homework. The first week is mainly for the psychological education of the negative emotions and the mindfulness training, introducing the concept of mindfulness through the raisin exercises. In the 2nd to 4th week, the mindfulness exercises were studied by referring to the mindfulness therapy for improving emotions, which included
1616
Y. Lei and E. Zhang
the body scanning, the mindfulness breathing and the mindfulness observation. It emphasizes that the subjects should observe and experience their thoughts, ideas, impulses and emotions objectively from moment to moment in their practice. Learning only regards them as the inner events and appreciates the self-changing attributes of these psychological phenomena. On the other hand, it emphasizes that they should devote their energies to constructive matters rather than pathological actions at this moment. The first hour of each time should be the mindfulness training, and the second hour should be carried out around a theme, such as “live in the present”, “allow it to be natural” and “ideas are not facts” respectively. The instructor led the subjects to actively lead to the emotional problems that have troubled them, and then use the mindfulness technology to deal with them, thus generating the new experience and understanding of their own problems. In the fifth to eighth time, using what they have learned to cope with the mood of the future, the purpose is to inspire the subjects to take actions that make them feel controlled and accomplished when they encounter emotional distress in the future. The ultimate goal is to let the subjects know, and especially experience, that these negative thoughts, emotions and impulses all exist in the process of occurrence, development and extinction, without spending a lot of time and energy to prevent their emergence. Through this treatment process, on the one hand, patients’ tolerance of the negative thoughts and emotions is increased, and on the other hand, patients’ impulse to implement the negative behavior is reduced, and finally their negative behavior is abandoned and their energy is put into normal affairs.
1.7 Statistical Method SPSS 14.0 statistical software package was used to process the data. The Wilcoxon paired sample test was used to compare the scores of each scale at different time points.
2 Results 2.1 Scores of the Scales Before and After the Intervention The average number of the trainings for six subjects was 6.5. The YBOCS and SAS score after the intervention was lower than that before the intervention, while the FFMQ score after the intervention was higher than that before the intervention, and the difference was statistically significant (P0.05).
Intervention Effect of Mindfulness Based Cognitive Therapy …
1617
2.2 Genus Analysis of the Interview Manuscripts Five topics were selected: the harvest of the mindfulness training, the feeling of the group atmosphere, the opinions and suggestions on the training courses, the obstacles to the practice, and the understanding of the mindfulness. All the participants thought they had gained from the training. When interviewed one week after the end of the course, most of them still insisted on using the breathing space for 3 min to help themselves face the negative emotions. The results were as follows: learning knowledge about negative emotions; inspiring teachers’ words; calming themselves and regulating their emotions; improving their mindfulness; and accepting and relaxing.
2.3 Outline of Results For the training settings, three participants felt that the first training did not explain the relationship between the training and their negative emotions, and they were somewhat confused. The biggest obstacle to the participants’ practice is the time and space. Four participants said that the practice time was too long, so they need to explain why they practiced for such a long time. Two participants said that they were afraid to disturb other students or feel embarrassed when they practiced in the dormitory. The mindfulness based cognitive therapy is a combination of the mindfulness and the cognitive therapy. Its core idea is based on the theory and practice of the mindfulness. Through the mindfulness breathing, the mindfulness walking, the mindfulness work and the life training, visitors’ mindfulness perception ability is cultivated, so that visitors can perceive their negative automatic thinking and their deep core beliefs. Unlike the cognitive therapy, the mindfulness based cognitive therapy does not need to change visitors’ negative automatic thinking and core beliefs, and nor does it need to replace their negative automatic thinking and core beliefs with the correct cognitive thinking. Only the visitors are required to be conscious of their negative automatic thinking and core beliefs, and the negative automatic thinking and core beliefs are presented truthfully, without any climbing and intervention at all, and the visitors’ negative automatic thinking and core beliefs will disappear automatically. When individuals have bad emotions and behaviors, in order to alleviate their pain, they usually adopt two coping styles—problem orientation and emotional orientation. The answer to the problem is to analyze and judge the problems and find the ways to solve them. The emotional orientation should be adjusted and intervened to eliminate the symptoms as soon as possible. The cognitive therapy considers that the positive coping strategies have the therapeutic significance. From the perspective of the mindfulness, the above-mentioned problem-oriented and emotional-oriented responses deviate from the mindfulness. They are both the climbing and persistence of problems and emotions, and the result is the continuation and aggravation of their pain. The correct response is to let the bad moods and behaviors present as they
1618
Y. Lei and E. Zhang
are, not to climb and intervene, not to fall into the trap of solving problems and bad moods, so that the bad moods and behaviors will disappear.
3 Discussion The Internet is a new technology that affects the world. It subverts the traditional way of life of human beings and brings many benefits to the modern Internet users. At the same time, the excessive abuse of the network will also have a negative impact on people. Some people are fascinated by the Internet, unable to control their use of the Internet, endangering their work and interpersonal relationships, resulting in the network dependence, which is seriously called the Internet addiction. With the younger age of the online game players, more and more college students are exposed to more and more online games. Because college students have poor self-control, weak self-protection and psychological resistance, they are easy to indulge in games. College students are more likely to rely on the online games, and even develop into an addictive behavior, which endangers their learning, life and healthy development. With the acceleration of the life rhythm nowadays, the combined effect of these factors and the external environment makes college students become addicted to the online games from the initial exploration, and finally lead to addiction, which not only damages their physical health, but may also lead to the physical and psychological dependence, such as the abnormal behaviors, the psychological disorders and the neurological disorders. Therefore, people pay more and more attention to college students’ dependence on online games. The Mindfulness Cognitive Therapy (MCT) is a new psychotherapy method developed by three famous cognitive therapists Segal, Williams and Teasdale after 1994 based on MBSR of Kabbakin. It integrates the mindfulness technology of the oriental culture into the traditional cognitive behavioral therapy for the recurrence of depression. Clinical practice has proved that this training can help the patients with severe depression to reduce the probability of the disease by half. Its efficacy is no less than that of the antidepressants, but without the side effects of the latter, and it has become one of the priority treatment options recommended by the National Health and Medical Quality Standards Agency (NHSQSA). Empirical research shows that MBCT is not only effective in intervening the recurrence of depression, but can also be used in children, postpartum depression, social fear, generalized anxiety disorder, insomnia, panic disorder, and test anxiety and so on. It represents the new development of the cognitive behavioral therapy. The Mindfulness Cognitive Therapy (MCT), as a structural procedure, is highly controllable. It is divided into two stages and eight courses. The first stage is the basic exercises, learning the basic mindfulness techniques, and the second stage is learning to use the mindfulness techniques to cope with the psychological symptoms. Individual and group forms are applicable. MBCT is mastered by the experiential learning and experiencing the entire process. It involves such basic mindfulness techniques as the observation breathing, the walking mindfulness, the meditation
Intervention Effect of Mindfulness Based Cognitive Therapy …
1619
mindfulness, the body scanning, the mindfulness stretching, and the mindfulness introducing and dealing with the emotional difficulties in daily life. Acknowledgements On-campus Scientific Research Project in Shaanxi University of Chinese Medicine (Project No. 2017SZKY-005).
References 1. Ruofei, Ge, and Huang Guoping. 2016. Research status of the mindfulness based cognitive therapy for insomnia. Sichuan Mental Health 29 (2): 190–192. 2. Zhu, Lijing, Bingting Sun, Yang Zong, et al. 2016. Research progress of biomarkers in the depression group. Chinese Journal of Hospital Pharmacy 23: 19–25. 3. Yang, Min, Hongjun Kang, and Xiaochang Dai. 2015. Progress in the pathogenesis and the treatment of depression. Sichuan Journal of Physiological Sciences 3: 22–28. 4. Kong, Qingfang, Yanhong Gu, and Shi Zhongying. 2017. Investigation of the self-management status and the related knowledge needs of patients with depression during convalescence. Chinese Nursing Research 31: 33–37. 5. Lu, Chaohui, Min Wang, and Ning Wang. 2012. Research status of the mindfulness based cognitive therapy for the prevention of the recurrence of depression. Medicine & Philosophy 33 (22): 49–52. 6. Qingyuan, Zhou. 2018. Multi-layer affective computing model based on emotional psychology. Electronic Commerce Research 18 (1): 109–124. https://doi.org/10.1007/s10660-017-9265-8.
Interpretation Technology of the Risk Causes of Management Based on Eigenvalue Disturbance Qiang Li, Xusheng Yang and Peiyu Liu
Abstract The business management risk refers to the uncertainty of profits brought to enterprises in the process of the enterprise production and operation, which directly threatens the interests of enterprises and the survival and development of industries. Therefore, this paper explores the causes of the business management risks, and explores measures to control the business risks. It has very important practical significance for the daily financial management of enterprises. The perturbation theory of eigenvalues plays an important role in the calculation of the eigenvalue problems. Based on the eigenvalue perturbation problem, this paper explores the causes of the business management risk, and analyses the technology of explaining the causes of the business management risks from a new angle. Keywords Eigenvalue perturbation · Business management risk · Explanation · Exploration
1 Eigenvalue Perturbation The perturbation theory of eigenvalues plays an important role in the calculation of the eigenvalue problems. The eigenvalue perturbation of the structured matrices has ˜ are the Hermitian matrices, and A is Hermitian, many results. For example, A and A ˜ is non-Hermitian. A is normal, but A ˜ is arbitrary. In recent papers, Mehl, et al. but A studied the perturbation theory of the structural matrices under the structured firstorder perturbations, focusing on the single, orthogonal or symplectic matrices with the indefinite inner product. In this paper, we focus on the explanatory techniques of the operational management risks of the perturbation Hermitian’s block matrix and block tridiagonal matrix for the eigenvalue perturbation [1]. Nakatsukasa obtains some new perturbation bounds for the eigenvalues of Hermitian matrices with the block tridiagonal structure, and shows that these results can explain the following Q. Li (B) · X. Yang State Grid Information & Telecommunication Group Co. Ltd., Beijing 100031, China e-mail: [email protected] P. Liu 4Paradigm (Beijing) Technology Co. Ltd., Beijing 100085, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_193
1621
1622
Q. Li et al.
two well-known phenomena: (1) Active early ventilation applied to the symmetric tridiagonal QR algorithm makes many eigenvalues uniform. When there are no nondiagonal elements to be neglected, the timer is not timed. (2) Wilkinson matrix has many pairs of almost equal eigenvalues. Nakatsukasa also gives the analysis between the given results and some related characteristic problems. It is worth noting that a Hermitian 2×2 block matrix can be regarded as the generalized saddle point matrix given. Therefore, the eigenvalue cluster of the preprocessing matrix can be analyzed by using the structured perturbation theory [2]. In this paper, we mainly study the analytic perturbations of the loss eigenvalues for the single-parameter nonlinear eigenvalue problems and the analytic perturbations of the loss eigenvalues for the single-parameter and multi-parameter generalized eigenvalue problems. For the nonlinear eigenvalue problem, based on the eigenvalue perturbation of the general nonlinear eigenvalue problem, this paper explores the explanatory technology of the causes of the business management risks.
2 Management Data Mining Based on the Eigenvalue Disturbance The business management data mining is an interdisciplinary subject involving the computer science, the management science and the statistics. It is devoted to exploring the unique data from the business management. Its purpose is to better understand the enterprises and their living environment, so as to improve the economic efficiency of the enterprises [3]. Data mining is a process of discovering the hidden patterns and knowledge from the massive data by a certain algorithm. It has been widely used in banking, insurance, finance and other fields. The eigenvalue perturbation, the data balance and other technologies are often used to solve the data imbalance and the high-dimensional problems of the big data [4]. The data preprocessing is the basis of the follow-up work, which directly affects the quality and efficiency of the follow-up work.
3 Operational Management Risks and Causes of the Operational Management Risks All human efforts involve risks of uncertainty. Risks can be regarded as threats, but there are businesses that respond to them. Different disciplines have different risk classification methods. In order to explain the lessons of the risk management in the credit crisis, the risk is divided into the known knowledge, the known unknowns and the unknown unknowns, which are actually based on the degree of the risks. The operating and management risks mainly include all kinds of the risks related to the operation and management of the management departments and other departments.
Interpretation Technology of the Risk Causes …
1623
These include but are not limited to the market risk, the credit risk, the operational risk, the business risk and the liquidity risk. The non-financial risks include those from the sources unrelated to finance. These include but are not limited to the political risk, the reputation risk, the bioengineering risk and the disaster risk. Risks can have four attributes: uncertainty, dynamics, interconnectedness, dependency, and complexity. The first two attributes have been widely recognized in the cross-time models in the field of the behavioral decision-making and behavioral economics, and the last two attributes have been well studied in the business management disciplines. The risk management can be defined as the process of identifying, analyzing, and accepting or mitigating the uncertainty in the investment decisions. The risk management is about managing the uncertainties associated with threats. The traditional risk management focuses on the risks arising from the physical or the legal causes such as the natural disasters or fires, accidents, deaths and lawsuits. The financial risk management deals with risks that can be managed using the transaction management tools. According to the latest concept, the enterprise risk management provides a tool from a systematic perspective to enhance the value of the business and the public systems. The operational research can always be used to optimize the risk management. It can identify various areas related to the business intelligence in the risk management in the literature.
4 Interpretation Technology of the Risk Causes of Management Based on the Eigenvalue Disturbance Combining Information Technology 4.1 The External Market Environment Is Constantly Changing, and the Internal Managers of Enterprises Do Not Pay Enough Attention to the Prevention of the Financial Risks The interpretation technology of the risk causes of management based on the eigenvalue disturbance, from the point of view of the non-linear relationship model, explains that the external market environment is changing constantly, and the internal managers of enterprises pay insufficient attention to the prevention of the financial risks. The eigenvalue perturbation is an artificial intelligence tool, which has proved to be very useful in identifying the patterns in the complex data structures, especially those involving the non-linear relationships. The aim of applying the eigenvalue perturbation to evaluate the reliability of the software is to reduce the risks of the project failure. Another application is given, which proves the value of the artificial eigenvalue perturbation model in projects involving the public-private partnerships. The industrial applications include the use of the eigenvalue perturbation models to analyze banks with the credit card applications, allowing banks to control the
1624
Q. Li et al.
risks more effectively after the bubble in 2008. The eigenvalue perturbation model is also combined with the test mining application, in which the model is applied to the financial risks in the day trading. The artificial eigenvalue perturbation model is used to manage the default risks of the Italian small businesses. According to the market environment in which the enterprise is located, the changing market leads to the current trend and the complex business environment, which increases the business risks of the company. The main reason is that for the company’s financial management, if the city cannot make a reasonable forecast for the future development of this field, it will not be able to occupy the market in time. At the same time, some economic changes cannot be adjusted in time, which has a certain impact on the business activities of the enterprises and increases the financial risks of the enterprises. At the same time, most business managers do not know the important role of the risk prevention. The enterprise internal risk prevention mechanism transaction investment is insufficient, and the existing risk prevention workflow cannot actively explore the optimization measures. It makes the enterprise risk prevention mechanism flow in form and fails to play its internal role, which leads to the inefficiency of the financial management.
4.2 The Characteristics of the Enterprises’ Industry and the Financial Risks Caused by Their Decisions The interpretation technology of the risk causes of management based on the eigenvalue disturbance explains the industry characteristics of the enterprises and the financial risks caused by their decision-making from the perspective of the decision support system. Since the 1970s, the use of the computer tools for the risk-based decision-making in the field of the information systems based on the eigenvalue perturbation has been widely studied, that is, the decision support system. Another application of AI to provide the loan risk analysis is to show the financial modeling of paper and pulp industries in this case. An analysis of the value and risk assessment of the IT investment based on the eigenvalue perturbations has recently been provided. Such investments involve the complex stakeholders, leading to the need to consider the organizational politics. Kozekod and Lee studied the role of the political pluralism in expanding the Indian commercial banks, including considering the risk management. The industrial decision-making involves not only the multiple stakeholders, but also the multiple criteria, partly because of the existence of these multi-stakeholders. This paper provides a multi-standard risk assessment technology for the manufacturing safety risk analysis. A method considering the product development risk is proposed, which can evaluate the risks and other challenges at an early stage. Because of the particularity of the company, if the financial management is in this process, it is difficult to find the problems in the internal control management of the enterprise in time. This will increase the company’s operational risks. For example,
Interpretation Technology of the Risk Causes …
1625
in the current market, the unconventional bidding behavior in most trading markets enables the enterprises to implement the projects in the process of the engineering, the quality of the project completion is poor, and the project payment is in arrears, and the price of the materials rises. There is the high and low inequality, and most owners use the urgency of the company in the engineering tasks, so that in the process of signing the contracts, they often add some uninterrupted comparable treaties, such as requiring the company to pay in advance for the project, which will cause certain losses to the company if there are problems in the project, from the financial risk factors. In addition, there are some industries in the late stage of the project completion. The main funds are often insufficient, which increases the timely recovery of the project completion settlement. Difficulties increase the financial burden of the trading units, extend the project warranty period, increase the cost of the project warranty, and increase the cost of the project, so that the financial risks will follow.
4.3 Lack of the Perfect Internal Control Management System in the Industrial Enterprises The interpretation technology of the risk causes of management based on the eigenvalue disturbance explains the lack of the perfect internal control management system in enterprises from the perspective of the data mining. The data mining has become a very popular method to apply the statistical and artificial intelligence tools to the analysis of the big data sets. In many risk management applications, the data mining tools are applied to the corporate finance, including the management fraud detection, the credit risk assessment and the corporate performance prediction. Jans and others focused on their data mining research to address the risks of the internal fraud and found that the data mining tools provide better results than the univariate analysis. Holden also discussed the professional fraud and applied the text mining to support the fraudulent auditing. In other industries, Nateghi and others applied the data mining technology to better predict the blackouts, especially those related to the hurricanes, and reviewed the text mining applications to support the risk management in the supply chains. Two studies specifically discussed the use of the data mining to reduce the risks of the occupational injury. Another major cause of the operational risk is the internal control. The system is not perfect and the relevant institutions are unreasonable. In addition, the overall quality of the business managers is not high, which hinders the improvement of the company’s overall strength. The relevant rules and regulations are not perfect, and there is no basic internal control management. At the same time, enterprises cannot meet the needs of the enterprises in the process of the internal control, as well as the actual needs of departments and companies in the fund management and benefit distribution. There are phenomena of the unclear powers and responsibilities and confusion in the management. At the same time, when there are financial risks
1626
Q. Li et al.
in the company, the relevant managers lack the sense of responsibility and cannot respond in time, causing serious loss of the funds within the company, and the project fund utilization efficiency is not high. In addition, due to the weak awareness of the internal control management, enterprises have outsourcing projects, with the largescale projects subcontracting. This problem has greatly increased the instability of the enterprise management and is not conducive to the long-term development.
4.4 Lack of the Perfect Risk Prevention Mechanism in Enterprises Based on the eigenvalue perturbation, the explanation technology of the business management risk causes explains the lack of the perfect risk prevention mechanism within the enterprises from the perspective of the knowledge management. The risk management is a very wide field of research, developed from the decision support system, the expert system and the artificial intelligence, including the data mining and the business analysis. The knowledge management also includes consideration of how to capture the tacit knowledge within an organization in a computer system, such as the case-based reasoning. Some articles have been found in the application of the knowledge management to the industrial risk management. Through the data mining, natural disasters such as landslides, earthquakes, floods and wildfires are analyzed and managed using the grid technology in geoscience. Their system is designed to help prevent and respond to disasters. Li, et al. focused on using the domain knowledge and the spatial data to predict the natural disasters and build the Bayesian networks. At present, because most managers of the trading companies do not understand the risk prevention, leading to the lack of a sound risk prevention mechanism within the company, the relevant risk prevention measures cannot meet the specific needs of enterprises to reduce the financial risks. In addition, the company is too casual in the phone calls of the risk prevention personnel, which is part of the management. In order to save money, managers often call on accounting managers to participate in the risk prevention. In this way, work will not only increase the work pressure of employees, but also increase the work pressure of employees. It is not conducive to the development of the enterprise risk prevention work. Before the start of some large-scale projects, the company did not carry out the anticipated research according to the market trend, which will increase the blindness of the enterprise investment. In addition, for some unavoidable project risks, the company did not appoint professionals in advance to formulate the risk contingency plans. Once the risk comes, it is likely to disrupt the normal operation order of the company and cause greater economic losses.
Interpretation Technology of the Risk Causes …
1627
5 Conclusion Based on the eigenvalue perturbation, this paper studies the risk of the enterprise resource planning project. In particular, they have explored the explanatory techniques for the causes of the operational and managerial risks. The main advantage of the eigenvalue perturbation analysis is that it can model the complex phenomena according to experts’ opinions. The tool simulates uncertainties and related events, and imitates the human reasoning. The tool specializes in modeling and maintaining the project outcomes and the risk perceptions, as well as their hidden interactions. Therefore, practitioners will assess the impact of the common impact maintenance risks on the project outcomes. The proposed tools will help practitioners manage and maintain the project risks in a more effective and proactive manner. Acknowledgements This work was supported by State Grid Technical Project (No. 52110418002W).
References 1. Liu, Yongping. 2018. The reasons and preventive measures of enterprise financial risks. Public Investment Guide 24: 22–30. 2. Yang, Qianli. 2017. Analysis of the importance of regulating processes to preventing risks for coal trade enterprises. Enterprise Reform and Management 22: 33–40. 3. Ling, Yun. 2017. Prevention and countermeasure of the liability operating risks. Modern SOE Research 12: 19–25. 4. Wei, Xuhui, and Jing Liu. 2017. Business risk prediction and simulation in economic adjustment. Computer Simulation 5: 21–29.
Design of the Art Education Platform Based on the Multimedia Network Sen Li
Abstract The multimedia art teaching under the network environment has become an important new teaching form in the field of education. It is the product of the combination of the network technology and the multimedia teaching. It is a way of the information dissemination based on the multimedia technology. The multimedia technology provides students with greater convenience and learning platform for the autonomous learning because of the diversity, extensiveness and randomness of resources. Students are easy to give up their learning when they encounter difficult problems, but with the multimedia technology, students can collect the information, consult online, collect different resources according to their own needs, build their own knowledge system, master the painting skills and technical skills, and lay a solid foundation for students’ sustainable learning and their lifelong art learning. Keywords Multimedia network · Art education · Platform design · Teaching innovation The combination of the computer network and the multimedia technology has opened up a new space and provided a new means for the traditional art education. The multimedia network teaching will make the art teaching form richer, the teaching mode more advanced, and the information transmission faster [1]. In order to give full play to the role of the multimedia teaching in the network environment, it is necessary to design and develop the learning process and resources reasonably so that each learner can learn effectively and independently.
S. Li (B) Institute of Fine Art, Fuyang Normal University, Fuyang City, Anhui Province 236000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_194
1629
1630
S. Li
1 Design Advantages of the Art Education Platform Based on the Multimedia Network In the network teaching, the status and the role of teachers and learners have changed. Its main manifestations are as follows. The distance teaching mainly focuses on learners’ autonomous learning, and the learners are the main body of all the teaching activities, and the arrangement and implementation of the teaching activities should be subject to and serve learners’ learning activities, while teachers are the teaching instructors, whose main tasks include: first, teaching the contents, and second, stimulating learners’ learning enthusiasms, and encouraging and guiding learners to actively participate in the teaching activities. In addition, the network technicians and the teaching managers are also required to act as “coordinators” of the teaching process [2]. On the one hand, they should actively participate in the communication with teachers and learners, coordinate the relationship between various elements in the process of the distance learning, and on the other hand, they should complete many teaching assistant tasks such as the school roll management and the curriculum arrangement and so on [3]. In the practical art teaching, teachers can create a relaxed and pleasant learning atmosphere with the help of the multimedia and the students, and carry out the stimulation, guidance, enlightenment, organization, communication and evaluation. Students have more room to think independently and study independently, changing from the objects of passive acceptance of knowledge to the subjects of the selfconscious and active learning and inquiry [4]. The joint participation of teachers and students has shortened the distance between them and established a harmonious relationship between teachers and students. In the art education, the proper use of the multimedia resources and the integration of the advantages with various teaching methods can optimize the classroom teaching, break through the teaching difficulties, solve the teaching priorities and effectively improve the teaching effect. It can also enrich students’ perceptual knowledge, broaden their horizons, stimulate their interests, and more importantly, promote the overall development of students’ qualities [5]. We should properly promote the rapid development of the modern education and the quality education. The combination of the multimedia technology and the art education makes the teaching contents rich and colorful. In the art appreciation and the demonstration teaching, it can be combined with the multimedia technology, which can help students to interact on the computer network, so that students can enjoy the convenience brought by LAN in the classrooms or studios, and students can study independently, and effectively transform the hard theoretical knowledge in the art textbooks into the vivid contents. The combination of the multimedia technology and the art education makes students have a strong interests in the art learning. The use of the multimedia technology in the art teaching is not subject to the control of the space-time and the region. It can vividly present different scenes and regions in front of students, save teachers’ hard language teaching time, and promote students’ divergent thinking from the multiple perspectives. For example, when teachers explain the still life sketch, it
Design of the Art Education Platform …
1631
is very difficult for students to feel the characteristics of the still life itself. Through the videos, teach students the steps of the still life sketch, and students understand the characteristics of the still life and the sketch demonstration in the videos. In a short time, they understand the key of the still life sketch, and they will be more proficient in the class practice.
2 Design Requirements of the Art Education Platform Based on the Multimedia Network The multimedia technology makes the theory of the art education vivid. The multimedia technology seeks the best way to express the basic art education ideas according to the teaching contents. It makes the abstract things in the art teaching concrete and vivid, and avoids the thinking obstacles students encounter in their learning to the greatest extent.
2.1 The Model of the Network Teaching Platform Starting from the actual needs of the teaching activities, the network teaching platform is an open platform for teachers, students and administrators to provide the network teaching and management. Students log on to the network teaching website, pass the identity certification, enter the online learning environment, and choose the courses to learn to start their learning. The contents of the online learning include the text curriculum learning, the video curriculum learning, the real-time answering questions, the online examinations, the BBS discussions and the online homework and tests. Among them, the text curriculum learning is mainly through the students browsing the syllabus, the teaching implementation scheme and the PPT courseware provided on the website, and the video curriculum learning is mainly through the online video-on-demand courses and other multimedia resources. The real-time question answering provides a real-time interactive learning environment in the form of the chat rooms, so that the full exchange and discussion can be implemented between teachers and students and between students and students. The BBS discussion provides the non-real-time interactive learning. Students can ask questions and put forward their own opinions through posts, get answers through reading posts and understand the learning situation of other students. The online testing provides students with the opportunity to conduct self-testing, and students can understand their mastery of the knowledge through the online testing.
1632
S. Li
2.2 Framework Requirements of the Teaching Platform The logical structure of the network teaching platform follows the MVC mode. It separates the display layer, the control layer, the business logic layer and the persistence layer rationally. The details of each layer are as follows. The customer layer is used to provide users with the visual user interface for the human-computer interaction. This system is the IE browser. The synchronized communication is the main communication mechanism, and the asynchronous communication is used when the local data need to be updated or some simple data transmission needs to be processed. View layer: The view layer is the most intuitive presentation of the businesses. It is only responsible for the presentation logic, not the business logic, and sends the user’s response through the control layer. In this framework, the view layer is mainly composed of HTML, JSP Struts tags and ActionForm beans. Control layer: The role of the control layer is very large, not only to deal with the user interaction, but also to call the business layer to process the data. At the same time, according to the request of different users, display different pages. The control layer can be understood as a distributor, responsible for passing the user’s requests to the business model, telling the business layer what to do, and then selecting the appropriate view to return to the users. Therefore, a model may correspond to multiple views, and a view may correspond to multiple models. In this architecture, the function of the control layer is mainly accomplished by ActionServlet, the core component of Struts. It receives the HTTP request information, forwards the request to the appropriate action according to the configuration information of the configuration file Struts-config.xml, and then calls the method of the model layer by Action to update the state of the model. Model layer: The model layer is between the control layer and the persistence layer. It is responsible for the business processing of the application system. It implements the appearance of the use case and coordinates the real implementer of the use case to complete the functions related to the application once. In this framework, for some simple business logic, it is done in Action. For some complex business logic, the action calls the relevant business logic components according to the user’s request. Persistence layer: The persistence layer saves the business model state and reads the business state when it functions. For the database application system, the function of the persistence layer is to store and acquire the data between the program and the database. In this architecture, the persistence layer is implemented by the middleware Hibernate. Database layer: It is used for the data storage and organization, the database distributed management, and the database backup and synchronization and so on.
Design of the Art Education Platform …
1633
3 Design Thoughts of the Art Education Platform Based on the Multimedia Network 3.1 Overall Design of the Network Teaching Platform According to the analysis of the functional requirements of the system, the system has designed three subsystems, namely the system management, the teacher management and the student learning management. The design of the administrator management module: The administrator management module mainly has the following functions. Administrators can modify their passwords, access to the knowledge exchange forum area to implement the management. They can browse, add, modify and delete teachers’ information, and browse, add and delete teachers’ teaching information. Teachers have no right to make any modifications. The basic information of students can be browsed and maintained. Only after the information of students is set up can students login with their own username and password and enter the self-learning module. The design of the teacher management module: Teachers can enter the teacher management module by entering the teacher’s work number and password and clicking the login button. The function of the teacher management module mainly includes the following aspects. Teachers can manage students’ homework, and download, review and delete the homework uploaded by the students. Teachers can publish some information on the forum, register the users, modify the personal information and password, and query the personal information and so on. Teachers can register new users in the chat rooms and enter the chat rooms to communicate with students at any time. They can answer questions raised by students at any time. At the same time, it is convenient for other students to discuss and master the problems. Teachers can manage the examinations and tests, and inquire students’ examination results according to the setting of the examinations. Teachers can browse some basic information of students and register students’ information. The design of the student learning module: In the student learning module, students can register online by themselves, and set up the information such as their student number, name, class and password. After registration, students can login to the student learning module through the identity authentication. The functions of the student learning module mainly include the following aspects: online registration, and setting up their own student number, name and password and so on. The registered students can login to the student learning module directly after authentication. In the learning part of the course, we can watch the courseware made by the teachers to facilitate students to learn the course. You can upload the completed homework. You can check the information published by the teachers, such as the arrangement of homework and the answers to some questions and so on. You can communicate online with teachers and classmates to facilitate students’ discussion and learning of the problems they have learned. The online test can be carried out, and the results can be obtained after the test is finished. The personal data can be queried and modified.
1634
S. Li
3.2 Database Design of the Network Teaching Platform The database is the foundation and core of the information management and the transaction processing application systems. The database management platform organizes a large number of the data according to a certain data model and provides functions of storage, retrieval and maintenance, so that the application platform can easily, timely and accurately obtain the required information from the database in a unified way. The SQL Server 2000 database management system launched by Microsoft is very powerful and has been widely used in various fields.
3.3 Security Design of the Network Teaching Platform The network teaching management platform runs on the server in the campus network, so it is protected by the firewall of the campus network at first. In order to further ensure the security of the platform system, the platform has taken the following two measures: controlling access to the IP address. This network teaching platform only allows users in the campus network to access it, and restricts the scope of the legitimate address of the clients, which prevents users outside the campus network from accessing the website. Although it reduces the scope of the application of the platform, it is a good security scheme. The security of the campus network: In the network teaching platform, no matter whether they are administrators, teachers or students, they must login and be authenticated before they can enter the platform, which, to a certain extent, ensures the internal security of the campus network.
4 Conclusion The art education is a schematic category of the visual art. The visual and perceptible images make students experience more directly and effectively. With the help of the multimedia, excellent pictures of artistic works can be displayed in an all-round way. Videos of the painting methods and steps of one or more artists can be introduced into the classrooms. While students can directly appreciate paintings and see sculptures from different angles, they can also watch the painting methods and steps of different artists, and experience the video images of some performance artists’ works of art and the new media works of excellent artists at home and abroad in the classrooms.
References 1. Tan, Fengping. 2015. Research on the mobile web application development based on the HTML5+jQuery mobile. Popular Science & Technology 7: 9–10.
Design of the Art Education Platform …
1635
2. Zhai, Na, and Min Zhang. 2015. Design and application of the foreign language micro-learning resources based on the We-Chat public platform. Electronic Design Engineering 12: 156–158. 3. Xu, Xuelin, Min Chen, and Jianfeng Chen. 2015. Research on the batch loading mode of the big data for the mobile platform under the asynchronous mechanism. Computer Programming Skills & Maintenance 6: 43–46. 4. Zeng, Hong, and Huifang Zhou. 2014. Realization of the auxiliary course system based on the We-Chat public platform. Science Mosaic 9: 46–49. 5. Xianwei, Meng. 2013. On the reform of the teaching model of the history of Chinese arts and crafts. Beauty & Times·Journal of Fine Arts 1: 55–56.
Implementation of Large-Scale English Speaking Test Based on P2P Sijing Li
Abstract The large-scale networked spoken language system is an examination system that is generated by networking the traditional oral examination system. This system is a product of modern information technology and English oral evaluation system. This paper proposes to use the large-scale spoken language test system based on computer network to conduct school-level oral English test, which can improve work efficiency, save cost and improve test efficiency. In order to achieve the normalization of the school-level oral English test. Keywords Computer network · Oral English test · Information technology
1 Introduction With the development of computer network technology, information technology and foreign language teaching have been deeply integrated, from the process management of self-learning, the construction of classroom teaching artificial interaction environment, the automatic wholesale and statistical analysis of student work, and the test evaluation link [1]. Current network education is mostly used in client/server (C/S) mode, the server unified management of teaching resources and to provide the service, the client and server clear division of labor, when the user is at a smaller scale this model can provide high efficiency service, but because the service is limited, with the expansion of the scale of the client and server load will gradually reach the limit, thus limiting the client number increase of P2P (Peer to Peer) or “peer-to-peer”, its main idea is “to the center”, each node in the network are equal, are both server and client functions. P2P network can fully tap the capacity of the network edge node, reduce the dependence on the central server [2–4]. To solve the limitations of the traditional network scale C/S mode using P2P technology, at the same time in the large-scale network environment, the efficiency of information exchange between nodes can also be improved. As shown in Fig. 1. S. Li (B) Foreign Languages Department, Hainan Medical University, Haikou, Hainan 571199, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_195
1637
1638
S. Li
Fig. 1 Comparison of P2P and C/S modes
Cloud computing is the development of distributed processing, parallel processing and grid computing or, these business concepts in computer science. The cloud is the core of virtual computer resource pool. Which makes full use of data center resources (shared resource pool), through the Internet will be packaged into service to provide all kinds of resources [5–8]. We put forward based on P2P cloud computing education services platform, users receive their own needs of education services in a unified manner, without considering other issues, greatly simplifies the operation of users, improve the efficiency of user access to resources [9–11].
2 Methods and Materials P2P network can be simply defined as the network of computer nodes, sharing of computer resources and service network through direct exchange. P2P network has self-organization, fault tolerance, strong scalability and other characteristics, especially suitable for various applications in wide area network is a combination of P2P and P2PStreaming for streaming media system has become a research hotspot, now P2PStreaming system, such as SplitStream, DONet, PPLive and PPStream. As shown in Fig. 2. This paper will design and implement A single source of P2P streaming media service system [12]. One or a group of server cluster as a server to provide services to the existing system of single source node in the system, the other in accordance with certain rules to form a data source for the multicast tree root [13]. The difficulty
Implementation of Large-Scale …
1639
Fig. 2 P2P sketch map
in the design of the system to construct and maintain the overlay network for at the bottom, and the optimization of data allocation algorithm based on this. As an important means to evaluate students’ oral English ability, oral English test is more and more frequent [14]. However, the traditional oral examination format for everyone’s dialogue is not suitable for the current teaching and social requirements, and reform is urgently needed. Relying on the existing network-based language laboratory, a comprehensive comparison between the traditional oral English test format based on “everyone’s dialogue” and the large-scale oral English test form based on computer network was carried out, and a large-scale computer network based The English Speaking System is applied to the school-level oral English test.
3 The Composition of Large-Scale Online English Speaking Test System Based on Computer Network The large-scale networked spoken English test system consists of two parts: hardware and software: the hardware is mainly composed of computer equipment, network equipment and earphone microphone receiving equipment. The software part consists of three functions: management, teacher and student: the management function is mainly (1) Examination management: the time, location, location, candidate scope, invigilation teacher arrangement, examination paper arrangement, etc. (2) Examination management end: The unified examination start and end instructions are issued by the end; (3) Marking management: The examination manager arranges the marking task, the review method, and the completion time of the marking. The main functions of the teacher are: (1) Test paper production and test paper management: the various materials are integrated into a test paper for various questions. The produced test papers are automatically classified into the test paper library, and the teachers manage the existing test papers in an orderly manner through the test paper library management. (2) The teacher’s end is also the invigilator of the oral English
1640
S. Li
test implementation, and undertakes the organization of the test and the examination process. Supervised function; (3) The teacher completes the review of the marking task assigned to himself through the scoring module of the teacher. The main function of the student is to conduct an oral English test for the “human-machine dialogue” class for the teacher to make a good test paper. The traditional spoken English test system based on “everyone’s dialogue” can no longer meet the requirements of current teaching. The test is inefficient and has a long duration, which makes the school-level oral English test impossible. Traditional oral English tests are usually conducted in the form of face-to-face conversations. If you implement a school-wide oral test at the school, all college English teachers will take at least two weeks to complete. Teachers are very nervous during the examination process, causing misery. Therefore, although the school-wide oral examinations are organized every year, it is not feasible to implement them, which is a great contradiction. Lack of uniform evaluation criteria and low reliability. Because the traditional face-to-face oral English test lasts for a long period of time and takes two to three weeks to complete, it is easy to cause inconsistencies in test results at different times. On the other hand, the traditional oral English test is usually carried out by the teacher in the scheduled class time. Each topic requires the teacher to dictate, and the teacher is required to give the score immediately. The evaluation of the teacher’s evaluation criteria is different, and the same judge teacher. The stability of the evaluation criteria of different time has been questioned, so the traditional English oral examination system based on “everyone’s dialogue” is difficult to be included in the student’s formative evaluation system. The examination form is single. Due to the limitations of time and space, the traditional oral examinations are mostly verbally expressed by the teacher, or the oral examination is used to convey the oral task. This is greatly divorced from the actual practice of the oral English test, which greatly lags behind the current information conditions. Diversified development of communication forms in the multimedia environment. The single form of the exam severely decouples the exam from the actual application scenario, making the oral exam flow in form.
4 Networked English Speaking Test Implementation The networked spoken English test system completely realizes the process of oral English test, and at the same time utilizes (1) Test management and use the test management module to arrange separately for the test room arrangement, the candidate’s scope, the invigilator and the test paper under the same interface. After the arrangement is completed, the system will distribute it to the corresponding personnel according to the information of the candidates and the invigilator. (2) The production of test papers, the large-scale networked spoken English test system has a special test paper production system. Through this system, the teachers only need to organize the materials needed, and then the system will organize the materials into various questions. After the design of the stem is completed, the test paper making
Implementation of Large-Scale …
1641
tool is used to set and match the answering time and answering process. After the test paper is completed, it will be automatically included in the test paper library for later test call. (3) Implementation of the examination process The implementation of the large-scale networked oral examination process requires the management, the teacher and the student to complete the task. First, the management side selects the specific examination and issues the examination start instruction; then the teacher enters and implements the invigilation function. Finally, the candidates enter their respective students to enter the exam. The examination process is a one-click operation, and the examination situation can be patrolled and managed during the examination. After the exam is over, the candidate submits the content of the answer. The invigilator will end the exam after the answer is uploaded, and the management will end the entire exam. (4) Review and analysis of the test results. After the test is over, the management end will subcontract the results of the whole test. The tasks can be assigned according to different types of questions, or assigned according to the test site or class. During the review period, the marking teacher can review online or offline.
5 Prospects for Oral Test in Computer Network Environment In the computer network environment, the normalized school-level oral examination is feasible. The large-scale oral examination based on computer network saves time and energy in the aspects of examination organization, examination implementation, test paper production, examination result evaluation, and examination result analysis, so that the whole school scope The internal speaking test has the conditions for normalization. The construction of the oral test database and the test paper library is imminent. Since the use of the current oral examination system is in the initial stage of implementation, the materials for making test papers are still relatively small, and the entire set of examination papers that can be directly used for oral examinations is relatively small. If you really implement a normalized large-scale oral test and avoid duplication of test papers, you need to organize specialized personnel to collect or design a large number of oral test questions, and proceed to accumulate the corresponding test questions and test papers. Research on computer-based machine evaluation methods is worthy of development. With the development of large-scale oral test, the workload of the test results will increase. If you want to make the large-scale oral test normal, use computer network technology to design a set of high-speaking oral test evaluation. The mechanism, and thus the oral examination paper review, can greatly save the workload of the marking teacher, so the research on the evaluation mechanism of the examination results becomes more and more important, which puts higher requirements on the oral system.
1642
S. Li
6 Conclusion Compared with the traditional oral examination system for everyone, the large-scale spoken English system based on computer network makes full use of the advantages of computer network, which makes the test break the time and space constraints, and has outstanding advantages in the following aspects: It can be seen from the table that the large-scale examination system based on computer network makes full use of the advantages of computer network, which greatly simplifies the various processes and makes the examination implementation more flexible. The large-scale oral examination system based on computer network has shown strong advantages in many aspects of the examination. It is the necessary condition for the normalization of oral examination and the formation of students’ formative assessment. However, there is still room for refinement and improvement in the construction of test questions and test papers, and computer-aided oral reading.
References 1. Xu, Lanying, and Hanbin Lu. 2008. On the establishment of a unified university English grading oral examination model. The Crazy English Teacher Version 5: 15–19. 2. Xing, Shumei. 2014. Analysis of digital English spoken English examination system in colleges and universities. Network and Information Engineering 8: 21–25. 3. Lai, C. 2015. Modeling teachers’ influence on learners’ self-directed use of technology for language learning outside the classroom. Computers & Education 82: 74–83. 4. Kumaravadivelu, B. 1994. The postmethod condition: (E) merging strategies for second/foreign language teaching. TESOL Quarterly 28 (1): 27–48. 5. Costa, J., G. McPhail, J. Smith, et al. 2005. Faculty first: The challenge of infusing the teacher education curriculum with scholarship on English language learners. Journal of Teacher Education 56 (2): 104–118. 6. Klingner, J.K., and S. Vaughn. 1996. Reciprocal teaching of reading comprehension strategies for students with learning disabilities who use English as a second language. The Elementary School Journal 96 (3): 275–293. 7. Share, D.L. 1995. Phonological recoding and self-teaching: Sine qua non of reading acquisition. Cognition 55 (2): 151–218. 8. Harper, C., and E. De Jong. 2004. Misconceptions about teaching English-language learners. Journal of Adolescent & Adult Literacy 48 (2): 152–162. 9. Bao, Wenshu, Haiying Zhou, and Feng Xie. 2017. An optimal design of web based online English teaching by using struts framework. Boletin Tecnico/Technical Bulletin 55 (10): 58–63. 10. Wenshu, Bao. 2014. Research on college English teaching based on intercultural communication in engineering universities. World Transactions on Engineering and Technology Education 12 (3): 191–195. 11. Bao, Wenshu, Haiying Zhou, Lu Wang, and Feng Xie. 2016. The system of knowledge management using web based learning and education technology. Computer Systems Science and Engineering 31 (6): 469–473. 12. Zhao, X., and L. Zhu. 2012. Schema theory and college English reading teaching. English Language Teaching 5 (11): 111–117.
Implementation of Large-Scale …
1643
13. Dreyer, C., and C. Nel. 2003. Teaching reading strategies and reading comprehension within a technology-enhanced learning environment. System 31 (3): 349–365. 14. Vaughn, S., P.G. Mathes, S. Linan-Thompson, et al. 2005. Teaching English language learners at risk for reading disabilities to read: Putting research into practice. Learning Disabilities Research & Practice 20 (1): 58–67.
Simulation Analysis of the Life Cycle of the Tire Industry Cluster Based on the Complex Network Xianghua Li
Abstract As a traditional manufacturing industry, the high carbon emissions run through the entire life cycle of the tire products. Taking the radial tire industry as an example, using 205/65/R/15 tire data, the carbon emissions of China’s tire industry were calculated. The empirical results show that the annual CO2 emission of the radial tires produced in China alone is as high as 316 million tons in the entire life cycle, and is concentrated in the use and production stages. Therefore, through improving the performance of the tire products, accelerating the development and production of the low-carbon environmental protection tire products, establishing the industrial symbiosis network, and realizing the low-carbon transformation with low energy consumption, low pollution and low emissions is the inevitable choice for the development of China’s tire industry. Keywords Complex network · Tire industry · Cluster life cycle · Simulation analysis With the globalization of the world economy and the gradual deepening of the global economic integration, the internationalization of tire enterprises has become an inevitable trend in the development of the tire industries in various countries, and is the only way to achieve the strong enterprises. Take the three tyre giants as an example, Bridgestone has 49 tyre factories in 23 countries, and Michelin has 50 tyre factories in 19 countries, while Goodyear has 37 tyre factories in 21 countries [1]. The simulation analysis of the tire industry cluster life cycle based on the complex network will provide a scientific reference for the transformation and optimization of the tire industrial structures in China [2]
X. Li (B) Qingdao University of Science and Technology, Jinan Shandong Province, 250000, China e-mail: [email protected] Shandong Youth University of Political Science, Jinan Shandong Province, 250000, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_196
1645
1646
X. Li
1 Global Tire Industry and the Development Characteristics of China’s Tire Industry The manufacturing equipment automation and informatization: Foreign advanced tire enterprises have developed their own high-end manufacturing technologies, such as Michelin C3M technology, Mainland MMP technology, Goodyear IMPACT technology, and Pirelli MIRS technology and so on [3]. At present, the mechanical automation has been widely used in the foreign advanced tire enterprises. These companies apply the robotic handling technology to the entire process of their tire production. The conveying process is basically unmanned, and the forming-vulcanizing-testing-warehousing process has been fully automated [4]. Green manufacturing technology: In the selection of the tire raw materials, rubber, accessories and additives with the high performance, multi-function and nontoxic safety are widely used, and the toxic and carcinogenic substances are strictly restricted, which tend to be green and energy-saving. In terms of the manufacturing technology, the low-temperature continuous mixing, the multi-drum tire forming, the high-temperature nitrogen-filled vulcanization, the wet mixing, the one-step molding, and the electronic radiator vulcanization are gradually becoming the development trends, paying more attention to the high efficiency, safety and energy saving [5]. Tire products are safe, environmentally friendly and intelligent. The green tire, which is characterized by safety, efficiency, energy saving and environmental protection, is the mainstream direction of the development of the international tire industry [6]. The tire structure has also been upgraded from “three modernizations” (meridian, flattening and tubeless) to “new three modernizations” with low roll resistance, high performance and multi-function, and has entered an era of safety, intelligence and longevity. Because the radial tire has the characteristics of wear resistance, fuel saving, comfortable ride, traction, stability and high-speed performances, the radial tire has become the main tire product in the world. The radial rate of the car tire in developed countries such as Europe, America and Japan reaches 100%, and that of the truck tire is more than 90%. The characteristics of the technology-intensive have been further strengthened, while the characteristics of the capital-intensiveness and the labor-intensiveness have been weakened. Michelin’s “Command and Control Communication – Manufacturing Integration System” can save 50% of the construction investments and 90% of the raw material losses. Goodyear’s IMPACT technology can improve the processing accuracy of the tire production by 43% and the product consistency by 100%, improve the production efficiency by 70%, reduce the labor by 42%, reduce the costs by 20%, reduce the inventory by 50%, save the raw materials by 15%, and shorten the vulcanization time by 20%. In 2013, the tire industry witnessed a rare boom in production and marketing. The capacity utilization and profitability of the manufacturing enterprises were obviously too fast, but there was some false demand. Generally, the tyre demand can be divided into two parts. The first is the rigid demand caused by the normal automobile matching
Simulation Analysis of the Life Cycle …
1647
and the increase of the ownership. According to the empirical data of the increase of the automobile ownership and production and sales in recent years, the increase of the tyre demand should be between 10 and 15%. Secondly, the price of the natural rubber has fallen in the past year, which leads to the expectation that the price of tyres will fall. Dealers have increased the intensity of the inventory compression to avoid the cost of the capital occupation. Since the price of the natural rubber stopped falling and rebounded in 2013, the demand of retailers’ replenishment stock has increased, but this part has increased for a short time, and because of the increasing information of the tyre demand transmitted by dealers, it has a certain amplification effect. Therefore, if the manufacturer does not know that the distributor has a certain demand for the replenishment, the demand of the manufacturer may be enlarged, and there is also an enlargement effect in the information transmission among different levels of the distributors. The domestic tire exports are more diversified. China’s exports to the United States and the seven European Union countries are declining year by year, and the tire exports are gradually shifting to Asia, Africa and other places. The growth of the demand in these areas may promote the export of tires in China for a long time. At the same time, some leading domestic enterprises begin to carry out the industrial layout in the rubber producing areas such as Southeast Asia.
2 Complex Network Model of the Industrial Cluster The industrial cluster refers to the geographical concentration of enterprises in the same industry as well as the related and supporting industries in the same industry. There is a demand-supply relationship between the upstream and the downstream enterprises in the industrial clusters. With the continuous development of the complex network theories and methods, many scholars at home and abroad began to combine the industrial clusters with the complex networks for research. At present, the research of the industrial cluster based on the complex network mainly focuses on the entire model of industrial cluster network and its evolution, lacking the analysis of its ability to resist risks. A complex network model of the industrial cluster is designed to analyze the changes of its ability to resist risks when different types of nodes exit the network. In the complex network model of the industrial clusters, firstly, according to the position of the enterprises in the industrial chain, enterprises in the industrial clusters are abstracted into the upstream, the middle and the downstream enterprises. The connection mode of the three types of enterprises is set up as follows. The upstream enterprises and the downstream enterprises can only connect with the upstream enterprises, and the midstream enterprises can connect with the upstream and the downstream enterprises. Connections between nodes are represented by the directed edges. The industrial cluster network model is based on the BA network model and the LC local world evolution model. The specific construction process is as follows:
1648
X. Li
In the complex network model of the industrial clusters, the initial state of the network is M0 nodes and E0 links. M0 nodes are randomly allocated to the three different nodes, and the connections between the nodes in the network are randomly generated. Every other time interval T introduces a new node i to the network. If the new node is the upstream enterprise, the downstream enterprise and the upstream enterprise respectively, then the carrying edges are m1, m2 and m3, and the local world is the midstream enterprise, the upstream enterprise, the upstream enterprise and the downstream enterprise respectively. The industrial cluster is a worldwide economic phenomenon. Its enormous vitality and great contribution to the social and economic development make the economists devote a lot of energy to the study of the industrial clusters. Tichy・G believes that the life cycle of the industrial clusters can be divided into four stages. The first is the generation stage. That is, in the stage of the product production and development, the product and the production process are not standardized. Enterprises initially gather together to produce products. Enterprises in the cluster gain competitive advantages based on the external economy generated by the information network, the division of labor and the cooperation, and the resource sharing. The second is the growth stage. The rapid development and the high growth rate of the cluster may also make the cluster have no pressure to innovate, but often focus on the best-selling products, and expand their production with the increasing speed and scale. The resources (knowledge, information and skills and so on) in the cluster will be increasingly concentrated, and more resources will be devoted to the leading industries (or products). The third is the mature stage. The production process and products are becoming standardized. Enterprises are pursuing large-scale production. Competitions among local enterprises with similar products are intensifying and profits are declining. The fourth is the recession stage. At this stage, a large number of the enterprises in the cluster exit, and there are only a small number of the new entrants. This paper also follows this train of thought in the study of the industrial cluster development. From the perspective of the new institutional economics, it analyses the situation of the industrial cluster as a system in different stages of its development process. From the point of view of the institutional economics, the industrial clusters can meet the needs of enterprises in some aspects: the economic function and the security function. The economic function is that the industrial clusters can reduce costs (transaction costs and production costs and so on) and improve the economic benefits. The safety function is that the industrial clusters can reduce risks (market risks, transaction risks, moral risks, and innovation risks and so on) and improve the stability of the enterprise operation. From the aspect of the economic function, the industrial clusters can only be formed when the profits of enterprises forming the industrial clusters exceed the expected costs. That is to say, the potential institutional innovation profits generated by the industrial clusters will generate the demand for the industrial clusters and thus promote the emergence of the industrial clusters. Therefore, the existing system cannot be obtained, and the external profits that the industrial clusters can obtain are the most important reasons for the emergence of the industrial clusters.
Simulation Analysis of the Life Cycle …
1649
3 Simulation Analysis of the Tire Industry Cluster Life Cycle Based on the Complex Network The industrial cluster is a complex network composed of different enterprises located in the industrial chain. In this paper, we design a complex network model of the industrial clusters by abstracting and simulating the connection characteristics and the network evolution process of the industrial clusters, and analyze the impact of different types of nodes on the network risks. The results show that the ability to withstand risks decreases rapidly when the nodes exit the network in the order of degree or median, and the trend and speed of the decline of the ability to withstand risks are highly consistent when the nodes exit in the order of degree and median. The difference of the complex network research is that first, the properties of the large-scale nodes and their connections in the network are investigated from a statistical point of view. Some of the most important properties and parameters in the complex networks include the degree and the degree distribution, the aggregation coefficient, the average shortest path length, and the median and so on. The degree of a node in a network is usually defined as the number of the connecting edges of the node. The degree distribution of the node in the network is expressed by a function, which means that the probability of an arbitrarily selected node is just right, and it is equal to the proportion of the number of nodes in the network to the total number of nodes in the network. The aggregation coefficient is used to describe the aggregation of nodes in the network. The aggregation coefficient of a node is defined as the ratio of the number of the adjacent edges among all its neighbors to the maximum number of the possible adjacent edges. The aggregation coefficient of a network is the average of the aggregation coefficients of all nodes. The distance between two nodes is the number of the edges connecting the shortest paths between them. The diameter of the network is the maximum distance between any two points, and the average path length of the network is the average distance between all pairs of nodes. The median is divided into the edge and the node, reflecting the importance (influence) of the nodes or the edges. The complex network model has two parts, including the visual components and the routines, which are closely related. The visual components are created in the Interface, and then the corresponding code is implemented in the routine. By setting the properties of the control, the two can be linked. The routines in the model include the initialization routines and the simulation routines: The initialization routine is implemented by setup. A button in the Interface page is connected with the setup routine. In the setup, the initial state of the model is set up, and the required knowledge-intensive companies are created and their states are set. For example, each knowledge-intensive company has some initial capitals, and the initial capital reflects the size of the company, and the initial capital is random, and the company with more capital is large. The capital of a large company is 10 times that of a small company, which is used by the company to produce and improve its knowledge levels. The execution of the simulation is realized by routine go, which compiles the required execution instructions in go routine and completes the
1650
X. Li
cycle simulation. A button in the setup controllable component is associated with the go routine, which is a permanent button. After clicking, the go routine will be executed repeatedly until the user clicks the button again or meets the stop instruction, and the simulation terminates. In the process of the go routine implementation, the knowledge-intensive companies apply their knowledge to the production. We define their potential innovation capability as the innovation hypothesis. The innovation hypothesis set is a subset of the knowledge gene Kene, including several knowledge units, which is the motive force of the innovation and then the profit. The mapping process from the innovation hypothesis IH to the new product is the process of extracting the attributes Ci of the innovation hypothesis set.
4 Conclusion The simulation analysis of the tire industry cluster life cycle based on the complex network provides an effective reference for the current development of the tire industry in China. In the use of the raw materials, further research and experiment on the rubber materials, the filling and reinforcing materials and the skeleton materials and so on will be carried out, and new materials will be actively promoted, and research and application of the environmentally friendly, light and recyclable materials will be emphasized. According to the requirements of the domestic market and the export market laws and regulations, the technical requirements such as rolling resistance and wet grip force are evaluated initially, periodically and annually. The internal audit report and suggestions for the rectification are submitted. All factors affecting the target market are controlled in the internal management process of the enterprises, and thus the green tires with the high technology content, including the European Union Tire Label Act, can be produced.
References 1. Chen, Hong. 2009. Choice of the industrial cluster development model based on the life cycle theory. Seeker 5: 28–33. 2. Chen, Yehua, and Ying Wang. 2010. Research on the risk control strategy of the industrial cluster based on the life cycle. Modern Management Science 1: 13–18. 3. Jing, Huiying. 2012. Study on the life cycle of the industrial clusters based on the ecology theory. Journal of Tianjin Vocational Institute 14 (9): 71–74. 4. Lihong, Cheng, Helian Xu, and Gang Wu. 2016. Structural characteristic recognition of the trade network of the global construction machinery products based on the complex network theory. Economic Survey 33 (1): 54–59. 5. Wang, Lijun, and Fengwu Han. 2013. Risk analysis of the industrial cluster based on the complex network. Digital Users 23: 247–252. 6. Qingyuan, Zhou, and Liu Ranran. 2016. Strategy optimization of resource scheduling based on cluster rendering. Cluster Computing 19 (4): 2109–2117. https://doi.org/10.1007/s10586-0160655-9.
Design of the Comprehensive Evaluation Model for Operating Risks of Power Grid Companies in Competitive Environment Di Liu, Yingbao Cui and Peiyu Liu
Abstract This paper firstly analyses the operation status and operational risks of power grid companies under the competitive environment, and secondly expounds what comprehensive evaluation is, and then puts forward the establishment of the comprehensive evaluation model of operation risks of power grid companies under the competitive environment, and finally explains the selection of the comprehensive evaluation methods of operation risks of power grid companies under the competitive environment, hoping to be helpful to the operation of power grid companies under the competitive environment. Keywords Competitive environment · Power grid companies · Operational risk · Comprehensive evaluation The electric power industry is the basic industry of our country, which is related to the national economy and people’s livelihood. The key work of the power industry is to ensure the security and stability of the power system [1]. The power grid companies have to face a series of risks while facing new development opportunities in the competitive environment. In order to maximize the economic and social benefits and ensure the safe and stable operation of the power system in a competitive environment, the power grid companies need to take necessary measures to fully understand the risk levels in all aspects of operation, and constantly improve risk management concepts and risk management systems through the comprehensive evaluation of various risks. Based on the full analysis of the operation risks of the power grid companies, this paper studies the design of the comprehensive evaluation model of the operation risks of the power grid companies, which provides an accurate basis for identifying the complex operation risks of the power grid companies.
D. Liu (B) · Y. Cui State Grid Information & Telecommunication Group Co. Ltd., Beijing 100031, China e-mail: [email protected] P. Liu 4Paradigm (Beijing) Technology Co. Ltd., Beijing 100085, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_197
1651
1652
D. Liu et al.
1 Operating Status and Risks of the Power Grid Companies Under the Competitive Environment Introducing the market mechanisms into the power industry can promote the sustainable development of the society, optimize the allocation of the resources, reduce the operating costs and improve the operational efficiency, thus effectively promoting the competition of enterprises. However, there are also a lot of uncertainties in the market-oriented power system, so in order to ensure the healthy development of the power market system, and the open and orderly and fair competitions, we must guard against risks, and identify them, and always pay attention to the risk factors in the market. Under the competitive power market environment, the fundamental purpose of the power grid companies is to maximize the value of the enterprises after they become the operation entity of the power supply link. In the process of the power purchasing and selling, the power grid companies are likely to cause the huge financial risks due to the economic fluctuations in the environment of the power market, the changes in the electricity supply and demand, and the fluctuations in the electricity prices and the poor management of the operators. Therefore, the power grid companies must focus on the operational risks they face. We mainly study the various operational risks faced by the grid companies in the competitive environment for the following two purposes. First, for the sustainable development and the economic benefits of the grid companies, how to deal with the reform of the power system is a realistic problem. Second, explore and study the establishment and improvement of the regional power market. For the large consumers and generators, including the distribution enterprises that are qualified, the two parties are encouraged to sign the power purchase contracts directly in the regional electricity market being promoted in China. The main factors causing risks in the electricity market are the small elasticity of the electricity demand relative to other commodities and the particularity of the electricity commodities, which results in the sharp fluctuation of the electricity prices. Especially in the case of the tight power supply, it will cause the soaring price of electricity [2]. Therefore, for the power grid enterprises, in the competitive environment, the market-oriented reform also brings a series of risks that will cause losses. The loss of the power grid enterprises in the competitive environment needs to be borne by them, which is the ability of the risk management to a large extent that determines the future competitiveness of the power grid companies. For the operation of the power grid companies, how to effectively assess these risks is very important, so we have a certain practical significance and importance for the study of the comprehensive evaluation model of the power grid companies ‘operational risks under the competitive environment’.
Design of the Comprehensive Evaluation …
1653
2 What Is the Comprehensive Evaluation? The comprehensive evaluation is a holistic and overall evaluation. Generally, according to the given conditions, each evaluation object is given an evaluation value by means of a certain method, and then ranked or selected according to the evaluation value. Therefore, the comprehensive evaluation is a complex process, in which the qualitative and quantitative, and the subjective and objective are combined. In order to promote the further scientific decision-making, the entire evaluation process should be reproducible, while the evaluation method should be scientific, operable, fair, reasonable and objective [3]. The evaluation model and method, the evaluation principle, the evaluation experts and their preference structures, the evaluation index system and the evaluation object are the basic elements of the comprehensive evaluation. If we want to carry out a scientific risk system evaluation, considering that there are many factors affecting the operation risks of the power grid companies, we must analyze the combination of the environment and the risk factors of the power grid companies, in addition to the composition of the risk factors and the relationship between them. The key of the entire multi-attribute comprehensive evaluation is to establish the index system and the basis of the accurate ranking or classification of the evaluation objects is to establish a scientific and reasonable index system. Therefore, the establishment of a scientific and effective risk index system has become a key issue in the comprehensive evaluation of the grid companies’ operational risks. The validity of the evaluation results is determined by the selection of the evaluation methods, so in the process of the comprehensive evaluation, the selection of the evaluation methods is also very important.
3 Establishment of the Comprehensive Evaluation Model for the Operating Risks of the Power Grid Companies Under the Competitive Environment In order to effectively supervise the operation risks of the power grid companies, provide the strong support for the power grid companies to make regulatory decisions, and timely monitor the competitive status of the market and the bidding behaviors of the market participants, a set of the scientific and perfect risk assessment system is indispensable. The main operational risks of the power grid are the direct supply risks of large users, the uncertainty risk of the load forecasting, the user arrears risk, the purchase risk and the market power risk of the power producers, which are usually caused by the economic fluctuations, the changes in the electricity supply and demand, the fluctuations in the electricity prices and the poor management [4]. The AHP method is used to construct the index set, divide the comprehensive evaluation objectives into several different components, and then subdivide these parts until the specific indicators can be used to describe these indicators. There are two limitations of the AHP method. The first one is that the selection of indicators
1654
D. Liu et al.
is likely to duplicate, and the second one is more subjective, which affects the final evaluation results. Definition 1: If the evaluation index Ui is more important than a certain evaluation criterion, it is Ui>Uj. Definition 2: Compared with a certain evaluation criterion, If the relationship of the evaluation index U1…Um satisfies the following relations: Ui>Uj>Uk and so on, the order relationship is determined by “>”. The expert weight similarity is expressed by the Euclidean posting schedule, and the corresponding similarity matrix is formed to judge the discrete degree of the weight given. The matrix of the first index weight is as follows: ⎡
⎤ W 11 . . . . . . W 1m ⎦ W = ⎣... W n1 . . . . . . W nm Among them, the number of experts is expressed in n and the number of risk factors is expressed in m. The formula of the proximity degree is as follows: m 1 × (Wik − W jk )2 ri j = 1 − m k=1 The operating risks and the influencing factors in the operation indicators of the power grid companies are shown in Table 1.
3.1 Power Generator Market Strength Because of the existence of the market power, some power producers in the power generation market, in order to obtain the excess profits, clear the prices by controlling the market. The electricity purchase cost of the power grid operation enterprises is also increased under the current single purchaser mode, which is not conducive to the sustained and healthy development of the market, contrary to the principle of the fair market transactions, and harmful to the interests of the power purchasers.
3.2 Risk of Electricity Fee Recovery The ultimate result of the operation of the power enterprises is the electricity charges. The effective operation of the entire power industry operation chain is also directly affected by the recovery and management of the electricity charging funds. For the operation of the power grid companies, how to prevent and avoid the operational
Design of the Comprehensive Evaluation …
1655
Table 1 Operating risks and influencing factors of power grid companies Operating risks of power grid companies
Influencing factors
Market power risk of power generators
Load forecasting risk
Risk of user arrears
Electricity purchasing risk
Risk of direct purchase of electricity by large users
Market scale of enterprises
Weather factor
Risk of internal electricity charge management process
Electricity price fluctuation risk
Market share reduces risk
Transmission restriction
Holiday factor
External environmental risk
Distribution risk of electricity purchase
Cross-subsidy risk
The influence of the bidding mechanism
Big user factor
Credit risk of electricity customers
Risk preference of e-commerce purchasers
Auxiliary service fee increases risk
Data transmission factor
Risk of user credit degree decline
Model error
risks, improve the efficiency of the comprehensive use of the funds, and timely and effectively recover the electricity funds has a decisive position [5].
3.3 Uncertainty Risk in the Load Forecasting At present, the main market players in China’s electricity market are the grid companies and the independent generators, while the single purchase system is the market model. In order to achieve the power balance of the system, the power grid companies should take accurate load forecasting as the basis when signing the power supply contract with the power suppliers. In the case of the power shortage, the contract price will be lower than the real-time market price, and the difference will increase due to the inaccurate load forecasting. The model error, the data transmission factor, the large user factor, the festival factor and the weather factor are the main factors affecting the uncertainty risks of the load forecasting [6].
1656
D. Liu et al.
3.4 Risk of the Large User Direct Power Supply The direct power purchasing by the large consumers is a kind of the mode of purchasing electricity. After negotiation with the power supply enterprises or the power generation enterprises, large users carry out the electricity purchasing and selling transactions under the conditions of bidding for access to the Internet and the separation of the power plants and networks. Generally, the bilateral electricity purchasing and selling contracts are signed directly. The main risks for the power grid companies are the impact of the direct supply of dedicated lines, the credit risk to the power supply enterprises, the risk to the power grid security, the price risk and the reduction of the sales revenue of the power grid enterprises. For the operation of the power grid companies, the main risks brought by the direct purchasing power by the large users include the risk of decreasing the user credit, increasing the ancillary service fees, the cross-subsidization and reducing the market share [7].
