2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies, 103) 981167468X, 9789811674686

This book gathers a selection of peer-reviewed papers presented at the third Big Data Analytics for Cyber-Physical Syste

119 21 21MB

English Pages 1241 [1157] Year 2021

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Organization
Preface
Conference Program
BDCPS 2021 Keynotes
Contents
Data Security and Privacy in Smart City
Security Defense Model of Web Page Design and Evaluation of Online Shopping Platform Based on Block Chain
1 Introduction
2 Security Defense Model Based on Block Chain-Based Online Shopping Platform Web Page Design and Evaluation
2.1 Security Issues Faced by Web Design and Evaluation of the Block Chain-Based Online Shopping Platform
2.2 Overall Network and System Structure Design of the Security Defense Model
2.3 Domain Name Privacy Model of the Security Defense Model of the Web Page Design and Evaluation of the Online Shopping Platform
2.4 Mean Clustering Algorithm for Spam Web Security Defense Detection
3 Security Defense Model Test of the Webpage Design and Evaluation of the Block Chain-Based Online Shopping Platform
3.1 Test Environment
3.2 Test Indicators
3.3 Test Sample
4 Data Analysis of Security Defense Model Based on Block Chain-Based Online Shopping Platform Webpage Design and Evaluation
4.1 Running Time
4.2 Accuracy Rate and False Alarm Rate
5 Conclusion
References
Emotional Design in Mobile App Interface Design
1 Introduction
2 Emotional Design in Mobile App Interface Design
2.1 Classification of Mobile App Interface Design
2.2 The Value of Emotional Design
2.3 Analysis of Emotional Factors Affecting the Mobile App Interface
3 Emotional Design Ideas for Mobile App Interface
3.1 User Experience Information Collection
3.2 Demand Analysis of App Interface Design
3.3 Reliability Test of Survey
4 Discussion
4.1 The Visual Characteristics of the Mobile App Interface
4.2 The Characteristics of the Reflection Level of the Mobile App Interface
5 Conclusions
References
The Development of Communication Mode of Network Language and Culture Under the Environment of New Media Convergence
1 Introduction
2 The Communication Mode of NLAC Under the Environment of New Media Convergence
2.1 New Media NLAC Communication Carrier
2.2 Communication Effect of NLAC
2.3 Influence of NLAC Communication
2.4 K-means Clustering Algorithm
3 Experimental Study
3.1 Subjects
3.2 Experimental Process Steps
4 Experimental Research and Analysis on the Communication Mode of NLAC Under the Environment of New Media Convergence
4.1 Internet Users in the New Media Convergence Environment
4.2 The Proportion of New Media Communication Mode
5 Conclusions
References
Design and Implementation of Highway Engineering Test and Detection Management System Based on Big Data
1 Introduction
2 Theoretical Research on Highway Engineering Test and Detection Management System Based on Big Data
2.1 Influence of Big Data on Test and Testing Management of Highway Engineering
2.2 Demand Distribution of Highway Engineering Test and Testing Management
2.3 System Design Based on Test and Testing Management of Highway Engineering
2.4 System Key Technologies
3 Implementation of Highway Engineering Test and Detection Management System Based on Big Data
3.1 Main Functions of the System
3.2 System Test Mode
4 Realization Analysis of Highway Engineering Test and Detection Management System Based on Big Data
4.1 Implementation Route and Implementation Mode
4.2 Test Management System
5 Conclusion
References
Art Construction and Protective System Design of Northeast Residential Decoration Classification Patterns Based on Big Data
1 Introduction
2 Art Construction and Protective System Design of Northeast Residential Decoration Classification Pattern Based on Big Data
2.1 Art Construction of Decorative Classification Patterns of Northeast Residential Houses Based on Big Data
2.2 Protective System Design of Northeast Residential Decoration Classification Pattern Art Based on Big Data
2.3 Big Data Connection Algorithm
3 Based on Big Data, Northeast Residential Decoration Classification Pattern Art Construction and Protective System Experimental Research
3.1 Research Methods
3.2 Determine the Research Object
3.3 Research Scope
4 Based on Big Data, Northeast Residential Decoration Classification Pattern Art Construction and Protective System Data Analysis
4.1 Use of Decorative Patterns in Northeast Residential Houses of Various Themes
4.2 Tourists’ Understanding of Northeast Residential Houses
5 Conclusion
References
Risk Mechanism and Supervision of P2P Lending Asset Securitization Under the Background of Big Data
1 Introduction
2 The Major Modes of P2P Lending Asset Securitization
2.1 P2P Lending Debt Assignment Mode
2.2 Mode of P2P Lending Plus Small Loan Companies
2.3 Mode of P2P Lending Plus Real Estate
3 Risk Mechanism of P2P Lending Asset Securitization
3.1 Legal Risk
3.2 Credit Risk
3.3 Liquidity Risk
3.4 Institutional Risk
3.5 Ethical Risk
4 Insufficient Supervision on P2P Lending Asset Securitization
4.1 High Requirements
4.2 Numerous Limitations
4.3 Undefined Supervision
5 Supervision Measures on P2P Lending Asset Securitization
5.1 Clarification of P2P Status and Normalization of P2P Market
5.2 Enhancement of Industrial Self-discipline and Introduction of Risk Evaluation
6 Conclusion
References
Design of Basketball Shot Automatic Recognition System Based on Background Difference Method
1 Introduction
2 Shot Detection Algorithm Based on Background Difference Method
2.1 Background Difference Method
2.2 Shooting Characteristics
2.3 Sensor Signal Acquisition
2.4 Algorithm Implementation
2.5 Environment Setup
2.6 System Design
3 Design Experiment of Basketball Shooting Automatic Identification System
4 Result Analysis and Discussion
4.1 The Basic Situation of the Tested Basketball Players
4.2 Analysis of System Results
4.3 Accuracy Evaluation
5 Conclusion
References
Application of BIM Technology in Project Construction Schedule Management
1 Introductions
2 Research on BIM Technology and Project Construction Schedule Management
2.1 Problems in Project Construction Schedule Management
2.2 Advantages of BIM Technology Application in Project Construction Schedule Management
3 Construction of Construction Schedule Management Platform Based on BIM Technology
3.1 Build a BIM 3D Model
3.2 Create a Construction Schedule
3.3 The Realization of BIM Four-Dimensional Management Platform
3.4 Project Construction Schedule Management
4 Detection of Construction Progress Management Platform Based on BIM Technology
4.1 Experimental Design
4.2 Data Processing
4.3 Result Analysis
5 Conclusions
References
Data Security Technology and Scheme Design of Cloud Storage
1 Introduction
2 Cloud Storage Application Architecture
3 Access Control
4 Integrity Audit
5 Data Encryption
6 Conclusion
References
Design of Internet Opinion Analysis System for Emergencies in Big Data Environment Based on Hadoop Platform
1 Introduction
2 Hadoop Ecosystem Architecture
3 JDBC Database Access
4 System Functional Design
5 Conclusion
References
Evaluation Model of Intelligent Anti-electric Theft Management
1 Introduction
2 Anti-theft Management
2.1 Anti-theft
2.2 Suspicion Model of Electric Theft Based on Artificial Neural Network
3 Intelligent Anti-theft Management Experiment
3.1 Design of Background Management Module
3.2 Design of Background Management Module
4 Evaluation Model of Anti-electricity Stealing Management
4.1 Suspected Power Theft Coefficient
4.2 Benefit Analysis of Network Loss Reduction
4.3 Benefit Analysis of Loss-Free Electricity
5 Conclusion
References
Civil Structure Damage Identification Method Based on Finite Element Model Technology
1 Introduction
2 Damage Identification of Civil Structures Based on Finite Element Model
2.1 ABAQUS Finite Element Software
2.2 Finite Element Model Corrections
3 Modification Experiments the Finite Element Model
3.1 Consider the Corrections to the Node Plates
3.2 Correction of the Structural Parameters
4 Model Correction Results
4.1 Still Load Deflection and Error
4.2 Temperature Deflection and Error
5 Conclusions
References
Cardiac CT Segmentation Based on Distance Regularized Level Set
1 Introduction
2 Method
2.1 Bilateral Filtering
2.2 Distance Regularized Level Set (DRLSE) Segmentation
2.3 Evaluating Indicator
3 Results
3.1 Segmentation Results
3.2 The Influence of Enhancement Methods
3.3 The Influence of Initial Border
3.4 The Influence of Iterative Method
4 Discussion
5 Conclusion
References
Monitoring and Analysis System of Municipal Private Economy Based on Big Data
1 Introduction
2 The Functional Framework of the Monitoring and Analysis System of Private Economy
2.1 Data Acquisition System
2.2 Data Management System
2.3 Statistical Analysis System
2.4 Early Warning Analysis System
3 Security Guarantee of Monitoring and Analysis System of Private Economy
4 System Architecture
4.1 Overall System Architecture
4.2 Technical Framework
5 Conclusion
References
Construction Safety Early Warning System of Power Transmission and Transformation Project Based on GIM
1 Introduction
2 Intelligent Early Warning Rule System
3 Personnel Location and Video Recognition Technology
3.1 RFID-Based Personnel Location Technology
3.2 Video Recognition Technology
4 Security Intelligent Warning System
4.1 Overall System Architecture
4.2 Technology Roadmap
4.3 System Function
5 Conclusions
References
Mine Escape Path Planning Algorithm Based on Simulation Model Technology
1 Introduction
2 Research on the Algorithm of Mine Escape Route Planning
2.1 Path Planning Related Algorithms
2.2 Comparison and Selection of Algorithms
2.3 Improvement of Dijkstra’s Algorithm
3 Experiment
3.1 Basic Requirements for Path Planning in Underground Mines
3.2 Modeling
3.3 Simulation Experiment
4 Discussion
4.1 Selection of the Best Exit for Escape
4.2 Crowd Congestion Strategy
5 Conclusions
References
Design and Implementation of the Drug Traceability System Based on Block Chain Technology
1 Introduction
2 Technical Introduction
2.1 Block Chain Technology
2.2 System Development Environment
3 Establish Drug Traceability System Model
4 Implementation of Drug Traceability
5 Summary
References
Using ARM Technology to Build a Rail Transit Catenary Wear Detection Operation Platform
1 Introduction
2 Using ARM Technology to Build a Rail Transit Catenary Wear Detection Operation Platform
2.1 System Architecture
2.2 Measuring Principle
3 Use ARM Technology to Build a Rail Transit Catenary Wear Detection Operation Platform to Achieve
3.1 Platform Construction
3.2 Cross-Compilation Environment Establishment
4 Use ARM Technology to Build Rail Transit Contact Line Wear Detection Operation Platform Test
4.1 Stress Test
4.2 Comparison of Prediction Results
5 Conclusion
References
Security Threats and Protection Based on Android Platform
1 Introduction to Android Platform
1.1 Mobile Phone Malware
1.2 Android Platform Security Mechanism
1.3 Android Platform Permission Mechanism
1.4 Security Mechanism of Mobile Terminal Interface
1.5 Root Risk of Terminal Platform
2 The Security Threats of the Android Platform
2.1 Leakage of Data Information
2.2 The Risk of Malicious Flashing
2.3 Loss of Mobile Terminal
3 Measures to Improve the Security Protection of the Android Platform
3.1 Security Module Design
3.2 Virus Scanning Module
3.3 Automatic Update of Virus Database
3.4 Mobile Anti-theft Module
3.5 SMS Encryption Module
3.6 Security of the Protection System
4 Concluding Remarks
References
A Data Security Scheme for Cloud Storage Based on Data Segmentation and Trusted Third Party Supervision
1 Introduction
2 Cloud Storage System Architecture and Data Segmentation Strategy Design
2.1 Cloud Storage System Architecture
2.2 Data Segmentation and Mapping Strategy Design
3 Cloud Storage System Operation Framework and Function Design
3.1 Cloud Storage System Operation Framework
3.2 System Initialization
3.3 The Cloud Server Requests the Distribution of the Session Key and Verifies the Identity of the User Requesting the Session
3.4 The User Receives the Session Key and Verifies the Identity of the Cloud Server
3.5 File Upload and Download
4 Program Analysis and Summary
References
Power Grid Security by Transforming a Certain Type of Wind Turbine
1 Introduction
2 Analysis of Hydraulic Pitch System of a Certain Type of Wind Turbine
2.1 Testing on the Spot
2.2 Theoretical Calculation of Pitch Ability
3 Renovation of the Main Control System
4 Converter Transformation
5 Conclusion
References
Reliability Growth in Product Quality Control in Modern Computer Industrial Control
1 Introduction
2 Reliability Growth Evaluation Model
2.1 Evaluation of Reliability Growth Level
2.2 Process of Reliability Growth Assessment
3 Reliability Growth Control Model at Present
4 Duane Model Is Applied to Reliability Growth
4.1 Original Duane Model
4.2 Improved Duane Model
5 Conclusion
References
Financial Risk Management of Small and Medium Sized Enterprises in the Internet Environment
1 Introduction
2 Financial Risk Management of Small and Medium-Sized Enterprises Under the Internet Environment
2.1 Financial Risk Management of Medium Sized Enterprises
2.2 The Causes of Financial Risks in Small and Medium Sized Enterprises
2.3 Characteristics of Financial Risks in the Internet Environment
3 Research Ideas and Methods
3.1 Research Ideas
3.2 Research Methods
3.3 Comparative Analysis
4 Financial Risk Management Results of Small and Medium-Sized Enterprises Under the Internet Environment
4.1 Financial Risk Analysis of Medium Sized Enterprises in the Internet Environment
4.2 Analysis of Financial Risk Management of Small and Medium-Sized Enterprises Under the Internet Environment
5 Conclusions
References
Based on Big Data Analysis Technology to Explore the Influence of Property Responsibility Derivative System on Enterprise Performance
1 Introduction
2 Theoretical Analysis and Research Hypothesis
2.1 The Influence of Property Liability Extension System on Enterprise Value
2.2 The Influence of Property Liability Extension System on Enterprise Financial Performance
3 Analysis Method and Variable Design
3.1 K-means Clustering Algorithm
3.2 Variable Definition and Research Design
4 Empirical Results and Analysis
4.1 Property Responsibility Extension System and Enterprise Value and Financial Performance
5 Research Conclusions and Suggestions
References
Classification of Cerebral Arteriosclerosis Patients Based on Fuzzy Comprehensive Evaluation in the Background of Information Technology
1 Introduction
2 Spectral Manifestations of Cerebral Arteriosclerosis
3 Changes of Vascular Elasticity Index of Transcranial Doppler
4 Basic Principle
5 Application of Comprehensive Fuzzy Evaluation in Classification
5.1 Object Set, Factor Set and Comment Set
5.2 Determine the Weight Distribution Vector of the Factor Set
5.3 Establish Fuzzy Evaluation Matrix R
5.4 Calculate the Comprehensive Evaluation Results of Each Object
6 Instance Analysis
7 Conclusion
References
Neural Network for Monitoring Design of Science and Technology Talent Flow System
1 Introduction
2 Data Sources
3 Complex Network Model of Transnational Flow of Science and Technology Leading Talents
4 Linear Standardization Method
5 Big Data Analysis on Characteristics of Talent Flow Network
6 Conclusion
References
BP Neural Network for Construction of Smart Campus Security
1 Introduction
2 An Overview of Teaching Quality Evaluation and Control in Higher Vocational Colleges
2.1 Definition of Basic Concepts
2.2 The Model of Neuron
3 Construction of Teaching Quality Evaluation Model in Higher Vocational Colleges Based on BP Neural Network
3.1 Construction of Teaching Quality Evaluation Index System in Higher Vocational Colleges
3.2 BP Network Model Structure
3.3 Using MATLAB to Build Teaching Quality Evaluation Model in Higher Vocational Colleges
4 Conclusion
References
Research on Railway Transportation Route Based on Dijkstra Algorithm
1 Introduction
2 Data Structure of Railway Network
2.1 Classical Dijkstra Algorithm
2.2 Algorithm Implementation
2.3 Key Points of Algorithm Application
3 Specific Path Parameter Language Design
3.1 Aggregation Class
3.2 Modify Mileage Class
3.3 Examples and Conclusion Analysis
4 Conclusion
References
The Mathematical Form of Grover Algorithm and Its Search Success Rate for Composite Database
1 Introduction
2 Uncertainty of Grover Search Method
2.1 Introduction of Grover Algorithm
2.2 Hybrid Dynamic Database Cluster
3 Grover Search Method in Noisy Environment
4 Probability of Success of Grover Search Method with Mixed Initial State
5 Conclusion
References
Optimization and Simulation of Electrical Wiring Path Based on Ant Colony Parallel Algorithm
1 Introduction
2 Ant Colony System
2.1 Mosquito Swarm Algorithm and TSP Problem
2.2 Mosquito Swarm Algorithm
3 Wiring Path Optimization
3.1 Problem Description
3.2 Algorithm Flow
4 Simulation Analysis
4.1 Mosquito Population M
4.2 Parameters a, P
5 Conclusion
References
Research on Method and Technology of Network Security Stochastic Model Based on Artificial Intelligence
1 Introduction
2 Anomaly Detection Method Based on Clonal Selection Fuzzy Clustering Algorithm
2.1 Research Status
2.2 Cluster Analysis
3 Evidence Combination Rule Based on Cross Complement Sharing Criterion
3.1 Evidence Combination and Conflict
3.2 Comparative Analysis of Two New Combination Rules
4 P2P Trust Management Model Based on Improved Evidence Combination Rules
4.1 Trust Model
4.2 P2P Trust Management Model Based on Improved Evidence Combination Rules
5 Conclusion
References
Efficient Identity-Based Multiple Copy Integrity Auditing Scheme for Cloud-Based IoT
1 Introduction
2 Related Work
2.1 Data Integrity Verification
2.2 Indistinguishability Obfuscation
3 Preliminaries
3.1 Bilinear Maps
3.2 Complexity Assumption
4 Construction
5 Performance Evaluation
5.1 Communication Overhead
5.2 Computation Overhead
6 Conclusions
References
Application of Fuzzy Decision Method in Target Detection
1 Overview
2 The Establishment of Target Evaluation Ability Index System
2.1 Evaluation Index System
2.2 Determination of Fuzzy Subsets with Weight Coefficients
2.3 Determination of Index Weight
3 Mathematical Model of Fuzzy Evaluation
4 Experimental Results of Fuzzy Decision Making
5 Conclusion
References
Emerging Standards for Smart City
New Methods of Urban Research in the Information Age—Based on the Combination of Big Data and Traditional Data
1 Introduction
2 Methodology and Analytical Framework of Urban Research
2.1 EDCF Methodology Framework
2.2 MFVM Methodology Framework
2.3 MADF Methodology Framework
3 Conclusion and Discussion
References
The Influence of Information Technology on New Media Dance
1 Introduction
2 New Media Dance Pioneers and Innovates on the Basis of Respecting Tradition
3 Information Technology Penetrates Aesthetic Concepts in the Reform of New Media Dance Creation
4 New Media Dance Gains a New Life Through Reference and Expansion
5 New Media Dance Changes the Old Customs in Communication and Interaction
6 Conclusion
References
Cultural Elements in the Urban Landscape Design Innovation Based on Big Data Era
1 Innovative Understanding of Cultural Elements in the Era of Big Data
2 The Relationship Between City Landscape Design and Cultural Elements
3 Problems in Modern Urban Landscape Design in the Era of Big Data
3.1 Worship the Foreign and the Whole Westernization
3.2 Loss of Cultural Connotation, Lack of Cultural and Historical Features
3.3 Element Stacking, Simple Copy
4 Innovative Expression of Cultural Elements in Urban Landscape Design in the Era of Big Data
4.1 The Role of Cultural Elements in Urban Landscape Design
4.2 Innovative Application of Cultural Elements in Urban Landscape Design
References
Application of Big Data in the Creative Design of Manchu Traditional Cultural Visual Symbols
1 Introduction to Manchu Traditional Festival Culture
2 The Inheritance Meaning and Development of Manchu Festival Culture
2.1 The Inheritance Meaning of Manchu Festival Culture
2.2 Development of Manchu Festival Culture
3 The Meaning of Visual Symbols Innovation for Manchu Festival Culture
4 The Essence of Manchu Festival Visual Symbol Innovation in the Context of Big Data
4.1 The Development of Brand Image Design System for Innovated Manchu Festival Visual Symbols
4.2 Develop Brand Derivatives in the Context of Big Data
4.3 The Use of Large Data Analysis for Media Promotion of Visual Image and the Brand Product
4.4 Deepen the Horizontal and Vertical Development of National Visual Symbols and Promote New Ways of Cultural Innovation
References
Construction on Standardization System of University Evaluation Mechanism Based on Data Analysis Technology
1 Introduction
2 Data Analysis Process
3 Data Analysis Tools
3.1 Automatic Data Modeling
3.2 Data Visualization
4 Standardization System of University Evaluation Mechanism Based on Data Analysis Technology
5 Conclusion
References
Smart Community Governance System and Governance Strategies in the Big Data Era
1 Introduction
2 Architecture Design of Smart Community Governance System in the Big Data Era
3 Function Design of Smart Community Governance System in the Big Data Era
4 Strategies and Suggestions of Smart Community Governance in the Big Data Era
5 Conclusion
References
Application of QR Code Recognition Technology in Modern Power Logistics Management
1 Introduction
2 Basic Principle and Process of QR Code Recognition Technology
2.1 Basic Coding Method
2.2 QR Code Coding Process
3 QR Code Contrast Image Enhancement and Adjustment Processing
4 QR Code Recognition Technology Commonly Used in Warehousing Management of Modern Power Logistics Enterprises
4.1 System Function
4.2 System Hardware Configuration
4.3 System Software Design
5 Conclusions
References
The Innovation of Visual Communication Design Based on Computer Aided Technology
1 Introduction
2 Method
2.1 Computer-Aided Technology
2.2 Visual Communication and Its Development
2.3 Innovation in Visual Communication Technology
2.4 Application of Computer Aided Technology in VCD
3 Experiments
3.1 Experimental Background
3.2 Experimental Method
4 Discussion
4.1 Analysis of the Status Quo of Visual Communication Design
4.2 Analysis of the Effect of Computer-Aided Technology on Visual Communication Design
5 Conclusions
References
Text Language Classification Based on Dynamic Word Vector and Attention Mechanism
1 Introduction
2 Research and Analysis of Text Language Classification Based on Dynamic Word Vector and Attention Mechanism
2.1 Word Vector and Attention Mechanism
2.2 Text Language Classification Based on Dynamic Word Vector and Attention Mechanism
2.3 Word Vector Learning Method Based on Attention Mechanism
3 Experimental Research on Text Language Classification Based on Dynamic Word Vector and Attention Mechanism
3.1 Subjects
3.2 Research Methods
4 Experimental Analysis of Text Language Classification Based on Dynamic Word Vector and Attention Mechanism
4.1 Comparative Analysis of Text Classification Language Algorithms
4.2 Experimental Analysis of Attention Mechanism Based on Semantic Understanding
5 Conclusion
References
Big Data Technology in Improving the Internal Governance Efficiency of Private Undergraduate
1 Introduction
2 There Are Some Problems in Improving the Internal Governance Efficiency of Private Universities
3 Research on the Strategy of Improving the Internal Governance Efficiency of Private Universities
3.1 The Main Contents of the Research on the Internal Governance Efficiency Improvement Strategy of Private Colleges
3.2 The Path of Improving the Internal Governance Efficiency of Private Universities
4 Summary
References
Design of Energy Saving Scheme for Data Center Power System Based on Artificial Intelligence
1 Introduction
2 Energy-Saving Methods for Data Center Power System
2.1 Data Center Power System
2.2 UPS Power System
2.3 Data Center High-Voltage DC Power Supply System
2.4 Discussion on Energy Saving of Power Supply System
3 Experimental Research on Energy Saving of Data Center Power System Based on Artificial Intelligence
3.1 Experimental Operation
3.2 Harmonic Control of Switching Power Supply System
4 Analysis of Energy-Saving Effect of Harmonic Control of Power System
4.1 Improved the Effective Utilization of the Power Distribution System
4.2 Comparison and Analysis of Energy Saving of HVDC, UPS, and Direct Supply from Mains
5 Conclusion
References
Application of LeNet Image Classification Algorithm in the Creative Design of New Painted Pottery
1 Introduction
2 Application of LeNet Image Classification Algorithm in the Creative Design of New Painted Pottery
2.1 The Ornamentation of Majiayao Painted Pottery Culture
2.2 Problems Existing in Majiayao Cultural and Creative Products
2.3 Necessity of Majiayao Cultural and Creative Product Design
2.4 LeNet Image Classification Algorithm
3 Experiment
3.1 Questionnaire Design
3.2 Process of the Questionnaire Survey
3.3 Reliability Test of the Questionnaire
4 Discussion
4.1 Survey Results
4.2 Design Strategy of Cultural and Creative Products
5 Conclusions
References
Cost Management of Transmission and Transformation Project Based on GIM Technology
1 Introduction
2 Technical Background of GIM
3 Project Cost Analysis
4 Cooperative Platform
5 Conclusions
References
Marketing Strategy Innovation Based on Mobile Internet Technology
1 Introduction
2 MS Innovation Based on MIT
2.1 Innovative Marketing Ideas Based on Mobile Internet
2.2 Mobile Internet MS
2.3 Marketing Algorithm Formula
3 Experimental Study
3.1 Subjects
3.2 Experimental Process Steps
4 Experimental Research and Analysis of MS Innovation Based on MIT
4.1 The Scale of Mobile Internet Users
5 Conclusions
References
5G Technology Promotes the Coordinated Development of E-Commerce and Regional Industries in the Guangdong-Hong Kong-Macao Greater Bay Area
1 Introduction
2 5G Technology Helps E-Commerce Innovation and Upgrading
2.1 5G Helps E-Commerce Realize Technological Innovation
2.2 5G Helps E-commerce Realize Technological Innovation
2.3 5G Helps E-Commerce Achieve Operational Innovation
3 The Status Quo of Regional Industry Development in the Guangdong-Hong Kong-Macao Greater Bay Area
4 The Status Quo of Coordinated Development of E-Commerce and Regional Industries
5 5G Technology Promotes the Coordinated Development Path of Industries and E-Commerce in the Bay Area
5.1 “5G+” E-Commerce Strengthens the Construction of an Ecosystem for the Coordinated Development of the Two
5.2 The Bay Area Industry Accelerates the Construction of a Supporting System for the Coordinated Development of the Two
5.3 Government Departments Increase the Promotion and Policy Guarantees for 5G Technology
6 Conclusion
References
Relay-Leader Based MAC Layer Multicast Protocol for 60 GHz Millimeter-Wave WLAN
1 Introduction
2 Design of the RLBMMP
2.1 Hierarchical Networking
2.2 Control Layer Based on LBP Networking
2.3 Relay of Data Layer
3 Simulation of the RLBMMP
3.1 Time Delay
3.2 Throughput
4 Conclusions
References
3D Point Cloud Data and Image Registration Technology
1 Introduction
2 3D PC and Optical Image Registration Method
2.1 Existing PC Data and Optical Image Registration Methods
2.2 PC and Optical Image Registration Based on Improved RIFT Algorithm
3 3D PC and Optical Image Registration Experiment
3.1 Experimental Method
3.2 Source of Experimental Data
3.3 Preprocessing of Experimental Data
4 Experimental Results of 3D PC and Optical Image Registration
4.1 Automatic Correlation and Accuracy of Airborne PC Depth Map and Aerial Survey Image
4.2 External Element Optimization and Precision
5 Conclusions
References
New Social Media Communication Based on Literature Analysis Method Technology
1 Introduction
2 Method
2.1 Literature Analysis Method
2.2 CBOW Language Model Algorithm
2.3 Research Front Analysis
3 Experiment
3.1 Experimental Investigation Objects
4 Results
5 Conclusion
References
Optimizing CO2 Emissions and Cost of Shear Wall Structure Based on Computer Simulation
1 Introduction
2 Mathematical Models and Methods
2.1 Design Objectives
2.2 Design Variable
2.3 Constraint Functions
3 Application and Discussion
4 Conclusion
References
Acceptance of Green Packaging Self-service Access System for Simulated Annealing Algorithm
1 Introduction
2 Packaging Self-storage Based on the Simulated Annealing Algorithm
2.1 Composition Elements of the Simulated Annealing Algorithm
2.2 Improved Simulated Annealing Algorithm
3 Green Packaging Self-storage Algorithm Verification
3.1 Parameters Related to the Algorithm
3.2 Sensitivity Analysis
4 Verification Results of the Green Packaging Self-storage Algorithm
4.1 Sensitivity Analysis Under Different Calculation Case Sizes
4.2 Sensitivity Analysis Under Different Pressure Volume
5 Conclusion
References
Influence of Environmental Regulations on the Performance of China’s Heavy Pollution Listed Companies Based on Eviews 8.0 Software
1 Introduction
2 Research Background
3 Correlational Research Status
4 Research Design
4.1 The Proposal of the Research Hypothesis
4.2 Research Samples and Selection Basis
4.3 Selection of Research Variables
4.4 Construction of the Model
5 Empirical Result Analysis
6 Policy Suggestion
6.1 Enhance the Intensity of Environmental Regulations and Attach Importance to Incentive-Based Environmental Regulations
6.2 Increase Policy Subsidies and Strengthen the Guidance of Company Innovation
6.3 Strengthen Environmental Performance Supervision and Promote the Construction of a Green Financial System
7 Conclusion, Shortage and Outlook
References
Development Strategies of China’s Rural Tourism E-Commerce Under the Background of “Internet Plus”
1 Current Situation of the Development of Rural Tourism E-Commerce
2 Analysis of the Problems Existing in the Development of Rural Tourism E-Commerce
2.1 Lack of Systematic and Professional Planning
2.2 Humanized Service Requires Improvement
2.3 Lack of Multi-disciplinary Talents of Rural Tourism E-Commerce
2.4 Lack of Online Marketing and Publicity Method
3 Development Strategies for Rural Tourism E-Commerce Under the Background of “Internet Plus”
3.1 The Government Should Improve the Strategic Planning and Integrate the Business Platforms of Rural Tourism to Realize Sustainable Development
3.2 Using Internet Big Data to Develop Rural Tourism Community and Create Humanized E-Commerce Website Service
3.3 The Cultivation of Rural Tourism E-Commerce Talents Should Be Valued
3.4 Operators Should Change Their Ideas, Keep Pace with the Times and Diversify Their Marketing Efforts
References
Application Method of BIM in Bridge Operation and Maintenance
1 Introduction
2 BIM Application Method for Bridge Operation
2.1 BIM Operation and Maintenance Application Method
2.2 BIM Application Method for Bridge Maintenance
3 Experiment
3.1 Research Methods
3.2 Experimental Design
4 Results and Discussion
5 Conclusions
References
Technical and Economic Evaluation of Flexible Substation AC/DC Distribution Network Based on ANP
1 Introduction
2 Establishment of Technical and Economic Evaluation Index System
2.1 Technical Performance Indicators
2.2 Economic Benefits
2.3 Environmental Impact
2.4 Policy Factors
3 Empirical Analysis
3.1 ANP Model Creation
3.2 Construct ANP Supermatrix to Calculate Weight
3.3 Comprehensive Technical and Economic Evaluation of AC/DC Distribution Network of Flexible Substation
4 Conclusion
References
Development Space and Prospect of the Charging Pile Market
1 Market Analysis of the Development Status of Electric Vehicle Charging Pile Market in China
2 Calculation of the Development Scale and Development Potential of China’s Charging Pile Market
3 Exploration of the Charging Operation Mode
4 Main Bottlenecks Bottleneck and Breakthrough in Charging Charging Charging Charging Pile Industry
4.1 Main Bottlenecks Facing China’s Charging Pile Industry
4.2 A Breakthrough Analysis on the Development of the Charging Pile Industry in China
5 “Transformation” of Charging Pile under the Background of “New Infrastructure”
References
AHP Matter Element Model for Expressway Service Quality Evaluation
1 Introduction
2 Service and Service Quality
2.1 Concept of Service
2.2 Concept of Expressway Service Quality
2.3 Customer Satisfaction and Service Quality Theory
3 Evaluation System of Expressway Service Quality
3.1 Road Condition Factors
3.2 Traffic Operation Factors
3.3 Traffic Environment Factors
3.4 Management System Factors
4 AHP Matter Element Model of Expressway Service Quality
4.1 Matter Element Determination of Expressway Service Quality
4.2 Weight Determination Based on AHP
4.3 Determination of Correlation Function and Comprehensive Correlation Degree
5 Conclusion
References
Research and Model Construction of Teacher Competency Based on K-Means Clustering Algorithm
1 Introduction
2 Competency Concept
3 K-Means Clustering Algorithm
3.1 Introduction of K-Means Clustering Algorithm
3.2 Basic Idea of K-Means Clustering Algorithm
3.3 Main Process of K-Means Clustering Algorithm
4 Data Analysis Model of English Teaching Post Competency Evaluation
4.1 Constraint Parameter Data Analysis
4.2 Quantitative Recursive Analysis of Assessment
5 Optimization of English Post Competency Evaluation Model
6 Conclusion
References
Application of Clustering Analysis Based on Ant Colony Algorithm in Performance Evaluation
1 Introduction
2 Ant Colony Algorithm
3 Guiding Significance of Ant Colony Algorithm Practical Teaching Effectiveness Evaluation Model for College English Practical Teaching
4 The Mathematical Model of Ant Colony Algorithm Practical Teaching Effect Evaluation
4.1 Mathematical Model of Mosquito Swarm Algorithm
4.2 MMAS Pheromone
4.3 Maximum Matching of Bipartite Graphs
5 Relationship Between OKR Self-Evaluation and Performance Evaluation
6 Concluding Remarks
References
The Application of Curve Algorithm and Computer Aided Design in Garment Design
1 Introduction
2 Bezier Curve Generation Algorithm
2.1 The Property of Constant Ratio Partition of Second Order Bezier Curve
2.2 Computer Iterative Calculation Method
3 Several Common Inverse Fitting Algorithms in Fashion Design
4 Input of Cutting and Curve Fitting
5 Conclusion
References
DEA Algorithm for Performance Evaluation of Public Sector with Benchmarking Management
1 Introduction
2 Performance Evaluation
2.1 Difficulties in Performance Evaluation of Public Sector
2.2 Basic Principles and Methods of Public Sector Performance Evaluation
3 Modeling Analysis
4 Model Application
5 Conclusion
References
TD-LTE Handover Algorithm for High Speed Railway Mobile Communication
1 Introduction
2 Wireless Coverage of LTE
2.1 Multi RRU Shared Cell
2.2 Overlapping Coverage Area Planning
3 Parameter Measurement of LTE
3.1 Physical Layer Measurement
3.2 Wave Filtering
4 Handover Algorithm of LTE
5 Conclusion
References
Optimal Allocation of Electric Vehicle Investment Based on Coupling Decision of Investment Return and User Utility
1 Introduction
2 Analysis of Electric Vehicle Charging Demand
2.1 Probability Distribution of Daily Driving Distance of Electric Vehicles
2.2 Bi Level Programming Model of Electric Vehicle Charging Station
3 Planning of Regional Charging Station
4 Conclusion
References
Enterprise Brand Marketing Communication Based on Computer Technology
1 Introduction
2 Method
2.1 CT
2.2 Corporate Brand
2.3 Marketing Communication
2.4 Probability Formula and Mathematical Expectation Formula
3 Experiment
3.1 Research Objects
3.2 Experimental Research Steps
4 Discussion
4.1 Consumers’ Understanding of the Two Brands
4.2 Annual Turnover of the Two Enterprises
5 Conclusion
References
Improving Traditional Environmental Infrastructure with Park Strategy Assisted by Artificial Intelligence
1 Introduction
2 Overview of Traditional Environmental Infrastructure
2.1 Cause Secondary Pollution
2.2 Trigger the “Movement to Avoid Neighbors”
3 Case Analysis of Park Strategy Application
3.1 Topographical Elements
3.2 Plant Elements
3.3 Water Elements
3.4 Pavement Elements
3.5 Building Elements
3.6 Landscape Facilities Elements
3.7 Results and Discussion
4 Summary of Design Strategy of Park Type Environmental Infrastructure
4.1 Improving “Secondary Pollution” with Landscape Elements
4.2 Using Immersive Experience to Improve the Phenomenon of “avoiding Neighbors”
4.3 Water Ecosystem Realizes “Environment Friendly”
5 Conclusion
References
New Path of Using Computer Induction and Integration Technology to Govern the Comprehensive Management of Tourism Market
1 Introduction
1.1 Background and Significance
1.2 Related Work
1.3 Main Content
2 Methods on the New Path of Comprehensive Management of the Tourism Market Using Computer Induction and Integration
2.1 AHP
2.2 Reliability Analysis and Validity Analysis
3 Experimental Reliability Analysis Data and Questionnaire Survey Data Analysis
3.1 Reliability Analysis
3.2 Validity Analysis
4 Experimental Data Results
4.1 Degree of Change in Spatial Form and Traditional Culture
4.2 Utilization Degree of Ancient Buildings and Traditional Culture
5 Conclusions
References
A CP-ABE Scheme for Multi-user Queries in IoT
1 Introduction
2 Related Work
3 System and Security Model
3.1 System Model
3.2 Security Model
4 The Proposed Scheme
4.1 Setup Phase
4.2 Encryption Phase
4.3 Query Phase
4.4 Decryption Stage
5 Security Analysis
6 Performance and Comparative Study
7 Conclusion
References
A Vertical Federation Framework Based on Representation Learning
1 Introduction
2 Related Work
3 Preliminary Knowledge
3.1 Vertical Federated Learning
3.2 Unsupervised Contrastive Learning
3.3 Graph Neural Networks
4 Vertical Federation Scheme Based on Representation Learning
5 Conclusion
References
Industry and Education for Data Usage in Smart City
Systematic Practice of Composition Courses Based on the Computer-Aided Technology
1 Meaning and Expression of Composition
1.1 Creative Thinking and Systematization
1.2 The Characteristics of the Correspondence Between the Composition Form and the Computer Graphics
2 Combination of Plane Composition and Computer
2.1 Transmission of Ideas
2.2 Quantitative Change Produces Qualitative Change
2.3 Teaching Practice of Vector Graphics Editing Software
3 Computer-Aided Color Composition
3.1 Adjust the Teaching Mode of Color Composition
3.2 Analysis of the Advantages and Disadvantages of Traditional Hand-Painting and Computer Use in Color Composition
3.3 Teaching Practice of Image Processing Software
4 Use Computer to Construct the Teaching Plan of Three-Dimensional Composition
4.1 Teaching Practice of Three-Dimensional Software
4.2 Feasibility of the Application of Computer in Three-Dimensional Composition
5 Teaching Innovation of the Composition Course
5.1 Executive Efficiency and Understanding Ability
5.2 Science Technology and Design
6 Conclusion
References
An Empirical Study on Influencing Factors of R&D Investment of Technology-Intensive Private Enterprises in the Age of Informatization
1 Introduction
2 Theoretical Basis and Research Hypothesis
2.1 The Innovation Chain Theory
2.2 “The Innovation Chain with R&D Investment as the Core” Model
3 Research Design
3.1 Samples and Data Sources
3.2 Definitions of the Variables
3.3 Results
4 Conclusion and Suggestions
4.1 Conclusion
4.2 Suggestions
References
Thoughts on the Future Development of Educational Management in the Internet Era
1 Introduction
2 Significance and Characteristics of Educational Management
2.1 Educational Management Is not an End in Itself, but a Means
2.2 Educational Management and Other Management Have Similarities, but also Have Significant Differences
3 The Influence of Classical Management Theory on Educational Management
3.1 Tiro’s Scientific Management Theory
3.2 Weber's Theory of Administrative Organization System
4 The Influence of Classical Management Theory on Educational Management
5 The Development Trend of Modern Educational Management in the Internet Era
5.1 Management Informatization
6 Conclusions
References
How to Use Information Technology to Build a Digital Media Art Teaching Resource Library
1 Introduction
2 Information Technology Builds Digital Media Art Teaching Resource Library
2.1 Features of Digital Media Art
2.2 Collection Channels of Digital Media Art Teaching Resources
2.3 K-means Data Mining Algorithm
3 Experiment
3.1 Operating Environment of the System
3.2 Administrator Function Module
3.3 General User Function Module
3.4 Database Framework Structure
4 Discussion
5 Conclusions
References
Construction of Teaching Quality Evaluation System in Colleges and Universities Based on BP Neural Network
1 Introduction
2 Basic Methods of Teaching Quality Evaluation
2.1 Classification by Area of Study
2.2 Classification by Subject
2.3 Classification by Standard Source of Evaluation
3 The Defects of the Traditional Teaching Evaluation System
4 The Determination of Teaching Quality Evaluation Index in Colleges and Universities
5 The Design of the Evaluation Framework for the Quality of University Training
5.1 Framework Design of Teaching Quality of University Training
5.2 Evaluation System of Teaching Quality of University Training
6 Applicability of Neural Network in Teaching Quality Evaluation
References
Achievements and Prospects of Intelligent Development of Teaching Process in Digital Age
1 Introduction
2 Methodology
2.1 Method
2.2 Sample Selected
3 Results
4 Conclusions
References
Design of Network Education Platform Based on Cloud Computing Technology
1 Introduction
2 The Design of Online Education Platform Based on Cloud Computing
2.1 Cloud Computing Delivery Deployment Model
2.2 Cloud Computing Related Technologies
2.3 Design of Educational Cloud Platform
2.4 PageRank Algorithm
3 Experimental Research on the Network Education Platform
3.1 Problems in the Development of Online Education Platforms
3.2 Sample Questionnaire Survey Process
4 The Feasibility Experiment Analysis of Network Education
4.1 The Sample Uses the Network Platform to Teach the Class Information Statistics
4.2 Analysis of Equipment Based on Network Education
5 Conclusion
References
MOOC Vocal Music Blended Teaching Mode and Digital Resource Platform Design in the Information Age
1 Introduction
2 Process of MOOC-Based Blended Vocal Music Teaching
3 Design of MOOC Digital Resource Management Platform
4 Application of MOOC-Based Blended Vocal Music Teaching
References
The Construction of Individualized Teaching Mode of Children’s Literature Based on Information Technology
1 Introductions
2 Research on Personalized Teaching Mode of Children’s Literature
2.1 Problems in the Individualized Teaching of Children’s Literature
2.2 The Role of Information Technology in Personalized Teaching
3 Investigation of Individualized Teaching of Children’s Literature
3.1 Purpose of the Investigation
3.2 Respondents
3.3 Survey Tool Design
3.4 Data Processing
4 Result Analysis
4.1 Expected Functions of the Supporting Environment for Personalized Learning of Children’s Literature
4.2 Difficulties that May Exist in the Teaching Process of Personalized Learning
4.3 The Construction of a Personalized Teaching Model for Children’s Literature
5 Conclusions
References
Online Teaching of Computer 3D Software Courses
1 The Teaching Status of 3D Software Application Course
2 Advantages of Online Teaching of 3D Software Application Courses
2.1 Contribute to the Comprehensive Growth of Students
2.2 Help Teachers Improve Their Professional Level
3 Online Teaching Strategies for 3D Software Application Courses
3.1 Flexible Use of Online Teaching Aids
3.2 Blurred Entities, Make up for Students’ Spatial Imagination
3.3 Actively Adopt the Teaching Mode of Micro-classes
3.4 Pay Attention to Showing Feedback Signals to Students
3.5 Combining “Online + Offline”, Focusing on Online Platform Construction
4 Concluding Remarks
References
Design and Realization of Basketball Tactics Computer Aided Teaching System
1 Introductions
2 Research on Computer Aided Teaching System of Basketball Tactics
2.1 Research Methods
2.2 Design and Analysis of Basketball Tactics Computer-Aided Teaching System
3 Design and Realization of Basketball Tactics Computer-Aided Teaching System
3.1 The Overall Architecture of System Function Modules
3.2 Tactical Demonstration Module
3.3 Tactics Teaching Module
4 System Testing
4.1 Test Design
4.2 Data Processing
4.3 Result Analysis
5 Conclusions
References
Ecosystem of Innovation and Entrepreneurship Education in Universities Based on Cloud Computing
1 Introduction
2 Framework of IEE Ecosystem in Universities Based on CC
2.1 Functional Mechanism of the Framework of IEE Ecosystem in Universities Based on CC
2.2 Build a Practice Platform of IEE Ecosystem in Universities Based on CC
3 Survey on the Current Situation of IEE Ecosystem Structure in Universities
3.1 Survey Method
3.2 Survey Subjects
3.3 Data Statistics
4 Investigation and Analysis of the Current Situation of the Ecosystem Framework of IEE in Universities
4.1 Faculty
4.2 Curriculum of IEE
5 Conclusions
References
Teaching Research on Automatic Evaluation System of Japanese Pronunciation Based on Artificial Intelligence
1 Introductions
2 Research on Automatic Evaluation System
2.1 Automatic Pronunciation Evaluation Process
2.2 System Requirement Analysis
3 Design of an Automatic Evaluation System for Japanese Pronunciation Based on Artificial Intelligence
3.1 The Overall Structure of the System Function
3.2 User Management Module
3.3 Course Selection Module
3.4 Online Evaluation
3.5 Organizational Structure of the System
3.6 Development Tools
4 Automatic Evaluation System Detection
4.1 Evaluation Design
4.2 Data Processing
4.3 System Evaluation and Manual Evaluation
4.4 System Use Evaluation
5 Conclusions
References
E-commerce on International Economic and Trade Under the Internet Plus Background
1 Introduction
2 The Influence of E-commerce on IE and Trade Under the Internet Plus Background
2.1 Internet Plus Background Brings Opportunities to IE and Trade
2.2 IE and Trade
3 Research Methods and Data Sources
3.1 Research Methods
3.2 Data Source
3.3 Research Indicators
4 The Impact of E-commerce on IE and Trade Under the Internet Plus Background
4.1 Internet Development Trend Analysis
4.2 Impact of E-commerce on IE and Trade Under the Background of Internet and Countermeasures
4.3 In View of This Paper Puts Forward Some Countermeasures
5 Conclusions
References
Influence of Internet Plus on Traditional Accounting Industry Under the Background of Information Technology
1 Introduction
2 Overview of the Internet Plus and Its Impact on Accounting Development
2.1 “Internet Plus” Impact on Accounting Development
2.2 Analysis Method
3 Research Methods and Data Sources
3.1 Research Ideas
3.2 Research Materials and Experimental Design
4 Discussion and Analysis of Research Results
4.1 Analysis of the Current Situation of Accounting Talents in China
4.2 Analysis of the Transformation Countermeasures of Accounting Industry
5 Conclusions
References
Teaching Reform of “Advertising Poster Design” Based on O2O Mode in “Internet+” Environment
1 Introduction
2 Teaching Reform of “APD” Based on O2O Mode Under “Internet+” Environment
2.1 Teaching Advantages of the Course “APD” Based on the O2O Model
2.2 Teaching Reform Strategies of “APD” Based on the O2O Model
2.3 Teaching and Learning Optimization Algorithm
3 Investigation and Research on the Teaching Reform of “APD” Based on O2O Mode in the “Internet+” Environment
3.1 Purpose of the Investigation
3.2 Investigation Implementation
3.3 Distribute and Collect Questionnaires
4 Analysis of the Results of a Questionnaire Survey on the Teaching Reform of “APD” Based on the O2O Model in the “Internet+” Environment
4.1 “APD” Curriculum Cognition Survey
4.2 Teaching Reform Effect of “APD” Based on O2O Model
5 Conclusion
References
Construction and Reform of Preschool Children’s Professional Curriculum Based on Big Data
1 Introduction
1.1 Background and Significance
1.2 Related Work
1.3 Main Contents
2 Construction and Reform Methods of Preschool Children’s Professional Curriculum Under Big Data
2.1 Periodic Analysis
2.2 Reading Learning Method
3 Experiment on Curriculum Construction and Reform of Preschool Children
3.1 Reform of Teaching Mode
3.2 Curriculum Evaluation Reform
4 Construction and Reform of Preschool Children’s Professional Curriculum Based on Big Data
4.1 Present Situation of Preschool Children’s Professional Courses
4.2 Preschool Children’s Professional Curriculum Prospect Analysis
5 Conclusions
References
Construction of Ubiquitous Multimodal Mobile Education Model for College English Based on Cloud Computing
1 Introduction
2 English Ubiquitous Learning Modes Based on Cloud Computing
3 Practical Utility of Ubiquitous Teaching Mode Based on Cloud Resources
4 Principles of Building Ubiquitous Multimodal Mobile Education Model for College English
4.1 The Principle of Modal Optimal Selection
4.2 The Principle of Flexible Application and Timely Updating
5 Construction of Mobile College English Teaching Model in Multimodal Environment
6 The Implementation of Ubiquitous Multimodal Mobile Education Model for College English
7 Conclusion
References
How to Develop Agricultural Modernization by Inclusive Finance Under Modern Information Technology
1 Introduction
2 The Role of Inclusive Finance on Agricultural Modernization
2.1 Improve the Level of Agricultural Production Technology
2.2 Reduce the Cost of Agricultural Production and Operation
2.3 Improve the Capacity of Rural Infrastructure Construction
2.4 Accelerate the Integration of Primary, Secondary Industry and Tertiary Industry
3 Ways to Improve the Level of Agricultural Modernization
3.1 Introducing Modern Information Technology
3.2 Developing Modern Industrialization Management Mode
3.3 Establishing Agricultural Insurance System
3.4 Improve Inclusive Financial Market
4 Conclusion
References
Dilemma and Breakthrough of School-Enterprise Integration in Cultivating Applied Cross-Border E-commerce Talents Under the Background of Internet
1 Raising the Problem
2 The Mechanism of School-Enterprise Integration in Cultivating Cross-Border E-commerce Applied Talents Under the Background of Internet
2.1 The Essence of Talent Cultivation of School-Enterprise Integration is the Interaction Between Schools and Enterprises
2.2 Vocational Ability Promotion is the Fundamental Purpose of School-Enterprise Integration to Cultivate Cross-Border E-commerce Application-Oriented Talents
3 The Dilemma of Cross Border E-commerce Application-Oriented Talents Training Based on School-Enterprise Integration
3.1 Application-Oriented Colleges and Universities Lack Resources for Deep Integration
3.2 Cross-Border E-commerce Enterprises Lack the Motivation of Deep Integration with Schools and Enterprises
4 Suggestions on Breaking Through the Dilemma of Cross-Border E-commerce Applied Talents Training Under the Background of Internet
4.1 Using the Connectivity of the Internet to Aggregate High-Quality Resources, and Gradually Expanding from Point to Area
4.2 Taking Advantage of the Interactivity of the Internet to Adopt an “Advanced” and Progressive Cooperation Mode
References
The Construction of University Student Management System Platform Under the Background of Internet
1 Introduction
2 The Platform of College Student Management System
2.1 Related Technologies
2.2 System Requirement Analysis
2.3 Analysis of the Whole Process of Student Management
2.4 Non-functional Demand Analysis
2.5 Application of Clustering Algorithm in Students’ Performance Evaluation
3 System Design Experiment
3.1 System Design
3.2 System Implementation
4 System Test
5 Conclusion
References
Current Situation and Strategy of Information Technology in Art Class Teaching in Colleges Under the Background of “Internet+”
1 Introduction
2 The Role of Information Technology in Art Classroom Teaching in Colleges
2.1 Greatly Enhance Students’ Interest in Learning
2.2 Greatly Improve Teaching Efficiency and Effectiveness
2.3 Greatly Broaden Students’ Thinking and Horizons
3 The Current Situation of Art Classroom Teaching in Colleges
3.1 The Problem of Teaching Positioning
3.2 The Goal of Training Talents in Fine Arts Is Not Clear Enough
3.3 Cultural Literacy, Art Theory and Painting Practice Are Not Closely Integrated
4 Countermeasures to Improve the Classroom Teaching Level of the Art Major of Information Technology Colleges Under the Background of “Internet+”
4.1 The Background of the Reform of Art Classroom Teaching
4.2 The Transformation of Teacher's Role
4.3 Teaching Model Reform Practice
4.4 Curriculum Class Open Network Course Art Teaching
5 Conclusion
References
Artificial Intelligence and Ethical Wisdom Education of College Students Against the Background of the Internet
1 Introduction
2 The Relationship Between the Internet and College Students’ Sense of Self-worth
3 The Influence of the Internet Age on College Students’ Self-worth
3.1 The Influence of Internet Information Technology on College Students’ Sense of Self-worth
3.2 The Internet Environment Has Recreated a New Form of Information Production and Dissemination
3.3 The Way that College Students Use Explicit Classroom Education Has Been Fundamentally Changed
3.4 The Internet Environment Tends to Diversify the Values, Ethics, and Sense of Morality of College Students.
4 The Optimization of College Students’ Self-values and Ethics in the Internet Age
4.1 Integrate the Moral Quality, Mental Health and Other Multi-dimensional Aspects, Establish Four Consciousnesses for College Students to Form Correct and Healthy Self-values
4.2 Guide College Students to Form Correct Self-evaluations Through the Establishment of an Ethical Education Atmosphere
4.3 Strengthen College Students’ Confidence in Individual Development and Professional Prospects Through the Establishment of a Good Internet Information Environment
4.4 By Media Platforms and Artificial Intelligence Technology, Through Implicit Education Methods for College Students, Guide Students from Thought, Behavior, and Psychology
5 Conclusion
References
Application of Random Simulation Algorithm in the Evaluation of Physical Education
1 Introduction
2 Application of SSA in the Evaluation of Physical Education
2.1 Content and Scope of Physical Education Evaluation
2.2 Random Simulation Algorithm
2.3 Application of SSA in the Evaluation of Physical Education
2.4 Data Mining Algorithm in Random Simulation
3 Experimental Research on the Application of SSA in the Evaluation of Physical Education Teaching
4 Application of SSA in the Evaluation of Physical Education
4.1 Comparison of the Running Time of the Algorithm Under Different Data Volumes
4.2 Relationship Between Running Time and Minimum Support Threshold
5 Conclusion
References
Compliance of English-Chinese Code-Switching in English Teaching Based on Corpus Technology
1 Introduction
2 English and Chinese Code-Switching Under the Corpus
2.1 Overview of Code-Switching
2.2 Application of Corpus in English Teaching
2.3 Code-Switching in English Teaching
3 A Survey of Code-Switching in English Classroom Teaching
3.1 Data Sources
3.2 Data Analysis
4 Results of the Survey
4.1 Code-Switching Frequency Distribution of English Teachers
4.2 Code-Switching Frequency of English Teachers in Different Classes
4.3 Compliance of Code-Switching
5 Conclusions
References
Algorithm Analysis of Ad Hoc Network Driver Routing Protocol for Internet of Things
1 Introduction
2 Ad Hoc Network Driven Routing Protocol
2.1 Principle of Table Driven Routing Protocol
2.2 Principle of Source Driven on Demand Routing Protocol
3 Ad Hoc Network Driven Routing Protocol Algorithm for Dedicated Frequency Point in Internet of Things
3.1 Design of Ad Hoc Network Model with Dedicated Frequency Point for Internet of Things
3.2 Improvement of Network Routing Protocol
4 Experimental Analysis
5 Conclusion
References
Research on Predictive Location Algorithm of Anti Theft and Early Warning Wireless Sensor Network Based on Optimized Algorithm
1 Introduction
2 Analysis of Target Location and Tracking Algorithm in Wireless Sensor Networks
2.1 Architecture of Wireless Sensor Network
2.2 Target Tracking in Wireless Sensor Networks
3 Moving Target Detection and Ranging Algorithm
3.1 Positioning Based on Ranging Technology and Positioning Without Ranging Technology
3.2 Classical Ranging Methods
4 Location Algorithm
4.1 Trilateral Positioning Algorithm
4.2 Triangulation Algorithm
5 Simulation Results and Analysis
6 Summary
References
The Camouflage Information Detection Method of Internet of Things Based on B-ISVM Algorithm is Studied
1 Introduction
2 Summary of Smart Home
3 Design of Smart Home System Based on Aiijoyn
3.1 System Implementation
3.2 System Architecture
4 The Selection of Intelligent Home System Classifier
4.1 Machine Learning Classifier
4.2 Unsw-Nb15 Data Set
5 Intrusion Detection Model Based on Ant Lion Optimized SVM
5.1 Intrusion Detection Model Based on SVM
6 Conclusion
References
Research on Intelligent Location of 5G Network Coverage Problem Based on Ant Colony Algorithm
1 Introduction
2 Intelligent Location of 5G Coverage Problem
3 Node Localization Method Based on Ant Colony Algorithm
3.1 Calculation Method of Positioning Node
3.2 Node Localization Method Based on Ant Colony Algorithm
3.3 Ranging Technology in Wireless Sensor Networks
4 Conclusion
References
Mathematical Basis of Particle Swarm Optimization Algorithm
1 Introduction
2 Description of Particle Swarm Optimization Algorithm
2.1 Group Division and Speed Update
2.2 Improve the Convergence Rate
3 Analysis of Mathematical Basis Algorithm of Particle Swarm Optimization Algorithm
3.1 Algorithm Analysis
3.2 Experimental Environment
4 Conclusion
References
Design and Implementation of Agricultural Products E-Commerce Industrial Structure Upgrading System Based on Classification Algorithm
1 Introduction
2 Introduction to Related Technologies
2.1 J2EE Overview
2.2 Classification Algorithm
3 System Overview
3.1 Client
3.2 Business
3.3 Platform End
4 System Design
5 Conclusion
References
Research on Real Time Data Acquisition of Sprint Based on Intelligent Fuzzy System
1 Introduction
2 The Basic Introduction of Fuzzy Algorithm
2.1 Parameter Setting and Genetic Operation Based on Fuzzy Logic
2.2 Genetic Operation Based on Fuzzy Logic
3 Hardware Design of Data Acquisition System
3.1 Acceleration Sensor Module
3.2 Pressure Sensor Module
3.3 Signal and Data Processing Module
3.4 Display Module
4 Epilogue
References
A Search Algorithm of Distance Education Model Based on Agent
1 Introduction
2 Agent Partition
3 Agent Model of Distance Education System
4 Basic Characteristics of the Model
5 Implementation Environment and Key Technologies of the Model
6 Conclusion
References
Robot Path Planning Based on Artificial Intelligence Algorithm
1 Introduction
2 Introduction to Basic Knowledge of Path Planning
2.1 Introduction of Artificial Potential Field Method
2.2 Local Minima of Neural Networks
2.3 Optimization of Wavelet Neural Network by Genetic Algorithm
3 Robot Path Planning Method Based on Artificial Intelligence Theory
3.1 Representation of Robot Path Planning Environment
3.2 Method Design of Virtual Obstacle
3.3 Design of Hybrid Intelligent Path Optimization Algorithm
4 Conclusion
References
Influence of Artificial Intelligence on the Research of Effective Thickness Electrical Standard
1 Introduction
2 Cause Analysis of Thickness Change
2.1 Thickness Comparison of Different Well Patterns
2.2 Comparative Analysis of Various Thickness in Different Logging Series
3 Research on Electrical Property Standard
3.1 Determination of Electrical Standard Unit
3.2 Development of Electrical Standards
4 Practical Application
5 Conclusion
References
Comparison of Ciphertext Features for Data Deduplication
1 Introduction
2 Preliminaries
2.1 Bilinear Maps
2.2 Hash Function
2.3 The Randomness Test of the Coefficients of the RCAR (1) One-Variable Autoregressive Model
3 System Model
4 Design Goals
5 Comparison of Ciphertext Features Before Ciphertext Deduplication
5.1 System Setup
5.2 Ciphertext Generation
5.3 Ciphertext Transformation
5.4 Sampling Data Processing
5.5 Data Contrast
5.6 Regression Model Test Analysis
6 Security Analysis
7 Conclusion
References
Reputation-Based Defense Scheme Against Backdoor Attacks on Federated Learning
1 Introduction
2 Related Work
3 Existing Attack Modes
4 Design of Incentive Selection Model
4.1 Workflow of Incentive Selection Model
4.2 The Weighting
4.3 The Updated Federated Average Algorithm
4.4 Performance Analysis
5 Concludes
References
Research on Security Vulnerability Detection of Smart Contract
1 Introduction
2 Related Work
3 Smart Contract Mechanism
3.1 The Workflow of Smart Contracts
3.2 Problems and Solutions
4 Smart Contract Security Issues
5 Smart Contract Vulnerability Detection Method
5.1 Contract Audit
5.2 Vulnerability Detection Methods
6 Conclusion
References
Short Paper Poster Track
Application Discussion of VR Technologies in FLT
1 Introduction
1.1 VR Technologies
2 Current Status of FLT
2.1 Situation
2.2 Opening up a New World
3 The Teaching Method of VR Technologies in FLT in Higher Education
3.1 Making VR Technologies Teaching Courseware
3.2 Creating a VR -Based Language Skills Learning Environment
3.3 Building a Cultural Language Learning Environment for VR Technologies
3.4 Constructing an Educational Resource Sharing
3.5 Immersive Classroom Teaching
4 There Are Several Problems
5 Conclusion
References
Status Quo and Key Technologies of Artificial Intelligence
1 Status of AI
1.1 Basic Recognition Function of AI
1.2 Basic Application Areas of AI
2 Research on Key Technologies of AI
2.1 BP Neural Network Calculation Method
2.2 Support Vector Machine Algorithm
2.3 K-means Algorithm
3 Conclusion
References
Application of Artificial Intelligence in Art Design
1 Introduction
2 AI and Art Design
3 Application of AI in Art Design
3.1 The Application of AI in Graphic Design
3.2 The Application of AI in Architectural Design
3.3 The Application of AI in Clothing Design
4 The Impact of AI on Art Education
5 The Application Prospect of AI in Art Design
6 Conclusions
References
An Evaluation Experiment of Photothermal Performance of PVT Hot Water Module Based on Big Data
1 Introduction
2 The Micro Cluster Structure Model for Large Data Processing
3 Result
4 Conclusions
References
Application of Big Data Information Processing Technology in Improving English Reading Speed
1 Introduction
2 Concept of English Reading Teaching Mode in the Context of Big Data
3 English Reading Teaching Mode in the Context of Big Data
3.1 Grasp Current Affairs Hotspots by Using Big Data to Enhance the Daily Life of Reading Teaching
3.2 Use Big Data to Master Discourse Hotspots and Feel the Charm of Reading Teaching
3.3 Make Use of the Data Age to Strengthen the Refinement of Reading Teaching
4 Problems of English Reading Teaching Mode in My Country
5 The Strategies for the Improvement of English Reading Speed in the Context of Big Data in My Country's Colleges and Universities
6 Conclusion
References
Application and Exploration of Edge Computing in Ubiquitous Electric Internet of Things
1 Introduction
2 Ubiquitous Power Internet of Things and Edge Computing
2.1 Ubiquitous Power Internet of Things
2.2 Edge Computing
3 Application of Edge Computing in the Ubiquitous Power Internet of Things
3.1 Edge Computing and Online Monitoring of Transmission Lines
3.2 Edge Computing and Intelligent Substation
3.3 Edge Computing and Smart Energy Use
3.4 Edge Computing and Electric Vehicle Intelligent Internet of Vehicles System
4 Difficulties and Challenges in Edge Computing
4.1 How to Guarantee the Data Privacy and Security
4.2 Compatibility Technology of Edge Computing Nodes
4.3 Reliability of Edge Computing Service Management
5 Peroration
References
Big Data Research on China’s Service Industry Under the COVID-19 Epidemic
1 Introduction
2 Customer Satisfaction Model
3 Customer Satisfaction Scores
4 Main Findings
4.1 Quality of Service Industry Showed Strong Resilience Under the Impact of the Epidemic
4.2 Overall Brand Competitiveness of Enterprises Has Improved
4.3 Decline in Customers’ Satisfaction in the Mobile Communications Field Requires Focus
4.4 Decline in Customers’ Satisfaction in the Mobile Communications Field Requires Focus
5 Conclusions
References
Integration Effect of International Exhibition Resources Based on the Cluster System
1 Introduction
2 Literature Review and Research Hypothesis
2.1 Temporary Cluster and International Exhibition
2.2 Cluster’s Effect on Resource Integration
2.3 Research Hypothesis
3 Research Design
3.1 Sample Collection
3.2 Research Design
4 Data Analysis
4.1 Exploratory Factor Analysis
4.2 Confirmatory Factor Analysis
4.3 Hypothesis Test
5 Conclusion
References
Urban Cable Field Inspection Technology Based on MR Technology
1 Introduction
2 Mixed Reality
2.1 Research Status
2.2 MR Technology Advantages
2.3 MR Technology Features
3 MR Image Segmentation Technology
4 Application of MR Technology in City Cable Field Inspection
5 Conclusions
References
How Negative Online Reviews Affect Consumers’ Purchase Intention
1 Introduction
2 Hypotheses
2.1 Conceptual Model
2.2 Hypotheses
3 Empirical Analysis
3.1 Reliability Analysis
3.2 Regression Analysis
4 Results and Discussion
References
Computer Management Method of Foreign Trade Business Expenses Based on Data Analysis Technology
1 Introduction
2 Cross Border E-Commerce and K-Means Clustering Algorithm
2.1 Cross Border E-Commerce
2.2 Data Analysis Technology and K-Means Clustering Algorithm
2.3 Research Object and Research Design
3 Analysis of Research Results
3.1 Process Analysis of Data Analysis Technology
3.2 Computer Management Method of Foreign Trade Business Expenses Under the Background of CBEC Development Based on Data Analysis Technology
4 Conclusions
References
Analysis on Correlation Effect of Shipbuilding Industry Based on Ghosh Model and Leontief Model
1 Introduction
2 Theoretical Analysis of the Effect of Relevance
2.1 Analysis of Forward Correlation Effect
2.2 Analysis of Backward Correlation Effect
3 An Analysis of the Industrial Correlation Effect of Shipbuilding Industry
3.1 Influence and Influence Coefficient in Shipbuilding Industry
3.2 Induction Force and Induction Coefficient in Shipbuilding Industry
4 Summary and Suggestions
References
Management and Control of Financial Information Platform by Big Data Technology
1 Introduction
2 Research Status at Home and Abroad
3 Problems Existing in the Process of Integrating Big Data Technology into Financial Control
3.1 Risk of Financial Control Failure
3.2 Subsidiaries Cannot Operate Independently
3.3 Causing the Disclosure of Financial Information
4 Countermeasures to Improve Financial Control of Group Company
4.1 Strengthen the Supervision of Financial Control
4.2 Reduce the Approval Process of Information System
4.3 Optimize Information System
5 Conclusions
References
Artificial Intelligence and Academic Inheritance of Famous Veteran TCM Doctors
1 Introduction
2 Inheritance of Famous Veteran TCM Doctors
2.1 Traditional Mode of Learning from Others
2.2 College Inheritance Mode
2.3 Evidence-Based and Translational Medicine Inheritance Mode
3 Tacit Knowledge and Academic Inheritance of Famous Veteran TCM Doctors
3.1 The Concept of Tacit Knowledge
3.2 Tacit Knowledge in Traditional Chinese Medicine
4 Traditional Chinese Medicine Inheritance and Artificial Intelligence
5 Conclusions
References
About the Design and Implementation of the Enterprise Internal Browser Solution
1 Introduction
2 System Architecture
2.1 Overall Architecture
2.2 Security Architecture
2.3 Technical Architecture
3 Construction Results
4 Conclusion and Outlook
References
Mobile-Assisted English Phonetics Teaching and Learning for Tertiary Learners: Practice and Approaches
1 Introduction
2 Mobile Learning and the Influence of Mobile Phone Auxiliary Tools on English Learning
3 MALL Based on WeChat
4 To Efficiently Use Mobile Phone Auxiliary Tools for English Learning
4.1 Innovative Education Concept
4.2 Actively Use Mobile Phone Teaching Aids
4.3 Focus on the Use of Network Resource Advantages
4.4 Adopt a Personalized Teaching Method
5 Conclusion
References
Application of ERP Electronic Sand Table Simulation Course Based on Human Resource Management
1 ERP Electronic Sand Table Business Management Simulation Course Overview
2 Application of ERP Electronic Sand Table Simulation Course Based on Human Resource Management
2.1 Integration of ERP Electronic Sand Table and Job Analysis
2.2 Integration of ERP Electronic Sand Table and Recruitment Management
2.3 Integration of ERP Electronic Sand Table and Training Management
3 Curriculum Reform Implementation Guarantee
3.1 School Guarantee
3.2 Teacher Protection
4 Summary
References
Analysis of the Control of Financial Sharing Service System of Meicai.com Under the Background of Big Data
1 Introduction
2 Related Concepts
2.1 The Concept of Financial Shared Service System
2.2 The Concept of Internal Control
3 Construction of Financial Sharing Service System of Meicai.com
3.1 Basic Situation of Financial Sharing Service System of Meicai.com
3.2 Analysis of Internal Control Status of Financial Sharing Service System of Meicai.Com
4 Problems and Optimization Suggestions of Internal Control in Financial Sharing Service System of meicai.com
4.1 Problems in Internal Control
4.2 Suggestions for Internal Control Optimization
5 Conclusions
References
Exploring the Path of Financial Risk Prevention in Big-Data-Supported Financial Audit
1 Introduction
2 The Role of Big Data on Financial Auditing to Prevent Financial Risks
3 Risk-Prevention Path in Big Data Financial Audit
4 Conclusion
References
Exploration of Constructing a New Mode of Evaluation of TCM Surgery Based on Computer Network Platform
1 Object and Method
2 Results
3 Discussion
References
Application of Internet +AI in the Lifecycle Management of Drugs
1 New Drug Research and Development
2 Pharmaceutical Production and Quality Control
3 Post-listing Circulation Supervision: Internet + Drug Circulation
4 Conclusion
References
Collision Detection of NURBS Surface Split Technology
1 Distance Solution Related Work
2 The Principle of Surface Splitting
3 The Implementation of the Split Algorithm
4 Compare the Results of the Experiment
5 Conclusion
References
Analysis on Optimization of Financial Sharing Center Based on “Cloud + End” Mode
1 Introduction
2 Current Status of Financial Sharing Center
3 Optimal Measures of Financial Sharing Center Under “Cloud + End” Mode
4 Conclusion
References
Construction of SPOC Blending Teaching Model of Computer English Course in Application-Oriented Institute
1 Introduction
2 Analysis of Current Situation of Computer English Teaching
2.1 Students’ Uneven English Foundation and Ignorance of Computer English Course
2.2 Unspecified Course Positioning
2.3 Out-of-Date Teaching Contents
2.4 Traditional Teaching Method
3 SPOC Blending Teaching
4 SPOC Blending Teaching in Computer English Teaching
4.1 Teaching Design
4.2 Teaching Contents
4.3 Teaching Implementation
5 Conclusion
References
Innovation of College English Teaching Based on the “Internet+” Era
1 Introduction
2 The Influence of “Internet + “ on College English Teaching
2.1 It Can Continuously Innovate the Teaching Model
2.2 It Can Change the Way Students Learn English
2.3 The Role of Traditional Teachers Can be Changed
3 Problems Existing in College English Classroom Teaching Methods
3.1 Students are not Motivated to Learn
3.2 The Content of English Teaching is Poor
3.3 Multimedia Teaching Has Become the Leading Role of Teachers in Teaching
3.4 Multimedia Production Pays Too Much Attention to Technology
3.5 College English Teachers Are Deeply Influenced by the Traditional Teaching Model Thoughts
4 The Innovation of College English Teaching Under the Background of “Internet + “
4.1 Use Micro-Classes and Flipped Classrooms
4.2 Innovative Teaching Concepts
4.3 Increase Teaching Content
4.4 Strengthen the Internet Technology Application
4.5 Use Open Courses to Share Teaching Resources
5 Conclusion
References
Personalized Recommendation Algorithm for Intelligent Travel Service Robot Based on Big Data
1 Introduction
2 Introduction of Relevant Knowledge
2.1 Big Data
2.2 Intelligent Travel Service Robot
3 Design and Implementation of Personalized Scenic Spot Recommendation Algorithm
4 Design and Implementation of Recommendation Algorithm
4.1 User Preference Extraction Model
4.2 Feature Extraction Module
5 Personalized Travel Route Recommendation Service Function
6 Conclusion
References
An Artificial Intelligence Detection Method for Helmet Wearing Based on Machine Vision
1 Introduction
2 Automatic Recognition Algorithm of Safety
2.1 Image Preprocessing
2.2 Foreground Detection
2.3 Connected Domain Detection
3 Edge Detection
4 Human Recognition
5 Safety Helmet Positioning Identification
6 Conclusion
References
Application of Improved Algorithm in Multi Objective Load Distribution of Power System
1 Introduction
2 Multi Objective Load Combination Model
2.1 Minimum Generation Cost Model
2.2 Minimum Pollution Discharge Model
2.3 The Fastest Load Adjustment Model
3 Niche Genetic Tabu Search Hybrid Algorithm
4 Example Analysis
5 Conclusion
References
Research on Route Optimization of Railway Passenger Transit Based on Shortest Path Dijkstra Algorithm
1 Overview of Shortest Path Algorithm
2 Shortest Path Algorithm
2.1 Analysis of Traditional Dijkstra Algorithm
2.2 Improvement Analysis of Dijkstra Algorithm
3 Hierarchical Model of Railway Passenger Transport Network
3.1 Hierarchical Model of Road Network
3.2 Endpoint Dynamic Base Point
4 Design of Railway Passenger Transit Route Optimization Algorithm Based on Dijkstra Algorithm
4.1 Calculation and Analysis of Passenger Route
4.2 Analysis on Calculation Model of Main Railway Passenger Transfer Network
5 Conclusion
References
Research and Implementation of Recommendation Algorithm in Current Computer Network
1 Introduction
2 Matrix Decomposition Recommendation Algorithm
2.1 Recurrent Neural Network
3 Matrix Decomposition Recommendation Algorithm Based on Asymmetric Similarity
4 Conclusion
References
Research on UAV Route Planning Technology Based on Evolutionary Algorithm
1 Introduction
2 Description of UAV Route Planning Problem
3 Theoretical Basis of Evolutionary Algorithm
3.1 Evolutionary Computing
3.2 Multi Population Evolutionary Algorithm Route Planner Mpepp
4 Verification of Planner Algorithm
4.1 Design of Experimental Environment
4.2 Experimental Result
5 Concluding Remarks
References
Fuzzy Recognition of Color and Its Application in Image Retrieval
1 Introduction
2 Local Binary Model
2.1 Primitive LBP Descriptor
2.2 Rotation Invariant LBP Descriptor and Uniform LBP Descriptor
3 Improved LBP Algorithm
4 Experimental Results and Analysis
5 Concluding Remarks
References
On the Legal Liability of Search Engine Data Mining Behavior Under Robots Protocol
1 Introduction
2 Technical Principle of Search Engine
3 Data Mining
3.1 Overview of Data Mining
3.2 Decision Tree Algorithm in Data Mining
4 Legal Issues Related to Data Mining Behavior of Search Engines Under Robots Protocol
4.1 The Constitution of Legal Relationship Under the Behavior of Data Mining in Search Engine
4.2 Behavior Classification and Related Legal Issues
5 Conclusion
References
Application of Color Language in Computer Graphic Design
1 Introduction
2 Application of Color Language in Computer Graphic Design
3 Conclusion
References
Discussion on the Application of Modern Information Technology in Landscape Architecture
1 Value Analysis of Landscape Architecture Construction
2 Information Technology and Landscape Architecture Design and Construction
3 The Role of Information Technology in Promoting the Construction of Landscape Architecture
4 Strategy of Applying Information Technology in Landscape Architecture
5 Conclusion
References
Application of VR Technology in Film and Television Art Scene
1 Immersive Experience of VR Technology
2 Application of VR Technology Center Scene
3 The Impact of VR Technology on the Design of F&T Art Scenes in F&T Creation
4 The Advantages of VR Technology Applied to the Design of F&T Art Scenes
5 Conclusion
References
Recommend Papers

2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies, 103)
 981167468X, 9789811674686

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Lecture Notes on Data Engineering and Communications Technologies 103

Mohammed Atiquzzaman Neil Yen Zheng Xu   Editors

2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City

Lecture Notes on Data Engineering and Communications Technologies Volume 103

Series Editor Fatos Xhafa, Technical University of Catalonia, Barcelona, Spain

The aim of the book series is to present cutting edge engineering approaches to data technologies and communications. It will publish latest advances on the engineering task of building and deploying distributed, scalable and reliable data infrastructures and communication systems. The series will have a prominent applied focus on data technologies and communications with aim to promote the bridging from fundamental research on data science and networking to data engineering and communications that lead to industry products, business knowledge and standardisation. Indexed by SCOPUS, INSPEC, EI Compendex. All books published in the series are submitted for consideration in Web of Science.

More information about this series at https://link.springer.com/bookseries/15362

Mohammed Atiquzzaman · Neil Yen · Zheng Xu Editors

2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City Volume 2

Editors Mohammed Atiquzzaman School of Computer Science University of Oklahoma Norman, OK, USA

Neil Yen University of Aizu Aizuwakamatsu, Japan

Zheng Xu Shanghai Polytechnic University Shanghai, China

ISSN 2367-4512 ISSN 2367-4520 (electronic) Lecture Notes on Data Engineering and Communications Technologies ISBN 978-981-16-7468-6 ISBN 978-981-16-7469-3 (eBook) https://doi.org/10.1007/978-981-16-7469-3 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Organization

General Chair Shaorong Sun, University of Shanghai for Science and Technology, China

Program Committee Chairs Mohammed Atiquzzaman, University of Oklahoma, USA Zheng Xu, Shanghai Polytechnic University, China Neil Yen, University of Aizu, Japan

Publication Chairs Deepak Kumar Jain, Chongqing University of Posts and Telecommunications, China Ranran Liu, The University of Manchester Xinzhi Wang, Shanghai University, China

Publicity Chairs Junyu Xuan, University of Technology Sydney, Australia Vijayan Sugumaran, Oakland University, USA Yu-Wei Chan, Providence University, Taiwan, China

v

vi

Organization

Local Organizing Chairs Jinghua Zhao, University of Shanghai for Science and Technology, China Yan Sun, Shanghai University, China

Program Committee Members William Bradley Glisson, University of South Alabama, USA George Grispos, University of Limerick, Ireland Abdullah Azfar, KPMG Sydney, Australia Aniello Castiglione, Università di Salerno, Italy Wei Wang, The University of Texas at San Antonio, USA Neil Yen, University of Aizu, Japan Meng Yu, The University of Texas at San Antonio, USA Shunxiang Zhang, Anhui University of Science and Technology, China Guangli Zhu, Anhui University of Science and Technology, China Tao Liao, Anhui University of Science and Technology, China Xiaobo Yin, Anhui University of Science and Technology, China Xiangfeng Luo, Shanghai University, China Xiao Wei, Shanghai University, China Huan Du, Shanghai University, China Zhiguo Yan, Fudan University, China Rick Church, UC Santa Barbara, USA Tom Cova, University of Utah, USA Susan Cutter, University of South Carolina, USA Zhiming Ding, Beijing University of Technology, China Yong Ge, University of North Carolina at Charlotte, USA T. V. Geetha, Anna University, India Danhuai Guo, Computer Network Information Center, Chinese Academy of Sciences, China Jianping Fang, University of North Carolina at Charlotte, USA Jianhui Li, Computer Network Information Center, Chinese Academy of Sciences, China Yi Liu, Tsinghua University, China Kuien Liu, Pivotal Inc, USA Feng Lu, Institute of Geographic Science and Natural Resources Research, Chinese Academy of Sciences, China Ricardo J. Soares Magalhaes, University of Queensland, Australia D. Manjula, Anna University, India Alan Murray, Drexel University, USA S. Murugan, Sathyabama Institute of Science and Technology, India Yasuhide Okuyama, University of Kitakyushu, Japan

Organization

S. Padmavathi, Amrita University, India Latha Parameswaran, Amrita University, India S. Suresh, SRM University, India Wei Xu, Renmin University of China Chaowei Phil Yang, George Mason University, USA Enwu Yin, China CDC, USA Hengshu Zhu, Baidu Inc., China Morshed Chowdhury, Deakin University, Australia Min Hu, Shanghai University, China Gang Luo, Shanghai University, China Juan Chen, Shanghai University, China Qigang Liu, Shanghai University, China

vii

Preface

With the rapid development of big data and current popular information technology, the problems include how to efficiently use systems to generate all the different kinds of new network intelligence and how to dynamically collect urban information. In this context, Internet of Things and powerful computers can simulate urban operations while operating with reasonable safety regulations. However, achieving sustainable development for a new urban generation currently requires major breakthroughs to solve a series of practical problems facing cities. A smart city involves wide use of information technology for multidimensional aggregation. The development of smart cities is a new concept. Using Internet of Things technology on the Internet, networking, and other advanced technology, all types of cities will use intelligent sensor placement to create object-linked information integration. Then, using intelligent analysis to integrate the collected information along with the Internet and other networking, the system can provide analyses that meet the demand for intelligent communications and decision support. This concept represents the way smart cities will think. Cyber-Physical System (CPS) as a multidimensional and complex system is a comprehensive calculation, network and physical environment. Through the combination of computing technology, communication technology, and control technology, the close integration of the information world and the physical world is realized. IoT is not only closely related to people’s life and social development, but also has a wide application in military affairs, including aerospace, military reconnaissance, intelligence grid system, intelligent transportation, intelligent medical, environmental monitoring, industrial control, etc. Intelligent medical system as a typical application of IoT will be used as a node of medical equipment to provide real-time, safe, and reliable medical services for people in wired or wireless way. In the intelligent transportation system, road, bridge, intersection, traffic signal, and other key information will be monitored in real time. The vast amount of information is analyzed, released, and calculated by the system, so that the road vehicles can share road information in real time. Personnel of road management can observe and monitor the real-time situation of the key sections in the system and even release the information to guide the vehicle so as to improve the existing urban traffic conditions. The Internet of ix

x

Preface

Things, which has been widely used in the industry, is a simple application of IoT. It can realize the function of object identification, positioning, and monitoring through the access to the network. BDCPS 2021 is held online at November 27, 2021, which is dedicated to address the challenges in the areas of CPS, thereby presenting a consolidated view to the interested researchers in the related fields. The conference looks for significant contributions on CPS in theoretical and practical aspects. Each paper was reviewed by at least two independent experts. The conference would not have been a reality without the contributions of the authors. We sincerely thank all the authors for their valuable contributions. We would like to express our appreciation to all the members of the Program Committee for their valuable efforts in the review process that helped us to guarantee the highest quality of the selected papers for the conference. We would like to acknowledge the General Chairs, Publication Chairs, Organizing Chairs, Program Committee Members, and all volunteers. Our special thanks are due also to the editors of Springer book series Lecture Notes on Data Engineering and Communications Technologies and editors Ramesh Nath Premnath and Karthik Raj Selvaraj for their assistance throughout the publication process. Norman, USA Aizuwakamatsu, Japan Shanghai, China

Mohammed Atiquzzaman Neil Yen Zheng Xu

Conference Program

Saturday, November 27, 2021, Tencent Meeting 9:50–10:00

Opening ceremony

10:00–10:40

Keynote: Mohammed Atiquzzaman

Shaorong Sun

10:40–11:20

Keynote: Neil Yen

14:00–18:00

Session 1

Junyu Xuan

Session 2

Yan Sun

Session 3

Ranran Liu

Session 4

Xinzhi Wang

Session 5

Guangli Zhu

Session 6

Zhiguo Yan

Session 7

Huan Du

Short papers poster

xi

BDCPS 2021 Keynotes

Keynote 1: Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System Professor Mohammed Atiquzzaman Edith Kinney Gaylord Presidential Professor, School of Computer Science, University of Oklahoma, USA

Mohammed Atiquzzaman (Senior Member, IEEE) obtained his M.S. and Ph.D. in Electrical Engineering and Electronics from the University of Manchester (UK) in 1984 and 1987, respectively. He joined as an assistant professor in 1987 and was later promoted to senior lecturer and associate professor in 1995 and 1997, respectively. Since 2003, he has been a professor in the School of Computer Science at the University of Oklahoma. Dr. Atiquzzaman is the editor-in-chief of Journal of Networks and Computer Applications, co-editor-in-chief of Computer Communications Journal and serves on the editorial boards of IEEE Communications Magazine, International Journal

xiii

xiv

BDCPS 2021 Keynotes

on Wireless and Optical Communications, Real Time Imaging Journal, Journal of Communication Systems, Communication Networks and Distributed Systems, and Journal of Sensor Networks. He co-chaired the IEEE High Performance Switching and Routing Symposium (2003) and the SPIE Quality of Service over Next Generation Data Networks conferences (2001, 2002, 2003). He was the panel co-chair of INFOCOM’05 and is/has been in the program committee of many conferences such as INFOCOM, Globecom, ICCCN, Local Computer Networks and serves on the review panels at the National Science Foundation. He received the NASA Group Achievement Award for “outstanding work to further NASA Glenn Research Center’s effort in the area of Advanced Communications/Air Traffic Management’s Fiber Optic Signal Distribution for Aeronautical Communications” project. He is the coauthor of the book “Performance of TCP/IP over ATM networks” and has over 150 refereed publications, most of which can be accessed at www.cs.ou.edu/~atiq.

Keynotes 2: Socially-Empowered Automated Mechanisms Towards Seamless Migration e-Learning to s-Learning Professor Neil Yen University of Aizu, Japan, Tsuruga, Ikkimachi, Aizuwakamatsu, Fukushima 9658580, Japan

Dr. Neil Yen is an Associate Professor at the University of Aizu, Japan. Dr. Yen received doctorates in Human Sciences (major in Human Informatics) at Waseda University, Japan, and in Engineering (major in Computer Science) at Tamkang University, Taiwan, in March and June 2012, respectively. His doctor degree at Waseda University was funded by the JSPS (Japan Society for the Promotion of Science) under RONPAKU program. Dr. Yen has actively involved himself in the international activities, including editorial works in journals and books, society services in academic conferences sponsored by IEEE/ACM, etc., and devoted himself

BDCPS 2021 Keynotes

xv

to discover advanced and interesting research directions. Dr. Yen has been engaged in the interdisciplinary realms of research, and his research interests are now primarily in the scope of human-centered computing and big data.

Oral Presentation Instruction 1.

2.

3.

4.

5.

Timing: a maximum of 10 min total, including speaking time and discussion. Please make sure your presentation is well timed. Please keep in mind that the program is full and that the speaker after you would like their allocated time available to them. You can use CD or USB flash drive (memory stick), make sure you scanned viruses in your own computer. Each speaker is required to meet her/his session chair in the corresponding session rooms 10 min before the session starts and copy the slide file (PPT or PDF) to the computer. It is suggested that you email a copy of your presentation to your personal inbox as a backup. If for some reason the files can’t be accessed from your flash drive, you will be able to download them to the computer from your email. Please note that each session room will be equipped with a LCD projector, screen, point device, microphone, and a laptop with general presentation software such as Microsoft PowerPoint and Adobe Reader. Please make sure that your files are compatible and readable with our operation system by using commonly used fronts and symbols. If you plan to use your own computer, please try the connection and make sure it works before your presentation. Movies: If your PowerPoint files contain movies, please make sure that they are well formatted and connected to the main files.

Short Paper Presentation Instruction 1. 2. 3.

Maximum poster size is 0.8 m wide by 1 m high. Posters are required to be condensed and attractive. The characters should be large enough so that they are visible from 1 m apart. Please note that during your short paper session, the author should stay by your short paper to explain and discuss your paper with visiting delegates.

Registration Since we use online meeting way, no registration fee is needed.

Contents

Data Security and Privacy in Smart City Security Defense Model of Web Page Design and Evaluation of Online Shopping Platform Based on Block Chain . . . . . . . . . . . . . . . . . Huili Chang Emotional Design in Mobile App Interface Design . . . . . . . . . . . . . . . . . . . Xiping Wu The Development of Communication Mode of Network Language and Culture Under the Environment of New Media Convergence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xuanyu Liu

3 13

23

Design and Implementation of Highway Engineering Test and Detection Management System Based on Big Data . . . . . . . . . . . . . . . Zhimin Zhang

33

Art Construction and Protective System Design of Northeast Residential Decoration Classification Patterns Based on Big Data . . . . . Xinyi Sun

43

Risk Mechanism and Supervision of P2P Lending Asset Securitization Under the Background of Big Data . . . . . . . . . . . . . . . . . . . Wenjing He

53

Design of Basketball Shot Automatic Recognition System Based on Background Difference Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fang Xie

65

Application of BIM Technology in Project Construction Schedule Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yanqiu Zhang

77

xvii

xviii

Contents

Data Security Technology and Scheme Design of Cloud Storage . . . . . . . Jingjing Liang and Jie Bai Design of Internet Opinion Analysis System for Emergencies in Big Data Environment Based on Hadoop Platform . . . . . . . . . . . . . . . . Yongchang Ren, Lihua Han, and Jun Li Evaluation Model of Intelligent Anti-electric Theft Management . . . . . . Linan Hu, Chang Su, Chong Tian, and Xianwei Meng

87

95 103

Civil Structure Damage Identification Method Based on Finite Element Model Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jia Li, Zhiyuan Yu, Xuezhi Zhang, and Yijiang Wang

113

Cardiac CT Segmentation Based on Distance Regularized Level Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xinyang Wu

123

Monitoring and Analysis System of Municipal Private Economy Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiangjun Yu and Chao Xie

133

Construction Safety Early Warning System of Power Transmission and Transformation Project Based on GIM . . . . . . . . . . . . Xin Liu, Lianyue Zheng, Yue Yang, and Xinyu Zhao

141

Mine Escape Path Planning Algorithm Based on Simulation Model Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guoju Lu, Guofei Zhao, and Liya Yu

151

Design and Implementation of the Drug Traceability System Based on Block Chain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hongjin Li and Han Li

161

Using ARM Technology to Build a Rail Transit Catenary Wear Detection Operation Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yang Yang and Zhiqi Wei

169

Security Threats and Protection Based on Android Platform . . . . . . . . . Xuemei Wang

179

A Data Security Scheme for Cloud Storage Based on Data Segmentation and Trusted Third Party Supervision . . . . . . . . . . . . . . . . . . Ping Xia

187

Power Grid Security by Transforming a Certain Type of Wind Turbine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hongmei Sun and Xiaogang Bai

197

Contents

Reliability Growth in Product Quality Control in Modern Computer Industrial Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fengchen Zhao, Lei Wang, Yuanyuan Yi, Desheng Lu, Junpeng Ma, Lingxu Meng, and Ou Qi Financial Risk Management of Small and Medium Sized Enterprises in the Internet Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yaxin Tan Based on Big Data Analysis Technology to Explore the Influence of Property Responsibility Derivative System on Enterprise Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yiyi Zhang Classification of Cerebral Arteriosclerosis Patients Based on Fuzzy Comprehensive Evaluation in the Background of Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Donghua Luo Neural Network for Monitoring Design of Science and Technology Talent Flow System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shouxia Wang BP Neural Network for Construction of Smart Campus Security . . . . . . Shengdong Lin

xix

207

215

225

235

243 249

Research on Railway Transportation Route Based on Dijkstra Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Junhui Di and Ruhu Gao

255

The Mathematical Form of Grover Algorithm and Its Search Success Rate for Composite Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shengzi He

261

Optimization and Simulation of Electrical Wiring Path Based on Ant Colony Parallel Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shimin Wang

267

Research on Method and Technology of Network Security Stochastic Model Based on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . Xin Ge and Minnan Yue

273

Efficient Identity-Based Multiple Copy Integrity Auditing Scheme for Cloud-Based IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tongtong Sang and Peng Zeng

281

Application of Fuzzy Decision Method in Target Detection . . . . . . . . . . . Binbin Wu, Fei Han, Xiaoqian Nie, Bingqi Wang, and Guangxu Chen

291

xx

Contents

Emerging Standards for Smart City New Methods of Urban Research in the Information Age—Based on the Combination of Big Data and Traditional Data . . . . . . . . . . . . . . . . Wenhao Wu The Influence of Information Technology on New Media Dance . . . . . . . Huilian Wen

301 311

Cultural Elements in the Urban Landscape Design Innovation Based on Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yu Wang

319

Application of Big Data in the Creative Design of Manchu Traditional Cultural Visual Symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tianhua Zhao

327

Construction on Standardization System of University Evaluation Mechanism Based on Data Analysis Technology . . . . . . . . . . Hongyan Liu

335

Smart Community Governance System and Governance Strategies in the Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xueyuan Sun

343

Application of QR Code Recognition Technology in Modern Power Logistics Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jibin Zhu, Yunxin Chang, and Chaofeng Zhu

351

The Innovation of Visual Communication Design Based on Computer Aided Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaobo Xue

359

Text Language Classification Based on Dynamic Word Vector and Attention Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zeming Li

367

Big Data Technology in Improving the Internal Governance Efficiency of Private Undergraduate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jingting Wang and Bao Liu

377

Design of Energy Saving Scheme for Data Center Power System Based on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ziliang Qiu

385

Application of LeNet Image Classification Algorithm in the Creative Design of New Painted Pottery . . . . . . . . . . . . . . . . . . . . . . . Nan Wang

399

Contents

xxi

Cost Management of Transmission and Transformation Project Based on GIM Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xin Liu, Lianyue Zheng, Yue Yang, and Guangliang Yang

407

Marketing Strategy Innovation Based on Mobile Internet Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lin Shan

417

5G Technology Promotes the Coordinated Development of E-Commerce and Regional Industries in the Guangdong-Hong Kong-Macao Greater Bay Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhongming Chen and Xiufang Qiu Relay-Leader Based MAC Layer Multicast Protocol for 60 GHz Millimeter-Wave WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qiang Miao and Hui Li 3D Point Cloud Data and Image Registration Technology . . . . . . . . . . . . Huabiao Li

427

441 449

New Social Media Communication Based on Literature Analysis Method Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yan Zhang and Xiaohua Zhou

459

Optimizing CO2 Emissions and Cost of Shear Wall Structure Based on Computer Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jianjian Zhang and Lin Ji

467

Acceptance of Green Packaging Self-service Access System for Simulated Annealing Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fang Deng and Xin Guo

477

Influence of Environmental Regulations on the Performance of China’s Heavy Pollution Listed Companies Based on Eviews 8.0 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yunyan Peng and Yongbo Sun

487

Development Strategies of China’s Rural Tourism E-Commerce Under the Background of “Internet Plus” . . . . . . . . . . . . . . . . . . . . . . . . . . . Jinyu Zhou

501

Application Method of BIM in Bridge Operation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yu Peng, Zheng Li, Tao Hu, Yangjun Xiao, Juan Wen, and Yu Liu

509

Technical and Economic Evaluation of Flexible Substation AC/DC Distribution Network Based on ANP . . . . . . . . . . . . . . . . . . . . . . . . Ke Lv, Yan Lu, Meng Yang, Chen Cheng, and Mingyu Li

519

Development Space and Prospect of the Charging Pile Market . . . . . . . . Guang Chen, Zhanjie Liu, Guozhen Ma, Di Wang, and Jianye Liu

531

xxii

Contents

AHP Matter Element Model for Expressway Service Quality Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sheng Hao, Zheng Qiao, Lu Zhao, and Xiaodong He

541

Research and Model Construction of Teacher Competency Based on K-Means Clustering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . Min Liu

549

Application of Clustering Analysis Based on Ant Colony Algorithm in Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Daoyu Mu

557

The Application of Curve Algorithm and Computer Aided Design in Garment Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jing Li

565

DEA Algorithm for Performance Evaluation of Public Sector with Benchmarking Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hongyan Ge

571

TD-LTE Handover Algorithm for High Speed Railway Mobile Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jingmei Zhao, Min Li, and Hairong Wang

579

Optimal Allocation of Electric Vehicle Investment Based on Coupling Decision of Investment Return and User Utility . . . . . . . . . . Haiyan Zeng, Yan Chen, Wei Li, Yu Wang, and Qiang Fu

585

Enterprise Brand Marketing Communication Based on Computer Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yishu Liu

591

Improving Traditional Environmental Infrastructure with Park Strategy Assisted by Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . Yi Chi, Qiannan Liang, and Zheng Lu

599

New Path of Using Computer Induction and Integration Technology to Govern the Comprehensive Management of Tourism Market . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wei Ruan and Yujie Yang A CP-ABE Scheme for Multi-user Queries in IoT . . . . . . . . . . . . . . . . . . . . Fanglin An, Yin Zhang, Yi Yue, and Jun Ye A Vertical Federation Framework Based on Representation Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yin Zhang, Fanglin An, and Jun Ye

609 619

627

Contents

xxiii

Industry and Education for Data Usage in Smart City Systematic Practice of Composition Courses Based on the Computer-Aided Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yisheng Zhang An Empirical Study on Influencing Factors of R&D Investment of Technology-Intensive Private Enterprises in the Age of Informatization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Weili Zhen, Zhaobohan Zhang, Yuli Yao, and Yuxi He

637

647

Thoughts on the Future Development of Educational Management in the Internet Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hongmei Xun, Zhuoshi Wang, and Yanchun Yu

657

How to Use Information Technology to Build a Digital Media Art Teaching Resource Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Huimin Liu

665

Construction of Teaching Quality Evaluation System in Colleges and Universities Based on BP Neural Network . . . . . . . . . . . . . . . . . . . . . . Wei Wu

675

Achievements and Prospects of Intelligent Development of Teaching Process in Digital Age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yue Sun and Chunming Zhang

683

Design of Network Education Platform Based on Cloud Computing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Long Li

691

MOOC Vocal Music Blended Teaching Mode and Digital Resource Platform Design in the Information Age . . . . . . . . . . . . . . . . . . . Yingming Jiang

701

The Construction of Individualized Teaching Mode of Children’s Literature Based on Information Technology . . . . . . . . . . . . . . . . . . . . . . . . Jinlan Xia

709

Online Teaching of Computer 3D Software Courses . . . . . . . . . . . . . . . . . Yanjie Li

719

Design and Realization of Basketball Tactics Computer Aided Teaching System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhenglei Lu

727

Ecosystem of Innovation and Entrepreneurship Education in Universities Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . Weijia Zeng, Fang Qin, Lin Li, Yao Li, and Nan Bai

737

xxiv

Contents

Teaching Research on Automatic Evaluation System of Japanese Pronunciation Based on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . Yu Lei

747

E-commerce on International Economic and Trade Under the Internet Plus Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jinping Zhu

757

Influence of Internet Plus on Traditional Accounting Industry Under the Background of Information Technology . . . . . . . . . . . . . . . . . . . Yun Li

767

Teaching Reform of “Advertising Poster Design” Based on O2O Mode in “Internet+” Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hao Hu

777

Construction and Reform of Preschool Children’s Professional Curriculum Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yanchao Li

787

Construction of Ubiquitous Multimodal Mobile Education Model for College English Based on Cloud Computing . . . . . . . . . . . . . . . Na Liu and Yunhong Zhao

797

How to Develop Agricultural Modernization by Inclusive Finance Under Modern Information Technology . . . . . . . . . . . . . . . . . . . . Xiu Sun

805

Dilemma and Breakthrough of School-Enterprise Integration in Cultivating Applied Cross-Border E-commerce Talents Under the Background of Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dan Huang and Jian Zhou The Construction of University Student Management System Platform Under the Background of Internet . . . . . . . . . . . . . . . . . . . . . . . . . Shan Zou Current Situation and Strategy of Information Technology in Art Class Teaching in Colleges Under the Background of “Internet+” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaofei Liu

815

823

835

Artificial Intelligence and Ethical Wisdom Education of College Students Against the Background of the Internet . . . . . . . . . . . . . . . . . . . . Mingwei Li

843

Application of Random Simulation Algorithm in the Evaluation of Physical Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haifeng Xu

853

Contents

xxv

Compliance of English-Chinese Code-Switching in English Teaching Based on Corpus Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yang Xin

861

Algorithm Analysis of Ad Hoc Network Driver Routing Protocol for Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lingwei Wang and Hua Wang

869

Research on Predictive Location Algorithm of Anti Theft and Early Warning Wireless Sensor Network Based on Optimized Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fenglin Li, Jian Ding, Bowen Li, Liangmin Zhang, and Chihao Chen The Camouflage Information Detection Method of Internet of Things Based on B-ISVM Algorithm is Studied . . . . . . . . . . . . . . . . . . . Xuebin Zhu, Zhoulin Wang, Peiwen Lin, ZiQian Ma, and Zhenghong Yu Research on Intelligent Location of 5G Network Coverage Problem Based on Ant Colony Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . Fenglin Li, Yue Pan, Xingyao Li, Xin Ke, and Yubing Liu Mathematical Basis of Particle Swarm Optimization Algorithm . . . . . . . Shengzi He Design and Implementation of Agricultural Products E-Commerce Industrial Structure Upgrading System Based on Classification Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xijie Li Research on Real Time Data Acquisition of Sprint Based on Intelligent Fuzzy System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xin Feng

877

887

895 903

909

915

A Search Algorithm of Distance Education Model Based on Agent . . . . Junrong Guo

921

Robot Path Planning Based on Artificial Intelligence Algorithm . . . . . . . Jingjing Wang

927

Influence of Artificial Intelligence on the Research of Effective Thickness Electrical Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hangqian Yu Comparison of Ciphertext Features for Data Deduplication . . . . . . . . . . Kejie Zhao, Dongfang Jia, and Jun Ye Reputation-Based Defense Scheme Against Backdoor Attacks on Federated Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Long Su, Zhicong Liu, and Jun Ye

935 941

949

xxvi

Contents

Research on Security Vulnerability Detection of Smart Contract . . . . . . Dongfang Jia, Zhicong Liu, Zhengqi Zhang, and Jun Ye

957

Short Paper Poster Track Application Discussion of VR Technologies in FLT . . . . . . . . . . . . . . . . . . . Jian Tao, Hongmei Chen, Yu Song, Caixia Huang, and Liang Hu

967

Status Quo and Key Technologies of Artificial Intelligence . . . . . . . . . . . . Bo Hu

975

Application of Artificial Intelligence in Art Design . . . . . . . . . . . . . . . . . . . Qianqian Zhai

981

An Evaluation Experiment of Photothermal Performance of PVT Hot Water Module Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . Yang Zhao

987

Application of Big Data Information Processing Technology in Improving English Reading Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jingtai Li

993

Application and Exploration of Edge Computing in Ubiquitous Electric Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhenyu Gao, Guochao Shi, Zhonghua Chen, and Fan Liu

999

Big Data Research on China’s Service Industry Under the COVID-19 Epidemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007 Yawei Jiang, Zhenhua Cai, and Huali Cai Integration Effect of International Exhibition Resources Based on the Cluster System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015 Lidan Zhang Urban Cable Field Inspection Technology Based on MR Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023 Yan Xu, Luping Shan, Qiushi Meng, Honggang Peng, and Yuping Huang How Negative Online Reviews Affect Consumers’ Purchase Intention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029 Mengwei Liu, Hui Lu, and Jiao Chen Computer Management Method of Foreign Trade Business Expenses Based on Data Analysis Technology . . . . . . . . . . . . . . . . . . . . . . . 1037 Ting Dai Analysis on Correlation Effect of Shipbuilding Industry Based on Ghosh Model and Leontief Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1045 Qing Luo

Contents

xxvii

Management and Control of Financial Information Platform by Big Data Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1051 Ge Guo, Lijun Shen, and Chengwei Zhang Artificial Intelligence and Academic Inheritance of Famous Veteran TCM Doctors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059 Zhiwen Zhang and Yang Li About the Design and Implementation of the Enterprise Internal Browser Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1065 Dong Feng, Guodong Qi, Yu Tang, Xiangchun Ji, and Zhengjie Yang Mobile-Assisted English Phonetics Teaching and Learning for Tertiary Learners: Practice and Approaches . . . . . . . . . . . . . . . . . . . . . 1073 Yanmei Zhao Application of ERP Electronic Sand Table Simulation Course Based on Human Resource Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081 Gongna Sun and Qiong Wu Analysis of the Control of Financial Sharing Service System of Meicai.com Under the Background of Big Data . . . . . . . . . . . . . . . . . . . 1089 Chengwei Zhang, Ge Guo, and Kai Jiang Exploring the Path of Financial Risk Prevention in Big-Data-Supported Financial Audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097 Jianjun Xiao Exploration of Constructing a New Mode of Evaluation of TCM Surgery Based on Computer Network Platform . . . . . . . . . . . . . . . . . . . . . 1103 Xiaoli Wang, Xu Qu, Liyang Lian, Liping Sun, Liwen Wang, Wenna Li, Weitao Zhang, and Yongfeng Wang Application of Internet +AI in the Lifecycle Management of Drugs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111 Yujie Wang, Yuanzhou Guan, and Yi Liang Collision Detection of NURBS Surface Split Technology . . . . . . . . . . . . . . 1119 Yan Li and Wei Zhao Analysis on Optimization of Financial Sharing Center Based on “Cloud + End” Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1127 Nan Li Construction of SPOC Blending Teaching Model of Computer English Course in Application-Oriented Institute . . . . . . . . . . . . . . . . . . . . 1133 Wuying Tan Innovation of College English Teaching Based on the “Internet+” Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1141 Juanjuan Qin

xxviii

Contents

Personalized Recommendation Algorithm for Intelligent Travel Service Robot Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149 Suyun Li and Liping Lai An Artificial Intelligence Detection Method for Helmet Wearing Based on Machine Vision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155 Feng Qiu, Hao Lin, Lingwei Yan, and Shi Cheng Application of Improved Algorithm in Multi Objective Load Distribution of Power System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1161 Xinyi Ren Research on Route Optimization of Railway Passenger Transit Based on Shortest Path Dijkstra Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 1167 Baochun Tian and Junhui Di Research and Implementation of Recommendation Algorithm in Current Computer Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173 Zhuan Wei Research on UAV Route Planning Technology Based on Evolutionary Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1179 Hancheng Zhang Fuzzy Recognition of Color and Its Application in Image Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185 Wei Yang On the Legal Liability of Search Engine Data Mining Behavior Under Robots Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191 Yong Zhang Application of Color Language in Computer Graphic Design . . . . . . . . . 1197 Meishuang Wu Discussion on the Application of Modern Information Technology in Landscape Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1203 Yujia Xia Application of VR Technology in Film and Television Art Scene . . . . . . . 1209 Haotian Sun, Junyu Qu, and Yuqi Meng

Data Security and Privacy in Smart City

Security Defense Model of Web Page Design and Evaluation of Online Shopping Platform Based on Block Chain Huili Chang

Abstract Block chain technology is a decentralized, transparent and open, fair and equitable Internet technology that can be used in online shopping platforms to promote transactions, provide certification, and improve operational capabilities. But at the same time, various security issues in web design and evaluation also follow, and it is necessary to build a security defense model based on the block chain-based web shopping platform web design and evaluation. The purpose of this article is to study the security defense model of the web page design and evaluation of the block chain-based online shopping platform. This paper analyzes the security problems faced by the web page design and evaluation of online shopping platforms, and combines the requirements of web security defense, and summarizes the overall network environment and the deployment location of the system modules required for the realization of the security defense model. This paper selects a set of different numbers of test samples to test the system’s detection time, block proliferation time, detection accuracy rate and false alarm rate performance. Experimental data shows that the accuracy rate is up to 99%, and the average false alarm rate is 5.3%. This shows that the design of this model meets the design expectations and has a good security defense. Keywords Block chain · Online shopping platform · Web design and evaluation · Security defense

1 Introduction With the rapid development of block chain technology, people’s lives and work have been greatly facilitated. Block chain application online shopping platform web page design and evaluation will bring huge development opportunities to it [1, 2]. Although the block chain can be applied in many aspects, there are still big problems [3, 4]. A large amount of redundant data and the characteristics of open access H. Chang (B) Ningxia Institute of Science and Technology, Shizuishan City 753000, Ningxia, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_1

3

4

H. Chang

to the whole network have brought problems such as low efficiency and privacy leakage in practical applications [5, 6]. In this severe information security situation, it is imperative to research and design a security defense model based on the block chain-based online shopping platform web page design and evaluation [7, 8]. In the research on block chain, online shopping platforms, and security defense models, many scholars at home and abroad have conducted in-depth discussions on them. For example, Veiga A believes that with the popularization of networking, single-machine defense can no longer meet the requirements of system security [9]; Barrett M uses the characteristics of Markov chain and applies it to the analysis of intrusion detection system to improve the success rate of defense [10]; Zhang improves the scoring standard of vulnerabilities in the attack and defense map. Based on the combination of attack success rate and host information assets to generate network security defense strategy [11]. The purpose of this article is to study the security defense model of the web page design and evaluation of the block chain-based online shopping platform. This article first analyzes the security problems faced by the web page design and evaluation of the online shopping platform, combined with the requirements of web security defense, and summarizes the overall network environment and the deployment location of the system modules required for the realization of the security defense model. Then, by selecting a set of different numbers of test samples, the system’s detection time, block proliferation time, detection accuracy rate and false alarm rate performance were tested to verify the various functions of the terminal equipment security protection module. The test results show that the design of the security defense model meets the design expectations, the functions and performance indicators meet the development requirements, and the expected research and development results have been achieved.

2 Security Defense Model Based on Block Chain-Based Online Shopping Platform Web Page Design and Evaluation 2.1 Security Issues Faced by Web Design and Evaluation of the Block Chain-Based Online Shopping Platform

(1)

Threats to identity privacy security

Identity privacy mainly refers to the mapping relationship between the public key address broad casted in the block chain system and stored on the chain and the user’s real identity [12]. In the existing block chain system, the output and input of the transaction are only mapped to the public key address, and each node does not need any real identity information when generating the public key address, which guarantees identity privacy to a certain extent security. However, because the entire

Security Defense Model of Web Page Design and Evaluation …

5

transaction process is completely open on the chain, its security is relatively fragile when faced with a combination of big data analysis and cyber-attacks against online shopping platform transaction records. The analysis of the relationship between input and output obtains the true initiator of the multi-input transaction. In the use of digital cryptocurrency, the process of transactions with related entities such as mining pools and e-commerce service providers will generate a mapping relationship between addresses and users’ real identities, through the ledger information and chains disclosed by related service providers. The transaction information disclosed on the above can obtain the association between multiple addresses and the association between addresses and user entities, thereby reducing or even disappearing the anonymous security of users. (2)

Threats to the transaction security of online shopping platforms

Transaction privacy mainly refers to judging the relationship between transactions through historical transaction information stored on the block chain. Due to the needs of the consensus process of the block chain system, all transactions recorded on the block chain can be traced back to the original coin base transaction, and due to the UTXO model adopted by a considerable part of the block chain system, it is inevitable to generate change addresses and attacks. Through the analysis of historical transaction records, the user can track the capital flow of related addresses, thereby obtaining the relationship between related transactions and the relationship between related addresses. In a centralized system, if relevant information is leaked, the information can be edited through the relevant operations of the center, so as to protect the security of relevant information that may have a mapping relationship with the leaked information. Different from centralized systems, the distributed and non-tamperable characteristics of the block chain system determine that once user identity information and transaction information are leaked, the harm is irreversible and will continue to cause harm.

2.2 Overall Network and System Structure Design of the Security Defense Model

(1)

Soft routing module

In the soft routing module, in order to make all intranet data packets flow through the intranet network card to facilitate centralized control and processing of traffic, VLAN technology is used. Simulate multiple virtual network cards on the physical network card and number them, and at the same time, the virtual network card corresponds to the VLAN one-to-one.

6

H. Chang

The soft routing module first needs to configure the IP address of the network card of the Linux operating system. The operating file is /etc./network/interfaces. Among them, lo is the local loopback address, and the address of the eth0 external network card is assigned by the upper DHCP server, and the internal network is as a whole The network segment is 10.10.0.0/16, where the address of the eth1 internal network card itself is set to 10.10.0.1, the address of the virtual network card eth1:1 is 10.10.32.1, and the subnet mask is 255.255.255.0. The third segment of the internal network virtual network card IP address is dynamically generated with a random number, ranging from 1 to 254, and a total of 100 different random integers are generated, that is, the soft routing module can support simultaneous access of 100 hosts. (2)

Real IP generation module

The real IP generation module mainly generates the IP addresses seen by the client and server in the internal network through the ifconfig command of the Linux system command line. This module is implemented by the DHCP service provided by the soft routing module. The virtual domain name generation module mainly uses the bind9 tool to build its own DNS domain name server on the routing gateway, and the domain name server address is the routing gateway address. (3)

False data packet response module

After constructing the ARP response packet, use the Python language scapy library to monitor the internal network card and capture the ICMP request packet. If the host address of the ICMP request is 10.10.2.166 and the destination address is 10.10.0.1, after capturing the ICMP request packet, a fake ICMP response packet needs to be constructed, and the type and source of the packet header structure of the captured ICMP request packet. The destination address and other parameters are forged.

2.3 Domain Name Privacy Model of the Security Defense Model of the Web Page Design and Evaluation of the Online Shopping Platform In the domain name system, in many cases, we need to isolate the data visibility of the domain name according to different regions. The current DNS domain name system does not provide similar functions, but the block chain network has natural cryptographic advantages. Therefore, three privacy modes are designed for domain name registration. (1)

Public mode (Public)

In the public mode, the regional data file will exist in the IPFS network in the form of clear text, and the transaction of the block chain network will store the file hash summary of the regional data file. Once the file is generated, it cannot be modified

Security Defense Model of Web Page Design and Evaluation …

7

or deleted from the IPFS network. The hash digest will be the only index of the file. The system needs to use the hash value to locate the regional data file from the IPFS when performing domain name resolution. (2)

Protected mode (Protected)

In the protected mode, the area data file will be stored in the IPFS in the form of XOR encryption, and the block chain network stores the hash digest of the encrypted area data file. In the protected mode, define a one-way hash function hash (), assuming that the length of the area data file to be encrypted is L (bit), and the output length of the hash() function is h(bit). First, perform a one-way hash calculation on the public key of the user holding the domain name to obtain the hash digest of the public key, and then use the digest to XOR encrypt the original zone data file to obtain an encrypted zone data file. Since the XOR calculation will not cause the data to increase, the size of the encrypted area data file is still L (bit). If the user needs to authorize the domain name for other users, then the user only needs to give the other party the hash digest of the public key, and the other party can decrypt the area data file. (3)

Private mode (Private)

In private mode, an asymmetric encryption algorithm is used. The data will be encrypted with the public key and decrypted with the private key. Except for the user who holds the private key, unless the user leaks his private key, other users will not be able to view the data in the area data file.

2.4 Mean Clustering Algorithm for Spam Web Security Defense Detection The IPR algorithm takes into account the characteristics of personalized web pages, and transfers the corresponding values to the web pages based on differences in authority. Based on this idea, the size of the authority value obtained by a web page can be measured by the proportion of the number of recommendations. In Figure, web page B points to A and D. Since the two have different degrees of authority, B should not pass 1/2 of its own authority value to them respectively, but judge the score based on the number of recommendations. The size, A recommended 1 time, D recommended 2 times, the number of recommendations represents importance, A gets B’s 1/(1 + 2) authority value, and D gets B’s 2/(1 + 2) authority value. Therefore, the improved Page Rank algorithm IPR is shown in formula (1).  OU TX 1−d m +d I P R(Bi ) N j=1 OU T j i=1 n

I P R(X ) =

(1)

8

H. Chang

 OUT X indicates how many web pages X points to. mj=1 OU T j first counts how many pages B j are linked to, and then adds up all the linked pages of each page. mOU TX represents the proportion of the number of links out of node X in all j=1 OU T j links out of B j to the node, and node X also gets an IPR value of B j based on this proportion. When the allocation strategy changes, the matrix M representing the probability of the mutual transfer relationship also changes.

3 Security Defense Model Test of the Webpage Design and Evaluation of the Block Chain-Based Online Shopping Platform 3.1 Test Environment The test environment host is a rolling update version of the archlinux operating system. The virtual environment is Docker Version, running 10 docker subsystems, and the virtual machine environment is alpinelinux. The test program was developed in C++ and compiled with the GCC compiler.

3.2 Test Indicators From a performance perspective, the system’s detection time, response time, detection accuracy, and false alarm rate are all indicators that measure the timeliness of the system. This test is the performance of the detection system, which will be evaluated in terms of detection time, block proliferation time, detection accuracy and false alarm rate.

3.3 Test Sample The test samples in this experiment were selected (10, 20, 50, 100, 500, 1000) of different numbers of samples as a set of test samples to test its batch detection effect. The sample collection was still from a foreign shared virus database website.

Security Defense Model of Web Page Design and Evaluation …

9

4 Data Analysis of Security Defense Model Based on Block Chain-Based Online Shopping Platform Webpage Design and Evaluation 4.1 Running Time By testing the operation of different numbers of samples, recording their running time and block proliferation speed, the data is shown in Table 1: When the number of samples is 10, 20, 30 and 100, the detection time is 1.2 s and 1.3 s respectively, 1.5 s, 1.7 s, the block proliferation time is 1 s, 1.2 s, 1.4 s, 1.5 s respectively. It can be seen from Fig. 1 that when different sample sizes are used for detection, the detection time of the security defense model is getting longer and longer, and the response time performance is gradually reduced. This experiment uses batch testing for all samples, and the detection time should not be much different, but as the sample size increases, during the data transmission process of the entire sample, due Table 1 Running time of different number of samples Detection time (s)

Block proliferation (s)

10

1.2

1

20

1.3

1.2

50

1.5

1.4

100

1.7

1.5

500

2

3.0

1000

3.5

3.4

Unit: s

Number of samples

4 3.5 3 2.5 2 1.5 1 0.5 0

Detection time (s)

Block proliferation (s) 3.5 3.4 3

1.2

1

10

1.3 1.2

20

1.5 1.4

50

1.7

2 1.5

100

Number of sample Fig. 1 Running time of different number of samples

500

1000

10

H. Chang

to network bandwidth limitations, network transmission delays, and some samples have been damaged, it cannot be detected. Circumstances lead to a reduction in response time and detection time.

4.2 Accuracy Rate and False Alarm Rate In order to more clearly show the relationship between the three indicators of detection accuracy, false alarm rate and response time of the security defense model of this research, we will compare and analyze the data obtained from the above-mentioned set of test samples. The results as shown in Table 2: When the sample size is 10, 20, 30, and 100, the detection accuracy rate is 99%, 98%, 89%, 94%, and the false alarm rate is 3%, 8%, 10%, and 10%, respectively. It can be seen from Fig. 2 that as the number of samples increases, the detection rate and false alarm rate of the system gradually approach a stable value from the initial random change and gradually approach the accuracy rate of the static detection Table 2 System accuracy and false alarm rate under different sample sizes Number of samples

Accuracy (%)

False alarm rate (%)

10

99

3

20

98

5

50

89

5

100

96

6

500

94

6

1000

97

7

120

Accuracy(%) 99

98

3

5

10

20

unit: %

100

False alarm rate(%) 96

94

97

5

6

6

7

50

100

500

1000

89

80 60 40 20 0

Number of sample Fig. 2 System accuracy and false alarm rate under different sample sizes

Security Defense Model of Web Page Design and Evaluation …

11

of the system, and the accuracy rate is the highest reached 99%. Due to the different selection of better algorithms in the process of static detection on the server side, the overall detection time of this system is relatively fast for each experiment, which has certain advantages. Therefore, the system can be used as a fast-detecting security defense system, and can implement security protection for the security of web pages and privacy information, which has certain feasibility.

5 Conclusion As the Internet gradually penetrates into all aspects of our lives, online shopping platforms have become an indispensable part of everyone’s lives, making people’s food, clothing, housing and transportation more and more convenient. But at the same time, the danger signal also came. Some criminals use online shopping platforms to harm people’s interests in order to seek benefits and convenience, and the security of online shopping platforms has also attracted more and more public attention. Although the existing security protection is strengthening, the ability to accurately detect unknown mobile malicious viruses is still insufficient. Therefore, this paper designs and implements a block chain-based online shopping platform web page design and evaluation security defense model based on this demand. Based on the block chain technology architecture, research and exploration have been conducted on the page design of the block chain online shopping platform and the auditability and security protection issues that exist on the platform. Combined with the requirements of web security defense, the overall network environment required for the security defense model is realized. And the deployment location of each module of the system is summarized. Then, by selecting a set of different numbers of test samples, the system’s detection time, block proliferation time, detection accuracy rate and false alarm rate performance were tested to verify the various functions of the terminal equipment security protection module. The test results show that the design of the security defense model meets the design expectations, the functions and performance indicators meet the development requirements, and the expected research and development results have been achieved.

References 1. Yang KC, Huang CH, Yang C et al (2017) Consumer attitudes toward online video advertisement: YouTube as a platform. Kybernetes 46(5):K-03-2016-0038. 2. Chang SH, Chih WH, Liou DK et al (2016) The mediation of cognitive attitude for online shopping. Inf Technol People 29(3):618–646 3. Doshi A, Connally L, Spiroff M et al (2017) Adapting thebuying funnelmodel of consumer behavior to the design of an online health research recruitment tool. J Clin Transl Sci 1(04):240– 245

12

H. Chang

4. Song C, Cho E (2016) An integrated design method for SOA-based business modeling and software modeling. Int J Software Eng Knowl Eng 26(2):347–377 5. Hasan B (2016) Perceived irritation in online shopping: the impact of website design characteristics. Computers Human Behav 54(JAN.):224–230 6. Wang Y, Wu Z, Bu Z et al (2016) Discovering shilling groups in a real e-commerce platform. Online Inf Rev 40(1):62–78 7. Willard S, Cremers G, Man YP et al (2018) Development and testing of an online community care platform for frail older adults in the Netherlands: a user-centred design. BMC Geriatr 18(1):87 8. Wilbur K (2016) Evaluating the online platform of a blended-learning pharmacist continuing education degree program. Med Educ Online 21(6):31832 9. Veiga A, Weyl EG, White A (2017) Multidimensional platform design. Am Econ Rev 107(5):191–195 10. Barrett M, Oborn E, Orlikowski W (2017) Creating value in online communities: the sociomaterial configuring of strategy, platform and stakeholder engagement. Oper Res 57(5–6):525–528 11. Zhang M, Shen X, Zhu M et al (2016) Which platform should I choose? Factors influencing consumers’ channel transfer intention from web-based to mobile library service. Library Hi Tech 34(1):2–20 12. Chen Y, Lu Y, Gupta S et al (2019) Understanding “window” shopping and browsing experience on social shopping website. Inf Technol People 33(4):1124–1148

Emotional Design in Mobile App Interface Design Xiping Wu

Abstract With the increasing development of science and technology, various smart products continue to innovate, affecting all aspects of people’s lives. In the face of these mechanized and intelligent electronic products, there is less and less communication between people, and people who urgently need emotional nourishment are constantly looking for solutions. Therefore, the emotionalization of design has gradually become the focus of attention. Mobile smart products no longer exist only as a pure material form, but as a bridge for communication between people, which are endowed with more spiritual, cultural and emotional connotations. This article aims to study the emotional design in mobile App interface design. First, it explains the classification of mobile App interface design, the value of emotional design and the emotional factors that affect the mobile App interface; secondly, it analyzes the emotional design ideas of mobile App interface; finally, through a questionnaire survey method to investigate the use of mobile App interface and preferences of college students in design practice, the survey results show that with regard to the characteristics of the reflection level of the mobile App interface, men choose more for the sense of accomplishment, resonance and storytelling accounted for 48.31%, 57.28%, and 42.98%, respectively; women were resonant, warm and satisfying, accounting for 55.56%, 44.44%, and 55.42%, respectively. Keywords Mobile app · Interface design · Emotional design · Design principles

1 Introduction The advancement of technology and the gradual advent of the 5G era have brought people a subversive cognition of mobile phone use [1, 2]. From the previous single-pointing type to the current multi-service type, human–computer interaction is changing towards multi-individualization, emotionalization and customization. X. Wu (B) Wuxi Vocational Institute of Commerce, Wuxi 214153, Jiangsu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_2

13

14

X. Wu

These changes and progress will inevitably promote the development of mobile phone interface design in a better direction [3, 4]. Today’s diversified, colorful and multi-connected interconnected life has profoundly changed people’s production and lifestyles. As a mobile phone user, in addition to focusing on rich and practical functions, it also attaches importance to personalized mobile phone interface [5, 6]. An interface with good visual effects and a sense of interaction can resonate and generate more valuable and meaningful emotions. Therefore, when designing the mobile App interface, it is more necessary to grasp the user’s emotional cognition, grasp the design scale, and guide the user’s psychological and thinking cognition of the interface [7, 8]. This article aims to study the emotional design in mobile App interface design. First, it explains the classification of mobile App interface design, the value of emotional design and the emotional factors that affect the mobile App interface; secondly, it analyzes the emotional design ideas of mobile App interface; finally, through the questionnaire survey method to investigate the status and preferences of the mobile App interface used by college students in a certain university for design practice.

2 Emotional Design in Mobile App Interface Design 2.1 Classification of Mobile App Interface Design (1)

Functional interface

The functional interface is built on the basis of symbol theory. Semiotics has been clearly defined by relevant experts in our country as the knowledge and perception that it carries with it. Some small numbers in our daily lives, the behavior of people and other small animals, and the cognitive consciousness in the brain are actually part of this type of semiotics. They actually combine natural symbols with other man-made symbols. The symbols are combined with each other into a whole, which has the important meaning of accurately conveying information to us [9, 10]. (2)

Emotional interface

Anyone’s work will have a feeling for their thinking and behavior, and only when they resonate will it be easier for others to accept and use. Even if some products are not recognized and favored by others, but I still like and cherish them very much, this also reflects the value and emotional sustenance of others, that is, the full expression of the charm of product innovation. The emotional interface just reflects the unique charm of emotional communication between man and machine [11, 12]. (3)

Environmental interface

Any design must be closely related to the current social environment and atmosphere, and it must be included in the humanistic environment of a society. The political,

Emotional Design in Mobile App Interface Design

15

economic, cultural and other wide-ranging factors contained in the environmental characteristic interface reflect the social characteristics of art design. The lifestyle of today’s society is centered on a collective, so this kind of interface with environmental characteristics must adapt to the characteristics and aesthetic trends of contemporary life, and meet the mental expectations of users.

2.2 The Value of Emotional Design (1)

Return to the user itself and shape emotional care

For design thinking, the first step is always to think about the user. Whatever the user needs, the designer will design what, instead of first considering the product and then the user, this will have great limitations. Therefore, returning to the user itself is the first priority and the first link of emotional design. Therefore, by subdividing user groups and refining user needs, can we locate emotional factors, grasp emotional relationships, respect user experience, and shape emotional interaction and emotional care. (2)

Return to the product itself and tap the value potential

The carrier of emotional design is the product, and users are both the receiver of the product and the feedback of emotional design. So returning to the product itself, that is, the mobile phone interface design itself, its design is not a random patchwork of elements and symbols, nor is it a complete stacking of visual expression techniques, but how to reasonably cut emotional factors into the mobile phone interface design, and from visual effects, information transmission, and user experience show “interface quality” and product value. When analyzing the product itself, it is only necessary to fully understand the composition rules of the mobile phone interface, the reasonable specifications of the interface design, and the areas and elements that can be innovated in the interface design, use the most conventional old elements to form a new combination and rationally use the expression of interface literacy. In order to make the mobile phone interface have connotation rather than superficial meaning, it has the meaning of conveying and enlightening. It can highlight the charm of interface design, and can continue to increase the potential of product value. (3)

Return to the market itself, component brand credibility

Looking at the major foreign mainstream design websites, it is not difficult to find that the domestic mobile phone interface design trend is relatively higher and prevalent, and the reason for this trend is based on the fatigue of users with the same mobile phone interface and the vigorous efforts of domestic mobile phone manufacturers. Promotion and attention as well as the development trend of the mobile phone interface market. Only by returning to the market itself can we reconsider from the source of origin and build a good image of the brand in all aspects.

16

X. Wu

Therefore, in the process of the mobile phone interface, the market, mobile phone manufacturers and designers need to play the role of cooperative development partners, return to the market itself, consider user needs, integrate emotional factors, build brand reputation, and achieve mutual benefit. (4)

Return to emotion itself and guide quality consumption

At the beginning of the development of the mobile interface, users can accept products of any quality. In the initial stage, they need to build and cultivate their habits, and have less demand for emotional experience and quality enjoyment. However, in the mature period of development, users are more interested in emotional products. The demand will increase rapidly, which requires designers to think in the minds of users and enhance the quality experience brought by emotional colors. Therefore, designers need to insist on returning to the emotion itself, better integrate the minimalist concept into practice, and guide users to the quality experience. The market needs to lead, users need to guide, and the principle of “moderateness” needs to be introduced. On the basis of emotional design needs, it encourages users to consume products and obtain a pleasant experience while digging out their own emotional needs through rational analysis to avoid low-quality product experience, and to reflect on the products to a certain extent, so that the mobile phone interface market is moving towards a healthier, more rational, and high-quality direction.

2.3 Analysis of Emotional Factors Affecting the Mobile App Interface (1)

Aesthetic standards 1.

2.

3.

(2)

Keynote. There is only one main-based artistic tone feature, and the others are designed and integrated closely around the main tone, so that we can achieve a unified and harmonious artistic aesthetics. Rhythm and rhythm. Rhythm refers to the orderly repetition, substitution, or sequential arrangement of a variety of different forms of elements, and can produce a beat visually, so that human vision produces a visual process. Symmetry and balance. It mainly refers to the rational configuration, coordination, and organization of graphics, text, location, direction, size, size, light and shade, texture and other elements in the building to achieve an overall balanced state, making people visually, you can get a good feeling psychologically.

Emotional factors at the visual level

Colour. When discussing whether something is red, green, or blue, different colors can attract our attention. We can all take advantage of it. For example, for accounting, red represents “negative” and black represents “positive”: in China, red represents

Emotional Design in Mobile App Interface Design

17

auspiciousness in festivals. Color is different from size. It is not sequential or quantitative. (3)

Emotional factors at the use level

Usability. An excellent app application must not only have an attractive and powerful interface, but also must be able to have a smooth interactive experience. Therefore, to improve the actual usability of the application is to conduct research from the two key aspects of interactive design and interface design, and consider the specific environment from the perspective of the enterprise or the user itself. Only through such various aspects of thinking and consideration can we design and produce a product that can interest users. (4)

Emotional factors at the reflective level

(1)

Emotional memory.

Emotional memory refers to the ability to remember things or situations that are still fresh, such as recalling your happiest things or sad things-it is this kind of emotional memory that allows you to remember your mood at that time. The same, but when we use a certain category or a certain APP, we can easily remember the use of this APP and the impression of it, then this is emotional memory. At this point, we consider that APP’s emotional memory has the following influencing factors: LOGO, design style, emotional experience, and imagination. (2)

Resonance

The sense of resonance here mainly refers to the strong sense of identity and contextual experience that mobile phone users will have when observing or using mobile apps. Through various contextual interactions with the mobile phone interface, it guides mobile phone users to correctly pair The calculation and operation of the interface. Most of this kind of emotional interactions are well-suited to the needs and mentality of young Chinese nowadays, mainly in various forms of activities such as fresh, fashionable, popular, and funny. Baidu App, Weather App, etc., often it will be updated according to different festivals, generally in the form of graffiti, animation, pictures that are welcomed by users and can cater to the current user’s “lively” mentality.

3 Emotional Design Ideas for Mobile App Interface 3.1 User Experience Information Collection Before making a new APP, you must first determine the corresponding target user group, and then collect the corresponding user needs according to this fixed target group, and analyze them. The product will eventually run on the market after research

18

X. Wu

and development, during which it must be targeted at the final target users, who have their own characteristics. There are also many methods for data collection, of which the most commonly used are the following two: (1)

(2)

Questionnaire survey method Questionnaire survey method is one of the most frequently used basic methods in survey research. Its advantage is not only to make a more comprehensive survey of the user population, but also to obtain further information about product users such as age, gender, education background, etc. Although the information collection method of the questionnaire survey method is not as flexible as the interview method mentioned later, this method allows us to learn more and more target users more quickly and easily. Moreover, the cost is relatively low, and the analysis is relatively quick. However, the generation of an excellent questionnaire still requires a certain complicated process. First, the designer must be clear about what he hopes to learn through the questionnaire, rather than a single simple list of questions. General questionnaire surveys include background, objective, subjective and testing questions. Background questions refer to the basic information of the respondent, while objective questions refer to questions about certain facts or behaviors that have occurred or are happening. Subjective questions are some basic simple question and answer questions, mostly to understand people’s thoughts, feelings, and state. Interview method The ultimate goal of user interviews is to find out the needs of users. The interviewees are usually selected based on the results of a questionnaire survey. The interview method is different from a questionnaire survey. Instead of listing the questions one by one to the users, they listen to the stories of the interviewees and learn from their stories. Their attitude and grasp a few points for proper questioning. The object of interview method is generally divided into two types, one is expert users and the other is ordinary users. Interviewing experts and users can get information about the status quo of related products, development issues, and product predictions, and provide a large number of opinions for product innovation.

3.2 Demand Analysis of App Interface Design After using the questionnaire survey method and the interview method to collect user information, the next step should be to conduct data analysis to determine the ultimate goal of APP interface design. The main purpose is to analyze similar applications and the core competitiveness of applications, with the purpose of analyzing the functions of existing applications and providing reference for application concepts. The demand analysis of interface design must be user-centered and highly subjective. Although designers can design new interfaces according to general interface

Emotional Design in Mobile App Interface Design

19

design principles, there are big differences in the culture, personal preferences, backgrounds, etc. of each individual user, so there are also many gaps in the design and use requirements of the interface. Different users have different requirements for the interface. Most users cannot clearly point out their requirements for the interface. Even if they are proposed, it is relatively vague. Therefore, to investigate the user’s interface requirements, we must first start from the investigation of the user’s own characteristics, summarize the requirements of different types of users, and then conduct a targeted analysis to finally get the final demand.

3.3 Reliability Test of Survey The so-called half-reliability is to divide the questionnaire into two halves, and then calculate their reliability coefficients separately. When the reliability coefficients of the two halves are the same, the Spearman-Brown formula is often used to obtain the reliability coefficient of the entire questionnaire. r S B = 2r S H /(1 + r S H )

(1)

When the coefficients of the two halves are not the same, the Lulun formula should be used for calculation. r Rulon = 1 −

2 Sa−b St2

(2)

4 Discussion The information collection for user experience mainly adopts the method of questionnaire survey. In the questionnaire survey, this paper conducts a survey of 200 college students in a university, including 106 girls and 94 boys, according to their use of the mobile App interface and the preference for design practice.

4.1 The Visual Characteristics of the Mobile App Interface From Table 1 and Fig. 1, it can be found that women and men have very different requirements for the visual level of the mobile App interface. The three words most selected by men are simple, intuitive and hip-hop, accounting for 36.79%, 42.31% and 45.47%, respectively; and women choose the most exquisite, intuitive and warm, accounting for 51.36%, 45.91%, and 66.67% respectively.

20 Male (%)

Female (%)

Unique

33.95

41.56

Exquisite

19.21

51.36

Simple

36.79

22.22

Intuitive

42.31

45.91

Hip-Hop

45.47

16.53

Lovely

12.46

37.21

Warm

26.74

66.67

Percentage

Table 1 Use three words to describe the visual characteristics of the App interface

X. Wu

Male Female

adj Fig. 1 Use three words to describe the visual characteristics of the App interface

4.2 The Characteristics of the Reflection Level of the Mobile App Interface According to Fig. 2, with regard to the characteristics of the reflective level of the mobile App interface, men choose more accomplishment, resonance and storytelling, accounting for 48.31%, 57.28% and 42.98%, respectively; women are sympathetic and warm those who are satisfied and those who are satisfied account for 55.56%, 44.44% and 55.42%, respectively.

Emotional Design in Mobile App Interface Design

21

adj

Male interesting Storytelling Resonance Warm fulfilled sense of achievement kind hearted

Female

36.39% 48.31% 57.28% 23.12% 41.56% 42.98% 24.69% 0%

20%

40%

26.51% 31.27% 55.56% 44.44% 55.42% 21.49% 33.23% 60%

80%

100%

Percentage Fig. 2 Use three words to describe the characteristics of the reflection level of the App interface

5 Conclusions With the development of technology and the continuous improvement of people’s living standards, the emotional needs of users have been paid more and more attention. This requires the design of mobile phone themes not only to meet the diverse needs of users, but also to meet the physical and psychological emotional needs of users. Introduce emotional design into mobile phone theme interface design, and make interface design a carrier of personalized customization services through innovative design techniques, and introduce new vitality to interface design. Its reasonable use can not only focus on user pain points, obtain user emotional attraction and recognition, but also promote products, guide users’ emotional cognition and emotional shaping, and establish long-term brand reputation. At the same time, it has also made certain attempts and challenges to break the traditional solidification model and innovate to guide new trends.

References 1. Wei Y, Chaoyang Q, Jun L (2019) Modular design of mobile APP interface based on the visual flow. Autom Control Comput Sci 53(1):56–62 2. Muzio ED, Toti D, Polticelli F (2017) Docking app: a user friendly interface for facilitated docking simulations with AutoDock Vina. J Computer-Aided Mol Design 31(2):213–218 3. Pengnate S, Sarathy R (2017) An experimental investigation of the influence of website emotional design features on trust in unfamiliar online vendors. Computers Human Behav 67(FEB.):49–60 4. Wang CH, Lin H (2018) Emotional design tutoring system based on multimodal affective computing techniques. Int J Distance Educ Technol 16(1):103–117 5. Wang W, Nagai et al (2018) Interactive technology embedded in fashion emotional design: case study on interactive clothing for couples. Int J Clothing Sci Technol 30(3):302–319

22

X. Wu

6. Uzun AM, Yldrm Z (2018) Exploring the effect of using different levels of emotional design features in multimedia science learning. Computers Educ 119(1):95–111 7. Alaniz T, Biazzo S (2019) Emotional design: the development of a process to envision emotioncentric new product ideas. Procedia Computer Sci 158:474–484 8. O’Malley G, Dowdall G, Burls A et al (2016) Exploring the usability of a mobile app for adolescent obesity management. Physiotherapy 102(2):e29 9. Hsu CL, Lin CC (2016) Effect of perceived value and social influences on mobile app stickiness and in-app purchase intention. Technol Forecasting Social Change 108:42–53 10. Yuan W, Xun Y, Vespasiani G et al (2017) Mobile app-based interventions to support diabetes self-management: a systematic review of randomized controlled trials to identify functions associated with glycemic efficacy. Jmir Mhealth Uhealth 5(3):e35 11. Dahne J, Lejuez CW, Kustanowitz J et al (2017) Moodivate: a self-help behavioral activation mobile app for utilization in primary care—development and clinical considerations. Int J Psychiatry Med 52(2):160–175 12. Sang PH, Park S, Oh W (2016) Mobile app analytics: a multiple discrete-continuous choice framework. Social Sci Electron Publ 40(4):983–1008

The Development of Communication Mode of Network Language and Culture Under the Environment of New Media Convergence Xuanyu Liu

Abstract New media and new technology are constantly updated, and the way of cultural communication is also constantly changing. New media can change people’s lives, make people full of curiosity and desire for the world, choose the right way of cultural communication, and contribute to the development of society. Although new media has a great impact on culture, making full use of these resources can promote cultural communication, improve the efficiency of information communication and speed up the process of cultural integration. This paper mainly studies the development of communication mode of network language and culture (NLAC) under the environment of new and new media integration. This paper begins to elaborate the carrier of new media NLAC communication, mobile phone carrier and the Internet, and then analyzes the effect of NLAC communication. The network language communication in the network culture environment reflects the group innovation consciousness of Internet users. This paper also studies the influence of NLAC communication, the influence of NLAC on people’s cognitive style, people’s life and cultural language, and the change of discourse power reflected by it. Based on big data, this paper analyzes the situation of Internet users and the proportion of main new media communication modes in the new media convergence environment through chart analysis method. The experimental results show that both the growth of Internet users and the utilization rate of new media have greatly increased in recent years. In 2016, the scale of Internet users is 73.63%, and by 2020, the scale of Internet users will expand to 87.24%. In terms of new media use, the growth rate of new media use in 2016 is 51.58%, and the growth rate of new media use in 2020 will reach 76.41%. Keywords Network language culture · Cultural communication · Mode of communication · New media

X. Liu (B) Cangzhou Normal University, Cangzhou City, Hebei Province, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_3

23

24

X. Liu

1 Introduction Since the development of human history, culture has played an important role as a tool to understand and change the world. In the complex social life, culture is used to change people’s attitude and way of life to promote social development [1, 2]. New media is a bridge to spread culture, enabling people to understand, accept and exchange various cultures [3, 4]. At the beginning of the twenty-first century, compared with traditional media and newspapers, the continuous development of science and technology promotes the emergence of new media communication forms, and the world has entered a new media era. To a large extent, cultural communication has unprecedented opportunities and challenges [5, 6]. In modern society, with the rapid development of Internet technology, the new communication mode of instant, interactive, massive and multimedia has fundamentally changed the way of human information transmission. In addition, the pursuit of personality and independence has formed a wide range of psychology, and the free expression of personal life and personality has increasingly become a way to seek self [7, 8]. Studying the communication mode and development characteristics of NLAC in the new media environment is of great significance to understand the difference between Internet communication mode and traditional media [9, 10]. In the research on the development of the communication mode of NLAC under the environment of new media convergence, many scholars at home and abroad have studied it and made some achievements. Roundtree AK pointed out that the Internet has become the most important place for human beings outside of real life. It can be said that the network world has become another virtual society in parallel with the real society. In this virtual society, with the change of time and communication mode, people’s habitual symbol and discourse system also reflects the text characteristics different from the reality of the times, and these new texts reflect the difference between the network communication mode and the traditional media [11]. Xu and others believe that interactivity is a feature of media, and different media have different degrees and forms of interaction. Traditional media is one-way, information flows from media to audience one-way, so the interactivity of media is low; the information of new media is two-way flow, so interactivity is the most important advantage of new media compared with traditional media [12]. The main research content of this paper is the development of NLAC communication mode under the new media integration environment. This paper expounds the carrier of new media NLAC communication, mobile phone carrier and Internet, and then analyzes the effect of NLAC communication. The network language communication in the network culture environment reflects the group innovation consciousness of Internet users. This paper also studies the influence of NLAC communication, the influence of NLAC on people’s cognitive style, people’s life and cultural language, and the change of discourse power reflected by it. This paper uses chart analysis method to study and analyze the situation of Internet users and the proportion of main new media communication modes in the new media convergence environment.

The Development of Communication Mode of Network …

25

2 The Communication Mode of NLAC Under the Environment of New Media Convergence 2.1 New Media NLAC Communication Carrier (1)

(2)

Mobile phone carrier The rapid development of SMS provides a favorable opportunity for the spread of NLAC. Since the mobile phone changed the previous voice dialogue mode and established SMS communication, its cheap communication mode has become an indispensable part of people’s daily life. SMS has become the most popular mobile phone service for its fast transmission, group sending, low price and confidentiality. The spread of NLAC is not only a simple oneway indoctrination, but also has its inherent regularity and interactivity. The whole NLAC can be said to be a huge cultural complex, but as far as each part is concerned, each unique NLAC will form its own unique cultural characteristics, this kind of unique cultural characteristic is also very obvious to distinguish from other cultures, and it is more important to attract public interest and attention. Internet The Internet has become a part of people’s life, especially for the young generation in China, they can’t imagine life without the Internet. More and more mature network services seamlessly access to our daily life, but also make the Internet really touch every aspect of modern life. The emergence and development of the Internet is the result of a comprehensive effect of media development. It not only breaks through the limitations of geographical and interpersonal communication, but also has the characteristics of two-way selectivity in the communication and exchange of information, which makes information widely spread through the Internet.

To spread the NLAC through the Internet, the first thing is to let a few people be affected by the NLAC. If these few people identify with and like the NLAC, it will also be widely spread to let more people accept and like it. From the perspective of communicators of NLAC, they also make continuous improvement and transformation to the meaningful places of NLAC, so that the unchanging NLAC can get new development. Communicators of NLAC can add new cultural elements according to the existing information, and form a new cultural form in front of the world. In the process of NLAC communication, NLAC communicators can freely express their views, upload or download their favorite forms of NLAC. In such an era of information development and resource sharing, they can deeply understand the spiritual connotation of NLAC through more information, after giving their part to the NLAC information they are interested in, they will also unconsciously feel proud and promote the NLAC communication industry to become more positive. As for the receivers of NLAC, in the new media era, due to the continuous differentiation of information development, the public’s acceptance of information has become more

26

X. Liu

differentiated and personalized. They will not receive and identify all the contents and information of NLAC, they will only choose the contents they are more interested in. Therefore, we should make different information and content of NLAC according to the different preferences of the public, so that the public can understand and love the NLAC more widely.

2.2 Communication Effect of NLAC The emergence and spread of network language is to adapt to the development of network culture. Language always appears in certain social culture. The Internet and electronic media are changing human culture and living conditions. Network space provides opportunities and conditions for people’s intelligence. The modern spirit of adventure, innovation, individualism and challenging authority represented by network culture. The development needs of network culture itself are the driving force of the development of network language. The humor, tact, decentralization and authority of network language enable netizens to show themselves and express their true thoughts in network culture. The spread of network language in the network culture environment reflects the group innovation consciousness of netizens, and both network language and network culture are full of vitality. The spiritual core of network language is anti-authority, anti-elite culture, multi freedom, highlighting personality and so on. When criticizing current affairs and supervising social hot spots, we express the inner thoughts of the grassroots people in a self-mocking and helpless tone. Network language tries to make the public have the right to speak and express themselves in social affairs through its own communication in cyberspace. Network language is full of irony to social reality. Netizens are used to ridicule themselves in a way of self-contempt. In an environment full of postmodern thoughts, network language is netizens’ struggle against elite culture, a victory of mass culture and a scramble for mainstream discourse power. Network language is full of logical paradox and postmodern individual spirit full of irony. In the deconstruction and subversion of the mainstream culture of elitism by the network language, we can see the social culture of the new generation of young people through the words full of ridicule, helplessness and self-ridicule.

2.3 Influence of NLAC Communication In the information age, the storage and dissemination of information by network media makes the audience experience a new way of life. In the pre information age, the dissemination and storage of information are limited by time and space. Nowadays, with the integration and development of new media environment, people’s cognitive style, lifestyle and values are changing.

The Development of Communication Mode of Network …

(1)

(2)

(3)

27

The influence of network language on people’s cognitive style The spread and popularity of the network language used in the network accelerates people’s forgetting of the original cognitive style. What the network media brings is a fragmented and shallow reading cognitive style. First of all, netizens browse information on the web, participate in post discussion in the forum or chat with friends, and use network language with randomness, entertainment and quickness. This kind of written language with the nature of spoken language, the content expressed and the information transmitted are fragmented, jumping and partial. The content of the chat is often the foreword does not match the Afterword, so that the third party is often at a loss. Secondly, there is too much information in the network. When reading a text, there are many link information hidden in the text. As long as the mouse clicks on the hypertext link attached to the text, netizens can jump from this text to another text. The linear reading of Internet users is interrupted, and the brain continues to accept the news in the new link. With the rapid update of information, people have lost patience and time to read deeply. The harm of shallow reading is that people often have a one-sided and superficial understanding of an event. Because of this, the development of network technology has changed people’s cognitive style, and the spread of network language has accelerated the change of this way. The influence of network language on people’s life and cultural language Network language is the language used in the field of network communication, which is adapted to network communication, so it has its own characteristics. Therefore, when the network language into people’s daily life, there will be some not in line with the daily norms. There are some vulgar words, illogical words and some negative thoughts in network language, which affect the development of network language. As a new type of language developed with the change of society, it must be accompanied by the phenomenon of immaturity and nonstandard in the process of its development. Network language brings innovation and vitality to the traditional language, but also impacts the traditional language and challenges its development standard. The change of discourse power reflected by network language The network language with grass-roots spirit gives the Internet users real discourse power in the virtual network space. The network language reflects the life of ordinary people positively and truly, and expresses the thoughts of ordinary people. The anonymity of network language gives the users a relatively secure identity to express their real ideas. The real status, social status, gender education and other personal information are hidden. It really achieved the separation of language from body, language and identity. When Internet users participate in public affairs discussion, they have no shackles of status and speak freely. In the fair and equal network platform, fully show yourself, use the network language to discuss a topic together.

The agenda setting of traditional media is top-down, which is spread to the audience after it is set by the authoritative class. The audience’s status is fixed, and

28

X. Liu

they accept information passively. The emergence of network media, especially the network language, makes the network agenda setting can influence the traditional agenda setting. Therefore, the network language can break the dominant position of the elite in the media. Of course, network language can give people the right to speak at the same time, there are also disadvantages. Due to the weakening of gatekeeper status, it is difficult to distinguish the true and false information in cyberspace, and various media platforms are full of rumors and lies. When the netizen’s network literacy accumulation is not enough, network language violence is easy to occur in the network. The network harm events caused by the network language violence make the network space which should be free, equal, civilized and open become a miasma.

2.4 K-means Clustering Algorithm The spread of network culture is inseparable from big data, and the new media convergence environment is also based on big data. The development of NLAC communication relies on similar data association to increase the chance of being hit by Internet users, so as to achieve wide spread. As the most commonly used data mining processing technology, K-means clustering algorithm is also applied in network communication to help network culture achieve better neighbor communication. The implementation idea of K-means algorithm is as follows: firstly, Euclidean distance is used to calculate the density parameter between adjacent objects with similar network propagation, which can represent the distance between adjacent objects, the calculation formula of Euclidean distance is as follows:   n  (a) (X i − X i(b) )2 (1) di (X i(a) , X i(b) ) =  i=1

Then the density parameter value m-dist associated with adjacent objects is calculated. After the calculation, the average density parameter value mean-dist of each adjacent object can be obtained. Then K objects in high-density area are selected from the adjacent dense parameter set as the cluster center, and then k-means algorithm can be implemented, the specific algorithm is as follows: m (i) = j}x (i) i=1 1{c K j :=  m (i) = j} i=1 1{c

(2)

For each cluster, the mean value of sample points in each cluster is calculated, and the mean value is regarded as the new cluster center. After determining the cluster center, we can increase the click results of similar network culture communication based on its divergent adjacent objects.

The Development of Communication Mode of Network …

29

3 Experimental Study 3.1 Subjects This paper mainly studies the development of communication mode of NLAC in the new media integration environment. By elaborating the carrier of new media NLAC communication, analyzing the effect of NLAC communication, and studying the influence of NLAC communication, this paper explains the development of NLAC communication mode in the new media environment.

3.2 Experimental Process Steps The main research content of this paper is the development of NLAC communication mode under the new media integration environment. This paper expounds the carrier of new media NLAC communication, mobile phone carrier and Internet, and then analyzes the effect of NLAC communication. The network language communication in the network culture environment reflects the group innovation consciousness of Internet users. This paper also studies the influence of NLAC communication, the influence of NLAC on people’s cognitive style, people’s life and cultural language, and the change of discourse power reflected by it.

4 Experimental Research and Analysis on the Communication Mode of NLAC Under the Environment of New Media Convergence 4.1 Internet Users in the New Media Convergence Environment Since the development of the Internet, the scale of Internet users in China has been increasing. The large number of Internet users has laid the foundation for the spread of NLAC in China. The more Internet users, the more people use new media, the more spread of NLAC, this paper collects and collates the growth scale of Internet users and the growth rate of new media use in recent years through big data, and the results are shown in Fig. 1 (Table 1). As can be seen from Fig. 1, both the growth of Internet users and the utilization rate of new media have greatly increased in recent years. In 2016, the scale of Internet users was 73.63%, and by 2020, the scale of Internet users will expand to 87.24%. In terms of new media use, the growth rate of new media use in 2016 will be 51.58%, and the growth rate of new media use in 2020 will reach 76.41%.

30

X. Liu

2020

years

2019 2018 2017 2016 0

20

40

60

80

100

propor on Growth rate of new media usage

Growth rate of Internet users

Fig. 1 Internet users in the context of new media convergence

Table 1 Internet users in the context of new media convergence 2016

2017

2018

2019

2020

Growth rate of internet users

73.63

78.51

81.35

84.77

87.24

Growth rate of new media usage

51.58

62.75

68.73

72.39

76.41

4.2 The Proportion of New Media Communication Mode At present, with the rapid development of new media, there are various ways of new media communication. Network media is favored by traditional media because of its timeliness, not limited by space and time, so its development prospects are bright. This paper collects and sorts out the five most common ways of new media communication through big data, and the results are shown in Table 2. As can be seen from Fig. 2, digital magazines account for 8.47%, digital TV for 13.52%, digital media for 21.68%, Internet for 34.51% and mobile phone software for 21.82% of the new media. Under the environment of new media convergence, there are various ways of communication of NLAC. Table 2 The proportion analysis of new media communication mode New media communication mode

Digital magazine

Digital television

Digital media

iinternet

Mobile software

Proportion

8.47

13.52

21.68

34.51

21.82

The Development of Communication Mode of Network …

New media communication mode proportion

Digital magazine 8.47

digital television 13.52

31

digital media 21.68

internet 34.51

Mobile software 21.82

8.47 21.82

Digital magazine 13.52

21.68 34.51

digital television digital media internet Mobile so ware

Fig. 2 The proportion analysis of new media communication mode

5 Conclusions It is of great significance to study the communication mode and development characteristics of NLAC in the new media environment for understanding the difference between Internet communication mode and traditional media. This paper studies the development of communication mode of NLAC under the environment of new media convergence, expounds the carrier of NLAC communication of new media, analyzes the communication effect of NLAC, studies the influence of network language and culture communication, the influence of network language and culture on people’s cognition, the influence on people’s life and cultural language, and the changes in discourse power reflected by it. Making full use of new media communication resources can promote cultural communication, improve the efficiency of information communication, and accelerate the process of cultural integration.

References 1. Li SA, Jeffs L, Barwick M et al (2018) Organizational contextual features that influence the implementation of evidence-based practices across healthcare settings: a systematic integrative review. Syst Rev 7(1):72 2. Miller B (2016) A computer-mediated escape from the closet: exploring identity, community, and disinhibited discussion on an internet coming out advice forum. Sex Cult 20(3):1–24 3. Da llas C (2016) Jean-Claude Gardin on Archaeological Data, Representation And Knowledge: Implications For Digital Archaeology. J Archaeol Method Theory 23(1):305–330 4. Tambyraja SR, Schmitt MB, Justice LM (2017) The frequency and nature of communication between school-based speech-language pathologists and caregivers of children with language impairment. Am J Speech Lang Pathol 26(4):1193–1201 5. Galaz V, Osterblom H, Bodin O et al (2016) Global networks and global change-induced tipping points. Int Environ Agreements Politics Law Econ 16(2):1–33 6. Fadlilah U, Mahamad AK, Handaga B (2021) The development of android for Indonesian sign language using tensorflow lite and CNN: an initial study. J Phys Conf Ser 1858(1):012085 (14pp)

32

X. Liu

7. Moreno L (2019) Museums and digital era: preserving art through databases. Collect Build 38(4):89–93 8. Kolesnikov AV, Fedosov DV, Nikolaev AV (2021) Calculation of the efficiency of electrically small antenna for mine communications. J Phys Conf Ser 1862(1):012001, 5pp 9. Busari AA, Loto RT, Ajayi SO et al (2021) Ameliorating urban traffic congestion for sustainable transportation. IOP Conf Ser Mater Sci Eng 1107(1):012102, 10pp 10. Ding Y, Yuan N (2020) Logic detection method in network culture communication based on semantic relevance. Pers Ubiquit Comput 24(2):287–298 11. Roundtree AK (2017) Communicating mobility and technology: a material rhetoric for persuasive transportation [by Pflugfelder EH, Book review]. IEEE Trans Profess Commun 60(1):112–114 12. Xu F, Armstrong R, Urrego D et al (2016) The mitochondrial division inhibitor Mdivi-1 rescues mammalian neurons from anesthetic-induced cytotoxicity. Mol Brain 9(1):1–13

Design and Implementation of Highway Engineering Test and Detection Management System Based on Big Data Zhimin Zhang

Abstract Test detection plays a very important role in highway engineering test. It is the basis for test design and identification, as well as the only way to achieve quality differences, and an important means to control technical quality. This article will be based on the national transportation industry standards and the regulations of the ministry of transport, combined with the actual situation of the highway engineering project industry, use big data technology to develop a practical highway engineering test and inspection management system. This article first expounds the influence of big data on highway engineering test and inspection management, then introduces the technical support of big data to the system and designs the specific modules of the system, and finally conducts the test and inspection of the system. The experimental results show that the highway engineering test detection management system can effectively improve the detection efficiency. Keywords Testing · Big data · Highway engineering · Management system

1 Introduction With the continuous development of China’s economy and society, China’s highway construction has entered a period of rapid development, and the requirements for road use quality are also higher and higher. The control of project quality mainly includes the self-inspection of test and detection units, supervision sampling, government supervision and other links, so the project test and detection data has become an important means to realize the project quality control [1, 2]. In recent years, highway engineering test and detection has been the research hotspot and difficulty of academic scholars, many experts are committed to research and design a convenient highway test and detection management system [3]. Yosuke, Morimoto etc. think that as a new e-learning content specification, cmi5 has been Z. Zhang (B) Shanxi Transportation Construction Engineering Quality Detection Center (Co.,Ltd.), Taiyuan City 030000, Shanxi Province, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_4

33

34

Z. Zhang

developed and widely concerned. The purpose of this study is to design and implement cmi5 specification on learning management system (LMS). Firstly, the cooperative operation method between LMS and LRS, the conversion method between learner interface and allowable unit (AUS) are designed; An LRS is deployed behind the LMS to improve the independence of the LRS. LMS provides a content table that shows the course structure and allows learners to switch between AUS. On this basis, the Moodle plug-in modElecoa has been extended to support cmi5. The plug-in is expected to be used to verify interoperability and further identify cmi5 [4]. Zhang Yuan believes that the sustainable development of the national economy will accelerate social progress, and expressway construction will develop at an unprecedented speed [5]. GuoLiang analyzes the importance of detection and evaluation technology, expounds the main contents of detection and evaluation, and puts forward some countermeasures for improving the detection and understanding of expressway technology. It is pointed out that only by doing a good job of inspection and demonstration in the process of road positioning and the inspection and demonstration play a full role in engineering quality control [6]. In order to further improve the quality of project management and make the management work develop in the direction of scientization and modernization, it has become an important development direction in the field of highway construction management to use big data for auxiliary test detection management. In view of the complicated procedures of highway engineering test and detection in recent years, this paper hopes to design an effective system to solve the problems of highway engineering test and detection management by using big data, and make a contribution to highway engineering test and detection management.

2 Theoretical Research on Highway Engineering Test and Detection Management System Based on Big Data 2.1 Influence of Big Data on Test and Testing Management of Highway Engineering 2.1.1

Big Data

Starting from the concept of big data, big data refers to data sets whose capacity exceeds the collection and storage capacity. It is also the latest data analysis technology, which can realize high-frequency data processing, quickly obtain value from massive complex data, and improve data processing efficiency [7, 8].

Design and Implementation of Highway Engineering …

2.1.2 (1) (2) (3) (4) 2.1.3

35

Characteristics of the Big Data Massive data volume Various data types Huge data value Intelligent data mining The Impact of Big Data

At present, the application system used by the detection department is independent, there is no unified data standard, and there is no interconnection between the systems, which leads to the lack of information resources and cannot be shared between the detection departments. This greatly limits the impact of informatization on improving work efficiency, and has become the biggest obstacle for big data technology to be applied in inspection and detection, so the construction of inspection and detection system is of great significance. With the increase of available data, people can do a lot of things that small data can’t do and also can model and analyze relevant experiments according to historical data, allocate the best resources, effectively manage inspectors, reduce experimental costs, and improve the efficiency of testing and scientific research.

2.2 Demand Distribution of Highway Engineering Test and Testing Management The overall requirements of the system are based on standardizing and innovating the behavior of highway test and inspection companies, to promote the transformation of highway test and inspection companies’ functions, improve administrative efficiency and the level of supervision and service of highway test and inspection companies, and have unified construction standards, reasonable structure, complete functions and safety reliable office platform [9]; promote the construction of information resource database for information management work, realize information exchange and sharing between various units of highway test and inspection enterprises, and significantly increase the degree of information sharing [10]; focus on building an office automation application system for enterprise information management work, and gradually improve the office automation application within the highway test and inspection enterprise, and realizes the cross-departmental digital office collaboration through the electronic engineering test and inspection exchange platform within the entire group company [11, 12]. After the completion of the highway engineering test management information system to achieve the following major functions: (1)

The engineering test detects the electronization of transmission. The non-secret and universal documents of highway test and inspection companies are all

36

(2)

(3)

(4)

Z. Zhang

electronically sent through the platform. The original paper documents are sent regularly for archiving, which can greatly improve the turnover efficiency and office efficiency of engineering test and detection, and save resources. Electronic information release. All kinds of information management contents are converted into electronic format, and all information management information submitted by test and detection departments are uploaded in the form of electronic documents through the platform. Gradually abolish the paper notification mode, use digital technology and mobile terminal technology, develop information broadcasting platform, and realize the notification and reminder function by SMS, e-mail, fax and other ways. This not only improves the timeliness of information management work, but also greatly facilitates the query and utilization of information, and improves work efficiency. Sharing of enterprise data in highway test and inspection. Build a data exchange platform for highway test and inspection enterprises, and promote the crossdepartmental exchange and sharing of data from various highway test and inspection enterprises. Establish electronic archives, highway test and inspection enterprise engineering test and inspection database, and highway test and inspection enterprise comprehensive information database, and store all kinds of highway test and inspection enterprise information digitally and centrally, facilitate the inquiry and sharing of information, and improve the ability of highway test and inspection enterprises to manage information and use resources. The collaborative application of information management. A unified office platform is built in the information management office network, which integrates various information management and release applications of various units and departments, such as office work, information release, e-mail, approval, provision of public information. Through a unified network interface, it provides collaborative office support for test and detection personnel of highway test and detection enterprises. In order to realize the road test and detection enterprise network office from the department scattered office, for the road test and detection enterprise system internal resource sharing, it needs to promote the improvement of office automation level of the department to lay the foundation.

To sum up, through the use of big data and its high-frequency data processing, we can quickly obtain value from huge and complex data, improve the efficiency of data processing, and develop the highway engineering test management system based on big data technology, so as to greatly improve the informatization degree of highway engineering test management.

Design and Implementation of Highway Engineering …

37

2.3 System Design Based on Test and Testing Management of Highway Engineering 2.3.1

Overall System Design

The calculation and processing methods provided by the system should be convenient and flexible, and can be controlled by users, and can be adjusted and maintained as the model of laboratory test data processing. The measurement and inspection have the following functions: (1) simple interface and easy operation; (2) high precision and flexibility; (3) comprehensive content and strong practicability; (4) safe, reliable, scientific and reasonable.

2.3.2 (1)

Functional Module Design User management

The requirements of user management are: the administrator can manage all user accounts of the collaborative office platform through the web; ordinary users rely on their assigned user name and password to access all information management systems through login; it can provide user management and user authentication for different application systems. Including: enterprise test personnel e-mail system, office automation system, highway test enterprise engineering test circulation system, comprehensive information database and so on. Administrators can batch import and export account data, group users, implement group level resource allocation policies, and provide system log management, backup and recovery functions. (2)

Information management module

The information management office module is a platform to provide unified daily transaction processing and personal office communication tools for the information management of highway test enterprises. The specific functions of the information management office system should include: unified user login, notification, daily transaction processing, information processing, personal office auxiliary tools, platform management functions, etc. The engineering test processing system is one of the core application systems in the highway engineering test management information system, which mainly includes two kinds of applications: document sending management and document receiving management. In the design of this highway engineering test management system, a special engineering test management system will be established for highway engineering test. (3)

Detection and processing module of engineering test

Engineering test and processing system is one of the core application systems in highway engineering test management information system, mainly including two applications of document management and document collection management. In the

38

Z. Zhang

construction of the engineering test and treatment system, a special engineering test and treatment system will be established for the road test and testing enterprises.

2.3.3

Database Design

According to the system requirements, the system mainly designs five database files: engineering test flow database (wsoa), daily affairs database (wsbusiness), work arrangement database (wsarrangedb), information release system database (wsips) and system framework database (wssoa).

2.4 System Key Technologies 2.4.1

CURE Clustering Algorithm

The cure algorithm based on representative points can deal with large data sets with arbitrary shape. In this algorithm, a group of fixed number and well distributed points are selected as the representative points. Such representative points can accurately capture the overall distribution and shape information of the category; after selecting the representative points, the algorithm shrinks the representative points to the centroid of each category according to a certain ratio (shrinkage factor), and uses the position of the shrunk points to represent the representative points of each category. The formula is shown in (1) (2) t(o, j) ← f (d, o) − max{b(o, j) + f (d, o)} ⎧ ⎨

I fo = j, b(d, o) ← min 0, p( j, j) + ⎩

 d ∈{o, / j}

⎫ ⎬ max{5, o(o, p)} ⎭

(1)

(2)

The introduction of shrinkage factor not only weakens the influence of noise points on clustering results, but also enhances the recognition ability of the algorithm for different class density. At the beginning of the algorithm, each data point in the data set is regarded as a class separately, and then the classes of the nearest two representative points are merged in each step until the number of categories is reached.

Design and Implementation of Highway Engineering …

39

3 Implementation of Highway Engineering Test and Detection Management System Based on Big Data 3.1 Main Functions of the System The test experiment data management system mainly includes the following functions: experiment task management, experiment data management, experiment comprehensive query, experiment resource management, basic data management, experiment modeling management and system management.

3.2 System Test Mode There are three ways to realize the application function of this system: customized development, configuration development and platform implementation. The specific description of the implementation method is as follows: the customized development method is that the system platform does not have this function, and the developers need to customize the development by programming according to the requirements. The configuration development mode is that the system platform has the function, but it can not fully meet the requirements of the system management. It needs to be developed on the basis of the platform function by programming according to the requirements. The implementation mode of the platform is that the system platform has this function, which only needs the implementation personnel to implement on the basis of the platform function according to the demand.

4 Realization Analysis of Highway Engineering Test and Detection Management System Based on Big Data 4.1 Implementation Route and Implementation Mode The implementation of this experiment is as follows: the transition between the states of the test tasks and the process monitoring will be realized in the existing functions of the platform, and the test task will be queried according to different conditions, and the implementation will be expanded according to the requirements. It will execute the existing experimental process and configure the implementation, then customized experimental data, data type maintenance and summary of data to generate module customized experimental report. The customized data can be queried in different dimensions and data statistics can be developed (Table 1).

40

Z. Zhang

Table 1 Implementation route and implementation mode Order number

System application function

Functional classification Scheme route

1

Experimental task management

Experimental task management

The transformation between experimental tasks and process monitoring are implemented in the platform

2

Experimental task planning

Experimental task management

Experimental task query according to different conditions and extension according to requirements

3

Personal task Management

Experimental task management

Existing experimental process execution function, configuration and implementation

4

Experimental data Management

Experimental Data Management

Customized experimental data, data type maintenance

5

Experimental report generation

Experimental Data Management

Summary data: to generate a module custom experiment report

6

Comprehensive comprehensive inquiry

Comprehensive comprehensive inquiry

Customize the query functions for the different dimensions of the data

7

Experimental statistics

Comprehensive comprehensive inquiry

Develop the data statistical function

8

Equipment and instrument management

Experimental resource management

Develop the equipment and instrument data management function

9

Basic data Management

Basic data management

Develop according to the basic data management requirements

4.2 Test Management System Figure 1 shows the test application in the two-dimensional list. The data are listed as serial number, operation, experiment task number, application form type, application form status, entrusting company, plan start time and plan finish time. The initial data of the list is the data except that the application form status is completed. The system adopts hierarchical design, which separates the presentation layer from business logic and data access. The business layer accepts the services provided by

Design and Implementation of Highway Engineering … Not started

Under implementation

5 4.5

41

4.4

4.3

4

Completion

Completed

3.5

3.5 3 2

3

2.5

2.4

2.5

2

2

1.8

1.5 1 0.5 0 View test application information

Modify test application information

Delete test application information

Process

Fig. 1 Test application operation

the logic layer and provides services for the presentation layer. As shown in Fig. 2, the business logic layer meets the actual needs of sample collection and testing, as well as the storage and modification of operation objects.

Presentation Layer

Business Tier

Business Logic Layer

Data Access Layer

22% 25% 49% 11% 35%21%

Fig. 2 System level

17% 22% 43%13% 21% 21%

42

Z. Zhang

5 Conclusion The system can comprehensively manage the test data information, improve the integrity of the test data, and provide a reliable guarantee for future highway engineering tests. It can also provide transparency of test data, allowing users to fully understand the current status of the test and test in the first time. For the test information, the system manages it more scientifically, so that test-related personnel can easily find all relevant test information. Testers can comprehensively analyze the test data, and find out the problems in the test process based on the data, and make improvements to the problems to achieve the effect of improving test efficiency. The realization of test networking can successfully complete all test data collection, data processing and other digitization. It greatly improves work efficiency and ensures the authenticity and credibility of data.

References 1. Tian YY (2020 )Design and implementation of image cloud management system based on big data. Software Eng Appl 09(1):62–71 2. Zhang P, Ding L, Jiang N et al (2018) Design and implementation of big-data analysis application on spark for distribution network based on data interception. Energy Procedia 152:1170–1175 3. Gao Huaiyu bright (2017) Problems in construction management of highway engineering and the solutions. Eng Constr Design 000(016):166–167 4. Nakabayashi K, Morimoto Y, Hada Y (2020) Design and Implementation of the cmi5 Specification on a learning management system based on ELECOA. Trans Jap Soc Inform Syst Educ 37(1):19–31 5. Yuan Z (2017) Analysis of the importance of highway engineering test management work in construction. Eng Construct Design 000(019):191–193 6. Liang G (2019) Test and analysis of highway engineering construction. Shanxi Architecture, 2018, 044(001):134–135. Hong L, Hua Y (2019) Design and implementation of meteorological data distribution management system based on Redis. Software Eng 022(003):47–50 7. Yong KJ, Salih MH (2019) Design and implementation of embedded auto car parking system using FPGA for emergency conditions. Indon J Electr Eng Computer Sci 13(3):876–883 8. Bingershaw (2017) Design and implementation on optimization system to increase highway toll lane capacity based on automatical toll. Open J Transport Technol 06(1):43–50 9. Buuveibaatar M, Shin S (2021) Design of Data Model for 3D geospatial information-based highway management using LandInfra standard 3. Int J Highway Eng 23(1):87–94 10. Onyelowe KC, Ebid AM, Nwobia L et al (2021) Prediction and performance analysis of compression index of multiple-binder-treated soil by genetic programming approach. Nanotechnol Environ Eng 6(2):1–17 11. Zh N (2018) Technical problems of highway subgrade and pavement construction and its countermeasures. Eng Construct Design 03(No. 377):182–184 12. Yang O (2018) Analysis of construction quality control of highway subgrade and pavement. Eng Construct Design 05(No. 379):176–178

Art Construction and Protective System Design of Northeast Residential Decoration Classification Patterns Based on Big Data Xinyi Sun

Abstract There are all kinds of traditional dwellings reflecting different national cultures, different historical periods, and different decorative patterns in our country. These dwellings carry a large number of excellent and valuable historical and cultural heritages. Based on big data, the artistic construction and protective system design of decorative classification patterns of northeast residential buildings are conducive to better development and protection of northeast residential buildings. The purpose of this article is to study the art construction and protective system design of northeast residential decoration classification pattern based on big data. This article summarizes and categorizes the decorative patterns of the different structures of the northeast residential houses in detail, and summarizes and analyzes the decorative patterns of the brick-wood structure, the brick-concrete structure and the brick-steel structure. Based on the background of the era of big data, this paper designs the protective system of the decorative pattern art of northeast residential decoration, and puts forward suggestions for the inheritance and development of decorative patterns in artistic construction. The survey data shows that among the decorative patterns of Northeast residential buildings, the theme of the decorative patterns of plants, flowers, animals, and traditional Chinese characters are 80%, 46.43%, and 35.71%, respectively. It can be seen that the northeastern residential houses use more plants, flowers, animals, and traditional Chinese calligraphy patterns. Keywords Northeast residential · Decorative patterns · Artistic construction · Residential protection

X. Sun (B) DPU Southampton International College, Dalian Polytechnic University, Dalian, Liaoning 116034, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_5

43

44

X. Sun

1 Introduction Our country is full of various traditional dwellings reflecting different national cultures, different historical periods, and different decorative patterns. These dwellings carry a large number of excellent and valuable historical and cultural heritage [1, 2]. The protection and renewal of the traditional houses in Northeast China must not leave the artistic construction of the decorative patterns of the houses [3, 4]. Nowadays, big data has become the focus of global attention. The increasing amount of data and the storage, processing, and analysis of various formats of data in specific practices pose challenges to data users [5, 6]. Big data provides a data basis for the study of residential protection activities. The art construction and protective system design of northeast residential decoration classification patterns based on big data is conducive to better development and protection of northeastern residential buildings [7, 8]. Many scholars at home and abroad have discussed it in the research on the construction of residential decoration classification art and the protective system design. For example, Bhuiyan M introduced the historical preservation buildings in Harbin in the form of pictures. The buildings in the article are all based on In the form of pictures, there are not only existing buildings but also damaged buildings [9]; Gefeller O assesses the decorative art characteristics of traditional houses in the old town of Kazan in Yili from an artistic perspective [10]; Kothari VK targets doors and windows of Uyghur houses in Yili area Decoration and its patterns are studied in art [11]. From the perspective of big data, this article explores the decorative patterns of northeastern houses, and provides new ideas for the protection and renewal of houses. This article first summarizes and analyzes the decorative patterns of different architectural structures in northeast residential buildings. Then it analyzes the characteristics of outdoor and indoor decoration art of folk houses, classifies and summarizes the decoration of different components, and finally extracts the most representative shapes of northeast folk house decoration. Finally, this article puts forward suitable protection countermeasures from different levels for the protection of the decorative patterns of northeast residential houses.

2 Art Construction and Protective System Design of Northeast Residential Decoration Classification Pattern Based on Big Data 2.1 Art Construction of Decorative Classification Patterns of Northeast Residential Houses Based on Big Data (1)

The decorative patterns of the brick-wood structure of the folk house

Art Construction and Protective System Design of Northeast …

1.

2.

(2)

45

“Chinese traditional decorative patterns” The residential buildings in the new era of Northeast China not only added new decorative elements. On this basis, they also added the stripes and imprints of traditional Chinese architectural decorations, which not only allowed the Northeast to follow the customs, but also gave the Northeast its own architectural culture. The characteristic, endows the architectural characteristic style of the Northeast New Era [12]. For example, Longmen VIP building hotel and Daowai Stores, above the main entrance of Longmen VIP building hotel, are decorated with a large number of traditional Chinese decorative patterns, including grapes, vases, leaves, phoenix, and long pans. These decorative patterns have many beautiful meanings. Smooth decorative components Designers are not limited to the elements of plants and natural forms, but also the elements of deep-sea creatures and animals. Use the extraordinary design thinking and creative inspiration of the masters to complete the blueprint of the design. The residential buildings in the Northeast also absorbed the decorative patterns of bones, and used the internal structure of animals as the decorative components of the building, mainly concentrated on residential buildings. It is reflected in the residences of the Northeast Railway Bureau.

Decorative patterns of residential buildings with brick-concrete structure 1.

Straight line decoration pattern The specific performance is as follows: two or three circles of different sizes are nested with each other, and three sets of three straight lines of different lengths are suspended, which are tangent to the outermost circle or intersect within the circle. This pattern perfectly combines curves and straight lines. Simple straight lines and elegant curves are the main decorative elements in Art Nouveau buildings. The perfect combination of the two makes the Northeast residential buildings have their own unique signs. Let the different styles of northeastern houses have a unified symbol. It allows people to clearly identify buildings in the style of Art Nouveau.

Decorative patterns of residential buildings with brick and steel structure. (1)

Decorative patterns of character heads

The more prominent decorative elements in the decorative patterns of northeastern houses are the decorative patterns of figures. The prototypes of the heads of the characters are mostly derived from the heads of ancient greek mythological figures and the faces of the devil in the bible, these decorative patterns have many meanings. In our country’s buildings, symmetrical decorative components, mostly stone, are placed at the entrance of the gate, such as lion, Jiao Tu, elephant and so on. In addition to decoration, it has a special meaning. Take Jiaotu as an example, the fifth son of the ancient divine beast dragon is withdrawn and disgusted by others approaching

46

X. Sun

his territory. He looks like a shell and prefers to be closed tightly. When an enemy invades, he will immediately close his mouth to protect himself. The people put it on the door of their own home, which has the meaning of protecting safety.

2.2 Protective System Design of Northeast Residential Decoration Classification Pattern Art Based on Big Data (1)

Protection of decorative classification patterns

First: Collect various decorative detailed patterns in traditional houses, draw them with CAD software, and classify them according to the theme and decorative parts of the patterns, and expand the pattern library for house decoration. Second: Modularize the decorative patterns in CAD software and upload the modular patterns to the residential building design shared resource platform to provide decorative materials for subsequent residential designers. Third: The patterns that have been collected and organized are classified and grouped according to different decorative components, and organized into a relatively complete atlas for subsequent residential research and design personnel as a reference and design basis. Fourth: Study the composition rules of the decorative patterns that have been collected, refine the core elements of the decorative patterns, and create new patterns in accordance with the laws of their changes. (2)

Protection of decorative shapes

By collecting and summarizing the existing decorative shapes, converting them into digital resources, and uploading them to the shared residential building design platform, it provides a reference for subsequent research and designers. The above protection of decorative patterns and shapes, patterns and shapes can only be made through specific techniques, so the protection of decorative craftsmanship in the protection of traditional house decoration is also a very important link. (3)

Process protection

Outdoor decorations in traditional dwellings are mainly classified into wood carvings and brick carvings according to their crafts. These two crafts are an important part of our country’s folk handicrafts. The protection of crafts is mainly: the collection of materials, the integration of decorative modeling, the combing of patterns, the classification of residential decoration crafts, the technological process, and the later education and publicity. The fourth chapter collects and summarizes the decorative modeling and patterns, and the fifth chapter details the methods of combing the decoration craftsmanship, and the patterns and characteristics of the pattern formation, all of which are protective decoration crafts. The decoration craftsmanship can only be displayed artificially, so the craftsman plays an important role in the protection of the decoration craftsmanship.

Art Construction and Protective System Design of Northeast …

(4)

47

Establish an open public interactive platform

In the context of the digital age, the network technology is very developed. The public open platform can be a website that discloses government official information, an APP that contains multi-function services for scenic spots, or even a remote sensing image technology reflected on a computer or mobile phone 3D map, using GPS and 3S technology, establishes a virtual village with the characteristics of Northeast dwellings on the Internet and APP. Netizens and tourists can click on different scenic spots to enter the simulation interface and experience the 3D effect as if they are in the Northeast dwellings. This will not only show the traditional streetscape of Northeast China, but also allow tourists and users to know in real time that managers can use the APP to promote information about the culture, activities, and commerce of northeast residential buildings in real time, through user feedback, they can also know in time that they need to be repaired buildings, etc.

2.3 Big Data Connection Algorithm The units that use systematic sampling are evenly distributed in the population, so they can better reflect the distribution of the population. According to statistical principles, the larger the sample, the higher the accuracy of sampling. The probability of occurrence of A event can be set to p, and the number of occurrences of A in n repeated trials is m. When n is sufficiently large, it is approximately as follows: 

 m − np N (0, 1) np(1 − p)

Taking the confidence interval as 100%, there is  −3 ≺

m − np np(1 − p)

 ≺3

And so: np − 3np(1 − p) ≺ m ≺ np + 3np(1 − p) Calculation error, as shown in formula (1) 1 3np(1 − p) 1 =3 − np np n

(1)

It can be seen that the larger the n, the smaller the error of m, and the higher the accuracy of sampling. Ideally, the amount of data received by each task is:

48

X. Sun N um

avg =

cos tkeyi

i=1

(2)

Rnum

3 Based on Big Data, Northeast Residential Decoration Classification Pattern Art Construction and Protective System Experimental Research 3.1 Research Methods (1)

Internet survey

Use the Internet to pay attention to the relevant information about the decorative patterns of northeast residential houses in real time, such as following the WeChat official account, Weibo official account, Douban group discussion, Zhihu, Tieba, Northeast residential exchange group, etc. And in the forum to exchange views with everyone, put forward ideas and discuss, broaden their thinking.

3.2 Determine the Research Object This paper selects H city in Northeast China as the research object. H city is an excellent representative of historical and cultural resources and remains in traditional northeastern residential houses. With the development of tourism, the amount of data based on the network data of village residents and visiting tourists is more than traditional the village is large, and the data level is more comprehensive.

3.3 Research Scope This data research is mainly distributed in the administrative villages and scenic spots of H City in the Northeast, with a total of 56 buildings. Traditional data mainly comes from field surveys, government information websites, visit surveys, etc. of scenic spots in City H. The main users of network data are residents of residential areas in H city and tourists in the scenic spots.

Art Construction and Protective System Design of Northeast … Table 1 Application of decorative patterns in residential H residential areas in Northeast China by subject

49

Traditional decorative patterns

Proportion (%)

Number of buildings

Plant flowers

80.36

45

animal

46.43

26

Story scene

10.71

6

Text symbol

35.71

20

Combination of utensils

17.86

10

4 Based on Big Data, Northeast Residential Decoration Classification Pattern Art Construction and Protective System Data Analysis 4.1 Use of Decorative Patterns in Northeast Residential Houses of Various Themes Through the above survey and research on the urban landscape of H, it is concluded that the traditional residential decoration patterns in city H mainly include plants and flowers, animals, stories of historical figures, text symbols, utensils, etc. The typical use of decorative patterns for each theme is shown in Table 1: Among the decorative patterns of northeastern houses, the subjects of animal, plant, and traditional Chinese character decorative patterns are 80%, 46.43%, and 35.71%, respectively. (Because a building will use a variety of decorative patterns themes, the percentages add up to greater than 1). It can be seen from Fig. 1 that the residents of H citizens used more plants, flowers, animals, and traditional Chinese calligraphy patterns. In the center of H citizens, it is generally used on ground paving, construction details, guardrails, and stone benches. There are also some plant and flower patterns that are often used to decorate the edges and corners to enrich the whole picture and make the work show a complete effect. The reason why there are so many traditional Chinese calligraphy patterns is that these auspicious words and words will convey a good life will, and the words are mostly used in some decorative sculptures as points and subjects.

4.2 Tourists’ Understanding of Northeast Residential Houses The text information selected in this study comes from two travel service websites, Dianping and Ctrip. At present, the popularity of smartphones is very high. Tourists and some residents of Longchuan as users can reflect their knowledge and evaluation of scenic spots on Public Comment and Ctrip, tourists and users’ tourism perception can form good feedback on H City. Based on the statistics of 400 comments made by

50

X. Sun

Traditional decorative patterns

Number of buildings

10

Combination of utensils

17.86 20

Text symbol 6

Story scene

proportion(%)

35.71

10.71 26

animal

46.43 45

Plant flowers 0

10

20

30

40

50

80.36 60

70

80

90

Number Fig. 1 Application of decorative patterns in residential h residential areas in Northeast China by subject

Table 2 Dianping’s word frequency statistics

Rank

Ranking entry

Word frequency

Proportion (%)

1

Nice scenery

354

88.5

2

Antique

296

59.2

3

Clean water

284

56.8

4

Country style

209

41.8

5

Livable

199

39.8

tourists on northeast residential houses, Table 2: “Good scenery in City H”, “quaint and antique”, “clean water”, “rustic atmosphere”, etc. are descriptions of the overall style of the village. It can be seen from Fig. 2 that tourists have a good evaluation of the residential buildings of H, and they believe that the overall style and conditions of the residential buildings in the Northeast are better. It can be seen that the environmental elements of residential houses are well protected in City H in the Northeast, and the styles of residential houses and streets are relatively complete and harmonious.

5 Conclusion Based on the research of the Northeast residential decoration classification pattern art construction and protective system design based on big data, this article takes the residential decoration patterns of H province as the main research object, and reveals the craft and cultural characteristics of the residential decoration patterns in

Art Construction and Protective System Design of Northeast …

Word frequency

51

Proportion

%

354 296

284

Number

209

199

88.5 59.2

nice scenery

Antique

56.8

Clean water

41.8

Country style

39.8

Livable

Ranking entry Fig. 2 Dianping’s word frequency statistics

this area, especially in restoration, and decorative details that are easily overlooked when protecting residential houses. The protection of the decorative pattern art of the northeastern residential houses should be done: the East collects various decorative detailed patterns in the traditional houses, and draws them with CAD software, and refines the classification according to the theme and decorative parts of the pattern, and expands the house decoration pattern library; establish an open public interactive platform, collect and summarize existing decorative shapes, convert them into digital resources, and upload them to the shared residential building design platform to provide reference for subsequent research and designers. Acknowledgements Scientific research project of Liaoning Provincial Department of education in 2020: Research on Inheritance and innovation development of intangible cultural heritage traditional handicrafts in southern Liaoning from the perspective of new media (J2020071).

References 1. Baek YS, Kim JK, Chun SS (2016) Spatio-temporal zonation by ichnocoenoses combined with sedimentary facies in the Yeochari tidal flat (Ganghwa Island), the Han River estuary of Korea. Geosci J 20(3):295–309 2. Florian B, Almeland OW, Julie S et al (2018) Genetic factors have a major effect on growth, number of vertebrae and otolith shape in Atlantic herring (Clupea harengus). Plos One 13(1):e0190995 3. Du H, Wang Z, Mao D (2018) Characteristics of sand dune pattern and fluvial-aeolian interaction in Horqin Sandy Land, Northeast Plain of China. Chin Geogra Sci 28(4):624–635

52

X. Sun

4. Das D, Bhattacharjee H, Deka A et al (2018) Immunohistochemistry on pattern of ocular & adnexal tumours in a tertiary eye care centre of Northeast India. Indian J Med Res 147(1):41 5. Guo Z (2020) Elegant clothing of ethnic Koreans in China. China Today 69(11):76–77 6. Guo Z (2020) The simplicity and complexity of Bouyei Ethnic Group’s Clothing. China Today 69(08):78–80 7. Yao X, Wang J, Ashdown SP et al (2016) Analysis of females’ preferences for buttock shapes with different ethnic backgrounds. Int J Clothing Sci Technol 28(5):600–611 8. Karmila M, Suciati, Widiaty I (2016) Uncovering Sundanese values by analyzing symbolic meaning of Ménak Priangan Clothing (1800–1942). IOP Conf Ser Mater Sci Eng 128(1):012050 9. Bhuiyan M, Wang L, Shaid A et al (2019) Advances and applications of chemical protective clothing system. J Ind Text 49(1):97–138 10. Gefeller O (2018) The garment protection factor: further advances in labelling sun-protective clothing. Br J Dermatol 178(4):835–836 11. Kothari VK, Chakraborty S (2016) Protective performance of thermal protective clothing assemblies exposed to different radiant heat fluxes. Fibers Polymers 17(5):809–814 12. Mark N, Brown MS, Goldstein JL (2019) European Heart J 42:3447–3449

Risk Mechanism and Supervision of P2P Lending Asset Securitization Under the Background of Big Data Wenjing He

Abstract With the wide application of Internet technology, P2P lending is developing well. P2P lending is a new way of lending, which has many platforms, large financing scale and great risks. In order to improve China’s financial system and rationally allocate resources, we must pay attention to the risk mechanism and supervision of P2P loan asset securitization. In the context of big data. By discussing the three main models and risk mechanisms of P2P loan asset securitization. Faced with the inadequate supervision of P2P loan asset securitization, it is suggested to strengthen the corresponding supervision measures to ensure the normal operation of P2P loan asset securitization. Keywords P2P lending · Asset securitization · Risk mechanism · Supervision

1 Introduction P2P lending is an emerging industry in the Internet financial industry, as well as the inevitable result of diversified economic development. The service subjects of P2P lending are mainly small and micro financial enterprises, so as to alleviate financing difficulties of the enterprises. Driven by the times, P2P lending tends to develop towards asset securitization [1–3]. However, asset securitization in China only has three major types: first is the credit asset securitization under the CBRC system; second is the asset securitization under the CSRC system; third is the project asset securitization under the CIRC system. P2P lending has not satisfied the requirements of these three types of asset securitization, it has no explicit supervision system or strict approval mechanism, the business under operation is the securitization inconformable to the standard. However, asset securitization business technology is used in the product design of P2P lending, and the method of asset securitization business is adopted in the transactions of P2P lending, thus the asset securitization is regarded as “P2P lending asset securitization” [4–6]. W. He (B) College of Modern Economics and Management, Jiangxi University of Finance and Economics, Gongqing 332020, Jiangxi, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_6

53

54

W. He

P2P lending asset securitization is a considerable development for both securitization sponsors and investors. This indicates that P2P lending has become a new financing channel, which to a certain extent reduces the financing cost of the sponsors as well as the risk assets in the balance sheet. P2P lending asset securitization can meet various demands of the investors, and guarantee investors’ appreciation in asset value [7–10].

2 The Major Modes of P2P Lending Asset Securitization The P2P lending industry is facing fierce market competition. In this context, it is necessary to implement asset securitization of the P2P lending industry. The process of P2P lending asset securitization mainly covers the creditor, the sponsor, the SPV, the debtor and the underlying assets,1. The process of P2P lending asset securitization has derived different modes of asset securitization, mainly including the debt assignment mode of P2P lending, the mode of P2P lending plus small loan company and the mode of P2P lending plus real estate.

2.1 P2P Lending Debt Assignment Mode The debt assignment mode of P2P lending belongs to offline mode, which can be divided into three main modes as follows: first is the investor’s debt realization mode. In order to achieve assets realization, investors in the same P2P lending platform will grant investment to other investors, so as to obtain circulating fund. The investor’s debt realization mode belongs to debt assignment between equal subjects, the P2P platform does not participate in the transaction, and the creditor, the assignee and the debtor discuss a solution on their own. Figure 1 shows the investor’s debt realization mode; second is the professional lender’s debt assignment mode. This mode has a series of risks, such as the effectiveness of debt assignment, false creditor’s rights and so on. In general, the professional lender is the actual controller of the P2P lending platform, who gets certain creditor’s rights by lending money to the borrower, and then assigns the debt to the platform investors through the P2P platform in order to obtain the interest of the creditor’s right. Figure 2 shows the professional lender’s debt assignment mode. The third is the debt assignment mode of package assets, which refers to that the P2P platform takes advantage of other cooperative agencies to get the creditor’s rights of the package assets, and then assigns the debt by releasing fundraising on the P2P lending platform. Although such debt assignment mode is in line with the conditions of petty proliferation of funds, it makes the transfer funds ambiguous and the transfer assets under wraps and leads to huge risks.

Risk Mechanism and Supervision of P2P Lending Asset …

55

Fig. 1 Investor’s debt realization mode

Fig. 2 Professional lender’s debt assignment mode

2.2 Mode of P2P Lending Plus Small Loan Companies The mode of P2P lending plus small loan companies is an integrating online and offline mode, mainly including financing end cooperation mode and investment end cooperation mode. The small loan companies can adopt the mode of financing end cooperation, and develop a good alliance relation with the P2P lending platform. The small loan companies can use their own advantages to expand the development projects of new P2P lending, and select and collect the appropriate development

56

W. He

projects through strict inspection. Under the condition of abundance of capital, the small loan companies can undertake and carry on the development projects. In the case of insufficient company funds, the small loan companies can introduce the development projects to P2P lending platforms and carry out financing on the platforms. As to the economic benefit generated by financing, the small loan companies can communicate and negotiate with the platforms. The P2P lending platforms and the small loan companies have launched the investment end cooperation mode, that is, the platforms make use of their own advantages of technology and datamation technology, allow some of the petty loan projects pass inspection and examination, and use the investment end cooperation mode to let the small loan companies take over appropriate asset projects and make loans. Such asset projects must be within certain range of risk control, and the loans can only be made according to regulations after the small loan companies carry out inspection on risk control of the overall project assets and large amount of loans. The risk control of the asset projects must execute in strict rotation the matched-degree principle of assets income and asset risk. Small loan companies can not bear all the risks during loaning of the assets projects, so P2P lending platforms should act the role of third parties to guarantee the assumption of risks.

2.3 Mode of P2P Lending Plus Real Estate There are mainly two modes of P2P lending plus real estate, one is the rent securitization mode, which is also known as lazy investment mode, and the other is the real estate crowd funding mode. The real estate lazy investment mode refers to that under the combined mode of P2P lending platform and brand house property, the obtained economic benefit is converted into the project of fixed assets, and then the benefit of this project is resold to the investor, so as to plan the fund. Afterwards, the fund is used to open up a mode of the new development project (e.g., YOU plus international youth community). Real estate crowd funding mode refers to that real estate developers extend an olive branch to real estate investors using the Internet platforms, so as to raise funds for real estate projects under their name. Real estate investment projects have multiple risks, which have multiple types, and the funds can be raised by the masses. At present, many real estate enterprises in China need to face high liquidity and large pressure. In view of this, estate agents intend to use asset securitization-like mode to carry out financing, and then invest by means of crowd funding, thereby consolidating the real estate development project.

3 Risk Mechanism of P2P Lending Asset Securitization The P2P lending platforms use its own science and technology and datamation technology and regard customers’ internal needs as the premise to accumulate a very large

Risk Mechanism and Supervision of P2P Lending Asset …

57

number of high-end customers, so as to make loans and take various measures to reduce the occurrence of risks. This enables P2P lending platforms to develop rapidly. However, affected by a number of reasons, the plight of P2P lending platforms is less optimistic.

3.1 Legal Risk Legal risk refers to that, due to a change in the internal or external legal environment of the enterprise during legal actual operation, the enterprise did not execute corresponding business according to regulations and thus suffers from the possible risk of negative legal consequences. P2P lending platforms have the characteristic of legal risk at initial development. The specific reasons are mainly embodied in the following aspects. First, the current P2P lending platforms have no express provisions or accurate detailed concepts, so similar legal issues can only be handled in accordance with the Guidance on Promoting the Sound Development of Internet Finance and Interim Measures on the Management of Business Activities of P2P Lending Information Agencies (hereinafter referred to as the Measures). Second, the supervision implemented by supervision organizations that supervise the current P2P lending platforms, that is, CBRC, is not enough in intensity, resulting in a gradual increase in the phenomena of frauds and illegal fund-raising. Besides, other businesses of P2P lending platforms, such as asset securitization and futures financing, have already touched the legal supervision red line. Third, P2P lending platforms did not obey strict rules in terms of storing information, which can easily cause breach of confidence. In addition, the capital of investors and borrowers of P2P lending platforms is complex, which makes the audit work extremely cumbersome, and also provides a chance of stealing to lawbreakers.

3.2 Credit Risk Credit risk is also called default risk, which refers to the risk of economic loss generated by two transaction parties failing to well perform their obligations stipulated in the contract. Credit risks mostly exist in the financial industry, and the main source of credit risks of P2P lending includes the platforms and borrowers. The business of P2P lending platforms involves a large amount of money and a wide range of fields, and the platforms should possess abundant funds and very standardized management ability. Some lawbreakers attempt to use P2P lending platforms and the loopholes of the supervision departments to steal the property and harm the interests of the investors, which belongs to the platform credit risk of P2P lending asset securitization. The credit risk concerning borrower lies in the authenticity of the borrower’s identity information. The imperfect credit information system of P2P lending asset securitization has led to the inflow of a large amount of false information, making the

58

W. He

funds loaned to the borrower unable to be regularly used. The main borrowing and lending population on P2P lending platforms are strangers, so malevolent default or non-repayment of the principal and interest will not affect the credit standing, as a result, the borrowers of P2P lending platforms are easily unable to repay normally, thereby damaging the investors and the P2P platform.

3.3 Liquidity Risk Liquidity risk refers to that although the enterprise has debt paying ability, it can not timely get sufficient funds to repay the maturing debt. P2P lending platforms themselves do not have liquidity risk, and they are essentially to provide a trading platform for lending and borrowing parties and to act as the intermediaries without participating in the transaction. But in reality, P2P lending platforms will get involved in the transaction between lending and borrowing parties in order to obtain more customer resources. In addition, in terms of risk control and financial products, the platforms did not master the rules of security properties and thus shorten the exposure time of the product risks, leading to liquidity risk. If the default consequences brought by liquidity risk cannot be well handled, the close-down of the platforms will be speeded up.

3.4 Institutional Risk Generally speaking, the institutional risk of P2P lending platforms has two patterns of manifestation: first, certification performed by authorities and intermediary organs is lacking. In the operation process of P2P lending platforms, not only authoritative supervision organizations are lacking, but also the approval from intermediary organs such as accounting and law firms is absent, resulting in that important hidden information has not been obtained. Second, information disclosure is lacking. On P2P lending platforms, the basic information and data of lending and borrowing parties and the specific operation process are mastered by the platforms, and the correlation between the parties is weak, which will lead to black box operation and trigger institutional risk.

3.5 Ethical Risk The ethical risk of P2P lending platforms is affected by two factors. First, the platforms have not properly executed bankruptcy isolation, which is the risk isolation between basic assets and other assets performed by asset securitization. Bankruptcy isolation is the central element, and its essence is to remove the debt relationship

Risk Mechanism and Supervision of P2P Lending Asset …

59

between the asset sponsor and the securitized asset. Due to the regulatory restrictions on P2P lending in China, the asset securitization products can only constitute carriers with general purpose, and can not be specialized, or achieve real bankruptcy isolation. Second, on P2P lending platforms, if the correlation between the lending and borrowing parties is overly high, the self-fusion operation mode will easily appear, thus leading to ethical risk.

4 Insufficient Supervision on P2P Lending Asset Securitization 4.1 High Requirements P2P lending platforms are in an unsupervised and unmanned plight, which has promoted the development of P2P lending platforms, laid a legal status and played a role of supervision and management on consumer behaviors. But it is very difficult to make the platforms completely obey the statutes in the consultation. Although the entry threshold for P2P lending platforms is low, a number of requirements have been raised. In the rules and regulations formulated by the supervision department, precise entry threshold for P2P lending has not yet been set up, and substantial funding requirement has not been raised. However, the rules and regulations compulsorily require that the operating funds of P2P lending platforms be kept by the banks. The banks are particularly prudent of the fund management, P2P lending platforms are required to have register capital of 50 million yuan and capital injection of 15 million yuan. In order to integrate the two ways, it is necessary to well match the information between the two parties, and P2P lending platforms should also possess the ability to develop the informational functions.

4.2 Numerous Limitations The businesses operated by P2P lending platforms should be feasible, but in reality, their operation is subjected to too many limitations. The businesses operated by the platforms are commonly known as “negative list management”, and mainly refer to those businesses the government management sectors can not participate in. The businesses involve management activities listed and allowed to be operated by P2P lending platforms. Although this method can allow the development of P2P lending platforms, it meanwhile limits the development, as the businesses mostly run in the opposite direction of the development prospect of the platforms, and limit the development patterns of the platforms to very pure intermediary information. At present, in order to act in line with the rules and regulations, P2P lending platform companies with strong comprehensive ability need to restructure the company or

60

W. He

the business, or optimize the business structure, so they are subjected to too many restrictions.

4.3 Undefined Supervision For P2P lending information institutions, the Measures have regulated that the supervisory organizations and other departments have supervision and management functions on them. Due to the limitations of P2P lending platforms, decentralized management style will lead to undefined powers of office and responsibilities of supervision and management, thus the true significance of supervision is difficult to be achieved. The medium of the business of P2P lending platforms is the Internet, and the business scope covers strangers across the country. The operation will inevitably bring income and risk. The income is registered under the name of the registration place, but the risk is shared by various places. If things continue this way, some places will relax the supervision and management in order to achieve economic development, which can be taken advantage of by unlawful P2P lending platforms, thus adding to opportunities of violation operations.

5 Supervision Measures on P2P Lending Asset Securitization Due to various portfolios of P2P lending asset securitization and their diversified operation patterns, its supervision system entails mutual cooperation and joint supervision of cross functions. Figure 3 shows the classification of Chinese internet finance and its supervision structure, from which it can be seen that CBRC is the supervision subject of P2P lending asset securitization, however, CBRC still needs to supervise internet trust and internet finance and it can’t totally supervise the whole operation of P2P lending asset securitization. On the other hand, the system with multiple

Fig. 3 Classification and supervision structure of China’s Internet Finance

Risk Mechanism and Supervision of P2P Lending Asset …

61

supervision departments is easy to cause unclear responsibilities and not-in-place supervision. Therefore, an unified supervision system must be established, such as the financial supervision bureau of “One Bank Three Commissions”, the supervision mechanism of “One Bank One Committee”, so as to normalize the financial market and safeguard the safety of financial transactions. Besides, the Central Bank’s credit system can also be referenced to establish the credit information sharing mechanism and guarantee the safety and proper utilization of information resources; the credit rating system should also be set up to enhance risk evaluation ability and improve the construction of supervision system for P2P lending asset securitization.

5.1 Clarification of P2P Status and Normalization of P2P Market Our country’s P2P lending platforms should be intermediary information organizations focused on loans exclusively, which take internet as medium to publish information and facilitate transactions. However, for now, they have become credit intermediaries triggering transactions by playing the role of underwriter. This kind of development mode is easy to lead P2P lending platforms to an abnormal track. In order to make their environment under the orderly development, they must be changed from the mode of credit intermediary to that of information intermediary. Aiming at this, CBRC led to formulate new P2P management regulations which clearly stipulate the businesses P2P platforms can’t do, require them to get back to

Fig. 4 Businesses unable to be done on P2P platforms

62

W. He

the right path and clarify their legal status. Figure 4 shows the businesses P2P platforms can’t do. Because P2P leading platforms’ entry threshold is relatively low and there is no clear legal supervision, the emergence of a large amount of P2P lending platforms in market is just transient, finally incurring loss of a lot of investors. Aiming at this condition, our country’s supervision authorities should normalize the market of P2P lending platforms from the following three aspects. Firstly, increase platform’s registered capital, improve our country’s P2P lending market environment, realize resource consolidation and reduce market risks. Secondly, order P2P platforms to choose proper banks as their cooperation allies base on their own conditions, which can not only normalize market, but also enhance hardware quality. Thirdly, P2P platforms’ senior management should have relatively strong financial management, risk management and other related professional competences. While supervision and management organizations should strictly monitor and control their industrial experience and normalize P2P lending market.

5.2 Enhancement of Industrial Self-discipline and Introduction of Risk Evaluation Due to the high ROI of P2P lending asset securitization, a lot of lawbreakers risk dangers in desperation, challenge the authority of law and try to profit from it. So, this situation entails excellent industrial self-discipline organizations of P2P lending platforms so as to avoid certain risks. However, our country’s self-discipline organizations in this industry are not systematic, and they are disperse in organization patterns, have no cohesion and relatively narrow supervision scope. Therefore, a normal industrial system should be established to standardize P2P lending asset securitization, formulate unified evaluation indexes and behavior standards, improve credit information sharing system, enhance credit construction, normalize industrial market and boost industrial self-discipline. Apart from industrial self-discipline, risk evaluation should also be introduced to enhance investors’ risk awareness considering risks of P2P lending asset securitization. For the investors in this industry, related parties should interpret in detail relevant investment risks, normatively evaluate their risk tolerance abilities, improve their awareness about risk investment, make them choose proper risk investment products and avoid blind investment.

6 Conclusion Under the background of rapid-developing internet technologies, P2P lending asset securitization comes into being. As a kind of new-type financial approach, it advances the development of our country’s market economy to some extent. Whereas, due to

Risk Mechanism and Supervision of P2P Lending Asset …

63

its short development period, people don’t have insufficient understanding about it and don’t know its risk mechanism clearly either. Through the investigations about the main modes of P2P lending asset securitization, this paper clarifies its risk mechanism. Investors must pay enough attention and avoid its risks. Besides, through researching its supervision systems, this paper finds that corresponding supervision should be enhanced, so as to safeguard its stable development. Project Information Research on Risk Control of P2P Network Lending Platform Based on Blockchain Technology, JJ18219.

References 1. Brinkmeier M, Fischer M, Grau S, Schäfer G, Strufe T (2009) Methods for improving resilience in communication networks and P2P overlays. PIK - Praxis der Informationsverarbeitung und Kommunikation 32(1) 2. Mietz R, Groppe S, Kleine O, Bimschas D, Fischer S, Römer K, Pfisterer D (2013) A P2P semantic query framework for the internet of things. PIK - Praxis der Informationsverarbeitung und Kommunikation 36(2) 3. Liebau NC, Mauthe AU, Steinmetz R (2011) Building a distributed trust anchor in P2P systems—creating trustworthy system signatures without a trusted third party. PIK - Praxis der Informationsverarbeitung und Kommunikation 34(2) 4. Kersch P, Szabo R (2008) A graph theoretical lower bound on maintenance overhead of structured P2P overlays. PIK - Praxis der Informationsverarbeitung und Kommunikation 31(1) 5. Kucharzak M, Siwek A, Walkowiak K (2010) Comparison of evolutionary algorithm and heuristics for flow optimization in P2P systems. Int J Electron Telecommun 56(2) 6. Di Modica G, Tomarchio O, Vita L (2011) Resource and service discovery in SOAs: A P2P oriented semantic approach. Int J Appl Math Comput Sci 21(2) 7. Risse T, Kneževi´c P, Wombacher A (2004) P2P evolution: from file-sharing to decentralized workflows (P2P Entwicklung: Vom Filesharing zu dezentralisierten Workflows). it – Information Technology (vormals it+ti)/Methoden und innovative Anwendungen der Informatik und Informationstechnik 46 8. Antons C (2013) Courting Kazaa—judicial approaches towards P2P networks in the US and Australia. Computer Law Rev Int 7(3) 9. Kobusi´nska A, Brzezi´nski J, Boro´n M, Inatlewski Ł, Jabczy´nski M, Maciejewski M (2016) A branch hash function as a method of message synchronization in anonymous P2P conversations. Int J Appl Math Computer Sci 26(2) 10. Feng L, Gao C, Ma K (2017) Unstructured P2P network load balance strategy based on multilevel partitioning of hypergraph. Open Phys 15(1)

Design of Basketball Shot Automatic Recognition System Based on Background Difference Method Fang Xie

Abstract Nowadays, the era is moving towards intelligence and data. As a popular sport in the world, basketball should also keep pace with the times. Because artificial judgment of goals and action standards requires high precision in the fleeting shooting movement, it is not an easy task for people with their subjective will. Therefore, in order to improve accuracy and objectivity, the development of automatic identification systems is a major change in the basketball world. For this reason, this article proposes to design a shooting automatic recognition system based on the background difference method in view of the current situation. In this paper, the design and application of the system are tested by method experimental analysis method, sampling survey method and data analysis method. First of all, this article collects the relevant information of the background difference method, and understands the algorithm flow and modeling method of the background difference method. Secondly, design related tests according to the characteristics of shooting. Then design an automatic identification system for experimental research. Eight basketball players were selected for data observation and analysis through sampling, and the results were obtained. Experiments show that the accuracy of the basketball shot automatic identification system reaches 89%, which can basically meet the requirements. However, in large-scale competitions, the recognition system needs to be further improved. Keywords Background difference method · Fixed-point shooting · Automatic identification system · Signal acquisition

1 Introduction Nowadays, sports have become a cultural symbol of world civilization and progress, and basketball is undoubtedly an important part of this. The shooting percentage is the main scoring point for people to participate in basketball competition. Modern basketball has tended to use rules to compare the body, technology and tactics, F. Xie (B) Military Sports Department, Yichun Vocational Technical College, Yichun 336000, Jiangxi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_7

65

66

F. Xie

physical stamina and style, consciousness and wisdom, and psychological quality in confrontation. The recording of technical statistical indicators commonly used in basketball games completes the process from qualitative to quantitative for the key factors of the basketball game. Data is an important basis for scientific decisionmaking, and letting data speak is the correct way to make scientific decision-making. Therefore, designing an automatic shot identification system and using the Internet to detect and analyze data is an important part of basketball sports events. Min explored crowd behavior in the context of sports by studying 139 men’s basketball games broadcast on TV by the National College Sports Association, focusing on shooting attempts that missed the basket at all. Through repeated observations, it was found that the home crowd was more likely to chant initially when shooting from a distance and causing loss of possession. When the shot is further away from the basket, the home audience is more persistent [1]. Goldschmied N feels that the basic physics of basketball shooting seems to be a direct example of Newtonian mechanics, which can be easily tracked using numerical methods. He simulated the shooting training of basketball players as a Monte Carlo sequence to construct the best shooting strategy. The successful launch speed generated by Monte Carlo simulation is used as the criterion for optimizing the shooting strategy, which includes not only mechanical factors but also human factors [2]. Satoru T uses a motion capture system with 22 cameras to obtain the three-dimensional coordinates of the reflective markers attached to the subject and the basketball when performing a three-point shot [3]. Based on the background difference method, this article mainly analyzes the characteristics, algorithms and modeling methods of the background difference method, and then designs the basketball shot automatic identification system, and then conducts experimental exploration. According to the comparison with other methods, it is found that the background difference method has more advantages. Specifically, there are sensor signal acquisition, algorithm implementation, environment construction and system design.

2 Shot Detection Algorithm Based on Background Difference Method 2.1 Background Difference Method (1)

Basic idea

The basic idea of the background difference method is to match the current frame image with a known background model reference image, calculate the similarity measure between each point of the image and the point in the background model, and use Eq. 1 to classify the foreground/background.

Design of Basketball Shot Automatic Recognition System …

 Hobject (m, n) =

67

   1   Hcurr ent (m, n) − Hbackground (m,n) ≥ T hr eshold 0  Hcurr ent (m, n) − Hbackgr ound (m, n) ≺ T hr eshold

(1)

Hobject (m, n) = 1 means (m, n) point is the pre-exercise scenic spot. Hobject (m, n) = 0 means (m, n) point is the background point. If the difference between the gray value of the background reference point and the gray value of the point to be found exceeds a certain range, the changed point can be judged as the scenic spot before the image movement, otherwise it will be regarded as the image background point [4]. (2)

Algorithm flow

The advantages of the background difference method are precise position, fast calculation speed, and the ability to segment complete moving objects. However, this algorithm is more sensitive to changes in the background image and needs to update the background model in real time. Before detecting the moving target in the image, the current image must be preprocessed. The preprocessing first is to convert the image and suppress the noise; then use the initially captured image to establish a background reference model; and finally the background reference model is differentiated from the current frame image, and other subsequent processing [5]. (3)

Modeling method

Since the scene environment will change slightly with the passage of time, for the background difference method, the background model needs to be updated in real time, and a good background model can accurately detect the moving target from the image. Most of the current background modeling methods are based on the improvement and optimization of the original algorithm [6]. Common modeling methods: (1)

(2)

Single-Gaussian background modeling: Gaussian background modeling is mainly used in situations where the scene environment is more complicated, such as leaf shaking or camera shaking in the scene environment. Mean value method background modeling: If the video image sequence scene is not too complicated, the mean value method can be used for background modeling. The averaging method is essentially a statistical filtering idea. Its implementation method is to accumulate multiple frames of images captured by the camera over a period of time, and then divide the accumulated value by the number of captured frames, and finally get the average value. The average value obtained is used as the background reference model. Expressed by mathematical formula (2) as: ⎛    1⎝ + + Sx = X x

x−1

x−X +1

⎞ ⎠

(2)

68

(3)

F. Xie

Kernel density estimation method

The characteristic of this method is that it does not require prior knowledge of the relevant data distribution in the sample, and the unknown density function can be directly obtained from the sample [7]. If the pixel value of the same characteristic pixel in the ∂ frame image is recorded as y1 , y2 and so on, then the kernel function can be used to estimate the probability density distribution of the pixel value tx of the current pixel at time t: ∂(yi ) =

X 1

L r (yi − yc ) X c=1

(3)

The advantage of the kernel density estimation method is that it can adapt to different scenarios, and it does not need to assume the probability distribution form of the background features in the process of background modeling, and it does not need to estimate the parameters. This method can handle multi-modal background distribution such as light changes, camera shake, leaf shaking, shadows, etc., but it occupies a large amount of memory and is complicated to calculate, so it cannot meet the real-time requirements of video detection.

2.2 Shooting Characteristics (1) (2) (3) (4)

The basketball will spin after the shot or in the case of wiping the board; The direction of basketball shooting to the hoop can only be anywhere on the left, center, right and the shooting line; When the basketball is shot, the size of the basketball changes from large to small when viewed from above; The basketball will deform when it touches the rim or backboard (the size of the deformation depends on the degree of basketball inflation).

2.3 Sensor Signal Acquisition (1)

Signal acquisition equipment

Four nodes are used as data collection equipment, and one base station is used as a data gathering point. Among them, the node equipment realizes the functions of data collection and wireless transmission, and the base station realizes the functions of wireless data receiving and uploading [8]. The integrated three-axis gyroscope MPU3050 and three-axis accelerometer and magnetometer LSM303DLH are used to collect angular velocity, acceleration and magnetic field strength respectively; nRF24L01 wireless transceiver is used for wireless transmission. STM32F103 is used as the core of the node processor module to control the normal operation of the

Design of Basketball Shot Automatic Recognition System …

69

entire node; the power supply uses a 3.7 V lithium ion battery to provide energy for the sensor node. (2)

Signal acquisition scheme

Regarding the legs and arms as the key parts of the human body movement, the accuracy of the shooting posture can be inferred by observing the movement of the limbs [9]. Four sensor nodes are used, which are attached to human arms and legs respectively, to detect the movement of upper limbs and lower limbs in human movement. And through the wireless communication protocol, the collected data information is sent to the base station. The base station completes data collection and uploads it to the host computer through the serial port for further data analysis.

2.4 Algorithm Implementation Through the determination of the position of the camera and the characteristics of the basketball in the shooting process, combined with the above further research and study of the background difference method, the algorithm for detecting the position of the basketball in the system is realized. (1)

(2)

(3)

(4)

(5)

Image capture and preprocessing. During the detection process, you first need to have a live video, where you use the recorded TestOne video for detection. The image captured by the camera is susceptible to noise interference and pollution during the transmission, conversion and storage process, which will cause the useful information in the image to be unable to be extracted, so the image is denoised by the neighborhood average method after the image is captured and converted. Background modeling. When using the background difference method to detect a moving area, the background reference model must first be prepared. After the background reference model is determined, the image can be differentiated [10]. In this topic, the mean value method is used for background modeling. The principle of its realization is to obtain the Img image in the video continuously, and then add the images of the consecutive frames and average them to obtain the background reference model. Image difference. With the reference model, the images in the video can be differentiated, the moving area in the image can be obtained, and the background in the image can be separated. Binarization. After the image is differentiated, the image needs to be further processed. Make it more convenient and quicker to extract basketball features. Binarizing the image can quickly extract the characteristics of the basketball. Morphological method processing. In order to be able to restore the basketball to its original shape, fill the holes. According to the effect of image difference and binarization, it is necessary to post-process the binarized image with morphological closing operation.

70

(6)

F. Xie

Judgment method. The method of judging a goal is to compare and analyze the characteristic value of the basketball calculated above. There are three conditions for judging whether to score a goal in the system. If any one of the conditions is not met, it will be regarded as the basketball has not been shot, and the image will be captured again for detection until the end of the test time.

2.5 Environment Setup The construction of the basketball shooting automatic identification system environment mainly includes the construction of hardware and software environments. The construction of the hardware environment is the key to the system, and the main equipment includes industrial cameras and computers [11]. The main function of the camera is to provide and capture image frames for the automatic shooting recognition system. The computer is mainly to provide an operating platform for the automatic identification system of shots. In fixed-point shooting, basketball moves very fast, so high frame rate industrial cameras are used in the selection of cameras. Computer: CPU above 2.0 clock speed; 2G memory; hard disk above 20G; more than 64 M video memory. The construction of the software environment is the main development environment and the construction of the operating environment. The development environment is the environment required for the design and debugging of the automatic identification system for shooting. The operating environment refers to the environment required for the operation of the automatic identification system for shooting.

2.6 System Design The realization of this system is divided into six modules for design, and each module performs different functions. The purpose of this is to make the system structure clearer and facilitate future improvements. (1) (2)

(3) (4)

Image capture preprocessing module: first capture the image frame, and then perform format conversion and denoising processing on the captured image. Parameter configuration: The parameter configuration module has two functions. The first is to read the configuration file and read the saved three parameters from the configuration file; the second is to modify and save these three parameters [12]. Shot detection: It includes functions such as background modeling, image difference and image binarization. Post-processing module: The binary image output by the detection module is subjected to mathematical morphological operations, and the gaps and small holes of the basketball in the binary image are filled through the closed operation.

Design of Basketball Shot Automatic Recognition System …

(5) (6)

71

Judgment module: including detection area segmentation, basketball feature calculation and basketball goal judgment. Graphical interface: Provide human–computer interaction for the system, display test status and test results.

3 Design Experiment of Basketball Shooting Automatic Identification System Taking 8 high-level basketball players as the research objects, they have been engaged in basketball training for more than 8 years, and their technical movements are relatively solid. They usually have more applications of forward-turning shooting techniques. They are more familiar with turning around before catching the ball and shooting their field goal percentage. Place two SONY HCIE cameras horizontally and adjust the height of the camera body. The camera body height is kept at about 1.4 m, the vertical height of the frame is fixed at about 1.5 m, the shooting frequency is 25 frames, and the angle between the two cameras in the range of 90°–120°, the distance between the camera and the frame is about 10 m. Shooting steps: First fix the frame, control the frame position within the fixed-point shooting range of the two cameras, and mark the frame position, which is the position range of the athlete shooting experiment. Make sure that the 24 points of the frame are clearly photographed to facilitate the later anatomy of the human body landmark points. Then shoot in sequence according to the 6 frame positions of the mark number. The two cameras are controlled by two people respectively to ensure that each person’s action range is controlled within the camera’s range. If the situation jumps out of the camera’s shooting range, the action must be filmed again. In order to ensure the integrity of the action, to ensure the extraction and analysis of the later motion data. Use VideoStudio 9 to cut and categorize the videos of 8 athletes at various stages, and use the German SIMI° MOTION motion analysis software to analyze the motion data of 8 athletes. A total of 60 sets of data were analyzed and the motion data was analyzed. Using statistical software such as SPSS16, EXCEL2007 and WORD2007, the kinematics data was extracted and analyzed.

4 Result Analysis and Discussion 4.1 The Basic Situation of the Tested Basketball Players In order to make the experimental data representative, this article selected 8 basketball players with more than 8 years of experience to conduct a basic survey, and selected age, height, weight and basketball experience years to make Table 1, as follows:

72

F. Xie

Table 1 The basic situation of the tested basketball players Serial number

Age

Height (cm)

Weight (kg)

Years of exercise

1

23

192

93

9

2

25

189

90

11

3

26

196

92

13

4

22

188

87

10

5

26

184

86

8

6

27

187

88

15

7

24

195

92

12

8

24

189

91

10

It can be seen from the above table that basketball players are generally over 20 years old, and most of them are in the 23–26 age group. Their height is generally over 185 cm, the average weight is 90 kg, and the playing age is generally over ten years.

4.2 Analysis of System Results The test is carried out through the recorded shooting video Test One (320 * 240), which includes most of the possible conditions during the test. The test results are as follows in Table 2. According to the data analysis in Fig. 1, the detection effect of Test One video is not good. In the detection process, if it falls into the basket, it is judged as a goal, but the basketball bounces out of the basket again, which will cause the system to misjudge. This is mainly because basketball has entered the basket. Because the basketball is in a state of high-speed rotation, with the help of the net and the hoop as the fulcrum, the basketball is rotated from the basket and then out of the basket. When testing the recorded video of Test Two, it was found that there was a phenomenon of missed testing during the testing process. Through analysis, in the process of shooting, the ball is shot from the front and the shooting speed is extremely fast. Since it does not touch the basket, it directly moves through the net to the base of the basketball stand. The area captured by the camera is blocked by the fixed bracket of the basketball hoop, so the ball cannot be detected. Table 2 Statistics of the number of goals scored

Left

Right

Middle

Actual goal

6

9

7

Judging goal

7

8

8

Design of Basketball Shot Automatic Recognition System …

Shots

Left 10 9 8 7 6 5 4 3 2 1 0

Right

73

Middle

9 8 7

8

7

6

Actual Goal

Judging Goal

Times of Shoting Fig. 1 Statistics of the number of goals scored

4.3 Accuracy Evaluation Through continuous testing of 30 sets of data, the accuracy of the system is analyzed and evaluated. The data is shown in Fig. 2. The accuracy evaluation mainly refers to the accuracy of the system in the detection process, which mainly includes the evaluation of three aspects: the false detection rate, the missed detection rate and the accuracy rate in the test system. The accuracy of the system can reach 89%, which can basically meet the requirements. The main reasons for missed detection and false detection are basically the same as those in the two test videos of Test One and Test Two. To ensure that the system accuracy Fig. 2 System accuracy analysis chart

7% 4%

89%

False Detection Rate Missed Detection Rate Accuracy Rate

74

F. Xie

rate can reach 100%, the system’s judgment conditions are added and the judgment method is improved in the follow-up work.

5 Conclusion Basketball is a collective sport in which the ball is thrown into the opponent’s basket to score and prevents the opponent from getting the ball and scoring under certain rules. With the rapid development of computer vision technology, basketball shot detection technology has attracted much attention. There are two main recognition methods for automatic recognition systems, namely, the recognition technology based on image analysis and the recognition technology based on inertial sensors. They are the basis for subsequent target identification work. In basketball, it is mainly through the observation of coaches and personal experience to judge the outcome of the shot. This method is bound to be subjective. Therefore, accurate identification of fixed-point shots plays an active and important role in basketball games and training. Therefore, the design of an automatic recognition system based on the background difference method is very necessary. Of course, the whole design of this article still has certain defects, and the induction system needs to be improved.

References 1. Min JB (2016) Application of Monte Carlo simulations to improve basketball shooting strategy. J Korean Phys Soc 69(7):1139–1143 2. Goldschmied N, Vira D, Raphaeli M et al (2018) Air ball, air ball!: a study of collective crowd chanting in collegiate basketball. Group Dynamics Theory Res Practice 22(2):63–75 3. Satoru T, Takayuki S, Koichi K et al (2017) Differences in joint movements of skilled and unskilled players during basketball three-point shots. Taiikugaku Kenkyu 62(2):535–558 4. Hall M (2019) Basketball: from tip-off to slam dunk—the essential guide. Children’s Book Media Rev 40(3):156–156 5. Ding Y, Zhong S, Hua L (2020) Automatic recognition of student emotions based on deep neural network and its application in depression detection. J Med Imag Health Inform 10(11):2634– 2641 6. Shiva Kumar M et al (2016) Automatic recognition of prolongations and repetitions in stuttering speech using ANN. J Instrum Soc India Proc Nat Symp Instrum 46(3):122–126 7. Gudigar A, Chokkadi S, Raghavendra U (2016) A review on automatic detection and recognition of traffic sign. Multimedia Tools Appl 75(1):333–364 8. Jia X, Mai X, Cui Y et al (2020) Automatic polyp recognition in colonoscopy images using deep learning and two-stage pyramidal feature prediction. IEEE Trans Autom Sci Eng 99:1–15 9. Sun H, Chen S P, Xu LP (2018) Research on cloud computing modeling based on fusion difference method and self-adaptive threshold segmentation. Int J Pattern Recogn Artif Intell 32(6):1859010.1–1859010.15 10. Lueza B, Rotolo F, Bonastre J et al (2016) Bias and precision of methods for estimating the difference in restricted mean survival time from an individual patient data meta-analysis. BMC Med Res Methodol 16(1):1–14

Design of Basketball Shot Automatic Recognition System …

75

11. Wang JR (2018) Image processing technology based on sparse decomposition and background difference fusion method. Shenyang Gongye Daxue Xuebao/J Shenyang Univ Technol 40(4):436–440 12. Liu H, Hiraoka T, Hirayama T et al (2019) Saliency difference based objective evaluation method for a superimposed screen of the HUD with various background. IFAC-PapersOnLine 52(19):323–328

Application of BIM Technology in Project Construction Schedule Management Yanqiu Zhang

Abstract Construction schedule control is an important task in the actual construction management process of the project, and it plays a key role in the process of controlling the construction quality. As the organizational structure of the entire project, as well as the process of construction and implementation have become more complex, the actual investment amount of the project has also become greater, resulting in a huge waste of investment in the national economy and society. One of the reasons is due to the project. The management efficiency is low, so the progress of the project cannot be well controlled. Therefore, we are required to adopt more efficient technical means to improve the effectiveness of program management. At present, BIM is to achieve the goal of project control and management, and to achieve the most effective project, but it is still rarely used widely in its construction schedule, and it mainly focuses on practical analysis. In fact, BIM is relatively rarely used in engineering. This article explores and studies the practical application of BIM information technology in construction schedule control and management of construction projects, and analyzes and summarizes some of the problems existing in China’s traditional construction schedule control and management on the basis of summarizing relevant documents. Then it analyzes some of the advantages and disadvantages introduced by the BIM information technology used in the construction schedule control and management of China’s construction projects, and then builds the schedule control platform of China’s BIM information technology in the construction of construction projects based on the above foundation. Finally, the number of people on a platform built by the platform was tested. The test results show that although the platform still has shortcomings, overall, the management system accounts for more than 32% of people with good engineering performance evaluation, generally 30% the above. Keywords BIM technology · Engineering construction · Schedule management · Management platform Y. Zhang (B) School of Architectural Engineering, Xuzhou College of Industrial Technology, Xuzhou 221140, Jiangsu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_8

77

78

Y. Zhang

1 Introductions The era of large-scale information has been fully developed, and information is still a key factor affecting the global economy [1, 2]. As one of the pillars of the national economy in recent years, BIM technology, as key information, will become the main subject of BIM calculation [3, 4]. China’s IT industry has two aspects, one is IT technology, and the other is information management [5, 6]. BIM technology uses its own mechanical information to aggregate CAD/CAE and other efficient methods, and eventually becomes the core technology used in the construction industry. Therefore, they are all priority issues for the development of construction industry informatization. The application of BIM technology to the construction industry can be widely optimized building production efficiency [7, 8]. In the application research of domestic BIM technology in the progress management of construction engineering construction, some researchers have conducted a more in-depth analysis of the actual application development status of BIM technology, which is in the schedule and control of domestic construction projects. It can be said to be a very important new stage in the study. The research has explored the preparation of schedule and the application of schedule control from a deeper level. The case represented by some large-scale airport engineering projects is promoted by the preparation of the schedule of BIM carry out architectural design [9]. At the same time, when analyzing the progress management of construction projects, relevant researchers have conducted in-depth research on its current advantages, deficiencies and shortcomings, and found the real reasons for these problems. At the same time, they have been compared with previous buildings. Comparing project schedule management interactions is an extremely important difference [10]. Some researchers have made new explanations for the development prospects of related technologies of BIM, framed the theory of schedule management, framed the theory and organized the completeness of the process, which is the new development direction [11]. And some researchers believe that although the application of BIM can improve the efficiency of operation and maintenance management from the perspective of visualization and query of the information database, the effective conversion of the information model to the operation and maintenance process and the continuous use of the information model will change the current situation information exchange process [12]. This article studies the application of BIM technology in project construction schedule management, summarizes some shortcomings of traditional project schedule management on the basis of literature research methods, and then analyzes several advantages of using BIM technology in project management schedules. Build a platform based on BIM technology for project management progress, and finally check the built platform to find out whether the built platform meets the actual requirements.

Application of BIM Technology in Project Construction …

79

2 Research on BIM Technology and Project Construction Schedule Management 2.1 Problems in Project Construction Schedule Management (1)

(2)

(3)

(4)

There are too many factors affecting project management. The construction process of the project is very complex, including environmental factors (topography, landforms and geographical location, etc.), resource factors (materials and equipment, construction equipment, labor, etc.), human factors (corporate quality, moral awareness and management skills, etc.), risk factors (economic, politics, natural disasters, etc.) and construction technology will affect the progress of the entire project. Under the intervention of human and physical factors, if there is no plan in the preparation process, the entire management system will have no rhythm, and the management of the program will get out of control. It is difficult to manage the collaboration between employees and between units and units. Since each unit must be integrated into the process of the project, there is a certain degree of difficulty in the entire organization process. Each construction team has its own characteristics and requires certain operations and cooperation between the teams to achieve effective construction and save the time of the project itself. Each unit must not only complete its own team management, but also coordinate with other parties. Insufficient coordination will delay the progress of the project. Due to the complexity of the project, different individuals and employees may not be able to cooperate smoothly. For example, due to external reasons, the capital supply of material suppliers may not be completed on time; the use of excavators is unevenly distributed in all aspects, which may lead to conflicts; interference, etc., all of which will affect the progress of the project. It is difficult to match resource cost control and project schedule. Throughout the construction phase, project progress, project quality, and project cost are opposing units, forming a triangle. Any change in one corner will change the other two points. For example, if the real situation is analyzed and the project progress is accelerated, the quality of the project may not meet the standard, and it will increase the cost of manpower and material resources. Therefore, the balance between the three is related to the smooth realization of the project goals. The schedule lacks flexibility. Currently, most programmers use Gantt charts and graphs, and use project management software such as P6 and Project for scheduling. Once approved by the relevant parties, they will be used directly in the control program. However, there are many factors that affect the construction, and the construction period needs to be adjusted flexibly. The workload of customization and optimization is very large, difficult to adapt, and easy to cause design disconnection.

80

Y. Zhang

2.2 Advantages of BIM Technology Application in Project Construction Schedule Management (1)

(2)

The construction information and construction personnel management information of the entire project can be effectively communicated and communicated with each other. At the same time, at different stages of the project, all participants, such as component and material providers, can use the BIM series to modify your team information in the relevant application software to make the project process more flexible and allow project participants to better coordinate the construction and change the construction schedule, construction methods and communication methods of the entire project. The core functions of the construction project schedule control management system, special software such as p6 and project can bring a lot of support and convenience to project managers. One of the most critical aspects of BIM is to cooperate with other software. A single software cannot realize the comprehensive operation of BIM technology functions. The cross-action between multiple BIM technology-related software ensures the realization of multi-function based on BIM.

3 Construction of Construction Schedule Management Platform Based on BIM Technology 3.1 Build a BIM 3D Model (1)

Choice of method

Through research, this paper combines the actual situation and situation of the project, and examines in detail various influencing factors such as construction engineering design cost and construction cost. In the process of project construction, a BIM model of the project will be created based on the BIM model and two-dimensional cad drawings. (2)

Modeling

Revit models are realized by combining different architectural elements, such as beams, columns, doors, windows, floors, ceilings, etc. When using BIM for modeling, related elements can be roughly divided into: model elements, projection elements, and annotation elements, which are used as the basis for creating a 3D model of a construction project. When BIM technology is used in architectural model design, it is no longer the traditional point, line, surface design, but the use of design components such as walls, columns, slabs, and stairs. It is no longer a common-sense design, but a design Enter the parameters in the, carry out the parametric design of the entire building, and adjust the parameters to reflect the different types of the same type

Application of BIM Technology in Project Construction …

81

3D Building Information Model

Model primitives Main entity

View primitive Component element

Annotate primitives Datum primitive

Annotation primitive

Fig. 1 Architecture diagram of 3D building information model

of components. The architecture of the 3D building information model is shown in Fig. 1.

3.2 Create a Construction Schedule Setting up a construction plan is an important preparation for managing BIM-based projects. Project management software the project integrates Gantt chart, network design and other functions. The 3D building information model created by Revit software contains all building project information. Determining the construction schedule should be based on the information of the 3D BIM model, and then use WBS technology to decompose the work structure of the construction project and create it with software such as Project.

3.3 The Realization of BIM Four-Dimensional Management Platform In actual projects, a three-dimensional building information model is generally established for the project through the modeling software Revit. On this basis, it is combined with the construction schedule and resources to create a BIM-based fourdimensional dynamic management system to realize the project management of the project in the construction phase.

3.4 Project Construction Schedule Management (1)

Construction site management: Using BIM technology with Navisworks simulation software, laser research and information surveying and mapping,

82

(2)

(3)

(4)

(5)

Y. Zhang

RFID and other communication technologies, real-time monitoring of the construction site in a virtual environment. Construction schedule simulation: Associate the 3D BIM model with the construction schedule, and create a visual 4D BIM model in Navisworks, which can visually and intuitively build the construction project schedule. Construction organization simulation: Based on the input time dimension of the 3D building information model, it helps manage the construction progress of the project, and uses the 4D building information model to control each construction process and optimize the construction plan of the construction project. Three-dimensional pipeline comprehensive construction: After the collision test is completed, the construction drawings can be directly derived from the integrated 3DMEP model, and design changes can be avoided through benchmark tests of different sizes. Digital component processing: BIM technology integrates traditional CAD design information into the 3D BIM model, and the building information provided can directly control component production. Dynamically monitor the supply, transportation and storage of materials, eliminate information errors between components at different stages of project implementation, and ensure project quality.

4 Detection of Construction Progress Management Platform Based on BIM Technology 4.1 Experimental Design The subjects selected for trial use are engineers who randomly select a project under construction in the city. There are 82 people in total. After the trial use by the engineers, a questionnaire will be issued for the engineers to fill out. A total of 82 copies were distributed and 82 copies were recovered, of which 80 were valid questionnaires.

4.2 Data Processing (1)

When performing correlation analysis on the collected data, the data must be classified and sorted. This will not only increase the utilization rate of the data, but also promote cross-data analysis. Therefore, the main consideration is the completeness and accuracy of the data. First of all, about data integrity. When the questionnaire is delivered to the sample subject for completion and collection, some sample items are arbitrarily completed, or their selection cannot

Application of BIM Technology in Project Construction …

(2)

83

be completed, which will cause some data sorting problems, but because the retrieved data accounts for the majority, so deleting the lost data means deleting the lost data. Secondly, the precision and accuracy of the data. When conducting an audit, the main consideration is to check whether these data are inconsistent with other choices, or the principle that conflicts with them should be selectively removed but as much as possible should be retained. The main meaning of a correlation relationship in the objective correlation analysis method is to generally refer to a certain relationship between various objective phenomena, but they are not strictly corresponding to each other in quantity. There are two main forms of determining the relevant properties of objective phenomena here: qualitative analysis and quantitative analysis. The main purpose of qualitative analysis is to rely on the scientific theoretical knowledge and practical experience of the researcher to accurately judge whether there are correlations between various objective phenomena. Or what kind of factor, the subjectivity of this analysis method is relatively strong. Among them, the commonly used calculation formula is expressed as:  (x − x¯ )(y − y¯ )/n S∧ 2xy ==   Sx Sy (x − x¯ )∧ 2/n (y − y¯ )∧ /n    n xy − x y r=    ∧    ∧    ∧ n x∧ 2 − x¯ 2 n y 2− y¯ 2 r=

(1) (2)

4.3 Result Analysis Through the questionnaire survey, the project construction schedule management platform constructed in this paper is tested, and the rationality of the project construction schedule management platform is tested. The survey results are shown in Table 1. Table 1 Inspection of project construction schedule management platform Experimental interface effects (%)

System response time (%)

Facilitate project management (%)

Content design (%)

Good

46

34

48

32

General

32

45

30

47

Not good

10

9

13

12

Do not know

12

12

9

9

84

Y. Zhang 60%

percentage

50%

46%

40%

48%

34%

30%

45%

32%

32%

47%

30%

20% 10% 9%

10%

13%12%

12%12%

9% 9%

0% Good

General

Not good

Do not know

Evaluation Experimental interface effects.

System response time

Facilitate project management

Content design

Fig. 2 Inspection of project construction schedule management platform

It can be seen from Fig. 2 that although the platform still has its shortcomings, in general, the number of people with better evaluations of the performance of management projects accounted for more than 32%, and generally more than 30%.

5 Conclusions With the increase of high-rise buildings in modern construction engineering, the engineering structure becomes more and more complex, and traditional construction schedule management cannot meet the needs of modern engineering. The development of computer technology has also significantly improved manufacturing information technology. As an application technology combining componentization, integration, and visualization, BIM meets the requirements of the information age and smart city construction. From this, it can be seen that BIM technology has great application prospects in construction progress management.

References 1. Elbeltagi E, Ammar M, Sanad H et al (2016) Overall multiobjective optimization of construction projects scheduling using particle swarm. Eng Constr Archit Manag 23(3):265–282 2. Yeom DJ, Seo HM, Kim YJ et al (2018) Development of an approximate construction duration prediction model during the project planning phase for general office buildings. J Civ Eng Manag 24(3–5):238–253 3. Jun I, Jin ZX, Han S et al (2016) Progress Measurement model based on documents for pre-construction phase of design build project. J Architect Inst Korea Plann Design 32(5):63–71

Application of BIM Technology in Project Construction …

85

4. Ansari R (2019) Dynamic simulation model for project change-management policies: engineering project case. J Construct Eng Manage 145(7):05019008.1–05019008.22 5. Hoc TD, Long LD (2018) Project scheduling with time, cost and risk trade-off using adaptive multiple objective differential evolution. Eng Constr Archit Manag 25(5):623–638 6. Vu H, Cu V, Min L et al (2017) Risk analysis of schedule delays in international highway projects in Vietnam using a structural equation model. Eng Constr Archit Manag 24(6):1018–1039 7. Melzner J, Hanff J (2017) Automatic generation of 4D-schedules for reliable construction management. Fortschritt Berichte Vdi Zeitschriften 223:112–124 8. Bakry I, Moselhi O, Zayed T (2016) Optimized scheduling and buffering of repetitive construction projects under uncertainty. Build Eng 23(6):782–800 9. Wang Z, Azar ER (2019) BIM-based draft schedule generation in reinforced concrete-framed buildings. Constr Innov 19(2):280–294 10. Akinade OO, Oyedele LO, Ajayi SO et al (2018) Designing out construction waste using BIM technology: stakeholders’ expectations for industry deployment. J Cleaner Prod 180:375–385 11. Guo SJ, Wei T (2016) Cost-effective energy saving measures based on BIM technology: case study at National Taiwan University. Energy Build 2016 127:433–441 12. Zeng S, Li C, Zhang X (2018) Application of BIM technology in the construction management of a metro station. Mod Tunnel Technol 55(3):18–27

Data Security Technology and Scheme Design of Cloud Storage Jingjing Liang and Jie Bai

Abstract With the development of cloud storage technology, more and more users choose to store data in the cloud. Cloud storage technology saves users’ local storage space, but users lose absolute control over data, which also leads to some cloud storage data security-related issues. Based on the cloud storage application architecture, this paper provides the complete solution for cloud storage data in three ways: first, access control, prevents the intrusion of illegal users or the damage caused by the careless operation of legitimate users; second, integrity audit, ensures that the data is truly and completely stored in the cloud; third, data encryption, protects the data in network transmission and cloud storage. In the actual application process, the three technologies need to be combined to achieve the ideal data security effect. Keywords Cloud storage · Data security · Access control · Integrity audit · Data encryption

1 Introduction With the advancement of science and technology, cloud computing technology was born and achieved rapid development, which has penetrated into many aspects of public production and life, and has attracted close attention from the academic community [1]. Cloud computing is the innovative development of traditional computing methods. The grid method is used to divide huge computing processing programs into small programs for computing. It has the same functions as supercomputers and is convenient and fast for computing [2]. Cloud storage is the kind of network storage technology that emerges with cloud computing, allowing multiple storage devices to coordinately provide services. Cloud storage solves the problem J. Liang (B) Department of Information Technology, Liaoning Institute of Science and Engineering, Jinzhou, Liaoning, China e-mail: [email protected] J. Bai Detachment of Network Security, Jinzhou City Public Security Bureau, Jinzhou, Liaoning, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_9

87

88

J. Liang and J. Bai

that data owners do not have enough storage space, and can meet the need to call data at any time. More and more individuals or companies store data in the cloud, which significantly reduces the capital investment for purchasing storage equipment. Because cloud storage users can purchase storage space according to actual needs, there is no need to set up dedicated managers to be responsible for the management and maintenance of storage devices, reducing maintenance costs. Companies only need to focus on business needs and improve work efficiency. With the popularity of cloud storage services, data security issues have become increasingly serious. While obtaining convenience and speed, it also undertakes certain risks. Because data is shared with the third party, it loses sole ownership and absolute control, which may not only give individuals, which may also cause serious consequences such as leaking state secrets. Cloud storage data security mainly comes from five aspects [3]: first, data leakage, data is maliciously eavesdropped during transmission between users and cloud storage, resulting in data leakage; second, malicious attacks, malicious users gain access to confidential data permissions cause data leakage; third, backup and storage security, the data backed up by the cloud service provider is usually not encrypted, which leads to security threats; fourth, sharing technology, the cloud service provider provides services in a flexible mode, which is not powerful multi-tenant architecture with isolation performance; fifth, service hijacking. When the attacker hijacks a cloud user’s account, he can not only obtain the cloud user’s data, but may also use the hijacked account to attack other users in the cloud platform. The security of cloud storage data has become the important factor restricting the development of cloud storage, and practical solutions must be studied to promote the further development of cloud storage.