3.5 Risk Analysis of the Electricity Purchase With the deepening of the electric power system reform, the separation of the transmission and the power supply will become the next goal of the electric power system reform. And the electricity market will eventually form a perfect electricity retail market and the power generation market. Under the condition of the perfect electricity market, the power supply enterprises will become an independent link that simultaneously undertakes the dual activities of purchasing and selling the electricity. Power supply enterprises will also face the risk of the sales difference and the electricity purchase because of the characteristics of the power cannot be stored. Therefore, in order to enable the power supply enterprises to make the scientific business decisions, it is necessary to evaluate the risk of the power supply enterprises’ purchasing reasonably and effectively. In the electricity market of the single purchaser mode, the purchase risk of the power grid operation enterprises is mainly caused by the fluctuation of the generation companies’ grid price and the fixed sales price. The risk preference, the market allocation risk and the price fluctuation risk of the electricity purchasing volume are the main risks of the electricity purchasing of the power grid companies [8]. According to the principle of the flexibility, we make the comprehensive evaluation decision model scalable and modifiable. According to the actual situation and different stages, the power grid companies can delete, add and modify the indicators in the evaluation index system (Table 2).
Operating risks of power grid companies
Overall risk
57.95
Risk value
24.5
31.3
Electricity purchasing risk
Uncertainty risk in load forecasting
Weight (%)
Level 1 risk indicators
64.55
52.19
Risk value
Data transmission factors
8.40
15.50
26.10
Holiday factor
Model factor
30.80
Big user factor
19.20
23.60
Risk preference of e-commerce purchasers
Weather factor
33.80
42.60
Electricity price fluctuation risk Market distribution risk of electricity purchase
Weight (%)
Level 2 risk indicators
Table 2 Comprehensive evaluation index system of power grid companies
0.1
0.2
0.2
0.1
0.2
0.1
High risk
0.1
0.2
0.3
0.3
0.3
0.2
0.1
0.2
Risk
0.2
0.3
0.3
0.1
0.3
0.2
0.2
0.3
Relative risk
0.2
0.4
0.2
0.3
0.1
0.5
0.4
0.3
Average
(continued)
0.4
0.1
0.3
0.1
Safer
Design of the Comprehensive Evaluation … 1657
Overall risk
Risk value
Table 2 (continued) Weight (%)
20.60
14.60
9.00
Level 1 risk indicators
Risk of user arrears
Market power risk of power generators
Risk of direct purchase of electricity by large users
49.09
71.88
52.84
Risk value
15.20
Risk of user credit degree decline
29.50
Cross-subsidy risk
18.20
37.10
Market share reduces risk
Auxiliary service fee increases risk
18.30
Transmission restriction
51.10
Market scale of enterprises 30.60
27.10
Credit risk of electricity customers
The influence of bidding mechanism
33.20
39.70
Risk of internal electricity charge management Risks in the external environment
Weight (%)
Level 2 risk indicators
0.2
0.1
0.2
0.1
0.1
0.1
High risk
0.2
0.1
0.2
0.1
0.3
0.3
0.6
0.2
0.1
0.1
Risk
0.2
0.2
0.3
0.2
0.5
0.6
0.2
0.2
0.2
0.2
Relative risk
0.5
0.5
0.3
0.5
0.3
0.3
0.3
Average
0.1
0.2
0.2
0.2
0.2
0.3
0.2
Safer
1658 D. Liu et al.
Design of the Comprehensive Evaluation …
1659
4 Selection of the Comprehensive Evaluation Method for the Operating Risks of Power Grid Companies Under the Competitive Environment Under the competitive environment, the selection of the comprehensive evaluation methods for grid companies’ operational risks mainly includes the following four aspects. First, the feasibility is strong, simple and practical, and the practicability and the scientificity of the new methods are difficult to evaluate in a short time, and need the long-term verification, so the evaluation methods should not blindly pursue innovation. In order to ensure the operability and simplicity and practicability of the evaluation method, the most suitable comprehensive evaluation method should be selected. Secondly, the characteristics of each comprehensive evaluation index system should be fully considered. When conducting the comprehensive evaluation, the most appropriate method should be used to select different evaluation methods according to different indexes. Thirdly, the choice of the evaluation method is to ensure the comprehensiveness and accuracy of the basic data of the evaluation index. Fourthly, no matter how the evaluation results of any index are obtained, they should be expressed in a single number.
5 Conclusion In summary, the index system of the operation risks of the power grid companies established in this paper is based on the operation risks of the power grid companies, and puts forward the effective suggestions on the selection of the evaluation methods, and also provides reference basis for the decision makers to control the operation risks of the power grid companies, so as to benefit the sustainable development and the economic benefits of the power grid companies. Acknowledgements This work was supported by State Grid Technical Project (No. 52110418002W).
References 1. Qiu, Huadong, Guang Duan, and Dongxiao Niu. 2019. Operation benefit evaluation of power sales companies based on ICWME. Research on Technology, Economy and Management 4: 17–22. 2. Tang, Kaiyu, Renjing Liu, Jitao Li, Yi Li Yi, and Yu. Wenqi. 2018. Research on the SD-based business forecasting model for power grid companies. Smart Power 46 (5): 84–90. 3. Li, Xianghua, Yudong Tan, Chelun Xie, Zhengwei Jiang, Ming Wen, De Zhang, and Jia Chen. 2018. Research on the power grid development strategy based on the investment capacity measurement. Management Observer 1: 48–49.
1660
D. Liu et al.
4. Zhimin, Yin. 2017. Comprehensive plan management and control system of Guangxi power grid company and its optimizing research. Guangxi Electric Power 7: 23–26. 5. Daoquan, Ou. 2017. Risk management of the power grid operating enterprises based on the power market environment. Modern Economic Information 8: 383. 6. Liu, Chang, and Liang Yu. 2016. Diagnostic analysis of the power grid enterprises. Journal of Anhui Electrical Engineering Professional Technique College 21 (4): 47–50. 7. Zhao, Huiru, Nana Li, and Jinfeng Xing. 2016. Monthly operation early warning model of the power grid company based on the combination weighting and the sector radar graph. Electric Power 49 (9): 119–124. 8. Pingkuo, L., and T. Zhongfu. 2016. How to develop distributed generation in China: In the context of the reformation of electric power system. Renewable and Sustainable Energy Reviews 66: 10–26.
The Coding Technology of Operation and Management Risk Characteristics Based on the In-Depth Learning Di Liu and Zhen Qiu
Abstract In the enterprise risk identification project, the data has the characteristics of the complex data sources and the diverse risks. The traditional feature extraction methods cannot cope with the multiple complex data sources at the same time. In this study, the risk feature extraction based on the single relationship of thein-depth learning and the feature coding technology of the risk atlas considering the time series can effectively extract the feature vectors of the risk atlas and avoid them at the same time. It avoids the complexity and blindness of the artificial feature extraction. And it is verified by a large-scale organization’s experiment on the enterprise’s overdue risk. Under the same model framework, the characteristics generated by using the risk feature coding technology are better than those given by the traditional experts under the model’s various indicators, which provide the strong support for the follow-up risk identification. Keywords In-depth learning · Feature coding · Risk identification
1 Research Background The State Grid Co., Ltd. is a large-scale key state-owned enterprise related to the lifeline of the national economy and the national energy security [1]. The company invests in the construction and operation of the power grids as its core business and undertakes the basic mission of ensuring the safe, economic, clean and sustainable power supply. The company covers 26 provinces (autonomous regions and municipalities directly under the Central Government), covering more than 88% of the land area, and more than 1.1 billion people in the power supply services. For 14 consecutive years, the company has been evaluated as a Class A enterprise in the performance appraisal of the central enterprises. Especially in the five years since the 18th National Congress, the company’s assets, income and profit scale have greatly increased. From 2016 to 2018, the company ranked 2nd in Fortune 500 and 1st in D. Liu (B) · Z. Qiu Research & Development Center of State Grid Information & Telecommunication Group Co. Ltd., Beijing 100031, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_198
1661
1662
D. Liu and Z. Qiu
China 500, and it is the largest public utility enterprise in the world. In promoting the structural reform of the supply side, tackling the poverty alleviation and building the “The Belt and Road Initiative” project, we have played an important role in the “six power” of the state-owned enterprises. The company carries out the national innovation-driven development strategy, aiming at “building world-class power grid and international first-class enterprise”, guarantees the construction of the innovation system, relies on the key project construction, vigorously promotes the “mass entrepreneurship and innovation among all people”, comprehensively implements the “first-class four” science and technology development strategy, and achieves the remarkable results in the scientific and technological innovation [2]. In the fields of UHV, smart grid, large power grid security and new energy, a number of the worldclass innovative achievements have been formed, which occupied the technological commanding heights of the world power grid. Relying on the company’s technological and management advantages, the company has successfully invested in and operated the backbone energy networks of many overseas countries and regions [3]. The international development has made outstanding achievements, and its competitiveness and influence in the world have been constantly highlighted. Every move of the company has attracted close attention all over the world. At the same time, the increasingly complex internal and external environment also makes the company’s operation face severe internal and external operating risks and challenges at any time. Among them, the external risks are mainly reflected in the timely detection of the public opinion crisis and the public relations [4]. The internal risks are mainly reflected in the production operations, the material management, the clean government construction, the legal affairs, the corporate cultures and other internal management risks [5]. In order to ensure the normal operation and management of the company and maintain the company’s brand images in the market, these risks should be detected and resolved in time. Since the launch of this scientific research project, companies in Zhejiang, Anhui and Fujian have actively cooperated with the project team to conduct the business researches. In the investigations, the departments at all levels of the provincial network companies elaborated in details the ways of hazards caused by various risks to the production and operation, the existing measures of the risk occurrence and prevention, and the methods of suggestions for improvement, and actively prepared data that could provide scientific research topics.
2 Operation Supervision Center The operation supervision is mainly responsible for the data acquisition and the operation analysis, from the media public number, the State Network Outreach Department, micro-blogs, and the mobile news client data retrieval, to achieve “risk prevention and efficiency increase”. The operation supervision center plays an important role in the enterprise operation risk management and control, in which the operation supervision center has become the focus department of Fujian Electric Power
The Coding Technology of Operation …
1663
Company in the enterprise operation risk management and control, realizing the risk monitoring and the early warning of all the professional business processes. Each provincial network company has constructed an operational risk monitoring system with the risk information base and the risk monitoring subject base as its core. Among them, Anhui Company has constructed more than 1300 business process data monitoring subjects. Focusing on the major risks, and supporting the establishment of the risk monitoring, the early warning and management and the control mechanism, the real-time risk closed-loop management of the entire process. Based on the operational information services, and carry out the comprehensive operation and management diagnostic analysis, which focuses on monitoring risks including:
2.1 The Impact of Disasters or Severe Weather on the Operation of the State Grid The impact of the natural disasters on the power equipment is sudden, wide-ranging and destructive. In recent years, the number of cases of the large-scale faults of the power transmission and the transformation equipment caused by natural disasters such as typhoon, icing, low temperature, gale, lightning, pollution, and mountain fire and so on is on the rise. Due to the failure of the real-time early warning and the timely adoption of the effective preventive measures, the equipment damage or the power outage is caused. The security and economic losses are enormous. Therefore, monitoring the development process of natural disasters, dynamically calculating the probability of the power equipment failure caused by the disaster conditions, accurately publishing the real-time early warning information before the equipment failure and guiding the prevention and control work can effectively avoid or reduce the major economic losses caused by accidents and create huge economic benefits.
2.2 Potential Risks from Major Holidays Major holidays may usher in the peak of electricity consumption, and this stage is in a state of the rotational duty and the staff shortage, and once there is a large-scale blackout or even the distribution burns and other major accidents, not only will we face a large number of complaints and public opinion pressure, but it will also pose a threat to people’s lives and property. The Transport Supervision Center hopes to scientifically forecast the power consumption load and the customer traffic, focus on monitoring the power outage, the low voltage and the heavy overload analysis gathering area, arrange the peak shaving of the thermal power and the pumping storage units rationally, and adopt the unit phase-in, the reactive power compensation device, the pull-out line, and the DC standby and DC step-down, in combination with the weather forecast and the power
1664
D. Liu and Z. Qiu
network load situation during the Mid-Autumn Festival and the Spring Festival and other major holidays, the voltage reduction and other voltage control means, to effectively control the system voltage level, and ensure the stable operation of the power grid, and at the same time, carry out the effective deployment of the customer service personnel to greatly improve their service efficiency.
3 Major Accident Risks in Daily Operation In the daily operation, it is necessary to focus on the monitoring of the level 1–2 personal, the power grid or the equipment incidents, dam breakdown incidents of the hydropower stations, major traffic accidents, fire incidents, and environmental pollution incidents, and so on, so as to timely detect and timely control safety.
3.1 Marketing Department Risk of the electricity charge recovery: Due to the external factors such as the economy, taxation and the government intervention, the risk of the electricity tariff recovery is caused by the customers of the power utilities. At present, the power supply enterprises generally use the operation mode of “first use electricity and then pay for it”, which lags behind 30 days to adopt the blackout measures to arrears, which brings some difficulties to the recovery of the electricity charges. The local administrative departments arrears or about the recovery of the electricity charges, and the weak legal concept of the individual users, all of which lead to the risk of the recovery of the electricity charges. Customer complaint risk: There is a certain gap between the reliability of the power supply and the customers’ expectation of the non-stop power supply, which leads to customers’ complaints about the service quality of the power supply companies. Customer electricity theft risk: Customer power theft and default methods emerge in an endless stream, and it is very difficult to prevent the electricity theft.
3.2 Finance Department Risks Every year, the provincial finance ministries carry out the financial operation risk survey and the problem supervision and rectification. Among them, this year, Fujian Province has focused on the fund settlement risk control and the electricity price implementation risk control. In the electricity price implementation, it has focused on the risk monitoring of the small hydropower and the photovoltaic electricity price implementation. However, provinces still face great financial risks:
The Coding Technology of Operation …
1665
The financial budget management has not yet been fully implemented. There is a lot of arbitrariness in the budget management, and there is no strict budget management model. Some provincial network companies have not even prepared the departmental budgets, and there is a lot of arbitrariness in the financial management, which is greatly influenced by the human and other factors. Many infrastructure projects, overhauls, and science and technology projects lack the entire process budget management and the cost management. There are problems in the cost management: The accounting settlement, the current settlement, the reimbursement, the meetings, the travel and many other kinds of the expenditure exceed the standard, and the financial personnel are not standardized. The company’s operating costs are increasing, and the company’s cost management only focuses on how to reduce costs, and only relies on the saving to reduce the costs. It does not consider the cost effectiveness from the perspective of the efficiency, and does not apply the principle of the cost-benefit balance. Secondly, the company only pays attention to the short-term economic benefits of the company in the cost management, but ignores the important role of the cost in the market competition. Capital managers and systems are not perfect: The financial management awareness is not strong, and the post is not complete. The management of the bank accounts, the reserve funds, the bank bills, the financial hardware, the secret keys, and the staff and funds are even many part-time jobs. The authorization for the examination and approval of funds is not perfect and the execution is not strict. Tax issues: Increase the revenue, and ignore the policies, with the irregular invoices and a lack of the systematic learning. The financial risk monitoring ability is limited. There is no perfect internal financial monitoring mechanism, and the financial activities are affected and restricted by the overall situation of the national economy and the industry prosperity, the adjustment of the national credit and the foreign exchange policies, the fluctuation of the bank interest rates and the exchange rates, and the degree of the inflation and other external macroeconomic environment. The ever-changing and uncertain financial environment of the company is because these factors exist outside the company. The changes are not easy to predict and difficult to change for the company, which will inevitably affect the financial activities of the enterprises, such as the fluctuation of the investment efficiency of the company caused by the fluctuation of the stock market and the fluctuation risk of the national interest rate policy. In the survey, the provincial network companies also introduced the data that they are preparing and can provide, including: the basic industrial and commercial information of the power utilities, the financial information, the announcement data of Shanghai and Shenzhen Stock Exchange, the operation status information of small and medium-sized enterprises in China, the court decision information, the enterprise data publicized by the judgment document network, the tax rating information, the court announcement information, the customer data and the market environment number. According to the internal management data, including the procurement bidding information, the operation monitoring, the financial data, the marketing and distribution data, the customer service center data, the dispatching data, and the
1666
D. Liu and Z. Qiu
transportation and inspection data, further refine the classification of the business risks in the scientific research subjects:
3.3 External Operating Risks of Enterprises It mainly refers to a large number of the complaints and the public opinion risks caused by the major production accidents, unreasonable distribution and other major events, such as the large-scale low voltage, and the blackouts and so on, as well as even the risk of the serious social negative emotional outbreak caused by the malignant cyber attacks. It mainly refers to the impact of the global economic changes on the industry, the impact of the regional market conditions on the number of customers, and the market demand and so on, the problems caused by the overcapacity, the high pollution and the high energy consumption, and the risks brought by the impact of the new policies on the industrial restructuring. It mainly refers to the risk of the malicious arrears of the electricity charges by the governments, enterprises and individual users.
4 Research Theory of the Characteristic Coding The deep learning is a machine learning method, which learns objects through the results of the neural networks with the multiple hidden layers. Through the end-toend machine learning, the difficulty of understanding the entire knowledge system is reduced, and the tedious manual feature extraction is avoided. In addition to more accurate prediction, the in-depth learning can also automatically learn different features from each layer of the network structure at the same time of the prediction. Therefore, thein-depth learning can also be used to generate features. This method of generating features is also called Embedding in the field of the deep learning. It means finding a mapping, mapping the original feature space to another space, and generating a new spatial expression. Generally speaking, we can automatically find this mapping relationship by setting a suitable target value and learning the target value through the deep network. The word2vector algorithm is the most classical Embedding method. It regards words as a serialization process. It sets output as the next word of the input. By learning the sequence relationship between words, it finds a dense feature projection method, which transforms the sparse vector of hundreds of thousands of dimensions into a dense vector of 150–200. Through this mapping, the problem of the synonym/synonym expression can be well solved. In fact, a considerable number of ideas of embedding are derived from the word2Vector algorithm, which can solve the problem of the embedding by transforming some relations into the word sequence
The Coding Technology of Operation …
1667
relations. In the research of this topic, it also involves a lot of business knowledge to construct the corresponding “word” sequence relationship to encode the features. In addition, there is a special kind of the data in the business risk: the knowledge map data. If these data are to be input into the machine learning algorithm as the feature data sources, it is necessary to map the knowledge map data sources into the feature space that the machine learning can process through some feature coding technologies. The knowledge atlas consists of points and edges. Nodes are used to represent the entity, and entities contain attributes and the values of attributes. Entities in the traditional knowledge maps are usually composed of the conceptual symbols, such as the natural language vocabulary. The edge expression in the map of the traditional knowledge is the relationship. It connects two single points, that is, the two entities. The strength of the relationship is expressed by weight, and the weight of the edge of the traditional knowledge map is usually constant. Bordes A (NIPS 2013) proposes a simple model TransE which embeds entities and relationships into the low-dimensional vector space. The model has become the baseline of the vectorized representation of the knowledge atlas, and different variants have been derived. In the TransE model and the TransH (Wang Z AAAI, 2014), TransR (Lin Y AAAI, 2015), and TransD models derived from it, there is a premise that the relations are the translation vectors between entities. Because there are a lot of many-to-one identical relationships in the diagram of the business risk (e.g. one enterprise versus multiple legal persons), this assumption is not suitable for this scenario. In addition to embedding the entities and relationships into the low-dimensional vector space, another idea is to regard the knowledge map as a graph. Some graph embedding algorithms can be used to project nodes or edges into the low-dimensional vector space, which can be used for the subsequent machine learning or the data mining tasks. The graph embedding method (GEM), also known as the network representation learning (NRL), uses the low-dimensional, dense, real-valued vectors to represent the nodes in the network (including the semantic relations, which are conducive to computing and storage, no longer need to manually carry features “self-adaptability”, and can project the heterogeneous information into the same low-dimensional space for the downstream calculation). Its representative algorithm is Deep walk (KDD 2014) proposed by Perozzi B, which ingeniously transforms the relationship between the graphs into mining the relationship between graph nodes through word sequence class in Word2vec. Compared with the Trans series, it is more suitable for the application scenario of the business risk.
5 Technical Proposal The enterprise management risk data has the characteristics of the complex data sources and the diversified data formats. Its data sources include the basic information of the enterprise industry and commerce, the patent application records of the intellectual property rights, the monitoring of the news and public opinions, and the
1668
D. Liu and Z. Qiu
monitoring data of the internal historical operation of enterprises and so on. Different data sources have different formats and data characteristics. When we study the coding of the risk characteristics of enterprise management, we need to design different coding methods according to the characteristics of these data. The word2vec is a NLP tool launched by Google in 2013. The earliest word vector model is the Bags-of-Words model. The dimension of the word vector generated by this method is the size of the whole vocabulary. For words in the vocabulary, the word vector represented by the word is constructed by 1-hot method, such as a vocabulary of five words: I am a little cat. A vector like (1, 0, 0, 0, 0, 0) can be used to represent the word I, and (0, 1, 0, 0, 1) to represent the word am. The representation method is very simple, but there are many problems. The biggest problem is that the vocabulary is usually very large. Every word is represented by a vector of millions of dimensions, which is a huge burden on the memory. In addition, the representation method cannot well represent the relationship between words and words. For example, cat and Kitty are synonyms, but using the above-mentioned representation method, the distance between cat and Kitty is the same as the distance between cat and people. Based on this, Google proposes a feature coding method based on the deep learning. Its idea is to map every word to a shorter word vector by training a deep learning model. All these word vectors constitute a vector space, and then we can use the general statistical methods to study the relationship between words. In the enterprise risk data, the ID data also has the problem of the word vector model. If this kind of data is encoding by using the 1-hot method alone, the vector size will be too large, and the relationship between different ID values cannot be well expressed. It is noticed that in the feature coding method of google, the key point is to construct the training depth learning model by learning the adjacent relationship between words, so as to get the corresponding feature coding. Similar ideas are adopted. In the enterprise risk data, for the ID type features, it is necessary to construct the “adjacent” relationship and transform it into a similar problem of word2vec. Take the ID characteristics of corporate/executive as an example. The research team observed that if an enterprise is at risk because of the corporate/executive, it is not only the enterprise, but also the other enterprises that the legal person or the executive holds a high probability of risks. Therefore, the graph relationship between the corporate/executive and the enterprise can better represent the enterprise risk relationship. The specific steps are as follows: (1) Construct a paragraph according to the relationship between the legal person and the executive in the figure with each enterprise as a unit. (2) Regarding the corporate/executive as a word, we take the first n corporate/executive 1-hot codes as n input vectors. (3) The weights of the connection coefficients of the input layer and the first layer of the hidden layer, i.e. MatrixC, are used as the parameters of the embedding. (4) For each corporate/executive ID, the encoding method of 1-hot is given, and multiplied by the shared parameter matrix MatrixC, and the feature encoding
The Coding Technology of Operation …
1669
method based on the in-depth learning of the corporate/executive ID can be obtained. In researching the encoding method, we also studied the parameters of the encoding length. In the word2vec tools, the dimension of the embedded vectors (between 100 and 200) in the text field is generally given by the expert experience. The distribution characteristics of the text data are relatively fixed, so the dimension of the vectors is basically limited in this range. However, in the risk of the enterprise management, the ID features may come from the data of various dimensions, and their data distribution and characteristics are different. Therefore, we need to study a method to determine each feature dimension independently from the data. Through experiments, we find that we can calculate the information quantity (entropy) of each discrete feature domain, and then distribute the dimensions according to the proportion of the entropy as far as possible. In order to avoid too large or too small dimensions, this paper limits the dimensions of all the feature domains to intervals [2256]. Then the dimension corresponding to each feature field is solved by the enumeration method. For example, the dimension of one feature field with the smallest entropy can be enumerated as 2, and then the remaining dimension can be allocated proportionally. The distribution scheme may not be unique. At present, according to the variance of the dimensions, the least variance distribution scheme is selected as the final scheme.
6 Application Case This method has been applied to the project of the enterprise risk prediction of a large organization and achieved good results. The following chapters will illustrate the effectiveness of the method from the following dimensions: the problem background, the data situation, the practice method and the evaluation effect.
6.1 Practice Methods The research group applied the previous methods to this scenario, and constructed and tried the following feature coding methods: (1) Characteristic coding of the ID data: including characters, shareholders, executive ID, and label behaviors of the text extraction and so on. (2) Characteristic coding of the risk map relations: It mainly considers four parts of the data structure: Industry and commerce, judicial, business and intellectual property. It covers the relationship between enterprises and enterprises and the relationship between enterprises and people. (3) Characteristic coding based on the time-based risk atlas relationship: the feature coding of (1) and (2) is joined together to get a multi-dimensional vector
1670
D. Liu and Z. Qiu
representing the enterprise, and the final risk feature coding of the enterprise is obtained by training the vector at the next moment. Finally, the team trained the model with the final risk feature coding as the input feature, and compared the model of the expert feature training under different evaluation indicators.
6.2 Evaluation Methods and Effect Like all systems, the system based on the machine learning modeling also needs a perfect evaluation system to evaluate whether the system runs in accordance with expectations. There are two kinds of the evaluation systems for the machine learning modeling: the off-line experiment and the on-line experiment. The off-line experiment refers to the simulation test of various indicators in the non-production environment, which has no impact on the real world. Correspondingly, the online experimentation refers to testing in the production environment, which will affect the real world. It is a very risky thing for a model without the off-line experiment to do the on-line experiment directly in the production environment. If the model is not effective, it will directly affect the production indicators (for example, an unproven loan approval model in the bank wind control system may lead to the approval of the loan for the people with the poor repayment ability, which will directly lead to the subsequent approval of the high default probability, so as to make it difficult for banks to repay money). On the other hand, the online experiments generally have a long verification cycle. Therefore, in the actual production, the offline experiments are usually conducted on the model first, and the online experiments are conducted after the indicators meet expectations in the offline experiments. In this subject, the main evaluation methods are offline experiments. The off-line experiment is to collect the historical data of the system and divide the historical data into the training set and the test set according to certain rules. The model training is completed in the training set and the effect of each index is verified on the test set. The advantage of this experimental method is that it does not affect the real world and can quickly test the effects of different models. The disadvantage of this experimental method is that the data set used in the simulation experiment is deviated from the data set of the real online experiment, which results in some errors between the indicators of the real online experiment and the indicators of the real online experiment. In the traditional machine learning textbooks, it is considered that the training set and the test set should be divided by the rule of random splitting. However, based on the practical experience of the industry, because the online applications use the historical data to predict the future, it is often more close to the online applications to split the training sets and the test sets according to the time. Take the problem of this topic as an example. In the enterprise business risk prediction, the prediction target is the probability of the enterprise’s business management risk, and further abstracted as the prediction of the enterprise’s loan overdue
The Coding Technology of Operation …
1671
probability in the next few months. In this system, the business risk data of January 2015 to December 2017 and the overdue record of applying for loans are kept. The off-line experiments can use the data from January 2015 to December 2016 as the historical data training model. Firstly, the feature coding of enterprise management risk is generated based on the in-depth learning, and then added into the prediction model as features. Secondly, the data of the enterprise management risk from January 2017 to December 2017 and the overdue records of the loan application are used as the test sets, using the previous ones. The model gives the predictive scores for each loan application from January 2017 to December 2017. Based on the predicted score and the actual overdue results of each loan, the indicators are compared.
7 Conclusions We find that the number of the risk customers identified by the 4P-Model is close to that of 30% customers in the first 20% of the customers through the traditional model, which means that under the condition of almost unchanged risk indicators, more than 10% of the customer loan applications (about 40,000) can be approved by 4P-Model. Based on the average loan amount of 500,000 Yuan per small and micro customer, the model can directly bring about an additional loan size of about 20 billion Yuan for banks.
References 1. Bordes, A., N. Usunier, A. Garcia-Duran, et al. 2013. Translating embeddings for modeling multi-relational data. In Advances in neural information processing systems, 2787–2795. 2. Wang, Z., J. Zhang, J. Feng, et al. 2014. Knowledge graph embedding by translating on hyperplanes. Twenty-Eighth AAAI conference on artificial intelligence. 3. Lin, Y., Z. Liu, M. Sun, et al. 2015. Learning entity and relation embeddings for knowledge graph completion. Twenty-Ninth AAAI conference on artificial intelligence. 4. Ji, G., S. He, L. Xu, et al. 2015. Knowledge graph embedding via dynamic mapping matrix. Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing, 687–696 (Volume 1: Long Papers). 5. Perozzi, B., R. Al-Rfou, and S. Skiena. 2014. Deepwalk: Online learning of social representations. Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 701–710.
The Evaluation Algorithms of the Computer Aided Instruction System Based on the New Media Qing Liu
Abstract The traditional CAI system runs in a single computer environment. It lacks convenience in updating knowledge. The teaching arrangement is formulated beforehand, which cannot fully meet the different requirements of different students. The means of checking students’ learning effects are also imperfect. The evaluation and test paper generation algorithm of the new media CAI system has always been a research hotspot in CAI. In view of the shortcomings of the current algorithms for generating test papers, a two-way automatic algorithm for generating test papers is implemented. The algorithm has the advantages of fast speed, high success rate and good avoidance of duplication of continuous test papers. Keywords New media · Computer aided · Teaching system · Evaluation algorithm The new media CAI system is a computer aided instruction system supported by the new media technology. It consists of the new media teaching resources and the new media teaching support system. The new media teaching resources include all media materials, courseware, question bank, cases and materials that support the operation of the new media teaching support system.
1 Characteristics of the New Media CAI System The intelligence computer-aided instruction (ICAI) is a new computer-aided instruction system which conforms to the trend of the educational theory and the educational reform. Since the first ICAI system came into being in the 1970s, many countries in the world have begun the research of the ICAI system. In the process of using this system for learning, students do not need to learn according to the instructional sequence prescribed by the system designer. The instructional sequence is generated by the running of the program, which is better than using the traditional computer-aided instruction system. Q. Liu (B) Chongqing Creation Vocational College, Yongchuan, Chongqing 402160, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_199
1673
1674
Q. Liu
The ICAI is an intelligent CAI, which is based on the cognitive theory and applies the artificial intelligence technology to CAI. It separates the teaching contents from the teaching strategy, according to the information provided by students’ cognitive model, dynamically generates contents and strategies suitable for the individualized teaching through the intelligent system search and reasoning, judges students’ learning levels through the intelligent diagnostic mechanism, analyses the causes of students’ errors, and puts forward suggestions for students to change and further study the contents [1]. Through the statistics of the error distribution of all students, the intelligent diagnosis mechanism will provide teachers with suggestions on the teaching focus, mode, test focus and question type, provide teachers with friendly teaching contents and test content maintenance interface, and adjust teaching strategies without changing the structures of the software [2]. Through the intelligent analysis of students’ cognitive models, teaching contents and test results, it will provide teaching supervisors with the help of the intelligent analysis of students’ cognitive model, teaching contents and test results. Teachers provide reference opinions on the evaluation of teachers’ teaching performances. It can be said that an ideal and perfect ICAI system is an independent and excellent “teacher”.
2 The Structure of the Computer Aided Instruction System Based on the New Media 2.1 The Overall Framework of ITS Based on the Network The network ITS will have the subject knowledge and the related teaching knowledge in a certain field, and can individualize the teaching for students. That is to say, it can select the corresponding teaching strategies according to students’ understandings of the knowledge, and simulate the human teaching experts’ teaching activities to a certain extent. It pays attention to the existing knowledge, the experience of the human teaching experts and the function of the systematic reasoning. Its greatest feature is that it can concentrate the wisdom of the teaching experts and teach students in accordance with their aptitude [3]. As far as the ITS function is concerned, it mainly consists of four modules.
2.1.1
Domain Knowledge Module
The domain knowledge module is a very important module, which contains the knowledge that the system tries to impart to students and represents the intelligence of experts. It not only determines the contents of the teaching interaction process, but also determines the structures of the teaching objectives [4, 5]. ITS provides an interface related to the domain knowledge, which consists of three basic components:
The Evaluation Algorithms of the Computer …
1675
the user interface: meeting the needs of the interaction between the users and the systems; the reasoning mechanism: providing an explanation of the knowledge base whose results are used to show the problem; the knowledge base: which is the core component of the expert system and contains many solutions to some application problems.
2.1.2
Student Model Module
It indicates what the students have known and don’t know and the cognitive characteristics of the students, which represents the students’ intelligence. The system establishes the students’ understandings through the student model, so the student model is the simulation of the intelligent teaching system to the students, including the students’ knowledge state, cognitive characteristics and personality characteristics.
2.1.3
Teacher Model
It mainly provides the targeted teaching strategies, which represents the intelligence of the teachers. It is to solve the problem of how to organize the teaching contents, that is, how to teach. The main task is to select the appropriate teaching contents under the guidance of the corresponding teaching principles, and to show it to the students at the appropriate time through the interface in an appropriate form of expression.
2.2 System Flow Students log on to the ITS server by using the computers in the student room or at home in the network ITS. Through the human-computer interaction, ITS will prepare different difficult teaching contents according to its different cognitive levels. When completing the study, the system determines the new cognitive level of the students through the self-adaptive testing, which serves as the basis for preparing the learning contents for the students when they log on to study next time, and puts forward suggestions for the students to further study the contents. At the same time, the system can also be used by the teachers. Teachers use their own computers to log on to the ITS server in the research room or at home, check the students’ learning progress and learning situation, and update the teaching contents and the testing contents according to the actual situations of students.
1676
Q. Liu
3 Research on the Evaluation Algorithms of the Computer Aided Instruction System Based on the New Media The construction of the CAI system aims at assisting teachers to complete the teaching design and implementation through the computer computing and storage capabilities. The design criteria of this kind of the system are concise and practical. The objects of using this kind of the system are mainly teachers and students, so two clients with different functions need to be designed. The server design of the system needs to satisfy the larger load, bear the data pressure when the traffic is large, and meet the user’s functional requirements at the same time. The problems of students’ role in assistant the teaching system are usually the lack of the sufficient understandings and reaction abilities. Because most of the students’ attention time is usually less than 15 min, in the construction of this system, considering the limited time of students’ attention ability, the teacher-student interaction process within a certain time range should be constructed in the system, which can not only improve the quality of the teaching but also improve the quality of the teaching. It also enables students to maintain a certain degree of attention to the classrooms, and effectively use the auxiliary system to complete the teaching. In the teaching process, the SPSS software can also be used to summarize and analyze the learning video, learning time and learning interest used by students. In the teaching process, it can produce the optimal allocation of the teaching resources, promote the maximization of the teaching and learning resources for students and teachers, and truly complete the students’ multi-faceted development and teaching convenience, through questions, chapters and difficulties. The three-dimensional constraint condition matrix Ti × j × k is constructed by these attributes, and the test paper is compiled. The element Tijk in the matrix represents the type i, the jth knowledge point, and the number of questions with difficulty K. The range of i, j and k can be set freely by the author. For example, questions are divided into four categories: single-choice, multiple-choice, judgment and subjective. The knowledge points are classified into eight categories according to the teaching contents. The difficulty is divided into three levels: simple (difficulty level 1), general (2) and difficult (3). Thus, there are 72 constraint units. Constraints are formed by setting the value of the constraints. In the actual test paper generation, the constraints that really need to be set are only a part of it, and the other default is 0. This method is similar to the traditional way of generating the test papers, which conforms to the habit of the author. Moreover, it can make the partial adjustments in the generated Web pages to form a satisfactory test paper. The process of the automatic test paper generation is that the browser passes the constraint parameters to the testpaper.asp program responsible for the test paper transaction through the form. The latter generates the Web pages of the test paper dynamically according to different parameters, and then disconnects the connection with the server. If you need to modify and replace the test questions in the generated Web pages, you should first pass the ID number information of the test questions to the server. Generally, the information is placed in the request string QueryString. After
The Evaluation Algorithms of the Computer …
1677
the server obtains the ID information of the test questions, you can modify and replace the test questions. The modification is that the ID number is directly found in the table to modify the corresponding fields. The realization of the replacement function is relatively complex. First, the ID number of the test question is used to obtain the corresponding question types, chapters and difficulty, that is, the corresponding feature coding, and then the same feature coding test questions in the question bank are displayed on the Web page, according to the sequence of the number of the times in which the test questions are extracted in ascending order. Arrange and display the detailed attributes of the test questions for the candidate to choose to replace. In the browser side, the author chooses the questions to be replaced by the Web page mentioned above. In order to complete the question replacement smoothly, he must transfer the ID information of the replaced question and the ID information of the replaced question to the server side at the same time. In the process of development, the following techniques are used to solve this problem. Each replacement question on the browser side corresponds to a single selected radio object, and the name attribute of all radio objects is uniform, and the value attribute is set to the ID number of the replacement question. In this way, when submitting the form, the ID information of the replacement question is transmitted to the ASP program selectsave.asp responsible for the replacement transaction on the server side through the value of the radio (value=”). In order to achieve the ID information of the replacement question at the same time, the action of the form is set as: selectsave.asp?query_id=, and the ID information of the replacement question is stored in the request string and delivered to the server. On the database side, a table exam_tempdata is established to store the temporary data, which is used to save the ID number of the test questions that meet the constraints of the test paper. If there is a requirement for the replacement of the test questions, the corresponding ID number in the table exam_tempdata is updated. In this way, in testpaper.asp, we first determine whether the user is requesting to generate a dynamic page for the first time (identified by setting a session-level variable). If not, the ID number is extracted from the exam_tempdata table and mapped to the question bank table to display the questions. If yes, the ID number is extracted from the question bank table directly according to the constraints, and saved in the exam_tempdata table for the adjustment of the questions. After the final confirmation is correct, the test questions are saved in the exam_test questioning table, which is displayed on the Web page presented to the candidates during the examinations. The bidirectional automatic test paper generation algorithm can be easily applied to the remote examination system. The typical architecture of the remote examination system based on the B/S structure is adopted. The system consists of three layers: the presentation layer (client), the business layer (business processing logic) and the data layer (database). The client is accessed by a variety of the terminals through a variety of ways. For the general meaning test, we can allow wired, 802.11 n/b/g, GPRS, and 3G access to the Internet. For the formal examinations such as the unified examination, only the wired access within the LAN is allowed. The entire examination system can be logically divided into four parts: the examination system, the examination administration system, the scoring system and the examination question
1678
Q. Liu
bank system. The interface adopts the frame structure. In the examination system, the two-way automatic test paper generation algorithm can be used to organize the test papers and edit the test papers. After each successful test paper formation, the relevant Web pages show the test papers that have been published but have not yet invoked by the exams, which can be edited and deleted twice according to the need to achieve the satisfactory results. In the test database system, we can add, delete, modify and query the questions. Scoring is accomplished by the automatic marking. The examination system, which is closely related to the candidates, is responsible for calling the existing test papers from the database for examinations, and can query the test result list of all candidates, and also can call the approved test papers for verification and comment.
4 Conclusion ICAI combines the computer technology, the multimedia technology, and the Internet technology with the education and teaching reform, creates a new teaching form through the intelligent design of the teaching mode, the teaching media and the student model, which is conducive to cultivating students’ strong ability of the information acquisition, the information analysis and the information processing, giving full play to the initiatives and creativity, and cultivating students’ ability to adapt to the fierce competitions in the twenty-first century. At the same time, ICAI also reflects the objective needs of the information society, which is the historical necessity of the development of the educational technology. It is not difficult to see that ICAI, compared with the traditional CAI, is more in line with the laws of our education and teaching, and is more in line with students’ cognitive habits, with obvious advantages.
References 1. Chen, Shipin, and Jiling He. 2016. Research on the Integration of the information technology and the teaching ecosystem. E-Education Research 8: 72–77. 2. Ren, Youqun, Minyu Wu, Huan Liu, et al. 2015. Pursue the common situation: The integration of the information technology and the education and teaching from an ecological perspective. China Educational Technology 1: 97–103. 3. Yang, Gaixue, and Junjie Hu. 2014. Interpretation of the classroom teaching supported by the information technology from the perspective of the ecology. China Educational Technology 8: 100–110. 4. Pan, Bingchao. 2015. An experimental study on the application of the flipped classroom model in the college teaching. E-Education Research 3: 83–88. 5. Huang, Yan, Ling Jiang, and Lei Huang. 2014. Application of the flipped classroom in the experimental teaching of modern educational technology. China Educational Technology 4: 110–115.
The Application of the Big Data Age and the Artificial Intelligence in the Computer Network Technology Qing Liu
Abstract With the development and inheritance of the modern science and technology in our country, the application of the computer network technology is becoming more and more important. By changing the forms of the technology applications in the development of the computer network, the application of the technology in the network research and development in the new period is applied to the development of the computer network technology. For example, the big data technology and the artificial intelligence technology are the new technologies formed in the development of the computer network technology. The combination of the new technology and the computer network technology can meet the technical needs of the development of the computer network technologies. In view of this, this paper analyses the application research of the big data age and the artificial intelligence in the computer network technology, hoping to provide reference for the application of the big data technology and the artificial intelligence technology in the computer network technology with the help of this project. Keywords Computer · Network technology · Big data era · Application of artificial intelligence The massive data and information in the computer networks are generally presented in the form of texts such as numbers, symbols and words. In this process, it is necessary to achieve higher standards of expression and judgment [1]. The artificial intelligence provides an important guarantee for strengthening the ability of the computer networks in this respect [2].
Q. Liu (B) Chongqing Creation Vocational College, Yongchuan, Chongqing 402160, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_200
1679
1680
Q. Liu
1 Artificial Intelligence Technology and Its Development The emergence of the artificial intelligence can enrich the information expression ability of the computer network. With its unique editing, processing, operation technology and the super-high analytical ability, it can automatically translate, manage and process the information [3].
1.1 Artificial Intelligence Simply put, the artificial intelligence is a new comprehensive intelligent technology, which takes the computer technology as the carrier and effectively simulates the human consciousness, thinking, movement and skills and so on [4]. It includes not only the physiological contents, but also the linguistic and psychological knowledge.
1.2 Development Status of the Artificial Intelligence In the 1950s, a group of American scientists with dreams summed up the idea of the “artificial intelligence” in the research of the machine simulation intelligence, which is the first time that the artificial intelligence has been put forward by people. Then, with the wide application of computers, people gradually mastered this tool for the effective simulation of human thinking, and the artificial intelligence was gradually developed, improved, and even widely used [5]. In the more obvious three stages of the AI development, people continue to use AI for scientific operations, exchanges and analysis with the human beings to extract huge amounts of information. Nowadays, the artificial intelligence has already possessed the basic ability of human beings. At the same time, more and more computer network technologies are used to develop themselves, which also shows that the computer network technology plays an important role in the progress of the artificial intelligence.
1.3 Application Significance of the Artificial Intelligence The significance of the AI development lies in the following two aspects. Firstly, the development of AI has increased the forms of charts, images, videos and audiovisual expressions of the computer network information, relying on the way of thinking and behaviors of the human brain, and realized the human behaviors, and at the same time, it has promoted the relevant abilities of the human prudence, comprehensiveness and system. Second, the development of the artificial intelligence opens
The Application of the Big Data Age …
1681
up the space and path of the computer network in processing the information, effectively combines many kinds of the engineering information involved in the computer network, achieves the goal of the centralized control, and completes the intelligent operation.
2 Big Data Era and the Application Direction of the Artificial Intelligence in the Computer Network Technology 2.1 Artificial Intelligence in the Network Security In the context of the continuous progress of the information technology, at this stage, the Internet has been able to cover a large area of areas and people in the use process, so that people’s lives and work have changed greatly. In the context of the inseparable relationship between the Internet and the people, how to improve its security is crucial. At this stage, users’ personal information is often threatened. The artificial intelligence is effectively applied to improve the network security in this situation. In this process, the network performance is improved and the user personal information is effectively protected. In the process of using the artificial intelligence, it has many abilities, including processing, reasoning and explaining the unknown and uncertainties. It has important application value in improving the network security. For example, in the process of applying the unknown and uncertain capabilities, an intelligent anti-spam system has been developed, which can automatically shield messages from suspicious sources in the daily operation process, display the results in the header, and apply the highquality security protection to users’ mailboxes. In the process of using AI, it can also make full use of its functions of the memory and training, so as to scientifically and effectively screen the data and realize the purpose of controlling access. In the process of preventing the virus intrusion, it can also apply the intelligent firewall technology, and integrate the autonomous AGENT object-oriented technology and the artificial neural network to enhance the intrusion detection ability to fully embody the integrity and confidentiality in resources. In addition, if we want to carry out the network security management, we also need to have a higher identification sensitivity and faster response ability, which can be achieved through the application of the artificial intelligence in the computer network technology. Only by establishing the artificial intelligence computer network can we improve the current level of the network security management and make the computer network technology better serve people.
1682
Q. Liu
2.2 The Agent Technology Promotes the Quality of the Computer Network Information Services The artificial intelligence agent technology is used as an entity in the software in the process of using. Its main components include the interpretive reasoning, the knowledge domain database and the database. In the process of processing the new information, it is necessary to apply all the Agent knowledge bases, and give the interpretation and reasoning mechanism to judge the surrounding environment effectively. Once a task exists in an Agent, it can apply the convenience of the communication network, promote the effective communication between different agents, and realize the task through cooperation. In the process of using this technology, the information can be searched automatically on the basis of the user-defined criteria, and it can be transmitted to the user-defined locations at the same time. In the use of this technology, the computer network in the process of providing services to people can more reflect the automation and personalization. Through this technology, users can effectively filter and organize a large amount of the information in the process of the web browsing and the information searching, quickly discover the useful information, and effectively save time. At the same time, in the process of using this technology, it can also promote the generation of the knowledge domain database, and effectively integrate the multiple kinds of the information, so as to manage and retrieve the information. In the process of the knowledge mining, it can also apply the fuzzy technology to improve the quality of the navigation services. More importantly, it can help users to make more scientific and reasonable arrangements for daily life in the process of using this technology. In the user’s permission state, it automatically handles e-mail and screens certain movies and TV programs and so on.
2.3 Overall Expansion in All Fields Since the second half of the last century, computer networks have developed rapidly, and the development of the computer networks has also led to the overall development of the whole social economy. This process clearly and definitely reveals that in the information society era, the management and production must be fully realized by computers, communications and networks, which are indispensable. The application of the computer network is rapidly expanding and extending to all fields of the world. There are more and more things and businesses to be dealt with. From the family affairs to the office business, from the business and financial processing of enterprises to the government affairs, the computer network is assuming more and more responsibilities. The artificial intelligence can help the computer network better handle the businesses and accomplish tasks more accurately.
The Application of the Big Data Age …
1683
2.4 Intelligent Reasoning and Intelligent Operation The computer network technology is developing rapidly. How to make use of the computer network to better serve human beings and meet the needs of the public to the greatest extent is the responsibility and obligation of the development of the contemporary computer network. The work of the computer network system has many characteristics, such as real-time, dynamic and transient. With the continuous expansion of the network scale, the area of the computer network management is more and more extensive and the structure is more and more complex. This requires us not only to ensure the quantity, but also to ensure the quality. Therefore, it is not enough to rely solely on the network managers. The artificial intelligence is the best choice to ensure the safe, reliable, efficient and stable operation of the network. As we all know, the artificial intelligence technology is the reasoning and computing technology that imitates the advanced intelligence. The combination of the artificial intelligence and the computer network makes the intelligent reasoning and the intelligent computing used in more and more industries, and shows strong advantages in many practical control and management issues.
3 Big Data Era and the Application of the Artificial Intelligence in the Computer Network Technology With the development of the computer network technology and the continuous progress of the computer technology, the problem of the network security has attracted more and more attention. The artificial intelligence is the deliberate imitation of the human’s thinking activities to solve various problems. We know that human’s thinking activities are carried out through the transmission of the nerve fibers through the operation of the nerve cells one by one. Therefore, through the continuous experiments and efforts, technicians successfully imitate the structure of the human brain and the way of thinking transmission, and develop the information processing system of the artificial neural networks.
3.1 Processing and Integration of the Multi-channel Information in the Computer Networks With the participation of the modern high-tech such as the network and the computers in the computer network, there are infinite possibilities for the development of the computer network, which has changed the way of realizing the artificial intelligence and the direction of realizing it. The application of the artificial intelligence in the computer networks has gradually changed from the traditional directional processing
1684
Q. Liu
to the large-scale, high-density and high-frequency data processing. This transformation of AI is manifested in many aspects. For example, in the modern network operation and the security management, it can realize the function of inputting the firewall in advance in the AI management, which can automatically intercept the bad information circulated in the network, and can automatically identify and judge the passing information, and submit the information with problems to the detection center. The information is judged and the advanced artificial intelligence technology is realized.
3.2 Application of the Artificial Intelligence in the Network Management In the computer network technology, the network management has always been a heavy work. The real-time dynamic and fast changing characteristics of the network make it difficult for the network management. In order to achieve more efficient network management, the artificial intelligence technology also shows certain effectiveness. In the computer network management, the artificial intelligence technology can make use of the artificial intelligence expert knowledge base and the problem solving technology to achieve the effect of the comprehensive management of the computer network. The expert system is a relatively intelligent computer program, which accumulates the knowledge and experience of experts in a certain field and records them into the relevant systems effectively. From this, the knowledge and experience of experts in a particular field can be gathered to realize the efficiency and comprehensiveness of the system and complete the analysis of various computer network problems in this field.
3.3 Application of the Artificial Intelligence in the Enterprise Management and Teaching The computer network technology will be applied in the management of the modern common enterprises, while the computer network which participates in the artificial intelligence will enhance the security and efficiency of the enterprise management more effectively. The artificial intelligence can realize the automatic defense system and the health system of the enterprise management system. It is a highly intelligent enterprise management system. In the teaching process, teachers can use the knowledge base of the artificial intelligence technology to define the contents of our educational knowledge in the knowledge base and reason the knowledge in the knowledge base. It is more intuitive for students to accept the teaching contents and improve the teaching efficiency.
The Application of the Big Data Age …
1685
3.4 Application of the Intrusion Detection Technology With the vigorous development of the computer network technologies, the network security technology has become a key technology of the computer networks, and the network security issues have received attention from all parties. So far, although there are many network security mechanisms to protect the computer networks, the network intrusion and attacks are common. Especially in recent years, the popularity of the e-commerce, including the development of the payment platforms such as Alipay and We-Chat, has made people pay more attention to the network security. Thus, the solution to the network security problems is imminent. In order to solve the security problem of the computer network, the firewall technology is introduced into the computer network.
4 Conclusion Nowadays, with the increase of the computer utilization, users pay more and more attention to the management of the network security. In the network security management, the network control function and the network monitoring function have become the focus of users’ attention. However, only when the data information is effectively acquired and processed in time can the network control function and the network monitoring function play a role. The data information in the computer network is irregular, and even some data information appears terminal in transmission, which makes the information incomplete. All these make it difficult for computers to analyze and judge the data information. Therefore, only by applying the artificial intelligence to the computer network technology can these problems be solved.
References 1. He Candeng. 2016. On the application of the artificial intelligence in the computer network technology based on the big data era. China Computer & Communication (24): 179–180. 2. Min Rui. 2016. Application of the artificial intelligence in the computer network technology in the big data age. Technology Innovation and Application (36): 98–112. 3. Wang Yanxian. 2015. Application of the artificial intelligence in the computer network technology. Information Technology and Informatization (8): 84–85. 4. Liu Jian. 2014. Discussion on the application of the artificial intelligence in the network education. Computer CD Software and Applications (6): 244–248. 5. Huang Liping. 2014. Application of the artificial intelligence technology in the computer network education. Computer CD Software and Applications (10): 236–239.
Network Security Entity Recognition Methods Based on the Deep Neural Network Weigang Liu
Abstract The network security threat intelligence analysis based on the security knowledge atlas can analyze the multi-source threat intelligence data in the fine granularity, which attracts the wide attention. The traditional named entity recognition methods are difficult to identify the new or the mixed Chinese and English security entities in the field of the network security, and the extracted features are inadequate, so it is difficult to accurately identify the network security entities. On the basis of the deep neural network model, a method of the network security entity recognition based on CNN-BiLSTM-CRF combined with the feature template is proposed. The artificial feature template is used to extract the local context features, and then the neural network model is used to automatically extract the character features and the text global features. The experimental results show that on the large-scale network security data sets, the proposed method of the network security entity recognition is effective. The relevant evaluation indexes are superior to other algorithms, and the F value is up to 86%. Keywords Deep neural network · Network security · Entity recognition · Method exploration The entity recognition is one of the key technologies to realize the text comprehension. It plays an extremely important role in many applications such as the information extraction, the question answering system, and the machine translation and so on. Nowadays, the entity recognition research mainly focuses on the named entities, including the biological named entity recognition, the product named entity recognition, and the conventional named entity recognition and so on [1]. Obviously, it is not enough for an efficient and robust information extraction system to recognize only the named entities in the texts without considering their nested structures.
W. Liu (B) Tianjin Modern Vocational Technology College, Tianjin 300350, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_201
1687
1688
W. Liu
1 Connotation and Application of the Deep Neural Network The deep neural network (DNN) is the basis of the deep learning. To understand DNN, we first need to understand the DNN model. Next, we will make a summary of the DNN model and the forward propagation algorithm. DNN refers to the deep neural network algorithm, which is a new popular topic in the field of the machine learning in the industry and academia in recent years. [2] The algorithm has successfully improved the previous recognition rate by a significant level. In recent years, the deep neural network algorithm has become a popular topic in the field of the machine learning in the industry and the academia. The DNN algorithm successfully improves the recognition rate by a significant level. The artificial neural network originated in the 1940s. The first neuron model was proposed by McCulloch and Petts in 1943. It is called the threshold logic. It can realize some functions of the logic operation. Since then, the research of the neural networks has been divided into two directions, one focusing on the process of the biological information processing, called the biological neural networks, and the other focusing on the engineering applications, called the artificial neural networks [3]. In 2006, the concepts of the deep network and the deep learning were put forward, and the neural network began to glow a new round of life. The deep networks, literally, are the deep-seated neural networks. The term “multi-layer neural network” is not used in the past. In order to distinguish it from the former neural network, it is a new concept. The term was coined by Geoff Hinton’s research group at the University of Toronto in 2006. In fact, the deep network proposed by Hinton’s research group is not different from the traditional multi-layer perceptron in structure, and the algorithm is the same when doing the supervised learning [4]. The only difference is that the network should do the unsupervised learning before doing the supervised learning, and then train the weights of the unsupervised learning as the initial value of the supervised learning [5]. This change corresponds to a reasonable assumption. We use P(x) to represent the data obtained from the pre-training of the network by the unsupervised learning, and then use the supervised learning to train the network (such as the BP algorithm), and get P(Y|X), where Y is the output (such as the category label). This hypothesis holds that the P(X) learning helps the P(Y|X) learning. Compared with the supervised learning, this learning approach helps to reduce the risk of the over-fitting, because it not only learns the conditional probability distribution P(Y|X), but also learns the joint probability distribution of X and Y. There are other explanations for the reasons why the pre-training is helpful for the deep learning. The most direct explanation is that the pre-training trains the network parameters to a set of the appropriate initial values, from which the cost function reaches a lower value.
Network Security Entity Recognition Methods …
1689
2 Process and Research Status of the Network Security Entity Recognition Based on the Deep Neural Network 2.1 Entity Recognition Process The entity recognition includes six stages: the preprocessing stage, the feature vector selection, the comparison function selection, the search space optimization, the decision model selection and the result evaluation. The pre-processing stage is the key stage of the entity recognition process. In this stage, the data standardization includes the space processing, the character case conversion, the complex data structure analysis and the format conversion, and the context heterogeneity elimination. The hidden Markov Model (HMM) is a common method to standardize the data in this process. The eigenvector is a set of attributes that can identify the entities. The selection methods of the feature vectors include the manual designation of the domain experts and the machine learning methods. The decision-making model is the selection of the decision-making model to judge whether the entity matches in the feature vector comparison in the search space. One is the probability model such as the Fellegi and Sunter model, and the other is the experience-based model, which sets the threshold values according to the experience of the domain experts. The evaluation results are matched, mismatched and possible matched. The uncertain matching results need to be evaluated manually, and the problems found in the process of the evaluation should be adjusted or the decision-making model should be improved in order to obtain more accurate entity recognition effect.
2.2 Research on the Entity Recognition The early entity recognition algorithms mainly used the similarity between the records to compare, using the rule method and threshold to determine whether two records are the same entity. In the machine learning method, the similarity function is generated dynamically to obtain a classifier, which effectively combines the similarity of the multiple attributes and accurately determines whether each pair of records can be matched to the same entity. The rule-based method is to determine whether different records describe the same entity according to rules. Some scholars have proposed a large data entity recognition algorithm based on the Map-Reduce framework. This algorithm first calculates the similarity between records by the attribute values, and then realizes the entity recognition based on the graph clustering. The complex data refers to the data generated in the real applications, such as the XML data, the graph data and the network data. The same entity has different complex data description methods. In order to effectively implement the quality management of these data, it is necessary to quickly and effectively identify the complex data entities. The entity recognition on the complex data can be divided into the pair recognition and the group recognition. According to the different recognition
1690
W. Liu
objects, the entity recognition of the complex data can be divided into the XML data entity recognition, the graph structure data entity recognition and the node entity recognition in complex network.
3 Network Security Entity Recognition Method Based on the Deep Neural Network 3.1 Attention-Based Based on the RNN-CRF model structure, this paper Attending to Characters in Neural Sequence Labeling Models focuses on improving the mosaic of the word vectors and the character vectors. Using the attention mechanism, the original character vectors and the word vectors are stitched together to sum weights. The two hidden layers of the traditional neural networks are used to learn the weights of attention, so that the model can dynamically utilize the word vectors and the character vector information. The experimental results show that the method is better than the original stitching method.
3.2 A Small Amount of the Labeled Data For the deep learning methods, a large amount of the labeling data is generally required, but there is no large amount of the labeling data in some areas. Therefore, how to use a small amount of the annotated data in the neural network structure method is also the focus of the recent research. These include Transfer Learning for Sequence Tagging with HierAR Chical Recurrent Networks and the semi-supervised learning. Here I mention a recent paper that ACL2017 just hired. In this paper Semisupervised sequence tagging with bidirectional language models, a two-way neural network language model is trained using a massive leafless g-annotated corpus, and then the trained language model is used to obtain the current LM embedding of the annotated words. Then the vector is added to the original two-way RNN-CRF model as a feature. The experimental results show that adding this language model vector to a small number of the labeled data can greatly improve the NER effect. Even on a large number of the labeled training data, adding this language model vector can still provide the effect of the original RNN-CRF model.
Network Security Entity Recognition Methods …
1691
3.3 A Method Based on the Deep Neural Network People began to study the model based on the neural network very early, but when the network layers are deep, it is easy to over-fit. The recognition rate of Google’s latest model in ImageNet in 2015 is even higher than that of the manual annotation. In the natural language processing, the deep learning has been applied to the distribution of words, the word sense disambiguation, the sentence semantic calculation, the repetition detection and the emotional classification. For the NER problem, the best model is a deep neural network model based on Windows proposed by Collobert in 2011. Its effect and performance are better than the traditional algorithm. Next, we will introduce the theory of the model and the details and techniques of how we implement the model. The model automatically learns a series of the abstract features from the input sentences, and trains the model parameters through the backward propagation algorithm. The first layer extracts the features of each word, and the second layer extracts the features from the word window, and regards them as a series of the local and global structures, thus distinguishing the traditional bag of the word model. The latter layer is the same as the classical neural network. If the distribution of the samples is regarded as a polynomial distribution, it is easy to write an analytical expression of the joint probability of the samples, and then solve it with the maximum likelihood estimation. The objective function is shown in the following formula. N is the sample size, and h is the number of the hidden layer nodes, while c is the window size, and d is the dimension of the word vector. In this paper, the maximum likelihood is transformed into the minimum negative logarithmic likelihood according to the usual processing method of the objective function. The purpose of the logarithm is to simplify the following derivative formula, and to transform the maximal problem into the standard minimal problem by the negative sign. In addition to the minimizing negative logarithmic likelihood, L2 regular terms of W and V are added to the loss function. The reason is that the parameters of the softmax function are redundant. That is, the minimum is not unique. In order to uniquely solve the problem, the regular term is added. On the other hand, the L2 regularization can increase the Gaussian priori of the parameters, control the variance of the parameters and punish the excessive parameters, which is helpful to improve the generalization ability of the model. Factor λ adjusts the weight of the regular term. The bigger the value is, the bigger the penalty for the large parameter is. Then we simply take λ as c. One of the important parameters of the stochastic gradient descent method is the learning rate. The learning rate is too high, and the model will converge quickly, but the accuracy is not high. On the contrary, how to learn the rate is too small and the accuracy is high, but the convergence speed is slow. This parameter needs to be determined by searching. The initialization of the first level of the word vectors has a great impact on the final classification effect, so a lot of the unlabeled data training is needed. The number of the network layers has little effect on the results after more than four layers. NER is a special case of the sequence annotation. For the general problems, such as POS and Chunking, a window-based approach can be used. But
1692
W. Liu
it is not enough for SRL. It needs the convolution method, which is essentially the superposition of several window-based methods, so the convolution can be regarded as a generalized window method. Based on the window method, the model does not know a sentence and only sees the information in the window at a time, assuming that the label only depends on the local words. If some special NERs cannot satisfy this assumption, the convolution-based methods need to be considered.
4 Conclusion With the arrival of the era of the big data, how to accurately identify the network security entities from the heterogeneous data is the basic problem of building the network security knowledge map. Therefore, in view of the text data related to the network security, this paper studies the secure entity recognition algorithm supporting massive network data, which lays the foundation for constructing the knowledge map of the network security. Aiming at the problem of the efficient and accurate extraction of the secure entities from the massive text-based network data, the data sets are effectively segmented to achieve the efficient and accurate identification of the secure entities.
References 1. Sun Shaoyuan, Li Linna, and Zhao Haitao. 2013. Depth estimation of the monocular vehicleborne infrared image using KPCA and BP neural networks. Infrared and Laser Engineering (9): 2348–2352. 2. Xing Jianfei, Luo Zhizeng, and Xi Xugang. 2013. Real-time face recognition based on the deep neural network. Journal of Hangzhou Dianzi University (06): 107–110. 3. Zhuo Wei, and Zhang Lei. 2014. Fast learning algorithms for deep neural networks. Journal of Jiaying University (5): 13–17. 4. Li Ruifan, Wang Xiaojie, and Zhong Yixin. 2014. Teaching of exploring the neural network in-depth learning. Computer Education (19): 77–79. 5. Cui Ruilian, Song Yan, Jiang Bing, and Dai Lirong. 2015. Language recognition based on the deep neural network. Pattern Recognition and Artificial Intelligence (12): 1093–1099.
Application of the Internet of Things Technology in the Urban Ecological Protection and Environmental Rehabilitation Huanchun Ma
Abstract With the continuous development of cities, the urban water pollution has become more and more serious, and the urban water pollution has become an important factor restricting the further development of cities. Nowadays, the water ecological environment of many cities in China has been affected and destroyed to varying degrees. Protecting the water ecological environment and reducing the damage to the water ecological environment has become an urgent problem. The relevant departments and the relevant personnel should continue to study and explore, in order to find ways to mitigate the damage to the water ecological environment and to repair the damaged water ecological environment while the urban economy continues to develop. This paper focuses on the analysis of the characteristics and connotation of the Internet of Things technology, and combines the background of the application of this technology in the urban ecological protection and environmental restoration, so as to explore the application strategy of the Internet of Things technology in the urban ecological protection and environmental restoration. Keywords Urban ecological protection · Environmental restoration · Internet of Things technology With the continuous development of China’s economy, the continuous improvement of the science and technology levels, and the acceleration of the urbanization into the cities, the intensity of the water resources development has been increasing, even beyond the scope that the urban ecological environment can bear, resulting in serious damage to the water ecological environment in China [1]. With the continuous improvement of the science and technology and the information technology, the Internet of Things technology has been widely applied and developed in the field of the environmental protection [2]. The reasonable application of the Internet of Things technology in the environmental monitoring process has a very important impact on improving the environmental monitoring, and also provides a solid foundation for the development of the environment. H. Ma (B) Chongqing Water Resources and Electric Engineering College, Chongqing 402160, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_202
1693
1694
H. Ma
1 The Characteristics and Connotation of the Internet of Things Technology The Internet of Things is the third wave of the world information industry after computers and the Internet. In recent years, with the development of the intelligent sensors and the mobile embedded systems, the application scope of the Internet of Things technology is gradually broadening, which can realize the scientific monitoring and promote the transformation of the modern ecological development supervision mechanism [3]. So far, there is no uniform and definite definition in the industry, but it can be considered that the Internet of Things technology is a system that places the perceptive chips in objects, transmits the collected data through the network, and finally centralizes the information by computers, so as to realize the interconnection between things and between things and people. The Internet of Things makes full use of the new generation of the IT technology in all walks of life [4]. Specifically, it embeds and equips sensors into various objects such as power grids, railways, bridges, tunnels, highways, buildings, water supply systems, dams, and oil and gas pipelines, and then integrates the Internet of Things with the existing Internet to realize the integration of the human society and the physical systems [5]. In the network, there is a super powerful central computer cluster, which can manage and control people, machines, equipment and infrastructure in the real time. On this basis, human beings can manage the production and life in a more delicate and dynamic way, achieve a “wisdom” state, improve the resource utilization and the productivity level, and improve the relationship between man and nature. Therefore, the Internet of Things is defined as a network that connects any object to the Internet through the radio frequency identification (RFID), the infrared sensor, the global positioning system, the laser scanner and other information sensing devices according to the agreement, and exchanges and communicates the information in order to realize the intelligent identification, location, tracking, monitoring and management of objects. In terms of the technology architecture, the Internet of Things can be divided into three layers: the perception layer, the network layer and the application layer. The perception layer is composed of various sensors and sensor gateways. Its function is equivalent to the nerve endings of human eyes, ears, nose, throat and skin. It is the source of recognizing objects and collecting information in the Internet of Things. Its main function is to identify objects and collect information. The network layer is composed of various private networks, the Internet, the wired and wireless communication networks, the network management systems and the cloud computing platforms. It is equivalent to the human nerve center and brain, and is responsible for transmitting and processing the information acquired by the perceptual layer. The application layer is the interface between the Internet of Things and the users (including people, organizations and other systems). It combines with the industry needs to realize intelligent applications of the Internet of Things.
Application of the Internet of Things Technology …
1695
2 Application Background of the Internet of Things Technology in the Urban Ecological Protection and Environmental Rehabilitation The top-level structure and the policy guarantee of the eco-environmental big data construction are improving day by day. It has become the primary task of our current construction to implement the construction of the eco-environmental monitoring network. At present, the requirement of the eco-environmental monitoring data is relatively vague, but there is no reliable front-end data collection with the monitoring data indicators, which will make the construction of the eco-environmental big data empty talk.
2.1 Urban Ecological Destruction and the Causes of the Environmental Pollution China is a big agricultural country, and its agriculture is developing in the direction of modernization. Agriculture in some areas has basically been modernized. However, some of them are relatively backward, and the agricultural production activities are carried out in a traditional way. The agricultural operations in the traditional agricultural areas mainly rely on the manpower and the manual tools, which have less impact on the water ecological environment. The modern agricultural operations need to use a large number of the chemical fertilizers and pesticides, and the chemical fertilizers and pesticides contain a large number of pollutants, and these pollutants will infiltrate into the groundwater with the rainwater, resulting in pollution of the water resources and the serious water ecological environment. With the continuous development of the social economy, people’s income level has been improved, which to a certain extent has promoted the influx of large numbers of people into cities, which makes the amount of the wastewater generated by residents’ water use increasing. At the same time, the number of industries in cities is increasing, which makes the discharge of the industrial wastewater increasing. Generally, the wastewater is untreated and directly discharged into the rivers. The discharge of these kinds of the wastewater far exceeds the self-purification capacity of the rivers, resulting in the damage of the ecological environment of the urban river and the deterioration of the urban water quality, which ultimately causes serious damage to the urban water ecology. The rainwater runoff caused by the rainfall is the main cause of the non-point source pollution of rivers. Rainwater will continuously wash the surface sediments of the roads around urban rivers. The areas with the low vegetation coverage will be severely washed by the rainwater. In the process of the rainfall, rubbish on both sides of rivers will be washed into rivers, which will pollute the nonpoint source of urban rivers. The content of pollutants is related to the vegetation coverage, the topography and the distribution of pollutants in urban rivers.
1696
H. Ma
2.2 Application Direction of the Internet of Things Technology in the Urban Ecological Protection and Environmental Rehabilitation With the increasing discharge of the municipal sewage, the treatment capacity of the sewage treatment plants should be strengthened, and the technical functions should also be enhanced. There are different treatment processes and discharge standards for different pollutants and sewage volumes. Continuously strengthen the process research and equipment development of the sewage treatment plants, develop the high-quality and high-level equipment, establish a sewage treatment plant with the strong comprehensive performance, and enhance the comprehensive skills of the sewage treatment. The artificial landscape water should also be built to expand the area of the green space in the city. Establishing the artificial landscape water in cities can not only satisfy people’s hydrophilic needs, but also improve the surrounding environment and become fresher.
2.3 Experience of the Environmental Monitoring and Governance in Western Countries China is experiencing the largest urbanization process in the world. The environmental problems in the urbanization process of the western developed countries have emerged in the urbanization process of our country for more than 200 years. People’s demand for the urban environmental problems has changed from solving the environmental pollution to improving the quality of living. How to protect and even optimize the urban environment while developing and constructing the cities has become an important direction of the urban sustainable development research. The environmental monitoring is the determination of the factors that determine the environmental quality, and it is one of the important means to study environmental problems at present. At present, the urban ecological environment monitoring mainly includes the hydrology and water quality, the soil environment, the microclimate and atmospheric quality, the acoustic environment and the wind environment monitoring.
3 Application of the Internet of Things Technology in the Urban Ecological Protection and Restoration The use of the Internet of Things (IOT) technology strengthens the exchange of the information between people, between people and things, and between things and things. It is the product of the continuous development of the modern science and technology and the social economy. The application of the Internet of Things
Application of the Internet of Things Technology …
1697
technology in the ecological environment monitoring not only makes up for the shortcomings of the traditional monitoring methods, but also improves the efficiency of the monitoring and effectively promotes the development of the ecological environment monitoring. With the further development of the science and technology and the need of the ecological environment monitoring, the Internet of Things technology will be more and more perfect in the future, and will play an increasingly important role in the ecological environment monitoring.
3.1 Application of the Internet of Things Technology in the Urban Ecosystem The application of the Internet of Things technology will help the relevant departments to construct the relevant data on the urbanization interference to the natural ecosystem, the urban ecological land planning technology system, the urban ecological restoration technology and policy, and the urban scale of the natural ecosystem, and carry out the systematic research and analysis, so as to carry out the urban ecological protection and environmental restoration more accurately.
3.2 Application of the Internet of Things Technology in the Land Use and the Water Ecology In China, the water environmental monitoring mainly includes two aspects: the water pollution monitoring and the drinking water monitoring. The water pollution monitoring is to detect the wastewater, effectively prevent the occurrence of the major wastewater pollution incidents, and control the discharge of the wastewater reasonably. The drinking water monitoring needs to install the sensors in the detected water source area need to detect the water source indicators of the monitored area daily, and understand the changes in the water sources in a timely manner, so as to improve the quality of the drinking water. Provide safe and reliable drinking water. The application of the Internet of Things technology in the land use and the water ecology is conducive to the analysis of the utilization of the rainwater resources, the sewage treatment and utilization, the ecological water use and the groundwater management, so that the relevant measures can be put forward more pertinently. At the same time, it is also conducive to the construction of the rainwater system for sponge cities and the low-impact development, and can pay close attention to the sewage collection and treatment technology, so as to update and apply the new water ecological treatment technology in time, so as to ensure the safety of the water resources and the stability of the water quantity. According to the water environment of the targeting area, such as the watershed water, the urban water source, and the landscape river, and the groundwater and so on,
1698
H. Ma
through installing the hydrological and water quality equipment in the key functional areas and characteristics, the unattended transmission network is designed. The water level, the flow rate, flow amount, pH, the dissolved oxygen, the ammonia nitrogen, chlorophyll, the absorption spectrum and other indicators are sensed, and the records are complete. The regional water environment change information, combined with the model algorithm, provides the function of the status notification and alarm and the historical trend analysis, and provides the scientific basis for the follow-up water quality management, the pipe network optimization, the ecological management and other work, and assists the decision-making support.
3.3 Application of the Internet of Things Technology in the Energy Conservation, Energy Utilization and Atmospheric Pollution In the future, the Internet of Things technology will continue to improve, and its application in the ecological environment monitoring will also be promoted. It will not only be applied to the atmosphere, the water quality, ecology, ocean and other aspects, but also to the soil monitoring, the noise monitoring, and the electromagnetic monitoring and so on. At the same time, with the continuous development of the science and technology, the Internet of Things technology will achieve a deeper level of networking and intellectualization. The equipment of the Internet of Things system will be more complete and perfect, so that the Internet of Things technology can be better applied in various fields, thereby improving the production efficiency of various fields and playing a greater role. The application of the Internet of Things technology in the energy saving, energy utilization and atmospheric pollution is conducive to better recording the current PM2.5 pollution and CO2 emissions, using the scenario analysis of the big data to analyze the impact of the atmospheric environment and the energy utilization from different perspectives and scenarios, so as to better carry out researches on the pollution issues and find more effective control strategies. The application of the Internet of Things (IOT) technology in atmospheric monitoring mainly includes two methods: the flow monitoring and the fixed on-line monitoring. The flow monitoring can not only realize the function of the monitoring, but also have the function of forecasting. The flow monitoring is the main way of applying the Internet of Things technology to the atmospheric monitoring in China in the future. The fixed monitoring is a method to monitor the atmosphere by installing the monitoring equipment at the sewage outlet and installing sensors in the form of grids within the monitoring range. Once there are the atmosphere changes within the monitoring area, the relevant staffs quickly receive and analyze the information perceived by the sensors through the network, which accelerates the speed of the problem solving and provides the information basis for the formulation of the prevention plans. It is understood that many cities in China have established perfect air intelligent monitoring system to monitor the air routine indicators in the real time.
Application of the Internet of Things Technology …
1699
4 Conclusion With the acceleration of the urbanization process, the urban economic development constantly encroaches on and destroys the natural environment, with the unreasonable exploitation and utilization of natural resources, resulting in the imbalance of the ecological environment, the serious water pollution, the desertification of the land, the low vegetation coverage, and the serious air pollution and so on. Haze and dust storms seriously threaten people’s health and bring great negative impact on people’s production and life. Facing today’s situation of the water ecological environment damage and the water resources pollution, we should give full play to the application advantages of the Internet of Things technology, strive to maintain and restore the damaged water ecological environment, and give the people a good water ecological environment. Acknowledgements Science and Technology Research Project of Chongqing Education Commission, KJQN 201803811.
References 1. Bao Wenrui. 2019. Research on the Internet-based remediation of polluted water environment in urban rivers. Environmental Science and Management 44 (1): 98–102. 2. Zhang Xiaoyu, and Wang Lijing. 2018. Study on the ecological environment restoration of the resource-based cities—A case study of Hebi City, Henan Province. Journal of Shangqiu Teachers College 34 (8): 94–97. 3. Shen Mengmeng, Zhang Qi, and Zhu Jixiang. 2018. Some understandings and reflections on the restoration of the aquatic ecological environment. China Water Transport (Second Half Month) 18 (4): 113–114. 4. Nankai University. 2017. Tianjin key laboratory of the urban ecological environment rehabilitation and pollution prevention and control. Science of Science and Management of S. & T. 32 (3): 181–183. 5. Su Liping, and Zhang Yong. 2017. Ecological restoration and urban function reconstruction of the waste land in the urban construction zone—A brief talk on the planning and implementation conception of public green space in Beijing economic and technological development zone. Beijing Planning Review (3): 82–84.
Construction of Knowledge Mapping Computing Framework Under Big Data Boliang Men, Xiumei Zhang and Yun Shi
Abstract With the country’s emphasis on teacher professional development and teacher education, the research on pre-service teacher education has attracted a lot of researchers’ attention. However, the impact of the teacher education researches has not been presented effectively so far. The analysis of the researches on the pre-service teacher education helps to explore the actual situation of my current English teacher education research, and promotes the reflection of researchers. In order to understand the development and research characteristics of the English teacher’s study in China since 2000, the study used CiteSpace V to conduct 381 valid literatures on English teacher education from January 1st, 2000 to 2017 of CNKI. The results show that, since 2000, the topic of English teacher education research focuses on internships, curriculum standards and English majors. These researches have been influenced greatly by education policies, and the cooperation of researchers is not prominent. Keywords Knowledge mapping · Timeline analysis · Research focus · Research cooperation The English teacher development has always been one of the topics of great concern in the undergraduate teaching activities of English majors. This is not only the demand for Basic English educators in social development, but also an important prerequisite and guarantee for improving the quality of teacher development in higher normal colleges and universities. In this new century, the Chinese government and educational institutions realized that the teacher education with the subject knowledge as the main concern would no longer meet the needs of the social development. If the quality of basic education is to be improved, it must be done in the training of Normal University students [1]. As early as March 2000, the Ministry of Education approved the “Syllabus for English Majors in Higher Education Institutions”, which clearly defined the training objectives of English majors in higher education institutions in China, and required to cultivate “a solid English language foundation and extensive cultural knowledge”. Proficiency in the use of English in the field of foreign affairs, education, economics, culture, science and technology, military and B. Men (B) · X. Zhang · Y. Shi Langfang Normal University, Langfang 065000, Hebei, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_203
1701
1702
B. Men et al.
other departments engaged in translation, teaching, management, research and other work of English-speaking talents, and requires these talents to have solid basic skills, broad knowledge, Certain relevant professional knowledge, strong ability and high quality, etc. [2]. In 2015, the Ministry of Education implemented a reform of the teacher qualification examination, and required all candidate should take part in the national unified examination. Normal students and non-normal students are required to participate in the teacher qualification examinations organized by the Ministry of Education. These reforms fully reflect the importance attached by the state and educational institutions at all levels to the development of the practical ability of normal students and the determination to improve the proficiency of basic education teachers in China. At the same time, various colleges and universities in China, especially the teachers’ colleges and universities, have also launched research on the related subjects of teacher training [3]. A series of reforms have continuously promoted the reflection and reform of the pre-service teacher training in Normal Universities. The study of English teacher education in colleges and universities must have an intuitive and systematic understanding of the hot topics, development contexts and trends of college English teachers in recent years [4]. This will help researchers to improve the sensitivity of research and reflect on the research and development of this topic timely. On this basis, this study focuses on two research questions: What is the development of English teacher education research since 2000? What are the characteristics of English teacher training research since 2000? The research uses the information visualization software CiteSpace V as the research tool, and the Chinese Knowledge Network literature as the main research object, and the visual analysis of the English normal student research. Through the combing of the hotspots, development context and characteristics of domestic English teacher training between 2000 and 2017, the two research questions are answered. Through reflection, to clarify the development trend and characteristics of the research topic to provide reference for further related research.
1 Research Method 1.1 The Introduction of Research Software This study used CiteSpace V as the main research tool, supplemented by China Knowledge Network (CNKI) visual analysis function. CiteSpace, also known as Citation Space, is a citation visualization analysis software that is developed in the context of scientometrics and data visualization. The software presents the structure, regularity and distribution of scientific knowledge through visual means. The visual graphics presented by data analysis are also called “scientific knowledge maps” (Chen Yue, Chen Chaomei, Hu Zhigang, Wang Xianwen, etc., 2014). “CiteSpace can effectively help readers better understand the research field they are engaged in. It can not only show the overall situation of a research field, but also highlight the
Construction of Knowledge Mapping Computing …
1703
development of those hot topics in the field” (Chen Yue, Chen Chaomei, Hu Zhigang, Wang Xianwen, etc., 2014).
1.2 Data Collection This study uses the China Knowledge Network (CNKI) database as the main source of literature data. In the advanced search, the article “English teacher students” is used to search the documents from January 1, 2000 to December 31, 2017, and the type is not limited. A total of 382 relevant literature records were retrieved. The literature information includes the literature category, author, author’s organization, title, journal, publication year, keywords, abstracts and other information. After deleting a supplementary announcement, 381 valid documents were retained. CNKI can output Refworks format files suitable for CiteSpace V analysis. The collected documents are converted to CiteSpace V analyzable format using the data conversion function Data in CiteSpace V. Then use CiteSpace V to study the key words and research hotspots of 381 literature data, set the time span to 2000–2017, analyze the time slice (Years per Slice) for one year, and the text processing (Text Processing) source segment source (Term Source) Select Title, Abstract, Author Keywords, and Keywords Plus. The data node analysis dimension uses a keyword (Keyword). Combined with the Timeline function in CiteSpace V, the document data was analyzed by keyword diachronic development. The relevant literature research hotspot knowledge map and research key words diachronic development knowledge map are obtained [5].
2 Data Analysis 2.1 Hotspots Analysis Research hotspots can clearly show the most core research topics in a research direction [6]. A hotspot analysis of a research topic can directly and effectively reflect the mainstream research content in the research direction and reveal its evolution process. Through the hotspot analysis with English teachers as the key words, we can effectively grasp the research development and research characteristics of English normal students from 2000 to 2017. The research uses the keyword co-occurrence visualization map analysis in CiteSpace V to analyze the collected 381 English teacher’s research literatures and obtain the keyword visualization results (Fig. 1). In the visualization result map, a total of 59 hotspots and 107 connecting lines were obtained. Among them, there are four important research hotspots closely related to the study of English teachers and students, namely #1 Education Internship, #2 English Major, #3 Pre-service Internship, #4 New Curriculum Standard.
1704
B. Men et al.
Fig. 1 Keyword co-occurrence visualization map analysis in 2000–2017
In order to fully display the distribution of research hotspots in English teachers development, and to show the literature in more detail, the author uses CiteSpace V to export the list of relevant high-frequency keywords and classify them by year in Table 1. The data in Fig. 1 and Table 1 shows the research on development of English teachers in 2000–2017. First of all, from 2000 to 2004, there was no research hotspot in the study of English teachers, and no relevant research was published in 2000 and 2002. In 2001 and 2003, one research literature was published. In 2004 and 2007, there were two and eight related literatures published, but none of them formed the hotspot of keyword research in the year. Based on this, it is found that when CiteSpace V conducts hotspot analysis, the frequency of occurrence of keyword research articles in the current year is generally used as the basis for calculation, and the co-occurrence of two or more document keywords in the same year is the hotspot analysis basis of the software. In 2005, the outstanding research hotspot was English teaching method. In 2006, it was English teacher’s student. In 2008, it was a teacher’s student. In 2009, it was teaching skill and educational internship. In 2010, it was a countermeasure and English. In 2011, it was a training mode. In 2012, it was a micro. Grid teaching, teaching skills, higher education institutions and new curriculum standards. In 2013, English majors, teacher beliefs, pre-service English teachers and teachers’ vocational skills. In 2014, research hotspots were more average. In 2015, teaching ability, local colleges and reforms. In 2016, the research hotspots were more diverse but the frequency keeps even. In 2017, there were only two frequencies in the research hotspots, mainly in English. The above data shows the development characteristics of the English teacher’s study since 2000. First of all,
Construction of Knowledge Mapping Computing …
1705
Table 1 High-frequency keywords 2000–2017 Year
Keywords(frequency)
2005
English Teaching Methods (7) Curriculum Goals (2)
2006
Pre-service students in Normal University (168)
2008
Pre-service Student (39)
2009
Teaching Skills (24) Educational Internship (13) Interns (3) Normal Students Education (2)
2010
Strategies (12) English (9) Pre-Service Education (2) English Major Students in Normal University (2) English Teacher (2)
2011
Cultivation (10) Mode of Cultivation (9) Teaching Practice (4) Comparation(2)
2012
Microteaching (8) English Teaching Skills (4) Normal University (3) New Curriculum Standards (2) Major course (2) Stereoscopic mode (2)
2013
English Major (6) Teacher Belief (6) Pre-service Teacher (4) Teaching Proficiency Skills (4) Issues (4) Situation (2) PCK Knowledge (2) Strategies (2) Trial (2) Teacher Education (2)
2014
Tpack Teaching Knowledge (2) English Major Students in Normal University (2) Phonetics (2) New University (2) Training System (2)
2015
Teaching Proficiency (11) Local University (4) Reform (4) Pedagogical Knowledge (3) Practical Teaching Ability (3) Teaching Files (2) Internship (2) Interns (2) Classroom Teaching Skills (2) Professional Skills (2)
2016
Identity Recognition (2) Teaching Proficiency Development (2)Major of Pedagogical (2) Ability of Self-assisted Learning (2) Comprehensive English (2) Necessity (2) Professional Standards (2) Ability of Reflection (2) Interactive Reflection Mode (2)
2017
English Teaching (2) English Major in Normal University (2)
Note The number in the brackets is the frequency of the keywords
before 2009, the relevant research of English teachers and students was not enough, and there was no obvious professional features. The keywords in the research were mostly teachers, English teachers and English teaching methods. The years when Hotspots are not listed by CiteSpace V are as follows: 2001 “Reflection mode and the cultivation of professional competence of English teachers”. This article mainly describes the cultivation of the reflective ability applied to the professional ability of English teachers 2003. “Importance and Teaching Methods of English Teacher’s Professional Voice Course”. In 2004, “Theory Discussion in English Teacher’s Tests” and “Thoughts on the Construction of English Major Teacher Education Curriculum System”. In 2007, “Discussion on the Professional Development of English Teachers in Higher Vocational Colleges”, “Reflexive Teaching and Cultivation of English Teachers”, “A Preliminary Study on the Quantitative Methods for the Evaluation of English Teachers’ Students in Higher Vocational Colleges”, “English Class for NonEnglish Normal Students”. Secondly, after 2009, there are many research hotspots in the teaching skills, teaching ability, internship, teacher professional development, vocational skills, pre-employment training and so on. This embodies the practical research on the study of English teacher’s students from theory to the beginning, paying attention to the cultivation of practical ability of normal students. This research
1706
B. Men et al.
hotspot change was particularly prominent in the three years from 2009 to 2011. During the three years, the English teacher’s research hotspots were the 2009 teaching skills and internships, the 2010 policies, the 2011 training model and teaching practices. The “National Education Reform and Development Plan (2010–2020)” issued in 2010 clearly states that higher education is required: “Teachers should take teaching as their primary task and continuously improve their education and teaching; strengthen laboratories, schools inside and outside. Teaching infrastructure such as practice bases and course materials” (2010). At the end of 2011, the Ministry of Education’s first “Teacher Education Standards” and “Teacher Professional Standards (Trial)” clearly demonstrated that the state’s emphasis on education and teaching has been enhanced. At a high level, and put forward higher requirements for teachers, promote the reform and development of normal student education. Therefore, the research hotspots at this stage are embodied in the practice-oriented English teacher training. Third, the increase in the study of English teacher students is highlighted in two time periods, 2009–2011 and 2015–2016. The “National Education Reform and Development Plan (2010–2020)” (hereinafter referred to as the “Outline”) promulgated in 2010 clearly states that Article 19 of higher education requires higher education to improve the quality of personnel training. Strengthen the construction of internship bases inside and outside the laboratory, and strengthen the practical teaching links. The study of English teacher’s development in the period from 2009 to 2011 before and after the promulgation of the “Outline” focuses on the teaching skills (24), educational internships (13), policies (12), English (9), training (10) and training of normal students. Mode (9). These research hotspots embodies the efforts of English majors in the cultivation of normal students to explore the training of professional talents suitable for their own disciplines, and begins to strengthen the cultivation of practical ability and educational teaching skills of normal students, and explore effective training mode of practical ability of normal students. The research hotspots of the following years have continued this trend and vividly reflected the new research topic of the year. Such as: 2012 microteaching (8), stereo mode (2), teacher beliefs in 2013 (6), pre-service English teachers (4), Tpack (2) in 2014, new colleges (2), Training system (2). In 2015, the Ministry of Education will apply for professional teachers who are enrolled in 2015 and beyond. Students who apply for primary and secondary school qualifications should take the teacher qualification examination. The proposal of this policy further urges the reform of normal colleges and universities in the education of normal students, promotes the quality improvement of normal colleges in the training of normal colleges, and maintains the advantages of training their professional talents. The research hotspots in 2015–2016 are obviously reflected in the research field of focusing on the characteristics of the discipline, refining the practical ability of normal students, paying attention to the basic English major courses, practicing teaching guarantees, teachers’ own identity and other activities that are closer to the frontline education and teaching activities and more pragmatic. For example, the hot keywords in 2015 are teaching ability (11), local colleges and universities (4), reform (4), teacher knowledge (3), practical teaching (3), teaching plan (2), internship (2), and internship (2) Classroom teaching
Construction of Knowledge Mapping Computing …
1707
skills (2), vocational skills (2), 2016 for identity (2), teacher professional development (2), teacher major (2), independent learning ability (2), comprehensive English (2), necessity, (2) primary school teacher professional standards (2), reflective ability (2), interactive reflection mode (2).
3 Chronological Analysis The number of publications in the English teacher’s study and the number of documents in the specific year are shown in Fig. 2. It can be seen from the figure that the number of documents of English teacher training in 2000–2017 shows a steady increase trend. In the whole research development trend, there are roughly four time periods worthy of attention: 2000–2008, 2009–2011, 2012–2014, 2015–2017. First of all, before 2008, the number of English teacher literature research literatures has been relatively small, and at a low growth stage, even in some years the number of documents is zero. The second phase is 2009–2011. The English teacher’s study has entered a fast and steady growth phase with an average annual increase of about 9. The number of documents in 2012–2014 has fluctuated, but it has remained generally at a stable stage. In 2012–2014, the number of documents remained at 32. The number of published literature in 2015–2017 has further increased to an average of 52 articles per year. Through the diachronic review of the social and policy environment of Chinese teachers and English teachers, we can find the synchronous development of the research and development of these four periods and the development of social policy environment. The release of the “Outline” in 2010 put forward new requirements for the training of English teachers, and the cultivation of the practical ability of normal students has risen to the height of national strategy. This The amount of articles published during 2001 - 2017 70
56
60
59
Amount of articles
50
27
30
40
40
36
40
28
28
20 20 10
8 1
0
1
2
6
8
12
0 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 -10
Year
Fig. 2 Timeline of articles
1708
B. Men et al.
provides new research ideas for the study of English Major students of Normal students, and a series of research topics related to the development of practical teaching ability of normal students are constantly being explored. Due to the characteristics of the English subject itself, the study of the practical ability of normal students has entered a stage of precipitation and reflection in the next years of 2012–2014. In the new curriculum standards of 2012, the idea of the English Education have both characters of tool and humanity have further promoted the English teacher training, and gave researchers a good opportunity to explore subjects from the perspective of English subject. The development of professional students with professional characteristics. In this stage, research hotspots are reflected in English teaching skills (4), new curriculum standards (2), English majors (6), subject teaching knowledge (2), Tpack (2), English majors (2), and voice. Intonation (2), training system (2), etc. In 2015, the teacher-class qualification examination policy for teachers in primary and secondary schools was once again pushing the study of English teacher education to a new climax. The teacher qualification examination system for teachers in normal universities urges universities to increase their practical training in the education and teaching of teachers’ majors, and practically implement the practical ability training of normal students, and explore the suitable opportunities in combination with the transformation opportunities of applied undergraduate institutions. The school’s characteristics of the teacher’s student training model. The number of documents in 2017 is relatively small in this phase, but this does not affect the average increment over the three years. According to the above analysis, as the country’s attention to education and teachers continues to increase, the study of English teachers and students is still receiving much attention. Figure 3 presents the time development of the hot topics related to the English teacher’s study. There are four important research hotspots closely related to the study of English teachers and students, namely #1 Education Internship, #2 English Major, #3 Pre-service Internship, #4 New Curriculum Standard. In CiteSpace’s Timeling visualization, we can clearly see the time development cycle of each relevant hotspot.
Fig. 3 The visualization timeline map in 2000–2017
Construction of Knowledge Mapping Computing …
1709
The first line is #0. The hotspot is the core keyword English teacher. The research runs through the whole period of 2000–2016, and the characteristics of English subjects in 2017 have become prominent, which has turned its hotspot into keyword English teaching and English teacher professional, which reflects the continuous improvement of the awareness and attention of English teachers. #1 Research hotspots are educational internships. Since 2009, the cultivation of teaching practice ability of normal students has begun to receive attention, and a series of research hotspots have been formed under the research hotspot. Around the educational internship, a series of research topics such as practice, skills, trials, internships, strategies, models, and policies have been formed. It can be seen that researchers are paying more and more attention to the important role of educational internship in the training of English teachers. #2 Hotspots are in English, and the hotspots started in 2009 and lasted until 2017. The study of English teacher students since 2008 gradually formed a study of normal students with a clear perspective of English. It shows that in the study of English Major Normal students, the researchers pay more attention to the subject profession of the normal students, and rely on the characteristics of the subject profession to explore effective training paths for normal students. His research key words include English vocational skills, phonetic intonation, and comprehensive English courses. The #3 hotspot is an internship. The hotspots linked to the hotspot include teacher education, local colleges, vocational ability, teaching skills, lectures, pre-vocational education, etc. As an important form of educational internship, posttraining is an important way for teachers to carry out pre-employment learning. It has very important practical significance for the development of teachers’ teaching practice ability, so it is paid special attention by researchers. Although the internship is important, it is more susceptible to various factors of society, and its research focuses on 2013–2015. Through the collation of related literature topics and keywords, the author finds that the main reason for this phenomenon is that researchers use the perspective of pedagogy-related disciplines when they use the post-internship as a key word. The author believes that with the addition of management science, sociology, educational sociology and other disciplines, post-training as a very important teacher training method will become an important research hotspot in the future. The #4 keyword hotspot is the new curriculum standard, and only appeared in 2012 at a frequency of 2. Referring to Figs. 1 and 3, the hotspot keyword has fewer connection lines with other hotspots, and is at the periphery of the research hotspot. The reasons for this phenomenon are diverse. First, the hot spot was formed in the release of the new curriculum standard in 2012. Secondly, through the analysis of relevant literature, it is found that policy interpretation is the main research method.
4 The Situation of Research Cooperation In the 2000–2017 literature sample collected by the author, 34 researchers were involved and 11 were connected. Through the CiteSpace researcher cooperative network analysis, the visualization map of Fig. 3 is obtained. The map shows that,
1710
B. Men et al.
except for some researchers who choose collaborative research, the vast majority of researchers choose relatively independent research methods (Fig. 4). In Fig. 3 and Table 2, from 2000 to 2017, there were 2005 Han Gang-Wang Rong, 2015 Xiong Qunhong-Liu Sisi, 2015 Gao Limin-Xia Yan, 2016 Fu Lirong-Kang Yanru, 2016 Yuan Yanhua-Jiang Huiwu Research cooperation, and in 2014, Peng Xueyan, Zhou Dandan, Xiang Zhenling, and Liu Wei, four researchers, formed a collaborative research hotspot #0 status analysis. Through the review of the research literature of relevant researchers, it is found that the researcher collaborates on research topics in addition to the status quo analysis, as well as the professional development of English teachers, the professionalization goals of teacher education courses, video case teaching, training mode, problem countermeasures, and reflection ability training.
Current situation research
Fig. 4 The visualization map of research cooperation network in 2000–2017
Table 2 Cooperation list in 2000–2017 Year
Keywords (frequency)
2005
Han Gang (3) Wang Rong (2)
2011
Shi Weina (2)
2012
Wang Wei (2) Zuo Ju (2)
2013
Zeng Miqun (2) Zhang Zhehua (2) Liu Quanmin (2) Ding Tianhua (2)
2014
Li Yingqi (2) Peng Xueyu (2) Zhou Dandan (2) Xiang Zhenling (2) Liu Wei (2)
2015
Huang Hui (2) Gao Limin (2) Zhao Xiaoguang (2) Tan Huarong (2) Xiong Qunhong (2) Li Juan (2) Zhang Jinying (2) Xia Yan (2) Liu Sisi (2) Liu Xiaojuan (3)
2016
Chen Yuzhuan (2) Yuan Yanhua (2) Meng Hongjie (2) Jiang Hui (2) Xu Yun (2) Kang Yanru (2) Xia Li (2) Fu Lirong (2)
2017
Yi Chunyan (2) Liu Hui (2)
Note Number in the brackets is frequency
Construction of Knowledge Mapping Computing …
1711
5 Discussion Through the above analysis, first of all, a clear understanding of the development of English teacher education since 2000. Since 2000, the research hotspots of English teachers have focused on four aspects: educational internship, English, internship, and new curriculum standards. Among them, there are three aspects related to English teacher training, English internship, English internship and internship. The diachronic development of the vein map shows the development of relevant hotspots (see Fig. 3). The English teacher’s study has always paid much attention to the subject profession, which also reflects the researcher’s research attaches importance to the subject profession and attaches importance to the academic professional ability of the English teacher. Educational internships and post-training internships have been the focus of researchers in this field since the publication of the Outline. This reflects the researchers’ increasing concern about the practical dimension of English teacher’s study and tries to explore an effective development model of English teacher’s practical ability. Taking the English teacher’s students as the object, the attention of the two basic dimensions of subject basic knowledge and teaching practice ability has made the study of English normal students in 2000 show a distinct combination of learning and learning. Secondly, it also has a certain understanding of the characteristics of English teacher training since 2000.
5.1 It Is More Sensitive to Relevant Policies Since 2000, English teacher life research has experienced four distinct development periods. Among them, there are three time nodes that are more interesting, the promulgation of the 2010–2011 Outline, Teacher Education Standards and Teacher Professional Standards (Trial), and the release of the 2012 curriculum standards and the implementation of the 2015 National Teacher Examination. If you carefully interpret the above three policies or documents, you can find the guiding meaning of the above: to improve the practical ability of normal students. These three points in time reflect the continuous exploration and efforts of relevant educational institutions and institutions in response to the policy of improving the training of normal students in the country. China has a vast territory, and there are some more specific performances in the demand for talents in various provinces and cities. It is not only the requirement of the reality to be explored under the guidance of the national guidelines and policies, but also the original intention of the formulation of relevant policy documents.
1712
B. Men et al.
5.2 Research Has Close Contact with the Disciplines of Their Own Disciplines English teacher-study research has always been very concerned about its own subject professional characteristics, and based on this to carry out research. After the implementation of the National Teacher Examination in 2015, the research focus began to focus on education and teaching capabilities and tried to use English and teachers as a common basis for research (see Table 1). This shift has brought about a shift in research keywords. The keywords that were studied before 2015 were concentrated in the English subject, and after 2015, a large amount of teacher knowledge, classroom instruction, Identity, professional development and teaching skills. What the author is saying here is a trend. It is not that there is no such thing as English-related research after 2015, but rather a change in the proportion or presentation (see Fig. 1).
5.3 There Is Little Cooperation Among Researchers Through the analysis of the research cooperation network map of Fig. 3, it can be found that there is less cooperation among relevant researchers in the English teacher’s study. By reading the research literature of a specific researcher, it can be found that the researcher cooperation is basically based on the subject. The same unit has more cooperation among researchers on the same subject. There is less cooperation among researchers across disciplines, inter-regional and interdisciplinary majors. The only research hotspot keywords that form a cooperative network are the status quo analysis. From the above analysis of the development and characteristics of the English teacher’s research since 2000, the paper has an intuitive preliminary understanding of the overall situation of the research field, and can provide some reference for researchers who pay attention to the research field. On the occasion of the completion of the draft, the Central Committee of the Communist Party of China and the State Council issued the “Opinions on Comprehensively Deepening the Reform of the Construction of Teaching Staff in the New Era” on February 1, 2018. This is the first landmark policy document issued by the Party Central Committee since the founding of New China. The publication of the “Opinions” means that normal education has an important strategic position in the Chinese teacher education system. Therefore, the characteristics of my current English teacher training in China have certain practical significance for the development of related research. Due to the delay in the network presentation of related literature, the sample collection of this research literature is due to be early 2017, which is the place for future research needs improvement. Acknowledgements (1) The 2018 Humanities and Social Sciences Research of Ministry of Education Youth Fund Project, “Study on the Formation and Influencing Factors of Teacher Professional Capital from the Perspective of Educational Sociology”, Project Number: 18YJC880065. (2) The 2018 Educational Science Research of Hebei Province for “Thirteenth Five-Year Plan”. “Study
Construction of Knowledge Mapping Computing …
1713
of the Teachers’ Professional Development based on the ‘Knowledge Sharing Mode’”, Project Number: 1803103.
References 1. Chen Yue, Chen Chaomei, Hu Zhigang, and Wang Xianwen. 2014. Principles and applications of analyzing a citation space, 12–21. Beijing: Science Press. 2. Schön, D.A. 2017. The reflective practitioner: How professionals think in action. New York: Routledge. 3. Cheng, L. 2008. The key to success: English language testing in China. Language Testing 25 (1): 15–37. 4. Ministry of Education of the People’s Republic of China. 2010. Outline of the national mediumand long-term education reform and development. Beijing: China Legal Publishing House. 5. Burnaby, B., and Y. Sun. 1989. Chinese teachers’ views of western language teaching: Context informs paradigms. TESOL Quarterly 23 (2): 219–238. 6. Hu, G. 2002. Potential cultural resistance to pedagogical imports: The case of communicative language teaching in China. Language Culture and Curriculum 15 (2): 93–105.
Dynamic Information Management System of Agricultural Economy Based on WebGIS Yue Meng and Wenkuan Chen
Abstract This paper designs the dynamic information database of the agricultural economy, establishes a lightweight WebGIS based on JQuery, completes the general rendering engine of results, integrates the software architecture of MVC, combines the data encryption and the transmission technology, AJAX, the rich client development technology, the Mysql database and other Web development technologies, and develops the dynamic information system for agricultural economy based on WebGIS according to the agile development model. Through the dynamic information system of the agricultural economy, we can fully understand the utilization of the agricultural biological resources, and the types and distribution of the agricultural biological resources, so as to effectively improve the relationship between the agricultural biological resources and the local culture, society and economy, evaluate their utilization value, put forward the utilization strategies, and formulate strategies to promote the local economic development by using the agricultural biological resources. Keywords WebGIS · Agricultural economy · Dynamic information · Management system The WebGIS technology expresses the geospatial information through the network, which originates from the geographic information. WebGIS is a computer system compatible with, storing, processing, analyzing, displaying and applying geographic information under the Internet or the Intranet network environment [1]. It is the product of the combination of the Internet technology, the Web technology and the traditional GIS technology [2]. Its basic starting point is to use the Internet to publish the geographic information so that the client browsers can browse and access the data and the functional services in the geographic information systems.
Y. Meng · W. Chen (B) Sichuan Agricultural University, Chengdu 610000, Sichuan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_204
1715
1716
Y. Meng and W. Chen
1 Dynamic Information Management System of the Agricultural Economy Based on WebGIS WebGIS is the product of the application of the Internet and the WWW technology to the development of GIS, and it is the latest stage of the development of GIS. Combine WebGIS with the soil and water conservation research in China, provide the timely scientific, detailed and intuitive data, provide the scientific basis for the land use planning, the basic farmland protection and the leadership decision-making, realize the dynamic balance of the total cultivated land, and ultimately achieve the regional sustainable development, thus making the research of the soil and water conservation truly socialized [3].
1.1 Communication Technology The communication technology is the technology of transmitting the information [4]. Therefore, the communication system is an indispensable information infrastructure for the establishment of the network GIS. Its development has transformed GIS from the wired field to the wireless field [5]. This mainly involves the compression and decompression of the spatial data. For the massive data managed by GIS, the transmission and storage of the data is one of the keys. The image roaming arbitrarily on the Internet at various scales puts forward higher requirements. Many predecessors have proposed relevant solutions, such as the wavelet theory. This also involves the data security, to avoid the data leakage or change in the process of the transmission, the data for GIS is as important as the heart for human beings. The data security mechanism also needs to establish a good system to improve.
1.2 Database Technology The geospatial data has the characteristics of the distribution and the quantification. Therefore, efficient storage and management of the massive and distributed geospatial data is the key to the success of WebGIS. At present, the mainstream commercial database management software mostly uses the object-relational database or the object-oriented database to store and manage the massive spatial data. This model can use objects to support the complex data models and the data structures, meet the requirements of the real world modeling, and also support the distributed computing and large object storage, so as to better realize the data integrity and adequacy. By utilizing the advantages of the commercial database management system in the massive data management, the concurrency control, the transaction processing and the data security, the data management capability of GIS is enhanced, which provides
Dynamic Information Management System …
1717
an efficient and secure spatial data management mechanism for the wide application of the network GIS, such as ArcGIS.
1.3 Efficient Computing Technology For the efficient processing of the massive spatial data, the functions of the spatial data processing, analysis, storage and retrieval in the network GIS require the server equipment with the strong computing ability, the fast response, the large storage capacity, and the stable and reliable performance. However, the cluster or parallel computers can solve the bottleneck problem of the processing rate of a single CPU. The network GIS is a task distributed processing system, which can make full use of the network resources and use the distributed coordinated computing to complete the complex and computational tasks of the geospatial computing.
2 Application of the Dynamic Information Management System of Agricultural Economy Based on WebGIS The development direction of the dynamic information management system of the agricultural economy based on WebGIS is to store a large amount of the multitemporal dynamic information data of the agricultural economy, to quickly obtain the information of the land quantity, quality, and ownership, and the quantity, spatial distribution and utilization status of the land use types and the land dynamic changes from the multi-temporal dynamic information data of the agricultural economy, and to change the annual land use. The survey data can be updated, managed and analyzed, and various queries, statistics and analysis results can be output. Without the participation of GIS, it is impossible to develop an effective land management system. WebGIS plays an irreplaceable role in the land management system. However, the development of the WebGIS system is not perfect. Firstly, there are still some problems in the data transmission rate, the data format and the system operation. Secondly, many technologies of WebGIS, such as the data model of WebGIS, the formulation of the spatial data exchange standard and the discussion of the true three-dimensional visualization technology, need to be deepened. The scientific, information and automation of the land management are realized by using the WebGIS integrated high-tech means. Establishing a scientific land management information system and exploring an important way of the efficient and rational utilization of the land resources have long been a problem of the great concern and the urgent need to be solved by the land management departments in China. Wider access: Customers can access the latest data on the multiple servers located in different places at the same time, which greatly facilitates the data management of GIS and makes the data management and synthesis of the distributed multi-data
1718
Y. Meng and W. Chen
sources easier. Independent customer platform: No matter what kind of the machine the server is, no matter what kind of the GIS software the server uses, users can access the WebGIS data as long as they support a common Web browser. Low cost: The ordinary GIS needs the expensive GIS software for each client, but they only use the most basic functions, which causes great waste, and the maintenance cost of the client cannot be ignored. WebGIS usually uses the Web browser on the client side, which greatly reduces the cost. The operation is simple. Users don’t need to face the complex GIS software. Universal Web browser reduces the complexity of the operation. Balancing efficient computing load: The traditional GIS processing ability is totally dependent on the client, and its efficiency is low. Today, some advanced WebGIS can make full use of the network resources, handing the basic and global processing to the server, and handing the simple operations to the client. This computing model can flexibly and efficiently find the reasonable allocation of the computing load and the network traffic load between the server and the client, and it is an ideal optimization model.
3 Design Mechanism of the Dynamic Information Management System for the Agricultural Economy Based on WebGIS The information system includes two functional subsystems: the data filling system for scientific researchers and the data statistical analysis system. These two subsystems are used for the data acquisition and analysis of the agricultural economic dynamic information. At the same time, the system also designed a general module for the bottom layer: the unified authentication module, the program interface module and the dynamic interface display generation module. Through these three functional modules, the security of the system and the efficiency of the system development can be ensured, and the system can also have a high scalability, reserving external interfaces for the future interoperability with other information systems.
3.1 Overall Framework Considering the factors of the installation, configuration, maintenance, ease of use, and beauty and sharing, the system is constructed in the Browser/Server mode. Through the abstraction of each part of the system, the top-down and layer-by-layer decomposition design method is adopted on the basis of the hierarchical division to ensure the integrity and consistency of the system and the data. The system divides the data and application into three levels: the data layer, the application component layer and the presentation layer, which provide a clear interface for the design and construction of the system. In the system architecture, the IT infrastructure platform
Dynamic Information Management System …
1719
provides and guarantees the communication and system services of the system, and the data layer is responsible for storing all kinds of the basic and thematic data of the management system and providing the data to the application component layer. The application component layer integrates the related functions of the system into the platform in the form of components or services according to the idea of the objectorientation, so as to facilitate the integration or distributed deployment. The layer, also known as the user access layer, is responsible for the interaction between the users and the system. The whole system is based on ESRI’s ArcGIS platform and integrates the multiple products for different solutions.
3.2 Key Technologies 3.2.1
Map Caching Technology
The map caching technology is also known as the tile technology. That is, according to certain rules, the map is cut into multiple images stored in files of different scales and stored on the hard disk. When the client accesses the map, it can browse these static map slices directly to achieve the purpose of providing the map services quickly. At present, the mainstream map websites such as Google Maps, Baidu Maps, Mapabc and so on all use this way to provide the efficient access speed.
3.2.2
REST Technology
Representational state transfer (REST) is proposed by Dr. Roy Thomas Fielding. Its essence is that all objects are abstracted as the resources and the corresponding unique identifiers. When operating resources through a common interface, they will not change their identifiers, and they are stateless. This stateless resource is expressed by the URL. Because it does not save any session state, it has more obvious advantages for improving the performances of the servers, reducing the complexity of the development and improving the scalability of the system.
3.2.3
Silverlight Technology
Silverlight is Microsoft’s Web client application development solution and one of the main application development platforms for Microsoft’s RIA (Rich Internet Program) strategy. It can transplant a large number of the processing tasks from the user interface to the client side, thus alleviating the resource pressure of the server side. It has the advantages of the compact and simple installation, the rich expressiveness, the asynchronous communication, no page refresh, and professional pictures, and the audio, video, animation and other features, which can bring users a new use experience. Moreover, Silverlight provides many ways to improve the efficiency of
1720
Y. Meng and W. Chen
the designers and developers, such as the language integrated query (LINQ), the data binding mechanism, the GPU acceleration, and the browser out-of-the-box operation, and so on. This system takes Silverlight 4 as the development platform, and the business logic of GIS is realized by the ArcGIS API for Silverlight 2.1. ArcGIS API for the Silverlight takes REST as its core, which enables users to easily and quickly publish and use the ArcGIS Server’s maps and functions, and create the Web GIS applications with rich functions, convenient operation and strong visual impact.
3.2.4
Middle Layer
The middle layer of WebGIS is used to identify and transform the XML data in response to the client’s requests. It requests spatial and attribute data from the underlying database and carries out the direct dialogue with the users. If the vector and the raster data of GIS are applied from the underlying database, it needs to be converted into the standard XML format. If the underlying supports the storage and the query of XML, the middle layer needs to submit the data application from the client to the underlying layer, summarize and organize the response data of the database, and uniformly schedule and distribute the data to the client browser.
3.2.5
Client-Side
The WebGIS services in the client need to personalize and diversify the response data according to the actual network situations of the customers. XML has such ability. The main work of displaying the XML data is done by the XML parser. Microsoft IE6 and Netscape Navigator 6.0 browsers can parse XML. With the development of XML, it will be an inevitable trend for more network applications to support XML.
4 Conclusion The functions of GIS in the dynamic information management of the agricultural economy mainly include: collecting the dynamic information of the agricultural economy, organizing, storing and updating the dynamic information of the agricultural economy, and statistics, analysis and decision-making of the dynamic information of the agricultural economy. Compared with the traditional desktop-based and the stand-alone GIS system, WebGIS has the following advantages, which make it possible to improve the dynamic information sharing of the agricultural economy.
Dynamic Information Management System …
1721
References 1. Zhang Jun, Gao Hui, Qiu Hong, Zhang Guangtao, Yan Xiting, and Li Haifeng. 2013. Research and development of the geographic information service platform for the new rural construction based on web—Taking Heheng Village of Shengao Town, Jiangyan City as an example. Agricultural Network Information (2): 51–53. 2. Liu Juan. 2015. Connotation and development model of the eco-agricultural industrialization. China Agricultural Information (First Half of the Month) (3): 146–153. 3. Li Jiao, Gong Yuesong, and Zheng Xiaoyang. 2014. Brief discussion on the design of the Shanghai sea dynamic monitoring and management system. Ocean Development and Management (1): 14–18. 4. Su Guangri, Zhang Yu, and Wan Yunxin. 2013. Design and implementation of the polar spatial database management system. Geomatics and Spatial Information Technology (12): 61–63. 5. Qian Jin, Han Zhiyun, Lin Xuefeng, et al. 2013. Application of GPS in monitoring the crustal deformation and the plate movement. Geomatics and Spatial Information Technology (6): 21–24.
Application of the Cloud Real-Time Interactive Response System in College English Reading Teaching Platform Di Qi
Abstract The cloud real-time interactive response system (IRS) is an important guarantee for the high-quality teaching, which helps teachers to obtain the comprehensive and timely information about students’ learning progress. The establishment of the IRS system can effectively promote students’ learning initiatives. Teachers can immediately detect students’ learning process, analyze students’ feedback through various feedback statistics, and adjust the teaching contents accordingly. This paper, taking the college English reading teaching platform as an example, explores the setting strategy of the cloud IRS system for the college English reading teaching platform, and applies the interactive response system reasonably in order to provide effective guarantee for the improvement of the college English reading teaching level. Keywords Interactive response system · College English · Reading teaching · Cloud end The cloud instant interactive response system includes a cloud server and the mobile intelligent terminals communicating with the cloud server, as well as the external input devices for inputting the user operation instructions to the mobile intelligent terminals, which are configured to be attached to the mobile intelligent terminals and can be separated from the mobile intelligent terminals [1]. The methods include providing a mobile intelligent terminal, the external input devices and the cloud server; the user sets the operation rules and operates an external input device through the mobile intelligent terminal, which inputs the user’s operation instructions to the mobile intelligent terminal; the mobile intelligent terminal runs the program in the mobile intelligent terminal according to the operation rules, and the operation instructions are input to the mobile intelligent terminal [2]. The command and setting rules are transmitted to the cloud server, which sends the feedback information to the users according to the received operation instructions and the set rules. The scientific and reasonable application of the cloud real-time interactive response system in college English reading teaching platform is not only conducive to promoting students’ interests in reading in the learning process, but also to avoiding students’ boredom in D. Qi (B) Fuyang Normal University, Fuyang, Anhui 236000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_205
1723
1724
D. Qi
learning and providing effective guarantee for the improvement of college English reading teaching level.
1 Current Situation of the College English Reading Teaching The teaching of reading has always been a very important part of our English teaching. For college students, in their daily learning process, they rely more on their own initiatives and enthusiasms, so as to achieve the learning and understanding of the English knowledge. In the process of their English learning, we should be aware of the importance of the reading teaching [3]. However, in the specific process of the college English reading teaching, there are still many factors that affect the students’ learning effect, which leads to the unsatisfactory learning effect. As we all know, in the process of the contemporary college students’ English learning, reading teaching can be regarded as a bridge and a way of learning to a certain extent and it is also a necessary prerequisite for college students to have a deeper understanding of the contents of their English learning. In the past, in the process of the college English reading teaching, the traditional teaching methods were usually used to explain [4]. The more common way is that teachers explain knowledge and contents in class, and students learn them in a passive way. In the entire teaching process, the teaching contents basically revolve around the teaching material contents of each semester. The contents of the teaching materials have the characteristics of singleness. Whether the subject matter or the content is relatively simple, it is difficult to meet the students’ individualized requirements for the reading knowledge and contents in the learning process [5]. In addition, in the process of the college English reading teaching, many teachers will focus on the memory of words and the usage of phrases from some microcosmic point of view when they explain different types of articles. However, it neglects the cultivation of students’ good reading awareness and interests. In fact, one of the most fundamental purposes of the English reading teaching is to cultivate students’ reading interests through the reading teaching, so as to promote students’ reading abilities to be effectively improved. In this way, it has a very important influence and effect on students’ follow-up study, communication, language ability and writing ability. However, in the current process of the English reading teaching, the methods used are too single, and the teaching methods are dull and boring [6]. This will not only directly dissipate the enthusiasms of students in the learning process, but also reduce the enthusiasms and initiatives of the English reading learning. If this phenomenon has not been effectively alleviated in practice, and then the main role of students in the reading teaching classroom cannot be effectively played [4]. This not only is not conducive to students’ learning, but also will lose the significance of the English reading teaching.
Application of the Cloud Real-Time …
1725
2 Application Status of the Interactive Response System Under the background of the continuous progress and rapid development of the science and technology, more and more new technologies have been developed and utilized. The overall application scope of these new technologies has become wider and wider, which has attracted widespread attention and attraction. Among them, the proposal of the interactive response system (IRS) plays a very important role in the reform, innovation and development of China’s education. In the analysis of the system, it is found that the interactive response system was originally a learning reactor developed in Japan. In order to realize the rational use of the interactive response system in the college English reading teaching, it is necessary to determine its relevant theoretical contents. Based on the analysis of the relevant literature statistics and the information records, it is found that in 1995, Taiwan’s “Central” University studied the feedback link in the traditional teaching, and effectively combined with the relevant theoretical contents of the technology integration. In 1998, the final research result was based on the group infrared, which can be called an interactive feedback system. In the process of the rational utilization of the system, it can not only provide the good opportunities for the interaction between teachers and students, but also give full play to the role of the system in the process of the information feedback. In the analysis of the utilization of the interactive feedback technology, if we want to combine the actual situation and realize the rational utilization of this technology, we must build and implement the interactive teaching mode that meets the actual requirements. Especially during the Tenth Five-Year Plan period, the key topic of our country, the research of introducing the information feedback technology to construct the interactive teaching mode, has been put forward since 2002, and has passed the appraisal until 2005. In the entire operation process, more than 50 experimental schools jointly participated in the project. From the point of view of the information feedback technology, this subject has been applied to the college English reading teaching since it was put forward. At the same time, the concept of “1:1 digital learning” has been taken as the main guiding basis. In this way, not only can the two interactive teaching modes of “teacher as the center” and “leading subject” be applied to the practice scientifically and reasonably, but also can put forward the targeted implementation measures according to the actual situation. The interactive feedback technology can also play a different role in different teaching environments. According to the relevant literature and statistical data, it can be concluded that in August 2011, the process of “teaching research based on the interactive feedback technology” which is the key topic of the 12th Five-Year Plan of China’s educational information technology research was authorized by the central audio-visual education department. Through the study of this project, it is found that in the specific application process of the entire project, it will not only involve some new ideas and concepts in the entire implementation process of our education, but also give full play to the students’ subjectivity role in it. At the same time, teachers should do a good job of assisting, so that not only can the interactive
1726
D. Qi
feedback system play a full role in the college English reading teaching, but can also lay a good foundation for the deepening of the technology. In addition, from 2006 to 2010, the research on the development of the social learning network by using the interactive technology, a key topic of educational technology in China, has been put forward and effectively implemented in practice, which has a very important impact and role in promoting the application of the interactive feedback system in the college English reading teaching. In the specific operation process, the application of the system to the college English reading teaching not only puts forward a series of the targeted application measures, but also effectively combines with the modern science and technology to build a social learning network that meets the actual requirements. This can not only fundamentally improve the application efficiency of the interactive response system in the college English reading teaching, but can also improve the effectiveness of the English reading teaching.
3 Application of the Interactive Response System in the College English Reading Teaching Platform The reasonable use of the interactive response system in the college English reading teaching platform can not only carry out the English reading teaching activities smoothly, but can also provide students with a good opportunity to express themselves. The application of the system in the college English reading teaching can decompose the functional features of the system, which can not only help students cultivate the good reading awareness from the multiple links and perspectives, but also improve the level of the college English reading teaching.
3.1 “Voting Questionnaire” Causes Students’ Cognitive Conflict As we all know, the reading teaching is a very important part of college students’ English learning process. It is not only the foundation, but also the necessary prerequisite for cultivating college students’ English communication, language expression abilities and their comprehensive qualities. Therefore, in the process of the college English reading teaching, we should have a correct understanding and cognition of college students’ English reading teaching, so as to improve the learning enthusiasms and initiatives. In the process of their learning, teachers can use the interactive response system to stimulate and mobilize students’ interests in their learning. Before the beginning of the reading teaching, a series of the preparatory activities should be carried out. In the process of carrying out the preparatory activities, the most fundamental purpose is to stimulate the students’ existing language knowledge and skills, so as to attract the students’ attention and promote the students’ learning enthusiasms
Application of the Cloud Real-Time …
1727
and their participation initiatives can be effectively enhanced. Before the beginning of the reading teaching, teachers should assign different types of tasks to students to stimulate their learning and writing actively, so as to promote the entire reading teaching process to be positive and active. Before the beginning of the reading teaching activities, teachers can combine with the reading teaching contents and materials to create situations for students [5]. The basic purpose of doing this is to find out the key contents that can interact with students, and teachers can also set up some open questions. Through the setting of these questions, students’ cognitive conflicts can be caused. On this basis, through the function of “voting questionnaire” in the interactive response system, students’ cognitive differences can be feedback. At the same time, the feedback results are directly regarded as a kind of the teaching resources, and also a very important basis in the teaching process, which has a very important impact and role on the promotion of the reading teaching activities. For example, in the teaching process of The Entertainment Economy in the college English reading teaching, its main content is the entertainment economy. In the process of our teaching, teachers can create a good situation for students, attract students’ attention, and discuss the concept of the entertainment economy. Then, using the function of “voting questionnaire” in the interactive response system, students can tell which industries or factors can promote the entertainment economy. When students ponder and analyze this problem, they will put forward that the entertainment economy may be influenced by the entertainment industry, the media industry, the network and other factors according to their knowledge, opinions and other factors. 在 On this basis, teachers should ask students questions, so that students can tell the reasons why they put forward these factors, so that teachers can naturally introduce the relevant teaching contents of The Entertainment Economy [6]. At the same time, students can read the entire article. Through reading, students can have a deeper understanding and cognition of the contents of the article. This can not only stimulate students’ interests in reading, but also ensure the effective improvement of the college English reading teaching level.
3.2 Consideration of the Collective and the Individual Feedback The reading teaching has always been a very important part of the college English teaching. The reading teaching plays a very important role in the development of students’ reading abilities and their comprehensive qualities. Before the beginning of the reading teaching activities, a series of the preparatory activities should be done in advance. After the completion of the preparatory activities, students should start reading under the guidance of teachers. In the process of their reading, students should make use of their language reasonably to promote their reading consciousness, abilities and strategies to be effectively cultivated and implemented. In the daily teaching process, teachers should effectively combine with the characteristics of the
1728
D. Qi
contemporary college students and design the reading teaching contents scientifically and reasonably, so as to reflect the operability of the reading teaching contents. On this basis, we should combine the actual situation, and through these two functions and links of the “test response” and “rush response game”, achieve the feedback. One can actively involve all the members in the process of the practical application, while the other is challenging and can achieve the teaching objectives at different levels. It can be seen that the rational use of the interactive response system can not only promote the entire process of the college English reading teaching to all students directly, but also pay attention to the individual differences of each student through the practical teaching. For example, in the process of the reading of this content of The War Against Women, teachers can combine with the background of the times of The War Against Women and set up what, where, when, and who and so on. This will not only help students understand the events at that time, but will also promote students to have a more comprehensive understanding of The War Against Women. Then, teachers can ask students to find answers in the process of reading by putting forward such questions as what, where, when and who. If students can answer them, it means that students’ reading plays a certain role and has a profound understanding of the contents of the story. In the process of the reading teaching, the classroom teaching feedback is actually a very important link in the teaching process. It is not only the feedback basis of students’ learning situation, but also the way that teachers can understand students. Teachers can effectively combine with the final feedback results to formulate and implement the reading teaching plans that meet the actual learning requirements of the college students. If most of the students answered the questions correctly, the teachers could give individual tutoring. If the correct rate of the answer is not very high, then the teacher needs to find out the questions and check, explain and feedback these questions again to ensure that the students can have a profound understanding of the reading contents.
4 Conclusion In the process of the college English reading teaching, the interactive response system (IRS) can be applied scientifically and reasonably, which can not only provide students with the convenient and fast learning methods, but also promote the development of the English reading education. In the process of the college English reading teaching, the application of the IRS system is just in its infancy, so the development and utilization of the software or the functions are still limited. In the future, we will strengthen the mining and utilization of the functional features of the IRS system and improve the application efficiency of the IRS system in the college English reading teaching.
Application of the Cloud Real-Time …
1729
References 1. He Kekang. 2018. The great influence of the new information technology on the deepening reform of our education in the 21st century. China Modern Educational Equipment (16): 1–7. 2. Cheng Zhixia, and Chen Zichao. 2018. The application of IRS in middle school teaching practice under the background of the intelligence education—Taking Nanzhuang No.3 Middle School in Foshan City as an Example. Educational Information Technology (5): 12–15. 3. Li Lanting. 2018. Application strategy of the IRS interactive response technology in mathematics teaching. China Modern Educational Equipment (04): 23–25. 4. Ye Minling. 2017. Application of the interactive teaching response system in the primary mathematics teaching. Educational Information Technology (11): 74–76. 5. Ning Ge, and Gong Rui. 2014. Monitoring of the teaching quality management supported by the interactive response system—A case study of Shenzhen Luohu Foreign Language School. Educational Information Technology (12): 65–69. 6. Zhu Shujun. 2014. Interactive feedback technology is a good helper for teachers to construct efficient classrooms. China Modern Educational Equipment (16): 65–66.
Service Products and App Design of Public Diocese in Colleges and Universities Ruibo Song and Chenglin Ma
Abstract To analyze the current service status of the users of public parishes in Colleges and universities, find out the problems of existing equipment and space in public parishes and the relationship between users and managers, enrich the service content of public parishes, enhance the experience of teachers, students and managers in public parishes, alleviate the contradiction between the high demand for teaching resources and idle waste, and innovate the service system of public parishes. On the premise of resource sharing, user and stakeholder research was carried out. With the help of user itinerary map, stakeholder map and other research tools, user-centered, co-creation, process and visualization principles of service design were used to discover the pain points and needs of teachers and students in the teaching process based on user experience, and new service flow chart was used to systematically display the service of public parishes. Innovative content. Intelligent terminal interactive products such as service blueprint, service platform APP, identity information verification equipment and intelligent display equipment have been formed, which optimize the service process of public parish, improve the user experience, and create new service mode and content of public parish. Keywords Parish · Service system · Design · Experience · Resource sharing With the continuous development of higher education, higher requirements have been put forward for teaching sites, experimental equipment, public facilities and other resources. There are many contradictions between the existing resources and teaching needs [1, 2]. In addition, the unreasonable allocation of resources leads to the inadequate and maximized use of resources, which not only creates poor experience for students and teachers, but also poses problems for managers. Public diocese is an area requiring higher allocation and use of resources. Examination and approval of the use of teaching hardware, functional zoning, order management, public information dissemination, teaching content sharing, real-time logistics management support and R. Song (B) · C. Ma The Design Art School, Shandong Youth University of Political Science, Jinan 250103, Shandong, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_206
1731
1732
R. Song and C. Ma
other factors all affect the use experience of educational resources in public diocese [3–5].
1 Educational and Social Needs Promote Innovation of Public Diocese in Colleges and Universities With the rapid development of information technology and information industry, information products are becoming more and more abundant, information terminal equipment has also been more optimized, and the cost of data information generation, transmission and use is becoming lower and lower, which provides a good basis for the information service design of university public education areas. People have more convenient access to information, the way of teaching and learning has also changed greatly, and higher requirements have been put forward for the allocation of teaching resources [6]. During this period, the society’s demand for talents continues to develop and increase, and the cultivation of College Students’ professional knowledge and comprehensive ability is also facing great challenges. Relevant research holds that, the function setting of classroom should be based on the differences of students to create different and targeted learning courses, so as to ensure that students have their own learning style and environment. Teachers set the corresponding learning content according to the particularity of each student, thus putting forward the concept of smart classroom. And it has a new supplement to the function [7–9]. The “wisdom” of intelligent classroom should be embodied in the marking and preservation of classroom contents, the instantaneity of interactive feedback, the intelligent control of public equipment, the function of information recognition, the accurate and efficient retrieval of relevant information and the realization of self-defined queries, as well as the establishment of personal data system. Intelligent classroom facilities and equipment not only to achieve the integration of a variety of technologies, but also need to support the intelligent service system, through the intelligent service system to view, control, understand the operation status of various electronic facilities, but also through the network for intelligent control of the corresponding information query, to establish the personality of teaching resources [10]. The pattern of diversification and diversification of teaching content can improve learners’ learning efficiency and related abilities. Improve the use of smart classroom experience, improve the efficiency of equipment operation, reduce the cost of investment.
Service Products and App Design of Public …
1733
2 Service Status of Public Diocese in Colleges and Universities Firstly, the public teaching area involves many courses, with a wide range and a large number of people. In the daily teaching courses, we need to deal with the classroom order in many ways, mobilize students’ enthusiasm in class, create a good classroom atmosphere, and the cumbersome and inconvenient procedures of curriculum adjustment will affect the teaching progress and efficiency. Secondly, students’ understanding and mastery of public teaching resources is the precondition for improving the utilization rate of resources. In the spare time, the application conditions of basic equipment, public facilities and other hardware equipment in the public education area and the feedback of problems will cause the change of utilization rate. The free choice of different users in the public diocese will cause the fluctuation of learning atmosphere in the classroom. The difference of selfbinding will affect the normal order in the classroom, and even cause unnecessary conflicts. The lack of communication and interaction between students of different majors, the lack of effective channels to understand the curriculum information of interesting but unfamiliar majors, and the inability to learn and reuse the remaining curriculum resources. Public teaching resources still adopt the traditional pyramid ladder mode of information transmission (lectures, forums). This mode makes the intermediate transmission level increase, information transmission slow, timeliness decline and accuracy distortion serious. Ultimately, communication opportunities for specific issues are reduced, which hinders the effective realization of maximizing the sharing of educational resources under current conditions. Thirdly, the service guarantee and maintenance are not in place, and the equipment service providers cannot monitor the operation of teaching equipment in real time. The accident and damage of equipment will always be handled after the event, which has great instability in terms of time and efficiency.
3 Analysis of College Public Diocese Service Based on Systematic Whole Process Experience Service attaches great importance to the system, which requires the participation of many people, social organizations and public resources, and has a high sociality. It distributes in different time and space environments, and coordinates and cooperates with each other to realize the reallocation and rational sharing of resources. From a systematic point of view, there are many deficiencies in the existing public diocese services in Colleges and universities, such as unclear guidance information, improper maintenance of equipment, small range of personalized choices, and so on, which have become an important content affecting the user experience of public diocese. Service is to better enhance the user’s experience, throughout the entire process of service content. The service provided by the parish lays more emphasis on the user’s
1734
R. Song and C. Ma
experience and the level of experience, which affects the teaching effect of teachers and the learning effect of students. Taking the whole process of the use of public parish users as a process, this paper studies the problems, pain points and needs of users in using public parish services, and puts forward targeted improvement methods. By dividing the whole service experience process into three stages, the former stage, the middle stage and the latter stage, it can more accurately distinguish the content of users’ needs.
3.1 Pre-experience Pre-service Pre-service before experience is crucial to the whole service process. Before experiencing, participants used APP to query resources within the parish, including available locations, environments, equipment and planning routes. Resource query process is the knowledge and expectation of the experience for the whole service process, and is the premise to improve the efficiency and experience in the experience. At present, the rectification services of public parishes are not perfect, mainly including information inquiry, self-study courses, academic activities and online applications. Firstly, within the public parish, the content information of the resource inquiry system is too simple to show whether there is curriculum use or not, and the use of after-school, the number of participants, hardware equipment and community atmosphere are not fully displayed. Secondly, with the increasing demand for compound talents in society, more and more people realize the importance of expanding knowledge network structure and increasing comprehensive quality cultivation. College students learn by “skipping classes” and lack of management of skipping classes. Most of the relevant departments in Colleges and universities hold that “people do not lift their hands, officials do not lift their hands”. As a result, there are some problems such as lack of information channels for self-study courses and non-disclosure of information for public courses, which affect users’ learning experience. Thirdly, the traditional pyramid ladder is still used in the transmission of information in academic activities, resulting in poor timeliness, small scope and weak intensity of information transmission, which makes the utilization of open academic resources inefficient and wasteful. Finally, under the current management system, the use of resources needs to submit various applications, go through too many procedures, and even need to be processed offline. Applicants for the use of resources need to go back and forth to various departments to submit and receive documents, which greatly reduces the efficiency.