2 Cloud Storage Application Architecture Cloud storage uses cluster applications, grid technology or distributed file systems and other functions. A large number of different types of storage devices in the network are assembled through application software to work together to provide a system for external data storage and business access functions to promise the data security. The cloud storage application architecture is shown in Fig. 1. As can be seen from Fig. 1, the cloud storage application architecture consists of cloud storage customers and cloud storage services. Cloud storage customers include individual users and corporate users, and corporate users are divided into ordinary users and users who have built the private cloud. Individual users access cloud storage data through client software. Enterprise users have their own application servers and backup servers, and can access cloud storage data through enterprise cloud storage clients or personal cloud storage clients. Enterprise users who have built the private cloud can access both private cloud storage data and public cloud storage data. The cloud storage service is composed of several data centers, and the data centers are interconnected. The cross-data disaster recovery center ensures that any hardware failure of any storage device or the failure of the physical server of the

Data Security Technology and Scheme Design … Cloud storage customers Personal user

89 Cloud storage service

Cloud storage client software

Internet Data Center (IDC-2)

A enterprise Application server

Backup server

Enterprise cloud storage client

Personal cloud storage client

B enterprise (Build a private cloud Application server Personal cloud storage client

Backup server

Enterprise cloud storage client

Internet Data Center (IDC-0)

Internet Data Center (IDC-1) Cross data disaster recovery center

Internet Data Center (IDC-3)

Fig. 1 Cloud storage application architecture

virtual platform will not cause business interruption and ensure business continuously operation capability [4]. The structure of the cloud storage data center is shown in Fig. 2. It can be seen from Fig. 2 that the cloud storage data center is composed of four parts: first, cloud storage server, which is responsible for directly providing cloud storage services to users and provides a wealth of network access methods; second, cloud storage data nodes, store the entire series of products based on the professional controller architecture, and use network port aggregation and hard disk load balancing technologies to provide high-speed data storage services; third, crossIDC data management, responsible for data transfer services such as data migration and real-time data synchronization among multiple data centers; fourth, cloud

Cloud storage server

Cross IDC data management

Cloud storage data node

Cloud storage control node

Fig. 2 Composition of cloud storage data center

90

J. Liang and J. Bai Access

Access Access control implementation module

Subject Allow or deny

Request decision

Object

Return decision

Access control decision module

Fig. 3 Access control model

storage control node, the device that performs necessary control over memory access according to certain time series.

3 Access Control Access control is to allow or restrict access capabilities through a certain way to control access to key resources and prevent the intrusion of illegal users or the damage caused by the careless operation of legitimate users. Whether it is a cloud provider or an enterprise user, access control is the primary consideration. In the provider storage environment, isolation and segmentation technologies should be fully utilized, including security partitions, structural identity authentication of switches and hosts, etc. [5]. The access control model is shown in Fig. 3. It can be seen from Fig. 3 that the access control model consists of the subject, the object, the access control implementation module, and the access control decisionmaking module. The subject is the active initiator of access and proposes to access or use specific resources in the target system [6]; the object is the resource to be accessed, and the subject’s access to the object needs to be controlled; the access control implementation module is used to coordinate the subject’s access to the object; access control decision-making module is to formulate a set of access control rules, must ensure that only legitimate users can access and use resources within the scope of authorization.

4 Integrity Audit Due to the cloud server that provides storage services is not completely credible, users have reason to doubt the integrity of data in cloud storage. Cloud servers are affected by software, hardware, or human factors, and it is inevitable that there will be errors in modifying or deleting user data. Users need to detect cloud data at any

Data Security Technology and Scheme Design …

91

Third party auditor Audit information

Audit authority

Audit certificate

audit report

Cloud user

Data flow

Cloud storage server

Safety information flow Fig. 4 Integrity audit model

time and randomly to ensure that the data is truly and completely stored in the cloud [7]. Therefore, it is very important to design the solution that supports cloud data integrity auditing. The integrity audit model is shown in Fig. 4 [8]. Considering the scale of user data and the limitations of user computing resources, in many cases the data stored in the cloud is not suitable for users to audit by themselves. Therefore, a trusted third-party auditor is introduced to audit the integrity of cloud data instead of users. The third-party auditor sends challenge information to the cloud server, and returns proof information from the cloud server.

5 Data Encryption Data encryption refers to the process of transforming plaintext into ciphertext through encryption algorithms and encryption keys, and the data is transmitted through encryption to ensure data security. The mainstream cloud data security sharing schemes at home and abroad are mainly based on attribute-based encryption mechanisms, identity-based encryption mechanisms, key negotiation and broadcast encryption mechanisms, and also based on homomorphic encryption and hybrid encryption. In view of the security of cloud storage data, the most direct and effective method is to encrypt user privacy data and upload it to the cloud. Cloud service providers can only see the ciphertext, and data control is completely in the hands of the user. Since the cloud server cannot parse the format content of encrypted files, users will not be able to preview and edit PDF and WORD files stored in the cloud. Because the cloud server cannot parse the format content of encrypted files, users will not be

92

J. Liang and J. Bai Encryption key

Sender

plain text

Decryption key

Secure channel Encryption

Secure channel Cipher text unsafe channel

Decryption

plain text

Receiver

Decipherer

Fig. 5 Data encryption and decryption process

able to preview and edit the format content stored in the cloud, like types of files such as PDF and WORD [9]. The general data encryption and resolution process is shown in Fig. 5.

6 Conclusion The cloud storage capacity can be dynamically expanded, and the data backup and disaster recovery work is completely completed by the cloud storage service provider. Users do not have to worry about insufficient cloud storage space. Cloud storage services can quickly adjust storage space according to users’ storage needs. Cloud storage also brings challenges to user data security, including confidentiality, availability, and integrity. Availability generally means that cloud storage service providers provide security guarantees through data backup and data disaster recovery technologies. This paper provides security solutions for confidentiality and integrity through technologies such as access control, integrity auditing, data encryption, and promotes the development and application of cloud storage technology.

References 1. Sun HX (2019) Research on data security in cloud storage. Inform Record Mater 20(2):97–98 2. Yan XX (2018) Research on cloud storage data security in big data environment. China New Telecommun 20(6):121–122 3. Zhang H (2019) Research and application of data security technology for cloud storage. Master’s thesis of University of Electronic Science and Technology 4. Wan PX (2016) Exploration on the construction of double active data disaster recovery center in hospital. J Fujian Computer 32(3), 102–103 5. yc’s Blog, Practical experience in cloud storage access control measures. http://blog.chinaunix. net/uid-29192009-id-4437185.html?utm_source=jiancool, 21 April 2021 6. Chen S, Liu XF, Zhang CM, Wang JJ (2017) Design of Access control scheme for electric system based on cloud storage. Computer Measure Control 25(10):240–243 7. Shao BL, Li XJ, Bian GQ, Zhao Y (2019) A survey on data integrity auditing technology in cloud storage. Netinfo Secur 19(6):28–36

Data Security Technology and Scheme Design …

93

8. Zhao HC (2019) Research on data integrity auditing schemes in technology in cloud storage. Master’s thesis, University of Science and Technology, Beijing 9. Han PY, Liu CY, Wang JH et al (2020) Research on data encryption system and technology for cloud storage. J Commun 41(8):55–65

Design of Internet Opinion Analysis System for Emergencies in Big Data Environment Based on Hadoop Platform Yongchang Ren, Lihua Han, and Jun Li

Abstract Public opinion analysis under the big data environment pays more attention to the collection, storage and cleaning of Internet data, and combines text mining technology to obtain opinion information from a large amount of low-value data. Based on the Hadoop platform, this paper develops the Internet opinion analysis system for emergencies, timely predicts and intervenes in the development trend of Internet opinion, effectively responds to negative opinions, and improves the level of social governance. First, the Hadoop ecosystem architecture consisting of “lowlevel components, data storage, distributed computing, data analysis and processing, and result output” was designed; then, the JDBC database access and optimization technology was designed; finally, it was designed by data system functions such as “data collection, data storage, data processing, data analysis, and data display”. Keywords Hadoop platform · Big data environment · Emergency · Internet opinion analysis · System design

1 Introduction Emergencies refer to events that may cause or have caused loss of life and property, the natural environment, or major harm to social public safety. China divides public emergencies into natural disasters, accident disasters, public health incidents and social security incidents [1]. Public emergencies directly affect people’s vital interests and are likely to cause widespread public concern. This requires the government to be transparent when handling emergencies. Some social emergencies are basically malicious propaganda carried out by a small number of people, so that the people Y. Ren College of Information Science and Technology, Bohai University, Jinzhou, Liaoning, China L. Han Land Satellite Remote Sensing Application Center, Ministry of Natural Resources, Beijing, China J. Li (B) School of Physical Education, Bohai University, Jinzhou, Liaoning, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_10

95

96

Y. Ren et al.

who do not know the truth can participate. Emergencies usually have great influence. The rationality of the results of the incident and the direction of public opinion will determine whether the impact will continue. Online public opinion is expressed and disseminated through the Internet, the sum of the various emotions, attitudes and opinions held by the public on various public affairs that are closely related to their own interests or their attention [2]. It has the characteristics of freedom and controllability, interaction and immediacy, richness and diversity, concealment and explicitness, emotionality and irrationality, individualization and group polarization. As the core subject of online public opinion governance, the government faces severe challenges in governance capabilities. Develop the Internet opinion analysis system for emergencies, predict and intervene in the development trend of Internet opinion timely [3], effectively respond to negative public opinions, improve the level of social governance, and provide the scientific basis for leadership decision-making.

2 Hadoop Ecosystem Architecture The Hadoop ecosystem is a variety of application frameworks based on Hadoop, which are compatible with each other and form an independent application system. The Hadoop ecosystem architecture is shown in Fig. 1. Hadoop is a software platform for analyzing and processing big data. It is developed by the Apache Foundation. Users can independently develop and run programs based on this data platform. It has low cost of use, high scalability, high data exchange storage and exchange efficiency, advantages such as strong reliability [4]. The Hadoop distributed file system provides the storage function of large data sets, and can carry out streaming data access, which has significantly improved the throughput. The Hadoop cluster divides the host from three different perspectives: host service, file system, and Map Reduce. The distributed file system is mainly responsible for the distributed storage of data, and can realize a series of operations such as the creation and deletion of files or folders. HDFS has many advantages [5], by adding machines to expand the storage capacity of the system, suitable for large data distributed computing, suitable for storage and processing of unstructured data. Hive is a tool for data analysis and processing. It is used for data extraction, transformation and loading. It is a mechanism that can store, query and analyze large-scale data stored in Hadoop. It can add data to HDFS and perform statistical analysis operating. In Fig. 1, the composition of data collection tools and general processing tools is shown in Fig. 2. The data collection tools are mainly composed of “Sqoop, Flume and Kafka”. Sqoop is a tool used to transfer data between Hadoop and relational databases; Flume is a highly available, highly reliable, distributed massive log collection, aggregation and transmission system provided by Cloudera; Kafka is a high-throughput system. A large number of distributed publish and subscribe messaging systems can process all the action flow data of consumers in the website.

Design of Internet Opinion Analysis System for Emergencies …

Fig. 1 Hadoop ecosystem architecture

Fig. 2 Tools of data collection and common processing

97

98

Y. Ren et al.

General processing tools are mainly composed of “Zookeeper, Oozie and Ambari”. Zookeeper provides coordination services to support storage, coordination, maintenance and sharing; Oozie is an open source workflow scheduling engine for the Hadoop platform; Ambari is a web-based tool that supports the supply, management and monitoring of Hadoop clusters.

3 JDBC Database Access In order to make Java programs not dependent on specific databases, Sun provides JDBC (Java Data Base Connectivity) specifically for operating databases, provides the standard application program interface, and provides unified access to a variety of relational databases. Through the JDBC API, users can use the same Java syntax to access various SQL databases, provide unified access to a variety of relational databases, and implement operations such as adding, deleting, modifying and querying data in the database [6]. The JDBC data access process is shown in Fig. 3. JDBC itself does not have the caching mechanism. As the scale of Web applications becomes larger and larger, the number of user requests increases, and the efficiency of data access is significantly reduced. The caching mechanism is introduced to use the advantage of memory read and write speed to cache frequently accessed data on the server. When the same data is requested next time, it is directly obtained from the server memory, which shortens the data request path, reduces the amount of database access, and improves Improve the efficiency of data access. Based on the hit rate theory, modify the executeQuery method of the Statement interface in JDBC, analyze the SQL statements of the application, and continuously count, filter and screen the accessed data, and forward the result set that meets the conditions to the server memory to make permanent hot data not be easily evicted from the cache, so as to improve the hit rate of cached data and improve the efficiency of reading data [7]. Fig. 3 Process of JDBC database access

Java application program

JDBC API ((Application Programming Interface))

JDBC Driver Manager

JDBC Driver

JDBC Driver

Teradata

Hive

Design of Internet Opinion Analysis System for Emergencies …

99

4 System Functional Design System function design is the core work of software development. With reference to related literature [8–10], the design results of the Internet opinion analysis system for emergencies in the big data environment are shown in Fig. 4. (1)

(2)

(3)

Data collection. Use web crawler technology to collect text, pictures, audio, and video from Weibo, forums, blogs, post bars, news sites, and search engines, and capture public opinion information with a high degree of dissemination on the regular basis. Data storage. The collected data is divided into metadata, standard base data, policy opinion data, industry knowledge data, other data, and stored on the medium. It can be stored in the local database or distributed data storage. Data processing. Process the collected raw data to prepare for data analysis, including automatic word segmentation based on the results of semantic analysis, as well as automatic summarization, automatic classification and

Fig. 4 System functional design

100

(4)

(5)

Y. Ren et al.

clustering, pattern recognition, keyword comparison, positive and negative character prediction, etc. Data analysis. Improve existing data mining and machine learning technologies, break through big data fusion technologies such as object-based data connection and similarity connection, and break through field-oriented big data mining technologies such as Internet behavior analysis and sentiment semantic analysis [11]. Data display. Show users the information data collected by the system, the results of data analysis and other content of the system, and provide users with operation pages to realize interaction with the system. When the front-end page is loaded, the system enables the verification mechanism to improve security.

5 Conclusion Under the big data environment, Internet opinion has undergone tremendous changes in terms of data volume, complexity and generation speed. The rapid analysis of massive Internet data, the establishment of public opinion monitoring and guidance mechanisms, and the provision of decision support for managers have become the research hotspot and the difficult issue. Different from traditional social public opinion analysis, public opinion analysis under the big data environment pays more attention to the collection, storage and cleaning of a large amount of Internet data, and combines text mining technology to obtain public opinion information from a large amount of low-value-density data. The design and development of this system is based on the Hadoop big data processing platform, which builds the computer cluster by connecting a large number of computers. The storage is to save the data on multiple nodes; the HDFS distributed file system is used to improve the throughput of application data access, and it is paralleled by MapReduce, and the programming model realizes parallel computing; processing nodes can be added as required, capable of processing PB-level data, so it can be widely used in real environments. Acknowledgements This work is supported by 2018 annual natural science foundation in Liaoning province (20180550541): Research on Analysis Technology and System for Internet Public Opinion of Emergency in Big Data Environment.

References 1. Shang XY (2021) Research on the countermeasures of local government to deal with the network public opinion of public emergencies. Inner Mongolia Sci Technol Econ 25(8):14–16 2. Baidu W (2021) On how to deal with network public opinion in emergency. https://wenku. baidu.com/view/bb17b36301f69e3143329427.html, 26 May 2021 3. X. G. Li, “Study and guide network public opinion in the era of big data,” Network Security Technology & Application, vol. 16, no. 12, pp. 81+83, 2016.

Design of Internet Opinion Analysis System for Emergencies …

101

4. Bai R (2019) Design of network public opinion monitoring system based on cloud computing and Hadoop. Electron Design Eng 27(16):141–144 5. Y. Chen, “Research on Medical Insurance Data Mining Based on Hadoop,” Master’s thesis of Shenyang University of Technology, 2020. 6. Han B, Li JJ, Fang YL (2018) Research on data management and query optimization based on JDBC. Computer Technol Develop 28(9):176–180 7. Han B, Jiang YM, Fang YL (2017) Data access optimization technology based on JDBC. Computer Eng Design 38(8):1991–1996+2031 8. Hou SM (2020) Design and implementation of enterprise-oriented network public opinion analysis system. Master’s Dissertation of Nanjing University 9. Zeng DW (2020) Research and application of Internet public opinion system based on topical crawler. Master’s Dissertation of Chongqing University of Technology 10. Yin PP (2013) Network public opinion analysis system in the era of big data. Radio TV Broadcast Eng 40(7):44–47 11. Douban (2021) Big data analysis and mining technology. https://www.douban.com/note/724 554380/, 26 May 2021

Evaluation Model of Intelligent Anti-electric Theft Management Linan Hu, Chang Su, Chong Tian, and Xianwei Meng

Abstract Theft of electric power has caused great economic losses to the state and power supply enterprises, and also brought a series of social problems, which need to be solved urgently. This research mainly discusses the evaluation model of intelligent anti-electric theft management. Based on the artificial neural network, the suspicion model of electric theft is established to monitor the user’s power consumption behavior, and the abnormal alarm is immediately sent out once there is abnormal power consumption. The evaluation standard of anti-electric theft management in power supply enterprises is selected, and the neural network is used to accurately evaluate and predict the electric theft situation. The analysis and experimental results show that this study is helpful to improve the efficiency of investigating and dealing with power theft by users. Keywords Electricity larceny prevention · Evaluation model · The neural network

1 Introduction As one of the important secondary energy sources, electric energy is indispensable to ensure the rapid and stable development of economy and people’s normal life [1, 2]. With the rapid development of economy, various forms of electricity consumption are increasing, especially industrial and commercial electricity consumption. However, some enterprises or individuals take unfair means to steal electric energy driven by interests. Stealing electric power is a kind of illegal behavior, which will not only cause great economic losses to the country and enterprises, but also bring a series of hidden safety problems, such as personal casualties caused by stealing electric power [3, 4]. Studies in recent years have found that stealing electricity is becoming more and more serious. Through the understanding and analysis of all kinds of electric L. Hu · C. Su · C. Tian (B) · X. Meng School of Electrical and Information Engineering, Heilongjiang University of Technology, Jixi 158100, Heilongjiang, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_11

103

104

L. Hu et al.

stealthy behaviors, it is found that the electric stealthy users use more and more electric stealthy methods, such as reverse connection, forging lead seal, using strong electromagnetic interference, changing polarity and high frequency interference, etc. At the same time, the technology and concealment of electric stealing means are also increasing, and even some electric stealing methods are developing toward the direction of high-tech. The act of stealing power not only brings great loss to the state and power enterprises, but also breaks the commercial balance of power supply market seriously. How to effectively carry out anti-electric theft work is imminent, especially to some illegal enterprises to monitor electricity consumption. Traditional anti-electric theft means, such as squatting and obtaining evidence from potential suspected users of electric theft, are not only of poor timeliness and low accuracy, but also of low efficiency in on-site investigation of electric theft and obtaining evidence. In recent years, the power system is gradually developing towards automation and intelligence. Manual meter reading has been gradually cancelled in some areas, so the reduction of manual information leads to a sharp decline in the reference value of its information. In the power system, the manual acquisition is replaced by the electric acquisition system step by step, and the user data collected is automatically analyzed by the system to judge the attributes of the user load. However, because the system collection is not perfect, the docking information between the user data of the station area and the collection system is often wrong, resulting in invalid analysis data [5, 6]. Even some system anomalies need quite a long time to be perfected, so the power supply company cannot effectively judge the users who steal power during this period [7, 8]. In this way, the accuracy of analyzing power-stealing users through the acquisition system is not high, which reduces the efficiency of power supply companies in power investigation and punishment [9, 10]. Therefore, it is of great practical significance to adopt more scientific and effective methods to screen the phenomenon of electric theft and to develop and popularize the analysis system of anti-electric theft for improving the work efficiency of anti-electric theft and reducing the economic losses of the state and electric power enterprises.

2 Anti-theft Management 2.1 Anti-theft At present, there is no special demonstration system for preventing electric power theft abroad, so it is only to improve the difficulty of electric power theft and reduce its possibility from the anti-electric power theft device. As at home, the United States and other countries in the world do not yet have a significant way to deal with electricity theft. There are also some methods to detect non-technical losses (in which electric theft accounts for the main part) in foreign anti-electric theft studies. Remote meter reading system with wireless transmission is used to record electric quantity data.

Evaluation Model of Intelligent Anti-electric Theft Management

105

In this method, the data recorded in the remote meter reading system every half an hour is compared with the existing abnormal data, and the correlation coefficient is obtained to determine the characteristics of the user’s electricity consumption. The electricity consumption characteristics can reflect the degree of correlation between the recorded user data every half hour and the non-technical loss. Thus it can be judged whether the user has the possibility of electricity theft and the magnitude of the possibility of electricity theft within a certain precise time period. Reducing the line loss rate of the power grid is an important measure to achieve energy conservation and emission reduction. This indicator means that power supply enterprises can effectively reduce the number of times of power theft, improve the stability and reliability of power supply, and reduce the power line loss after taking anti-power theft management measures. Reducing the line loss rate can save energy, reduce the waste of resources and pollutant discharge, so as to achieve the effect of energy saving and emission reduction. Therefore, the anti-theft management measures of power supply enterprises can effectively improve the economic benefits, environmental benefits and social benefits of enterprises.

2.2 Suspicion Model of Electric Theft Based on Artificial Neural Network Artificial neural network is a new type of information processing system which simulates the structure and function of human brain neurons and the function of human brain nerve tissue. BP neural network algorithm (Error Back-Propagation) is widely used at present. Based on the structure of BP neural network, the management evaluation model of anti-electric theft is established, which takes the characteristic evaluation of electric theft as the content. In order to simplify the model of antielectric theft, a BP neural network model with three-layer topology is established. The basic idea and process of establishing the suspicion model of electric theft based on artificial neural network is as follows. Determine the input sample. The following data can be selected, such as the user’s monthly electricity consumption, the line loss of the customer’s line, the type of the meter, the difference between the metering current and the detection current, the abnormal change of the voltage, the customer’s load power, the load power factor change and other indicators. (1)

(2)

The input and output values are processed in a unified way to determine the parameters required for the training process and prepare for the network training. The data in the input anti-electric theft model should have a unified standard and be as unified as possible within the interval of [0, 1]. Call the training function for training, get the model and calculate the average absolute error. The basic process is to input the training samples into the network, calculate the corresponding threshold value of each node, and then output the data after passing through the hidden layer. The output data is

106

(3)

L. Hu et al.

compared with the expected data and the error is calculated; If the error does not meet the requirements, the error will be returned to the network and the operation function or corresponding weight will be adjusted in the opposite direction. Iterate repeatedly until the error meets the requirement. The model is used to predict the test sample results, and the accuracy of the model judgment is obtained.

Select evaluation criteria. Before any evaluation can be made, relevant reference standards need to be set for comparison. Therefore, it is necessary to formulate evaluation criteria according to the actual situation before the comprehensive evaluation of the anti-stealing management effect of power supply enterprises is started. xi =

xi − xmin x minmax

(1)

In the formula, xmax represents the maximum range of data variation in the network model. Develop a questionnaire in accordance with the budget criteria, evaluation parameters and standards, and then send the prepared questionnaire to the experts in the field. According to the above evaluation criteria, they will score each indicator in the actual situation of anti-stealing management of power supply enterprises, so as to get the expert scoring results. xmax + xmin 2

(2)

xi − xmid 1 minmax ) 2 (x

(3)

xmid = xi =

Among them, xmid represents the median value of the range of variation of the questionnaire data.

3 Intelligent Anti-theft Management Experiment 3.1 Design of Background Management Module The data management part is mainly to add, delete, modify and check the data on the meter side and the high voltage side collected by the remote power auditing instrument stored in the database, and update the database in real time based on the collected data. The data analysis part is mainly to perform data query and data analysis operations on the data according to a certain analysis algorithm and the needs of the user, and monitor the user’s electricity consumption behavior according

Evaluation Model of Intelligent Anti-electric Theft Management Table 1 Network input vector

Serial number

Input parameters

1

Monthly electricity consumption

2

User maximum line loss

3

Table type

4

Line loss

5

Three-phase unbalance rate

6

Microcomputer scanning situation

7

Power factor

8

Contract capacity ratio

107

to various abnormal judgment algorithms, and send an abnormal alarm immediately when there is an abnormal electricity consumption.

3.2 Design of Background Management Module The development of the line loss analysis function in the electricity consumption information collection system combines the original functions of the collection system to investigate the fluctuation of the line loss at a macro level. This function narrows the scope of user inspection, locks key suspects, and provides for investigation and punishment of electricity theft a strong basis. Combined with neural network prediction, the sample to be tested is input into the trained network, and the predicted value is output, and accurate evaluation and prediction are made from the electricity theft situation. The network input vector is shown in Table 1.

4 Evaluation Model of Anti-electricity Stealing Management 4.1 Suspected Power Theft Coefficient The coefficient of suspected electricity theft is shown in Table 2. It can be seen from Table 2 that the suspected power theft coefficient in January 2020 reached 0.9835. The closer it is to 1, the greater the possibility of power theft. Therefore, users with high power theft suspected coefficient in the month can be targeted for investigation. The test results show that the use of standard BP neural network to predict the coefficient of suspected electricity theft has a high accuracy rate. By establishing a neural network, it can be shown that the use of neural network as a tool is feasible to analyze suspected electricity theft. It can be seen from the user’s actual electricity consumption that in January when the user steals the electricity, the way of stealing

108

L. Hu et al.

Table 2 Coefficient of suspected electricity theft Time

Whether stealing electricity

Power theft suspect coefficient

Error (%)

Judge right or not

201,909

0

0.0114

1.14

Correct

201,910

0

0.0188

1.88

Correct

201,911

0

0.0085

0.85

Correct

201,912

0

0.0183

1.83

Correct

202,001

1

0.9835

−1.752

Correct

202,002

1

0.9729

−2.71

Correct

202,003

1

0.9896

−1.04

Correct

202,004

0

0.0393

3.93

Correct

electricity is one line and one place. This way of stealing electricity will directly cause abnormalities in microcomputer scanning. At the same time, due to electricity theft, the metering device is less metered, so the line loss has also increased significantly.

4.2 Benefit Analysis of Network Loss Reduction Figure 1 shows the results of the benefit analysis of network loss reduction. Before the implementation of anti-theft management, Power Supply Company A lost a lot of electricity every year due to power theft, which seriously affected the company’s economic benefits. After the implementation of anti-electricity theft management, electricity theft has been greatly reduced, thereby enhancing the company’s economic benefits. The line loss rate of Power Supply Company A in 2018 was 7.12%. After the implementation of anti-theft management, the regional power supply in 2019 was 11.73 billion kWh, and the line loss rate was 4.33%. Taking 2018 as the base year, the electricity price is 380 yuan MWh. The benefit of reducing network loss in 2019 is 124.35 million yuan. 2018

Line loss rate (%)

Fig. 1 Benefit analysis of network loss reduction

8 7 6 5 4 3 2 1 0

1

2

3

4

5

2019

6

7

2020

8

9

10

11

12

Evaluation Model of Intelligent Anti-electric Theft Management

109

4.3 Benefit Analysis of Loss-Free Electricity The results of the loss-free power benefit analysis are shown in Fig. 2. After the implementation of anti-power-theft management, power-theft behavior has been greatly reduced, and the damage to electricity metering devices and other related equipment by power-thief is also linearly reduced, which can improve the health of equipment, reduce the workload of equipment maintenance, and ensure the safety of the power grid. The equipment’s annual power supply reliability rate was increased from 98.3% before implementation to 99.4% in 2019. It can be seen that the loss-free electricity benefit in 2019 is 4.54 million yuan. By implementing anti-stealing power management, Power Supply Company A has greatly improved the safety and reliability of the grid operation in local area, greatly reduced the impact of power outages caused by power theft on residential power consumption, and ensured that high-consumption groups enjoy high-quality services. The need for safer and more reliable electric energy can improve their satisfaction with electricity consumption and encourage them to consume more electricity. Further analysis, it is found that the quality of some electricity inspection staff in Power Supply Company A is the bottleneck for the further decrease in the rate of electricity theft. The quality of employees can be divided into professional quality and moral quality. The quality of employees of Power Supply Company A mainly refers to the professional quality of employees. In terms of professional quality, with the development of science and technology, criminals have become more sophisticated and concealed in stealing electricity. Therefore, the professional quality of electricity inspection staff also needs to be improved with the advancement of technology. However, the quality of many electricity inspection staff is still in the past, so it is impossible to investigate high-tech and hidden electricity theft. Therefore, it is necessary to improve the quality of some electricity inspection staff in Power Supply Company A. Specifically, the following measures should be taken. Regular professional training should be carried out for the electricity inspection staff to ensure the training and promotion opportunities of these employees. Professional training includes not only training on investigating and dealing with electricity theft, but also training on legal concepts. Through technical training, they can master the latest investigative techniques and methods, which can make it easy to investigate and punish high-tech electric theft. 1 POWER SUPPLY RELIABILITY RATE

Fig. 2 Results of benefit analysis of loss-free electricity

0.995 0.99 0.985 0.98 0.975 0.97 0.965 0.96

1

2

3

4

5 2020

6

7

8 2019

9

10

11

12

110

L. Hu et al.

5 Conclusion This research mainly discusses the evaluation model of intelligent anti-power theft management. The data analysis part is mainly to perform data query and data analysis operations on the data according to a certain analysis algorithm and the needs of the user. Based on various abnormal judgment algorithms, users’ power consumption behavior is monitored, and abnormal alarm is immediately sent out once there is abnormal power consumption. The development of the line loss analysis function in the electricity consumption information collection system combines the original functions of the collection system to investigate the fluctuation of the line loss at a macro level. This function narrows the scope of user inspection and locks key suspects. Combined with neural network prediction, the sample to be tested is input into the trained network, and the predicted value is output, so as to evaluate and predict the electric theft situation accurately. This research helps to reduce labor costs and build a reasonable electricity environment. Acknowledgements “Research on ultra short term load data analysis and forecasting method of smart grid” research results, the subject comes from the special fund project of basic scientific research business expenses of Heilongjiang Provincial undergraduate universities in 2020, subject number: 2020-KYYWF-0515. The name of the project is “Research on data analysis and forecasting method of ultra-short-term load in smart grid”. This paper is supported by Natural Science Foundation Project of Heilongjiang province (Grant No. LH2019F050). The name of the project is “Research on the control system of intelligent discrimination of electricity stealing and omission”. Research achievement of “Research on propagation velocity model and defect detection of internal stress wave in trees”, which is from the natural science foundation of Heilongjiang Province, subject number: LH2020C091.

References 1. Guo R, Luo T (2019) Intelligent management and control for land resources. Chin J 64(21):2166–2171 2. Yang HF, Lin K, Chen CS (2018) Supervised learning of semantics-preserving hash via deep convolutional neural networks. IEEE Trans Pattern Anal Mach Intell 40(99):437–451 3. Yin P, Zhang S, Lyu J et al (2018) BinaryRelax: a relaxation approach for training deep neural networks with quantized weights. SIAM J Imag Sci 11(4):2205–2223 4. Zhang XM, Han QL (2018) State estimation for static neural networks with time-varying delays based on an improved reciprocally convex inequality. IEEE Trans Neural Netw Learn Syst 29(99):1376–1381 5. Chuang FC, Chang CL, Chow YN et al (2020) Application of water tank employing smart sensor for thermal-electric energy conversion on vehicles. Sens Mater 32(1):135–148 6. Kar D, Kuntawar S (2019) Review on remote multiparameters monitoring and controlling system for solar panel application. IOSR J Electron Commun Eng 14(3):16–20 7. de Sá RGQ, de Sá Mello da Costa A (2019) In search of transparency: anti-history, memorials and resistance. J Manag Hist 25(4):493–515 8. Thwal CM, Lee M, Hong CS (2020) A study on the intelligent delivery management system using UAV-edge computing technology. J KIISE 47(12):1208–1214

Evaluation Model of Intelligent Anti-electric Theft Management

111

9. Lu GX et al (2018) Multimodal accessibility of modern roundabouts: intelligent management system versus common signalization scheme. Transp Res Rec 2183(1):103–119 10. Varma A (2019) Do culturally intelligent management accountants share more knowledge?— the mediating role of coopetition as evident from PLS SEM and fsQCA. Theoret Econ Lett 09(1):100–118

Civil Structure Damage Identification Method Based on Finite Element Model Technology Jia Li, Zhiyuan Yu, Xuezhi Zhang, and Yijiang Wang

Abstract IDamage identification of structures is the key to structural health monitoring. How to develop effective damage identification methods is still a difficult problem. In practical engineering, due to the complexity of the structure, the uncertainty of the environment, the experimental measurement data are not complete and have errors, the damage index is not sensitive enough, and the accuracy of the finite element model is difficult to ensure, there is no universally applicable method for structural damage identification. This paper mainly studies the damage identification method of civil structure based on finite element model technology. The initial finite element model of the bridge is established by using the finite element software, and the temperature response and static load response of the model are calculated. Combined with the existing problems in the modeling process, two steps of model modification are developed to realize the modification of the finite element model. Keywords Finite element modeling · Abaqus software · Civil structures · Damage identification

1 Introduction Civil engineering structures can be divided into buildings, Bridges, industrial towers and other structures. Among them, bridge engineering is an important structure that surmounts all kinds of terrain obstacles and has bearing function in the construction of urban and rural roads, water conservancy, railway and highway. In recent decades, with the rapid development of China’s transportation industry, a large number of Bridges have been built in China. As a very important component of the transportation lifeline system, the bridge structure plays an important role in the national J. Li (B) · X. Zhang · Y. Wang Department of Logistics and Infrastructure Construction, Beijing Institute of Technology, Beijing, China e-mail: [email protected] Z. Yu Beijing Wodong Tianjun Information Technology Co., Ltd., Beijing, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_12

113

114

J. Li et al.

economy and national defense construction. Once the bridge structure fails, it will bring irreparable losses. In the normal service process, civil engineering structures will be affected by various adverse factors, such as long-term load, environmental corrosion, structural fatigue and material aging, etc., which will inevitably lead to structural damage, loss of bearing capacity, and even accidents [1, 2]. The continuous occurrence of bridge accidents warns people to pay attention to the health problems of Bridges in use. Especially in today’s society with the rapid development of transportation industry, many Bridges are often in a state of poor load use, which makes some parts of these Bridges damaged and unknown, leaving hidden safety risks [3]. At present, the quality and life of Bridges during service have gradually been paid attention to, the evaluation and maintenance of existing Bridges is also the focus of research worldwide, and the health condition of Bridges during service has been concerned. Scientific and effective bridge structural damage detection and assessment can provide reliable basis for existing Bridges, play a role in ensuring the safety of existing Bridges and reducing the occurrence of bridge accidents. Meanwhile, early detection of bridge damage can save the maintenance cost of Bridges and avoid the occurrence of catastrophic accidents [4]. Structural damage identification is to realize long-term monitoring of the use status of the structure through testing and analyzing the key indicators of the structure [5]. The method of structural integral damage identification can model any structure into a physical system composed of parameters such as stiffness, mass, damping, etc. Once the structure is damaged, the parameters will change accordingly, so the damage identification information can be obtained according to the changes of the parameters. Whole damage identification methods involve many technical fields, such as detection technology, information technology, computer technology, etc. [6]. In recent years, many scholars in the field of civil engineering at home and abroad have been devoted to the research of global damage detection methods, which has made great progress in the development of health monitoring technology, and achieved a series of research results. Structural damage detection methods can be divided into local damage identification methods and global damage identification methods according to detection targets [7]. To find an effective and reliable method of damage identification, timely understanding of the structure in different stages of the service state, in order to take corresponding measures to reinforce the structure or repair, is the guarantee the safety of structures, trial and durability of the important measures, but also to avoid casualties and economic damage to property plays an important role.

Civil Structure Damage Identification Method Based …

115

2 Damage Identification of Civil Structures Based on Finite Element Model 2.1 ABAQUS Finite Element Software ABAQUS is a set of commercial simulation software based on finite element method. It was launched by HKS (now Simulia) Company and entered the engineering simulation software market, and then introduced to China. Now, the software has been in development in China for more than 20 years. In the field of civil engineering, ABAQUS can be used to simulate the static and dynamic forces, contact, fracture and other problems of a variety of engineering materials, especially to provide great help in solving complex geometric and material nonlinearity problems. With the deepening of research, the research problems in the field of structural engineering become more and more detailed and the amount of calculation becomes larger and larger. In order to avoid low-level repetitive work, finite element calculation tools such as ABAQUS are playing an increasingly important role [8]. ABAQUS consists of three main solver modules, ABAQUS/Standard, ABAQUS/Explicit, and ABAQUS/CFD. Among them, ABAQUS/Standard is an implicit analysis solver, which is often used to solve static problems. ABA has a rich material library, including various strengthening and softening models of steel and concrete under cyclic loading, which is the basis of this simulation study. In order to adapt to the complex and varied geometric modeling, while grasping the main mechanical behavior characteristics of components and ignoring the secondary factors, ABAQUS/Standard has a large unit library, allowing users to choose different units and their combinations for the same problem according to different accuracy requirements and computational efficiency considerations. ABAQUS/Standard has a parallel sparse matrix solver with dynamic load balance, a parallel iterative solver based on domain decomposition anda parallel Lanczos eigenvalue solver, which can conduct general process analysis and linear perturbing process analysis [9]. At the same time, Abaqus has good scalability, can edit more materials and cell properties through the user subroutine interface. ABAQUS/Explicit is an Explicit dynamic solver, suitable for simulating transient or instantaneous dynamic events, such as impact load, explosion and other highly discontinuous problems. It is characterized by the ability to automatically find out the contact pairs of each component in the model, and calculate the contact displacement and reaction forces. Different from ABAQUS/Standard, the solution of display dynamics does not need to solve the coupled equation system at each incremental step, but derives the results backwards in turn at a very small incremental step in time, so there is no convergence problem [10]. ABAQUS/Explicit also has a rich set of material models and unit types, and its unit library is a subset of the ABAQUS/Standard unit library. ABAQUS/Explicit provides a parallel computation solver based on domain decomposition, which does not allow for linear perturbation analysis.

116

J. Li et al.

ABAQUS/CFD can perform hydrodynamic analysis, such as simulating laminar flow and turbulence of liquids, and also simulate seepage and other models in geotechnical engineering. If ABAQUS/CFD is used in combination with the first two solvers, it can solve a large number of fluid–structure coupling problems in port and offshore platform engineering, and has a wide range of applications. The steps of finite element analysis by ABAQUS are: (1) Establish the model (pre-processing); (2) Establish equations; (3) Discrete Equation; (4) Solve the equation; (5) Presentation of results (post-processing). Among them, 2–4 are carried out automatically by the program, and the analyst’s work is mainly reflected in Step 1 and Step 5. For step 1, ABAQUS provides a dedicated interactive preprocessing module, ABAQUS/CAE, and the analyst can also write the INPUT file as a command stream. For the fifth step, ABAQUS has a powerful post-processing function. It can not only output moires of stress and its components, strain and its components, damage and stiffness degradation, but also generate X–Y curves of variables and create a table report of output data, which provides great convenience for analysts.

2.2 Finite Element Model Corrections

(1)

Theoretical research

Using finite element model to analyze bridge structure has become one of the important methods in bridge research. For bridge engineering, on the one hand, some factors such as performance degradation and section damage will occur during the use of the structure, which will lead to its deviation from the design parameters. On the other hand, in the process of modeling, it is inevitable that there are some idealized or simplified component simulations, both of which will lead to differences between the finite element model and the actual structure. In order to make the response of the finite element model similar to that of the real bridge, it is particularly important to modify the model [11, 12]. (2)

Finite element model modification process

The content of finite element model modification mainly includes: obtaining the measured response of the structure through static load detection or health monitoring data, establishing the finite element model according to the design parameters, calculating the theoretical value of the model and comparing with the measured value to determine the necessity of model modification. Combined with the actual engineering and parameter sensitivity analysis, the basic parameters of the structural components are selected, and the objective function is constructed by using the structural response. Through repeated iteration of the objective function, the optimal solution of the modified parameters is calculated to realize the modification of the finite model.

Civil Structure Damage Identification Method Based …

(3)

117

Parameter sensitivity analysis

The algorithms of sensitivity analysis mainly include difference method, matrix perturbation method, modal summation method and so on. Sensitivity analysis generally takes eigenvectors and eigenvalues as multivariate functions of structural parameters and takes partial derivatives of multivariate functions to get the sensitivity function of a parameter to the objective function. The theoretical derivation process of this method is as follows: When the initial design parameter p of the structure changes slightly, the expansion formula of the structural response f to the design parameter p is as follows: f ( p + p) = f ( p) +

∂2 f ∂i f ∂f p + p 2 + · · · + pi 2 ∂p 2!∂ p 2!∂ i p

(1)

Assuming that the DIJ type response function Fi of the structure is correlated with n structural design parameters P = [P1, P2… Pn], then the first-order sensitivity of the structural response to any structural parameter is as follows: ∂fj ∂ f j ( p1, p2, . . . , pn) = ∂p ∂ pk

(2)

The limitation of the parameter sensitivity correction method is that the parameters with high sensitivity are not necessarily the cause of the error of the finite element model. Therefore, it is often used in combination with the empirical method to modify the finite element model.

3 Modification Experiments the Finite Element Model 3.1 Consider the Corrections to the Node Plates In actual engineering, the truss is divided into three sections with the same axial force and different area by the joint plate. However, the influence of the joint plate is not considered in the initial modeling, and the truss is simulated as a bar with the same area, which leads to inaccurate axial stiffness of the model. In order to consider the influence of joint plates, ABAQUS was used to establish a simplified model of stiffening beam section and an actual model with joint plates for analysis and conversion. (a) No joint plates were simulated in the simplified model, and all truss rods were connected in the way of common joints. (b) In the model with node plate, the node plate is established by plate element and fixed by rigid connection between the node plate and the truss. In the model calculation, the boundary conditions of the guaranteed quantity model are the same as the external forces received, that is, the axial forces received by the bar with the same position are the same in the two models. Calculate the

118

J. Li et al.

deformation of Model (a) under the action of external force, and modify the axial stiffness in Model (b) to make the deformation of the same bar in the two models the same, and realize the correction of axial stiffness considering the influence of joint plate. The calculation formula is as follows: =

FN L αE A

(3)

3.2 Correction of the Structural Parameters During the initial modeling, the model response errors caused by the inaccuracy of upper chord stiffness caused by the unsimulated deck pavement and railing of the stiffened girder bridge system and the inaccuracy of elastic modulus and linear expansion coefficient caused by the particularity of the main cable material construction need to be further corrected. The elastic modulus and expansion coefficient of the main cable and the axial stiffness of the upper chord of the stiffening beam were selected as the correction parameters, the static load deflection and temperature deflection coefficient of 2#–4# sections and the temperature strain coefficient of 1#–5# sections were used as the target values, and the response of each section in the model was taken as the variable to construct the objective function as follows: y=

3 i=1





ui − ui u1

2 +

5 i=1





ai − ai a1

2 +

3 i=1





bi − bi b1

2 (4)

Through repeated iteration, the objective function is minimized and the optimal solution of the modified parameters is determined.

4 Model Correction Results The new parameters are given to the finite element model, the static load test and temperature response of the new model are analyzed, the measured data are compared, the relative error is calculated, and the correction effect of the finite element model is verified.

Civil Structure Damage Identification Method Based …

119

Table 1 Static load deflection and relative error of the modified finite element model Condition 1 deflection (mm) Relative error (%) Condition 2 deflection (mm) Relative error (%)

1#

2#

3#

4#

5#

10.32

−60.22

−127.46

−61.94

12.26

6.12 11.04 9.03

−5.13

−5.57

−1.91

−8.46

−130.73

−117.54

−20.36

12.91

−7.64

−6.51

3.85

−8.93

4.1 Still Load Deflection and Error As shown in Table 1, the static load deflection and relative error of the modified finite element model are listed. In working condition 1, the static load deflection of section 1# is 10.32, and the relative error is 6.12. In working condition 1, the static load deflection of section 2# is −60.22 and the relative error is −5.13. In working condition 1, the static load deflection of section 3# is −127.46 and the relative error is −5.57. In working condition 1, the static load deflection of section 4# is −61.94, and the relative error is −1.91. In working condition 1, the static load deflection of section 5# is 12.16, and the relative error is −8.46. In working condition 2, the maximum relative error is cross section 1#, and the relative error reaches 9.03.

4.2 Temperature Deflection and Error As shown in Figs. 1 and 2, by comparing the errors before and after correction, the temperature deflection coefficients of 2#–4# are all within 7%. The temperature strain coefficients of 1#–5# are all less than 7%, and the deflection error of static load is less than 10%. The load response error is reduced on the whole. The analysis value of the existing model matches the measured value well, and the model modification has achieved a good effect. 0 -1

2#

3#

-2.17

-3.48

-3 -4

4# -2.15

-2.53

-2

Data

Fig. 1 Temperature deflection coefficient and relative error of the modified finite element model

-4.74

-5 -6.28

-6 -7

Cross section Deflection coefficient

Relative error(%)

120 10 5

Data

Fig. 2 Temperature strain coefficient and relative error of the modified finite element model

J. Li et al. 7.93 4.01

3.51

2.65

0 1# -1.39

2#

3# -2.64

-5 -5.26 -10

4#

5# -1.82

-5.78

-6.75

Cross section Coefficient of strain

Relative error(%)

5 Conclusions On the background of studying the significance of finite element model modification and damage identification of civil structures, this paper establishes the initial finite element model of the bridge. On this basis, the sensitivity analysis, objective function iteration and other technical means are used to realize the model modification, and the accurate finite element model is obtained. But in finite element simulation and experimental analysis, there is still a lot of hard to avoid in the process of the uncertain factors, the simulation and experimental results of this paper a certain impact, this will reduce the accuracy of damage identification, and so on the basis of the above work there are many need to be further perfect, in the process of experiment, as a result of the limitation of laboratory equipment and conditions, the static load test of the bridge beam was only carried out, while the dynamic load test was not carried out. This undoubtedly reduces the argumentation of this paper. Therefore, when the experimental equipment and conditions permit, dynamic load experiments will be carried out in the future, and the effect of dynamic and static combined damage identification will be better.

References 1. Astroza R, Ebrahimian H, Yong L et al (2017) Bayesian nonlinear structural FE model and seismic input identification for damage assessment of civil structures. Mech Syst Sig Process 93:661–687 2. Ebrahimian H, Astroza R, Conte J P et al (2018) Bayesian optimal estimation for output-only nonlinear system and damage identification of civil structures. Struct Control Health Monit 4:e2128.1–e2128.32 (in press) 3. Beer M, Kougioumtzoglou IA, Patelli E et al (2021) System and damage identification of civil structures. Encyclop Earthq Eng 70(1):1–9. https://doi.org/10.1007/978-3-642-36197-5 4. Hua X (2017) Model study of civil engineering structure damage identification system based on modern intelligent algorithm. Rev Fac Ing 32(15):196–201 5. Zhi-Xiong L, Wen-Ping Z, Bin Z (2017) Research on performance detection system and damage identification method based on civil engineering structure. Acta Tech CSAV Cesk Akad Ved 62(1):201–213 6. Pang-Jo C, Naoya K, Kouji K (2016) Damage identification on I-beam member using multipoint acceleration measurement and machine learning. J Jpn Soc Civ Eng Ser A2 Appl Mech (AM) 72(2):I_623–I_631

Civil Structure Damage Identification Method Based …

121

7. Gu Y, Huang Z (2017) Wavelet analysis to realize damage identification and earthquake disaster mitigation design of civil engineering building structure by using structural dynamic characteristics. Bol Tecn Tech Bull 55(6):325–334 8. Pegg EC, Gill HS (2016) An open source software tool to assign the material properties of bone for ABAQUS finite element simulations. J Biomech 49(13):3116–3121 9. Alotta G, Barrera O, Cocks A et al (2018) The finite element implementation of 3D fractional viscoelastic constitutive models. Finite Elem Anal Des 146:28–41 10. Druckrey AM, Alshibli KA (2016) 3D finite element modeling of sand particle fracture based on in situ X-ray synchrotron imaging: 3D finite element modeling of sand particle fracture. Int J Numer Anal Meth Geomech 40(1):105–116 11. Ansari MA, Samanta A, Behnagh RA et al (2019) An efficient coupled Eulerian-Lagrangian finite element model for friction stir processing. Int J Adv Manufact Technol 101(1):1–14 12. Wang Y, Liu Y, Tang W et al (2017) Parametric finite element modeling and tooth contact analysis of spur and helical gears including profile and lead modifications. Eng Comput 34(8):00–00

Cardiac CT Segmentation Based on Distance Regularized Level Set Xinyang Wu

Abstract Before analyzing CT images, it is crucial to segment the heart image. Moreover, the left ventricular (LV) inner and outer membrane segmentation is one of the most important contents. However, manual segmentation is tedious and timeconsuming. In order to facilitate doctors to focus on high-tech tasks such as disease analysis and diagnosis, it is crucial to develop a fast and accurate segmentation method (Kang et al. in J Electron Imag 21(1):01090 (2012) [1]. In view of this phenomenon, in this paper I used distance regularized level set (DRLSE) to explore the segmentation effect of epicardium and endocardium (Li et al. in IEEE Trans Image Process 19:3243–3254, 2010 [2]), which included a distance regularized term and an external energy term. Finally, five CT images were used to verify the proposed method, and image quality evaluation indexes such as dice score and Hausdorff distance were used to evaluate the segmentation effect. The results showed that the method could separate the inner and outer membrane very well (endocardium dice = 0.9253, Hausdorff = 7.8740; epicardium Hausdorff = 0.9687, Hausdorff = 6.3246). Keywords Image segmentation · Level set method · Cardiac CT images · Bilateral filtering

1 Introduction Cardiovascular disease (CVD) is one of the most common causes of death in the world [3]. X-ray computed tomography (CT) cardiac imaging can provide detailed anatomical information such as chambers, blood vessels, coronary arteries and coronary artery calcification score, thus considerably deepening people’s understanding of the anatomical structure of cardiovascular diseases. The analysis and diagnosis are based on heart image segmentation, and the LV segmentation is very important.

X. Wu (B) Sun Yat-sen University, Shenzhen, Guangdong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_13

123

124

X. Wu

Although level set function (LSF) has been widely used in medical image segmentation [4], the evolution process of conventional level set has been plagued by irregularity, which leads to numerical error and eventually destroys the stability of level set evolution. In order to overcome this difficulty, people use the numerical method of reinitialization to restore the regularity of LSF and maintain the stable level set evolution [5]. However, this method may mistakenly move the zero-level set away from the expected position. In order to avoid the problem of reinitialization, I choose the distance regularized level set model. The general segmentation process is that the image is preprocessed by bilateral filtering, and then the initial ellipse template is framed in the intima. In the iterative process, the parameters are continuously modified to get a perfect fit of intima segmentation, and then the outer membrane segmentation is obtained by expanding so that a perfect outcome can be observed.

2 Method The overall framework is shown in Fig. 1.

2.1 Bilateral Filtering Because the level set segmentation directly using the original image is affected by noise, and the computational cost is huge [6], it is necessary to preprocess the image. After trying a variety of image enhancement methods, the bilateral filtering method is finally determined because of its good effect in removing CT spatial noise [7]. The main purpose of this step is to enhance the edge structure and remove noise in the middle, so that the level set is less affected by the noise in the non edge area, quickly updated, and accurately iterated and did not leak when approaching the boundary.

Fig. 1 The basic structure of the algorithm

Cardiac CT Segmentation Based on Distance Regularized Level Set

125

Bilateral filtering is nonlinear. The principle is to give different weights according to the distance and brightness of the target pixels to achieve the denoising effect. The larger the intensity difference and the farther the distance between the points around the target pixel, the smaller the weight. The formula is as follows: N y[k] =

W [k, n] · x[k − n] N n=−N W [k, n]

n=−N

(1)

The weight W includes the spatial information WS and the intensity information Wi . The farther the two target pixels are, the larger the value difference and the smaller the weight is. In this way, the surrounding noise is filtered out because of the large intensity difference, and the edge structure is retained because of its close distance and heavy weight.

2.2 Distance Regularized Level Set (DRLSE) Segmentation 2.2.1

Level Set Function

This method is based on the traditional level set function (LSF). LSF is a technique of using fixed mesh to represent moving interface or boundary. Based on an implicit surface, it can distinguish whether each point is on the zero level line by whether the function value is equal to zero. The level set equation can be obtained by deriving and simplifying the level set definition and adding the numerical stability term on the right side   ∇ ∂ + u · ∇ = γ ∇ · ε∇ − (1 − ) |∇| ∂t

(2)

where ε represent the width of the transition band in f from 0 to 1, which is a constant in the given domain, and it is equal to the maximum value of the grid size h in the domain. Parameter γ determines the amount of reinitialization or stabilization of level set functions. Through this equation, the free surface can update the zero profile in fluid motion according to the fluid velocity [8].

2.2.2

The Distance Regularized Level Set Model

In order to keep the good state of LSF and make the evolution of level set stable and accurate, it is necessary to keep it smooth during the evolution process. Therefore, DRLSE introduces the energy formula with distance regularization. It is defined by ε(φ) = μR p (φ) + λL g (φ) + α A g (φ)

(3)

126

X. Wu

where RP (f) is the regularization term, λ is the weight of the weighted length term in the energy regularization formula, and α is the weight of the weighted area term. Then the DRLSE equation can be expressed as  ∂εext  ∂φ = μdiv d p (|∇φ )∇φ − ∂t ∂φ

(4)

The edge indicating function g is defined as follows: g

1 1 + ∇G σ ∗ I 2

(5)

Gσ is the Gaussian kernel with the standard deviation σ, convoluted with image I to smooth noise. The value of this function at the boundary of the object is usually less than that at other locations.

2.3 Evaluating Indicator The results were evaluated by two dimensions of area and distance, which were dice score and Hausdorff distance. Because the last two indicators were similar to dice score, their weights were lower.

2.3.1

Dice Score

It is a commonly used indicator for image segmentation. The larger the value is, the more similar the segmentation is Dice =

2 ∗ Asl A s + Al

(6)

where As is the area of the segmentation result area, Al is the area of the label, Asl is the area where the two overlap.

2.3.2

Hausdorff Distance

The similarity is described by the distance between two point sets. The smaller the value, the better. The distance is defined by 

 d H (X, Y ) = max sup inf d(x, y), sup inf d(x, y) x∈X y∈Y

y∈Y x∈X

(7)

Cardiac CT Segmentation Based on Distance Regularized Level Set

127

where d (x, y) represents the distance between two points, X and Y represent the segmentation result and label respectively.

2.3.3

Pixel Accuracy (PA)

The ratio represents the proportion of the number of correctly classified pixels to the total number of pixels.

2.3.4

Matthews Correlation Coefficient (MCC)

MCC is essentially the correlation coefficient between observed and predicted binary classification that returns to a value between −1 and +1. T P × T N − FP × FN MCC = √ (T P + F P)(T P + F N )(T N + F P)(T N + F N )

(8)

3 Results Five ventricular CT images were used in this experiment, and the resolution of each image was 726 × 726. After exploring the influence of different enhancement methods, border selection and iterative methods on the results, the optimal method is determined.

3.1 Segmentation Results The following shows the image segmentation results of five images, the index statistics of CT Fig. 1, and the comparison between this method and the traditional LSF method (Fig. 2; Tables 1 and 2).

Fig. 2 The red border is the inner membrane and the green border is the outer membrane

128

X. Wu

Table 1 Statistics of internal and external membrane indexes Dice

Hausdorff

PA

MCC

Dice

Endocardium

0.9253

7.8740

0.9840

0.9166

0.9253

Epicardium

0.9687

6.3246

0.9888

0.9620

0.9687

Table 2 Comparison of inner and outer film segmentation effect between DRLSE and LSF Endocardium Epicardium

Dice

Hausdorff

PA

MCC

LSF

0.8967

8.4857

0.8996

0.8965

DRLSE

0.9253

7.8740

0.9840

0.9166

LSF

0.9001

7.0841

0.9236

0.8968

DRLSE

0.9687

6.3246

0.9888

0.9620

Table 3 The effect of different pre-treatment on the segmentation of intima Dice

Hausdorff

PA

MCC

BF + gradient

0.8984

7.6811

0.9787

0.8865

WF + gradient

0.8939

6.7082

0.9765

0.8823

BF

0.9003

7.0711

0.9776

0.8902

WF

0.8735

7.7460

0.9701

0.8635

Gradient

0.8975

7.8740

0.9787

0.8857

Original

0.9003

7.4833

0.9785

0.8897

3.2 The Influence of Enhancement Methods In order to improve the computational efficiency and accuracy, it is necessary to enhance the image before segmentation. In the ablation experiment, I explored the combination effect of ➀ bilateral filtering(BF), ➁ Wiener filtering (WF) [9], and ➂ gradient operator [10], and evaluated the results of rough endometrial segmentation with dice and Hausdorff as the main indexes when the other parameters were consistent in 85 iterations (Table 3).

3.3 The Influence of Initial Border The ablation experiment studied the influence of the shape and position of the border on the results (Fig. 3).

Cardiac CT Segmentation Based on Distance Regularized Level Set

129

Fig. 3 Analysis of initial border and segmentation results

Fig. 4 Different outer membrane iteration methods and results

3.4 The Influence of Iterative Method In the ablation experiment, I also studied the effects of iterative methods (1) from the inside out and (2) from the outside to the epicardium (Fig. 4). In the figure above, the inner membrane is used as the initial segmentation to iterate outwards, while in the figure below, the inner membrane is iterated outwards.

4 Discussion This algorithm involves α, ε, μ, σ, λ, and the number of iterations. To sum up, the key to accurate segmentation is to find and approach the critical value ε as much as possible with the continuous reduction of α. Although larger ε will produce jagged

130

X. Wu

lines on the boundary, but it will not cause huge error after smoothing the image every 10 iterations. However, there is still room for improvement in practice. First of all, although the results can be improved by using bilateral filtering enhancement, the filter is essentially a single resolution, which is unable to access different frequency components of the image. Although it is very efficient to remove noise in the high-frequency region, the performance of removing noise in the low-frequency region is poor [7]. As a result, the segmentation in the irregular inner and outer film boundaries cannot be optimized very well, such as spots near the inner membrane. On the other hand, although DRLSE speeds up the whole process, it still needs a large amount of computation, since the input image size was large (726 × 726) and due to system configuration, the iteration speed was still very slow, up to 1 min, which brings great trouble to debug parameters. Finally, the DRLSE algorithm is too sensitive to initialize. The segmentation result is closely related to the initial image and parameter setting. For each image, the parameters and initialization must be set separately, so it is not universal.

5 Conclusion In this paper I explored the effectiveness of the level set LV segmentation through DRLSE model. After exploring various enhancement filtering, initial contour and iterative methods, by comparing the dice score, Hausdorff distance and other indicators of segmentation results and the visual effect of iterative process, the best segmentation method was determined. After bilateral filtering, the inner membrane was segmented iteratively by using the ellipse template, and then the outer membrane was segmented by using the inner membrane results.

References 1. Kang D, Woo J, Kuo CCJ et al (2012) Heart chambers and whole heart segmentation techniques. J Electron Imag 21(1):010901 2. Li C, Xu C, Gui C et al (2010) Distance regularized level set evolution and its application to image segmentation. IEEE Trans Image Process 19(12):3243–3254 3. Mendis S, Puska P, Norrving B et al (2011) Global atlas on cardiovascular disease prevention and control. World Health Organization 4. Kass M, Witkin A, Terzopoulos D (1988) Snakes: active contour models. Int J Comput Vision 1(4):321–331 5. Sethian JA (1999) Level set methods and fast marching methods: evolving interfaces in computational geometry, fluid mechanics, computer vision, and materials science. Cambridge University Press 6. Li C, Huang R, Ding Z et al (2011) A level set method for image segmentation in the presence of intensity inhomogeneities with application to MRI. IEEE Trans Image Process 20(7):2007– 2016

Cardiac CT Segmentation Based on Distance Regularized Level Set

131

7. Bhonsle D, Chandra V, Sinha GR (2012) Medical image denoising using bilateral filter. Int J Image Graph Sig Process 4(6) 8. Wang MY, Wang X, Guo D (2003) A level set method for structural topology optimization. Comput Methods Appl Mech Eng 192(1–2):227–246 9. Pratt WK (1972) Generalized Wiener filtering computation techniques. IEEE Trans Comput 100(7):636–641 10. Abdul-Kader SA, Khalil AI (2012) Comparative study for edge detection of noisy image using sobel and Laplace operators. J Coll Educ Women 23(11)

Monitoring and Analysis System of Municipal Private Economy Based on Big Data Xiangjun Yu and Chao Xie

Abstract The monitoring and analysis system of private economy is to establish a municipal monitoring and analysis system of private economy based on the big data of private enterprises in Wuhan. With the purpose of “timely data collection, accurate operation and analysis, effective monitoring and early warning”, the system covers four major market entities: private enterprises, private holding companies, self-employed enterprises and private non enterprise units. Through data collection, analysis, evaluation, prediction, early warning and decision-making services, the system provides accurate data and early warning for decision-making departments. According to the structure, the whole system is divided into four subsystems: data acquisition system, data management system, statistical analysis system and early warning monitoring system. The system highlights the analysis, monitoring, prediction and early warning functions of economic operation, provides new data governance solutions for government departments in terms of data speaking, data decision-making, data management and data innovation, enhances the government’s ability to adjust and control the macro-economy and respond to market emergencies, and can take over the overall economic situation of the whole city. Keywords Private economy · Economic monitoring · Big data · Economic analysis

1 Introduction In November 1, 2018, general secretary Xi Jinping personally proposed and chaired a symposium on private enterprises. At the meeting, the general secretary stressed that “two unwavering” and “three no changes” fully demonstrated that the Party Central X. Yu School of Economics, Hubei Business College, Wuhan, Hubei, China C. Xie (B) School of Management, Wuhan Donghu University, Wuhan, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_14

133

134

X. Yu and C. Xie

Committee firmly resolutely encouraged, supported and guided the determination and a clear attitude of the development of the non-public sector of the economy. Private economy plays an extremely important role in stabilizing growth, promoting innovation, increasing employment and improving people’s livelihood. However, at the municipal level, the statistical analysis of private economy data in some domestic cities is not perfect [1]. Due to the lack of integrity, coordination and matching, the statistical investigation scheme on private economy is difficult to implement, and there is no comprehensive and perfect platform and detection mechanism for the monitoring of private economy operation, it has been unable to meet the objective needs of the rapid growth of private economy under the current new economic situation. In order to actively promote the institutionalization and standardization of the statistical work of municipal private economy, strengthen the government’s monitoring of the development of private economy and the change of economic operation, it is of great significance to establish a set of municipal private economy monitoring and analysis system based on the big data of private enterprises in the city, so as to accurately “feel the pulse” and boost the development of private economy and the optimization of business environment [2]. The private economy monitoring and analysis system is based on the idea of “big data, big operation, big monitoring”, with the goal of “timely data collection, accurate operation and analysis, effective monitoring and early warning”, to establish a comprehensive monitoring platform covering four major market entities: private enterprises, private holding companies, self-employed enterprises and private non enterprise units [3].

2 The Functional Framework of the Monitoring and Analysis System of Private Economy 2.1 Data Acquisition System Rich data is the basis of big data application and the core support for the platform to provide information services for the government and enterprises. The data acquisition system collects the operation data of private economy from all parties to support the big data architecture environment, and forms the private economy big data through the secondary processing of data in the later stage. Data acquisition system needs to support a variety of data acquisition strategies, can support all kinds of internal and external data acquisition, and need to support a variety of forms, different frequencies, and different forms of data acquisition. The collection methods can include data import and data sharing of government departments, and also need to support online data filling and automatic collection by web crawler [4]. The data forms include structured data, semi-structured data and unstructured data.

Monitoring and Analysis System of Municipal Private Economy …

135

2.2 Data Management System Data management system includes data verification, data reporting, data cleaning, data query, evaluation and rating model and other functions [5]. Firstly, the system collects the scattered data in different formats (direct reporting data of key enterprises, direct reporting data of departments, third-party data, government data, etc.) from the data acquisition system, and imports the data form with unified standard format into the basic database of the system through the platform, so as to organically integrate the data, so as to improve the data sharing and query efficiency. The system realizes the data exchange, comparison, conversion and integration, so as to extract the real related data around the private economy and realize the collection and unification of economic operation data.

2.3 Statistical Analysis System In the statistical analysis system, based on various economic indicators and economic data, the typical big data mining and application means such as machine learning of big data are used to study and recommend the economic operation situation, find out the problems in the process of economic policy implementation, establish the problem cause analysis model, and use big data technology to make correlation analysis on the cause factors of the problems, Identify the real cause of the problem. On this basis, combined with the changes of massive historical data, by adjusting the variables of relevant factors, we can correctly predict the development trend of economic development, and finally provide quantitative basis for the government to scientifically formulate relevant economic development support policies. The statistical monitoring system takes the private economy, industry and enterprise as the research object [6]. It conducts comprehensive and real-time analysis, monitoring and early warning on the relevant indicators of the operation of the private economy from the macro, meson and micro levels, and comprehensively understands the economic and development status of the private enterprises in the city from different dimensions of time, region, industry and industry [7].

2.4 Early Warning Analysis System Early warning monitoring is a data application analysis system based on the basic database and advanced early warning analysis methods. It provides early warning of economic prosperity index, industrial development index and key enterprise operation in combination with enterprise asset liability ratio index, return on investment index and private economy added value. The system provides the functions of risk early warning indicator setting and risk early warning reminder. The staff

136

X. Yu and C. Xie

can customize the early warning indicator to dynamically monitor the economic operation risk. The system will automatically notify the relevant personnel through SMS, email and station letter to provide decision-making basis for the government’s macroeconomic management decision [8].

3 Security Guarantee of Monitoring and Analysis System of Private Economy Combined with the description of security services in national standards, the whole system should follow the following security principles: Authentication: used to identify and verify the identity of user objects in the system. Using authentication service can confirm whether the system user has fake identity; the verification is only used to verify whether the data source received by the system server is consistent with the claimed source, but it can not protect the data from being modified in the middle. Access control (accesscontro1): provides defense measures against unauthorized use of resources. In this system, oauth2.0 protocol is used to provide unified authentication login of the system, and token ticket is used to verify the user’s permission to use the system during system operation [9]. Data confidentiality: the defensive measures taken to protect the data of the system from unauthorized disclosure. The main defense methods include connection confidentiality, connectionless confidentiality, business flow confidentiality and field selection confidentiality. Data confidentiality and access control technology work together to protect the confidential information of the system from illegal access [10]. Data integrity: when users use the system, they identify the data integrity of the user’s connection life, and verify whether the information source of the data unit uploaded by the user is accurate and effective. Non repudiation: it is mainly used to prevent users’ repudiation behavior, which is used to confirm that the behavior in the system is really owned by the user operation. It is divided into two types: repudiation with primary data proof and repudiation with delivery proof.

Monitoring and Analysis System of Municipal Private Economy …

137

4 System Architecture 4.1 Overall System Architecture The monitoring and analysis system of private economy is based on the infrastructure network facilities, with the operation guarantee system, standard system and information security system as the guarantee, with the data center as the hub, with the data acquisition system, data management system, statistical query system, analysis and early warning system, interactive communication system and other systems as the support, to build a platform for the government, the government, the government, the government, the government, the government, the government, the government, the government, the government, the government, the government and the government An integrated service system for enterprises to provide public services (see Fig. 1 for the overall architecture). The overall architecture of the system is divided into five layers, namely access layer, application service layer, system support layer, data resource layer and infrastructure layer. Through the effective hierarchical structure division, the system architecture design ideas can be fully displayed.

Government

Operation and maintenance personnel

Enterprise

User layer Platform users

Presentation layer

Application business layer

Mobile end (government end, enterprise end)

Official website of platform

Data acquisition system

Data management system

Statistical query system

Analysis and early warning system

Foundation support system

Interactive communication system

City Department data, enterprise direct report data, provincial city data, etc

Data layer

Data acquisition

Data extraction

Unified standards

Cloud Facility Layer

Economic index database

Private economy database

Private enterprise database

Data verification Unified standard

Data integration

Data exchange

Data resource system

Infrastructure, computer room, network, host, basic software

Fig. 1 The overall architecture of private economy monitoring and analysis system

138

X. Yu and C. Xie

Access layer: the overall system functions design and write a unified service entrance in the presentation layer, which uses a unique top-level domain name for access, and the system functions can be directly accessed through the service entrance; The download and use of mobile client realizes the functional support on different carriers and stable and efficient instant messaging capability, provides low-cost, convenient, all factor and open user experience, and meets the needs of government staff and enterprises for business handling and access. Application service layer: Based on the application service operation framework of the system, realize the way of “service and component”, realize the unified application service and data support of the whole system, and provide unified data service and application service support for enterprise feedback, enterprise cultivation, information analysis and other applications. System support layer: all businesses are developed and applied based on a unified development system, and the underlying organization permissions and other data can be shared to achieve single sign on, unified user management and unified permission management. Data resource layer: the data layer is the guarantee of the data resources of the whole project. Through the construction of the data resource system, the project realizes the comprehensive integration and sharing of data resources. Through the effective design and planning of the data layer, it realizes the effective classification and processing of the data resource database, unifies the data standard and format, and provides high reliability and high performance mass data storage and analysis ability. Infrastructure layer: Based on Wuhan e-government cloud, using cloud computing pool technology, build computing pool, storage pool, network pool and disaster recovery pool, according to the actual use of the application, realize dynamic expansion, on-demand distribution, and realize the sharing of the city’s data resources.

4.2 Technical Framework The system adopts the microservice technology framework based on spring cloud, integrates cloud computing technology, and adopts advanced and unified standards and technical practices. The system adopts the back-end development framework based on spring boot and builds a remote access platform based on B/S architecture to realize the standardization of technology and management. The system adopts the front-end development framework based on knockout.js, which is compatible with any mainstream browser, and uses any nested structure template to form the interface, so as to achieve a comprehensive and complete front-end specification. The system adopts unified basic platform and application platform, including operating system platform (Linux),

Monitoring and Analysis System of Municipal Private Economy …

139

database platform (MySQL) and application server middleware (Tomcat), to ensure the consistency and stability of the system. The system adopts rest style network interface, which is used for the interaction between client and server, to ensure that the interface is more concise, more hierarchical and easier to implement. Swagger is used in the system to manage the interface and realize the interface visualization and online testing. The system uses redis cache technology to reduce the database pressure and improve efficiency.

5 Conclusion The system adopts the current popular microservice architecture. Although the microservice architecture improves the development mode and enhances the stability and load capacity of the system, it also causes some other problems. Among these problems, the most important one is the problem of data. In the microservice architecture, the system functions are componentized and serviced when designing the system. Each microservice can be deployed independently, which also means that each microservice has its own independent database. At this time, we need to use big data technology. We can easily solve this problem by using spring cloud and MySQL. Through technical means, we can synchronize the data distributed in multiple databases to the MySQL Cluster, and carry out data cleaning in the process of data synchronization to meet the business needs of the system. Spring cloud’s support for MySQL is very friendly, which is mainly reflected in two aspects. On the one hand, spring cloud technology encapsulates many common methods, which are convenient for developers to use. On the other hand, spring boot also encapsulates many distributed computing related functions, which enables developers to realize query and statistics in a more concise way.

References 1. Lu L (2021) Discussion on the statistical monitoring method and system of private economy. Stat Theory Pract 2:69–77 (2021) 2. Luo L, Hu Q, Shang M (2021) Research on economic monitoring and forecasting ability based on big data. Dazhong Sci Technol 2:17–29 3. Liu W, Tian L, Wu W (2021) Research on statistical monitoring and evaluation system of high quality development of county economy under the new situation. Stat Theory Pract 1:67–72 4. Zhang J (2020) Research on economic monitoring and forecasting based on Internet big data— taking private economy as an example. Inf Syst Eng 7(2020):71–75 5. Tian R (2020) Application of big data technology in economic operation monitoring and analysis. China Econ Trade J Middle 4(2020):14–18 6. Wang J (2020) Application progress of big data in economic monitoring and forecasting. Data Anal Knowl Discov 1(2020):12–25 7. Liang M (2018) Construction of big data economy network public opinion monitoring system. Electron World 10(2018):80–91

140

X. Yu and C. Xie

8. Mao H, Ruan B (2018) Monitoring and research on big data economic operation in Zhuji City. Priv Technol 2(2018):182–190 9. Hua H, Jing H (2017) Literature review on the construction of economic growth monitoring and early warning index system in Shanxi Province. Financ Circ 18(2017):16–21 10. Qu Y (2017) Building an in-depth economic and financial monitoring and analysis system based on big data. Electron Financ 5(2017):40–49

Construction Safety Early Warning System of Power Transmission and Transformation Project Based on GIM Xin Liu, Lianyue Zheng, Yue Yang, and Xinyu Zhao

Abstract In the digital era, the construction of smart power grid puts forward higher requirements for engineering construction. In order to improve the level of security control and work efficiency of power transmission and transformation construction site, an intelligent early warning system based on video recognition and personnel positioning is developed, verified and applicated in this paper. The functions of timely collection of safety risks, accurate judgement of safety rules and real-time feedback of early warning results are realized. At the same time, through the positioning subsystem server and the on-site intelligent security behavior analysis server, the warning notice is converted into digital signal and linked with the on-site voice broadcast equipment to realize the on-site warning, informing and reminding function. Keywords Power transmission and transformation engineering · Intelligence security early warning · Video identity · Personnel positioning · GIM

1 Introduction In the digital era, the construction of smart power grid puts forward higher requirements for engineering construction. The construction site of power transmission and transformation project involves a large number of personnel in multiple professions and teams, and the construction work is carried out under the environment of high density, high risk and strict requirements. At present, the workload of safety supervision, code of conduct inspection and risk prevention is huge only depending on the project leader and safety officer. Also, there is a lack of effective auxiliary system to X. Liu · L. Zheng · Y. Yang State Grid Hebei Electric Power Company Cangzhou Power Supply Company, Cangzhou, Hebei, China X. Zhao (B) School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_15

141

142

X. Liu et al.

support. Therefore, it is of great significance to develop a construction safety early warning system suitable for power transmission and transformation projects [1, 2]. It is very important for the construction safety management of power transmission and transformation projects to quickly and accurately locate personnel on the construction site and identify violations by using the Internet of things technology [3–8]. The grid information model (GIM), with its advantages of datamation and visualization, has a broad development prospect in the construction safety early warning system of power transmission and transformation projects [9, 10]. Therefore, through the establishment of a visual construction management platform, this paper developed an intelligent prevention and early warning system for power transmission and transformation construction site based on video identification and personnel positioning and verified the application to improve the safety management level and work efficiency of the construction site.

2 Intelligent Early Warning Rule System After field investigation of power transmission and transformation projects of different voltage levels, intelligent early warning items and early warning rule system suitable for power transmission and transformation projects are sorted out respectively. Intelligent early warning items are shown in Table 1. Through intelligent video recognition, the following violations can be captured by video and a warning notice is issued at the same time. Table 1 Intelligent early warning items of power transmission and transformation project site Intelligent early warning items Safety isolation facilities set up in dangerous areas Arrangement of hole protection facilities Layout of construction electric facilities Safety passage arrangement Arrangement of dangerous goods protection facilities Arrangement of protective facilities for hoisting operation Arrangement of protective facilities for height work Alarm of dangerous area intrusion and crossing Not wearing a helmet Not wearing work clothes Not wearing a badge On duty and supervision of side station management Layout of protective facilities to prevent lightning strike and near power operation

Construction Safety Early Warning System of Power Transmission …

143

3 Personnel Location and Video Recognition Technology 3.1 RFID-Based Personnel Location Technology Based on RFID positioning technology, the movement track and movement area of construction personnel can be monitored in real time. Combined with the visual characteristics of GIM model, it can realize the early warning of unsafe behaviors of construction workers, so as to take measures quickly and effectively, improve the work efficiency of safety management personnel and prevent accidents.

3.1.1

The Architecture of the Positioning Subsystem

Personnel location management based on RFID technology adopts B/S architecture, it realizes MVC separation, business jump control and persistence layer support based on SSH framework (struts, spring and Hibernate). The system is divided into four layers: interface layer (UI), business logic layer, RFID location middleware layer and storage layer. The architecture is shown in Fig. 1.

3.1.2

Field Deployment and Application Deployment

Dongguang North 220 kV substation project is selected as the pilot project for this system. According to the site conditions, in order to meet the system functions and user needs, a set of positioning system servers should be deployed for the collection, analysis, uploading and local storage of the positioning data. Deploy RFID readers and reference tags whose locations are known to be fixed in batches. The field deployment diagram of substation RFID positioning equipment is shown in Fig. 2. The location subsystem is written and implemented by Java language and the SSH framework is adopted. The message system of RFID location middleware layer utilizes JMS and JMX frameworks. The JMS framework is used to process asynchronous information in the distributed system, while the JMX framework is used to uniformly manage processing components. The components of J2EE technology include JSP, Servlet, XML, JMS and JMX. Hibernate technology is used to realize the interaction with database. Eclipse 3.2 is used as the development tool. The deployment of the positioning subsystem application is shown in Fig. 3.

3.1.3

Function Design and Implementation

Based on user needs and management requirements, the positioning subsystem realizes the dynamic distribution of personnel in the construction area based on GIM, including personnel positioning, trajectories, statistics of attendance, in and out time

144

X. Liu et al.

Client browser interface

Boundary layer

Personnel informaon

Access control aendance records

Security training records

Physical examinaon records

Personnel posion

Personal trajectory

Aendance record

Side report

RFID-based personnel posioning service

Process engine

Logic layer Locaon informaon management subsystem

Personnel management system

RFID posioning

RFID middle layer

Data acquision

Data processing

Interface encapsulaon

Java interface

MySQL storage

Storage layer RFID posioning informaon

Personnel locaon informaon

Fig. 1 The overall architecture of the positioning subsystem Fig. 2 Field deployment

Workflow engine

Web Service Interface

Construction Safety Early Warning System of Power Transmission …

145

Fig. 3 Location subsystem application deployment

query, on-site time query and alarm of entering dangerous areas. The function list of the positioning subsystem is shown in Table 2.

3.2 Video Recognition Technology Through the construction of AI intelligent behavior safety monitoring and early warning subsystem, combined with 3D digital GIM resources, it can actively judge and locate multiple scenes in the construction site and specific scenes, such as whether to wear safety helmet, whether the safety officer is in place, whether to dress correctly, whether to set protective fence, whether to fasten safety belt, etc.

3.2.1

System Architecture

The system architecture of the video recognition subsystem is mainly composed of six parts: surveillance camera, POE switch, NVR (network video recorder), intelligent security behavior analysis server, security alarm system and service platform. Among them, surveillance camera, switch and NVR can reuse the original equipment, intelligent analysis server needs to be purchased separately and implanted with video recognition algorithm, security alarm system is built as a subsystem, external service platforms include other self-built management platforms of the unit, which can be used for service invocation through external API. The architecture of video recognition subsystem is shown in Fig. 4.

146

X. Liu et al.

Table 2 Function list of positioning subsystem Level 1 module

Level 2 module

Personnel positioning Personnel positioning

Functional description Including personnel location display, personnel location query (by name and time)

Trajectories

Based on the GIM map, the trajectories of the personnel can be displayed, the historical track can be inquired by the name and time of the personnel

Number of people present

Including real-time statistics of attendance, the name of people present and historical query of the number of people present. The statistical dimensions include units, project departments, dates, etc

In and out time

The entry and exit time of on-site personnel is displayed in the form of a list

Duration of presence

Including the total hours of all personnel. The timeout alarm function is realized by querying the name/unit/date of the person (a person present for more than 12 h is deemed to be overtime)

Alarm for entering dangerous area By presetting the dangerous area and the no-entry time, record the personnel who enter the specific working face area during the no-entry time and send out an alarm Fig. 4 Video recognition subsystem architecture

Construction Safety Early Warning System of Power Transmission …

147

Fig. 5 Image recognition model of CNN NN

Input layer

3.2.2

C1

S2

C3

S4

transmied to NN

Principle of Video Image Recognition

Video recognition technology is realized based on artificial neural network method and deep learning model. Convolutional neural network model (CNN) is adopted for deep learning of video image recognition. CNN is a multi-layer deep network with a special structure. It has greatly improved the target recognition rate and also plays a good role in the processing of high-resolution images. CNN consists of one or more convolution layers and pooling layers. In addition, there is a fully connected layer on the top layer. Neurons in CNN are divided into C and S elements, C-elements are used to resist deformation, S-elements are used to learn characteristics. The Selement includes sensory field and threshold parameter. Sensory field determines the size of input region in this layer and threshold parameter represents the sensitivity of the output to the input. The input data of the lowest layer in the CNN model is a small area in the image and the representative features of each layer are obtained by convolution operation. The image recognition model of CNN is shown in Fig. 5.

3.2.3

Video Recognition Scene

By combing the rules system of intelligent prevention and early warning in the construction site of power transmission and transformation, the video recognition scene is defined. Also, based on the image recognition model, some common violations and dangerous states are deeply studied. At present, the defined and implemented scenarios include: breaking into the area, not wearing safety helmet, not wearing safety belt in high altitude operation, not wearing correct clothes and not setting protective fence in dangerous area.

4 Security Intelligent Warning System 4.1 Overall System Architecture Aiming at the data synchronization of personnel positioning field information and 3D early warning system, this paper studies of 3D early warning system safety rules, the early warning feedback of field personnel, the linkage of video and early warning system, the identification of video information, the judgement of safety rules and

148 Fig. 6 Overall system architecture

X. Liu et al.

Applicaon layer

Plaorm layer

Network layer

Personnel posioning

Video idenficaon

Personnel locaon subsystem

On site warning

Video recognion subsystem

GIM 3D visualizaon warning

GIM 3D visualizaon

Regional autonomy network

Internet network

percepon layer Remote monitoring equipment

Intelligent idenficaon server

RFID reader

RFID tag

On-site alarm

early warning push, so as to realize the functions of timely collection of safety risks, accurate judgement of safety rules and real-time feedback of early warning results. At the same time, through the positioning subsystem server and the on-site intelligent security behavior analysis server, the warning notice is converted into digital signal and linked with the on-site voice broadcast equipment to realize the on-site warning and informing function. The overall architecture of the system is shown in Fig. 6.

4.2 Technology Roadmap Based on the field fusion of intelligent early warning system and GIM, the security intelligent early warning system is developed with Java language. The front-end user interface adopts bootstrap, the data chart adopts ecarts, the back-end framework uses spring MVC and hibernate, the database uses mysql. Firstly, the GIM project files are parsed by GIM parser and integrated into the column database according to the hierarchy of system, subsystem, equipment, components and parts. The distributed cache system Memcache is used to cache the database query results, so as to quickly query and check the model information and improve the access speed. The service layer uses eclipse Model Driven Architecture to transform the model into code efficiently and correctly. The client can exchange information based on GIM.

4.3 System Function According to the research scope of the project, the security intelligent early warning system is developed, which combines personnel positioning, video recognition and GIM 3D visualization. The functional structure of the system is shown in Fig. 7. Through the background management interface, engineering information, personnel data, label data, dangerous areas, video scenes, warning records can be viewed or modified; In the front display interface, information such as GIM 3D

Construction Safety Early Warning System of Power Transmission …

149

Fig. 7 Function structure diagram

visualization model, personnel positioning, trajectories, number of people present, duration of presence, in and out time and violation video recognition can be seen.

5 Conclusions In this paper, an intelligent prevention and early warning system for power transmission and transformation construction site based on video identification and personnel positioning is developed to realize the functions of timely collection of safety risks and real-time feedback of early warning results. At the same time, the warning notice is converted into digital signal and linked with the on-site voice broadcast equipment to realize the on-site warning, informing and reminding function.

References 1. Zhang J (2014) Analysis on intelligent safety early warning system of substation. Tech Entrepreneur 08:249 (in Chinese) 2. Ma R (2020) Application of intelligent early warning information system in construction project safety production management. Eng Constr Des 09:168–170 (in Chinese) 3. Chen J, Zheng Y, Zhang J, Chen L, Zhu H (2020) Application of construction safety control based on internet of things technology. Integr Circ Appl 37(01):78–79 (in Chinese) 4. Gai Y (2021) Human behavior recognition technology based on deep learning. Inf Technol Inf 05:143–144 (in Chinese) 5. Li Q, Yang W, Chen X, Yuan T, Wang Y (2020) Human motion recognition model based on tightly coupled spatiotemporal double-flow convolutional neural network. Comput Appl 40(11):3178–3183 (in Chinese) 6. Zhou X (2020) Application of video recognition in intelligent building. Mod Inf Technol 4(15):108–110 (in Chinese) 7. Zhou Q (2020) Job alarm system based on intelligent video recognition technology. Electron Des Eng 28(05):31–35 (in Chinese)

150

X. Liu et al.

8. Li X (2020) Research on human action recognition in video scene based on deep learning. Digit Technol Appl 38(09):62–64 (in Chinese) 9. Ding K (2020) Research on building intelligent grid information sharing platform with GIM technology. China Equip Eng 02:33–34 (in Chinese) 10. Sheng D, Qie X, Hu J, Wu Z, Qi L (2013) Develop GIM technology and build a smart grid information sharing platform. Electr Power Constr 34(08):1–5 (in Chinese)

Mine Escape Path Planning Algorithm Based on Simulation Model Technology Guoju Lu, Guofei Zhao, and Liya Yu

Abstract When a disaster accident occurs, choosing an escape route quickly and reasonably can not only reduce unnecessary economic losses as much as possible, but also effectively protect the lives of the people. The choice of escape route belongs to the optimal route choice problem in the route planning problem. In recent years, its importance has become more prominent, and it is regarded as a hot spot in many fields for key research. In the field of mine safety, the correct choice of the optimal path can enable underground workers to escape to a safe area in the fastest time when a disaster occurs. The purpose of this paper is to study the algorithm of mine escape route planning based on simulation model technology. After analyzing the related algorithms of path planning, the comparison and selection of algorithms, the Dijkstra algorithm is improved, and various improvement strategies are proposed for various problems existing in the mine. Finally, the improved Dijkstra algorithm is applied to the mine underground point network model during the catastrophe period for simulation experiments. The experimental results show that the improved algorithm can indeed find the optimal escape exit through a single calculation, which basically achieves the purpose of the design. Keywords Simulation model technology · Mine escape · Path planning · Algorithm improvement

1 Introduction For a long time, emergencies such as natural disasters and mining accidents have threatened people’s lives and brought huge losses to social properties [1, 2]. The governments of various countries have formulated various emergency rescue strategies to reduce the losses caused by risks as much as possible. Emergency rescue refers to a series of rescue measures taken by the emergency rescue department when a disaster accident occurs, so as to minimize the loss caused by the emergency [3, 4]. G. Lu (B) · G. Zhao · L. Yu Shanxi Institute of Energy, Jinzhong 030600, Shanxi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_16

151

152

G. Lu et al.

Path planning has been favored by researchers in various disciplines in recent years, and the optimal path selection problem has been favored by various research fields (computer field, geographic information system field, etc.) [5, 6]. In the computer field, different path planning algorithms are usually explained by means of different network models in graph theory, and the best choice path can be found by simulating different algorithms in specific situations [7, 8]. With the progress of the times, the deep coupling between the applied mathematics field with spatial analytical geometry as the mainstream development and the computer field has enabled the traditional graph theory to develop by leaps and bounds, making it possible to simulate and solve practical problems on a larger and larger scale. With the continuous improvement of computing efficiency, space storage efficiency, and application requirements, the optimal path selection algorithm has also been continuously improved and perfected [9, 10]. This paper improves the Dijkstra algorithm after analyzing the related algorithms of path planning, the comparison and selection of algorithms, and proposes various improvement strategies for various problems existing in the mine. Finally, the improved Dijkstra algorithm is applied to the mine underground point network model during the catastrophe period for simulation experiments.

2 Research on the Algorithm of Mine Escape Route Planning 2.1 Path Planning Related Algorithms (1)

Dijkstra algorithm

Dijkstra algorithm is the most well-known algorithm. As a typical shortest path algorithm, it has been widely used in solving shortest path problems since it was proposed in the 1950s. Its proposal laid a theoretical foundation for the solution of the shortest path in the path-solving problem [11, 12]. The solution idea of Dijkstra algorithm is a relatively iterative process, sorting the obtained paths, and selecting the one with the smallest path value as the shortest path. This solution idea was relatively advanced in the 1950s, and it was similar to the outward expansion of water ripples until the target node was found. In the case of a relatively simple road network, Dijkstra’s algorithm has a very high execution efficiency. It does not need to consider too many factors. It only needs to look out in circles according to the pre-designed steps. It can be said that the algorithm’s search is oriented to all directions, but there is no relatively fixed search route. (2)

A* algorithm

In order to reduce the resource waste and inefficiency caused by blind search, there has been a wave of exploration of new algorithms. The most influential one is the

Mine Escape Path Planning Algorithm Based on Simulation …

153

heuristic algorithm. The so-called heuristic algorithm means that the search of the algorithm is targeted and makes the search path. Try to focus on the target node instead of aimlessly searching like traditional algorithms. The most typical of these is the A* algorithm. As the earliest heuristic algorithm, it brings innovative changes to path planning, greatly reduces the search space, and improves the efficiency of algorithm execution. The reason why the A* algorithm can greatly shorten the search time lies in the change of its search strategy. It does not traverse all the branch nodes to find the path, but chooses the best node through continuous expansion and mutual comparison. It expands, and other nodes are discarded. It is a search algorithm with a certain priority. Nowadays, A* algorithm has played its key role in many fields. Because it is a heuristic search algorithm, different heuristic information can be set to perform different operations. This is also one of the reasons why it can be applied to many different fields. For example, in path planning, the heuristic information can be changed to the shortest distance, then the searched path must be the shortest path; if the cost is required to be the smallest, you can use the heuristic. The information is set to the least cost, so that the result of the algorithm execution must be the least costly, and so on. The introduction of heuristic information greatly reduces the search space, but there may be errors. After all, the entire road network is not searched, so it lacks completeness. Moreover, to introduce heuristic information into the algorithm, it is necessary to design a well-designed introduction strategy, otherwise the error of the algorithm will be greater. (3)

Biomimetic algorithm

The evolution and development of the ecosystem in nature has brought people new inspirations. Based on this, a new algorithm, a biomimetic algorithm, appeared. It solves some complex problems in reality by simulating some ecological laws in nature. Its appearance adds new brilliance to the existing algorithms and further improves the path planning problem. In recent years, with people’s further exploration of biomimetic algorithms, a variety of biomimetic algorithms have been developed according to different biological characteristics, such as ant colony algorithm, artificial immune algorithm, genetic algorithm, etc. The most typical of which is ant colony algorithm. Literally, the ant colony algorithm solves problems by imitating some of the living habits of the ant colony. Since ants do not have vision, how do they choose roads? This question has entered the field of vision of bionicians. Through long-term observation, they found that ants have wonderful road choices. Although they do not have visual organs, they will be in Leave a mark on the passing road to mark the route when returning. This marker is a substance secreted by the ant’s organs, later collectively referred to as pheromone, which is a volatile substance, and its concentration will gradually decrease over time. If the road is short, the ants will feel a high concentration when they come back. If the road is long, the concentration will be very low. In this way, the ants can know the length of the road. When the ant colony is foraging, there are many paths leading to things, and the pioneer ants in the ant colony will walk

154

G. Lu et al.

all the paths. Later ants made corresponding choices based on the concentration of pheromone left on the path. Most ants would choose a path with a high pheromone concentration, because a high pheromone concentration means a short path, so the cycle continues and the more ants walk the higher the concentration of pheromone. Over time, the path with high pheromone concentration will be determined, and other paths will be discarded, so that the ant colony completes a path selection, and the next time it passes, it will choose this road to pass. Based on this, bionicians have developed an ant colony algorithm, which has been applied in many fields in reality by simulating the foraging habits of ants.

2.2 Comparison and Selection of Algorithms As can be seen from Table 1, among the four algorithms, the A* algorithm has the smallest time complexity. As a heuristic algorithm, the A* algorithm can avoid some non-optimal nodes from the beginning, and the number of nodes searched is small. Therefore, it is faster than Dijkstra’s algorithm in search speed. However, the A* algorithm belongs to static path planning, and the search accuracy of the algorithm strongly depends on the constructed heuristic function H (x). The heuristic function is very sensitive to the changes of each node in the network. Once the state of some nodes changes, a new evaluation function must be redesigned, otherwise there will be a local optimal solution or even no solution. The underground mine roadway in the disaster period is under a kind of “semi-dynamic situation. The so-called “semidynamic” means that the traffic state of most roadway nodes remains unchanged; but due to disasters, a small number of nodes will be affected by various disasters are no longer accessible for humans. Corresponding to the network diagram, the weights of some nodes have undergone major changes. Due to the unpredictability of underground disasters, the A* algorithm is used when the status of underground nodes cannot be clarified in advance. It is more difficult to realize the path planning of coal mines during disasters. The ant colony algorithm has a high rate of success, but it needs to send multiple ants to walk to each node repeatedly, continuously iteratively process, and adjust the pheromone concentration on the road to find the optimal solution. In the process of solving, there are disadvantages such as slow convergence speed and high time complexity. Moreover, underground coal mines belong to a dynamic environment Table 1 Three algorithm performance parameter table Algorithm

Number of search nodes

Time complexity

Dijkstra

n

o(n2 )

A*

About 0.5n

o(n2 )

Ant colony algorithm

n

o(n4 )

Mine Escape Path Planning Algorithm Based on Simulation …

155

during disasters. Whenever a disaster occurs in the tunnel, the node needs to be reconverged. Otherwise, the residual pheromone on the original road will be misleading and may lead employees to the most extreme. You can even go to dangerous areas. Therefore, it is untimely to use ant colony algorithm in the environment of emergency evacuation in mines. The Dijkstra algorithm is very reliable and can always solve the optimal escape route 100%. Due to the principle limitation of the Dijkstra algorithm, it will try to find the shortest path from the source node to all other nodes in the network graph when calculating the single shortest path. There is a large amount of useless calculation in the calculation process. This shortcoming will cause greater computational complexity in the general single-source single-sink problem, but in the case of multiple escape exits in the well, proper use of this point can instead solve the gap between the starting point and each exit at one time. The algorithm only needs to be modified slightly to find out which exit the trapped personnel should choose as the real escape target. This is exactly what the A* algorithm does not have. In summary, this article will use Djjkstra algorithm as the core algorithm of underground mine emergency evacuation path planning. However, since Dijkstra’s algorithm still has related defects in its computational efficiency and the storage space occupied by the adjacency matrix, a series of improvements will be made to it.

2.3 Improvement of Dijkstra’s Algorithm Although the search accuracy of the classic Dijkstra algorithm is very high, there are still some shortcomings. Generally, for a network graph with n nodes, Dijkstra’s algorithm requires the construction of an adjacency matrix of order n2 at the beginning of the operation, where matrix element Aij represents the distance value from node i to node j, and specifies that if node i and If the nodes j are not directly connected, the value of the element Aij is set to infinity. If i = j, then Aij = 0, that is, the distance from the node to itself is 0. When the value of n is relatively large, since the number of neighbor nodes of each node in the network graph is always limited, the n-th order connection matrix corresponding to the algorithm is a sparse matrix with very low effective element content. In response to this problem, an improved adjacency table is used to perform an appropriate dimensionality reduction operation on the connection matrix, which reduces the computer memory occupied by the algorithm and improves the addressing efficiency. At the same time, in the calculation process of Dijkstra’s algorithm, intermediate and indirect continuation nodes are generally stored in an unordered list. Every time you find the intermediate node with the smallest weight, a lot of comparison work is required, and the calculation efficiency is very low. In response to this problem, a binary sorting tree is introduced, which sorts the successive nodes from small to large, reduces meaningless comparison calculations and improves the efficiency of the algorithm.

156

G. Lu et al.

3 Experiment 3.1 Basic Requirements for Path Planning in Underground Mines

(1)

Escape speed requirements

This is the most basic requirement for underground emergency path planning. In the case of various disasters in the mine, the probability of a trapped miner’s survival is inversely proportional to the trapped time. The longer the trapped time, the lower the probability of survival. Therefore, it is necessary to consider the impact of a series of related factors such as the roadway’s own environment and the correct choice of escape targets on the escape speed. In many cases, according to the shortest path obtained by the static roadway map, the escape time of personnel is not necessarily the shortest. (2)

Real-time requirements

After a disaster occurs underground, the internal environment of the tunnel is in a dynamic change. Even if it is the optimal route planned before, it may become a non-optimal solution after a period of time, or some nodes of the route may be inaccessible due to the spread of disasters. The modern coal mine ground dispatching system generally realizes the collection and processing of various information of coal mine tunnels through the underground industrial ring network, which guarantees the safety and stability of underground signal transmission to the greatest extent. Based on the various information collected, the changes of nodes can be sensed in real time, and the system environment data can be updated in time after the destructive changes of the optimal escape path node originally planned, and the escape path of the miners can be re-planned based on these data. (3)

Safety requirements

The design purpose of underground emergency path planning is to enable the disasterstricken and trapped miners to evacuate the dangerous zone as soon as possible. The safety requirement is the most important requirement of the system, and the safety and accessibility of the escape nodes must be ensured at all times. The changes of the roadway nodes can be monitored in real time through the underground safety monitoring network, but the gathering effect of the crowd after the disaster is more difficult to control. In an emergency, the crowd gathered together due to the herd mentality is in a state of panic, and it is extremely prone to trampling and other man-made casualties. Therefore, it is necessary to avoid excessive crowd gathering when planning.

Mine Escape Path Planning Algorithm Based on Simulation …

157

3.2 Modeling To use the Djkstra algorithm to solve the optimal escape route in the coal mine, it is necessary to combine the needs of the underground and conduct a targeted analysis. The emergency escape path planning is summarized as a mathematical model. The goal of the model is to minimize the total escape time in Ti of all trapped miners under the premise of satisfying various constraints underground: Min

n 

Ti = T1 + T2 + · · · + Tn

(1)

i

 Among them, in Ti represents the total escape time of miners, Ti represents the time required for the ith miner to escape, and n is the total number of miners trapped underground. Under the condition that the escape speed of underground miners is roughly the same, the overall escape distance that needs to be confirmed is also the shortest if the shortest escape time is required. Therefore, the problem can be transformed into Min



 path i

(2)

path i = (G(N ode1 , N ode2 ) + G(N ode2 , N ode3 ) . . . G(N oden−1 , N oden )) (3) In the formula, pathi represents the total road length experienced by user i, and N ode j represents the node j passed by user i. The distance between two nodes is represented by G(Noden−1 , Noden ).

3.3 Simulation Experiment A simulation environment for underground emergency evacuation was built using Matlab software. The platform parameters are as follows: CPU: AMD Ryzen5 [email protected] GHz. Memory: 16 GB DDR4. Operating system: WIN10 64 bit. Matlab version number: 2016b. The total number of outlets in the underground dot network model is 3, the total number of internal nodes of the dot network is 217, and the number of internal workers in the dot network model is set to 20 in each test. The simulation experiment will carry out confirmatory experiments for various improved search strategies to verify whether the algorithm has achieved the design purpose.

158

G. Lu et al.

4 Discussion 4.1 Selection of the Best Exit for Escape The experiment process is divided into two groups, one group adopts an improved strategy and compares the classic Dijkstra algorithm to find the shortest path. The results of five experiments are shown in Table 2. Since the positions of underground personnel are randomly distributed during each experiment, there are some differences in the calculation time of the same algorithm in the five simulation experiments. But on the whole, the ratio of the computing time consumed by the Djkstra algorithm and the algorithm after using the improved search strategy is close to the number of exports of 3, which is almost the same as the estimated value, which proves that the improved algorithm can indeed find the best value through a single calculation. The excellent escape exit basically achieves the purpose of the design (Fig. 1). Table 2 Five experimental simulation results Classic Dijkstra algorithm (s)

Improvement strategy (s)

The first simulation time-consuming

25.23

7.95

The second simulation time-consuming

27.75

8.09

The third simulation time-consuming

26.92

8.41

The fourth simulation time-consuming

30.97

9.38

The fifth simulation time-consuming

32.12

9.23

40

Classic Dijkstra algorithm

Improvement strategy

Time

30 20 10 0 first

second

third Times

Fig. 1 Five experimental simulation results

fourth

fifth

Mine Escape Path Planning Algorithm Based on Simulation … Improved average distance of Djkstra algorithm Anti-congestion strategy average distance Improved Djkstra algorithm average evacuation time Anti-congestion strategy average evacuation time

3000 distance/tume

159

2000 1000 0

first

second

third Times

fourth

fifth

Fig. 2 Comparison of algorithm parameters after multiple planning

4.2 Crowd Congestion Strategy Figure 2 shows the average escape distance and average escape time of mine personnel based on improved Djkstra algorithm and anti-congestion strategy after multiple simulation experiments. In the experiment, the positions of the underground personnel at the beginning of each simulation are randomly refreshed and the distribution is set. The average moving speed of the miners is set to 0.9 m/s. Considering that the number of people in this experiment is relatively small, it is enlarged according to the ratio of 1:5. The number of popular nodes on the path is related to the number of people in the roadway. The value of the congestion influence coefficient K is related to the number of people in the roadway. This experiment is set to 1.3. The data of the average distance S in the table is measured by experiments. SD and SC represent the average distance under the improved Djkstra algorithm and the anti-congestion strategy respectively, and TD and TC represent the average evacuation time of the improved Djkstra algorithm and the anti-congestion strategy respectively.  It can be seen from the data in the figure that the overall evacuation time in Ti of people underground is reduced by about 15.5% after the evacuation of people using the anti-congestion strategy.

5 Conclusions Based on the classic Dijkstra algorithm based on the classic Dijkstra algorithm, an emergency path planning algorithm suitable for underground mines is proposed by analyzing the actual requirements for path planning in underground mines during disasters. The results of simulation experiments show that compared with the classic Dijkstra algorithm, the path planning algorithm in the paper has improved planning

160

G. Lu et al.

speed and overall escape time, which provides a certain reference for underground emergency path planning. Acknowledgements Fund project: Science and Technology Research Fund for Young People— Study on grey optimization method of coalbed methane area guided by multi-attribute subjective and objective factors, Item no. 201901D211452.

References 1. Uchino G, Yoshida H, Sakoda N et al (2017) Outlet strut fracture and leaflet escape of BjorkShiley convexo–concave valve. Gen Thorac Cardiovasc Surg 65(6):358–360 2. Kaffa NS, Sukojo BM, Handayani HH (2021) Tiga Dihaji Dam access route plan alternative using geographic information system (cost distance method). IOP Conf Ser Earth Environ Sci 731(1):012007 (11pp) 3. Naus K (2019) Drafting route plan templates for ships on the basis of AIS historical data. J Navig 73(3):1–20 4. Dib O, Moalic L, Manier MA et al (2017) An advanced GA-VNS combination for multicriteria route planning in public transit networks. Exp Syst Appl 72:67–82 5. Pham QD, Le KT, Nguyen HT et al (2017) A constraint-based local search for offline and online general vehicle routing. Int J Artif Intell Tools 26(02):1750004 6. Hwang HG, Kim BS et al (2017). An evaluation of effectiveness for providing safety navigation supporting service: focused on route plan sharing service. J Korea Inst Inf Commun Eng 21(3):620–628 7. Conesa-Munoz J, Pajares G, Ribeiro A (2016) Mix-opt: a new route operator for optimal coverage path planning for a fleet in an agricultural environment. Exp Syst Appl 54:364–378 8. Yang MS (2018) Application of triangular fuzzy numbers for route selection of ShanghaiNanjing intercity railway. J Railw Eng Soc 35(6):7–10 9. Zhang JD, Feng YJ, Shi FF et al (2016) Vehicle routing in urban areas based on the oil consumption weight-Dijkstra algorithm. IET Intell Transp Syst 10(7):495–502 10. Lu L, Gao J (2021) Research on aircraft taxiing path optimization based on digraph model and Dijkstra algorithm. IOP Conf Ser Mater Sci Eng 1043(4):042045 11. Yipeng LU, Xian XU, Luo Y (2019) Path planning for rolling locomotion of polyhedral tensegrity robots based on Dijkstra algorithm. J Int Assoc Shell Spat Struct 60(4):273–286 12. Mena FM, Ucan RH, Cetina VU et al (2016) Web service composition using the bidirectional Dijkstra algorithm. IEEE Lat Am Trans 14(5):2522–2528

Design and Implementation of the Drug Traceability System Based on Block Chain Technology Hongjin Li and Han Li

Abstract Drug traceability is a system that supervises the production and circulation of drugs through the electronic supervision system of drugs. If problems occur, they can be traced back to the system. Since the development of the society, drug use safety is walking into people’s concern and becomes a hot spot in people’s life. This article is based on the alliance block chain Hyper ledger Fabric technology, combined with existing drug production, warehousing, logistics, and sales models for research, and proposes the drug anti-counterfeiting traceability system implementation plans, with the help of distributed ledgers, smart contracts, and consensus Mechanisms and other technologies write drug data into the block chain to ensure the safety of drug information. It is also for consumers, quality inspection agencies and the State Food and Drug Administration to trace the source of drugs. Using block chain technology, during the entire process of drug supply, various related information of drugs is automatically recorded and stored, and a traceability and anti-counterfeiting system is established for the whole process from production and processing to sales, so as to solve problems such as the source and safety of drugs, and guarantee The quality and safety of medicines, while realizing decentralized, secure, and non-tamperable medical data sharing, contribute to the shared medical resources in the context of my country’s medical big data. Keywords Drug traceability · Security · Block chain

1 Introduction Medicine is a kind of special commodity which is closely related to people’s health. Safe drug use is a medical term for doctors. For patients, the price, side effects, sources of drugs have always been a particular concern, but when they are not in a good condition, anxiety and other emotions will make patients ignore the quality of drugs. It can be seen that the society has higher and higher requirements for the H. Li (B) · H. Li Zunyi Medical University, Zunyi, Guizhou, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_17

161

162

H. Li and H. Li

informatization of drug production and management. This paper is an attempt to design and implement in the field of drug traceability based on block chain technology. Drug safety is important in the field of health care, and emerging block chain technology has the characteristics of open cut in sharing data, in the chain of blocks are stored in the database is Shared between participants trade record, so that you can achieve safe, reasonable, effective and economic drug use, make the patients, patients’ families and doctors to intuitive understanding to the source of the drug, Don’t worry about the use of medicine [1–4].

2 Technical Introduction 2.1 Block Chain Technology The essence of block chain is a distributed and decentralized shared database. Based on its characteristics of “non-forgeable”, “whole-process trace”, “traceable”, “open and transparent”, “collective maintenance” and so on, block chain technology lays a solid foundation of “trust” and creates a reliable mechanism of “cooperation”, which based on cryptographic principles allows any two willing parts to transact directly. In addition, block chain ledgers are distributed and anyone can access the publicly available data in the system. The primary medium through which data is stored in a block chain network is a chain-like structure of blocks, all of which are time stamped so that they can be easily traced. The basic feature of block chain system is decentralization. In this system, there is no central payment and clearing system, and information between nodes can be directly interacted with each other. The damage of any node will not affect the operation of the whole network. This decentralized system has advantages such as high transaction efficiency, low maintenance cost and high obligation continuity. Block chain uses cryptography and digital signatures to protect data and verify transactions which keeps a sense of safety for users. Generally speaking, block chain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer. The data layer encapsulates the underlying data block, the related data encryption, time stamps and other basic data and basic algorithms. The network layer includes distributed networking mechanism, data transmission mechanism and data verification mechanism. The consensus layer mainly encapsulates all kinds of consensus algorithms of network nodes. The incentive layer integrates economic factors into the block chain technology system, mainly including the issuing mechanism and distribution mechanism of economic incentives. The contract layer mainly encapsulates all kinds of scripts, algorithms and smart contracts, which is the basis of the programmable characteristics of block chain. The application layer encapsulates various application scenarios and cases of block chain. In this model, chain block structure and economic incentive are the most representative innovation points of block chain technology.

Design and Implementation of the Drug Traceability System …

163

2.2 System Development Environment The system uses JAVA to develop the back-end client, taking IDEA as the development platform; Using SQL Server 2005 as the database platform; Develop a standalone front end with HTML5 and JavaScript, and take Web Storm as the development platform; JetBrains Goland 2019 is the development platform for the block chain code written in GO language. This system consists of interaction, core and basic three modules. Users are divided into two categories: drug manufacturers and sellers can access and release drug ingredient information and transit information through the browser, and consumers can log in to access and view these information. The back-end client can manage users and published drugs and implement other business.

3 Establish Drug Traceability System Model The drug traceability system is divided into three modules with a six-layer architecture, as shown in Fig. 1. Different APIs are used between each module. Node.js SDK is used for the interaction module, and GRPC interface is used between the core module and the basic module. The data layer is realized by using Couch DB as the distributed shared ledger storage system. The production information, component information and transit information of drugs are stored in the system in the JSON format, and complex business queries are completed with the help of its native JSON and byte array operations. At the same time, the drug information can be accessed in a secure container, and the drug information cannot be tampered with through security and password service. The upper layer can complete the maintenance of

Fig. 1 Functional structure diagram of drug traceability system

164

H. Li and H. Li

ledger data and state database through API. Network layer: this layer carries out P2P distribution of ledger information, status information, member information and other data of drug traceability system based on Gossip protocol. Use Gossip to connect the sorting service to Peer nodes, efficiently completing the task of synchronizing data distribution from one source node to all nodes. Use MSP to complete the member information management and maintenance, and determine the member in the normal state or failure state. Consensus layer: the system sends the transaction proposal to the endorsement node according to the specified endorsement strategy, and digitally signs the result using ESCC and returns it to the application program through simulated execution. After confirming that the execution results of all endorsement nodes are identical, the application packages the transaction proposal, proposal response and endorsement signature to generate the transaction broadcast to the sorting node. The sorting node uses the KAFCA streaming service to put the transaction into the message queue, package the transaction into blocks according to the transaction order, and broadcast the transaction to the Peer node to verify the validity of the transaction. Contract layer: intelligent contract is realized through Chain code, including business logic of drug endorsement, initiating drug ingredient information endorsement, transit information endorsement, drug information query, ingredient information query, transit information query, etc. Business layer: the front-end part of the business processing is completed through the Restful interface. The back end completes user management and drug management, and uses the Node.js SDK provided by Hyper ledger fabric to communicate with the block chain network. At the same time, the business layer can also conduct data interaction with other business systems. Application layer: This layer takes HTML, CSS and Angular JS as the front-end framework to provide users with page interactive operations, including user operations and business operations. The user part is built in at the bottom and provides only login and logout operations for the user. The business part includes the completion of drug information release, composition information writing and drug transit information updating by the manufacturer; Consumers, quality inspection agencies and regulators to achieve drug information query.

4 Implementation of Drug Traceability First of all, the drug manufacturer, the logistics organization and the seller initiate the drug information transaction proposal. After the transaction information is confirmed, the drug-related data is stored in the blockchain, and the system synchronizes the data of each participating party node. Then, consumers, quality inspection agencies and regulators can verify the authenticity of the entire supply chain information of the drug according to the unique identification code of the drug. Detailed drug traceability information is like this before: 1.

Inquire the basic information of drugs. As shown in Table 1, the name, specification, production date, shelf life, batch number, production license number,

Drug arrival time

2020.09.10

Drug Departure Time

2020.09.01

Table 1 Basic information of the drug

Transportation

Storage or transportation X City

origin Y City

destination Pharmaceutical company

seller Railway

Shipping method

X Company

Logistics Company

$200

Cost

Design and Implementation of the Drug Traceability System … 165

166

H. Li and H. Li

Table 2 Drug composition information

2.

3.

Component ID

Component details (mg)

001

Acetaminophen 250

002

Hydrocarbamide 100

003

Benamine maleate 2

004

Artificial bezoar 10

005

Caffeine 15

manufacturer name, ex-factory price, production location and other information of the drug can be inquired through the unique identification code of the drug. Inquire drug ingredient information. As shown in Table 2, the ingredient ID and the corresponding ingredient details can be queried based on the unique drug identification code. Inquire drug transfer information. The information of departure time, arrival time, storage or transportation, origin place, destination, seller, storage time, transportation method, logistics company name, cost and so on can be searched through the unique identification code of the drug.

This system classifies the key information of each link from production to transportation to sales [5]. Drug production information: distinct identification code, name, specification, production date, shelf life, product batch number, production license number, name of manufacturer, production location, ex-factory price [6]; Drug ingredient information: distinct identification code, ingredient ID, ingredient name [7]; Drug transit information: distinct identification code, departure time, arrival time, storage and transportation, origin place, destination, seller, storage time, transportation method, name of logistics company, transit cost [8]. After the above classification, the use of block chain system to trace drug-related information not only facilitates the inspection of drug production information by quality inspection agencies, but also provides consumers with transparent and assured detailed drug information [9, 10], and provides the regulatory authorities with the necessary basis for review.

5 Summary In this paper, a drug traceability system based on block chain was designed based on the actual application scenarios of drugs. With drugs as the traceability object and based on the Hyper ledger Fabric technology of the alliance block chain, data were recorded and tracked in the process of drug production, processing, logistics, transportation and retail use. The traceability information of the drug can be obtained by querying the drug traceability source code by the client. Block chain technique and the technique of roots can further improve the performance of the pharmaceutical

Design and Implementation of the Drug Traceability System …

167

anti-counterfeiting system roots. Based on the block chain technology decentralization, the data is difficult to tamper. Meanwhile, it can be traced back to each participant on the chain, which improves the transparency of medical traceability information security, and ensures that consumers can know all the information from the production to the use of the drug by querying the unique identification code of the drug. How to effectively solve the effective and accurate “medicine to the case” doctors, reduce doctor-patient disputes, how to solve the safe use of drugs, how to solve the quality and safety of the drug itself, only to avoid the drug false, these are the original intention and expectation of the design and implementation of this system. At present, block chain technology at home and abroad are still in the primary stage of development, but in the future, block chain technology will be used in many fields, especially in the field of medical and health care. Block chain-based drug traceability system will escort people’s medication and other problems. This paper proposes an implementation scheme of drug anti-counterfeiting traceability system for sharing medical resources under the background of medical big data in China. Acknowledgements Foundation Project: Guizhou Provincial Science and Technology Plan Project (No.: Talents of Guizhou Science and Technology Cooperation Platform [2018] 5772-050); Zunyi Science and Technology Project (No.: Zunyi Science and Technology Cooperation HZ [2020] No. 43).

References 1. Xue T, Fu Q, Wang Z et al (2019) Research on the medical data sharing mode based on blockchain. ACTA Autom Sin 43(09):1555–1562 2. Zhang W, Li Y (2019) Drug traceability scheme from the perspective block chain technology. Mod Enterpr 09:58–59 3. Feng X, Sun T, Guo X et al (2019) Research on application of block chain technology in drug traceability. Netw Secur Technol Appl 07:101–102 4. Liu P, Zhang B, Yuan Z et al (2019) Research and development of drug traceability system based on block chain. Inf Commun 04:162–164 5. Yuan Y, Wang F (2016) Blockchain: the state of the art and future trends. ACTA Autom Sin 42(04):481–494 6. Ma D (2020) FRID-based drug production management and packaging information. J Qual Goods 01:246 7. Wang Y (2020) Research and analysis of the chemical components of natural medicines. Jiangsu Salt Sci Technol 47(05):34–35 8. Wang W, Xi J (2021) Problems and countermeasures of storage and transportation of drugs in logistics enterprises. China Pharm 30(03):04–06 9. Liu T, Chen Z, Song X (2021) Research and application of drug traceability system based on blockchain technology. J Zhejiang Wanli Univ 34(02):78–85 10. Sang L, Ding W, Zhou L (2020) Application of blockchain technologies in the intelligent supervision of drugs. Chin J Med Guide 22(09):659–660

Using ARM Technology to Build a Rail Transit Catenary Wear Detection Operation Platform Yang Yang and Zhiqi Wei

Abstract The bow network system is a key component of the urban rail transit power supply system. It bears the important responsibility of transmitting electric energy from the traction network to the train. If there are any abnormalities or diseases in this process, if they are not found and dealt with in time, may lead to serious consequences. In the context of non-contact detection methods based on image processing technology, in order to accurately, quickly and effectively detect various wear and tear diseases of the pantograph and catenary, it is necessary to adopt different detection schemes for different components and different environments. By studying machine vision-based pantograph and catenary wear disease detection algorithms, it can provide new ideas and methods for the development of domestic rail transit system detection automation and intelligence, and further implement automatic detection. The technology lays the foundation, has strong use value and development prospects, and further promotes the development of China’s rail transit industry. This article uses ARM technology to build an operating platform and uses ZigBee technology for data transmission. The data transmission speed is fast and the stability is strong. The handheld data terminal has a small body and powerful functions. It uses the latest Android operating system. Based on the above principles, this article uses ARM technology to build a rail transit catenary wear detection operation platform, uses the measured data of the city’s rail transit lines and uses the model to simulate according to the algorithm to find the best fit between the abrasion factors and the amount of wear. The simulation process of the contact wire wear was completed, and finally the prediction of the contact wire wear was successfully realized, and the result analysis was carried out. The results show that the data with a relative error of less than 10% reaches 100%, which has a high degree of credibility. If the number of learning samples of the contact line wear prediction model is expanded, for example, the data of the entire line measured by the catenary detection system, the use of ARM technology to build the rail transit catenary Y. Yang (B) · Z. Wei Nanchang Institute of Technology, Nanchang, Jiangxi, China e-mail: [email protected] Y. Yang Bansomedjchaopraya Rajabhat University, Bangkok, Thailand © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_18

169

170

Y. Yang and Z. Wei

wear detection operation platform will have higher prediction accuracy and more reference value. Keywords ARM technology · Traffic catenary · Wear detection · ZigBee technology

1 Introduction With the rapid development of our country’s railway industry, the number of railway mileage is increasing year by year, and it is estimated that the total mileage will reach 145,000 km by the end of the “13th Five-Year Plan” period. At the same time, the speed of high-speed trains has reached more than 300 km/h, and our country’s railway industry is thriving [1, 2]. However, with the long-term use of rails in railways and the increase in train speeds, the surface of the rails is prone to various wear defects, such as wave-shaped wear, cracks, and side wear. These defects will shorten the service life of rails and increase the cost of railway operation [3, 4]. Moreover, if the rail defects are not detected and dealt with in time, it is very easy to cause railway safety accidents and bring economic losses and personal threats to the country and the people. Therefore, rail wear detection is of great significance for railway safety transportation, reducing railway operating costs and reducing economic losses [5, 6]. At present, non-contact image detection methods are used in China to detect pantograph diseases, while foreign pantograph detection methods are mainly divided into non-image processing methods and image processing methods [7]. Japan’s JR Tokai Company has developed an alarm-type contact wire wear detection system. According to the different embedded objects, the alarm detection system can be divided into two types: embedded wire type and embedded fiber type [8]. When the embedded object is a wire, when the wear of the catenary reaches the limit, the insulation layer of the detection line is destroyed, causing the detection line to contact the catenary or the detection line is disconnected, the detection device will sound an alarm, and then the maintenance personnel will take care of it. When the embedded object is an optical fiber, when the pulsed light is irradiated into the optical fiber, a small amount of Rayleigh scattered light will be generated inside the optical fiber to return to the side of the light source [9]. The intensity of the scattered light is constant in the length direction of the optical fiber, and because the propagation speed of the laser light in the optical fiber is constant, the wear state in the length direction of the optical fiber can be known by measuring the intensity of the Rayleigh scattered light at each time period. When the optical fiber is broken due to the wear of the contact net, the intensity of the backscattered light will change (intensity decreases or increases due to the reflection of the section). The wear state of the contact net can be detected by detecting the changes in the intensity of the Rayleigh scattered light in the optical fiber. The position of the fiber disconnection can be calculated by the return time of the scattered light [10].

Using ARM Technology to Build a Rail Transit Catenary …

171

This article uses Marposs U05 high-precision displacement sensor to measure, uses ARM technology to build an operating platform, uses ZigBee technology for data transmission, uses the latest Android operating system, and uses ARM technology to build a rail transit catenary wear detection operating platform to predict the required measurement line. The degree of wear of the contact line provides a certain reference for the rail transit operation department to arrange the maintenance time reasonably [11, 12].

2 Using ARM Technology to Build a Rail Transit Catenary Wear Detection Operation Platform 2.1 System Architecture The traditional method is generally to transfer image data to a PC, and then use the SDK development kit provided by the camera manufacturer to develop a detection system based on image processing. In this paper, the single-line image data collected by the camera is transmitted to the embedded system through the Gigabit Ethernet interface, and Nios II is a soft core processor is implanted in the FPGA using SOPC Builder to realize the Gigabit Ethernet driver and System data communication protocol, and complete image preprocessing in FPGA. (1)

Lighting source

The environment where the catenary is located is random. In rainy weather or when the train enters the tunnel, the light intensity has a great influence on the quality of the collected images, and even has a decisive effect on the detection results. Therefore, it is necessary to install a lighting device in the appropriate time. The light intensity is compensated. In addition, the following factors should be weighed: the light source can efficiently emit single-wavelength light; the light emitted by the light source can cover all areas within the offset range of the contact wire; the light intensity is based on increasing the contrast between the contact line and the surrounding noncharacteristic background area as much as possible; the light source can be adjusted according to the changes in environmental conditions to achieve the best collection effect. (2)

Image filtering and enhancement

In the detection of catenary wear, image enhancement is needed to highlight the edge information of wear, so as to better calculate the width of the wear surface. Normally, noise is introduced during image transmission or processing to blur the image, reducing image quality, and even submerging features, which brings difficulties to analysis. The use of image enhancement technology can effectively overcome these problems. In the process of image enhancement, there is no increase in new

172

Y. Yang and Z. Wei

information, but only by suppressing a part of the information, thereby highlighting another part of the information, making the target features easier to distinguish.

2.2 Measuring Principle

(1)

Image segmentation and edge detection

The edge is the end of one area and the beginning of another area. The edge exists between the target and the background, between the target and the target. In order to calculate the amount of wear of the power wire, the edge of the target feature must be extracted. The pixel value of the image in the edge area will change suddenly. Taking advantage of this feature, differential operators can be used to detect edge information. Generally, there are two methods of first-order derivative and second-order derivative. The Sobel edge detection operator and Robert edge detection operator are both based on the first derivative, and the edge detection operator based on the second derivative has the Laplace operator. Although there are many methods for edge detection, the best edge detection algorithm needs to be adopted according to different image characteristics in practical applications. In the measurement of the friction and wear of the contact line, whether the edge information of the wear surface of the contact line can be accurately extracted is directly related to the accuracy of the system measurement result. The prerequisite for image edge detection is to perform image segmentation. Image segmentation is to divide the image into different parts according to the characteristics of different areas, and the images in the same area have a certain feature similarity. The classic method of image segmentation is based on the gray-level threshold. It divides the pixel points into thousands of categories by gray-level by setting the threshold. Therefore, the threshold selection method becomes particularly important. Compared with the artificial threshold method, automatic the application of threshold method in automation system is more common and applicable. (2)

Calculation of the degree of wear

After long-term service, the cross-section of the catenary is reduced due to friction and abrasion, and the contact surface with the pantograph changes from point contact to surface contact. With the passage of contact friction time, the wear surface will gradually increase. There is a big difference between the worn surface and the unworn part at the pixel level, and the brightness value is usually larger. The basis of this system’s measurement is to detect the edge of the wear surface according to the pixel difference between the target and the background, so as to obtain the width w of the wear surface. The friction and wear value of the contact line that needs to be measured is: wactual = wpixel × 0.42

(1)

Using ARM Technology to Build a Rail Transit Catenary …

173

Therefore, it is only necessary to use image processing technology to calculate the width value w (pixel) of the wear surface at the pixel level, and then the required friction and wear value and the area S of the wear surface can be obtained: S = θ × r2 −

1 × r 2 × sin(2θ ) 2

(2)

where r is the radius of the contact line, and θ represents half of the circumferential angle corresponding to the chord where the wear width is located, which can be obtained by formula (3): θ = arcsin

w 2r

(3)

3 Use ARM Technology to Build a Rail Transit Catenary Wear Detection Operation Platform to Achieve 3.1 Platform Construction This article will use Marposs U05 high-precision displacement sensor to measure, use ARM technology to build an operating platform, and use ZigBee technology for data transmission. The data transmission speed is fast and the stability is strong. The handheld data terminal has a small body and powerful functions. It uses the latest Android operation. System, and analyze the factors that may affect the contact line wear, provide learning samples for the platform network through the data measured by the parameter detection equipment, and establish the contact line wear prediction model.

3.2 Cross-Compilation Environment Establishment Before building an embedded system Linux, you need to install a cross-compiler. The cross-compiler is the main software tool for cross-platform development. It runs on one processor architecture, but can be generated on a different processor architecture. The compiler of the object code that runs on. Ubantu operating system, the hardware environment of the target machine ARM, and the steps to install the cross compiler arm-linux-gcc-4.3.2 are as follows: Download the cross compiler compressed package: http://www.arm9.net/dow nload-arm-linux-gcc-4.3.2.asp;

174

Y. Yang and Z. Wei

Table 1 Stress test statistics Virtual users

60S

120S

180S

240S

300S

30

50

70

90

120

Response time

17.5

34.6

42.8

51.3

68.7

Number of system processing

12

11

13

12

11

Unzip the package in the /usr/local/arm/4.3.2 directory: #tarxvzfarm-linux-gcc4.3.2.tgz–C/; Add the path of the cross compiler to the environment variable, first open the file with a text editor: #vi/etc./profile, add at the end of the file: exportPATH = $PATH:/usr/local/arm/4.3.2/bin; The new environment variable takes effect immediately: source/etc./profile.

4 Use ARM Technology to Build Rail Transit Contact Line Wear Detection Operation Platform Test 4.1 Stress Test The platform was subjected to 3000, 5000 and 7000 visit stress tests to verify the gradient performance of the system for different user visits. And select the use of ARM technology to build the rail transit catenary wear detection operation platform in the actual application process, the use frequency and the highest system performance requirements of the core function: research information full-text retrieval as a test sample for performance testing. As shown in Table 1 and Fig. 1, through the analysis of the stress test chart, when the number of platform visits increases or decreases, the concurrent response of the platform will actually increase step by step, but even under 7000 visits per second, the platform’s the response time is also good. The actual response time is no more than 3 s, which can fully meet the requirements. From the side, it can be verified that the system can fully meet the user’s access needs. Analyzing the number of processing per second of the system, the actual processing situation will not change significantly due to the increase in the CPU utilization of the platform, and the performance is good.

4.2 Comparison of Prediction Results The platform of this article uses the data measured by the two sets of equipment of the city’s rail transit line with the help of the contact wire wear detection system and the pantograph detection system. In order to test the effectiveness and accuracy

Using ARM Technology to Build a Rail Transit Catenary …

175

Virtual users Response time Number of system processing 140

User number

120 100 80 60 40 20 0 60S

120S

180S

240S

300S

Test period

Fig. 1 Stress test statistics

of the construction of the rail transit contact line wear test platform established in this paper, 10 sets of verification samples were randomly selected from the test data set and brought to the testing platform to compare the prediction results of the line contact line wear correct. Use the Sim function in the main window of the platform to call the trained network model, and provide the verification data input samples to the network to obtain the predicted value of the contact line wear, which is compared with the actual measured value one by one. The verification results are shown in Table 2 and Fig. 2. Through the line graph, it can be clearly seen that the measured value of the contact line wear is very close to the predicted value curve. By comparing the measured value of the contact line wear with the predicted value of the model, the data with a relative error of less than 10% reaches 100%, which has a high degree of credibility. If the number of learning samples of the contact line wear prediction model is expanded, for example, the data of the entire line measured by the catenary detection system, the use of ARM technology to build the rail transit catenary wear detection operation platform will have higher prediction accuracy and more reference value. After verification experiments, the idea of using ARM technology to build a rail transit catenary wear detection operation platform to detect contact line wear is feasible. Electrified railways and urban rail transit lines are mainly different in current systems, voltage levels, train speeds, etc., but they all conform to the theoretical basis of using ARM technology to build a rail transit contact line wear detection operation platform, so future research method can also be used for electrified railways.

176

Y. Yang and Z. Wei

Table 2 Comparison of measured and predicted contact wire wear Sample point

Measured value of wear (%)

Predicted value of wear (%)

Relative error (%)

1

2.75

2.69

2.1

2

2.31

2.25

2.5

3

1.52

1.45

4.6

4

3.84

3.92

2.1

5

3.51

3.47

1.1

6

1.37

1.31

4.3

7

1.31

1.35

3.1

8

4.21

4.15

1.4

9

1.97

1.95

1.0

10

4.68

4.51

3.6

Note The wear amount is the percentage value of the worn area of the contact line and the completed cross-sectional area

Percentage

Measured value of wear (%)

Predicted value of wear (%)

5 4.5 4 3.5 3 2.5 2 1.5 1 0.5 0 1

2

3

4

5

6

7

8

9

10

Sample point Fig. 2 Comparing the results of contact wire wear and model prediction

5 Conclusion With the rapid development of our country’s electric traction technology, the detection method of catenary system wear will develop towards the goal of faster detection speed, higher detection accuracy, simpler detection system, and lower detection and maintenance costs. However, the catenary wear prediction model studied in this paper is to replace a detection method under the condition that the accuracy of the existing

Using ARM Technology to Build a Rail Transit Catenary …

177

measurement technology is still unsatisfactory, and to adopt other easily obtained factors that affect the contact line wear and the relationship between them. Relations, using Marposs U05 high-precision displacement sensor measurement, using ARM technology to build an operating platform, using ZigBee technology for data transmission, data transmission speed is fast, strong stability; handheld data terminal body is small and powerful, using the latest Android operation system. It supports multiple wireless communication methods such as Bluetooth, 5G, 4G, and WIFI, and can realize accurate positioning of Beidou satellites. Built-in database can facilitate data storage, data query, interval and anchor information input and other data management. Acknowledgements This work was supported by National College Student Innovation and Entrepreneurship Training Program-Upgrade and promotion of rail transit catenary smart wear detector based on the enterprise’s internal entrepreneurial model (202012795001S).

References 1. Jaewon K, Joorak K, Changmu L et al (2018) Optimal capacity estimation method of the energy storage mounted on a wireless railway train for energy-sustainable transportation. Energies 11(4):986 2. Chen J, Liu Z, Wang H et al (2018) Automatic defect detection of fasteners on the catenary support device using deep convolutional neural network. IEEE Trans Instrum Meas 67(2):257– 269 3. Qiao H, Zhang Z, Zhang X et al (2021) Research on image feature extraction of pavement crack disease. J Phys Conf Ser 1883(1):012100 (9pp) 4. Collar C, Armero E (2019) Lipid composition and dynamics during breadmaking in heatmoisture-treated associated matrices. Eur Food Res Technol 245(11):2413–2424 5. Hao J, Gu Z et al (2016) Modeling pantograph-catenary arcing. Proc Inst Mech Eng Part F J Rail Rapid Transit 230(7):1687–1697 6. Li Q et al (2016) Industrial frequency single-phase AC traction power supply system for urban rail transit and its key technologies. J Mod Transp 02 24(67):19–29 7. Yldrm D, Akit MH, Yolaan C et al (2020) Full-scale physical simulator of all SiC traction motor drive with onboard supercapacitor ESS for light-rail public transportation. IEEE Trans Industr Electron 67(8):6290–6301 8. Zhang W, Liu B et al (2017) Influence of a high-speed train passing through a tunnel on pantograph aerodynamics and pantograph-catenary interaction. Proc Inst Mech Eng Part F J Rail Rapid Transit 231(2):198–210 9. Yang Z, Du Z et al. Research on the influence of straddle-type Monorail’s pantograph head parameter on power collection quality. Urban Rail Transit 3(3):149–157 10. Li Q (2016) Industrial frequency single-phase AC traction power supply system for urban rail transit and its key technologies. J Mod Transp 24(02):103–113 11. Aydin I, Celebi SB et al (2018) Fuzzy integral-based multi-sensor fusion for arc detection in the pantograph-catenary system. Proc Inst Mech Eng Part F J Rail Rapid Transit 232(1):159–170 12. Brown LE, Strommen J (2018) Training younger volunteers to promote technology use among older adults. Fam Consum Sci Res J 46(3):297–313

Security Threats and Protection Based on Android Platform Xuemei Wang

Abstract With the development of mobile Internet and electronic information technology, mobile terminals have become popular, and users can communicate data and information more conveniently, but at the same time, people are paying more and more attention to the information security protection of mobile terminals. As the mainstream operating system of mobile phones, the Android operating system is subject to various security threats, such as malicious software, illegal flashing, and information theft. In response to this situation, on the basis of the original security mechanism, we discussed the risks and protective measures of the Android platform. In order to improve the security protection level of the Android platform, some security protection modules can be added, such as information encryption module, mobile phone anti-theft module and virus retrieval Modules, etc. Keywords Android platform · Security threats · Protective measures In recent years, with the continuous development of information technology, the era of big data has gradually come, and the world has entered the era of mobile Internet. The emergence of the mobile Internet has also profoundly changed our way of life and work. According to statistics, the number of mobile Internet users in China in 2012 has surpassed the number of traditional Internet users. Mobile smart terminal equipment is even more popular in thousands of households, and mobile smart platforms are also diverse, such as ios system, Symbian system, and Blackberry system, among which Android platform, due to its outstanding performance such as open source, openness and customizability, the market share is increasing year by year. According to the “Mobile Internet White Paper” published by the Ministry of Industry and Information Technology of China in 2013, the Android platform has occupied 86.4% of the market [1], and has taken an absolute advantage in domestic mobile phone systems. However, while the share of the platform has increased, its security situation has become less and less optimistic. As platform users have a weak X. Wang (B) Shandong Huayu University of Technology, Dezhou, Shandong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_19

179

180

X. Wang

concept of mobile phone information security performance, and lack of professional security protection knowledge, mobile phones are infected with various electronic viruses. happens sometimes. Regrettably, research on the security field of the Android platform is still relatively slow, and it is even considered the most promising research, which has further aggravated the security risks of the Android system.

1 Introduction to Android Platform The Android platform is a mobile terminal application platform built on the Linux operating system. The platform mainly includes three main parts: the operating system, the middle layer, and the application layer. The Android platform was initially only applied to mobile phones, and then gradually developed to other mobile terminals. In mainland China, it is customarily called the “Android system”. It was developed by Google and the Open Mobile Alliance. The first Android phone was released in October 2008. According to statistics, the number of mobile phones purchased by this system in 2013 has reached 1 billion units.

1.1 Mobile Phone Malware Mobile phone malware generally refers to a software program that is forcibly installed into a user’s mobile phone without the customer’s approval and knowledge, and cannot be uninstalled or deleted once installed. This kind of software program can often have some normal software functions, but it is also uncontrollable for users. Compared with normal software, malware has two obvious characteristics: (1) Whether the user actively installs the software on the mobile phone, it is usually installed on the mobile phone without the user’s knowledge, using normal means Unable to uninstall. (2) After installation, whether to network, record and send user information without any prompts, or if there are some prompts, but the prompts are not obvious or even mislead users.

1.2 Android Platform Security Mechanism The Andriod platform is generally a user isolation mechanism based on UID. The most basic security principle followed by its security model is: an application program is not allowed to perform operations that cause damage to other programs, such as accessing sensitive resources of other programs and system hardware. Mutual access of devices and applications, etc. The Andriod platform uses Sandbox to realize the isolation between applications, so as to realize the non-interference of each program. During the operation of each program, they will be assigned the same ID, and the

Security Threats and Protection Based on Android Platform

181

application will also share the user’s ID. It is convenient to realize that multiple programs run in the same process.

1.3 Android Platform Permission Mechanism In the Android platform, when an application wants to access the resources of other programs, it needs to apply for permission, and the risks that may be involved in the access operation must be listed, and then the user is authorized to decide whether to perform the operation. Even if authorized, the system will check the authority when it is running to determine whether the operation is qualified to call other sensitive information, if not, the program will be terminated.

1.4 Security Mechanism of Mobile Terminal Interface For mobile terminals, it has many external data connections such as Bluetooth, data connection, wife, etc. Although the use of these data interfaces gives users a very good experience, it also makes users face more security Threatened. First of all, mobile terminals are used more frequently than traditional personal computers, and are almost always in a “networked” state, making them more susceptible to stealing, monitoring, and attacks. Secondly, with the rise of mobile payment, people’s financial security is at greater risk. Finally, the privacy of the mobile terminal has become the natural target of the stealer, and the contact information, chat history, and call history among them will bring various benefits to privacy stealing.

1.5 Root Risk of Terminal Platform Openness is the most important feature of the Android platform. Therefore, users can easily obtain the ultimate root permissions. Once the root permission is obtained, the user can operate on the root directory, add, delete or modify some software platforms, which ultimately lead to threats to the security of the mobile phone, or even an undefended state, giving criminals a chance to take advantage of it. Once a virus or malicious software actively attacks the mobile phone system, the mobile terminal data will be damaged, and the file system may be added, deleted, and modified by the malicious software at will, causing huge losses to the user [2].

182

X. Wang

2 The Security Threats of the Android Platform 2.1 Leakage of Data Information Everyone’s mobile terminal data has personal privacy. The contact information, photos, audio, video, and transaction information contained in the mobile phone are all key targets for attackers to steal. Generally, the leakage of data information can be divided into the following ways. First of all, current electronic products are updated quickly. When users need to replace their devices, they usually don’t notice the information and data on the old devices. Some technicians can find the user’s private information from these devices, which is similar to traditional mobile devices. The risk of hard disk leaks is similar. Secondly, the mobile terminal carried by the user may also be at risk of being lost. Sometimes the mobile terminal is placed in a car, meeting place, or desk, and there is a risk of being read by others when leaving. Due to the weak concept of information protection and security, some users do not set up an identity verification mechanism in order to be more convenient when using mobile terminals, resulting in extremely easy leakage of data information. Finally, the risk of leakage of communication channels is also the main way of information leakage. When a user sends data, it is usually sent in plain text, which can easily be intercepted by other technicians, and can even monitor the user’s conversation, causing privacy leakage. In addition, malware can also use platform vulnerabilities to intercept users’ private information, and even defraud users’ bank account information, causing huge economic losses to customers [3].

2.2 The Risk of Malicious Flashing In order to meet the actual needs of users, current mobile terminal manufacturers have some terminal devices that can also be flashed after they leave the factory. If the user does not meet the manufacturer’s factory design, he can change the mobile terminal protocol by flashing the mobile terminal [4]. This allows criminals to use the opportunity of flashing to implant malicious codes or viruses into mobile terminals and directly control mobile terminal devices in the background. Therefore, we need to limit the flashing operation of mobile terminals after leaving the factory to avoid the huge security risks caused by flashing [5].

2.3 Loss of Mobile Terminal With the development of technology, in order to facilitate users to carry around, the appearance of mobile terminals is developing in the direction of flatness and miniaturization, but it has brought a more serious problem, that is, it is easy to be

Security Threats and Protection Based on Android Platform

183

lost and stolen. Once lost or stolen, due to the disclosure of private data, it will cause irreversible economic or other losses to the user. If no identity verification mechanism is set up, anyone can easily view the information on the phone, including address books, text messages, chat records, and even personal identification information and bank information [6].

3 Measures to Improve the Security Protection of the Android Platform 3.1 Security Module Design In order to better protect the privacy of users, it is necessary to design a complete set of encrypted information modules including pictures, videos, audios and files. The information can be encrypted by the AES algorithm and stored in the phone memory, effectively protecting the user’s information security [7]. For mobile terminals, passwords and passwords are required for authorization, and local multimedia files are selected for encrypted storage according to the guidance of the system. The encrypted files can use double encryption of the file and name and disappear under the original path. Only after authorization can the files be decrypted and deleted, and these encrypted files cannot be accessed without authorized terms, which can guarantee the security of local data and the control of information to the greatest extent [8].

3.2 Virus Scanning Module The virus scanning module uses MDS feature matching to filter security programs and virus programs. Once the scanning program is run, the characteristic value of each program file will be calculated in the background and sent back to the cloud for comparison with the virus database. When a sample of suspected virus characteristics is found, the program will pop up a prompt box to inform the user whether they need to personally experience it. If the user confirms, the cleaning program or uninstalling the program will be performed until the entire scanning and cleaning process is completed [9].

3.3 Automatic Update of Virus Database The automatic update of the virus database is an important guarantee to ensure the effective operation of the virus scanning module. In the real-time update program

184

X. Wang

of the virus database, an XML configuration file will be automatically pulled from the server at a fixed time period, which contains the download address of the virus database and the virus the version of the library (recorded in JSON format) [10]. When the automatic update program is installed, the program can discover the virus database in time, and automatically insert data into the existing virus database, thereby completing the virus database update operation. At the same time, because the virus database is only a TXT file, it takes up very little traffic and will not affect the user’s normal mobile phone operations [11].

3.4 Mobile Anti-theft Module The mobile phone anti-theft module is an important guarantee for realizing the automatic positioning and returning function of the mobile phone. When the mobile phone receives the instruction from the security number, the automatic positioning module will immediately start GPS positioning and use the auxiliary program to determine the coordinate information of the mobile phone [12]. At the same time, the mobile phone the anti-theft module will also send this information back to the bound secure mobile phone in the form of a text message or a link, and the location of the mobile phone can be searched immediately after receiving the location. All processes of the anti-theft module of the mobile phone are completed in the background, leaving no trace on the mobile interface, which effectively guarantees that even if the user’s mobile phone is stolen, it will not be discovered by the thief during the positioning process (Fig. 1).

3.5 SMS Encryption Module For the encryption of SMS, before encryption, it is necessary to determine whether it is information encryption or contact encryption, and whether automatic encryption is required according to the user’s needs, and then set the SMS encryption strategy accordingly. Encryption can use the AES algorithm, and make full use of the observer Content observer to register and monitor the changes in the SMS database to achieve the effect of automatic encryption [13]. After the mobile phone is restarted, the SMS encryption module needs to be able to monitor the broadcast of the startup completion, so as to realize the automatic encryption of the SMS at startup. In the decryption process, it is necessary to ensure that the input key and encryption key use the same algorithm, and the keys are consistent. In order for Angzhi users to perform secondary encryption and secondary decryption on information that has been encrypted or decrypted, it is necessary to make a mark in the information to remind the user of the current status of the information. The approximate program algorithm is as follows.

Security Threats and Protection Based on Android Platform

185

Turn on the phone Monitor SIM card

Whether the SIM card has been replaced

Sign out

Switch to emergency Start SMS monitoring command Receive instruction text message N Is it in a state of emergency Y

Sign out

Matching instructions

Phone

Text

emergency contact

Fig. 1 Schematic diagram of mobile phone anti-theft module

3.6 Security of the Protection System The security protection measures used by Android platform users can be divided into two aspects. The first is to improve the security of the verification password. Many users directly use their birthday or some special commemorative numbers as the power-on password for the convenience of turning on and off the machine, which increases the security. Risk. After the security module is added, the MD5 algorithm is used to encrypt the file, and the user can change the program password by him, so that even if the phone is viewed by someone, if the correct password quality is not known, the file cannot be viewed. The second is to improve the security of the service port. In order to better ensure the safe and stable operation of the server, we can try to install the prepared Servlet program on the platform to improve the security performance of the cloud platform and reduce the operating cost of the server.

186

X. Wang

4 Concluding Remarks Through the research of this system, the security threats of the Android platform mainly come from data information leakage, mobile terminal loss, the risk of malicious flashing, and mobile phone malware. When performing protection, it is necessary to judge these different security threats, and comprehensively consider the ways and consequences of each threat to adopt different protection measures. We can use security module design for the Android platform, such as virus scanning module, SMS encryption module and mobile phone anti-theft module, etc., to achieve a security protection system based on Android mobile phones. In the future research and design process, we will implement more data analysis and system protection on the Android platform in the cloud to provide more complete security services. Acknowledgements Based on the first class undergraduate course “C language programming” project in 2020.

References 1. Tyagi P (2021) Pragmatic flutter: building cross-platform mobile apps for android, iOS, web & desktop. CRC Press 2. Zhang Q, Qiao S, Zhang Q, Liu S (2021) Design and implementation of the detection software of a wireless microseismic acquisition station based on the Android platform. Geosci Instrum Methods Data Syst 10(1) 3. Dhalaria M, Gandotra E (2021) CSForest: an approach for imbalanced family classification of android malicious applications. Int J Inf Technol 13(3):1059–1071 4. Bagheri H, Wang J, Jarod A, Negar G, Sam M (2021) Flair: efficient analysis of Android inter-component vulnerabilities in response to incremental changes. Empir Softw Eng 26(3) 5. Tyagi P (2021) Pragmatic flutter: building cross-platform mobile apps for Android, iOS, web and desktop. CRC Press 6. Dantu VVR, Sai Dasaradha VVS, Sasikumar P (2021) Unified automotive location tracking using Android things (IoT). Wireless Personal Communications (prepublish) 7. Shivi G, Niyati B (2021) Android security assessment: a review, taxonomy and research gap study. Comput Secur 100 8. Alswaina F, Elleithy K (2020) Android Malware family classification and analysis: current status and future directions. Electronics 9(6):942 9. Altuwaijri H, Ghouzali S (2020) Android data storage security: a review. J King Saud Univ Comput Inf Sci 32(5):543–552 10. Hussain AKH, Kakavand M, Silval M, Arulsamy L (2020) A novel android security framework to prevent privilege escalation attacks. Int J Comput Netw Inf Secur (IJCNIS) 12(1) 11. Ratul S, Md Shohel K, Md Shohrab H, Zada KW (2020) A survey on android security: development and deployment hindrance and best practices. TELKOMNIKA Telecommun Comput Electron Control 18(1) 12. Rahimi N, Nolen J, Gupta B (2019) Android security and its rooting—a possible improvement of its security architecture. J Inf Secur 10(2) 13. Yoo S, Ryu HR, Yeon H, Kwon T, Jang Y (2019) Visual analytics and visualization for android security risk. Elsevier, p 53

A Data Security Scheme for Cloud Storage Based on Data Segmentation and Trusted Third Party Supervision Ping Xia

Abstract In order to improve the security of data access process in cloud storage environment, an association structure based on data security level and data segmentation strategy is proposed. Design a reliable cloud storage data security scheme with the technical support of Trusted Third Party control and data encryption. In this scheme, the key-partition-machine corresponding logic relation of the threelevel association map is constructed by selecting the data segmentation strategy with different security intensity according to the data of different privacy and security level, the data is fragmented and stored in separate physical database nodes. Using data fragmentation can not only solve the bottleneck of storage performance, achieve the goal of uniform data distribution and load balance, but also improve the confidentiality and stability of data cloud storage, effective prevention of single database breach brings the problem of data leakage. In addition, Trusted Third Party provides key distribution and management, digital certificate signing and identity authentication functions, and use data encryption techniques in user upload and storage processes, further enhance the data in the cloud storage process of controllability, data integrity and confidentiality, greatly improve the security performance of cloud storage. Keywords Cloud storage · Data segmentation · Trusted third party · Three-level association mapping table · Data encryption

1 Introduction With the widespread development and application of cloud computing and network storage, accessing files and data through cloud storage can relieve the computing and storage pressure of user terminal devices, and solve the limitations of data storage and access to physical locations. Reduce the maintenance and management costs of local storage, and meet the actual needs of mobile and networked storage. Cloud P. Xia (B) Guangzhou College of Technology and Business, Guangzhou, Guangdong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_20

187

188

P. Xia

storage is a storage method that uses network technology, computer resource virtualization technology, distributed computing technology and other technologies to provide data storage and access service functions centrally through the network [1]. At present, cloud storage generally maintains user data by network operators, and mainly implements a layer of encryption protection for files and data through encryption algorithms. Once an attacker masters the cracking law, it is easy to crack the key and intercept the data. In addition, the data stored in the back-end database of the cloud server is vulnerable to hacker attacks, causing a large amount of user data to leak, and the security and confidentiality of user data cannot be fundamentally guaranteed. Therefore, it is urgent to solve the data security problem in the cloud storage [2].

2 Cloud Storage System Architecture and Data Segmentation Strategy Design 2.1 Cloud Storage System Architecture The cloud data security storage system solution based on data segmentation and Trusted Third Party (TTP) supervision proposed in this paper mainly includes three types of entities: third-party trusted centers, end users, and cloud servers [3]. The overall system architecture is shown in Fig. 1. According to the role of different entities in the system of different participating roles, define the functional authority of the role. TTP is the core entity that controls the security of the system and guarantees the safe storage of data. It provides reliable key distribution, identity authentication, and security management and control services for end users and cloud server entities in the region. TTP includes functional modules such as the key distribution center KDC, the certificate issuing center CA, and the identity authentication server AS. On TTP, KDC is mainly used to distribute and manage RSA keys for each user and server entity. The CA and AS servers

Fig. 1 Cloud storage system architecture

A Data Security Scheme for Cloud Storage Based on Data …

189

provide the signing and authentication of digital public key certificates and identity certificates to realize the two-way authentication service between entities and provide security guarantee for the realization of the secure cloud storage function of legal entities. The end user entity is responsible for storing local data in files, generating file metadata and data tags, encapsulating the data and uploading it to the cloud server after encryption [4]. The cloud server entity is responsible for preprocessing the data uploaded by users, slicing and storing the data in different database nodes, and providing download functions.

2.2 Data Segmentation and Mapping Strategy Design The purpose of using data segmentation in this solution is to divide a complete data block file into multiple independent and orthogonal data subsets, which are scattered and stored in different database nodes of the cloud server. This not only solves the storage performance bottleneck, achieves the purpose of data distribution and load balancing, and more importantly, it can effectively prevent the exposure risk of the entire data block file caused by the leakage of part of the fragmented data. Through the decentralized storage of data fragments, it is difficult for illegal attackers to accurately locate all data fragments, and to a certain extent can achieve the purpose of enhancing system security functions [5]. The data segmentation model first divides the data block according to the segment size threshold, the segmentation strategy and the characteristic value, and maps it to the link relationship table (keypartition mapping) between the key and the data segment. Then the data fragments are stored in the physical database according to the fragmentation strategy mapping (partition-machine mapping) to form a three-level association mapping table of the many-to-many fragmented link database [6–8]. Data fragmentation strategies include equal distribution algorithms, round-robin fragmentation algorithms, and hash algorithm fragmentation strategies to meet the data fragmentation needs of different application scenarios and physical users. The sharding strategy based on equal distribution is the default sharding strategy of the system, and it is distributed as evenly as possible to all database nodes according to the number of shards. There are two cases to discuss here. Assuming that the number of shards is a multiple of the number of databases, each database will store the same number of data shards. Assuming that the number of shards is not evenly divisible by the number of databases, the remaining shards are sequentially appended to the database node with the smaller sequence number. When the number of shards n is 18 and the number of physical databases m is 4, the data partitioning and sharding mapping relationship model using the system default sharding strategy is shown in Fig. 2. The sharding strategy method based on equal distribution is simple, easy to implement, less relational calculations, system performance overhead and implementation cost are small, and can meet the storage requirements of ordinary data sharding with a low security level.

190

P. Xia

Fig. 2 The default data segmentation and shard mapping relationship model of the system

The round-robin-based fragmentation strategy performs fragmentation according to the fragment size threshold, and sequentially stores data fragments in different database nodes according to the set number of rotation fragments and the rotation order. This fragmentation strategy is similar to the average distribution strategy. The difference lies in the order of data fragmentation, which achieves the purpose of confusion, and is suitable for data partitioning with an intermediate security level. The sharding strategy based on the hash algorithm is more complicated than others. Its core idea is to calculate the SHA-1 hash code of the key value of data sharding, and map the physical storage location through the hash code modulus operation. Further use hash functions and relational operations to enhance the security of data storage. First, the data fragments are divided according to the joint data feature values of multiple fields and the data key values are generated, and the fragment key value string is output as a fixed-length hash code using a hash function. Take the remainder of the number of databases m and the hash value of the shards to establish a logical mapping table between the shards and the database nodes, and specify the actual physical location of the data shard storage, so that the data shards are distributed and stored on different database nodes. The implementation process of the sharding strategy based on the hash algorithm is more challenging than other strategies. The encryption of the secure hash function is used, which has stronger security and is suitable for data segmentation requirements with higher security levels.

A Data Security Scheme for Cloud Storage Based on Data …

191

Fig. 3 Cloud storage system operation framework

3 Cloud Storage System Operation Framework and Function Design 3.1 Cloud Storage System Operation Framework The main operation flow of the whole system scheme, as shown in Fig. 3, mainly includes four main stages. These are system initialization, the cloud server requests the session key and verifies the identity of the session user, the user accepts the session key and verifies the identity of the cloud server, file upload and download.

3.2 System Initialization Step 1: The KDC server distributes and manages the server master key for the cloud servers registered in the TTP control area. As shown in Fig. 3, KDC generates a public–private key pair (PKB , SKB ) based on the RSA algorithm for cloud server B, and uses the master key KB shared with server B during registration to encrypt the public–private key pair. The system master key SKTTP is used to generate the signature data SignDataB based on the public and private key pair of cloud server B, the system public key PKTTP and the public key PKCA of CA are updated and stored in the system shared public key rings table PKT, and the public and private key pair of B is secretly stored. Use a pseudo-random number generator to generate a onetime random number NKDC and obtain the current timestamp TimeKDC of the system, and finally link and encapsulate all data items, and send them to the cloud server B through a secure communication channel. After receiving the data, B sequentially unpacks and decrypts the data, and uses the system public key PKTTP in the system shared public key ring table PKT to verify the signature data item SignDataB . If the signature verification is successful, B will secretly store the public and private key pair (PKB , SKB ), and send a confirmation message to KDC. Step 2: The KDC server distributes and manages the user master key for the registered terminal user A in the area, the method is similar to step 1.

192

P. Xia

Step 3: The CA server issues a public key certificate for the cloud server B that has distributed keys in the TTP control area. CA mainly chooses B’s device identification and user identification IDB and public key PKB to construct the certificate subject. In order to prevent replay attacks, it is necessary to attach a one-time random number and a system timestamp, the data item (IDB , PKB , NCA , TimeCA ) is encrypted by the CA’s master key SKCA , and B’s public key certificate is generated. The cloud server can send its own public key to other users in the form of a public key certificate, and the recipient can use the CA public key PKCA in the PKT table to verify the public key certificate of B. Step 4: The CA server issues a public key certificate for the user A who has distributed the key in the TTP control area. The method is similar to step 3. Step 5: The CA server issues an X.509-based identity certificate CB for the cloud server B. B uploads the certificate issuance request CSR file, which is defined by PKCS#10 and sent to the CA. The CSR file is encoded in the PEM format, and it mainly contains certificate information and signature algorithms such as Version, Distinguished Name, Public Key, and Attributes encrypted with SKB . The requester’s private key generates a signature under the specified signature algorithm, and it can also have optional fields. After CA receives B’s certificate request file, it extracts user information and user public key certificate to make a certificate, and uses its own private key SKCA to sign the server certificate. After the cloud server downloads the certificate, it installs and securely stores the identity certificate. Step 6: The CA server issues the X.509-based identity certificate CA for user A, the method is similar to step 5.

3.3 The Cloud Server Requests the Distribution of the Session Key and Verifies the Identity of the User Requesting the Session Before uploading and downloading files, the user needs to verify the identity of both parties in the session by the AS server, and the KDC issues a one-time session key encrypted based on the RSA public key to encrypt the uploaded and downloaded data. First, the user A sends to the cloud server B the file upload session request data including the own identity certificate CA1 and the one-time random number NA . After the cloud server receives user A’s request data, it uses its private key to encrypt user A’s session request data, and attaches its own identity certificate CB1 , a one-time random number NB , and a timestamp TimeB . Cloud server B links all data items to the AS server, and the AS applies to the CA to verify whether the server identity certificate requesting the session key is a legitimate server. After the identity verification is passed, the AS applies to the KDC for distribution and obtains the session key KS . AS uses B’s public key to encrypt five items of data: the first item is the session key KS , the second item is the identity CA of user A, the third item

A Data Security Scheme for Cloud Storage Based on Data …

193

is a one-time random number NB , and the fourth item is the timestamp TimeB . The fifth item is the session key KS encrypted with user A’s public key, B’s identity CB , one-time random number NB , and time stamp TimeB . Finally, AS uses the system master key to sign the data and send it to B. After the cloud server B receives the data packet, it uses the system public key to verify the digital signature, checks whether the data source is legal and reliable, and then uses its own private key to decrypt the linked data item. B compares the CA sent by the AS with the CA1 sent by the user A to verify the legitimacy of the user’s identity. If the identity of user A requesting the session is a legitimate user, B extracts the session key KS and secretly stores it for encryption of data transmitted with A, and forwards the fifth item of dataEPKA (KS , CB , NB , TimeB ) to user A. Otherwise, if user A’s identity verification is inconsistent, B will reject A’s session request.

3.4 The User Receives the Session Key and Verifies the Identity of the Cloud Server After user A receives B’s response data packet, he uses his own private key to decrypt the data item to verify whether B’s identity information CB is legal and reliable and whether the timestamp TimeB is fresh. If the verification is successful, the session key KS is extracted and stored secretly for data encryption transmission in the file upload and download stage. User A sends a confirmation message to the cloud server B. After the cloud server B receives the confirmation information from the user A, it further confirms the session information, establishes a secure communication connection with the user A, and delegates the file upload and download permissions to the user A.

3.5 File Upload and Download In the file upload stage, user A needs to generate file metadata and data tags (including file and data attributes, security levels, and feature values) and other information by the user. The user can independently select the security level and characteristic value of the file according to the file data attribute and privacy level, as the basis for the selection of the server-side data segmentation and storage strategy. The security level mainly includes three categories: high, intermediate, and low. For file data with different security levels, different data segmentation schemes will be used to provide different data segmentation security strengths. The user encapsulates the metadata and data tags of the file to be uploaded, uses the session key KS to encrypt the session data and uploads it to the cloud server B.

194

P. Xia

The cloud server B preprocesses the data uploaded by user A, and uses the data segmentation strategy corresponding to the security level according to the different security levels and data characteristic values set by the user, and sets the fragment size threshold and data key values. Through the data segmentation of the sharding algorithm, a three-level mapping association table based on data key values, data sharding and physical database is constructed. The table is encrypted with high security strength encryption technology and stored in the core database of the cloud server to prevent illegal attacks and security leakage risks. Finally, according to the corresponding logical relationship of the three-level association mapping table of the fragments, the data fragments are scattered and stored in different physical database nodes to meet the security storage requirements of the data. In the user data download stage, after the user chooses to download a file, the cloud server extracts the three-level mapping association table of the data fragments from the core database according to the file information. According to the corresponding fragmentation strategy, data feature value and fragment size threshold, all data fragments are reassembled in order to restore the file content. Finally, use the session key KS to encrypt the file, and open the link channel for users to download.

4 Program Analysis and Summary The solution uses TTP as the core entity for security management and control, and provides reliable key distribution, certificate issuance, identity authentication and security services for user entities and cloud server entities. It can effectively guarantee the cloud storage requirements of legally registered users in the area, and prevent illegal users from attacking and misusing the cloud storage system. The user uses a one-time session key to implement encrypted transmission of the uploaded data, and the cloud server uses data segmentation technology to fragment the data uploaded by the user. It can effectively solve the problem of leakage in the process of cloud data transmission and storage, greatly improve the security performance of cloud storage data, and provide a feasible solution for the development and application of cloud storage technology.

References 1. Zhou D, Wu C (2016) Research on the design of security fusion cloud storage based on multipoint trust evaluation. Bull Sci Technol 32(05):77–81 (in Chinese) 2. Du C (2019) Cloud storage information architecture and design analysis based on high security level. Inf Technol 43(11):160–163 (in Chinese) 3. Li Z (2016) A modular cloud storage solution for data encryption and segmentation. Sci Tech Wind 21:72 (in Chinese) 4. Yin Y, Ling Y, Zhu F (2021) Design of hierarchical security model for cloud storage medical big data based on segmentation. Comput Netw 47(03):65–67 (in Chinese)

A Data Security Scheme for Cloud Storage Based on Data …

195

5. Yang J, Tan D, Shao J (2019) Research on the security of data stored in cloud computing. J Chongqing Univ Posts Telecommun Nat Sci Edn 31(05):710–715 (in Chinese) 6. Yu H, Chen J, Zhang K (2021) A secure cloud storage scheme design based on blockchain. Comput Appl Softw 38(04):64–68 (in Chinese) 7. Chang L, Wang G, Yang X (2020) A lattice signature verification method for the integrity of cloud storage. J Heilongjiang Univ Sci Technol 30(04):455–459 (in Chinese) 8. Zhang J, Cha D (2021) Discussion on methods of enhancing the security functions of cloud storage systems. Netw Secur Technol Appl 04:69–70 (in Chinese)

Power Grid Security by Transforming a Certain Type of Wind Turbine Hongmei Sun and Xiaogang Bai

Abstract With the increasing capacity of wind turbine assembly machines, it accounts for an increasing proportion of the power grid. In order to avoid a shortterm fall in the power grid, the wind power generators will be disconnected from the grid in a large area, which will lead to grid security problems. Standards such as “Regulations for Grid-connected Operation of Wind Farms” have been formulated, stipulating that wind turbines should have a certain low voltage ride through capability. Based on this, after analyzing, testing, and researching the characteristics of a certain type of wind turbine from the aspects of control system, hydraulic pitch and converter, these three parts are modified to make the unit have low voltage ridethrough capability and at the same time improve The reliability and safety of wind turbines have good application prospects and commercial use value. Keywords Wind turbine · Low voltage ride through · Hydraulic pitch system · Converter transformation

1 Introduction Most wind farms in my country and the world are located in relatively remote areas, so most of the wind farms connected to the grid are far away from the load center. Once the grid fluctuates, it will affect the stable operation of the wind turbines. When the voltage drops significantly, the large-scale disconnection of wind turbines will inevitably pose a serious threat to the safe operation of the power grid. In order to avoid such accidents, my country has issued relevant standards for Low Voltage Ride Through (LVRT) for wind farms, and clearly stipulates the LVRT of wind turbines [1]. H. Sun (B) Beijing Polytechnic, Beijing, China e-mail: [email protected] X. Bai Beijing Jingcheng New Energy Co., Ltd, Beijing, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_21

197

198

H. Sun and X. Bai

LVRT requires that when a voltage drop occurs at the grid connection point of the wind turbine, the wind turbine cannot be disconnected for a short period of time, and at the same time, it can deliver reactive power to the grid to support the restoration of the grid until the grid voltage returns to the normal value within the specified time to achieve “crossover”. In order to avoid a large-scale disconnection of wind turbines when the grid voltage drops for a short time due to a transient failure of the power grid, which may bring about grid security and stability problems, all countries now strictly formulate regulations on the grid-connected operation of wind farms and clarify the wind power generation system. It should have a certain low voltage ride through capability. Several grid failures in Gansu power grid have accelerated the pace of my country’s wind power industry to develop LVRT technology for wind turbines [2]. In addition to the improvement of low voltage ride-through parameters in the latest national standards, the requirements for the ability to generate reactive power during the LVRT process are also becoming stricter. When the wind turbine grid-connected point voltage is within the range of 20–90% of the nominal voltage At the time, the wind turbine can support the restoration of the grid voltage by injecting reactive current. Starting from the moment of voltage drop at the grid connection point, the dynamic reactive current response time must be controlled within 75 ms, and the duration must not be less than 550 ms. At this time, the dynamic reactive current injected by the wind turbine into the power system is: IT ≥ 1.5 × (0.9 − UT )I N , (0.2 ≤ UT ≤ 0.9)

(1)

In the formula: UT —Voltage per unit value of the grid-connected point of the wind turbine; IT —Rated current of the wind turbine. Major domestic wind turbine manufacturers have been able to produce wind turbines with low voltage ride-through capability. From the perspective of adapting to the technological development of the domestic wind power industry, a certain type of wind power must have LVRT functions. LVRT cannot be understood as a one-sided understanding of the requirements for specific components of the wind turbine. As a wind turbine manufacturer, it should fully and objectively understand its specific requirements, and consider the overall wind turbine to meet the national standard requirements. The EOS control system of a certain type of wind turbine has always used the original design, the pitch system adopts the hydraulic pitch design, and the converter adopts the Prowind converter. According to the power grid requirements at the time, the converter only met the performance requirement that the grid voltage dropped to 60% during the LVRT process and lasted 640 ms. However, with the improvement of the national grid standards, the technology can no longer meet the requirements of the latest national grid connection standards. This paper analyzes, tests, and studies the control system, hydraulic pitch and converter of a certain type of wind turbine, and determines the LVRT technical transformation plan of the whole machine, so that the unit has low voltage ridethrough capability, and at the same time, it can also improve wind power generation.

Power Grid Security by Transforming a Certain Type …

199

The reliability and safety of the unit have good application prospects and commercial use value.

2 Analysis of Hydraulic Pitch System of a Certain Type of Wind Turbine In order to ensure the required pressure threshold and hydraulic pitch related performance of LVRT, the following theoretical analysis and on-site testing of the hydraulic pitch system will show whether the above two aspects can be met.

2.1 Testing on the Spot Now make a simple analysis of the hydraulic system, the schematic diagram of the hydraulic system [3] is shown in Fig. 1 In order to determine whether the hydraulic pitch is capable of pitching during the LVRT process, its accumulator capacity must first be considered. In this unit, the control loop has 2 50 L accumulators, the safety loop has 1 50 L accumulator,

Fig. 1 Schematic diagram of hydraulic system

200

H. Sun and X. Bai

and 6 24.5 L accumulators to ensure the safe operation of the unit. At 20 °C, the nominal charging pressure of the accumulator is 6 MPa, and the working pressure of the safety and control loop is 13.5–16 MPa. In order to ensure the safety of the wind turbine, determine the safety pressure threshold of the hydraulic system and the relative performance of the hydraulic pitch during LVRT. After testing multiple units on site, the following conclusions are drawn: The minimum operating pressure of the control circuit and the safety circuit is 6.5 MPa; the minimum pressure that can ensure the feathering of the unit is 7.5 MPa; the entire process of the safety cylinder and the control cylinder from the open position to the feathering position, even if the pitching speed is different, just start The starting pressure is the same and the ending pressure is basically similar; the unit triggers low voltage ride through when the control circuit pressure is 12 MPa, the control cylinder passes through the feathering during the low voltage ride through period and the propeller opening during the torque recovery period, and the remaining pressure can still ensure the safety of the control cylinder Feathering: The feathering speed of the unit is basically the same when the initial pressure of the safety circuit is different; the unit triggers low voltage ride through when the safety circuit pressure is 12 MPa and the control circuit pressure is 12 MPa, and the safety cylinder triggers a fault during the low voltage ride through and torque recovery period It can ensure the safe feathering of the safety cylinder; it is more appropriate to set the hydraulic pump start delay time to 2 s after LVRT.

2.2 Theoretical Calculation of Pitch Ability In this unit, the rated pressure of the accumulator at 20 °C is 6 MPa, then according to the gas state Eq. (2), the most stringent accumulator pressure at −30 °C can be obtained, and its value is 5.12 MPa. PV0/T = constant

(2)

In the formula: P is the gas pressure of the accumulator; V0 is the volume of the accumulator; V0 is the temperature of the accumulator gas. The total volume of the accumulator refers to the sum of the airbag and hydraulic volume. According to Formula (3), the hydraulic oil volume VW required to be output during work can be obtained [4].  Vw = V0

1 p0

 n1 

1 p2

 n1

 −

1 p1

 n1  (3)

In the formula: V0 is the volume of the accumulator; P0 is the gas pressure of the accumulator; P1 is the highest working pressure; P2 is the lowest working pressure; n is the index.

Power Grid Security by Transforming a Certain Type …

201

PV/T = fixed value, then the most stringent accumulator pressure at −30 °C can be obtained, and its value is 5.12 MPa. Ignoring the volume change of the hydraulic oil due to the pressure change and the temperature change in a short time, according to the hydraulic circuit pressure from 13.5 to 6.5 MPa, an accumulator with a volume of 50 L can be obtained, which can provide 19.2 L of oil. The two accumulators of the control circuit can provide a total of 38.4 L of pressure oil. 24.5 L accumulator, each can provide 9.4 L of pressure oil, 6 accumulators can provide a total of 56.4 L of pressure oil, plus 1 50 L accumulator to provide 19.2 L of oil, the safety circuit can provide a total of 75.6 L Pressure oil. Then the hydraulic circuit can provide a total of 114 L of pressure oil [5–7]. According to the short-term fault of the power grid, during the low voltage ride-through, the propeller will be pitched 10° to the feathering position first to prevent the unit from overspeeding when the load is dumped. After the power grid fault is eliminated within 2 s, the propeller will be changed to the working position, and the hydraulic system motor will start Before pressure compensation, the system pressure is continuously decreasing. At this time, when the unit fails again, the blades must be feathered. Based on this working condition, each control cylinder requires 9 L of oil for action, and a total of 27 L of oil is required for the three cylinders. Each safety cylinder requires 8.24 L of oil to operate, and the three cylinders require a total of 24.72 L of oil, and a total of 51.72 L of oil is required. Through the above test, analysis and calculation, the capacity of the accumulator of the unit can fully meet the needs of low voltage ride through [8].

3 Renovation of the Main Control System Through the evaluation of the existing system, it is found that based on the mastered communication protocol, the LVRT requirements of the wind turbine can only be achieved by modifying the original control system based on the understanding of the original system and the latest requirements of the user [9]. The modified main control system must have the following functions in LVRT: In the event of a grid drop failure, the low-voltage ride-through program should be started immediately to stop all motors of the wind turbine generator set immediately, to ensure that the solenoid valve of the hydraulic system does not lose power, and to ensure that the blade angle can smoothly return to the propeller to prevent overspeed. During the period, once the hydraulic system is under pressure If it is lower than the minimum safety value, it will stop immediately to ensure the safety of the unit. After 2 s of the fault, judge whether to cut out the low voltage ride through program. If the grid fault still exists, then it must be off-grid and shut down; if the fault is eliminated, start the hydraulic main motor first, and timely add pressure to the main circuit of the hydraulic system to ensure the safety of the wind turbine. After the system is fully restored to normal, start the yaw system, cooling system and other motors of the unit in turn, and completely exit the low voltage ride through program module [10]. In order to support the variable pitch power supply during the LVRT phase and complete the pitch control during the low cross-over period, the variable pitch power

202

H. Sun and X. Bai

Fig. 2 Pitch power supply in the original wind turbine

supply can be cut off when the low cross-over does not end within 2 s of the power grid drop or the wind turbine encounters a real power outage, so that the wind turbine can be feathered in an emergency. Before the transformation, the pitch power supply only had a switching power supply, so the pitch was inevitably powered down during the LVRT period. As shown in Fig. 2. In order to prevent the pitch loop from powering down during the LVRT period, it is necessary to add a DC UPS and a time relay after the original pitch solenoid valve is powered by the switching power supply. The transformation schematic diagram is shown in Fig. 3. When the 400 V power is off, the 24 V back end of the switching power supply is powered off, and the time relay timing function is activated. At the same time, the UPS enters the battery power supply mode. When the time relay reaches the set time, the relay activates and activates the UPS remote shutdown function, and the UPS cuts off the output. If the voltage of 400 V is restored during the timing process, the timing relay will fail and the system will operate normally. The scope of this transformation plan is small, only adding some components UPS, storage battery and time relay after the switching power supply, and most of the original lines do not need to be changed. There is no need to replace any components in the original cabinet. Since the front-end switching power supply has a capacity of 20 A, the DC UPS capacity cannot be less than 20 A. Combine the current mainstream products in the market to choose a suitable DC UPS. The operating current of the pitch solenoid valve is 1 A, 11 solenoid valves are running, totaling 11 A, the other sensors and the yaw DC lubrication pump in the loop are all running at about 6 A, totaling 17 A. The circuit is equipped with a surge suppressor, regardless of the impact caused by the solenoid valve action, the required backup time is 2 s, so the required battery capacity (Ah) is 17 A *

Power Grid Security by Transforming a Certain Type …

203

Fig. 3 Pitch power supply after transformation

2 s/3600 s = 0.01 Ah. This kind of battery does not actually exist. According to the UPS configuration requirements, the minimum backup battery is 3.4 Ah to meet the requirements. The time relay is only used to control the remote shutdown of the UPS, and the contact current is mA level. After 14F3 was manually disconnected on site, the unit was pitched to test the effect of the modification, and the modification requirements could be met.

204

H. Sun and X. Bai

4 Converter Transformation The low-voltage ride-through performance of the converter is an important part of the assessment of the low-voltage ride-through capability of the wind turbine system, because in the transient process of grid failure and grid restoration, the most serious impact on the wind turbine system is the converter part. In the case of a grid voltage drop, the doubly-fed generator in the wind turbine will cause overcurrent on the rotor side. At the same time, the rapid increase of the rotor side current will cause the DC side bus voltage of the rotor side converter to rise rapidly. Current and active and reactive power will cause oscillations. This is because when the grid voltage drops instantaneously in the doubly-fed induction generator, the stator flux linkage cannot change abruptly with the stator terminal voltage, which will produce a DC component. Due to the decrease of the integral, the stator flux linkage will hardly change, and The rotor continues to rotate, which will produce a large slip, which will generate a large voltage and current in the rotor winding. If the voltage drop is asymmetrical, it will make the rotor voltage overvoltage and overcurrent phenomenon more serious, because the stator voltage contains a negative sequence component, and the negative sequence component can produce a high slip, and the overvoltage generated by the rotor winding is too high. Flow can cause serious damage to the rotor converter. Therefore, in order to protect the rotor converter, it is necessary to take corresponding protective measures. Based on this, the transformation plan was determined: on the basis of the hardware system of the existing converter, a new control system and related hardware were added to realize the low voltage ride through function. The LVRT control strategy of the rotor Crowbar protection circuit has been widely used in doubly-fed asynchronous wind turbines to realize the low voltage ride through function. The basic principle is to protect the rotor-side converter by short-circuiting the rotor windings through a resistor of a certain resistance during a grid fault to release excess capacity in time. The success or failure of Crowbar protection control mainly depends on the depth of the voltage drop at the grid connection point and the size of the bypass resistor. When the resistance value of the protection resistance is constant, the deeper the stator voltage drop, the lower the effect of Crowbar protection control. When the voltage drop depth is constant, the greater the resistance of the protection resistance, the faster the energy will be released through the resistance. As a result, the peak value of the rotor current will be smaller, but the peak value of the rotor voltage will increase; and the smaller the resistance value is, even though the rotor voltage is Within the safe range, but the energy cannot be released quickly, so the Crowbar protection effect is deteriorated. Therefore, when designing the Crowbar short circuit of the LVRT converter, the protection resistance value should be determined first to ensure that the rotor current is within the safe range, and then the rotor voltage during the fault process should be limited to avoid rotor overvoltage and overcurrent. Optimizing the Crowbar circuit design is the focus of research on Crowbar protection technology. After the fault occurs, the optimized

Power Grid Security by Transforming a Certain Type …

205

Crowbar circuit design can improve the low-voltage ride-through capability of the doubly-fed wind power generation system.

5 Conclusion After analyzing, calculating, testing and analyzing the technical transformation plan of the main control system, pitch system and converter of a certain type of wind power generation, it should be able to meet the relevant requirements of the State Grid for LVRT, and the relevant sets of factory and on-site simulation tests. All have been successfully completed, and are currently waiting in line at the wind farm for the test certification of the Chinese Academy of Electric Power. After the transformation, the reliability and safety performance of the wind turbine will be improved, and it has good application prospects and commercial use value. It has laid a solid foundation for our company to comprehensively carry out the LVRT transformation of a certain type of wind turbine in the wind farm and the next in-depth study foundation.

References 1. Zhao X (2010) Research on control strategy and low voltage ride through technology of doublyfed wind turbines. Beijing Jiaotong University, Beijing 2. Yan G (2009) Simulation analysis of low voltage ride through of variable speed doubly-fed wind turbines. East China Electr Power (7):19–27 3. Zhang H, Huang Y, Wang J (1999) Hydraulic and pneumatic transmission. Mechanical Industry Press, Beijing 4. Guo Y, Xu Q, Li Y (2011) Research on grid fault ride-through capability of doubly-fed asynchronous wind power generation system. Electr Power Eng Sci 27(7):1–6. (in Chinese) 5. Yao X et al (2010) Independent pitch adjustment technology based on coordinate transformation. Renew Energy 28(005):19–22 6. Guideline for the certification of wind turbine, 2010 edn 7. Ying Y et al (2011) Research on pitch control technology of wind turbine based on load optimization. Chin J Mech Eng 47(016):106–111 8. Thermal power equipment technical manuals, power engineering society of China. The steam turbine, vol 2 (2007). Mechanical Industry Press, Beijing 9. Wu H (1982) Turbine parts structure and strength calculation. Mechanical Industry Press, Beijing 10. Ni W, Xu J (2010) Automatic adjustment principle of turbine machinery automatic adjustment. Mechanical Industry Press, Beijing

Reliability Growth in Product Quality Control in Modern Computer Industrial Control Fengchen Zhao, Lei Wang, Yuanyuan Yi, Desheng Lu, Junpeng Ma, Lingxu Meng, and Ou Qi

Abstract Reliability is a very important property of product quality. How to promote reliability growth scientifically and reasonably of modern computer industrial control is an urgent problem to be solved. To solve this problem, this paper proposes a reliability growth model, which can make the reliability of products grow scientifically, reasonably and stably in a certain range of modern computer industrial control. Through comparison, the effectiveness of the proposed method is verified, and reliability growth effectiveness measurement is the next research direction. Keywords Reliability · Growth · Quality control

1 Introduction In the process of reliability growth, product reliability is constantly changing of modern computer industrial control [1]. The failure data of products at all times do not come from the same matrix, so it is necessary to apply the principle of change statistics to establish the reliability growth model of products. The product reliability growth model reflects the product reliability growth law in the change [2–4]. The reliability growth model can be used to evaluate the reliability state of products at any time of change [5, 6]. Another important use of reliability growth model is to make ideal reliability growth curve of modern computer industrial control. Reliability growth is a planned and targeted work project, in which the most important is to determine the test time, which directly affects the resources required for growth [7–9]. Any reliability growth model contains unknown parameters. When the model is selected for the purpose of making growth plan, rather than just for the purpose of evaluating variable reliability, the parameters of the model should have engineering significance, that is, they can be selected accurately according to the characteristics of product hardware, test conditions and management level of the manufacturer. Otherwise, the growth F. Zhao · L. Wang · Y. Yi · D. Lu · J. Ma · L. Meng · O. Qi (B) Army Academy of Armored Forces, Changchun, Jilin, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_22

207

208

F. Zhao et al.

planning curve is far away from the actual growth law, and the control of reliability growth process will not only lose its significance, but also lead the growth work astray of modern computer industrial control [10–12].

2 Reliability Growth Evaluation Model 2.1 Evaluation of Reliability Growth Level In the process of growth, there are two kinds of evaluation of product reliability level based on test data. Verification value reliability verification value is an estimate of the current reliability level of the product based on the test data. This evaluation is applicable to the hardware structure being tested, but not to the future hardware structure. The verification value is obtained according to the test section by section, and there should be a verification value after each test section of modern computer industrial control. Predicted value reliability predicted value is the estimated value of reliability level at a certain time in the future. Predictive value can be divided into extrapolation predictive value and delay correction predictive value. Extrapolation prediction value refers to the estimation value of product reliability at a certain time in the future extrapolated by the same growth model in the continuous growth process under the condition that the test conditions and the control degree of the growth process remain unchanged, that is, the reliability estimation value of extending the tracking curve to a certain time in the future. The delayed correction prediction value refers to the reliability estimation value of the product at the beginning of the next test section after correction by using the growth prediction model when the fault is corrected after the test.

2.2 Process of Reliability Growth Assessment In the process of product reliability growth, it is necessary to grasp the fault information in time, and evaluate the product reliability level with the selected model or method according to the fault data. These evaluations include the reliability verification value and/or the delayed correction prediction value at the end of the test section, and the tracking curve and extrapolation prediction value for the continuous growth process. These estimates and the curve describes the real growth process and trend. Control and decision-making control the growth process is mainly to control the growth rate. When the verified value and predicted value are lower than the planned value, and the growth rate of the tracking curve is lower than the planned growth rate, we should try to speed up the growth rate. The main factors affecting the growth rate are the perfection of fracas, the accuracy of fault analysis and the

Reliability Growth in Product Quality Control in Modern …

209

effectiveness of corrective measures. If the verified value and predicted value are higher than the planned value, and the tracking curve is higher than the planned curve, special attention should be paid to the inspection of test methods and instruments and equipment, so as to improve the accuracy of fault detection and prevent the fault from missing detection.

3 Reliability Growth Control Model at Present There are two main differences between reliability growth management and general reliability program management without reliability growth. First, there is a carefully formulated growth curve as the basis of management; second, the reliability level of products in the growth process can be accurately evaluated by using the selected evaluation method. Therefore, there is a powerful means to control the process of reliability growth: quantitative control. However, the quantitative control model has great defects, it can achieve effective control of reliability growth in the case of linear, but the control effect of the quantitative control model is poor when the reliability is in the nonlinear region (Fig. 1).

Redesign

Test Exposure

Growth Assessment

Policy Decision

Fig. 1 Quantitative control of reliability growth

Fault Detection

Growth Curve

210

F. Zhao et al.

4 Duane Model Is Applied to Reliability Growth 4.1 Original Duane Model Duane growth model is an important model in reliability growth experiment, which is used to improve the reliability of complex products. A large number of practical experience and statistical results show that the initial mean time between failures of the newly designed prototype is very low MTBF is usually only 10–30% of the expected value (lower for reliability). Therefore, the reliability index must be increased through growth test (or equivalent test), and finally reach the expected value at the beginning of design when the test is stopped and the product is finalized. At present, the reliability of complex products, especially large mechanical and electrical Repairable Products, is very critical. Therefore, the reliability growth test (or equivalent test) must be carried out. The first task of reliability growth test is to establish the time probability distribution model of reliability growth. Due to the complexity of the failure mechanism, there are hundreds of models proposed, but the effect of engineering application is not ideal. There are many problems, such as large test deviation, complex test, long test cycle, high test cost and so on. The effective way to solve this engineering problem is to use the very mature model of hardware growth test in engineering application to equivalent the reliability growth model, and then fit the failure data collected in the test run with it. Let the cumulative test time of Repairable Products be t, and the cumulative failure times of products (0, t) in the development period be N (t). The cumulative failure rate λ (t) of a product is defined as the ratio N (t) of cumulative failure times to cumulative test time t  λ (t) = N (t)/t (1) Duane model points out: in the process of product development, as long as the exposed systemic failure is continuously corrected and improved to make it no longer  occur, the relationship between cumulative failure rate λ (t) and cumulative test time t can be approximately described by a straight line on the double logarithmic coordinate paper, and its mathematical expression is ln λ



(t) = ln λ1 − α ln t

(2)

Namely λ



(t) = λ1 t −α

(3)

 where: λ (t) is the cumulative failure rate observed at time t; is the estimated initial failure rate (failure rate at time t = 1), also known as the scale parameter, whose geometric meaning is the intercept of the Duane curve on the longitudinal axis of

Reliability Growth in Product Quality Control in Modern …

211

the double logarithmic coordinate paper; α is the estimated reliability growth rate, whose geometric meaning is the slope of the Duane curve on the double logarithmic coordinate paper. The trend of steady decline of cumulative loss efficiency is obtained from Formula (1) N (t) = λ



(t)t = λ1 t 1−α

(4)

From Eq. (4), the relationship between instantaneous failure rate and cumulative failure rate can be obtained as follows:  (t) (5) λ(t) = dN (t)/dt = (1−α)λ1 t −α = (1−α)λ Thus, the estimated value of instantaneous failure rate is 

λ(t) = (1−α)λ1 t −α





(6)

 Therefore, the cumulative value θ (t) and instantaneous value θ (t) of MTBF can be solved by the following formula 



(t) = t α /λ1

(7)

θ (t) = 1/λ(t) = t α /(1 − α)λ1

(8)

θ

(t) = 1/λ

In the period of reliability growth test, the estimation of cumulative failure rate can be calculated by successive failures; after the reliability growth curve is determined, the estimation of instantaneous failure rate λ(t) can be calculated. First, draw the relation curve between and t on the double logarithmic coordinate paper. According to the failure data record sheet collected, draw the relation curve—Duane curve on the double logarithmic coordinate paper.

4.2 Improved Duane Model If it represents the cumulative working time t, the number of failures N (t) within the period (0, t], and the average failure rate λ(t) = N (t)/t within the period (0, t], then on the double logarithmic coordinate paper, it has a linear relationship ln λ(t) with ln t, i.e. ln(N (t)/t) = α + β ln t

(9)

212

F. Zhao et al.

where, α, β is the model parameter, which can be estimated by the least square method, so the reliability growth can be predicted. Set λ(t) to t instantaneous failure rate at the moment, t, N (t) and λ(t), are defined the same as the Duane model. Mountain type (9) can be obtained: N (t)/t = eα t β

(10)

Order a = eα , b = β + 1, then N (t) = at b . If it is taken at b as the average number of failures including the product (0, t], then E[N (t)] = at b

(11)

Instantaneous failure rate λ(t) of t λ(t) = dE[N (t)]/dt = abt b−1

(12)

Order ∂ ln f /∂a = 0,∂ ln f /∂b = 0, we can get the following results: 

a = n/t0b 



b = n/

n 

ln(t0 /ti )

(13)

(14)

i=1

The planned growth curve is drawn according to the overall contour of the ideal growth curve. The target value of each stage in the planning curve is based on the corresponding value on the ideal curve, and is obtained by necessary modification according to the engineering experience. According to the characteristics of the tested hardware and the test, the correction method is selected for each test section. Because different test sections can have different correction methods, the shape of the planning curve can be various combinations of three different correction methods. According to the correction mode of each test section and the reliability level of the corresponding section of the ideal curve, the reliability levels of the entry point and the end point are determined. These reliability values can be corrected according to engineering experience.

5 Conclusion In this paper, through the study of reliability growth in product quality control, the shortcomings of traditional reliability growth model are pointed out. The product reliability is increased by Duane model and improved Duane model. The effect of

Reliability Growth in Product Quality Control in Modern …

213

improved Duane model is due to the original Duane model. How to measure the effect of reliability growth scientifically and effectively is the next research direction.

References 1. Wang L, Liu J, Yang C, Wu D (2021) A novel interval dynamic reliability computation approach for the risk evaluation of vibration active control systems based on PID controllers. Appl Math Model 92:422–446 2. Asadi M (2020) Reliability modeling of two-unit cold standby systems: a periodic switching approach. Appl Math Model 92 3. Demir N, Demirel M, Turna N, Yildizlar D, Demirbas N, Saglam Y (2021) Effect of clinician’s experience and expertise on the inter- and intra-observer reliability of hip migration index in children with cerebral palsy: a strobe-compliant retrospective study. Medicine 100(10) 4. Dhillon BS (2021) Applied reliability for engineers. CRC Press, Boca Raton, pp 03–11 5. Behling R (2021) Modern diagnostic X-ray sources: technology, manufacturing, reliability. CRC Press, Boca Raton, pp 03–11 6. Jafariasl J, Ohadi S, Seghier M, Trung NT (2021) Accurate structural reliability analysis using an improved line-sampling-method-based slime mold algorithm. ASCE-ASME J Risk Uncertainty Eng Syst Part A Civ Eng 7(2):4021015–4021011 7. Adomavicius G, Wang Y (2021) Improving reliability estimation for individual numeric predictions: a machine learning approach. Informs J Comput (2) 8. Wang D, Zhao X, Chen X (2021) New Hammerstein modeling and analysis for controlling melt pool width in powder bed fusion additive manufacturing. ASME Lett Dyn Syst Control 1(3):1–7 9. Inoue S, Yamada S (2020) Software shipping time estimation for Markovian change-point reliability model. Int J Reliab Qual Saf Eng 28(03) 10. Sharma G, Rai RN (2020) Risk-based threshold on intensity function of repairable systems: a case study on aero engines. Int J Reliab Qual Saf Eng 28(03) 11. Guerraiche K, Chatelet E, Dekhici L, Zeblah A (2020) Reliability optimization of wind farm power systems using bat algorithm with generalized fly. Int J Reliab Qual Saf Eng 28(03) 12. Suo B, Zhao L (2020) Synthetic reliability assessment model involving temperature–humidity step-stress based on wiener process. Int J Reliab Qual Saf Eng 28(03)

Financial Risk Management of Small and Medium Sized Enterprises in the Internet Environment Yaxin Tan

Abstract Nowadays, Internet technology has rapidly become the core of information technology, and has changed all walks of life at an amazing speed, which has had a profound impact on all aspects, not only politics, economy, culture and ecology, but also our daily life. On the Internet, small and medium-sized enterprises in my country are often at financial risk. This is why this article launched a study to analyse the financial management of small and medium-sized enterprises in the Internet. This article uses a combination of bibliographic analysis and comparative analysis to implementation of the research. In the research process of this article first examines the types of financial risks for small and medium-sized enterprises and the reasons for the formation of risks and analyses of the Internet environment by comparing the characteristics of financial risks with medium-sized enterprises, this document examines the types of financial risks faced by Chinese medium-sized enterprises on the Internet and analyses the problems of managing financial risks for medium-sized enterprises and provides appropriate solutions. Singing. The results of the investigation show: that compared to medium-sized enterprises, the most common financial risks of Chinese medium-sized enterprises on the Internet are financial risks and. investment risks, 28%. The results of the study of this article will be a specific guideline for managing the financial risk of small and medium-sized enterprises in my country. Keywords Internet environment · Medium sized enterprises · Financial risk · Risk management

1 Introduction We know that after the reform and opening up, the cooperative development of stateowned enterprises and private enterprises has continuously promoted the deepening Y. Tan (B) Wuhan University of Technology, Wuhan, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_23

215

216

Y. Tan

of the socialist market economy, and in this process, small and medium-sized enterprises have greatly promoted China’s economic development [1, 2]. In contrast to large enterprises and public enterprises, SMEs are relatively more flexible and the market. This is also an important reason why SMEs can obtain rapid market information and exploit business opportunities through their own development [3, 4]. Today, we can say, that the role of my country’s small and medium-sized enterprises in the diversified development of the market economy cannot be ignored, and the backbone is gradually becoming the economic development of my country and have achieved remarkable results in promoting employment [5]. Today, after a long period of development, SMEs have become an important part of my country’s national economy [6]. In recent years, however, the development of the Internet has been associated with some difficulties, the biggest financial risks [7]. We know that once there is turbulence in the financial sector, huge impact on the economic development of the country [8, 9]. It is therefore very important that you do a good job in managing and controlling financial risks with the rapid development of the Internet today, the characteristics of small and medium-sized enterprises hamper financial management [10]. On the Internet, the analysis of financial risk management for SMEs can effectively support the development of SMEs. Firstly, this paper briefly describes the financial risk management of small and medium-sized enterprises, explores the reasons for its formation, and summarizes the characteristics of financial risk in the Internet environment [11]. Plus, this article starts with the types of financial risks to which SMEs in my country are exposed in the Internet environment, and after discussion of risks to the media in my country on the Internet, this article analyses the problems that exist in the financial management of SMEs, and makes some suggestions equivalent countermeasures have been proposed [12].

2 Financial Risk Management of Small and Medium-Sized Enterprises Under the Internet Environment 2.1 Financial Risk Management of Medium Sized Enterprises 2.1.1 1.

Types of Financial Risks of Small and Medium Sized Enterprises

Market risk

Generally speaking, there are many market risks, including the risks faced by enterprises due to the changes of stock price, market price and exchange rate, which will directly affect the smooth development of enterprises.

Financial Risk Management of Small and Medium Sized Enterprises …

2.

217

Credit risk

As the name suggests, it is related to the credit of both parties. In other words, if one side of the transaction does not keep its promise, or due to other factors, the enterprise will face more financial risks. 3.

Liquidity risk

Capital has a certain liquidity, which requires enterprises to maintain a certain liquidity during the operation period. If the liquidity cannot be realized, it is likely to cause liquidity risk. 4.

Operational risk

The main reason of operational risk is due to the management mistakes of enterprises. Therefore, enterprises should constantly improve the rules and regulations and adopt mature management methods. 5.

Financing and investment risk

Generally speaking, it refers to the risk caused by the uncertainty of foreign investment income during the operation period of the enterprise. We know that no matter which enterprise needs to raise funds, once the efficiency of raising funds is reduced, the enterprise will not be able to repay its debts in time, which is likely to reduce its operating profits, and even make it unable to produce normally. In financing and investment risk, capital adequacy is an important test room indicator, Capital asset ratio =

Capital × 100% Total assets

Capital adequacy ratio Capital − Deductions = × 100% Risk weighted assets + 12.5 × Market risk capital Core capital adequacy ratio Core capital − Deduction of core capital = × 100% Risk weighted assets + 12.5 × Market risk capital

(1)

(2)

(3)

218

Y. Tan

2.2 The Causes of Financial Risks in Small and Medium Sized Enterprises 2.2.1

External Causes

Generally speaking, there are two external causes of business risk. The first is the financial risk itself, which is mainly caused by various unstable economic factors. The second is the current social economic and political environment. In addition, if the financial risk prediction and management mechanism is not perfect, it will also create favorable conditions for the occurrence of financial risks.

2.2.2

Internal Reasons

Generally speaking, the internal factor of financial risk is the risk control system. Specifically speaking, if the enterprise does not establish a complete internal management system, then when the enterprise’s own financial management level is relatively low, there will be financial management regulations and systems cannot play a corresponding role. In this case, the enterprise has no way to make rational use of funds, resulting in financial losses. At the same time, if enterprises make false financial information, people will not be able to correctly predict the financial risk, so it is impossible to effectively establish a targeted early warning system, so it is easy to fall into business difficulties. On the other hand, if the quality of financial personnel is relatively low, it will also bring some financial risks, which may affect the normal operation of the enterprise.

2.3 Characteristics of Financial Risks in the Internet Environment 2.3.1

Strong Communication

We know that in the Internet age, the development of network technology and mobile terminals is very rapid. In this way, financial information can be spread faster and more widely, even to everyone. In this way, once there is a risk, it will have an impact on the financial behavior of the market.

2.3.2

Fast Instantaneity

One of the characteristics of the Internet is fast, in such an environment of financial management, are the use of high-tech network technology, so as to provide strong

Financial Risk Management of Small and Medium Sized Enterprises …

219

it support for the realization of financial service convenience, capital flow is fast. In this way, financial risk has the characteristics of instantaneous fast.

2.3.3

High Virtue

In the age of the Internet it is by nature virtual. Therefore virtual digital information is the key element in online transactions, and the object, the purpose and process of the transaction is not transparent. Consequently, time and geographical constraints are lost you go. propose higher requirements for the prevention and control of financial risks and financial supervision on the Internet.

2.3.4

Very Complex

Economic application in the Internet environment offers advanced information technology. Services. The complex technical system makes it difficult, hidden risk problems to find. The open and shared Internet environment increases the probability of malicious Attacks. The requirements for network encryption technology and information technology are even greater.

3 Research Ideas and Methods 3.1 Research Ideas As a starting point for the type of financial risks faced by small and medium-sized enterprises in my country, the types of financial risks that deal with small and mediumsized enterprises in my country on the Internet and compare them with financial risks are discussed, faced by non-SMEs see. Analysis existing risk management problems and provision of appropriate solutions.

3.2 Research Methods 3.2.1

Literature Analysis

As a starting point for the type of financial risks faced by small and medium-sized enterprises in my country, to discuss the types of financial risks associated with small and medium-sized enterprises in my country on the Internet and compare them with financial risks.

220

Y. Tan

3.3 Comparative Analysis This paper provides a comparative analysis of research comparing SMEs with nonSMEs. Emphasis on the financial risks faced by Chinese SMEs on the Internet and the creation of the foundations for research and management analysis risks.

4 Financial Risk Management Results of Small and Medium-Sized Enterprises Under the Internet Environment 4.1 Financial Risk Analysis of Medium Sized Enterprises in the Internet Environment This paper analyzes the types of financial risks of small and medium-sized enterprises in China, and the results are shown in Table 1 and Fig. 1. It can be seen from Table 1 and Fig. 1 that in the Internet environment, compared with non-SMEs, the financial risks of SMEs are mainly financing and investment risks, accounting for 28%, while the financing and investment risks of non-SMEs are only 19%. In addition, market risk is the most frequently encountered risk of nonSMEs, accounting for 25%, followed by credit risk, accounting for 22%, operational risk, accounting for 18%, and liquidity risk, accounting for 16%. In SMEs, market risk accounts for 18%, credit risk 18%, liquidity risk 16%, and operational risk 20%. Table 1 Types of financial risks of small and medium-sized enterprises Types of risks

Non small and medium sized enterprises (%)

Small and medium-sized enterprises (%)

Market risk

25

18

Credit risks

22

18

Liquidity risk

16

16

Operational risk

18

20

Financing and investment risk

19

28

Financial Risk Management of Small and Medium Sized Enterprises …

221

Small and medium-sized enterprises Non small and medium sized enterprises

Types of risks

Financing and investment risk Operational risk Liquidity risk Credit risks Market risk 0%

5%

10%

15%

20%

25%

30%

35%

Proportion Fig. 1 Analysis results of financial risk types of small and medium-sized enterprises

4.2 Analysis of Financial Risk Management of Small and Medium-Sized Enterprises Under the Internet Environment 4.2.1

Problems in Financial Risk Management of Small and Medium Enterprises Under the Internet Environment

This paper analyzes and sorts out the problems existing in the financial risk management of small and medium-sized enterprises under the Internet environment, and the results are shown in Table 2 and Fig. 2. Table 2 Problems in financial risk management of small and medium-sized enterprises under the internet environment Problems in financial risk management of small and medium enterprises under the Internet Environment

Proportion (%)

Weak technical foundation and backward risk management means

23

Policies and regulations are incomplete, and the legal basis of risk management 18 needs to be further improved The lack of objective conditions of risk management restricts the development of risk management

18

Due to the cumbersome approval management procedures, the approval risk of 25 SME financing increases Foreign exchange control policy and implementation imbalance, increase foreign exchange risk

16

222

Y. Tan

Weak technical foundation and backward risk management means 18% 25% 18%

41% 16% 23%

Policies and regulations are incomplete, and the legal basis of risk management needs to be further improved The lack of objective conditions of risk management restricts the development of risk management Due to the cumbersome approval management procedures, the approval risk of SME financing increases

Fig. 2 Analysis results of problems in financial risk management of small and medium-sized enterprises under the internet environment

4.2.2

Countermeasures for Financial Risk Management of Small and Medium Sized Enterprises Under the Internet Environment

On the Internet, the economic risks of small and medium-sized enterprises must be better addressed are. First, we need to manage financial risks for small and mediumsized enterprises optimize. Second we need national policies improve. Strengthening legislation and improving the reforms of the financial system for the further opening of the financial market. Only the risk management body, but also the intermediate risk management body, should be set up to take into account the training of risk management staff and to strengthen risk prevention for small and medium-sized enterprises, so that small and medium-sized enterprises can be empowered, to manage economic risks well on the Internet.

5 Conclusions After the reform and opening up, my country’s small and medium-sized enterprises have developed beautifully and have become an important part of my country’s national economy. We know that the Internet has now become part of our daily lives and has had a major impact on our lives. In the Internet environment, the development of small and medium-sized enterprises in my country is facing some difficulties, the most important of which is the economic risk. This article takes the types of financial risks faced by small and medium-sized enterprises in our country as their point of entry, discuss the types of financial risks faced by Chinese SMEs

Financial Risk Management of Small and Medium Sized Enterprises …

223

in the Internet environment and compare them with non-SMEs. Finally, we have analysed the problems in managing the financial risk of SMEs and we are providing corresponding solutions. The research in this article will provide a specific reference price for managing the financial risk of small and medium-sized enterprises on the Internet.

References 1. Bruhn M, Karlan D, Schoar A (2018) The impact of consulting services on small and medium enterprises: evidence from a randomized trial in Mexico. 102(2):31–33(3) 2. Rostami A, Sommerville J, Wong IL et al (2017) Risk management implementation in small and medium enterprises in the UK construction industry. Eng Constr Archit Manag 22(1):91–107 3. Rossi M (2017) Capital structure of small and medium enterprises: the Italian case. Int J Globalisation Small Bus 6(2):130–144 4. Munguti MJ, Wamugo L (2020) Microfinance credit accessibility and financial performance of small and medium enterprises in Machakos County, Kenya. IJBE (Integr J Bus Econ) 4(1):71 5. Naude MJ, Nigel C (2017) A proposed operational risk management framework for small and medium enterprises. S Afr J Econ Manag Sci (SAJEMS) 20(1):1 6. Mahmood K, Shevtshenko E, Karaulova T et al (2018) Risk assessment approach for a virtual enterprise of small and medium-sized enterprises. Proc Est Acad Sci 67(1):17–27 7. Karaoulanis A (2017) Financial impediments in risk management mechanisms of Greek small and medium enterprises. Int J Manag Inf Technol 12(1):3128–3152 8. Noja GG, Thalassinos E, Cristea M et al (2021) The interplay between board characteristics, financial performance, and risk management disclosure in the financial services sector: new empirical evidence from Europe. J Risk Financ Manag 14(2):79 9. Effiong S, Ejabu FE (2020) Liquidity risk management and financial performance: are consumer goods companies involved. Int J Civ Eng Technol 9(1):2277–3878 10. Kazbekova K, Adambekova A, Baimukhanova S et al (2020) Bank risk management in the conditions of financial system instability. J Entrepreneurship Sustain Issues 7(4):3269–3285 11. He S (2021) Risks of enterprise financial management and legal countermeasures. China Collective Econ (10):139–140 12. Jia L (2021) Analysis of enterprise financial risk assessment and control. Adm Assets Finance 06:90–91

Based on Big Data Analysis Technology to Explore the Influence of Property Responsibility Derivative System on Enterprise Performance Yiyi Zhang

Abstract With the continuous implementation of State Construction Strategy and various environmental policies in China, the government has some policies in the enterprise’s extended responsibility system. However, the impact of such policies on the enterprise’s performance is unknown. Big data analysis technology is a more effective technology in today’s data analysis, which can be based on data collection, data preprocessing, data processing, data management, data management, etc. The four key stages of data analysis and data application are mining all kinds of valuable information related to enterprise performance and environmental regulation from massive data. Based on the information related to production responsibility derivative system of pilot enterprises from 2014 to 2019 and the big data of enterprises disclosed on the Internet, this paper mines the changes and differences of enterprise performance with environmental regulation, Through these two methods, the research shows that: the real estate responsibility extension system can improve the enterprise performance and value to a certain extent, so it is suggested to realize the promotion of the production responsibility extension system as soon as possible, and the promotion mode is not limited to the government enforcement, but more rely on the market. Keywords Big data · The system of property liability extension · Corporate financial performance · Enterprise value

1 Introduction Big data is one of the most popular research fields, which has been widely concerned all over the world. In the academic community, nature and science have launched a special issue on data processing to discuss the new opportunities and challenges brought by the flood of data in the field of scientific research [1]. In industry, McKinsey research institute points out that big data will be the next wind vane Y. Zhang (B) Shanghai University, Jiading District, Shanghai, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_24

225

226

Y. Zhang

of innovation, competition and productivity improvement. At the government level, the US government has opened up more than 400,000 pieces of government data, and promulgated policies such as “big data research and development plan” to promote data sharing. The Chinese government also attaches great importance to the application and development of big data technology. In 2015, the State Council issued the “action plan for promoting the development of big data”, pointing out that data has become an important national strategic resource [2]. With the continuous popularization of advanced IT equipment applications, enterprise information systems and social media services, a large amount of structured and unstructured data (big data) are emerging, and the challenges of enterprise data management and capitalization of data advantages are also growing. Big data is characterized by volume, velocity, variety and veracity. Industry participants generally believe that big data analysis will open a new blue ocean of business value. Enterprise big data analysis is an innovative it behavior that enterprises use various technologies (such as database and data mining tools) and methods (such as analysis methods) to analyze large and complex data, aiming at improving the performance of enterprises in all aspects. Data storage, management, analysis ability and visualization technology are important components of enterprise big data analysis ability. With the help of big data analysis, enterprises can monitor and track the market situation of products/services, which can more accurately judge the business environment. Theoretically speaking, it will play an important role in reducing enterprise costs, exploring strategic information, expanding business vision, improving decision-making efficiency and quality, and shaping potential competitive advantages. Some enterprises begin to step on the fast train of big data, such as Google, IBM, apple and other IT giants are very optimistic about the business prospects of big data analysis and application, invest a lot of money in related technology fields, and master the most cutting-edge technology of big data analysis. However, in reality, many theorists and industrialists still hold a differentiated attitude towards the strategic value of big data. Some scholars believe that big data, as a social technology phenomenon, should critically question and carefully examine its real benefits [3]. Nowadays, how to regulate the environment has become a very important policy in the development of enterprises, and how to combine the environment with the development of enterprises has become the goal of enterprise research in the future, The data used in the development of enterprises are mainly divided into internal data and external data. Among them, the internal data mainly includes OA system, EPR system and relevant data provided by some financial management departments, which are combined on the basis of informatization. The external data mainly includes some unstructured data on the network. In the current stage of work, the most widely used data are hypertext, XML, etc. Image and video information, etc. the traditional technology has been faced with the production demand under the background of big data. Therefore, it is necessary to connect it with the domain points on the Internet to provide the relevant users with the data and information they need. Data interface collection is to achieve data collection by coordinating the software manufacturers of business-related enterprises and providing data interface by software manufacturers.

Based on Big Data Analysis Technology to Explore the Influence …

227

In 2016, the State Council issued the case of promoting the extended responsibility system of property owners, which defined the connotation of EPR and the key industries to promote the EPR system. However, due to the theory of externality, the producer does not need to bear this part of the cost, but because of the implementation of EPR (extended liability system), the enterprise increases the extra cost, The negative externalities of its production will lead to the reduction of the total social welfare, and electricity and waste are also typical externalities [4]. In the process of the implementation of the extended responsibility system, the government’s policies mainly include the construction of recycling system, the promotion of resource utilization and green design. This requires enterprises to improve their own innovation ability, and need to add green related technology on the basis of the original technology. However, the impact of applying big data analysis technology to circular economy on enterprises is very rare. In the existing research on ERP, many scholars are dedicated to the study of extended responsibility system of household electrical appliances. Some scholars have studied the construction of extended responsibility system of household electrical appliances by taking CH Company as an example, How to adapt the extended responsibility system to the changing process in the home appliance market. However, the impact of applying big data analysis technology to circular economy on enterprises is very rare. In the existing research on ERP, many scholars are dedicated to the study of extended responsibility system of household electrical appliances. Some scholars have studied the construction of extended responsibility system of household electrical appliances by taking CH Company as an example, How to adapt the extended responsibility system to the changing process in the home appliance market [5]. In the automobile industry, Wang Lili has also carried out corresponding research. She has studied three modes of reverse logistics recovery of end-of-life automobile under EPR system, including manufacturer responsibility mode (MDCM, mdcdm), manufacturer consortium responsibility mode (mdcdp), third party responsibility mode [MDC (TP)], cooperation mode [MDC (IM)] and so on. On the basis of mechanism characteristics and stress conditions, the factors influencing the selection of recovery mode of reverse logistics of end-of-life steam were clustered [6]. In addition, there are also corresponding studies at the enterprise level. There are also studies on the effectiveness of the reward and punishment mechanism in the mode of EPR selection. The experiments show that: (1) There are also studies on the effectiveness of the reward and punishment mechanism in the mode of EPR selection; (2) Through the comparison of different recycling channel modes, it is found that the single recycling channel dominated by producers is the most efficient. (3) According to the different rewards and punishments, the producer can choose to entrust the dealer to recycle or the third party to recycle [7]. Based on the above research, this paper adopts the pilot enterprises of listed companies as the sample data, and uses big data analysis technology to obtain and process the data, so as to study the impact of the implementation of EPR on enterprise performance.

228

Y. Zhang

2 Theoretical Analysis and Research Hypothesis 2.1 The Influence of Property Liability Extension System on Enterprise Value For many years, many scholars have studied the impact of environmental regulation on enterprises in depth. Adopting EPR can encourage enterprises to innovate and enhance their competition in the market. In this way, enterprises can benefit from production. But in addition, many enterprises will face serious cost pressure because of taking strict measures, In order to reduce the resource profit and the additional cost of waste recovery profit as much as possible, the enterprise’s profit will increase. In history, there are three main viewpoints: traditional hypothesis, Porter hypothesis and uncertainty hypothesis. The traditional hypothesis holds that the burden of environmental responsibility of enterprises will inevitably lead to the loss of their economic interests, weaken the competition of enterprises to a certain extent, and inhibit the development of enterprise performance. However, Porter put forward in 1991 that “appropriate environmental policies can improve innovation and production efficiency, make up for the cost of environmental protection products, and form benefits”. He believed that environmental regulation can provide innovation advantages and first mover advantages for enterprises, and improve the overall performance of enterprises. This view later developed into the famous “Porter Hypothesis”, and has been verified by many scholars in the field of economics. In addition, the “uncertainty hypothesis” holds that there are many uncertain factors between environmental regulation and firm performance. In the remanufacturing industry, Jian Cao studied the environmental regulations and financial measures formulated by the government, and elaborated their impact on the reverse supply chain. The results show that under the appropriate policy incentives, supply chain members can take environmental protection measures to improve the actual remanufacturing rate and increase the recycling degree, so as to promote the development of remanufacturing industry, especially in the early stage of its development [8]. For the impact of the measures on the enterprise itself, we should not make too much progress. According to the current data of the electricity waste trading market, the overall trading volume and volume of China’s household appliances and other electricity waste related markets have increased steadily, and the national carbon trading market is in the construction stage. Therefore, the allocation of pilot enterprises in each pilot market will be more stringent. Under the political pressure of energy conservation and emission reduction regulations, enterprises have the motivation to purchase emission reduction equipment and improve technological process, which can promote the development of enterprises. Therefore, this paper puts forward the hypothesis 1: H1: the implementation of property responsibility extension system can enhance enterprise value.

Based on Big Data Analysis Technology to Explore the Influence …

229

In addition, the current listed companies have less disclosure of EPR information or “four green” information. A little detailed disclosure will attract investors’ attention. Energy saving and emission reduction enterprises can form “first mover advantage” in the capital market, transmit positive signals, further enhance investors’ willingness and enhance enterprise value.

2.2 The Influence of Property Liability Extension System on Enterprise Financial Performance On the basis of Coase’s property right theory, Thomas put forward the method of internalizing enterprise cost, which can be realized by the producer being responsible for the whole life cycle of the product, especially for the recovery, circulation and final disposal of the product. After the implementation of this policy, the responsibility of the producer extends to all the cycles of the product, which can internalize the negative externalities caused by waste reasonably. In this way, the market mechanism can play an active role in the allocation of environmental resources, encourage the environmental subjects to make decisions through market signals, and make the marginal cost of pollution reduction tend to be equal among the emitters, In this way, the total amount of pollution emission can be controlled with the lowest overall emission reduction cost, and Pareto optimization can be achieved. Before that, China’s industrial responsibility extension system was in the stage of pilot operation. The government often adopted a series of safeguard measures and incentive measures to promote the pilot enterprises to fulfill the extended responsibility [9]. In addition, the recycling and treatment of waste contains huge business opportunities, and domestic waste treatment is often not undertaken by domestic enterprises. Industrial enterprises know the composition and structure of products best, so it is the best choice for them to take the responsibility of recycling, recycling and disposal of waste products. In fact, the extended responsibility system of industrial enterprises is to give waste products to industrial enterprises in the form of laws and regulations. The recycling and treatment of product waste will produce some extra profits. However, the recycling profits of product waste can bring profitable resources to the enterprise, reduce the production cost and external dependence of resources, and may become a new profit source for the enterprise [10]. In addition, the enterprise acceptance trading system will be subject to more stringent institutional constraints such as verification, reporting and performance. The environmental impact and waste recovery in the production process are subject to more government supervision, which is conducive to reducing the environmental risk of enterprises, reducing the probability of environmental fines, administrative penalties, production suspension and other related events, and avoiding the outflow of economic benefits. Therefore, for the micro level of the enterprise subject, after the implementation of the property responsibility extension system pilot, through reducing costs, reducing risks, trading income and other investment activities, we

230

Y. Zhang

can get additional economic benefits and improve the financial performance of enterprises. Therefore, this paper proposes hypothesis 2: H2: the implementation of property responsibility extension system can improve the financial performance of enterprises.

3 Analysis Method and Variable Design 3.1 K-means Clustering Algorithm In order to compare the value impact of the controlled enterprises participating in EPR and the controlled enterprises not participating in EPR before and after the implementation of the extended liability system, and the pilot time is July 2015, this paper selects China’s pilot enterprises from 2014 to 2019 as the data sample. The specific list of enterprises is obtained from the pilot list of four ministries and commissions on releasing the responsibility extension of electrical products and producers. In order to obtain the data of related enterprises, K-means clustering algorithm is a widely used iterative clustering algorithm. It divides different entities of the whole system into specific clusters by means of classification. In the process of division, it is necessary to ensure that each cluster has high similarity, and ensure that there are certain differences between different clusters. In the specific operation process, it needs to be carried out according to the strict processing flow. First of all, we need to define a fixed centroid, mainly through random selection; the decision-maker randomly selects a centroid from a large number of data center points. After the position of the center of mass is determined, the distance between the center of mass and the data points is measured and analyzed by using a certain computer algorithm. At the same time, these data points need to be divided into clusters. After completing the above operation, according to the data points measured in the second step, the new quality is determined and measured, and finally the data reading is completed. Nowadays, the manufacturing industry has basically realized e-commerce. The variables related to enterprise performance, such as sales data, are obtained from the e-commerce website. The cluster analysis method is used to classify and obtain the instrumental variables that can best reflect the enterprise performance. The method of double difference (did) test is adopted. The enterprises with EPR are taken as the treatment group, and those without EPR are taken as the control group, The main factors affecting the implementation of EPR include policy management, economic and technological factors and environmental awareness [11]. Therefore, according to the above variables, we selected the paired samples from the enterprises in the pilot provinces and cities, and carried out the following screening: (1) only for the manufacturing industry, such as automobile industry, electrical machinery and equipment manufacturing industry, computer equipment and

Based on Big Data Analysis Technology to Explore the Influence …

231

other electrical products industry (2) Eliminate companies with missing data (3) Excluding the companies listed after 2010.

3.2 Variable Definition and Research Design 3.2.1

Explained Variables: Financial Effect, Including Enterprise Value and Financial Performance

The enterprise value is calculated as the value of market value and total assets by using tobins q after clustering analysis of big data analysis method. The financial performance of an enterprise is derived from the big data analysis method, that is, the rate of return on total assets (ROA). The calculation method is the value of current net profit and average total assets.

3.2.2

Explanatory Variables: The Implementation of the Policy of Property Responsibility Extension System

According to the standard did regression method, there are three explanatory variables in this paper, namely, the implementation time of the extended liability system, whether the enterprise is included in the extended liability system, and the time * treated. The implementation time and whether to be accepted or not are dummy variables.

3.2.3

Control Variables

In the model, the influence factors of other factors on enterprise performance are obtained by cluster analysis, and six control variables are selected to control the influence of other factors on enterprise value. These control variables are: current, size, LEV, turnover, shrhfd and investor protection.

3.2.4

Model Design

Based on the existing research, this paper sets the model (1)–(2) and adopts OLS method for regression analysis: tobins Q i,t = a0 + a1 time + a2 tr eated + a3 time ∗ tr eated + γ X i,t + εi,t r oai,t = a0 + a1 time + a2 tr eated + a3 time ∗ tr eated + γ X i,t + εi,t

(1) (2)

232

Y. Zhang

Among them, Tobins Qi,t represents the current enterprise value, measured by Tobin Q value; roai,t represents the current financial performance of an enterprise, measured by the rate of return on total assets; a0 is the intercept, a1 is the coefficient, time represents the year in which the extended property responsibility system is implemented in the pilot area, treated represents whether the enterprise is included in the extended property responsibility system, time * treated is the cross factor, Xit represent the control variables, including current, size, Lev, turnover of total assets, etc. Shrhfd, investor protection, εit the residual.

4 Empirical Results and Analysis 4.1 Property Responsibility Extension System and Enterprise Value and Financial Performance In Table 1, 1 refers to the model regression data to test hypothesis 1, and 2 refers to the regression data to test hypothesis 2. The explained variable models of each model are tobinsq and ROA, respectively. Liquidity ratio, enterprise scale, asset liability ratio, turnover energy, equity concentration and investor protection degree are the control variables. From this, we can see that the cross multiplier coefficient of time * treated is positive and significant, which proves that the extension of responsibility system can effectively enhance the value of the enterprise, and the tobinsq value of about 0.404 is increased after the implementation of the policy and before the policy. Table 1 Model regression data results 1

2

Variable

tobinsQ

roa

Time

−0.487*** (−6.58)

−0.003* (−1.83)

Treated

−0.093 (−1.12)

−0.005*** (−3.13)

Time * Treated

0.404*** (3.02)

0.004* (1.42)

Current

0.0001 (1.17)

−0.0001 (−0.18)

Size

−0.031** (−2.01)

−0.003 (−1.55)

Lev

−0.154*** (−4.55)

−0.031*** (−11.87)

Turnover

−0.072*** (−2.21)

0.010*** (6.43)

Shrhfd

−0.688*** (−5.72)

0.024*** (3.11)

Investor

−0.051*** (−16.72)

0.002*** (7.32)

Year/industry

Yes

Yes

R-squared

0.164

0.142

Adj_R2

0.163

0.121

F

152.9

13.18

Based on Big Data Analysis Technology to Explore the Influence …

233

5 Research Conclusions and Suggestions In this paper, we use big data technology to mine and process the data of pilot enterprises. We use the double difference method (did) to study the impact of its policy on enterprise financial performance and enterprise value. The research shows that the pilot enterprise responsibility extension system can effectively improve enterprise value and enterprise performance. 1.

2.

To promote the implementation of the extended responsibility system, the current system is forced by the government, not by enterprises. From the conclusion of this paper, it can be seen that if this policy is adopted, the enterprise value and performance can be improved to a certain extent, and the innovation ability of enterprises can be improved, and there can be a competitive place in the market. The application of big data analysis to the relationship between environmental regulation and enterprise performance is very useful for enterprises to further improve enterprise management and make correct empirical decisions. In this paper, the K-means clustering method is used to cluster several variables most related to enterprise performance and combine them with environmental policy to obtain useful results, which is more rigorous than finding variables from academic articles, It confirms the authenticity of the results, so we can combine big data with empirical research in the future to make the conclusions more rigorous.

References 1. Mao Z, Zhao J (2020) Modeling and application of driving behavior recognition based on remote monitoring data of new energy vehicles. Automobile Accessories 17:80–83 2. Lei Z, Jia F, Zhou X, Lin J (2015) Big data health monitoring method for mechanical equipment based on deep learning theory. J Mech Eng 51(21):49–56 3. Spaaij R, Thiel A (2017) Big data: critical questions for sport and society. Eur J Sport Soc 14(1):1–4 4. Zhou S, Tao C (2012) Environmental accounting: theoretical review and enlightenment. Account Res (02):3–10+96 5. Chen Z (2015) Take CH company as an example to carry out the research on the construction of extended producer responsibility system for home appliance products. University of Electronic Science and Technology of China (in Chinese) 6. Wang L (2013) Research on reverse logistics recovery model of scrapped automobile based on EPR. Master, Chongqing Jiaotong University (in Chinese) 7. Zhao Y, Wang W, Ni Y (2020) EPR system based on a reward and punishment mechanism: producer-led product recycling channels. Waste Manage 103:198–207 8. Cao J, Zhang X, Hu L, Xu J, Zhao Y, Zhou G, Schnoor JL (2018) EPR regulation and reverse supply chain strategy on remanufacturing. Comput Ind Eng 125:279–297 9. Pan F (2012) Research on extended producer responsibility system in China. Master, Hunan University (in Chinese)

234

Y. Zhang

10. Li J (2006) Dual effect analysis of extended producer responsibility. China Sci Technol Pap Online (6) (in Chinese) 11. Zhao Y, Zhu Q, Wu C (2008) Empirical study on the influencing factors of the implementation of extended producer responsibility system in China’s automobile industry. Manag Rev (01):40– 46+64

Classification of Cerebral Arteriosclerosis Patients Based on Fuzzy Comprehensive Evaluation in the Background of Information Technology Donghua Luo Abstract Under normal circumstances, the degree of disease of patients with cerebral arteriosclerosis is reflected by the blood vessels condition showed by the changes of hemodynamic parameters PI, RI, S/D and the characteristics extracted by spectrum through the imaging of extracranial blood vessels by transcranial doppler detector. This paper combines advanced information technology and uses fuzzy theory to classify hemodynamic parameters. According to the condition of blood vessels, the patients’ condition of cerebral arteriosclerosis is judged in order to give doctors recommendations and implement effective treatment plans for patients. Keywords Cerebral arteriosclerosis · Fuzzy comprehensive evaluation · Information technology

1 Introduction With the rapid development of information technology, hospitals have now introduced a large number of advanced technology and equipment. The transcranial doppler detector is one of them. It uses advanced information technology to obtain the PI, RI, S/D and other parameters of each artery and blood vessel through transcranial doppler. It can directly reflect the functional status of cerebral blood vessels and changes in hemodynamics. It has the advantages of fast, non-invasive and repeatable. Since 1988, it has been widely used clinically in China. Cerebral arteriosclerosis is one of the common diseases of middle-aged and elderly people. There are no specific indicators. Many domestic scholars use TCD to detect the anterior cranial artery. In patients with cerebral arteriosclerosis, the pathological changes of cerebral arteriosclerosis will inevitably lead to changes in cerebrovascular function status and changes in hemodynamics, which can be shown in transcranial doppler spectral images. Due to the difference in the degree of cerebral arteriosclerosis and the difference in hemodynamic changes, the abnormality of the transcranial doppler detector D. Luo (B) Shandong Communication and Media College, Jinan, Shandong Province, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_25

235

236

D. Luo

and its indicators can also have many manifestations. Different manifestations also reflect the degree of cerebral arteriosclerosis. Fuzzy comprehensive evaluation is based on fuzzy mathematics. It applies the principle of fuzzy relationship synthesis to quantify some unclear borders and difficult to quantify factors, then does corresponding comprehensive evaluation [1]. Through fuzzy theory knowledge, the experiment used membership degree and membership function to properly describe the fuzzy characteristics of cerebral arteriosclerosis, and used the principle of maximum membership to classify. Satisfactory results have been achieved, and the efficiency and accuracy of diagnosis have been improved.

2 Spectral Manifestations of Cerebral Arteriosclerosis In clinic, many patients have dizziness and vertigo symptoms for decades, but CT examination is normal, and TCD diagnosed cerebral arteriosclerosis. Because cerebral arteriosclerosis can lead to diffuse blood supply disorders, and as the course of cerebral arteriosclerosis continues, atherosclerotic plaque fills the vascular cavity, which causes irregular thickening of the vascular wall, resulting in cerebral vascular stenosis and spasm, and insufficient blood supply to the brain. Patient will have a series of neurological symptoms [1]. Cerebral arteriosclerosis will inevitably lead to weakened cerebrovascular elasticity and cause changes in the functional state of cerebrovascular, which can first be reflected in the shape of the transcranial doppler spectrum. Therefore, the transcranial Doppler spectrum images of patients with cerebral arteriosclerosis have different degrees of changes and exception, mainly manifested in three aspects [2]. The first is the early abnormality of intracranial blood vessels in patients with cerebral arteriosclerosis. The TCD spectrum changes are based on spectrum changes without blood flow velocity changes. The characteristics of the spectrum changes are: the main peak is rounded, the peak time shifts back, the frequency window disappears, and the main changes are in the internal carotid system. The principle is: When the ultrasound beam is projected to the detected artery, blood cells in the blood vessel produce a frequency-shifted wave pattern along with the vasoconstriction and relaxation during the cardiac cycle. Its formation is affected by many factors, mainly vascular elasticity and peripheral resistance. When sclerosis, blood flow in the blood vessel fills and prolongs rapidly, the contraction peak loses its steep shape, and the turning angle of the ascending branch is called the folded peak [3]. Therefore, it can be considered that if only the elasticity of the blood vessel is changed in arteriosclerosis, the blood flow is not affected, so that the blood supply to the brain can be normal. The second is the insufficiency of blood supply to the cerebrovascular. It is mainly due to the changes in the frequency spectrum accompanied by the slowing of the blood flow of single or multiple arteries, which is considered to be the degeneration of the vascular intima, which thickens the lumen, resulting in a relative decrease in blood flow. TCD can find whether there is stenosis, occlusion or abnormal development of the large arteries and the compensatory ability of the collateral circulation. The insufficiency of blood supply is mainly due to the

Classification of Cerebral Arteriosclerosis Patients Based …

237

blood flow speed being significantly lower than normal. The third is cerebral artery stenosis. TCD is undoubtedly more sensitive to hemodynamic changes than other existing tests [2]. However, due to the sufficient blood supply of the collateral circulation at the initial stage, there may be no changes in localization signs, but there are changes in hemodynamics. Increased blood flow velocity: When the blood flow remains relatively constant, the smaller the lumen, the greater the flow velocity. This relationship has been confirmed by angiography [3–5]. TCD abnormal changes are asymmetrical blood flow velocity increase. Although statistical processing P > 0105, combined with the suppression of the spectrum changes, it can cause vascular sclerosis in cerebral arteriosclerosis. The stenosis has a certain meaning. ➁ Abnormal doppler signal: When the vascular laminar flow is turbulent, the eddy signal can be seen. Such as during the upper and lower systolic period, there will be higher-density lumpy images. In the experiment, two patients had this change, indicating that the changes in arteriosclerosis and vascular stenosis were more obvious [4].

3 Changes of Vascular Elasticity Index of Transcranial Doppler In spectral vascular elasticity indicators, such as PI, RI, S/D, if more than two of the three parameters exceed the normal range, or the PI index exceeds the normal range, combined with changes in the spectral shape, cerebral arteriosclerosis can be diagnosed.

4 Basic Principle Fuzzy comprehensive evaluation [5] is to use fuzzy mathematics tools to make a comprehensive evaluation of the assessment objects with the influence of multiple factors. U = {u 1 , u 2 , . . . , u m } is the m kinds of factors of the assessed object, called the factor set. V = {v1 , v2 , . . . vn } is the n kinds of decisions of the state of each factor of the assessment object, which is called the decision set. There are two types of fuzzy sets here. Taking subjective weighting as an example, one type is the fuzzy weight vector on the sign factor set A = ua11 + ua22 + · · · + uamm (0 ≤ ai ≤ 1; i = 1, 2 . . . m), where ai is the degree of membership of u i to A, which is a measure of the importance of single factor u i in all factors. The other is the fuzzy relationship from U to V , which is expressed as the fuzzy matrix R of m × n. Applying a certain fuzzy synthesis operation to these two types of fuzzy sets will get V fuzzy subset B = {b1 , b2 , . . . , bn }. This subset is the comprehensive evaluation of the assessed object. According to the comprehensive evaluation result, the level of the object can be directly determined according to the principle of maximum membership degree, or it can be converted into a comprehensive score to rank the evaluation objects. The

238

D. Luo

core of fuzzy comprehensive evaluation is to find a fuzzy weight vector A and a fuzzy evaluation matrix R[ri j ]m×n from U to V , where ri j indicates the degree of factor u i having a degree of v j ( j = 1, 2 . . . n). Furthermore, the fuzzy comprehensive evaluation vector B = {b1 , b2 , . . . , bn } is obtained, where b j indicates the degree of v j that the evaluated object has a comment. It can be seen that the mathematical model of fuzzy comprehensive evaluation involves three elements: 1. 2. 3.

Factor set U = {u 1 , u 2 , . . . , u m }, a set composed of various factors of the assessed object Decision set V = {v1 , v2 , . . . vn }, a set of various judgments (comments) for each factor Single factor judgment, that is, the evaluation of a single factor (i = 1, 2 . . . m), and the fuzzy set (ri1 , ri2 , . . . , rin ) on V can be obtained, which is a fuzzy mapping from U to V . The evaluation of all factors constitutes a fuzzy evaluation matrix R.

The composite A ◦ R = B of the fuzzy weight vector A on the factor set U and the fuzzy evaluation matrix R is the comprehensive evaluation of the assessment object. Thus, (U, V, R) constitutes a comprehensive evaluation model.

5 Application of Comprehensive Fuzzy Evaluation in Classification 5.1 Object Set, Factor Set and Comment Set The object set here is patients with cerebral arteriosclerosis in the hospital to be assessed, and factor set U is the elasticity index of each blood vessel examined by the transcranial doppler detector U = {u 1 (vascular pulsation index P I ), u 2 (resistance index R I ), u 3 (diastole to systole ratio S/D), systolic blood f low velocit y(V P )}. In the application, four assessment indicators are selected as the factor set, and the comment set V = {v1 (mild), v2 (moderate), v3 (sever e)} represents the different assessment results of each factor.

5.2 Determine the Weight Distribution Vector of the Factor Set Fuzzy weight vector A = ua11 + ua22 + · · · + uamm (0 ≤ ai ≤ 1; i = 1, 2 . . . m). Among them, ai is the degree of membership of u i to A, which is a measure of the importance of single factor u i in all factors. There are many methods to determine the weight

Classification of Cerebral Arteriosclerosis Patients Based …

239

vector, such as expert consultation method, analytic hierarchy process, etc. The expert consultation method [6–8] is used here, that is, the weight vector is obtained by comparing the relative importance of the evaluation index decided by the expert group. The advantage of the expert consultation method is that the algorithm is simple and easy to obtain, but it also has disadvantages, mainly due to the great influence of subjective factors. When the expert consultation method is adopted, the expert consultation book shall be formulated in detail, experts shall be selected reasonably, and at least two rounds of consultation shall be conducted.

5.3 Establish Fuzzy Evaluation Matrix R To evaluate a certain object O (patient), it can start with factor set U = {u 1 , u 2 , . . . , u m } and comment set V = {v1 , v2 , . . . , vn }. The fuzzy relationship between the domain of factors and the domain of comment can be expressed by a ⎡ ⎤ r11 r12 L r1n ⎢ r21 r22 L r2n ⎥ ⎥ judgment matrix R = ⎢ ⎣ L L L L ⎦. rm1 rm2 L rmn Among them, ri j = R(u i , v j ) indicates the degree of affiliation at which something can be rated as v j from the perspective of factor u i . In order to find the fuzzy matrix R, it is necessary to construct the membership function v1i , v2i , v3i for each evaluation index u i , which belongs to v1 (mild), v2 (moderate), and v3 (sever e) according to the index data of the hospital to be evaluated.

5.4 Calculate the Comprehensive Evaluation Results of Each Object With the above preparation, we can get the comprehensive evaluation result through the synthetic operation of fuzzy relations A ◦ R = B. Here “◦” means a certain fuzzy product operation selected according to the actual problem. When A satisfies the normalization condition, the product of real numbers can also be used, and the result will be more refined. From the calculation of the comprehensive evaluation matrix above, the memberi-th patient⎤with respect to these 4 indicators to 3 levels can ship matrix R (i) of the ⎡ (i) (i) (i) r11 r12 r13 ⎢ (i) (i) (i) ⎥ ⎢ r r22 r23 ⎥ be obtained R (i) = ⎢ 21 (i) (i) (i) ⎥. ⎣ r31 r32 r33 ⎦ (i) (i) (i) r41 r42 r43

240

D. Luo

Therefore, the fuzzy comprehensive evaluation can be performed by A ◦ R = B, and the comprehensive evaluation B = (b1 , b2 , b3 ) of the i-th patient can be obtained. b b b It is equivalent to the fuzzy subset on comment domain V :B = v11 + v22 + v33 (0 ≤ bj ≤ 1). Among them, bj is the membership degree of the object rated as comment v j , and B is the comprehensive evaluation result.

 b b b Normalize B, and set β = 3j=1 bj , then B = β1 , β2 , β3 = (b1 , b2 , b3 ). According to the principle of maximum degree of membership, the fuzzy evaluation subset B can be used to directly determine the comment level of patients with cerebral arteriosclerosis.

6 Instance Analysis Take 10 patients with cerebral arteriosclerosis in a hospital in Jinan as an example. For the convenience of description, only three assessment indicators were taken as illustrations. According to the expert consultation method, the fuzzy weight vector A = (0.30, 0.20, 0.15, 0.45) was obtained, and A satisfies the normalization condition. Table 1 shows the assessment data results of some indicators of 10 patients with cerebral arteriosclerosis. According to the method described above, after compiling a computer program, enter the data in Table 1 to calculate the comprehensive evaluation matrix for the ⎡ ⎤ 0.2 0.05 0.04 ⎢ 0.05 0.33 0.06 ⎥ ⎥ patient R = ⎢ ⎣ 0.05 0.11 0.01 ⎦. With the matrix, B = (0.2, 0.16, 0.06), can be 0.1 0.16 0 obtained. Through the analysis of experimental data, among the 10 patients, 3 patients were with mild cerebral arteriosclerosis, 4 patients with moderate cerebral arteriosclerosis, and 4 patients with severe cerebral arteriosclerosis, which accorded with actual doctor’s diagnosis results, and the evaluation accuracy velocity was 100%.

7 Conclusion Against the background of information technology, through the imaging of extracranial blood vessels by transcranial doppler detector, the evaluation data of patients is obtained by using hemodynamic parameters. Patient assessment involves multiple index parameters. The principle of fuzzy comprehensive evaluation is very suitable for analyzing the comprehensive evaluation of multi-index parameter system. The reliability and veracity of comprehensive evaluation mainly depend on the reasonable selection factor set and evaluation factor. The fuzzy evaluation matrix is determined by the weight distribution of factor set. The comprehensive evaluation result is obtained through the synthetic operation of the fuzzy relationship, and the fuzzy

0.83 0.35 2.57 100

Resistance index (u 2 )

Blood pressure ratio of diastole and systole (u 3 )

Systolic blood flow velocity (V P )

P1

110

5.78

0.45

0.85

P2

Patient (P)

Pulsation index (u 1 )

Evaluation index

80

8.9

0.46

0.78

P3

72

2.68

0.60

0.79

P4

Table 1 Index statistics of 10 patients with cerebral arteriosclerosis in a hospital in Jinan

91

2.09

0.75

0.45

P5

86

3.89

0.8

0.89

P6

67

3.96

0.48

0.94

P7

54

2.45

0.74

0.98

P8

45

9.8

0.68

0.96

P9

47

7.9

0.79

0.85

P10

Classification of Cerebral Arteriosclerosis Patients Based … 241

242

D. Luo

relationship of the comprehensive evaluation becomes an important factor for classification. Therefore, the determination of the weight of the factor set is very important. What’s more, the determination of the membership function of the evaluation factor has an important role in classification. This paper uses fuzzy comprehensive evaluation system to meet the higher accuracy requirements. The evaluation model is very effective.

References 1. Li Z, Hong G (2018) Study on habitability of comprehensive evaluation based on uncertainty comprehensive judgement—a case study of economic zone. J Anhui Inst Archit Ind 26(06):108– 113 2. C Wang (2017) Research and implementation of speech evaluation model based on fuzzy comprehensive evaluation. East China University of Technology 3. Yang R (2017) The clinical significance of combined application of transcranial Doppler and carotid ultrasound in the early diagnosis of cerebral arteriosclerosis and cerebral infarction. Chin J Pract Nerv Dis 20(09):98–100 4. Yi X (2016) The value of transcranial doppler ultrasound in the diagnosis of early cerebral arteriosclerosis. J Mod Med Res 10(11):41–42 5. Xi R, Peng W, Cao J (2015) Comparative study of MRI and TCD findings in early cerebral arteriosclerosis. Radiol Pract 30(08):822–825 6. Tian F, Yao F, Song M et al (2012) Diagnostic value of transcranial Doppler ultrasound in early stage cerebral arteriosclerosis. J Central South Univ (Med Sci) 37(05):495–499 7. Xu X, Deng Z, Zheng Y (2005) The design and realization of the fuzzy person evaluation system. Microelectron Comput 03:236–238 8. Chen Y, Luo Li, Zheng Y (2020) Research on evaluation index selection of medical ultrasonic diagnostic equipment service system based on expert consultation method. China Med Dev 35(02):28–30

Neural Network for Monitoring Design of Science and Technology Talent Flow System Shouxia Wang

Abstract Based on the information of highly cited scientists and high-strength patent inventors obtained by neural network, this paper uses the complex network big data analysis method to build a global science and technology leader talent flow network model, system detection research, and measure and analyze the characteristics of global leading talent flow in major countries (regions) and the whole world. Through the analysis of the model, we can find that the United States and other western developed countries attract a large number of leading talents in science and technology, while the loss of leading talents in developing countries is more serious, and the flow of leading talents between developed countries is very frequent. From the global perspective, there is a central node in the talent flow network, that is, the whole talent flow network has strong anti-interference. Keywords Science and technology leading talents · Complex network · Transnational flow of talents · Big data analysis · Neural network

1 Introduction With the rise of knowledge economy and the in-depth development of globalization, the competition for leading talents in science and technology has risen to the strategic height of all countries in the world [1]. The competition of comprehensive national strength in today’s world is in the final analysis the competition of talents, and talents are becoming more and more strategic resources to promote economic and social development [2]. With the increasingly fierce competition in global science and technology, countries all over the world attach great importance to the allocation of global vision and science and technology resources, and the competition for leading talents in science and technology innovation has already risen to the national strategy. The 13th five year plan for national innovation in science and Technology issued recently by China proposes that we should plan and promote scientific and S. Wang (B) Shandong Xiehe University, Jinan, Shandong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_26

243

244

S. Wang

technological innovation from a global perspective. In today’s globalization of scientific and technological innovation, the introduction of leading talents from the world will be an important means to comprehensively enhance China’s independent innovation ability, realize innovation driven development, and promote China’s integration into the global innovation network [3–5].

2 Data Sources The Ministry of science and technology should focus on the three aspects of national science and technology supply and strengthen the national science and technology and social demand, Through academician and expert consultation, 10 cutting-edge scientific and technological fields have been formed (including frontier basic cross science, new energy technology, new generation information technology materials, marine space and earth development, advanced manufacturing and intelligent equipment manufacturing, agriculture and food security, resources and ecological environment, modern medicine and frontier biology, smart city and Digital Society) [6–8]. After that, by searching the global paper database and patent database, the first or corresponding authors of highly cited papers in the above fields, as well as inventors with high-strength patents in the above research directions, are selected as the science and technology leading talent samples of this project [9]. Based on the in-depth mining of the Cor patents and papers related information of the selected scientific and technological talents, the time-varying sequence of the countries where the leading scientific and technological talents belong and the countries where the current work belongs are determined. Further, the above data and information are summarized and sorted out to determine the number and direction of the flow of science and technology leading talents (including inflow and outflow) in major countries in the world in a certain period of time [10]. After the completion of data collection, we can construct a directional multi value network matrix for the flow of science and technology leading talents, that is, the vertical coordinate of the matrix is set as the outflow country, the inflow country is taken as the vertical coordinate of the matrix, and the value of the elements in the matrix is the number of science and technology leading talents flowing from the outflow country to the inflow country. Through the directed multi value network matrix, we can determine the number and direction of the flow of science and technology leading talents. For example, if we study the flow of science and technology leading talents among n countries, we need to form an n × n directed multi value network matrix [11].

Neural Network for Monitoring Design of Science …

245

3 Complex Network Model of Transnational Flow of Science and Technology Leading Talents Since watts and Strogatz studied small world network and Barabasi and ABER studied BA network (scale-free network), complex network method has been widely used in various fields, such as multi robot cooperative control, biological swarm behavior research, social network modeling, aviation network, economic network and so on. The key point of complex network research is the relationship between nodes (i.e., the edge connecting nodes), that is, the topological relationship. In the cross-country flow of global science and technology leading talents, if the country is regarded as the node in the network, and the talent flow channel (side loop) is regarded as the edge, the network model can be constructed, and the talent flow is carried out along the direction of the edge between nodes. For each node, the degree of attraction and the degree of control exist in the network. Therefore, through the establishment of a network model of talent flow among countries, this paper studies the complex flow direction relationship and node connection of science and technology leading talent flow network [12].

4 Linear Standardization Method In this paper, we define the element m i j in the directional multi value network matrix as the number of personnel flowing from the country to the country, and vice versa. In the complex network theory and algebraic graph theory, the weights of the edges between connecting nodes are generally defined in the range [0, 1]. Therefore, it is necessary to standardize M. In this paper, the linear standardization method is adopted. ai j =

li j − min(m i j ) max(m i j ) − min(m i j )

(1)

where min(m i j ) is the smallest of all min(i = j), and max(m i j ) is the largest of all min(i = j). When asked, ai j = 0 holds. The corresponding adjacency matrix A = A and Laplacian matrix l can be constructed as follows: ⎧ ⎨ li j = −ai j , i = j n  L= ai j ⎩ lii =

(2)

i=1

Through L, we can study the connectivity of complex networks. If a directed network is strongly connected, that is, from any node in the network, at least one directed path can reach all other nodes. In the talent flow network, this definition can be interpreted as a talent flow channel from any country in the world to any

246

S. Wang

other country [2]. On the other hand, if the rank of a strongly connected network is l-connected or not, then it is determined whether the network is strongly connected. Similarly, if we use the weak connectivity in the complex network, we can judge whether all the nodes in the whole network are a whole [13].