3.2 Services in Experience There are many problems in the diocese, including simple guidance system, poor continuity of guidance, and the inability to use GPS technology to locate accurately.
Service Products and App Design of Public …
1735
After entering the public diocese, accurate positioning has become a difficult problem in a large number of public educational resources. The planning, accurate positioning and guidance of the path direction also need to be clearer. The number of teachers and students in the public diocese is relatively large. They rely too much on students’ selfcontrol and teachers’ management in personnel diversion, attendance statistics and order management, and lack related technical resources and equipment resources. For managers, it is difficult to form effective and visual information data. They can neither discover the use of relevant resources nor grasp the real-time information of users. They cannot deal with emergencies timely and effectively. In addition, users in the same area are engaged in different learning content, and more problems will arise because of different content, resulting in interaction between groups, reducing work efficiency, and the use of resources in the public transport area cannot be fully utilized.
3.3 Experienced Services The feedback way of the use of related resources and equipment in public parishes is relatively single. It can only be reported through the traditional hierarchical system. It relies heavily on people’s quality and sense of responsibility, and there are more uncertainties in the solution of the problem. In terms of feedback on teaching methods, teaching contents and teaching effects, there are also single channels and insufficient timeliness, and many problems cannot be effectively and timely solved. In the aspect of user experience sharing, there is a lack of relevant paths, neither scoring content of service experience evaluation, nor communication platform with non-participants, nor guiding content for the improvement and innovation of service content. The service foundation of the diocese has many different experience loopholes for different stakeholders, but the ultimate problem comes down to resource location, usage and usage mode. Many stakeholders in the diocese are in a one-way cyclic state, among which the service personnel are not enough to empower the terminal participants, lacking in professionalism, timeliness and effectiveness. The image, transformation and utilization of information cannot be effectively transmitted to participants, which leads to the exhaustion of circulating energy in the whole service system. At the same time, the resources of terminal participants are in the hands of service managers and their use is limited.
1736
R. Song and C. Ma
4 Service Design of Public Diocese in Colleges and Universities Through analyzing and sorting out the service experience stage of the public parish, the service loopholes are excavated. The service gap is filled by using the design schemes such as brand image and guidance system, emotional user experience and online and offline interactive experience. A complete public parish education resource sharing system is designed to create a better service experience process.
4.1 Basic Objectives of Service Design in Public Diocese Firstly, we should build a public diocese resource sharing service platform, change the single status of resource utilization, and make effective use of public resources in public diocese. Improve the data transmission efficiency of the platform, and promote the efficient, healthy and orderly operation of public Diocese resources. Secondly, the intelligent integration of personal mobile digital terminals and intelligent devices in public parishes will promote the interconnection and sharing of information and data, and integrate human, intelligent devices and environment into a platform to realize the interconnection and sharing in the platform. Thirdly, visual guidance system is an important service content in the diocese, which can help participants quickly distinguish and clarify the environment and location information of the diocese, and also deepen the impression of terminal participants on the service experience in the diocese. Fourthly, it is necessary to change participants’ awareness and sense of belonging of educational resources in public parishes in a new way of use, expand the scope, fields and ways of making friends, so that participants can actively participate in resource sharing services in public parishes.
4.2 Public Diocese Service Blueprint Through the framework of the blueprint for the service design of the parish. The participants of the service can communicate directly with the background data online. Change the service provider from the front desk staff to the back-end database. According to the data traces left by terminal participants, the database provides personalized service experience for each participant. The optimized service system enables users to fully understand the parish before experiencing, reduces the strangeness of participants to the parish, and makes the guide of the parish more smoothly in experiencing. It can also help service providers get timely feedback after the experience, and participants can actively share the experience. The optimization direction of public parish service system lies in the contact transmission between the
Service Products and App Design of Public …
1737
service team and participants. It can drive the whole stakeholders forward by using the minimum energy of the team, and avoid the problems and loopholes caused by the resource utilization efficiency of the service staff. It can flexibly change the strategy according to the change of service experience.
4.3 Design of Guidance System in Public Diocese Guidance system is also one of the important ways for participants to familiarize themselves with the public parish environment and enhance user experience. It can clearly show the layout and path of the public Diocese environment. To do a good job in the new sorting of the classrooms in the parish area, the label of the classroom in the same corridor is changed from the original round-trip sorting to the left-right symmetrical sorting. Guidance information is set up in important passageways, stairs and toilets where there is a large flow of people. Unified guidance information can help participants quickly and directly grasp the resources system of the parish. Visual guidance mainly includes information that can guide participants, such as toilets, functional zones, floors and safety exits.
4.4 Public Product Design in Public Diocese Public goods are common facilities for all stakeholders in the public diocese, which can not only improve participants’ awareness of the public diocese, but also facilitate participants’ use, increase their preference for the public diocese, and enhance participants’ stickiness to the public diocese service experience. With the progress of technology, the speed of information transmission has been greatly improved. Products no longer need bulky and crude public facilities, but need lightweight, concise and intelligent products. The main functions of public goods are identity recognition and data statistics, real-time and comprehensive links with service platforms. Identity information identification and verification product is an important part of public goods. It is also an important voucher for public parish participants to reserve resources. It verifies the terminal reservation resources and the reservation time. When participants begin to verify the instrument, the equipment will present the real-time curriculum, participants, usage, environmental conditions, infrastructure and other information in the classroom in an upward projection way. At the same time, relevant information will be uploaded to the background data platform for management personnel to monitor and manage. Teachers can also real-time understand students’ learning situation, and students can avoid the problem of uneven distribution of resources caused by human factors.
1738
R. Song and C. Ma
4.5 Public Diocese APP Design The mobile phone terminal APP in the parish is an important information carrier through the whole process, and also an online platform for the realization of the whole service. Through the complete display and data tracking of the location, usage and usage of public parish resources, participants can get effective feedback before, during and after the experience of the whole process, run through the contact point of the whole process, grasp the rhythm of the whole process, and increase the actual understanding of users. Effective interaction between high users and public parishes. According to the analysis of user experience process, APP online platform services in accordance with the three stages.
4.5.1
Pre-service Before Experience
Provide participants with a unified search information and resource reservation service, which can discover the updated content in time. Including: Introducing and noticing the cultural activities and academic forums in the diocese. Pushing them in the form of pictures and texts in APP, facilitating participants’ understanding and choice, and making corresponding plans according to the requirements and arrangements of the activities. Use of resources and scheduled services to enable participants to understand the location information, utilization and basic equipment allocation of specific areas of the diocese, so as to improve the efficiency of resource utilization, so as to achieve efficient and non-gap recycling. Check the content information, duration, location distribution and navigation route of resource requirements, and personalize the changes according to the participants’ own situation, providing different resource environments and route choices.
4.5.2
Services in Experience
Provide route guidance and participation experience services for participants. Including: Firstly, When arriving at the parish, we can check the usage and booking service of the planned resource information, and arrive at the environment where the reserved resource is located within ten minutes. Secondly, combining the device identification verification device, the corresponding identification and punching task can be completed by checking the location information, and the ranking of the daily attendance list can be obtained through information check. The higher the score, the priority will be given to data screening for re-application of resources, using the least time to obtain the fastest allocation of resources.
Service Products and App Design of Public …
4.5.3
1739
Experienced Services
Provide continuity service for participants, strengthen the stickiness of service, expand the scope and object of service. Including: Develop online communication, raise the doubts and problems encountered in the use of resources, strengthen the cooperation between service providers and service users, increase the vitality of public diocese resources utilization, transfer the service experience of public diocese, enhance the autonomy of participants, constantly improve the content of experience, create new forms of service and achieve the goal of: Effective communication. Define the function orientation of management and service, strengthen the collaborative relationship among stakeholders such as students, teachers, cleaning and maintenance, systematically look at the problems arising in the experience, accept the suggestions of terminal participants after experiencing, and form a new service mode, which ensures that the interests and needs of end users are met, but also allows more. Stakeholders benefit. Push the announcement information of interest activities, academic forums and other activities to users in real time, enhance the attractiveness and vitality of the parish, and continue the experience cycle of resource services in the parish.
5 Conclusion The service design of public parishes in Colleges and universities is a new service platform constructed by using Internet technology and digital equipment on the premise of not increasing fixed assets. Based on the basic concept of resource sharing, the use of service design methods and tools effectively alleviated the pain points in the use of public parishes, and also innovated the way of experience to meet the different needs of teachers, students and logistics personnel. As a university, we should define the role of service providers and further improve the service experience system so as to achieve the effective use of resources, maximize and optimize the provision of various service content and forms, so as to make the learning process have a higher degree of experience, and ultimately improve the quality of higher education.
References 1. Zhang Hui-jing, and Zhang Jing. 2017. A comparative study of the reform and innovation of classroom teaching mode in colleges and universities. World Education Information 30 (12): 62–65. 2. Yu Sen-lin. 2008. New proposition of design: Service design—Taking community clothing cleaning service design as an example. Decoration (10): 80–81. 3. Song Rui-bo, and Zheng Lei. 2018. The essence of customized home is based on the whole process of user experience. Sales and Marketing (Management Edition) (10): 76–78.
1740
R. Song and C. Ma
4. Wang, T., and W. Zhou. 2019. Current situation and countermeasures of Chinese street furniture design in intelligent development context. International Conference on Applied Human Factors and Ergonomics, 471–479, Springer, Cham. 5. Shen Da-ming. 2017. Design of service system for classification and treatment of urban domestic waste in Guangzhou. Decoration (06): 142–149. 6. Yu Cheng-Yang. 2019. Research on the service design of internet + experience agriculture. Age Agriculture 46 (02): 84–86. 7. Jing Peng-fei, and He Li-na. 2016. Enlightenment of complex adaptive system theory on sustainable design process. Design (09): 64–65. 8. Goldstein, S.M., R. Johnston, J.A. Duffy, et al. 2002. The service concept: The missing link in service design research? Journal of Operations Management 20 (2): 121–134. 9. Lynn Shostack, G. 1982. How to design a service. European Journal of Marketing 16 (1): 49–63. 10. Von Hippel, E. 2007. Horizontal innovation networks—By and for users. Industrial and Corporate Change 16 (2): 293–315.
Software Elderly-Oriented Interaction and UI Design from the Perspective of Service Design Ruibo Song and Lei Zheng
Abstract This paper analyzes the pain points, problems and needs existing in the use of software by the elderly, and studies the cognitive and perceptual characteristics and problems of the elderly. The method and principle of systematically carrying out integrated innovation based on user’s whole process experience from the perspective of service design is put forward. Keywords Elderly-oriented · Software · Interaction and UI design · Service design With the development of society, people have increasingly high requirements on the content and form of service. With the support of advanced technologies such as the Internet, intelligent products and services have become indispensable in our life [1, 2]. As an important group of the society, the elderly have encountered many problems and difficulties in receiving and using the related services provided by information technology [3]. How to solve these problems and difficulties has become an important task at present.
1 Information Technology Drives the Development of Services The development of science and technology has made our life better in the future, and the popularization and application of information technology has become an important support, which also has a profound impact on all aspects of life [4, 5]. In the process of smart city construction, transportation, shopping, life payment, bank savings, medical care and other services, whether in the form of service or experience, are undergoing great changes. R. Song (B) The Design Art School, Shandong Youth University of Political Science, Jinan 250103, Shandong, China e-mail: [email protected] L. Zheng The Art Design School, Shandong Women’s University, Jinan 250103, Shandong, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_207
1741
1742
R. Song and L. Zheng
1.1 Changes in Service Form and Content At present, many services have been transformed from traditional offline to O2O, and all kinds of services have been expanded to various service platforms relying on the Internet [6]. However, due to their own problems and software design, the elderly are still accustomed to receiving offline services. Most of the people waiting in the bank, shopping mall and water and electricity fee paying hall are old people, while few young people appear [7]. At the same time, due to the transformation of the service form of bank, supermarket, water, electricity and heating payment hall, the traditional person-to-person service window is also reduced, which aggravates the deficiency of the elderly in these service experience and causes more and more conflicts with service providers.
1.2 Pain Points and Needs of the Elderly The physical function of the elderly will have different degrees of degradation with age, and the cognitive perception ability will gradually become weaker, especially in the aspects of feeling, perception, thinking and memory. In terms of vision, the elderly’s visual perception of the surrounding environment is inaccurate, their visual sensitivity is reduced, and their ability to distinguish colors is also declining, which hinders the elderly’s analysis and processing of text, graphics, images, colors and other information content. In terms of hearing, the hearing system of the elderly has also undergone degenerative changes. The hearing threshold gradually increases, the hearing field gradually shrinks, and the acceptability and output of information become lower and lower. In the aspect of touch, due to the decline of the nervous system, the tactile sensitivity becomes worse, the reaction becomes sluggish, and the positioning accuracy and sensitivity of things are reduced. Vision, hearing and touch of a series of problems caused the elderly overall cognitive level is greatly reduced, causing cognitive aging, memory ability reduce no learning ability and the effect of variation, thinking slow response, strong dependence of previously accumulated knowledge system, it is difficult to accept the new information and knowledge, and it is difficult to make a decision in the face of choice.
2 Analysis of Cognitive Perception of the Elderly The physical function of the elderly will deteriorate in varying degrees with age, and their cognitive perception ability will gradually weaken, especially in sensation, perception, thinking and memory. In terms of vision, the old people’s inaccurate visual perception of the surrounding environment, reduced visual sensitivity, and the ability
Software Elderly-Oriented Interaction …
1743
to distinguish colors are also declining, which hinder the analysis and processing of information content such as text, graphics, images and colors. In auditory aspect, the auditory system of the elderly has also undergone retrograde changes, the hearing threshold has gradually increased, the auditory field has gradually narrowed, and the degree of acceptance and output of information has become lower and lower. In tactile sense, the decline of nervous system leads to poor tactile sensitivity, slow response, and reduced accuracy and sensitivity in locating things. A series of problems of vision, hearing and touch have led to a great decline in the overall cognitive level of the elderly, resulting in cognitive aging, loss of memory ability and poor learning ability and effect, slow thinking response, strong dependence on the previously accumulated knowledge system, difficulty in accepting new information and knowledge, and difficulty in choosing. To make a decision.
3 Comparisons of Design and Development of Elderly-Oriented Software and Service Design Software is a non-physical tool designed and developed by people to solve problems. It is mainly divided into two categories: system software and application software. Application software is frequently used by ordinary users, including various operating software, apps and small programs installed on smart phones, smart TVS and other smart terminal facilities. There are basic methods and principles for software design and development, which first define problems through investigation and analysis, then study their feasibility, analyze requirements, develop design, test and further improve. Its design and development method and principle are basically consistent with the thinking method of service design. The basic method and process of service design is “empathy – definition – assumption – prototype – test”. That is to say, it firstly carries out user-centered research, then studies the definition of problem essence and demand positioning, service blueprint, and finally product prototype, design verification and adjustment.
4 Design Principles of Elderly-Oriented Software The main purpose of the development and design of adapted software is to provide services to solve user problems and meet user needs. Therefore, the thinking, methods and principles of service design should also be followed.
1744
R. Song and L. Zheng
4.1 User-Centered, User Experience-Based The elderly should be regarded as the center of design research and service, and survey and analysis should be carried out from the perspective of users. Draw user experience map, make clear the process of user experience using software, analyze the contact points of each elderly user and the software, find out the shortcomings and pain points of each exit point, and determine the high, medium and low emotions of users. Aim at the low point of emotion, study the method and content of improving emotion, change the pain point into the pleasure point. For example, in terms of the visual experience of the software, first of all, the font should be appropriately increased, and at the same time, the text should be clearly distinguished from the surrounding background factors, and the navigation bar and small icon with poor recognition should be avoided, and the motion strobe rate of dynamic elements should also be appropriately reduced. The graphics of the software interface should be concise and easy to understand, and the image properties should be clear. Secondly, it is necessary to increase the fault tolerance in the interface design, improve the difference between elements, and increase the color difference between elements. In the aspect of tactile sense, it is necessary to avoid too delicate operation in the operation process. Human-machine interaction should be simple and direct, and the form of feedback should be strengthened to change the single vibration into vibration plus sound or color change or size change. Expand the limitation of a single sense, integrate various sensory forms, and enhance the effect of the elderly’s information reception. In view of the problem that the elderly are prone to close or modify the page by mistake, the system restoration function with memory should be added to enhance the user experience.
4.2 Pay Attention to the System and the Whole Process Service design pays attention to systematic, that is, to carry out from the perspective of the whole ecological, global research, analysis, positioning and design, to fully human and products, human beings, interface, and the relationship between human and environment, and more on service, service and after service before three stages analysis, found the user’s actual demand, provide a complete service closed-loop, and the services provided by the content can replicate and expand. The systematic design of suitable old software should be carried out from two aspects: longitudinal time axis and horizontal environment. First of all, it should be able to fully attract elderly users to actively understand and use the software and be interested in developing the experience. Secondly, the system between the elderly users and the surrounding environment, people and products should be fully studied in the experience process. After the experience, there should be enough feedback space and feedback path, which can not only help the software developers to improve the software, but also allow the elderly users to participate in the design, thus increasing the user viscosity.
Software Elderly-Oriented Interaction …
1745
4.3 Expanding Resources and Integrating Innovation The quality standard of service design is not correct, only better and easy to use. The elderly-oriented software design should not only solve the problem, but also aim at improving the user’s experience, constantly expand innovation, integrate online and offline resources, mix reality and virtual, create the form and content that can bring excellent experience to the old users, and create a new life style for the old people in the new era.
5 Conclusion The elderly-oriented software design based on the elderly physiological, psychological characteristics, from the cognitive level and other aspects of the features and requirements, understand the feeling of the elderly, perceptual characteristics, the research of the elderly, interactive reading habit, the whole process experience and the system based on older users situation, system builds comfortable old software service framework, the interaction process and interface elements.
References 1. Song Ruibo, and Zheng Lei. 2018. The essence of customized home is based on the whole process of user experience. Sales and Marketing (Management Edition) (10): 76–78. 2. Zheng Guangying. 2014. Product operational feedback design based on senile sensory characteristics. Mechanical Design 31 (1): 116–119. 3. Wang Lihong, Bai Xuejun, and Yan Guoli. 2014. Aging of Chinese reading perception width: An eye movement study. Psychological and Behavioral Studies 12 (6): 763–768. 4. Li Wei, Zhao Jianghong, and Tan Hao. 2013. Accessibility design of cognitive-based elderly website. Packaging Engineering 34 (12): 54–56. 5. Yang Zhiliang. 2011. Talking about the study of human memory. Psychological Science 34 (1): 249–250. 6. Zhang Ping, and Ding Xiaomin. 2018. Research on interactive design of aged intelligent products under compensation mechanism. Journal of Graphics 39 (4): 700–705. 7. Zhou Ming, and Li Yajun. 2017. Research on interactive aging design of old-age services with Chinese characteristics. Art Baijia 33 (1): 233–234.
Application of Fuzzy Algorithm’s Equal Flow Information Sampling Technique in Smoke Concentration Monitoring Jiying Chen, Shuanghe Chi, Gaoyuan Cheng and Wenqin Zha
Abstract In view of the shortcomings of China’s current monitoring of smoke concentration using weighing method, this study designed and developed a smoke concentration online monitoring system based on sampling technology of equal velocity information of fuzzy algorithm. This study uses fuzzy logic tool in MATLAB to simulate the design of the fuzzy algorithm. Moreover, after entering the fuzzy command in the MATLAB command input line, the algorithm enters the fuzzy logic toolbox. In addition, this study conducts a one-month test on a thermal power plant through the smoke concentration online monitoring system. Finally, this study combined with error analysis to test the performance of the research system. The research shows that the method proposed in this paper has certain effects and can be used as a reference for subsequent practice research. Keywords Fuzzy algorithm · Sampling technology of equal velocity information · Smoke concentration · Online monitoring
1 Introduction With the rapid development of the global economy, the pollution problem has gradually become a hot spot of global concern, among which air pollution is one of the most serious problems [1]. In recent years, smog weather has been throughout the country, and some cities have even severe air pollution throughout the year, and smoke contamination is the main source of air pollution. Smoke contamination directly threatens people’s life and health. In the process of breathing, the human
J. Chen (B) · S. Chi College of New Energy, China University of Petroleum, Qingdao 266580, China e-mail: [email protected] G. Cheng School of Information Science and Engineering, Lanzhou University, Lanzhou 730000, China W. Zha College of Information Engineering, Shanghai Maritime University, Shanghai 201306, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_208
1747
1748
J. Chen et al.
body inhales various particles of dust particles in the atmosphere and deposits them in different parts of the respiratory tract, causing various pneumoconiosis [2]. There are many ways to detect the concentration of dust. Foreign research in this field is very early and rapid development. There is already a set of monitoring methods and instruments that can be used, but there is no effective solution to how to simply and stably monitor the dust concentration online. There are currently three types of instruments used worldwide to measure dust: dust samplers, dust meters, and dust concentration sensors. As early as the end of the nineteenth century, the French scientist Ringgman divided the blackness of the smoke into six grades. The six grades defined the standard of six rectangular pieces of different blackness. When testing the blackness of the smoke, it is directly observed with the naked eye. The method is very simple, but the error is very large, which is greatly affected by the vision and environmental factors of the measurer. Until 1936, the British Cancer Research Organization began to investigate the damage of dust to the human body and proposed a hypothesis—using artificial lung devices to monitor dust. According this thought, in 1959, the United Kingdom designed a sampling device that can divide dust into two parts, respiratory and non-breathing, thus completing the plan to start artificial lung sampling, which was immediately adopted by the United States, Canada and other countries. The United Kingdom is the world’s [3] research site for dust detection techniques and their hazards. The British fixed-point breathing dust sampler includes a laser device, and the dust concentration can be directly expressed on the instrument. The instrument can synchronously generate a curve change map, which can be directly observed and is very convenient. Later, Rotheroe-Mitchel of the United Kingdom made a computer monitoring system for OSIRIS dust concentration based on the dust detector, which can continuously and automatically monitor the dust concentration [4]. In the 1960s, American scientists discovered that the important cause of pneumoconiosis was respiratory dust by analyzing many articles, and then the method of expressing dust concentration was converted from dust counting method into respiratory effluent frequency measurement method. The transformed approach laid the groundwork for the US approach to setting dust exposure limits. The CPM dust emission continuous monitor developed by BHA uses the principle of extinction. Its operation is convenient, but the accuracy is not high [5]. The Mel. CSP particle content detector developed by KPOPUL Company can be monitored online and continuously in real time using the principle of static electricity [6].
2 Research Method Observing the structure shown in Fig. 1. The sensor is used to collect various environmental parameters of the industrial site. The sensor converts the environmental quantity into an analog output through the transmitter output, and then converts the `` and then transmits it to voltage or circuit signal into a digital signal through AAD, the fuzzy controller. After the fuzzy controller blurs the input signal and the control rules and performs fuzzy inference and defuzzification on the signal, a digital signal
Application of Fuzzy Algorithm’s Equal …
1749
Fig. 1 The structure of the fuzzy control system
`` the actuator is driven to is output [7]. Then, after the output is converted by DAA, manipulate the controlled object. When the sampling pump and the sampling nozzle are selected and the frequency of the tested inverter is set to the range of 32–52 Hz [8]. However, the actual flow rate of the on-site flue is generally 8–16 m/s. Then, the basic domain of the deviation E is at [−8, 8], that is, the variation range of E is in the interval [−8, 8]. The fuzzy domain of the deviation E is divided into seven symmetric intervals of NB (negative large), NM (negative medium), NS (negative small), Z (zero), PS (positive small), PM (median), and PB (positive). The fuzzy domain is [−6, +6]. The center point of the fuzzy set is the elements −6, −4, −2, 0, 2, 4, 6, which correspond to NB, NM, NS, Z, PS, PM, PB, respectively. The membership of the seven elements in the set is 1, such as NM(−4) = 1, NS(−2) = 1, PS(2) = 1, PM(4) = 1 [9]. The membership function of the flow velocity deviation is shown in Fig. 2. After fuzzy inference, the obtained output is a fuzzy value, and the controlled target cannot be directly manipulated by the fuzzy value. The fuzzy value needs to be defuzzied to obtain a value that can adjust the controlled object. The commonly used anti-fuzzy methods have three methods: weighted average (center of
Fig. 2 Membership function of flow velocity deviation
1750
J. Chen et al.
gravity), maximum membership, and median. In this paper, the method we choose is the weighted average method. The weighted average method is further divided into algebraic product form and MIN-MAX form. The algebraic product weighted average method formula is shown in Eq. (1) [10]: n
Z0 =
ki u i
i=1 n
(1) ki
i=1
Among them, Ki is the weighting coefficient, which is the membership value in the cybernetic domain and ui is the value of the cybernetic domain. The formula for the MIN-MAX weighted average method is shown in Eq. (2): n
Z0 =
u c (z i )z i
i=1 n
(2) u c (z i )
i=1
In the formula, (z i ) is the corresponding element value in the cybernetic domain, and u c (z i ) is the membership value of the corresponding element in the cybernetic domain. The obtained z 0 needs to be converted into an accurate control amount z, and the conversion formula is as shown in Eq. (3): z = z0 × kz
(3)
In the formula, k z = x/n. Among them, x is the corresponding value 10 of the control quantity in the basic domain, and n is the corresponding value 6 of the control quantity fuzzy domain. MATLAB’s fuzzy logic tools are used to simulate the design of the fuzzy algorithm. After entering the fuzzy command in the MATLAB command input line, the system enters the fuzzy logic toolbox. After that, the simulation design of the fuzzy algorithm is carried out according to the requirements of this paper. Input and output, membership functions are set, Mamdani fuzzy inference method is selected, and fuzzy rules are designed according to empirical rules. Each part of the fuzzy algorithm is shown in Figs. 3 and 4 [11]. According to the requirements of this paper, the fuzzy algorithm is designed by using the MATLAB fuzzy logic toolbox to obtain the fuzzy rule inference graph and the control surface graph of the input/output variables, as shown in Figs. 5 and 6, respectively.
Application of Fuzzy Algorithm’s Equal …
Fig. 3 Simulation design of the fuzzy algorithm
Fig. 4 Fuzzy rule design of fuzzy algorithm
1751
1752
Fig. 5 Reasoning diagram of fuzzy rules
Fig. 6 Control curve of input/output variables
J. Chen et al.
Application of Fuzzy Algorithm’s Equal …
1753
(a) Sampling speed equals flue gas velocity (b) Sampling speed is greater than flue gas velocity (c) Sampling speed is less than the flue gas velocity Fig. 7 Schematic diagram of the relationship between sampling speed and flue gas velocity of sample point
3 Hardware System Construction As part of the direct contact with the measured environment in the online smoke concentration monitoring device, the smoke gas sample collection part is mainly responsible for sequentially conveying the flue gas containing smoke in the measured environment (such as the flue) to the continuous weighing part of the smoke and the smoke gas sample detecting part, so as to measure the smoke quality and the smoke sample volume through the steps of weighing and detecting, and finally calculate the concentration of smoke [12]. The device adopts the method of equal flow rate sampling, that is, the sampling speed of the sampling nozzle is equal to the flue gas velocity. Figure 7 [13] is a schematic diagram showing the relationship between the sampling velocity and the flue gas velocity of the sample point. The collection part of the smoke gas sample is mainly composed of six parts: a sampling gun, a temperature transmitter, a differential pressure transmitter, a pressure transmitter, a heat-treating tube, and a back-blowing pump. Figure 8 is an overall structural view of the smoke gas sample collection part drawn by the SolidWorks software [13].
4 Monitoring Application Through a smoke concentration online monitoring system, a thermal power plant is tested for one month. The converted concentration is the measured value of the device, and the comparative concentration is the measured value of a smoke monitor that has been put into operation near the same flue hole of the thermal power plant,
1754
J. Chen et al.
1-sample gas collection control cabinet; 2-sampling tube; 3-temperature sensor; 4-pilot; 5-sampling gun body; 6-flange fixing parts; 7-heat pipe; 8-three-position two-way solenoid valve; 9-pressure transmitter; 10- differential pressure transmitter; 11-backflushing pipeline
Fig. 8 Overall structure of the collection part of the smoke gas sample
and the principle is light scattering. In the actual use process, the instrument needs to periodically correct the measured value by manual weighing method, so the measured value is considered to be close to the actual true value. The converted concentration measured by the system was compared with the contrast concentration measured by the smoke detector used in the field installation, and the two were analyzed by expectation, median, variance, etc., and the results are shown in Table 1. By analyzing the test data, the results of Table 1 are obtained. The results show that the measured smoke concentration of the system is lower than the actual smoke concentration, and the data fluctuates greatly. (1) The impact of the sampling gun design. The parts such as the pitot tube and the sampling nozzle on the sampling gun have insufficient processing precision. After the equipment is operated for a long time, the pitot tube may be blocked, resulting in a large pressure difference. (2) The impact of the pipeline design impact. There are unreasonable situations in the design of the piping design. In the actual sampling, the sampled gas passes through the sampling gun, and then the flue gas is fully heated by a 5-meter heat tracing tube, and then the flue gas is filtered through the filter of the weighing unit. (3) The impact of weighing unit. There are many mechanical Table 1 Comparison table of converted concentration and contrast concentration
Converted concentration (mg/m3 )
Contrast concentration (mg/m3 )
Expectation
2.0748
2.102
Standard deviation
0.1479
0.1141
Variance
0.0220
0.0130
Median value
2.036
2.128
Maximum value
2.365
2.275
Minimum value
1.754
1.889
Application of Fuzzy Algorithm’s Equal …
1755
movements in the weighing unit. During the weighing process, the opening and closing action of the filter cylinder and the vibration of the test platform may cause the dust particles on the filter to fall, thus affecting the weighing result. (4) The impact of sampling time. The length of the sampling time also has a certain influence on the measured smoke concentration. If the sampling time is too short, the amount of smoke deposited on the filter is too small, and the balance is prone to large errors when weighing.
5 Conclusion Aiming at some shortcomings of existing smoke concentration monitoring equipment, a prototype of online monitoring system for smoke concentration based on filter weighing method was designed. This paper mainly designs the software for this system, including the embedded program design of the system weighing unit and the interface of the system human-computer interaction unit. At the same time, an equal-flow sampling design based on the pattern algorithm is realized, and the prototype is taken. The system overcomes the obvious defects of the traditional weighing method for the monitoring of smoke concentration, and the system has high degree of automation, low manufacturing cost, and can complete the monitoring of smoke concentration in the absence of people. The prototype of the online monitoring system for smoke concentration designed in this paper is still in the experimental stage, and there are still many places that need to be improved and improved, such as the design of the device structure, the design of the balance, and the in-depth discussion and research on the compensation factors of smoke concentration.
References 1. Hill, L.D., R. Edwards, J.R. Turner, et al. 2017. Health assessment of future PM2.5 exposures from indoor, outdoor, and secondhand tobacco smoke concentrations under alternative policy pathways in Ulaanbaatar, Mongolia. PLoS ONE 12 (10): e0186834. 2. Jasi´nska-Starczewska Maria, S. Iwona, M. Bo˙zEna, et al. 2017. The influence of cigarette smoke exposure on the copper concentration in the serum depending on the use of menopausal hormone therapy. BioMed Research International: 1–6. 3. Zhang, H.J., H.T. Zhang, W.B. Wang, et al. 2017. Effects of smoking on concentration of urinary 8-hydroxydeoxyguanosine in coke oven workers. Zhonghua lao dong wei sheng zhi ye bing za zhi = Zhonghua laodong weisheng zhiyebing zazhi = Chinese Journal of Industrial Hygiene and Occupational Diseases 35 (4): 265. 4. Benedict, K.B., A.J. Prenni, C.M. Carrico, et al. 2017. Enhanced concentrations of reactive nitrogen species in wildfire smoke. Atmospheric Environment 148: 8–15. 5. Smith, V.A., A.R. Mcbrearty, D.G. Watson, et al. 2017. Hair nicotine concentration measurement in cats and its relationship to owner-reported environmental tobacco smoke exposure. Journal of Small Animal Practice 58 (1): 3–9.
1756
J. Chen et al.
6. Liu, X., M. Xu, S. Lu, et al. 2018. Corrosive effects of smoke with different concentrations from PVC on 304 stainless steel and 6061 aluminium alloy. Corrosion Engineering, Science and Technology 53 (2): 141–152. 7. Burhanuddin, S.R., S. Jayadevan, A.S. Shatha, et al. 2018. Salivary cotinine concentration and carbon monoxide levels in young adults smoking midwakh in comparison with cigarette smokers. Tobacco Control. https://doi.org/10.1136/tobaccocontrol-2017-054202. 8. Wang, C., D.B. Collins, R.F. Hems, et al. 2018. Exploring conditions for ultrafine particle formation from oxidation of cigarette smoke in indoor environments. Environmental Science & Technology. https://doi.org/10.1021/acs.est.7b06608. 9. Heal, M.R., and I.J. Beverland. 2017. A chronology of ratios between black smoke and PM10 and PM2.5 in the context of comparison of air pollution epidemiology concentration-response functions. Environmental Health 16 (1): 44. 10. Wang, H., L. Wang, B. Xu, et al. 2017. Experimental study on extinction performance of carbon nanotubes smoke to infrared radiation. IOP Conference Series Materials Science and Engineering 167 (1): 012033. 11. Prabowo, H., E. Martono, and W. Witjaksono. 2017. Activity of liquid smoke of tobacco stem waste as an insecticide on Spodoptera litura Fabricius Larvae. Jurnal Perlindungan Tanaman Indonesia 20 (1): 22. 12. Chiu, Y.L., S.J. Huang, C.H. Lai, et al. 2017. Validation of self-reported smoking with urinary cotinine levels and influence of second-hand smoke among conscripts. Scientific Reports 7 (1): 15462. 13. Bao Xiang, and Xiaogang He. 2017. Constant velocity sampling system based on fuzzy-PID controller. Coal Technology 36 (6): 273–275 (in Chinese).
Design of Human Resource Management System in the Background of Computer Big Data Jingyuan Zhang
Abstract Under the background of big data, human resources management not only ushered in new opportunities, but also faced with more and more severe challenges. We need to do a good job in time to ensure the effectiveness of human resources management. This paper analyses the problems in human resource management of enterprises in our country. Aiming at this problem and the analysis of big data, this paper designs a human resource management system based on SOA architecture, which can effectively solve the management of human resources under the modern enterprise system. The system has a certain practical reference for the management of human resources. Keywords Big data · SOA architecture · Human resource management system · Demand analysis
1 Introduction With the continuous deepening and development of big data in daily life, its value has a very important impact on the governance of the state to society, the management of enterprises to themselves and the way of thinking of individuals [1]. Because of the particularity of enterprises in the era of big data, the impact of big data on enterprises will permeate every link of enterprise management and decision-making. Human resource management, as one of the important core competitiveness of enterprises, is bound to meet the challenges brought by the era of big data. Enterprise human resource management should change its way of thinking, use big data to build and improve human resource management system [2, 3]. Therefore, enterprises should correctly understand the significance of the big data era in the process of enterprise development, timely change the development mode and management mode, and give full play to the role of big data in promoting human resources management.
J. Zhang (B) Shandong Women’s University, Jinan 250300, Shandong, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_209
1757
1758
J. Zhang
2 Problems of Current Human Resource Management for Chinese Enterprises 2.1 Fossilization of Human Resource Management Model Generally, human resources management work is always a set of fixed workflow. Therefore, under the constraints of this traditional human resources management thinking, human resources management mode still occupies a major position in a considerable number of enterprises, this phenomenon is particularly common in small and medium-sized enterprises [4, 5]. According to the traditional mode of human resource management, the emphasis of human resource management is on the management of things, not on the importance and subjective initiative of people in the process of management and being managed, but on people as a tool of assistant management, strictly controlling the behavior and thinking mode of employees [6, 7]. This kind of management mode which does not attach importance to people has very big drawbacks in the actual management and operation of enterprises. Human resources management department neglects the subjective feelings and demands of employees, leading to human resources management in a sense has little effect and cannot achieve its due efficiency. This kind of management mode lacks humanization and does not conform to the current social development and the trend of the times (Fig. 1).
2.2 Human Resource Managers Are Backward in Thinking In most cases, managers ‘ideas and decisions on specific matters often play a decisive role in the development and progress of enterprises’. Therefore, in the era of big data, the concept of human resource managers has a very important impact on the innovation and reform of enterprise human resource management model. If we want to innovate the human resource management mode, we must first change the concept of managers [8]. However, in the current situation, the human resources management departments of enterprises are not fully and profoundly aware of the big data era, and the traditional management concept is still used in the human resources management of enterprises. Human resource managers only stay on the surface of human resource management, cannot respond to the impact of the era of big data on enterprise management mode in a timely manner, nor play the key role of human resource management in promoting enterprise development to the greatest extent. They still regard human resource management as the routine management within the enterprise.
Design of Human Resource Management System …
1759
Fig. 1 Big data
2.3 Human Resource Management in the Big Data Era Is Shocked The means of human resources management have been staying at a relatively basic level. To do a good job in human resources management, enterprises need to optimize and innovate the means of human resources management. Because of the arrival of the era of big data, the traditional ways and methods of training talents can no longer adapt to the development of the times. In the era of big data, the application of information technology in many aspects is conducive to the cultivation of enterprise talents. Talents, as the constant core competitiveness in the process of enterprise competition, have always been an important resource for major enterprises to compete for, and tend to be more and more white-hot stage [9, 10]. However, there are drawbacks in the means and methods of human resource management in enterprises. They do not make good use of big data to speed up the training of talents and cannot play a good role in improving the efficiency of personnel training and selecting talents. This has led to the training and selection of talents lagging far behind the development of information technology (Fig. 2).
1760
J. Zhang
Fig. 2 Human resource management system
3 Design of Human Resource Management System in the Background of Big Data 3.1 Development Architecture Design The human resource management system adopts the architecture of SOA, which uses B/S software. It mainly includes three parts: browser, software application layer and data support layer. The browser is mainly responsible for the operation of the web page and completes the relevant instructions entered by users. The middle layer includes related servers, which are mainly responsible for the logical management of the system. The data support layer is big data.
3.2 Design Scheme Based on SOA Architecture This paper studies the human resource management system based on the SOA framework, and puts forward the design scheme of the SOA framework. This framework is different from the traditional one. It can ensure the security and maintenance of the human resource system, and plays a very important role in human resource management. The structural framework is shown in Fig. 3. The structure framework of this system is mainly divided into data layer, structure layer, business layer, application layer, inquiry layer, security system and standardization system.
Design of Human Resource Management System …
1761
Fig. 3 Structure diagram of human resource management system based on SOA architecture
(1) Data layer: Data Layer contains all users’ ID and equipment operation data, and has corresponding functions for each application. (2) Structural layer: Structural layer has a clear structure level, each level has corresponding functions, which can carry out business requests and page processing, provide interfaces to users, and connect and effectively manage the system and users; (3) Application layer: The application layer is the interface for operating business, which can transform the object and view object of the field and control the business process. (4) Driver layer: Driver layer is the interface for business and user access, making human resource management easier to achieve; (5) Database: The database stores all kinds of information in the operation of the system and can transfer data.
1762
J. Zhang
3.3 The Characteristics and Advantages of Human Resource Management System (1) Promoting strategic position. The object of human resource management is human. Human resource management is relatively difficult, its value is difficult to be evaluated objectively, and its professionalism cannot be fully recognized. If large data can be used as a decision-making tool, it can significantly enhance the strategic position of human resource management. First, the formulation and implementation of human resource management decision-making needs a lot of information as support. Big data technology can collect and collate more organizational personnel information, ensure that human resource managers can connect personnel, posts, organizations and so on, and ensure the accuracy and effectiveness of human resource decision-making. Second, the application of big data technology to human selection, appointment and training can improve the scientific nature of management and management efficiency. Thirdly, with the support of big data technology, human resources management departments can exert greater influence in the organization and lay a solid foundation for the achievement of organizational development strategy (Fig. 4). (2) It can improve the management effect. With the popularization of big data technology, human resource management has gradually changed from empiricism to scientific management. With its support, no matter personnel, positions, performance or salary, incentives, training, etc., can achieve data, to ensure the smooth development of quantitative work. In this way, it can make human resources management more professional and efficient. Professional human resources
Fig. 4 Human resource management system
Design of Human Resource Management System …
1763
management must be supported by perfect and reliable data. Traditional data analysis is the summary of data generation, which has the characteristics of relatively backward management. Big data analysis emphasizes predictability and belongs to forward-looking management. Through building data analysis and data mining, it can complete the analysis of employees’ performance level and help employees improve their performance and self-worth. (3) It can make a comprehensive evaluation of employees. Under the background of big data, human resource management emphasizes the interaction between employees, ensures that employees can participate in human resource management, and promotes the improvement of their ability. Supported by big data technology, the platform can automatically collect and sort out all kinds of data. These data can fully reflect the working status, social relations, interests, development potential of employees, which can help human resources management departments to understand the needs of employees, make a comprehensive evaluation, achieve a comprehensive evaluation of the performance level and development potential of employees, and help to strengthen the influence of human resources management on employees.
4 Conclusions This paper focuses on the shortcomings of human resources management, and combines the new technology of computer technology and software technology, designs the enterprise human resources information management system. This system can make the management and work of managers and managers more convenient and effective. It belongs to an innovative and advanced management system. It can save a lot of money and personnel. Because the structure of the system is still in the initial stage, there are still some defects in many places, which need to be constantly remedied and perfected. I believe that the application of this system will be more effective in human resources management, and the field of application will be more and more extensive.
References 1. Wang Huan. 2017. Innovation and challenge of human resource management application in the background of big data. Commodities and Quality 20 (26): 89–90. 2. Zhang Kai. 2016. Opportunity analysis of human resource management in the background of big data era. Modern Marketing (10): 115. 3. Ai Kai. 2012. Design and implementation of human resource management system based on J2EE. University of Electronic Science and Technology. 4. Wu Zhibin. 2015. Exploring the problems and suggestions in personnel management. Management Observation (17): 12–13+16.
1764
J. Zhang
5. Xiao Hongju. 2017. Construction and analysis of personnel management information platform under SOA architecture. Software Engineering (11): 51–53+37. 6. Bernal, J.M., A. Prieto, and O. Llanes. 2015. Optimizing kernel methods to reduce dimensionality in fault diagnosis of industrial systems. Computers & Industrial Engineering 87: 140–149. 7. Nayak, J., B. Naik, and H. Behera. 2015. A comprehensive survey on support vector machine in data mining tasks: Applications & challenges. International Journal of Database Theory and Application 8 (1): pp. 169–186. 8. Seera M., C.P. Lim, C. Loo, and H. Singh. 2015. A modified fuzzy minmax neural network for data clustering and its application to power quality monitoring. Applied Soft Computing 28: 19–29. 9. Liu, Z., Q. Pan, J. Dezert, and J. Han. 2018. Classifier fusion with contextual reliability evaluation. IEEE Transactions on Cybernetics 48 (5): 1605–1618. 10. Zhang, L., W. Lu, X. Liu, and W. Pedrycz. 2016. Fuzzy c-means clustering of incomplete data based on probabilistic information granules of missing values. Knowledge-Based Systems 99: 51–70.
Research on Intellectual Property Protection of Industrial Innovation Under the Background of Big Data Yu Wang and Lei Zhang
Abstract The rise of big data industry has caused people’s attention to industrial innovation and legal protection of intellectual property. With the comprehensive and full protection of innovative industrial innovation data, the call for the right of commercial data has arisen. Based on the analysis of the current situation of intellectual property protection in China under the background of big data, this paper summarizes the new problems of intellectual property protection in software, Internet of Things and customized production caused by the development trend of manufacturing industry in industrial innovation. Finally, some suggestions are put forward to improve the software patent system and patent examination system for digital software intellectual property protection. Keywords Intellectual property · Industrial innovation · Innovative ability · Big data
1 Introduction The rise of big data industry has caused people’s attention to industrial innovation and legal protection of intellectual property rights [1]. Copyright and trade secrets of compiled works can not protect innovative business data comprehensively and adequately, so the call for the right of business data arises [2]. Although the “real right theory”, “intellectual property theory” and “intangible property theory” have certain reference value, as a tool to balance the interests of all parties, the law should not only see the need to protect commercial data, but also recognize the impact of the establishment of property rights on industrial innovation. In the current era of big data, Y. Wang Postdoctoral Research Station of Zhongnan University of Economics and Law, Hubei Wuhan, China L. Zhang (B) Center for Housing Fund Management in Taizhou, Taizhou, Jiangsu, China e-mail: [email protected] Y. Wang ChangJiang Polytechnic, Wuhan, Hubei, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_210
1765
1766
Y. Wang and L. Zhang
it is urgent to pursue the protection of property rights of commercial data [3]. Under special circumstances, some commercial data can indeed constitute compilations or trade secrets and be protected by legal rights, but for general commercial data, its essence is rights rather than rights [4, 5]. Therefore, this paper analyses how to protect intellectual property rights from the comprehensive score and ranking of technological innovation ability of various industries in China.
2 Analysis on Technological Innovation of Manufacturing Industry in China Under the Industrial Background The data mainly come from China Statistical Yearbook 2018, China Industrial Statistical Yearbook and China Scientific and Technological Statistical Yearbook. Under the background of industry 4.0, the comprehensive scores and rankings of technological innovation ability of China’s equipment manufacturing industry are: communication equipment, computer and other electronic equipment manufacturing industry, instrument and culture, office machinery manufacturing industry, electrical machinery and equipment manufacturing industry, transportation equipment manufacturing industry, special equipment manufacturing industry, general equipment manufacturing industry, metal products industry [6–8] (Table 1). The comprehensive score of telecommunication equipment, computer and other electronic equipment manufacturing industry is the first, among which the preinvestment of technological innovation, the support of internal environment of technological innovation and the output of technological innovation are the first, while the support of external environment of technological innovation and the input of technological innovation resources are the second [9]. The comprehensive scores and rankings show that the manufacturing of communication equipment, computers and other electronic equipment is an industry that the international, national and social people attach great importance to. Both in the internal environment and the Table 1 Comprehensive score and rank of technological innovation ability of manufacturing industry in China (2018) Industry
Score
Ranking
Metal industry
12.112
7
Equipment industry
14.254
6
Manufacturing of special equipment
14.665
5
Transportation equipment manufacturing industry
15.912
4
Electrical machinery
16.998
3
Instruments and office machinery manufacturing industry
17.812
2
Communications equipment, computers and other electronic equipment
23.622
1
Research on Intellectual Property Protection …
1767
Fig. 1 Technological innovation
state financial investment have given high attention, coupled with the industry’s high investment in technological innovation, it is the reason why the state and enterprises attach great importance to the development of technological innovation activities [10]. Therefore, the protection of intellectual property in this field deserves our study [11–13] (Fig. 1).
3 Suggestions on Intellectual Property Protection Under Big Data 3.1 Suggestions on Strengthening the Protection of Software Intellectual Property Rights Algorithms have always been regarded as rules and methods of intellectual activities, while computer software, as a derivation of algorithms, is excluded from the object of patent protection. Because of this, software patent protection has been controversial. From a practical point of view, the algorithm is only a part of the software. Sometimes in order to achieve the same software function, different developers use different algorithms, which shows that the software is not exactly the same as the algorithm. Even though the rules and methods of intellectual activity are not within the scope of patent protection granted by patent law, intellectual activity exists in human thinking. Although software programs are abstract, they can act on computers. Now software is not very different from other tools and cannot be regarded as the rules and methods of intellectual activity. Therefore, it is not appropriate to exclude software from patent protection (Fig. 2). (1) To clarify the patent protection of computer software in the patent law. As for the intellectual property rights using patent protection software, there is no clear stipulation in our current patent legislation and judicature, so we should improve
1768
Y. Wang and L. Zhang
Fig. 2 Big data innovation
our existing patent law. The development of software industry can also better safeguard the interests of software intellectual property rights holders. Software industry has played an important role in the national economy and is an important part of the national economy. If it cannot be adequately protected, it will greatly weaken the competitiveness of our software industry in the international arena, and make our computer software industry face enormous risks. (2) Adjusting the duration of software patent protection. Although we hope to bring software into the scope of patent protection, the software industry is very different from the traditional patent products. The software development speed is faster than the traditional products, so the protection period of software patents should be stipulated separately. (3) Trade secrets protection should be supplemented. As patent protection requires that technical solutions be made public, many software developers still do not want to disclose their technical solutions. They should use the protection of trade secrets to protect software technical solutions. Software intellectual property protection covers a wider area, which also makes up for the deficiencies of current copyright law in software intellectual property protection. Through the combination of trade secret protection and patent protection, more options and better protection for the right holders will play a great role in promoting the software industry. (4) Improving the patent examination system. At present, China’s patent review system requires that the technological scheme of software be disclosed first, but the importance of the technological scheme of software is much higher than the former. In addition, due to the rapid updating of software and the long period of actual patent review in China, patent rights are usually obtained in the third year after patent application. Such review speed and software update speed cannot match at all, and cannot adapt to the characteristics of fast software update and
Research on Intellectual Property Protection …
1769
short cycle. Therefore, to speed up the training of intellectual property professionals and lay a solid foundation for the sound development of intellectual property rights in an all-round way is an urgent task to be carried out in China.
3.2 Suggestions on Improving Intellectual Property Protection of Internet of Things (1) The government should guide domestic innovators to formulate IOT standards from the perspective of the construction of independent intellectual property rights. At the same time, it should actively develop IOT support technology and application technology in close connection with the development direction of IOT technology at home and abroad. (2) The government should make every effort to strengthen the training of intellectual property talents. Only with a certain number of backbone talents of the Internet of Things industry, can we support the progress of the entire industry, and then more effectively promote the development of the Internet of Things industry, any industry without outstanding talents cannot talk about and develop. In order to make the Internet of Things industry develop better, the government should formulate a series of talent attraction and training plans, establish a set of perfect talent training and reserve system. The government should train a batch of compound talents who not only know the Internet of Things technology, but also are familiar with the laws and policies of intellectual property rights. (3) The government establishes the industry organization association of the Internet of Things in China to guide and supervise the development of the industry of the Internet of Things by using the industry association. (4) The government should strengthen the support of intellectual property rights for technological innovation and Entrepreneurship of the Internet of Things, and focus on setting up benchmarking enterprises in the whole industry. They can drive the development of the whole industry and gradually form an innovation and entrepreneurship cluster to enhance the technical level of the entire Internet of Things industry. (5) Guiding the Internet of Things enterprises to actively participate in the standardsetting work of the Internet of Things industry, vigorously promoting the construction process of the intellectual property alliance of the Internet of Things enterprises, and realizing the task of transforming patents into standardization, so as to guide the development of technology in the Internet of Things industry. Through the intellectual property alliance, the patents of Internet of Things enterprises can be licensed or traded with each other, thus avoiding the internal friction caused by intellectual property disputes among enterprises, and improving the efficiency of patent utilization and promoting the common development of Internet of Things enterprises. For some technology applications with patent risks, we should also do a good job of early warning and eliminate risks in
1770
Y. Wang and L. Zhang
Fig. 3 Internet of things
advance. We should guide enterprises to do a good job in technological innovation and patent transformation and protect the legitimate rights and interests of intellectual property rights in which enterprises participate in joint R&D (Fig. 3).
3.3 Suggestions on Customization of Intellectual Property System (1) Establishment of Indirect Patent Infringement system When formulating the indirect infringement system, the state should clarify the constituent elements of the patent indirect infringement system. The purpose of establishing indirect infringement system is mainly to protect the interests of patentees, especially under the impact of customized production mode and Internet data, we should expand the scope of protection of monopoly rights as far as possible, and protect the economic interests of patentees in the premise of safeguarding public interests. With the continuous popularization of information technology, the speed of knowledge dissemination is also faster and faster, and the replacement of intellectual property protection will inevitably become more frequent. Therefore, our country should establish patent indirect infringement system according to the national conditions, which can not only effectively deal with the concealment and diversity of
Research on Intellectual Property Protection …
1771
infringement, but also more effectively protect the interests of patent holders from infringement. (2) Preventing Indirect Patent Infringement under the network environment. The rapid dissemination of all kinds of data in the open environment of the Internet not only challenges the current patent system, but also damages the interests of intellectual property owners. Network service companies receive a large number of complaints about patent infringement disputes in the network every day. However, due to the backward means of network supervision, the large number of Internet service users, the professionalism and complexity of the identification of intellectual property infringement, and the imperfect laws and regulations on the protection of patent rights in the network, network platform service providers are not liable for the infringement of rights in the Internet communication. Clearly, even ignoring the infringement for the sake of interests can not effectively protect the intellectual property rights in the network. Therefore, the law on intellectual property infringement of Internet service providers needs to be promulgated urgently. (3) Enhancing Users’ Participation in Intellectual Property Protection In the development of new products in which users participate, the lack of knowledge of users may lead to differences in knowledge exchange between the two sides in cooperation, and sometimes even lead to technical incompleteness. On the other hand, users do not understand the enterprise’s confidentiality rules, and may unconsciously disclose the contents that need to be confidentially, resulting in the loss of intellectual property rights. Therefore, enterprises should actively communicate the necessary professional knowledge and instill confidentiality system to users who participate in innovation, so as to avoid the risk of intellectual property leakage.
4 Conclusions China has also made great progress in industrial intellectual property rights. Through a series of policies, the interest of high-tech talents in intellectual property research has been greatly mobilized, and the intellectual property industry is extremely popular. On the other hand, we should also note that there are not enough high-level international patents in our country. Many core technology patents are still in the hands of foreign enterprises. On the one hand, we should catch up with the developed countries in Europe and America in science and technology. In the field of deepening intellectual property reform, we should also speed up the pace, keep up with developed countries and improve the ownership system of intellectual property that is conducive to stimulating innovation. Finally, we construct an IPR-oriented mechanism to enhance innovation efficiency and efficiency. Acknowledgements This paper was supported by: 1. The annual general project of national social science foundation: research on anti-monopoly economic based on vertical constraints of manufacturers (grant no. 15bjy002) 2. Later-stage projects funded by the national social science fund:
1772
Y. Wang and L. Zhang
research on the unbalance of economic development and the adjustment and upgrading of industrial structure (grant no. 17fjy014); 3. Major tendering tasks of educational science planning of hubei province in 2017: research on the quality evaluation system of higher vocational education in hubei province (grant no. 2017zdzb12); 4. The key research bases of humanities and social sciences in hubei institution of higher learning (hubei skilled talents training research center)
References 1. An, Xiaopeng. 2015. Industry 4.0 and the future of manufacturing industry. Zhejiang Economy (5): 19–21. 2. Ying, Xu, Chen Fang, and Jiang Jie. 2013. Analysis of the nature of software use behavior under SaaS model. Legal System and Society 36: 196–197. 3. Ruixian, Chen. 2017. Theoretical analysis and countermeasures for the development of internet of things industry. China New Communications 19 (01): 50–52. 4. Qian, Zhang. 2017. Patent competition situation analysis of internet of things. Telecommunication Network Technology 07: 51–56. 5. Zhu, Wanmin. 2017. Challenges faced by China’s intellectual property protection system under the background of “Industry 4.0”. Science and Technology Innovation and Application (08): 26–27. 6. Angelo, M., R. Palhares, M. Filho, and R. Maia. 2016. A new fault classification approach applied to tennessee eastman benchmark process. Applied Soft Computing 49: 676–686. 7. Cerrada, M., R. Sánchez, F. Pacheco, and D. Cabrera. 2016. Hierarchical feature selection based on relative dependency for gear fault diagnosis. Applied Intelligence 44: 687–703. 8. Jales, B., P. Parvanov, and L. Affonso. 2015. Fully unsupervised fault detection and identification based on recursive density estimation and self-evolving cloud-based classifier. Neurocomputing 150: 289–303. 9. Fan, J., and Y. Wang. 2014. Fault detection and diagnosis of non-linear non-gaussian dynamic processes using kernel dynamic independent component analysis. Information Sciences 259: 369–379. 10. Gomes, C., B. Jales, L. Affonso, and P. Parvanov. 2016. An evolving approach to unsupervised and real-time fault detection in industrial processes. Expert Systems with Applications 63: 134–144. 11. Martin, W., F. Sarro, and Y. Jia. 2016. A survey of app store analysis for software engineering. IEEE Transactions on Software Engineering 43: 817–847. 12. Khalid, H., E. Shihab, and M. Nagappan. 2014. What do mobile app users complain about. IEEE Software 32: 70–77. 13. Heydari, A., M. Tavakoli, and N. Salim. 2015. Detection of review spam: A survey. Expert Systems with Applications 42: 3634–3642.
Foreign Language Teaching and Intercultural Communicative Based on Network Environment and Cloud Computing Platform Zhiyin Wang
Abstract Cloud computing platform, also known as cloud platform, refers to services based on hardware and software resources, providing computing, network and storage capabilities. Cloud computing platforms can be divided into three categories: storage cloud platforms based on data storage, computing cloud platforms based on data processing, and integrated cloud computing platforms based on both computing and data storage processing. With the rise of the network is changing all the traditional teaching methods and teaching idea; development of multimedia computer and network communication technology, provides an ideal cognitive tool for English learning environment, can effectively promote the learners to improve their English level. At the same time also contribute to the all-round development of students. This paper analyzes how to use the cyber source of teaching content, enrich the teaching methods, improve teaching effectiveness. Keywords English teaching · Network environment · Cloud computing · Multimedia
1 Introduction With the development of multimedia technology and network technology, the global village gradually formed, the use of network and multimedia technology, we can easily understand the many different cultures and customs. English as an international language in the world economic integration today, the more significant position [1]. We use English culture, and from many countries in the world science and technology, business and trade exchanges, but only understand the language do not understand the cultural background knowledge and cannot solve all the communicative problems, therefore, culture is an important aspect that cannot be ignored [2]. In recent years, intercultural communicative foreign language teaching is development in the world. Many domestic scholars also the study called for foreign language teaching Z. Wang (B) Institute of Foreign Languages, Inner Mongolia University of Technology, Hohehot Municipality, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_211
1773
1774
Z. Wang
and cross-cultural communication [3]. Combined with the comprehensive foreign language teaching circles think that foreign language teaching aims to cultivate students’ intercultural communicative competence, English teaching should not only cultivate students’ English listening, say, read, write the ability, they should pay more attention to cultivate their cultural quality, make it through learning English to cross cultural boundaries, beyond the linguistic and cultural differences and become cross culture [4–6]. Language is the carrier of culture, culture is the base of language, between language and its survival culture has a very close relationship. Culture is a complex concept, involving many fields, such as humanities, social science and linguistics, the most important is that the same language with different culture background. The anthropologist tailor believes that culture is a complex whole which includes knowledge, belief, art, morals, law, customs and people as members of society all the abilities and habits acquired [7–9]. The definition of culture of Qi Yu is more comprehensive, the scope of culture includes three levels: 1. The material and it is shown through a variety of physical products, making people including architecture, clothing, food, supplies, tools and so on [10]. The system, customs and culture, it is the social norms and comply with the common people through the performance, including the system, regulations and corresponding facilities and customs of the spirit. It is the way of culture and are manifested through the formation of people’s thinking activity, including the concept of value, mode of thinking, aesthetic taste, morality, religion, including philosophy, science, literature and art achievements and products. The Chinese and Western cultures have great the difference, because students do not understand the western culture, are not aware of this difference, often have learning disabilities and mistakes [11, 12]. Students’ learning is inevitably influenced by culture in the process of foreign language, this is reflected in the customs, way of thinking and values, cultural differences will inevitably lead to the meaning, sentence meaning, difference contact the meaning and metaphorical meaning of language phenomenon. Foreign language teaching task is to develop the communication between people with different cultural background talent, foreign language teaching experts distinguish communication in linguistic errors and cultural errors that the latter is more serious. Therefore, the process of language learning is the understanding It is also the process of cultivating intercultural communicative competence (Fig. 1).
2 Introduction to Intercultural Communication “Intercultural Communication” of the English name is “intercultural communication” or “cross-cultural communication”. It refers to between native speakers and non-native speakers of communication, also refers to any people who have differences in language and cultural background of communication. Different cultural background caused by the way people speak or habits are not the same, so it could make inaccurate inference on the other side of the discourse in communication, resulting in conflicts and failures. For English teaching, especially English Teaching
Foreign Language Teaching and Intercultural Communicative …
1775
Fig. 1 Language learning
in Career Academy, is not only to impart language Knowledge, more important is to cultivate students’ communicative competence, cultivate their ability to use English in intercultural communication. The pragmatic failure was like grammar mistakes will look like, if you can speak a foreign language fluently appear pragmatic mistakes, he will probably be thought to be impolite or unfriendly. He is lacking in communication the error will not be attributed to the language ability but will be attributed to his rudeness or hostility (Fig. 2). Fig. 2 Cloud platform
1776
Z. Wang
3 The Importance of Intercultural Communication in College English Teaching The rapid development of the globalization of the world economy and make all people exchanges in various fields have become increasingly frequent, this also requires people to possess the ability of intercultural communication. English as an international language, in recent years, intercultural communicative English teaching is the development of international and domestic. In the field of foreign language teaching at home and abroad generally agree that the purpose of English teaching is to to cultivate intercultural communication ability, can cross cultural boundaries in the international society, cross culture transcends cultural differences in language. International linguists think intercultural communication method of language learning is a social process, language learning is the target of social activities Practitioners. They in cross culture and language learning, actively participate in the language teaching dialogue on self-reflection and recognition. Many domestic scholars have called for a study of foreign language teaching and cross-cultural communication. Combined with the whole process of comprehensive learning of target language learners is negotiated between the mother language and the target language and culture language and culture and the significance of the building process (Fig. 3).
4 The Lack of Cultural Education in Language Teaching The traditional language teaching only emphasizes voice, vocabulary, grammar and other language knowledge imparting, ignoring the cultural teaching, not relating to the teaching of language cultural background knowledge and language knowledge mastery, greatly influenced the cultivation of students’ intercultural communicative ability, all the information that they could not accept the language carrier bearing or convey correctly, which leads to the failure of communication. The traditional view of language teaching focuses on language knowledge itself, almost did not take into account other factors especially the language and cultural factors influence and role, neglect the communicative function of language required by the cultural background, 5. use the network environment, improve the foreign language teaching mode, cultivate students’ intercultural communicative competence The development of multimedia, network technology has brought new opportunities to cultivate students’ intercultural communicative competence in foreign language teaching, with the network technology, so that English Teaching in students from active learning time and place, personalized learning direction. To determine the dominant position of students in the process of learning, to cultivate students’ cross cultural communication ability for the direction of teaching reform, the classroom language teaching, self-regulated learning and counseling in spoken English class together organically, English teaching as a whole, add a lot of English cultural
Foreign Language Teaching and Intercultural Communicative …
1777
Fig. 3 Cloud education
background knowledge, so that students are exposed to more English language culture deeply and appropriate use of English to improve The ability of intercultural communication. Network teaching is the use of modern educational technology, especially the Internet as much as possible to mobilize the teaching media, information resources to build a meaningful learning environment, to promote and support the learning activities of students. Under the organization and guidance of teachers, give full play to the initiative, the enthusiasm of the students, creative. The students can truly become the active construction of knowledge and information, more contact and understand the relevant knowledge of English culture, so as to achieve good teaching effect. Foreign language learning is a kind of cross-cultural learning, information technology and multimedia network technology to the study of intercultural communication to bring about a change. The network not only has There is a huge language and culture learning resources, is a platform for cross cultural communication. The multimedia network environment for the cultivation of students’ intercultural communicative competence has created very favorable conditions. English teaching is about the character of people, thinking, language ability, comprehensive quality education and cultural knowledge and awareness. Understanding cultural differences enhance the ability of cross-cultural communication, strengthen the global consciousness and make the students seem to be particularly important with the multicultural
1778
Z. Wang
inclusiveness in real communication. In English teaching, teachers should according to the age characteristics and cognitive ability of students, improve teaching methods and teaching mode, and gradually expand the content and scope of cultural knowledge, Consciously penetrate culture education, teach students how to appropriately use language training, sensitivity and discrimination of cultural differences, so as to improve the consciousness and ability of intercultural communication. In addition, through the relevant cultural background knowledge introduction to broaden students’ horizons, creating experience foreign culture atmosphere, and teachers are familiar with foreign cultures. You can also collect some foreign cultural information, through the relevant text and video playback English songs and movies, to enable students to use the language when they communicate directly, feel facial expressions, gestures, body taste the authenticity of communication with foreign teachers. The school should also give full play to teachers in western culture the role of communication, they are living culture textbooks, students communicate with the teacher, listening to foreign reports or lectures, the teacher’s words and deeds to teach a cultural influence to students. Since the university English teaching emphasis on linguistic knowledge, while ignoring the cultivation of intercultural communicative competence. In order to change this situation, we must improve teaching methods, to strengthen cultural teaching in the classroom teaching in two aspects of quality and quantity and make full use of modern teaching methods to mobilize the enthusiasm of the students. In addition to hold some lectures, to meet the needs of students Desire to cultivate a high degree of intercultural communication ability (Fig. 4).
Fig. 4 Multimedia English teaching
Foreign Language Teaching and Intercultural Communicative …
1779
5 Conclusion The main purpose of English teaching is to realize cross-cultural communication, in order to communicate with people of different cultural backgrounds. To improve the efficiency and quality of English teaching, greatly improve the students’ language application ability, is an urgent need for economic development, an urgent task of higher education is also a cross century in order to achieve this. The goal, we need to fully realize the cross culture education is an important part of foreign language education, language is viewed as an important part of society and culture are inseparable, the use of network technology and multimedia technology, the improvement of foreign language teaching mode, cultivating students’ intercultural communicative competence in foreign language teaching, the most Ultimate goal. Acknowledgements This paper was supported by (1) The Special subject of Foreign language and Literature Teaching and Research in Colleges and Universities of Inner Mongolia Autonomous region “Research on the course system of English majors in Inner Mongolia Science and Engineering Universities from the Perspective of connotative Development” (Project Grant No.: WYZX201614); (2) An empirical study on the influence of metonymy thinking on critical thinking ability of English majors in Inner Mongolia Autonomous region (Project Grant No.: 2018NDB096); (3) The achievements of the key Teaching Reform Project of Inner Mongolia University of Technology “the Reform of English Curriculum system in Engineering Colleges under the New situation: taking Inner Mongolia University of Technology as an example” (Project Grant No.: 2015107).