5 Big Data Analysis on Characteristics of Talent Flow Network Based on the analysis of the characteristics of the global leading talent flow, we can draw the conclusion that the global leading talents flow is based on the actual data collection of the global leading talents. Limited to the length of the article, this paper only studies the flow network of science and technology leading talents among 11 typical countries or regions in the United States, the United Kingdom, Russia, France, Germany, India, China, Japan, Southeast Asia. Africa and Oceania, and analyzes the characteristics of the talent flow network of the selected countries (regions) and the whole talent flow network, Then it summarizes the flow situation of global science and technology leading talents. Based on the data collection method, this section collects the number of science and technology leading talents flowing among 11 countries and regions in the five years from 2011 to 2016. By calculating the path between nodes and analyzing the flow of scientific and technological talents between countries, we can find that in the whole network, The top ten shortest paths are from China to the United States, from Japan to the United States, from China to Oceania, from Germany to the United States, from France to Germany, from Germany to France, from France to the United States, from India to the United States, from India to Britain and from the United States to India Degree path. It can be found that the distance of the directional path of talent flow from developing countries to developed countries is relatively short, and the directional path between the nodes of developed countries is also short, but the distance of the directional path of talent flow from developed countries to developing countries is longer, and some nodes in developing countries do not even have the directed path of talent inflow. Therefore, it is believed that the trend of global science and technology leading talent flow is still from developing countries, such as China and India, to developing countries, such as the United States and Oceania, and the flow of talents between developed countries is also quite frequent [14]. Similarly, according to the definition of network entropy, the entropy of science and technology leading talent flow network between selected countries and regions is calculated to be 0.72, However, the stability of the whole talent flow network is not entirely dependent on these developed countries and regions. It can be further considered that the changes of internal and external environment in some countries and regions will not have a more severe impact on the basic situation of the whole world’s leading talents in science and technology. At present, the basic situation of talent flow is very stable.

Neural Network for Monitoring Design of Science …

247

6 Conclusion Through bibliometrics, algebraic graph theory and complex network analysis methods, this paper proposes a method to construct a network model for the transnational flow of global science and technology leading talents, and applies the characteristics and indicators of complex network to the analysis of talent flow network. Through the above quantitative research methods, we can find that: first, the outflow star of science and technology leading talents shows obvious imbalance, that is, the basic trend of flow is still from developing countries to developed countries, and the flow of talents between developed countries is also quite frequent; second, the global flow network of scientific and technological talents is quite robust, The stability of the whole network does not depend on one or a group of major countries or regions, even if the internal and external environment changes of some countries or regions will not have a great impact on the basic trend of global science and technology talent flow. The next step of work can focus on studying the internal mechanism of the above-mentioned talent flow, and predicting the future development trend of global science and technology talent flow through complex network and system dynamics methods. In addition, the method of using complex network to study the flow of scientific and technological talents can also be extended to study international migration, international trade, information transmission and other similar issues. Acknowledgements Key R&D projects (Soft Science) in Shandong Province: The Research on the Influencing Factors and Mechanism of Sci-tech Talents Flow in Shandong Province, Project No: 2019RKB01362.

References 1. Zhang J (2013) Historical investigation on the brain drain of British scientific and technological talents to the United States after World War II. China Social Sciences Press, Beijing 2. Du H, Zhao Z (2014) Policy research on China’s overseas high level scientific and technological talents. China Renmin University Press, Beijing 3. Wang H (2012) Talent internationalization and global wisdom: a new trend of global talent flow. Int Students (2):12–13 4. Zheng Q, Wang H, Li Z (2014) The form, development trend and enlightenment of global scientific and technological talents flow. Sci Technol Prog Countermeasures (13):150–154 5. Zheng Q, Wang H, Li Z (2014) The form and development trend of global scientific and technological talent flow and its enlightenment to China. Sci Technol Prog Countermeasures (13) 6. Yan S, Zhang Q (2021) Research on the flow mechanism of young scientific and technological talents in China in 2035. Spec Econ Zone (05) 7. Luo W (2008) The reason, way and development trend of Ningxia science and technology talent flow. China Sci Technol Forum (09) 8. Li H, Liu H, Song W (2017) Research on collaborative innovation of scientific and technological talents in Hebei Province under the background of Beijing Tianjin Hebei collaboration. Sci Technol Ind Strait (07)

248

S. Wang

9. Liu ZX, Zhang X (2003) Investigation on the flow and function of scientific and technological talents. Chin Talents (02) 10. Li C (2015) Research and analysis on the flow of scientific and technological talents in China. New Econ (26) 11. Chen X (2017) Study in different places, local stratification and the flow of high-tech talents: a case study of information technology industry in Guangdong Province[M]. Philos Soc Sci Qiqihar Univ (07) 12. Luo W (2008) Problems and countermeasures of talent flow. China’s Private Sci Technol Econ (09) 13. Wang Y, Luo H, Li Z (2016) The new trend and characteristics of the flow of scientific and technological talents in today’s world. Glob Outlook Sci Technol Econ (12) 14. Song S (2005) Construction of talent ecosystem. Mod Enterp (06)

BP Neural Network for Construction of Smart Campus Security Shengdong Lin

Abstract Now, higher vocational education has accounted for half of China’s higher education. Higher vocational education is facing the great challenge of large-scale and quality games. People pay more and more attention to the quality of education and become the focus of higher vocational education. In order to further improve the quality of higher vocational education, clarify the status and training objectives of Higher Vocational Education in national education, issue relevant documents to the Ministry of education, and clarify the healthy development direction of higher vocational education. From the micro perspective, this topic makes a detailed study of teachers’ teaching as the object of teaching quality evaluation and control, looks for a more reasonable way of teaching quality evaluation, and provides accurate feedback information for improving teaching quality. With the development of artificial neural network in China in this century, as a new information science learning from human brain, that is, artificial intelligence method constructed by simulating human brain nerve to transmit information, its application fields include biology, economics, sociology and so on. In view of the prominent advantages of artificial neural network in the comprehensive evaluation of nonlinear complex systems and the difficulties of higher vocational education evaluation, we choose this method to study the educational evaluation and control of higher vocational education. Keywords Evaluation model · System science method · BP neural network · Teaching quality of higher vocational colleges

1 Introduction Quality is not only the life of the school, but also the guarantee that the current high vocational college has an advantage in the “reshuffle”. The research of this subject has profound practical significance. (1) Solve the problems of quality evaluation and S. Lin (B) Dalian Vocational and Technical College, Dalian Radio and Tv University, Dalian 116035, Liaoning, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_27

249

250

S. Lin

control in the process of educational management. The establishment of a reasonable education quality evaluation and control system is helpful to improve the level of education management. Each stage of educational management needs evaluation, and evaluation is the basis of effective control. The management without evaluation is an open management system, unscientific and imperfect. Through evaluation management, we can feed back information in time, find and solve problems. That is a closed-loop management system and scientific management methods. Seeking appropriate means of education quality evaluation and control will help to improve the accuracy of feedback information. Educational evaluation is an important measure to deepen educational reform. The scientificity of evaluation and control means is directly related to the recognition of the achievements of educational reform and the deepening of educational reform. The application of artificial neural network in educational evaluation evaluates the old subjective problems. (2) Enriches the application value of artificial neural network in social science. Artificial neural network has made great achievements in speech recognition, image processing, character recognition, radar, sonar signal processing and other engineering fields. However, due to the lack of social science and artificial intelligence, this theory does not go deep into the field of social science. Especially in the field of education, few people carry out research and application. This subject expands the application scope of artificial neural network to a certain extent and promotes the research and development of artificial intelligence [1].

2 An Overview of Teaching Quality Evaluation and Control in Higher Vocational Colleges 2.1 Definition of Basic Concepts Generally speaking, the word mass has two meanings. One is the concept of mass in physics, which is a physical quantity to measure the inertia of matter and the strength of gravitational action. Initially, it was used as “the amount of matter contained in an object”. The other is the concept of quality that we often use in social life. The interpretation of “quality” in Cihai is the quality of products or work, which is just an interpretation of quality. IBM’s definition is simple: “quality is customer satisfaction.” American quality management expert Dr. Zhu LAN defines the new product quality as “adaptability”, which is to see quality from the perspective of users. Klausby, a quality management expert, defines the quality of a product as the degree that the product meets the specified requirements, which is from the perspective of the manager of the production unit. The international organization for Standardization (ISO) is faced with the fact that quality is the reflection of people’s values on products or services, and the quality evaluation is people’s value judgment on products or services. People’s values change with the development of economy and society. Therefore, quality is a dynamic, changing and developing concept. Facing

BP Neural Network for Construction of Smart Campus Security

251

the new situation of modern society, ISO defines quality scientifically and strictly in is08042:1994 terms of quality management and quality assurance. The development of Higher Vocational Education in China is slow. In the late 1990s, it entered a period of accelerated development. In terms of education quality evaluation and control, the traditional evaluation methods are adopted, and the education quality evaluation and control system of undergraduate and secondary vocational schools is transplanted and improved. Now, the current situation of quality evaluation and control of higher vocational education is as follows [2]. 1.

2.

3.

The status of “evaluation and control” is low. There are many problems in the assessment of teachers in higher vocational colleges, such as paying more attention to scientific research than to teaching, and paying more attention to the amount of class hours than to the quality of curriculum. The wrong orientation of teacher assessment leads to the low status of teaching quality evaluation and control, which has a formal process, but no substantive monitoring role. Teachers’ lack of quality awareness of teaching makes their job of teaching and educating people weakened. There is a lack of “evaluation and control” model. The theory and practice of teaching quality evaluation and control have achieved preliminary research results, but the research in this field is not very mature in theory, and there is still a lack of practical evaluation model and evaluation means reflecting modern technology. The evaluation and control system is very simple. Because of the long period of supervision and evaluation, many schools directly evaluate the quality of teachers by student scoring. Some students’ evaluation results are directly linked to the teacher’s bonus. Teachers are teaching forms, and students have a great difference in teaching rules and teaching methods. Despise the content, seriously distort the teacher to the education quality evaluation and control.

2.2 The Model of Neuron Artificial neuron is the simulation and abstraction of biological neuron, and it is the basic unit of artificial neural network. Therefore, to construct an artificial neural network system, we must first construct an artificial neuron model. The general structure model is shown in Fig. 1. Neuron model is usually described by first-order differential equation, which can simulate the variation of synaptic membrane potential with time in biological neural network:   i τ du dt = −u i (t) + wi j x j (t) − θi (1) yi (t) = f [u i (t)] The role of neurons in information processing before output is represented by “activation function”. In practical application, the activation functions are as follows:

252

S. Lin

Fig. 1 Artificial neuron model

 f (u i ) =

1 ui ≥ 0 0 ui < 0

(2)

The structure of artificial neural network is an important feature of network model. From the connection mode, there are mainly feedforward network and feedback network [3].

3 Construction of Teaching Quality Evaluation Model in Higher Vocational Colleges Based on BP Neural Network 3.1 Construction of Teaching Quality Evaluation Index System in Higher Vocational Colleges To evaluate the quality of education, we must first determine a scientific evaluation standard system of education quality. This paper mainly studies the evaluation of classroom education. There are many studies on the evaluation of educational quality at home and abroad, and the composition of indicators is different, but the research on the characteristics of the specialized schools is very few. The current higher vocational education is student centered. If the new curriculum is required to focus on the work course, the benchmark of education quality evaluation will be relatively backward.

BP Neural Network for Construction of Smart Campus Security

253

3.2 BP Network Model Structure If there are enough silver layer nodes, the silver layer neural network can approximate the nonlinear function m with any accuracy, and all continuous functions in the closed interval can be accessed through the silver layer only network, and two or more implicit names can be used as adoptive children. meaningless. The more hidden layers are used, the more time is required for network training. The more silver layers, the more complex the calculation of error propagation process, and the training time will increase sharply. In addition, with the increase of the number of hidden layers, the local minimum error will also increase. In the connection process, due to the local minima and non convergence of the network, it is difficult to adjust the power or threshold of all neural sources to the minimum error, and in the process of practical application, the three-layer neural network structure can be adopted to basically meet the needs of solving the problem. Therefore, the education quality evaluation model adopts a three-layer BP neural network structure, including input layer, cladding layer and output layer.

3.3 Using MATLAB to Build Teaching Quality Evaluation Model in Higher Vocational Colleges Mat1ab was born in the 1970s by Dr. Cleve Miller and his colleagues. Different from other high-level languages, it is called the fourth generation computer language. It is a kind of high-performance programming software for engineering calculation, and integrates scientific calculation, programming and visualization of results in a very convenient environment. Compared with other high-level languages, language has the following characteristics [4]. 1.

2.

3.

4.

High programming efficiency. Matlab allows programming in mathematical language. Programming in MATLAB is as simple as arranging formulas and solving problems on calculus paper. It is easy to operate, learn and understand. Malab language is a kind of interpretation and execution language, which is flexible, convenient, rich debugging means and fast. It integrates the four steps of editing, compiling, linking and executing. It can operate flexibly on the same interface and eliminate the writing errors in the input program quickly, so as to speed up the writing and modification speed of developers. It has strong expansion function and rich functions in the advanced version Library of MATLAB language, which can be called directly when complex mathematical operations are carried out. Matlab library functions are formed in the same way as user files, and user files can also be called matlab library functions. The transplantation is open. Matlab is written in C language, and C language has good portability. Mat1ab can be easily transplanted to the operating platform that can run C language.

254

5.

S. Lin

The sentence syntax is simple. The most basic and important component of mat1ab language is function. Its general form is composed of function name, input variable and output variable. The writing is very simple and short, which greatly reduces the disk space.

4 Conclusion With the development of Higher Vocational Education in China, the education quality of higher education has become a hot issue. Through empirical and theoretical research, this paper analyzes the current situation of education quality evaluation in colleges, puts forward the education quality evaluation standard system of colleges, and summarizes the characteristics of BP neural network and mat1a toolbox. Change. This paper finds a lot in common in the dilemma of BP neural network and education quality evaluation. BP neural network is used to build a professional education quality evaluation model. This paper uses empirical data to train and simulate the network to build a professional education quality evaluation model. The ideal data output is obtained through the construction. The quality of college education has certain theoretical and practical value. In this paper, BP network based on MATLAB neural network toolbox is applied to the education quality evaluation model of special schools, which better solves the subjective problem of index weight. Zheng change can reflect the ideas of experts. Especially when students evaluate the quality of education, they can often correct the differences in the process of student evaluation. The education quality evaluation model of junior college based on neural network gives full play to the advantages of neural network. This is a new evaluation and control method of education quality and a new evaluation and control method of Education quality. Objectively and fairly evaluate teachers’ educational quality, stimulate teachers’ educational enthusiasm and improve educational quality. Acknowledgements Dalian Vocational and Technical University (Dalian Radio and Television University) (Project No.: DZ2021Q04).

References 1. 2. 3. 4.

Good luck. General course of so9000 family standard (2001). Beijing China Standards Press Ye L (2001) Introduction to education. People’s Education Press, Beijing Xiao Z (2003) University management. People’s Education Press, Beijing Yuan X (2006) Higher vocational teaching quality control system and continuous improvement approach research. Nanjing University of Technology, Nanjing

Research on Railway Transportation Route Based on Dijkstra Algorithm Junhui Di and Ruhu Gao

Abstract Dijkstra algorithm is an important basic algorithm for computer decision of railway transportation route. Taking Dijkstra as the shortest path algorithm, combined with the current situation of railway transportation in China, a specific path parameter description language is designed to realize the intelligent judgment of railway transportation path by computer. The speed of path calculation is more than 50,000 pieces/s, and the accuracy rate is 100%. It can meet the needs of different business on the path. It is the result of transforming theoretical knowledge of grate into productivity of railway transportation. Keywords Railway network · Adjacency table · Dijkstra algorithm · Shortest path · Specific path

1 Introduction In recent years, with the rapid development of railway construction, the rapid expansion of railway network scale, the continuous optimization of road network structure, and the significant improvement of transportation capacity, how to make good use of road network resources and make the allocation of railway transport capacity resources more in line with the market demand is a major subject in the process of China’s railway going to the market. The establishment of railway freight transport route is an important technical means to improve the overall carrying capacity of the road network [1]. The efficient calculation of railway freight transportation path is of great significance to support the calculation of the time limit for freight transportation, the accurate tracking of freight and train tracks, and the evaluation of railway transportation benefits. At present, the transportation route system η has solved the J. Di Hohhot Vocational College, Hohhot, Inner Mongolia 010051, China e-mail: [email protected] R. Gao (B) Lanzhou Jiaotong University, Lanzhou 730070, Gansu, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_28

255

256

J. Di and R. Gao

technical problems caused by the complexity of road network and the particularity of transportation mode [2–4]. However, with the deepening of railway freight transport business reform, the intelligent degree, operation efficiency and platform expansion of the routing system need to be further improved. This paper focuses on solving the existing problems from the perspective of data structure, graph theory and business logic [5].

2 Data Structure of Railway Network The algorithm of railway shortest path has always been the key topic of railway research institutes, and it is also the basis of railway transportation path determination and then it is extended to the end point.

2.1 Classical Dijkstra Algorithm In the preset model, the shortest travel distance of emergency power supply after traffic damage is considered to affect the effect of emergency power supply participating in power system restoration. In this paper, the updated Dijkstra algorithm is used to solve the travel path after road damage. Dijkstra algorithm was proposed by Dijkstra, a Dutch computer scientist, in 1959, so it is also called Dijkstra algorithm [6]. Is the shortest path algorithm from one vertex to the other vertices, which solves the shortest path problem in weighted graph. The main feature of Dijkstra algorithm is that it starts from the starting point and uses the strategy of greedy algorithm. Each time, it traverses the adjacent node of the nearest and not visited vertex from the starting point until it is extended to the end point. The algorithm is used to find the shortest path between two specified points in a graph, or the shortest path from one specified point to all other points. It is suitable for undirected and directed graphs with positive edge weight, but not for graphs with negative edge weight [7]. When a certain road in the transportation system is damaged and unable to pass, it means that all the paths passing through the road will be changed, and the shortest travel distance will also be changed. Considering that Dijkstra algorithm uses infinity to describe the distance when dealing with roads that are not directly adjacent to each other (that is, roads that have no actual distance to mark), it can also use infinity to deal with the distance of damaged roads, so that it can analyze the travel law of traffic system damaged by roads to find the shortest path and the shortest distance [8, 9]. When the system road is damaged, the moving path of emergency power supply will change when the road is damaged and impassable. In this paper, the actual distance of the damaged road is treated as infinity, which is convenient for research and calculation [10]. Based on the above theory, the distance between any nodes in any kind of damage scene can be calculated, which provides important data for the

Research on Railway Transportation Route Based on Dijkstra …

257

subsequent model solution. The method considers the impact of traffic damage on elastic recovery.

2.2 Algorithm Implementation The key to implement the algorithm is the speed of operation, platform expansion and space utilization. Based on the comprehensive analysis of the characteristics of various computer languages, the Dijkstra algorithm is implemented by C++ language. At present, there are nearly 7000 vehicles in the whole road, and the shortest path operation speed is more than 100,000/s [11].

2.3 Key Points of Algorithm Application The shortest path algorithm is the soul of the routing system and the core of whether it can support a specific path algorithm. The key to the calculation of the shortest path lies in the treatment of special cases. In China’s railway network, there are some lines which are only used for goods from each station of the line, such as Qiyan line, this type of line is not included in the calculation of the shortest path, and the shortest path passing through Jinan Yancheng north or Yancheng North Jinan is not allowed [12]. The mileage of this line is only used for arrival and departure of each station on this line. With the increase of the number of joint ventures and local railways in China, the proportion of the above two types of lines in the road network is increasing year by year.

3 Specific Path Parameter Language Design Specific path parameter language design is the key to whether the routing system can meet the business logic. If the whole road is transported according to the shortest route, it is bound to cause traffic congestion on the shorter lines in the road network, but there is no traffic flow on the longer lines in the road network, so the transport capacity resources cannot be brought into full play. Therefore, China Railway State Group Co, Ltd. will comprehensively analyze the factors such as the shortest path, line flow, marshalling plan and freight rate, and formulate specific routes, The overall carrying capacity of the road network is optimized. Then, the specific path must be realized by the computer parameter language.

258

J. Di and R. Gao

3.1 Aggregation Class The marshalling type is the most important type in a specific route. Simply speaking, it is to gather the train flow to a certain marshalling station, and then implement the corresponding route provisions of the marshalling station. The marshalling station sending to a certain group number range may be re aggregated to the next marshalling station according to the specific path, or to the arrival station according to the shortest path or specific path. For example, Article 12 of the relevant line of Shanghai and Nanchang bureaus in stipulates that “(x) the heavy vehicles loaded between the stations of yuanzhai and its south, the west of Luqiao, and the north of Sanshipu, and the stations of Nanjing and its East, the south of Yuxikou, and the south of jingjiangnan are transported according to the East Point of Hefei. (11) heavy vehicles loaded between Hefei East (Wuhu East) fulcrum (Shuishui Bengbu line, Maqiao Ma’anshan station of Nanjing Wuhu line) and the stations east of Xuancheng, the south of Wuxi and the east of Huangdu of Shanghai Bureau are transported through Anhui Jiangxi railway and Xuanhang line.” This article stipulates that the heavy vehicles loaded in Hefei East marshalling station far away from Nanxiang are assembled to Qiaosi marshalling station. Through the design of assembly class, the business logic of specific route and layer by layer recursion can be realized. Specific steps of the algorithm: (1) Initially, s only contains the source point, that is S=V

(1)

In this paper, a total of 10 scenarios are set up, and the roads and lines in each scenario are damaged to varying degrees. In this paper, the updated Dijkstra algorithm is used to deal with the road damage, and 300 random simulation tests are carried out under the condition of randomly generating the load weight value and the number of lines damaged, The result output of the model can realize the fastest recovery of the interrupted load by using the limited number and output of emergency power supply in all scenarios with complete roads and lines and different degrees of damage. The result is the weighted optimal value in 10 scenarios, which is the optimal configuration of emergency power supply in multiple scenarios, It plays the role of quickly recovering important loads in a short time when unknown disasters come, and improves the survival resistance of power system. The shortest path between each pair of fixed points can be obtained by repeating Dijkstra algorithm n times (there are n vertices in the graph): O = n3

(2)

Research on Railway Transportation Route Based on Dijkstra …

259

3.2 Modify Mileage Class The modified mileage category is a special type of route mileage statistics, which is mainly used to modify the charging mileage. For example, according to the stipulation in the freight odometer of Huainan line that “the distance between Yuxikou and Wuhu East is charged at 50 km”, but the actual mileage is only 20 km, so when calculating the shortest route of the road network, it is calculated as 20 km, while in the mileage statistics, the mileage of Shanghai Railway Bureau plus 30 km, the mileage of charging mileage plus 30 km, the mileage of fund plus 30 km, and the mileage of electrification plus 30 km. Similar to such examples, there are still many places in the road network, which need special treatment in the algorithm design. The design of specific path parameter language and so on, but it is still a very complex project in the parameter language compilation algorithm. The definition of region, the connection of specific path, the efficiency of execution and the display of graphics need to be designed carefully by the designer, and the most important thing is to have the most comprehensive grasp of business logic.

3.3 Examples and Conclusion Analysis Taking the freight odometer as the basic information of the railway network, the data structure of the road network is built, and the shortest path algorithm in Sect. 2 is used for programming. The results show that the shortest path and mileage all conform to the judgment results of the circular path in the electronic freight odometer information system, For example, the shortest route from Lanzhou north to Guangzhou west station is Lanzhou North Tianshui Xinzhu Shangnan Xiangyang donglaodao River Guangzhou West, with a mileage of 2611 km [13]. Then, the specific path parameter language is compiled based on the specific path. The route and mileage of the specific path are completely consistent with the query results of the whole railway vehicle flow path query system. For example, the route from wuweinan to Yuci station is Wuwei nanyingshui bridge Dingbian Suide Yuci, with a mileage of 982 km, and the calculation speed of the path is more than 50,000 s in the environment of wn32.

4 Conclusion However, the research in this paper has improved the efficiency of railway routing and improved the efficiency of railway routing. In the next step, we will continue to carry out in-depth research on theoretical algorithms, and explore the implementation methods of a, sub short path, Freud and other classical theoretical methods in the railway transportation path.

260

J. Di and R. Gao

References 1. Yang X (2018) Research on the impact of electric vehicles on power/transportation network. Master’s dissertation. Hunan University, Changsha 2. Zhang W, Li R, Xie Z (2017) Urban road travel time prediction based on deep learning. J Syst Simul 29(10):2309–2315+2322 3. Bie C, Lin Y, Qiu AICI (2015) Basic concepts and research prospects of resilient grid and its resilience. Power Syst Autom 39(22):1–9 4. He S (2019) Bi level programming model and algorithm for traffic flow assignment considering destination selection. J Wuhan Univ Technol (Traffic Sci Eng Edition) 43(4):596–600 5. Lu Z, Xu J, Huang T (2020) Multi version container image loading method based on fragment reuse. Acta Sin (06) 6. Yang X (2020) Research on the legal protection mode of computer software intellectual property. Chin Foreign Entrepreneurs (12) 7. Shi T (2019) Current situation and intelligent development of China’s high speed railway informatization. Sci Technol Guide (06) 8. Ren S, Du W, Sun M (2018) Research on architecture and technical route of railway unified development and testing platform. Railway Comput Appl (12) 9. Kuang M, Han F (2018) Research on optimization of China’s railway technical regulation system. Railway Transp Econ (09) 10. Xia Y (2012) Evolution of railway wireless communication technology to lte-r. China Railway (08) 11. Zhang Y, Wang X, Guo Y, Zhu D (2012) Research on the construction model of technology roadmap based on bibliometrics. Sci Res (04) 12. Yang D (2012) Research on development direction of heavy haul railway track technology. J Railway Eng (02) 13. Tong R (2012) Research on industrial technology roadmap based on integrated methodology. Sci Technol Prog Countermeasures (01)

The Mathematical Form of Grover Algorithm and Its Search Success Rate for Composite Database Shengzi He

Abstract Grover proposed a database quantum search method with m capacity. In this paper, we extend the Grover search method in reference to the mixed state case, give a Grover search method based on mixed state, and analyze the upper bound of the success probability of the search method. It is further found that the success probability of the search method depends entirely on the initial state (mixed state) used. The conclusion provides a theoretical basis for understanding the influence of quantum noise on Grover search method. Finally, an example is given to illustrate how to implement Grover search method based on mixed states. Keywords Grover search method · Mixed state · Iteration · Probability of success

1 Introduction In recent 20 years, it has been widely applied in the fields of quantum mechanics and biochemistry. And the most striking one is the emerging quantum computing and quantum information science. It is a new interdisciplinary subject produced by the combination of quantum mechanics, information science, computer science and mathematics. Its main goal is to use quantum effects (such as quantum entanglement) to complete common information processing tasks. Grover proposed the quantum search method in 1997. We know that on a classical computer, searching a database of capacity n requires n operations. Using Grover search method, we only need O(N ) operations, and then accelerate the search essentially [1–5]. Grover search method reveals that quantum computer is more powerful than classical computer because Grover search method may be helpful to solve NP problem in classical computation. Moreover, Grover search method is gradually moving from theory to practical application.

S. He (B) Fuzhou Preschool Education College, Fuzhou 344000, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_29

261

262

S. He

2 Uncertainty of Grover Search Method In fact, Grover search method has uncertainty (that is, the probability of successful search is not always 1), especially when the database capacity is not too large, Grover search method is not ideal. Professor Long Guilu gave a modified Grover search method 1L. Later, it was found that we can generalize the H operator in Grover iteration operator hr0(x) HR(n) to any unitary operator 1211. The initial state can also be replaced by any pure state. However, due to the influence of the quantum decoherence effect, the Grover search method based on pure state can be realized on the premise that Grover iteration is completed before the coherent effect occurs (that is, the iteration time cannot exceed the decoherence time). In addition, under the influence of decoherence, pure states often evolve into mixed states. So we often deal with mixed states rather than pure states in reality [6–8]. The Grover search method is discussed. However, the fidelity of Grover search is more discussed in their literature. Therefore, this paper presents different implementation schemes of Grover search method with mixed state as initial state (which means Grover search method is in quantum noise environment). From another point of view, that is, taking the probability of successful implementation of Grover search method as an index, the Grover search method with mixed initial state is considered. By analyzing the success probability of Grover search method, not only the influence of mixed initial state on Grover search success probability is clarified, but also the theoretical basis for predicting the influence of quantum noise (mainly caused by decoherence effect) on Grover search with pure initial state is provided.

2.1 Introduction of Grover Algorithm Information is the representation of the state or movement characteristics of objective things. For example, early computers used punched cards with paper tape to represent the two states of “have” (“1”) and “None” (“0”). With the development of electronic technology, the logic element of semiconductor tube is used to represent the two states of on and off. In 1932, Werner Heisenberg (1901–1976), a Nobel Prize winner in physics, founded quantum mechanics and opened a new chapter in the study of microscopic particles in physics [9, 10]. The concept of quantum in the micro particle world usually includes atoms, electrons and neutrons. In quantum mechanics, quantum information is the physical information about the “state” of a quantum system. Through various coherent properties of quantum systems (such as quantum parallelism, quantum entanglement and quantum non cloning), a new information mode for computing, encoding and information transmission is proposed. For example, two different polarizations of photons; the orientation of nuclear spin in a uniform electromagnetic field [11].

The Mathematical Form of Grover Algorithm and Its Search …

263

2.2 Hybrid Dynamic Database Cluster The parallel spatial join algorithm of hybrid dynamic database cluster includes three steps: establishing candidate task set, assigning task, collecting and filtering results. Jinli candidate task set is the foundation and important step of parallel spatial join in algorithm 8. In the process of establishing candidate task set, computing nodes first obtain candidate focus according to data distribution state. Spatial data partition has a direct impact on data distribution state. Redundancy and balance of spatial data partition will affect the operation efficiency and load balance of the whole system, After reciting data partition and coding, the basic idea of spatial data partition is as follows: the data is allocated to the dry partition and coded, and then the parallel spatial connection calculation is carried out on each partition to realize parallel processing. The data division adopts the grid division method to divide the whole data space into grids of equal size, A grid is called a partition single mapping. Hash mapping is used to solve data skew. Spatial objects of different layers are adjacent or intersecting in space, but they are saved to different nodes to a large extent [12–14].

3 Grover Search Method in Noisy Environment Let the search space S contain N (= 2n ) elements, N (= 2n ) to mark them. Then the dimension of bent space H by s is n. Further, Let f : {0, 1, . . . , N −1} → {0, 1}.Then the target X satisfies the condition f (x) = 1. In order to implement the Gmv search method, we have prepared the quantum state 0 >⊕n . However, under the influence of quantum noise, it often evolves into a mixed state. We can describe the evolution process by quantum operation.    Ak |0⊕n 0|⊕n A+ p = ε |0⊕n 0|⊕n = k

(1)

k

Here A+ k , generally speaking, the effect of operator a is difficult to account. So we add an auxiliary quantum system N 2 with F and |0a as the initial ground state. Then operator a can be defined by a Western operator u acting on H ⊗ Ha . U |0⊕n |0a =



Ak |0⊕n |ka

(2)

k

Furthermore, the Grover iterative operator with mixed initial state can be written as: G = −U R00a (a)U + R f (β)

(3)

264

S. He

Mixed mode structure is a system structure design method based on the combination of C/s and B/S mode. In the process of system development, through the optimization analysis of the system, different selling modes are adopted for different applications, and finally the unification of the whole structure mode is realized through the integration of functions among systems. In the design process of database information system, the authority is divided according to resource type, operation type and user attribute [15–17]. The control idea of role access and modular access are adopted to realize the isolation of management and user. According to the use objects of the database information system, the structure functions of the whole database information system are divided into two categories: the basic operation and use function for the regular users, and the maintenance and management functions for the information system operators with the highest security level. The whole database information system is based on C/s and Japanese s two mixed platform structure design. No matter how users are interconnected with the information system, as long as data modification and system maintenance have high security requirements, CS building is used.

4 Probability of Success of Grover Search Method with Mixed Initial State From the above algorithms (1) (2) (3), we can see that the success of grovel search method with initial state as mixed state depends on two parts: when we do projection measurement above auxiliary system, the measured result is |0a . In other words, we mark success or failure by measuring |0a or not. The second part is whether we use Grover iteration operator to evolve the first n qubits into |0a . Therefore, the probability of success of Grover search method with initial state as mixed state should be the product of the two parts mentioned above. Let p be the probability of |0a when the projection measurement is made on the auxiliary system ha. P is the probability that the first n qubits evolve into |0a by Grover iterative operator. Let’s find P and P respectively. In recent years, with the rapid development of the network, the amount of data increases rapidly. The hybrid dynamic database contains a large amount of data, so it is difficult to query. Parallel spatial connection algorithm is the most representative algorithm in the cluster of hybrid dynamic data base, which can quickly realize the query and requires high efficiency, It can meet the query requirements of most users. There are many researches on Spatial Join Algorithm of well row. The common GDMC algorithm based on large-scale parallel processing architecture is currently used. Although the algorithm can realize well row connection, the traditional hash data partition method is still used in the division of important space, which is prone to high redundancy and inclination, which affects the query efficiency and load balance of the system [18–20]. The design of bpsj parallel spatial join algorithm has high efficiency, but it cannot solve the practical application problems. In order to ensure

The Mathematical Form of Grover Algorithm and Its Search …

265

the query efficiency of parallel spatial join and ensure the practicability, a new parallel spatial join optimization algorithm for hybrid dynamic database cluster is proposed. Experimental results show that the proposed algorithm can effectively solve practical problems with high efficiency.

5 Conclusion We discuss Grover search method for mixed entangled states. Because such Grover search scheme often corresponds to a noisy channel, it is necessary to analyze the probability of successful implementation of the scheme. By analyzing the probability of successful implementation, we find that the mixed state affects the upper bound of the probability of successful implementation of the search scheme. Our results will be helpful to determine whether Grover search scheme is affected by noise in the case of no noise (corresponding to ideal channel). Specifically, if the G π over search fails to succeed with a high probability within the specified number of steps, we consider it to be affected by noise. Of course, it is more practical to study Grover search method under the influence of specific noise.

References 1. Liu S (2019) Research on heterogeneous encrypted database access and integration scheme in hybrid cloud environment. Xi’an University of Electronic Science and Technology 2. Wu H (2019) Adaptive database query optimization for hybrid engine. University of Chinese Academy of Sciences (Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences) 3. Jin G (2019) Parallel spatial join optimization algorithm for hybrid dynamic database clusters. Sci Technol Eng 19(12):254–259 4. Zhao X, Chen J, Zhang H, Yang Z, Hu L (2018) Random generation method of soil rock mixture model based on block shape database. Geotech Mech 39(12):4691–4697 5. Zhaohaiyan, Wang Q, Ma Y (2016) Big data security certification scheme of quantum cryptography combined with Grover search. J Nat Sci (04) 6. Peng X, Liu F (2012) Problems and amendments to Grover model of metal physical equation in liquid and solid/liquid mixed phase region. J Phys (18) 7. Liu X, Song H, Wang H, Jiang R, Anjiale (2018) Overview of improvement and application of Grover algorithm. Comput Sci 15(12):15–25 8. Yang S, Deng Z, Libo (2017) Improved Grover quantum search algorithm. J Nanchang Univ (Science Edition) (06) 9. Zhang H, Dai Y, Huling Y, Shu J, Xiong H, Hu Y (2016) The simulation implementation of Grover quantum search algorithm. J Shaanxi Normal Univ (Nat Sci Ed) (03) 10. Wuqinqin, Lan X (2011) Linear optical implementation of Grover quantum search algorithm. J Hunan First Normal Univ (04) 11. Longguilu, Liyansong, Xiao L, Tu C, Sun Y (2004) Grover quantum search algorithm and improvement. Rev Nucl Phys (02) 12. Jinwenliang, Chen X (2012) Generalized multiphase matching of Grover quantum search algorithm. Comput Phys (01)

266

S. He

13. Peng Y (2010) Study on the parameters of NMR pulse sequence in two quantile Grover quantum algorithm. J Photonics (10) 14. Zheng X, Dong J, Yang Q, Yang M, Caozhaoliang (2010) Grover search algorithm implementation scheme based on superconducting quantum bit network (English). J At Mol Phys (04) 15. Jin W, Chen X (2012) Generalized multiphase matching of Grover quantum search algorithm. Comput Phys (01) 16. Peng Y (2010) Study on NMR pulse sequence parameters of two qubit Grover quantum algorithm. Acta Photonica Sin (10) 17. Zheng X, Dong J, Yang Q, Yang M, Cao Z (2010) Implementation of Grover search algorithm based on superconducting qubit network. J At Mol Phys (04) 18. Song H, Liu X, Wang H, Yin M, Jiang D (2021) Integer decomposition based on Grover search algorithm. Comput Sci (04) 19. Xie X, Duan L, Qiu T, Yang Y (2020) Improved quantum search algorithm and its application in solving nuclear attributes. Comput Eng Appl (14) 20. Zhu W, Liu Z (2018) User identification algorithm based on quantum computing. Acta Electronica Sin (01)

Optimization and Simulation of Electrical Wiring Path Based on Ant Colony Parallel Algorithm Shimin Wang

Abstract The connection relationship of components in relay control system can be described by network topology diagram. The connection path optimization between components is similar to traveling salesman problem (TSP), which belongs to NP complete combinatorial optimization problem. In this paper, the ACS ant colony algorithm is introduced into the wiring path optimization, and a calculation model suitable for the relay system wiring path optimization is established, and the parallel algorithm is implemented on the basis of MPI (Message Passing Interface). Through the simulation and analysis of the initial parameters of the algorithm, the optimal range of each parameter is determined. The experimental results show that the ACS ant colony algorithm has good global search ability and fast convergence speed when the parameters are properly selected. Keywords Relay control system · TSP · Ant colony system · Combinatorial optimization · MPI

1 Introduction The design of relay control system includes the main diagram, component list, equipment layout, equipment terminal block and cable connection list. The wiring list describes the cable connection relationship between components, which is the key process document of relay control system construction design, and is also the most time-consuming and error prone part in manual design [1]. With the introduction of CAD technology, at present, the above work is mainly completed by CAD software. The objective is to optimize the total length of connecting wire, determine the connection sequence of components, and automatically generate terminal strip and wiring list. The optimization of the total length of connecting wires is similar to traveling salesman problem (TSP), which belongs to NP complete problem [2–5]. If

S. Wang (B) Shandong Vocational College of Science and Technology, Weifang 261053, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_30

267

268

S. Wang

the traditional search method is used, the amount of calculation will increase exponentially with the increase of the scale of the problem. When the nodes exceed 30, the calculation time will be calculated in years. In practical engineering application, it requires less calculation and shorter solving time, and only approximate solution is needed. Therefore, many researchers study various approximate solutions according to the characteristics of engineering construction.

2 Ant Colony System 2.1 Mosquito Swarm Algorithm and TSP Problem Bionics research has found that ants can leave information substance (pheromone) on the path it passes through during the movement process, and ants can sense this material and guide their movement direction. The more ants walk on a certain path, the higher the concentration of information material, the greater the probability that the latecomers choose the path, The collective behavior of the ant colony composed of a large number of ants shows a positive feedback phenomenon. It is through this way of information exchange between ants to achieve the purpose of searching for food [6].

2.2 Mosquito Swarm Algorithm The mosquito swarm algorithm can effectively solve small-scale TSP (n < 30) problems. Similar to other evolutionary algorithms, this algorithm also has the problems of slow convergence speed and long time to find the optimal solution, so it is not suitable for solving larger scale problems. Ant colony system (ACS) is an improvement of the above algorithm, which is mainly reflected in the following aspects: the influence factors of known information are enhanced in the transfer rules of ant selection nodes; in the updating strategy of information traces, local information update rules are distinguished (when every position changes in the process of ant search, the influence factors of known information are enhanced) [7–9], In the global update rules, only the information on the shortest path is updated, which reflects the global decision of ant colony and improves the convergence of search. ACS algorithm uses the following state transition rules to select the next node:  Sk =

arg max j (k) {[τ (r, u)].[η(r, u)]β } S  β

Pk (r, s) =

 [τ (r,u)].[η(r,u)] β j (k) [τ (r,u)].[η(r,u)]

0

(1)

(2)

Optimization and Simulation of Electrical Wiring Path Based …

269

Sk represents the next node selected by the ant with sequence number k; q is a random variable and q is a set threshold value. The ant obtains a random value q before selecting the next node. If q ≤ q0 , the node that is not in the tabu list J(R) and has the maximum value of expression [τ (r, u)].[η(r, u)]β is selected according to the known information. The β parameter comprehensively reflects the relative degree of the influence of trace strength (r, s) and heuristic function n(r, s) on ant decision-making; if q ≤ q0 , then random method is used, s is called search, The probability distribution is determined by Pk (r, s) calculated by Formula (2).

3 Wiring Path Optimization 3.1 Problem Description According to the wiring technology of relay control system, each pair of terminals of components is allowed to connect two wires at most. Considering that the components may be installed on different mounting surfaces (board areas), the wiring between different mounting surfaces needs to be realized through terminal strip. In the construction design, for the convenience of maintenance, some special or important components are not allowed to be directly connected with other components, but connected through the terminal block as an intermediary [10]. In addition, in the actual wiring process, in order to be beautiful and convenient for construction, line cards are often set in special parts of the board area to fix the connecting lines, which will also affect the routing path. The total length of the wire is taken as the objective function of optimization, and all nodes affecting the routing and their arrangement order are taken as independent variables to calculate the minimum value of the objective function [11].

3.2 Algorithm Flow At present, the ant colony algorithm is mainly a recursive algorithm based on single CPU computer system. The mosquito swarm system is essentially a parallel system, and the parallel technology can be used to improve the computing speed. MPI is a message passing interface for parallel programming, which has the advantages of portability and ease of use [12]. It provides complete asynchronous communication function and high-level concepts such as process group, collective communication, process topology and communication context. In this paper, based on MPI, the strategy of dividing ant colony is adopted to realize the parallel algorithm of ACS, and the algorithm is simulated: the experimental environment is four PIII 850100mb switching hub, the number of network nodes is n = 70, the number of ants is m = 700, the number of iterations is t = 1000, the running time is 308.85 s (single machine

270

S. Wang

running time is 1010.47 s), the speedup ratio is 3.27, and the parallel efficiency is 0.82.

4 Simulation Analysis The main parameters to be set in ant colony algorithm are the number of leeches m, global volatilization factor A, local volatilization factor P and heuristic function weight β. The number of network nodes in the problem of relay control system wiring path optimization is in the range of 50–100 [13]. Therefore, this paper selects the data of 70 nodes to study the parameters affecting the algorithm.

4.1 Mosquito Population M The more ants there are in ACS algorithm, the stronger the global search ability is. However, the calculation amount of the algorithm is proportional to m, and the more ants there are, the greater the calculation will be. In order to find the best number of leeches, this paper selects the parameters of M = n/10, N/5, N2, N, 2n, 5N, 10N, (n = 70) for simulation analysis. The optimization result is better; when m > N, the evolution of the solution is generally good, basically converges near the optimal solution obtained when m = n, and the effect of the increase of m on the optimal solution is not obvious; when m < n, the optimization result deteriorates rapidly, and m 100

Visible light

16

Infrared

15

Electric investigation

14

Acoustic wave

0

Fuzzy decision result

5

Table 4 Objective evaluation result 2 Category Single equipment decision results

Radar

Number of UAVs

Number of errors

Times of missing inspection

> 100

> 100

6

Visible light

15

9

6

Infrared

23

16

5

Electric investigation

45

6

0

2

0

10

10

0

2

acoustic wave Fuzzy decision result

298

B. Wu et al.

5 Conclusion Fuzzy decision-making is a very effective multi factor decision-making method to make a comprehensive evaluation of things affected by many factors. For the UAV detection system, this paper proposes the fuzzy decision-making method for comprehensive evaluation. According to the actual experimental test results, it can optimize the system decision performance and select more reasonable targets. The work of this paper is only the application of fuzzy optimization theory in UAV target decisionmaking, and the establishment of membership function in fuzzy decision-making method needs further study. Because the establishment of most membership functions still depends on experience and experiment, there is no mature and effective method. Acknowledgements This paper is supported by the National key R&D plan of the Ministry of science and technology (Project Name: “Grid function expansion technology and equipment for community risk prevention”, Project No. 2018YFC0809704), and the International Science and Technology Cooperation Fund Project of Shanghai (Grant No. 18510730300).

References 1. Chen W, Wan X, Li J (2018) Detection technology of non-cooperative UAV targets in airport clearance area. J Civ Aviation 2(5):54–57 2. Jin W, Shang Y (2019) The safety supervision of unmanned aircraft systems in China. Sci Technol Rev 37(14):66–77 3. Chen W, Huang Y, Lu X (2020) Survey on application of multi-sensor fusion in UAV detection technology. Mod Radar 42(6):15–29 4. Chen S (1998) Theory and application of engineering fuzzy sets. National Defense Industry Press, p 11 5. Ge S (1985) Fuzzy subset fuzzy relation fuzzy mapping. Beijing Normal University Press, p 4 6. Wen G, Wang R (1997) A method for fast recognition of multi class targets based on fuzzy decision. Pattern Recogn Artif Intel 010(002):106–111 7. Wang Y, Liu J, Chen Z (2012) Research on the value of artillery firepower attacking target based on fuzzy decision. Ship Electron Eng 01:25–27 8. Li A (2018) Application of fuzzy decision method in automatic rifle selection. J Sichuan Ordnance Ind 039(002):8–11 9. Dang J, Han Y, Hao J (2002) Application of fuzzy decision method in smooth blasting. Nonferrous Min Metal 10. Sun B, Liu G, Hou Y, Wang Z (2020) A method of tactical target analysis based on hesitant fuzzy decision. Ordnance Autom 39(266, 12):24–27

Emerging Standards for Smart City

New Methods of Urban Research in the Information Age—Based on the Combination of Big Data and Traditional Data Wenhao Wu

Abstract The rapid development of information technology has led to the upsurge of “big data” in the field of urban research, and brought about the transformation of traditional urban research methods. However, many defects of its own make scholars have to reconsider the application role of traditional data. Traditional data has not lost its application value. On the contrary, urban research in the information age, which focuses on the study of the relationship between city and residents’ behavior and activities, should fully combine big data and traditional data, and explore appropriate methodologies and methodological frameworks, so as to cope with increasingly complex urban problems and residents’ needs. Therefore, this paper constructs three analytical frameworks, namely “large sample spatial development evaluation + spatial difference and connection discovery + small sample influencing factor exploration”, “small sample model construction + influencing factor discovery + large sample verification and mining”, “micro activity analysis + activity space definition + influencing factor exploration”, and analyzes the specific application of these frameworks, In order to provide ideas and methods for future urban research. Keywords Big data · Traditional data · Methodological frameworks

1 Introduction The term “big data” has gradually set off a great upsurge in urban geography, social geography, urban planning and other disciplines. Scholars have come to realize that the traditional urban research ideas and methods based on statistical data, questionnaire survey, basic geographic information and interview data have many defects, such as ignoring micro-individual behaviors and needs, small and inaccurate samples, narrow research scope and high cost [1, 2]. In addition, the emergence of network data, smart card, GPS, monitoring and sensing equipment data, which reflect the micro large sample of residents’ activities and the operation of all aspects of the W. Wu (B) School of Economics, Shanghai University, Shanghai, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_34

301

302

W. Wu

city, undoubtedly brings epoch-making opportunities to the research of cities and related fields, and the traditional research paradigm has also begun to transform [3, 4]. In the field of residents’ behavior research, GPS trajectory capture replaces the activity log survey, which can more accurately understand the spatio-temporal information of residents’ travel and activities, and study the relationship between residents’ behavior and urban environment [5, 6]. In the field of regional research, social network activities, mobile communications and other big data are used to represent the comprehensive strength of the city, the spatial and temporal connection between cities and the spatial structure, and then re understand and define the development relationship within the region [7]. It can be seen that behind the “big data craze” is the transformation of traditional urban research from micro to macro multi-level theories and methods, and the analysis of residents’ behavior and activity big data has become the core of this transformation [8]. However, there are still many problems in the application of big data. First of all, big data is often difficult to represent the whole sample, especially the application of network data [9]. The sample users only account for a part of all urban residents, and tend to be young and highly educated groups. The analysis and research of these specific groups can not accurately reflect the real phenomenon of the city. Second, big data is not all shared. Although network data is generally recognized as relatively easy to obtain data, but mobile phones, smart cards, video sensor devices and other big data related to personal privacy, trade secrets, urban security are really difficult for researchers to obtain and share, and it is these data that are the key to the study of residents’ behavior, enterprise operation and urban problems [10]. Finally, big data has caused a research boom because it can find the correlation between urban phenomena that cannot be accurately predicted by traditional statistical methods, but it is difficult to explain the causal relationship between these phenomena. In fact, although big data can improve the quality and accuracy of traditional data, it cannot replace traditional data, and the relationship between them is complementary [11]. Through the above description, we can see that big data and traditional data have their own advantages and disadvantages in urban research, and the combination of the two has become an inevitable trend. However, at present, scholars only put forward the necessity of combining big data, but less attention is paid to how to combine the two. This paper attempts to explore the methodology and specific framework of urban research in the information age of traditional data combined with big data, so as to promote the integration of multi-source data in urban research in the future.

2 Methodology and Analytical Framework of Urban Research Traditional urban research focuses on the macro analysis of urban physical space, economic space and social space with the basic unit of urban and larger space scale, trying to find out the problems of urban development and the contradiction between

New Methods of Urban Research in the Information …

303

supply and demand, and then achieve the fair distribution of space or factor resources through the overall space transformation or economic and social organization adjustment High quality economic and social development goals [12]. However, due to the lack of data and other reasons, these studies, on the one hand, lack the analysis of the laws or patterns of urban residents’ behavior, on the other hand, lack the in-depth discussion of residents’ individual behavior preferences and formation mechanism. With the continuous advancement of “people-oriented” new urbanization and the “big data” of residents’ behavior activities brought by information technology, the focus of traditional city research is bound to change: the relationship between city and residents’ behavior activities will become the main body of city research in the information age, which is also the key field of big data [13]. On the one hand, taking urban space as the research object, this paper discusses the impact of residents’ behavior on urban space (urban space evaluation); On the other hand, taking residents as the research object, this paper aims to find out the influence of urban environment (including built-up and human environment) on Residents’ behavior. Therefore, combined with the relationship between traditional data and big data and the methodology of urban research in the information age, this paper constructs three combination method frameworks suitable for the above two research fields.

2.1 EDCF Methodology Framework With the wide use of information technology, on the one hand, scholars can not only obtain large samples, dynamic location and text or picture data of different urban spaces or facilities from many theme websites, but also master the attitude evaluation data of urban residents towards these spaces; On the other hand, big data such as smart card swiping, mobile phone positioning and social network check-in always record the activity characteristics and tracks of urban residents, which can be combined with descriptive statistics and other methods to analyze the residents’ use efficiency of different spaces, and can also use relationship simulation tools such as social network analysis to find out the relationship between different spaces in the city. Therefore, this paper constructs the research framework of urban spatial evaluation in the information age, namely “large sample spatial development evaluation + spatial difference and connection discovery + small sample influencing factors exploration” (EDCF) (Fig. 1). First of all, we can grasp the distribution characteristics and development pattern of these different spaces with comprehensive development quality, utilization efficiency and spatial contact information by using the geographical location data of different spaces, and find out the “high-level area” and “low-level area”, “strong connection area” and “weak connection area” and the existing spatial problems; Secondly, on the basis of the above analysis of spatial differences and connections, some sample spaces with development information are randomly and evenly selected. Through

304

W. Wu

Data Sources

Portal website such as DianPing,Taobao

Geographic data from Mobile Phone,Smart Card, Social Network

Evaluation Statistics

Text Message

Picture Message

Credit Card Data

Factorial Analysis

Sentiment Analysis

Image Analysis

Descriptive Statistics

Comprehensive Development Quality of Urban Space

Locating Data

Network Signin Data

Social Network Analysis

Comprehensive Utilization Efficiency of Urban Space

Differences and Relations of Urban Spatial Development

Dependent Variable(Y) Spatial Equilibrium Sampling

Independent Variable's(X) Design and Source of Data Questionnaire

Website

Statistical Data

Respondent Preference, Space and Environment,...

Environmental Appraisal, Facilities Evaluation,...

Spatial Location, Density of Population,...

Econometric Model

Dependent Variable(Y)

Spatial Difference Sampling

Difference Analysis

Verification and Supplement

The Influencing Factors of Urban Space Development

Put forward the Comprehensive Management Suggestions

Fig. 1 The analytical framework of EDCF

questionnaires, website information and statistical data collection, the factors that may affect the comprehensive quality, utilization efficiency and correlation of these sample spaces are understood, and then the significant influencing factors are found by combining with the econometric model. Moreover, we can also conduct sampling interviews on the spaces with different development characteristics, and use qualitative analysis methods to understand the problems existing in the development of these spaces and the deep-seated formation mechanism of the differences. Finally, determine the urban space development and influencing factors, and put forward its optimal layout and management suggestions.

New Methods of Urban Research in the Information …

305

2.2 MFVM Methodology Framework Research on the impact of urban environment on Residents’ activities is one of the most widely used fields in traditional urban research. Through sampling questionnaire survey and statistical model analysis, we can understand the specific built environment or human environment factors that affect residents’ behavior and activities, and then put forward macro strategies and suggestions to adjust the relevant space. However, the traditional research methods are limited by the accuracy of residents’ recall, the number of questionnaire samples and representativeness. Therefore, the traditional research on the impact of cities on Residents’ behavior needs more representative sample groups and more specific spatial implementation, which can be verified and supplemented with the help of big data analysis, that is, to build a “small sample model construction + influencing factor discovery + large sample verification and mining” urban environmental impact research method framework (MFVM) in the information age (Fig. 2).

Urban Inhabitant Behavior and Activity Indicators(Y) Big Data

Verify Smartphone Data WiFi Location Data Map Platform Data Website Data

Travel Indicators

Activity Indicators

Behavioral Preference Index

Urban Environment and Residents' Attribute Index(X) Built Environment Humanistic Environment Resident Attribute Indicator Indicator Index

Descriptive Statistics Spatial Analysis Imagine Analysis

Verify Population Density Traffic Accessibility Service Facilities Land Utilization

Technical Innovation Organizational Management Cultural Environment

Social Contact Age and Gender Educational Level Income Level

Econometric Model

The Trajectory of Residents' Behavior and Emotional Simulation

Verify

Urban Environmental Factors that Affect Residents' Behavior and Activities

Dig

Dig Characteristics of Urban Environment Utilization and Residents' Cultural Consumption Preference

Urban Built Environment Optimization and Humanistic Environment Management Suggestions

Fig. 2 The analytical framework of MFVM

Questionnaire Statistical Data Spatial Data

306

W. Wu

Specifically speaking, on the one hand, in the research of “traditional data + econometric model”, the variable design mainly includes three contents: Residents’ behavior activity index as dependent variable, city index as independent variable and residents’ attribute index as independent variable, and these index data mainly come from questionnaire survey, statistical data and spatial data. On the other hand, through the comprehensive analysis of big data such as mobile phone calls, WiFi Positioning, and microblog check-in, we can grasp the residents’ activity trajectory and emotional spatial distribution in a certain urban space, and test the accuracy of significant influencing factors obtained from the “traditional data + econometric model” analysis, such as green space area, number of service facilities, and so on Group differences, etc.

2.3 MADF Methodology Framework In the traditional research of urban environmental impact on Residents’ behavior, questionnaire survey or activity log is used to collect residents’ behavior data. After the emergence of new technology and activity big data, the traditional research methods need to be transformed, and the research method framework of urban environmental impact in the information age of “micro activity analysis + activity space definition + influencing factors exploration” (MADF) needs to be constructed (Fig. 3). On the one hand, the descriptive statistics and spatial recognition technology are used to extract, identify and analyze all the location information of the residents in the survey period of small sample acquired in GPS, mobile phone and social network, calculate the range of activity space, activity path, activity space combination mode, etc., and act as the dependent variable of small sample model analysis. On the other hand, the above activities were investigated by questionnaire, combined with statistical data and spatial basic data, and the data of independent variables such as builtup environmental indicators, human environment indicators, personal preferences, social communication and personal attribute information that may affect the activity space of the respondents were obtained, and the significant factors affecting the daily activity space of urban residents were found by using the method of measurement model. In addition, the processing and analysis of Web activity log, mobile app text information, micro blog text or image information can help to calculate the variable index of activity space of the respondents, to distinguish the specific activity content and behavior preference of residents at each time point, The results show that the significant factors found in the final model can be verified or the specific distribution of residents’ behavior activities and cultural preferences can be supplemented under the influence of space.

New Methods of Urban Research in the Information …

307

Data Sources

GPS and Web Platform Positioning、Smartphone APP Location、Social Software Check-in

GPS Data

App Positioning Data

Network Check in Data

Web Activity Log

Descriptive Statistics、Spatial Recognition

App Text Information

App Image Information

Text Analysis、Picture Analysis

Verify Urban Inhabitant Behavior and Activity Indicators(Y) Scope of Activities

Activity path

Activity mode

Activity Content and Preference Judgment

Urban Environment and Residents' Attribute Index(X) Built Environment Humanistic Environment Resident Attribute Indicator Indicator Index

Population Density Traffic Accessibility Service Facilities Land Utilization

Technical Innovation Organizational Management Cultural Environment

Econometric Model

Dig

Social Contact Age and Gender Educational Level Income Level

Questionnaire Statistical Data Spatial Data

Verification and supplement

Urban Environmental Factors that Affect Residents' Behavior and Activities

Characteristics of Urban Environment Utilization and Residents' Cultural Consumption Preference

Urban Built Environment Optimization and Humanistic Environment Management Suggestions

Fig. 3 The analytical framework of MADF

3 Conclusion and Discussion Through the analysis of the existing big data and traditional data related research, this paper finds that the combination of the two is the inevitable trend of urban research in the information age, and it is also a more scientific research method. However, there are few systematic methodology and specific method framework for the combination of two types of data at home and abroad. According to the relationship between the two types of data, such as mutual supplement, mutual verification or corroboration, and improving the quality of data, this paper constructs the specific method framework of urban research in the information age from three aspects, including “large sample spatial development evaluation + spatial difference and connection discovery + small sample influencing factors exploration”, “small sample model construction

308

W. Wu

+ influencing factors discovery + large sample verification and mining”, “small sample model construction + influencing factors discovery + large sample verification and mining” “Micro activity analysis + activity space definition + influencing factors exploration”. Generally speaking, in terms of research topics, these frameworks emphasize the important role in the research field of the relationship between city and residents’ behavior and activities, and grasp the key needs and directions of urban research in the information age; In terms of technology and methods, these frameworks advocate a new paradigm of urban research methods in the information age of “multi-source data supplement and fusion, multi type method integration and revision”. The central city working conference held in December 2015 clearly pointed out that in the future, China’s urban development needs to further promote the new urbanization of “people-oriented”. This requires urban planners and managers to fully understand the real-time operation status of the city, existing problems, residents’ opinions and individual needs. Based on the urban research based on the combination of big data and traditional data, they need to change the traditional urban planning methods and formulate urban management policies that meet the wishes of the government, enterprises and residents. However, the method framework proposed in this paper is more about the construction of the method system of the main direction of urban research in the information age, which needs to be further supplemented and refined, and also needs to pay attention to the exploration of new technologies and new methods for the application of the two types of data. In addition, the rapid development of information technology has not only brought about the transformation of traditional urban research technology and methods, but also accelerated the flow of geospatial elements and the connection between virtual and real space, and changed the organizational form of space itself. In the information age, the time–space elasticity of urban elements has been greatly enhanced, and new urban spatial phenomena or types will continue to appear. How to take advantage of the combination of data to cope with these changes, we need to construct the method application system from a broader perspective, and pay attention to the relationship with computer science, geographic information science, economics, sociology, psychology, etc. Management and other multidisciplinary methods in-depth cross integration.

References 1. Brommelstroet M, Pelzer GS (2014) Forty years after lee’s requiem: are we beyond the seven sins. Environ Plan B 42(3):381–387 2. Feng Z, Xiao Q, Xi G (2015) The innovation of geography and human geography in the information era. Scientia Geograph Sinica 35(1):11–18. (in Chinese) 3. Richard S (2015) Dazzled by data: big data, the census and urban geography. Urban Geogr 36(7):965–968 4. Liu Y, Wang F, Xiao Y et al (2012) Urban land uses and traffic ‘source-sink areas’: evidence from GPS-enabled taxi data in Shanghai. Landsc Urban Plan 106(1):73–87

New Methods of Urban Research in the Information …

309

5. Kong L, Liu Z, Wu J (2020) A systematic review of big data-based urban sustainability research: state-of-the-science and future directions. J Clean Prod 273 6. Hollenstein L, Purves R (2013) Exploring place through user-generated content: using flicker tags to describe city cores. J Spatial Inf Sci 1:21–48 7. Yang Y (2021) Research and simple calculations on public transport card data. J Phys Conf Series 1865(4) 8. Krings G, Calabrese F, Ratti C et al (2009) Urban gravity: a model for inter-city telecommunication flows. J Stat Mech Theory Exp L07003:1–8 9. Graham M, Shelton T (2013) Geography and the future of big data, big data and the future of geography. Dial Hum Geogr 3:255–261 10. Kitchin R (2013) Big data and human geography: opportunities, challenges and risks. Dia Hum Geogr 3(3):262–267 11. Tang F (2015) Big data and small data: methods in social sciences. J Sun Yat-sen Univ (Soc Sci Ed) 55(6):141–146 (in Chinese) 12. Hao J, Zhu J, Zhong R (2015) The rise of big data on urban studies and planning practices in China: review and open research issues. J Urban Manag 13. Dang A, Xu J, Tong B, Li J, Qian F (2015) Research progress of the application of big data in China’s urban planning. China City Plan Rev 24(01):24–30

The Influence of Information Technology on New Media Dance Huilian Wen

Abstract New media dance was created in the United States in the 1960s, and China only began to study it in 2004. The emergence of new media dance changes people’s perception of dance, and changes the way of dance creation. The technological method is to use it to serve the dance as much as possible. The new media dance, which interacts with modern dance and projection technology, brings people a wonderful and magical visual sensory experience. The choreographer makes use of the dancer’s unique body texture and material contrast. Coupled with the principle of diffraction recording, three-dimensional images and other digital multimedia LED panels, real-time video projection, media software and digital computer light technology, it creates a dazzling and fascinating image of time and space. Facing the present, the progress of modern society, the change of life pattern, the renewal of the concept of time and space, the explosion of Information Technology, how to adjust the relationship between dance and the rapid development of society, and make the art of dance and the development of the world become more and more balanced? What are the influences of Information Technology on new media dance? The author will explain from the background of Information Technology that new media dance is pioneering and innovating on the basis of respecting tradition, Information Technology infiltrates aesthetic concepts in the reform of new media dance creation, new media dance gains a new life through reference and expansion, and new media dance is interacting with each other. In the four aspects of changing the old and the custom, it explains the influence of Information Technology on the development of new media dance. In addition, the author explores the current new media dance with dance works on the current stage, thinking about how to make Chinese dance dialogue with the world, and integrate Chinese culture and technology. Keywords Information technology · New media dance · Science and technology · Dance creation

H. Wen (B) School of Art East, China University of Technology, Nanchang 330013, Jiangxi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_35

311

312

H. Wen

1 Introduction New media dance was created in the United States in the 1960s, and China only began to study it in 2004. Conceptually, new media dance refers to the use of multimedia technologies such as video technology, sound, light, and dance, and the use of light and shadow changes to match the dancers’ movements to create a more threedimensional and vivid story background and characters [1–3]. Ancient Chinese dance is an expression of “poetry, music, and dance”. With the passage of time, music has gradually become the accompaniment form of dance, and the power of body movements is revealed as a unique artistic language. As a result, the choreographers gradually stripped the “dance” from “poem, music, and dance”, and they were widely used. Today, with the advanced technology of Information Technology, many dance works are integrated with multimedia technology, and have a certain degree of appreciation and expressive ability [4–6]. New media dance has gradually developed into an art form that can independently express content. Information Technology’s influence on new media dances is expanding day by day. It uses the current technology or editing technology to splice each dancer together, breaking the boundaries of time and space, and appearing in front of everyone together. Or it uses the principle of diffraction to record, three-dimensional images and other digital multimedia LED panels, and real-time video projection to create a different space–time image. The emergence of new media dance changes people’s perception of dance, and changes the way of dance creation [7–10].

2 New Media Dance Pioneers and Innovates on the Basis of Respecting Tradition The creation of different types of dance has its own characteristics. Under the influence of Information Technology, the reform of new media dance creation methods does not require choreographers to completely break the advantages of existing traditional creation methods and discard the essence of traditional concepts. Instead, the choreographer is required to strengthen the existing advantages and realize the linkage and intercommunication between dance and Information Technology, so that dance creation can be updated and advanced in inheritance and innovation, so as to adapt to the social requirements of new media dance creation. Bai Juyi, a poet of the Tang Dynasty, has a poem chanting “Hu Xuanwu”, in which there are “Hu Xuan Girl, the heart responds to the string, the hand responds to the drum, the string responds to the double sleeves, the snow floats back and forth, and the tent dances to the left. Right-handed indefatigable, thousands of times endlessly, the species in the world are incomparable, and the wheels are slow to whirlwind …” This is the intuitive impression of ancient people on dance. It is a creative performance of dance without any modern information technology background. Through the verses, we can vividly experience the dance culture of the Tang Dynasty. Dancers dance to the

The Influence of Information Technology on New Media Dance

313

drum. The three characters can be summarized as anxious, floating, and swirling. It is a combination of dance movements and ancient poems using the description of objects. This not only shows the poet’s longing and pursuit without contending with the world in the poems, but also gives the dance a distinctive spiritual meaning and supports the central idea in the dance theme; In September 2015, Wang Yabin created the modern dance drama “Tsing Yi”. The choreographer uses the dancer’s unique body texture and material contrast. Coupled with the principle of diffraction recording, three-dimensional images and other digital multimedia LED panels, realtime video projection, media software and digital computer light technology, another Wang Yabin is presented on the sky screen with new media technology. Wang Yabin wrestled with another self. Because the new media technology can make people move as fast as a movie, Wang Yabin danced. The other one moves forward very slowly, or goes up to the sky very fast, or falls slowly in the air. The choreographer perfectly combined the real dancers on the stage with new media technology, and achieved surprising results, broadening the space of dance formal language; these two dances are originally incomparable, but from the perspective of Information Technology, they are both the imprints of the dancer’s era [11–13]. In the creation of new media dance, respect for the traditional foundation and advantages is the first. The choreographer must adjust the development direction of dance creation on the basis of fully understanding his own shortcomings, give full play to his professional advantages on the premise of summarizing the traditional dance creation experience, and realize the logical continuation of the creation theory. The author conducted a perception survey in the choreography of the comparison between new media dance and traditional dance. As shown in Table 1, in the new media dance and traditional dance choreographer perception survey, the highest average value of the new media dance group is 9.66, and the lowest average value is 8.13. The highest average value of the traditional dance group was 8.96, and the lowest average value was 6.37. There were significant differences between the choreographer’s favorite and performance style of the new media dance group and the traditional dance group. The new media dance group was about ± 3.29 higher than the traditional dance group. Table 1 A survey of the perception of new media dance and traditional dance choreographers (Scoring standard: 10 points system) Content

Average value of new media dance group (N = 30)

Average of traditional dance group (N = 30)

Performance content

8.10

8.06

Stage space

9.53

6.37

Technical skills

8.13

6.97

Dance movement texture

9.63

8.96

Comprehensive dance performance

9.66

7.49

314

H. Wen

Based on the above analysis, it can be seen that the emergence of new media dance means that pure dance art can no longer be satisfied with the artistic pursuit and aesthetics of modern people, and the advancement of technology has driven people to a higher artistic taste. There are significant differences between new media dance and traditional dance in terms of stage space and overall dance performance. The new media dance group is higher than the traditional dance group in terms of movement texture, technical skills, dance movements and expressiveness. Therefore, it can be concluded that on the basis of respecting tradition, new media dance helps to enhance the pioneering and innovative level of dance creators’ movement skills and stage performance.

3 Information Technology Penetrates Aesthetic Concepts in the Reform of New Media Dance Creation The advent of the information age has made aesthetic development in the direction of popularization, and the forms of artistic presentation have become more diverse, resulting in a decline in the aesthetic taste of some directors. Art disciplines should adhere to the value concept of “aesthetics”. As a creator of beauty, we should avoid the development of dance in the direction of “technological supremacy” in the environment of new media. The new media dance in the Information Technology environment should strengthen the cultivation of the audience’s aesthetic ability. This is because in the new era environment, some audiences have misunderstandings about art. The choreographer overemphasizes the importance of technology in creation, while dancers tend to “show off their skills” in their performances, instead of paying attention to the aesthetic feelings the works bring to the audience, and ignoring the status of artistic characteristics as the core of aesthetics. Dance choreographers should recognize the importance of aesthetic education, use technology to accelerate the process of dance performance reform under the premise of respecting the artistic characteristics of dance, and reflect the charm of the integration of technology and art. “Showing Wealth” by the Kevin Williamson Dance Company of the United States, the work symbolizes the mosaic of the vanity fair, the flash of the giant human body foundation and the urban ruins, and the multi-dimensional exciting “sound and light”. This makes the virtual and reality interaction between the stage illusion and the performer, which produces a shocking effect. However, the author did not immerse himself in technological means, but tried his best to serve the dance with technology, and found the common ground between the three-person dance and the three-degree harmony of music, allowing the dancers to pass through rich changes. It shows self-confidence, the intersection of humorous seasonal spoken language and action language, etc., as if the individual color clothing is faded away. It shows the young people’s desire to express themselves, live in the present, and strive for social recognition and value recognition.

The Influence of Information Technology on New Media Dance

315

The dance works presented by new media have inherited traditional forms. There are also innovations in details. Cultivating the audience’s aesthetic ability for new works and new elements should become the new goal of dance creation reform, always keeping in mind the artistic characteristics of “beautify people”.

4 New Media Dance Gains a New Life Through Reference and Expansion With the development of the times and changes in history, dance art is constantly absorbed and abandoned, integrated and developed. China’s new media dance already has the experience of learning advanced foreign practices, and Information Technology has gradually diversified the presentation of dance works, enabling the choreographer to break through the creative inspiration limitations of traditional dance, reflecting the integration of human nature and technology. The choreographer is no longer alone. Under the background of Information Technology, new media dance has realized the integration of dancers and digital scientists. At the same time, the development of new media dance will inevitably impact traditional dances, and the cultural destination of Chinese new media dances will inevitably move toward the spirit of traditional culture. Such new media dances will have more vitality. The choreographer draws inspiration from other disciplines in dance creation, and draws on the way new media dance is presented. They use lines, melody, light and shadow to show the aesthetic value of works, and provide a source of inspiration for artistic creation by looking for theories and specific methods related to people’s spiritual pursuits. For example, Mr. Mei Lanfang’s opera and dance “The Goddess Scattering Flowers” narrates a myth from the Buddhist classics “Vimalakirti Biography”. Among them, the long silk dance uses the actor’s wrist strength to dance lightly, and the dance has a visual impact like a fairy; the action chooses the combination of playing dragon tendons, harrier turning over, single-handed flower, gun flower, etc., and selected Buddha seat lotus platform, etc. The figure is accompanied by the singing of Xipi, Erhuang and Kunqu opera together, singing and dancing, melodious and charming, or looking forward to brilliance, or making a stereotyped appearance; It sometimes resembles waves and ripples, sometimes like running clouds and flowing water; there are single pendulum turntable sleeves, some overlapping turntable sleeves on the front side, some fly straight, some shape like wheels and so on. These are to express the characters’ psychological activities, thoughts and feelings vividly, to create an illusory and graceful heavenly mood, and to bring the audience to a magical and wonderful celestial world. Just imagine, if we learn from Information Technology and turn it into a new media dance, then the creation of a vain and graceful heavenly mood will definitely be a different scene. The new media stage art will provide new space and new ideas for the shaping of dance characters, and can enrich the characters. In addition, the means of shaping characters will continue to

316

H. Wen

increase, and the audience will have a deeper understanding of the spiritual pursuit of new media dance.

5 New Media Dance Changes the Old Customs in Communication and Interaction The new media dance itself is comprehensive. The exchange of dramas in the script literature, the exchange of performances in the theater stage, and the exchange of lighting and dance art in technology, etc., all reflect the intersection of new media dance and other disciplines. New media makes the field of dance practice continue to expand. Under the background of Information Technology, new media dance has opened up a broader space for development and communication for the development of the dance field. This not only breaks the limitations of performance styles, but also breaks the limitations of broadcasting tools, prompting choreographers to seek reforms and breakthroughs on the basis of inheriting tradition. Under the background of Information Technology, choreographers need to respect the independence of new media dance development, deeply analyze the actual problems in the development of new media dance, continuously strengthen the aesthetic function, and reflect the new direction of dance development in the art reform. The dance theater “Peony Dream: Beyond the Dream” is the latest work of Yin Mei, a famous contemporary dancer, tenured professor of Queen’s College of the City University of New York, and director of the dance department. The play was inspired by Tang Xianzu’s classic book “The Four Dreams of Linchuan”, “The Peony Pavilion”, which premiered on May 9, 2019 at the 13th LAMAMA MOVES Experimental Theater International Dance Festival in New York, USA. (LAMAMA MOVES International Dance Festival attracts outstanding dance companies from China, the United States, Canada, Italy and other countries all over the world. This season’s programs include post-modern, experimental, ethnic fusion and other performance styles). I have the honor to participate in the creation and performance of Yin Mei’s dance project, which won the American NDP dance project, as a national public visiting scholar. This work connects Du Liniang and modern dancers through a “self-portrait”. In this work, through the overlap of dance drama and visual art, the deep invisible inner world of the characters is expressed through the use of visual materials. At the same time, the work uses paper, carbon, oil, wood, body, ink and matcha powder for subversive creation. These materials provide powerful raw materials for visual exploration of memory, history, culture, and the destination of the individual’s heart and identity. Yin Mei’s artistic creation philosophy and body movement methods are deeply influenced by traditional Chinese space philosophy and energetics. The actor’s beautiful body and holographic interactive technology stage art have opened a magnificent visual feast. The twists and turns of the story and the abundant emotions of the characters embody the core idea of “the harmony between man and nature” in traditional culture. The dance drama “The Electric Wave That Never Elapses” was

The Influence of Information Technology on New Media Dance

317

performed at the Shanghai International Dance Center in December 2018. It is a rare dance drama with the theme of the Red Spy War in recent years. Multimedia creation cannot avoid the problem of “how to balance between enriching stage narrative and not overpowering the audience”. Multimedia should work harder in terms of functionality, not overpowering the audience and overpowering the audience, and add luster to the actor’s stage expression. Interpreting such a deeply rooted and complex story through dance drama, while taking into account the dance, but also accurately expressing the drama plot and sublimating emotions. On this basis, the emergence of multimedia should be breakthrough and more sophisticated, like the finishing touch of walking, injecting short-term but significant brilliance into the stage.

6 Conclusion At present, with the progress of modern society, the change of life pattern, the renewal of the concept of time and space, and the explosion of Information Technology, we are facing severe new challenges. Dance creation is merging with various emerging media, which adds fresh blood and strong momentum to the development of dance creation. With the increase of mass cultural demand, the society has higher and higher requirements for the presentation methods and communication channels of dance. New media dance creation has no fixed mode. Dance creation and choreography are constantly innovated under the influence of new media, and constantly explore new dance languages and expressions. Only in this way can the vitality of dance art be extended from dance forms to ideological content.

References 1. Martin J (1994) Introduction to dance (Trans. by Ou J). Culture and Art Publishing House, Beijing. (in Chinese) 2. Liu Q (2004) The history of western modern dance. Shanghai Music Publishing House, Shanghai, pp 327 (in Chinese) 3. Xiao S (2013) Contemporary choreography theory and techniques. Central University for Nationalities Press, Beijing, pp 28. (in Chinese) 4. He Y (2011). History of ancient Chinese dance. Shanghai Music Publishing House, Shanghai, pp 20. (in Chinese) 5. Ren B (1984) Tang teased. Shanghai Ancient Books Publishing House, Shanghai, pp 497. (in Chinese) 6. Qi R (2014) Organization of Chinese drama. Shanxi People’s Publishing House, Shanxi. (in Chinese) 7. The Story of Mei Lanfang, The Biography of Xu Ji, The Story of Xu Yuanlai, and Zhu Jialu. Forty years of stage life: memoirs of Mei Lanfang. Unity Press, Beijing, pp 481. (in Chinese) 8. Ouyang Y (1959) Yi Deyu Copy: selected art essays from 1951–1959. Writers Publishing House, Beijing, pp 351–352. (in Chinese) 9. Li Z (1981) The course of beauty. Cultural Relics Publishing House, Beijing. (in Chinese)

318

H. Wen

10. Li Z (2002) Collection of old aesthetics. Tianjin Academy of Social Sciences Press, Tianjin, pp 465 (in Chinese) 11. Wang J (2017) Analysis on the origin and characteristics of new media dance art. Voice Yellow River 03:23–27 12. Long Y (2009) Introduction to dance art. Shanghai Music Publishing Society, Shanghai (in Chinese) 13. Wan C (2017) Cognition and interpretation of new media dance art. Dance 01:10–14

Cultural Elements in the Urban Landscape Design Innovation Based on Big Data Era Yu Wang

Abstract With the advent of the era of big data and the rapid development of modern urban construction in China. Landscape design has become an effective way to reflect urban culture and most cities blindly imitate the modern metropolis for the construction of urban landscape culture. As a result, the urban landscape lacks the construction of its own unique cultural elements. By using data of urban traditional culture elements in the analysis of the application in landscape design, Innovative thinking in the construction lack of features, the lack of historical and cultural construction, and other issue, The cultural innovation should be adopted to promote the urban landscape environment and to shape the cultural elements of the city as well as the characteristics of the city. Highlight the role of Landscape Design in Urban Cultural and traditional Features. Explore the innovative and feasible ways to translate cultural elements into modern landscape design. Keywords Big data era · Cultural elements · Landscape design · Urban character With the advent of the era of big data and the rapid development of modern city construction in China, city landscape has also spread rapidly. Even though landscape design and its infrastructure had basically met the living demands of the public, most of the city landscape lacks its own characteristics, like people just blindly imitating and directly using the exiting elements of landscape which connects with culture, leading to cities lose its own characteristics and move towards synergy. Lacking the construction of the cultural elements of the city’s own characteristic. How to use big data analysis and explore innovative design basis of urban cultural elements to guide urban landscape design, discusses the application of the humanities connotation and culture elements of city features, using the humanities characteristics for city landscape design has become the development trend of today’s urban landscape research [1]. Y. Wang (B) Department of Landscape Architecture, Shenyang Institute of Technology, Shenyang, Liaoning, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_36

319

320

Y. Wang

1 Innovative Understanding of Cultural Elements in the Era of Big Data Cultural elements—the traditional cultural elements with regional characteristics is the precious heritages left by history, which has colourful content and diverse form. Meanwhile, traditional cultural elements are changing with the rapid development of modernization. In the era of Big Data, the innovation of urban landscape design should pay attention on its thoughts and ideas rather than blindly emphasize the visual effect. It should break the traditional cultural elements inherent in the present form, the traditional culture element in the inheritance and optimization of constantly updated. Considering the requirement of its service, traditional form of expression is combined with modern technique, so that the traditional concept is reorganized under the new concept, which embodies the characteristics of the times and highlights its cultural connotation at the same time [2]. The combination of traditional cultural elements and modern urban landscape design needs to consider the connotation of communication, integrate aesthetic and ecological concepts, fully combine with modern design thinking, and use abstract, inductive, combined and regenerative inheritance techniques [3]. By analyzing and refining big data, design the landscape with urban characteristics. Urban landscape environment and cultural context complement each other, cultural elements aeriform in changing the concept of landscape design and expression, the interdependence and Promotion of Culture and Landscape. The modern urban landscape design needs to get rid of all the elements, simple patchwork and the imitation of western landscape design blindly. Instead, the historical context should be continued, Use big data analysis to cultural elements to highlight the regional characteristics and cultural concepts, the city landscape design presents its colorful charm and shows its rich regional cultural connotation.

2 The Relationship Between City Landscape Design and Cultural Elements Cultural elements and the relationship between the urban landscape design has been the focus of attention in landscape design, how to coordinate the relationship between them, apply cultural elements, especially the traditional culture elements in modern city landscape design, guide the urban landscape design more diverse direction development is very important [4]. How to refine and use cultural elements in the era of big data, combined with the background of urban landscape design is the primary issue. The design needs to inherit, develop and innovate the cultural elements. Abstract design techniques are used to refine the essence of the cultural elements so as to highlight their urban characteristics in the landscape design. By combining the traditional techniques and forms with the elements of modern science and technology, to create a city landscape environment design with both cultural connotation and time characteristics.

Cultural Elements in the Urban Landscape Design …

321

As a cultural heritage left over from the development of urban history, culture contains the rich contents of different periods. Traditional cultural elements provide rich ideas and creative inspiration for the design of modern urban landscape, both in terms of ideology and form, shape and subject. The rational extraction and creative application of cultural elements with urban characteristics can highlight the unique charm of city and meet the requirement of people who want to understand and know the characteristics of the city. Through big data analysis, modern urban landscape design in order to better highlight the characteristics of urban culture which can be incorporated into the design performance of regional culture, traditional technology, folk culture as well as in its spatial layout, style positioning, landscape sketch design, Plant configuration, etc. In order to highlight the characteristics of urban culture, landscape can be incorporated into the design performance of regional culture, traditional technology, folk culture, in its spatial layout, style positioning, landscape sketch design, Plant configuration, etc.

3 Problems in Modern Urban Landscape Design in the Era of Big Data With the development of landscape design, modern landscape design pays more attention to the harmony of human, nature and culture [5]. In the era of big data Traditional culture and regional characteristics are the historical context and cultural form of a city in a certain period, which is the most intuitive embodiment of its urban characteristics. It is reflected in the landscape design, which is the sustenance and expression of people’s regional feelings. It is the shaping of the urban characteristic landscape, it is the most intuitive manifestation of improving the urban image. Just blindly the city buildings, sketch, mountain, water, different elements, such as the simple together is not the true sense of urban landscape, only constantly city cultural spirit and urban context into the city landscape design to make it alive. People will be attracted by the connotation of landscape to express, to stop, think, aftertaste, only the deep experience that brings people more visual and sensory experience, can make people deep inside the people and the scene emotional resonance, the spiritual satisfaction [6]. However, there are some problems in urban landscape design, such as the lack of urban culture, the formalization of urban landscape design symbols and so on.

3.1 Worship the Foreign and the Whole Westernization Compared with foreign landscape, Chinese landscape design develops relatively late, the theoretical system is still not mature. In order to catch up with the development process of foreign countries, designers begin to learn advanced design thinking,

322

Y. Wang

methods and concepts from abroad, meanwhile, they admire foreign countries. As the phenomenon that total westernization appears constantly and eventually, leading to the gradual disappearance of traditional cultural elements. Blindly imitating western design techniques and drawing lessons from Western design works, combining Chinese cultural elements with landscapes, which results in superficial and superficial design. Even in some places, people use the false culture in order to make the local economy develop rapidly. Thus, using traditional culture and local characteristics without careful and serious, which leads to some highlights the characteristics of city culture elements gradually forgotten by the people, thus affecting the development of the urban landscape design.

3.2 Loss of Cultural Connotation, Lack of Cultural and Historical Features People often see monotonous, stereotyped, lack of their own urban personality of the landscape environment. The reason is the lack of in-depth research on the historical process, traditional culture, local customs and humanistic characteristics of the city in design process. Lead to the overall urban landscape design positioning is not accurate, make the Landscape design is not consistent with the overall environment of the city, which is difficult to be accepted and recognized users.

3.3 Element Stacking, Simple Copy Urban landscape design can directly and indirectly reflects the development degree of urban culture instead of simply model and copy. Thus, people should pay attention to study and explore the cultural elements reflected. During the design, it is common thing that using some unsourced cultural elements, or using some symbols and patterns to paste, just to consider the form without any further exploration of the meaning, so that the elements are supposed to reflect the city’s culture and transformed into a cultural patch that doesn’t fit in. Each city has its own characteristics, cultural elements can be pasted. Therefore, it is necessary to consider how the cultural connotations behind cultural elements are integrated with the whole urban landscape.

Cultural Elements in the Urban Landscape Design …

323

4 Innovative Expression of Cultural Elements in Urban Landscape Design in the Era of Big Data 4.1 The Role of Cultural Elements in Urban Landscape Design The characteristic landscape of a city can perfectly embody the spirit of a city. Attention should be paid to embody the unique cultural connotation in the history of urban development in urban landscape design. If simply surface decoration, weakening the cultural connotation, its urban landscape design must be bland [7]. Through analysis and refining in the era of big data, only by combining the modern urban landscape with the cultural elements with urban characteristics can the urban landscape design with more connotation and time sense be designed. Modern urban landscape is a kind of existence, but also a kind of cultural existence. Only by grasping the role of cultural elements in the urban landscape, can the landscape be endowed with connotation, in addition, the city can show its regional characteristics and unique charm of historical culture. It can become a city with cultural characteristics. Highlight the city features: In urban landscape design, it is a development trend to fully consider the integration of cultural elements in combination with big data analysis, which can not only meet the visual enjoyment of the users, but also cause its spiritual resonance with the landscape environment. The cultural heritage of the city is a means of expression of cultural accomplishment, cultural feelings and cultural propaganda in the city, which can strengthen the appeal of the city culture and enhance the residents’ feeling of belonging to the city. Propaganda education and culture: Urban environment often create some unique education and propaganda of landscape space, which means it can reflect a city’s own spirit and regional culture, with its tangible elements exert a subtle influence on to reflect the city’s cultural characteristics, influences people’s thought and behavior. It forms a cultural display platform which is different from traditional propaganda. Enhanced participation and interaction: Leisure and entertainment is an important functional component of urban landscape design through big data analysis. The interaction between people and environment can make people feel happy in their environment and pay attention to the integration of cultural elements in the landscape environment. By allowing culture to engage through another medium, people can better engage in dialogue and interaction with culture in the environment.

324

Y. Wang

4.2 Innovative Application of Cultural Elements in Urban Landscape Design Urban landscape design in the era of big data, the application of cultural elements is a process of analyzing and refining-reanalyzing and refining. Refining and summarizing the typical cultural elements, meanwhile, using innovative way to apply the process of urban landscape design through art way and expression. In addition, connecting the characteristics of urban culture element with he design of city landscape architecture. Historical cultural elements: As the unique heritage of the city, the historical culture is the coagulation and crystallization of urban regional culture, which can vividly reflect the differences of different cities. Using big data to extract the city’s historical and cultural characteristics, integrating that into urban landscape design, the historical process is recorded and evolved in landscape design by using creative expression techniques to maintain and extend the historic context of the city. For example, the Furong Garden of Datang in Xi’an shows the splendid civilization of the prosperous times of the Tang Dynasty against the background of “Going into the history, Feeling the humanities, Experiencing the life”. The park design makes people experience and aftertaste the change and evolution of urban culture in the landscape environment. Architecture and Natural Culture elements: It is an important mean to create urban cultural landscape from fully excavating the city’s landmark buildings, buildings and the unique natural landscape environment as well as extracting the urban cultural context by using the big data. Natural culture is a cultural accumulation in nature. Architectural culture is a cultural accumulation in the process of urban development. The form of architecture and layout of landscape can reflect the unique interest of its culture in urban landscape design, it is an important part of building a featured urban landscape. Poetic cultural elements: It is a kind of style of traditional garden landscape design in China, Poetry culture is one of the most direct manifestation of the essence of culture. The combination of poetry and painting embodies the unique Chinese traditional aesthetic conception. For example, “Sound of rain hits plantain is slow, Wind blows flowers and plants.” Poems show the artistic conception of its environment with unique culture and three-dimensional landscape space. So, it enrich people’s spiritual world, embodies the charm of urban landscape. Pattern culture elements: It is the essence of Chinese culture after five thousand years of history, different traditional patterns show different historical stages of the humanistic customs and characteristics of the times, the design culture can transfer the humanistic customs in the urban landscape design. Bring a feeling of beauty. The pattern is integrated into the urban landscape design through the different evolution ways, creating the indispensable scenery in the space environment and injecting the soul of the pattern culture elements into the urban environment design, furthermore, regional cultural features also can be better displayed [8].

Cultural Elements in the Urban Landscape Design …

325

Peroration In the era of big data, the city landscape design has the cultural elements and regional features, which can highlight the urban theme better and show the unique historical context of the city. Similarly, only the humanistic spirit and regional cultural characteristics of the city landscape design can be deeply popular. How to integrate cultural characteristics into landscape design requires us to constantly improve our own cultural literacy, use innovative techniques to better integrate urban cultural elements into city landscape design, so that traditional culture blooms its unique charm. Forming the city landscape environment with regional characteristics [9, 10].

References 1. Tan J, Yang X (2014) Analysis of the application of cultural elements in urban landscape design. Design 7:59–60 2. Xu H (2015) The application of Chinese traditional cultural elements in modern urban landscape design—taking suzhou as an example. Qilu University of Technology Thesis for Master degree 3. Du H, Cai Q (2020) Discussion on the planning and design concept of Chinese modern landscape garden. Pract Rural Technol 5:136–137 4. Min C (2020) The application of humanization concept in landscape architecture design. New Mater New Decoration 12:20–22 5. Lu L (2019) Brief analysis of the domestic and foreign development status and technical development trend of landscape design. Sci Technol Innov Herald 47:140–141 6. Chen Y (2017) Studying on the application of traditional cultural elements in modern park design—a case study of Suzhou Gaoxin traditional park. Jinlin agricultural University Thesis for Master degree 7. Liu W (2015) Analysis on the expression of regional culture in landscape design. Chin Horticult Abst 10:142–143 8. Jing R (2018) Reflections on the elements of folk culture and contemporary art design. Ind Des 3:75–76 9. Wang M (2021) Investigation of remote sensing image and big data analytic for urban garden landscape design and environmental planning. Arab J Geosci 10. Zhao K (2020) Big data-driven environmental landscape design scheme evaluation research. Mod Electron Technol 12:132–136

Application of Big Data in the Creative Design of Manchu Traditional Cultural Visual Symbols Tianhua Zhao

Abstract Manchu, the most ancient minority in China, is the only minority where two dynasties were established in China (Tong in Man Zu Yan Jiu 1:47–52, 2007 [1]). In the course of history, many visual symbols are handed down, especially the ones about the festival culture. In terms of the inheritance and innovated design of Manchu visual symbols about festival culture, this paper explores the meaning and visual innovated design of Manchu festival culture, selects traditional Manchu visual symbols about festival culture, and uses the modern innovated design method to present ethnic design. Hope this can provide design ideas for the inheritance and development of China multiethnic festival cultures. Keywords Big data · Manchu · Festival culture · Visual symbols · Innovated design The innovation and development of cultures rely on culture carriers. As a component part of the culture, minority customs show the diversity of Chinese culture and help the transmission of Chinese traditional cultures. Traditional festivals, mirroring the traditional culture, have unique advantages in traditional culture transmission. Currently, more and more people pay more attention to economic development but ignore the soft power development [2]. Linking market economy with traditional culture by visual design language is one of the promotion methods for culture innovation to show both traditional cultures and design products of market economic value. Since Chinese traditional cultures are handed down from generation to generation, Manchu, as the final reigning nation in the feudal period in China, has kept a lot of local traditions. Based on this, this article analyzes the visual symbols from a deeper perspective to demonstrate the innovated design, spread the traditional culture, and explore new ideas of culture innovation.

T. Zhao (B) Department of Visual Communication, Shenyang Institute of Technology, Shenyang, Liaoning, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_37

327

328

T. Zhao

1 Introduction to Manchu Traditional Festival Culture Manchu, as one of the minority ethnic groups in China, has over ten million people. When Manchu resigned in the Qing dynasty and entered the Central Plains, for regime consolidation, their customs were influenced by the Han nationality, including some festivals, such as the Spring Festival, Dragon Boat Festival, and Mid-Autumn Festival. Besides, Manchu also brought various festival customs to the Central Plains. For example, Banjin Inenggi, the anniversary of the name creation of Manchu. Shangyuan Festival, also called Lantern Festival, on every 15th day of the first month of the lunar calendar, when Manchu people hang lanterns and eat tangyuan (a Chinese dessert, also called “yuanxiao”), has influenced the Han nationality a lot [1]. Tiancang Festival (also called Fillposition Insection) is on every 22nd day of the first month of the lunar calendar. In this festival, rural people in Manchu make glutinous sorghum rice and put it in a granary and use the trunk of kaoliang stalk to make a horse-like knitting and stick it into the basin full of rice, which means the horse can bring rice home to give a good harvest. Dragon Heads-raising Day is on every second day of the second month of the lunar calendar. On the morning of that day, Manchu people strew stove ashes on the courtyard in the shape of dragon, which means to attract the dragon. What’s more, they perform a ceremony to wish a good weather for the crops. Chongwang Festival is on every 6th day of the sixth month of the lunar calendar when the plague of insects happens easily. The Zhongyuan Festival, also known as Ghost Festival for salvation, is on the 15th day of the seventh month of the lunar calendar. Such festivals still remain to this day and have become distinctive ethnic cultures. Design elements originated from these traditional festivals and transferred into visual language exactly provide transmission carriers for innovation, which meets the current development requirements. Traditional festival is a representation of traditional culture. China is a multiethnic country with multiple distinct ethnic cultures [3]. The mutual influence and blending between ethnic cultures enrich the Chinese culture and enhance its vitality and creativity and improve the cultural identity and inclination of the Chinese nation. Based on the local characteristics, use Manchu traditional festival culture for interpreting the innovation of traditional cultures and festival culture with minority to analyze the traditional culture essence for better innovated transmission of traditional culture.

2 The Inheritance Meaning and Development of Manchu Festival Culture Manchu festival culture is not only a cultural representation of Manchu development but also an important way for culture inheritance [4]. Enriched festival cultures have been passed down over the past 5000 years with various methods including writing, verbal form, visual symbols, and behaviors and have become a profound

Application of Big Data in the Creative Design …

329

characteristic of Chinese Cultures, essential life style, and valuable culture heritage. In addition, to meet the current society requirements, new methods are developed with advanced technologies for the inheritance.

2.1 The Inheritance Meaning of Manchu Festival Culture Manchu, the final ruling nationality in Chinese feudal society, has profound meaning on Chinese traditional culture. Also, the inheritance of Manchu festival culture contributes a lot to the development of the nationality, culture, and society. During the modern time, some traditions of Manchu festivals still exist in China, especially in the northern areas of China, including the festival name, date, necessities, and customs. If the innovated ways are developed for Manchu festival culture inheritance, useful data will be collected, and innovation experience will be gathered for the development of Chinese traditional cultures.

2.2 Development of Manchu Festival Culture Traditional festival culture is an effective carrier for the inheritance of traditional ethnic culture. Minority festival cultures with unique ethnic characters have more national traits and diversity [5]. Since ancient time, Chinese traditional festivals make a difference to Chinese traditional festivals, including the Spring Festival, Qingming Festival, Mid-Autumn Festival, and Double Ninth Festival, run a long course from a remote source. Today, the fusion of festival features of Manchu and the Han nationality is made in terms of these festivals, which makes the festivals full of ethnic connotations. Additionally, typical festivals in Manchu, such as Banjin Inenggi, Shangyuan Festival, and Zhongyuan Festival also have their inheritance meaning for Manchu. However, with the deeper assimilation of minorities and the Han nationality, some Manchu traditional festival cultures are on the wane and less and less attention is paid on them by people, while some Western festivals become more and more popular with Chinese people. One of the reasons is the branding design for festival culture promotion. Branding the festival culture through brand symbols originated from festival culture and made into what modern people like to cater for the modern people. Compare with the Western festival, branding design of Chinese festivals seems old-fashioned and out-of-date and doesn’t meet the interests of modern people, and therefore, people gradually get away from the traditional festivals. Challenges that Manchu festival culture faces are more arduous. The wane of Manchu words remains the barrier to the inheritance of Manchu culture. Therefore, the inheritance of Manchu culture is a task which brooks no delay. Mining the meaning of festival culture and developing more innovated design of festival culture

330

T. Zhao

for young people are the key to the inheritance and revolution of Manchu traditional festival culture.

3 The Meaning of Visual Symbols Innovation for Manchu Festival Culture Traditional festival is a most important element for linking modern life with traditional culture. The change of Chinese traditional festivals over the past thousands of years, visual image is used as the significant carrier. So does Manchu festival culture. With the development of modern life, unique minority features need to be demonstrated on visual symbols. For example, use special images for various festival necessities to show the joyous atmosphere. Introducing traditional festival culture into modern life to make the traditional festival more dynamic with modern style is not only an inherent requirement of modern culture development but also an important way to nationalize and modernize the Chinese design. Starting with the visual design of traditional festivals, creating more visual festival images that modern people prefer can lead the fashion trend and make a breakthrough on the design to show China’s multi-ethnic features and at the same time, open up a new road for visual design. With a huge population, Manchu has its own words, language and life style which however are assimilated by the Han nationality after a long-term fusion. Some special visual symbols that Manchu owns have disappeared. The redesign of festival culture visual symbols can help the research on the disappeared traditional cultures and culture innovation.

4 The Essence of Manchu Festival Visual Symbol Innovation in the Context of Big Data Festival visual elements are many and varied and have permeated throughout the people’s daily life. Therefore, they can enhance the entertainment in festivals. With time going by, some visual elements have been developed into special visual symbols with profound meaning for the inheritance of ethnic traditional culture. Traditional culture uses festival visual design as the carrier to permeate people’s life. Traditional festival visual design is the external performance of traditional festival culture. It utilizes design methods to express the themes and customs in a traditional festival comprehensively. Everything related to the festival can serve as the design content. Different from common applied visual design, traditional festival visual design is a generalized design system with multiple design measures, in which traditional images and ceremony elements are used as the basic elements and innovated continuously to cater for the new festival culture and fashion. Therefore, it has

Application of Big Data in the Creative Design …

331

a border range. Traditional festivals reflect Chinese values, thing modes, moral principles, behavior standards, aesthetic taste, and traditional ethos such as continuous self-renewal, loving life, and being kind to nature, and represent people’s yearning for a better life. This is an essential theme for designing the traditional festival visual images. Manchu festival culture, as one of the components of Chinese traditional culture, because of its limits, society changes, and Manchu culture loss, is on the wane in modern life after thousands-of-year changes and gradually loses the festival atmosphere and customs. Festival culture is vulgarized and simplified without culture foundation. Through the development of the innovation system for Manchu festival visual images, modern design languages are used to revive the traditional customs, culture fun, enrich the festival culture, and promote positive energy in modern society. The visual design of Manchu festival culture is a direct expression of culture innovation. Innovation ideas and multi-dimension development of visual design become effective ways to promote traditional cultures.

4.1 The Development of Brand Image Design System for Innovated Manchu Festival Visual Symbols Based on the requirements for modern life, modern design techniques are used to systematically develop the Manchu festival visual symbols and form a brand system to improve the spread of festival cultures [6]. To pass down traditional culture, firstly, we should have a comprehensive understanding on traditional culture. Absorb the quintessence and discard the dross. The innovated Manchu visual design cannot be developed without surveys and research on Manchu culture. Visual symbols must be designed based on the actual ethnic status so that they can mirror ethnic ethos and values. Visual language is dependent upon festival behaviors and contents, and therefore, the understanding of festivals is an important part of visual symbol design. For example, Manchu people view crows as the holy bird and they have many daily supplies based on the crow image, especially the ethnic patterns [5]. Manchu Eight Banners have their own characteristics and will be gathered in festivals with different colors, which means a lot. Manchu festivals are filled with joyousness. Folk activities such as the shrine or image of God, decoration with lanterns and streamers, and visiting to relatives and friends are all represents the best wish for life. Additionally, these activities gradually become the Manchu customs after cycling year by year. Comprehensively understand the culture background so that the design can better meet the essence of the nation and be more feasible. Manchu festival has outstanding ethic features and is suitable for visual image design. If the visual design can be developed into a brand, the market value of festival culture will be enhanced and the inheritance of culture can be pushed from

332

T. Zhao

the perspective of culture, economy and society. This the core opinion upon innovated design.

4.2 Develop Brand Derivatives in the Context of Big Data When developing the visual design system for Manchu festival culture, designers firstly analyse the visual symbols of Manchu festival culture and then redesign them so that the symbols can be used as a spiritual support, communications and feeling exchanges. The social progress has brought a lot of advanced techniques in many areas, especially in the material and product manufacturing areas, and convenience for innovation design [7]. Based on the modern society development and people’s requirements, analyzing the meaning of traditional festival culture, developing Manchu festival culture visual image system, expanding range of derivatives and putting them into the market can make more modern people know about traditional cultures in visual, audio, and feeling forms and push them to protect traditional culture. A brand called Feel Joy is a great example. There is a culture communication company in Shangxi Province called Feel Joy which creates innovated products. They apply Shangxi traditional patterns in daily goods to interpret traditional elements into new visual images. New images actually impress people much more and are easily received by modern people. Therefore, the inheritance of traditional cultures needs more carriers in multiple dimensions so that people can be benefited. The visual image design of modern society-based derivatives should be developed from a plane form to the stereoscopic form to build a multi-dimension innovation mode [8].

4.3 The Use of Large Data Analysis for Media Promotion of Visual Image and the Brand Product With the Internet era coming [9], people’s life style has been changed completely. Life is filled with intelligence and information. More and more people use electronic media instead of paper media, which is an essential point for us to design the traditional culture transmission. Manchu festival culture has its own nationality features and various potentials to be mined. Modern techniques used for data input in the visual design system development can help us know about how well people know and recognize Manchu culture and festival culture so that we can design better. At the same time, new media such as the Internet and interactive media have provided a larger stage for visual design promotion. Using new media to output the design is also an essential part of innovated Manchu festival culture visual design [10].

Application of Big Data in the Creative Design …

333

4.4 Deepen the Horizontal and Vertical Development of National Visual Symbols and Promote New Ways of Cultural Innovation The research on innovated Manchu festival culture visual design will bring resources for Chinese culture innovation so that traditional ethic visual symbols can be further developed in a space–time approach. This can be applied to the other 55 nationalities on traditional culture visual symbol development and visual symbol development history in China. Besides, all these research can enhance the development of culture innovation. As traditional cultural ideology, life interest, outstanding content, such as spiritual belief development of intelligent system for cultural innovation design. Development of intelligent system for cultural innovation design [11]. Through the big data platform to effectively promote national visual symbols [12], ongoing cultural innovation design update.

References 1. Tong Y (2007) The relationship between manchuology. Man Zu Yan Jiu 1:47–52 2. Hang J (2005) Three friends in cold—the origin of the seminar on Chinese traditional graphics and modern visual design. Art Observ 5:29 3. Chen Y (2014) Chinese traditional auspicious patterns in Chinese. J Chongqing Univ 01:30 4. Kong Z (2006) Inheritance and innovation of traditional festival visual design. Human Soc Sci 07:108–109 (in Chinese) 5. Deng Y (2019) The application of Chinese traditional auspicious pattern in modern design. Pack Eng 40(20):223–225+235 6. Bao S, Miao L (2020) Traditional visual symbols in the application of city brand image design. Art Res 02:152–153 7. Zhao N, Sun W, Zhao Y, Jia X (2020) Research on the innovative design of Tianjin intangible cultural heritage derivatives. Pop Lit 20:75–76 8. Shu KY (2019) The role of artificial intelligence in the innovation of traditional culture. People’s Tribune 20:44–45 9. Santiago RR (2017) Brand opportunities and countermeasures under digital marketing. Int J Educ Econ 03(14) 10. Mohammad MF, Pantea F (2021) Corporate brand design: developing and managing brand identity. Taylor and Francis 11. Joana CM, Beatriz F, Carla M (2020) Brand logo and brand gender: examining the effects of natural logo designs and color on brand gender perceptions and affect. J Brand Manag 1–19 12. Jerome CK (2014) Brand design imperatives for emerging global markets by Jerome C. Kathman. Des Manag Rev 04(25):49–56

Construction on Standardization System of University Evaluation Mechanism Based on Data Analysis Technology Hongyan Liu

Abstract With the rapid development of technologies such as the Internet and cloud computing, the accumulation of data has become larger and larger, and data analysis techniques have emerged, and have gradually been used in many fields for knowledge discovery and searching for valuable information. Aiming at the current situation of universities generally adopting consequential evaluation and neglecting formative and diagnostic evaluation, this paper conducts research based on data analysis technology in the context of educational big data. Construct the data analysis process consisting of “data source, data processing, data modeling, result display”, etc., research data analysis tools such as automatic data modeling and data visualization, and construct the standardized system of university evaluation mechanism based on data analysis technology. The research results help to establish a new concept of talent quality, a new concept of teaching quality, and a new university quality culture. Keywords Big data · Data analysis technology · Automatic modeling · Standardization system

1 Introduction The “Overall Plan for Deepening the Reform of Education Evaluation in the New Era” points out that education evaluation is related to the direction of education development, improving the moral composition system and mechanism for fostering people, reversing the unscientific education evaluation orientation, improving the ability and level of education governance, and accelerating the modernization of education, and strengthening the educational country that satisfies the people. Education evaluation must be scientific and effective, improve result evaluation, strengthen process evaluation, explore value-added evaluation, improve comprehensive evaluation, make full use of information technology, and improve the scientific, professional, and objectivity of educational evaluation. Improve the evaluation of universities, guide H. Liu (B) Graduate College, Bohai University, Jinzhou, Liaoning, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_38

335

336

H. Liu

the scientific positioning of different types of universities, establish characteristics and levels, strengthen the position of talent training centers, highlight the characteristics, quality and contribution of disciplines, correct the one-sided evaluation of academic levels by academic titles, and explore the establishment of applicationoriented undergraduate evaluation standards. Emphasize the cultivation of corresponding professional abilities and practical application abilities. At present, the pace of reform of the evaluation mechanism in universities still lags behind the reform of higher education models in the new era. Results-based evaluation is generally adopted, formative and diagnostic evaluation is ignored, and there is a lack of in-depth analysis of teaching data. In the context of big data, rational use of data analysis techniques to explore the complex relationships behind teaching data, and build the standardized system of university evaluation mechanisms that meet the requirements of the current era will help improve the quality of talent training, establish a new concept of talent quality, new teaching quality and new university quality culture to realize the sustainable development of higher education.

2 Data Analysis Process Data analysis is the process of extracting useful information and forming conclusions, conducting detailed research and generalizing the data, using appropriate statistical analysis methods to analyze the large amount of data collected, maximizing the development of data functions, and playing the role of data. Through data analysis, the information hidden behind a large number of seemingly chaotic data is intensively extracted, and the inner law of the research object is summarized. In actual work, data analysis can help managers make judgments and decisions in order to adopt adaptive strategies and actions. The data analysis process is shown in Fig. 1 [1]. It can be seen from Fig. 1 that data analysis is carried out according to the process of “data source → data processing → data modeling → result display”. If the “result display” is not ideal, it can also be fed back to “data processing” or “data modeling” stage. Data sources include database systems, data warehouses, or other data. Data preparation is the most time-consuming task of data analysis, and data storage and data structuring must also be considered. Data processing is the process of standardizing data, including integration, cleaning, and filtering. Data modeling is the core work of data analysis, and valuable information is excavated through mathematical models. Result display provides users the results of data analysis to assist users in decision-making.

Construction on Standardization System of University …

Data source

Data processing

Database system

Preprocessing, aggregation, transformation and other data operations

Data warehouse

337

Data modeling

Results display

Model estimation

Behavior description, result description, prediction, importance estimation, visualization

Model validity

Other data

Fig. 1 Data analysis process

3 Data Analysis Tools Data analysis tools are divided into categories such as automatic data modeling, data visualization, and scenario analysis. This topic research mainly uses automatic modeling and data visualization.

3.1 Automatic Data Modeling Compared with traditional data modeling, automatic data modeling is mainly reflected in the replacement of manual operations by machine operations in the entire data modeling process, and the parameters and dimensions can be huge. The core of automatic data modeling is automatic machine learning. Automatic machine learning is used to describe the automatic method of model selection or hyper-parameter optimization. The automatic data modeling process is shown in Fig. 2. Automatic modeling initially focused on model selection in machine learning, and has now covered the entire process automation of data preprocessing, model selection, variable selection, model tuning and model evaluation, which has improved the efficiency of data analysis [2]. Data preprocessing

Model selection

Fig. 2 Automated data modeling process

Model parameter adjustment

Model evaluation

338

H. Liu

Tableau Prep

Tableau Desktop

Analyse

Visualizatio n

Clean

Data Restructure

Understand Share

Fig. 3 Data visualization of Tableau

3.2 Data Visualization Data visualization is the use of the human eye’s perception ability to interactively visualize data to enhance cognition. Generally include scientific visualization, information visualization and visual analysis. Tableau is the most commonly used data visualization tool, as shown in Fig. 3 [3]. Tableau is a visual data analysis platform that helps people view and understand data, quickly analyze, visualize and share information. The Tableau tool is easy to use. Drag and drop a large amount of data onto the digital “canvas” to easily create various charts, easily dig deeper into the data, and use summary and other quick table analysis functions to get the more macroscopic image.

4 Standardization System of University Evaluation Mechanism Based on Data Analysis Technology The standardization system of university evaluation mechanism is composed of “student evaluation, teacher evaluation, scientific research evaluation, teaching evaluation, financial evaluation, subject evaluation, curriculum evaluation, comprehensive evaluation”, etc. The preliminary standardized system is shown in Fig. 4. Based on data analysis technology, on the basis of analyzing various data of the school, the relevant indicators of the preliminarily constructed standardization system are adjusted, and the weight of each indicator is calculated to form the final standardization system. The final standardization system is not permanent and needs to be dynamically adjusted based on the results of data analysis. (1)

(2)

Student evaluation [4]. Student-centered education is the most core value of the educational ideology of universities. Student evaluation is at the core of educational evaluation. It is not only the key criterion for universities to evaluate outstanding students, but also an important evidence for enterprises to select outstanding talents. Teacher evaluation [5]. The implementation of the evaluation system for university teachers can promote the development of professional quality, give play to

Construction on Standardization System of University …

339

Standardization system of university evaluation mechanism based on analysis technology Student evaluation

Teacher evaluation

Comprehensive quality

Learning ability

Degree and title

Teaching ability

Physical health

Ideology and morality

Scientific research ability

Serving the society

Scientific research evaluation

Teaching evaluation

Scientific research funds

Research achievements

Teaching platform

Teachers' ability

Scientific research project

Scientific research talents

Teaching management

Teaching effectiveness

Financial evaluation

Subject evaluation

Budget revenue

Expenditure structure

Construction target

Fund investment

Financial risk

Financial supervision

Construction process

Construction results

Curriculum evaluation

Comprehensive evaluation

Teaching program

Teaching content

Infrastructure

Cultural environment

Teaching process

Teaching results

Management level

Development potential

Fig. 4 Standardization system of university evaluation mechanism based on analysis technology

(3)

(4)

(5)

(6)

the leading role of teachers, create the team of high-quality professional and innovative teachers, and improve teachers’ teaching ability, scientific research ability and social service ability. Scientific research evaluation [6]. Universities are important bases and backbones for scientific and technological innovation, and scientific research evaluation is an important process for judging the value of scientific and technological innovation work. Through scientific research evaluation, the continuous scientific research and innovation joint force is formed, and the enthusiasm of scientific research personnel is mobilized. Teaching evaluation [7]. Teaching evaluation has diagnostic, motivating and regulating functions. For the complexity of teaching situations, data must be sufficient; for the growth of teaching objects, data must be long-term; for the richness of teaching methods, data must be diverse. Financial evaluation [8]. The financial performance evaluation indicators of universities need to follow the new trend of the new era and make appropriate adjustments in the application and selection of specific indicators according to the background and resource allocation of different universities to maintain the flexibility and fairness of financial evaluation. Subject evaluation. Through the evaluation of the effectiveness and quality of subject construction, it provides objective subject level information, helps universities understand the current situation, advantages and disadvantages of

340

(7)

(8)

H. Liu

subjects, promotes subject construction, and improves the quality of graduate training and degree award. Curriculum evaluation [9]. Curriculum evaluation is an important part of higher education curriculum reform and construction. The purpose is to scientifically design curriculum evaluation content, improve teaching methods, enhance students’ curriculum experience, continuously improve and optimize courses, and improve teaching quality. Comprehensive evaluation. Comprehensive evaluation is the comprehensive evaluation, which can be evaluated on the basis of each sub-item evaluation, or can be independently designed for evaluation indicators. This topic independently designs indicators such as infrastructure, social environment, management level, and development potential.

5 Conclusion The ultimate goal of data processing and analysis is to assist people in making reasonable decisions in various applications with the help of data understanding. Years of campus information construction has accumulated a large amount of original data, which provides basic support for data analysis. The research results of this topic are conducive to reforming the evaluation of colleges and universities, and promoting the implementation of the fundamental task of moral composition and cultivating people; conducive to improving teacher evaluation and promoting the practice of teaching and educating people; conducive to improving student evaluation and promoting the overall development of virtue, intelligence, physical conditions, mind status and community service; conducive to improving employment evaluation and jointly creating the good environment for education development; conducive to improving financial evaluation and raising the performance level of education funding. Acknowledgements This work was financially supported by Humanities and social sciences research project of department of education of Liaoning province in 2020 (WJ2020004): Research on standardization system of university evaluation mechanism based on data analysis technology.

References 1. Cnblogs (2021) Methods and techniques to improve the performance of big data analysis. https:// www.cnblogs.com/csbdong/p/5719484.html, 2021–05–11 2. Personal Library (2020) Current situation and trend of data analysis technology tools. http:// www.360doc.com/content/20/0604/14/49586_916451370.shtml, 2020–06–04 3. Zhu WJ (2021) How to learn Tableau? https://www.zhihu.com/question/29478254/answer/745 600500, 2021–05–11 4. Yang XF (2011) Comprehensive quality evaluation student survey system. Sci Educ Article Collects 8(4):33–34

Construction on Standardization System of University …

341

5. Li HL, Zhuang M (2021) Analysis on the problems existing in teacher evaluation and their causes. Econ Res Guide 17(12):81–83 6. Zhang L, Constantino NHS, Li WY, Tang J (2019) Study on scientific research evaluation index system for university. J Liupanshui Normal Univ 31(6):40–44 7. Jin ZM (2021) Teaching evaluation is the key to improve the quality of higher education. Popular Trib 37(4):19–21 8. Wang W, Hou SJ, Xie W (2019) Construction of financial performance evaluation index system in universities. Bus Econ 38(9):193–194 9. Li J (2020) On the evaluation of university curriculum based on CIPP model. Academy 13(15):74–75

Smart Community Governance System and Governance Strategies in the Big Data Era Xueyuan Sun

Abstract Big data is another new technological revolution following the Internet, Web of Things and cloud computing. With the continuous development of mobile Internet and security technology, smart communities have become the new form of community governance in the new era. Smart community governance in the big data era has the characteristics of socialization, informatization, specialization, refinement, legalization, and intelligence, which enhance the sense of contentment and happiness of the residents. Based on big data and intelligent technology, this paper designs the system architecture composed of “infrastructure layer, resource provision layer, application support layer, business logic layer and presentation layer”; it is designed to be composed of multiple subsystems and functional modules, and the system functions of the smart community have put forward strategies and suggestions for smart community governance to improve the level of community governance in the big data era. Keywords Big data era · Smart community · Intelligent technology · Architecture design · Strategies and suggestions

1 Introduction As the end of national governance and social governance, the community is also the governance unit closest to the masses, playing the key role in connecting the past and the next. With the sinking of power and resources to the grassroots level, many social things have returned to the community, and community services and property management have become more complicated. The role of traditional community governance is restricted, the level of community services cannot be continuously improved, and community services cannot meet the needs of residents. Traditional community construction is relatively independent and difficult to blend with each other, which has a negative impact on the scientific management of the community, X. Sun (B) Liaoning Institute of Science and Engineering, Jinzhou, Liaoning, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_39

343

344

X. Sun

and is also a waste of information resources [1]. In recent years, in order to meet the needs of residents and improve the quality of life of residents, governments at all levels have focused on innovating community governance models, further improving service methods, enhancing governance capabilities, and promoting community informatization. Smart community is the new concept of community management and the innovative social governance model. Smart communities use technologies such as mobile Internet, cloud computing, Web of Things, and big data to enable residents to obtain administrative, health, entertainment, education, and family services [2]. Community governance based on big data starts with the issues that residents are most concerned about, the most direct, the most realistic, and the most urgent need to be resolved, to establish the safe, comfortable, healthy, harmonious and civilized living environment, and form more theoretical innovations and practical innovation and institutional innovation. Promote the socialization, informatization, specialization, refinement, legalization and intelligence of community governance, accurately grasp the needs of residents, directly solve the interests of the residents most concerned, and promote the people to live and work in peace, social stability, and long-term political stability.

2 Architecture Design of Smart Community Governance System in the Big Data Era Smart community is the new type of community management concept involving wisdom parks, artificial intelligence, community property, public housing management, etc., with the help of the Internet and the Web of Things, to provide community residents with safe, efficient and convenient intelligent services. In order to develop the community governance system in the big data era, the first step is to design the architecture. On this basis, each part will be constructed step by step, and finally the complete system will be formed. The result of the architecture design is shown in Fig. 1. The system architecture shown in Fig. 1 is supported by the security system and operating maintenance system. It adopts the layered architecture and closely cooperates with each layer. The components in each layer maintain cohesion, and each layer maintains the adjacent layer. Loosely coupled, establish contact through data and message transmission, and ultimately provide users with complete information system services. This layered architecture is conducive to the specialized division of labor when building the system and improves work efficiency.

Smart Community Governance System and Governance …

345

Fig. 1 Architecture of smart community governance system in the big data era

3 Function Design of Smart Community Governance System in the Big Data Era The smart community governance system in the big data era takes big data as the management core, computer as the means, non-contact smart card as the information carrier, and the network as the link. Through the combination of powerful software function modules and complete hardware supporting facilities, Users can use all management subsystems unimpeded, while enjoying various services and security guarantees. The system function is shown as in Fig. 2. The construction of the smart community is mainly to deepen intelligent technologies such as face recognition, video structuring, big data and artificial intelligence into the application of community scenes, and through video surveillance, face recognition, visual intercom, access control, vehicle recognition, and fire perception,

346

X. Sun

Fig. 2 Function of smart community governance system in the big data era

perimeter alarm, electronic patrol and home alarm functions to form the front-end IoT perception data resource pool of the entire community. And through the big data community operation platform, these data are processed and manually analyzed to realize real-time detection and control of people, vehicles, objects and equipment in the community, innovate the management model of the community and enhance the property service capabilities [3]. For the system function shown in Fig. 2, it is composed of 10 subsystems, and each subsystem includes 5 functions. Different users are assigned different functions through authority management. Among them, the community security management subsystem can best reflect the core functions of the “smart” community. Through monitoring and management of the community, the role of security personnel can be used to deal with emergencies in a timely manner, improve the reliability and accuracy of security management,

Smart Community Governance System and Governance …

347

and improve the community emergency response capability. With the development of network technology and information technology, the smart community security monitoring system is gradually developing in the direction of digitization and integration, bringing a greater sense of security to residents, and protecting residents’ lives and property safety [4].