References 1. Treur, J. 2016. Dynamic modeling based on a temporal–causal network modeling approach. Biologically Inspired Cognitive Architectures 16: 131–168. 2. Wang, L., J. Meng, and P. Xu. 2018. Mining temporal association rules with frequent itemsets tree. Applied Soft Computing 62: 817–829. 3. Mishra, D., S. Samantaray, and G. Joos. 2016. A combined wavelet and data-mining based intelligent protection scheme for microgrid. IEEE Trans Smart Grid 7 (5): 2295–2304. 4. Bhatt, U., and P. Patel. 2015. A novel approach for finding rare items based on multiple minimum support framework. Procedia Computer Science 57: 1088–1095. 5. Ji, Y., H. Ying, J. Tran, and P. Dews. 2013. A method for mining infrequent causal associations and its application in finding adverse drug reaction signal pairs. IEEE Transactions on Knowledge and Data Engineering 25 (4): 721–733. 6. Koh, H., and G. Tan. 2011. Data mining applications in healthcare. Journal of Healthcare Information Management 19 (2): 65–69. 7. Nahar J., T. Imam, and K. Tickle. 2013. Association rule mining to detect factors which contribute to heart disease in males and females. Expert Systems with Applications 40 (4): 1086–1093. 8. Thelwall, M., K. Buckley, and G. Paltoglou. 2012. Sentiment strength detection for the social web. Journal of the Association for Information Science and Technology 63: 163–173. 9. Yun, U., and G. Lee. 2016. Incremental mining of weighted maximal frequent itemsets from dynamic databases. Expert Systems with Applications 54: 304–327.
1780
Z. Wang
10. Sohail, S., and J. Siddiqui. 2016. Feature extraction and analysis of online reviews for the recommendation of books using opinion mining technique. Perspectives in Science 8: 754–756. 11. Savage, D., X. Zhang, and X. Yu. 2015. Detection of opinion spam based on anomalous rating deviation. Expert Systems with Applications 42: 8650–8657. 12. McIlroy, S., N. Ali, and H. Khalid. 2016. Analyzing and automatically labelling the types of user issues that are raised in mobile app reviews. Empirical Software Engineering 21: 1067–1106.
Design of P2P English Teaching Platform Based on Network Technology and Streaming Media Ya Yu
Abstract At present, the network technology and streaming media technology with the continuous updating and development, promote the school English network teaching mode update and reform platform to create a diversified educational resource for English teaching. The teaching of English people network needs gradually expanding the scope, not only with browsing and downloading knowledge between teaching and learning the need for more teachers and students interact, because the bandwidth streaming media technology has been affected, can not effectively achieve information transmission, so the user, in order to solve this problem, using P2P network docking technology, design and develop a P2P based architecture. Firstly, the detailed analysis of English network teaching auxiliary system business requirements, describe the operation process of each system, then abstract the functional requirements of the system, and the use of UML modeling language to draw each function module use case diagram. This paper uses the SSH framework to achieve P2P network English teaching mode, access system based on browser, realize whenever and wherever possible learning and download a variety of teaching materials. Keywords SSH framework · English network teaching · Platform design · UML modeling
1 Introduction Current network education is mostly used in client/server (C/S) mode, the server unified management of teaching resources and to provide the service, the client and server clear division of labor, when the user is at a smaller scale this model can provide high efficiency service [1], but because the service is limited, with the expansion of the scale of the client and server load will gradually reach the limit, thus limiting the client number increase of P2P (Peer to Peer) or “peer-to-peer”, its main idea is “to the center”, each node in the network are equal, are both server and client functions. P2P network can fully tap the capacity of the network edge Y. Yu (B) Hunan Mass Media College, Changsha, Hunan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_212
1781
1782
Y. Yu
Fig. 1 Comparison of P2P and C/S modes
node, reduce the dependence on the central server. To solve the limitations of the traditional network scale C/S mode using P2P technology, at the same time in the large-scale network environment, the efficiency of information exchange between nodes can also be improved. As shown in Fig. 1. Cloud computing is the development of distributed processing, parallel processing and grid computing or, these business concepts in computer science [2]. The cloud is the core of virtual computer resource pool which makes full use of data center resources (shared resource pool), through the Internet will be packaged into service to provide all kinds of resources. We put forward based on P2P cloud computing education services platform, users receive their own needs of education services in a unified manner, without considering other issues, greatly simplifies the operation of users, improve the efficiency of user access to resources.
2 Methods and Materials P2P (peer2to2peer) network can be simply defined as the network of computer nodes, sharing of computer resources and service network through direct exchange. P2P network has self-organization, fault tolerance, strong scalability and other characteristics, especially suitable for various applications in wide area network is a combination of P2P and P2PStreaming for streaming media system has become a research hotspot, now P2PStreaming system, such as SplitStream, DONet, PPLive and PPStream [3]. As shown in Fig. 2.
Design of P2P English Teaching Platform …
1783
Fig. 2 P2P sketch map
This paper will design and implement a single source of P2P streaming media service system. One or a group of server cluster as a server to provide services to the existing system of single source node in the system, the other in accordance with certain rules to form a data source for the multicast tree root [4]. The difficulty in the design of the system to construct and maintain the overlay network for at the bottom, and the optimization of data allocation algorithm based on this.
3 Analysis and Discussion 3.1 An Analysis of the Present Situation P2P streaming media system based on its source node to provide data can be divided into two types: single source (singlesource) P2P streaming media system (multi2source) and multi P2P streaming media system [5], single source and multi-source streaming media system P2P in Fig. 3.
1784
Y. Yu
Fig. 3 P2P streaming media system diagram
3.2 Two System Design The P2P platform is (Xu 2011) based cooperative nodes in the P2P application system based on can, generally refers to the topology of nodes and nodes in the interconnection with neighboring nodes to maintain code of conduct in connection of the P2P platform can be divided into two types: topology node associated with unstructured and structured unstructured P2P. P2P which has P2P great arbitrariness, do not have a specific structure, so the topology structure is loose, such as: Gnutella, KaZaA [6] and so on. Structured P2P will give an identifier for each node, and according to certain algorithm The nodes join the system, the topological structure is determined, so as to improve the efficiency of information search, such as the typical CAN [7] algorithm, Chord algorithm and so on. The topology of unstructured P2P randomness so that the system has low maintenance cost and is suitable for highly dynamic environment, so the design uses unstructured P2P platform to build the system, the design process of platform construction using (Gong 2011). network strategy Gnutella protocol classic definition of Gnutella communication between PEER nodes by the protocol descriptor set, by Ping, Pong, Que Ry, QueryHit, Push. Its broadcast strategy: forward broadcast messages are fair and simple, discarding of messages that have been processed [8], discarding the TTL 1 message, reply message source return request, to all the connecting point broadcast messages generated by node itself. For streaming media system, the expansion of its instruction set. At the same time to optimize the protocol. Before the introduction of the system design, first
Design of P2P English Teaching Platform …
1785
introduced two concepts: autonomous system and multicast technology. Considering the actual situation of the network—Internet is a loosely organized network, scholars have put forward the autonomous system (Autonomous system, AS) the concept of an autonomous system comprises a plurality of network and gateway. Autonomous system Internet is divided into a plurality of small networks, such as campus network, modern residential networks can be regarded as autonomous system, autonomous system in internal communication costs than the self governance system between the communication cost will be small a lot of IP Multicast Technology (IP multicast) to achieve one to many communication Internet efficiently [9], improve the scalability of the system. However, due to various constraints IP multicast exist, such as difficult to achieve reliable multicast and congestion control and so on, IP multicast technology has not been widely used (Fig. 4). According to the actual situation of the network, the system described as system users from different autonomous systems, strong node and server ability in autonomous systems together constitute an application layer multicast [10], autonomous domain system in each communication overhead is relatively small, the strong node through the IP multicast technology to realize data the distribution, so as to improve the efficiency and performance of the system. When the server starts, the first open end of the Peer multicast group, the new node joins as follows: A. when any host starts to move, to join the IP multicast group initiated by the server, each host knows the multicast IP address. B. sent to the multicast group a TTL Ping message 1. The message arrives at a router, the router will first be TTL minus 1, the message TTL is 0, the router will not be distributed to other routers. In order to control the message in an autonomous domain [11]. C. is located in all activities of the multicast group. The host on receipt of the Ping message, extracted from the IP
Fig. 4 English teaching platform
1786
Y. Yu
address and port number, update to its neighbors in the table, the host sends command to the Ping host in response to a Pong message in response to the news. After receiving the D. Ping message from the host. Some of the Pong message to extract the IP address and port number, joined the list of the local host. E. time interval, repeat steps B to D. F. if the packet is sent to 1 Ping after TTL, within the prescribed time has not received a response to the Pong package, the domain is not the system the node. In this case, the node will directly to the address of the server to send Connect packets. Through the TTL 1 package can effectively limit the communication in an autonomous region, autonomous region through multicast effectively save bandwidth, improve the utilization rate of resources. Automatic answering system is a knowledge base of adaptability, the automatic answering and manual answering two most. In the teaching design, teachers will be the most common discipline problems according to a certain organization, stored in the knowledge base, when students encounter difficult problems, submit a description of the problem through the remote network [12]. The system will be described based on students to submit the problem of intelligent search of domain knowledge base (mainly adopts the technology of automatic segmentation, Chinese words of full text retrieval, semantic network, keyword index, etc.), in accordance with the relevant content retrieval level, will present the answer to this question to the students. When in the knowledge base Not find the answer to this question, the system will inform students, and adopt two methods for subsequent processing: (1) automatic questions sent by e-mail to preside over the course of the teacher, when the teacher told the answer, the system will automatically answer the e-mail sent to the students; (2) will be published for answers in answering questions on the board, and someone on the answer, the student will be notified by e-mail. After the system will be the answer to this question is summarized into the domain knowledge base, so that other students encountered similar problems, can give automatic response and completeness of the intelligence of the system. With, the continuous expansion of the knowledge base, and expand continuously. Automatic answering also provides online answering function, students log on to the room, they can be sent to the public question answering room on the whiteboard, presided over the teacher or other students can make appropriate answers to the students, and will send answer to public whiteboard. The communication between teachers and students is a very important link in the teaching activities. Through the communication, students can get answers to questions, teachers can understand the students’ learning status. Based on remote teaching activities in a communication environment can make effective distributed and convenient communication, which can effectively improve the quality of distance teaching activities. In order to effectively support the distributed communication between teachers and students in different places, remote communication tools should include synchronous/asynchronous discussion forum (chat room, BBS), email, instant messaging and other communication tools, it should also be through the desktop video and audio conference system to provide Image, voice, video, electronic bulletin and other multimedia support, learning management system no matter how high the system with intelligent computer, and can not replace human teachers, computers can liberate humanity from repetitive simple intellectual labor,
Design of P2P English Teaching Platform …
1787
but advanced diagnosis, in the process of teaching management, teachers must be human reasoning to complete, it can be said that the lack of teachers’ participation in human learning system that is not a perfect learning system in the Internet based teaching system, human teachers’ participation is still very important, it can make up for the lack of intelligent computer system. Learning management should have the functions: targeted guidance, troubleshooting, coordination and monitoring, the implementation of intelligent Personalized distance learning environment, performance management, learning progress management, student work area and classroom notebook management, etc.
4 Conclusion P2P network teaching plays a very important role in promoting quality education. However, we also find that there are some shortcomings and defects in the network teaching Funding. To carry out the network teaching, open schools, families, teachers have the hardware conditions need to invest a lot of money, but also investment cycle is short, fast update characteristics. At the same time, the network teaching, the training of personnel and software requirements will also pay a lot of labor and capital. Difficult to control content. Because of students’ strong desire for knowledge, curiosity, but poor self-control, easy to network many new things distract, thus affecting the implementation of network teaching monitoring. Students learning content is still very difficult. It needs the school, family, society to work hard. How to better enable students to surf the Internet back to the network teaching contents will also be a future research topic. Teaching management needs to be improved. There are still some teachers do not pay enough attention to the network teaching, the teaching concept is not changed. So the network teaching investment enthusiasm is not enough. In the process of teaching, the network teaching and teaching organization form. The lack of pertinence, objective and systematic operation the tendency of one-sided. Family, teachers and other factors. For the network teaching, some parents also have doubts. The reason is that some fear of affecting the eyesight of children; some children afraid of bad sites, influence children’s physical and mental health; some fear of children playing games, affect the child’s learning. Some parents are themselves on the computer technology and network technology is very strange or are not familiar with, some parents are on the new learning mode view. In addition, the school also lacks to the network teaching of the teachers. The backwardness of education is a country and nation behind the reasons and results. Due to historical reasons, China’s education system and in the cultivation of innovative talents and the developed countries There is a certain gap, and the popularization of computer, the development of multimedia technology, and the rapid growth of the use of the Internet, has brought new opportunities to us. Therefore, we must take the responsibility to deal with the modernization of teaching methods, to the history of life to do this
1788
Y. Yu
sacred cause, in order to promote the national quality. Comprehensively promote the socialist modernization of our country and contribute our work.
References 1. Mushtaq, M., U. Akram, I. Khan, and S. Khan. 2017. Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications 8 (10): 183–195. 2. Zhang, R., M. Gao, X. He, and A. Zhou. 2016. Learning user credibility for product ranking. Knowledge and Information Systems 46: 679–705. 3. Wang, X., and Y. Song. 2018. Uncertainty measure in evidence theory with its applications. Applied Intelligence 48 (7): 1672–1688. 4. Bleisch, S., M. Duckham, A. Galton, and P. Laube. 2014. Mining candidate causal relationships in movement patterns. International Journal of Geographical Information Science 28 (2): 363–382. 5. Jilani, R., A. Crampton, D. Kitchin, and M. Vallati. 2015. Ascol: A tool for improving automatic planning domain model acquisition. In Congress of the Italian association for artificial intelligence, 438–451. Cham: Springer. 6. Bettinsoli, M., A. Maass, Y. Kashima, and C. Suitner. 2015. Word-order and causal inference: The temporal attribution bias. Journal of Experimental Social Psychology 60: 144–149. 7. Mishra, D., S. Samantaray, and G. Joos. 2016. A combined wavelet and data-mining based intelligent protection scheme for microgrid. IEEE Trans Smart Grid 7 (5): 2295–2304. 8. Natarajan, S., V. Bangera, T. Khot, J. Picado, and A. Wazalwar. 2017. Markov logic networks for adverse drug event extraction from text. Knowledge and Information Systems 51 (2): 435–457. 9. Parkinson, S., V. Somaraki, and R. Ward. 2016. Auditing file system permissions using association rule mining. Expert Systems with Applications 55: 274–283. 10. Abdel, A., Y. Xu, and A. Josang. 2015. A normal-distribution based rating aggregation method for generating product reputations. Web Intelligence 13: 43–51. 11. Lin, C., H. Chen, and Y. Wu. 2014. Study of image retrieval and classification based on adaptive features using genetic algorithm feature selection. Expert Systems with Applications 41 (15): 6611–6621. 12. Ullah, A., and W. Zeb. 2015. The impact of emotions on the helpfulness of movie reviews. Journal of Applied Research and Technology 13: 359–363.
Waterfront Recreational Landscape Planning and Ecological Protection Based on Cloud Computing and Neural Network Evaluation Yang Cao
Abstract With the improvement of material quality of life and the acceleration of daily rhythm, more and more people hope to enjoy the rare leisure. Since then, a number of dynamic prediction models have been put forward by scholars at home and abroad, including representative models, such as numerical model, grey system model, catastrophe theory model, time series model, neural network model and so on. In the case of the adaptation of the test parameters, all kinds of prediction models can play a good performance. Cloud computing and neural network analysis can effectively provide evaluation accuracy. This paper puts forward the principles, strategies and methods of landscape planning based on the knowledge of plant community, ecology and aesthetics. This paper analyses the ecological allocation of waterfront recreational sites in the Pearl River Delta region and makes SBE evaluation. The results show that the bigger the SBE average value of landscape allocation is, the more popular it is. It can reflect the best ecological model which is in line with both ecology and aesthetics. It can provide scientific basis and technical reference for plant landscape construction of waterfront recreational sites. Keywords Waterfront landscape · Cloud computing · Neural network · Data processing
1 Introduction With the development of urbanization, waterfront attracts people’s attention with its unique spatial charm. The recreational space built on the waterfront space is one of the best places for people to carry out recreational activities. Urban waterfront recreational space has occupied a very important position in modern urban space. The concept of “waterfront” is very broad. Rivers, springs, pools, lakes, seas and surrounding land in nature, or artificial urban waters, namely surrounding land, which belong to the category of “waterfront”. Waterfront is the boundary between water and land. The shoreline formed by the land-water interfa presents different forms Y. Cao (B) Haikou College of Economics, Haikou 571127, Hainan, China e-mail: [email protected]; [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_213
1789
1790
Y. Cao
of topography, such as concave, convex and flat, and forms rich natural landforms. There is no definite conclusion about the concept of waterfront plants, which is commonly known as coastal plants, waterfront plants and aquatic plants. Therefore, waterfront plant landscape is one of the most important components of waterfront landscape. The ecological value and social and economic value of resources are invaluable wealth for sustainable development. More in-depth research and more scientific development should be carried out on it.
2 Principles and Strategies of Waterfront Recreational Landscape Planning 2.1 Design Principles Sustainable development and utilization of urban waterfront is a comprehensive project to create healthy natural, social and economic benefits, retain historical context and create a beautiful city image. Making certain design principles is one of the important bases to ensure the realization of these goals [1]. (1) Respecting and protecting nature Ensuring the integrity of river ecosystem is the premise of recreational space construction in waterfront areas. We can only play the natural ecological role of both sides, restore the ecological function of rivers, respect the law of natural development, maintain ecological balance and protect biodiversity. Only in this way can we build riverside recreational space, therefore, we can guarantee the sustainable development of landscape corridors [2]. (2) Inheriting history We need to pay attention to the historical and cultural evolution of waterfront areas, protect the integrity of history and those artificial structures full of cultural implications. In the process of construction and development, we need to excavate the elements of historical features and cultural characteristics, embody the characteristics of regional history and culture, and integrate traditional culture into the design. (3) Sustainable development of man and nature First of all, the new concept of harmony must be deeply rooted in the hearts of the people. Secondly, in the design of waterfront urban landscape belt, we should make full use of the characteristic landscape, retain the original natural elements, and shape the unique image of the waterfront area. Finally, we should make sustainable development and utilization of river resources. Wetlands have abundant biological resources, which are natural resources for water purification; rivers have a large number of beaches, farmlands, pastures, fruit forests, etc., which provide abundant land resources for agriculture and animal husbandry; rivers are vast, unshielded, and have
Waterfront Recreational Landscape Planning …
1791
abundant wind and solar energy resources. Although the provision of these resources is renewable, we should adhere to the combination of river resources development and protection, and maintain the scientific, orderly and sustainable utilization of resources development for the benefit of future generations and sustainable development [3].
2.2 Design Strategy (1) Ecological strategy Wetland is the most valuable ecosystem in the world, which is closely related to human survival, reproduction and development. Wetlands have important functions such as maintaining water source, purifying water quality, storing flood and preventing drought, regulating climate and protecting biodiversity, and are known as the “kidney of the earth”. Wetland is an important part of ecological corridor, and also an important basis for sustainable development of rivers. In the construction of recreational space, the designer fully combines geographical and environmental advantages, uses appropriate artificial means such as bio-purification canal to restore the wetland space, and achieves the function of purifying the water body. At the same time, the designer creates a wetland park with local characteristics [3]. The designer uses the ecological purification function of natural embankment, combines the unique spatial characteristics of the embankment and maintains the ecosystem, completes the transition between water and land through non-rigid embankment, and creates a unique landscape of the embankment. (2) Landscape strategy Landscape composition of planned river course mainly includes four categories: ecological wetland, urban recreation, urban movement and ecological pastoral. On the basis of ecosystem restoration, designers create recreational landscape with special features, which mainly consists of river courses, ecological protection and greening, landscape and other landscape systems that constitute cross-strait space [4]. According to the characteristics of different riverside areas, we set up different themes of recreational space. In different spaces, through the common development of different biological communities, the whole system constitutes a good relationship between species, and harmonious coexistence. These include animals and plants, aquatic organisms, terrestrial organisms and birds, artificially cultivated species and rare species, and so on. Different recreational space, according to different ecological conditions, we create different vegetation environment. Tree ecological corridors provide wildlife access to urban green space. An open space network of waters and natural land allows people and wildlife to cross ecological corridors [5]. (3) Cultural strategy Planning should take historical relics as the soul of recreational space design, protect historical and cultural resources, establish “open-air museum” system, and form
1792
Y. Cao
urban public “spiritual space” and cultural space [6]. Designers need to combine historical relics with recreational space in order to increase the recognizability and regional uniqueness of recreational space. Combining with other regional cultures, the designer strengthens the influence of regional history and culture on urban space. (4) Functional strategy Different regions should construct suitable recreational space according to the actual situation [7]. For example, the recreational space in urban section is mainly to improve the quality of living space in waterfront area. We should pay attention to the choice of recreational content and the good passage between recreational space and urban space. The recreational space in rural areas should fully consider the characteristics of agricultural landscape, combine recreational space with new agriculture, and how to promote the construction and development of rural areas while attracting people [8]. (5) Space strategy Recreational space in different locations of waterfront also has its own characteristics [9]. Designers need to adapt to local conditions and choose a suitable spatial model for local topographic characteristics for design and construction. We make full use of the spatial characteristics of riverbed, beach, embankment and bank to create a waterfront recreational space with rich spatial levels and full of interest. (6) Activity strategy In order to enhance the attractiveness of corridor space and promote close links between cities, we have organized a series of activities to expand the publicity of recreational space in waterfront areas and attract people by means of artificial activities, such as holding marathons, hiking conferences and other recreational activities [10]; relying on the open recreational space in river beach areas to hold kite competitions.
3 BP Neural Network Model 3.1 BP Neural Network In the BP neural network (see Fig. 1) algorithm uses data samples to constantly repeat the learning to meet the set error range, so as to establish the data model. The training process is divided into two stages: forward propagation and reverse communication. The first phase: the data matrix of the sample is processed through the input layer and the hidden layer to the output layer [11]. The second stage: the data matrix that fails to obtain the expected value is also reversed by layer by layer and adjusts the difference between the actual output value and the expected output value. These two stages are used to adjust the weights. The use of Luxenberg Marquardt
Waterfront Recreational Landscape Planning …
1793
Fig. 1 BP neural network
optimization algorithm (LM algorithm). The algorithm adopts the approximate two order derivative information, which is suitable for small and medium scale networks, and the convergence speed and convergence precision are stronger than other algorithms [12]. The input layer and the output layer are set as the related water quality parameters. The actual measured concentration value of the I neuron in the output layer at the t moment is (T), the expected output value is (U), and the n is the number of the output layer neurons. When the t BP network error function E(T) is less than the pre given error value, the network training stops and obtains the neural network prediction model. The pile foundation is more and more widely used in modern civil engineering, especially in the area with less bearing capacity of the foundation in the southeast of China [13]. The deep pile foundation plays a very important role in transmitting the load of the superstructure. In the stage of geotechnical engineering investigation, it is possible to predict the bearing capacity of pile foundation early and more accurately not only to select the suitable design parameters of pile foundation [14], but also to save the cost. It can also save a lot of time for the follow-up period. The prediction of the bearing capacity of pile foundation can be divided into two kinds: the stress control method and the displacement control method. The former is made up of the maximum stress of the interaction between pile and soil to determine the bearing capacity. The latter is derived from the load settlement displacement curve of the pile foundation. The stress control methods include load transfer method, numerical simulation method, static sounding (CPT) method and pore pressure static penetration (CPTU) method.
1794
Y. Cao
3.2 LM Algorithm It is a very important thing to predict the vertical bearing capacity of pile foundation in geotechnical engineering. The prediction model of BP neural network provides a scientific basis for the environmental protection of drinking water source in Shanxi reservoir [15]. By comparing with the field static load test, the load response curve of the pile foundation with higher correlation coefficient is obtained. In view of the shortcomings of the existing research, based on the standard BP neural network algorithm and adding a momentum factor, a modified BP neural network model is established. The vertical bearing capacity of single pile is predicted. The data matrix of pH value, permanganate index, total nitrogen, total phosphorus and chlorophyll a was established on the basis of the emergency monitoring data during the outbreak of algae in Shanxi reservoir. Taking the geological exploration report completed by Zhenjiang Institute of Surveying and mapping as the engineering background, the 4 indexes (cone resistance, cone friction, shear wave velocity and pore water pressure) measured by the seismic cone penetration test (SCPTU) were taken as input parameters. Using MATLAB R2015b GUI visual interface module, the sample space of emergency monitoring data is divided into training samples, verification samples and test samples, and BP neural network model of Shanxi reservoir is established [16]. This predicts the concentration of chlorophyll a during the algal outbreak of Shanxi reservoir. The bearing capacity of the pile foundation is the output parameter. Compared with the traditional prediction method, it is found that the modified BP neural network algorithm can effectively predict the vertical bearing capacity of the pile foundation with high precision (Fig. 2).
Fig. 2 BP neural network algorithm
Waterfront Recreational Landscape Planning …
1795
4 Evaluation of Waterfront Recreational Landscape 4.1 Evaluation Method In order to get a model reflecting the aesthetic quality of plant allocation landscape in waterfront recreational sites, this paper uses Scenic Beauty Estimation (SBE) to evaluate the aesthetic quality of plant allocation landscape in waterfront recreational sites [17].
4.2 Judgment Process The article uses the indoor evaluation method, we invite the public to watch slides for evaluation. The scoring criteria are 5 points, namely 0, 1, 2, 3 and 4. The larger the value, the more beautiful the landscape; the smaller the value, the worse the landscape. Scores specifically represent the degree of landscape: 0—very poor, 1— poor, 2—general, 3—good, 4—very good.
4.3 Standardization of Score Value We used PPT to obtain the SBE value of landscape. Calculating process: Researchers arbitrarily select a slide as a “benchmark” and calculate the standard deviation of the baseline to adjust the starting point of SBE measurement. The calculation formula is as follows: 1 N (1) BSDMZ = (Z i − µ)2 i=1 N −1 In the formula, N is the number of effective scores of the “baseline”; Zi is the score value of the “baseline”; µ is the average value of the “baseline” subject; We standardize the original values with the standard deviation of the mean of the baseline to eliminate the measurement differences caused by different perceptions, and then we can obtain the standardized SBE values of each subject. S B Ei =
M Zi BSDM Z
(2)
Formula: SBEi is the standardized value; MZi is the average value; BSDMZ is the standard deviation of the average Z value of the baseline group.
1796
Y. Cao
Table 1 SBE comparison of plant landscape structure Position
Hierarchical structure
Shore
Shoreside
Water
Amount
Maximum value
Minimum value
Average value
Tree-vegetation
13
3.28
2.04
2.68
Tree-shrub-vegetation
12
3.57
1.75
2.86
Shrub-vegetation
4
2.62
1.90
2.22
Vegetation
2
2.62
2.26
2.45
Tree-vegetation-wetland
5
2.89
1.38
2.18
Tree-vegetation
3
2.89
2.04
2.60
Tree-shrub-vegetation
3
3.20
2.45
2.81
Vegetation
3
1.82
1.07
1.43
Monolayer-single plant
3
2.40
1.23
1.78
Monolayer-multi plant
3
2.40
2.01
2.17
Multilayer plants
4
4.25
1.31
2.80
4.4 Result and Analysis For example, in the Pearl River Delta, there are abundant types of plant allocation in waterfront recreational sites. By comparing SBE values of different allocation types, we can reflect the preference of visitors to which type [18]. According to the plant hierarchical structure, all SBE values were summarized, and the SBE data of different plant configuration structures were obtained. The results are listed in Table 1. We draw the following conclusions: (1) Tree-shrub-vegetation, because its overall seasonal color is prominent, the level is clear, the landscape is simple and pure. This is the most preferred landscaping arrangement for shore plants for visitors. (2) The configuration structure of coastal plants is tree-shrub-vegetation, because of its outstanding seasonal color, distinct hierarchy and simple and pure landscape. It is also the most preferred form of revetment plant landscape configuration for tourists. (3) The configuration structure of aquatic plants is multi-layer plants, single-layer plant and single-layer plants. This shows that there are many layers, because of its rich overall level and diverse landscape forms, which is the most common configuration mode of plant landscape on the water surface, and also the most favorite configuration of plant landscape on the water surface for tourists.
Waterfront Recreational Landscape Planning …
1797
5 Conclusions Among the plant landscape configuration structures, the average SBE values of treeshrub-vegetation structure in terrestrial plant landscape, tree-shrub-vegetation structure in coastal plant landscape and multi-layer and multi-structure in water plant landscape are the highest, which indicates that it is the most beautiful and favorite among recreational people. However, the judges’ score on the plant landscape displayed by the plant configuration at a certain time cannot fully reflect the overall evaluation of the characteristics of the plant landscape in the space during the four seasons, this has certain limitations, we do further research in post-menopausal studies. Acknowledgements This research was financially supported by Scientific Research Projects of Higher Education Institutions in Hainan Province in 2019 (Study on Ecosystem Service Function Upgrading and Ecological Restoration Technology in Nandu River Basin Hnky2019ZD-39).
References 1. Lu Ning. 2011. Research on evaluation index system of Leisure City based on urban leisure index. Journal of Capital University of Economics and Trade (6): 77–85 (In Chinese). 2. Lou Jiajun and Xu Aiping. 2011. Study on the development stage and evolution characteristics of urban leisure function in Shanghai. Tourism Science 25 (2): 16–22 (In Chinese). 3. Hu Xin. 2014. Research on spatial form of mountain cities abroad. Master’s Thesis of Chongqing University (In Chinese). 4. Zhou Yongguang, Ruan Fangshi, and Shen Xuwei. 2013. A comparative study of recreational space in waterfront between China and foreign countries. Urban Issues (In Chinese). 5. Kabalci, Y. 2016. A survey on smart metering and smart grid communication. Renewable and Sustainable Energy Reviews 57: 302–318. 6. Schleich, J., C. Faure, and M. Klobasa. 2017. Persistence of the effects of providing feedback alongside smart metering devices on household electricity demand. Energy Policy 107: 225– 233. 7. Diamantoulakis, P., V. Kapinas, and G. Karagiannidis. 2015. Big data analytics for dynamic energy management in smart grids. Big Data Research 2 (3): 94–101. 8. Irfan, M., J. Iqbal, A. Iqbal, and Z. Iqbal. 2017. Opportunities and challenges in control of smart grids—Pakistani perspective. Renewable and Sustainable Energy Reviews 71: 652–674. 9. Djenouri, Y., A. Bendjoudi, and M. Mehdi. 2015. Gpu-based bees swarm optimization for association rules mining. The Journal of Supercomputing 71 (4): 1318–1344. 10. Castelli, M., L. Manzoni, and L. Vanneschi. 2017. An expert system for extracting knowledge from customers’ reviews: The case of amazon.com, inc. Expert Systems with Applications 84: 117–126. 11. Centeno, R., R. Hermoso, and M. Fasli. 2015. On the inaccuracy of numerical ratings: Dealing with biased opinions in social networks. Information Systems Frontiers 17: 809–825. 12. Ghaderi, A., H. Mohammadpour, and H. Ginn. 2015. High impedance fault detection in distribution network using time-frequency based algorithm. IEEE Transactions on Power Delivery 30 (3): 1260–1268. 13. Bayindir, R., I. Colak, and G. Fulli. 2016. Smart grid technologies and applications. Renewable and Sustainable Energy Reviews 66: 499–516. 14. Ebesu, T., and Y. Fang. 2017. Neural semantic personalized ranking for item cold-start recommendation. Information Retrieval Journal 20 (2): 109–131.
1798
Y. Cao
15. Fang, H., J. Zhang, and Y. Bao. 2013. Towards effective online review systems in the Chinese context: A cross-cultural empirical study. Electronic Commerce Research and Applications 12: 208–220. 16. Andrea, A., F. Ferri, P. Grifoni, and T. Guzzo. 2015. Approaches, tools and applications for sentiment analysis implementation. International Journal of Computer Applications 125: 26– 33. 17. Leiva, J., A. Palacios, and J. Aguado. 2016. Smart metering trends, implications and necessities: A policy review. Renewable and Sustainable Energy Reviews 55: 227–233. 18. Beuscart, J., K. Mellet, and M. Trespeuch. 2016. Reactivity without legitimacy? Online consumer reviews in the restaurant industry. Journal of Cultural Economy 9: 458–475.
Analysis of Rural Labor Transfer Based on Network Data Mining and Financial Time Series Statistics Bowen Guan and Xinze Li
Abstract The in-depth study of rural labor transfer and rural land transfer is of great significance for promoting economic development, agricultural modernization, and protecting the interests of farmers. Based on the network data mining technology, this study combines the financial time series statistics to analyze the labor transfer in China and simulates the effective strategies of rural labor transfer and management through model simulation. The study shows that after China has jumped over Lewis’ first turning point under the premise of objective development inevitability, our country must not only accelerate the smooth transfer of agricultural labor, but also pay more attention to the improvement of agricultural labor productivity. At the same time, our country needs to improve agricultural labor productivity, in particular, to improve labor technology and promote the transformation of China’s dual economic structure. Keywords Data mining · Financial time series · Statistical analysis · Rural labor · Transfer
1 Introduction With the rapid development of the economy, the traditional land contracting system has begun to restrict the development of agricultural modernization. The intensive, large-scale and mechanized operation of rural land is the result of the smooth flow of rural land. However, due to the serious economic awareness of the rural labor force, the low level of education, and the lack of skills in non-agricultural industries, the speed of rural labor transfer is low. At the same time, due to the lack of a sound social security system and a fair employment environment, farmers regard land as B. Guan College of Accounting, Jilin University of Finance and Economics, Changchun 130022, China e-mail: [email protected] X. Li (B) Department of Public Foreign Language Teaching and Research, Jilin University of Finance and Economics, Changchun 130022, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_214
1799
1800
B. Guan and X. Li
a guarantee for their lives, restricting the circulation of rural land and hindering the development of agricultural modernization. Rural land transfer and labor transfer are the inevitable requirements of rural development in Hebei Province, and the two influence each other and promote each other. According to the model of “dual economic structure theory”, W. A. Lewis proposes that the difference between traditional agriculture and modern industry is mainly marginal rate of return and labor productivity. Moreover, he proposed that the main reason for the difference is that farmers enter the city to work in the secondary and tertiary industries [1]. Regarding the connection problem of labor transfer, although some scholars did not conduct special research on them, their opinions on this issue are also diverse in some articles. They believe that the most important factors in the formation of surplus labor are mechanized production and modern management [2]. In addition, some scholars believe that the fundamental transfer of rural labor is the impact of macroeconomic level on the redistribution of resources and industrial structure optimization [3]. Zhang Y, under the assumption that the trend of agricultural output and population growth is consistent, proposes that the basis of labor transfer is that agricultural production does not require more labor. When there is no surplus of agricultural labor, the labor force will not enter the urban non-agricultural sector for employment. However, when there is surplus of agricultural labor, the labor force will be transferred to the urban non-agricultural sector for employment. Therefore, whether the agricultural labor force is surplus determines the amount of farmers’ transfer [4]. Ji X conducted a systematic analysis of 13 years of farmers’ transfer data in 29 countries and found that the per capita GDP contribution rate of farmers during the transfer process was 0.85%. Moreover, he proposed that labor transfer not only makes rational allocation of resources, optimizes industrial structure, but also rational allocation and utilization of resources and optimization of resource structure are especially critical for a country’s growth rate [5]. The related researches on the remaining labor transfer include: the push-pull theory of Mitchell and Ravenstein, the urban expected income theory of Todaro, the migration theory of Jinghan Fei and Ranis, and the “dual economic structure” of Lewis and so on. The push-pull theory is the first to suggest that the work of farmers entering the city to engage in other industries is affected by various push-pull forces. Borg, William Pedi, and Herbola built a “cost-benefit” model, and they argued that labor transfer was directly affected by the cost and income levels they transferred. That is to say, whether the farmers transfer to the city is mainly determined by the final income level of their transfer [6].
2 Research Method Due to the ubiquity of time series, it has gained widespread application in various industries. For example, data on securities transactions at all times, changes in rainfall over time in a region, monitoring data that is constantly generated while a machine is operating, brainwaves and ECG data during a patient’s hospitalization all require
Analysis of Rural Labor Transfer Based on Network …
1801
a time series. The mathematical description of the time series is [7]: X = (x1 , x2 , . . . , xi )
(1)
Among them, xi represents the value of the time sequence of the ith time, which is generally a real number. The length of the time series is the number of its data values. For Eq. (1), the length of X is |X| = t. Euclidean Distance (ED) refers to the distance between two objects in an mdimensional space. Because it has very efficient computing performance, it has become a commonly used metric in data mining and can also get good results. Euclidean distance in two-dimensional space [8]: dist =
(x1 − x2 )2 + (y1 − y2 )2
(2)
The Euclidean distance that is generalized into the m-dimensional space is m dist = (x1i − x2i )2
(3)
i=1
In the formula, x1i represents the value of the i-th dimension of point 1, and x2i represents the value of the i-th dimension of point 2. Dynamic Time Warping (DTW) is a method of metrics similar to time series metrics, and it has high accuracy and robustness, and it has been applied for the first time in the field of speech recognition. Different from the traditional Euclidean distance, the DTW can match the time series of data points by bending the time domain of the time series [9]. It not only can get better morphological measurement effect, but also can measure two time series of unequal length, as shown in Fig. 1.
(a) Data matching
(b) DTW-based data matching
Fig. 1 Comparison of Euclidean distance and DTW-based time series similarity measure
1802
B. Guan and X. Li
By repeatedly verifying the search until the condition is met and the search process ends, and finally the complete curved path is obtained, as shown in Fig. 2. K-means clustering is one of the clustering techniques. The basic idea is: The first step is to randomly or specify k number of observations as the initial cluster representation. In the second step, the distance between the remaining objects and the cluster is measured, and the object is classified into the cluster in which the cluster with the shortest distance is located. In the third step, the mean of each cluster is calculated, and the mean is represented as a new cluster of the cluster, that is, the mean becomes a “new member” of the cluster. Steps 2 and 3 are repeated continuously, and clustering is terminated when the Cluster representation has not changed or changes very little (Fig. 3) [10]. The idea of the split clustering method is that it initially assumes that all time series belong to a single independent large cluster, and then through the process of repeated feedback, the cluster is gradually divided into smaller clusters until the
(a) Data matching relationship between time series S and Q
Fig. 2 Data matching relationship and curved path
Fig. 3 K-means clustering effect
(b) Curved path
Analysis of Rural Labor Transfer Based on Network …
1803
Fig. 4 Effect diagram of condensed hierarchical clustering
requirements of cluster stop are met. Another clustering method just happens to be awkward. The basic principle is as follows: each time series is taken as a single cluster at the initial stage, and the similar clusters are merged through the repeated feedback process until the cluster stop requirement is met, as shown in Fig. 4 [11].
3 Analysis of Agricultural Labor Transfer As shown in Fig. 5, WSS1 is the supply curve for labor, and the WS level indicates the labor supply curve under constant wages. D1 (K1 ), D2 (K2 ), and D3 (K3 ) are labor marginal productivity curves (also labor demand curves). When it is tilted to the lower right, it means that under the given amount of capital, as the labor input increases, the marginal product of labor decreases. Marginal productivity is equal to wages, that is, labor supply equals demand, which is the equilibrium point [12]. Fig. 5 Lewis model
1804
B. Guan and X. Li
When K = K1 , the labor demand curve D1 (K1 ) intersects with the supply curve WS at F1 , the agricultural surplus labor absorbed by the industrial sector is O L 1 , the total industrial output is O L 1 F1 D1 , and WF1 D1 is the capitalist’s profit. At this time, since the wage income of the workers is only enough to support the family, the key to economic development lies in the capitalist profit WF1 D1 , that is, the remaining use. Assuming that all profits are saved, invested, and capital accumulation is formed, the labor demand curve expands to D2 (K2 ) and intersects with the supply curve WS at F2 , the more agricultural surplus labor absorbed by the industrial sector is L2 , the total industrial output is O L 2 F2 D1 , WF2 D2 is the profit of the capitalist, and the capital employed labor is O L 2 . The curve continues to progress until the transfer of agricultural surplus labor reaches S point, which is the Lewis turning point in economic development [13]. At this point, the end of the period of unlimited supply of labor, if the industrial sector wants to get more agricultural labor, it must raise wages to compete with the agricultural sector, as shown in Fig. 6. Figure 7 shows the simulated network data generated by the benchmark network program according to the specified parameters, which can subdivide the market into different consumer groups, help the enterprise to find the labor objects in the market in time, and help the rural labor to achieve employment. Figure 8 shows the original network of the Karate data set and the effect of distinguishing the network by the LPC method.
Fig. 6 Lewis-Ranis-Fei model
Analysis of Rural Labor Transfer Based on Network …
1805
Fig. 7 Clustering process
Fig. 8 Labor division results
4 Analysis and Discussion In view of the above research and analysis, since the “Lewis turning point” is the only way for each developing country in the process of economic development, after jumping over Lewis’ first turning point on the premise of its objective development inevitability, China must not only accelerate the smooth transfer of agricultural labor, but also pay more attention to the improvement of agricultural labor productivity. At the same time, our country needs to improve agricultural labor productivity, in particular, to improve labor technology and promote the transformation of China’s dual economic structure. Among the three major industrial structures in China, the absorption of labor employment by the agricultural sector is small, and the pulling effect of the second and tertiary industries on the transfer of agricultural surplus labor is significantly enhanced. The crowding out of the labor force by the densification of modern industrial capital makes the absorption capacity of the secondary industry to the labor force significantly weaker than that of the tertiary industry. In order to further increase the transfer of labor wages, it is necessary to continue to deepen reforms to remove and reform many constraints that are not conducive to the transfer of surplus labor, promote the reform of labor market integration, and achieve optimal allocation of labor resources. Therefore, we need to improve the wage income of labor transfer from the reform of the integration of urban and rural labor markets and promote the effective and rational transfer of agricultural surplus labor.
1806
B. Guan and X. Li
5 Conclusion In the production process, from the perspective of social division of labor, we must always pay attention to the organic connection between the agricultural and industrial sectors. The agricultural surplus labor force is not only a reserve force for industrial enterprises, but also cannot be completely transferred from agriculture. China is in the stage of developing from an agricultural country to an industrial country. In the process of transferring labor, it is necessary to combine specific situations from a global perspective and not to ignore the interaction between industries. Based on the network data mining technology, this study combines the financial time series statistics to analyze the labor transfer in China and simulates the effective strategies of rural labor transfer and management through model simulation. After China has jumped over Lewis’ first turning point under the premise of objective development inevitability, our country must not only accelerate the smooth transfer of agricultural labor, but also pay more attention to the improvement of agricultural labor productivity. At the same time, our country needs to improve agricultural labor productivity, in particular, to improve labor technology and promote the transformation of China’s dual economic structure.
References 1. Lanhui W., H. Jiahui, W. Yaming, et al. 2018. The impact of Beijing-Tianjin Sandstorm Source Control Project on rural labor transfer. Journal of Beijing Forestry University. 2. Xu, Ding-de, Sha Cao, Xu-xi Wang, Shao-quan Liu. 2018. Influences of labor migration on rural household land transfer: A case study of Sichuan Province, China. Journal of Mountain Science 15 (09): 209–221. 3. Ambler K., A.D. Brauw, and S. Godlonton. 2018. Rural labor market responses to large lumpy cash transfers: Evidence from Malawi. Department of Economics Working Papers. 4. Zhang Y., K. Zhao, and J. Li. 2018. Setting up the uniform social security system under huge rural labour migration in China: A quantitative analysis using a SICGE model. Social Science Electronic Publishing. 5. Akram A.A., S. Chowdhury, and A.M. Mobarak. 2017. Effects of migration on rural labor markets. Nber Working Papers. 6. Ji, X., Z. Qian, L. Zhang, et al. 2018. Rural labor migration and households’ land rental behavior: Evidence from China. China & World Economy 26 (1): 66–85. 7. Shi F., X.H. Zhang, S.W. Chen, et al. 2017. Co-integration analysis of rural labor nonagricultural activities and household income. ITM Web of Conferences, Vol. 12. 8. Heffner, K. 2019. Rural labour markets and peripherization processes in Poland: Transformation in rural space. In Rural areas between regional needs and global challenges. Cham: Springer. 9. Bigler C., Michèle Amacker, C. Ingabire, et al. 2017. Rwanda’s gendered agricultural transformation: A mixed-method study on the rural labour market, wage gap and care penalty. Women’s Studies International Forum 64: 17–27. 10. Shen Z, M. Parker, D. Brown, et al. 2017. Effects of public health insurance on labor supply in rural China. China Agricultural Economic Review 9: 623–642. 11. Li, Q., Y. Wang, and Y. Zhao. 2018. The impact of China’s new rural pension program on elderly labor, grandchild care, and old-age support. Feminist Economics 24: 1–23.
Analysis of Rural Labor Transfer Based on Network …
1807
12. Yuanjing Q., and T. Chong. 2017. Effect of labor migration on cultivated land planting structure in rural China. Transactions of the Chinese Society of Agricultural Engineering 33: 233–240. 13. Newell R., I. Spillman, and M.L. Newell. 2017. The use of facilities for labor and delivery: The views of women in rural Uganda. Journal of Public Health in Africa 8 (1): 592.
Technical Structure Factors of the Teams in the 2018 Russia World Cup Based on Cloud Computing Artificial Intelligence Xiaowei Lv and Changjiang Tao
Abstract Compared with the traditional software architecture model, cloud computing has the advantages of low cost, rapid deployment and flexible scale adjustment. Cloud service platform for the four-tier structure, that is, operational access layer, application interface layer, basic management, system storage layer. Platform operation management module, user management is mainly responsible for managing the enterprise registration, management of users and their access rights, management platform system resources. Analysis of technical structure factors of the teams in the 2018 Russia World Cup is presented in this paper. In football matches, there are many indicators that determine the skill and tactical level of the participating teams, and factor analysis is one of the methods to study the complex hierarchical problems by means of dimensionality reduction. This method can make the problem clearer, from statistical data. The discussion of angles has far-reaching significance in the process of football sports system reform, competition performance evaluation and evaluation, and team special skills and tactics training. Keywords World Cup · Technical structure · Factor analysis · Virtual cloud platform · Large-scale
1 Introduction 13 technical indicators of the 126 matches of 32 teams competing in the 2018 World Cup in Russia were analyzed [1]. The common factors of the original parameter indicators were extracted by factor analysis method to explain its meaning. The common factors affecting the technologies of 32 teams were analyzed and evaluated and analyzed [2, 3]. The results showed that 38 correlation coefficients (P < 0.01) and 20 correlation coefficients (P < 0.05) were highly correlated for the technical indicators of the 32 teams participating in the World Cup in Russia [4]. The weights of the five X. Lv (B) School of Busyness, Sichuan Agricultural University, Sichuan 611830, China e-mail: [email protected] C. Tao School of Tourism, Sichuan Agricultural University, Sichuan 611830, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_215
1809
1810
X. Lv and C. Tao
common factors affecting the 32 teams participating in the World Cup in Russia are respectively K1 = 0.24868, K2 = 0.15010, K3 = 0.11603, K4 = 0.10135, K5 = 0.07912; the total score of the factor is F = 0.24868 F1 + 0.15010F2 + 0.11603F3 + 0.10135F4 + 0.07912F5. Through factor analysis, the method of dimensionality reduction can solve the problem of complex hierarchical structure, which can make the problem clearer, that is, evaluate with less comprehensive variables, discuss from the perspective of data statistics, eliminate the interference of off-site factors, and correctly understand. The essence of the research question is simple and easy, and it is a good method [5, 6]. Provide a basis for scientific and effective pre-match training control and performance prediction [7, 8]. Through the official website database, collect the number of goals in the 126 matches of the 32 teams of the 2018 Russia World Cup X1, the average ball control rate X2, the assists X3, the shooting X4, the number of shots X5, the number of passes X6, the number of steals X7, There are 13 data indicators for the number of corner balls X8, the number of free kicks X9, the number of digits X10, the number of fouls X11, the number of yellow cards X12, and the red card X13. Through dimensionality reduction processing of the data of 13 indicators, the common factors were extracted, and the factor structure of the 32 teams influencing the 2018 World Cup in Russia was studied and discussed from the perspective of multivariate statistics, so as to explain its meaning and discuss the factor score status and strength of each team [9, 10]. Data processing and analysis SPSS17.0 software was used for statistical processing of the collected data, including descriptive statistics, correlation analysis and factor analysis [11–13].
2 Sports Cloud Platform Overview 2.1 Performance Analysis Cloud technology is based on the cloud computing business model application of network technology, information technology, integration technology, management platform technology. We integrate cloud technology with sports to build a sports cloud platform that integrates learning, training, competition, recreation, entertainment and communication of different sports. The platform of virtual reality-based resource sharing is a sports cloud platform. Through the sports cloud platform, people can use their indoor infrastructure services according to different needs to achieve their own sports purpose. For example, one can read data from world-renowned athletes from a cloud server and exchange ideas and experiences in the virtual world by choosing the appropriate venue facilities. Can also be based on their actual skills needs, to establish a suitable character model, interact with them in the virtual world. Of course, the role of sports cloud platform is also reflected in the fact that two or more users take the cloud platform as their basis and their own real-time sports data as variables to reach the common sports exchange in the virtual environment and at the same time give
Technical Structure Factors of the Teams in the 2018 …
1811
Fig. 1 Virtual cloud platform
people face-to-face realism. To achieve this, real-time updates of people, actions, and scene changes depend on the tracker’s tracking rate and real-time delay. That is, the change in the direction of the object’s position and the time difference that the tracker detects this change. We should minimize this delay during modeling and simulation to minimize the negative impact of delay, and to achieve Immersion and Interactivity brought by virtual reality. Immersive, lifelike reality (Fig. 1).
2.2 Construct the Sports Cloud Platform Based on Virtual Reality The theory of sports cloud platform based on virtual reality is the basic guarantee to apply sports cloud platform to sports practice and is the prerequisite for smooth implementation of sports cloud platform. We are here to explore its construction theory, hope that through the VR modeling, the sports cloud platform as soon as possible into practical applications. Through the charm of science and technology sports, increase people’s enthusiasm for participation in sports so that more people participate in sports at the same time experience the fun of science and technology sports, leisure, entertainment. Under the existing architecture, all the tenants’ virtual routers and firewall devices are located on the same physical node. The traffic involving the tenant network boundary is concentrated on this node for processing. This may cause a single point of failure and increase the number of virtual machines communication network delay. Energy-saving deployment algorithm in the process of using the need to pay attention to the problem, first, try to choose a small amount of servers to install
1812
X. Lv and C. Tao
the virtual machine; the second is to give priority to select high-performance server with good performance; third choice with the server close to demand, to avoid the use of the process there debris; Fourth, in the process of reconfiguration, to minimize the migration frequency, reduce energy consumption. In a multi-tenant scenario as the existing virtual network isolation implementation pattern leads to the tenant of the virtual machine are most of the flow rate through a single physical node to cause huge load pressure to the network nodes. If centralized deployment of virtual network isolation architecture is adopted, network nodes can be used as single nodes to realize network functions and services, which can easily lead to single point of failure. The virtual network boundary is fuzzier and more complex than the traditional network, which requires more explicit definition of network boundary node and more reasonable solution of network boundary isolation. With between the renter’s cross subnet virtual machine correspondence, according to the virtual machine position distribution, may subdivide for the identical physics machine and the cross-physics machine two kind of situations. Under the original central route pattern, under the identical renter between the cross subnet virtual machine correspondence all needs hypothesized route processing which lights after the link. Even if two correspond in between the identical physics machine on virtual machine, because is not in the identical subnet, also does not have the local route connection, therefore must transmit first to the node. Such step is extremely tedious, not only increased in the correspondence network detention, also has brought the initiation simple point breakdown hidden danger. The intelligent virtual experiment platform is divided into 4 layers, in which the hardware system layer consists of several highperformance servers and network devices to provide users with computing resources; the virtual system layer then divides the computer hardware from the operating system through virtualization technology to provide a virtual hardware interface, And dispatches the operating system to execute on the computer hardware; The system management layer is responsible for the management of the virtual resources, while including the generation and destruction of the virtual resources. In the cloud data center, providing real-time assurance for applications is especially necessary, sometimes even mandatory. For real-time tasks, its effectiveness is not only to ensure the correctness of the running the results, but also to ensure completion by a certain time (Fig. 2).
3 Results and Discussion 3.1 Technical Factor Structure Analysis In order to achieve a reasonable transition from the traditional evaluation of original indicators to the evaluation of factor structure, descriptive statistical analysis is conducted on 13 original data indicators of the 32 teams participating in the 2018 World Cup in Russia. The results are shown in Table 1. Total range R, also known as range,
Technical Structure Factors of the Teams in the 2018 …
1813
Fig. 2 The Google based platform
is a measure of the range of variation of a group of data. R = Maximum−minimum, is the distance between the maximum and minimum marker values of the overall unit in a group of overall data, which reflects the range between the overall market values and is an important indicator to reflect the degree of index dispersion. Standard deviation S is one of the most important indicators that reflect the degree of dispersion of the data, the greater the standard deviation of the data, the greater the degree of dispersion of a certain indicator, that is, the greater the S of a certain indicator indicates that the level of a certain indicator of the sample is quite different. Probability theory is used to measure the degree of deviation between a random variable and its mathematical expectation (that is, the mean). The variance in the statistics (sample variance) is the mean of the squared difference between the mean of each sample value and the mean of all sample values. Analysis of Table 1 shows that the total distance and standard deviation of possession rate and pass number of the teams are relatively large. Possession rate R = 58, S = 13.47795, pass number R = 906, S = 143.830. The results show that the dispersion degree of the original data of possession rate and pass number of each team is relatively large, which indicates that the level of each team is quite different in these two technical indicators. Although descriptive statistics can reflect some information of statistical indicators, they are not comprehensive and in-depth. In order to fully understand the true level of each team’s technical structure and the corresponding factor analysis can be comprehensively and accurately evaluated, practical and targeted.
1814
X. Lv and C. Tao
Table 1 Describes the statistics N
The whole distance
Minimum
Maximum
Goal
126
6
0
6
Ball control rate
126
58.00
21.00
79.00
Assist
126
4
0
Shot positive
126
12
0
Mean
Standard deviation
Variance
1.53
1.407
49.9992
13.47795
4
.83
0.910
0.828
12
3.96
2.243
5.030
Shot
126
25
3
28
Pass
126
906
208
1114
Steal
126
24
6
Corner kick
126
11
0
Free kick
126
108
Offside
126
Foul
126
Yellow card Red card
1.979 181.655
12.74
5.365
28.787
462.96
143.830
20687.078
30
16.25
5.055
25.551
11
4.75
2.443
5.967
4
112
13.77
9.889
97.795
5
0
5
1.35
1.168
1.365
21
4
25
13.61
4.615
21.296
126
6
0
6
1.72
1.312
1.722
126
1
0
1
0.03
0.176
0.031
A certain correlation between indicators is a prerequisite for principal component analysis. The statistical significance of the correlation coefficient r is a statistical index indicating the closeness and correlation direction of the linear correlation between the two variables, −1 ≤ r ≤ 1, and the closer to 1 is, the closer the linear correlation coefficient between the variables is; the closer to 0, indicating that the more linear the relationship is. In order to better explain the correlation between the indicators, a relevant analysis is carried out. Table 2 shows that 38 correlation coefficients P < 0.01, which are highly correlated, and 20 correlation coefficients P < 0.05, are significantly correlated. For example, the number of goals is equal to the number of assists and the number of shots is highly correlated with the number of shots; The number of balls was significantly correlated at the 0.05 level. In the 2018 World Cup in Russia, effective assists are the main technique for shooting. Therefore, in all the statistics of the 32 teams participating in the competition, the process of the game has a high degree of similarity with the meaning of the data indicators, indicating that the statistical results have good reference significance.
0.114
0.000
0.000
0.000
0.032
0.000
0.156
0.193
0.001
0.013
0.184
0.412
Assist
Shot positive
Shot
Pass
Steal
Corner kick
Free kick
Offside
Foul
Yellow card
Red card
Goal
Ball control rate
Ball control rate
0.000
0.229
0.407
0.401
0.073
0.115
0.193
0.406
0.126
0.045
0.000
0.114
Assist
0.000
0.339
0.080
0.003
0.088
0.370
0.000
0.088
0.000
0.000
0.000
0.000
Shot positive
Table 2 Correlation analysis between indicators
0.013
0.355
0.032
0.002
0.463
0.317
0.000
0.068
0.000
0.000
0.045
0.000
Shot
0.028
0.348
0.004
0.000
0.247
0.157
0.000
0.034
0.000
0.000
0.126
0.000
Pass
0.262
0.022
0.278
0.138
0.102
0.330
0.076
0.034
0.068
0.088
0.406
0.032
Steal
0.218
0.149
0.033
0.028
0.416
0.187
0.076
0.000
0.000
0.000
0.193
0.000
Corner kick
0.197
0.378
0.273
0.289
0.394
0.187
0.330
0.157
0.317
0.370
0.115
0.156
Free kick
0.381
0.059
0.347
0.323
0.394
0.416
0.102
0.247
0.463
0.088
0.073
0.193
Offside
0.168
0.349
0.000
0.323
0.289
0.028
0.138
0.000
0.002
0.003
0.401
0.001
Foul
0.357
0.366
0.000
0.347
0.273
0.033
0.278
0.004
0.032
0.080
0.407
0.013
Yellow card
0.130
0.366
0.349
0.059
0.378
0.149
0.022
0.348
0.355
0.339
0.229
0.184
Red card
0.130
0.357
0.168
0.381
0.197
0.218
0.262
0.028
0.013
0.000
0.000
0.412
Goal
Technical Structure Factors of the Teams in the 2018 … 1815
1816
X. Lv and C. Tao
3.2 Factor Analysis KMO and Bartlett tests showed that the moderate determination value of KMO sampling was 0.515, which was greater than 0.5, and was between 0 and 1 KaiserMeyer-Olkin measure of sampling appropriateness. Bartlett’s sphericity test P(Sig. = 0.000) < 0.001, rejected the original hypothesis, and the KMO value was close to 1. The data showed that the sample was suitable for factor analysis. In order to solve the problem of multicollinearity, using the factor analysis of multivariate statistical analysis, extracted from the original indicators affect 2018 common factors of 32 teams from Russia’s World Cup, explaining its meaning, in order to help in a scientific training system to control the reasonable technical and tactical training, improve the level of technology and tactics of the team, establish a new evaluation mode, change the existing evaluation system. After statistical treatment, the characteristic value, factor contribution rate and cumulative contribution rate (Table 3) and the factor load matrix after rotation (Table 4) were obtained. In statistics, the contribution rate is the percentage of the total amount of information reflecting the amount of information provided by the main component; the cumulative contribution rate reflects the percentage of the total amount of information before the M principal components together to provide information. Table 3 shows four common factor eigenvalues > 1, the cumulative contribution rate of up to 70%, a high amount of information to extract the original data indicators. Therefore, the extraction of four common factors can perfectly reflect the main information content factor loading matrix of the original data index, and show the load-correlation coefficient of each common factor on each variable. The correlation between the original index and the common factors can be clearly understood through the correlation coefficient. However, based on the statistical analysis, the significance of each common factor in practice is what are the characteristics of each factor? And what are the specific solutions to each factor in practice? A detailed discussion is required. In order to understand the practical significance of the four cofactors in depth, the factor-load matrix after the maximum orthogonal rotation of the variance is obtained (Table 4). After rotation (that is, the factors obtained after rotation), the load on each variable shows polarization, and the magnitude of the absolute value is separated, which makes it easier to explain the meaning of the factors. For example, in Table 4, the first common factor includes five indicators, including average possession rate, shot on target, shot on goal, pass and corner. Its practical significance lies in the successful passing the ball in the football match, can effectively improve the possession of the game against a team who receive appear active, increase the number of scoring the other half, get effective offensive opportunities, on the contrary, passing the ball is not fluent, direct influence on the possession and attacking initiative, losing on the field initiative of control of the game, not to attack each other effectively. For example, the 2018 World Cup Russia France VS Belgium semi-final, the French team out of the corner, gretzman through the border pass in the ball to send assists, Umtiti small penalty area on the right side of the Head Ball, the ball ran into the upper right corner
0.073
0.563
1.123
2.768
3.067
4.281
5.771
6.325
6.574
7.802
9.072
9.727
14.258
28.669
100.000
99.437
98.314
95.546
92.478
88.197
82.426
76.101
69.527
61.725
52.654
42.927
28.669
Extraction method: principal component analysis
0.146
13
0.750
8
12
0.822
7
0.360
0.855
6
11
1.014
5
0.557
1.179
4
0.399
1.265
3
10
1.853
9
3.727
2
1.014
1.179
1.265
1.853
3.727
7.802
9.072
9.727
14.258
28.669
Variance (%)
Extract square sum loading Total
Cumulative (%)
Total
Variance (%)
Initial eigenvalue
1
Ingredients
Table 3 Explains the total variance
69.527
61.725
52.654
42.927
28.669
Cumulative (%)
1.028
1.318
1.508
1.951
3.233
7.912
10.135
11.603
15.010
24.868
Variance (%)
69.527
61.615
51.480
39.878
24.868
Cumulative (%)
Rotation square sum loading Total
Technical Structure Factors of the Teams in the 2018 … 1817
1818
X. Lv and C. Tao
Table 4 Rotation component matrix Ingredients 1
2
3
4
5
Ball control rate
0.829
−0.030
−0.176
0.152
Assist
0.059
0.875
0.021
0.021
0.084
Shot positive
0.615
0.547
−0.123
0.017
−0.153
Shot
0.861
0.207
−0.084
−0.044
−0.096
Pass
0.799
0.049
−0.250
0.103
0.117
Steal
−0.188
0.068
0.020
−0.605
−0.140
Corner kick
0.814
0.004
0.009
0.038
0.022
Free kick
0.036
0.107
−0.055
0.015
0.944
−0.104
0.282
−0.194
0.636
−0.213
Offside
0.112
Foul
−0.231
0.048
0.811
0.012
−0.004
Yellow card
−0.101
0.025
0.818
−0.018
−0.045
Red card
0.045
−0.152
0.121
0.705
0.001
Goal
0.090
0.848
0.093
−0.106
0.064
of the opponent’s goal. France 1: 0 qualified for the final. The second common factor includes assists and goals. In the 2018 Russian World Cup, Croatian VS England semi-finals, Croatian team Fersaliko sent an assistant through a side pass. Percic shot with his left foot in the centre of the penalty area, the ball flew into the lower left corner of the opponent’s goal, and Croatian 1-1 England drew. Percic headed an assistant, Manjukic shot with his left foot in the small penalty area, the ball flew into the lower right corner of the opponent’s goal and Croatia won the final 2:1 in England. The second common factor includes 2 indicators for fouls and yellow cards; the third common factor includes 3 indicators for steals, offsides and red cards; and the fourth common factor includes 1 indicator for free kick. Therefore,in order to obtain the meaning of the four common factors, it is necessary to evaluate and discuss it, and rely on each common factor score based on the basis of the post-rotation factor load matrix, the significance of the factors is explained by the size of the factors, and the factor component score Matrix is obtained. Table 4 shows that the average ball control rate, shooting, passing and cornering are highly correlated with the first common factor, and the factor scores are 0.272, 0.292, 0.242, and 0.305, respectively. Ball control, shooting, passing, and corner kicks are important indicators of a team’s effective offense in football. Successfully passing the ball in the game can effectively improve the ball control rate of the team during the game, gain the initiative on the scene, increase the number of opponents to the half, gain effective attack opportunities, and play a decisive role in obtaining good results. The assists, strikes, and goals are closely related to the second common factor, with factor scores of 0.472, 0.239, and 0.445, respectively. Effective assists are able to improve the number of positive shots and goals, is an important indicator of the score in the game, is an important manifestation of the tactical awareness of
Technical Structure Factors of the Teams in the 2018 …
1819
the players in the game; the number of fouls, yellow card and the third common factor is extremely high, the score is: 0.566, 0.593. It reflects the efficiency of the defensive end of the team during the game. It is the most direct manifestation of the team disrupting the smooth coordination of the opponent and suppressing the effective attack of the opponent. A reasonable tactical foul can effectively suppress the opponent’s offensive rhythm and strive to create a time for the teammates to fight back. On the scene, the passive state of the battlefield is effectively controlled, and to a certain extent, the initiative of the game is won. The accumulation of the yellow card number will cause the athlete to be expelled, the team will form a passive situation with less playing, or the main athlete will be suspended. The difference between the strength of the substitute athlete and the main athlete will greatly reduce the overall performance of the team; Tackling, offside and red card are highly dependent on the fourth common factor, with scores as high as 0.456, 0.503 and 0.543. The dependence degree of the fifth common factor between the free-kick and the fifth is extremely high, its score is: 0.920. To sum up, it is known that the weight of the five common factors that affect the 126 results of the 32 teams participating in the World Cup in Russia is K1 = 0.24868, K2 = 0.15010, K3 = 0.11603, K4 = 0.10135, and K5 = 0.07912, respectively. Based on the above statements and the five common factors that affect the 32 teams participating in the World Cup in Russia, the standardized linear group scoring formula is as follows: (1) F1 = 0.272X1 − 0.079X2 + 0.151X3 + 0.292X4 + 0.242X5 − 0.029X6 + 0.305X7 − 0.037X8 − 0.143X9 + 0.048X10 + 0.104X11 + 0.007X12 − 0.042X13 (2) F2 = −0.100X1 + 0.472X2 + 0.239X3 + 0.019X4 − 0.052X5 + 0.039X6 − 0.092X7 + 0.040X8 + 0.203X9 + 0.014X10 − 0.015X11 − 0.069X12 + 0.445X13 (3) F3 = 0.021X1 − 0.014X2 − 0.016X3 + 0.073X4 − 0.045X5 − 0.042X6 + 0.151X7 − 0.011X8 − 0.166X9 + 0.566X10 + 0.593X11 + 0.126X12 + 0.043X13 (4) F4 = 0.057X1 − 0.046X2 − 0.015X3 − 0.090X4 + 0.022X5 − 0.456X6 − 0.025X7 + 0.026X8 + 0.503X9 + 0.049X10 + 0.016X11 + 0.543X12 − 0.054X13 (5) F5 = 0.083X1 + 0.065X2 − 0.181X3 − 0.126X4 + 0.084X5 − 0.141X6 − 0.001X7 + 0.920X8 − 0.207X9 + 0.027X10 − 0.016X11 + 0.017X12 + 0.045X13 (6) the total score of the 32 teams participating in the World Cup in Russia is estimated as follows: F = K1F1 + K2F2 + K3F3 + K4F4 + K5F5 (7) the total score is estimated as F = 0.24868F1 + 0.15010F2 + 0.11603F3 + 0.10135F4 + 0.07912F5.
1820
X. Lv and C. Tao
4 Conclusion In football matches, there are many indicators that determine the skill and tactical level of the participating teams, and factor analysis is one of the methods to study the complex hierarchical problems by means of dimensionality reduction. This method can make the problem clearer, from statistical data. The discussion of angles has farreaching significance in the process of football sports system reform, competition performance evaluation and evaluation, and team special skills and tactics training.
References 1. Aldhouse, F. 2014. Anonymisation of personal data—A missed opportunity for the European Commission. Computer Law & Security Review 30 (2): 403–418. 2. Brown, H., H. Issa, and D. Lombardi. 2015. Behavioral implications of big data’s impact on audit judgment and decision making and future research directions. Accounting Horizons 29 (2): 451–468. 3. Zhu, X., L. Zhang, and Z. Huang. 2014. A sparse embedding and least variance encoding approach to hashing. IEEE Transactions on Image Processing 23 (9): 3737–3750. 4. Hu, R., X. Zhu, D. Cheng, and W. He. 2017. Graph self-representation method for unsupervised feature selection. Neurocomputing 220 (7): 130–137. 5. Aytac, D., and M.C. Guran. 2011. The relationship between electricity consumption, electricity price and economic growth in Turkey: 1984–2007. ArgumOeconomica 27 (2): 101–123. 6. Zhu, X., X. Li, and S. Zhang. 2016. Block-row sparse multiview multilabel learning for image classification. IEEE Transactions on Cybernetics 46 (2): 450–461. 7. Chang, R.M., R.J. Kauffman, and Y. Kwon. 2014. Understanding the paradigm shift to computational social science in the presence of big data. Decision Support Systems 63 (14): 67–80. 8. Zarpelão, B., R. Miani, C. Kawakani, and S. Alvarenga. 2017. A survey of intrusion detection in internet of things. Journal of Network & Computer Applications 84 (2): 25–37. 9. Zhu, X., X. Li, S. Zhang, and C. Ju. 2016. Robust joint graph sparse coding for unsupervised spectral feature selection. IEEE Transactions on Neural Networks & Learning Systems 26 (6): 1263–1275. 10. Tao, J., S. Wen, and W. Hu. 2016. Multi-source adaptation learning with global and local regularization by exploiting joint kernel sparse representation. Knowledge-Based Systems 98 (2): 76–94. 11. Petersen, K., S. Vakkalanka, and L. Kuzniarz. 2015. Guidelines for conducting systematic mapping studies in software engineering: An update. Information and Software Technology 64 (1): 1–18. 12. Tasan, C., M. Diehl, D. Yan, and M. Bechtold. 2014. An overview of dual-phase steels: Advances in microstructure-oriented processing and micromechanically guided design. Annual Review of Materials Research 45 (1): 391–431. 13. Tanwar, S., and N. Kumar. 2015. A systematic review on heterogeneous routing protocols for wireless sensor network. Journal of Network & Computer Applications 53 (2): 39–56.
3D Reconstruction Method of Waterfront Recreational Landscape Space Based on Artificial Intelligence and Fuzzy Algorithms Yang Cao
Abstract The paper proposes a method of building three-dimensional landscape entity model based on digital measurement. First, we use the relationship between the three-dimensional landscape images to build a rendezvous model, then get the coordinates of the landscape points systematically. Third, we calculate the translation and rotation relationship between the camera coordinate system and the world coordinate system and correct the distorted image points. Finally, we use the corrected three-dimensional coordinate points to realize the three-dimensional landscape entity model. The experimental results show that the proposed model has the characteristics of high accuracy and fast speed, which provides a feasible basis for the construction of digital. Keywords Spatial geographic information · Similarity transformation · Digital landscape · Artificial intelligence
1 Introduction The construction and application of three-dimensional city model (3DCM) is the research hotspot of the latest international remote sensing (RS), geographic information system (GIS) and three-dimensional image reconstruction. In the process of building a three-dimensional landscape entity model, it is necessary to express the appearance or internal structure of the landscape entity according to the geometric shape information of the surface or interior of the landscape entity. However, compared with most of the three-dimensional landscape entity models, the geometric shape information of the landscape entity cannot be given. Therefore, the problem of three-dimensional landscape entity modeling has become an important factor restricting the development of three-dimensional image field, which has attracted the attention of many experts and scholars [1].
Y. Cao (B) Haikou College of Economics, Haiko 571127, Hainan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_216
1821
1822
Y. Cao
There are many studies on the solid modeling of three-dimensional landscape, and some achievements have been made in the relative research. Literature [2] firstly transforms the existing three-dimensional landscape model map into three-dimensional model, gives camera calibration parameters, and builds threedimensional landscape entity model on this basis. This method can effectively give lines or polygons that contact or intersect with each other in three-dimensional landscape entity space, but it cannot correct the distorted imaging points, which has the problem of low accuracy of landscape entity modeling. Literature [3] firstly preprocess the landscape image matching based on Skylin, and then calculate the geometric shape of landscape entity, thus realizing the three-dimensional landscape entity model based on texture mapping. The model can modify the matching of local topography and objects of landscape entity, but it is difficult to reflect the fluctuation of landscape topography. Document [4] combines stereo vision and machine learning to calculate the three-dimensional coordinates of the corresponding points of the landscape entity in its image space, and then establishes a three-dimensional landscape entity model. The model can automatically construct the surface of the three-dimensional model of the landscape entity, but it can not accurately calibrate the principal coordinates of the three-dimensional landscape entity. To solve these problems, this paper proposes a three-dimensional landscape entity model based on digital measurement. The simulation results show that the model proposed in this paper has the characteristics of high accuracy and fast speed, which provides a feasible basis for the construction of digital.
2 Principle of Accurate Measurement and Modeling for Three-Dimensional Landscape In the process of building an accurate measurement model of three-dimensional landscape entity, we give the transformation relationship between image coordinate system and pixel coordinate system, and get the rotation matrix of the image [5]. Secondly, we use the algorithm to extract the three-dimensional point space coordinates based on feature points, and obtain the non-homogeneous coordinates of any point in the three-dimensional space of landscape entity in the left and right camera [6]. Then we give the relative geometric relationship of the same camera when shooting at different positions, and get the standard coordinates of the three-dimensional model of landscape entity, and then build the three-dimensional landscape entity model based on this [7]. The specific steps are described in detail below. It is assumed that f 1 and f 2 represent focal length, (x 1 , y1 ) represent the pixel coordinates of some landscape entity feature points under the effective focal length f 1 . (x 2 , y2 ) represents the pixel coordinates of the same feature point under the effective focal length f 2 , then the transformation relationship between the image coordinate system and the pixel coordinate system is given by Formula (1).
3D Reconstruction Method of Waterfront Recreational …
1823
Ellp
∓ { f1 , f2 } S λ ⊕ m jkp = swer (x1 , y1 ) ⊕ (x2 , y2 ) f r y
(1)
In formula, Sswer represents the intersection of optical axis and image plane. m jkp represents the number of feature points of landscape entities. λ f r y represent optical axis. We suppose that t x and t y represent the translation component, (X W , YW , Z W ) represent the coordinates of any point P in space in the world coordinate system, (X C , YC , Z C ) represent the coordinates of P point in the camera coordinate system, and the rotation matrix of the image is obtained by Formula (2). Rse f
p ± tx , t y (X W , YW , Z W ) × = (X C , YC , Z C ) μf r t
(2)
In formula, μf r t is transition parameters. We set that ωs f g is Radial distortion coefficient, R jkp is the plane coordinates of point p, {O1 , −X 1 , Y1 } is image coordinate system, {Or , −X r , Yr , Z r } is right camera is camera coordinate system, {O2 , −X 2 , Y2 , Z 2 } is left camera coordinate system, z cg perspective model, Then we extract three-dimensional point space coordinates based on feature points by Formula (3).
Rser t
z cg × ωs f g p × {O1 , −X 1 , Y1 } ⊕ z cg = × {Or , −X r , Yr } × {O2 , −X 2 , Y2 , Z 2 } R jkp
(3)
We set that μser , μper represents the position relationship between the coordinate systems of the left and right cameras. Q swer is spatial transformation matrix, we use Formula (4) to obtain the inhomogeneous coordinates of any point in the threedimensional landscape space in the left and right camera coordinates. (xω , x1 , x2 ) =
Q swer
μser , μper {R1 , T1 } × × {R2 , T2 } k g jk , ±h g jk
(4)
In formula, the {R1 , T 1 } and {R2 , T 2 } represent the external parameters of the left and right cameras, respectively. k g jk represents the geometric relationship between two cameras. h g jk represents the correspondence between the image points of two cameras. We set that s f ggh is the radial basis function. E xs f g is the horizontal plane of the elevation of the landscape entity. y ks f g is the slope of the elevation of the landscape entity, Then the relative geometric relationship of the same camera at different positions is given by Formula (5).
1824
Y. Cao
E swer
y ks f g ∓ E xs f g = s f ggh dd f r
(5)
In formula, dd f r is globally supported radial basis function. If, rsg f h is a point on the side elevation of a landscape entity. Then the coordinates of reference points of the three-dimensional model of landscape entity are obtained by Formula (6). Rwej (x, y, z) = Rse f
rsg (xw , x1 , x2 ) ∓ Ellp f h ∓ α sdgh × E swer R f g × Rser t
(6)
In formula, α sdgh denotes the height of the unknown point alpha. R f g is Side Inclination of Landscape Entities. A three-dimensional landscape entity model can be built based on the results of Formula (6). In summary, it can be explained that the principle of three-dimensional landscape entity modeling can build three-dimensional landscape entity model.
3 The Technique Basis for the Proposed Method 3.1 The Artificial Intelligence Technique Artificial intelligence in the pattern recognition refers to the use of the computer instead of human or human to help to perceive external information that can be said that a kind of human perception of a simulation [8]. It explores the establishment of computer pattern recognition system, through the computer system to simulate the human sensory recognition and perception of external information. It is well known, the definite inference has many shortcomings and the insufficiency, under the movement rule, the accuracy often is relative and the inaccuracy is inevitable. The indefinite theory is the theory of probability, the credible theory and reliable theory general designation [9]. At present, the experts and scholars have put forward based on the research and experiment on many uncertain reasoning model based on probability theory [10], subjective Bayes method based on the fuzzy set theory, the possibility of the Dem Pster-Shafer evidence theory, rough set method, data mining method and fuzzy logic inference. In Fig. 1, we show the sample ones. The basic indefinite inference was in a high-level intelligent system development realization important research area, the uncertainty inference principle applies in the scientific research and industrial production has all obtained the preliminary result [11]. On the other hand, the definite inference as also was solves the traditional expert system knowledge vulnerability and that inference monotonous extremely important method, uncertainty inference passes through many year development
3D Reconstruction Method of Waterfront Recreational …
1825
Fig. 1 The components of the artificial intelligence technique
already to establish the integrity system and the mature research technique from now on will be able to have broader application place inevitably. Fuzzy proposition logic imperfect root in general proposition conjunction definition [12], because took line foreword flexible logic, fuzzy proposition logic besides the acknowledgment atomic proposition true value flexibility is a fuzziness, but that also must solve about the molecular fuzzy proposition true value question. In Table 1, we show the essential logistic concerns of the artificial intelligence technique.
3.2 The Information Retrieval Model In the research of semantic retrieval, the main idea is based on ontology semantic network and reasoning mechanism of ontology is used to realize general semantic relation [13]. Due to the particularity of the ontology theory its powerful and the robust semantic network is a prerequisite for practical application of ontology, and it has become an important factor restricting its development. As reflected from Fig. 2, the flowchart of the IR model is shown. The semantic analysis always is the important topic which many computer practitioners’ study [14], also is the natural language understood the domain needs to solve the fundamental question and pursue goal. The semantic analysis is refers in the analysis sentence syntax structure and in each word meaning foundation as promotes can reflect this
1826
Y. Cao
Table 1 The essential logistic concerns of the artificial intelligence Universal logic mode
Characteristics
Established to describe the relationship between propositions flexible connective operation model of uncertainty
These operator clusters can describe the uncertainty of the relationship between flexible propositions. And it has been proved that this model contains all kinds of uncertain reasoning models, such as reasoning model based on probability, reasoning model based on trust measure and reasoning model based on trust degree
Establish a flexible reasoning model which can describe the reasoning process uncertainty
Due to the true value is allowed in the generic logic flexible, flexible, relationship dimension, flexible, flexible and model of flexible degree, the existence of, can describe the relationship between the unity of opposites and contradictions of transformation, provides mathematization of dialectical logic symbolic
Establish proposition true value uncertainty description of flexible true range
It has induced each logics which has first, describes each kind of true value uncertainty true value territory W general form is the random multi-dimensional ultra-foreword space and the related properties
The establishment can describe the restraint degree uncertainty flexible classifier operation model
The common formula sets and reasoning models of flexible logic are rich in content, including deductive reasoning, inductive reasoning and hypothetical reasoning, which are defined on the basis of three primary elements
Fig. 2 The flowchart of the information retrieval model
3D Reconstruction Method of Waterfront Recreational …
1827
sentence significance the formalized expression. As the primary standard of the IR, the Formula 1~2 demonstrate the similarity measurement paradigms.
4 Simulation Experiment In order to prove the validity of the proposed entity model of Landscape Based on digital measurement and similarity transformation [15], the experimental site is selected in a certain landscape, and a large number of measured data can be used for reference and analysis and comparison in the whole experimental area. Two aerial surveying images with 3 Mbit data can be selected. The data of control points can be distributed evenly in the landscape by using electronic total station in the field.
4.1 Establishment of Evaluation Index This paper evaluates the quality of different models in terms of the effect of building is the total number of three-dimensional landscape entity models. We set that ddgh test samples, ker y is distortion vector, ωawr is the change value of imaging calibrating point. Formula (7) is used to calculate the error caused by lens radial distortion. Q swer =
ωawr ∓ ker y ⊕ m kp ddgh
(7)
In formula, m kp calibrate the fitting radius of landscape map. It can be explained from the calculation results of Formula (7) that the lower the Q swer value, the higher the accuracy of reconstruction.
4.2 Experimental Result From the simulation results of Figs. 3 and 4, it can be shown that the model can give the corresponding photographic rays and coplanar conditions, thus ensuring the requirement of 3D landscape entity modeling for its modeling quality. The simulation results show that the proposed model has the characteristics of high accuracy and fast speed, which provides a feasible basis for the construction of digital.
1828
Y. Cao
Fig. 3 Original image
Fig. 4 Simulation model
5 Conclusions In the era of higher and higher digitalization, the information contained the landscape entity information system can no longer be limited to two-dimensional or two-anda-half-dimensional, and the real three-dimensional urban landscape entity must be
3D Reconstruction Method of Waterfront Recreational …
1829
displayed. Therefore, a three-dimensional landscape entity model based on digital measurement is proposed in this paper. Practice has proved that the use of digital measurement technology in three-dimensional modeling has the following advantages: (1) abundant data sources; (2) fast modeling speed; (3) easy to update in real time, whether the changes of landscape entities or their terrain can be reflected in time. Acknowledgements This research was financially supported by Scientific Research Projects of Higher Education Institutions in Hainan Province in 2019 (Study on Ecosystem Service Function Upgrading and Ecological Restoration Technology in Nandu River Basin Hnky2019ZD-39).
References 1. Bingjiang, Wang. 2017. Design and Simulation of three-dimensional visual system. Computer Simulation 34 (1): 352–355 (in Chinese). 2. Fangjian, Wang, et al. 2014. Key technologies analysis of digitization and three-dimensional modeling of large buildings. Remote Sensing Technology and Applications 29 (1): 144–150 (in Chinese). 3. Jun, Fang, Huang Changqing, and Zhang Lusong. 2014. Technological process and application of planning three-dimensional modeling based on Skyline. Journal of Jiangnan University (Natural Science Edition) 13 (1): 84–89 (in Chinese). 4. Hua, Li, Wang Guoping, and Yong Junhai. 2016. Fast three-dimensional modeling for high accuracy—Preface to the special journal of fast three-dimensional modeling technology. Journal of Software 27 (10): 2459–2461 (in Chinese). 5. Songmin, Jia, et al. 2014. Three-dimensional reconstruction of monocular vision based on variational model. Journal of Optics 34 (4): 162–168 (in Chinese). 6. Sun, K., D. Yan, and T. Hong. 2014. Stochastic modeling of overtime occupancy and its application in building energy simulation and calibration. Building and Environment 79 (5): 1–12. 7. Liu, F., and Z. Zhou. 2015. A new data classification method based on chaotic particle swarm optimization and least square-support vector machine. Chemometrics and Intelligent Laboratory Systems 147 (15): 147–156. 8. Esteva, A., B. Kuprel, R. Novoa, J. Ko, and S. Swetter. 2017. Dermatologist-level classification of skin cancer with deep neural networks. Nature 542 (7639): 115–118. 9. Fan, C., and F. Xiao. 2015. A framework for knowledge discovery in massive building automation data and its application in building diagnostics. Automation in Construction 50: 81–90. 10. Salem, A., J. Shaffer, and R. Kublik. 2017. Microstructure-informed cloud computing for interoperability of materials databases and computational models: microtextured regions in Ti alloys. Integrating Materials & Manufacturing Innovation 6 (1): 111–126. 11. Liang, X., T. Hong, and G. Shen. 2016. Occupancy data analytics and prediction: A case study. Building and Environment 102 (2): 179–192. 12. Kaneko, H. 2017. A new measure of regression model accuracy that considers applicability domains. Chemometrics and Intelligent Laboratory Systems 171 (2): 1–8. 13. Wang, E. 2015. Benchmarking whole-building energy performance with multi-criteria technique for order preference by similarity to ideal solution using a selective objective-weighting approach. Applied Energy 146: 92–103.
1830
Y. Cao
14. Pingkuo, L., and T. Zhongfu. 2016. How to develop distributed generation in China: In the context of the reformation of electric power system. Renewable and Sustainable Energy Reviews 66: 10–26. 15. Zhou, L., B. Wang, and J. Jiang. 2017. Predicting the gas-liquid critical temperature of binary mixtures based on the quantitative structure property relationship. Chemometrics and Intelligent Laboratory Systems 167: 190–195.
Research on Computer Network Information Security and Protection Countermeasure in Big Data Era Jiyan He and Yanbin He
Abstract Network security is not only related to personal information security, but also to the information security of the whole country. The application of big data technology in network security analysis can not only maximize the data acquisition, storage and analysis capabilities of the network system itself, but also further reduce the storage cost of the network information itself, and provide an important security guarantee for data retrieval and traceability. In this paper, a new idea of network security situational awareness model is proposed, and an effective network security situational awareness model is found from the perspective of network data traffic characteristics. The experimental results show that the machine learning and data mining algorithm in this paper has high accuracy and timeliness in processing large data. This provides a new way of thinking for the research and processing of new problems brought by big data. Keywords Network security awareness · Machine learning · Distributed computing · Large data
1 Introduction With the rapid development of network information technology in recent years, computer network information technology has been widely used in people’s work and life [1–3]. Network security has also become the most important issue in the process of computer application [4]. Network security is not only related to personal information security, but also to the information security of the whole country. Therefore, we need to further strengthen the defensive capability of the network and make use of new technologies to make up for the loopholes in the network system [5]. The application of big data technology in network security analysis has laid a favorable foundation for achieving this goal [6]. Therefore, strengthening the application and J. He Yunnan Agricultural University, Kunming, Yunnan, China Y. He (B) Yunnan University, Kunming, Yunnan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_217
1831
1832
J. He and Y. He
research of big data technology has become the key to meet people’s network security needs and ensure the safe operation of the network [7].
2 Adaptive Network Security Situational Awareness Model Based on Large Data
Fig. 1 Adaptive network security situational awareness model
The adaptive network security situational awareness model is shown in Fig. 1. Network security situational awareness model mainly includes three modules: situational awareness, situational understanding and situational prediction. The main task of the first module (Network Security Situation Awareness) is to identify the various activities in the network and their rules and characteristics [8, 9]. The main task of the second module (Network Security Situation Understanding) is to make the next analysis based on the identified attack activities and their characteristics, and to judge the relationship between the intention of anomalous activities and various anomalous activities [10]. The main task of the third module (Network Security Situation Prediction) is to identify potential threats based on the identified anomalous behavior to assess the hazards and future security situation [11–13].
2.1 Offline Module In this module, we mainly model various behaviors in network traffic. We need to find all kinds of normal and abnormal activities in traffic. In the network data flow, the normal network traffic is much larger than the abnormal network traffic. Therefore,
Research on Computer Network Information Security …
1833
Fig. 2 Various behaviors in network traffic
we need to model both normal and abnormal traffic. In this paper, an adaptive genetic algorithm is used to accomplish this task by continuously adapting to the dynamic data flow (Fig. 2).
2.2 Online Module This module detects abnormal data. First of all, we need to pre-process these data, so that the data is conducive to subsequent analysis and processing. The pretreated data is matched with the template obtained by off-line learning in training stage to detect the abnormal data in data stream, and finally the result of situation awareness is obtained. At the same time, we extract the data that do not match the template but may be potential new abnormal behavior from the situation awareness results to save the abnormal database, and update the template obtained by offline learning through online learning in the training stage. At the same time, the system assigns weights to the new template and continues to check the data flow. In the process of detection, the system carries out continuous error feedback and carries out adaptive weight updating operation for each template, deleting the template with too low weight. By updating the template dynamically, the situational awareness model can adapt to the dynamic characteristics of network data flow, so as to improve the detection rate and reduce the false detection rate.
1834
J. He and Y. He
2.3 Data Stream Module When dealing with large data in streaming network, the arrival time and sequence of data cannot be determined, and the data cannot be stored completely. Therefore, the system does not store large data of streaming network, but directly calculates in real time based on memory. In the data stream module, the real-time arrival data stream is processed as a convenient template matching detection form. Most data sets contain highly redundant features. In order to remove these data with little correlation and redundancy, feature optimization can improve the efficiency of data processing. Mainstream dimension reduction methods are divided into two categories: feature extraction (projecting high-dimensional data into low-dimensional space) and feature selection (substituting subsets for original feature sets) (Fig. 3).
Fig. 3 Data stream module
Research on Computer Network Information Security …
1835
3 Experimental Results and Analysis 3.1 Main Steps and Procedures of the Experiment Step 1: The system generates training data sets, which are modeled in the offline learning stage to generate templates for each abnormal activity. Step 2: The system preprocesses the network data stream which is arriving continuously, and extracts the characteristic attributes of each data record through a novel data dimension reduction method, which makes the data conducive to subsequent analysis. Step 3: The system uses template to match data, and completes the recognition of activity features, and classifies each data record according to attribute characteristics. Step 4: The system uses a novel unsupervised method to cluster data records which are not obvious or belong to known types. Store the new exception in the exception library. Step 5: Update the template library with new exceptions, assign weights to each template, and update each weight by error feedback learning. This can effectively reduce the false detection rate.
3.2 Training Generation Template In order to better represent the training data generation process, we define the following symbols to represent the data generation process. DTt represents the generated j training data set, where 1 ∈ [1, 5]. D N represents normal activity data. D A represents the exception activity data set, where 1 ∈ [1, 4]. T represents the template library generated by the training process. Then the training data generation process can be j expressed as follows: DT6 = D N U 4j=1 D A , it contains normal activity data and four j
kinds of abnormal activity data in DT6 · DT4 = D A ∪ D N , where j ∈ [1, 4] and i = j. t This means that it contains normal activity data and an abnormal data in DT. activity Then the template library of the model is generated: T = AGA DT6 U 4j=1 AGA DTt . (1) Generating exception Libraries This algorithm uses cosine similarity to measure the similarity of network data. Although the attribute values fluctuate, the direction of the data record remains unchanged, and it still represents the characteristics of the same activity. Suppose there are two network data records: x1 = {x11 , . . . , x1k , . . . , x1n ,}; x2 = {x21 , . . . , x2k , . . . , x2n ,} Then, their cosine similarity is calculated as follows:
1836
J. He and Y. He
n cos(θ ) =
k=1
n k=1
x1k
x1k x2k n k=1
x2k
(2) Adaptive error adjustment Input: Initialization weights, learning rate η; Output: Updated weights; Step 1: Each template is randomly initialized with a weight value. Step 2: Identify network activities; Step 3: if (less similarity between template and data) Adjustment weight decreases; Else if (the similarity between template and data is large-the number of matched records is large) Reduction of adjustment weights Else if (the similarity between template and data is large & the number of matched records is small) Adjustment weights increase
3.3 Result Analysis In this experiment, for each different anomaly type, we evaluate the false detection rate and detection rate of the model. The experimental results are shown in Fig. 4. The
Fig. 4 Contrast chart of detection rate and mistake detection rate
Research on Computer Network Information Security …
1837
graph contains four curves, which correspond to the optimization of dynamic time warping algorithm (DTWA) and the comparison of detection rate and false detection rate of traditional matching algorithm in network security situation detection. When dealing with the same data set, the detection rate of the optimized method is obviously higher than that of the non-optimized algorithm, and the false detection rate is also improved. Although the false detection rate and detection rate fluctuate in the face of different abnormal data sets, the overall trend tends to be stable, and the average detection rate of the optimized method is stable at about 94%.
4 Conclusion By optimizing the dynamic time warping algorithm and adaptive adjustment strategy based on weights, the model presented in this paper has better stability in dealing with large data volume, And with the increase of data, the number of training adjustments for each weight has been more, the accuracy is higher, and the detection rate shows an upward trend as a whole. The experimental results show that the proposed model can not only effectively deal with real-time network data flow, but also find hidden network features in high-dimensional data flow, which makes up for the deficiency of network security situational awareness model in dealing with real-time problems.
References 1. Qiu Fangjia. 2016. Analysis of data security and data backup storage technology. Information System Engineering (4): 68 (in Chinese). 2. Fang XiangDong. 2017. Talking about data security and data backup storage technology. Information Technology (11): 119 (in Chinese). 3. Chen Xiaobo. 2018. Brief discussion on the application of big data technology in network security analysis. Network Security Technology and Application (04): 102, 106 (in Chinese). 4. Zhang Shuwen, Liu Xiaowu, and Sun Xueyan. 2016. Hierarchical perception of network security situation based on multi-source integration. Computer Technology and Development 26 (10): 77–82 (in Chinese). 5. Ramaki, A.A., M. Khosravi-Farmad, and A.G.Bafgh. 2016. Real time alert correlation and prediction using Bayesian networks. International Iranian Society of Cryptology Conference on Information Security & Cryptology. 6. Leon, M.C., and H. Jukka. 2018. Searching for big data: How incumbents explore a possible adoption of big data technologies. Scandinavian Journal of Management 34 (2): 129–140. 7. Samiya, K., L. Xiufeng, A.S. Kashish, and A. Mansaf. 2017. A survey on scholarly data: From big data perspective. Information Processing and Management 53 (4): 923–944. 8. Andreas, K., K. Andreas, and X. Francesc. 2017. A review on the practice of big data analysis in agriculture. Computers and Electronics in Agriculture 143 (2): 23–37. 9. Robin, G., Pi Jean-Michel, and T. Christine. 2017. Random forests for big data. Big Data Research 9: 28–46. 10. Ejaz A., Y. Ibrar, A. Ibrahim, and H. Targio. 2017. The role of big data analytics in Internet of Things. Computer Networks 129 (2): 459–471.
1838
J. He and Y. He
11. Chunming T., H. Xi, S. Zhikang, and J. Fei. 2017. Big data issues in smart grid—A review. Renewable and Sustainable Energy Reviews 79 (2): 1099–1107. 12. Subbu, Kalyan P., and V. Athanasios. 2017. Big Data for context aware computing—Perspectives and challenges. Big Data Research 10 (7): 33–43. 13. Shaoyan, C., and X. Yunjian. 2012. Research on application of multimedia technology in college physical education. Procedia Engineering 29 (2): 4213–4217.
Intelligent Security Patrolling System of the Robot Based on Improved Encryption Algorithm Bo Zhao, Ming Yang, Yuxin Cai and Zhiwei Tang
Abstract With the acceleration of information and the rapid development of economy, the management of various industries in the society will tend to be intelligent, information and standardization. There are various new technologies speed up the pace of security management. In this paper, we adopted sensing layer data acquisition technology of Internet of things based on RFID to design an intelligent security patrolling system of the police robots. Meanwhile, we put forward RFID core technology and optimized cryptography technology, which are used to solve the reliability and integrity verification requirements of data acquisition by nodes of the sensing layer of Internet of things. Keywords Security patrolling system · The robot · Encryption algorithm
1 Introduction In recent years, with the acceleration of the pace of information and the rapid development of economy, the management of various industries in the society tend to be intelligent, information and standardization. Among the application of various new technologies speed up the pace of security management. Security industry patrol more management system is an essential system, that cannot be completely replaced by electronic technology equipment. General security system mainly includes: closedcircuit television monitoring system, entrance and exit control system, alarm system, patrol more system, among which the most important security guard work is patrol more. Usually patrol management basic it is sign in record on duty situation, unable to inspect personnel to verify whether, theft or other accidents are hard to make fast and accurate judgment, appeared on the management of a lot of loopholes, so in order to more accurately and truly record the actual circumstances of the patrolling B. Zhao (B) School of Communication and Information Engineering, Shanghai University, Shanghai, China e-mail: [email protected] B. Zhao · M. Yang · Y. Cai · Z. Tang The Third Research Institute of the Ministry of Public Security, Shanghai, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_218
1839
1840
B. Zhao et al.
personnel to perform a task, to ensure security patrolling to ensure the quality of the work is smooth and the application of electronic patrolling management system has become a must.
2 The Overview 2.1 Research Status of Patrol System at Home and Abroad Guard tour system originated in the United States and entered China in the 1990s, that was the introduction of a new technology in the field of security and defense has realized standardized and scientific information management. The main flow of the system was for security personnel to use specific patrol recording equipment, and completed the inspection work according to certain lines or self-set lines. In addition, the inspection information has been recorded by connecting and recording equipment. And electronic patrol was able to patrol more personnel patrol time, the number of accurate records, and eliminated the wiring work, simple operation. In addition, the system has the combination of computer information network, GPS and other resources [1]. Electronic patrol more system is the combination of technical prevention and manual prevention. In recent years in our country also got rapid development, more and more units and departments use electronic patrol more system to strengthen security and prevention work. In a lot of units, be like storehouse, village, hotel, electric power, communication, railroad, post and telegram, factory mine to wait, patrol, patrol inspects a job to concern safety, must be carried out strictly by the line of regulation, time. But the evaluation of the work has always been a challenge. And electronic patrol system can solve this problem well. The basic principle is to install a series of radio frequency cards representing different points on the patrol line (also known as induction cards), patrol personnel to each point with hand-held patrol more machine (equivalent to the card machine) card, representing the card number and time at the same time recorded down. After the inspection is completed, the patrol machine transmits the data to the computer software for processing through the communication line, and then records and evaluates the inspection situation. In recent years, the rapid development of Android system, patrol more terminal from the past WINCE, WIN Mobile platform to the Android platform over, at present, there are a large number of Android handled terminal devices in hardware to fully meet the requirements of patrol more terminal [2].
Intelligent Security Patrolling System of the Robot …
1841
2.2 Encryption Technology Status In the electronic patrol system, more and more the data of security have gradually received people’s attention. Through encryption and other means, we have ensured the security of electronic patrol system data transmission. The cryptography originated from the secret message transmission, and gradually developed by the coding and breaking. It is a comprehensive study of the technical science of coding and deciphering codes, closely related to computer science, informatics and so on. The basic idea is to protect sensitive information, including confidentiality, authentication, message integrity and non-repudiation. The three most widely used algorithms are: symmetric algorithm, asymmetric algorithm and hash algorithm. The public key cryptography system of asymmetric cryptography was proposed by Diffie and Hellman. In 1978 Rivest, Shamir and Adleman proposed RAS cryptography based on the decomposition of large prime Numbers. ElGamal cryptosystem is generated based on discrete logarithm problem in finite domain, while elliptic curve cryptography system is generated based on discrete logarithm problem in elliptic curve. In addition, other public key cryptography schemes have emerged which are also based on difficult problems. At present, RSA, DSA, DH and ECC are widely used [3, 4]. The hash algorithm, also known as a hash function, is a function that changes an arbitrary input message string to a fixed output string. This output string is called the hash value of the message.
3 Intelligent Security Patrol System Design 3.1 An Overview of the System In this paper, perception layer data acquisition based on RFID technology security requirements in terms of research, aiming at the core of data acquisition devices, RFID read-write device by using the core technology, password technology and RFID trusted authentication technology, the research design is acquisition node data twoway authentication, automatic processing, solve IoT perception layer node demand for the reliability of the data acquisition, integrity, authentication, at the same time using smart mobile operating system Android to realize the above technology.
3.2 The Secure Design of Electronic Patrol System In order to ensure the security of commercial passwords, the national commercial password management office has developed a series of password standards, including SSF33, SM1 (SCB2), SM2, SM3, SM4, SM7, SM9, zuchongzhi password algorithm
1842
B. Zhao et al.
and so on. Among them, SSF33, SM1, SM4, SM7 and zuchongzhi are symmetric algorithms. SM2 and SM9 are asymmetric algorithms; SM3 is a hash algorithm. The published algorithms include zuchongzhi sequence cryptography, SM2 elliptic curve public key cryptography, SM3 cryptography hash, SM4 block cryptography, etc. SM4 algorithm is a grouping algorithm used for wireless LAN products. The packet length of this algorithm is 128 bits and the key length is 128 bits. Both encryption algorithm and key expansion algorithm adopt 32-round nonlinear iterative structure. The decryption algorithm has the same structure as the encryption algorithm, except that the use order of the round key is opposite, and the decryption round key is the reverse order of the encryption round key [5]. SM4 algorithm wheel transformation scale is relatively small, with a large number of rounds. If state machine control is adopted, the speed is relatively low; if full pipeline method is adopted, it will occupy more resources. Considering the balance between velocity and area, the semi-pipeline method is adopted. SM4 algorithm encryption key length is 128 bits, that is expressed as MK = (MK0, MK1, MK2, MK3), where MKi(I = 0, 1, 2, 3) is the word. The round key is expressed as (rk0, rk1,…, rk31), where rki(I = 0,…, 31) for the word. The round key is generated by the encryption key. FK = (FK0, FK1, FK2, FK3) is the system parameter, CK = (CK0, CK1,…, CK31) is a fixed parameter for the key expansion algorithm, where FKi(i = 0,…, 3), CKi (i = 0,…, 31) is the word. This algorithm uses a nonlinear iterative structure, each iteration is given by a round function, where the round function is composed of a nonlinear transformation and a linear transformation, and the nonlinear transformation is given by the S box. r ki is the round key, and the synthetic permutation T constitutes a round function. The generation of the round key is similar to the flow of the above figure, generated by the encryption key as an input, the linear transformation in the round function is different, and some parameters are different. The specific algorithm of SM4 encryption and decryption as follows: R(A0 , A1 , A2 , A3 ) = (A3 , A2 , A1 , A0 ), Ai ∈ Z 232 , i = 0, 1, 2, 3
(1)
The plain text input is as this formula: (X i , X i+1 , X i+2 , X i+3 , r ki ) = X i ⊕ T (X i+1 ⊕ X i+2 ⊕ X i+3 ⊗ r ki )
(2)
Ciphertext output is: 4 (Y0 , Y1 , Y2 , Y3 ) ∈ Z 232
(3)
The decryption transformation of the algorithm is the same as the encryption transformation structure, and the difference is the order of use of the round key. In the SM4 algorithm, the round key of the encryption algorithm is generated by the encryption key through the key expansion algorithm.
Intelligent Security Patrolling System of the Robot …
1843
3.3 Software Design of Patrol Terminal The software of the portable security electronic patrol terminal runs on the intelligent mobile operating system Android. The system has good support for network and human-computer interaction, and can fully meet the design requirements of the terminal equipment. The patrol terminal judges whether the security personnel are patrolling normally by reading the RFID tag, and saves the patrol management record in the database [6]. The main work flow is as shown in Fig. 1.
Start
Read RFID information
Display main interface initialization reader
W hether it is a system card
Y
Y
Query the database , if there is a patrol to suspend recording
Query other information about the card and write the card letter to the database
N
N Whether to continue the last patrol
Read line information
Read the last route information and complete the point information
Show route information And enter the patrol main interface (waiting for card reading )
N
Whether patrol has been completed at the time of enquiry
Y
Prompt to complete the patrol
End
Fig. 1 Intelligent patrol system chart
1844
B. Zhao et al.
4 Summary and Outlook This paper introduces an all-round security management system based on the Internet of Things system. It can realize the automation and intelligence of the security management and strengthen the security of the system. Using multi-technology integration, using RFID, video, WIFI, GPIS, encryption and decryption technology, multi-technology integration of portable security electronic patrol terminal, combined with wireless network transmission, background real-time management platform technology. Acknowledgements This work was supported by National Key R&D Program of China under Grant 2017YFC0806500.
References 1. Huang, W.T., and P.Y. Hsu. 2006. Application of computerized patrol management system of examining for the petrochemical plant. Journal of Kao Yuan University 12: 81–93. 2. Chen W.D., G.P. Hancke, K.E. Mayes, et al. 2010. Using 3G network components to enable NFC mobile transactions and authentication. IEEE International Conference on Progress in Informatics and Computing, Shanghai. 3. Fave, F.M.D., A.X. Jiang, Z. Yin, et al. 2014. Game-theoretic security patrolling with dynamic execution uncertainty and a case study on a real transit system. Journal of Artificial Intelligence Research 50 (1): 321–367. 4. Dehuai Z., X. Cunxi, and L. Xuemei. 2005. Design and implementation of a security and patrol robot system. Mechatronics & Automation, IEEE International Conference. 5. Guan, Z.H., F. Huang, and W. Guan. 2005. Chaos-based image encryption algorithm. Physics Letters A 346 (1–3): 153–157. 6. Ngai, E.W.T., K.K.L. Moon, F.J. Riggins, et al. 2008. RFID research: An academic literature review (1995–2005) and future research directions. International Journal of Production Economics 112 (2): 510–520.
Integration of Information Technology and Teaching in Vocational Colleges Based on Computer Big Data System Hao Yu
Abstract In this paper, the idea of combining theory with practice is adopted. Firstly, the characteristics and current situation of teaching mode reform in Higher Vocational Colleges in the information age are comprehensively analyzed through investigation. Through the analysis of the current situation of the deep integration of information technology and classroom teaching, this paper analyses the factors that affect the effect of the promotion, puts forward solutions and makes feasibility analysis. With the help of large data technology, the corresponding abstract model is constructed. Then, based on the data, the optimal management information model of university education and teaching is analyzed, which theoretically proves the rationality of the big data technology and sample data reconstruction method presented in this paper. The experimental results show that compared with typical DS-means, the information development strategy proposed in this paper can not only greatly reduce the communication cost between network nodes, but also improve the information efficiency of the global teaching management on average about 10%. Keywords Education and teaching · Information technology · Large data technology · Network
1 Introduction This paper makes an analysis of the characteristics of the reform of teaching mode in Higher Vocational Colleges in the information age. By means of investigation, network questionnaire and social network analysis, the basic characteristics of the reform of teaching mode in Higher Vocational Colleges in the information age are analyzed [1]. Understand the driving mechanism of promoting the reform of teaching mode, and through the analysis of internal and external factors, study the software and hardware facilities offered by higher vocational education institutions to promote H. Yu (B) Tianjin Light Industry Vocational and Technical College, Nankai University Graduate, Tianjin, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_219
1845
1846
H. Yu
the integration of information technology and classroom teaching, the basic knowledge and skills of information technology possessed by teachers, and the integration of information technology and classroom teaching by teachers [2]. The views and students’ needs for integration and their experience of current integration methods are listed in this paper [3]. Discuss the new mode of promoting the deep integration of information technology and classroom teaching mode. Through the induction of the characteristics of the deep integration of information technology and education and teaching, as well as the combing of the influencing factors to promote the integration, the shortcomings of the traditional integration mode are comprehensively analyzed, combined with the characteristics of the current excellent mode at home and abroad [4]. The informatization of university education and teaching management promotes the information literacy and comprehensive quality of college students, and creates the new educational form that is compatible with the information society and knowledge economy [5]. The information management of higher education teaching breaks the traditional constraints of time, and lays the foundation for the construction of lifelong education system of globalization [6]. In short, the ultimate goal of the informatization of education and teaching management in Colleges and universities is to train high quality and comprehensive talents for colleges and universities. The information of education and teaching management in Colleges and universities is the content of education information, and it is an important step to realize the modernization of education [7]. The research direction, development and construction of education and teaching management informatization in Colleges and universities is bound to play a positive role in guiding the development direction of educational informatization, and further affect the progress and technical constitution of educational modernization. In the modern information society, colleges and universities have brought together excellent technical and managerial talents, forming excellent research and teaching teams, which have the advantages of technological frontier and management frontiers Therefore, the information of education and teaching management in Colleges and universities is the decisive force of education information, and it is an important step and core impetus to promote the modernization of education. The information of education and teaching management in Colleges and universities is conducive to improving the quality of teachers and students. The development of education information provides a lot of new media technology for people. The application of these new media technology in education and teaching provides rich and colorful means for the presentation and transmission of educational information. Educational informatization is not only used to perfect the presentation and transmission of information, but also provides many convenient conditions for the analysis of teaching process, the setting of teaching environment, and the control of teaching process. It enables people to have more freedom in the choice of teaching methods, teaching modes and teaching forms. It provides more ways for improving teaching effectiveness and cultivating innovative talents. The information of education and teaching management in Colleges and universities has become the focus of research and application in recent years. It belongs to a new teaching management mode, so there are many technical difficulties that need further processing. At the same time,
Integration of Information Technology …
1847
some research methods and related theories need to be solved urgently. At the present stage, from the perspective of research, there are mainly large scale data sets which emphasize the information of education and teaching management in Colleges and universities. It is a special set of data that needs to be stored, analyzed, acquired, and managed with appropriate tools for data size larger than ordinary management. In the process of information processing in the management of education and teaching in Colleges and universities, the emphasis is to guide an effective method of analysis. It does not use random analysis method to deal with the data simply, but each data is handled in an all-round way. It is believed that the best effect should be brought into play in the specific application field when the direction method of information development is used in the management of education and teaching in Colleges and universities. Aiming at the direction of informatization in higher education and teaching management, this paper puts forward a strategy of informatization based on large data technology. A special data processing method is used to integrate this teaching management information, and a systematic analysis framework is obtained. Based on the data structure of large data technology, the management strategies of education and teaching in Colleges and universities are described. Based on the above research, the best management information model consistent with the informatization of higher education and teaching management is constructed, and the effectiveness of the strategy is evaluated and verified.
2 Optimal Model of Information Development of Education and Teaching Management in Colleges and Universities The informatization of university education and teaching management can make all data formatted, abstract and transformed by using the concept of existing big data technology, and become a standard data type that can be analyzed and processed. Definition 1 (large data technology). Given a time series T = t1 , t2 , · · · ti , · · ·, data dimension d and node number n. A large data technology is defined as S = r1 , r2 , · · · , ri , · · ·, where each Sk (k = 1, 2, · · · , n) is a single datastream, is a mul- tidimensional data tuple sequence Sk = r1 , r2 , · · · , ri , · · ·, ri = ri1 , ri2 , · · · , rid collected on T. Definition 2 (historical window). Given a time series T = t1 , t2 , · · · ti , · · · and a data flow S = r1 , r2 , · · · , ri , · · · on it. Suppose ti , tk ∈ T, ik, Hk = [ti , tk ) is called the historical window of the S corresponding to k, and k belongs to a mining point. The data chunkk = ri , ri+1 , · · · , rk−1 from the H k is called the data block of the historical window. Definition 3 (large data). Assuming the d dimension data set X = {x1 , x2 , · · · xn }, which is A=B, the large data structure of the data set contains the following 5 tuple M = n, c, s, d, f definitions.
1848
H. Yu
(1) M.n: Represents the total number of data (here is n). (2) M.c: Mean value, equivalent to the center point, that is M.c = j
n
j xi
n, j = 1, 2, · · · , d
(1)
i=1
(3) M.s: Square sum statistics (to prevent overflow radicand) n j j j xi × xi , j = 1, 2, · · · , d M.s =
(2)
i=1
(4) M.d: Statistical value of variance M.d = j
n
j xi
− M.c
j
2
n, j = 1, 2, · · · , d
(3)
i=1
(5) M.f: The class identifier of the data set. Definition 4 (teaching management informatization of university education model). The optimal model of education and teaching management information in Colleges and universities with the main technical features of distributed and fluidity is defined as M = T,D,O,P. Among them, T = t1 , t2 , · · · is the sequence of time points for data collection, and D = {S1 , S2 , · · · Sn } is determined by the structure of big data technology composed of n strips and data streams collected from T data at some single nodes of data set. This is also the source of data mining. Operator operations for D are performed by O, and special algorithms are needed. P is the optimer of the dataset.
3 Information Process of Education and Teaching Management in Colleges and Universities Based on Large Data Technology 3.1 Large Data Extraction Algorithm The purpose of this system is to realize the big data mining analysis after the system receives the corresponding data blocks of teaching management information. For
Integration of Information Technology …
1849
example, algorithm 1 shows the extraction of large data from the implementation of teaching management informatization. Algorithm 1: mi cr o − cl ust er − abst r act or Input: the mining time is set to t; at this time the corresponding data block is D; its data dimension is d; k represents the number of large data. Output: M is a large set of data at t
7.
divide D into k cluster s C by Algorithm k − means; F O R each p ∈ C p.n ← | p|; FOR i=1to d
i q n; p.ci ← q∈ p p.s i ← qi × qi ; q∈ p
2 p.d i ← q i − p.ci n;
8. 9. 10. 11. 12. 13. 14. 15. 16.
E N DFO R p.c ← ( p.c1 , p.c2 , . . . , p.cd ); p.s ← ( p.s 1 , p.s 2 , . . . , p.s d ); p.d ← ( p.d 1 , p.d 2 , . . . , p.d d ); f lagp. f with the most label in instances o f p; integrate p.n, p.c, p.s, p.d and p. f into microclusterm; M ← M ∪ {m}; E N DFO R r etur n M.
1. 2. 3. 4. 5. 6.
q∈ p
The algorithm uses the k-means in first steps to implement the clustering operation. The time complexity of the algorithm can be expressed as o (l × m), l and m indicate the number of iterations to be completed under the premise of obtaining the optimal partition and the total amount of data needed to be excavated. m = k × n, so the time complexity of the algorithm depends on the k-means algorithm.
3.2 Data Maintenance Algorithm of Teaching Management Information Based on the characteristics of distributed educational management information in Colleges and universities, the author selects the “variance and minimum” analysis method to get the best combination cluster. A large data set M is given, in which two large data m1 and m2 that are merged should meet the following conditions:
1850
H. Yu
min
d
unite(m 1 , m 2 ).d |m 1 , m 2 ∈ M i
(4)
i=1 ∗
.d i is the i dimension value of the variance of a large data; unite (m1 , m2 ) represents the large data after the combination of m1 , m2 . Definition 5 (the process of merging large data). For the two d dimension big data m1 and m2 , assuming that the two big data have the same class identities, it can be merged into new big data by a merging operation unite (m1 , m2 ), and is labeled m3 =unite (m1 , m2 ), thus obtaining the statistical process of the m3 statistics.
m 3 .n ← m 1 .n + m 2 .n m 1 .n × m 1 .ci + m 2 .n × m 2 .ci m 3 .n m 3 .s i ← m 1 .s i × m 1 .s i + m 2 .s i × m 2 .s i m 3 .ci ←
m 1 .s i × m 1 .s i + m 2 .s i × m 2 .s i − 2 × m 3 .ci m 3 .n m 1 .ci × m 1 .n + m 2 .ci × m 2 .n + m 3 .ci × m 3 .ci × m 3 .n
(5) (6) (7)
m 3 .d i ←
m3. f ← m1. f
(8) (9)
Theorem 1 For m 3 = unite(m 1 , m 2 ), the statistical values corresponding to the large data m3 can be calculated by using the formula (5) ~ (9) in the definition 5. According to the calculation results, the data distribution features before the merger can be obtained. It is proved that under generalconditions, m1 and m2 are all data one-dimensional sets, which are written as c1 = x1 , x2 , · · · , x p and c2 = y1 , y2 , · · · , yq (since both are one dimensional dataset, they are not marked dimensions). For m 3 = unite(m 1 , m 2 ), the original data set of the m3 cluster is c1 ∪ c2 = x1 , x2 , · · · , x p , y1 , y2 , · · · , yq . Combined with the statistical method of large data point number defined by 3, we can get it m 3 .n = p + q = m 1 .n + m 2 .n
(10)
Therefore, the definition of (5) in 5 is established. The calculation process of the large data center point corresponding to 3 is defined.
Integration of Information Technology …
1851
m 3 .c = x1 + · · · + x p + y1 + · · · + yq ( p + q) = x1 + · · · + x p + y1 + · · · + yq m 3 .n
(11)
m 1 .c = x1 + x2 + · · · + x p m 1 .n, m 2 .c = y1 + y2 + · · · + yq m 2 .n
(12)
Add the formula (12) to formula (11) and get m 3 .c = (m 1 .c × m 1 .n + m 2 .c × m 2 .n) m 3 .n
(13)
The formula (6) in the definition 5 can be judged to be established. We further analyze the large data square of the definition of 3 and its statistical results. (14) m 3 .s = x12 + · · · + x p2 + y12 + · · · + yq2 m 1 .s =
x12 + x22 + · · · + x p2 , m 2 .s = y12 + y22 + · · · + yq2
(15)
Add the formula (15) to formula (14) and get m 3 .s =
√
m 1 .s × m 1 .s + m 2 .s × m 2 .s
(16)
So the formula (7) in definition 5 is established. Calculate according to the statistical values of variance of the large data defined in definition 3. p
m 3 .d =
i=1
q
(yi − m 3 .c)2
i=1
p+q p
=
(xi − m 3 .c)2 +
i=1
xi2
+
q
i=1
yi2
− 2 × m 3 .c ×
p
i=1
xi +
q
yi
i=1
p+q
+ m 3 .c2
(17)
Add the formula (15) and (12) to formula (10) and (17), get m 3 .d =
m 1 .s × m 1 .s + m 2 .s × m 2 .s m 1 .c × m 1 .n + m 2 .c × m 2 .n − 2 × m 3 .c × m 3 .n m 3 .n +m 3 .c × m 3 .c (18)
It can be proved that the formula (8) in definition 5 is established, and
1852
H. Yu
m3. f ← m1. f
(19)
Combined with the above results, we can see that for the one-dimensional data set, theorem 1 is established. When data set is multidimensional, we only need to calculate every dimension separately. Algorithm 2: mi cr o − cl ust er − mai nt ai ner. Input: set the mining time t; M ∗ is the large data set extracted from the current data block; its dimension d; L is the largest number of data that can be carried out for teaching management informatization; M is the big data set for maintaining the last mining point. Output: a large data set M that is updated at time t. 1. 2. 3. 4. 5. 6. 7.
M ← M ∗ ∪ M; L M ← |M|; W H I L E L M >L DO b ← the largest number o f machine F O R each m 1 ∈ M F O R each m 2 ∈ M d
IF unite(m 1 , m 2 ).d i b T H E N i=1
9.
s1 ← m 1 ; s2 ← m 2 ; d
unite(m 1 , m 2 ).d i ; b←
10. 11. 12. 13. 14. 15. 16. 17.
E N DI F E N DFO R E N DFO R p ← unite (s1 , s2 ); M ← M ∪ { p}; M ← M − {s1 } − {s2 }; L M ← L M − 1; E N DDO r etur n M.
8.
i=1
Through algorithm 2, we can see that the time cost is determined by the number of large data merging. It can be found that the big data extraction algorithm based on k-means can form k big data in the existing data blocks, so algorithm 2 can carry out the unite operation of big data at most k times.
Integration of Information Technology …
1853
3.3 A Sample Reconstruction Algorithm for Teaching Management Information Processing Center When a big data mode corresponding to teaching management information is updated, it can be transmitted to the teaching management information processing center by network. As shown below, it shows the following code in algorithm 3 to form a global training data sample set. Algorithm 3: Sampl e − r emaker. Input: set the mining time t; at this time, M is a large data set consisting of the information data of the teaching management; the dimension of the data set is d. Output: the set of data samples reconfigured at t is S.
6.
F O R each m ∈ M n ← m.n; F O R i=1 to n F O R j=1 to d r ← rand (-1.1); the random numbers in the -1 ~ 1 interval are obtained. l ← 3 × n × m.d j 2;
7. 8. 9. 10. 11. 12. 13. 14.
x j ← m.c j + l × r ; E N DFO R x ← (x 1 , x 2 , . . . , x d ); the multidimensional data point x is obtained. f lag x with m.f; insert x into S; E DN FO R E N DFO R r etur nS.
1. 2. 3. 4. 5.
It can be found that the time complexity of the algorithm 3 is O (n) in the condition that the influence of the data dimension is excluded, in which the n represents the number of the recovered samples. The actual memory space depends on the size of the data of these samples. Theorem 2 If the data in the large data technology are in the form of normal distribution, the data set constructed by the algorithm 3 will be equivalent to the original statistical results of the mean and variance of the large data. Document [8–10] analyzes the one-dimensional data, assuming that the big data set M contains only one big data m, where μ and σ are the mean and variance of m respectively, and the algorithm 3 is used to compute m, and the sample set X = {x1 , x2 , · · · xn } can be obtained. According to the definition of the mean value of large data, the X center point Xc can be expressed as: Xc = 1
n×
n i=1
xi
(20)
1854
H. Yu
At the same time, the point of X is obtained by the algorithm 3. ∀xi ∈ X, xi ← μ +
3nσ 2 × rand (−1, 1)
(21)
Add the formula (21) to formula (20) and get X c =1
n μ + 3nσ 2 × rand (−1, 1) n×
=μ + 1
i=1
n×
n 3nσ 2 × rand (−1, 1)
(22)
i=1
In the normal distribution, A=B. So according to the formula (22), Xc ∼ μ
(23)
In addition, according to the definition of variance in definition 3, the variance A of Xd is n (24) Xd = 1 n × (xi − X c )2 i=1
Add the formula (21) to formula (24) and get X d =1 =1
2 n μ + 3nσ 2 × rand (−1, 1) − X c n× i=1
2 n n× (μ − X c ) + 3nσ 2 × rand (−1, 1)
(25)
i=1
According to Eq. (23) X c ∼ μ, the formula (25) and the following formula is equivalent: n
Xd ∼
2 3nσ 2 × rand (−1, 1)
i=1
3n × σ × = =3σ 2×
n
n rand (−1, 1)2
i=1 n i=1
2n rand (−1, 1)2
(26)
Integration of Information Technology …
Because of
rand(−1, 1)2 ∼
1855
1 −1
x 2 d x = 2 3, then
Xd ∼ σ
(27)
According to the above formula (23) and the formula (27), it is found that theorem 2 is suitable for single large data and single dimensional data space types. For multidimensional data or large data, it is only necessary to use the above method to reasoning each dimension or large data in turn.
3.4 The Optimal Updating Algorithm of Large Data in Teaching Management Information A base optimer is used as a large data scale structure in this paper. Given a large data scale E={e}. Algorithm 4 is the optimal device code for the learning of the teaching management information processing center. Algorithm 4: ensembl e − updat er. Input: set the mining time t; at this time, the training sample set is S; the previous mining point maintains large data scale to E; the largest number of weak optima can exist in the big data scale is Q. Output: Get large data scale E after update at t. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.
p ← |S|/Q; F O R each e ∈ E e.err or ← 0; FOR s ∈ S f ← e(s); Using the weak optimer e to realize the prediction I F f = s. f T H E N delete s from S E L S E e.err or ← e.err or + 1; E N DFO R I F S = φ T H E N br eak ELSE K ← randomly select p samples f r om S; e∗ ← C4.5(K ) New optimer learning E ← E ∪ {e∗ }; END IF I F |E| > Q T H E N c ← e that satis f ies max{e.err or |e ∈ E } E ← E − {c}; Deleting the worst optimer over the upper bound condition E N DI F E N DFO R r etur n E.
1856
H. Yu
In algorithm 4, the above 3 work needs to be completed separately for each worst optimer. At the same time, the number of the worst optimer depends on the Q value. Through the analysis, the algorithm time complexity is Max{O(Q × n),O(Q × c),O(Q2 )}.
4 Experiment and Result Analysis In this experiment, KDD (CUP) 99 data set is used to evaluate the effectiveness of the information development strategy of education and teaching management in Colleges and universities. The DS-means algorithm is compared. Experiment 1 (accuracy test under different historical window). Combined with the application of the LDTC method and the contrast algorithm DS-means, the global optimer is obtained. After that, the accuracy was tested through a dataset from KDD99. Figure 1 shows that the LDTC error rate is significantly lower than DSmeans (about 10%). As the historical window increases, the accuracy of the LDTC is gradually increasing and the DS-means is fluctuating. Experiment 2 (the optimal precision test under different large data scale). In 1000 s, error rate tests are performed every additional 100 s performs 1 times LDTC and DS-means to generate global optimer. From Fig. 2, we can see that compared with DS-means algorithm, the optimal accuracy of this paper is obviously better. From Fig. 3, we can get that LDTC will increase with the increase of training time, and DS-means will fluctuate. Experiment 3 (test execution time and memory space). The time spent in the teaching management information processing center is executed by tracking LDTC and DS-means. As you can see in Fig. 4, the two algorithm increases with the time of the history window, and the time cost of each update is increased. The execution time of the LDTC is not as much as DS-means. As shown in Fig. 5, the memory size of LDTC and DS-means is basically the same. This is because when LDTC calls the C4.5 algorithm, only one of the numbers
Fig. 1 The change of error rate when the length of the time window increases
Integration of Information Technology …
Fig. 2 Error rate of the corresponding flow data under each integrated optimal condition
Fig. 3 The corresponding error rate state under the condition that E-no is 20
Fig. 4 The relationship between the execution time and the length of the time window
1857
1858
H. Yu
Fig. 5 The relationship between the memory space and the length of the time window
of training samples is selected. Therefore, the memory is slightly lower than memory size that occupied in experiment 1, 2 and 3 of DS-means. For the application process of the information of education and teaching management in higher level colleges and universities, this paper provides a cost that can increase at a small time, so that the efficiency of data teaching management information development can be significantly improved, so as to achieve optimal results through certain coordination between accuracy and cost.
5 Conclusion This paper makes a comprehensive analysis of the potential application of the informatization of education and teaching management in Colleges and universities, and probes into the role of information technology in the management of education and teaching with weak magnetic space. And through the concept of big data technology, the author builds a model of information management in Colleges and universities, and further designs the best model of informatization in higher education and teaching management. The experiment shows that this algorithm can improve the best mining effect of the information of education and teaching management in Colleges and universities with the main technical characteristics of the weak magnetic space.
Integration of Information Technology …
1859
References 1. Arias, M.B., and S. Bae. 2016. Electric vehicle charging demand forecasting model based on big data technologies. Applied Energy 183: 327–339. 2. Bulletin, M. 2014. Stuart parkin receives 2014 millennium technology prize for opening big data era. MRS Bulletin 39 (7): 573. 3. Chen, C.L.P., and C.Y. Zhang. 2014. Data-intensive applications, challenges, techniques and technologies: A survey on big data. Information Sciences 275 (11): 314–347. 4. Dahl, K.K.B. 2011. Becoming a health education professional in kenyan teacher training colleges: Professional identity, everyday life and health education practices. Annals of Internal Medicine 2 (2): 289–290. 5. Devi, A. 2013. A comparative study of teacher educators of government-financed and selffinanced colleges of education in relation to their professional values, teaching aptitude and job satisfaction. Journal of Applied Crystallography 46 (4): 849–855. 6. Edgren, H. 2017. Abstract 2596: Medisapiens explorer technology platform—Integrated solution for big biomedical data. Cancer Research 77 (13 Supplement): 2596. 7. Hammond, M. 2010. What the literature says about continuing professional development and the use of learning platforms in schools and in initial teacher education. Swiss Medical Weekly 140 (19–20): 286–292. 8. Isomoto, Y., U. Nakano, H. Yamasaki, and S. Itoh. 2017. Examination and problems in development of a simulation teaching matrial for information processing education. Physics Today 35 (8): 60–61. 9. Ma, J., and J.C.P. Cheng. 2016. Estimation of the building energy use intensity in the urban scale by integrating GIS and big data technology. Applied Energy 183: 182–192. 10. Ngobi, D.H., J. Otaala, J. Maani, and G. Bakaira. 2011. The role of universities in teacher education and professional development: Kyambogo university a case study. Systematic Entomology 35 (1): 19–58.
Research on Private Cloud System Architecture and User Data Security Based on Simulation Jian Chang
Abstract In view of the false related problems in the construction of data security risk assessment index system, it is difficult to converge to the optimal solution of state space by traditional methods, which leads to poor evaluation performance. In this paper, the author sets up a data security risk assessment index system under the background of private cloud. Under the constraint of learning samples of stochastic functional, the author solves the optimal solution of data security risk assessment index system under the background of private cloud. At the same time, the position vector fitness updating method is used to optimize the training of data security risk assessment. The results show that, under the background of private cloud, the use of data security risk assessment index system can effectively solve the virtual goodness and false correlation existing in the collection data, thus avoiding the influence on the more explicit variables. It can also effectively reduce the errors caused by observation data, thus reducing computation cost, and ultimately making data security risk assessment more precise. Keywords Private cloud background · Data security · Risk assessment index · Index system construction
1 Introduction Big data, cloud computing, Internet of things, mobile Internet, block chain and other technologies are the typical applications of the post information technology era. It not only changes people’s thinking mode, but also changes people’s life and work way, making society and individual more and more dependent on data and the products based on the post information technology era. It makes all kinds of data showing explosive growth [1]. Cloud computing provides storage and computing platform for the diversification of mass data, and data mining technology such as distributed computing can also enhance the ability to analyze and judge trends in data [2]. J. Chang (B) College of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an, Shaanxi, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_220
1861
1862
J. Chang
Under the background of the private cloud, the definition of the data security risk assessment index system is basically consistent [3]. It refers to that taking the newly observed data as the basic object, combining it with the current state, strengthening the accuracy of the current state and improving the evaluation accuracy [4]. Aiming at the potential threat and attack mode in the current big data environment, we carry out the evaluation and analysis of the security risk [5]. Security risk, on the one hand, is always accompanied by the existence of the system, which cannot be thoroughly eradicated, only the prevention of risk [6]. That is all potential risks that may cause security events can be suppressed, transferred, dispersed, or reduced to tolerable risk. In this paper, a method of building a data security risk assessment index system is proposed. It is built under the background of private cloud, and the data is optimized [7]. At the same time, it effectively constructs the equivalent weight of data security risk, and gives an analytic expression of data security risk assessment. Finally, the new method is verified and compared with the traditional method to verify the validity and scientificity of the data security risk assessment index system.
2 Construction Process of Data Security Risk Assessment Index System The security of large data has been paid much attention by many experts and scholars at home and abroad, and it has been deeply analyzed from the multidimensional degree to the problem [8]. To explore a new high efficient and secure new model of large data processing is the hot spot of current research. In this paper, the Ensemble Transform Kalman Filter (ETKF) is used as the basis of the algorithm [9, 10]. The Euclidean distance is calculated first, then the security risk of the data is evaluated, and then the weight is given. We use the observed data to reduce the evaluation error and reduce the false correlation so as to assess the value approaching the real situation.
2.1 Private Cloud Introduction Because the impact of robustness is too obvious, the effect of evaluation will inevitably be affected. Especially in the background of private cloud, the data security risk assessment index system will show stronger nonlinearity and instability. In the evaluation system, the importance of observation data at different observation points is usually determined by the weight of observation. In Fig. 1, the image shows a data assessment map under the private cloud background. In the graph, the status update location is represented by the seven horns, and the data security risk is represented by Pentagram. If it is a traditional scheme, a smooth filter is used. Taking the central
Research on Private Cloud System Architecture …
1863
Fig. 1 Private cloud
lattice as the basic object, using the sequential loop method, all the objects are processed into the analysis network. First we calculate the Euclidean distance and then quantify it according to certain rules, so as to determine the size of the weight value, the closer the update position, the greater the weight, and if the longer the update position, the smaller the weight.