4 Strategies and Suggestions of Smart Community Governance in the Big Data Era Big data technology can collect huge and complex data through the network, and obtain valuable information through integration, analysis and extraction. Big data has absolute advantages in community governance. The application of big data technology can accurately process community residents’ information. Residents can use big data to learn and cooperate with the development of smart communities. Big data can help residents quickly communicate and interact with property, neighborhood committees and other organizations. Restricted by geographic location, economic development, technological level, and human resources, the construction of smart communities in many cities is extremely slow, with low popularity, technology at an early stage, and fewer professional service personnel. Residents are not much more interested in smart communities and the sense of participation is not strong [5]. Therefore, make full use of big data technology and give full play to the advantages of smart community governance, and put forward the following strategies and suggestions: (1)

Accelerate the promotion and application of new technologies. Focusing on the characteristics of networking, informatization, automation, and intelligence of smart communities, and facing the basic goals of information sharing and exchange among participants in smart communities, the construction of smart communities in the big data era mainly involves the following technologies: first, the big data technology, mainly refers to the use of computer software and network technology to capture, manage and process massive amounts of data related to the processing object [6], including big data collection, big data preprocessing, big data storage, and big data analysis, which together form the core technology of big data in the cycle. Second, the intelligent technology of equipment. In the development of science and technology, equipment is in the direction of intelligent development, and the comprehensive processing of people and things has been improved, which promotes the development of community equipment to intelligent community [7]. Third, the RFID technology, is mainly used for community services such as community access control, community medical care, community service payment, dining and shopping, and community activities to ensure that the services of smart communities are “smart and convenient.” Fourth, the Web of Things technology, it can integrate the smart home system in the home, the Web of Things system and

348

(2)

(3)

X. Sun

services in the community, and enable community managers, users, and various intelligent systems to form various forms of information interaction. Manage more conveniently and quickly, and bring users a more comfortable “digital” life experience. Give full play to the governance role of big data. Big data has changed the way of community governance, making decisions based on big data, and avoiding blindness. Big data technology introduces community governance, fully integrates population data, actual data, comprehensive governance data and work data, etc., fully displays on the big data platform, and analyzes the management status to provide necessary conditions for the realization of the scientific governance of the community, to stimulate the vitality of community governance. Managers should regard big data application as the major strategic project, attach importance to top-level design, and reduce work execution difficulties caused by conflict of ideas; strengthen constraints and supervision on the collection, transmission, storage, opening, and utilization of data resources, and open data guarantee and accountability mechanism of data leakage, the processing and punishment methods of data leakage, etc., make clear legal regulations and judicial interpretations to ensure the safety of information use [8]; accelerate the development, release and implementation of standards such as cloud computing data security requirements, and the norms are based on data storage, transmission and application of cloud computing technology-related services and platforms, and innovative data collection methods, provide the scientific basis for community management and decision-making. Strengthen the construction of talent team. The construction of smart communities in the big data era has high requirements for management and technical talents. The development of smart communities in China started late, big data technology has not yet been deeply recognized, high-skilled and compound talents are lacking, and the level of professionalization of community staff is low, which cannot meet the needs of smart community construction and development. The specific path includes three aspects [9]: first, strengthen the training and introduction of high-skilled talents, colleges and universities joint enterprises to create smart talent cultivation bases, and localities speed up the formulation of talent introduction measures to increase the attractiveness of talents. Second, strengthen the training of compound management talents, we must not only focus on professional management capabilities, but also reserve relevant information technology knowledge. Third, strengthen the professional training of community workers, speed up the construction of management and service capacity assessment mechanisms, and speed up the construction of management and service capacity assessment mechanisms to guide them to use more effective theories and skills to serve community residents.

Smart Community Governance System and Governance …

349

5 Conclusion Relying on cloud computing and big data technology to build the smart community can make community management more scientific and effective, make services more convenient and intelligent, break through the communication barriers of traditional information systems, and allow community data and government departments to effectively integrate data. Through smart governance, the efficient linkage mechanism can be established between the community, the government and the society. Through in-depth analysis and exploration of community big data, timely detection, early warning and collaborative handling of various issues in urban management can be achieved. The research results of this paper aim to provide practical implementation methods for the construction of smart communities, improve the level of community governance in the big data era, enhance the sense of contentment and happiness of residents, better promote social equity and justice, and allow residents to share reform and development results.

References 1. Yang J (2020) Research on the construction of smart community in big data environment. Think Tank Era 4(11):10–11 2. Hou LM (2021) Construction and optimization of urban smart community governance system in the era of big data. China Sci Technol Inf 33(7):105–106 3. Xiao YQ (2020) Functions and troubleshooting of smart community security monitoring system. Urban Dev 39(21):61–63 4. Zhang Q (2020) Design and implementation of smart community security monitoring system. Housing Real Estate 26(32):164+166 5. Liu X, Feng YN, Zhang H et al (2021) Research on the development path of smart community in the big data era. Mod Bus 16(8):111–113 6. Han TQ (2021) Innovative application of big data technology in public management. Manag Technol SME 30(5):70–71 7. Zhuanlan (2020) What aspects does the smart community construction technology include? https://zhuanlan.zhihu.com/p/126491679, 2020–04–07 8. Chen J (2017) Research on the innovation mode of urban community management under the environment of big data. Master’s thesis of Guangdong Ocean University 9. Shi DD, Zhu XF, Wang XY (2020) Analysis of talent team construction in smart community under the background of big data. Bus Econ 39(10):102–103

Application of QR Code Recognition Technology in Modern Power Logistics Management Jibin Zhu, Yunxin Chang, and Chaofeng Zhu

Abstract Modern power logistics management highly depends on the collection, analysis, processing and real-time update of a large number of data and information. One of the decisive factors for the rapid development of a series of information technology is the continuous development demand of modern power logistics enterprises, including graphic identification technology. This paper introduces the basic principle of image recognition technology, explains the whole process of bar code recognition, and mainly studies the application of the graphic identification technology in modern power logistics enterprises, especially in each link. This paper analyzes the application of the technology in modern power logistics enterprises, and points out that the bar code automatic identification technology can solve the problems existing in procurement management, production management, sales management and warehouse management. Through the application of information technology such as twodimensional code, we can improve the efficiency of management, enhance economic benefits, and better provide technical support for the power sector and enterprises to achieve management objectives. Keywords QR code · Recognition technology · Power logistics management · Histogram equalization algorithm

1 Introduction In recent years, the development speed of e-commerce is faster and faster, and the development of e-commerce has brought a huge impact on the traditional shopping mode. Jingdong, Taobao, vip.com and other well-known commercial platforms have tens of thousands of orders for data processing every day. With the increase of the number of enterprises and the business volume of stores, the service rapidity is gradually concerned [1]. Because QR code has information storage function and is easy to use, it has been widely used in order information storage business [2]. In J. Zhu (B) · Y. Chang · C. Zhu Pinggao Group Co., Ltd., Pingdingshan 467001, Henan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_40

351

352

J. Zhu et al.

the order flow process of modern power logistics, employees can scan the QR code of each link to mark the order process, analyze the order link, analyze the data and formulate the actual operation strategy [3–5]. As the most basic and key technology of modern information recognition technology, QR code and its recognition technology will play a very important role in today’s rapid development of information society. Breaking through the core technology of QR code will be the key research content of technical personnel, and ultimately realize the wide application of QR code in various fields, which will promote the development of information automatic identification technology [6–10].

2 Basic Principle and Process of QR Code Recognition Technology 2.1 Basic Coding Method The QR code is mainly composed of three positioning pattern positioning graphics two-dimensional code. The location pattern is composed of three concentric square overlapping clusters and three color patterns. The size of the array is 7 × 7, 5 × 5, 3 × 3. From any angle, the width ratio of each module in the positioning mode is 1:1:3:1:1. This ratio is based on the optimization principle to generate a graphics library with similar probability in other regions, so as to realize fast positioning and two-dimensional code recognition. Each QR code positioning mode has a white separator, which is used to separate the encoding mode and positioning mode. The size of the separator is 1. In addition to positioning graphics, QR code, time positioning graphics and calibration graphics, time positioning graphics can be divided into two types: horizontal direction and vertical direction. The width of these two kinds of graphics starts from 1. The blackand-white bar code is black at the beginning and end of the module. The horizontal time position map passes through the sixth line of the QR code and is located between the two positioning patterns on the top of the separator. The vertical position map is located between the two position pattern separators through the sixth line of the QR code. The version of the two-dimensional code can be determined by the label density of the time positioning graph, and the time positioning model can also provide accurate positioning of the module coordinates. The calibration map of QR code includes a black 5 × 5 module, a white 3 × 3 module and the center distribution and quantity of the calibration map. Different versions of two-dimensional code are different. The higher the version is, the more the number of the calibration map is. The basic figure of QR code is shown in Fig. 1.

Application of QR Code Recognition Technology …

353

Fig. 1 The basic figure of QR code

2.2 QR Code Coding Process First of all, we need to analyze the coding data of QR code. Coding data analysis can determine the type of coding character according to the analysis of input data stream, and support QR code expansion channel. Compared with the default character set, the encoding data of QR code is different. In addition to the QR code encoding model, there are many types. To ensure the correctness of encoding mode selection can lay the foundation for the transformation of character subset into symbol character, and the switching mode between data can improve the speed of conversion into binary string. If customers are not limited to the QR code version, they only need to select the data coding requirements that meet the QR code version. The QR code also needs to be modified. In the process of data error correction coding, the algorithm needs to first design the corresponding pattern representation into a new pattern, and finally add a terminator in each data sequence, so that the data can be converted into characters according to the corresponding bit stream. Then an 8-bit word is used to divide the converted bit stream into corresponding characters. Finally, the QR code filled with characters is added to the corresponding QR code version.

3 QR Code Contrast Image Enhancement and Adjustment Processing Compared with digital image processing, enhancement is a process of image enhancement. In essence, it is to adjust the light intensity of the input image so that the output subjective image can be displayed more clearly. The main purpose of image contrast

354

J. Zhu et al.

enhancement is to let the observer perceive more information and provide clearer input image for image processing algorithm. Simplified histogram equalization is one of the most commonly used techniques for contrast enhancement. The algorithm is simple and easy to implement, so it has been widely used. Histogram equalization algorithm is mainly to calculate the map through the histogram. In a certain range of light intensity, stretch and display the light intensity square in the horizontal and vertical directions, so as to enhance the image contrast after mapping. The principle of this method is as follows. We will record the discrete gray image as x, use n1 to represent the number of occurrences of gray values in x images, and record the gray value as i, then the probability of gray i appearing in grayscale x is as follows. P(x(i)) = p(x = i) −

ni ,0 ≤ i ≤ L n

(1)

The L in the above formula represents the total number of gray values contained in x. The total number is generally 256, and n is the total number of pixels. P(x(i)) represents the value obtained from histogram to [0,1]. According to Px, the following cumulative distribution functions can be pushed down. cd f x (i) =

i 

px ( j)

(2)

j=0

The contrast enhancement algorithm is simulated by MATLAB software, and the adaptive histogram equalization algorithm is realized in the simulation process. The results of contrast enhancement algorithm is shown in Fig. 2. The test only focuses on the calculation of a two-dimensional code. It can be seen that the dim figure on the left in Fig. 2 is the most original figure. The QR code is the QR code on the right after using the computer to improve the brightness effect in the

Fig. 2 The contrast enhancement algorithm results

Application of QR Code Recognition Technology …

355

Fig. 3 The QR code test

middle. After applying the adaptive histogram equalization algorithm to calculate the structure, the comparison results are obvious. As can be seen from Fig. 3, the operation result of adjusting the QR code image causes some pattern areas to be too bright and other areas to be too dark. After adaptive histogram equalization, the QR code image is clear and the decoding efficiency is high.

4 QR Code Recognition Technology Commonly Used in Warehousing Management of Modern Power Logistics Enterprises 4.1 System Function Scanning and production of QR code are as follows. When the materials and equipment are transferred into the warehouse, the operator inputs the name, type, number, production time, use status and other information of the materials to be stored into the PC, makes a QR code through the PC management software, prints it through the bar code printer, and then pastes it on the surface of the materials to be stored. The QR code of equipment and materials scanned out of warehouse is as follows. When the materials need to be out of the warehouse and registered, the PC will collect the data and send the out of warehouse order to the PDA. The two-dimensional laser scanning gun (PDA) will scan the barcode on the equipment materials, and then return the data to the PC. after receiving the information, the computer will send it to the database through the LAN to update the inventory and complete the out of warehouse. The transfer management is as follows. The warehouse manages the goods according to the location, and the system provides the function of warehouse moving management, which can realize the mutual movement between the locations, so as

356

J. Zhu et al.

to achieve the accuracy of the goods between the locations, and provide convenience for the storekeeper to deliver goods. The inventory situation is as follows. PDA is used to scan the two-dimensional bar code on the materials and products stored in the inventory one by one. When the scanning is completed, the inventory module can automatically make statistics on the equipment and materials in inventory, and display all the specific information of the equipment and materials in inventory, which is completely machine-readable and automatic processing. At the same time, it can also query the situation of equipment and materials in and out of the warehouse, collect, sort out and analyze the current inventory situation, optimize the inventory structure, and put forward reasonable inventory suggestions.

4.2 System Hardware Configuration The hardware environment of the system mainly includes two parts: the query system on the embedded information collector and the management system based on LAN. The two parts are closely connected and interact with each other through wireless communication. The main hardware includes PDA with scanning and storage function, data server, computer, LAN and barcode printer.

4.3 System Software Design The software part of the system is mainly divided into three parts: PC management software design, PDA software design and network transmission. When it works, the PC will send the warehouse out or warehouse in order to PDA. After the PDA scans the QR code of the corresponding equipment, the data will be returned to the PC, the data is correct, the warehouse out or warehouse in is confirmed, the data is wrong, and the alarm is given. The main functions of PC management software are basic setting, equipment management, query report, data security and system setting. The basic settings include department settings, user management, equipment type and warehouse settings. Equipment management includes equipment dictionary, equipment storage, equipment storage and equipment transfer. Query report includes the functions of stock in query, stock out query, stock transfer query and inventory query. Data security includes post authority, log management, data backup and data recovery. System settings include bar code parameters, hardware parameters, personality settings and password modification. The operation program of the hand-held bar code input terminal is compiled according to the actual needs, and the convenience, flexibility and universality of the operation process must be fully considered. The handheld barcode input terminal has the functions of data transmission, data query and system management.

Application of QR Code Recognition Technology …

357

5 Conclusions Modern logistics highly depends on the collection, analysis, processing and realtime update of a large number of data and information. In a sense, the competition of modern logistics has become the competition of logistics information. However, defects and errors in the quality of logistics information may have potential risks to the overall logistics supply chain. Therefore, the quality and timeliness of logistics information is the key factor of logistics operation, and automatic identification technology can effectively solve these problems. Automatic identification technology includes bar code technology, magnetic stripe (card) technology, optical character recognition, system integration, radio frequency technology, voice recognition, visual recognition and other high-tech disciplines integrating computer, optical, electromechanical and communication technology. The rise of automatic identification technology provides an effective means of data acquisition and input quickly and accurately, and solves the problems caused by the slow speed and high error rate of computer data input. Bar code identification technology is one of the most widely used automatic identification technologies in modern logistics system.

References 1. Eunji P (2013) A study on the application of QR code through case study—focused on logistics and distribution sector. J Korea Port Econ Assoc 29(4):247–264 2. Dutta K, Bhattacharjee D, Nasipuri M et al (2021) Complement component face space for 3D face recognition from range images. Appl Intel 51(10):1–18 3. Sadhya D, Singh SK (2019) A comprehensive survey of unimodal facial databases in 2D and 3D domains. Neurocomputing 358(17):188–210 4. Al-Salihi SK, Aydin S, Ghaeb NH (2021) SWFT: subbands wavelet for local features transform descriptor for corneal diseases diagnosis. Turk J Electr Eng Comput Sci 29(2):875–896 5. Kornilov K, Soldatova S, Povetkin P (2021) Study of local features of antihypertensive drugs pharmacoepidemiology as a means of hypotensive therapy optimization ways searching. Therapy 2:29–38 6. Altameemi A, Abbas HH (2019) Biological landmark versus quasi-landmarks for 3D face recognition and gender classification. Int J Electr Comput Eng 9(5):295–311 7. Nassih B, Amine A, Ngadi M et al (2021) An efficient three-dimensional face recognition system based random forest and geodesic curves. Comput Geom 132(11):226–234 8. Skrzypecki J, Patel MS, Suh LH (2019) Performance of the Barrett toric calculator with and without measurements of posterior corneal curvature. Eye 33(11):73–88 9. Vivian NI, Ise OA (2020) Face recognition service model for student identity verification using deep neural network and support vector machine (SVM). Int J Sci Res Comput Sci Eng Inf Technol 6(4):11–20 10. Jothi JN, Letitia S (2020) Tampering detection using hybrid local and global features in wavelettransformed space with digital images. Soft Comput 24(7):5427–5443

The Innovation of Visual Communication Design Based on Computer Aided Technology Xiaobo Xue

Abstract As one of the computer technologies, Computer-aided technology has been used in all aspects of modern society. The development of computer technology has largely changed the habits and ways of thinking of human production and life. The birth of the Internet has directly and strongly promoted the emergence of new communication methods and media based on the Internet. With the emergence of new technologies, visual communication technology is no longer confined to traditional television and film advertising communication technology, but more diversified. Therefore, this article mainly studies how computer-aided technology affects visual communication design innovation and its effects. This article mainly uses research methods such as survey analysis, qualitative analysis, and quantitative analysis to conduct experiments. First, the current status of domestic visual communication technology is studied, and secondly, the effect of computer-aided technology on visual communication design is analyzed. The analysis results show that among the 200 students majoring in visual communication design, nearly half believe that the current way of communication in the field of visual communication is still traditional TV advertising. A total of 166 students believe that the emergence of computer-assisted technology helps to a certain extent in the development of visual communication technology. Among these 166 students, nearly half believe that the development of computer-aided technology has made visual communication more artistic, and a quarter of the students believe that computer-assisted technology can enrich the design style of VCD (Visual Communication Design). Keywords Computer assisted technology · Visual communication design · Computer technology · Visual art

X. Xue (B) Fashion Design School, Shanghai Institute of Visual Art, Shanghai, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_41

359

360

X. Xue

1 Introduction With the progress of science and technology and the rapid development of the times, computer-aided technology has been widely used in many fields of modern society. At the same time, the update of computer-aided technology has also greatly promoted the innovation of VCD, making this technology develop in the direction of multimedia design and interactive design. At present, developed countries in Europe already have a complete set of visual communication design methods, while our country’s visual communication design started late and its development is not yet perfect [1]. Therefore, the innovation of visual communication design based on computer-aided technology is a subject worthy of further research. In the related research on visual communication of computer-aided technology, at present, many scholars have conducted various discussions on it. For example, Feng Y believes that with the advent of the knowledge economy era, we must learn to continuously improve our competitiveness through independent innovation [2]. Ramos V. C. proposed that assistive technology and communication technology (ICT) are two important technologies used by computers to retrieve, transmit and manipulate data. ICT is an umbrella concept that mainly includes radio, television, cellular phones, computers and network hardware. ICT is often used in education, healthcare, libraries, security and other fields [3]. Jaenichen C. proposed a design method for visual communication symbols and graphics. This method defines graphic design symbols as four dimensions of speech use, language use, context and semantics [4]. The research content of this article mainly includes: First, investigate the current status of current visual communication technology, and list several specific visual communication technologies; secondly, it analyzes the effect of computer-aided technology on VCD, and respectively enumerates the proportion of visual communication majors who think that computer-aided technology contributes to the development of visual communication technology; finally points out the effect of computer-aided technology.

2 Method 2.1 Computer-Aided Technology Computer-aided technology is a technology that uses computers as tools to assist users in completing specific tasks in specific application areas. It combines a variety of drawing tools, technologies and software, which can effectively improve efficiency and accuracy [5, 6]. In our country, computer-aided technology was initially used in the aviation and military industries. In recent years, this technology has gradually been applied to the electronics, construction, machinery, medical, petrochemical and other industries [7].

The Innovation of Visual Communication Design Based …

361

2.2 Visual Communication and Its Development For a long time, visual communication design has mainly or partly relied on our vision. The medium and audience are the basis of visual communication. In the past, the works of visual communication design were finally presented to people in the image of two-dimensional space. The main forms of communication are printed matter, paintings, etc. [8]. When creating design works such as prints, designers will give full play to their professional advantages and use creative techniques that combine virtual and real to create a spatial structure as much as possible. Today’s designers have already broken the tradition and started new challenges. In the end, the work they designed is a real three-dimensional space, not just a two-dimensional image. On the one hand, the emergence of new technologies has made many design effects that were previously impossible to achieve possible, and has challenged human imagination time and time again [9]. On the other hand, the application of computer-aided technology to visual communication brings viewers an unprecedented sensory experience.

2.3 Innovation in Visual Communication Technology Visual communication design is gradually surpassing the original industry category, and gradually involves more and more industries. At present, the main fields it involves are electronics, construction, medical, petrochemical and other industries. First of all, visual communication technology has experienced a development from static to dynamic. Compared with traditional static images, dynamic images present us with a larger amount of information, which can well stimulate the imagination of the audience. This innovation is reflected in the visual communication design gradually getting rid of the limitations of paper media. Designers began to use computer technology to add more dynamic elements to their works [10, 11]. Secondly, visual communication technology has experienced a process from plane to three-dimensional.

2.4 Application of Computer Aided Technology in VCD The innovation of VCD (visual communication design) is inseparable from the development of computer-aided technology. First of all, computer-aided technology promotes the transition of VCD to multimedia media. In the traditional visual transmission design, vision is the main transmission medium. These traditional media include advertisements, newspapers, data, movies and TV series that people see in daily life. The shortcomings of these media are poor visual transmission and lack of sense of space [12]. However, the application of computer-aided technology can

362

X. Xue

overcome these shortcomings, and visual communication design works using this technology can often give people a visual impact. Secondly, computer-aided technology promotes the transformation of VCD to multi-dimensional space. The emergence of computer-aided technology has opened up designers’ creative thinking and made them realize that their work should not be limited to two-dimensional space. Designers can add more timeliness and interactivity to their works on the basis of the original two-dimensional. Finally, computer-aided technology has greatly changed the content of VCD. The focus of traditional VCD is mainly on the material level, and the design concept only stays at a static, single level [13]. Computer-aided technology provides designers with diversified creative methods and creative languages, making their works gradually transition from static to dynamic.

3 Experiments 3.1 Experimental Background Computer-aided technology has largely changed the production and lifestyle of human beings. The update of computer technology has also greatly promoted the innovation of visual communication design. However, compared with other developed countries, our country’s visual communication design started late and its development is not perfect. Therefore, how to realize the visual communication design innovation of computer-aided technology is the focus of this article.

3.2 Experimental Method Convene 200 college student volunteers majoring in VCD at the University of City A to conduct a questionnaire survey. With the help of the questionnaire star software and the printed paper version. The advantage of the help paper version of the questionnaire survey is that after completing the questionnaire, you can have face-to-face communication with the respondents for in-depth understanding; the advantage of using the questionnaire star survey is that it saves time and is convenient and quick. The results of the questionnaire were analyzed with the help of questionnaire star software and SPSS software. The main statistical information includes: the current status of VCD (visual communication design), the effect of computer-aided technology on VCD (visual communication design), and several difficulties that may be encountered when computer-aided technology is applied to visual communication design. In the process of data analysis, the following formulas are mainly used: x=

−b ±

√ b2 − 4ac 2a

(1)

The Innovation of Visual Communication Design Based …

S2 =

363

(m − x1)2 + (m − x2)2 + · · · (m − xn)2 n

(2)

4 Discussion 4.1 Analysis of the Status Quo of Visual Communication Design The domestic visual communication design has undergone several major changes. I feel that the communication technology is not limited to the traditional television and film advertising communication technology, but gradually shifts to the direction of multimedia design and interactive design. So in the current field of visual communication, what proportion of multimedia design, interaction design, etc.? This article conducted a questionnaire survey on this issue and specifically analyzed the status quo of visual communication design. The specific results of the data survey are shown in Table 1. Table 1 The current state of visual communication design

Number of people

The proportion (%)

52

26

Interactive design

50

25

Advertising design

66

49

Multi-media design

Fig. 1 The current state of visual communication design

26% 49% 25% multi-media design TV advertising design Interactive Design

364

X. Xue

It can be seen from Fig. 1 that nearly half of the 200 related majors surveyed believe that the current communication method in the field of visual communication is television advertising, and 26% of students believe that multimedia design is the mainstay in the field of visual communication. Communication method, only 25% of students believe that the main communication method in the current visual communication field is interactive design communication. On the whole, the communication method in the field of domestic visual communication is mainly traditional TV advertising. The current development of visual communication technology in our country is not perfect, and there is still a certain gap between visual communication technology in developed countries.

4.2 Analysis of the Effect of Computer-Aided Technology on Visual Communication Design It can be seen from Table 2 and Fig. 2 that nearly half of the students majoring in visual communication believe that computer-aided technology is very conducive to the innovation of visual communication technology64 students believe that the emergence of computer-assisted technology makes visual communication technology no longer limited to traditional television and film advertising communication technology; in addition, 17% of students still think that computer-aided technology has no effect at all. They believe that computer-aided technology cannot promote the development of visual communication technology in the direction of multimedia design and interaction design. After the statistics of 166 students believe that computer-aided technology can promote the results of visual communication technology innovation, in order to more Table 2 The effect of computer-aided technology on visual communication design

Very effective Number Proportion (%)

Effective

102

64

34

51

32

17

number NUMBER

150 100 50

102

64

0 Very effective

Invalid

Effective EFFECT

34 invalid

Fig. 2 The effect of computer-aided technology on visual communication design

The Innovation of Visual Communication Design Based … Fig. 3 How computer technology promotes the innovation of visual communication technology

365

25% 50% 25%

Rich design methods Improve design style Enhance aesthetic effect specifically analyze the effect of computer-aided technology, we re-visited these 166 students via email. 160 students responded to the survey email. The main statistical content of the email is how they think computer-assisted technology promotes the innovation of visual communication technology. The statistical results are shown in Fig. 3. 50% of students believe that the development of computer-aided technology can make visual communication more artistic; 25% of students proposed that computer-aided technology makes visual communication design methods more diverse; the remaining 40 students believe that computer-aided technology makes visual communication design styles more diversified. In summary, computer-assisted technology has promoted the continuous innovation and development of visual communication technology in terms of design style and design methods.

5 Conclusions Since the development of mankind, computer-aided technology has been widely used in many fields of modern society. The update of computer technology is inseparable from the continuous innovation of visual communication technology. The visual communication technology is not limited to the traditional television and movie advertising communication technology, but is developing in the direction of multimedia design and interactive design. However, our country’s visual communication design started late and its development is not perfect. Therefore, the innovation of visual communication based on computer-aided technology in this article is of great practical significance. It is pointed out that computer-aided technology can promote the transformation of visual communication technology to multimedia design and interactive design.

366

X. Xue

References 1. Haotian W et al (2020) Correction to: Innovation and improvement of visual communication design of mobile app based on social network interaction interface design. Multim Tools Appl 79(1):17–18 2. Feng Y (2016) Research on computer-aided product innovation design based on TRIZ. J Comput Theor Nanosci 13(12):9876–9881 3. Ramos VC, Escrig EM, Miralles FF et al (2016) The effect of information and communication technologies on creativity in collaborative design. Res Eng Des 28(1):1–17 4. Jaenichen C (2017) Visual communication and cognition in everyday decision-making. IEEE Comput Graph Appl 37(6):10–18 5. Wu H, Li G (2020) Visual communication design elements of internet of things based on cloud computing applied in graffiti art schema. Soft Comput 24(11):8077–8086 6. Xu L et al (2019) Computer aided design technology for convex faceted gem cuts based on the half-edge data structure. J Beijing Inst Technol 28(101, 03):207–219 7. Chege SM, Wang D (2019) The influence of technology innovation on SME performance through environmental sustainability practices in Kenya. Technol Soc 60:101210 8. Kaabouch NG et al (2016) A survey on image mosaicing techniques. J Vis Commun Image Represent 34:1–11 9. Zhi H, Liu S (2019) Face recognition based on genetic algorithm. J Vis Commun Image Represent 58:495–502 10. Brennan C, Mccullagh P, Lightbody G et al (2020) Performance of a steady-state visual evoked potential and eye gaze hybrid brain-computer interface on participants with and without a brain injury. IEEE Trans Hum Mach Syst PP(99):1–10 11. Kocaman-Karoglu A (2016) Personal voices in higher education: a digital storytelling experience for pre-service teachers. Educ Inf Technol 21(5):1–16 12. Sharad S, Sivakumar PB, Ananthanarayanan V (2016) An automated system to mitigate loss of life at unmanned level crossings. Procedia Comput Sci 92:404–409 13. Feng X, Wan W, Richard XU et al (2018) A perceptual quality metric for 3D triangle meshes based on spatial pooling. Front Comput Sci 12(4):798–812

Text Language Classification Based on Dynamic Word Vector and Attention Mechanism Zeming Li

Abstract With the continuous development of Internet information processing technology, artificial intelligence and machine learning technology have been applied to text classification, making the development of text classification technology more rapid. The deep neural network suitable for text classification can also be used in tasks such as text sentiment classification and text sentiment analysis because it can well extract the deep and complex features of text. By designing and implementing a dynamic word vector algorithm model to better identify text language features, to improve the system’s ability to recognize text language features, it has very important value and significance. The purpose of this paper is to study the text language classification of dynamic word vector and attention mechanism. This article first summarizes the basic theory of dynamic word vector, and then extends the core algorithm of dynamic word vector, and analyze the status quo of text language classification. This paper systematically expounds the algorithm flow and model of dynamic word vector and attention mechanism. And through the comparative method, observation method and other research forms to carry out the experimental research on the text language classification based on dynamic words and attention mechanism. Research shows that the text language classification algorithm based on dynamic word vector and attention posture studied in this paper is more efficient in many aspects. Keywords Dynamic word vector · Attention mechanism · Text language · Split research

1 Introduction The language classification in this paper is an important basic technology for efficiently managing the huge amount of text language information on the Internet [1, 2]. However, the huge amount of text on the Internet and the rapid growth of the amount of information make it difficult for manual processing to be effective and Z. Li (B) Harbin University of Commerce, Harbin 150028, Heilongjiang, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_42

367

368

Z. Li

timely processing [3, 4]. Therefore, computer-based automatic text classification technology emerged and developed rapidly. So far, it has become an important basic technology in text information recognition systems such as search engines [5, 6]. Text classification technology has long attracted the attention of researchers. Around the 1960s, computer text classification technology based on word frequency statistics and Bayesian formulas opened the automatic text classification technology based on knowledge engineering for decades [7, 8]. However, in this period, the design of the classifier mainly relied on manual construction for specific data sets. In the mid-1990s, the emergence of support vector machines pushed the application of machine learning in the field of text classification to a new peak [9, 10]. Compared with the previous manual methods, the accuracy and efficiency of text classification based on machine learning is more prominent [11, 12]. The purpose of this paper is to improve the language classification ability of this paper, and to study the text language classification based on dynamic word vectors and attention mechanism. By comparing the traditional text language classification method with the text language classification based on dynamic word vector and attention mechanism studied in this article, we can judge the feasibility of the research content of this article.

2 Research and Analysis of Text Language Classification Based on Dynamic Word Vector and Attention Mechanism 2.1 Word Vector and Attention Mechanism (1)

(2)

Word vector The word vector is the vectorized representation of the word, that is, the word is transformed into a vector composed of numerical values, so that the problem of natural language understanding can be transformed into a problem that is processed by a machine. Attention mechanism 1.

2.

Theory The idea of attention mechanism is derived from the imitation of human attention behavior when recognizing text information. When humans are reading chapter-level Chinese, in order to improve the efficiency of comprehension and memory, they will form abstract features of the recognized Chinese text in the brain and highlight key content. Attention algorithm model First define the total output of the attention model. The total output of the model is defined as:

Text Language Classification Based on Dynamic Word …

P(Yt |Yt−1 , x) = G(h t , act )

369

(1)

Among them, X is the input of the current time step, which is a onedimensional vector. In the python compilation environment, it is usually processed as a tuple or list for easy calculation and calling. The input X of the current time step has the form: X = [x1 , x2 , ..., xn ]

(2)

2.2 Text Language Classification Based on Dynamic Word Vector and Attention Mechanism (1)

(2)

Data set construction In the study of language text classification, selecting the appropriate corpus is an important basic work. There are two standards: First, the corpus must be enough. The corpus must be large enough and contain clear semantic words and sentences reflecting the relationship between words. It must be large enough so that the model can learn enough information from it; second, the corpus must be accurate and the documents in the corpus must be formatted. It is clear, conforms to language habits, and can accurately reflect the semantic relationship in each language. Text preprocessing In text classification, the original text is often not directly usable due to its uncertain format, inconsistent format, and the existence of many special symbols. Therefore, in actual operation, before text representation and text classification, a certain amount of processing, that is, preprocessing, needs to be performed on these texts.Preprocessing generally refers to a certain amount of processing in advance according to the actual needs of text processing, including: 1. 2. 3. 4.

(3)

Remove some special symbols, special marks, etc., to make the format clear and uniform. Remove stop words, etc., reduce the interference of meaningless words on text features, and make the features clear and prominent. For different languages, there will be targeted pre-processing processes, such as English stemming and Chinese word segmentation. Other preprocessing operations

Representation of text Based on the dynamic word vector space model, it mainly includes the following three parts:

370

Z. Li

1.

2.

3.

Documentation That is, the entire article, which is written in natural language and formed after preprocessing. Feature items It is the representative words in the document. The more representative, the more important feature items in the document representation. In this way, the set of all feature items in the document can be used to represent the document, that is, the document is represented as Document = D(t1, t2, …, tn), where tk is the feature item, i ≤ k ≤ n. Weight The more representative feature items are, the more important they are. The way to distinguish this degree of importance is to set a weight for each feature item. The method of setting weights is usually to use some statistical information in the text, such as word frequency. Each feature item in the document has a weight, then document D can use these two characteristics to represent: D = D(t1 : w1 , t2 : w2 , ..., tn : wn )

(3)

At this point, the document written in natural language can be represented as a vector in an n-dimensional space. This is the general step of the vector space model to represent text. (4)

Feature dimensionality reduction Feature dimensionality reduction is a supplement to text representation, and it can also be regarded as a part of text representation. When using the dynamic word vector model for text representation, if all words are used as feature items and not selected, the dimensionality of the feature space will be very high. This will cause a huge burden on storage, will also bring higher computational overhead, and will affect the performance and efficiency of the classifier. Therefore, it is necessary to reduce the dimensionality of features.

2.3 Word Vector Learning Method Based on Attention Mechanism (1)

Analysis of word vector correlation algorithm

More than 10 years have passed since the word vector was proposed. The early word vector is only an adjunct to the language model training task, and there is a lack of in-depth research on word vector. And when using the language model to obtain the word vector, due to the existence of the hidden layer, training on large-scale text is expensive. In practice, it is found that using training texts with a size of about 1G requires 1–2 weeks on the feedforward neural network and the recurrent neural network, respectively. This is unacceptable for applications with huge amounts of text or fast text changes that require constant updating.

Text Language Classification Based on Dynamic Word …

371

About Chinese, many researchers have proposed improvements, hoping to enrich the expression information of word vectors from the characteristics of words. For example, split a word into characters and extract radicals from a word. A set of vectors is trained through the characters and radicals, and then added with the original word vectors to obtain the final word vector. The current research methods are only the method of adding word vectors and word vectors. As shown in formula (4), w’ is the original word vector, ci is the word vector in the word, n is the number of words in the word, and ⊕ is the point addition operation of the vector. This method does not consider the importance of different Chinese characters and still needs improvement. 

w=w ⊕ (2)

1 ci n i

(4)

Word vector training method based on attention mechanism

Attention language is a new method of neural network. It has been widely used in natural processing problems such as machine translation, article summarization, automatic question and answer, and relations, and has achieved excellent results. So this article hopes to introduce attention to the word training process. Mainly through the steps shown in formula (5). In the conversion process from word to word, first evaluate the importance of the word in the word, and assign the word ci weight α i . Finally, the weight of the word vector is combined with the original word w’ to obtain the final phrase. exp(ciT · u c ) αi = n T k exp(ck · u c )

(5)

The ⊕ in formula (5) can use point sum or splicing operation. In the actual experiment process, it is found that the word vector effect obtained by the two methods is equivalent. But splicing will increase the dimension of the final word vector, increase the time of model training, and is not conducive to comparison with other algorithms. So, in the follow-up experiment, ⊕ operation, this article uses the point and operation. In the training model, this article uses Continuous Bag of Words proposed by Mikolov. In the training phase, first, according to the dictionary of all Chinese characters and all words of the corpus resume, a k-dimensional representation vector is randomly initialized for each word and word; then the length c of the context window is set, and the context word of the current word xi is selected as the original Input; use formula (5) to calculate the word vector {Wi−c , Wi−c+1 , …, Wi−1 , …, Wi+c−1 , Wi+c }, wk represents the word xk obtained by the attention mechanism Word vector; then average the word vector of the context. X=

1 2c

c  j=−c,k=1

wi+ j

(6)

372

Z. Li

3 Experimental Research on Text Language Classification Based on Dynamic Word Vector and Attention Mechanism 3.1 Subjects (1)

(2)

In order to make this experiment more scientific and effective, this experiment compares and analyzes the traditional text language classification algorithm and the text language classification algorithm based on dynamic word vector and attention mechanism studied in this article to judge this article Study the feasibility of the content. In this experiment, the two algorithm systems are tested on the same corpus. Statistic and analyze the operating efficiency on a hundred-point system. In order to further research and analyze this experiment, this experiment also tested the performance of text language classification based on dynamic word vectors and attention mechanism. In this experiment, a Chinese text classification experiment was first carried out on the related algorithm model under the 100-dimensional word vector, and compared and analyzed the experimental results. In order to facilitate the horizontal and vertical analysis of the experimental results, the experimental results can be analyzed more clearly and thoroughly.

3.2 Research Methods (1)

(2)

(3)

Comparative method This experiment compares and analyzes the traditional text language classification algorithm and the text language classification algorithm based on dynamic word vector and attention mechanism designed in this paper to judge the feasibility of the research content of this paper. Observation method This language classification algorithm runs the detection time in the corpus and collects data. These data provide a reliable reference for the final research results of this article. Mathematical Statistics The software performs statistics and analysis on the final research results of this article.

Text Language Classification Based on Dynamic Word …

373

Table 1 Comparison and analysis of text classification language algorithms 1

2

3

4

5

Dynamic word vector (%)

76.2

77.8

69.4

73.1

71.9

Traditional (%)

59.7

60.3

58.4

63.1

62.0

Fig. 1 Comparison and analysis of text classification language algorithms Percentages

Dynamic word vector

59.70% 76.20% 1

60.30% 77.80% 2

Traditional

58.40% 69.40%

63.10% 73.10%

62.00% 71.90%

3

4

5

Number of times

4 Experimental Analysis of Text Language Classification Based on Dynamic Word Vector and Attention Mechanism 4.1 Comparative Analysis of Text Classification Language Algorithms This experiment is more scientific and effective. This research compares and analyzes the traditional text language classification algorithm with the text language classification algorithm based on dynamic word vector and attention mechanism designed in this paper. The data obtained is shown in Table 1. As can be seen from Fig. 1, under the same corpus, compared with the traditional text language classification algorithm, the text language classification algorithm based on dynamic word vector and attention posture studied in this paper is more efficient in many aspects. The average time efficiency of the five groups exceeds 10%, which fully reflects the excellent performance of the text language classification algorithm based on dynamic word vectors and attention mechanism.

4.2 Experimental Analysis of Attention Mechanism Based on Semantic Understanding This experiment is researched and analyzed step by step. In this experiment, a Chinese text classification experiment was carried out on a related algorithm model under a 100-dimensional word vector. The data obtained are shown in Table 2.

374

Z. Li

Table 2 Experimental analysis of attention mechanism based on semantic understanding Test accuracy rate (%)

Average monologous iteration time (s)

Test time (s)

BATT

79.30

2112.4



CNN5

83.44

125.0



C3C4

84.26

289.36



C3L2

87.61

2379.3

616.23

FDEAT_C3C4_C5

88.12

2476.8

447.96

BATTL2_C3C4_C5

88.40

4569.6



FDEAT L2_C3C4_C5

89.24

4734.3

1080.26

FDEAT

90.27

2062.6

416.79

It can be seen from Fig. 2 that compared to the monomeric basic attention mechanism model (BATT), the classification accuracy of the algorithm studied in this paper is about 10.97% higher than that of BATT, which proves that the feature difference enhancement attention mechanism FDEAT proposed in this paper appropriately amplifies the difference between the semantic features of the text, making it play a greater role in the process of text recognition, and achieves a good Chinese text classification effect, proves the effectiveness of the proposed algorithm model based on dynamic word vector and attention mechanism.

Numbers

Modules

BATT CNN5 C3C4

79.3 0 0

FDEAT

289.36 Test accuracy rate (%)

87.61

2379.3

616.23 88.12

FDEAT_C3C4_C5

FDEAT L2_C3C4_C5

83.44 125 84.26

0

C3L2

BATTL2_C3C4_C5

2112.4

2476.8

447.96 88.4

Average monologous iteration time (s) Test time (s) 4569.6

0 89.24

4734.3

1080.26 90.27 416.79

2062.6

Fig. 2 Experimental analysis of attention mechanism based on semantic understanding

Text Language Classification Based on Dynamic Word …

375

5 Conclusion With the growth of all kinds of text information, people can access more and more Internet text information every day. How to obtain more needed information in a limited time is an important direction of artificial intelligence research in the future. With the development of text classification technology, some large amounts of unknown information that should be processed manually have become machine processing. People only need to receive a small amount of final target information. This also enables intelligent management of libraries, personalized news recommendations, and text information. Technologies such as filtering have become a reality. The focus of this paper is the text language classification method based on the fusion of attention mechanism and dynamic word vector. The attention mechanism and word vector algorithms used to extract text language features have been deeply researched and improved.

References 1. Li S, Cao Y (2018) Research on the text and emotion classification of particle swarm optimization in natural language processing. Mach Tool Hydraulics 046(4):150–155 2. Wang H, Deng S (2017) A paper-text perspective Studies on the influence of feature granularity for Chinese short-text classification in the Big Data era. Electron Library 35(4):689–708 3. Vani K, Gupta D (2017) Text plagiarism classification using syntax based linguistic features. Expert Syst Appl 88(8):448–464 4. Xing Y, Guo X, Tan P et al (2016) Text sentiment classification based on cloud model clustering and mixed-fisher feature. J Front Comput Technol 10(9):1320–1331 5. Onan A, Koruko˘glu, Lu S, Bulut H (2016) Ensemble of keyword extraction methods and classifiers in text classification. Expert Syst Appl 57(9):232–247 6. Rago A, Marcos C et al (2018) Using semantic roles to improve text classification in the requirements domain. Lang Resour Eval 52(3):801–837 7. Brodi D, Amelio A, Milivojevi ZN (2016) Language discrimination by texture analysis of the image corresponding to the text. Neural Comput Appl 29(1):1–22 8. Arruda HD, Costa L, Amancio DR (2016) Using complex networks for text classification: discriminating informative and imaginative documents. EPL 113(2):28007 9. Wang H, He J, X Zhang, et al (2020) A short text classification method based on N-gram and CNN. Chin J Electron 29(2):248–254 10. Elnagar A, Al-Debsi R, Einea O (2020) Arabic text classification using deep learning models. Inf Process Manag 57(1):102121 11. Esuli A, Moreo A, Sebastiani F (2019) Funnelling: a new ensemble method for heterogeneous transfer learning and its application to cross-lingual text classification. ACM Trans Inf Syst 37(3):371–373 12. Jeong H, Ko Y, Seo J (2016) How to improve text summarization and classification by mutual cooperation on an integrated framework. Expert Syst Appl 60(10):222–233

Big Data Technology in Improving the Internal Governance Efficiency of Private Undergraduate Jingting Wang and Bao Liu

Abstract The deep integration of big data and internal governance of undergraduate colleges has been paid more and more attention. Especially in the perspective of public governance, the big data provides technical and intellectual supports for the improvement of internal governance efficiency of private undergraduate colleges. In order to accelerate the construction of a “double first-class” high-level university with distinctive characteristics of teacher education, this paper analyzes the internal governance status and problems of private undergraduate colleges from the aspect of organizational reform based on the improvement of management efficiency. It aims to stimulate the subjectivity and creativity of secondary colleges in terms of organizational, personal, technical, cultural and incentive constraints. The paper establishes the mechanism of improving the internal governance efficiency of private undergraduate colleges from the perspective of public governance, and improves the modernization level of education governance, and provides the path and theoretical reference for private colleges to apply the big data technology to the improvement of internal governance efficiency. Keywords Big data technology · Public governance · Private undergraduate college · Internal governance · Efficiency improvement

J. Wang (B) School of Engineering and Technology, Xi’an Fanyi University, Xi’an, Shaanxi, China e-mail: [email protected] B. Liu College of Electrical and Control Engineering, Xi’an University of Science and Technology, Xi’an, Shaanxi, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_43

377

378

J. Wang and B. Liu

1 Introduction In 2014, Xi Jinping put forward the grand goal of “developing modern education with Chinese characteristics and the world level” in the goal of describing the “China dream” to the whole China. At the Peking University teachers and student symposium, he gave important speech that “we should seriously absorb the advanced experience of running schools in the world, and follow the educational law, and take root in the land of China and run a university” [1]. In April 2017, the Ministry of education and other five departments jointly issued several opinions on deepening the reform of streamlining administration, delegating power, delegating management and optimizing service in the field of higher education, which proposed to “improve the internal governance of colleges and universities” and “strengthen the system construction, improve the democratic management and academic governance, so as to make the development of colleges and universities well governed, managed, and clean” [2, 3]. On October 28, 2019, the Fourth Plenary Session of the 19th CPC Central Committee adopted the decision on several major issues of upholding and improving the socialist system with Chinese characteristics and promoting the modernization of national governance system and governance capacity. Specifically, in the field of education, based on the situation and task of building a powerful country in higher education, we should promote the construction of “double first class” in the new era, focusing on promoting the modernization of higher education governance [4]. The modernization of higher education governance mainly includes two aspects: the external and internal governance. The former refers to improving the external governance structure of universities, establishing the legal power boundary between government, school, and society, while the latter refers to rationalizing the relationship among stakeholders of internal governance according to the logic within modern universities [5, 6]. The theory of public governance is the theoretical basis for the study of internal governance in universities. The improvement of internal governance efficiency is an important premise for improving internal governance of universities. Especially for private undergraduate colleges, lack of support from public resources, it is necessary to help private schools to plan, master, and use the resources inside and outside the university by means of the big data technology. Thus, the private undergraduate universities can realize the modernization of governance system and governance ability [7]. From the perspective of the government’s streamlining administration and decentralization, how to effectively carry out the internal governance of universities has become one of the core propositions of the modern university system construction, especially for the private undergraduate universities. How to effectively improve the internal governance efficiency of private universities in accordance with the management mode of modern universities has never been a recognized result. Therefore, it is necessary to analyze the current situation and problems of internal governance of private universities from the perspective of public resource sharing of the big data

Big Data Technology in Improving the Internal Governance …

379

technology, starting from the construction of internal quality assurance system to improve the effectiveness of internal governance of schools and secondary colleges.

2 There Are Some Problems in Improving the Internal Governance Efficiency of Private Universities The main problems of improving the internal governance efficiency of private undergraduate colleges are as follows. (1) The cost of improving the internal governance efficiency continues to increase, but the efficiency decreases. At present, the increasing cost of running private universities, as well as the waste and improper management caused by multiple management, is an obvious problem. (2) There is a bottleneck in the system inheritance of internal governance. The system continuity of private undergraduate colleges is poor, and the “service desert” phenomenon is more prominent. (3) It is difficult to integrate the administration and scientific research. The interaction between the politics and research is facing the risk of separation and isolation. How to effectively adjust the political research and discipline layout of private undergraduate colleges is an important issue that must be considered. These problems are to be solved in order to change the traditional internal governance mode, realize “good governance” and improve the efficiency of internal governance in universities in the new era.

3 Research on the Strategy of Improving the Internal Governance Efficiency of Private Universities 3.1 The Main Contents of the Research on the Internal Governance Efficiency Improvement Strategy of Private Colleges (1)

“School-based” improvement of internal governance efficiency in private universities

In the era of big data, enhancing the transformation of government functions and service awareness creates a relatively relaxed environment for the reform and development of school education. All sectors of the society generally attach importance to education, and it is a common practice to respect teachers. All these show that promoting quality education based on the school has become a distinctive feature of the current education reform. Especially in the field of improving the internal governance efficiency of private undergraduate colleges from the perspective of public governance, the reality has posed a challenge to school management. Each school

380

J. Wang and B. Liu

should firmly grasp its own reality on the basis of the macro background of education development in the era of big data. We should build a mechanism of educational reform and development with the school’s own characteristics, and implement the idea of “school-based” in the process of school management, so as to truly build the school into a position of reform and a stage of innovation. (2)

The “democratization” of improving the internal governance efficiency of private universities

First, in the era of big data, the improvement of internal governance efficiency of private undergraduate colleges from the perspective of public governance inevitably needs to shift the focus down. The department heads and research office directors of each secondary college share the management functions, and participate in management activities in their respective posts, and give play to collective wisdom and pool their wisdom, which is more conducive to promoting reform and doing a good job. The downward shift of the center of gravity will inevitably lead to the decentralization of school administrators. We should reasonably divide the powers according to different positions, and determine the management authority, and form a big data management network, so as to form a pattern of job management. Second, we should pay more attention to the achievements of secondary colleges. The purpose of management is not to control, but to emphasize breakthrough and innovation. Therefore, school management should have a new value orientation, and pay attention to process management, not to pursue the uniformity of the process, but pay more attention to the achievement and breakthrough of work. Third, we should pay more attention to the big data group sharing. It is a breakthrough of modern management in the era of big data to transform the one-way subordinate relationship between “management” and “managed” into a new relationship of group interaction, cooperation, and sharing. (3)

“Informatization and learning” of improving the internal governance efficiency of private universities

“Group information learning” in the era of big data has become a new way to improve the internal governance efficiency of private universities. The school creates a good environment, and advocates learning and research, and turns passive coping with various affairs into active experiment and coping, which has made some progress and achievements in the education reform. We should enhance the awareness of “dialogue” in school management, and fully tap the creative potential of teaching staff, and give play to the creativity of “collective intelligence” through communication and dialogue. “Group E-learning” can be interdisciplinary, and it has great flexibility for everyone to study a common topic “Dialogue” will gradually become a common way of school management. Collective agreement will become the basic mode of school operation. To enhance the “value-added” function of school management, the key lies in creation. In terms of guidance mechanism, operation mechanism, and evaluation mechanism, we should create a big data information sharing environment for teachers and students, and strive to build an open and orderly school management

Big Data Technology in Improving the Internal Governance …

381

system, and keep the “platform” of school management and operation constantly improving. (4)

The “autonomy” of improving the internal governance efficiency of private universities

In the era of big data, in order to realize the modernization of education governance in private colleges, we must straighten out the internal governance system, and establish the big data thinking, and improve the organizational mechanism, and improve the ability of autonomy [8]. First, we should do a good job in designing the internal governance structure and system of private undergraduate colleges, and deepen the reform, and clarify the boundaries of property rights, powers, and responsibilities of all parties, and protect the rights and interests of stakeholders; Second, we should pay attention to the cultivation of big data thinking consciousness of teachers and students, so that the daily administrative, teaching, and other management activities can be established on the basis of objective data analysis, and provide information services and decision support for the internal governance system; Third, it is necessary to improve the regulations and supervision mechanism of application-oriented universities, and manage departments at different levels, and coordinate and allocate various resources, and form a diversified governance structure with the interests of teachers and students as the core and the development of departments as the key.

3.2 The Path of Improving the Internal Governance Efficiency of Private Universities The internal governance efficiency of universities is affected by various organizational factors. According to different classifications, these factors include organizational structure, personnel structure, management system, technical conditions, dominant resources, organizational goals, organizational culture, external environment, incentive, and restraint policies, etc. These factors have different effects on organizational effectiveness in different aspects. To sum up, the internal governance efficiency of a university is closely related to its organizational characteristics, and the most important organizational characteristics are summarized as five elements: organization, individual, technology, culture, and incentive and restraint policies (as shown in Fig. 1). Therefore, starting from these five aspects, we should establish a mechanism to improve the internal governance efficiency of private undergraduate colleges from the perspective of public governance in the era of big data. (1)

Sort out the rules and regulations and workflow of school work in the era of big data, and improve the efficiency of internal governance

In order to ensure the service style from the system, we should closely adhere to the development goal of private colleges, the principle of convenient grass-roots and scientific management, and sort out the existing rules and regulations. The key points of carding are as follows. First, we should adjust institutions and posts scientifically

382

J. Wang and B. Liu

Fig. 1 The influencing factors of internal governance efficiency in universities

and reasonably, and implement target responsibility system and performance system. Second, we should distinguish different types of management and simplify management links. Third, we should deal with the relationship between planned work and non-planned work. Taking the project team system of big data sharing, modular or matrix organization mode of key work to break the division barriers of bureaucratic organizations is conducive to better integrate the resources of university management departments, so as to improve the flexibility and efficiency of organization operation. In addition, the internal work processes of colleges and universities should be standardized and scientific. The cumbersome and unnecessary processes and procedures can be further cleaned up to greatly improve the efficiency of management services. (2)

Establish the operation mechanism to improve the efficiency, correct the awareness, and improve the service quality and efficiency

In accordance with the principles of legality, rationality, integrity and conventionality in the era of big data, we should pay close attention to the system construction, and promote the institutionalization and standardization of internal management of private colleges from the perspective of public governance. We should solve the problems of unclear responsibilities, low efficiency, unfulfilled work, and good or bad work, and initially form a system to manage people and affairs. In particular, we should do a good job in the following system construction: post responsibility system, first responsibility system, positive handling and negative reporting system, limited time completion system, timely feedback system, service commitment system, government affairs open system, efficiency evaluation system, dereliction of duty investigation system, and regular investigation system. (3)

Cross integration of politics and research in the era of big data to enhance the value of human resources

To create a “double first-class” university, we need not only first-class teaching and research personnel, but also high-quality internal governance service personnel. Administrative personnel are the backbone of improving the management efficiency of colleges and universities. It is more important to strengthen the big data technology by training of administrative personnel, improving research ability and incentive measures. It is an inevitable way to enhance the value of human resources of administrative service personnel in private universities to carry out special support plan, and improve the quality of administrative service personnel, and promote the exchange

Big Data Technology in Improving the Internal Governance …

383

and rotation of administrative cadres, and broaden work vision and enhance work vitality. (4)

Advocate the internal governance culture of big data, and provide spiritual power for efficient internal governance

A good cultural atmosphere requires the practice of the “people-oriented” concept and the development of high-quality service activities and cultural construction. First, we should create an atmosphere of “career, treatment, and feelings”, and respect the labor of internal administrators, and appropriately improve the treatment of personnel. Second, we should deepen the construction of internal governance style, and continue to implement the work behavior norms, civilized language and service taboos of internal managers. Third, we should build the internal governance culture of big data. With the satisfaction of teachers and students as the goal, the improvement of service quality is regarded as the starting point, foothold and focus of internal governance efficiency construction. The governance culture of teachers and students first and service first is constructed. (5)

Implement the big data performance appraisal and improve incentive and constraint mechanism

The establishment of scientific, reasonable and effective performance evaluation mechanism and incentive and restraint mechanism is conducive to the development of private colleges [9]. Scientific interest incentive mechanism can turn external compulsion into internal drive [10]. Therefore, motivation should be considered from two aspects: motivation and constraint. First, it is included in the annual assessment. We should build a set of scientific, quantitative and operational performance evaluation methods based on the big data, and combine the evaluation with post allowance, yearend bonus and other benefits to stimulate the enthusiasm of employees. Second, we should investigate the responsibility of efficiency, and strengthen efficiency monitoring and supervision, and set up efficiency complaint telephone and complaint mailbox. At the same time, teachers and students can be employed as efficiency supervisors to inspect the work of various management departments regularly or irregularly. For departments and personnel with more complaints, there should be a conversation system and accountability methods.

4 Summary In the era of big data, the improvement of internal governance efficiency of private colleges from the perspective of public governance constantly stimulates the subjectivity and creativity of secondary colleges, and leads the overall development and connotation construction of private colleges with the construction of “double first class”. At the same time, the in-depth discussion on the internal governance of private colleges under the background of “double first-class” has important theoretical significance and practical application value, which provides strong support for

384

J. Wang and B. Liu

the construction of “double first-class” private colleges and disciplines, and provides a solid guarantee for the cultivation of new talents. Acknowledgements This work was supported by School level teaching reform project (J20B36); School level teaching team (T1808); E-commerce provincial first-class professional projects; Higher education research project of Xi’an University of science and Technology (GJY-2020-ZD-2); The degree and graduate education and teaching reform project of Xi’an University of science and technology (YJG2020020).

References 1. Young people should consciously practice the socialist core values (2018). http://www.xinhua net.com/politics/2014-05/05/c_1110528066.htm 2. Some opinions on deepening the reform of streamlining administration, delegating power and deregulation combined with optimizing service in the field of Higher Education (2018). http:// www.moe.gov.cn/srcsite/A02/s7049/201704/t20170405_301912.html 3. Lin S (2018) Research on promoting the modernization of internal governance of colleges and universities through the efficiency construction from the perspective of Public Governance— taking a university in Fujian as an example. J Guangxi Inst Educ 3:148–152 4. Hu M (2019) Strengthen the confidence of education with Chinese characteristics and promote the modernization of higher education management. J Natl Acad Educ Adm 11:3–7 5. Research Group on ideological system of higher education with Chinese characteristics (2017) Outline of ideological system of higher education with Chinese characteristics. Higher Education Press, Beijing 6. Lin S (2018) Improvement of internal governance efficiency in colleges and universities from the perspective of Public Governance. Contemp Vocat Educ 3:69–74 7. Liu X (2019) Exploration on improving the internal governance ability of local universities in the context of big data. China High Educ 20:41–42 8. Liu S (2020) Exploration on the path of modernization of educational governance in applied universities in the era of big data. Software 41(12):230–232 9. Zhang X, Gao X (2018) Research on the improvement of administrative efficiency of Secondary Vocational Colleges under the background of internal quality assurance system construction. J Mudanjiang Inst Educ 9:49–51 10. Zhang W (2010) On improving the management performances of university authority. J Henan Inst Educ (Philos Soc Sci) 29(3):113–116

Design of Energy Saving Scheme for Data Center Power System Based on Artificial Intelligence Ziliang Qiu

Abstract The development of artificial intelligence has brought explosive growth in business volume for data centers. At the same time, with the concurrency of issues such as global warming and energy shortages, data centers are facing the requirements of reducing consumption and saving costs. Therefore, based on the development of artificial intelligence, this paper designs an energy-saving solution for the data center power system. This article has made an understanding of the data center power system through experimental research methods, survey methods, and data analysis methods. Then, based on the investigation, it is found that the commonly used uninterruptible power supplies in the system include UPS, high-voltage direct current, etc. This article has made a detailed understanding of the equipment of the power system, and then uses artificial intelligence technology to transform the equipment. Through the harmonic control experiment, it finds out the feasible energysaving methods. Experimental studies have shown that energy-saving solutions for data center power systems based on artificial intelligence need to take into account direct city power supply and high-voltage direct current, because they consume 1% and 3.4% of electrical energy, respectively. Keywords Artificial intelligence · Data center · Ups · High-voltage direct current · Power energy-saving development · System design

1 Introduction The data center is an important carrier of Internet information. In recent years, with the rapid development of the global economy and Internet technology, the scale of the data center is also increasing. IDC data center can provide high-speed, safe, stable and convenient Internet access services, and has extremely rich network resources and comprehensive network management services and application services. On the Z. Qiu (B) Shenzhen Power Supply Limited Company, Shenzhen 51800, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_44

385

386

Z. Qiu

premise of ensuring continuous and reliable power supply, how to formulate energysaving solutions for uninterruptible power supplies based on artificial intelligence and reduce the energy consumption of data centers is a key issue that needs to be solved in the design of current data center power systems. Yu Y proposed a DC power distribution system using three active bridge converters to achieve this type of higher reliability system. The TAB converter is based on an isolated DC-DC converter and can control the DC power flow between three ports. Two more reliable DC power distribution systems using TAB converters are proposed [1]. London Y analyzed the peak-to-average power ratio (PAPR) of next-generation data center optoelectronic communication systems. In view of the separate design of optical modules and airborne electronic devices, a new challenge of transmitting ultra-wideband signals through PTL has been introduced [2]. Cheung H said that in recent years, due to the rapid increase in data center energy consumption, people have done a lot of work to develop energy-saving design, control and diagnosis of their cooling systems, and energy system simulation is an effective tool. However, the existing data center information technology (IT) equipment model does not well reflect the impact of IT equipment design and operating status on data center cooling demand, which hinders the development of data center energy-saving cooling technology. He introduced a power consumption model of data center IT equipment, which provides coefficients and modeling scripts, which can be immediately used for data center energy system simulation [3]. To reduce the energy consumption of the data center and improve the efficiency of power usage, the focus is to reduce the power consumption of non-IT equipment. The purpose of this paper is to provide guidance for the energy-saving and emission-reduction work of data centers by studying several common uninterruptible power supply energy-saving solutions in data centers. Commonly used uninterruptible power supplies in data centers include industrial frequency UPS, high frequency UPS, high voltage DC power supply and direct utility power supply. By studying the working principles and structures of these types of uninterruptible power supplies, and applying artificial intelligence technology to graph analysis of efficiency data, it is the focus of this research.

2 Energy-Saving Methods for Data Center Power System 2.1 Data Center Power System (1)

Peripheral equipment. 1.

Auxiliary equipment. An independent high-power power supply cabinet can only fully play its role when supplemented by appropriate equipment to provide reliable power for many important loads.

Design of Energy Saving Scheme for Data Center …

2.

3.

4.

5.

(2)

387

Enter the power distribution cabinet. There are many ways to input the power of the power distribution cabinet. Generally, it is a power input fed from the low-voltage power distribution system. Output distribution screen. The distribution cabinet is placed in a position where the load is relatively concentrated, and its power is provided from the main distribution panel, and then distributed to the nearby loads with a smaller capacity and a larger number. Bypass isolation transformer. There are two ways to choose the capacity of the bypass isolation transformer: one is to choose according to the load capacity, and the other is to choose according to the rated output capacity of the UPS uninterruptible power supply system. Maintain the bypass cabinet. Feed power to the load through the manual maintenance switch of the system maintenance bypass cabinet to maintain the system without power failure.

Supporting equipment 1. 2.

Input power system. Low-voltage power distribution system.

2.2 UPS Power System At present, most data centers adopt the traditional AC UPS system power supply mode. The problem of high energy consumption in data centers continues to emerge, and the traditional UPS power supply mode has the problem of low efficiency [4]. (1)

Classification: According to the different power supply system (according to the input and output mode), it can be divided into single-input single-output, three-input single-output and three-input three-output UPS. According to the working frequency, it can be divided into industrial frequency machine and high frequency machine. 1.

Power frequency UPS is composed of SCR rectifier, IGBT inverter, bypass and step-up transformer. The rectifier of the power frequency UPS mainly adopts three-phase bridge rectification. The relationship between the DC bus voltage and the input AC voltage is: Uv = 1.22Uc cos α(0◦ ≺ α ≺ 90◦ )

(1)

The power frequency UPS inverter adopts PWM modulation technology, and the relationship between the DC bus voltage and the output line voltage of the UPS inverter is √ 6N Up = √ Uv (0 ≺ N ≤ 1) 2 5

(2)

388

Z. Qiu

2.

In formula (2), N is the inverter modulation ratio. The advantages of industrial frequency machines are: strong environmental resistance, high reliability and stability under harsh power grid environmental conditions, and low noise when operating with a large load [5]. Compared with industrial frequency UPS, high frequency UPS uses IGBT instead of thyristor in the input rectifier circuit. The high frequency boost circuit on the rectifier side boosts the bus voltage, and the inverter is changed from a full bridge to a half bridge structure. The rectifier of high-frequency UPS is an IGBT rectifier. The relationship between the DC bus voltage output by the IGBT rectifier and the input line voltage √ 2 5 Uv = √ Uc (0 ≺ N ≤ 1) 6N

(3)

The magnitude of the voltage can be adjusted by changing the modulation ratio N, that is, the IGBT rectifier has a boost function. The advantages of high-frequency machines are: small size, low cost, and low price. Disadvantages: poor tolerance and high dependence on the environment [6]. (2)

Comparison of high frequency UPS and industrial frequency UPS: 1.

2. 3. 4.

(3)

Power frequency UPS has high power consumption. Compared with the high frequency UPS, the power frequency UPS has an output transformer, which reduces the efficiency of the power frequency UPS by about 2%-3% [7]. The power frequency UPS is large in size and heavy in weight. The industrial frequency UPS is large in size and heavy in weight. The reliability of power frequency UPS is not stronger than that of high frequency UPS. Industrial frequency UPS increases user investment. Generally speaking, the price of a power frequency UPS with the same capacity is more than 28% higher than that of a high frequency UPS. In summary, in terms of performance, reliability, and price, highfrequency UPS is better than industrial frequency UPS. The replacement of high-frequency UPS is the general trend of the current UPS development [8].

UPS high reliability power supply scheme: 1. 2. 3.

“Hot backup” of master and slave in series Directly parallel the model with redundant power supply Double bus power supply

Design of Energy Saving Scheme for Data Center …

(4)

389

Several commonly used UPS components 1. 2. 3. 4. 5.

Power diode Thyristor Power bipolar transistor Power field effect transistor Insulated gate bipolar transistor

2.3 Data Center High-Voltage DC Power Supply System (1)

Features and advantages of HVDC 1. 2. 3. 4. 5.

(2)

High voltage DC power supply mode 1. 2. 3.

(3)

Energy saving. Compared with the UPS system, the high-voltage direct current has reduced power transmission loss. Power supply reliability [9]. Since the high-voltage DC bus power supply is uninterrupted, it can ensure the continuity of power supply. Easy to expand. Because the DC power supply adopts a modular structure design, the capacity expansion of a single unit is easy to realize. “Zero-ground” voltage problem. With DC input, there is no neutral line in the system. Intelligent management [10]. The complete battery management system facilitates the intelligent management of the battery, effectively prolongs the service life of the battery and reduces the overall operating cost.

240 V high voltage DC power supply 336 V high voltage DC to 12 V DC subrack power supply HVDC + direct supply from mains

Feasibility analysis of HVDC

When IT equipment is powered by AC, the output is current in the same direction within one cycle of AC voltage. Current servers all support global voltage [11]. When the DC power of a certain voltage level is supplied, the two forward symmetrical diodes are always on, and the reverse symmetrical two diodes are always turned off. As long as the average value of DC power is 114–306 Vdc, that is, the voltage output of the rectifier circuit is consistent with the output when AC power is used, theoretically IT equipment can work normally.

390

Z. Qiu

2.4 Discussion on Energy Saving of Power Supply System (1)

Data center power system architecture The electronic information system should be divided into three levels: A, B, and C.The electronic information system room that meets one of the following conditions shall be Class A. 1. 2.

3. 4. 5.

The interruption of the operation of the electronic information system will cause significant economic losses. The interruption of the operation of the electronic information system will cause serious disorder in public places. The electronic information system room that meets one of the following conditions shall be Class B. The interruption of the operation of the electronic information system will cause greater economic losses. The interruption of the operation of the electronic information system will cause disorder in public places. Those that do not belong to Class A and Class B are called Class C.

The data center power system can be divided into: 1. 2. (2)

AC power supply. AC power system is divided into direct city power supply + UPS power supply mode and UPS power supply mode; High voltage DC power supply. HVDC DC power supply and HVDC + mains direct supply mode

Discussion on energy saving of power supply system

With the continuous development of science and technology and the wide application of new technologies, the power supply efficiency of HVDC power supplies has been greatly improved. This brings new ideas for data center energy conservation and reduction of PUE indicators. HVDC power supply has obvious advantages. Its battery is directly connected to the input of the server without going through the inverter link, which truly realizes uninterrupted power supply. At the same time, its expansion is more convenient than UPS; it adopts modular design, maintenance is simpler. The application of new HVDC technology has increased the power density of the module, and at the same time, the efficiency of the whole machine has also been significantly improved. From the above data, it can be seen that the emergence of new technologies and new modules has significantly reduced the PUE index of the data center, which is a new generation green, energy-saving data center power supply provides a new solution. When the power supply is directly supplied by the city, the loss of the system is only the line system loss and the power distribution loss. The system efficiency is much higher than that of the HVDC power supply method, and the PUE index is improved [12].

Design of Energy Saving Scheme for Data Center …

391

3 Experimental Research on Energy Saving of Data Center Power System Based on Artificial Intelligence The harmonic control of the power system generally adopts a combination of nearby control and centralized control, that is, for UPS, switching power supply and other large harmonic source loads, a source filter device is installed at the front end of the power supply system to adopt the nearest control method, and then at the low-voltage general power distribution office. Install reactive power compensation devices for a comprehensive centralized management.

3.1 Experimental Operation The UPS system adopts a 12-pulse 400 kVA 1 + 1 configuration, and the actual active load of the current load is 240 kW, that is, the load rate is 62.5%. Through the test and analysis of the harmonic content in the actual operation of the UPS system, a 100 A active wave device is connected in parallel at the input end of each single unit. After installing a source filter for harmonic control, the harmonic content of the UPS system has been better improved.

3.2 Harmonic Control of Switching Power Supply System The system has a capacity of 3000 A and is equipped with a 9000AH backup battery. The actual load current is 1050 A after field testing. The total input current is 110 A, the input power factor is 0.92, the current waveform is severely distorted, and the harmonic current content is 34.9%, of which the 5th harmonic wave current content is as high as 31.4%, followed by the other third harmonic current content is also very high. The switching power supply rectifier is a three-phase three-wire, so a three-phase three-wire active filter is selected to compensate the system, that is, a three-phase three-wire active filter is installed at the input front end of the switching power supply system. Reactive power compensation effect of low-voltage power distribution system. System A is equipped with two 2500 kVA transformers. Under normal circumstances, the transformer adopts 1 + 1 cold backup mode. A system mainly installs three 250KVAR non-attack compensation cabinets composed of capacitor + reactance on the horizontal busbar of the system. System B is equipped with two 2500 kVA transformers. Under normal circumstances, the transformer adopts 1 + 1 cold backup mode. The main load of system B is UPS system, switching power supply system and a small amount of special air conditioner for computer room, etc. The C system is equipped with an 800 kVA outdoor transformer, and the main loads include

392

Z. Qiu

Table 1 Current changes before and after harmonic control of power system Total capacity

Reduced operating current

System capacity increase

Percentage increase in system capacity (%)

UPS system

4000

424

288

7.2

Switching power supply system

3000

450

240

8

Low-voltage power distribution system

5000

480

300

6

non-guaranteed living loads such as business halls, central air conditioning, office electricity, canteens, and factory maintenance areas.

4 Analysis of Energy-Saving Effect of Harmonic Control of Power System 4.1 Improved the Effective Utilization of the Power Distribution System After the harmonic control of the power system, the reactive current in the system operation is effectively eliminated, and the total current of the system operation is reduced, thereby improving the effective utilization rate of the power distribution system; it is equivalent to increasing the capacity of the power distribution system. Save one time investment cost. The specific situation is shown in Table 1. As shown in Fig. 1, after the harmonic processing of different power systems, the operating current is reduced. At the same time, electricity bills will also decrease. It should be noted that while the operating current decreases, the system capacity is relatively increased. Therefore, harmonic processing can improve the power factor, reduce line loss, and reduce the loss of power distribution equipment, thereby effectively saving electricity bills.

4.2 Comparison and Analysis of Energy Saving of HVDC, UPS, and Direct Supply from Mains Summarize the power supply factors of HVDC, UPS and mains direct supply to obtain a list of HVDC, UPS, and direct mains supply factors. The small proportions of high-voltage direct current and direct mains supply indicate that the two methods of direct mains supply and high-voltage direct current are conducive to energy saving.

Current

Design of Energy Saving Scheme for Data Center …

6000 5000 4000 3000 2000 1000 0

393

5000 4000

3000 424

288

UPS SYSTEM Total Capacity

240

450

SWITCHING POWER SUPPLY SYSTEM

480

300

LOW-VOLTAGE POWER DISTRIBUTION SYSTEM

Reduced Operating Current System Capacity Increase

Power System

Fig. 1 Current changes before and after harmonic control of power system

In contrast, the energy-saving effect of UPS is even less obvious. As shown in Table 2. From Fig. 2, we can see that the energy consumption of direct power supply and distribution is the lowest among the three, with an average of 0.013, indicating that it has the least power consumption, and HVDC ranks second, followed by UPS. Therefore, in the design of energy-saving solutions for data centers, direct city power supply plus high-voltage direct current can be preferred. Taking into account the development of artificial intelligence today, we can improve the high-voltage DC equipment based on the existing artificial intelligence technology, and make the calculation and diagnosis distribution of the direct supply of city power more automatic and intelligent. Table 2 Energy-saving comparison of HVDC, UPS, and mains direct supply Load factor

40%

50%

60%

70%

80%

90%

100%

HVDC

0.083

0.062

0.055

0.046

0.042

0.038

0.034

UPS

0.186

0.143

0.112

0.098

0.074

0.062

0.059

Direct supply from mains

0.023

0.019

0.017

0.014

0.012

0.011

0.010

394

Z. Qiu

Fig. 2 Energy-saving comparison of HVDC, UPS, and mains direct supply

5 Conclusion The energy-saving design of the data center power system is an all-round project. At present, the data center power system is mainly divided into power supply modes such as UPS, high-voltage direct current, and direct city power supply. Under the background of artificial intelligence, the harmonic control of the power system reduces the consumption of electric energy, and at the same time saves the electricity bill. It can also effectively increase the utilization rate of electricity and achieve the effect of energy saving and consumption reduction. According to experimental analysis, in order to design an effective energy-saving solution, it is necessary to start with high-voltage direct current and direct supply from mains. In the artificial intelligence technology transformation, these two power supply modes must be improved. Therefore, it is of great significance to conduct artificial intelligence comprehensive management of harmonics in data center power systems.

References 1. Yu Y, Keisuke M, Keiji W et al (2018) A DC power distribution system in a data center using a triple active bridge DC-DC converter. IEEJ J Ind Appl 7(3):202–209 2. London Y, Sadot D (2017) Intensified peak-to-average power ratio of high-speed coupled signals in data center connections. Opt Eng 56(9):096111.1–096111.7 3. Cheung H, Wang S, Zhuang C et al (2018) A simplified power consumption model of information technology (IT) equipment in data centers for energy system real-time dynamic simulation. Appl Energy 222(JUL.15):329–342 4. Castro-Leon E (2016) IT-driven power grid demand response for datacenters. It Prof 18(1):42– 49 5. Bo W, Fang B, Wang Y et al (2016) Power system transient stability assessment based on big data and the core vector machine. IEEE Trans Smart Grid 7(5):1–1 6. Li K (2016) Power and performance management for parallel computations in clouds and data centers. J Comput Syst Sci 82(2):174–190 7. Cho J, Kim Y (2016) Improving energy efficiency of dedicated cooling system and its contribution towards meeting an energy-optimized data center. Appl Energy 165:967–982 8. Acun B, Langer A, Meneses E et al (2016) Power, reliability, and performance: one system to rule them all. Computer 49(10):30–37

Design of Energy Saving Scheme for Data Center …

395

9. Liu L, Sun H, Chao L, et al (2017) Managing battery aging for high energy availability in green datacenters. IEEE Trans Parallel Distrib Syst PP(12):1–1 10. Lyu X, Y Li, Ren N, et al (2019) A comparative study of switched-tank converter and cascaded voltage divider for 48V data center application. IEEE J Emerg Sel Topics Power Electron PP(99):1–1 11. Constante-Flores GE, Illindala MS (2019) Data-driven probabilistic power flow analysis for a distribution system with renewable energy sources using Monte Carlo simulation. IEEE Trans Ind Appl 55(1):174–181 12. Proietti R, Xiao X, Zhang K et al (2018) Experimental demonstration of a 64-port wavelength routing thin-CLOS system for data center switching architectures. IEEE/OSA J Opt Commun Netw 10(7):49–57

Application of LeNet Image Classification Algorithm in the Creative Design of New Painted Pottery Nan Wang

Abstract As an important part of Chinese traditional culture, painted pottery culture is a historical evidence of the development and progress of human society. In the context of cultural diversification and economic globalization, the aesthetic context of the masses has undergone tremendous changes. How to transform traditional culture into modern innovation and make it conform to the development trend of the times, so as to obtain more effective inheritance is a question worth exploring. Therefore, this article takes Majiayao colored pottery as an example to study the application of LeNet image classification algorithm in the creative design of new colored pottery patterns, analyze the pattern of Majiayao colored pottery culture, the necessity of Majiayao cultural and creative product design, and use image classification based on the algorithm discovering the problems of Majiayao cultural and creative products, it conducts a questionnaire survey on people of different ages, and then proposes the design strategy of Majiayao cultural and creative products. The survey results show that the main factors that affect consumers’ purchase of cultural and creative products are: practicality, product price, product interest, product appearance and other factors. Consumers are more inclined to buy cultural and creative products of daily necessities and clothing, and are also very interested in food products. Keywords LeNet image classification algorithm · New colored pottery decoration · Cultural and creative products · Creative design

1 Introduction As an important part of primitive art, painted pottery culture is an artistic treasure of China and the world. Painted pottery not only combines practical and aesthetic functions, but also penetrates into a strong human content, contains the evolution of prehistoric art, and has a profound impact on the later traditional Chinese culture and art [1, 2]. Majiayao painted pottery is unique among many painted pottery cultures N. Wang (B) Lanzhou Resources & Environment Voc-Tech College, Lanzhou 730021, Gansu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_45

397

398

N. Wang

with its mysterious and gorgeous patterns and rich spiritual connotation, which has pushed Chinese painted pottery culture to a peak [3, 4]. As pictures become an important carrier of network information, problems also arise. Traditional information materials are recorded by words. We can retrieve the content and process them by searching keywords. When the information is expressed by pictures, we cannot retrieve or process the information expressed in the pictures [5, 6]. Pictures have brought us a convenient way to record and share information, but it is difficult for us to use the information expressed by images. In this case, how to use computers to intelligently classify and recognize the data of these images is particularly important [7, 8]. This paper takes Majiayao colored pottery as an example to study the application of LeNet image classification algorithm in the creative design of new colored pottery, analyze the pattern of Majiayao colored pottery culture, the necessity of Majiayao cultural and creative product design, and use the image classification algorithm to discover. On the basis of the problems existing in Majiayao cultural and creative products, a questionnaire survey was conducted among people of different ages, and then a design strategy for Majiayao cultural and creative products was proposed.

2 Application of LeNet Image Classification Algorithm in the Creative Design of New Painted Pottery 2.1 The Ornamentation of Majiayao Painted Pottery Culture (1)

(2)

Water ripples and swirl patterns In the Majiayao culture type, its water ripples, swirl patterns and other patterns occupy the main position, and have different characteristics in different periods. Decorative patterns such as water ripples and whirlpools express the ancestors’ worship of water to the extreme. One of the reasons for this is that in ancient times, river water was an important resource for the survival of the ancestors. Gansu was the main location of Majiayao culture. Most of its land was dry land, and water resources became the lifeblood of agriculture. On the other hand, the flood of floods in ancient times caused fear among the ancestors. The primitive ancestors therefore believed that Yu Shui was the most supersacred existence in their hearts, and regarded water as a kind of god to worship and admire sincerely [9, 10]. Bird pattern The bird pattern in the Majiayao culture period is more abstract than the Yangshao culture period. The head of the bird is replaced by a dot, and the wings are gradually simplified into a line segment. The modern interpretation of the inner meaning of the bird pattern is that, on the one hand, “the pottery patterns from animal images to geometric patterns have the sacred meaning of a clan totem.” It is believed that the bird pattern represents the exclusive totem

Application of LeNet Image Classification Algorithm …

(3)

399

of the primitive clan and is a symbol of identity and spirit. On the one hand, the bird pattern is regarded as the reproductive worship of primitive ancestors. This article believes that birds are also regarded as the product of the primitive people’s understanding of nature and liberating their nature. The form of birds flying carefree and free in the sky made the primitive people yearning for it, and they also yearned to be like birds. They stepped into the sky just like children, which gave rise to the feeling of worship [11, 12]. Frog pattern, god-human pattern In terms of modern aesthetics, the frog patterns and god-human patterns in Majiayao painted pottery look very shocking. At first, the frog pattern of the Majiayao type period was a concrete and realistic style, and then gradually abstracted into a kind of “symbol.” In the Mid-Levels period, its style was more simplified and abstract, and a variant image of the combination of a frog and a person was born. The head of the frog was gradually replaced by a circle, and the colors alternated with black and red, which evolved into the god-human pattern. The academic point of view of the inner meaning of frog pattern and god-human pattern is reproductive worship. Frogs are amphibians with strong reproductive ability. In order to grow their tribes, the ancient ancestors had to multiply the population. The frog is thus regarded as a symbol of the womb of pregnant women. In addition, there is a saying that the worship of “gods”, due to frequent flooding during the horse factory period, floods as the biggest hidden danger affecting rural production and the lives of the ancestors feared the ancestors. But when the flood came, the frog, like an elf, was unharmed in the water and was at ease. The ancestors therefore placed their desire for life on the frog, hoping to be protected by the frog “god” to “manage” the water god, and the ancestors worshipped the frog as the “protector god”. The god of water was gradually replaced by the god of frogs, and this situation was constantly amplified in the later period.

2.2 Problems Existing in Majiayao Cultural and Creative Products (1)

Lack of individuality, serious homogeneity problem After feature extraction of Majiayao colored pottery cultural and creative products on the Internet through image classification algorithms, it is found that the number of Majiayao colored pottery cultural and creative products is relatively small, and most of the products are mainly modern reproductions of colored pottery. Lack of the design refinement of the ornamentation, or simply print the colored pottery ornamentation on pillows, bookmarks, postcards, cups and other carriers, the effect of the picture is slightly thin, and it is difficult to stimulate the public’s desire to buy. Our innovation in traditional culture does not only stop at simply copying elements, but also uses a variety of modern design techniques to deconstruct, simplify, exaggerate, and implant modern

400

(2)

(3)

N. Wang

fashion modeling styles, so as to improve the traditional cultural connotation. At the same time, it shows the personality of the times and actively follows the diverse aesthetic needs of the modern public. Insufficient culture After feature extraction of Majiayao painted pottery cultural and creative products on the Internet through image classification algorithms, it is found that most of the current Majiayao cultural and creative products are only covered with a layer of “painted pottery”, and they have not traced the roots to digging behind the patterns. The author believes that culturality is the soul of cultural and creative products. The process of shaping cultural and creative products is the process of elaborating culture. A good cultural and creative product needs to reflect the deep cultural connotation of culture all the time. There are many kinds of decorative subjects shaped by painted pottery, and there are rich emotional expressions behind it. The public’s consumption of cultural and creative products is not only the appearance and function, but also the attraction of the story behind it and the inner feelings. Obviously, it is difficult for a simple copy to arouse emotional resonance among consumers, and cannot satisfy the spiritual and cultural needs of consumers. We need to dig deeper into the cultural “implications” behind the Majiayao colored pottery patterns, and inject modern new thinking logic to tell consumers the meaning and feelings behind the cultural and creative products, which will produce the effect of empathy and let the public pass the products. Create an emotional link to the Majiayao painted pottery culture to increase the added value of the product. The visual performance lacks integrity The essence of cultural and creative design is to create a unique life wisdom, and it is a process of concretely beautifying abstract cultural concepts. After feature extraction of Majiayao painted pottery cultural and creative products on the Internet through image classification algorithms, it is found that the “redesign” of painted pottery has not constructed a unified visual system. Most of the products sold are designed and developed in a single piece. This makes the final visual effect of the product slightly fragmented and lacks some integrity. This article believes that we can use the method of constructing the brand visual identification system of Majiayao colored pottery to classify the overall cultural and creative design, so as to construct a series of design systems for the Majiayao colored pottery cultural and creative product series around different themes, so as to standardize. The visual performance of the product forms some special “buy points” to attract more consumer groups.

Application of LeNet Image Classification Algorithm …

401

2.3 Necessity of Majiayao Cultural and Creative Product Design (1)

(2)

(3)

The inheritability of Majiayao colored pottery cultural and creative products Always paying attention to the development of traditional culture is our duty and responsibility as the new generation of cultural youth. Majiayao painted pottery culture has been accumulated and sublimated for a long time, and it contains the ancestors’ cognition of human beings, the laws of nature, and the worship of life. The brand design of Majiayao painted pottery culture can promote the inheritance and wider dissemination of Majiayao painted pottery culture, and it will play an important role in promoting the development of Lintao into a cultural county and the development of cultural industries in Lanzhou and Gansu. The commercial nature of Majiayao colored pottery cultural and creative products With the rapid development of modern society and economy, brands have received extensive attention in many fields such as economy and culture, and various industries basically need brand image shaping and brand communication and promotion. “However, cultural industry enterprises and cultural products have strong cultural attributes and creative extension space. It is easier to find the integration point between products and consumers’ spiritual needs, and to establish an intimate relationship between consumers and brands.” With the promotion and dissemination of the Majiayao colored pottery cultural brand, related cultural products have gradually appeared in front of consumers, which can drive the economic development of related industries. The innovation of traditional elements as one of the ways of modern cultural consumption is very popular with consumers. The use of this commercial form can reflect the uniqueness of the Majiayao painted pottery culture and the potential value of its redesign. Innovativeness of Majiayao painted pottery cultural and creative products The Majiayao painted pottery is full of rhythm, movement and rhythm. It has unique artistic characteristics and traditional historical and cultural status, expressing the ancestors’ yearning for a better life. The pursuit of traditional culture by modern consumers is no longer limited to the functional needs of the brand itself, but pays more attention to the innovation of products. The types and patterns of Majiayao colored pottery are sorted, broken, and separated. Reorganize, refine, use imagination, exaggeration, break the established model, combine with modern design, while looking for innovative and unique new methods, keep up with the pace of the times to adapt to the changes in modern consumer psychology and aesthetic needs, and deeply explore horses. The cultural connotation of Jiayao colored pottery, continuous innovation, build the Majiayao colored pottery cultural brand system, focus on consumer experience and satisfaction, update and innovate the added value of Majiayao colored pottery cultural products, so that the Majiayao colored pottery culture. The

402

N. Wang

core is better embodied, and the goal of inheriting and developing Majiayao painted pottery culture in cultural and creative product innovation is realized.

2.4 LeNet Image Classification Algorithm In image processing, image convolution is also called image filtering. Generally, the convolution result of the convolution kernel (filter) w and f(x, y) in the image is: g(x, y) =

a b  

w(s, t) f (x + s, y + t)

(1)

s=−a t=−b

where a = (m − 1)/2 and b = (n − 1)/2.

3 Experiment 3.1 Questionnaire Design The questionnaire survey method is a basic and commonly used research method that uses an objective survey tool—the survey questionnaire to search for information through the issuance and recovery of the questionnaire. For the purpose of the research, based on the Johnson language learning knowledge and presentation questionnaire, the questionnaire of this article was developed. After revision and preliminary testing, the questionnaire was determined to be the official questionnaire supporting this article.

3.2 Process of the Questionnaire Survey This article investigates the Majiayao painted pottery culture and related derivatives in the form of questionnaires. The questionnaires are mainly distributed to consumer groups at all levels. The questionnaires are distributed through online platforms such as WeChat and Weibo. The investigation was carried out in the form of multiple aspects and multiple age divisions to investigate the degree of understanding of Majiayao painted pottery culture and derivatives. A total of 250 questionnaires were issued and 238 valid questionnaires were returned. Because this questionnaire is related to traditional culture, in order to ensure that people of all ages are involved in the survey, all age groups in this questionnaire are considered within the scope of the survey.

Application of LeNet Image Classification Algorithm …

403

3.3 Reliability Test of the Questionnaire In order to test the reliability and stability of the questionnaire, the variance of the questionnaire results was first calculated, and then the reliability of the returned questionnaire was tested by the method of “half-half reliability” test. Using formula (2) to calculate the reliability coefficient, the correlation coefficient of the questionnaire is r = 0.883. According to the theories and methods of modern scientific research, when the reliability of a test reaches 0.80 or more, it can be regarded as a test with higher reliability. The test results confirm that the questionnaire is reliable. S2 =

(M − X 1 )2 + (M − X 2 )2 + (M − X 3 )2 + · · · + (M − X n )2 n r = 1 − S 2 (1 − r1 )/Sn2 r=

(2) (3)

2rban 1 + rban

(4)

4 Discussion 4.1 Survey Results The questionnaire in this article sets up three questions, namely “How to buy Majiayao painted pottery cultural and creative products”, “The main factors affecting the purchase of cultural and creative products” and “Which type of cultural and creative

Others

Channel

Commodity Market Creative Life Pavilion Taobao Gift shop museum 0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

Percentage Over 55

41-55

26-40

15-25

Fig. 1 How to buy Majiayao painted pottery cultural and creative products

35.00%

40.00%

404

N. Wang

Table 1 The main factors affecting the purchase of cultural and creative products 26–40 (%)

41–55 (%)

Over 55 (%)

21

26

23

35

Practicality

16

28

31

28

Exterior

39

24

20

25

Fun

24

22

26

12

percentage

15–25 (%) Price

45% 40% 35% 30% 25% 20% 15% 10% 5% 0%

15-25

Clothing

stationery

26-40

41-55

Over 55

daily necessities

food

souvenirs

product

Fig. 2 Which type of cultural and creative products are more inclined to buy

products are more inclined to buy”. The data obtained is shown in Fig. 1, Table 1 and Fig. 2. The analysis and survey results show that the main factors that affect consumers’ purchase of cultural and creative products are: practicality, product price, product interest, and product appearance. Consumers are more inclined to buy cultural and creative products of daily necessities and clothing, and are also very interested in food products.

4.2 Design Strategy of Cultural and Creative Products (1)

Individual symbol design From an innovative point of view, Majiayao colored pottery elements are selected to create classics, and the product personality is expressed through the creation of classic elements. The design based on traditional culture should not simply borrow traditional totem patterns, but think about creativity in life practice, and convey a unique new image with modern visual language. The colored pottery elements are refined through subtraction from the complex to the simple design, the main characteristic symbols are retained and the deformation or exaggeration is processed, and the classic elements are used to express the

Application of LeNet Image Classification Algorithm …

(2)

405

personality of the product. It not only meets the modern aesthetic needs and personality changes, but also reflects the cultural connotation. The Majiayao colored pottery elements are accurately and clearly refined and cleverly used to design individual products with distinctive features. Emotional communication in sophisticated visual design The design process of Majiayao colored pottery cultural and creative products should pay attention to the sensory and psychological control of the audience consumers, adhering to the people-oriented design concept, and forming an emotional relationship with the audience through interesting, interactive and narrative design thinking. Interesting interactive design method: Innovative design is carried out through more subjective methods such as association, imagination, deformation, exaggeration, and flattening. When the audience produces pleasant surprises, they induce their behaviors and interact. The design of the Majiayao painted pottery symbol uses a fun and interactive design method, so that the audience can be more deeply impressed by the product. Narrative design method: that is, through a certain design form, convey the inner spiritual connotation that the thing wants to express. In modern media, there are many narrative forms of brand stories. In the process of promoting the Majiayao painted pottery cultural brand, it can be presented through the narrative method of text and the visual form of illustrations. The symbolic elements of Majiayao colored pottery show the production and lifestyle of the ancestors in the primitive period and the emotional expression of the ancestors. They are mainly narrative and presented in the visual form of hand-painted illustrations.

5 Conclusions Majiayao painted pottery culture is an ancient flower in China’s historical and cultural heritage. The development of China’s abundant traditional culture is a responsibility of our contemporary Chinese designers. The design of Majiayao colored pottery cultural and creative products is a long process. We need to base ourselves on the local national culture and grasp the cultural connotation while using modern design. Concept to create design works that meet the needs of the times and people, and continue to dig deeper, innovate, and make breakthroughs to create more excellent works. Acknowledgements Research on Creative Design of New Painted Pottery Decoration and Development of Cultural Creative Products (Number: Y2020B-04).

406

N. Wang

References 1. Wang Z, Bo D, Zhang L et al (2017) A novel semisupervised active-learning algorithm for hyperspectral image classification. IEEE Trans Geosci Remote Sens 55(99):3071–3083 2. Livieris I, Kanavos A, Tampakas V et al (2018) An ensemble SSL algorithm for efficient chest X-ray image classification. J Imaging 4(7):95 3. Saichandana B, Srinivas K, Kirankumar R (2016) Image fusion in hyperspectral image classification using genetic algorithm. Indones J Electr Eng Comput Sci 2(3):703–703 4. Jing-Shi R, Hai-Wei P, Peng-Yuan L et al (2016) Symmetry theory based classification algorithm in brain computed tomography image database. J Med Imaging Health Inform 6(1):22–33 5. Li K, Wang F, Zhang L (2016) A new algorithm for image recognition and classification based on improved Bag of Features algorithm. Optik—Int J Light Electron Opt 127(11):4736–4740 6. Alimjan G, Sun T, Liang Y et al (2018) A new technique for remote sensing image classification based on combinatorial algorithm of SVM and KNN. Int J Pattern Recognit Artif Intell 32(7):1859012.1–1859012.23 7. Hosseini L, Kandovan RS (2017) Hyperspectral image classification based on hierarchical SVM algorithm for improving overall accuracy. Adv Remote Sens 06(1):66–75 8. Sahlol AT, Yousri D, Ewees AA et al (2020) COVID-19 image classification using deep features and fractional-order marine predators algorithm. Sci Rep 10(1):15364 9. Liu K, Lu H (2020) Research on the design and development of animation cultural and creative products in Jilin Province under the internet big data. IOP Conf Ser Earth Environ Sci 619:012074 10. Zhang S, An Z, Su P et al (2020) Research on design of Tibetan cultural and creative products based on prototype theory. E3S Web Conf 179(7):02113 11. Fang J, Ma Y, Li Y et al (2021) Design and development of urban cultural and creative products with segment filling insertion. J Phys Conf Ser 1790(1):012032 12. Dai Y (2021) Digital art into the design of cultural and creative products. J Phys Conf Ser 1852(3):032042

Cost Management of Transmission and Transformation Project Based on GIM Technology Xin Liu, Lianyue Zheng, Yue Yang, and Guangliang Yang

Abstract Project cost management is the core link in the construction of power transmission and transformation projects. By introducing advanced technologies such as grid information model (GIM), Internet of things and big data, the accuracy, intuitiveness and sharing of cost management can be further improved, thus cost personnel can be reduced from heavy tasks. Furthermore, this could realize the real-time sharing of information such as cost review and settlement data, making the cost management process more refined standardized and streamlined. It is urgent to use GIM technology to build a more collaborative platform for cost management of transmission and transformation projects, which could realize the dynamic connection of cost management in the whole process, and form a complete visual cost management system. Keywords Big data · Power transmission and transformation engineering · Collaborative platform · GIM

1 Introduction With the development of the times, the traditional cost management method of power transmission and transformation projects has been unable to meet the requirements of intelligence. For example, the existing cost compilation relies on manual, which is time-consuming and laborious [1]. Additionally, because the cost management lacks the support of a big data platform, the problem of data island is serious [2]. In order to further improve the construction and management level of power transmission and transformation projects, it is necessary to use big data, grid information model (GIM) X. Liu · L. Zheng · Y. Yang State Grid Hebei Electric Power Company Cangzhou Power Supply Company, Cangzhou, Hebei, China G. Yang (B) School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_46

407

408

X. Liu et al.

[3] and other technological innovations. Building a new type of power transmission and transformation cost management coordination platform is the only way to realize the digital construction of power grid [4]. Since 2003, China has introduced the concept of building information model (BIM) system [5, 6]. This technology uses building information to build a threedimensional model, which enables others to obtain building design information intuitively. However, since BIM aims at single buildings, it still encounters some problems when used in the networked and cross-connected power transmission and transformation system. Therefore, GIM technology is proposed. This technology further absorbs geographic information data on the basis of BIM to realize the threedimensional visualization and information sharing of power transmission and transformation projects, which is the development direction of the field of construction engineering in the future. In response to the urgent needs of real-time tracking, data sharing, and collaborative management in the cost analysis of power transmission and transformation projects, this article uses GIM as the pointcut to expand its application in engineering volume, cost management, and cost auditing, making full use of its intuitiveness. With the characteristics of analyzability and shareability, a GIM-based collaborative platform for cost management of power transmission and transformation projects is proposed to reduce the heavy work of cost personnel and make cost information accurate and complete.

2 Technical Background of GIM GIM technology is based on various related information of power transmission and transformation projects. It establishes a parameterized model to make the project information complete and consistent. Now, GIM technology has been implemented in the design stage. In 2013, the State Grid Economic Research Institute issued the application guidelines for digital design of power transmission and transformation projects. In 2018, 8 standards were gradually released. The “three types, two networks, world-class” strategic goal based on the internet of things has been put forward. Therefore, building visual platform based on GIM will become an important research. Since there is currently no exchange standard and data expression applicable to the electrical equipment model of power transmission and transformation projects, the State Grid has formulated a corresponding interaction specification, that is, a GIM file in the format “*.GIM” [7], which mainly includes physical model, logical model, attribute set, component class and other parts. The attribute set mainly includes various engineering parameters, geometric parameters, graphic symbols, etc.; the component category mainly includes equipment, materials, buildings, etc.; the physical model describes the physical size and spatial location of each electrical device; the logical model describes The relationship between electrical equipments. The file structure of GIM is shown in Fig. 1. It can be seen that the GIM file contains

Cost Management of Transmission and Transformation Project …

409

Fig. 1 GIM file storage method

comprehensive information about power transmission and transformation projects, and provides important data support for the cost management of power transmission and transformation projects. GIM technology has the characteristics of three-dimensional simulation, data relevance and high reliability [8], making it a key technology project cost management. The three characteristics of GIM are introduced below. (1)

(2)

(3)

Three-dimensional simulation GIM includes comprehensive power transmission and transformation project data information, and can establish a visual three-dimensional model of the project, which fully reflects the true original appearance of the project construction, and meets the needs of the project, such as visualization, editability, and drawing. In addition, the checkers can easily view data changes through the three-dimensional model, making it possible to check the cost and graphic information, laying a solid foundation for the development of power project construction and operation management. Data relevance The cost data of traditional power transmission and transformation projects are stored in various systems, which leads to a lot of effort in cost preparation. In contrast, the use of GIM can combine the needs of all parties involved in the project and internal and external business needs, which is conducive to the study of the integration of cost data, material data, and financial data. Based on GIM, the establishment of the database is completed, and data collection can be completed by sharing data information on different platforms, so as to realize the continuous data flow of upstream and downstream businesses such as engineering quantity implementation and cost management. High reliability

410

X. Liu et al.

Applying GIM technology to power grid information platform will significantly improve data collection capabilities, and provide a key basis for decisionmaking in the full cycle of electrical equipment procurement and operation. Through the introduction of blockchain technology, the unique correspondence between equipment and model codes can be achieved, complete information traceability can be achieved, data barriers can be broken and malicious fleeing goods can be prevented, which provided engineering information security with reliable guarantees. In summary, GIM has the characteristics of simulation, relevance, and reliability. If there exists professional software which can generate cost data from *.GIM in one click, it will significantly improve the cost accuracy and reduce the workload of technical and economic personnel. Additionally, it liberates a large number of cost personnel from the heavy calculation work, which enables them to engage in more professional work such as cost consulting, etc. The GIM model of the designed engineering project is not limited to the application of engineering cost. Instead, it can also be used for the construction, management, operation and maintenance during the whole life cycle of the project. In addition, the accuracy of GIM data has reached a high level and integrates all relevant information of the construction project. In conclusion, GIM can realize the automatic calculation of engineering quantities and form a powerful structured database, thus providing a good platform for the cost calculation of engineering construction projects.

3 Project Cost Analysis Applying GIM to the cost management of power transmission and transformation projects to realize the “five calculations” of project cost [9] can be mainly divided into two steps: the first step is the calculation of engineering quantities. Since engineering quantity calculation is the basis of engineering cost calculation, and it has also become the key to the accuracy of cost results, it is of great importance to complete the design of the three-dimensional model of power engineering on the basis of GIM. The second step is to calculate the project price based on the result of the project quantity. According to the budget, a reasonable pricing rule needs to be established. Calculation component can be obtained by three-dimensional component through one-to-one or one-to-many mapping. The cost of each component is available through corresponding algorithms, and then forms the overall cost of the project, as shown in Fig. 2. The following two specific measures for cost management are analyzed: (1)

Circulation design of cost information model

As a complete information model, the GIM model connects data, processes and resources at different stages of the project life cycle. Making full use of the cost analysis function of GIM technology can realize automatic calculation of engineering

Cost Management of Transmission and Transformation Project … Three-dimensional design components

Mapping rule

Calculating component

cement pole

Concrete pole

steel pole

Steel pole

angle steel tower, steel pipe tower

Tower

Tower

Tower group

411

Foundation

One-to-one mapping

Insulator string

Corresponds to the base model

Insulator string Concrete Cast-in-place Digging fabricated foundation foundation foundation Cast-inPrecast pile Steel pipe place pile foundation foundation foundation

Fig. 2 Schematic diagram of tower group mapping

quantities, accurate acquisition of schedule engineering quantities, and dynamic analysis of costs. Before carrying out cost analysis, it is necessary to complete the construction of the cost model, and carry out the transfer of model information between different units. The transfer design of the cost information model between the main participating units is shown in Fig. 3. The creation of models is the first step. The design unit uses the model family library as the design standard, and creates the power engineering project model

GIM model family library

Design unit

GIM model of power engineering project

Owner's Unit

Consulting Service Unit

Construction unit

GIM consulting

GIM data application during construction

Plan comparison and investment analysis

GIM collision check

Construction schedule simulation based on GIM

Fig. 3 Diagram of project cost information model

Material supplier

Production of special prefabricated components

Operation and maintenance unit

Project operation management

412

X. Liu et al.

according to the specific requirements of the project construction, forming a power engineering project model that includes materials, geometric information and calculation budget rules. After that, the model is delivered to the responsible engineering unit for model review, and the design part of the GIM application in cost management is completed. Second, the circulation of the cost information model enters the main application stage and the operation and maintenance stage. The owner unit delivers the project model that meets the requirements. The construction unit uses the model to carry out the project construction management. The consulting service unit will screen the project construction plan, analyze the cost and guide the engineering construction. Equipment and material suppliers can produce special materials or equipment required according to model data and relevant parameters in model attributes. Third, when the project is completed, the final complete model of the project can be handed over to the operation and maintenance management unit to provide an effective data basis for subsequent operation, maintenance and management. (2)

Design of engineering cost process

Comparing the design of various costing processes, the process design of “design based on the GIM platform → GIM model → pricing software → bidding” is finally determined, which is shown in Fig. 4. This programme can avoid the emergence Fig. 4 Flow chart of project cost

GIM model family library

Design unit

GIM-based design software

GIM model of power engineering project

Owner's Unit

Whole process control

GIM calculation/price calculation software

Construction unit

GIM pricing software Simulation and control of the whole process Construction process control

Cost Management of Transmission and Transformation Project …

413

of “false GIM”, and realize the true value of the 3D building information model. This solution is the most ideal solution for the application of 3D technology in the field of construction project cost. The specific cost management process is as follows: The model design process uses GIM technology software and building information modeling technology to complete the calculation of project engineering quantities. Afterwards, the engineering quantities are imported into cost software developed based on GIM technology, so as to realize the calculation of project cost. The construction of the model in this scheme is the responsibility of the design unit. The design unit uses the GIM design software to design the power engineering project with reference to the model standard based on the model library. After the design is completed, the design unit is responsible for handing over the designed project to the owner, who will hand over the model to the construction unit for application in the construction process. In the process of construction management, the owner unit can use GIM to complete the calculation of the quantity and price of the project.

4 Cooperative Platform In order to form a good information flow in the project construction stage, it is necessary to fully study GIM technology and build a collaborative platform for cost management of power transmission and transformation projects. Therefore, the following three points should be achieved: First, from the perspective of project construction, it is necessary to ensure that GIM technology runs through the beginning to the end. Post-operation units should participate in the whole process to avoid the problem of repetitive operations [10]. According to the application characteristics of the three-dimensional information model, the project is divided into stages, and the cost management characteristics and focus of each stage are different. The cost characteristics of each stage are analyzed in a targeted manner, and the whole process cost control of the construction project is realized. The stage cost management is connected dynamically to form a complete visual cost management system. The system architecture of the 3D building model in the cost management not only includes the management of price and quantity, but also the project cost management in the entire construction process at all stages. A data integration layer is necessary to ensure that a large amount of data information of the building information model is transferred and shared properly between different software, different roles, and businesses. The data integration mainly includes material price information database, comprehensive unit price information database, standardized component database, and engineering cost index database. Second, it is important to study cost management system based on visualization. On one hand, the budget and actual costs should be counted correctly, so that the actual cost and the planned investment can be compared in time, which ensure that the cost target value is lower than the planned investment. On the other hand, completion settlement of the project in the completion stage should be studied according to the

414

X. Liu et al.

actual construction cost. In the completion settlement link, it is not only cumbersome to check the engineering quantity through 2D-CAD drawings, but also complicated for cost engineers of both parties to install the respective engineering quantity calculation books to check the components one by one. Additionally, if the discrepancy is large, the engineering quantity calculation needs to be carefully calculated from the source, which requires the data of the whole process. Since the traditional settlement method relies on human resources or spreadsheets, the cost data is often incomplete, and there are many inconveniences in modification. In order to realize the efficiency of settlement, it is necessary to strengthen the audit strength and transparency, and realize the 3D visualization of the audit through GIM. Third, making full use of the visual features of GIM in cost management and settlement costs. The use of GIM in settlement management can not only calculate engineering quantities accurately and efficiently, but also help to standardize and complete settlement data. At the same time, the GIM is also constantly adjusting, updating and perfecting its own database in the process of cost management. Since GIM has the feature of accuracy and automation, it can greatly speed up the settlement process. In summary, GIM technology is a powerful tool to realize a collaborative platform for power transmission and transformation cost management. We should take full advantage of the characteristics of GIM to improve the work efficiency of front-line managers, reduce the time for filling and checking engineering quantities, and further promote the digital construction of smart grids.

5 Conclusions GIM technology has the characteristics of three-dimensional simulation, data relevance and high reliability, and it has obvious advantages when applied to the cost management of power transmission and transformation projects. By establishing a sharing information platform, it is possible to ensure a good integration of the information flow and business flow in the project phase. In the future, it is still necessary to continuously introduce new technologies to promote better development of the informatization construction of power transmission and transformation projects.

References 1. Wu B, Liu W, Song Y et al (2020) Automatic verification method for clearance distance compliance of substation GIM model. Manuf Autom 42(03):48–52 (in Chinese) 2. Wei H (2020) Research on intelligent calculation of overhead transmission line based on GIM model. Sci Technol Innov 31:86–87 (in Chinese) 3. Zheng G (2020) Feasibility study on cooperative aided design of pile foundation based on GIM system. Fujian Archit Constr 10:96–100 (in Chinese)

Cost Management of Transmission and Transformation Project …

415

4. Song X, Du H (2020) Exploration of deduction of substation construction scheme using GIM technology. Sci Technol Innov 28:163–166 (in Chinese) 5. Sun R, He W, Hai H et al (2021) Application of BIM technology in construction and management of power grid substation project. Electr Equip Econ 03:36–39 (in Chinese) 6. Zhu W (2021) Application of bridge construction monitoring technology based on BIM. Shanxi Archit 47(13):109–110 (in Chinese) 7. Zhang H, Jia C, Geng S et al (2020) Exploration of substation techno economic calculation based on GIM 3D design results. Sci Technol Innov 36:97–98 (in Chinese) 8. Ding K (2020) Research on constructing smart grid information sharing platform based on GIM technology. China Plant Eng 02:33–34 (in Chinese) 9. Zhang H, Jia C, Geng S et al (2020) Exploration of technology and economic calculation of substation based on GIM 3D design results. Sci Technol Innov 36:97–98 (in Chinese) 10. Luo K (2020) A collaborative platform for smart construction of power transmission and transformation projects based on BIM technology. Fujian Hydropower Gener 01:38–42 (in Chinese)

Marketing Strategy Innovation Based on Mobile Internet Technology Lin Shan

Abstract The birth and development of mobile Internet has brought about great changes in the marketing environment. Based on the comprehensive arrival of the mobile Internet era and the mobility and wide spread of mobile Internet, the threshold for the public to receive information through mobile terminal devices has been lowered, and the participation degree and participation mode of marketing communication activities have been changed, marketing communication under traditional media is gradually eliminated by enterprises and consumers in the era of mobile Internet. Facing the rapid development of mobile Internet, enterprises gradually transfer marketing channels from traditional media to mobile Internet, and mobile Internet has become a new marketing territory. This paper mainly studies the marketing strategy (MS) innovation based on mobile Internet technology (MIT). Based on the innovative marketing thinking of mobile Internet, this paper puts forward the corresponding MS. Internet MS innovation takes users as the core, big data as the support, and social media as the carrier to achieve measurable communication effect, accurate marketing channels, and reshape the relationship between marketing and communication parties. It also expounds the measures of MS under the MIT. According to the MIT, this paper uses data mining to analyze the scale of Internet users in China, and statistics the basic information scale of consumer groups targeted by mobile internet marketing from gender, age and income. The results show that marketing innovation can focus on the consumption taste structure of young people, and the consumption of marketing products can be controlled within the range of 3000–4000 yuan. In the aspect of mobile internet marketing, the main Internet consumption assistance is in the two age groups of 20–29 and 30–39, among which women are the main consumption force. The main income structure of mobile Internet users is 3000–4000 yuan. Keywords Marketing management · Mobile Internet · Strategy innovation · Marketing communication L. Shan (B) Dalian University of Science and Technology, Dalian 116052, Liaoning, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_47

417

418

L. Shan

1 Introduction In the Internet era, traditional industries will eventually be transformed into MIT based industries. The key to Internet marketing innovation is to effectively explore the related behaviors of related users through data mining. With the change of market environment and the rapid change of marketing media, it is more urgent to collect information while collecting information, improve the quality of service and realize win–win situation between enterprises and consumers [1–6]. These problems are all the problems that need to be considered in the innovation of mobile internet MS. In the era of mobile Internet, marketing not only relies on random analysis to study local data, but also uses all the data left by customers to analyze the whole sample. Therefore, the thinking of big data on the Internet will respond to the rules more comprehensively and objectively, so as to maximize the accurate information and realize accurate marketing, and also more forward-looking [7, 8]. The enterprise accumulates and studies customer data continuously with the thinking of mobile Internet, thus guiding the market orientation of products, clarifying the competitive advantages of enterprises and forming effective marketing and development decisions, fundamentally changing the relationship between the two parties and subverting the traditional MS [9, 10]. In the research of MS innovation based on MIT, many scholars at home and abroad have made some research results. Schuhmacher M. C. and others pointed out that the advantage of the Internet is that it can provide massive data and information. By combining free products and services, simple and easy to operate participation process, low learning threshold and quick access to relevant products and services in the market, enterprise products can break through the existing market capacity and price ceiling and expand the market scale [11]. Costa J. C. N. D. and others pointed out that the marketing information communication form based on mobile Internet breaks the single communication form in traditional media marketing activities, and more presents the characteristics of real-time interaction, focusing on in-depth communication and experience. From the perspective of the rise of social media platform and audience psychology, users’ expectation of being valued and communicating, and their demand for active participation and timely response are increasing [12]. This paper mainly studies the MS innovation based on MIT. Based on the innovative marketing thinking of mobile Internet, this paper puts forward the corresponding MS, platform thinking to build production and marketing alliance strategy, flow thinking to achieve customer incremental strategy, big data thinking to help precision MS, social thinking to expand marketing communication channels, search engine to improve the arrival rate of marketing communication. Internet MS innovation takes users as the core, big data as the support, and social media as the carrier to achieve measurable communication effect, accurate marketing channels, and reshape the relationship between marketing communication parties. This paper expounds the measures of MS under the MIT, strengthens the brand image, avoids excessive marketing, combines online and offline, improves the product experience, takes the

Marketing Strategy Innovation Based on Mobile …

419

consumer as the guidance, establishes long-term association, accurate marketing positioning, and enriches the forms of communication.

2 MS Innovation Based on MIT 2.1 Innovative Marketing Ideas Based on Mobile Internet (1)

(2)

(3)

Strategy of building production and marketing alliance by platform thinking Platform business model refers to a business model that connects two or more specific groups, provides interaction mechanism for them, meets the needs of each group, and realizes profit from it. There are two principles of platform business profit model: first, the network effect stimulated by the complementary needs of various groups is the foundation of platform business profit model. Therefore, the platform must set up interest barriers, grasp the core factors of connecting the needs of all parties. It is not only a link in the linear single value chain, but also the biggest difference between the platform and the traditional enterprise operation mode. Platform enterprises integrate value, connect multilateral groups, and dominate the ecosystem. It can be seen that platform thinking has broken the vertical system of traditional business competition, and transformed the chain like industrial model into a threedimensional network structure. On this basis, all stakeholders have become important nodes in the network, emphasizing competition and cooperation, interaction and mutual benefit. Flow thinking to realize customer increment strategy The advantage of the Internet is that it can provide massive data and information, and traffic is also the source of value pursued by the Internet industry. The combination of free products and services, simple and easy to operate participation process, low learning threshold and quick access to relevant products and services in the market can make enterprise products break through the existing market capacity and price ceiling and expand the market scale. It can be seen that the thinking of traffic is an important thinking path for the marketing reform of real estate enterprises in the Internet era. In the information age, more and more businesses realize that only by obtaining customers’ traffic through free and low payment and forming customers’ consumption habits can they continuously form positive accumulation of reputation and create a stable customer base for marketing. Big data thinking helps precision MS In the Internet era, traditional industries will eventually turn into big data based industries. From the perspective of big data itself, it is the key of Internet marketing to effectively mine the related behaviors of associated users through data mining. The traditional data analysis usually takes the way of sampling collection, but in the era of big data, marketing will not only rely on random

420

(4)

(5)

L. Shan

analysis method for local data research, but also use all the data that can be collected by customers for full sample analysis. Therefore, the thinking of big data will reflect the law more comprehensively and objectively, which can maximize the access to accurate information, achieve precision marketing, and also be more forward-looking. With the thinking of big data, enterprises continuously accumulate and study customer data, so as to guide the market positioning of products, clarify the competitive advantages of enterprises, and form effective marketing and development decisions. Socialized thinking expands marketing communication channels The control power of traditional media is dispelled, and the content is king in the era of new media, forming a new way and channel of advertising communication. Social media makes the information dissemination channels present a large network connection, reshaping the communication relationship between enterprises and users in an interactive way. In the Internet era, social media is the main battlefield of marketing, and it is a marketing activity that spreads information and interactive activities through Internet channels such as micro-blog, official account, friends circle and other social networking platforms, including marketing communication, customer maintenance and public relations. Search engine improves the arrival rate of marketing communication In order to improve the arrival rate of marketing communication information, enterprises use the search engine function of the portal website to improve the search ranking position and highlight the relevant information of enterprises through bidding ranking, so that customers can see the relevant information of businesses more likely when searching the corresponding keywords.

2.2 Mobile Internet MS (1)

(2)

Strengthen brand image and avoid over marketing Brand, like an invisible business card, can play a preconceived role in consumers’ choice of products. Consumers’ recognition of brands will make consumers become loyal users of enterprises. Brand image building is partly to let consumers recognize the enterprise, on the other hand, it is also to avoid the situation that it is difficult to be accepted again in the process of new product promotion. Excessive marketing not only can not increase the brand favor, but also damage the original acceptance of consumers. For example, in momentum marketing, hot spot tracking is beneficial for consumers to shift their attention from topic to product. However, taking advantage of some time nodes and events will reduce the original brand image, and also make consumers feel tired and marketing consumers’ purchase behavior. Combine online and offline to improve product experience Mobile Internet brings obvious advantages in online marketing, but pure online marketing lacks experience link. Consumers’ trust in products may be reduced due to the lack of experience in online communication, so they can get

Marketing Strategy Innovation Based on Mobile …

(3)

(4)

421

through online and offline to improve the experience of purchasing process. To lay out offline, enterprises need to enhance their ability to operate offline sales channels and ensure the stability of prices online and offline. Only in this way can they have more advantages in offline layout and promote online and offline complementarity. To establish long-term relationship with consumers In the mobile Internet environment, the impact of consumers on the marketing effect is gradually increasing, but also adds uncertain factors to the loyalty of enterprises, and enterprises are in a passive position in the market. No matter what enterprise, stick to the past seller’s market will be abandoned by consumers. Therefore, the establishment of consumer oriented marketing concept, through the continuous interaction and mutual concern between enterprises and consumers, can win the market. Accurate positioning of marketing and rich forms of communication Marketing positioning is mainly reflected in the operation of users and channels. Different enterprises have different products, corresponding to different consumer groups. Only when enterprises find the target group according to their own positioning and product characteristics can they complete the image label of consumer groups, so as to lay the user foundation for the subsequent marketing activities. Mobile Internet brings the diversification of marketing channel selection. Users of different channels have different identity tags. In the marketing process, they need to choose the corresponding marketing channels according to the characteristics of different users. Enterprises should explore the distribution of users in each communication channel, and should not advocate the publicity method of spreading the net in a large area in the past, but should use the mobile Internet to produce the effect of 1 + 1 > 2.

The richness of communication forms is reflected in two aspects. One is the diversity and interest of content. Since the Internet era, words, pictures, audio and video can be presented in new media, and the diversity and interest of communication content can be presented more easily. Under the advantage of new media, we should make full use of this advantage to spread more interesting and meet the needs of the audience; the second is the diversity of marketing forms, whether it is word-ofmouth marketing, event marketing, leverage marketing or fans marketing, a variety of marketing forms combined to reduce user participation fatigue, and constantly make new marketing communication to stimulate consumers’ perception of the brand.

2.3 Marketing Algorithm Formula Mobile internet marketing not only brings good results and benefits to enterprises, but also greatly reduces the marketing costs of enterprises. As long as enterprises have good products and content, they may obtain a large number of users at low cost or even zero cost. The efficient arrival rate and feedback rate of mobile Internet enable

422

L. Shan

enterprises to adjust and optimize marketing strategies in time to further reduce costs, the marketing effect formula is as follows: M S = (P V /40 + 2 ∗ I + 10 ∗ SV = 18 ∗ F) ∗ C O I ∗ PCC/T C

(1)

That is, marketing effect = (exposure/40 + interaction * 2 + sales * 10 + fans * 18) * industry coefficient * communication channel coefficient/input cost. The overall evaluation of marketing effect is also the overall evaluation of the whole marketing activities. In addition, the marketing revenue formula is as follows: M GV =

n 

Si ∗ PCC +

i=1

n 

BEj ∗ PIC

(2)

j=1

The calculation of enterprise marketing revenue can make clear the revenue brought to the enterprise after the marketing expense is invested, and store the data after the marketing behavior can reasonably evaluate the effect of enterprise marketing investment.

3 Experimental Study 3.1 Subjects This paper studies the marketing innovation strategy under the MIT. Starting from the mobile Internet, this paper collects and integrates the structural information of the current Internet users through data mining technology. Aiming at the statistics of the basic information scale of the consumer groups targeted by the mobile internet marketing, this paper makes a specific analysis from three aspects of gender, age and income.

3.2 Experimental Process Steps In this paper, data mining is used to analyze the information scale of Internet users under the MIT, to make statistics on the information of Internet users, to understand their gender composition, age structure and income structure, and to formulate corresponding marketing strategies according to the main consumption structure of Internet users. Based on the innovative marketing thinking of mobile Internet, this paper puts forward the corresponding MS. Internet MS innovation takes users as the core, big data as the support, and social media as the carrier to achieve measurable communication effect, accurate marketing channels, and reshape the relationship

Marketing Strategy Innovation Based on Mobile …

423

between marketing and communication parties. It also expounds the measures of MS under the MIT.

4 Experimental Research and Analysis of MS Innovation Based on MIT 4.1 The Scale of Mobile Internet Users The premise of mobile internet marketing needs to investigate the market, consumer data and per capita consumption to get the optimal marketing reference. According to the MIT, in the context of the Internet, data mining is used to analyze the scale of Internet users in China, and the basic information scale of consumer groups targeted by mobile internet marketing is calculated. The information scale of this paper is analyzed from three aspects: gender, age and income. The data results are shown in Tables 1 and 2. As can be seen from Fig. 1, in terms of mobile internet marketing, the main Internet consumption assistance is in the two age groups of 20–29 years old and Table 1 Analysis on the age structure of male and female mobile Internet users < 10

10–19

20–29

30–39

40–49

50–59

> 60

Man

1.14

8.42

10.54

6.09

3.47

1.15

0.43

Woman

2.16

11.18

19.56

17.31

9.73

5.05

3.77

Table 2 Analysis on the income structure of men and women of mobile Internet users 0

< 1000

1000–2000

2000–3000

3000–4000

4000–5000

> 5000

Man

2.13

Woman

3.07

13.71

7.07

11.35

13.68

6.54

3.17

6.79

6.33

6.35

9.52

6.56

3.73

Fig. 1 Analysis on the age structure of male and female mobile Internet users

424

L. Shan

Fig. 2 Analysis on the income structure of men and women of mobile Internet users

30–39 years old, among which women are the main consumers. As can be seen from Fig. 2, among the main income structure of mobile Internet users, the number of people in the range of 3000–4000 yuan is the most. Therefore, marketing innovation should focus on the consumption taste structure of women and young people, and the consumption of marketing products should be controlled in the range of 3000–4000 yuan.

5 Conclusions Mobile internet marketing not only brings good results and benefits to enterprises, but also greatly reduces the marketing cost of enterprises. It has a series of advantages, such as wide range of marketing communication, fast communication speed, large audience scale, low production cost, unlimited time and space, strong interaction and pertinence. For the marketing activities of enterprises under the background of mobile Internet, It is not only a new development opportunity, but also a new challenge. Through the research of MS innovation based on MIT, this paper provides the corresponding theoretical basis for the research and practice of marketing innovation strategy, which has certain practical significance.

References 1. Newman C, Shankar R, Hanna J et al (2016) Developing an evidence-based epilepsy risk assessment ehealth solution: from concept to market. JMIR Res Protoc 5(2):e82 2. Duque EB, Dutra RL (2016) Un sistema de inductores para la innovación en el contexto de organizaciones colombianas. Cuadernos Latinoamericanos de Administración 8(14):83 3. Hao S, Song M (2016) Technology-driven strategy and firm performance: are strategic capabilities missing links? J Bus Res 69(2):751–759 4. Kuester S, Konya-Baumbach E, Schuhmacher MC (2018) Get the show on the road: go-tomarket strategies for e-innovations of start-ups. J Bus Res 83(1):65–81

Marketing Strategy Innovation Based on Mobile …

425

5. Yu W, Ramanathan R, Nath P (2016) Environmental pressures and performance: an analysis of the roles of environmental innovation strategy and marketing capability. Technol Forecast Soc Chang 11(7):160–169 6. Grbosz-Krawczyk M, Pointet JM (2017) Co-branding strategy as a source of innovation on international market. Nephron Clin Pract 9(3):63–77 7. Syapsan (2019) The effect of service quality, innovation towards competitive advantages and sustainable economic growth Marketing mix strategy as mediating variable. Benchmarking 26(4):1336–1356 8. Salunke S, Weerawardena J, Mccoll-Kennedy JR (2019) The central role of knowledge integration capability in service innovation-based competitive strategy. Ind Mark Manag 76(1):144–156 9. Kashmiri S, Nicol CD, Arora S (2017) Me, myself, and I: influence of CEO narcissism on firms’ innovation strategy and the likelihood of product-harm crises. J Acad Mark Sci 45(3):1–24 10. Jeng JF, Pak A (2016) The variable effects of dynamic capability by firm size: the interaction of innovation and marketing capabilities in competitive industries. Int Entrep Manag J 12(1):115– 130 11. Schuhmacher MC, Kuester S, Hultink EJ (2018) Appetizer or main course: early market vs. majority market go-to-market strategies for radical innovations. J Prod Innov Manag 35(1):106– 124 12. Costa JCND, Shirlei Miranda C, Ana Maria MT et al (2018) The role of marketing capabilities, absorptive capacity, and innovation performance. Mark Intell Plan 36(4):410–424

5G Technology Promotes the Coordinated Development of E-Commerce and Regional Industries in the Guangdong-Hong Kong-Macao Greater Bay Area Zhongming Chen and Xiufang Qiu Abstract The Guangdong-Hong Kong-Macao Greater Bay Area has experienced more than 40 years of development since the reform and opening up, and has achieved remarkable economic achievements. With the emergence of 5G technology, e-commerce has ushered in a new wave of development, which has in turn promoted the transformation and upgrading of e-commerce. This paper systematically analyzed the status quo and existing problems of the coordinated development of industries and e-commerce in the Greater Bay Area, focusing on how 5G technology can achieve the coordinated development of e-commerce and regional industries, and proposed the development path of business and industrial economy of “5G+” electronics in a targeted manner. From three dimensions (empower the e-commerce industry by “5G+”, and achieve three “upgrades” through three “strengthenings”; the support system construction of the Greater Bay Area accelerating the coordinated development of the two; government departments enhance the promotion and policy guarantee for the application of 5G technology), the paper formulated optimization countermeasures and model suggestions, which can give full play to the advantages of 5G technology, and promote the development of e-commerce in the Guangdong-Hong Kong-Macao Greater Bay Area. Keywords 5G technology · E-commerce · Guangdong-Hong Kong-Macao Greater Bay Area · Regional industries

Z. Chen (B) · X. Qiu Economy and Trade Department, Guangdong Polytechnic of Industry and Commerce, Guangzhou, Guangdong Province, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_48

427

428

Z. Chen and X. Qiu

1 Introduction On June 6, 2019, the Ministry of Industry and Information Technology issued 5G (fifth generation mobile communication technology, hereinafter referred to as 5G) commercial licenses to China Mobile, China Telecom, China Unicom, and China Radio and Television, marking China’s official entry into the 5G era. With the advent of 5G, e-commerce is constantly innovating and evolving. Relying on 5G technology, e-commerce, with its interoperability across time and space, precise connection of consumer demand and commodity production, has promoted the adjustment of the market supply-side structure, reduced the initial cost, and promoted the transformation of the sales structure, and further promoted the improvement of the e-commerce industry chain. The inherent advantages and convenient conditions of e-commerce provide a good opportunity and breakthrough for the industrial development of the Guangdong-Hong Kong-Macao Greater Bay Area. In recent years, under the policy atmosphere of “ecommerce prospering the city”, the industry in the Greater Bay Area has developed by leaps and bounds, and has further promoted the transformation and upgrading of the industrial consumption structure and production structure. The emergence of 5G technology brings opportunities to the coordinated development of e-commerce and the Bay Area industry, but also brings huge challenges. How to realize the innovative and coordinated development of the two through the application of 5G technology is particularly important (Figs. 1, 2, 3 and 4).

Fig. 1 Panorama of 5G application. Source Roland Berger

5G Technology Promotes the Coordinated Development …

429

Fig. 2 Analysis mason, 2018. Source China—5G launch timeline

Fig. 3 The influence of intergenerational changes in communication technology on the form of media content. Source Tencent, Orient Securities

Fig. 4 5G-enabled industry digitalization revenues for ICT players, 2026. Source Ericsson and Arthur D.Little

430

Z. Chen and X. Qiu

Fig. 5 Video live broadcast of 5G application scenarios. Source Huawei Wireless X Labs

2 5G Technology Helps E-Commerce Innovation and Upgrading 2.1 5G Helps E-Commerce Realize Technological Innovation In the 5G era, e-commerce innovation and upgrading are mainly through the integration of 5G technology and related industrial technologies to enhance consumer shopping experience. Reflected in the following aspects: “5G+Ultra HD Video”: 5G accelerates the industrialization of UHD video. Taking Taobao as an example, the outlet has been converted from graphics to short videos and then to live broadcasts. In 2020, Taobao live broadcasts have exceeded 400 billion yuan, and the number of live broadcasts has exceeded 40 million [1]. “5G+ VR&AR”: 5G further combines VR/AR technology to directly realize online virtual experience and enhance consumers’ shopping experience. “5G+artificial intelligence”: 5G accelerates the Internet of Things. With the rise of artificial intelligence, it has changed the trend of e-commerce operations. The emergence of new forms of ecological consumption such as smart logistics, unmanned retail, and mobile payment has brought consumers brand-new consumer experience [2] (Figs. 5 and 6).

2.2 5G Helps E-commerce Realize Technological Innovation High-quality creative content under the background of 5G technology will bring huge traffic. Users’ demand for professional, vertical, and personalized high-quality content will be a new demand under the background of 5G technology. 5G technology gives users more creative space and lower release threshold, giving full play to the creativity of users. Through the integration and application of 5G and cloud

5G Technology Promotes the Coordinated Development …

431

Fig. 6 5G+AR/VR multiple application scenarios. Source China mobile

computing, big data, artificial intelligence and other technologies, it will be able to achieve the accuracy of content recognition more efficiently, present more accurate content information to users, stimulate users’ desire to consume, increase user stickiness, and bring more and more accurate users for e-commerce enterprises. The higher requirements of users for content will surely stimulate the enthusiasm of content creators and achieve continuous content output and continuous improvement in quality.

2.3 5G Helps E-Commerce Achieve Operational Innovation In the 5G era, the innovation of e-commerce operations is mainly reflected in three aspects: diversified channels, vertical operations, and closed-loop social economic consumption [3]. In terms of operating channels, diversification will be a characteristic of the 5G era. E-commerce uses new media such as “WeChat, Weibo and news clients”, short videos, H5 and other new media to realize all-round and multichannel dissemination of information and information to stimulate the potential of e-commerce. In terms of vertical operation, more and more companies choose more in-depth and detailed vertical market. 5G technology helps to achieve customized and personalized vertical operations in the field. They can solve the problem of subdivision scenarios through different functions for specific scenarios provided by AI. In terms of community economic operations, 5G technology accelerates big data analysis to achieve user tagging, precise positioning and management of community users, and a flat operating model that transforms a single business profit model into a diversified model, forming a closed-loop consumption.

432

Z. Chen and X. Qiu

3 The Status Quo of Regional Industry Development in the Guangdong-Hong Kong-Macao Greater Bay Area Since the State Council issued the Outline of the Development Plan for the Guangdong-Hong Kong-Macao Greater Bay Area in February 2019, the cooperation between Guangdong, Hong Kong and Macau has moved from the “Version 1.0 of the Front Store and the Back Factory” and the “Version 2.0 under the CEPA Framework” to the “Version 3.0 Coordinated Development of the Greater Bay Area”. The Guangdong-Hong Kong-Macao Greater Bay Area has undertaken the important task of opening up a new pattern for the country’s reform and opening up to a new stage. The main features of the Guangdong-Hong Kong-Macao Greater Bay Area economy are: one country, two systems, national development strategy, superior geographical location, strong economic foundation, strong economic vitality, high degree of openness, outstanding innovation genes, abundant supply of talents, and gradual increase in leading enterprises. New technology is the core to drive growth, and it has become the new “main force” to support the high-quality development of Guangdong’s economy. The total GDP created by the Greater Bay Area in 2019 is 11.59 trillion. Economic benefits are an intuitive manifestation of the regional industrial economy. The Greater Bay Area has gradually transitioned to a service economy and pursued an innovative economy. Although the industrial structure of the Guangdong-Hong Kong-Macao Bay Area is highly complementary and the economic ties are also very close, overall, the current industrial synergy in the Guangdong-Hong Kong-Macao Bay Area is still at a low level, mainly due to the following problems: The level of economic development among cities in the Pearl River Delta is unbalanced; industrial development planning and development positioning lack coordination; interest and communication and coordination mechanisms are imperfect; the free flow of production factors is restricted, etc. Therefore, how to strengthen the development of industries in the Guangdong-Hong Kong-Macao Greater Bay Area has important practical significance for enhancing the competitiveness of industries in the Bay Area and promoting its formation of a new pattern of full opening.

4 The Status Quo of Coordinated Development of E-Commerce and Regional Industries In the era of rapid development of e-commerce, analysis from the three dimensions of production factors, market conditions, and regional enterprise cooperation and competition reveals that e-commerce effectively promotes knowledge spillover effects in regional industries and helps industries quickly respond to the market, expand the capacity of the market, and integration of regional resources, thereby enhancing the level of cooperation among enterprises in the region, increasing the intensity of competition in regional industries, and spurring enterprises to innovate.

5G Technology Promotes the Coordinated Development …

433

The transformation and upgrading of the industry through e-commerce is to change the way of thinking and doing things, expand the channels, rather than subvert the traditional industry. Therefore, its transformation path is based on the original industrial culture, brand effect and resource advantages, using Internet technology and information sharing to collaborate, innovate and integrate in the entire link of product design, manufacturing to sales, thereby reducing costs and expanding marketing channels, looking for new profit growth points. In addition, although regional industries actively promote the development of e-commerce, there are still implementation problems such as inability to provide effective promotion and supervision. What’s more, there are still problems in the construction of e-commerce such as lack of planning, backward warehousing and logistics and public facilities construction, and single application channels, which has restricted the development of e-commerce by enterprises in the region. Therefore, the coordinated development model of “e-commerce + regional industry” should be actively constructed.

5 5G Technology Promotes the Coordinated Development Path of Industries and E-Commerce in the Bay Area 5.1 “5G+” E-Commerce Strengthens the Construction of an Ecosystem for the Coordinated Development of the Two With the rapid development of e-commerce, it is an inevitable choice for industries in the Guangdong-Hong Kong-Macao Greater Bay Area to move from offline to online. At the same time, the advent of the 5G era has opened up a new path for the e-commerce of the Bay Area industry. To explore a “5G+” e-commerce path suitable for the healthy development of the industry, it is necessary to adhere to the three “strengthenings” to achieve the three “upgrades” and build a sustainable development ecosystem.

5.1.1

Strengthen the Blessing of Industrial Technology and Enhance the Consumer Experience

Marshall McLuhan’s “Media is Information” theory believes that the real message is a constantly evolving and changing medium. The new paradigm brought about by the upgrading of media technology is changing the way society spreads and receives information, and reshapes the relationship between people, things and society [4]. In the context of 5G network acceleration, faster loading speed can achieve a substantial improvement in video quality. VR technology and short videos can make the display of products more diverse and in-depth, allowing users to have an intuitive

434

Z. Chen and X. Qiu

Fig. 7 Global VR/AR shipments. Source IDC, Orient Securities

experience of the product, and better present products’ selling point and performance. For example, taking the traditional automobile industry in the Bay Area as an example, FAW-Volkswagen Foshan Branch has carried out online live broadcasts to call brands through TikTok, and let users experience the charm of the product immersively through a variety of H5 interactive promotion. It also cooperated with the live broadcast anchor of Taobao to conduct car sales, which created a new era of e-commerce in the automotive industry (Fig. 7). Industries in the Bay Area need to constantly try new technology applications to enhance users’ cultural consumption experience. Through industry research and analysis, it can be seen that the industries in the Bay Area can combine their own characteristics, transform the original traditional e-commerce model, create a clearer and more intuitive, immersive shopping environment through the “5G+” e-commerce model, and give full play to the advantages of the “5G+” e-commerce. The high-speed and low-latency characteristics of the 5G era will significantly improve the response speed of digital devices, present different e-commerce shopping scenarios to users, and realize various scenarios from construction, connection to sharing. At the same time, the personalized needs of users are more important. It is necessary to fully understand users, establish more detailed user portraits, push and match the most suitable products and corresponding scenarios, increase the depth of user experience products, and enhance consumer experience. By these strategies, an innovative development model of “5G+” e-commerce in the Bay Area industry can be formed and the previous single e-commerce sales model can be changed.

5G Technology Promotes the Coordinated Development …

5.1.2

435

Strengthen Marketing and Promotion Layout, Improve Communication Efficiency

The industries in the Guangdong-Hong Kong-Macao Greater Bay Area seeking ecommerce development must rely on a wide range of marketing camps. Traditional and single methods cannot meet the current requirements of “5G+” e-commerce, which will limit the innovative development of industries. From the perspective of current industrial marketing and promotion, there are two shortcomings: First, the communication method is still at the level of traditional media. Although relevant information is released through WeChat official accounts, it is mainly based on traditional media such as website news and newspapers. The second is that there is no core in dissemination, which only promotes the product itself, and does not carry out targeted user demand analysis with user portraits, so as to match the most suitable marketing scenarios. The industry in the Bay Area needs to establish a convergent media communication system. 5G technology will help the industry to innovate in a wide-ranging and indepth layout of all media, reach users through more communication channels, realize further iterative optimization of existing media forms, and emerge new media forms. Among them, shared “cloud” media forms will be large emerged [5]. The industry can use cloud media to enable users to experience an immersive product experience on any terminal and in any scene. 5G also accelerates the efficiency of information processing, and industry-related copywriting and product display will achieve scale and collectivization. At the same time, the combination of online and offline will also be more conducive to industry communication. It can not only continue to develop through offline forms such as brand naming, product exhibitions, and experience activities, but also release product information through “WeChat, Weibo, news clients”, conduct social linkage through short video platforms such as TikTok, One Smile, and Douban, and explain and interact deeply through Taobao and Douyin live broadcast, so as to attract more user groups’ attention. Some industries in the Bay Area can also be used to become the latest online celebrity “check-in” hotspot. In addition, industries relying on “5G+” e-commerce need to have in-depth communication with users, forming emotional resonance with users through event marketing, emotional marketing, word-of-mouth marketing and other modes, conveying the core and essence of products, and cultivating high-viscosity products fans.

5.1.3

Strengthen the Training of Compound Talents and Enhance the Vitality of the Industry

By starting from the cultivation of human capital, the problem of shortage of industrial e-commerce talents is solved. Through visits and investigations to some industries in the Greater Bay Area, it can be seen that most of the practitioners in many industries lack e-commerce-related knowledge. Taking traditional manufacturing companies in the Bay Area as an example, due to the late start of the application of e-commerce, it is relatively difficult to carry out systematic teaching for current practitioners, but it is

436

Z. Chen and X. Qiu

possible to selectively carry out practical e-commerce training programs to help them understand e-commerce. The development trend of the business industry, the application of 5G technology, and the direction of e-commerce that are compatible with the industry, such as the development of “5G+” e-commerce applications in manufacturing companies, e-commerce live broadcasts, community marketing and other content lectures. “5G+” e-commerce will have a long-term impact on the careers of employees and the innovation and development of the industry. Starting from universities to cultivate compound talents is more conducive to the future development of the industry. In addition to e-commerce majors, the curriculum of many colleges and universities are mainly arranged around related industries. Taking into account the continuous changes of current new technologies and the innovative development of e-commerce, in order to meet the needs of the development of the times, it is recommended to add e-commerce related courses and use them as elective courses to facilitate the study of other majors who want to engage in the e-commerce industry and cultivate compound talents. In addition, it is also possible to selectively carry out university-enterprise cooperation for companies with e-commerce business to help students understand the new trend of e-commerce such as live broadcast, short video marketing, and content marketing with the influence of the current 5G technology and cloud computing, artificial intelligence, and big data, and broaden the e-commerce vision of ceramic art students.

5.2 The Bay Area Industry Accelerates the Construction of a Supporting System for the Coordinated Development of the Two 5G means that the era of rapid information transmission is coming. E-commerce based on 5G technology will make competition among enterprises more intense. Relying on regional advantages, industries in the Guangdong-Hong Kong-Macao Greater Bay Area can be explored from the following two aspects:

5.2.1

Build a “5G+” Multi-channel Co-construction Mechanism

Realizing the coordinated development of industries in the Bay Area must be based on the prerequisite of unifying interests. To this end, it is necessary to establish a cooperative joint construction mechanism between industries in the “9 + 2” cities, and the application of 5G technology will better establish multi-directional connection channels. Through 5G technology, the industry will carry out in-depth digital empowerment actions, carry out “5G + Industrial Internet” application promotion, build digital workshops, smart factories, and smart parks, and quickly realize data transmission, resource and information sharing. It is a good way to jointly build cooperation parks and cooperation platforms to form the unified operating rules

5G Technology Promotes the Coordinated Development …

437

of the Greater Bay Area, create a national 5G + industrial Internet demonstration benchmark, lead the digital transformation of the Bay Area industry, and eliminate obstacles and barriers to enterprises in investment, mutual recognition of qualifications, and financial cooperation. This can give full play to the advantages of 5G technology, and realize the sharing of industrial benefits.

5.2.2

5G Technology Promotes the Industry to Leap Towards Mid-to-High-End Positioning

The Guangdong-Hong Kong-Macao Greater Bay Area should continue to promote the transformation and upgrading of industries, give full play to the regional economy and their respective comparative advantages, and in-depth cooperation to achieve win–win results. As a pioneering demonstration zone of socialism with Chinese characteristics, Shenzhen must fully and quickly implement the innovation-driven strategy, use 5G technology to promote the joint development of artificial intelligence, electronic communications, blockchain and other scientific and technological innovation fields, and become the leading benchmark for new technologies in the Bay Area. Relying on its location advantages, Zhuhai builds an industrial belt on the east coast of the Pearl River with a focus on next-generation 5G communication technologies, new energy and new materials, and an industrial belt on the west coast of the Pearl River with high-end manufacturing such as home appliances and biomedicine as the focus [6]. Guangzhou should make full use of the functions of international shipping and transportation hubs, improve the modern commercial circulation system, use 5G technology to promote the transformation and upgrading of facilities, promote logistics standardization, and cultivate circulation enterprises with global competitiveness [7, 8]. Through the deep integration of 5G technology and industry, the Bay Area industry will be promoted to the middle and high end of the value chain, and the coordinated development of the industry will be promoted.

5.3 Government Departments Increase the Promotion and Policy Guarantees for 5G Technology From a macro perspective, the coordinated development of e-commerce and regional industries is inseparable from government policy support. Government actions will have a significant impact on the coordinated development of regional industries and ecommerce, including the government’s management level, preferential policies, and the formulation of relevant laws and regulations. Therefore, government departments should increase their support, promote the comprehensive coverage of 5G technology, and provide policy guarantees for the coordinated development of the two.

438

5.3.1

Z. Chen and X. Qiu

Accelerate the Introduction of Favorable 5G Technology Policies

In the context of the “Belt and Road Initiative” and Guangdong’s “Fourteenth Five-Year Plan”, the development of e-commerce in the Bay Area industry is a concrete practice of industry-Internet integration and innovation, which will effectively promote the transformation and upgrading of the industry. As an emerging technology, 5G’s development has not yet reached a mature stage. Relevant government departments should introduce more favorable policies to encourage industries to make full use of 5G technology to develop e-commerce, and improve the enthusiasm and confidence of enterprises in the use of 5G technology with the stability of policies, and promote its application in the field of e-commerce. In addition, due to the differences in different industries in the Bay Area, government departments must fully consider the actual situation of the industry in the policy formulation process to ensure the accuracy and matching of the entire vehicle. All departments must, under the background of fully understanding the actual operation of 5G technology, introduce specific and highly operable supporting policies to ensure that 5G technology is truly implemented in specific industrial applications.

5.3.2

Improve 5G-Related Infrastructure Construction

After years of development, the design and construction of industrial infrastructure and domestic logistics facilities in the Guangdong-Hong Kong-Macao Greater Bay Area have been relatively complete, which has facilitated the development of the industry. However, with the promotion of 5G technology, the construction of related equipment and facilities still needs to be strengthened, and it is difficult to improve the entire industrial system depending on the input of a single enterprise, and government departments must participate. Take logistics improvement as an example. With the advent of 5G technology, the application of artificial intelligence in the logistics field has become a future development trend. Government departments can strengthen cooperation with new technology companies such as 5G technology and artificial intelligence to jointly develop modern intelligent logistics system that meet the needs of the current industry. At the same time, it is also important to give full play to the leading role of the government, and promote the establishment of 5G infrastructure in the region through policy encouragement, capital, tax support, and financial subsidies, so as to solve the 5G application problems of enterprises.

6 Conclusion The emergence of 5G technology accelerates the innovative development of ecommerce, which will surely endow it with more lasting vitality. The industries in the Guangdong-Hong Kong-Macao Greater Bay Area can be developed through continuous deepening of reform and innovation, while integrating modern marketing

5G Technology Promotes the Coordinated Development …

439

concepts and relying on “5G+” e-commerce to narrow the gap between the industry and consumers. In the future, the Bay Area industry will fully release the huge commercial potential brought by 5G, stimulate comprehensive upgrades in multiple dimensions such as technology, capital, and information, further promote value inheritance, promote the development of industrial economy, and realize the construction of industrial branding. It has a far-reaching society Role and historical significance. Acknowledgements Foundation Project: Guangdong Province 2020 key scientific research platform and project of ordinary colleges and universities Research on the Long-term Mechanism of University-Enterprise Collaboration in the Development of Rural E-commerce Talent Training with the Rural Revitalization Strategy (Project number: 2020ZDZX1072).

References 1. GMV 400 billion of Taobao live broadcasts in 2020, will the first echelon of live broadcast e-commerce come out or get out? [online]. Available at: https://www.sohu.com/a/464850363_ 120773109 2. Chen F (2019) 5G helps e-commerce new upgrades. Foreign Invest China 12:82 3. Zhu J, Zheng Q, Fang A (2020) An analysis of the innovative development of the cultural industry under the background of 5G. View Publ 06:14–17 4. McLuhan M (2011) Understanding media: the extensions of man. Yilin Press, Nanjing, p 98 5. Guo Q (2019) 5G technology and the development of China’s media industry. News Writ 06:63– 68 6. Deng W (2020) Research on the problems and countermeasures of the industrial coordinated development in the Guangdong-Hong Kong-Macao Greater Bay Area. Logist Eng Manag 42(05):147–148 7. Proposal of the Guangdong Provincial Committee of the Communist Party of China on the formulation of the Fourteenth Five-Year Plan for the National Economic and Social Development of Guangdong Province and the long-term goals for 2035. Guangzhou Daily, 2020-12-18 8. Liang K (2019) The potential impact and change of traditional e-commerce sales in the 5G era. Theor Expl 04:05

Relay-Leader Based MAC Layer Multicast Protocol for 60 GHz Millimeter-Wave WLAN Qiang Miao and Hui Li

Abstract Through the research of multicast technology and the layer architecture. In order to improve the performance of transmitting data frames using multicast technology in 60 GHz millimeter-wave wireless networks. Combing the 60 GHz millimeter-wave WLAN communication, we propose a relay-leader based MAC layer multicast protocol. Firstly, we complete the hierarchical networking for all terminals using the 5 GHz control layer. Secondly, choose a leader from each group nodes, the leader will control the group and in charge of message interaction with multicast sources. Thirdly, in 60 GHz data layer, the leader completes the relay and data layer communication among the multicast source and all terminal nodes. The experiment results show that, the proposed protocol can effectively improve the performance of the whole MAC layer multicast transmission in two parts which are time delay and throughput. Keywords MAC layer · Multicast protocol · WLAN · 60 GHz millimeter-wave

1 Introduction 60 GHz Millimeter-Wave technology is perfectly suited for services in high demand of broadband such as transmitting HD video stream in short distances environments with its advantages of high speed, small volume and anti-interference [1]. Nowadays, 802.11ad protocol standard support the switches among the 60 GHz and some low frequency bands. But for the multicast frames which are unsuccessfully received in multicast technology, there is no recovery mechanism for MAC layer in this standard [2]. In order to solve the low reliability problems in the existed multicast Q. Miao (B) School of Computer and Software, Dalian, Neusoft University of Information, Dalian, Liaoning, China e-mail: [email protected] H. Li School of Intelligence & Electronic Engineering, Dalian Neusoft University of Information, Dalian, Liaoning, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_49

441

442

Q. Miao and H. Li

technology such as packet-loss, miss transmitting and hidden nodes [3], based on the Leader broadcast protocol and relay transmission concepts, we propose a RelayLeader Based MAC Layer Multicast Protocol with high-reliability rely on 60 GHz millimeter-wave communication and layer architecture.

2 Design of the RLBMMP The 802.11ad protocol defines a new MAC architecture PBSS (Personal Basic Service Set) which could synchronize two devices quickly and simultaneous transmission of multiple frequency bands [4].

2.1 Hierarchical Networking We can use 5 GHz band to send and receive to realize large static coverage because control information of WLAN belongs to low rating data flows. The protocol design brings hierarchical networking architecture. We use 5 GHz control layer and 60 GHz data layer. The low layer is based on the omnidirectional control layer, and supports the user discovering, authentication and synchronization, solve the problems of hidden nodes. The upper layer supports directional layer to support the service data transmitting with high speed of Gbps. The diagram of MAC protocol framework is shown in Fig. 1. The data layer works at 60 GHz millimeter-wave frequency band to support the directional dynamic coverage and adjusts the coverage modes and range according to the access changes and mobile changes of network nodes [5].

Fig. 1 The diagram of MAC protocol framework

Relay-Leader Based MAC Layer Multicast Protocol …

443

2.2 Control Layer Based on LBP Networking The main concept of LBP (Leader Based Protocol) is to choose a receiving node as Leader to complete the RTS/CTS interaction with multicast source [6]. When the multicast source sends RTS, only the chosen Leader will response CTS to the multicast source. The multicast source casts data frames after receiving the CTS, only the Leader will response ACK to multicast source. Other receiving nodes will response NAK to multicast source if they receive no data frames, and there is no reaction in other situations. In 802.11ad protocol, the normal DMG-STA can be the multicast source to set link connection with receiving nodes directly if it supports the multicast [7]. The example of the Leader selection is shown in Fig. 2. We bring two new managing control frames during ATI interviewing period which are multicast request frame and multicast response frame. The frame formats are shown in Figs. 3 and 4. Fig. 2 The example of the leader selection

Fig. 3 The multicast request frame

Fig. 4 The multicast response frame

444

Q. Miao and H. Li

In the multicast request frame, RA is the MAC address of PCB/AP. TA is MAC address of multicast source. Address of Receivers are the MAC address of receiving nodes. This fields completes the mapping from the MAC addresses of receiving nodes to the corresponding Leader numbers. In the multicast response frame, RA is the MAC address of receiving nodes. TA is the MAC address of PCB/AP. Addresses of Source is the address of multicast. We add a directional detection signal in the data frame at the same time. The signal sends short signal detection frames one by one in the form of TDMA, and the other nodes receive the frames in their directions. Through the directional detection, the multicast source will understand the link quality of all the networking nodes and set list, and then use the adaptive decision algorithm to supply decisions for the leader choosing in the following [8].

2.3 Relay of Data Layer When the multicast source sends data packets, firstly the leader and receiving nodes complete interaction between multicast request and response and set multicast groups. Secondly completing the data multicast sending and relay based on leader according to the CBAP time slot [9]. (1)

(2)

(3)

Firstly, the multicast source multicast the RTS data frames to the corresponding leader. We add two new fields in the RTS frame which are sequence number field and leader number field. Secondly, the leader response CTS frame to the multicast source in TCTS time turn after receiving the RTS frame. The other nodes will send DMG-CTS message to the leader if they are ready to receive the data packet, then remain silent and wait the leader relay to send. The node will directly send notice to its own leader if it receives no data packet. Thirdly, we use 60 GHz to complete the data packet transmitting after the multicast source receives DMG-CTS frame from every leader successfully. If the leader receives the data packet successfully, it will response ACK to multicast source in TACK turn, and forward data to the group members at the same time. Other terminal destination nodes will remain silent if they receive successfully. On the other hand, they will send NAK to leader to request resending data packets.

3 Simulation of the RLBMMP In the simulation stage, we use MATLAB to simulate and compare the RLBMMP protocol, LBP protocol and IEEE802.11ad working under the 60 GHz millimeterwave environment. The experiments design 1–20 receiving terminals, and assume

Relay-Leader Based MAC Layer Multicast Protocol …

445

each terminal has the function of sending and receiving data. We mainly compare the changes of time delay and throughput as the increasing number of terminals [10].

3.1 Time Delay The experiment compares the time delay in two ways. First one is the change of the number of terminals. The second one is the change of packet loss rate. From the results shown in Figs. 5 and 6 we get that the time delay of the 3 protocols all increase as the number increasing of nodes. Under the same situation, the IEEE802.11ad has

Fig. 5 Delay varies with the number of nodes

Fig. 6 Delay varies with packet loss rate

446

Q. Miao and H. Li

the maximum time delay. RLBMMP has the better improvement than LBP, especially under the situation of more terminals and higher packet loss rate.

3.2 Throughput Also, the experiment compares the time delay in two ways, which are the changes of the number of terminals and packet loss rate. From the results shown in Figs. 7 and 8 we get that the throughput of the 3 protocols all increase as the number decreasing of nodes as well as the reduction of packet loss rate. Under the same situation, the IEEE802.11ad has the minimum time delay. RLBMMP still has the

Fig. 7 Throughput varies with the number of nodes

Fig. 8 Throughput varies with packet loss rate

Relay-Leader Based MAC Layer Multicast Protocol …

447

better improvement than LBP, especially under the situation of higher packet loss rate.

4 Conclusions In order to improve the performance of transmitting data frames using multicast technology in 60 GHz millimeter-wave wireless networks, based on the Leader multicast protocol, relay transmission concepts and layer architecture, we propose a relayleader based MAC layer multicast protocol. The simulation results shown that the proposed protocol can effectively improve the performance of the MAC layer multicast transmission in two parts which are time delay and throughout. But at the same time, we notice that the effect is more obvious only if there are more terminals. Acknowledgements This work was, in part, supported by the Liaoning Province Education Department Project (Grant Nos. SYDR202005, JZR2019002, JZR2019007, JZR2019009); Liaoning Province Natural Science Fund (Grant No. 2019-MS-014).

References 1. Kim J, Kim K (2020) A design of 60-GHz bandwidth-enhanced comb-line array. Microwave Opt Technol Lett 62(10):3292–3300 2. Wu W, Xu W, Chen Z, Yang M (2020) Energy-efficient link scheduling in time-variant dual-hop 60GHz wireless networks. Concurr Comput: Pract Exp 32(23) 3. Capdehourat G, Bermolen P et al (2021) Large-scale 802.11 wireless networks data analysis based on graph clustering. Wirel Pers Commun 1–29 4. Dhaya R, Kanthavel R, Ahilan A (2021) Developing an energy-efficient ubiquitous agriculture mobile sensor network-based threshold built-in MAC routing protocol. Soft Comput 1–10 5. Boukerche A, Zhou X (2020) A novel hybrid MAC protocol for sustainable delay-tolerant wireless sensor networks. IEEE Trans Sustain Comput 6. Lin Z, Tang Y (2019) Distributed multi-channel MAC protocol for VANET: an adaptive frame structure scheme. IEEE Access 7. Karthick K, Asokan R (2021) Mobility aware quality enhanced cluster based routing protocol for mobile ad-hoc networks using hybrid optimization algorithm. Wirel Pers Commun 1–25 8. Ren H, Geng X (2021) Review of MAC protocol of underwater acoustic sensor network. Int Core J Eng 7(6) 9. Tan J, Liu A, Zhao M et al (2018) Cross-layer design for reducing delay and maximizing lifetime in industrial wireless sensor networks. EURASIP J Wirel Commun Netw 2018(1):1–26 10. Boukerche A, Zhou X (2017) MAC transmission protocols for delay-tolerant sensor networks. Comput Netw 124:108–125

3D Point Cloud Data and Image Registration Technology Huabiao Li

Abstract With the popularity of multi-source sensors in the field of surveying and mapping, point cloud (PC) data and optical image have been widely used. How to coordinate PC and optical image, and how to establish direct mapping between two kinds of data to realize complementary advantages have become the focus of current research. This paper mainly studies 3d PC data and image registration technology. In this paper, the registration method of PC data and optical image is studied. Based on the improved RIFT feature algorithm, the indirect registration of PC data and optical image is realized, and the external image elements are iteratively optimized to achieve the direct registration and true color mapping of PC. Keywords 3D point cloud · Optical image · Registration technology · RIFT algorithm

1 Introduction As a new data acquisition method, 3D lidar technology has the characteristics of strong initiative, little weather influence, no day and night influence, and certain penetrability to block the ground objects. It has a broad development prospect. Compared with laser PC data, optical image has abundant spectral information, texture features and other semantic information, but it does not have three-dimensional spatial position and intensity information of ground objects, so laser PC data and optical image are highly complementary. The fusion of these two kinds of heterogeneous data and the complementary advantages of three-dimensional space position information of laser PC and rich texture information of optical image are of great practical value for the automatic generation of digital elevation model, urban modeling, target recognition and other aspects. Registration is the key to fusion of the two. It is an important step and prerequisite to realize data fusion processing, transformation detection, image Mosaic, map update, disaster detection and monitoring and other surveying H. Li (B) National Museum of China, Beijing 100006, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_50

449

450

H. Li

and mapping applications, as well as a technical difficulty in image processing [1]. The purpose of registration is to transform the data to be merged into the same geographic coordinate system. The registration of the PC data and the optical image is to unify them into the reference data of the geographic coordinate system where the 3D laser PC is located, and establish the mapping relationship between the two different dimensional data. In order to make full use of their advantages, PC and optical image search is effective data registration method, the domestic and foreign scholars of LiDAR PC with optical image registration problem to do a lot of research, Yoo selection of the same object is more than a degree of overlapping images, and then by extracting some feature matching to generate dense PC, finally based on the adjacent point iterative algorithm and the laser PC data registration [2]. Holz uses PC filtering to extract non-ground PCs, projects them according to the Z-axis direction, extracts features from optical images by means of mean segmentation, and then achieves registration of two kinds of data [3]. Bybee proposed two feasible methods to directly extract line segments from the PC for registration. However, the linear feature elements in the data to be registered need to be extracted manually, which is not highly automated [4]. This paper mainly studies the 3 d laser PC registration problems with optical image, based on the characteristics of the registration scheme and algorithm based on improved RIFT characteristic study of laser PC and the optical image registration method, realize the image elements of exterior orientation of optimization, solving the problem of two kinds of different source data registration and realizes the laser PC and optical image registration after the true color of mapping, qualitatively and quantitatively through the experiment on registration accuracy is analyzed.

2 3D PC and Optical Image Registration Method 2.1 Existing PC Data and Optical Image Registration Methods In this paper, Revit software with better parametric modeling capability is selected. This software realizes parametric modeling mainly in two ways, one is the family component template provided based on Revit, and the other is modeling by Dynamo combined with parameter chemical tool according to the logical relationship between points, lines and planes of the model. (1)

Registration Method Based on Gray Information The registration method based on gray information is a common method to solve the problem of image registration. It uses the gray characteristics of the image to compare the similarity degree and distribution characteristics of the gray levels of selected areas in the image for matching. For such heterogenous

3D Point Cloud Data and Image Registration Technology

451

images, the most popular and effective correlation measure is to calculate their mutual information value [5]. Mutual information, a concept in information theory, is a commonly used information-information-based measurement method in the medical field. It is usually used to count the amount of information between two systems to correlate with each other, usually expressed in terms of entropy. An image is defined as M, and its entropy is: H (n) = −



PM (a)log PM (a)n = i, (i = 1, 2)

(1)

a

The joint entropy of image M and N is defined as: H (M, N ) = −



PM N (m, n)log PM N (m, n)

(2)

mn

In the above formula, PM(m) and PN(n) respectively represent the edge probability distribution of image m and N gray scales, and PMN(m,n) represents the joint probability distribution. The mutual information of the two images can be obtained as follows: I (M, N ) = H (M) + H (N ) − H (M, N )

(3)

On the basis of mutual information, normalized mutual information is derived, as shown in Formula (4): Y (M, N ) = (H (M) + H (N )/H (M, N ))

(2)

(4)

In PC data and optical image registration process, the mutual information algorithm is used in more depth of the PC image and optical image registration, the depth of the PC based on mutual information and optical image registration method can be understood as: in depth chart and optical image registration of PC, between the depth of the PC figure corresponds to the largest amount of information of the largest amount of information in optical image; The smallest amount of information in depth maps is also the smallest amount of information in optical images [6]. Using this correspondence, the correct registration parameters can be calculated by adopting a certain registration strategy. Registration Method Based on Features In the feature-based registration scheme, the feature primitives extracted from the PC depth map and optical image will be applied in the subsequent calculation of registration parameters. By calculating the corresponding relationship between the feature primitives with the same name, the registration of these two kinds of heterogeneous data will be realized and unified in the same

452

H. Li

coordinate system [7]. Therefore, the extraction of feature primitives is very important, and its accuracy affects the final registration result. 1.

2.

3.

Registration method based on surface features Using the surface features as registration primitives, the surface features extracted from the PC data are projected and transformed to coincide with the image features of the same name, so as to achieve the registration between the PC data and the optical image. This process requires relatively accurate external elements, and it is difficult to extract surface features, complicated calculation, and has certain limitations. Registration method based on line characteristics Straight line features are extracted from PC data and projected onto the corresponding optical image to achieve the registration of both by matching the line features with the same name. At present, there are line feature extraction methods based on PC data, normal line feature extraction method based on echo information grid, and line feature extraction method based on feature microelement statistics. Registration method based on point characteristics Point features mainly refer to the corner points and local contour interpolation points of buildings and roads in the image, and their gray values change significantly in the two-dimensional direction. SIFT feature extraction and matching method can extract feature points from images and carry out reliable matching under different perspectives of objects or scenes. Feature points extracted by SIFT algorithm have rotation invariance and scale invariance, and have strong robustness to changes of light, noise and affine. In addition, the feature points extracted by this method are highly unique.

2.2 PC and Optical Image Registration Based on Improved RIFT Algorithm (1)

RIFT Algorithm Improvement The algorithm uses phase consistency instead of image intensity to detect feature points. Taking into account the number of feature points and the number of repetitions, the corner points and edge points on the PC map are extracted, and the maximum index image (MIM) is proposed for feature description [7, 8]. Therefore, this paper improves the RIFT algorithm, replacing the traditional rigid registration model with a thin-plate spline function, and performs a mapping transformation on the image to be registered. The thin plate spline function is developed from the natural spline function. It can decompose the spatial transformation into global affine transformation and local non-affine transformation. From the two images to be registered, calibrate N pairs of corresponding mark points Pi and Qi, I = 1, …, N. According

3D Point Cloud Data and Image Registration Technology

453

to the corresponding mark point pairs, find a suitable transformation function F in the two-dimensional space. For a two-dimensional image, the spatial transformation function fxy(x,y) contains the mapping function in the x direction and the y direction: f x y (x, y) = ( f x (x, y), f y (x, y))

(5)

Fx (x, y) is the mapping function in the x direction, and Fxy (x, y) is the mapping function in the y direction. Take the mapping function on X square as an example: f x (x, y) = A(x, y) + R(x, y)

(6)

The function R(x,y) is the weighted sum of the nonlinear function g (RI), where g (RI) is the thin plate spline transformation function: g(ri ) = ri lgri2

(7)

The mapping function in the X direction is: f x (x j , y j ) = a0 + a1 x j + a2 yi +

n 

Ai g(ri )

(8)

i=1

(2)

Based on the optimization of External Elements of the Space Retractable Image By using accurate external image elements, the collinear equation of photogrammetry can realize the direct registration of PC data and optical image, so it is very important to obtain accurate external image elements, which is the key point in the registration process of PC data and optical image. The PC depth map generated under the precise external element should be roughly consistent with the optical image, but due to the existence of errors, it cannot be fully fitted, and there will be distance differences between the feature points with the same name [9, 10]. In this paper based on the improved algorithm to realize the depth of the PC in RIFT and optical image after registration, using indirect mapping relationships get a lot of the same name point, based on the method of space resection the exterior orientation elements to calculate a new image, and then continue to registration involves cloud depth map, repeat the above steps until RIFT algorithm without registration on the depth of the PC chart and optical image of the extracted feature points with the same average distance less than a certain threshold of output exterior orientation elements, to achieve image of exterior orientation elements of optimization.

454

H. Li

3 3D PC and Optical Image Registration Experiment 3.1 Experimental Method In this paper, the airborne PC data and the corresponding synchronous aerial survey image were used for registration experiment. First, with the assistance of the initial external position element of the aerial survey image, the PC data were projected through the pinhole imaging model to map the PC depth map. Then, based on the improved RIFT feature algorithm, the depth map and aerial image of airborne PC are registered, so as to realize the indirect registration of airborne PC and aerial image. Finally through to the principle of spatial resection in photogrammetry indirectly obtained a lot of the same name registration realization of inverse calculation of exterior orientation elements of the feature points, obtained by inverse calculation of exterior orientation elements generate a new PC registration depth map, and then to optimize images of exterior orientation elements, until meet the feature points mean distance minimum constraint conditions, the output of optimized parameters, implementation is based on photogrammetry collinear equation of PC data with optical image and the PC registration was directly true color texture mapping.

3.2 Source of Experimental Data The PC data density involved in the experiment is not easy to be sparse, and the optical image should be a central projection and contain obvious buildings. The data used in this paper are two sets of airborne PC data and synchronous aerial survey images. Registration experiments were carried out on two groups of airborne PCs and aerial image data under DELL workstation and Windows10 operating system.

3.3 Preprocessing of Experimental Data Cut a large number of redundant PC, and then use the statistical filtering in the PCL library to filter the airborne PC data. Statistical filtering is applicable to normally distributed data. Taking into account the characteristics of PC outliers, it can be defined as if the PC is less than a certain density, the PC here is regarded as an outlier, and then it is removed.

3D Point Cloud Data and Image Registration Technology 2

455 1.84 1.73

1.78 1.81

Value

1.5 82% 82%

1

80% 81%

0.5 0 RMSE

CMR

Experimental group a

RMSE

CMR

Experimental group 2

Experimental group Mutual information

Improvement in RIFT

Fig. 1 Two sets of algorithms were evaluated

4 Experimental Results of 3D PC and Optical Image Registration 4.1 Automatic Correlation and Accuracy of Airborne PC Depth Map and Aerial Survey Image As shown in Fig. 1, accuracy analysis is carried out on the registration results of PC depth map. The results show that the registration accuracy RMSE of these two groups of data is 1.81 and 1.73 respectively, and the image registration effect is good. This paper also uses the method based on mutual information to register the PC depth map and aerial survey image in two groups of experiments, and carries out comparative analysis. It can be seen that in the first group of experiments, the accuracy of the method adopted in this paper and the method based on mutual information are similar, and both of them achieve good registration results. In the second group of experiments, the accuracy of the registration method based on mutual information is lower than that of the method adopted in this paper due to the large geometric distortion of the generated PC depth map, which proves that the method adopted in this paper has certain reliability and applicability.

4.2 External Element Optimization and Precision As shown in Table 1 and Fig. 2, due to the inaccuracy of the image orientation elements, there is a large pixel difference among the three pairs of feature points with the same name. If the image parameter accuracy is high, the position information of the three feature points should be roughly the same without feature matching. So you can according to the last section of indirect registration photogrammetric resection get new points with the same parameters to calculate the optimal image

456

H. Li

Table 1 Pixel coordinates Aerial image point coordinates

Depth image point coordinates

Distance difference

X

Y

X

Y

l

1

1348.51

1527.19

1348.61

1531.09

10.18

2

3327.42

2251.51

3337.52

2257.51

9.43

3

3581.36

3387.74

3575.36

3397.74

8.12

Coordinates

Dot

4000 3500 3000 2500 2000 1500 1000 500 0

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

Dot 1

2

3

Fig. 2 Pixel coordinates

exterior orientation elements, repeat the steps in the previous section until the image in front of the registration of the same name as the pixel distance between points is less than a certain threshold (two image geometry size is the same), finally realizes the airborne PC data based on collinear equation and the aerial mapping directly. As shown in Table 2, the improvement in RIFT algorithm without mapping transformation PC depth map and optical images of the same name as the average distance between the feature points extracted value is less than four pixels, the iterative optimization to stop, otherwise continue to use after back calculation of exterior orientation elements involves cloud depth map matching with optical image, select feature points is optimized. By using the optimized registration parameters, the direct mapping relationship between the laser PC data and the optical image based on the collinear equation of photogrammetry was established. The results in the table show Table 2 Optimized external image elements Group

External elements of the image

Experimental group 1

X= 235,114.52

Y= 3,776,485.57

Z= 538.39

Phi = 0.19

Omega = 0.07

Kappa = −92.37

Experimental group 2

X= 520,548.17

Y= 469,442.41

Z= 1553.34

Phi = 0.46

Omega = 8.32

Kappa = −146.38

3D Point Cloud Data and Image Registration Technology

457

that the accuracy of the parameters after the indirect registration optimization in this paper has been effectively improved.

5 Conclusions PC data can provide accurate spatial location information of the target ground objects, while optical images have rich semantic features. Registration fusion of the two can realize complementary advantages. The existing registration methods of 3D PC and optical images are analyzed, and the feature-based methods and the extraction of feature primitives are emphatically studied. The RIFT characteristic algorithm based on phase consistency model is introduced and improved. Through comparative experiments, it is proved that the improved RIFT algorithm has a better registration effect on the PC depth map and the optical image, can achieve better mapping of the image as a whole and as a part, and the correct matching rate CMR can be improved by 5%.

References 1. Li C, Lu B, Zhang Y et al (2018) 3D reconstruction of indoor scenes via image registration. Neural Process Lett 48(3):1281–1304 2. Yoo WS, Park JB, Lee BH (2015) Adaptive 3D object registration based on PC distribution for mobile robot. Electron Lett 51(10):752–754 3. Holz D, Ichim AE, Tombari F et al (2015) Registration with the PC library: a modular framework for aligning in 3-D. IEEE Robot Autom Mag 22(4):110–124 4. Bybee TC, Budge SE (2019) Method for 3-D scene reconstruction using fused LiDAR and imagery from a Texel camera. IEEE Trans Geosci Remote Sens 57(11):8879–8889 5. Zhou N, Yin X, Wang L (2020) A research of surgical navigation system of mixed reality based on image registration. SID Symp Digest Tech Pap 51(S1):28–30 6. Li J, Yang B, Chen C et al (2019) NRLI-UAV: non-rigid registration of sequential raw laser scans and images for low-cost UAV LiDAR PC quality improvement. ISPRS J Photogram Remote Sens 158:123–145 7. Zhang J, Lin X (2016) Advances in fusion of optical imagery and LiDAR PC applied to photogrammetry and remote sensing. Int J Image Data Fusion 8(1):1–31 8. Li B, Havskov J, Lars Ottemöller et al (2015) New magnitude scales M L and spectrum-based M w for the area around Shanxi Rift System, North China. J Seismol 19(1):141–158 9. Vaughan N, Dubey VN, Wainwright TW et al (2016) A review of virtual reality based training simulators for orthopaedic surgery. Med Eng Phys 38(2):59–71 10. Cor JJ (2018) Modeling centrifugal, multiphase, turbulent flows with a mixture-averaged driftflux algorithm. Numer Heat Transfer Fundam 74(4):647–660

New Social Media Communication Based on Literature Analysis Method Technology Yan Zhang and Xiaohua Zhou

Abstract In the information age, many new media have been born in our country. New media has brought various forms of communication, and built a new social network system, in which elite users and ordinary users have begun to separate. Through the analysis and research of node types and node relationships in this network system, you can understand the flow of information Specific direction. The development of new media in our country is showing a trend of mobilization, socialization, and integration. Micro-communication based on new media has become a new driving force for social development. The new social media communication methods are still worthy of research, so this article uses literature analysis techniques to analyze the relevant literature in the new social media communication research field, and study the evolution of hotspots in this field over the years, frontier development and future research trends. The research results show that new media communication started late, but the momentum of development is rapid; the strength of research in this field is strong, but the relationship between each other is weak, and the maturity of the subject field is not high; media convergence research is throughout the entire development of the field process research hotspots, among which the research on audience behavior and needs has gradually deviated from simple theoretical discussion, and instead focuses on specific applications in different fields after combining with new media. Keywords Literature analysis · New social media · Communication · Socialization

Y. Zhang (B) Department of Media and Art Design, Guangzhou Huali College, Guangzhou 511325, Guangdong, China e-mail: [email protected] X. Zhou Computer and Information Engineering, Guangzhou Huali College, Guangzhou 511325, Guangdong, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_51

459

460

Y. Zhang and X. Zhou

1 Introduction As early as 1967, American Goldmark put forward the concept of “new media”. After the birth of the Internet, this concept was widely recognized by the world [1, 2]. People use digital technology, Internet technology and other advanced communication technologies to transmit information to the audience through a variety of terminal devices such as computers, mobile phones and digital televisions. The one-way relationship of “being” is transformed into a two-way interactive network relationship, and the audience changes from receiving information to being able to play its own role in all links of the information chain [3]. New social media is also called social media, participating media, and self-media. The basic characteristics are freedom, interaction, sharing, real-time and openness [4]. The core of social media is based on the P2P network operating system as the media platform, which integrates a variety of new media forms, including microblogs, instant messaging, streaming media, and comprehensive media, into audio, video, and text. Blogs, podcasts, wikis, news statistics, forums, instant messaging, etc. are all new media that are carriers of communication [5]. New social media is a kind of “micro-chain communication.” Information completes “multi-directional communication” in the multi-directional flow of decentralized and de-authorized. It can be a two-way or multi-directional communication mode of “one-to-one, one-to-many, and many-to-many communication” [6]. This communication mode not only helps to expand the boundaries of external communication, but also effectively expands the scope of communication [7]. The characteristics of low cost, high speed and cross-border make social new media one of the most convenient and effective media in international communication [8]. The new social media communication network takes new media as the center, understands information exchange, avoids the one-to-one and one-to-many boundaries of information, truly realizes many-to-many barrier-free communication, and truly realizes the breakthrough of time and space boundaries [9, 10]. New media communication is the center and core of social new media communication networks. Use new media tools to form a complete new social media communication network system, fully tap the advantages of mass communication networks and traditional interpersonal networks, and create a large amount of information dissemination. It can better reflect the dispersion of information and reflect the characteristics of different information [11]. In a narrow sense, new social media are the current Weibo V and WeChat official accounts, and in a broad sense refer to all influential Weibo users. For the generation and dissemination of new social media information, public participation has changed the form of new social media dissemination and information acquisition methods, and media rights can be redistributed [12]. In the portal era, editing and publishing content is completely controlled by editors. In the age of blogging, content is edited by users but still recommended by editors. In the era of micro-dissemination, the role of editors is getting weaker and weaker, and it is no longer possible to control the entire process of disseminating information content.

New Social Media Communication Based on Literature Analysis …

461

2 Method 2.1 Literature Analysis Method Literature analysis is a method to analyze the collected literature, discuss the nature and state of the research object, and get their own opinions. This will help researchers form a general impression of the research objects, help them to grasp the research objects dynamically, and also study the research objects that are inaccessible as they were a long time ago. The main contents of literature analysis are as follows. (1) (2) (3)

Analyze and study the relevant archives. The collected personal diaries, notes and biographies were analyzed and investigated. The collected public books and periodicals were analyzed and investigated.

Literature analysis is to provide search identification and to clarify the “correct content” in the analyzed literature. Generally divided into two stages. (1) (2)

First find the object of discussion in the literature, and then further search for which aspects of the object of discussion. First find out the various concepts contained in the literature, and then further understand the relationship between them, forming many complete themes. There may be multiple topics analyzed in the literature.

2.2 CBOW Language Model Algorithm The new social media communication resources have a wide range of data sources and rich information, but the current full-service data center cannot effectively express the value of big data, the inter-domain use and information of commercial data. Knowledge extraction technology based on production promotion data can realize social innovation. In order to study multiple data extraction methods for new social media communications, it is necessary to analyze multiple types of data extraction techniques. For production data, a lot of regular expressions are established for information extraction. For popular data, POS-CBOW related calculation models are used to extract new social media communication system relations based on new social media communication resource information. The basic stages of the CBOW language model are as follows. Step 1: The context size of the input layer in the input layer is limited to M, and the copper word sequence is read sequentially in the window. C(t − M), C(t − M + 1), . . . , C(t + M) Get the relevant word position of the projection stack through the hash table.

(1)

462

Y. Zhang and X. Zhou

W(t − M), W(t − M + 1), . . . , W(t + M)

(2)

Get the upper and lower M word Context(W(t)) of W(t) word. Step 2: In the projection layer, perform the operation of step 1 in the context of W(t). V(t) is the accumulation of W(t) text. V(t) =

t+N 

Context(W(t))

(3)

t−N

Step 3: Use the context information of the word W(t) in the output layer of the projection layer to generate the vector value of the word W(t) through expression (4). The expression (5) here is a word vector. Complete regression analysis of W(t) judgment. P(W(t)|Context(W(t))) =

t+n 

f(V(t)θ)

(4)

t−n

f(V(t)θ) =

1 1 − e−V(t)θ

(5)

2.3 Research Front Analysis The concept of “research frontier” was first proposed by Price. Chen Chaomei, the developer of Cite space software, believes that research frontier means “a combination of new dynamic concepts and potential research problems” and made a clearer statement about it. Different from the commonly used keywords in the general sense, the research frontier can perceive new terms that are used quickly in a short period of time, and discover new trends and changes in the subject area. Cite space software provides the function of inflated word detection. The greater the emergence value of an inflated word, the greater the importance of the word in the research field. After sorting out, there are 59 inflated words in the field of audience communication research in the new media environment, of which 19 inflated words with an emergent value greater than 5, such as “media integration” (18.72), “audience” (16.86), and “traditional media” (14.19), “New Media” (10.28), etc. It can be seen that the current research frontiers in this field are mainly focused on the integration of new media and traditional media, that is, media integration. These studies have greatly enriched the practical experience of new media audience communication, perfected its theoretical application system, and have profound practical significance. As the communication political economists Golding and Murdoch said: Modern social media organizations produce “special products”, which can greatly affect people’s understanding of the world they live in.

New Social Media Communication Based on Literature Analysis …

463

Table 1 Questionnaire survey report status Questionnaire issuance and recovery

Spread the domestic platform

Spread foreign platforms

Total

Issue

88

66

154

Recycle

82

63

145

Effective

80

60

140

Efficient (%)

90.1

95.2

90.1

3 Experiment 3.1 Experimental Investigation Objects First of all, the investigation and research method is used to conduct detailed and in-depth investigation and research on the choice of each new social media communication method, research data, research rules, and refine and summarize the first-hand information. This article selects a variety of new social media communication platforms, and conducts a practical investigation and research on whether to choose to use literature analysis techniques from factors such as communication methods and promotion modes. As shown in Table 1, a total of 154 questionnaires were collected and distributed to the experimental research of the publicity and communication platform. A questionnaire survey was conducted on 154 promotion and communication platforms at home and abroad to evaluate whether literature analysis technology was used in the communication of each promotion platform. In this regard, first of all, we need to conduct a detailed and in-depth study on various integration promotion modes, and at the same time, we need to study the direct assimilation of data and information, so as to apply research and research methods to concretize and summarize specific cases. Secondly, the use of case analysis method needs a variety of communication platforms. Through case study, this paper analyzes the current situation of the new social media communication mode based on literature analysis.

4 Results The research object of this experiment is related literature in the field of new social media, and the data source is the China National Knowledge Base (CNKI) database. In order to maximize the coverage of the research status in related fields, the subject search method was selected, and the search was carried out with “new social media communication” as the subject term. The search scope was Chinese documents, dated January 12, 2021, and 831 search results were initially obtained. By reading the title

Y. Zhang and X. Zhou

Number of articles

464

300

215 139

200 100

6

12

22

29

24

26

52

149

92

0 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020

Years Amount of Posts/Articles Fig. 1 The number of papers published in social new media communication related papers over the years

and abstract, excluding non-academic documents and documents that are not related to the research topic, finally 719 valid documents are obtained. Judging from the time and number of publications (Fig. 1), the amount of publications in the field of domestic community updates is on the rise. It started at the beginning of the twenty-first century and was in its infancy in 2010. The number of papers published was small, and the number of publications did not exceed 10. During this period, there was a lack of theoretical foundation in the field of community renewal and lack of academic attention. After 2011, it entered a period of slow development, and the number of documents gradually increased, and the number of documents published every year was 20–30. After 2016, it entered a period of rapid development, the number of documents rose rapidly, and the level of research and the degree of attention continued to increase. Compared with 2019, the number of articles published in 2020 is slightly reduced. Since the retrieval time is January 12, 2021, a small number of articles published at the end of 2020 have not been entered into the CNKI database. From the perspective of discipline distribution (Fig. 2), domestic new social media communication research is mainly concentrated in the two disciplines of communication (79.33%), Chinese politics and international politics (6.97%), macro communication and sustainable development (3.37%), Sociology and Statistics (2.79%) and other disciplines are slightly involved. As shown in Fig. 3, the increase rate of new social media communication has increased year by year, while the previous year has increased, but the growth rate in 2011 has been underestimated. Due to this epidemic, the share of consumption rose sharply in 2012, and the level of transmission increased sharply, much higher than in 2011. On the other hand, new social media dissemination related papers have reached a new level over the years. The macro development level and situation are consistent with the overall trend of modern and social new media development. Whether it is for customer brand communication, the communication and promotion needs of different industries are appropriate and corresponding advertisements should be made. The diversification and commercialization of scenes provide new opportunities for the

New Social Media Communication Based on Literature Analysis … Fig. 2 Distribution of literature disciplines

2.79% 3.37% 6.97%

465

0.70% 6.84%

79.33%

Increase rate

Communication Discipline Chinese Politics and International Politics Macro communication and sustainable development Sociology and Statistics agricultural economy other

0.35 0.3 0.25 0.2 0.15 0.1 0.05 0 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020

Years Increase rate of new social media communication Fig. 3 Investigating the growth rate of new social media communication

spread of new social media. The increase in the publication of literature and the use of literature analysis is another breakthrough that provides new development opportunities for new social media.

5 Conclusion This article uses 719 academic papers on standard literature research by domestic scholars, and uses content analysis to find that although the number of domestic academic research results that have standardized standard literature for more than ten years has been small, the overall trend has been increasing, and the growth

466

Y. Zhang and X. Zhou

rate has been increasing in recent years. Speed up, but the research is limited in terms of breadth and depth; there are still some shortcomings in the combination of research topics and research methods. To sum up, in the current environment of rapid development of the Internet, the development of new social media communication research started late, but it has received widespread attention, and the amount of research publications has increased rapidly. The changes in the media environment have forced the spread of new social media to actively find a way out. Although the changes in the media environment have different forms, their advertising, publicity, sales and other behaviors are essentially similar. They should be able to graft content and business operation models with each other. Interaction and integration make the new social media a win–win situation.

References 1. Alphandery E (2020) The potential of various nanotechnologies for coronavirus diagnosis/treatment highlighted through a literature analysis. Bioconjug Chem 31(8):1873–1882 2. Yeung A, Aggarwal BB, Orhan IE et al (2019) Resveratrol, a popular dietary supplement for human and animal health: quantitative research literature analysis—a review. Anim Sci Pap Rep 37(2):103–118 3. Li P B, Chen P, H Wu, et al (2020) Discussion and prediction of application prospects of Citri Grandis Exocarpium on COVID-19 based on literature analysis and molecular docking. Chin Tradit Herbal Drugs 51(9):2368–2378 4. Patel VR, Subramanian PS, Fortin E et al (2020) New initiatives at Journal of NeuroOphthalmology: highlighting technology, social media, and content for trainees. J Neuroophthalmol 40(3):285–285 5. Scotto G (2021) The new social media and the glory: for a theological-political criticism of the functioning of contemporary liberal democracies. Telos 2021(194):69–88 6. JMP Galán, Deseare A, Blasco J, et al (2020) P-07-5 sexting and new cybersex roles through social media. J Sex Med 17(6):S213–S214 7. Caccamise F, Newell W, Fennell D et al (2019) The Georgia and New York State programs for assessing and developing sign communication skills of rehabilitation personnel. JADARA 21(4):5–5 8. Barnard GA (2019) Ethics in statistical practice and communication: five recommendations. Br J Philos Sci 23(2):123–132 9. Yoo SK, Cotton SL, Scanlon WG (2019) Switched diversity techniques for indoor off-body communication channels: an experimental analysis and modeling. IEEE Trans Antennas Propag 64(7):3201–3206 10. A descriptive study using the comprehensive race socialization inventory: findings from the national survey of American life-adolescent supplement (2020). J Black Stud 51(2):147–167 11. Chase LE (2021) Psychosocialization in Nepal: notes on translation from the frontlines of global mental health. Med Anthropol Theory 8(1):1–29 12. Botsan A (2021) Resocialization of minor considerations at the penitentiary and postpenitentiary stages. Bull Sci Pract 7(5):425–433

Optimizing CO2 Emissions and Cost of Shear Wall Structure Based on Computer Simulation Jianjian Zhang and Lin Ji

Abstract Buildings have produced a large number of carbon emissions, which have a significant impact on global warming. In order to promote sustainable environmental development, the potential of building carbon reduction has attracted extensive attention and research. Based on the perspective of computer simulation design, the paper studies the relationship between CO2 emissions and cost of shear wall structure. The structure model was optimized on the basis of seismic codes and is suitable for the shear wall structure with 19 floors. The results show that the overall cost was reduced by 10.50%, CO2 emissions of structure decreased by 11.09%; the maximum inter-story drift ratio and maximum displacement of structure increased by 34.37% and 27.78% than the original model; the stiffness ratio and shear bearing capacity ratio of the structure are slightly lower than the original model, but all values conform to the seismic code, so the research is effectively to reduce the cost and CO2 emissions of shear wall structure, which is beneficial to promote the sustainable development of environment. Keywords Cost · CO2 emissions · Shear wall structure

1 Introduction Global warming and extreme weather events caused by excessive emissions of greenhouse gases from human which have become a typical problem and cause global damage. According to the comprehensive average results of the latest Earth System Model (ESM), the global warming is expected between 1.0 and 3.7 °C in the twentyfirst century. Due to the persistent emissions of CO2 and other greenhouse gases into the atmosphere, the global climate will continue to warm sharply [1]. Under J. Zhang Macau Institute of Systems Engineering, Macau University of Science and Technology, Macau, China L. Ji (B) Graduate School of Business, SEGi University, Kuala Lumpur, Malaysia © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_52

467

468

J. Zhang and L. Ji

the impetus of urbanization and improvement of living standards, the consumption of building energy in China growth quickly [2–4] and CO2 emissions in buildings account for 30–50% of the total CO2 emissions, so it has a major impact on global warming [5] and China’s carbon emission reduction targets. China has significant responsibilities and potential to mitigate global carbon emissions [6]. Therefore, as one of the China’s largest sources of emissions, Chinese buildings should reduce carbon emissions to achieve this goal. Last few years, many researchers take into account of environmental impacts and cost in the building. Park et al. [7] designed a method of calculating structural costs and CO2 emissions of SRC columns based on genetic algorithm, which reduce the cost of construction materials and CO2 emissions and minimize the lifecycle energy use of buildings. In order to compare the relationship among building height, CO2 emissions and construction cost, An et al. [8] proposed a sustainable design model analysis the slenderness ratio, the results show that when the slenderness ratio is increased, CO2 emission varies in proportion to the height. Based on the previous studies, this study will study the relationship between the cost of shear wall structure and CO2 emissions from the perspective of computer simulation design. In order to achieve this goal, on the basis of meeting the structural design constraints, it will optimize the structural section size to reduce CO2 emissions or reduce costs.

2 Mathematical Models and Methods In order to satisfy the seismic performance of the structure and minimize the emissions of CO2 , a mathematical model to minimize the CO2 emissions and cost was established by optimizing the size and diameter of the section to achieve the goal. Meanwhile, the floor shear capacity ratio, floor stiffness ratio, inter-story drift ratio, reinforcement ratio and axial compression ratio are adopted to meet the design specifications [9–11]. Application of optimum design method to the design of a 19-storey Shear Wall Structure.

2.1 Design Objectives The CO2 emissions and structure costs are set as the objective functions need to be optimized, as shown in Eqs. (1)–(2) [7, 12]. f CO2 = Vc E c + Vs ρs E s

(1)

f cost = Vc Cc + Vs ρs Cs

(2)

Optimizing CO2 Emissions and Cost of Shear Wall …

469

f CO2 is the CO2 emissions (kg) from the main structure; f cost is the cost (yuan) of the main structure; V c is the volume (m3 ) of concrete; V s is the volume of rebar; ps is the density of rebar; E c , E s is the unit of CO2 emissions in concrete and reinforcement respectively, C c , C s is the cost of concrete and rebar respectively too.

2.2 Design Variable The shear wall section and beam section size are typical design variables used to optimize the shear wall structure from Table 1. Specifically, the variables of concrete cross-section, the diameter, number and spacing of rebar’s cross-section are shown in Table 1 [9, 10, 13], respectively. According to the Chinese carbon emission standards [11] and market prices, Tables 2 and 3 lists the concrete’s cost, CO2 emissions and rebar’s cost, CO2 emissions for different diameter of rebar. The concrete strength grade used in highrise buildings is C25 and C30, the steel strength is 360 N/mm2 . Table 1 Design variable of shear wall structure Material

Structural components

Design parameter

Concrete

Shear wall

1. Width of section bt (mm) 1. 160 ≤ bt ≤ 400 2. Height of section ht (mm) 2. 3 ≤ h t ≤ 8 bt

Beam

1. Width bb (mm) 2. Height hb (mm)

1. bb ≥ 200 mm

Floor

Thickness

t ≥ 80 mm

Strength

fc (N/mm2 )

C25–C30 (11.9–14.3 N/mm2 )

Shear wall

Diameter and spacing of horizontal and vertical rebar

1. The Diameter variable of Vertical rebar is 12, 14, 16, 18 mm 2. The Diameter variable of Horizontal rebar is as 10, 12, 14, 16, 18 mm 3. The maximum spacing of Horizontal and Vertical rebar is 300 mm

Beam

Diameter and number of longitudinal rebar d (mm)

1. d ≥ 12 mm 2. At least two steel bars are arranged along the top and bottom of the beam

Floor

Diameter and spacing of horizontal and vertical rebar

1. d ≥ 8 mm 2. Spacing of Horizontal and Vertical rebar is not than 200 mm

Rebar

Range

2. hbbb ≤ 4

470

J. Zhang and L. Ji

Table 2 Basic performance of concrete Type

Impermeability grade

Strength

Cost (yuan/m3 )

CO2 (kg/m3 )

C25

P6

11.9

410.00

272.5

C30

P6

14.3

420.10

295

Table 3 Basic properties of steel bars Type

Diameter of reinforcing bar

Strength design value (N/mm2 )

Cost (yuan/ton)

CO2 (kg/ton)

HRB400

22

360

4500

2340

2.3 Constraint Functions The shear capacity of each floor and the ratio between them are taken as seismic constraints such as Eqs. (3)–(4) [13]. ⎧ 1 ⎪ ⎪ (λ > 2.5) ⎨ V ≤ γ (0.2βc f c bw h w0 ) RE 1 ⎪ ⎪ ⎩V ≤ (λ ≤ 2.5) (0.15βc f c bw h w0 ) γR E   0.8 ≤ Vx Vx p , 0.8 ≤ Vy Vyp

(3)

(4)

β c is the influence coefficient of concrete strength; γ RE is the seismic adjustment coefficient of bearing capacity of components; f c is the design value of axial compressive strength of concrete; bw and hw0 are the width and effective height of shear wall section, respectively. Equation (4) represents the ratio of bearing capacity of this floor to that of the upper floor (X, Y direction). U= i,w =

N ≤ 0.6 A × fc

Vi,w ≤ []s = 1/1000 Di

0.25% < ρw = 1 ≤ Rat x =

As bw h w

E I y,i E Ix,i , 1 ≤ Rat y = 70%E Ix,i+1 70%E I y,i+1

(5) (6) (7) (8)

As shown in Eqs. (5)–(7), U is the axial compression ratio of the shear wall, N refers to the axial pressure design value of the shear wall and A refers to the full cross-sectional area of the shear wall. Δi,w is the inter-story drift ratio of ith floor,

Optimizing CO2 Emissions and Cost of Shear Wall …

471

V i,w and Di represent the shear and stiffness values of ith floor. pw represent the section reinforcement ratio and it’s one of the parameters affecting the mechanical characteristics of members and As is the area of shear wall. bw is the width and hw is the height of shear wall. In Eq. (8), the stiffness ratio Ratx or Raty mainly restricts the irregularity of the vertical arrangement of the structure.

3 Application and Discussion In this study, optimal design is applied to a commercial building with 19 stories. The structure has 19 floors above ground and 2 floor below ground, which as shown in Fig. 1a. The second floor of basement is 3.3 m, the first floor of basement is 2.9 m, the other layers are all 3.0 m except the top floor is 4.2 m and the total height of the structure is 58.2 m. The standard floor plan is shown in Fig. 1b. The floor is 120 mm thick normally and the shear wall is 250 mm or 200 mm thick. The seismic fortification intensity is 7 degree (0.15 g), the site type II, and the design earthquake is the first group. The size of the original column is 500 × 500 mm, the strength grade of concrete are C30 (fc = 14.3 N/mm2 ) and C25 (fc = 11.9 N/mm2 ), the strength grade of rebar is HRB400 (fy = 360 N/mm2 ), the allowable reinforcement ratios of shear wall is min = 0.25%. The maximum interstory drift ratio is 1/1000.

Fig. 1 Structural layout. a Structural elevation layout of the building; b Structural plane Layout of standard floor

472

J. Zhang and L. Ji

From the initial structural design, the layers from 1 to 2 are standard layer, the layers from 3 to 16 are standard layer, each of the other layers is a standard layer. Concrete’s strength grade from the second floor of basement to the 16th floor is C30, Concrete’s strength grade from 17th floor to the 19th floor is C25, each layer of rebar is HRB400. According to the structural seismic design and concrete structure design code [9, 10], the structural dimensions are appropriately adjusted as shown in Table 4. The frame column is only in the first and second floor of basement, so the size was reduced from 500 × 500 to 400 × 200 mm. The shear wall from underground two story floor is adjusted from 250 mm width to 200 mm width, the original 200 mm shear wall width which from all floors adjusted to 180 mm width; the thickness of the underground two story floor slab is adjusted from 180 to 120 mm, and the remaining floor slab thickness is adjusted from 100 to 80 mm except the 18th floor. The appropriate adjustment of the structural beam can be seen from Table 5 which according to the concrete structure design code [9], the I beam (150 × 250 × 10 × Table 4 Structure dimension variables Floor

Shear wall (mm)

Slab (mm)

Column (mm)

Second Basement

250

200

180

120

500 × 500

200

180

250

200

100

80

200

180

1–2 floor

200

180

100

80

3–16 floor

200

180

100

80

17 floor

200

180

100

80

18 floor

200

180

120

120

19 floor

200

180

100

80

First basement

200 × 400

Table 5 Structure dimension variables of beam Beam height (mm)

Beam width multiplied by beam height before optimization (mm)

Beam width multiplied by beam height after optimization (mm)

300–500

200 × 300

150 × 250 × 10 × 100 × 100 × 10

200 × 350

150 × 350

200 × 400

150 × 400

250 × 400

150 × 400

200 × 450

150 × 400

250 × 450

150 × 450

200 × 500

200 × 500

200 × 600

150 × 500

250 × 600

250 × 600

200 × 700

200 × 700

500–700

Optimizing CO2 Emissions and Cost of Shear Wall …

473

100 × 100 × 10) in the middle of the structure is to increase the structural rigidity appropriately. Through the optimization and adjustment of the structure, the new model meets the seismic design requirements. In Fig. 2a, it can be seen that the CO2 emissions of concrete are reduced by 14.57%, the CO2 emissions of rebar are reduced by 6.49% despite the increase of steel sections, and the overall CO2 emissions of the structure are reduced by 11.09%. As can be seen from Fig. 2b, the concrete cost in the models is reduced by 13.90%, the cost of the rebar is reduced by 6.50%, and the overall cost of the structure is reduced by 10.50%. By comparing Fig. 2a and b, it is concluded that the reduction of structural CO2 emissions is slightly more than the cost reduction. the maximum floor displacement of the whole building under the Xwind load increased 27.78% from 8.46 mm to 10.81 mm (occurring on the 19th floor and 1 tower), The maximum inter-story drift ratio under X-wind load conditions on the first floor and increased by 34.37%, which from 1/8613 to 1/6410. But it satisfy the 1/1000 requirement of Eq. (6).

Fig. 2 Comparison of CO2 emissions and cost before and after optimization

Fig. 3 The shear bearing capacity ratio and stiffness ratio of each floor

474

J. Zhang and L. Ji

According the Eqs. (4), the results is shown in Fig. 3a, Shear bearing capacity ratio of each floor is greater than the limit value of 0.8. According the Eqs. (8), the results are shown in Fig. 3b, it can be seen that the stiffness ratio of all floors is greater than the limit value of 1. So both indicators meet the requirements. The optimized reinforcement ratio and axial compression ratio meet the requirements.

4 Conclusion This study adopts the comparative analysis method, which analyzes the inter-story drift ratio, stiffness ratio, shear capacity ratio and other seismic performance of the building. It helps the architect to obtain a good scheme in the initial design stage of the project. Through calculation and analysis, the displacement and inter-story drift ratio of the structure is slightly increased compared to the original model, but it meets the seismic requirements. The structure in the seismic index such as stiffness ratio and shear bearing capacity ratio has a slight decrease in the top and bottom values compared with the original model, but it does not affect the stability of the entire structure. Concrete cost reduced by 13.9% after building model optimization, the cost of steel and rebar were still reduced by 6.5%, the overall cost was reduced by 10.5%. At the same time, the CO2 emissions in concrete decreased by 14.57%, the total CO2 emissions of steel and rebar were still reduced by 6.49%, and the overall CO2 emissions of the structure decreased by 11.09%. Because the optimization meet the seismic requirements and structure’s safety, so the research reducing the cost and CO2 emissions of the shear wall structure is an effective method, which is beneficial to promote the sustainable development of the environment and reduce greenhouse gas emissions.

References 1. Anderson TR, Hawkins E, Jones PD (2016) CO2 , the greenhouse effect and global warming: from the pioneering work of Arrhenius and Callendar to today’s Earth System Models. Endeavour 40:178–187 2. Du Q, Bao TN, Li Y, Huang YD, Shao L (2019) Impact of prefabrication technology on the cradle-to-site CO2 emissions of residential buildings. Clean Technol Environ Policy 21:1499– 1514 3. Yang T, Pan YQ, Yang YQ, Lin MS, Qin BY (2017) CO2 emissions in China’s building sector through 2050: a scenario analysis based on a bottom-up model. Energy 128:208–223 4. Zhou N, Khanna N, Feng W, Ke J, Levine M (2018) Scenarios of energy efficiency and CO2 emissions reduction potential in the buildings sector in China to year 2050. Nat Energy 3:978– 984 5. Lin BQ, Liu HX (2015) CO2 emissions of China’s commercial and residential buildings: evidence and reduction policy. Build Environ 92:418–431

Optimizing CO2 Emissions and Cost of Shear Wall …

475

6. Lin BQ, Liu HX (2015) CO2 mitigation potential in China’s building construction industry: a comparison of energy performance. Build Environ 94:239–251 7. Park HS, Kwon B, Shin Y, Kim Y, Hong T et al (2013) Cost and CO2 emission optimization of steel reinforced concrete columns in high-rise buildings. Energies 6:5609–5624 8. An JH, Bae SG, Choi J, Lee MG, Oh HS et al (2019) Sustainable design model for analysis of relationships among building height, CO2 emissions, and cost of core walls in office buildings in Korea. Build Environ 150:289–296 9. GB50010 (2010) Code for design of concrete structures. China Architecture & Building Press, Beijing, China 10. GB50011 (2010) Code for seismic design of buildings. China Architecture & Building Press, Beijing, China 11. GB/T51366 (2019) Standard for building carbon emission calculation. China Architecture & Building Press, Beijing, China 12. Li Z, Zheng S, Tao Q, Hu Y, Zhao P (2013) Failure modes-based three-level aseismic optimal design for a SRC frame-RC core wall hybrid structure. J Vib Shock, 44–50 13. JGJ3 (2010) Technical specification for concrete structures of tall building. China Architecture & Building Press, Beijing, China

Acceptance of Green Packaging Self-service Access System for Simulated Annealing Algorithm Fang Deng and Xin Guo

Abstract Warehousing system plays a very important role in modern supply chain, and it is the key factor to determine the success or failure of enterprises. With the quickening of residents’ pace of life, both buyers and sellers have much more requirements on the timeliness of commodity transportation. In order to improve the requirements of rapid transportation of goods, people have stronger requirements on the cooperative operation of warehouse system. This paper mainly studies the acceptance of the green packaging self-service access system which simulates the withdrawal algorithm. An improved simulated annealing algorithm is designed to solve the model according to the characteristics of the problem. The improved algorithm is mostly carried out from two aspects: the generating method of the initial solution and the exchange strategy of the neighborhood solution. Finally, the effectiveness of the model and algorithm is verified through practical application research. Keywords Simulated annealing algorithm · Green packaging · Self-service storage system · Algorithm optimization

1 Introduction Warehousing system is the key node of goods storage and transportation, and is an important part of commodity supply chain system. In recent years, with the rapid development of domestic e-commerce, customers’ requirements for goods are constantly improving, and a variety of goods emerge in an endless stream. The storage capacity and operation efficiency of the warehouse system are put forward higher requirements. The operation efficiency of the warehouse system directly affects the performance of the whole supply chain. Since the 1950s, automatic access systems have been widely used in distribution and production environments. An early automated storage system consisted of many shelves. The stacker runs along the laneways between the shelves to serve them. In distribution and production environments, F. Deng · X. Guo (B) Department of Business Administration, Gachon University, Seongnam 13210, Gyeonggi-do, Korea © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_53

477

478

F. Deng and X. Guo

automated access systems are utilized to store goods (including raw materials, semifinished and finished goods, etc.) and also to remove goods from inventory to meet customer requirements. Automatic access systems have many advantages over nonautomatic access systems, such as reduced labor costs and ground space, increased flexibility, and reduced error rates. With the increase of land cost and the diversity of commodity types, it is necessary to design and optimize the streaming access mode in order to achieve the goals of high storage density, low investment cost and low operating cost. During the design and operation of automatic access system, there are many design and control problems that need to be paid attention to. For example, shelf designs, storage strategy, path strategy, standby site strategy, travel time estimation, stacker operation mode, etc. The key for designing a good automatic access system is to enable it to effectively handle current and future requirements without bottlenecks and overcapacity. In addition, the requirements of automatic access system also depend on the use environment of the system to some extent. In a manufacturing environment, the automatic access system must first provide all necessary materials in a timely manner to ensure that the production process runs smoothly. The production process plays a dominant role and cannot stop the production process to wait for the system to provide materials. In the distribution environment, the main function of the automatic access system is to support the order realization process and ensure the customer’s order can be satisfied in time. A traditional automatic access system performs an inventory operation as follows: Firstly, items entering the system are classified and grouped into suitable items for storage in the system. Secondly, weigh the goods to make sure the weight limit is not exceeded. Thirdly, the goods are transported to the I/O point of the system and the information about the goods is stored in a central computer. Fourthly, the central computer arranges the goods to a certain place on the shelf according to certain rules and records the information of this place [1, 2]. Finally, a stacker is utilized to transport the goods from the I/O point to the assigned location. The process of picking up the goods is relatively simple. Upon receipt of the pickup request, the central computer searches the records, finds the storage location of the goods, and arranges the stacker to pick up the goods from the storage location, and the stacker transfers the goods from its storage location to the I/O point of the system [3, 4]. In this paper, the simulated annealing algorithm is used to optimize the green packaging autonomous storage system in the warehouse. The proposed model and the obtained results not only improve the performance of the warehouse system, but also provide some theoretical guidance for managers.

Acceptance of Green Packaging Self-service Access System …

479

2 Packaging Self-storage Based on the Simulated Annealing Algorithm 2.1 Composition Elements of the Simulated Annealing Algorithm Application of simulated annealing algorithm to solve combinatorial optimization problem, the problem of the objective function f(I) and its solution corresponding to the energy of the solid E(I) and its microscopic, assume that decrease with algorithm process control parameter t act as the role of in the process of solid annealing temperature t, on the assumption that conditions, according to each value of control parameter t, the Metropolis algorithm runs a continuous iterative process of “generation of new solutions, judgment, acceptance/rejection”, which is the process of simulating a solid to a gradual equilibrium at a specific temperature, and is also an iteration of the Metropolis algorithm [5]. The Metropolis algorithm starts from the randomly generated initial state and obtains the final equilibrium state of the system through the evolutionary iteration process of the algorithm. Similar to this process, the simulated annealing algorithm also starts from an initial solution. After a large number of transformations of the initial value, it can be obtained under the condition of given control parameters. For the approximate optimal solution of the combinatorial optimization problem, when the value of the control parameter t slowly decreases, Metropolis algorithm carries out repeated iteration. As the control parameter t gradually approaches zero, the overall optimal solution of the combinatorial optimization problem can be finally obtained [6]. The main components of simulated annealing algorithm are as follows: (1)

(2)

(3)

(4)

Search space  The search space is also known as the state space, which is a set composed of feasible solutions, where a state I corresponds to a feasible solution of the actual optimization problem [7]. Energy Function E(X) The energy function is equivalent to the objective function of the actual optimization problem, and the point corresponding to the minimum value of the function is the optimal solution to be sought [8]. State transition rule P The rule of state transfer refers to the probability value of the transition of the former state Iold to the later state Inew in the annealing process, which is determined by the current temperature parameter T [9]. Cooling schedule The cooling schedule refers to the cooling equation when the annealing process changes from the high temperature state T0 to another low temperature state [10].

Assuming that T(t) is the temperature value at time T, the cooling equation of the basic simulated annealing algorithm is as follows:

480

F. Deng and X. Guo

T (t) =

T0 lg(1 + t)

(1)

The cooling equation of fast simulated annealing algorithm is as follows: T (t) =

T0 1+t

(2)

All the above equations can ensure that the iterative process of the simulated annealing algorithm converges gradually to the global optimal solution. However, in the practical application, the following formula (3) can also be used for cooling management in order to facilitate calculation: T (t) = k ∗ T (t − 1)

(3)

In order to ensure that the cooling process can proceed slowly and that the thermal equilibrium state can be reached at each temperature value, the coefficient k should be slightly less than 1.0, and cannot be excessive values [11, 12].

2.2 Improved Simulated Annealing Algorithm Considering that the problem studied in this paper belongs to the NP problem, if the traditional simulated annealing algorithm is directly used to solve the problem, it may consume a lot of time, and the effect of the solution obtained is not good. In view of this, this paper designed an improved simulated annealing algorithm, that is, the traditional simulated annealing algorithm as the basic framework, the introduction of the idea of group neighborhood transformation, according to the characteristics of the problem, the design of the initial solution generation strategy, effectively improve the initial individual’s good, so that the performance of the algorithm has been qualityimproved. In addition, according to the structural characteristics of the designed individuals, a new individual generation strategy is developed, which effectively improves the directivity of the algorithm search. The improved simulated annealing algorithm designed in this paper has efficient local excavation ability and excellent global search ability. (1)

Basic steps of the algorithm

The initial solution generation strategy of the algorithm is based on heuristic rules, and the neighborhood transformation strategy is given in combination with the characteristics of the studied problem. The specific steps of the improved simulated annealing algorithm are as follows. • Step 1: Initialize parameters and input relevant original data; • Step 2: Generate H initial solutions based on heuristic rules, and ensure the feasibility and optimal health of initial solutions;

Acceptance of Green Packaging Self-service Access System …

481

• Step 3: Based on the neighborhood transformation strategy designed in this paper, the generation of new individuals is realized, and the original individuals are consistent with the new individuals. That is, in each iteration, an original individual has and only has one new individual corresponding to it. • Step 4: Calculate the fitness of all individuals (including the original individual and the new individual) and record the global optimal individual; • Step 5: Calculate the fitness difference between the new individual and the original individual, update the original individual according to the Metropolis acceptance criterion, and record the fitness of the original individual; • Step 6 if the number of iterations at the current temperature does not reach the number of internal cycles, go to Step 7; otherwise go to Step 8; • Step 7: Use neighborhood transformation strategy to generate new individuals, calculate the fitness of new individuals, and record the global optimal individuals, then go to Step 5; • Step 8: Implement the cooling strategy. If the current temperature does not reach the termination temperature, go to Step 7; otherwise go to Step 9; • Step 9 outputs the global optimal individual. The cooling strategy mainly includes three methods. The first method is the cooling coefficient method, that is, the temperature after cooling is equal to the original temperature multiplied by the cooling coefficient, and the value of the cooling coefficient is usually between 0.95 and 0.99. The second is gradient cooling method, that is, the value of each cooling is a fixed constant, and the value of this constant is usually between 0.01 and 1; the last is the dynamic cooling method, in which the temperature of each reduction is influenced by the quality of the current optimal solution and the current temperature, which is usually more complex. In view of this, the cooling strategy in this paper adopts the cooling coefficient method. (2)

The termination condition of the algorithm

The algorithm designed in this paper is an improved simulated annealing algorithm. The main improvements are the introduction of group operation, generating initial solution based on heuristic rules and designing neighborhood transformation strategy combining the characteristics of the problem. The main framework of the algorithm is the simulated annealing algorithm, whose iteration times are mainly affected by the initial temperature, the termination temperature, the cooling coefficient and the number of internal cycles. Therefore, the termination condition of the algorithm is to reduce the temperature to the termination temperature.

482

F. Deng and X. Guo

3 Green Packaging Self-storage Algorithm Verification 3.1 Parameters Related to the Algorithm To effectively improve the search performance of the algorithm and not only focus on the algorithm search quality, and promote the efficiency of balancing algorithm, the experiment many times after comparative analysis, this article related parameter selection of improved simulated annealing algorithm are as follows: 30 group size, initial iteration temperature 100, terminate the iteration 0.12 temperature, cooling coefficient 0.97, the inner loop iteration number 15.

3.2 Sensitivity Analysis In order to further analyze and verify the effectiveness of the proposed algorithm, a sensitivity analysis experiment was carried out. Considering that the influencing factors of the algorithm mainly include the size of the solved case and the influence of the tank volume, the sensitivity analysis experiment in this paper is composed of two parts: the sensitivity analysis under different case volume and the sensitivity analysis under different tank volume.

4 Verification Results of the Green Packaging Self-storage Algorithm 4.1 Sensitivity Analysis Under Different Calculation Case Sizes In order to verify the effectiveness of the algorithm presented in this paper under different calculation case sizes, the arrival time of inner set card, the reference value, the volume of pressure box and the distribution of box locations under different calculation case sizes were given according to the empirical distribution. As shown in Fig. 1, the value of the algorithm in this paper is not only affected by the scale factor, but also by the box volume, the reference value and the box location distribution. In terms of solving time, the solving time of the algorithm in this paper shows a linear trend of slow growth with the increase of problem size, which verifies the effectiveness of the algorithm.

Acceptance of Green Packaging Self-service Access System …

483

600

Value

500 400 300 200 100 0 Target volume

Amount of the closet

Total cartons

Time consuming(s)

Data set 1

2

3

4

Fig. 1 Experiments on different numerical examples

4.2 Sensitivity Analysis Under Different Pressure Volume Considering that the algorithm in this paper is also affected by the factor of low pressure volume, in order to verify the effectiveness of the algorithm under different low pressure volume, 60 target boxes are taken as the basic scale, and the integer interval of [0, 1], [0, 2], [0, 3] and [0, 4] are respectively taken as the generation interval of the low pressure volume of each target box. The arrival time of the inner set card, the reference value and the distribution of the box are given according to the empirical distribution. As shown in Table 1 and Fig. 2, the target value of the algorithm in this paper generally presents a linear growth trend with the increase of the container volume. However, the target value is also affected by the arrival time of the inner set card, the reference value, the container volume and the distribution of the container position and other factors, so some examples have abnormal situations. On the other hand, the target value increases with the increase of tank volume, but the trend is not as obvious as the change trend of the target value under different calculation example scales, so the target value is affected by both tank volume and target tank volume. In terms of solving time, the solving time of the algorithm in this paper is almost not affected by the factors of pressure tank volume. Table 1 Experiment with different pressure volume Target volume

Amount of the closet

Total cartons

Time consuming (s)

1

60

27

87

251.63

2

60

46

106

254.14

3

60

63

123

255.37

4

60

94

154

250.38

484

F. Deng and X. Guo

300 250

Value

200 150 100 50 0

Target volume

Amount of the closet

Total cartons

Time consuming(s)

Data set 1

2

3

4

Fig. 2 Experiment with different pressure volume

5 Conclusion Warehousing system is an important part of modern supply chain. In order to ensure the efficient operation of the supply chain system, it is necessary to optimize the operation efficiency of the storage system. The efficient operation of the warehouse system is also the key factor that determines the success or failure of an enterprise. The performance of warehouse system is an important factor that determines the efficiency of logistics network distribution in supply chain. With the gradual popularization of artificial intelligence and the continuous development of modern logistics technology, more and more new warehousing systems have appeared. Merchants and customers are becoming more and more receptive to self-service storage systems. This paper mainly studies the efficiency optimization of packaging self-help storage in storage. From the data analysis, the quality of the optimal solution finally obtained in this paper is good, but the optimal solution is not given, and the loading effect cannot be intuitively seen. Therefore, in the subsequent research, the optimal solution can be further combined with the Matlab simulation system Simulink to display.

References 1. Mohammadi-Hosseininejad SM, Fereidunian A, Shahsavari A et al (2016) A healer reinforcement approach to self-healing in smart grid by PHEVs parking lot allocation. IEEE Trans Industr Inf 12(6):1–1 2. Santos SF, Fitiwi DZ, Cruz M et al (2019) Analysis of switch automation based on active reconfiguration considering reliability, energy storage systems, and variable renewables. IEEE Trans Ind Appl 55(6):6355–6367

Acceptance of Green Packaging Self-service Access System …

485

3. Bioletti L, Capuano MT, Vietti F et al (2016) Celiac disease and school food service in Piedmont Region: Evaluation of gluten-free meal. Annali Di Igiene Medicina Preventiva E Di Comunità 28(2):145–157 4. Pishchin ON, Ivakin AA (2017) Reducing the transportation network load of the service provider using distributed content storage system. Vestnik of Astrakhan State Technical University Series Management Computer Science and Informatics 2:80–87 5. Gao Y, Nan X, Kai H et al (2017) An optimized clustering approach using simulated annealing algorithm with HMM coordination for rolling elements bearings’ diagnosis. J Fail Anal Prev 17(3):1–18 6. Jiang P, Ge Y, Wang C (2016) Research and application of a hybrid forecasting model based on simulated annealing algorithm: a case study of wind speed forecasting. J Renew Sustain Energy 8(1):226–239 7. Rui Z, Cheng W (2017) A simulated annealing algorithm based on block properties for the job shop scheduling problem with total weighted tardinessobjective. Comput Oper Res 38(5):854– 867 8. Wang X, Liu C, Xu D et al (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84(3):1417–1429 9. Ezugwu ES, Adewumi AO, Frincu M (2017) Simulated annealing based symbiotic organisms search optimization algorithm for traveling salesman problem. Expert Syst Appl 77(Jul.):189– 210 10. Zou DX, Wang GG, Pan G et al (2016) A modified simulated annealing algorithm and an excessive area model for floorplanning using fixed-outline constraints. Front Inf Technol Electron Eng 17(11):1228–1244 11. Najeeb M, Mansor M, Razali R et al (2017) An Intelligent voltage controller for a PV inverter system using simulated annealing algorithm-based PI tuning approach. J Eng Appl Sci 12(3):660–669 12. Chen H, Wu C, Zuo L et al (2017) Optimization of detailed schedule for a multiproduct pipeline using a simulated annealing algorithm and heuristic rules. Ind Eng Chem Res 56(17):5092–5106

Influence of Environmental Regulations on the Performance of China’s Heavy Pollution Listed Companies Based on Eviews 8.0 Software Yunyan Peng and Yongbo Sun

Abstract With people’s increasing attention to environmental issues and the promotion of “sustainable development” strategies, enterprises are facing increasingly prominent environmental externalities caused by production. But what kind of impact environmental regulations will bring to the performance of enterprises has yet to be determined in academia. This paper selected listed companies in China’s heavy pollution industries as a sample, and used Eviews 8.0 software to study the influence of environmental regulations on the economic performance of heavily polluting companies. The empirical results gotten in this experiment show that environmental regulations are positively correlated with corporate economic performance, which is in line with the “Porter Hypothesis”, that is, environmental regulations have a positive incentive effect on the economic performance of companies. It is recommended that the government adopt measures such as intensifying environmental regulations, actively implementing incentive-based environmental regulations, and granting policy subsidies to enterprises. Keywords Environmental regulation · Company performance · Economic externality

1 Introduction Nowadays, with the improvement of national environmental awareness, environmental performance has gradually become an important factor in measuring the overall strength of companies. At the same time, social problems caused by pollution have occurred from time to time. Therefore, China has begun to change economic development models, taken the path of ecological industry, and gradually emphasized the improvement of the environment and the construction of ecological civilization. Practice has shown that environmental protection and economic development are not

Y. Peng (B) · Y. Sun Heilongjiang University of Science and Technology, Harbin, Heilongjiang, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_54

487

488

Y. Peng and Y. Sun

contradictory to each other. The government has strengthened the economic regulation of companies that violate the environment and improved the level of risk control. This article adopts the panel data of China’s heavily polluting listed companies as a sample to build a model of the influence of environmental policy intensity on corporate production performance, and collates the research results into a paper.

2 Research Background In recent years, with the improvement of national environmental awareness, environmental performance has gradually become an important factor in measuring the overall strength of enterprises, prompting operators to consider more environmental factors in decision-making, and incorporating environmental management countermeasures and concepts into corporate strategies at various levels and daily business. At the same time, social problems caused by pollution have occurred from time to time. Although these companies have made great contributions in terms of GDP contribution and employment, environmental issues are also urgent. This is not only related to China’s development, but also to its international status. China has begun to change its economic development model, taking the path of ecological industry, and gradually emphasizing the improvement of the environment and the construction of ecological civilization. It has issued a series of environmental policies based on market instruments, all of which aim at the internalization of negative environmental externalities. Compared with the environmental policy of command control, the market law is weak and has limited direct impact. At the same time, it has the advantage of flexible application that can minimize the adverse effects of pollution control on the economy. It has a greater incentive effect for enterprises, and a better incentive effect [1]. Practice has shown that environmental protection and economic development are not contradictory to each other. It is needful to strengthen the economic regulation of companies that violate the environment and improve the level of risk control. In the process of policy making, market forces cannot be ignored more and more. The government should not only restrict companies from the technical level and continue to implement relevant environmental policies, but also regularly disclose environmental information. High-strength environmental regulations require companies to increase the cost of environmental regulations, improve their technical level, and develop environmentally friendly products, even if their economic performance will be affected. However, its impact on corporate performance is still inconclusive.

Influence of Environmental Regulations on the Performance …

489

3 Correlational Research Status At present, the academic circles mainly hold three views on the influence of environmental regulations on the economic performance of enterprises, Porter Hypothesis, Restriction Hypothesis and Uncertainty Hypothesis. Hurt and Ahuja [6] found through a study of 127 large-scale companies in the United States that under environmental regulations, the greater the reduction in corporate pollution emissions, the greater the increase in their revenue, and this relationship is particularly obvious in heavily polluting companies. Majumda and Marcus [7] collected data from 150 power companies in the United States and conducted research. The results showed that appropriate environmental regulatory policies can increase the productivity of companies. Hamamoto [9] used data from 5 industries in Japan’s manufacturing industry as a sample to conduct research and found that pollution control costs and research and experimental development (R&D) expenditures are significantly positively correlated, which also has a significant positive impact on total factor productivity. King [2] studied samples of US manufacturing companies and the empirical results showed that companies with lower pollution levels had higher Tobin’s Q values than companies with heavy pollution. Xepepsdeas [3] established a transaction model to simulate the impact of environmental regulations on corporate output and profits under different intensities of pollution tax policy scenarios, and studied the changes in corporate capital composition and its mechanism. The results show that when strict emission tax is implemented, companies may adopt new equipment as a countermeasure, which will increase production efficiency and further increase the output per unit of capital stock. Domazlicky and Weber [8] used relevant data from the chemical industry in the United States from 1988 to 1993 to study and analyze the relationship between environmental pollution control costs and industry productivity. The results show that environmental regulations not only did not lead to a decline in productivity, but promoted its productivity growth rate to maintain between 2.4 and 6.9%. The above scholars’ views confirmed the Porter Hypothesis. However, Dufour, Lanoie, and Patry [5] studied 19 manufacturing industries in Quebec, Canada, and found that the implementation of environmental regulation policies slowed down productivity growth, but hindered the growth of corporate performance, confirming Restriction Hypothesis. In addition, the research results of some scholars’ support Uncertainty Hypothesis. The research results of Johnstone [4] on renewable energy show that policy tools such as public policies, tax incentives, investment incentives, command control, emissions trading, voluntary environmental protection projects, etc., have different effects on patent applications. Jaffe’s [10] empirical research on the relationship between the environmental protection investment and R&D investment of companies, and it reveals that there is a significant correlation between the environmental protection investment and R&D investment of companies. However, there is no direct connection between environmental protection investment and innovation achievements. Berman and Wicks [5] used data from 1985 to 1994 in 17 manufacturing

490

Y. Peng and Y. Sun

industries in Quebec, Canada, and found that a negative correlation between environmental regulations and productivity is sure, but the regression results lagging 4 years show that the relationship is positive related. Through combing the literature, it is easy to find out what kind of impact environmental regulations have on corporate performance. There has not yet been a consensus, and further research is needed.

4 Research Design 4.1 The Proposal of the Research Hypothesis From a short-term perspective, the implementation of environmental regulations makes companies incur environmental regulations costs, which will surely lead to a decline in market performance. However, from the perspective of long-term effects, environmental regulations will increase the price and cost of production factors of enterprises on the one hand, and directly affect market performance. On the other hand, they will change the existing market structure and thus change market performance. Therefore, the influence of environmental regulations on corporate performance is the result of a combination of direct and indirect effects. This is because under the environmental regulation system, companies promote certain pollution control technology innovations or product innovations to achieve cleaner production in order to reduce production pollution emissions or reduce high-polluting products. This type of enterprise innovation can reduce corporate regulatory costs on the one hand, and improve the current production and business model and produce new products on the other, thereby increasing productivity and profits. This is the innovation compensation effect. Meanwhile, the implementation of environmental regulations will create obstacles to the development of enterprises in different industries by increasing enterprise costs, improving enterprise production levels, increasing the amount of necessary capital, and increasing the minimum economic scale requirements. Powerful companies will adjust their own development methods and adopt a series of actions to meet the requirements of environmental regulations. Some enterprises with poor production conditions and no economic strength will be forced to withdraw from the current market because of the lower exit barriers. Companies ready for being listed companies will be influenced due to the impact of the implementation of regulations, which is called the barrier effect. Therefore, this article raises the following assumptions. Hypothesis 1: There is a positive correlation between environmental regulations and corporate economic performance.

Influence of Environmental Regulations on the Performance …

491

4.2 Research Samples and Selection Basis This article selected heavily polluted listed enterprises from 2013 to 2017 as the research samples. (Heavy polluting enterprises are classified into 16 industries, including steel, thermal power, cement, electrolytic aluminum, coal, metallurgy, petrochemical, chemical, building materials, paper making, brewing, pharmaceutical, fermentation, textile, leather and mining, according to Guidelines for Environmental Information Disclosure of Listed Companies published by the Ministry of Environmental Protection.) Because the Ministry of Environmental Protection and the securities market have different industry classification methods, and the sample in this paper used listed companies as the screening criteria, a slight adjustment was made on the basis of the industry classification of the Ministry of Environmental Protection. In the end, this paper selected 9 industries including mining, textile and tanning, chemical industry, thermal power, building materials, coal, metallurgy, papermaking, and pharmaceuticals for data collation and statistics. The basis for sample selection: (1) Exclude ST listed companies (2) Exclude the samples of listed companies in the Tibet Autonomous Region, because some of Tibet’s industrial waste management data are missing, it is impossible to calculate the intensity of its environmental regulations (3) Exclude certain variables for the sample of listed companies with missing indicator data (4) Select only listed companies that issue A shares (5) Exclude companies with insufficient environmental interest disclosure reliability.

4.3 Selection of Research Variables (1)

(2)

(3)

Explanatory variable The intensity of environmental regulation (X), that is, the indicator of the intensity of environmental and economic policies is measured by the sum of the company’s annual pollutant discharge fees and the resource tax collected. The data comes from the annual reports released by the company and Corporate Social Responsibility Report released regularly by the company [13]. Explained variables Return on assets (Y1), which is the ratio of the total amount of returns a company receives in a certain period of time to the average total assets. It is an index represents how much net profit is created per unit of assets, and the return on assets is to show the profitability of a company [13]. Tobin’s Q value (Y2) is the ratio of an enterprise’s market value, which is to the replacement cost of its assets. It reflects the ratio of two different value estimates of a company [12]. Control variables Company size (A) is the average annual total assets of the enterprise. For the measurement of enterprise scale, the “total assets” can show the enterprise scale from two levels: resource occupation and production factors. The production

492

Y. Peng and Y. Sun

Fig. 1 Variable descriptive statistics

scale of a company will affect its technological innovation and its ability to respond to environmental regulations [12]. The debt-to-asset ratio (S), also called the debt operation ratio, is for measuring the ability for companies to use creditors to provide funds for their business activities. It is an indicator that shows the safety degree of creditors’ loan grants as well. It is gotten by comparing a company’s total liabilities with its total assets. It reflects the radio of assets belong to debt in all the assets of the company. It is a comprehensive indicator that can evaluate the company’s debt level [12]. Equity concentration (G) is the quantitative index of equity concentration or dispersion of equity shown by all shareholders due to different shareholding ratios. Equity concentration is the main indicator to measure the distribution status of a company’s equity. It is also an indicator to measure the stability of the company, and the company’s structure. This article used the year-end shareholding ratio of the ten largest shareholders to measure [12]. According to the nature of property rights (SER), this paper divided listed companies into two categories based on the nature of the actual controller of a company: state-owned enterprises and non-state-owned ones. State-owned companies are 1 and non-state-owned companies are 0 [12]. Proportion of independent directors (H). Independent directors are directors who are independent of the company’s shareholders and do not serve within the company. They don’t have necessary business or professional connections with the company or company managers. Meanwhile, they don’t make independent judgments on company affairs (Fig. 1).

4.4 Construction of the Model In order to avoid or alleviate the multicollinearity of variables and the heteroscedasticity of random errors in the overall regression function. This paper used logarithmic transformations for the variables involved in the model.

Influence of Environmental Regulations on the Performance … Table 1 The meaning of variables in the formula

493

Items in the formula

Meaning

Y1

Return on assets

Y2

Tobin’s Q value

X

Strength of environmental regulations

A

Company size

S

The debt-to-asset ratio

SER

Nature of property rights

G

Equity concentration

H

Proportion of independent directors

To measure the direct effect of environmental regulations on the economic performance of enterprises, a dynamic panel data model is constructed as shown in formula (1) (Table 1): Yi = a1 X + a2 A + a 3 S + a4 S E R + a5 G + a6 H + c

(1)

Since environmental regulation is a path-dependent continuous dynamic adjustment process, it is susceptible to the influence of previous data, and there may be a lag effect [11]. It is necessary to introduce a lag term in the dynamic model to control the lag effect, so the data was regressed for 1 year.

5 Empirical Result Analysis This article used Eviews 8.0 software to perform mixed regression, fixed effect regression, and random effect regression on the model to analyze the influence of environmental regulations on corporate economic performance. Although a basic econometric hypothesis for mixed regression of panels is that there is no individual effect, and through the above explanation, it is known that this example does not satisfy this hypothesis, but as a model reference system, mixed regression should still be chosen to perform on the data first. Since the internal situation of each enterprise is hard, there may be missing variables, a fixed-effects model is considered (Figs. 2, 3, 4, 5, 6 and 7). It can be seen from the above regression results that for every 1% change in the intensity of environmental regulation, the return on assets changes around 1%. During the lag period, for every 1% change in the intensity of environmental regulations, the return on assets changes at about 0.4%. Environmental regulations are positively correlated with the economic performance of companies. Hypothesis 1 is verified; The economic performance of enterprises will increase due to the increase in the intensity of environmental regulations. At the same time, it is also found that the size of companies and the debt-to-asset ratio are important factors that affect the rate

494

Y. Peng and Y. Sun

Fig. 2 Regression results of mixed effects

Fig. 3 Results of 1st-order lag regression with mixed effects

of return on assets. The current company size is negatively correlated with the rate of return on assets, while the lagging period is positively correlated. The failure of the immediate enterprise scale may be caused by the high correlation between the enterprise scale and the sum of resource tax and pollution discharge fees. In order to better verify the conclusion, Tobin’s Q value for stability test was also chosen. The result is basically the same as the return on assets, which also confirms Porter Hypothesis.

Influence of Environmental Regulations on the Performance …

Fig. 4 Random effects regression results

Fig. 5 Random effects regression results of 1st-order lag

495

496

Fig. 6 Fixed effects regression results

Fig. 7 Fixed effect regression results of 1st-order lag

Y. Peng and Y. Sun

Influence of Environmental Regulations on the Performance …

497

6 Policy Suggestion 6.1 Enhance the Intensity of Environmental Regulations and Attach Importance to Incentive-Based Environmental Regulations The government should gradually enhance the intensity of environmental regulation and implement reasonable environmental regulation policies. While paying attention to the economic growth rate, we must also focus on the quality of economic development, and optimize the industrial structure by improving the technological level of enterprises. While companies continue to improve their technological level, they also improve their core competitiveness, and through innovation to compensate for the negative influence of environmental regulations on economic performance. The government should accelerate the promotion of incentive-based environmental regulation policies and fully use the advantages of the market. It not only allows companies to meet the requirements of environmental regulations at a lower cost, but also reduces the adverse effects of environmental regulations on business performance.

6.2 Increase Policy Subsidies and Strengthen the Guidance of Company Innovation In addition to continuing to implement compulsory measures, the government must actively use inducement measures to provide policy subsidies to heavily polluting enterprises in the specific implementation of policies for environmental regulation. Specific feasible ways include: (1) Establish a mechanism for paid use of resources and environment, and make the environment market as a production factor. (2) Improve economic policies that promote corporate environmental regulation, and combine environmental taxes, policy subsidies, and tax incentives. The government should encourage companies to intensify innovation to ensure a “win– win” environment for environmental protection and economic growth, and take the lead in market competition. Innovation is the core of an enterprise and its core competitiveness. Only companies with innovative strength can have sustained and excessive operating profits. Moreover, innovation can compensate for the additional costs of environmental policies in the future. Thus, all institutes in society should improve environmental control standards, encourage companies to perform research and development, enhance their competitiveness, and improve their economic performance.

498

Y. Peng and Y. Sun

6.3 Strengthen Environmental Performance Supervision and Promote the Construction of a Green Financial System From the perspective of government supervision and corporate autonomy, environmental supervision by local governments can help companies improve environmental performance, reduce corporate pollution emissions, and promote the development of new energy and green economy for companies. This paper believes that the government should supervise the production of companies together with other stakeholders, and provide more policy support for companies with clean energy and clean products, which will help to take the path of green development. The government should organize regular environmental protection education policy seminars to support the transformation of companies’ development strategies and the preparation of green development paths. At the same time, China’s green financial system has not yet been fully established, and related environmental and economic policies are still relatively backward. In the future, relevant environmental policies will continue to be improved, and financial means must be fully used to achieve a green financial strategy that improves environmental performance and reduces financial risks. As a necessary foundation for the implementation of green insurance, green bonds, and green credit policies, guarantee and evaluation mechanisms must be improved as soon as possible, and relevant guidelines for environmental performance evaluation must be improved.

7 Conclusion, Shortage and Outlook This article used the panel data of China’s heavily polluting listed companies as a sample to construct a model of the influence of environmental policy intensity on company production performance, including immediate and lagging 1st-order mixed effects, fixed effects, and random effects models. The empirical research results show: Environmental policies are helpful on the production performance of enterprises, which validates the “Porter Hypothesis”. The reason for this result may be that a properly designed environmental policy improves the production efficiency of companies, thereby helping to enhance their competitive advantage. The shortcomings of this paper are that the sample size is too small, and it does not consider all impacts of different industries and types of environmental regulations on corporate performance. How to incorporate industry factors and environmental regulations into the research system will be the focus of the next phase of research. Acknowledgements This paper is the phased achievement of the scientific research and cultivation project funded by undergraduate colleges and universities in Heilongjiang Province and the national social science fund project (Project number: 13BJY059) in 2020.

Influence of Environmental Regulations on the Performance …

499

References 1. Jia N, Chen S (2017) A study on the relationship of environmental regulations and economic performances. IOP Conf Ser Earth Environ Sci 94(01):12–35 2. Saenz S, Atochekong C (2014) Profiting from environmental economic regulations: the mediating role of innovation capabilities. In: Portland international conference on management of engineering & technology. IEEE 3. Meng XH, Zeng SX, Tam CM (2013) From voluntarism to regulation: a study on ownership, economic performance and corporate environmental information disclosure in China. J Bus Ethics 116(01):217–232 4. Reynaud A (2012) Assessing the impact of formal and informal regulations on environmental and economic performance of Brazilian manufacturing firms. Working Papers 52(01):65–85 5. Berman SL, Wicks AC, Kotha S et al (1999) Does stakeholder orientation matter? The relationship between stakeholder management models and firm financial performance. Acad Manag J 42(05):488–506 6. Nuesse CJ (1996) Talcott Parsons. Structure and process in modern societies. Free Press, New York, 1996, pp 103 7. Dowling J, Pfeffer J (1975) Organizational legitimacy: social values and organizational behavior. Pac Sociol Rev 18(01):122–136 8. Neu D, Warsame HA, Pedwell K (1998) Managing public impressions: environmental disclosures in annual reports. Acc Organ Soc 23(03):265–282 9. Ho SSM, Wong KS (2001) A study of the relationship between corporate governance structures and the extent of voluntary disclosure. J Int Account Audit Tax 10(02):139–156 10. Marshall S, Brown D, Plumlee M (2009) The impact of voluntary environmental disclosure quality on firm value. Acad Manag Proc 01:99–103 11. Dhaliwal DS, Li OZ, Tsang A et al (2011) Voluntary nonfinancial disclosure and the cost of equity capital: the initiation of corporate social responsibility reporting. Soc Sci Electron Publish 86(01):59–100 12. Yang Y (2012) Research on the impact of environmental regulations on the performance of thermal power companies. Xi’an Shiyou University 13. Chen H (2014) The impact of environmental policy on enterprise production performance. Fudan University

Development Strategies of China’s Rural Tourism E-Commerce Under the Background of “Internet Plus” Jinyu Zhou

Abstract The arrival of the Internet era has provided unprecedented opportunities and challenges for the development of rural tourism in China. Although China has a certain development prospect in rural tourism and e-commerce, its development of rural tourism e-commerce is still lagging behind compared with that of developed countries. This paper analyzes the current situation and existing problems of rural tourism e-commerce in China, and proposes that the government should improve the strategic planning and integrate the business platforms of rural tourism to realize sustainable development. Internet big data should be applied to develop rural tourism community and create people-oriented e-commerce website services; multi-disciplinary talents of rural tourism e-commerce should be vigorously cultivated; the operators should change their ideas, keep pace with the times and diversify their marketing, so as to promote the development of rural tourism e-commerce in China. Keywords Internet+ · Rural tourism · E-commerce · Innovation and development Since China put forward the “Internet Plus” Action Plan in 2015, all walks of life have been involved in it. On one hand, the term “rural e-commerce” was highlighted rapidly, and rural e-commerce has gradually become an important thrust for the development of rural economy, the promotion of agricultural supply-side structural reform, and the increase of farmers’ income; On the other hand, China’s tourism has taken the express train of “Internet Plus” to becoming one of the largest and fastestgrowing industries in China’s e-commerce. As of December 2018, the number of Internet users booking air tickets, hotels, train tickets or tourism products online reached 401 million, an increase of 52.85 million or 15.2% compared to the end of 2017. In 2018, the transaction scale of China’s online tourism market reached RMB 1,077.2 billion, a year-on-year increase of 30%. Rural tourism e-commerce is the development mode combining rural tourism economy and e-commerce, which is J. Zhou (B) School of Foreign Language and International Business, Guangdong Mechanical & Electrical Polytechnic, Guangzhou 510630, Guangdong, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_55

501

502

J. Zhou

generated in the vigorous development of “Internet Plus”. It takes the rural tourism market as the main body, e-commerce as the basis, Internet as the carrier, to operate the rural tourism market and sell rural tourism products through modern network-based information technologies.

1 Current Situation of the Development of Rural Tourism E-Commerce With the improvement of residents’ living standards and the development of information technology, rural tourism as a way of leisure and entertainment has emerged. The rapid development of e-commerce has added fuels for rural tourism and provided opportunities for the development of leisure agriculture and rural tourism. Its development has promoted the development of rural tourism to some extent. It not only provides consumers with more ways of leisure and entertainment and agricultural products, but also more employment ways for farmers, making leisure agriculture and rural tourism more convenient and humanized [1, 2]. In 2018, General Office of the State Council issued the Opinions of the CPC Central Committee and the State Council on the Implementation of Rural Revitalization Strategy, which clearly put forward that “developing and implementing the excellent projects of leisure agriculture and rural tourism”. Afterwards, a new trend of building characteristic towns, rural tourism inns, guesthouses, tourist farmhouses and characteristic ecotourism has sprung up all over China, and China’s rural tourism e-commerce began a new development. At present, the main development is the government-led tourism information website, or the cooperation with Ctrip, Tongcheng and other third-party tourism e-commerce websites, and the focus is laid on the building of rural tourism website or the sales of rural agricultural products. However, due to immature technology, and lack of experience and professionals, many regional tourism markets and e-commerce markets fail to adapt to the “Internet plus” era, which seriously hinders the development of local tourism economy.

2 Analysis of the Problems Existing in the Development of Rural Tourism E-Commerce 2.1 Lack of Systematic and Professional Planning Due to the lack of systematic and professional planning, rural tourist attractions are in a state of blind development, without prospective planning of rural tourism and e-commerce. In the process of development and construction, they fail to fully integrate the characteristics of local tourism resources, or excavate the connotation of

Development Strategies of China’s Rural Tourism …

503

local rural tourism resources, for which the problems such as disordered construction, primary development, serious damage to the environment, lack of new ideas of products, repeated development modes exist. The first reason is that the local government’s tourism planners are short of forward-looking thinking and cognition [3–5]. They think that the informatization level of rural areas and the villagers’ awareness of tourism e-commerce are low, so they have ignored the planning of rural tourism e-commerce. The second reason is that tourism needs cooperation with a wide range of industries, and the effective integration of rural tourism and e-commerce requires significant human, material and financial resources, for which the local government is not willing to spend too many resources and energy.

2.2 Humanized Service Requires Improvement At present, the service function of most rural tourist attractions websites is far from meeting the requirements of humanized service. Through a systematic comparison of the top ten rural tourism websites in terms of market share in China, it is found that their content is highly similar [6–8]. They focus on rural tourism products, do not target at the demands of tourists, and do not provide tourists with personalized tourism services and the tourism products to choose. For example, some rural tourism websites only provide certain information about its own scenic spots, but less information about other functions and content. Moreover, they are similar in service offerings and have no characteristic services. In addition, many rural tourism websites do not support online purchase of scenic spot tickets. This is mainly because many rural tourism e-commerce platforms do not have the idea of humanized service, and there is no related talent to guide them. Therefore, the websites are seriously lacking of humanized services. Service is an important factor affecting a tourist’s experience of local landscape, and the longer such service is absent, the worse the effect will be caused.

2.3 Lack of Multi-disciplinary Talents of Rural Tourism E-Commerce In recent years, with the continuous development of rural tourism, more and more professional and technical talents are required for the management. In the actual work, although they have many years of rural tourism operation and management experience, there are still deficiencies in website construction and e-commerce development [9, 10]. The operation and management of a tourism website require many respects of knowledge. The staff should not only master Internet-related knowledge, but also be proficient in marketing, economics and management. However, looking at the relevant practitioners of rural tourism e-commerce platforms, most of

504

J. Zhou

them can only master one or several aspects of knowledge, and cannot reach every aspect of a matter, for which their works are only time-consuming and laborious, but also hinders the development of the industry. In addition, although the corresponding talent management strategy has been issued, the construction and management of the website are not improved, and the development of rural tourism is still stagnant. This is mainly caused by two reasons. On one hand, most of the tourism professionals cultivated by colleges and universities major in marketing, which is not naturally adapted to tourism and e-commerce. On the other hand, many e-commerce teachers in colleges and universities do not come from the tourism industry, and lack relevant teaching and practical experience of tourism. The vigorous development of rural tourism e-commerce is in sharp contrast to the severe shortage of corresponding talents.

2.4 Lack of Online Marketing and Publicity Method Currently, rural tourism development still uses conventional marketing methods, relying on publicity by local government, word of mouth, bus advertising, cultural festivals and etc. Of course, some regions also use the Internet for publicity and marketing, such as WeChat official account, Weibo, short video applications (e.g. Tik Tok, Kuaishou, etc.), but fail to draw much attention. Taking Weibo as an example, the number of fans of each province’s microblogs related to rural tourism is very small. For example, the Weibo account registered in the name of “Sichuan Tourism” has 1.03 million fans, but very few comments and retweets. Worse still, there are no comment or retweet related to “rural tourism” and “online tourism”. In terms of WeChat official account, the well-operated official account of Guangdong Rural Tourism Association is also low in the number of views, without ideal publicity effect. It is almost blank in using e-commerce platforms for propaganda. Therefore, the online publicity method of rural tourism e-commerce is relatively simple (Fig. 1).