2.2 Optimization Training of Data Security Risk Assessment By using data security risk assessment and optimization training, the weight of corresponding observation points can be obtained, and the state update vector can be calculated accordingly. The detailed calculation process is as follows: (1) Based on the change of the Euclidean distance (with the letter L), the domain of the language variable is set, and its range is usually set to {0, 40}; then the equivalent weight μ is output, and then the scope of the variable domain is set, and it is set to {0, 1}. Then the quantization factor is reset, and usually it is set to 0.025. The Euclidean distance can be expressed by the following formula. l=
2 (Oi − Vi )2 + O j − V j
(1)
In the above expression, Oi represents the abscissa of the observation point, O j represents the value of the longitudinal coordinates of the observation point,
1864
J. Chang
and Vi is the value of the abscissa corresponding to the state renewal point, and V j represents the value of the ordinate corresponding to the state renewal point. (2) The reasoning of dynamic data security risk assessment. The equivalent weight is dependent on the variation of Euclidean distance. If the Euclidean distance is farther away, the equivalent weight will be smaller, and the trigonometric membership function should be taken again. (3) The determination of the equivalent weight u. From the theory, the data of the observed data determines the data of the weight u. Under the condition of the evaluation rules, the optimal output weight u of the data security risk assessment is obtained. According to the algorithm synthesis rules, the following formula can be obtained. u = l · M
(2)
In the above expression, u represents the output equivalent weight, and l is Euclidean distance (that is the distance between the observation point and the update grid point of the state). M represents the overall data security risk assessment optimization relationship. (4) The optimization of data security risk assessment. Through the above reasoning, we get the optimized value of data security risk assessment (that is, the optimal output weight u of the data security risk assessment). This process is usually called data security risk assessment optimization, and the method of maximum membership is selected in this paper. (5) State update process. Physical space distance is obtained by using data security risk assessment to optimize the weight of training. To get each step of the state update variable, it can be obtained by the following formula: f Ai,:
i T
S
i
i T
−1
SS
f
xia = xi +
√ ⎛
i
i
y−H
i x
f
i
(3)
N −1 ⎞− 21 i i
a Ai,: = Ai,: ⎝ I + S T S ⎠ f
i
pi,: u i,:
(4)
In the above expression: Ai,: represents the i line of the set perturbation matrix i
i
A; y refers to the local observation data; H refers to the local observation operator; i pi,: u ii,: refers to the weight value of the observation in i position; the corresponding
i i √ i i − 21 f local set of observation disturbances is expressed with S ≡ R H A N − 1, i
i
and in this formula, the covariance is expressed by R , and A is used for the local set
Research on Private Cloud System Architecture …
(a) range of weights covariance matrix
1865
(c) dependent background error covariance matrix
(b) background error
Fig. 2 The influence of data security risk assessment training on covariance matrix
i
i
f
perturbation. In the Formula (3) and (4): K i,: = Ai,: S T . i
i T
I +SS
−1
√
i
N − 1, T =
i i T
− 21
I+S S
i
i
, U = pi,: u i,: ,
Then the above formula is arranged, we can get i
f
i
i
i y−H xf xia = xi + K i,:
a Ai,:
=
f Ai,:
i i T
i
U
(5)
− 21
I+S S
(6)
Taking every step as the basic object, we update the variables to get the data set disturbance. Then the data is fused in the system, then the covariance matrix and the analysis mean are obtained in the range of the optimization training of the data security risk assessment, thus the status update value and the state analysis set are calculated. The background value of this time is the last data security risk assessment, and then it is returned to the evaluation model, which is constantly reciprocating according to this process. The position background error covariance matrix is detailed in Fig. 2. The analysis of Fig. 2 shows that the false correlation can be reduced by new methods, thus effectively eliminating the negative effects of remote observation on state updating.
3 Numerical Simulation Results and Analysis In this paper, we need to test the performance of data security risk assessment index system, so we need to simulate it. In the simulation experiment, the Sphere function
1866
J. Chang
and the Rastrigin function are used effectively, and the data security risk assessment algorithm is used in the private cloud background to get the convergence result and time consuming of the equilibrium point training under the private cloud background. The details are shown in the following two figures (Figs. 3 and 4). Through the evaluation of the figures, the efficient use of the text algorithm can reduce the computational cost as much as possible. It can not only save a lot of running time, but also can evaluate the efficiency of data security risk assessment. In the process of research, data security risk assessment function can be expressed in the following formula: n 1 2 R M S Ea = (x − xi ) n i=1 Fig. 3 Training time under different data sizes
Fig. 4 Convergence of data equilibrium point in private cloud background
(7)
Research on Private Cloud System Architecture …
1867
Table 1 Experimental design scheme Set number N
Observation number P
Model step T
Magnifying factor infl
Forced parameter F
Experiment 1
5–50
10
25
1.01
8
Experiment 2
20
1–20
25
1.01
8
Experiment 3
20
10
5–60
1.01–1.12
8
Experiment 4
20
10
25
1.01
8
Experiment 5
20
10
25
1.01
4–12
In the above formula, the dimension is expressed with n, the evaluation value is expressed by x, and the true value of the state is expressed by xi . In order to verify the validity of FETKF (Fuzzy Con-trol Ensemble Transform Kalman Filter, Model under private cloud background), it is discretized in this study. At the same time, it compares ETKF with LETKF (Localized Ensemble Transform Kalman Filter) to N (set), P (number of observations), T (model step size), infl (covariance amplification factor), F (coercive parameter), LETKF localization coefficient and FETKF weight coefficient. In the experimental research, parameter setting is as follows: the setting of parameters in Experiment 1 is shown in Table 1. The change interval of N is [5-50], and the interval is 5. We can draw 3 conclusions as follows: conclusion 1: the root mean square error is closely related to the number of sets. If the aggregate number is increased, the root mean square of the 3 methods is decreasing, and the accuracy of the evaluation is enhanced. Conclusion 2: if the set number is 2, the root mean square of the 3 methods all appears very obvious. At this time, it is difficult to achieve the evaluation requirements. If the set number continues to increase, the convergence speed based on FETKF method is the fastest. If the set number is 20, then the assessment accuracy is higher. If the set number is 40, 3 kinds of methods to evaluate the effect are the same. Conclusion 3: the calculation burden is closely related to the set number. The more the aggregate number is, the heavier the calculation burden is. In the 3 methods, the FETKF method presents an obvious advantage, and it presents the best evaluation effect.
4 Conclusion In the age of information technology, people are more dependent on data. The traditional data security mechanism cannot meet the security needs of the current big data system. Users’ data security and personal privacy protection have many potential security threats. In the optimization training of data security risk assessment, the best data security risk assessment requires constant modification of the observed values, and a data security risk assessment index system in the private cloud environment is proposed. In this paper, we not only give the solving algorithm of the nonlinear
1868
J. Chang
system, but also give the calculation process of the nonlinear system with the ETKF method. The research results show that under the background of private cloud, the new method can effectively improve the false correlation and avoid the effect of more variables. It can effectively reduce the errors caused by observation data, and further reduce the computation cost, so that the data security risk assessment index can be further upgraded.
References 1. Arnot, J.A., T.N. Brown, F. Wania, K. Breivik, and M.S. Mclachlan. 2012. Prioritizing chemicals and data requirements for screening-level exposure and risk assessment. Environmental Health Perspectives 120 (11): 1565–1570. 2. Khoury, M., C. Manlhiot, and B.W. Mccrindle. 2013. Role of the waist/height ratio in the cardiometabolic risk assessment of children classified by body mass index. Journal of the American College of Cardiology 62 (8): 742–751. 3. Sekhon, B.S., D.K. Bhumbla, J. Sencindiver, and L.M. Mcdonald. 2014. Using soil survey data for series-level environmental phosphorus risk assessment. Environmental Earth Sciences 72 (7): 2345–2356. 4. Allodi, L., and F. Massacci. 2017. Security events and vulnerability data for cybersecurity risk estimation. Risk Analysis 37 (8): 1606–1627. 5. Yin, Y., X. Zhang, D. Lin, H. Yu, J. Wang, and P. Shi. 2014. Gepic-v-r model: A gis-based tool for regional crop drought risk assessment. Agricultural Water Management 144 (144): 107–119. 6. Agency, E. 2013. Further development of poppie database: Development of a groundwater contamination risk assessment methodology. Systematic Botany 38 (3): 795–804. 7. Noer, M.C., C.D. Sperling, S.L. Antonsen, B. Ottesen, I.J. Christensen, and C. Høgdall. 2016. A new clinically applicable age-specific comorbidity index for preoperative risk assessment of ovarian cancer patients. Gynecologic Oncology 141 (3): 471–478. 8. Yusà, V., C. Coscollà, and M. Millet. 2014. New screening approach for risk assessment of pesticides in ambient air. Atmospheric Environment 96 (7): 322–330. 9. Han, L., Y. Song, L. Duan, and P. Yuan. 2015. Risk assessment methodology for Shenyang chemical industrial park based on fuzzy comprehensive evaluation. Environmental Earth Sciences 73 (9): 5185–5192. 10. Paredes, S., T. Rocha, P.D. Carvalho, J. Henriques, J. Morais, and J. Ferreira. 2015. Integration of different risk assessment tools to improve stratification of patients with coronary artery disease. Medical & Biological Engineering & Computing 53 (10): 1–15.
Artificial Intelligence and Deep Learning Application in Evaluating the Descendants of Tubo Mgar Stong Btsan and Social Development Dancairang Ye
Abstract The effective usage of artificial intelligence technology can greatly improve the shortcomings of traditional system. In this paper, the author analyze the artificial intelligence and deep learning application in evaluating the descendants of tubo geer dongzan and social development. On the basis of the introduction of artificial intelligence, BP neural network is used to calculate historical development and Character relationship. The function of this design is that it can improve the complexity of the logic of the client, which can greatly enhance the complex logic computing power. In a word, throughout the whole process of the auxiliary government of the Gaer family, it has experienced the peak period of its rise and development. The Gar Family reached its peak in the era of Gar Zannie and on the Qinling Tomb. However, at this time, it was also the beginning of the decline of the family forces. For the active implementation of the external expansion strategy of Tubo, this paper argues that the geographical and natural factors of the Qinghai-Tibet Plateau, the political system of Tubo at that time and the fierce internal power struggle inevitably prompted Tubo to implement the expansion strategy. Keywords Artificial intelligence · Tubo power · System construction · Deep learning
1 Introduction With the rapid development of computers, computers have played an important role in various fields. Because computers are constantly improving and progressing, its functions in various fields are also becoming increasingly perfect, and the artificial intelligence, which came into being at the right moment, is also gradually being applied to various fields [1]. The scope of the research of artificial intelligence system mainly includes the architecture of artificial intelligence, classroom teaching model, knowledge system representation, expert teaching system, virtual reality and learning environment, intelligent help system and so on [2–4]. In fact, in recent D. Ye (B) Northwest Minzu University, Lanzhou 730030, Gansu, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_221
1869
1870
D. Ye
years, great achievements have been made in the development of intelligent systems and classroom teaching practice, especially in improving the classroom teaching quality and promote students’ multi-sensory acceptance ability, the effect is outstanding [5]. However, with the depth of related research, many problems began to emerge. For example, today’s intelligent systems are mostly directed at simple, easy-to-formalized thinking of procedural knowledge, and are difficult to articulate on content that is difficult to express, such as declarative knowledge [6]. In the current common classroom teaching, the role of students is passive knowledge of the recipient, intelligent systems and students lack of interaction between the exchange [7]. So began to consider the optimization of artificial intelligence system in English teachers’ classroom teaching ability system application. In Tibetan history, there is a well-known family. This family once held the military and political power of Tubo eminently for a time, and with infinite loyalty, it contributed all its strength to lay a good foundation for the prosperity and development of the Tubo Dynasty [8]. However, the good beginning did not end well. Later, his descendants were rejected by Zampu because of their high merits and disobedience [9]. As a result, they fled to death and were destroyed by doors. This family is the Gar family [10]. However, for the Gaer family, there are many different opinions, praises and criticisms, and reputations in the history, so that today, the respect, praise and saliva concentrated on this family will still set off a storm-like debate in academia. However, in any case, with the legendary and glorious military and assistant political career of the Gar family, there are evidently sufficient reasons and grounds to prove that the Gar family is an outstanding generation in Tibetan history. The Gar family is one of the most famous families in the history of Tubo. In the early history of Tubo, it played an important role. This family not only has a high military literacy, but also has profound political talent; as early as before the unification of the Tubo Dynasty, talent began to emerge, which contributed a lot to the prosperity of the Tubo Dynasty. Especially after the death of Zampson Zangganbu, the family began to take over the power of the Tubo military regime gradually. From the Gar Dongzan auxiliary government in 650 A.D. to 698 A.D. Chidusong used force to eradicate the Gar family. During nearly half a century, the Gar family almost completely controlled the decision-making power of the Tubo military regime. The object of this study is the unique example in the history of Tubo, that is, the Gar family headed by Gar Dongzan, which has been “assistant government” for nearly half a century. At present, some scholars have studied the Gar family as a subject. Some discuss the rise and fall of the Gar family from the macro point of view, and some grasp its typical representative personages from the micro point of view to prove that the research topic is large or small, which causes the readers to fail to fully understand this special stage in the history of Tubo, that is, the “assistant government” historical facts of the Gar family for nearly half a century.
Artificial Intelligence and Deep Learning Application …
1871
2 Research and Introduction of Artificial Intelligence 2.1 Principles of Artificial Intelligence The use of artificial intelligence to re-construct the English teachers’ teaching ability system is a branch of artificial intelligence science and a comprehensive reform of English teaching. The exact principle is that the computer collects the facts about a situation through a sensor (or a manual input). The computer compares this information with the stored information to determine its meaning, and calculates the various possible actions based on the information collected, and then predicts which action is the best. The process of artificial intelligence is: for the human caused by the outside world caused by the stimulus and response, and therefore caused by learning, inference, judgments and other processes, these processes gradually decomposed into some simple basic procedures, and then through the program design, And then the human behavior of these problems to solve the problem of materialization or formula, making the artificial intelligence system can have a complete structural approach to design or solve the more complex problems. This set of software systems that can cope with the problem is known as artificial intelligence systems. The design of the program is simplified as follows (Fig. 1): In this paper, the artificial intelligence system is designed to have a plurality of independent parallel sensors. The function of this design is that it can improve the complexity of the logic of the client and does not need the auxiliary system of the additional gaseous periphery, which can greatly enhance the complex logic computing power. The logic components of the artificial intelligence system include:
Fig. 1 Artificial intelligence
1872
D. Ye
Fig. 2 Neural network
Calculation Speed
a memory, a logic operator, an operation editor, a logic module power supply, and a control separation system. In order to be able to perform fast logical operations, it is necessary to select the carrier position with the largest operation rate. As shown in Fig. 2:
2.2 Introduction of Artificial Intelligence The process of introducing artificial intelligence systems is relatively complex and requires the redesign of the traditional teaching system. Intelligent systems include human intelligence and computer intelligence (i.e., machine intelligence), both of which are complementary to each other. The introduction of artificial intelligence can convert human intelligence thinking into computer intelligence to re-build auxiliary English teaching ability system, that is, to implant human intelligence into the computer intelligence. The introduction of artificial intelligence can also presuppose the knowledge of the presupposition, that is, the formalization of knowledge processing. Artificial intelligence can also be used for knowledge retrieval, reasoning and proof, that is, computer processing knowledge of automation and intelligence. Thus, it can be seen that artificial intelligence plays an important role in the construction of English teachers’ classroom teaching ability system in combination with artificial intelligence. The application of artificial intelligence technology in the construction of English teachers’ classroom teaching ability system, in order to make the classroom teaching suitable for each student’s different situation and teach according to students’ different aptitudes. The classroom teaching ability system combined with artificial intelligence includes the “teaching decision” module, the “student model” module and the “natural language interface” module, and in the classroom teaching, after-school counseling, test simulation, daily practice a variety of teaching mode get applied, giving full play to the interactive characteristics of artificial intelligence. The introduction of artificial intelligence into the English teachers’ classroom teaching ability system, the following diagram (Fig. 3) can be used.
Artificial Intelligence and Deep Learning Application …
1873
Teaching data interface
Data Acquisition System Based on Artificial Intellgence
Preprocessing module
Data analysis based on artificial intelligence
Preset knowledge database
Data processor
Display system Fig. 3 Introduce artificial intelligence chart
On the basis of the traditional English teachers’ classroom teaching ability system, the artificial intelligence data analysis module is added to increase the artificial intelligence of the system. Wi is used to refer to intelligent momentum and the introduction process is as shown in the Formula (1): Wi =
-p
R - bi Rc
n - p 2 R - ai i=1
Rc
(1)
i -p
In the formula, R refers to the volume of intelligent database; bi refers to the execution attribute of artificial intelligence; Rc refers to the energy attribute of database; -p ai refers to the expression attribute of artificial attribute. At this point, the study and introduction of artificial intelligence, massive data are efficiently processed, improving the teaching efficiency and quality. Next, artificial intelligence can be used to reconstruct the English teacher classroom teaching system.
1874
D. Ye
3 The Political Career of Gardongzan When it comes to Gar Dongzan’s political career, it can be said that he was born at the right time and stepped forward smoothly. As mentioned above, on the one hand, the Tubo Dynasty in the early seventh century was full of opportunities and challenges, especially the male Lord Songzangganbu. In order to balance the conflicts between the old and the new aristocracies, he consciously elevated or supported the Gar family to enter the political heart of the Tubo society, and objectively established the social land of the Gar family in the Tubo dynasty. Bit. On the other hand, the Gar family itself has emerged two historical figures with extraordinary abilities, namely Gar Chizazimen and Gar Mengshang Songzang. Under the careful cultivation and deep political foundation of the two, Gar Dongzan thrived and began to enter the road of official career under relatively relaxed political environment. There is no clear record of when Gar Dongzan stepped into the political arena, but according to Dunhuang documents, it is said that “he succeeded Tubo Dalun in Qiongbao Bangse Suzi”. Obviously, Gar Dongzan participated in the social and political field of Tubo very early, and gained the trust of Zamb. Otherwise, the wise Songzangganbu would never let a person without political experience take such an important role. In addition, Gar Dongzan played an important role in many important incidents happened in the early days of Songzan Ganbu. In the field of historiography, it is widely believed that Gar Dongzan was deeply trusted by Zambia after he exposed the conspiracy of Jombo Bonsai. In fact, there are signs that, as early as Jombo Bonser’s life or as minister, Gar Dongzan has emerged as the reliance and trust of Matsuzan Ganbu, which can be seen from the historical events of Gar Dongzan’s involvement in historical books and documents. In the Zampsongzangganbu era, Gar Dongzan was involved in many historical events. Among them, the most important order according to the general history of Tibet is to expose the conspiracy of Qiongbao Bangse, conquer the Elephant Kingdom, formulate the laws and regulations of Tubo and emigrate to foreign countries. At present, most scholars hold the same view. Although this arrangement does not specify the specific time, it indirectly constitutes a vague temporal and spatial order for the readers of history. Marxism holds that “quantitative change causes qualitative change”. Similarly, different permutations and combinations can also cause the change of “quality” of things. According to the above order, the conclusion is that Gar Dongzan first exposed the Jombo Bonse conspiracy, and at the same time won the trust of Zamb and served as Tubo Dalun, then began many brilliant achievements. In this regard, the author raises doubts, only from the conquest of the Elephant Kingdom. In short, it is certain that Gar Dongzan entered the social and political field of Tubo as early as possible, and gradually entered the core of political rights of Tubo society after years of political experience. Because of his superhuman wisdom and skills in literary and military tactics, he accomplished a series of lofty missions and arduous tasks, which made him highly praised by Pusong. Ganbu’s great trust and
Artificial Intelligence and Deep Learning Application …
1875
praise eventually laid a solid political foundation for Gar Dongzan and the Gar family to reach the peak of power in the near future.
4 The Decline of the Gar Family The Gar family, which arose in the twenty-fifth generation of Zanpu Chiza Bangzan, experienced two generations of Gar Chizazimen and Gar Mengshang Song sac, and developed unprecedentedly in the Song Dynasty of Gar Dongzanyu. Because of Gar Dongzan Wentao’s astonishing talent in military strategy and the most dynamic era in Tibetan history, he has just entered the political arena, and has been greatly appreciated and highly praised by Zan Pu Songzan Ganbu, eventually becoming the most trusted Minister of Songzan Ganbu. Since Songzan Ganbu’s death, because of his young successor, he began to take charge of the dynasty in an all-round way. He not only established Tubo’s distinctive political deliberation system, the League, but also worked hard to improve the Tubo’s “legal system” and actively expand the territory. He successively conquered many surrounding tribes such as “Tuguhun” and set foot in the “Western Regions”. It laid a solid foundation for the Tubo dynasty’s strong journey. It is worth mentioning that under the leadership of Gar Dongzan, not only did the Tubo Dynasty become strong, but also his family began to expand unprecedentedly. After his death, two “assistant government” Dalun (blun Chen po) appeared successively in the Gar family, and their power was as high as the sun. As the “Tong Tong Tubo biography” put it, “and the death of Dongzan, the Qinling brothers were afraid to revert to their kingdom.” It is indisputable that after several generations of efforts, the Gar family finally reached its peak in the era of Gar Zannie and Lun Qinling. As mentioned in the previous chapter, at that time, there was no second Gaer family in Tubo society, which combined honor and power. However, it happened that at this time, when the Gar family was immortal and powerful, the decline of the family was closely followed. This also reflects to a certain extent the truth that “all things must be lacked, and extreme things must be reversed”. According to the existing historical records, it can be inferred that the precursor of the decline of the Gaer family should be Zampman Songmang Zangga’s death. The reason is naturally related to the “contest for the position” within Tubo. From the scattered historical records, we can see that the Gar family not only involved in this struggle, but also played an important role.
5 Conclusion First of all, from the law of the development of things, everything from the date of its emergence foreshadows its eventual demise. Secondly, during the half-century assistant political career of the Gar family, the Tubo and its neighboring brothers, including the Tang Dynasty, could no longer withstand tremendous armed friction
1876
D. Ye
because of long-term expansion and military struggle. The Gar family was not originally an aristocrat of Yalong Sibuye, but a minister of Senboje in the ancient Lhasa River Basin. Around the time of Chizha Bangzan, King Ziboye, seized the opportunity of Senboje’s splitting up the civil strife and threw himself under his leadership, thus becoming the aristocrat of the Yalong Royal family. By sorting out the limited historical data, this paper infers the general era in which Gar Chizhazimen and Gar Mengshangsong lived, and points out that these two men are not only distinctive in personality and ability, but also at the juncture of time when Gar Dongzan entered the political arena of Tubo, so their influence on the political career of the latter is inevitable.
References 1. Shuang, Chen, and Zou Weicheng. 2016. A study of teacher’s learning in the teaching of repetitive classroom for English majors. Chinese Foreign Language 3: 65–72. 2. Xin, Feng. 2015. A probe into the development of English teaching and thinking ability based on “student-centered and teacher-oriented”. Foreign Language Teaching 36 (4): 64–68. 3. Tingting, Lv, and Wang Na. 2016. Research on the teaching mode of the reversing classroom based on the SPOC + digital teaching resource platform—Taking college English as an example. China’s Audio—Visual Education 5: 85–90. 4. Mazinan, A.H., and A.R. Khalaji. 2016. A comparative study on applications of artificial intelligence-based multiple models predictive control schemes to a class of industrial complicated systems. Energy Systems 7 (2): 1–33. 5. Nabavi-Pelesaraei, A., R. Abdi, S. Rafiee, et al. 2016. Resource management in cropping systems using artificial intelligence techniques: A case study of orange orchards in north of Iran. Stochastic Environmental Research and Risk Assessment 30 (1): 413–427. 6. Rana, C., and S.K. Jain. 2015. A study of the dynamic features of recommender systems. Artificial Intelligence Review 43 (1): 141–153. 7. Sanguino, T.J.M., and V.M.R. Santos. 2015. Open classroom: Enhancing student achievement on artificial intelligence through an international online competition. Journal of Computer Assisted learning 31 (1): 14–31. 8. Mingyue, Si. 2016. An empirical study on college students’ autonomous teaching ability in information environment. Foreign Language Teaching 37 (4): 61–65. 9. Luxin, Yang. 2015. Teachers’ guidance and students’ academic writing ability development—A reflective teaching study of “academic English reading and writing course”. Foreign Language and Foreign Language Teaching 5: 29–35. 10. Zhang Songsong, Gu, Pan Yanyan Yunfeng, et al. 2016. A report on the current situation of college English teachers’ educational technology competence in the context of educational informationization—A case study of Nanjing local universities. Electronic Foreign Language Teaching 2: 70–74.
Analysis of Digital Media Art Teaching Innovation Based on Network and Cloud Computing Qian Ma, Bing Zhang and Zhiqiang Xu
Abstract The art form of digital media art is popularized with the development of computer. Since the middle of twentieth century, computers have changed people’s way of thinking and habits at an amazing speed. Digital technology has a profound influence on the artistic expression and language form changes. At present, the development of various digital technologies has emerged in an endless stream, which has brought a bright future for the development of digital technology in China. The digital media art major is an applied subject, and the practical teaching occupies an important position in the whole teaching system. In recent years, new design concepts, new means of expression, new technology and so on are constantly emerging, and the requirements for design talents are becoming higher and higher. In the construction of practical teaching system, we should focus on the reform and construction of professional courses, formulate the planning ideas of curriculum construction, and revise the teaching plan, update the contents of practice teaching, and form a plan to improve teaching quality. Keywords Digital technology · Art design · Innovation · Information technology
1 Introduction The invention and discovery of science have been used in great quantities to bring unprecedented convenience and stimulation to human beings. Nowadays, a new cross media art with unique art form and language—digital media art deeply influences human cognition of the world under the close combination of technology and art [1]. The art of digital media is being recognized by more and more people, and it is also deeply affecting the development of society and people’s life. Digital media art and design major is a new major developed in recent years based on computer digital technology. Although this profession has not been appearing for a long time, it develops rapidly like mushrooms. Based on many current situation of Digital Media Q. Ma · B. Zhang (B) · Z. Xu School of Digital Media and Creative Design, Sichuan University of Media and Communications, Chengdu, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_222
1877
1878
Q. Ma et al.
Arts Education under the market environment [2], such as in the discipline teaching, professional settings, teaching contents, teaching methods, teaching conditions, teaching quality, training objectives and training methods and other aspects of the problem, proposed the University and college teachers should conform to the needs of the times, follow the forward market and digital technology the pace of training of digital media art design talents and technology and art and creative ability for the state and society. With the rapid development of the market economy, the employment prospect of digital media art talents is very broad. With the rapid development of art and design major and the characteristics of innovation and practicality of art and design majors, it is particularly important to cultivate innovative and entrepreneurial abilities of art and design majors. To further strengthen the cultivation of professional art and design students’ creative spirit and practical ability, for art and design graduates increasingly large scale to adapt to social development, has important significance in improving the innovation of the whole society driving ability, personnel training is the state of the University have proposed requirements [3]. Digital media art design is a set of digital media technology and art design in one of the professional, cultivate students with technical application ability of digital media art and solid theoretical foundation, grasp the digital technology in the field of film and television art, network multimedia art in the field of knowledge, skills and application, has become the advanced talents and broad knowledge strong skills in the field of the industry. Art and design of computer application in the design of history reference, occupation research, idea generation, critical study, different design ideas, drawing techniques and steps of 3 core modules (all three units must be taken Unit level) multimedia design and production, multimedia production, animation technology, web pages from the following special unit (pick 6 Select nine specialist units from the unit following list) design method, principle of design, production, marketing and advertising media, advertising, advertising war art trend of development sketches, personal style, bibliography and resources, image communication, printing technology, printing advanced ideas, manual analysis scan text application system research and application of image processing and editing design, common characteristics, visual communication, cultural interpretation, in the digital environment. Management of work, business practice, design and production process.
2 Digital Media Art Design Analysis 2.1 Digital Media Art Design The emergence of new forms of communication and media makes the content of visual communication art design greatly enriched and expanded [4]. Network, digital TV, interactive media, interactive games and virtual space have become the main form and the medium of information dissemination, the traditional visual communication
Analysis of Digital Media Art Teaching Innovation Based …
1879
Fig. 1 Digital media
design category by the breakthrough in the development of digital carrier impact, which greatly extends the visual communication design form and content, in the rapid development of contemporary digital art design, digital media art design theory and aesthetic theory is very weak [5]. The theory and aesthetic category of the new media art design inherits the theoretical system of the traditional visual communication design. The traditional visual communication design theory still can serve as the theoretical foundation of digital media art in the art design, based on the theory of several aspects in common: first of all, to meet the functional requirements of the basic theory of aesthetics, aesthetic second is the same (Fig. 1).
2.2 Digital Technology In the “public entrepreneurship, innovation” background, coupled with the vigorous vitality of the Internet thinking further practice—“Internet plus” driven by social economic entities under the influence of College Students’ entrepreneurship has a hitherto unknown opportunity [6]. In this upsurge, the construction of the practice system of innovation and entrepreneurship in Colleges and universities is particularly important. In order to enhance the ability to target, from the current situation analysis of advantages and disadvantages, the path to enhance the practical ability of innovation and Entrepreneurship of college students to explore “Internet plus” background.
1880
Q. Ma et al.
Digital technology (see Fig. 2) is a concomitant with electronic computer science and technology, it refers to the use of certain equipment of all kinds of information, including: Figureheads sound like, into the electronic computer can recognize the binary number after the operation, processing, storage, transmission, the spread and reduction technology. Because in computer operation, storage and other links, we need to use computer to compress, compress and decode information, so it is also called digital technology, computer digital technology and so on. Digital technology is also known as digital control technology [7]. The software is completed by software compiling. More than 10 of families realize the technology of sampling and digitization of audio, video and other 80 of the media in the family network. It can be counted as the beginning of the digital age. We live in the real world in a simulated, thinking, perception is simulated and continuous, how to adapt to the new digital life, how to overcome the digital brought by a variety of diseases, although these problems will be resolved gradually, but it is more important to a lot of opportunities of digital life to us, to the information industry brought huge business opportunities. In this field, we also need to develop such technologies as access technology, chip technology, embedded operation system, middleware technology, application software, tool software, information resource construction and service [8].
Fig. 2 Digital technology
Analysis of Digital Media Art Teaching Innovation Based …
1881
3 Digital Media Art Design Evaluation System 3.1 Evaluation System Construction To construct a reasonable evaluation index system is the premise of the scientific evaluation. At present, China’s government institutions and experts and scholars put forward to society, economy and military 100 kinds of evaluation index system, because of the lack of optimization method and strict procedure, often on the same object to the evaluation index system, a variety of far therefore, urgent need to build a method of comprehensive evaluation index system was studied [9]. The development of digital media art forms, the new aesthetic characteristic of digital media art is that it breaks the Convention and transforms the difficult and mysterious things into an art form that everyone can accept and understand, giving people a visual feast [10]. The art of digital media combines the science element with the art element science, and presents it to everyone in a simple way of deciphering. The prosperity and brilliance of the works, stunning and stunning, the interpretation and interpretation of the full automation of the digital media art through computer programming. Both in the form of art and in the content, they all have the same character on the computer. In the field of art, the development of digital media art is a revolutionary subversion to this field, which has a milestone significance. Different artistic information can be converted to each other, and you can also enjoy extraordinary visual and artistic vision. (1) Digital media technology employment development of digital media art training direction is the combination of technology and art of combination of talents. Technology and art complement each other in the art of digital media. The lack of traditional education of digital media art talent and technology and art of the two, and the cultivation of such talents is also consistent with the emerging market demand, employment direction of their main levels of television, film and television animation, media and advertising companies, digital art company, exhibition design company, image planning company, multimedia and web design, interior decoration design, product design and other hot industry. The development of digital media art is a wise choice, because it has hidden great potential for development (see Fig. 3). (2) The art of digital media has a striking similarity with the three prisms. The angle of the three-prism observer is different, and the light of its relative refraction is different. And so is the art of digital media. Digital media art, as a new form of art, relies on digital technology and modern media technology to integrate human rational thinking and artistic perceptual thinking into a new and unique form. It is composed of art, science and technology, media and application, including extensive commercial design and mass art. (3) The digital media art has the digitization of the creation tools, the interactivity of the display of the works, the polymorphous of the works, and the extensive characteristics of the subject matter. The concrete presentation is that the creation
1882
Q. Ma et al.
Fig. 3 Increasing rate
process is an effective combination of all kinds of Art (film and television art, synthetic art, network art, etc.) and computer technology. The last step is the combination of intelligent software and the final output of art works. The progress of science and technology innovation and ideas will become the driving force to promote the development of digital media art, creative industry and information design will be the mainstream of the development of digital media art, digital media art artistic innovation to lead more extraordinary unique thinking and wider and wider view [11].
3.2 Research Tools and Methods Students should be encouraged to carry out scientific research and highlight the teaching practice [12]. To build a training mechanism for the three in one cooperation between universities, scientific research institutions and enterprises. By carrying out the activities of “production, learning and research”, the cooperation and complementary advantages of the three are given full play to enhance the teaching effect of the digital media. Advocating the training mode of school enterprise combination, relying on the platform of market demand, is finding problems and solving problems in specific jobs, and training and improving their creative ability by overbearing practical operation training [13]. For example, Bournemouth University will develop professional talents in digital media and the industry as closely linked, through the construction of “three-in-one base of teaching practice research”, training a large number of digital media technology with practice ability and innovation ability.
Analysis of Digital Media Art Teaching Innovation Based …
1883
Table 1 Evaluation in art design method Evaluation
Students’ self-evaluation
Group evaluation
Teachers’ comments
Enterprises’ evaluation
Number
35
45
60
90
Percentage
36
45
20
70
Table 2 Evaluation in art design content Content
Phased project
Professional competence
Medium-term plan
Appraisal test
percentage
50
20
20
10
4 Empirical Analysis 4.1 Digital Media Art Design Learning Evaluation Aiming at evaluate students’ behaviour, learning attitude and learning ability output, namely learning goals and academic achievements, focusing on students’ learning to express their design ideas, share design results and experience their essence. As a result, the comprehensive evaluation of the four aspects (see Table 1) of the students: (1) students’ evaluation, (2) group evaluation, (3) teachers’ comments, and (4) enterprises’ evaluation. After each project, a summary report of the unit courses is carried out, and the tasks and tasks completed by students at the teaching resource level of related tasks are displayed [14]. To develop examination questions database, the examination is to let students randomly extract and complete independently in the question bank, and the teacher strictly establishes the course website according to the grading standard, then hangs the item bank and the grading standard on the curriculum network. At the stage of practical design, a general evaluation is made on the topic selection, completion schedule, quantity, quality and expected effect of the project (see Table 2).
4.2 Improvement of Teaching Performance With the continuous application of digital technology to art majors, students’ views on this major field have changed [15]. Before, most of the students were not very acceptable or satisfied with such teaching methods. But with the development of information technology and the change of times, digital media art is more and more accepted by students. The number of students who are satisfied with digital media art design increased from 14 to 40 (see Table 3).
1884
Q. Ma et al.
Table 3 Students’ satisfaction with the current evaluation Content
Factor
Very satisfied
Satisfied
General
Dissatisfied
Very dissatisfied
Previous evaluation
Number
2
14
36
42
65
Percentage
1.7
8.6
37.5
39
45.1
Current evaluation
Number
20
40
28
30
39
Percentage
12.7
45
18
14
11.6
5 Conclusion The introduction of digital media has brought great vitality to the present class, which makes the classroom no longer so boring and the students are willing to learn. With the continuous efforts of the predecessors, the introduction of the new digital media to the classroom has achieved some obvious results. But at present, there are still many problems in the actual application of digital media in the classroom. Therefore, solving these problems is very important for the introduction of the digital media into the classroom. Through specific practice and practice after a comprehensive analysis of the experience, and then better analysis of the problems and effectively solve the problem. We have to understand that the introduction of digital media into the classroom is not only a simple technical use, but a new integration of technology and art. The application of digital media art in the classroom there are a lot of content is worth us to explore, the ultimate goal is to make the teaching of amplification are no longer boring, the course has its own personality, let the students give full play to their imagination, cultivate students’ sense of team, further enhance the self-confidence of students, the maximum extent improves the students’ interest in learning. As an advanced tool and commonly used means of art design, digitization technology enables designers to better play the creative ability of design, and make the design creation more vivid through the ingenious performance of digitized technology. At the same time, the practice of basic knowledge and the practice and innovation of design thinking cannot be ignored. Only by combining the base of painting with the digital technology can the design road of a designer go longer and more durable. Acknowledgements This paper is one of the phased achievements of the key project of Sichuan Education Department in 2015 (15ZA0352).
References 1. Allen, J. 2005. Digital media in architectural design education: Reflections on the e-studio pedagogy. Art Design & Communication in Higher Education 4 (3): 205–222.
Analysis of Digital Media Art Teaching Innovation Based …
1885
2. Chen, L. 2005. Digital media design and development of graphic design education. Art & Design. 3. Chang, L. 2017. The discussion about the characteristics and influence of digital media art design. International Conference on Education, Management and Computing Technology. 4. Ford, K. 2010. The pool model: Foregrounding an alternative learning and teaching approach for digital media design in higher education. Art 9 (1): 57–73. 5. French, K. 2010. The pool model: Foregrounding an alternative learning and teaching approach for digital media design in higher education. Art 9 (1): 57–73. 6. Ham, Y., and X. Li. 2012. An analysis on the dynamic design of e-books of digital information media in present China. International Conference on System Science, Engineering Design and Manufacturing Information, IEEE 1: 93–97. 7. Hon, S. 2010. New media art and design in digital age. Art & Design. 8. Jogjakarta, M. 2011. Btu and school of planning and media design is funded by Edu as a partner in the art line project bleeding institute of technology is a partner in the south Balti cross-border cooperation prong. 9. Hostler, S.C. 2011. Integrating Mathematics, theory and creativity: Visualizing proportional structures in digital media. Design Collection 3: 279–292. 10. Ken, H.U., and G.I. Polytechnic. 2016. Research on the reform of art design personnel training mode in higher vocational colleges—Taking digital media art design specialty as an example. Journal of Guangdong Industry Technical College. 11. Knight, J., and M. Subroutine. 2002. Understanding the user: Research methods to support the digital media designer. Research Issues in Art. 12. Moe, Y., L. Geo, and J. Huang. 2016. Application of digital media art in architectural decoration design in industrial 4.0 era. International Conference on Arts, Design and Contemporary Education. 13. Satsuma, Y. 2004. Formation of a communication tool using digital median computer design exercises and considerateness: Withe view-to a next-generation communication tool. Art as Bulletin of Jakarta University of Art & Design 17: 135–144. 14. Sue, Z.Y. 2017. The characteristics of the digital media art design and the impact on the traditional art design. Journal of Shandong Agriculture & Engineering University. 15. Thang, Y. 2016. Application of digital media art in exhibit design. International Education, Economics, Social Science, Arts, Sports and Management Engineering Conference.
Application of Big Data Intelligent Algorithms in Enterprise Security Risk Control Xiaogang Gong, Wei Ye, Yaqiong Guo and Chao Chen
Abstract The daily production and life of the people are producing much data, and the speed is getting faster, which marks the formal arrival of the big data age. At present, China is accelerating the information construction in various fields. With the advancement of the construction process, the demand for information security guarantee is becoming more important. But many people think that information security can be solved as long as technology is guaranteed. However, with the construction of information security risk assessment system, the evaluation process and evaluation contents have been constantly improved, but it still lacks a scientific method of assessment, and the assessment tools are not mature enough. So the problems in the actual application of the assessment are still serious. In this context, the research focus of this paper is the periodic assessment model of risk. Machine learning methods are used to automatically identify threats in the network. Risk measurement based on VAR and quantitative model of complex risk are proposed in this paper. Keywords Big data · Network risk · Automatic identification · Risk control
1 Introduction In the background of the present big data age, the network and information security problems are becoming more prominent, and they are faced with a variety of attacks. Such as APT attacks and ZeroDay attacks, which causes information security events emerge in an endless stream [1]. Such results reflect the existence of two aspects of the current security technology means [2]. First, the architecture of the information security standards determines the diversity and size of the data, but the data analysis capability fails to match it. Second, the new means of attack are constantly emerging. The traditional [3–5] method of analysis cannot adapt, and cannot quickly make decision and response [6]. The above two problems make it important for many enterprises to optimize and transform existing data structures, and enterprises begin to X. Gong (B) · W. Ye · Y. Guo · C. Chen State Grid Zhejiang Electric Power Corporation Information and Telecommunication Brach, Hangzhou, China e-mail: [email protected]; [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_223
1887
1888
X. Gong et al.
pay more attention to the application value of security data. The so-called information security risk is mainly a process that affects the event or the event will cause harm to the information [7]. Based on the IS security level, risk management mainly includes identifying the factors that will cause harm to the information, understanding the confidentiality and integrity of the information, identifying the factors in time, and taking measures to deal with them in time [8, 9]. Table 1 list some threats that IS may face. The report of the Seventeenth National Congress of the Communist Party of China mentioned that it is necessary to develop information and realize the common development of information and industrialization. Informatization is conducive to the development process of industrialization, and industrialization helps to become increasingly mature in information technology. By the wider application of information, new industries are emerging, thus promoting the development of our economy. In recent years, China’s information technology is improving and information technology is widely used. Many enterprises and institutions are constantly improving their information system, that is, IS, and with the help of information technology, the work efficiency has been further improved. With the continuous development of our society, the network and information system have a stronger basic and global nature, which profoundly affects the process of social development in our country. Table 1 Some threats that IS may face Threats (including threat sources)
Describe
Accidental release
Unauthorized or accidental disclosure of classified, private, or sensitive information
Natural behavior
All natural disasters (earthquakes, hurricanes, fires) that can affect systems and applications. These potential threats may lead to power outages, thereby affecting availability
Software changes
Deliberately modifying, inserting and deleting an operating system or application system program, threatening the confidentiality, availability, and integrity of the system resources, programs, and data
Occupancy bandwidth
Using communication bandwidth intentionally or unintentionally
Electronic interference and destruction
Cause denial of service or data change
Intentional modification of data
Deliberately modifying the data of the processing system, affecting the confidentiality, integrity, and availability of data processing and storage
System configuration error
Unintentional configuration errors occur when the soft, hardware, communication devices, or operating environments are installed or upgraded
Communication failure/interruption
Errors in communication links or communication units that cause data transmission interruption between remote computer terminals
Application of Big Data Intelligent Algorithms …
1889
2 Risk Cycle Assessment Model The risk of network security appears at any time with complex characteristics. When danger is found, the danger to the network will be greatly reduced, but new dangers will emerge [10]. It is due to the high dynamic and evolutional nature of the risk that the risk assessment must be sustained and periodic [11, 12]. Therefore, based on the traditional risk assessment method, we put forward the risk periodic evaluation model shown in Fig. 1. The so-called evaluation cycle includes 2 stages, the first is the observation period, and the second is the evaluation period. Through the evaluation results obtained by the model, the organization can take timely measures to prevent risks and solve risks. In the observation period, whether the network function or the operation state of the network service is relatively normal [13, 14]. In recording network access behavior, the professional data acquisition software and the audit function of network service are used. Before the observation period, it is necessary to assess the level of risk in the cycle and adjust the length of the observation period according to the results. The length of the observation period is Ci, and i is the i-th evaluation cycle, and the risk of this period is Ri. All the suspicious events found in this cycle are Si, and the following relationship is drawn: F: R × R→R, Ci = F(Ri−1, Si). If the Ri in the last cycle is relatively high, or the Si is relatively large, then the events in the observation period should not be too long. If the Ri in the last period is relatively low, the network running state is relatively stable, so the observation period can be longer (Fig. 2). Fig. 1 Risk cycle assessment model
1890
X. Gong et al.
Fig. 2 Big data intelligent
3 The Construction of Network Risk Automatic Identification System The most important of risk management and control in information system is to identify the risks in the system. As the recognition system is relatively fragile, the threat will use this shortcoming to attack the business target when it is damaging to the organization’s information system. So the most important thing is to identify the vulnerability and the threat of the system. A case of network intrusion threat is introduced, and statistical learning method is used to identify the threat of network intrusion. Intrusion detection needs to distinguish between normal data and abnormal data in the system. Identification of information system intrusion detection is a very complex problem. It has the characteristics of large data volume, linear inequalities and high dimensions. At the same time, intrusion data has strong dynamics, which requires administrators to quickly identify the response, so the number of samples obtained is relatively small. Based on small sample learning, SVM algorithm is extended, which is a classifier design method. It is mainly used to collect small sample data, but this method is not sensitive to data dimension. At the same time, the SVM method can estimate the density and find the outlier, that is, the unsupervised anomaly detection can be carried out in the uneven data set. Therefore, in the field of intrusion detection, the SVM method is mainly used to design classifiers in highdimensional heterogeneous data sets. This method can be widely applied in intrusion detection field.
Application of Big Data Intelligent Algorithms …
1891
3.1 Distribution and Representation of Experimental Data The learning of the intrusion detector needs to establish a prediction model, so as to analyze whether the data is normal or abnormal. In 1999, the KDD competition was applied to evaluate the intrusion detection system, and the benchmark data set was obtained. The information set was widely applied in validating the performance of intrusion detection algorithm. This data set is also used in this study.
3.1.1
Test Data Distribution
A connection is a TCP packet, which is also the flow of the source IP and destination IP under the corresponding protocol from the beginning to the end of this period. Each connection is divided into normal or attack, and each connection records about 100 bytes. The main four types of attack are the following: DoS R2L U2R
denial of service attacks, such as: SYN Flood; unauthorized access from a remote host, such as: guessing passwords; unauthorized access to local super user rights, such as various types of “buffer overflow” attacks; Probing monitoring and other spying behavior, such as: port scan. It is worth noting that the test data and the training data are different in the probability distribution. Some of the data in the test data do not belong to the training data, and the range of the test data is larger, which is more in line with the actual situation. Some intrusion transfer points out that many of the new attacks that are now emerging are developed under known attacks. By analyzing the characteristics of known attacks, new attacks can be found in time. There are 24 types of attacks in the data set, and 14 of the test data are added. 4 types of attacks in the original data are DoS class attacks. Table 2 shows the specific distribution. The original data is about 100 bytes per record, with a total of about 5 million connection records, including normal traffic and many types of attack. Table 2 Test data categories and distribution Category
Training data
Training data distribution (%)
Test data
Test data distribution (%)
Normal
97276
19.6908
60594
19.4813
Prob
4108
0.8316
4165
1.3397
DoS
391457
79.2389
229852
73.9001
U2R
53
0.0101
229
0.071
R2L
1125
0.2276
16188
5.204
Total
494019
100
311028
100
1892
X. Gong et al.
It is necessary to preprocess due to too much data is in the original data set. Table 2 shows the use of the original proportional sampling method in the construction of experimental data sets.
3.1.2
Definition of Classification Performance Evaluation Index
First, whether it is the training data or the test data, it needs to be converted to SVM data to be used. Second, training data sets are trained for support vector machines. Third, test data sets are used when testing. When describing the performance of a classifier, there are the following indexes: True positive True negative False positive False negative
normal samples are marked as normal abnormal samples are marked as exceptions normal samples are classified as abnormality abnormal samples are classified as normal.
Assuming that E1 is normal and E2 represents an exception, the above concept can be represented as Table 3. If t indicates that the classification is correct, tp represents the number of normal samples under the classification, and tn represents the number of error samples. If f represents a classification error, fp represents the normal number of samples under the classification, and fn represents the number of erroneous samples. The indicators that define the performance of a classifier are as follows: Accuracy =
t p + tn t p + tn + f p + f n
When intrusion detection is in practice, compared to true negative rate and true positive rate, we will pay more attention to the failure of the event, or report the normal event as an exception. Therefore, in addition to the use of the above indicators, there is a need for the following definitions: f alse positive rate: FPR =
fp tp + f p
It indicates the proportion of the number of normal samples being misreported as an abnormal sample to the normal sample number. Table 3 Classifier performance description Obtained result of correct result of classification
Correct result of classification E1
E2
E1
True positive
False negative
E2
False positive
True negative
Application of Big Data Intelligent Algorithms …
1893
f alse negative rate: FNR =
fn f n + tn
It indicates the proportion of abnormal samples of erroneous classification to total number of abnormal samples.
3.2 Experimental Results and Analysis 3.2.1
Data Classification Results of KDD
The normal and abnormal data are divided into two categories shown in Table 4, and then the test data are divided into three groups: The classification results are shown in Table 5. The results of the experiment can be found that the SVM method is used in the classification of data, and the accuracy is higher.
3.2.2
Experiment on Intrusion Detection in Local Area Network
The author carries out intrusion detection in a small LAN of a company, which consists of three parts: the first is the internal file server. Second is the web server. Table 4 Test data Category
Training data
Normal Abnormal
Test data
97276
60594
Prob
4108
4165
DoS
391457
229852
U2R
53
229
R2L
1125
16188
Total
494019
311028
Table 5 Test data classification results Group number
Data category
Test data
fp
fn
Accuracy
FPR
FNR
First group
Normal
20196
688
282
97.25
3.5%
1.84%
Abnormal
15191
Second groups
Normal
20197
820
355
96.67
4.07%
2.34%
Abnormal
15191
Normal
20197
788
263
97.02
3.91%
1.725%
Abnormal
15191
Third groups
1894 Table 6 Simulated four attacks
X. Gong et al. Attack category
Attack name
Service type
Effect
DoS
SYN flood
TCP
Consume host resources
Smurf
ICMP
Consume bandwidth resources
Ipsweep
ICMP
Confirm the host running
Satan
Varied
Obtain system vulnerability
Prob
The third is the mail server. We collect the original data traffic of the LAN within three weeks, and 4 of the attack behavior data are shown in Table 6. There is a total of the original data of 500 M. Part of them is used as the training data and the other part is used as the test sample set. The data format used in the DARPA intrusion detection and evaluation project in 1999 is used to convert all the network data to the format that the SVM classifier can handle. The data in the training center are manually annotated, and the following are the processed data: (0,tcp,http,SF,224,1658,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,18, 18,0.00,0.00,0.00,0.00,1.00,0.00,0.00,91,255,1.00,0.00,0.01,0.04, 0.00,0.00,0.00,0.00,normal).
4 Conclusion This paper uses many theories and methods in the process of research, such as risk management and learning methods. After studying the theory seriously, the quantitative model of complex risk and the model of risk periodic evaluation are put forward. The statistical learning method is used to identify the risk, and the RAR method is used in the process of risk quantification. The use of the above methods realizes the dynamic automatic identification of the risk, and realizes the quantification of the risk. The theory of research is applied to practice, and it is pointed out through the analysis of the case of the information system and the related research data, the models and methods mentioned in this paper are both highly scientific and effective, which lays the foundation for developing effective information security decisions.
Application of Big Data Intelligent Algorithms …
1895
References 1. Werner, P.O. Jueptner, Thomas M. Kreis, Ulrike Mieth, et al. 1994. Application of neural networks and knowledge-based systems for automatic identification of fault-indicating fringe patterns. Proceedings of SPIE—The International Society for Optical Engineering 2342: 16–26. 2. Jueptner, W.P.O., T.M. Kreis, W. Osten. 1994. Application of neural networks and knowledgebased systems for automatic identification of fault-indicating fringe patterns. In International Conference on Interferometry—International Society for Optics and Photonics: 16–26. 3. Papi, F., D. Tarchi, M. Vespe, et al. 2014. Radiolocation and tracking of automatic identification system signals for maritime situational awareness. Radar Sonar & Navigation Iet 9 (5): 568– 580. 4. Pillai, B.R., A.S. Kumar. 2008. A real-time system for the automatic identification of motorcycle—Using artificial neural networks. In International Conference on Computing, Communication and Networking, IEEE: 1–6. 5. Yang, H., J.M. Garibaldi. 2015. A hybrid model for automatic identification of risk factors for heart disease. Journal of biomedical informatics 58 (Suppl): S171. 6. Bigan, C. 2002. A system for neural networks detection and automatic identification of EEG epileptic events, IET: 13/1–13/4. 7. Ziolkowski, V., Ivan N.D. Silva, R.A. Flauzino. 2007. Automatic identification of faults in power systems using neural network technique. IEEE International Conference on Control Applications: 813–818. 8. Djenouri, Y., A. Bendjoudi, and M. Mehdi. 2015. Gpu-based bees swarm optimization for association rules mining. The Journal of Supercomputing 71 (4): 1318–1344. 9. Castelli, M., L. Manzoni, and L. Vanneschi. 2017. An expert system for extracting knowledge from customers’ reviews: The case of Amazon.com, Inc. Expert Systems with Applications 84: 117–126. 10. Bayindir, R., I. Colak, and G. Fulli. 2016. Smart grid technologies and applications. Renewable and Sustainable Energy Reviews 66: 499–516. 11. Ebesu, T., and Y. Fang. 2017. Neural semantic personalized ranking for item cold-start recommendation. Information Retrieval Journal 20 (2): 109–131. 12. Fang, H., J. Zhang, and Y. Bao. 2013. Towards effective online review systems in the chinese context: A cross-cultural empirical study. Electronic Commerce Research and Applications 12: 208–220. 13. Andrea, A., F. Ferri, P. Grifoni, and T. Guzzo. 2015. Approaches, tools and applications for sentiment analysis implementation. International Journal of Computer Applications 125: 26– 33. 14. Leiva, J., A. Palacios, and J. Aguado. 2016. Smart metering trends, implications and necessities: A policy review. Renewable and Sustainable Energy Reviews 55: 227–233.
Application of Network Cloud Resources in College English Listening Class Ning Ding
Abstract In the traditional college English listening class, there are few applications of network resources, and the improvement effect of students’ listening level is poor. Therefore, the application of network resources in college English listening class is studied. Select listening teaching materials through Krashen’s input hypothesis. According to the characteristics of the selected listening teaching materials, the listening teaching strategies are established from the perspectives of teachers and students. According to the advantages of network resources, teaching strategies are put into practice, and listening teaching process is designed in three steps: introduction, sorting and output. Realize the application of network resources in college English listening class and complete the application method design. The validity of the design method is demonstrated experimentally. The experimental data show that the design method enables the network resources to be widely used in college English listening classes, which can improve the students’ listening ability by 4% more than the traditional method, and has high effectiveness. Keywords Network resources · College English · Listening class · Applied research
1 Introduction The purpose of English language teaching is to cultivate the students’ oral and written application skills, which are the five abilities of listening, speaking, reading, writing and translating. And the listening and speaking ability is an important sign to measure a student’s English application ability. According to one statistic, the practice of language in daily life is as follows: listening accounts for 45%, speaking for 30%, reading for 16% and writing for 9% [1]. It can be seen that listening plays an important role in language teaching. On the other hand, with the advent of the information age, computer-centered multimedia, network technology and information technology have become the commanding heights of education reform. The teaching goal of N. Ding (B) Xi’an Conservatory of Music, Xi’an 710061, Shaanxi, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_224
1897
1898
N. Ding
college English is to cultivate students’ comprehensive English application ability, especially listening and speaking ability. We should make full use of the opportunity brought by the development of multimedia and network technology and adopt the new teaching mode to improve the original single classroom teaching mode which is mainly taught by teachers. The new teaching mode should be supported by modern information technology, especially network technology, so as to make English teaching develop towards personalized learning, active learning without time and place limitation [2]. The new teaching model should reflect the principle of integrating English teaching with practicality, culture and interest, and fully mobilize the enthusiasm of both teachers and students. In particular, it should establish the main role of students in the teaching process. Therefore, it is inevitable to apply network resources to listening teaching, which is also a great challenge to traditional listening teaching methods and methods. The use of network resources to assist college English listening teaching has changed the original listening teaching methods to some extent, led to the reform and renewal of English listening teaching methods, and promoted the transformation of listening teaching thoughts, the adjustment of listening teaching objectives, the updating of listening teaching contents and the study of listening teaching methods [3]. However, in the traditional college English listening class, the application of network resources is usually rigid and difficult to mobilize students’ interest in learning. It not only fails to achieve the expected effect, but also disrupts the pace of the class, resulting in adverse effects. In view of the above problems, this paper studies the application of network resources in college English listening class, designs the application method of network resources in college English listening class, and conducts experimental demonstration analysis on the effectiveness of this method by simulating the use environment.
2 Application Method Design of Network Resources in College English Listening Class 2.1 Choose Listening Teaching Materials The characteristics of listening materials determine the difficulty of listening, and analyze its characteristics, including the following aspects. Listening materials belong to audio materials, which are fleeting in the ear of the listener. Unlike reading materials, readers can read back at any time. It covers all fields of life, including street chat, proverbs, new people and new things, as well as the situations that are not well known to the learners, and the speaker often changes the topic in the same conversation. Some content, such as news reports, interviews, daily conversations and so on, is so incoherent that the listener can’t predict what the speaker will say next. The phonological features of consecutive, unexploded sounds make it difficult for the listener to distinguish a single word in the stream, even if it is readily familiar on paper.
Application of Network Cloud Resources in College English …
1899
There will be a large number of colloquial words and expressions in the materials of the nature of everyday conversation, such as the use of stuff to express material and so on, and sometimes the expression that does not conform to the grammatical norms, such as the incomplete or cumbersome sentence composition [5]. Listening materials are selected according to the characteristics of listening materials. When choosing the listening teaching materials, we should select the different learning contents of different students strictly, so that the training contents in different stages are cohesive, consolidated, targeted and improved. Listening textbooks should keep up with the pace of the times, the content should be novel, is the information that students are interested in, adjust the interests and tastes of different students. Therefore, in the teaching of listening class, the teacher should prepare the lesson fully, make a reasonable teaching plan, the listening teaching time is fully arranged, the listening teaching material is selected reasonably, the time and mode of listening class are avoided, the teachers and students should interact and create a relaxed and harmonious way through discussion, dictation, reading, guessing riddles and story making. Teachers use explanation, supplement, emphasis and repetition to meet the students’ listening needs, reduce the students’ hearing pressure, and improve the teaching level of listening. Through the above process, we complete the selection of listening teaching materials.
2.2 Establish Listening Teaching Strategies According to the characteristics of selected listening teaching materials, the strategies of listening teaching are established from two perspectives: teachers and students. The listening teaching strategies are shown in Fig. 1. Teachers play a leading role in the teaching process. We should formulate teaching plans on the whole, select and determine relatively suitable teaching methods, implement teaching plans according to the actual situation, evaluate the teaching effect and take remedial measures. In order to make teachers grasp the whole teaching process, the planning strategy, evaluation strategy and reinforcing-remedial strategy are designed. Operational strategy means that in teaching practice, teachers should formulate practical teaching plans according to the principle of gradual learning, combining the characteristics of students and learning content. Operational strategy is divided into macro-plan and micro-plan. Macro planning strategy refers to the formulation of a course’s overall teaching plan or unit plan, teaching purpose, teaching steps, teaching focus, teaching evaluation methods, etc., which has the purpose, objectivity, integrity, unity and certain flexibility.
1900
N. Ding
Fig. 1 Teaching strategy classification
2.3 Design the Listening Teaching Process The teaching strategy is put into practice, which is divided into three steps: introduction, sorting and output. The teaching design is shown in Fig. 2. Fig. 2 Teaching process design
Application of Network Cloud Resources in College English …
1901
Fig. 3 Cloud network resources
As the network resources are conducive to hearing matting and perception, the lead-in link design is completed by using the network resources. Teachers can choose understandable and authentic language materials from textbooks, radio, television, movies, English songs, Internet and real life. In view of the obstacles that may cause difficulties in understanding, the obstacles in language and background knowledge are removed in advance, and meaningful and reasonable tasks are designed, with the help of words and words. Related pictures, charts, text, video, or cultural background knowledge, guide the students to predict the meaning of the hearing material according to the headlines, topics or the clues provided, and combine visual and listening to help students understand the instructions of the task and enter the language situation as soon as possible (Fig. 3).
3 Experimental Demonstration and Analysis In order to ensure the validity of the application method designed in this paper, the validity of this method is demonstrated and analyzed by design experiments. In the course of the experiment, teachers of the same level of teaching will use the design method of this paper and the traditional listening teaching method respectively to teach English listening to students of the same learning level. Taking the improvement of listening level of the two groups of students as the experimental subjects. Due to the gradual progress of learning itself, the experimental time was set at 6 months to obtain clearer experimental results. The improvement of English listening level of students after 6 months of teaching experiment was recorded and the experimental results were observed.
1902 Table 1 Results of students’ listening proficiency test
N. Ding Content
Value
Average score
Statement dictation
20
11.4
Statement comprehension
20
13.8
Conversation comprehension
20
12.3
Passage comprehension
20
11.1
Spot dictation
20
13.9
Total score
100
62.5
3.1 Data Preparation In order to ensure the accuracy of the experimental results, the experimental variables are controlled. This paper tests the validity of the application method of network resources in college English listening class. It is necessary to control the teaching level of the teachers themselves and the learning and acceptance ability of the students who receive teaching, and other variables other than teaching methods, so as to prevent interference with the accuracy of experimental results. In order to prove the effectiveness of the teaching method designed in this paper, a comparative experiment was carried out and a control group was selected. In order to get the result of improving students’ listening ability, before the experiment, students’ listening ability was tested by randomly selecting test papers from the latest college English test band 4 [10]. The test results are shown in Table 1.
3.2 Comparison Test Results A comparative experiment was set up and different teaching methods were used for college English listening teaching. After 6 months of continuous teaching, the listening level of students was tested again. The improvement of listening level of the two groups of students was recorded respectively. The test results are shown in Table 2.
4 Conclusions The application method of the network resources designed in this paper in college English listening class has been proved by experiments that it can effectively improve students’ English listening level and is highly effective.
Application of Network Cloud Resources in College English …
1903
Table 2 Results of students’ listening proficiency test after half a year Content
Value
The average score of the designed in this paper
The average score of the traditional method
Statement dictation
20
12.0
11.7
Statement comprehension
20
14.9
14.4
Conversation comprehension
20
13.3
12.5
Passage comprehension
20
12.3
11.6
Spot dictation
20
14.3
14.1
Total score
100
66.8
64.6
References 1. Yong, Lin. 2017. A review of web-based English listening research. Journal of Sichuan International Studies University 33 (5): 150–155. 2. Zheng, Wang. 2017. A study of the framework for the online self-access English center based on learning behavior analysis. China Educational Technology 13 (3): 96–102. 3. Hongjun, Chen, Luo Fuqiang, Zhao Liheng, and Li Yao. 2017. Optimal identification of network resource information loss under large data. Computer Simulation 34 (9): 358–361. 4. Xiuqin, Zhang. 2017. A survey on vocational college students’ autonomous online English learning—Analysis of the survey data based on non-English majors in Jiangsu vocational colleges. Vocational and Technical Education 38 (2): 43–46. 5. Amuti, Siyiti, Abudureyimujiang Ruze, Chen Shengguo, and Liu Fengxia. 2018. A questionnaire survey on the effect of online class task of regional anatomy. Chinese Journal of Anatomy 12 (1): 107–108. 6. Yu, Xing. 2017. Analysis of cadets’ English listening ability obstacles and measures of improvement. Journal of Naval University of Engineering 14 (1): 69–73. 7. Beuscart, J., K. Mellet, and M. Trespeuch. 2016. Reactivity without legitimacy? Online consumer reviews in the restaurant industry. Journal of Cultural Economy 9: 458–475. 8. Centeno, R., R. Hermoso, and M. Fasli. 2015. On the inaccuracy of numerical ratings: Dealing with biased opinions in social networks. Information Systems Frontiers 17: 809–825. 9. Ghaderi, A., H. Mohammadpour, and H. Ginn. 2015. High impedance fault detection in distribution network using time-frequency based algorithm. IEEE Transactions on Power Delivery 30 (3): 1260–1268. 10. Abdel, A., Y. Xu, and A. Josang. 2015. A normal-distribution based rating aggregation method for generating product reputations. Web Intelligence 13: 43–51. 11. Lin, C., H. Chen, and Y. Wu. 2014. Study of image retrieval and classification based on adaptive features using genetic algorithm feature selection. Expert Systems with Applications 41 (15): 6611–6621. 12. Ullah, A., and W. Zeb. 2015. The impact of emotions on the helpfulness of movie reviews. Journal of Applied Research and Technology 13: 359–363.
Design of Japanese-Assisted Translation Teaching System Based on Cloud Computing and Intelligent System Jingxian Huang
Abstract In order to improve the ability of Japanese-assisted instruction, a design method of Japanese-aided instruction system based on the theory of second language acquisition is proposed. The system consists of resource information management module, database module and communication module of upper computer. Network transmission control module, bus transmission module and application loading module, etc. The module connection and function control of Japanese-aided instruction system are carried out under the VME bus architecture, and the data storage layer of Japanese-aided instruction is constructed with Eclipse as the development environment. Under the guidance of second language acquisition theory, the software development and design of Japanese-aided instruction system are carried out, and the big data management and resource scheduling of Japanese-assisted instruction are carried out by using embedded database design method. The simulation results show that the Japanese-aided instruction system designed by this method has better artificial intelligence, stronger teaching ability and better ability of Japanese-aided teaching and resource management. Keywords Cloud computing · Intelligent system · Japanese-assisted instruction system
1 Introduction Japanese teaching has always focused on the accumulation of learners’ knowledge. The emphasis of examination and certificate evaluation is also on the vocabulary, grammar mastery and reading ability of Japanese. This leads teachers to ignore the cultivation of students’ communication ability in Japanese. In recent years, the listening comprehension of the Japanese ability examination and the test results of the module of the Japanese comprehensive skills of the Japanese self-examination class taught by us show that the listening ability of the students is quite weak, so the conversational ability closely connected with it can be imagined. Therefore, it is J. Huang (B) School of Foreign Languages, Guizhou Minzu University, Guiyang 550025, Guizhou, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_225
1905
1906
J. Huang
necessary to construct a Japanese-assisted teaching system, to optimize the design of Japanese-assisted teaching system with artificial intelligence analysis method, and to apply the research results of second language acquisition to Japanese teaching practice scientifically. It can promote teachers to explore the rules of learners’ Japanese acquisition, organize the teaching centered on learners, and improve the learning efficiency. It has great significance to study the design method of Japanese-aided instruction system under the guidance of second language acquisition theory [1]. Second language acquisition (SLA), as an independent discipline, began in Europe and the United States in the late 1960s. It mainly studies the nature and process of second language acquisition and foreign language acquisition outside the mother tongue. Krashen, an American linguist, one of the main constructors of second language acquisition theory, put forward the monitor model of second language acquisition in the late 1970s and early 1980s, in which “acquisition-learning hypothesis” is the basis of Krashen’s theory. According to this theory, acquisition and learning are opposite and independent concepts. Learning refers to the second language learners consciously grasp language knowledge through learning language rules and forms. Acquisition means that learners subconsciously acquire the language through extensive exposure and use of the target language. The most fundamental difference between the two is that learning is conscious and acquisition is unconscious. In other words, just mastering the rules is not the same as being able to use the language freely. The rules only serve to monitor whether the statements we produce are correct and do not allow us to express them more fluently; the brain does not think about the language rules when it comes to sentences. But unconsciously blurting out. When expressing in a foreign language, the acquisition of the language can only be assumed if the sentence is unconsciously produced [2].
2 Overall Frame Model 2.1 Description of Development Environment of Japanese-Aided Instruction System Under the guidance of second language acquisition theory, a Japanese-assisted instruction system is constructed [3–6]. Firstly, a network architecture model is constructed. The system is designed under the environment of Internet of things and embedded development, and the top-level design of the teaching system is described globally [7]. In the environment of Internet of things, the network Japanese-aided instruction system is divided into three layers, namely, the perceptual control layer, the network transmission layer and the application service layer, in which the perceptual control layer is based on the sensor device. Radio frequency identification (RFID) and multimedia sensing technology are used to collect information of teaching resources, and wireless ad hoc network technology and cooperative information
Design of Japanese-Assisted Translation …
1907
processing technology are used to control the network of Japanese-aided teaching system, and the middleware of online network control is constructed [8]. The architecture of Japanese-assisted instruction system under the guidance of second language acquisition theory is constructed through the low-speed and medium-high speed network transmission technology. The open service access interface and the network control interface are used to manage the information of Japanese-aided teaching resources. In the information transmission layer of Japanese-assisted teaching resources, a heterogeneous network, a mobile communication network and a campus network are established for Japanese-assisted teaching resource information transmission, and the data transmission control of Japanese-assisted teaching resources is realized through the network support layer [9]. Achieve high energy efficiency, accuracy, reliability of Japanese language teaching resources transmission and control. Under the guidance of second language acquisition theory, the Japanese-assisted instruction system adopts the model view software development mode based on browser/Server structure to realize the resource development and business logic control of Japanese-assisted teaching, and define the user behavior in the perception control layer. Combining the C/S and B/S models, the embedded development framework is adopted [10, 11], and the Japanese-aided teaching resources are searched and queried in all directions. Based on the above analysis, the three-tier architecture of the Japanese-assisted instruction system under the guidance of the second language acquisition theory designed in this paper is shown in Fig. 1. Under the guidance of the theory of second language acquisition in Fig. 1, the teaching control platform and communication control module of Japanese-aided instruction system are constructed based on TCP/IP protocol and C/S model. Under the guidance of the second language acquisition theory, the system carries on the remote control of the teaching platform. The network transmission layer of the system
Fig. 1 Cloud computing system
1908
J. Huang
takes the campus network and the local area network as the media to carry out the remote transceiver control. Under the guidance of second language acquisition theory, the optimal control design of Japanese-assisted instruction is realized. The VGA input and output control of multimedia teaching equipment is used to control the remote multimedia teaching in Japanese-assisted teaching. Improve the multimedia control ability of Japanese-aided teaching.
2.2 Description of Development Environment and Analysis of Function Structure Japanese-aided instruction system is composed of resource information management module, database module, host computer communication module, network transmission control module, bus transmission module and application program loading module. The module connection and function control of the Japanese-aided teaching system are carried out under the VME bus architecture. In the service ability layer of interface access, the Japanese-aided teaching system is mainly composed of information collection unit and information storage structure of teaching resources [12]. The QoS management of Japanese-assisted instruction is realized by adopting a heterogeneous and hierarchical network architecture, and the functional modules of Japanese-assisted instruction system are obtained as shown in Fig. 2.
3 Algorithm Design of Japanese-Aided Instruction In order to mine Japanese teaching resources in Japanese-aided instruction system, data structure analysis and data fusion preprocessing are needed. This paper studies that the Japanese-aided instruction system is a multi-media distance teaching system under the cross-platform network environment [13]. The constructed Japanese-aided instruction system supports the users to realize the Japanese-aided teaching in any terminal. The data distribution structure of the Japanese-aided instruction system under the cross-platform network application support layer is given as an undirected graph model, and the data distribution chart model of the Japanese-aided instruction system is represented in Fig. 3. Assuming that the length of the information flow vector in the embedded Japaneseaided instruction system database is N, sampling and extracting, in the Japanese-aided instruction system, the local outliers produce cross-type data sets. The information flow model of local outliers in Japanese teaching resource mining is expressed as follows: wu,v Dw (S) =
u,v∈S
|S| × (|S| − 1)/2
(1)
Design of Japanese-Assisted Translation …
1909
Fig. 2 Functional modules of Japanese-aided instruction system
Fig. 3 Data distribution structure model of Japanese-aided instruction system
9 0.51
11 3
0.48
10
0.53
6 0.52
2
0.69 0.74
0.65
v
8
0.49 0.51
0.75
1
4
0.48
7
0.62
5
where, wu,v represents the weights between u and V in the network cluster nodes of the Japanese auxiliary teaching system, and /S/refers to the number of intersection points of the data feature in the undirected graph S. In the two-dimensional projection plane, the Japanese teaching resources in the Japanese-aided teaching system are decomposed with probability features to satisfy the requirements:
1910
J. Huang
b j = a j ⊕ parit y(z)
(2)
D − Kjkkk ] is the nonlinear time series of Japanese Set rk (v + 1) = [ Fk (v+1)+V k (v+1) teaching resources in the Japanese-aided instruction system, and the mother wavelet of data sampling be recorded as parit y(q p (z)). When the Japanese teaching resource x(k) = s(k) + w(k) is quasi-stationary and random information flow is obtained in the Japanese-aided teaching system, in the reconstructed high-dimensional phase space, the higher-order moment features of the Japanese teaching resources in the Japanese-assisted instruction system are extracted [14, 15], and the optimization design of the Japanese-assisted instruction system under the guidance of the second language acquisition theory is carried out with the big data mining method. The distribution of multimedia information in Japanese-assisted instruction is obtained as follows: N −1 k (3) pk = p2D (1 − p2D ) N −1−k , k = 0, 1, 2, . . . , N k
The characteristic data information fusion matrix X(i) is divided into p(i) subspace matrix Ni j × m in the design of Japanese-aided instruction system, and the mean-variance function of the distribution of Japanese-assisted teaching resources is obtained. F f itness
m 1 = ( f i − yi )2 m i=1
(4)
The data management in Japanese-aided instruction system is designed, the distributed database model is constructed by using cloud storage technology, and a large amount of cloud data is integrated in the distributed database. In order to improve the accuracy and efficiency of data mining, it is necessary to optimize the structure of cloud data in distributed database in Japanese-aided instruction system. The phase space reconstruction method is used to decompose the high frequency components and attenuation characteristics of the Japanese teaching resource flow information. The expressions are shown as follows: fˆiq (t, τ ) =
q/2 1 bk φ(t + ck τ ) 2π τ k=−q/2
(5)
The big data mining and resource scheduling of Japanese-aided instruction system are realized by using the above algorithm design.
Design of Japanese-Assisted Translation …
1911
4 Experimental Test Analysis Under the guidance of second language acquisition theory, the application test of Japanese-assisted instruction system is based on the activity Group software simulator, which integrates software simulator, hardware simulator and program development function. The program compiling software of Japanese-aided instruction system is developed by using the Simulator program of Visual DSP, and the cross compiler of Japanese-aided instruction system is run on DSP hardware. The running effect of the Japanese-aided instruction system designed in this paper is analyzed. The robustness test curve of the system is shown in Fig. 4. Figure 4 shows that the system designed in this paper is robust to Japanese-aided instruction. The resource scheduling performance of Japanese-aided instruction system is further tested, and the results are shown in Fig. 5. Figure 5 shows that the resource scheduling performance of this method is good and the accuracy of big data mining is high. Fig. 4 System performance testing
Proposed method Literature [6] method
Robust feature/dB
10 9 8 7 6 5 4
0
20
40
60
80
100
120
140
160
Fig. 5 Comparison of resource scheduling performance of Japanese-assisted instruction
Resource scheduling accuracy/%
System processing scale/Gbit
Reference [6] 70
Proposed method
60 50 40 30 20
0
10
20
30
40
50
Iterations
60
70
80
1912
J. Huang
5 Conclusions In this paper, a design method of Japanese-aided instruction system based on the theory of second language acquisition is proposed. The system consists of resource information management module, database module and communication module of upper computer. Network transmission control module, bus transmission module and application loading module, etc. The module connection and function control of Japanese-aided instruction system are carried out under the VME bus architecture, and the data storage layer of Japanese-aided instruction is constructed with Eclipse as the development environment. The higher-order moment features of the Japanese teaching resources in the Japanese-assisted instruction system are extracted, and the optimization design of the Japanese-assisted instruction system under the guidance of the second language acquisition theory is carried out by combining the big data mining method. The simulation results show that the Japanese-aided instruction system designed by this method has better artificial intelligence, stronger teaching ability and better ability of Japanese-aided teaching and resource management. This method has good application value in Japanese-aided teaching design.
References 1. Bartolini, N., T. Calamoneri, T.F. la Portat, et al. 2011. Autonomous deployment of heterogeneous mobile sensors. IEEE Transactions on Mobile Computing 10 (6): 753–766. 2. Lin, T.Y., H.A. Santoso, and K.R. Wu. 2015. Global sensor deployment and local coverageaware recovery schemes for smart environments. IEEE Transactions on Mobile Computing 14 (7): 1382–1396. 3. Palomares, I., L. Martinez, and F. Herrera. 2014. A consensus model to detect and manage non-cooperative behaviors in large scale group decision making. IEEE Transactions on Fuzzy Systems 22 (3): 516–530. 4. Wang, J., M. Li, J. Chen, and Y. Pan. 2011. A fast hierarchical clustering algorithm for functional modules discovery in protein interaction networks. IEEE/ACM Transactions Computational Biology and Bioinformatics 32 (11): 607–620. 5. Kabalci, Y. 2016. A survey on smart metering and smart grid communication. Renewable and Sustainable Energy Reviews 57: 302–318. 6. Schleich, J., C. Faure, and M. Klobasa. 2017. Persistence of the effects of providing feedback alongside smart metering devices on household electricity demand. Energy Policy 107: 225– 233. 7. Diamantoulakis, P., V. Kapinas, and G. Karagiannidis. 2015. Big data analytics for dynamic energy management in smart grids. Big Data Research 2 (3): 94–101. 8. Irfan, M., J. Iqbal, A. Iqbal, and Z. Iqbal. 2017. Opportunities and challenges in control of smart grids–Pakistani perspective. Renewable and Sustainable Energy Reviews 71: 652–674. 9. Kaneko, H. 2017. A new measure of regression model accuracy that considers applicability domains. Chemometrics and Intelligent Laboratory Systems 171 (2): 1–8. 10. Wang, E. 2015. Benchmarking whole-building energy performance with multi-criteria technique for order preference by similarity to ideal solution using a selective objective-weighting approach. Applied Energy 146: 92–103. 11. Pingkuo, L., and T. Zhongfu. 2016. How to develop distributed generation in China: In the context of the reformation of electric power system. Renewable and Sustainable Energy Reviews 66: 10–26.
Design of Japanese-Assisted Translation …
1913
12. Zhou, L., B. Wang, and J. Jiang. 2017. Predicting the gas-liquid critical temperature of binary mixtures based on the quantitative structure property relationship. Chemometrics and Intelligent Laboratory Systems 167: 190–195. 13. Salem, A., J. Shaffer, and R. Kublik. 2017. Microstructure-informed cloud computing for interoperability of materials databases and computational models: Microtextured regions in Ti alloys. Integrating Materials & Manufacturing Innovation 6 (1): 111–126. 14. Nepusz, T., H. Yu, and A. Paccanaro. 2012. Detecting overlapping protein complexes in proteinprotein interaction networks. Nature Method 33 (14): 471–475. 15. Kai, L.I.U., Z.H.U. Ji-hong, and Y.U. Bo. 2013. Longitudinal control of aircraft with thrust vectoring using robust dynamic inversion. Control and Decision 28 (7): 1113–1116.
Risk Control System of Construction Engineering Based on Data Mining and Artificial Intelligence Technology Wei Rao and Jian Chen
Abstract Cloud computing provides a displaying and sharing platform for data mining technology. In order to prevent privacy disclosure, these data often contain artificially added risk control data, which makes the process of data sharing face the problem of deep mining of data. In terms of privacy protection, construction engineering risk control system is usually through the generalization way to complete the sharing of the accurate data, providing a condition for the follow-up accurate query process. At the same time, it also ensures that these data can be effectively predicted. According to the possible intersection or inclusion relationship between the generalized values, the generalized values are stratified and clustered in order to save the related important information of the construction project risk control. On this basis, this paper uses data mining technology (DMT) to design a construction project risk control system (CPRCS) based on data mining technology. Finally, through theoretical analysis and experimental comparison, this paper demonstrates the feasibility and effectiveness of the system. Keywords Data mining technology · Constructional engineering · Risk control · Privacy protection
1 Introduction Cloud computing is an efficient platform for data sharing and information presentation. Taking data as an analytical object and conducting in-depth research and data mining on it will help to further discover and utilize the potential value of the data, thus significantly increasing the accuracy of prediction results. Given the privacy protection problem of data, these shared data are often artificially added with risk control information [1, 2]. Therefore, if people continue to use the traditional data mining method to mine these data containing risk control information, it will produce obvious inefficiency, and even it cannot mine the effective information content. For a better promotion of the current efficiency of data sharing, it is necessary to find W. Rao (B) · J. Chen Campus Construction Department, Zhongnan University of Economics and Law, Wuhan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_226
1915
1916
W. Rao and J. Chen
a more efficient and reasonable way to mine the risk control data of construction engineering quickly [3]. Since the shared risk control data for construction works process the original accurate data by the generalized way, these data have the same characteristics [4]. Therefore, data information can be analyzed through data mining technology in the process of accurate query of data. Using data mining technology to realize the information mining of risk control system of construction engineering has become an interesting data analysis method, which can be used for fast analysis of a large number of data and can search for value links between different sets of items and data attributes [5, 6]. In this paper, based on data mining technology, the risk control system of construction engineering is studied, and a risk control system based on data mining technology is proposed. The corresponding conditions of minimum confidence and minimum support are set for each generalization value of this system to achieve the purpose of mining data.
2 Data Mining Technology 2.1 Concept of Data Mining In this paper, the data mining is expressed in the form of “X ⇒ Y ”. The attribute set of X is called the generalized identifier (GI), and the attribute set of Y is called “sensitive attribute”. Suppose I = {I1 ,I2 } = {x1 ,…,xn } is a set of items, and at the same time, the following relations are established: I1 ∪I2 = I及I1 ∩I2 = Ø. The data set is denoted by DS = T1 , T2 , . . . , Tn and Ti (i∈[1,n]) represents a specific record, and the this record has a unique identifier which is made up of one item of I1 and several items of I2 . Taking the record (A,B) as an example, its support number is equal to the GI value with A and the simultaneous sensitivity value with B in DS. Therefore, there exist A∈I1 and B⊆I2 . If the support number within (A,B) is greater than or equal to the minimum support number ξ of item A, it is considered that the itemset B has multidimensional characteristics with respect to item A.
2.2 Rules of Data Mining Technology When a list of EGI values is generated, to prevent multidimensional read and write operations on disk, this paper uses the highly compressed tree structure to store all kinds of information about the risk control of construction engineering [7, 8]. At the same time, during the construction of the tree structure, if the corresponding prefix of each record is the same, the prefix item is merged to further reduce the number of tree nodes, and the corresponding support number of the combined item is equal
Risk Control System of Construction Engineering …
1917
to the result of the addition of the support numbers of each item before the merging [9, 10]. Definition 3. Data mining structure: (1) Each descendant node corresponding to root node “root” is UDS multidimensional item; (2) In the structure of the construction tree, there are five domains in the structure except the root node, namely item, f ather , childitemslist and similar nodelink. Among them, count is the number of records contained from the root node to other nodes in the path. item is the value of the node item; f ather is the pointer corresponding to the parent node;childitemslist is the pointer for the child node, and similar nodelink is the pointer for data mining, which has the same EGI value; otherwise, the result is equal to null. (3) In the case of item equaling to EGI, the node is the child node of the root node. In addition, if the node belongs to the sensitive attribute multidimensional item, the node is the descendant of the EGI node, and it conforms to the conditions corresponding to the EGI value and the 1-dimensional item headertable. (4) Each headertable contains two fields: item and head of node-link. This node originally exists in the EGI value’s descendant node, and the above nodes have consistent items. According to the conditions specified in definition 3, the following data mining is done for example 1: The first step is to do a full scan of the UDS, and according to the EGI values, the corresponding 1-dimensional item list is generated, which is arranged in the order in which the number of supports gradually decreases. If other sorting methods are adopted, the correct results will not be obtained. This is because the multidimensional items of this record are all based on the 1-dimensional item descending order list under the condition of EGI value to carry on the data mining. In the last column of Table 2, the sensitive attribute values for medical records are arranged in the order in which the EGI value gradually decreases, in order to help the later discussion process. The second step is to construct the root node of data mining and represent it with “root”. Then, it is needed to scan the UDS again, and then construct the UDS record path for the GI value under each EGI value. If the EGI value is equal to 25–40, it can be regarded as the result of combining the GI value of 25–35 and 30–40. Therefore, it contains records existing in two GI values. For root nodes, a new sub-node A(25– 40:6) is set up, and because the corresponding multidimensional item list c, b, a, g of the prefix of the first two records is different from the prefix of c, b, a, g, two new paths for node A are set up. At the same time, the number of support of each item is set at 1; The multi-dimensional item descending order list c of the third record is the prefix corresponding to the original path c, b, a, g in the A node. In this case, the supporting number of the prefix item should be increased by 1. The multidimensional item descending order list b, a in the fourth record is consistent with
1918
W. Rao and J. Chen
the prefix b corresponding to the original path b of point A, where the number of support for each node of the prefix should be increased by 1, and a new node (a: 1) as a sub-node of (b: 2) should be established. In record 5, the multi-dimensional item descending order list is c, b, a, g consistent with the original path c, b, a, g of point A, so the support numbers of nodes on this path are increased by 1. For the last record, the multidimensional item descending order list c belongs to the prefix in the first path, which also increases the support number of prefix items by 1. 5%. The third step is to build a headertable for each EGI value, where each item corresponds to a 1-dimensional item in turn. At the same time, there is a pointer pointing to this multidimensional item for data mining for the first time. From the above analysis, one can see the following construction data mining process: The 1-dimensional item data under each EGI value condition is obtained by UDS scanning. These data are arranged in the order of numerical decrease. Let Li be the 1-dimensional item descending order list under the condition of the i-th EGI value, and the value range of i is [1, |EGIvalue|], in which |EGIvalue| represents the number of all EGI values. Each record in the UDS is executed according to step 3. Select a record with a GI value equal to O, and when the value O does not generate a new generalization value, it is needed to continue to determine whether there are root nodes of the item equal to O. If no such node is finally determined, new construction is conducted. The multidimensional items are arranged according to the 1-dimensional item descending order list under the value O, so as to obtain [e|E] where e stands for the first item and E for the rest of the item. The calling procedure is insert, tr ee([e|E],0,0). If the value O has a new generalized value N, then on the basis of the above operation, it is needed to further analyze whether there are child node of the item value corresponding to N under the root node. If the result shows that there is no child node, then according to the 1-dimensional item descending order list LN in the case of value N, the multidimensional items corresponding to the record are arranged as [e |E ], where e’ belongs to the first item and E’ represents the list of other items. The calling procedure is insert_tr ee([e |E ], N , N ). According to the data mining methods mentioned above, it is needed to do two scans on UDS: the first scan is to construct the corresponding 1-dimensional item descending order list for each EGI value; the second scan is a data mining process in which the time complexity of inserting a record into the data mining is O (|items|), where |items| represents the number of multidimensional items contained in the record.
Risk Control System of Construction Engineering …
1919
3 Risk Control of Construction Engineering Based on Data Mining Technology Data mining technology is the key step of construction engineering risk control. This paper uses data mining technology to mine CPRCS. Property 1. Similar nodes have interconnection properties. With any EGI value qj and any multidimensional term fi , the traversal process begins with the header pointer to item fi in qj . It terminates upon arrival of an item in which similar nodelink is equal to null, obtaining various multidimensional patterns containing fi . This feature can be obtained directly during data mining. For data mining, all kinds of patterns associated with fi can be obtained by traversing the pointer corresponding to the internal term fi of header table of qj once. The case of a E G I value equal to 25 ~ 40 is also used as an example to analyze how to mine the control information of construction engineering from the data mining process in Fig. 1. The risk control data {(g: 2)} corresponding to node g and the specific path c : 4, b : 2, a : 2, g : 2 associated with this data mining are derived. Here, 2 means there are two times of existence of the string ““(c, b, a, g)”“, and four times of c, but only two times of co-existence with g. Because it is only necessary to analyze the path of co-occurrence with g, the inclusive path is denoted as c : 2, b : 2, a : 2, g : 2. The prefix path “{{c: 2 b: 2 A: 2}}”, which contains the path, is expressed as “. G”. The prefix path of g is c : 2, b : 2, a : 2, g : 2, which
Fig. 1 Data mining diagram
1920
W. Rao and J. Chen
Fig. 2 Construction engineering management
belongs to the conditional pattern base of g. Considering that only one prefix path exists at this time, mine (c : 2, b : 2, a : 2|g) can be called directly (Fig. 2). For node a, the construction engineering risk control data {a: 3)} and two inclusive paths are derived. Although g and a appear together in a certain path at this time, information about g has been obtained during the previous analysis, so no further analysis of g is required here. Similarly, the a obtained in the previous analysis has a prefix path“{(c : 2, b : 2), (b : 1)}”. When the condition of the existence of several prefix paths is encountered, each item in the prefix path should be combined with this node in turn to obtain a new itemset, and when the new itemset has multidimensional properties, the path it contains should be found from all the correction paths. Then, recursion is conducted on it, and the prefix path is judged. The concrete process is first to derive the construction engineering risk control data {(ba : 3), (ca : 2)} and the prefix path “{(c : 2)}”of ba. Finally, the construction engineering risk control data containing a are obtained as {(a:3),(ba:3),(ca:2),(cba:2)}.
4 Experiment In order to compare the performance difference between CPRCS system and traditional building engineering risk control systems of FP-growth and Aprior, the simulation environment for the above three algorithms is constructed in this experiment.
4.1 Experimental Data and Algorithm Environment All three-construction engineering risk control systems, CPRCS, Aprior and F P − gr owth are implemented in a single XP system with a processor condition of
Risk Control System of Construction Engineering …
1921
2GHzIntel®CoreTM2DuoCPU and a memory size of 3 GB. When the stability of each construction engineering risk control system under different magnitudes of data is compared and analyzed, the construction engineering risk control system Aprior and F P − gr owth are also running in the same single-machine environment, while the CPRCS is running on the hadoop cloud computing platform which consists of three nodes, one of which is consistent with the stand-alone environment, and the other two nodes belong to the WIN7 system. The system hardware condition is that the processor configuration is 2.4 GHz Intel. ®CoreTMi3-2370MCPU; the memory configuration is 2 GB; and all algorithms are programmed in perl script language. A total of two data sets are tested in this experiment. The first one is extracted from UCI machine learning database Adult, which contains 12 fields and nearly 50000 records. The second dataset is the data set obtained by the IBM dataset generator, which is represented as D3. Each record of this dataset contains an average of 10 items, and the average number of multidimensional items is equal to 5, with a total of 1 million records. All the Age fields of the Adult data set have been generalized by generalization processing to get the construction engineering risk control data set with different coarseness. During data test, the data set Adult is divided into two data sets with different numbers, which includes D1 with 5000 records and D2 with 30000 records. It can be seen that the number of multidimensional items in the above two data sets has increased exponentially with the decline of the support degree. At the same time, there are construction engineering risk control data sets and generalized data sets in D1, D2 and D3 data sets, each of which corresponds to the specific construction engineering risk control system.
4.2 Analysis of Results The extensibility of the construction engineering risk control systems CPRCS,Aprior and F P − gr owth in the different data sets whose support degrees decline from 5% to 0.1% is shown in Fig. 3. Figure 3 shows the performance of each construction project risk control system under different support degrees. By comparison, one can find that CPRCS has significant risk control efficiency, and it can also be seen from Fig. 3 that when the minimum support decreases gradually, the number of multi-dimensional items increases rapidly, because Aprior needs to deal with many candidate items, which makes its search data increase rapidly. FP-growth is slightly weaker than CPRCS in performance, which is because after the increase in the amount of construction engineering risk control data, FP-growth needs to build the condition tree in a multidimensional way, while CPRCS just needs to calculate the prefix path. Figure 4 shows the average time of multi-dimensional items obtained under different support levels. According to the test results, the CPRCS shows better stability and with the gradual decrease of the support level, the mean time of multi-dimensional items is also decreasing.
1922
W. Rao and J. Chen
Fig. 3 Performance of different construction engineering risk control systems under different support levels Fig. 4 Time taken by CPRCS to process risk control data
Risk Control System of Construction Engineering …
1923
In order to further analyze the expansibility of the construction engineering risk control system when the amount of data increases, the minimum support degree is set at 0.1%. And on the data set D3, the performance of the construction engineering risk control system under different amounts of data is analyzed. It can be seen that when the number of records increases, the three construction engineering risk control systems all show linear expansion characteristics. Through the comparison, it can found that the CPRCS is significantly better than Aprior and F P − gr owth, and when the amount of data increases, the performance difference of the risk control system of each construction project also becomes more obvious.
5 Conclusion This paper presents a construction engineering risk control system based on data mining technology, which is based on the efficient computing and storage function of cloud computing. This risk control system can spread the risk control process to different nodes to achieve the purpose of concurrent execution, thus effectively improving the efficiency of risk control.
References 1. Edwards, M., A. Rashid, and P. Rayson. 2015. A systematic survey of online data mining technology intended for law enforcement. ACM Computing Surveys 48 (1): 1–54. 2. Wang, J., and F. Zhang. 2015. Research on spatial data mining technology in agricultural spatial decision support system. Journal of the Institute of Brewing 46 (2): 73–74. 3. Xu, W., and J. Yao. 2013. Application of data mining technology for the effects of modern pentathlon on the prevention of urban white-collar workers’ occupational disease. Journal of Periodontology 50 (20): 335–343. 4. Gopalakrishnan, Vanathi, Jonathan L. LustDMTten, Shyam Visweswaran, and Gregory F. Cooper. 2010. Bayesian rule learning for biomedical data mining. Bioinformatics 26 (5): 668–675. 5. Chen, H., T. Li, C. Luo, S.J. Horng, and G. Wang. 2015. A decision-theoretic rough set approach for dynamic data mining. IEEE Transactions on Fuzzy Systems 23 (6): 1958–1970. 6. Zhang, L., X. Wu, M.J. Skibniewski, J. Zhong, and Y. Lu. 2014. Bayesian-network-based safety risk analysis in construction projects. Reliability Engineering & System Safety 131 (3): 29–39. 7. Finch, A. 2013. A comparative study of systematic risk management implementation within UK construction projects and implications on project success. American Journal of Surgical Pathology 30 (7): 795–801. 8. Jun, D.H., and K. El-Rayes. 2011. Fast and accurate risk evaluation for scheduling large-scale construction projects. Journal of Computing in Civil Engineering 25 (5): 407–417. 9. Ghahramanzadeh, Mana. 2013. Managing risk of construction projects: A case study of Iran. Seminars in Dialysis 27 (4): 362–370. 10. Taroun, A., and J.B. Yang. 2013. A DST-based approach for construction project risk analysis. Journal of the Operational Research Society 64 (8): 1221–1230.
Training Mode of Cross-Border E-commerce Japanese Translators Based on Neural Network Jingxian Huang
Abstract Deep learning and its application have become a key tool for practical machine learning. Neural networks are equally important to many existing statistical and machine learning methods. In this paper, the author analyzes the training mode of cross-border e-commerce Japanese translators based on neural network. Neural network can also be regarded as a kind of non-linear regression. Based on the theory of system science, the paper reveals the organization structure of Cross-border electric talents training and constructs the talent training system. At the same time, the economic and trade cooperation and cultural exchanges between China and Japan are also increasing. China and Japan are important trading partners of each other. Therefore, Chinese enterprises need a large number of Japanese translators to join in the exchange work. The translation of Japanese trade should be practical. In the fierce competitive market environment, the efficiency of enterprises must be highly efficient. Therefore, translation must be pragmatic. Keywords Cross-border electronic commerce · Training of applied talents · Neural network
1 Introduction As we all know, China’s cross-border electricity dealers have ushered in the gold development period. According to the statistics released by Iresearch consulting group, China’s cross-border electricity dealers reached 2 trillion yuan in 2012; 2013, about 3.1 trillion yuan, an annual increase of about 30%, far higher than the line of traditional foreign trade growth. At the same time, a large number of companies ready to enter the Cross-border electric business industry, especially traditional foreign trade enterprises, but found that cross-border e-commerce talent is extremely scarce. On the one hand, many cross-border electric business enterprises in the rapid rise and expand the scale, managers and professional and technical personnel cannot keep up; On the other hand, the cultivation of trans-boundary e-commerce talents J. Huang (B) School of Foreign Languages, Guizhou Minzu University, Guiyang 550025, Guizhou, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_227
1925
1926
J. Huang
and the practice of enterprise management can not be effectively linked, most of the education is based on theoretical knowledge, can not really combine the Crossborder electric power business skills and the actual needs of enterprises, thus unable to meet the recruitment requirements of the relevant personnel. In fact, since crossboundary businessmen need both foreign trade talents and domestic power suppliers, it is difficult for enterprises to recruit such compound talents directly, therefore, the cultivation of cross-border electrical quotient talents is the urgent demand of the development of Cross-border electric power industry in foreign trade, and the theoretical research and practical exploration of talent training mode need to be widened and deepened. With the increasing interaction and exchanges between Chinese enterprises and other countries in the world, the number of translators needed in the process of business contacts has also increased. As a neighbouring country and an important trading country, Japan has more and more frequent contacts between Chinese enterprises and Japan. Therefore, Japanese translation is very popular. Enterprises also pay more attention to training Japanese translators. When training translators, enterprises should not only ensure that they can grasp the linguistic basis of Japanese, but also cultivate their cultural connotations. They should also pay attention to cultivating translators to master relevant professional knowledge and skills, so as to promote their talents with international vision and high level of literacy and smooth progress with foreign cultures. Communicate with Japanese companies to complete translation tasks accurately and smoothly.
2 Cross-Border E-commerce Talent Training Organization System Combined with the characteristics of the market complexity, the adaptability of management extroversion and the characteristics of knowledge, application and creativity of Cross-border electric business talents, the demand for Cross-border electrical talents can be roughly summed up as senior decision-making management talents, business-oriented talents and skilled talents. Different market and different cross boundary electric business Enterprise’s demand for cross-boundary electrical quotient talents is different, therefore, for the development of the relevant Cross-border electrical quotient talents, it is necessary to stand in the perspective of Cross-border electric business and specific enterprise needs and talent developing strategy, on the basis of the reasonable talent training organization system, according to the needs of various stakeholders to be targeted to adopt the corresponding talent training model. This requires us to use the system science theory to study cross-border e-commerce as a system from a holistic perspective, global analysis of the relationship between the whole and the parts. Comprehensive consideration of various factors, the organization system for the training of Cross-boundary electrical quotient talents is shown in Fig. 1.
Training Mode of Cross-Border E-commerce …
1927
Personal factors Culture System factors Organizational factors
Organization system structure of cross-border ecommerce talents Training
Basic files
Personal needs
Their own quality
Other factors
Teacher Strength
Curriculum development
Hardware devices
Effect Assessment
Regulatory bodies
Other factors
Management Organization Principles Other basic education
The education system of cross-border electric quotient talents Other factors
Fig. 1 Organization system structure of cross-border e-commerce talents Training
The system of Talent training organization is a complicated giant system, and the training system of the cross boundary electric quotient personnel should also cover the students’ individual, enterprise, University, society and national policy and other decision-making bodies. The interaction of various interest-related groups affects the formation, operation and final training of the organization system of personnel training for Cross-border electrical quotient. This paper analyzes the structure of the cross-border electric quotient personnel training organization system from the main body of the game Chain network, and first clear the two carriers of the current trans-border e-commerce talent Training: First, including enterprises in the community of all walks of life e-commerce talent training Base Construction (hereinafter referred to as Enterprise Training); the second is to rely on the University of Electronic commerce and other related professional opening (hereinafter referred to as the University training). So we get the cross-border electric talent training organization
1928
J. Huang
E
U
E
U
F3
F2
F1 E
U
E
U
......
Fn
E
U
Fig. 2 The Game Link network of cross-border e-commerce talent Training Organization system
system consists of two game chain, enterprises and colleges and universities of the two players of the various components of each other influence, mutual constraints, according to this form game unit, Game Group, game chain and game Chain network. The two sides in the game process of mutual balance, coordinated development and gradual evolution, and finally reached a relatively stable state [1]. Cross-border electric business talent Enterprise Training and university training organization system game chain Network as shown in Fig. 2. Which E indicates the enterprise culture model, U indicates the university training model, F n expresses each main body and its partial game relation function. The cultivation of trans-boundary e-commerce talents is that enterprises and colleges, according to their own culture and the idea of running a school, take the Development of enterprises (colleges) and the cultivation of talents as the goal, establish certain training system and plan and adopt corresponding methods and measures to form their own enterprises (institutions). The training mode of the cross-border electric quotient talents is a part of the Talent training organization system, which is decided by the training target, the training system and the training method of the personnel training carrier. Specifically, the training goal of the ability of the crossboundary electric Power quotient personnel is devoted to cultivating the professional ability of electronic commerce and mastering the ability of foreign language, at the same time, with an open international vision and the innovation ability of advancing with the times; The cultivation system involves the culture and school-running idea, the rules and regulations, the management operation and the evaluation system of enterprises and colleges; The methods of cultivation are mainly the ways of classroom teaching, after-school tasks and practical practice. Figure 3 shows the model of cross-border e-commerce talent cultivation mode game chain diagram, showing the form of game group chain, is to refine the organization system game Chain Network Diagram results. Similarly, E and U represent the enterprise and the university culture Model respectively, f j ( j = 1, 2, 3) represent the corresponding relational function.
Training Mode of Cross-Border E-commerce … Fig. 3 The game group chain of cross-border e-commerce talents Training mode
1929 Training goals
E E
f1
International Social communicative Competence
U U
The training mode of Cross-border e-commerce talents
E
Information acquisition Capabilities
U
E
Business development and innovation capability
U
E
The ability to use a variety of technologies
U
E
Ability to manage international U affairs in a systematic and
Training System
f2
E
Manage operations
U
E
Regulations
U
E
Evaluation system
U
Culture method
f3
U
E
Self-design ability
E
Classroom Teaching
U
E
After-school tasks
U
E
See Practice
U
3 Cross-Border E-commerce Talent Training System Construction 3.1 Cross-Border Electrical Business Talent Enterprise Training System Generally, enterprises to the Cross-border E-commerce training methods mainly have knowledge, excellent enterprise internship visits and staff on-the-job training and other content. Among them, in the course of related training course design, based on the demand of talents and ability of cross-border electric business enterprise, according to the existing staff’s personal characteristics and quality structure, the course
1930
Check for updates regularly
J. Huang
Determine the overall demand for enterprise personnel training
Analyze job Responsibilities according to job description
Define the goal and standard of talent training
An analysis of training talents ' knowledge structure and quality ability
Develop training plans and prepare materials
Implementation of training plans and assessment programmes
Check for updates regularly
Fig. 4 Training System of cross-border e-business talents
is developed for the specific post of e-commerce. To the cross-border electric business enterprise website Planning position For example, the general requirements of employees familiar with the site planning, implementation and operation of business processes, and familiar with the operation of the Cross-border electricity business processes; Master a certain network knowledge, to grasp the cross-border electrical business enterprises on the site’s functional requirements and so on. According to the need to carry out training courses, so that the process of talent training more purposeful and less effort, the specific operating procedures referred to as shown in Fig. 4.
3.2 Cross-Border Electrical Business Talent Higher Education System In the process of knowledge culture and political and economic development, the society and enterprises urgently need the Cross-border e-commerce application talents. Higher education should play its dominant role and cultivate applied talents suitable for enterprises and market demand. 2015, “Internet +” officially appeared in the government work report, the development of “Internet +” action plan to promote mobile internet, cloud computing, large data and Internet, and so on with modern manufacturing integration [2]. On the other hand, electric business enterprises in the rapid expansion of mobile interconnection market, but faced with a large number of cross-border electrical business talent gap. The gates of the interconnected age have opened, and new Internet portals have arrived, how to improve the relevant marketing ability and operation ability of the university students, meet the demand of the market and enterprise to the applied talents, for colleges and universities to cross-border
Training Mode of Cross-Border E-commerce …
1931
e-commerce personnel training of fine standards and specific implementation of the path put forward new requirements. At present, the country attaches great importance to e-commerce and Crossborder E-commerce personnel training, through the promulgation of a variety of regulatory policies and planning, hope that comprehensive implementation, efforts to cultivate and quickly supplement E-commerce enterprises urgently needed for the senior E-commerce application-oriented talents. In the 2011, China Electronic Commerce Association launched the “National e-Commerce application Talent Training Project” Call, further from the legal regulation of the construction of E-commerce personnel. In response to the government’s call, to train a group of relevant industry knowledge, professional skills and comprehensive quality of the application of Crossborder electrical talents, in order to better promote student employment and meet business needs, at present, the domestic institutions of higher learning have strengthened the training of e-commerce talent, now about 375 colleges and universities have set up specialized E-commerce. In addition, the foreign trade major in colleges and universities opened an e-commerce course, through the opening of foreign trade and E-commerce classes, training students in international social applications, information acquisition, business development and innovation and other aspects of the ability.
4 Training of Japanese Translation Talents in Enterprises 4.1 Characteristics of Japanese Translation (1) Standardization of translation The application norms of Japanese translation in enterprises are, first of all, in terms of wording and format, and also in terms of simplification and respect. At the same time, we should ensure that the translation process and time meet the requirements of relevant norms. Thus, the same document in different fields and enterprises can have the same results after standardized translation, so that translation can ensure its unity. (2) Translation should be logical When translating textual materials or other documents, translation should have good logic. According to relevant requirements, the content of documents should be translated logically. For example, the results of events can be translated first, and then the causes of translation events can be traced back. (3) Translation should be widely applicable in all fields The translation process involves a wide range of fields, so the translators of enterprises should actively cooperate with various departments, so as to ensure that the activities of enterprises can be accurately translated.
1932
J. Huang
(4) The translation content has certain repeatability The content of translation work will be repetitive to a certain extent. Although different clients are faced with, the content of contract signing may be roughly the same. (5) Comparing translation with effectiveness Translation should be pragmatic. In the fierce competitive market environment, the efficiency of enterprises must be highly efficient. Therefore, translation must be pragmatic.
4.2 Training of Japanese Translation Talents When training translators, enterprises can draw on the analysis and introduction of translation outlines learned from translation theory and some research reports on common problems in translation, which can provide useful guidance for the cultivation of translation ability. At the same time, we should constantly hone the ability of translators through practical translation activities. With the increasing demand of enterprises, translators are required to have good bilingual communication skills. Therefore, when training translators, enterprises should not only encourage them to study Japanese carefully, but also strengthen the ability of translators to use Chinese accurately and improve their language accomplishment. When training translators, enterprises should pay attention to Japanese professionalism and require translators to have the same spirit when working with Japan, so as to better complete the translation task. Therefore, we should strengthen the cultivation of the comprehensive quality of translators, and urge them to strengthen their study, respect others and widely absorb all kinds of knowledge.
5 Conclusion Under the background of global economic development, economic and trade cooperation and cultural exchanges between China and Japan are also increasing. China and Japan are important trading partners of each other. Therefore, Chinese enterprises need a large number of Japanese translators to join the exchange work. In the new era, the requirements of enterprises for translators are not only for the translation of language, but also for translators to have a deep understanding of Japanese culture and tradition, and have a broad international perspective and good communication skills. In order to adapt to this change in demand, enterprises should comprehensively improve the comprehensive quality of translators and promote them to improve their translation ability, so that they can play an important role in the communication between enterprises and the outside world.
Training Mode of Cross-Border E-commerce …
1933
References 1. Hou Guangming, et al. 2006. Introduction to organization system science. Beijing: Science Press. 2. Fan Xinmin. 2015. Internationalization of higher education and cultivation of e-commerce talents in cross-border foreign trade: A cross-border integration perspective. Journal of Hebei Normal University, Educational Science Edition 17 (3): 101–107.
Application Research of Artificial Intelligence in Medical Information System Tianhua Bao and Cheng Cheng
Abstract With the rapid development of society, China’s modern information technology has also gained a good space for development, and has prompted various industries in China to enter the era of intelligence. Driven by the attention of national ministries and hospital leaders, the current hospital informationization construction in China is gradually improving in data interconnection and sharing, Internet + medical, mobile medical and medical big data, and with artificial intelligence technology in various fields of society. The booming, the combination of AI and medical care has become more and more close, which has had a huge impact on the development of the medical industry. This paper briefly introduces the current status of informationization construction and future development trends of hospitals in China, and outlines some key technologies of artificial intelligence applied in medical field. From the three stages of medical treatment process, this paper focuses on the application of the construction of artificial intelligence in medical information system. Keywords Artificial intelligence · Medical · Informatization · Application
1 Introduction With the rapid development and widespread application of new technologies such as big data, cloud computing, Internet of Things, visual networking, mobile Internet, smart cards, mobile-based data consumption, Internet of Things-based data collection, big data-based data analysis, cloud-based Computational data sharing is gradually becoming a reality, and hospital informationization is developing in the direction of standardization, integration, intelligence, mobility, and regionalization. Under the background of the overall shortage of medical resources, uneven geographical distribution, shortage of general practitioners, unsatisfactory graded diagnosis and treatment, and rising medical demand, with the development of Internet + medical T. Bao (B) The Second Affiliated Hospital of Xi’an Medical University, Xi’an, China e-mail: [email protected] C. Cheng The Third Research Institute of the Ministry of Public Security, Shanghai, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_228
1935
1936
T. Bao and C. Cheng
care, many hospitals have gradually realized digitization and completed, the data has more running, and the masses have fewer miles to run. At present, China’s medical industry is undergoing a major change from “taking disease treatment as the center to people’s health as the center”, and medical care has become one of the most transformative areas of artificial intelligence. In October 2016, the Central Committee of the Communist Party of China and the State Council issued the “Outline for the ‘Healthy China 2030’ Plan”, clearly proposing that promoting health science and technology innovation and building a health information service system is an important support for deepening the reform of the medical and health system and building a healthy China. With the gradual maturity of technologies such as voice interaction, computer vision and cognitive computing, the integration of artificial intelligence technology and medical health has deepened, and the application scenarios of artificial intelligence have become more and more abundant. Artificial intelligence technology has gradually become an influence on the medical industry development, an important factor in improving the level of medical services. The application of artificial intelligence in the medical field and the application of artificial intelligence in the medical field will accelerate the process of medical informationization, and even break the traditional Moore’s Law, and help the new medical reform and healthy China strategy.
2 The Status Quo and Development Trend of Hospital Information Construction 2.1 The Status Quo of Information Construction The construction of hospital information in China began in the 1970s [1]. Its development history generally includes four stages [2]: single-user single-user application, department-level system application, hospital-level system application, and regional medical exploration. The construction model has also undergone a certain transformation: from the business-oriented operation to the resource-oriented integration in the application purpose; from the one-to-one application to the collaborative service and the remote hospital in the application scope; in the development focus, from the data focus The collection shifts to focus on information utilization; in terms of implementation methods, it shifts from exchange-oriented to platform-oriented. According to the data in the survey report of China Hospital Informationization Survey 2017–2018, the three main obstacles in the development of informatization are insufficient funds, insufficient staffing and lack of corresponding capabilities of suppliers (68, 54, 46%). At present, the informationization level of hospitals in China has made some progress. According to the “China Hospital Informationization Survey 2017–2018” issued by the Information Management Professional Committee of the China Hospital Association, 95% of hospitals have specialized information
Application Research of Artificial Intelligence …
1937
departments, and More than 90% of tertiary hospitals have adopted a unified information coding system. At the same time, some large hospitals and some powerful institutions in China have been constructing in the fields of Internet medical care and mobile medical care, and have begun to explore regional medical informationization to realize medical information exchange and sharing among medical institutions in a certain area. In the next few years, the scale of China’s medical informatization will continue to grow, and will exceed 87 billion yuan by 2021 [3].
2.2 Development Trend With the rapid development of information technology, national ministries and hospital leadership attaches great importance to information construction, Internet + medical, hospital information systems, sophisticated medical equipment, high-tech medical care and compound talents, and high-efficiency management models are modernized. An important part of hospital operations is indispensable. At the same time, new concepts such as health records, telemedicine, mobile medicine, big data, and artificial intelligence have become important areas for the future development of medical informationization [4]. Since 2015, national policies have begun to promote the combination of medical and technology. From “Internet + medical” to “artificial intelligence + medical”, we can generalize the future informationization of hospitals into three major areas: for medical personnel. “Smart Health”, mainly based on electronic medical records as the core of information construction; patientoriented “smart services”, such as mobile phone settlement, appointment registration, appointment diagnosis, parking information push, etc.; “smart management” for hospital management, that is, Refined and information management.
3 Definition and Key Technologies of Artificial Intelligence 3.1 Basic Definition Artificial intelligence is a science and technology based on computer science, biology, psychology, neuroscience, mathematics and philosophy. It belongs to the threeway interdisciplinary disciplines of natural sciences, social sciences and technical sciences. It is considered to be the twenty-first century. One of the most advanced technologies (genetic engineering, nanoscience, artificial intelligence) [5]. Its main research is to make computers simulate some human thinking processes and intelligent behaviors (such as learning, reasoning, thinking, planning, etc.), the shaping and promotion of the machine’s independent creative thinking ability, including the principle of computer-implemented intelligence, manufacturing similar Computers that are intelligent in the human brain enable computers to achieve higher levels of
1938
T. Bao and C. Cheng
application. Artificial intelligence will involve many disciplines such as computer science, psychology, philosophy, and linguistics. After nearly three decades of rapid development, it has achieved fruitful results in the medical field and has been widely used in many subject areas.
3.2 Key Technology 3.2.1
Machine Learning and Deep Learning
Machine learning is an interdisciplinary subject involving statistics, system identification, approximation theory, neural networks, optimization theory, computer science, brain science, etc., to study how computers can simulate or implement human learning behaviors to acquire new knowledge or skills, reorganizing existing knowledge structures to continuously improve their performance, is the core of artificial intelligence technology is the fundamental way to make computers intelligent, and its application covers all fields of artificial intelligence. It mainly uses induction, synthesis rather than deduction. Data-based machine learning is one of the most important methods in modern intelligent technology. Researching from the observation data (samples) to find the law, using these laws to predict future data or unobservable data. According to different learning modes, learning methods and algorithms, machine learning has different classification methods. Neural network is a kind of neural network that simulates human brain in order to realize artificial learning-like deep learning technology.
3.2.2
Knowledge Map
Knowledge map is one of the semantic web technologies. It is a graph-based data structure consisting of nodes (entities) and labeled edges (the relationships between entities) [6]. It is essentially a way to reveal the relationship between entities. Semantic networks can formally describe things in the real world and their interrelationships [7]. Compared with the traditional Web page network, the nodes in the knowledge map are changed from web pages to different types of entities, and the edges in the graph are also changed from hyperlinks connecting web pages to rich semantic relationships between entities. Knowledge maps require data mining methods such as anomaly analysis, static analysis, and dynamic analysis, which have great advantages in search engines, visual display, and accurate recommendation [8].
3.2.3
VR/AR
Virtual reality (VR)/Augmented Reality (AR) is a new type of audio-visual technology with computer as the core. It combines relevant science and technology to
Application Research of Artificial Intelligence …
1939
generate a digital environment that is highly similar to the real environment in terms of sight, hearing and touch. The user interacts with the objects in the digital environment with the necessary equipment, interacts with each other, and obtains the experience and experience of the real environment, and is realized by the display device, the tracking and positioning device, the force sensing interaction device, the data acquisition device, the special chip, and the like. From the perspective of technical characteristics, virtual reality/augmented reality can be divided into five aspects: acquisition and modeling technology, analysis and utilization technology, exchange and distribution technology, display and interaction technology, and technical standards and evaluation system. It is predicted that the total profit of the AR/VR industry will reach 120 billion US dollars by 2020, and AR will account for 75%. From the perspective of segmentation application structure, hardware devices are the main source of profit for the AR/VR industry. AR application scenarios (profit sources) are more abundant than VR, and applications in the medical field will continue to develop in depth [9].
3.2.4
Biometric Identification
Biometric identification technology refers to the technology of identifying and certifying an individual’s identity through individual physiological characteristics or behavioral characteristics. From the perspective of the application process, biometrics are usually divided into two stages: registration and recognition [10]. During the registration phase, the biometric information of the human body is collected by sensors, such as optical information such as fingerprints and faces, microphones, and other acoustic information collected by the image sensor, and the data is processed by data preprocessing and feature extraction techniques, get the corresponding features for storage. Biometrics technology covers a wide range of topics, including fingerprints, palm prints, face, iris, finger veins, voiceprints, gait and many other biological features. The recognition process involves image processing, computer vision, speech recognition, and machines. Learn and many other techniques.
4 Application of Information System The construction of hospital information system should be based on data, technology as the core and service-oriented [11]. In the future, the hospital’s information system should be able to have two supporting systems: one is the application system, which can gradually transform from semi-intelligent to full-intelligence by integrating artificial intelligence smart applications with existing applications and serving the medical business. The process is even unmanned. The whole process is formed by the deployment of smart applications to form “smart nodes”, replacing the nodes on the original process to form a “smart unit”. Finally, each unit links to form an “intelligent network”, which ultimately forms a complete The intelligent
1940
T. Bao and C. Cheng
Fig. 1 Medical information system
hospital application system; the other is the ecological system, through the intelligent pension, smart pharmacy, smart medical care, smart health medical association, systematic construction of medical institutions, to provide better services for medical care (Fig. 1). The application scenarios of artificial intelligence in hospitals can be divided into four categories: the first category is smart services, which is the most popular field at present, such as Internet + hospital, artificial intelligence + hospital, App mobile hospital, etc. are concentrated in this field; The second category is smart management, which serves more hospitals’ medical and operational management; the third type of translational medical research, such as clinical research and new drug research and development, will rely on data or artificial intelligence in the future; Class education, including science education for patients, basic education for all levels of primary hospitals in graded diagnosis and treatment. According to the patient’s medical treatment process, the application system of artificial intelligence in the hospital can be divided into a smart pre-diagnosis module, a smart clinic module and a smart post-diagnosis module.
4.1 Before Diagnosis First, patient identification. Today’s identity technology relies on medical cards. In the future, when patients are seeking medical treatment, a series of services, from
Application Research of Artificial Intelligence …
1941
reception to medical treatment, medical treatment, and follow-up appointments, can be realized through non-inductive facial recognition technology, which will greatly improve the efficiency of hospital visits. From the hospital’s point of view, the current technology is not very mature. It will first be tested from a small medical area such as special medical care, high-end medical care or private hospitals. After the technology is mature and can identify a large number of personnel information, it can be eliminating the magnetic card used now, it brings great convenience to patients. Secondly, the gait feature is a biological feature that can be acquired from a long distance. From the perspective of intelligent video surveillance, the application prospect of gait recognition is very extensive. Because different diseases can have different special abnormal gaits [12], such as neurodegenerative diseases, including Parkinson’s disease, Huntington’s disease, and amyotrophic lateral sclerosis, quantitative analysis of gait can also be the diagnosis of the disease provides important clues. Again, intelligent guidance. Now there are a variety of guiding directions such as APP indoor positioning. The future intelligent service robot guidance may not be a simple clinic navigation, but the whole process from the time of admission to the hospital can be accompanied by a nurse, the classification and triage of the disease, and then guide the optimal path, so that patients have a good medical experience; finally, the inspection or drug taking behavior involved in the medical treatment process, such as automatic medicine dispensing machine has begun to be applied in large scale in some hospitals.
4.2 In Diagnosis First, the hybrid reality technology combining immersive virtual reality and augmented reality will become a common technology in the medical field in the next 5–10 years. In 3D human virtual reconstruction, vascular illumination, surgical teaching, teaching anatomy, surgery Medical health applications such as surgical visualization navigation and surgical simulation training are of great value. Second, the amount of image data accounts for more than 90% of the total data of the hospital [13]. The image data of ordinary hospitals grows at a rate of several tens of G per year. The image intelligent reading technology is popularized, and a standardized, large-scale and third-party image analysis algorithm platform is established. Can greatly improve the tumor recognition rate and improve the reading speed. Third, medical speech recognition technology is not only used in clinical interviews, waiting for appointments, appointments, etc., but also has greater value in special work scenarios such as ultrasound, pathology, oral cavity, endoscopy, etc., combined with clinical decision support system. Effectively implementing the voice-assisted disease diagnosis function is an important indicator of the development level of medical information. Finally, by constructing a multimodal learning algorithm based on the fusion of medical knowledge maps and real clinical data, a clinical drug and disease diagnosis prediction model is established, and artificial intelligence is applied to the individualized medication system and medication monitoring system; The data
1942
T. Bao and C. Cheng
characteristics and important variables of disease and drug use are more in line with the requirements of clinical complex scenarios; establish a complete quality control system from the use of real clinical data of hospital information systems.
4.3 After Diagnosis When the treatment is over, the patient spends most of his time managing health at home. In the future, artificial intelligence is also well applied in this field. Although the hospital advocates full-time medical treatment, because the proportion of doctors and patients is seriously imbalanced, and there is no time to personalize one-on-one care, this gives a lot of room for intelligence. For example, wearable devices have already implemented blood glucose testing, ECG monitoring, exercise monitoring, diet type and calorie monitoring [14], as well as targeted personalized recommendations for specific conditions of patients. In scientific research, data mining and artificial intelligence related technologies can promote the development of new drugs, have a good application value for the construction of hospital knowledge bases and knowledge maps, and promote the integration of clinical sample phenotypes and life groups. Precision medical technology, based on molecular diagnostics, genetic testing, precision medical clinical decision support systems for major disease and rare disease risk prediction, early screening, molecular typing, targeted therapy, and personalized treatment strategies an important manifestation of the speed of future medical progress.
5 Conclusion With the rapid development of technology and the maturity of related industries in the field of medical information, the future development of hospital construction and artificial intelligence will present the characteristics of commonality and individuality. Nowadays, it may be the watershed of informationization of medical institutions. Compared with the previous traditional medical informationization, today’s hospitals are increasingly demanding the specialization and intelligence of application systems. Targeting intelligent applications for specific populations, specific businesses, and specific needs will be the main features of hospital information development in the future. It is characterized by intelligence, precision, frequent iteration, and emphasis on application personalization and innovation. In the future, the medical field will exist in a convenient, service, efficient and inclusive model. Based on the advantages of artificial intelligence technology, it will realize the extensive penetration of medical links, from disease diagnosis, medical examination, medication plan and scientific research. It will be launched in the form of artificial intelligence. It is also expected that artificial intelligence technology can make great progress,
Application Research of Artificial Intelligence …
1943
accelerate its wide application in the medical field, form a new medical model, and label the future medical service with the times.
References 1. Chen, Baosong. 2012. Useful exploration of promoting hospital sustainable development with hospital information construction. China E-Commerce (21): 40. 2. Zhu, Xiaobo. 2015. Research on the status quo and development countermeasures of hospital informationization construction in China. Modern Instruments and Medical (21) 1: 76–79. 3. WeidongJia. 2017. The path of information construction promotes the development of medical sharing. China Management Informationization (20) 12: 41–42. 4. Zhou, Yue. 2018. Research on the status quo and development countermeasures of hospital information construction. Technology Information (16) 2, 38–39. 5. Li, Huaqiang. 2017. Talking about the influence of artificial intelligence. Information Recording Material (18) 7: 20–21. 6. Wikipedia. 9 May 2016. Knowledge graph [OL]. http://en.wikipedia.org/wiki/Knowledge_ Graph. 7. Nickel, M., K. Murphy, V. Tresp, et al. A review of relational machine learning for knowledge graphys. Proceedings the IEEE 104 (1): 11–33. 8. Hou, Mengwei. 2018. A review of knowledge map research and its application in medical field. Computer Research and Development (55) 12: 2587–2599. 9. Xia, Lei. 2018. Analysis of VR/AR development and prospects. Computer Knowledge and Technology (14) 23: 250–251. 10. Tian, Qing, and Jianbin Song. 2019. Exploring the application security of biometrics in identity authentication. China Information Security (2): 30–33. 11. Lin, Jingsheng. 2018. The driving force of the development of new medical associations: Research on the construction of intelligent hospital information system. China Information Security (22) 11: 10–13. 12. Tang, Xiangyu, and Yujie Liu. 2017. Progress in the application of medical gait analysis tools. The World’s Latest Medical Information Abstracts (17) 26: 33–36. 13. Cai, Yumeng. Strategy and application of archiving under large-scale hospital image grading storage architecture. Chinese Digital Medicine (12) 1: 48–51. 14. Mei, Cexiang, Yu Liu, et al. 2016. Application and development status of wearable devices in human health monitoring. Electronic World (19): 8–10.
Discussion on the Application of 5G Network UAV in Public Security of Smart Cities Zhifang Wang and Cheng Cheng
Abstract This paper first introduces and implements the functions of the 5G networked UAV. Secondly, combined with 5G mobile communication network, explore the typical applications of 5G network drones in smart cities such as security, rescue, inspection etc., and propose overall solutions for different application scenarios and requirements for 5G communication capabilities of networked drones. Finally, summarize the difficulties and solutions encountered by the current 5G network drones. In summary, the outstanding performance of 5G network UAVs in real-time monitoring, command and dispatch, and collection of data center cloud records and calls makes it an advanced media work platform for decision-making level of emergency command. In the future, the management of the entire smart city will play a more important role, providing the government with multiple conveniences for the citizens. Keywords 5G networked drone · Smart city · Public safety
1 5G Network Connected Drone 1.1 Introduction In recent years, driven by the wave of technology, UAVs have developed rapidly. According to Goldman Sachs research forecasts, from the beginning of 2016 to 2020, UAVs will have a market scale of 100 billion U.S. dollars, and UAVs as the leading technology development in China. One of the products became a brand new business card made in China. With the continuous rapid growth of the drone market and the continuous expansion of its application range, the limitations of the short-distance flight distance and poor signal stability brought by the existing UAV peer-to-peer communication technology have become increasingly prominent, which seriously restricts the further development of the UAV industry. With the continuous approach of 5G commercial Z. Wang (B) · C. Cheng The Third Research Institute of the Ministry of Public Security, Shanghai, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_229
1945
1946
Z. Wang and C. Cheng
time, the 5G base stations all over the country as the communication relay of 5G network UAVs are expected to solve this problem completely. The development of UAV network is imperative [1]. The so-called 5G network UAV is a UAV that accesses the 5G mobile communication network, which can realize equipment supervision, route planning, airspace planning, ultra-high-definition image transmission, remote low-latency control, realtime online, etc. The UAV application field, to achieve a variety of services 24 × 24 h, build a new, colorful “network sky” [2].
1.2 5G Network Connected Drones Expected to Achieve the Function Networked drones have higher requirements and greater challenges for 5G cellular mobile communication network speed, delay, location and coverage [3]. With the development of 5G mobile communication, the network drone will achieve breakthroughs in functions such as remote control, high-definition picture transmission, flight status monitoring, precise positioning, and network security.
1.2.1
Remote Control
As the “brain” of drones, remote control mainly includes three categories: UAV attitude control, UAV equipment management and emergency control. The remote control capability of the networked drone has high requirements for speed and delay [4]. In terms of rate, the downlink rate requirement in various application scenarios is 300–600 kbps, and the existing 4G network can meet the downlink rate indicator. In terms of time delay, the delay of remote control of the drone is loop delay, involving uplink and downlink, the delay requirement is less than 300 ms, and the future 5G delay will be within 140 ms, meeting the remote control requirements of the drone.
1.2.2
HD Image Transmission
The combination of the drone and the equipped camera equipment has the “God’s perspective” and the “eyes in the air”, which greatly expands the application scene of the drone. Video compression technology, signal processing technology, channel coding technology and modulation and demodulation technology, the video captured by the camera carried by the drone is transmitted wirelessly to the base station in real time to help remote decision makers outside the line of sight more effective to make decisions. The high-definition image transmission capability of the networked UAV mainly demands the network uplink rate, and the network uplink rate is mainly determined
Discussion on the Application of 5G Network …
1947
by the picture transmission quality. For example, at this stage, the digital picture transmission quality is generally required to reach 1080P (1920 × 1080), and the network uplink rate requirement is 10 Mbps. In the future, with the uplink rate of 5G reaching more than 300 Mbps, it will meet the requirements of 4 K and 8 K HD video for network uplink speed of 120 Mbps.
1.2.3
Flight Status Monitoring
The flight status monitoring of the networked UAV means that when the drone is in the automatic flight state, the drone reports the flight status (such as space coordinates and load status) to the base station in real time, so that the remote operator can accurately grasp the drone. Aircraft status information and, in exceptional circumstances, emergency response in a timely manner. The flight state monitoring capability of the networked drone mainly demands the network uplink rate and delay. In terms of speed, the uplink rate is required to be 200 kbps. In terms of time delay, the current delay requirement is 1000 ms. In the future, with the advancement of technology and the further release of vertical industry demand, the transmission delay indicator is controlled within 140 ms.
1.2.4
Precise Positioning
The networked UAV positioning technology not only needs to locate the horizontal position of the drone, but also needs to accurately locate the altitude information of the drone. With the expansion of the UAV business type, the demand for UAV positioning continues to increase. From tens of meters of ordinary positioning to centimeter-level high-precision positioning has become an important trend in the development of UF positioning technology in the future.
1.2.5
Cyber Security
The networking of drones has led to the emergence of new applications and new services. The foreseeable period of scale development is coming, and the resulting network security issues are imminent. On the one hand, the demand for flight safety of drones is to ensure the safety of information transmission of flight control systems and to ensure that flight equipment is not hijacked by “hackers”. On the other hand, the data security requirements of drones ensure the security of transmissions including flight records such as telemetry data, video and audio. The 5G system cooperates in network transmission, system platform, hardware equipment, software application and other aspects to ensure the security and reliability of the networked drone, and to protect its scale development.
1948
Z. Wang and C. Cheng
2 5G Network Connected Drones in Smart City Applications 2.1 Description of the Application Scenario 2.1.1
City Security
5G network UAVs are used in many smart city areas, such as border defense monitoring, fire monitoring, traffic monitoring, environmental protection, criminal investigation, anti-terrorism, security patrol, etc. [5]. In the event of an emergency, the drone can rush to the scene instead of the police force, using visible light video and thermal imaging equipment, etc., to transmit the real-time situation back to the ground equipment, providing a basis for the commander’s decision. In smart city applications, typical requirements for drones include: real-time video transmission (multiple), flight status monitoring, remote operation, and network-based positioning.
2.1.2
Emergency Rescue
Due to the geographical environment and climate diversity of our country’s territory, various natural disasters occur from time to time. The annual economic losses caused by natural disasters and accidents are hundreds of billions, and post-disaster relief work is particularly important [6]. The drone can achieve rapid response during the rescue operation, arrive at the scene at the first time, quickly start the operation, collect the field data, and quickly transmit the live audio and video signals to the command center for the leader to evaluate and make decisions. Communication relay function, quickly restore on-site communication, track the development of events, and help the command center to implement uninterrupted command processing [7].
2.1.3
Infrastructure Inspection
Infrastructure inspection refers to inspection or condition monitoring of transmission lines, oil pipelines, base towers, bridges, wind power generation and other infrastructure. The contents of the operation include monitoring of the infrastructure itself, exploration of the surrounding environment, daily maintenance of the infrastructure, and simple troubleshooting and processing. The traditional manual inspection program is affected by the environment and weather, with large workload, low work efficiency, high cost, and certain personal safety risks. UAVs are more and more widely used in infrastructure inspections due to their low cost, flexibility, high security, small impact from natural environment and terrain, and superior viewing angles [8].
Discussion on the Application of 5G Network …
1949
Fig. 1 5G network connected drone overall plan
2.2 Overall Plan Both the UAV terminal and the ground control terminal of the 5G networked UAV transmit data and control commands through the 5G network, and load applications of various scenarios through the service server. The 5G network provides an overall network solution from the wireless network to the core network to adapt to the network implementation of various complex application scenarios. As shown in Fig. 1, the UAV and 5G combine to achieve a variety of functions, to achieve a full range of security-free security control: (1) Control center personnel use VR glasses’ 4 K high-definition video to display real-time viewing and synchronization with ground security equipment, complement each other and maximize security scene capabilities; (2) The control center personnel remotely control the steering of the unmanned aerial camera, the flight status and route of the drone through the 5G network through the ground control terminal such as VR glasses and PAD, and further track the locking target; (3) The UAV predicts the sudden security scene problem and automatically realizes the target realization of automatic identification. Through the effective introduction of the intelligent UAV flight platform and the 5G cellular network capability, the transformation of the traditional security industry into the integration of heaven and earth and the intelligent upgrade of multi-scenario security capabilities will be promoted as a new security solution model. It has been widely used to promote the wisdom upgrade of traditional security service providers, thus bringing the development of the entire industry.
2.3 Communication Capability Requirements In smart city application scenarios, there are patrols, security, rescue, etc. The drone needs to have excellent flight stability, quick response capability, uninterrupted onsite real-time tracking, and can return HD video in real time. Analytical recognition
1950
Z. Wang and C. Cheng
Table 1 Rate requirement rating table
Grade
Rate
Typical application
1
Upstream 200 kbps
Control signal transmission
2
Upstream 3 Mbps
720P data transmission
3
Uplink 10 Mbps
1080P data transmission
4
Upstream 30 Mbps
4 K HD video
5
Upstream 120 Mbps
8 K HD video
of human eyes or computer AI. Specifically, the drone has the following requirements for the communication network: uplink/downlink rate, delay, network positioning, and signal coverage.
2.3.1
Uplink/Downlink Rate
At present, 4G network meets 720P and 1080 video transmission requirements, and 5G implements 4 K and 8 K HD video transmission. Compared with 720P uplink rate of 3Mbps, 8 K HD video transmission requires 120 Mbps uplink rate. In addition, with the gradual popularization of the networked drone service, the demand for multichannel concurrent transmission may gradually become more prominent, posing a higher challenge to the network uplink transmission rate (Table 1).
2.3.2
Delay
The data backhaul of the drone only involves uplink, and its end-to-end delay includes coding delay, wireless network side delay, external network transmission delay, server processing delay, decoding delay and display delay. The delay of remote control of the drone is loop delay, involving uplink and downlink, including coding delay, wireless network side delay, external network bidirectional transmission delay, server processing delay, decoding delay and display delay. Compared with the data backhaul service, the delay index of the remote operation is higher, and the requirement is 140 ms (Table 2). Table 2 End-to-end delay and network-side delay indicator levels Grade
End-to-end delay
Network side delay
Typical application
1