3 Development Strategies for Rural Tourism E-Commerce Under the Background of “Internet Plus” In view of the problems existing in the development of rural tourism e-commerce, we can use the characteristics of e-commerce to solve them, so as to promote the development of rural tourism e-commerce.

Development Strategies of China’s Rural Tourism …

505

Fig. 1 Rural tourism settlement landscape

3.1 The Government Should Improve the Strategic Planning and Integrate the Business Platforms of Rural Tourism to Realize Sustainable Development In the tourism industry, due to different positions in the industry chain, market competition positions, economic strength, human resources and other factors, the demand size, investment scale and application capability of each enterprise in terms of ecommerce are also different. As such, local governments at all levels should actively participate in the planning and formulation of rural tourism e-commerce, which can not only ensure the basic direction and focus of rural tourism e-commerce development from macroscopic aspects, but also contribute to practitioners’ operation and management of rural tourism e-commerce from microscopic aspects, so as to achieve the goal of the reasonable and sound development of rural tourism in China. First, with the support from relevant government authorities, government agencies related to rural tourism should be set up to manage all aspects of rural tourism, and supervision and good regulation should be conducted to ensure the rural tourism mainly in the form of e-commerce operates within a reasonable scope and in an orderly manner, so as to better promote the rapid and comprehensive development of local rural tourism. Second, strict control by and close cooperation from relevant government authorities are also required. Tourism projects in various regions should be well planned. It is necessary to have a deep understanding of the local development status and economic level, wage reasonable communication and planning, and develop local unique tourism projects and corresponding boutique tourism routes by making use of local unique characteristics, such as local customs and local

506

J. Zhou

unique natural landscapes. Finally, local rural tourism plans should be vigorously promoted on the Internet platform related to rural tourism to actively publicize relevant tourism projects and products, allowing tourists to fully understand the relevant content and choose their own projects and related tourism services according to their own situation.

3.2 Using Internet Big Data to Develop Rural Tourism Community and Create Humanized E-Commerce Website Service A rural tourism e-commerce enterprise should use Internet big data and mining technology to integrate the information of target or potential consumers, find out the relevance of their browsing information, analyze their behaviors, interest characteristics and preferences, and develop rural tourism communities. Therefore, it is necessary to pay attention to the layout of mobile terminals, and maintain the operation and sound development of the system through incentive, screening, promotion and other mechanisms. Targeted personalized products and services should be launched, and personalized customized tourism products and services should be provided. For example, young people who like to try new things may be recommended adventurous, novel and experiential rural tourism products; for the middle-aged and elderly with nostalgic complex, the rural tourism products with historical background and cultural heritage may be recommended. In order to meet the demands of more tourists and improve the satisfaction of tourists to the rural tourism e-commerce website services, it is necessary to build a complete set of humanized e-commerce website service system, to improve the service quality and leave tourists a better service experience. For this purpose, tourism applications or WeChat applets may be developed, the humanized service system should be improved through specialized and integrated operation mechanism, tourists should be provided with one-stop services by sharing information resources among scenic spots to increase tourist projects, and the content and functions of a website should be improved to provide better services for tourists. This requires that the person in charge of the website content should add some unique rural tourism resources, such as customs and flavor snacks, in addition to introducing the relevant content of scenic spots. The public toilets, scenic spot locations and dining places in a tourist attraction should also be marked to improve the service quality. In terms of function, in addition to the function of purchasing tickets, it is also necessary to provide transaction inquiry, information consultation, customer service telephone number, tourist message, tourist experience evaluation, surrounding facilities searching, hotel booking, air tickets and bus tickets purchasing and other functions on an e-commerce website, so as to expand the influence of a scenic spot e-commerce website.

Development Strategies of China’s Rural Tourism …

507

3.3 The Cultivation of Rural Tourism E-Commerce Talents Should Be Valued Professional e-commerce talents are essential to the development of e-rural tourism e-commerce in China. First, the government may enter into rural tourism e-commerce orders with colleges and universities to cultivate professional talents in a targeted and quantitative way, moderately improve the salary and welfare benefits and provide a relatively high-quality working environment for the staff. Second, attach importance to the training of on-post staff, actively make use of advanced working technologies and ideas, and employ professional lecturers to strengthen the working enthusiasm of rural tourism e-commerce staff and improve their professional skills. Third, encourage the youth to return home for employment and promote the development of local economy, so as to assist the development of rural tourism ecommerce. Finally, rural tourism operators may organize regular training courses or lectures on e-commerce knowledge to improve the villagers’ awareness and cognition of e-commerce, in order to promote the rapid development of rural tourism and e-commerce.

3.4 Operators Should Change Their Ideas, Keep Pace with the Times and Diversify Their Marketing Efforts In the Internet era, the development of rural tourism cannot just rely on the government. As the operators of rural tourism, both enterprises and individuals should actively change their management ideas, keep pace with the times, and accept and embrace new things. First of all, they should innovate their thoughts, be able to accept new things, new platforms and new technologies, and frequently participate in relevant technical training courses or lectures to improve personal abilities. Second, they should do market researches, analyze new trends in the market, truly understand the demands of customers, pay attention to the interaction between new and old customers, and explore new models of community marketing. New media marketing is an important channel for the promotion of e-commerce. Live broadcast, WeChat, Weibo, Tik Tok, Toutiao and other new media platforms have provided us with rich network marketing tools. Therefore, we can use information platforms with a large number of active users for publicity and promotion, such as Toutiao, WeChat, Weibo, applications and other self-media platforms to achieve the “fan attraction” effect.

508

J. Zhou

References 1. Cao C (2019) Research on the rural tourism e-commerce development in counties in Sichuan Province based on rural revitalization. Econ Res Guid 05:93–94 2. Zhang S (2020) Research on the development of rural tourism e-commerce in the internet era. Northern Economy 01:159–160 3. Ren L (2019) Research on the development strategies of Hainan rural tourism e-commerce in the era of big data innovation. Inf Technol Appl 04:119–120 4. Wang M (2019) Research on the current situation of rural tourism e-commerce under the background of “Internet Plus.” Think Tank Era 04:7–8 5. Wang F (2015) Development status and countermeasures of cross-border electronic commerce in China. China Circulation Economy 36(03):38–41 6. Lai Y, Wang K (2014) Development patterns, obstacles and next steps of cross-border electronic commerce in China. Reform 05:68–74 7. Hong T, Zhang C (2015) 2014–2015 China agricultural products e-commerce development report. China Business Theory 8. Zhang Z, Chen P, Ye C, Characteristics and trends of e-commerce development in China. In: “Decision Forum” 9. Ming W-L, De X-X, Research on the present situation and development of Fujian’s Export to cross-border electronic commerce—taking the development strategy in Thailand under the background of “the belt and road initiative” as an example 10. Wu C (2015) Analysis on the development mode of fresh e-commerce abroad. World Agric 05:136–138

Application Method of BIM in Bridge Operation and Maintenance Yu Peng, Zheng Li, Tao Hu, Yangjun Xiao, Juan Wen, and Yu Liu

Abstract The construction industry puts forward the transformation goal of “digital construction”, and starts the research and demonstration application of bridge operation and maintenance information model. Under this background, the necessity and urgency of positive design of BIM (building information modeling) is highlighted. This paper studies the application method of BIM Technology in bridge operation and maintenance, puts forward the modeling and definition method of BIM software in operation and maintenance, and realizes the automation of BIM operation and maintenance drawing calculation by quantifying the construction of bridge. In this paper, BIM Technology is combined with operation and maintenance measurement system to achieve the accuracy of three-dimensional bridge modeling. In this paper, the bridge building operation and maintenance measurement system uses STM32 microprocessor as the main body, keeps the modular design, avoids the contradiction of multi-channel attitude communication. The processor adopts cortex-m4 architecture, optimizes the cost and power sensitive problems, and its 32-bit processor can support floating-point operation. High control performance is the basis of the normal operation of the system. The research shows that the operation and maintenance results of BIM forward design are more than 45% better than that of CAD design process, and the operation and maintenance cost can be reduced by 25–55%. In addition to the drawings in the traditional sense, BIM models of various specialties are integrated, as well as a series of results derived from BIM models, such as roaming animation, panorama, VR/AR scenes, various statistical tables, various visual analysis, etc. The design of BIM model itself can continue to be applied to the operation and maintenance stage, so as to create more added value.

Y. Peng · Z. Li (B) · T. Hu · Y. Xiao · J. Wen Chongqing Chengtou Road and Bridge Administration Co., Ltd., Chongqing 400060, China Y. Peng School of Civil Engineering, Chongqing University, Chongqing 400045, China Y. Liu Chongqing Municipal Research Institute of Design Co., Ltd., Chongqing 400020, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_56

509

510

Y. Peng et al.

Keywords Building information model technology · Bridge operation and maintenance · Visual model · Automatic drawing calculation

1 Introduction The existing bridge management process includes traditional model, illegal assembly management, communication interruption and distribution, and the management effect is very different. The ability to apply BIM Technology can improve the quantification and safety of existing bridges. From an important point of view, we analyze the existing bridge management, lack of management, middle BIM Technology Management and specific application methods according to the management mode of BIM Technology. Sawyer pointed out that there are some problems in the bridge operation and maintenance, such as the lack of intelligent software. In the modeling stage, it is impossible to connect with the front-end design data to automatically generate the model, which results in a huge amount of turnover work [1]. Zhao put forward that most of the splitting and reinforcement of prefabricated components in the design stage are designed manually, so the design work is heavy. Compared with two-dimensional design, the workload of three-dimensional design has increased. If the degree of software intelligence is insufficient, it will seriously affect the design efficiency [2]. Mikkonen a pointed out that the degree of software localization is low. At present, the BIM design software commonly used in the deepening design stage is mainly foreign software, such as planbar, Tekla, etc., and the degree of perfection of its graphics processing ability and other software functions is unmatched by domestic software [3]. Telena pointed out that the value of digital technology application is difficult to reflect, and the poor data interaction is mainly reflected in the poor data interaction between the traditional structural design software and the detailed design software. The design BIM model in the operation and maintenance drawing stage can not be imported into the detailed design software for direct use. Except for a few software, most of the component detailed design needs to re create the model. The design model data in the operation and maintenance diagram stage is not well transferred, the workload of repeated modeling is heavy, and BIM data is missing in this process [4]. Stampler pointed out that most of the component production is still based on the manual production of workers according to the design drawings, the deepening design software has become an auxiliary drawing tool, the data of BIM model created in the design process has not been used, and the application value of digital technology is difficult to reflect [5]. The research of the above bridge operation and maintenance shows that the high price, design specifications and drawing standards do not conform to the domestic standards, which also become the barrier for its wide application. The data interaction between the bridge operation and maintenance design software and the production management software is poor. Some foreign software has realized the automatic production of design data directly to the factory equipment. However, due

Application Method of BIM in Bridge Operation and Maintenance

511

to the lack of unified data transmission standards, intelligent production management software and supporting automatic production equipment in China, the design data can not be connected to the automatic production of industrial software driven components. This paper studies the application method of BIM (building information modeling) technology in bridge operation and maintenance, puts forward the modeling and definition method of BIM software in operation and maintenance, and realizes the automation of BIM operation and maintenance drawing calculation by quantifying the construction of bridge. In this paper, BIM Technology is combined with operation and maintenance measurement system to achieve the accuracy of three-dimensional bridge modeling. It improves the operation and maintenance efficiency and reduces the operation and maintenance cost.

2 BIM Application Method for Bridge Operation 2.1 BIM Operation and Maintenance Application Method (1)

(2)

In the daily and special inspection of bridge operation and maintenance management, it is necessary to inspect the bridge facilities, and there are often problems such as the inspection is not in place, the inspection is not standardized, and the inspection information is missing [6]. Therefore, build BIM inspection path model of bridge, standardize inspection route, regularly and quantitatively conduct periodic inspection as required, demonstrate daily inspection route, and form standardized inspection route based on BIM model [7]. In the special inspection management under specific circumstances, for special inspection items such as key parts and inspection after rain, the inspection path of BIM plane model is formulated, the BIM facilities and structure model of inspection content are established, the photos and data information of inspection site are uploaded to the cloud platform, and the site conditions are compared with the BIM model. Realize the special patrol management of storage inspection records and efficient search function in one [8]. In the process of daily and special inspection, we should combine the wireless punch in technology, implement the special safety equipment for special personnel, install the signal device in the safety helmet and safety clothing, automatically punch in and display the personnel inspection information, and store the inspection records by calculator to implement the responsibility [9]. Daily cleaning during bridge operation belongs to the main scope of daily operation and maintenance work, while bridge operation belongs to 24-h uninterrupted vehicle traffic. The safety accidents of cleaning personnel during operation are frequent, and the existing problems such as high risk of safe operation and omission of cleaning points are due to the lack of intuitive safety training for cleaning personnel. Most of the training only stays in the text

512

(3)

Y. Peng et al.

explanation, which is difficult for the operators to understand and the training effect is not good [10]. The method to solve the problem of full coverage of bridge cleaning work scope is to allocate the responsibilities of personnel in the work content on the BIM model and demonstrate the precautions for cleaning safety. It is a more understandable method to assist cleaning personnel in safety training [11]. The daily security of bridge operation includes many aspects of security work, such as low efficiency of security disposal and lack of timely information [12]. At the same time, through the fire sensor and the Internet of things, the alarm location and disaster level are displayed on the BIM model in case of fire.

2.2 BIM Application Method for Bridge Maintenance (1)

Routine maintenance

The pre shift safety education of bridge maintenance is the basic measure to ensure the safety of bridge. However, due to the lack of pertinence of the pre shift education content and the operators’ insufficient understanding of the correct implementation process, the implementation efficiency is low. In serious cases, the operators are faced with a large degree of casualties. The correct operation process and method of maintenance are demonstrated in the BIM model. It can reduce the accident rate of safety maintenance by marking the precautions of safety behavior in key operation links and standardizing the daily maintenance behavior of staff [13]. As shown in Fig. 1, BIM application modes are divided into single business application mode, multi business application mode and integrated application mode with project management. Multi business integrated application mode is completed by integrating multiple models through collaborative platform, data interface and data standard [14]. BIM Technology is applied to the design of bridge building operation and maintenance measurement system [15]. (2)

Reconstruction and expansion project

With the increase of building functions, modern architectural design will become more and more complex, so in the process of design and operation and maintenance, we can not avoid the problem of collision. In the construction of civil engineering, pipeline and fire protection, BIM model needs collision detection W = x

A

w=0

(1)

awj

min min|w0 − wt | + α max max|w0 − wt | β=

u

j

u

|w0 − wt |

j

(2)

Application Method of BIM in Bridge Operation and Maintenance

(A) Daily and special inspection

513

(B) Daily safety

(C) Design scheme collision check

(D) Demand collision

Fig. 1 BIM application mode and operation and maintenance process bridge model diagram

D=

⎧ n ⎨ ⎩

j=1

[v(1 − β)]

⎫ ⎬ ⎭

(3)

W is the operation and maintenance result, a is the operation and maintenance cost, and D is the operation and maintenance efficiency of BIM. Next, let’s see what kinds of situations BIM model collision detection will encounter. For example, in the design of space clear height, the clear height required by the owner in the 2D design time is the clear height between the floor and the floor of the structure, and the 2D design time has not been able to consider the clear height between the lower floor and the upper ceiling after the actual construction is completed in line with the requirements of electromechanical pipelines and various regulations, resulting in demand-based collision, as shown in formula (4)

Dit ln Dit − 1

= α + β ln Dit − 1 + ϕ X it − 1 + vi + τt

(4)

where D is the number of collision detection, and X is whether there is collision. Due to the limitation of 2D drawing design, component collision in 3D space can not be easily identified. The 3D visualization and collision checking function of BIM model is used for design type collision checking. For the owner, it is difficult to imagine the final operation and maintenance results when expressing the design content.

514

Y. Peng et al.

3 Experiment 3.1 Research Methods This paper studies the application method of BIM Technology in bridge operation and maintenance, puts forward the modeling and definition method of BIM software in operation and maintenance, and realizes the automation of BIM operation and maintenance drawing calculation by quantifying the construction of bridge. In this paper, BIM Technology is combined with operation and maintenance measurement system to achieve the accuracy of three-dimensional bridge modeling. The bridge building operation and maintenance measurement system uses STM32 microprocessor as the main body, which is more mature in the current market. It maintains the modular design and avoids the contradiction of multi-channel attitude communication. The processor adopts cortex-m4 architecture to optimize the cost and power sensitive problems. Its 32-bit processor can support floating-point operation, and high control performance is the basis for the normal operation of the system.

3.2 Experimental Design In this paper, in the process of 3D modeling of bridge engineering using BIM Technology, each component of the bridge (such as pier, tie beam, pile cap and pile foundation) is a “family” file called software” Family files exist in the form of independent files, and each family file has a corresponding code. The overall model of the bridge can be obtained by calling the “home” file for modeling. Then, bridge engineering statistics can be performed by encoding the “series” file object. You can also use the statistics function to get statistics about a single component, component type, or the entire bridge project. This method improves the accuracy and efficiency of the calculation, because there is no need to manually calculate the traditional 2D graphics.

4 Results and Discussion The concept of BIM forward design has included the requirements of forming design documents based on model, so whether to draw a diagram based on BIM model is a key basis to judge whether it is forward. This paper does not look forward to the future, only from the reality of the current design industry, this paper thinks that BIM drawing technology is the primary key technology of BIM forward design. At present, the widely used BIM design software, such as Revit and Archicad, support two-dimensional expression based on three-dimensional model, and have considered the professional expression habits. Their drawing principles are basically the same.

Application Method of BIM in Bridge Operation and Maintenance

515

Fig. 2 BIM drawings in the traditional sense

They are projection or cutting based on three-dimensional model to obtain twodimensional views, and then supplement the necessary annotation elements to form drawings in the traditional sense, as shown in Fig. 2. The 2D lines from components are associated with 3D components, which cannot be edited freely as in AutoCAD. Although BIM software has made a lot of adaptations and adjustments according to professional expression habits, and external loaded components can also customize the two-dimensional expression, the constraints are still quite large. It often takes a lot of time to study how to realize or modify the two-dimensional expression of components. Therefore, the technical system of BIM forward design needs to study the BIM drawing methods of various specialties and drawings, and the expression details of various drawings, so as to meet (or at least close to) the traditional professional drawing specifications and expression habits. BIM collaboration is a key link in the process of BIM forward design. The way of directly viewing and annotating the design work file in Revit is suitable for the internal mutual calibration of the design team and the review of the professional design results by the professional leader, as shown in Fig. 3. The verification of BIM forward design is quite different from that of traditional two-dimensional CAD design. Its results include not only the drawings in the traditional sense, but also the BIM models of various specialties, as well as the information contained in the models. Therefore, whether it is proofreading or auditing, it is aimed at the

7 6

Walkthrough animation Panorama Visual analysis

VR/AR scene Statistics table

Effect

5 4 3 2 1 0

Mutual

Audit

design

Operation & maintenance

Operation and maintenance factors Fig. 3 BIM operation and maintenance design results review mechanism

516

Y. Peng et al.

Table 1 Operation and maintenance results of BIM forward design Hypothesis

Walkthrough animation

Panorama

VR/AR scene

Statistics table

Visual analysis

BIM—Mutual

5.15

5.79

4

3.86

2.95

CAD—Mutual

3.25

4.21

3.81

2.51

2.62

Audit

1.62

4.79

3.84

2.41

3.72

Design

4.56

2.25

2.23

2.99

1.57

Operation and maintenance

5.6

3.1

5.39

5.61

2.65

overall design results, not only the printed drawings. This also puts forward higher requirements for the reviewers. As shown in Table 1, the operation and maintenance results of BIM forward design are more than 45% better than that of CAD design process, and the operation and maintenance cost can be reduced by 25–55%. In addition to the drawings in the traditional sense, BIM models of various specialties are integrated, as well as a series of results derived from BIM models, such as roaming animation, panorama, VR/AR scenes, various statistical tables, various visual analysis, etc. The design of BIM model itself can continue to be applied to the operation and maintenance stage, so as to create more added value. In the bridge operation and maintenance management, the safety operation training is the main measure to reduce the safety accident rate, but the effect of the training is not ideal. The main reason is that the training content can not be intuitively understood by the operators. BIM Technology is a method to assist the operators to understand the operation. It can make the trainers learn the specific safety problems clearly, and further understand the matters needing attention in operation. At the same time, BIM has the function of demonstration, which can standardize the correct operation of personnel work. In the smart platform, human–computer interaction technology is applied, app is established on the mobile phone, and can be operated by voice.

5 Conclusions With the accumulation of projects, the scale of BIM resource library will grow very rapidly. Therefore, it is suggested that design enterprises purchase mature family library management software and assign special personnel for centralized management to avoid scattering in various projects. The BIM positive design mode we understand is the process reengineering and optimization and upgrading of the whole architectural design process. It is a design mode that can be implemented and become sustainable productivity, not just a tentative technical exploration. Therefore, the overall planning of technology and management is needed, and the systematic support

Application Method of BIM in Bridge Operation and Maintenance

517

of enterprise level is needed. This paper combs the key technologies and management points that need to be considered in the process of BIM forward design in the overall transformation of design enterprises. The contents mentioned have been verified in the transformation practice of foreign architectural design institutes in recent years, hoping to give some reference to design enterprises. BIM design has high cost and low efficiency. Compared with traditional buildings, prefabricated buildings increase the component deepening design link, which has large design workload, high design accuracy requirements and large drawing workload. The traditional 2D CAD aided design is difficult to complete the rapid design, and the quality of drawings is also difficult to guarantee. Therefore, BIM Technology has become the first choice for most of the deepening design teams in the deepening design stage.

References 1. Sawyer T (2018) Cloud service aims to bridge the BIM-to-gaming gap. Engineering NewsRecord 281(17):48–48 2. Zhao P, X He (221) Research on dynamic data monitoring of marine bridge steel structure building information based on BIM model. Arab J Geosci 14(4):305–309 3. Mikkonen A, Jarävenpää ME (2018) Finnish with BIM. Bridge Des Eng 8(90):53–57 4. Telena R (2018) Plain language BIM. Bridge Des Eng 2(90):20–23 5. Stampler J (2018) Data framework. Bridge Des Eng 4(2):74–75 6. Tadokoro M, Isogai K, Harada S et al (2019) Evidence of proton-coupled mixed-valency by electrochemical behavior on transition metal complex dimers bridged by two Ag+ ions. Dalton Trans 48(2):535–546 7. Zou Y, Kiviniemi A, Jones SW et al (2019) Risk information management for bridges by integrating risk breakdown structure into 3D/4D BIM. KSCE J Civ Eng 23(2):1–14 8. Hochmuth M, Nguyen T, Huler M (2020) Innovative und moderne Planungsmethoden im Brückenbau. Bautechnik 97(2):89–92 9. Bednorz J, Hindersmann I, Jaeger K et al (2020) Methoden zur Generierung von As-BuiltModellen für Bestandsbrücken. Bautechnik 97(4):58–59 10. Deinzer F, Bielski J, Siffling M (2019) On the axis. Bridge Des Eng 5(94):67–68 11. Costin A, Adibfar A, Hu H et al (2018) Building information modeling (BIM) for transportation infrastructure—literature review, applications, challenges, and recommendations. Autom Constr 94(10):257–281 12. Wu L, Nayak A, Shao J et al (2019) Crossing the bridge from molecular catalysis to a heterogenous electrode in electrocatalytic water oxidation. Proc Natl Acad Sci USA 116(23):11153–11158 13. Providakis S, Rogers C, Chapman DN (2019) Predictions of settlement risk induced by tunnelling using BIM and 3D visualization tools. Tunnelling and Underground Space Technology 92(9):103049.1–103049.13 14. Ruggieri P (2018) Progetto di riqualifica e adeguamento sismico di sovrappasso autostradale: analisi per fasi e vantaggi di un approccio BIM. Costruzioni Metalliche 70(4):67–78 15. Sebastian R, Olivadese R et al (2018) Connecting the knowhow of design, production and construction professionals through mixed reality to overcome building’s performance gaps. Proceedings 2(15):1153–1153

Technical and Economic Evaluation of Flexible Substation AC/DC Distribution Network Based on ANP Ke Lv, Yan Lu, Meng Yang, Chen Cheng, and Mingyu Li

Abstract More and more power equipment began to adopt DC transmission technology, flexible substation emerged at the historic moment. This paper collects the technical and economic data of a flexible substation and AC/DC distribution network project since it was put into operation, builds the evaluation index system, uses the network analysis method to carry out the technical and economic evaluation, analyzes its economic and social benefits, and provides reference for future projects. Keywords Flexible substation · ANP · Technical and economic evaluation

1 Introduction With the development of social economy and the continuous application of advanced technology, the number of DC loads increases sharply, and the change of grid load puts forward new requirements to the distribution network. At the same time, all kinds of renewable energy power generation generally produces DC power, which needs to be converted into AC power through inverter to connect to the Internet, which increases the AC-DC conversion link and reduces the transmission efficiency [1]. In order to balance and realize the pressure on the user side and the grid side, the application of AC/DC distribution network technology based on flexible substation has become an urgent requirement. With the implementation of the project, the great demonstration value brought by the project in terms of concept, technology and benefit can be investigated through technical and economic evaluation [2].

K. Lv · Y. Lu · M. Yang Beijing Jingyan Electric Power Engineering Design Co., LTD., Beijing, China State Grid Jibei Electric Economic Research Institute, Beijing, China C. Cheng (B) · M. Li School of Economics and Management, North China Electric Power University, Beijing, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_57

519

520

K. Lv et al.

2 Establishment of Technical and Economic Evaluation Index System 2.1 Technical Performance Indicators (1)

System functionality (a)

(b)

(c)

(2)

Transmission efficiency (a)

(b)

(3)

System flexibility The flexibility of AC/DC transmission system based on flexible substation refers to the flexibility of the system topological junction, the ability to facilitate design, installation and transformation, the stability of the system and the ability to cooperate with other equipment. System expansion capability The expansion capability of AC/DC system based on flexible substation mainly includes the flexibility of topology structure and the adaptability of topology structure. System functional integration System function integration refers to the types of functions that a device has relative to similar devices. The more functions a device has, the higher the system function integration will be, while the less functions a system has, the lower the system function integration will be.

Loss compensation In the distribution network, since the transmission line has a large capacitance to the ground, the longer the line is, the greater the capacitive reactive current will be. The loss in the process of reactive power compensation is called reactive power loss. Other losses Other losses include converter station losses, cable losses, and variable voltage losses.

Operational reliability (a)

(b)

Power flow control ability The power flow control ability refers to the strength of the system’s ability to regulate and control the power flow of the whole system. The stronger the power flow control ability of the system is, the more stable the operation of the whole system is and the stronger the reliability of the system is. Fault isolation capability Fault isolation capability refers to the ability of the system to quickly isolate fault units without affecting the normal operation of other parts of the system when a fault occurs in a certain part of the system.

Technical and Economic Evaluation of Flexible Substation …

(c)

(d)

(4)

521

Harmonic filtering capability Harmonic filtering capability refers to the ability of a system to eliminate or prevent harmonics generated by operation. Power system stability Power system stability is the ability of the power system to operate smoothly and the users to provide continuous and qualified electric energy.

Transient characteristics of the system (a)

(b)

(c)

Failure recovery time Fault recovery time refers to the time required from the beginning of the fault to the resolution of the fault and the normal operation of the system. Overvoltage protection level Overvoltage protection level refers to any voltage whose overvoltage peak is greater than the corresponding peak of the maximum steady-state voltage under normal operation. Short-circuit capacity Short-circuit capacity refers to the apparent power of the three-phase short-circuit under the specified operation mode of the power system. It is a characteristic parameter representing the power supply capacity of the power system, and its magnitude is equal to the product of the short-circuit current and the rated voltage at the short-circuit.

2.2 Economic Benefits (1)

Costs and expenses (a)

(b)

(c)

Unit investment The initial investment is content that most engineering projects must calculate, namely, the cost of capital construction, which generally includes the purchase cost of equipment, construction project cost, installation cost and other dynamic costs. Maintenance costs The maintenance cost mainly includes the cost of materials and labor in the maintenance and overhaul process of each year, which is generally estimated according to the historical average maintenance situation or converted according to the construction cost based on the engineering experience. Failure costs Failure cost refers to the economic loss caused by failure to the power grid and users, which is mainly related to the occurrence time, duration, frequency and user type of power outage.

522

K. Lv et al.

(d)

(2)

Abandonment cost Abandoned cost refers to the residual value that can be recovered when the equipment is abandoned.

Investment efficiency (a)

Net present value Net present value is a method to evaluate the investment value of a project. Net present value = total present value of future returns − total construction investment N PV =

n  t=1

(b)

Ct − C0 (1 + r )t

(1)

In the above formula, N P V is the net present value; C0 is the initial investment; Ct is annual cash flow; r is the discount rate; n is the life cycle of the investment project. Dynamic payback period The dynamic payback period is the year when the cumulative present value of the net cash flow of the investment project is equal to zero after the net cash flow of each year is discounted into present value according to the benchmark rate of return. The formula is as follows: n  (C I − C O)t (1 + r )−t = 0

(2)

t=0

(c)

In the above formula, C I and C O are the cash inflow and cash outflow over the years of the project life period, r is the discount rate, and n is the dynamic investment payback period. Internal rate of return The internal rate of return is the discount rate when the total present value of capital inflows is equal to the total present value of capital outflows and the net present value is equal to zero. The calculation formula is as follows: n 

(C I − C O)t (1 + I R R)−t = 0

(3)

t=0

In the above formula, C I and C O are the cash inflow and cash outflow in the project life period over the years, and IRR is the internal rate of return, even if the present value of net cash flow in the life period is equal to zero discount rate.

Technical and Economic Evaluation of Flexible Substation …

523

2.3 Environmental Impact (1)

Influence of natural environment (a)

(b)

(2)

The influence of surrounding environment The advantages of AC/DC power transmission technology based on flexible transformer station over traditional DC power transmission on the surrounding environment are mainly reflected in the following aspects: First, the area of land is reduced. Second, narrow transmission corridors and reduced use of fossil fuels. Third, eliminate pollution and noise problems in local power plants [3]. Resource consumption The AC/DC transmission technology resource consumption based on flexible transformer station is described from the following aspects. First, reduce the unnecessary power conversion link, improve the efficiency of power transmission. Second, reduce the construction of lines. Third, effectively control the flow and reduce the loss of instability. Fourth, simplify the equipment structure, achieve intelligence, improve system coupling, save costs.

Social and environmental influences (a)

(b)

(c)

Demonstration of innovation As a new type of power transmission technology, the flexible AC/DC transmission technology can be used to carry out the commutation by the turn-off commutation device, which provides a new way to solve the problems exposed in the new situation of power grid and power transmission. Economic promotion Economic promotion refers to the improvement of national economic benefits brought by the implementation of the project. AC/DC power transmission based on flexible substation supports the national targeted poverty alleviation strategy and promotes the economic growth of farmers. In addition, the implementation of this technology will save funds and improve the level of economic benefits in the future. Technological facilitation Technological facilitation refers to the new technological change caused by the technological innovation brought about by the project implementation. The stronger the technological facilitation is, the more new technological changes will appear based on the new technology [4].

524

K. Lv et al.

2.4 Policy Factors Policy compliance means that the planning shall conform to the local development planning and management measures, follow the management measures for the development and construction of the transmission system, and strictly follow the implementation rules such as the regulations on the use of transmission, environmental protection, construction and operation [5].

3 Empirical Analysis 3.1 ANP Model Creation The construction of index system mainly refers to the completion of the construction of the whole model in the Super Decision, including the creation of element sets, nodes and links [6]. (1)

(2)

Create Cluster of elements Cluster, or set of elements, corresponds to the network level indicator, which is the second-level indicator. Create all the secondary metrics, and you can see a schematic of the set of elements for the metrics in the SuperDecision software, as shown in Fig. 1. Create element Node A Node, or element, corresponds to the index sub-item in the network level indicator, namely the third-level indicator. Creating an element is to edit the

Fig. 1 Schematic diagram of the element set

Technical and Economic Evaluation of Flexible Substation …

(3)

525

network level indicator, which refers to adding the next level indicator to each second-level indicator. Create all the three-level indicators corresponding to the second-level indicators, and input all the indicators into the Super Decision in the form of element sets and elements, as shown in Fig. 2. Establish element sets and associations between elements The links of all elements (nodes) are created according to the association conditions provided in the evaluation index association case table, and the complete network hierarchy model is input into the Super Decision, as shown in Fig. 3.

Fig. 2 Element set and element schematic diagram

Fig. 3 ANP model diagram

526

K. Lv et al.

3.2 Construct ANP Supermatrix to Calculate Weight (1)

(2)

Constructing the second-level index judgment matrix According to the Delphi method, the importance degree coefficient among the second-level indicators is determined, as shown in Fig. 4. According to the eigenroot method, the weight of the matrix was automatically obtained and the results of consistency test were obtained. As shown in Fig. 5, the consistency coefficient of the alternative (A) judgment matrix Cr = 0.0626 < 0.1, indicating that the weight was acceptable. Construction of three-level index judgment matrix According to the Delphi method, the importance coefficient among the three levels of indicators is determined, as shown in Fig. 6. The weight of the matrix was automatically obtained according to the eigenroot method and the results of consistency test, as shown in Fig. 7. For the judgment matrix “A1”, the consistency coefficient Cr = 0.052 < 0.1, indicating that the weight was acceptable.

Fig. 4 Cluster Comparisons for Alternatives

Fig. 5 Alternatives (A) judgment matrix priorities

Technical and Economic Evaluation of Flexible Substation …

527

Fig. 6 Comparisons wrt “A1”node in “Cost and expense” cluster

Fig. 7 Priorities of the “A1” judgment matrix

(3)

Calculate the unweighted super matrix The unweighted super matrix can choose the criteria of the judgment matrix and the set of elements to construct the judgment matrix. The association of all elements in the set of all elements will be quantitatively reflected in such a judgment matrix, as shown in Fig. 8.

Fig. 8 Unweighted hypermatrix

528

K. Lv et al.

(4)

Calculate the weighted super matrix After the unweighted super matrix is established, the super matrix is weighted, as shown in Fig. 9. Calculate the global weight In order to reflect the interdependence of the element questions, a stability processing is also needed for the weighted matrix. The specific algorithm is to calculate the limit matrix of the weighted matrix and generate the global weight of the index, as shown in Fig. 10.

(5)

Fig. 9 Weighted supermatrix

Fig. 10 Limit matrix

Technical and Economic Evaluation of Flexible Substation …

529

Fig. 11 Limit matrix

3.3 Comprehensive Technical and Economic Evaluation of AC/DC Distribution Network of Flexible Substation In order to make the index weight reflect the opinions of most people, when calculating the index weight, several experts are selected. Assuming that each expert has the same weight, the given index weight of each expert is obtained by using the above 5 steps. Finally, the comprehensive evaluation score of the index is determined by using the comprehensive method [7]. As can be seen from Fig. 11, the comprehensive evaluation score of the traditional scheme is about 0.10, and that of the flexible substation scheme is about 0.41. For these five schemes, it is obvious that the flexible substation scheme is the best.

4 Conclusion In this paper, from the technical performance, economic benefits, environmental impact, policy factors from four points of view, comprehensive analysis of all aspects of the influencing factors, the establishment of a comprehensive index system; Secondly, the method of analytic hierarchy process and fuzzy comprehensive evaluation is used to sort the indicators, select the factors that are highly sensitive to the project’s technology and economy, and sort the indicators. Finally, a comprehensive and comprehensive evaluation model of technology and economy is established, which can evaluate the technology and economy of the project conveniently and scientifically, and provides a reference for the key point of the project management and the later stage of the technology and economy evaluation.

References 1. Zhou J, Wu J, Chen Y, Yu W, Zhang B (2019) Flexible DC transmission and distribution system of ALI cloud data center. Electr Appl 38(01):54–58 2. Xie J, Zhang Y (2018) The world’s first AC/DC distribution network based on flexible substation is officially put into commercial operation. North China Electric Industry 12:2 3. Zeng J (2015) Research on reliability evaluation method of flexible DC distribution network. Zhejiang University

530

K. Lv et al.

4. Liu X, He Y, Yu B, You F, Xiao Y (2017) Technical and economic research on substation prefabricated building based on ABC-AHP. Mech Electr Inf 36:132–133 5. Wu T (2021) Theoretical foundation and model construction of comprehensive evaluation of distribution network. IOP Conf Ser Earth Environ Sci 631(1) 6. Gong X, Yang M, Du P (2020) Renewable energy accommodation potential evaluation of distribution network: a hybrid decision-making framework under interval type-2 fuzzy environment. J Clean Prod 7. Tang B, Hu R, Li X, Fu Y (2010) J Shanghai Univ Electr Power 26(3):215–219 (in Chinese)

Development Space and Prospect of the Charging Pile Market Guang Chen, Zhanjie Liu, Guozhen Ma, Di Wang, and Jianye Liu

Abstract This paper mainly analyzes the development scale of Chinese charging pile market, calculates its development potential, analyzes the main bottleneck and breakthrough point facing Chinese charging pile industry, and studies the changes of charging pile under the situation of “new infrastructure”. Keywords Charging pile · Development potential · Botteck

1 Market Analysis of the Development Status of Electric Vehicle Charging Pile Market in China With the gradual enhancement of China’s social environmental awareness, the development of the new energy vehicle industry has become a key point to solve the shortage of oil resources and reduce air pollution. Under the stimulation of social demand, government support, and private capital, the number of new energy vehicles in China has reached 3.44 million, a year-on-year increase of 72.9%. Under the development of new energy vehicles, especially the tram policy of taxi and online car hailing, has promoted the industrial development of charging piles [1]. China’s public charging piles mainly rely on charging owners using charging services to make profits, and many charging pile manufacturers have successfully on the market. However, in many areas of China, some places such as idle parking piles in underground parking lots, while some places with large traffic such as schools and hospitals, there are problems of insufficient charging piles and queuing for charging. The inadequate maintenance of electric vehicle charging facilities and the insufficient service capacity are common problems in the charging pile operation industry.

G. Chen (B) · Z. Liu · D. Wang · J. Liu State Grid Energy Research Institute Co. Ltd., Beijing 102209, China G. Ma Economic & Technology Research Institute, State Grid Hebei Electric Power Company, Shijiazhuang, Hebei, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_58

531

532

G. Chen et al.

Influenced by the large-scale popularization of new energy vehicles and strong policy support, the scale of Chinese charging pile industry grew rapidly; especially in 2016, the number of public charging piles reached 185.3%; the growth rate slowed down after 2016 and showed a stable growth trend. By the end of the second quarter of 2019, the number of public charging piles in China reached 412,000, up 51.5% year on year and 11,656 new public charging piles per month from July 2018 to June 2019. At present, China’s public charging piles mainly rely on charging certain service fees to car owners using charging services to make profits. Different charging pile operators, their charging service charging standards are different, but for the charging limit, different cities will have different regulations [2]. On March 26, 2019, the Ministry of Finance, the Ministry of Industry and Information Technology, the Ministry of Science and Technology and the National Development and Reform Commission jointly issued new subsidies for new energy vehicles. Compared with last year, the 2019 subsidy standard dropped nearly 40%, and was more strict for battery energy density and energy consumption; the aim is to avoid car companies from obtaining subsidies by improving battery range and energy ratio. The transition period for the implementation of the new energy subsidy policy ended in June 2019, and the sales of new energy vehicles in July of the same year decreased by 47.5% month-on-month, and 4.7% year-on-same year. Affected by the government ‘s new energy subsidy policy, the sales volume of China’ s new energy vehicles increased significantly from 2015 to 2018, among which pure electric vehicles accounted for the main share of the new energy vehicle market. From January to July 2019, 699,000 sales of new energy vehicles were sold, up 40.9% compared with the same period last year, and sales of pure electric vehicles increased 47.8% year-on-year. At the end of the second quarter of 2019, the number of AC charging piles in Chinese public charging piles was 236,000, representing more than 50%; the second, DC charging piles were 175,000; AC-DC charging piles with fast charging accounted for only 0.1%. Data show that the total monthly charging volume of Chinese public charging piles increased rapidly from June 2018 to June 2019; the total charging volume in June 2019 increased by 13.1% from May, up 147.6% year-on-year. With the rapid development of new energy vehicle industry, we bring development opportunities for charging pile industry. China’s public charging infrastructure has maintained a steady growth trend. As of February 2021, the number of public charging piles nationwide was 837,000, an increase of 26,000 over last month, and a growth rate of 57.6% year-on-year in February. Data show that in February 2021, the top 10 provinces and cities in China were Guangdong, Shanghai, Beijing, Jiangsu, Zhejiang, Shandong, Anhui, Hubei, Henan, Hebei, including 113,000, first in the country; 84,000, and 81,000 public charging piles in Beijing. In February 2021, the top 10 provinces and cities in China were Guangdong, Jiangsu, Zhejiang, Beijing, Shanghai, Shandong, Hebei, Tianjin, Sichuan, Hubei, including Guangdong 90,000, first in China; Jiangsu 57,000 and 52,000 in Zhejiang.

Development Space and Prospect of the Charging Pile Market

533

As of February 2021, the number of 10 public charging piles operated by charging enterprises in China exceeded 10,000, respectively: 212,000 in special calls, 196,000 in State Grid, 171,000,60,000 in Cloud Express, 26,000,20,000 in SAIC Anyue, 15,000 in Shenzhen, 15,000 and 14,000 in China.The 10 carriers represent 91.9% of the total, and the remaining 8.1%. Charging infrastructure is fully digital and intelligent in charging experience, operation and maintenance, and network coordination, realizing safe and fast charging experience, unattended charging facilities, remote operation and maintenance, intelligent and efficient charging facilities, and intelligent scheduling of charging network. In the future, the energy supplement methods of new energy vehicles will be diversified and scene. The power changing as a supplement of energy supply methods of operating vehicles will have further developed. It is expected that more car companies will develop and apply power changing models in 2021. Hainan and cities with relatively concentrated operating vehicles will actively promote the power changing mode, and give policy support, promote the technological progress and standardization of power changing facilities through the promotion of a certain scale of power changing stations, and explore a new development path and operation mode.

2 Calculation of the Development Scale and Development Potential of China’s Charging Pile Market 1.

As one of the key areas of “new infrastructure”, China’s charging pile market has a huge development potential.

At present, many research institutions have analyzed and estimated the development scale and space of China’s charging pile market, but different opinions vary, some think that tens of billions, some think that more than 10 billion, 20 billion, or even more than one trillion yuan. Why are the predictions so different? (Fig. 1). First, the assumptions under which all parties estimate the development scale and development space of the charging pile market are different. Estimating the development scale and development space of the charging pile market needs to be based on a series of hypothetical conditions. Different parameters setting will lead to very different estimation data of the development scale and development space of the charging pile market [3]. One of the assumed parameters: the average development speed of new energy vehicles in China. In the case of the known number of new energy vehicles, the average development speed of China’s new energy vehicles determines the guaranteed number of new energy vehicles after several years, which is an important reference data for all parties to formulate the charging pile construction plan. Assumed parameter 2: pile ratio.

534

G. Chen et al.

Fig. 1 Number of EV charging piles in China, 2010–2020E

In the case of the number of new energy vehicles being determined, the proportion relationship between new energy vehicles and charging piles determines the number of charging piles that ultimately need to invest and build in China. At present, the car pile ratio in China is about 3.5:1. How to define the market capacity of the charging piles? How to determine the reasonable proportion relationship of the car pile ratio? At present, most parties refer to the proportion relationship close to 1:1 proposed by four ministries and commissions (National Development and Reform Commission, Energy Bureau, Ministry of Industry and Information Technology, Ministry of Industry and Information Technology and the Ministry of Housing and Urban–Rural Development) in the Electric Vehicle Charging Infrastructure Development Guide (2015–2020), as the standard to judge the final demand for charging piles and estimate the potential “gap” of charging piles. It should be noted that the 1:1 pile ratio is only a forward-looking policy estimate made by the government at the time, not necessarily in the actual situation. Due to the differences and uncertainties in the development level of electric vehicles (cities) across the country, the charging demand of different user groups, and the proportion relationship between public charging piles and private charging piles, the relevant departments have no longer emphasized this 1:1 ratio. However, as a reference basis, the parties still tend to reference this data [4]. Assumed parameter 3: the construction cost of different types of charging piles and the proportion relationship between various charging piles. Charging piles mainly include public charging piles and private charging piles. Public charging piles and public charging piles are divided into two types of DC piles and AC piles. Various types of charging piles have different construction costs. Among them; the private charging pile is generally an AC charging pile, with an investment cost of less than 5,000 yuan. For the construction cost of various charging piles and the proportional relationship between different charging piles (public charging pile and private charging pile; DC pile and AC pile), different investment cost and investment scale will be obtained. Take the forecast of Everbright Securities as an example:

Development Space and Prospect of the Charging Pile Market

1.

2.

3.

4.

535

Assume that the average annual growth rate of China’s new energy vehicles from 2020 to 2025 was 30–40%, thus the number of new energy vehicles in 2020 was 5.2 million, and 21.59 million in 2025. Assumes that the pile ratio in China is 3:1, so the number of charging piles is 7. 2 million in 2025, and 5. 980 million new charging piles in China from 2020 to 2025. Assumes that the ratio of the public charging piles and the private charging piles in China is 45%:55%, and the ratio of the DC and AC piles in the public charging piles is 50%:50%. In public charging pile, the investment of a single DC pile is RMB 80,000 yuan, RMB 8,000 yuan and a single private charging pile is RMB 3,000.5, based on the above series of assumptions, Everbright Securities believes that the total investment scale of China’s charging pile market was 128.2 billion yuan from 2020 to 2025.

Second, the prediction interval selected by all parties is different. Some research institutions predict the total investment scale of a time period (e. g. 2020–2025), and some predict only the investment scale for a specific year (e. g. 2025). Moreover, the end time of the prediction period varies. For example, some predict the 2025 results, and some predict the 2030 results, even longer term. The inconsistent prediction interval selected by all parties is also a reason for the large difference in the prediction data. Third, there are cognitive differences between all parties on the connotation of “charging pile market”, which is also an important reason for the great difference in the development scale and development space of the charging pile market estimated by all parties. From the narrow sense to the broad sense, The “charging pile market” can have several different understandings, Expansion of capacity layer by layer, Gradually generalization: First, the “charging pile market” only includes the charging pile equipment market; Second, the “charging pile market” in addition to the charging pile equipment market, It also includes the charging operation service market mainly formed by charging charging service fees; Third, the “charging pile market” in the basis of charging pile equipment market and charging operation service market, coupled with the civil engineering cost and operation cost of charging operators; Fourth, the “charging pile market” in the charging pile operators on the basis of the charging pile equipment market, charging operation service market, the civil engineering cost and operation cost of the charging pile operators, plus the supporting power grid investment; Fifth, the “charging pile market” in the charging pile equipment market, charging operation service market, civil engineering and operation costs of charging pile operators, on the basis of supporting power grid investment, coupled with the development of the new energy vehicle industry and so on. Different understanding of the connotation of the “charging pile market” will draw different conclusions. It needs to show that the real value of charging pile, real potential is not only in the charging pile itself can directly drive investment, how much the formation

536

G. Chen et al.

of the market, more importantly, outside the charging pile, the new energy vehicle industry, the support of energy security and as a “wisdom terminal” to promote the construction of smart city and so on.

3 Exploration of the Charging Operation Mode Charging service fee is an important foundation, data service is a powerful supplement, and the effect of value-added service is gradually appearing. At present, charging service fee is still the main source of operator revenue and channels, according to China charging alliance incomplete statistics, charging power in 2019 more than 5 billion kWh, increased by more than 100% last year, part of the geographical location, station management system, high quality station good profitability, charging service fee revenue is an important basis for maintaining operation. With the continuous improvement of users’ demand for travel service quality, electric vehicle charging information services are also under the momentum. Automobile enterprises and travel service providers have purchased charging information services to improve the product quality. All charging operators have established strategic cooperative relations with mainstream automobile enterprises, and actively promote the realization of the interconnection of vehicle pile information, information service has become the main source of income in addition to charging service fees, laying a foundation for the development of big data value mining industry of charging operation [5]. At present, the general loss of charging facilities operators has been continuing, and the operators began to explore new business models and service systems. First, collaborative cooperation to jointly promote industrial connectivity and avoid price competition in the industry from further reducing profitability. China’s charging facilities have been following the construction principle of “moderately advanced”, leading to the phenomenon of exceeds supply of public charging facilities. In order to improve the industrial profit efficiency, operators have changed from service fee price competition to price coordination and service competition, so as to enhance the overall profit potential of the industry. The second is to provide platform access and subsidy application for charging stations built in industrial parks. With the planning and construction of local government platforms, local charging facilities require operators to build and access charging service platform to local government platform. Some charging operators start to gather small-scale charging stations in industrial parks, providing intervention services and government subsidies, expanding the scale of platform charging facilities. The third is to provide operation and maintenance services and insurance services for private charging facilities; car companies install private charging piles for users with private charging pile installation conditions, and provide 1–2 years of transportation and warranty period. With the continuous improvement of private passenger car users, there will be a large number of “guarantee” private charging piles in the future, some operators began to build private pile operation and maintenance team, undertake private pile operation and maintenance business. Fourth, to provide data and information services for enterprises such as

Development Space and Prospect of the Charging Pile Market

537

automobile and travel services, such as to revise the relevant standards of car pile information interaction. With the improvement of the informatization level of charging infrastructure industry, China’s charging infrastructure industry has basically formed a charging facility market mechanism with the national and local government information service platform as the supervision and the operator service platform as the operating body. The government information platform mainly contributes to the approval and subsidies of the construction of local charging facilities, and greatly improves the efficiency of government office. All operators mainly reduce the construction and operation costs of charging facilities through the information service platform. First, with the help of the platform big data analysis and rational layout of charging stations, it not only reduces the site selection time cost of the charging station, but also reduces the investment and construction of ineffective or low-efficiency charging facilities. Second, through the charging service platform, inspection and maintenance [6], reduce the frequency of field operation of the operation and maintenance team, and reduce the labor cost of operation and maintenance. Third, through the charging data analysis, the efficiency and value of the existing charging piles are evaluated, and a targeted treatment plan of the low power / 0 power pile is put forward to improve the utilization efficiency of the facilities. Fourth, reduce the procurement cost of equipment. Some operators’ charging facilities only provide online opening, stop, charging payment and other services, which simplifies charging equipment with card swiping, display screen, buttons and other parts, effectively reducing the production and manufacturing cost of equipment.

4 Main Bottlenecks Bottleneck and Breakthrough in Charging Charging Charging Charging Pile Industry 4.1 Main Bottlenecks Facing China’s Charging Pile Industry At present, China’s charging pile industry is mainly facing two major bottlenecks: First, there is an insufficient structural supply of charging piles. One of the performance: there is still a lot of room for improvement in the number of charging piles. At present, the car pile ratio in China is about 3.5:1. In theory, there is still a large “gap” between the goal of approaching 1:1 proposed in the State for the Development Guide of Electric Vehicle Charging Infrastructure (2015–2020); in reality, the construction number of charging piles, facing the presence of oil vehicle occupation, needs to improve. Performance two: the charging pile in the structure is in urgent need to greatly improve the charging power. On the one hand, the average charging capacity of new electric vehicles has risen from 22 kWh in 2015 to more than 50 kWh; on the other hand, the charging power of electric passenger vehicles up to 150 kW, electric commercial vehicles is generally above 200 kW, close to 500 kW. Compared with it,

538

G. Chen et al.

the current mainstream 60–120 kW DC charging pile in China can no longer meet the needs of the rapid development of electric vehicles, so it is urgent to greatly replace the old piles and build the new high-power DC charging piles [7]. Performance three: the charging pile in the quality level is uneven, the operation and maintenance management is not in place. The manufacturing threshold of charging equipment is low. In recent years, under the stimulus of financial subsidies, this field has attracted a large number of social capital (many speculative capital), and invested in the construction of many cheap charging piles, and the durability and reliability of its key components cannot be guaranteed. In addition, due to the lack of accountability mechanism, public charging piles lack effective management after their completion and a lack of timely maintenance after the damage. Second, charging operators have a single operation model and are facing profit problems. At the present stage, the revenue source of Chinese charging operators is mainly charging charging service fee, about 0.4–0.6 yuan/kWh. Due to the low utilization of public charging piles, the level of service fees is difficult to improve, a large number of charging operators, especially small and medium-sized charging operators have not yet been profitable, even in the domestic market first call (parent company for Teride) is also just established in 2014 into a long loss period, until 2018 just cross the profit-even line to profit.

4.2 A Breakthrough Analysis on the Development of the Charging Pile Industry in China First, vigorously promote the scientific and reasonable planning and layout of charging infrastructure [8]. It is suggested that local governments (cities) take into account urban construction, transportation, site, power and other factors, and plan and layout charging infrastructure according to local conditions. In cities with new energy buses and more fast-charging DC piles will be built with high-power fast charging and operating vehicles, and more slow-charging AC piles are built in other cities. Second, with the in-depth development of charging data as the core, actively explore a variety of charging operation business models, and create a post-charging service market. The charging pile obtains a large amount of relevant data while charging, such as the type and density of electric vehicle battery, the user’s car and charging habits, electric vehicle vehicle location and time distribution and other data. Charging operators can dig in - depth into these data, actively develop the post-charging service market based on charging data, and provide external data value-added services such as user portrait, station planning, second-hand car evaluation.

Development Space and Prospect of the Charging Pile Market

539

5 “Transformation” of Charging Pile under the Background of “New Infrastructure” Compared with the past, charging piles under the background of “new infrastructure” policy have been given with “new” connotation and some “new” changes. The essence of “new infrastructure” is digital infrastructure. In the future, the charging pile will no longer only have a simple charging function, nor a simple equipment and isolated monomer, but a “intelligent terminal” into a digital, intelligent and networked “intelligent system”. Specifically, the change in charging piles will be mainly reflected in the following aspects [9]. First, the charging pile will be integrated with 5G, big data, artificial intelligence, the Internet of Things and other digital technologies. Through the integration of wifi, Internet of Things, charging piles will have the functions of monitoring, alarm, information and data analysis, which can realize the interconnection, sharing and sharing of data, information and funds between different charging piles and between different operators. Second, the charging service network will be more three-dimensional and diversified. From a horizontal point of view, the service scope is broader. The future charging pile will not only meet the charging demand of general passenger cars, but also meet the charging demand of rural charging and logistics, ports, mining areas and other special vehicles. From a vertical perspective, the charging pile will connect through all links of the electric automobile industry chain. Through mining the value of the platform and data, the electric automobile manufacturers, dealers and other links of the industrial chain can accurately grasp the customer needs and create more value. Third, the charging scheme will be user-centered, more faster, convenient and intelligent. In the future, high-power charging and other technologies will significantly shorten the charging time of electric vehicles, while V2G and other technologies can realize the two-way energy flow between electric vehicles and the power grid, and let users participate in sharing the benefits [10]. Fourth, with charging piles as the carrier and media, it will form a variety of charging operation business models. At present, the income source of charging operators in China’s charging operators is mainly charging service fees, with a single operation mode and difficult profit. In the future, charging operators will take the indepth development of charging data as the core, and actively explore the provision of value-added services for user portrait, station planning, second-hand car evaluation and other value-added services, to create a post-charging service market. Fifth, charging piles will transform to a “comprehensive node” in urban, energy, transportation and other fields. By collecting, summarizing and analyzing massive charging data, charging pile will become an important part of digital ecology to build a charging ecosystem with extensive social participation. By developing big data application, charging pile will be the “new terminal” and important starting point of smart city construction, serve urban construction, traffic layout and power grid planning and optimize the allocation of social resources.

540

G. Chen et al.

Acknowledgements This work was supported by the science and technology project of State Grid Corporation of China, called “Research on bidirectional data value mining technology and typical application of “power economy” in SGCC” (Project Code: 1400-202157207A-0-0-00)”.

References 1. Wu Y (2020) development problems and strategy analysis of public charging piles under the background of “new infrastructure.” Ind Innov Res 12:10–11 2. Wang Y, Miao J (2016) Study on the development status and problem countermeasures of charging pile. China Market 41:4551 3. Huang H, Zhang J, Zhuang H, Zhang X, Zhang X (2020) Analysis on the development of new energy vehicle charging pile under new infrastructure. South Agric Mach 51(21):92–94 4. Zhang C (2016) Research on investment opportunities brought by the rapid development of new energy vehicles. Chin Bus Theory 14:142–143 5. Wang Z, Ding Y, Han X (2018) Charging pile construction requires. People’s Daily, 5 Aug 2020 6. He Y (2006) Charging pile operation difficulties are pending. China Energy News, 25 July 2016 7. Zhou X, and Zhang W (2010) Study on the development status of electric vehicle charging facilities at home and abroad. Central China Electric Power 23(05): 16–20 + 30 8. Chen L, Zhang H, Ni F, Zhu J (2011) Construction status and development of energy supply facilities for electric vehicles. Power Syst Autom 35(14):11–17 9. Zhou X, Lian ZW, Wang X, Yang X, Xu Y (2010) Analysis on the operation mode of electric vehicle charging station. Protect Control of Electr Power Syst 38(21):63–66 + 71 10. Cui Y, Yang Q, Zhang L, Wang J (2010) Research on the development status and charging technology of electric vehicles at home and abroad. Yunnan Electr Power Technol 38(02):9–12

AHP Matter Element Model for Expressway Service Quality Evaluation Sheng Hao, Zheng Qiao, Lu Zhao, and Xiaodong He

Abstract The evaluation of expressway service quality is an important basis to find out the weak links in its operation and improve its comprehensive effectiveness. Based on the systematic analysis of the influencing factors of expressway traffic service quality, this paper constructs an expressway service quality evaluation system covering road condition, traffic operation, traffic environment and management system. The analytic hierarchy process (AHP) is used to establish the index hierarchy structure of the evaluation system, and the weight of each index is determined by combining with the expert consultation method. Based on the theory of extensible set, the matter-element evaluation model of expressway service quality is established. By calculating the weight and correlation function of each evaluation factor, the quantitative evaluation of expressway service quality is realized. Keywords Highway service quality · Matter element evaluation model · Service quality evaluation

1 Introduction In recent years, the rapid development of highway is also traceable and reasonable. Accordingly, the good development of expressway has the driving force to speed up the pace of economy and improve the quality of people’s life. In the whole expressway operation system, it mainly includes toll station, service area, gas station and other important modules. With the rapid development and gradual improvement of expressway, in the operation and management of service area, customer demand and management methods are gradually diversified. However, due to the weak service S. Hao (B) · L. Zhao Highway Monitoring and Response Center Ministry of Transport, Beijing 100029, China Z. Qiao Ministry of Transport, Beijing 100736, China X. He Tsinghua Strait Research Institute, Xiamen 361000, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_59

541

542

S. Hao et al.

awareness of service personnel, backward infrastructure and low customer satisfaction, the service unification and standardization of expressway service area are restricted. This makes it more difficult to evaluate the service quality of service area. In order to evaluate the service quality of the service area, we must first make a scientific, objective and comprehensive evaluation on the service quality of the service area, and then further aim at the problems existing in the service quality of the service area, combine with the characteristics of expressway, refer to the service experience and criteria of advanced service areas at home and abroad, and learn from the service standards of other industries, Work out a feasible and effective plan to improve the service level of the service area and improve customer satisfaction with the service area [1]. At present, there are still many deficiencies in the overall service of domestic highway service area. There is no authoritative and widely recognized evaluation method for the service quality of service area. This paper will study the service quality evaluation of service area based on AHP matter element model.

2 Service and Service Quality 2.1 Concept of Service The earliest concept of service is defined by the American marketing circle, which means that it is used to sell or make the interests and behaviors of commodity sales get the satisfaction and recognition of users. Service is an abstract intangible activity given to consumers in the process of entity commodity marketing.

2.2 Concept of Expressway Service Quality The connotation of service quality includes: first, the ultimate purpose of service is to meet the needs of consumers, it is a process. This understanding is mainly evaluated from the perspective of the service provider, and the service quality is measured by the efficiency, applicability and economy of the service. Second, the gap between the service quality consumers expect and the service quality they actually perceive. This understanding is mainly measured from the perspective of consumers. Only the service satisfaction perceived by consumers can reflect the real service quality. The highway service quality refers to the sum of the degree to provide services for the consumers driving on the highway so that their potential needs are met [2].

AHP Matter Element Model for Expressway …

543

2.3 Customer Satisfaction and Service Quality Theory Customers have formed service expectations before they really accept service and consume. However, when customers perceive the gap between service quality after receiving service, customer service satisfaction theory is mostly applied to the service industry, which is quite different from customer satisfaction. The theory of service satisfaction is mainly based on the theory of customer satisfaction and service quality. However, some scholars confuse service quality with service satisfaction and think that service quality is directly proportional to consumers’ service perception. Later, some scholars pointed out that service quality is only used to measure the performance of service providers. Some scholars point out that service quality is the result of consumers’ overall evaluation of service after receiving service. Based on this, grunos puts forward the theory of comprehensive perceived service quality. He points out that consumers’ perceived service quality is directly proportional to their subjective feelings, and the standard of evaluating service quality is actually the gap between consumers’ expectation and actual perception.

3 Evaluation System of Expressway Service Quality Expressway is a complex comprehensive system formed by the interaction of many factors. In order to evaluate its service quality scientifically and reasonably, we must first have a comprehensive understanding of the various elements that affect the service quality of expressway system, and make a systematic analysis.

3.1 Road Condition Factors Generally speaking, in the process of highway construction, the designers have higher requirements on the road characteristics. The reason is that the advantages and disadvantages of the design characteristics often lead to the number of accident points, which has a direct impact on the highway traffic safety, and will lead to the use efficiency of the rest of the highway sections, and then affect the service quality of the whole highway.

3.2 Traffic Operation Factors After the expressway is put into operation, the index that can fully reflect its operation level and traffic condition is the various operation parameters of vehicles running on

544

S. Hao et al.

the expressway. These parameters are not constant values, they often change with the change of time cycle and traffic demand, which is the intuitive embodiment of expressway service quality.

3.3 Traffic Environment Factors The traffic environment of expressway is composed of various natural and artificial conditions. The normal and efficient operation of expressway has higher requirements for the traffic environment. It can not only provide environmental protection for vehicle operation, but also bring adverse effects to the pedestrians. Generally speaking, the traffic environment is mainly reflected in the degree of road greening, traffic hazards and pollution [3].

3.4 Management System Factors Expressway management system is an important part of the whole expressway operation system. The integrity and efficiency of the management system also has an important impact on the quality of expressway service, which plays an important role in whether the expressway can give full play to its function and reduce the frequency and loss of traffic accidents. Based on the above analysis of expressway service quality characteristics, from the perspective of following the principles of systematicness, hierarchy, practicability and operability, the expressway service quality evaluation index system is constructed, as shown in Fig. 1.

Fig. 1 Evaluation system of expressway service quality

AHP Matter Element Model for Expressway …

545

4 AHP Matter Element Model of Expressway Service Quality Matter element analysis is an important mathematical tool by introducing the concept of “matter element” and using the theory of extension set to analyze things quantitatively. It has been widely used in creative thinking, artificial intelligence, decisionmaking, recognition and evaluation. In matter-element analysis, by organically combining the three elements of object, feature and characteristic value, an ordered triple is formed in a certain order, which is called matter-element. The main idea of matter-element analysis is to replace the characteristic vectors of various evaluation indexes, and implement matter-element transformation with reference to the corresponding comment set, so as to calculate the correlation degree between the matter-element to be evaluated and the comment set of each grade, and finally select the grade corresponding to the maximum value of the maximum correlation degree as the subordinate grade of the matter-element to be evaluated [4].

4.1 Matter Element Determination of Expressway Service Quality Taking thing N as expressway service quality, the quantity value of characteristic C is V, and the ordered triple R = (N, C, V ) is taken as the basic unit to describe things, namely expressway service quality. The matter element R has n characteristics (evaluation index) expressed by ci (i = 1,2,…, n) respectively, and the corresponding quantity value is v i (i = 1,2,…, n) ⎡

N c1 ⎢ c2 R=⎢ ⎣ ... cn

⎤ v1 v2 ⎥ ⎥ ... ⎦

(1)

vn

4.2 Weight Determination Based on AHP The idea of weight calculation method based on analytic hierarchy process is to arrange each index into several levels (as shown in Fig. 1) according to the membership relationship and category, and then compare the importance of each index in the lowest level, so as to quantify the relative importance of each index, and construct the judgment matrix of the quantitative value of the relative importance of each index

546

S. Hao et al.



a11 ⎢ a21 A=⎢ ⎣ ... am1

a12 a22 ... am2

⎤ ... a1n ... a2n ⎥ ⎥ ... ... ⎦ ... amn

(2)

The maximum eigenvalue is calculated according to the judgment matrix A λmax and the corresponding eigenvector ω = (ω1 , ω2 ...ωn ), At the same time, the consistency index CR is calculated to judge the consistency rate, i.e. C R = C I /RC, C I = (λmax − n)/(n − 1)

(3)

Among them: RC is a random consistency index, and its value can be obtained by consulting the relevant literature. When CR < 0.1, it is considered that the consistency is acceptable. After passing the consistency test, the final feature vector w is the weight coefficient of the evaluation index.

4.3 Determination of Correlation Function and Comprehensive Correlation Degree According to the extension set theory and the basic characteristics of freeway, the following correlation function is used to express the membership degree between the service quality of freeway to be evaluated and the pre-determined evaluation grade. The correlation function k j (x i ) of the evaluation index i of the matter element R of expressway service quality with respect to the evaluation grade j can be expressed as  ρ(xi ,x ji ) k j (xi ) =

ρ(xi ,x pi )−ρ(xi ,x ji ) −ρ(xi ,x ji ) |x ji |

(4)

Suppose that the weight of each feature ci is ωi , then the multi index comprehensive correlation degree k j (R) of matter element R with respect to different grades j can be expressed as K (R) = max k j (R)

(5)

For the matter element R of expressway service quality, the comprehensive correlation degree k j (R) The higher the value, the higher the correlation degree of expressway service quality belonging to grade j, and K(R) means that the service quality of Expressway belongs to grade j.

AHP Matter Element Model for Expressway …

547

5 Conclusion The matter element analysis is used to evaluate the service quality of expressway. Through the analysis of the factors affecting the service quality of expressway, the relevant indexes are selected to construct the evaluation system. On this basis, the matter element evaluation model of the expressway service quality is established. Based on the AHP matter element evaluation model, it is feasible in the expressway service quality evaluation, and the calculation is convenient and the steps are clear. Meanwhile, the method can get the comprehensive evaluation results of expressway service quality, and also reflect the evaluation results of various indexes in the evaluation system with specific numerical values, so as to provide reasonable suggestions for improving the service quality of expressway.

References 1. Wu Y, Wang J, Lu X et al (2005) Evaluation model of expressway operation service quality and its application. Traffic Standardization 6:124–127 2. Wang J, Lu X, Gu S et al (2003) Study on evaluation standard and scoring method of expressway operation service quality. Highway Transp Sci Technol 20(4):114–117 3. Lu X, Wang J, Yan Z et al (2003) Evaluation system of expressway operation service quality. J Chang’an Univ Nat Sci Ed 23(4):69–72 4. Wang X, Li M, Lu X (2006) Evaluation system of expressway operation service quality. Guangdong Highway Transp 4:56–60

Research and Model Construction of Teacher Competency Based on K-Means Clustering Algorithm Min Liu

Abstract Based on the design of senior high school English education function evaluation system, a constraint parameter standard analysis model is established to evaluate the position ability of big data information model, extract the characteristic information of position ability limitation, and use k-means fusion algorithm to evaluate the position ability in the workplace. Integrate the evaluation and ability index parameters, complete the educational resource allocation plan, realize the scientificity of English education post ability evaluation, and design the information fusion analysis ability evaluation index system according to the experimental results, so as to improve the measurement accuracy and high practical application value. Keywords K-means clustering algorithm · English teaching · Evaluation of educational post competency

1 Introduction Teachers’ job ability based on data algorithm is not only the basic condition for teachers to engage in education, but also the compass to improve teachers’ education level. Based on human resource management such as performance appraisal, studying teachers’ job ability, promoting the development of teachers’ individuals and groups, deepening educational reform, and comprehensively improving the level of education and the quality of talent training are conducive to the practice of educational modernization. At this stage, it is a hot and key issue of research at home and abroad. Information education is becoming more and more popular, and the concept of intelligent learning has also been widely popularized and accepted. In the new educational environment, the research on Teachers’ job ability is also carried out, taking the post of foreign teachers. The research on Teachers’ professional competence is faster than that in China, and the formulation and promotion of informationbased education policy is also faster than that in China. We should sort out and M. Liu (B) School of Foreign Languages, Shangqiu Normal University, Shangqiu 476000, Henan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_60

549

550

M. Liu

analyze the relevant foreign research. In the new educational environment, we can refer to the research on Teachers’ professional competence in China. It has high practical value to be applied to educational evaluation and resource information management, which is conducive to improving the quantitative management and planning ability in the educational process, and on this basis, limiting the participation of job ability [1]. K-means clustering does not allow noisy data, but in hierarchical clustering, noisy data sets can be used directly for clustering.

2 Competency Concept McLellan first put forward the concept of “competence” in testing for competence rather than for intelligence in the 70s of last century. He believes that the traditional intelligence test has deviation and can not distinguish the excellent performers from the average performers. Therefore, his concept of competency emphasizes the key characteristics of selecting the excellent performers. Then scholars put forward many definitions of competency. Boyatizis (1982) believed that competency is an internal and stable characteristic of a person, and his concept of competency began to highlight the importance of internal characteristics. Spencer (1993) believes that competency is the deep personal characteristics in a certain field, such as knowledge, behavioral skills, motivation, traits, self-concept, attitude or values, which can distinguish the excellent personnel in a specific position, and these characteristics are measurable. This concept highlights the importance of practicality in the definition of competency. Chinese scholar Wang Chongming (2000) believes that competency refers to the knowledge, skills, values, attitudes, motivation and other characteristics associated with high management performance. Looking at the above concepts of competency, the author believes that first of all, the potential characteristics of individuals must be included in this concept, because the deep-seated characteristics in personality are more persistent and decisive, and can stably predict the job performance of a specific post in the future. Secondly, competency should have a significant role in distinguishing, with these capabilities to become outstanding performers. Finally, it should be noted that it is also important to understand this concept from a dynamic perspective, because different posts have different requirements for competency, that is, the concept of competency is situational.

3 K-Means Clustering Algorithm K-maeans fusion algorithm is j, and BK means fusion algorithm is a typical classification algorithm. It is the most extensive and mature classification analysis method at present. The algorithm has the advantages of simplicity, speed and applicability

Research and Model Construction of Teacher Competency …

551

to large data set processing, and is suitable for wide application in scientific research and industrial application.

3.1 Introduction of K-Means Clustering Algorithm K-means aggregation algorithm is a typical hard aggregation algorithm based on distance. The algorithm usually takes the square sum function of error as the optimization objective function. The square sum function of error is defined as follows: E=

K    2 x − m j 

(1)

j=1 x∈C j

where k is the trembling number, C j (j = 1, 2,… K) is the j sub cluster, X is all data objects of cluster C j , M is the average value of cluster C j , e is the square sum of data samples and center difference, and the value of e depends on K collection centers. Obviously, the smaller the E value, the higher the quality of setting results. So, we should try to find the clustering result that makes the value of clustering criterion function E reach the minimum.

3.2 Basic Idea of K-Means Clustering Algorithm The basic idea of k-maeans algorithm is to randomly select k data objects from the data containing N data objects, calculate the distance from each data object to each center with the initial stage as the center, and calculate all data objects based on the nearest neighbor principle. The average value of each set is calculated as the new center of each set, and the new center is compared with the previous center. If the new center remains unchanged, the algorithm is collected and output to compare the new center. Before the convergence condition of the algorithm is satisfied, the data objects of all new centers must be reorganized [2].

3.3 Main Process of K-Means Clustering Algorithm Input: dataset x containing K values and N data objects. Output: K kinds of square to minimize the error. (1)

In the data set containing N data objects, k data objects are randomly selected and the initial setting is focused.

552

M. Liu

(2)

Calculate the distance from each data object to the center of each data set (usually Wu’s distance), divide the data object into the nearest set displayed by the set according to the nearest neighbor principle, and calculate the square sum of the error and the value of the reference function E. Update the cluster center, calculate the average value of all clusters as the new center of each cluster, and calculate the value of error square sum benchmark function E in the new cluster center. If the absolute value of the difference is less than the preset threshold, collect the set reference function in step 5, otherwise go to step 2. Output K clusters.

(3)

(4) (5)

To improve the education and teaching ability of Ideological and political teachers is to require teachers to adopt the best education and teaching scheme according to the characteristics of students’ learning and psychological development, so as to achieve the purpose of maximizing education. First, College Ideological and political teachers need to master the corresponding multimedia teaching technology. With the development of information communication technology, college students are more interested in the combination of sound, color and video. Ideological and political teachers should learn to use a variety of teaching means and multi-dimensional teaching methods, skillfully operate multimedia teaching technology, carefully select and grind teaching content, and cooperate with excellent multimedia courseware to assist teaching. Second, College Ideological and political teachers should pay attention to the art of language explanation. The ideological and political theory textbook is a course to explain with language. Teachers should improve the language expression ability, language affinity, persuasion and appeal of education and teaching, activate the classroom atmosphere with humorous and interesting classroom language and mobilize the enthusiasm of students’ participation. Third, College Ideological and political teachers should be good at growing up in reflection. In the process of education and teaching, ideological and political teachers should be diligent in reflecting on teaching methods and their effects, actively exchange classroom learning experience with students, timely accept students’ information evaluation feedback, update education and teaching ideas and innovate education and teaching methods in reflection. Improve the ideological and theoretical system. In the rapidly changing knowledge society, must establish the concept of lifelong learning and comprehensive learning in order to effectively preach, teach and solve doubts. First, teachers study professional theoretical knowledge. The most basic and core knowledge of Ideological and political teachers in Colleges and universities is the profound professional theoretical knowledge. Only by mastering the profound professional knowledge, can they flexibly use it in teaching practice and easily explain the knowledge points. Second, the teachers need to be knowledgeable about relevant subjects (Fig. 1).

Research and Model Construction of Teacher Competency …

553

Fig. 1 Flow chart of K-means clustering algorithm

4 Data Analysis Model of English Teaching Post Competency Evaluation 4.1 Constraint Parameter Data Analysis In the previous English education post ability evaluation, due to the low classification special English education post ability evaluation system. In order to correctly evaluate the English education post ability, an informal post ability evaluation system is designed. The information sample model of post force constraint parameter as gradient parameter is constructed. Using the methods of information fusion and time series analysis, this paper makes a statistical analysis of the development after English education. It restricts the development of English education. Nonlinear time series, through the structure, this paper puts forward a specific form of index parameter distribution model. Combined with the existing research results, this paper analyzes

554

M. Liu

the main indicators and quasi levels restricting the employability of English education. The differential equation of educational management level and professional level is established, that is, the information flow model with limited parameters. H is used to represent the diversity index of English education positioning and location ability evaluation, and ωn is used to represent the evaluation error measurement index [3]. xn = x(t0 + nt) = h[z(t0 + nt)] + ωn 

= diag(δ1 , δ2 , ..., δi ), δi =

 λi , ∀i = j

(2) (3)

4.2 Quantitative Recursive Analysis of Assessment When analyzing the big data information model, the quantitative regression analysis method is used to complete the construction of the control objective function of English education function evaluation. The grey model is used to quantitatively evaluate the English education position ability, and {x}n is used to represent the position ability. According to the business ability characteristics of English education positions, the special position ability is put forward. We predict and speculate the probability density function of the position of the obstruction Gong. u i (t) = K xi (t)

(4)

5 Optimization of English Post Competency Evaluation Model In order to further improve the quantitative evaluation ability of the post competency, this paper proposes an English post competency estimation method based on fuzzy kmeans clustering, which transforms the evaluation problem into solving the objective function (K-means clustering) as the least squares estimation problem, that is, finding the English post competency β. Evaluate the consistency of the resource constraint vector to make |y − x β| Minimum, where | | is Euclidean norm, and the entropy feature of capability constraint feature information is obtained [4]. Ploss = 1 −

ρ0 + ρ − 1 1 − ρ0 = ρ ρ

(5)

Research and Model Construction of Teacher Competency …

555

The real part is represented by X (L) represented by Y (L). The amplitude randomization of English post competency is realized by using the surrogate data method. The empirical distribution data (Teaching Ability Evaluation in class k) is processed by perturbation functional, and the subclass set of class k is obtained, so as to obtain the utilization rate of English teaching resources. Uuitil = γ X

(6)

Construct a hierarchical tree, construct the main component feature quantity of English job ability evaluation through big data analysis, and seek the similarity of educational resource distribution through ambiguous matching method. Through the classification and integration of index parameters, complete the corresponding allocation scheme of educational resources and educational ability.

6 Conclusion In the existing English education function evaluation, because the data information classification accuracy of the evaluation algorithm is low, this paper mainly designs the professional English education function evaluation system and big data information model (quantitative material) based on the big data fuzzy k-means set algorithm. Put forward the ability evaluation of analytical method, extract the energy constraint features and information entropy features, integrate the K-mean set algorithm, classify and integrate the post ability standard parameters of English education posts, formulate the educational resource allocation plan, complete the composition and complete the English education posts. It has application value to realize the scientific evaluation without ability. Carry out political education, legal education and national political education for college students, and deeply carry out the work of high school ideological and political teachers. Ideological and political theory education mainly introduces the integration of social software, accurate, short and fascinating essays, short stories or micro videos, encourages college students to put forward their views on online hot issues through social network services such as wechat, microblog and QQ, and actively creates a healthy network environment in the equal and harmonious communication between teachers and students.

References 1. Cai L (2015) Two level logistic regression model for evaluation of ESP teaching effect and its influencing factors. China Health Stat 6:1064–1065 2. Ji P, Fan J, Fan Y (2016) College English curriculum design and evaluation based on language curriculum design model: taking English translation course as an example. China Foreign Lang 1:68–76

556

M. Liu

3. Zhou R, Li Z, Chen S et al (2016) Parallel optimized sampling clustering k-means algorithm for big data processing. Comput Appl 2:311–316 4. Sun Y (2017) Evaluation of English teaching ability based on feedback model. Mod Electron Technol 20:25–27

Application of Clustering Analysis Based on Ant Colony Algorithm in Performance Evaluation Daoyu Mu

Abstract With the rapid development of domestic economy, the demand for talents is also increasing. Colleges and universities in the cultivation of students with the actual needs of the society does not match the phenomenon, based on this problem, educators began to use ant colony algorithm, based on it to establish college English practice teaching effect evaluation system, according to the ant colony algorithm for the current college English data optimization processing. This paper is to use the advantages of ant colony algorithm to process data, according to the problems in the current college English practice teaching to evaluate it effectively, and improve the practice teaching strategy according to the evaluation results, so as to cultivate more qualified English talents for the society. Keywords Ant colony algorithm · College English · Practice · Evaluate

1 Introduction With the advancement of the new curriculum reform, modern university education begins to pay attention to students’ practical ability. Teachers establish a practical teaching system when formulating education plans, so that students can practice comprehensively through practice combined with students’ theoretical knowledge and practice. In order to promote people’s development and improve students’ professional quality, students should participate in practice and enrich their English knowledge. However, in practical education, there are still many problems in College English education. In order to cultivate talents, based on the nature of College English practical education, an evaluation system of College English practical education based on ant colony algorithm is established, which improves the current college English practical education [1].

D. Mu (B) P.R. China Shandong Women’s University, Jinan 250002, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_61

557

558

D. Mu

2 Ant Colony Algorithm The early studies of bionics on ant behavior show that the information transmission between individuals in groups and between individuals and environment is mostly dependent on the chemical substances produced by ants. People call these chemicals pheromones. Ants find the food location along the way by sensing the path information released by other ants. This behavior way that influences the path selection of ant colony is the inspiration of ant colony algorithm. Ants are looking for bait, but they are easy to move in the direction of high concentration. Therefore, the foraging behavior of a large number of ant groups is a positive feedback phenomenon. The shorter the path, the more ants walk on the road, and the greater the intensity of the remaining fromon. The higher the probability of choosing a path in the future, by exchanging this information, ants will choose the shortest path to find food. Ant colony optimization algorithm is an optimization algorithm to simulate ant foraging behavior. This is a description of the retrieval principle and mechanism. Assuming that there are two lengths from the ant’s nest to the feed garden around the obstacle (Fig. 1), the lengths of ant’s nest and food and ant’s nest ACD food are 4 and 6 respectively. Ants can move unit distance in unit time, and there is no pheromone in all paths at first [2].

Fig. 1 The process of ants searching for the shortest path

Application of Clustering Analysis Based on Ant Colony …

559

The performance evaluation adopts the methods of mathematical statistics and planning to build a comprehensive evaluation index system to comprehensively evaluate the enterprise’s profitability, asset quality, debt risk, business growth and other business achievements and efforts in a certain operation period, compare the corresponding evaluation standards, combined with quantitative analysis and qualitative analysis. Performance evaluation is a certain evaluation method. Using quantitative benchmark and evaluation benchmark, comprehensively evaluate the achievement degree of the performance goal specified by the central department to achieve the function and the budget implementation results specified to achieve the goal. The performance evaluation process comprehensively evaluates the collected employees’ work performance and requirements. This is a benchmark for comparing performance.

3 Guiding Significance of Ant Colony Algorithm Practical Teaching Effectiveness Evaluation Model for College English Practical Teaching First, it is conducive to the establishment and improvement of English practice teaching system. Ant colony algorithm evaluation model is conducive to the establishment and improvement of business practice teaching system. The evaluation model of ant colony algorithm can make the school according to the characteristics of College English major. When establishing the teaching system, the school should make the teaching plan according to the characteristics of English major. English Majors in Colleges and universities aim to cultivate a group of students with professional quality and skills, so that they can obtain the qualification certificate during the teaching period. Through the ant colony algorithm evaluation model, colleges and universities can provide a good teaching environment for students in combination with the needs of the current social development. Combined with the characteristics of English major in Colleges and universities, the school can provide students with the post of English practice in Colleges and universities, such as the cooperation of some tourism projects. The school can let students participate in the projects, give play to their English knowledge, and apply some business to the cooperation, so that students can play their professional ability and cultivate their professional skills and quality. When using ant colony algorithm to evaluate the model, the school can let students choose college English knowledge according to the evaluation of the model. On the basis of mastering English knowledge, improve students’ professional skills, and then provide the society with high-quality talents of College English major. To establish and improve the College English practice teaching system, we should focus on the implementation in practice, so that students can actively participate in the practice, according to the training objectives [3].

560

D. Mu

Second, it is helpful to assist teachers in practical teaching. Ant colony algorithm practice teaching effectiveness evaluation model is conducive to assist teachers in practice teaching. In College English practice teaching, teachers generally use theory teaching, and students usually master the corresponding knowledge in class, but when they fall into practice, they will find that their ability is insufficient. In order to make up for this problem, teachers can make a reasonable teaching plan according to the evaluation given in ant colony algorithm. According to each student’s learning situation, targeted teaching, so that students can better practice English. Teachers can make the whole English practice teaching step by step according to the evaluation of students in ant colony algorithm.

4 The Mathematical Model of Ant Colony Algorithm Practical Teaching Effect Evaluation 4.1 Mathematical Model of Mosquito Swarm Algorithm Pikj =

⎧ ⎨

α

β

[τi j (t)] [ηi j ]  [τi j ]α [ηi j ]β

⎩ s∈allowed

, j = allowedk

(1)

0

tabuk (k = 1, 2, 3,… N) denotes the set of all nodes that ant k is currently passing through, and allowed denotes the set of points that ant has not passed through.

4.2 MMAS Pheromone After each cycle, only one ant updates the pheromone. The pheromone range of each ant is limited to [τ min , τ max ], when the value of pheromone τ > τ max , take τ = τ max , on the contrary, when the pheromone value τ < τ min , take τ = τ min .

4.3 Maximum Matching of Bipartite Graphs Graph is a mathematical model which uses points and lines to describe the relationship between things in a discrete set of things in a certain way. A graph can be used to show the good and bad teaching quality of the evaluated teachers. The graph is represented by a triple g (n, a, b), where n = 1,2,3, … n is the vertex set of G, a is the set of all edges in the graph, and B is the set of eigenvalues of edges. In the algorithm, bipartite graph is used to treat “course, class, teacher” and “satisfaction degree of teachers and students, course name” as two interrelated models to find the maximum

Application of Clustering Analysis Based on Ant Colony …

561

matching. In the triple g, n regards the relational pattern < curriculum, class, teacher > as the set of leftmost points, and regards < teacher, student satisfaction, course name > as the set of rightmost points. The points on the left and the points on the right in a are matched, and only those that meet certain conditions are connected. The weight in B is the satisfaction degree of the students on the matching side [4]. The relationship model < course, class, teacher > is referred to as P, and < teacher, student satisfaction, course name > is referred to as g. before teaching, the data in the relationship of < course, class, teacher > comes from the academic affairs office. P is regarded as the leftmost set of points, and the relational model G is the rightmost set of points. Cartesian product is used to connect the left and right vertices. The weight in the connection is the average value of students’ overall evaluation of teachers. The maximum weight in all weights is selected as the maximum matching. When using ant colony algorithm to solve the classic TSP problem, each ant starts from the initial city node, must pass through each city in the graph, and can only pass through once. When all cities are out of date, the ant completes a traversal. In the process of teacher evaluation, ant traversal is different. In the created bipartite graph model, all ants start from a node in the left a set of bipartite graph, find the matching node in the right b set, and then return to the left a set. The next starting point and the previous ending point are logically regarded as a node. In this way, until the ant completes all the matching in the A. b set, the ant’s traversal is completed.

5 Relationship Between OKR Self-Evaluation and Performance Evaluation OKR self-evaluation and performance evaluation are two independent evaluation systems. Employees will eventually have a self-assessment score for each OKR, which only reflects the progress information of OKR. When carrying out OKR, please remember that OKR is formulated to stimulate and release employees’ internal potential and encourage them to challenge themselves, not for performance evaluation. OKR score is 0–1, full score is 1, and OKR score has nothing to do with performance evaluation. When carrying out performance evaluation, the starting point is employee selfevaluation. What is evaluated here is the employee’s final contribution, not OKR score. Self evaluation is a textual input. Employees only need to briefly list their actual outputs in the evaluation cycle. The management team shall, in combination with the actual output of employees, qualitatively evaluate the contribution of employees in the evaluation cycle. How is this different from traditional practice? The biggest difference is that the achievement of goals is not directly applied to the performance evaluation. In the traditional performance management, the completion rate of each goal needs to be evaluated. In practice, employees usually need to evaluate the completion of each goal one by one, and then use it as input to submit it to the supervisor for performance

562

D. Mu

evaluation. In this way, employees subconsciously establish a connection between goals and evaluation. In the future, employees will inevitably tend to be conservative when setting goals. It is this practice that restricts employees’ independent willingness to challenge. Therefore, OKR’s great breakthrough is to draw a line between objectives and evaluation, and divide objective management and evaluation management into two independent systems. Target management focuses on value creation, and performance evaluation focuses on value evaluation. In value creation, we should pay attention to how to love and make the cake bigger, rather than focusing on the final cake from the beginning (and always after). Value creation is the basis of value evaluation. Without effective value output, value evaluation is a blind toss. Value creation is the premise of value evaluation. Although value creation will eventually affect value evaluation, there is an implicit indirect relationship between them, rather than an explicit binding.

6 Concluding Remarks Strictly speaking, performance evaluation system includes performance target, performance guidance and performance evaluation. So we can think that performance evaluation is only a part of performance evaluation. But now, this concept is generally blurred, and the two are regarded as the same. However, in different performance evaluation periods, performance evaluation methods are also different. For example, the performance evaluation of enterprises: in the period of traditional simple evaluation of financial performance, the performance evaluation is based on the value of shareholders as the evaluation standard, which is adapted to a set of financial index system, and the effective evaluation method is usually EVA (economic value-added method); in the period of diversified performance evaluation, the performance evaluation is based on the customer value as the evaluation standard, What matches with it is a set of comprehensive index system, including financial index and non-financial index; In the increasingly developing period of strategic performance evaluation, the performance evaluation standard is based on the value orientation of stakeholders. With it is a strategic performance evaluation method based on the value orientation of stakeholders—performance prism method, which was proposed by Andy Nilly and Chris Adams of Cranfield college in the UK. In the performance evaluation of enterprise employees, the fundamental difference between the evaluation under the performance management system and the original performance lies in: it is transparent, the goals of managers and employees are consistent, the standards are determined, it is not a secret operation, but fair and just. To sum up, in College English practice teaching, schools can make reasonable analysis and suggestions on the teaching system according to ant colony algorithm. To help students make effective use of the teaching resources around them when

Application of Clustering Analysis Based on Ant Colony …

563

learning college English. Pay attention to the combination of theory and practice, cultivate students’ professional skills and practical ability. Through the improvement of ant colony algorithm, this paper makes an effective evaluation of College English practical teaching, evaluates the students of English major in Colleges and universities, and puts forward some strategies in line with college English practical teaching, so as to promote the all-round development of students.

References 1. Yuan Y (2004) Theory and practice of teaching management reform in Colleges and universities. Beijing University of traditional Chinese medicine, Beijing 2. Yu H (2016) Effectiveness evaluation of business English practice teaching based on ant colony algorithm. Sci Technol Bull 2(2):229–232 3. Liu Y (2012) Deepening the reform of higher education and taking the connotative development road with improving quality as the core. Qiushi 10:3–9 4. Qiu G (2012) Practical teaching of business English under the guidance of competency model. Educ Career 14:182–183

The Application of Curve Algorithm and Computer Aided Design in Garment Design Jing Li

Abstract Fashion design is the focus of science, technology and art, involving aesthetics, culture, psychology, materials, engineering, marketing, color and other elements “Design” refers to planning, conceiving, conceiving and establishing schemes, and also includes imagery, drawing and shaping Fashion design process “that is, according to the requirements of the design object to conceive, and draw out the effect map, plan, and then according to the drawings to make, to complete the whole process of design”. In this paper, a new algorithm of second order berier curve is proposed, and some problems related to curve fitting are discussed, and it is applied to the curve design of clothing. Keywords Bezier curve · Computer graphics algorithm · Inverse fitting · Lofting

1 Introduction Fashion design is a complex process, which includes style design, structure design and process design. No matter which part is involved in geometric calculation and drawing, the traditional design method uses empirical formula and constant to simplify the calculation, the measurement of size mainly depends on the designer’s experience and feeling, and the drawing of graphics completely depends on the designer’s manual operation. Therefore, the whole design process is not only repetitive and complicated, but also extremely imprecise, and easy to make mistakes. The result is that the design is labor-consuming, inefficient and long cycle, which makes the whole clothing industry difficult to meet the needs of market development in style and specification. With the development of computer science and the popularization of computer aided design (CAD) application technology, clothing CAD system has begun to replace the traditional manual design method. Clothing CAD uses computer aided designers to complete clothing design, which combines people’s creative thinking with the high-speed operation and accurate drawing of computer, J. Li (B) Shandong Vocational College of Light Industry, Zibo 255300, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_62

565

566

J. Li

so as to improve the design quality, The design cycle is shortened. Recently, we have successfully designed and developed lccad-1 leather garment CAD system on PC, which has the functions of leather garment design, cutting input and layout, material calculation style modification and push plate lofting, basically replacing the traditional complex manual operation [1]. The design of garment CAD software system involves many problems of computer graphics algorithm, in which the workload of free curve design is particularly large, such as the upper sleeve cage, sleeve cage door, collar arc, the lower back crotch and lower crotch seam, etc. the design of these free curves is also more complex than the straight line circle and arc. In this paper, some computer algorithms of curve design in lccad POG garment CAD system are discussed, including the algorithm of generating Bezier curve, the method of inverse fitting calculation under specific conditions, the input and fitting of curve and the lofting calculation of curve. These algorithm problems are also concerned by other clothing CAD systems, so it has a certain reference value for the design and development of other systems.

2 Bezier Curve Generation Algorithm Second order Bezier curve can be defined by vector parameter equation. r1 + K 2 r2 r(K ) = (1 − K )2 r0 + 2K (1 − K )

(1)

In order to draw the curve by computer, it is necessary to have an appropriate algorithm. At present, there are several computer algorithms for Bezier curves, such as Bezier drawing method, non-uniform point taking approximation method according to curvature variation, forward difference method, and arc approximation method. In order to make the formula more concise and ensure higher calculation accuracy and speed, in lccad-1 system, we use the constant ratio partition discriminant calculation method. Its basic idea is to use the constant ratio partition property of Bezier curve to construct discriminant function, and then directly start from the parameter equation of Bezier curve, and simply use the discrete degree of parameter K to control iterative calculation and drawing accuracy [2].

2.1 The Property of Constant Ratio Partition of Second Order Bezier Curve The so-called constant ratio partition property means that in the second-order Beizer curve as shown in Fig. 1, there exists the following relationship: |P0 N | |Q L| |P0 L| = 2K =K =K |P0 P1 | |P0 P2 | |N L|

(2)

The Application of Curve Algorithm and Computer Aided Design …

567

Fig. 1 Second order Beizer curve

In the graph, P0 (x 0 , y0 ), P1 (x 1 , y1 ), P2 (x 2 , y2 ) are the vertices of Bezier curve control polygon, M is the midpoint of P0 P2 , NL is parallel to MP: r(K) represents the space vector of any point Q (x, y) on the second order Bezier curve defined by control polygonP0 ,P1 ,P2 .

2.2 Computer Iterative Calculation Method The initial conditions of iterative calculation are f 0 = 0, P0 = c1 h(1 − h), u 0 0, g0 = 0, v0 = 0 The sign function E in the previous formula should be changed once when the curve passes through the pole. It can be proved that in this case, the product of the first-order difference of two adjacent points is less than zero. In other words, e should change the symbol when Pi-1 * Pi < 0. Figure 2 shows the flow chart of the computer to realize the above generation algorithm. Because the algorithm starts directly from the parameter equation of the second-order Bezier curve and controls the iterative process with the degree of discretization of the parameters, it avoids the control judgment and calculation in the X and Y directions, so it ensures high drawing speed and accuracy. At the same time, the algorithm steps are relatively simple. In addition, in the traditional fashion design, in order to draw the curve manually, we usually take the bisection point between the starting point and the end point of the curve, and give the concave potential of the corresponding points, and then connect them smoothly. They correspond to ui = ihx 2 = ix 2 /n and yk in this algorithm respectively. It can be seen that for fashion design, the geometric meaning of this algorithm is relatively clear.

568

J. Li

Fig. 2 Flow chart of generation algorithm

3 Several Common Inverse Fitting Algorithms in Fashion Design As a known condition, the common curves in fashion design usually give the starting point and the ending point. In addition, according to different situations, some other conditions may be given, such as the tangent direction at the end point or the coordinates of the points on the curve. In this case, in order to accurately fit the required Bezier curve, in addition to the two known endpoints, it is often necessary to solve the remaining control vertices according to other known conditions. This process is called inverse fitting of the Bezier curve. After the control vertex is determined, the Bezier curve can be drawn with the algorithm mentioned above. Theoretically, if n + 1 type value points Q (J = 0,… N) are known, and the parameters corresponding to Q have uniform interval, then the parameter k = J/Mn (J = 0,…, n) can be used to reverse the vertex P (j = 0, 1,… n). In principle, if 2n type value points can be given, N + 1 vertices of n-order Beier curve can be uniquely determined. However, with the increase of order, the power of parameter k is also increasing, which will be very difficult to solve. However, since only second-order or third-order Beier curves are involved in fashion design, if some boundary constraints can be given here, the problem may be simplified. Most of the curve inverse fitting algorithms in fashion design belong to this kind of situation. For example, if the end point and tangent direction of the end point of the curve are known, or the concave potential of the end point of the curve and the midpoint of the connecting line of the end point are known, another control vertex of the second order Bezier curve (as shown in the front lower swing arc and waist seam arc of the four piece skirt in Fig. 3) is required, then the geometric method can be directly used to solve [3].

The Application of Curve Algorithm and Computer Aided Design …

569

Fig. 3 The front hem and waist arc in four skirts

4 Input of Cutting and Curve Fitting It is an important function of garment CAD to input garment cut into computer for storage, copy, modification, transfer or output. It also embodies the superiority of computer aided garment design. Generally, digitizer is used for the input of cutting piece, which has a large flat plate which can generate magnetic field after being electrified. When working, the garment pieces are laid on the tablet of the digitizer, and the digitizer is connected with the computer through the interface. Here, the vernier coil of the digitizer is placed at different positions of the cutting piece, and then the coordinates can be obtained by detecting the magnetic field signal. The input of the straight line segment is relatively easy, just input the coordinates of the two endpoints [4]. The curve input is approximated by inputting continuous small segments of broken line. In order to smooth the input broken line, and to facilitate future modification, the second-order or third-order B-spline should be used to fit the broken line after the cutting input. Suppose the input value point is Pi (i = 1,2,…, n − 1) and the sampling interval is basically uniform, then the vertex Bi can be solved by matrix method according to the properties of B-spline. In order to facilitate calculation, the calculation formula can be approximately written as follows according to the superposition principle of solutions of linear equations ⎡ Bi = ∨3 · ⎣ Pi +

4 

⎤ (Pi+ j + Pi− j ) · λj ⎦

(3)

j=1

It is not only computationally expensive, but also inconvenient to modify the whole curve because of the local plasticity of B-spline. So we use a simpler method in lccad1 system, that is, after inputting the curve according to the above method, we take two points on the curve, except for the two endpoints, and then fit them according to the

570

J. Li

third-order Bezier curve. Practice shows that this method can meet the requirements when the curve is close to symmetry, but when the curve is completely asymmetric or there is a long curve segment approximate to a straight line, it is necessary to obtain a better fitting effect through appropriate sampling according to experience. Considering the human–computer interaction in the design process, if there is a big difference between the fitted curve and the actual input curve, it can also be adjusted by moving the control vertex through interactive operation. So using this simplified processing can fully meet the requirements of fashion design. Because this method only needs to solve two control points except the endpoint according to the third-order berier formula, the amount of calculation is greatly reduced.

5 Conclusion Garment CAD is a complex system, in which there are many calculation methods, especially the calculation method of curve, which is worth studying. In addition to the curve generation algorithm, inverse fitting algorithm, curve input fitting and lofting algorithm discussed in this paper, other curve algorithms involved in lccad POG garment CAD system also include curve intersection algorithm, calculation of curve polygon area, calculation of curve polygon area The algorithm of automatic approximation of existing curves, etc.

References 1. 2. 3. 4.

Chang G et al (1980) On the mathematical basis of Bezier method. Comput Math (3):4R 49 Liu Y (1994) A fast method for drawing Bezier curve. Appl Microcomput 3(5):34, 35 Liu Y An algorithm for drawing curves. Microcomput Appl 5:35–37 Jinling C et al (1993) An algorithm for approximating cubic Bezier curve by circular arc. Acta Computationa Sin 16:776–781

DEA Algorithm for Performance Evaluation of Public Sector with Benchmarking Management Hongyan Ge

Abstract In the traditional performance appraisal of departments, the weight of examination is quite subjective, which is unreasonable for the performance appraisal of departments, especially for the public management departments and other nonprofit departments. Based on this, this paper proposes an improved algorithm of data envelopment analysis (DEA). This algorithm not only avoids the abnormal influence of weight, but also overcomes the defect of “relative effectiveness” of DEA algorithm itself. Using this method to evaluate the performance of the public sector, the theory is relatively perfect, and the evaluation results are very consistent with the actual results. At the same time, this method can also give the direction and method of improvement for non DEA effective departments. Keywords Benchmarking management · DEA · Performance appraisal

1 Introduction DEA (Data Envelopment Analysis) algorithm was proposed by a famous operational research scientist A. Chambers W. Cooper E. Rhodes in 1978 in an important paper. It has been widely used in many fields such as management, economics, military science and so on since its birth, and has become a new branch of operational research. DEA algorithm is mainly used in the system model with multiple input and output. It has outstanding advantages in evaluating the relative effectiveness of the same (similar) types of departments, which is a great advantage. For example, each member is a decision-making unit (DMU) for textile mills of the same type, colleges, hospital libraries, and functional departments with the same nature of government work. In evaluating the performance of these member units, the better way to deal with is to treat it as a multi-objective decision-making problem with multiple inputs (the smaller the input is, the better) and multiple output indicators (the larger the H. Ge (B) Chongqing Metropolitan College of Science and Technology, Yongchuan District, Chongqing 402167, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_63

571

572

H. Ge

output is, the better). But DEA algorithm still has its own limitations that cannot be overcome—relative effectiveness. The so-called “relative effectiveness” refers to the comparison of performance among departments when evaluating the same (similar) departments. Finally, the best performance is selected as the effective decision unit of DEA, so there will be the performance of the evaluated Department itself is not very good, but according to DEA algorithm, The results of DEA are still evaluated, which is inconsistent with the actual evaluation requirements. In order to overcome the limitations of the effectiveness evaluation of DEA, this paper proposes a comprehensive use of benchmarking management and DEA algorithm [1]. Benchmarking, also translated as benchmark management and reference management, is a new management method which has been rising abroad since 1980s. It is a continuous learning process for enterprises to deal with the most tough competitors. The learning object can be a strong hand in the industry or an advanced unit in the enterprise. Internal benchmarking management is to compare the same behaviors, departments or related enterprises in the unit to determine the optimal behavior level in the normal situation, that is, best practice. Of course, benchmarking management is also applicable to non-profit departments such as public management. The objects to be assessed are compared with excellent departments (units) with the same or similar conditions, analyze the gap, set goals and improve the performance level of the departments.

2 Performance Evaluation 2.1 Difficulties in Performance Evaluation of Public Sector The reason why public sector performance evaluation has not yet established a complete index system is because of the particularity and complexity of public sector, there are many contradictions and difficulties in implementing performance evaluation. 1.

contradiction between public welfare, non-profit goal and benefit goal required by performance evaluation

The biggest difference between public and private sectors in market economy is that the former pursues the maximization of public interests, while the latter pursues the maximization of individual interests and benefits, or, in other words, the former pursues fairness and the latter pursues efficiency. Therefore, the effectiveness of the public sector is not only difficult to judge, but also considered meaningless. We believe that the purpose of performance evaluation for public is to make limited public resources perfect the use and allocation through evaluation, and give full play to the maximum public benefits without sacrificing public interests, and realize the maximization of public welfare, without waste of public resources and low efficiency. The performance evaluation and the non-profit and public welfare

DEA Algorithm for Performance Evaluation of Public Sector …

573

are not only not contradictory, but also an effective means and method to maximize public interests. The key and difficult point here is that the evaluation index setting requires scientificity, and distinguishes the efficiency required by public sector and the efficiency pursued by enterprises. The public sector is more pursuing social benefits and their own efficiency of use. How to evaluate whether the public is in line with the goal of maximizing public interest and whether it conforms to the goal of maximizing its own efficiency has become one of the difficulties in the evaluation of public institutions.

2.2 Basic Principles and Methods of Public Sector Performance Evaluation Performance evaluation of public sector is an important content of the evaluation of public institutions performance by investors, and an important way to improve the efficiency of use. In order to overcome the contradiction and difficulty in performance evaluation, combined with the public sector and its operation practice, we believe that the following principles and methods should be implemented in performance evaluation: 1.

2.

principles of establishing performance appraisal and evaluation system with quality, efficiency and contribution as the core index and other indicators as auxiliary indicators Because of the non-profit and non-profit of the public sector, the public can neither maintain nor increase value. As a result of the formation of public financial investment, the owners and investors (represented by the government and the taxpayers in fact) are concerned about not profit-making and value-added, but should be: ➀ quality. Whether the user has maintained the usability, integrity and safety well, and whether it can guarantee the needs of the development of the enterprise; ➁ efficiency (not benefit). The benefit requires value-added and profit, while efficiency focuses on the rationality of utilization and allocation, whether it has been fully utilized and whether the allocation is scientific and reasonable; ➂ Contribute. Contribution is the result of the double effect of quality and efficiency, but it is different from benefit. It mainly evaluates the results of use, namely the quantity and quality of public services and public products provided by the unit for the society. Besides the above core indicators, it is necessary to make supplementary examination on the solvency, development ability, and the efficiency and valuekeeping and value-added status of the public sector’s operational and quasi operational. the principle of relative index as the main and absolute index as the auxiliary The purpose of performance evaluation is to judge the safety, benefit and development potential of the user through the analysis and comparison of the results of use and use. Therefore, the evaluation indexes must be comparable

574

3.

4.

H. Ge

among the units. The premise of absolute index comparison is to eliminate the difference factors between units, and only compare between the same units. For example, the total amount of the comparison between universities and primary and secondary schools is almost meaningless, and it is not significant between schools and scientific research institutions, so it is difficult to draw corresponding conclusions. Only by adopting relative indexes can the level be comparable. Therefore, the performance evaluation of public sector should be based on relative indicators, and absolute indicators as the auxiliary [2]. the principle of value index assessment and physical index as the auxiliary is the value embodiment of various economic resources and property materials in public sector under the market economy. It is not only manifested as property material of millions of physical forms, but also unified value. The evaluation of performance is different from the work evaluation of public sector, nor is it an evaluation of the quality, quantity and benefit of public products or quasi public products provided by the public sector, but also the evaluation of its own situation, input–output, development potential and other contents. Because of the variety of physical forms, it is not comparable. In order to facilitate comparison and evaluation, the performance evaluation should be based on the value index assessment, and at the same time, it is also assisted in the physical status assessment. the core indicators are designed uniformly. The principle of classification design of auxiliary indicators should be designed according to the characteristics of various public sectors in addition to the above core indicators due to the complexity of public sector. The core index is the index reflecting the basic performance of public sector. In order to facilitate comparative evaluation, it must be unified. The auxiliary index is an indicator reflecting the performance of a certain public sector or a special type of special. It should be designed according to the characteristics of different types of public departments or special projects.

3 Modeling Analysis Model processing mode: DMU for each D MU j = 1, 2, . . . , n respectively, the following optimal linear programming models (P) are established: let be the decision unit model discussed D MU j0 , ⎧ max V P = μT y j 0 ⎪ ⎪ ⎨ T ω x j − μT y j ≥ 0 j = 1, 2, . . . , n (P)s.t. ⎪ ω T x j0 = 1 ⎪ ⎩ ω ≥ 0, μ ≥ 0 Here is x j 0, y j 0, y j , x j ,

j = 1, 2, . . . , n are known vectors,

(1)

DEA Algorithm for Performance Evaluation of Public Sector …

575

ω = (ω1 , ω2 , . . . , ωn )T , μ = (μ1 , μ2 , . . . , μn )T Is the vector. Or its dual programming (d) ⎧ min VD = θ ⎪ ⎪  ⎪ ⎪ ⎪ x j λ j + s = θ x0 ⎨ j=1 (D)s.t.  ⎪ y j λ j + s = y0 ⎪ ⎪ ⎪ j=1 ⎪ ⎩ λ j ≥ 0, j = 1, 2, . . . , n

(2)

According to the optimal value, it is new. (3) introduce benchmarking management program, collect the best work performance and index data of the same or similar departments by means of investigation, interview and online search, and establish the benchmarking unit dmum to be assessed [3]. It should be noted that this benchmark is not necessarily the data of a certain department. Generally speaking, it should be the synthesis of the best performance extracted from many same or similar departments. Of course, it is not easy to find out the best data of the same department. We can collect data from enterprises, institutions and organs with similar functions, and then eliminate different factors. The effective decision-making unit is selected by comparing the effective decision-making unit and benchmark with DEA algorithm. The flow chart is shown in Fig. 1

4 Model Application Taking performance evaluation of a functional department of government organ as an example, they can be regarded as the same function and the same type of unit. According to DEA algorithm, performance evaluation index should include input index and output index. The input index of setting up the performance evaluation of this functional department refers to the cost of the Department to occupy or use the resources of its own people, finance, and materials. It includes the number of employees, the professional and cultural level of the employees, the number of vehicles allocated, the jurisdiction, the funds used, and the geographical location. Output indicators refer to the public security management, industry management, population management, fire control management, computer security management, police command and management of public security office, financial equipment management, team education and management, including the number of cases (rate), number of strike handling (rate), number of police advance disposal (rate), registration rate of foreign population, number of fire, consolidation rate of industry renovation, number of illegal and disciplinary violations of police, etc., The level and number of awards [4].

576

H. Ge

Fig. 1 Flow chart of effectiveness evaluation

According to the requirements of DEA algorithm and combined with the actual situation, the following requirements are made: (a) the model only takes a few key indicators, input indicators to take the quality of employees, the number of vehicles allocated, and the current funds allocated. (b) The output index is the number of cases (rate), the number of strike handling (rate), the number of fire, the level and number of awards. (c) The dimension of DEA algorithm does not affect its effectiveness. Because there is no strict requirement for dimension, dimensionless treatment is not carried out. This is really a big advantage of DEA. Enter the index employee quality by product of the number of employees and the corresponding cultural level according to a rule. The calculation results are shown in Table 1. (e) The output index Table 1 Staff quality score DMU1

DMU2

DMU3

DMU4

DMU5

DMU6

DMU7

DMU8

0 + 19 + 1

0 + 16 + 2

0 + 15 + 6+1

0 + 10 + 5

0 + 13 + 4

0 + 15 + 4

0 + 13 + 1

0+8+2

19.7

17.4

19.7

13.5

15.8

17.8

13.7

9.4

DEA Algorithm for Performance Evaluation of Public Sector …

577

awards are calculated by multiplying and accumulating by grade and number. (f) The output index takes the inverse of the fire number in case of fire. The validity of DMU of each DMU is obtained. Considering the duality problem (d) of linear rule (P), it is easier to make in-depth analysis theoretically and economically.

5 Conclusion (1)

(2)

(3)

From the previous analysis, we know that DEA algorithm has nothing to do with the preference of leaders or decision-makers, and does not set the corresponding weight, which avoids the abnormal influence of weight, and has complete objectivity and transparency The combination of DEA algorithm and traditional benchmarking management in government evaluation overcomes the relative effectiveness defects of DEA algorithm· DEA effective DMU, cannot be sorted, this is DEA C ° But it can be combined with other methods, such as analytic hierarchy process (AHP), balanced scorecard, principal component analysis, fuzzy comprehensive evaluation and so on

References 1. Li Z (2000) Operational research ABC. Economic Management Press, Beijing 2. Zhao S (2001) Avon’s benchmarking management. Enterprise Reform Manag (7):28 3. Keeley P et al (2002) Benchmarking management in public sector. China Renmin University Press, Beijing 4. Quanling W (1988) DEA method for evaluating relative effectiveness. China Renmin University Press, Beijing

TD-LTE Handover Algorithm for High Speed Railway Mobile Communication Jingmei Zhao, Min Li, and Hairong Wang

Abstract With the rapid development of China’s high-speed railway, it has become inevitable that the railway broadband mobile communication technology lter replaces GSMR. Lter is the next generation broadband mobile communication system determined by the international railway union. It has the characteristics of high-speed, low delay, high mobility and high security. According to the characteristics of high-speed railway wireless communication environment, based on the analysis of the measurement parameters, filtering parameters and control parameters involved in the TD-LTE handover process, a handover algorithm based on the combination of train running direction and running speed is proposed. The improved handover algorithm is simulated and analyzed to obtain the optimal combination of switching parameters, The probability of ping-pong handoff and link connection failure is minimized, which can effectively prevent ping-pong handover and drop call phenomenon, and improve the handover success rate under high-speed conditions. Keywords LTE-R · High speed railway · Handover · Running speed · Running direction

J. Zhao (B) · M. Li · H. Wang College of Optoelectronic Engineering, Yunnan Open University, Yunnan Province, Kunming 650223, China e-mail: [email protected] M. Li e-mail: [email protected] H. Wang e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_64

579

580

J. Zhao et al.

1 Introduction Personalization is the need to add unique and own characteristics on the basis of popularization. It emphasizes the service and demand with individual interest characteristics. Personalized recommendation system can provide users with personalized resource list according to their historical behavior data [1]. With the rapid popularization and rapid development of the Internet, people have entered an era of information explosion. In this era, while enjoying the convenience of information, they are also trapped in the mire of information overload. Personalized recommendation system is proposed to solve these problems and has been developed rapidly. A complete recommendation system consists of user behavior recording module, user preference analysis module and recommendation algorithm module [2]. At present, GSM-R communication system has been widely used in high-speed railway communication, providing network, intelligent and comprehensive train dispatching and command functions for railway operation. However, with the development of railway transportation, the narrow-band voice and data services provided by GSMR can no longer meet the business needs of the daily development of highspeed railway. With the rapid development of intelligent terminals and mobile Internet services, GSM-R communication system has been widely used in high-speed railway communication, When users travel by high-speed rail, there are more and more mobile office and network entertainment needs, which has become a major challenge for the construction of high-speed rail communication network. LTE is a mobile communication technology mainly developed by 3GPP. TD-LTE can meet various service requirements through different uplink and downlink timeslot ratios, so as to achieve the optimal service experience and the best spectrum utilization. Therefore, Tdlte technology is the first choice of high-speed railway mobile communication in the future [3–5].

2 Wireless Coverage of LTE 2.1 Multi RRU Shared Cell From the perspective of network coverage performance, high-speed rail LTE adopts private network construction, adopts dual channel remote radio frequency unit (RRU) technology for coverage networking, and uses MIMO technology to improve network data service rate; at the same time, it uses multiple rrus to share cells, which reduces inter cell switching and improves network performance, and can adapt to complex high-speed rail lines, tunnels and other places [6]. From the point of view of RRU, there are two ways to cover the RRU in the same direction; For single RRU two-way coverage, each station is equipped with a location group, and then through the power divider shunt, respectively connected with a pair of antennas to radiate along the railway on both sides of the station site. The cost of single RRU coverage mode is

TD-LTE Handover Algorithm for High Speed Railway …

581

lower than that of double RRU coverage mode, but the power divider has certain loss [7].

2.2 Overlapping Coverage Area Planning The reasonable planning of overlapping coverage area can ensure timely switching, avoid switching too early or too late, and avoid the occurrence of ping-pong switching. The setting of switching band shall enable user terminal (UE) to switch twice in the switching band [8]. That is, UE is allowed to make the second handover supplement immediately after the first handover failure. Transition area a is the distance required for the signal strength of the temporary cell to reach the handover threshold, and the handover execution area B is the distance from A3 event to handover completion, and the required distance for two handoffs should be considered. When the measured value of LTE is better than that of the current cell, when the measured value of LTE is better than that of one cell, it will trigger the handover [9].

3 Parameter Measurement of LTE 3.1 Physical Layer Measurement UE needs to periodically measure the reference signal receiving power and the reference signal receiving quality parameters of the service cell and the adjacent cell. The reference signal receiving power is the average receiving power of the useful signals of the multiple resource particles re of the reference signal of a specific cell within a certain frequency band, that is, the average power of the re in the same resource block RB: RS R P = PR S − Pnoise

(1)

where: RSRP is the received power of the reference signal;PR S is the average received power of each RE carrying the reference signal; and Pnoise is the average noise power of each re carrying the reference signal. The received signal strength indication is the average value of the total received power of OFDM symbols in several RB within a certain frequency band, including all the power of useful signal, cyclic prefix, intra cell interference, adjacent cell interference, noise, etc. [10]. However, the reference signal received power and received signal strength indicate that the bandwidth used in the measurement is different, so it is meaningful to compare the numerator and denominator in the same bandwidth, so a coefficient must be used to adjust [11]. The received power of the reference signal

582

J. Zhao et al.

Fig. 1 Schematic diagram of measurement period Tm and reporting period Tn

is the power of a single RB, while the received signal strength indication is the power of N RBS. The bandwidth used in the received signal strength indication is n times of the reference signal received power: RS R Q = N ·

RS R P RSS I

(2)

where: RSSI received signal strength index; rsrp is the receiving power of reference signal.

3.2 Wave Filtering There are two cycles in layer 1 filtering, measurement period TN and reporting period T, as shown in Fig. 1. The time is divided into several periods according to Tm . In each Tm period, the rsrp values are continuously read. In layer 1, the m RSRP values obtained in Tm time period are weighted and averaged, and then the measurement random error is added. The error function follows the normal distribution of (µ, 0). The key of layer 3 filtering is to establish a certain correlation between each value reported by measurement and the measurement result at the previous time. The reported value at the current time is not only determined by the measurement value of the current physical layer, but also related to the reported value at the previous time [12]. The effect of this is to reduce the impact of random channel changes on the measurement.

4 Handover Algorithm of LTE At present, there are two kinds of LTE handover algorithms used in high-speed railway. Class 1 is a joint decision algorithm based on rsrp and rsrq. The advantage of this algorithm is to compare rsrp and rsrq comprehensively, so as to avoid frequent handoff and drop call. The disadvantage is that when the train is running at different speeds, the same delay h and trigger delay time TM are used for handover decision,

TD-LTE Handover Algorithm for High Speed Railway …

583

which may lead to premature or late switching. The other is the optimization of switching parameters based on the characteristics of moving speed [13]. The algorithm improves the shortcomings of the joint decision algorithm based on rsrp and rsrq. When the train is running at different speeds, different hysteresis hy and trigger delay time TA are used to make handover decision. The disadvantage is that when the train switches at different speeds, if the same measurement period TN and reporting period T are adopted, the system can be used to determine the switching parameters, The number of measurement reports reported by UE to eNodeB is inconsistent, which reduces the accuracy of handover decision. Due to the diversity of mountain environment, bridges, and so on, this paper mainly focuses on the simulation of mountainous environment and bridges. In mountain scene, it is mainly affected by large-scale fading, shadow fading and multipath fading. The ping-pong handoff can be effectively prevented by layer 1 filtering and layer 3 filtering. LTE system level simulation platform includes simulation scenarios, traffic flow, protocol stack, etc. The simulation of handover process is mainly based on this platform. LTE SIM is an event triggered object-oriented simulation software written in C+ language, which is a LTE system level simulation platform [14]. Now the software consists of 90 classes and is written with nearly 23,000 pieces of code. LTE SIM network architecture includes access network e-utran and evolution packet system EPS. It supports single cell, multi cell environment, multi-user equipment environment, quality of service level, user mobility, handover and frequency reuse technology. On the basis of this module, we add the signal module and measurement module.

5 Conclusion As one of the key technologies of LTE system, handover technology can effectively ensure the communication quality of users. In the process of handover, if the handover is too early, it will produce ping-pong effect, and if the handover is too late, the wireless link connection will be interrupted and the call drop will occur. The simulation results show that, compared with the traditional A3 algorithm and the optimization algorithm based on the moving speed characteristics, the switching success rate of the train is improved under various running speed conditions, especially when the train running speed is higher, this performance advantage is more obvious. Therefore, the handover algorithm proposed in this paper can better adapt to high-speed rail occasions, ensure the timely and effective handover, and provide safe and reliable wireless communication for high-speed rail.

584

J. Zhao et al.

References 1. Yang L (2013) TD-LTE high speed railway coverage scheme. ZTE Commun Technol 6:26–27 2. Wei Z, Xu X, Zhang J et al (2010) Handover optimization based on mobility characteristics in LTE. Commun Technol 43(11):134–138 3. Huang J, Ma J, Zhong Z (2006) Research on GSMR handoff in passenger dedicated line. Railway Commun Signal 42(5):51–53 4. Li D, Zhuang HC (2013) Review of key issues of 3G and TD-LTE mobile communication for high-speed railway. Computer Appl Res 30(5):1297–1302 5. Zhang L (2013) Optimization of cell handover algorithm based on rsrp/rsrq in TD-LTE. Digital Commun (02) 6. Migansuo M (2015) Research on the application of speed triggered early Handover Algorithm in lte-r. Acta Electronica Sin (12) 7. Ling Q, Zhang L, Wang H, Wang B (2018) Fast handover algorithm of lte-r in high speed railway environment. Comput Eng Des (11) 8. Ma B, Wang S, Xie X (2020) Research on robust vertical handoff algorithm based on interval label decision. Acta Electronica Sin (05) 9. Li X, Wang J, Sun C, Wan X (2016) An energy efficient vertical handoff algorithm in heterogeneous networks. Telecommun Technol (12) 10. Du X, Dong Z, Chen B, Zhang H (2017) Heterogeneous network handoff algorithm based on pre decision and improved grey correlation. Comput Appl Res (02) 11. Wang L, Zheng H, Lin H, Cai J, Chen S (2017) Heterogeneous network handoff algorithm based on speed prediction. Comput Syst Appl (05) 12. Mao Z, Hong P, Lu H (2008) An adaptive inter WLAN handoff algorithm with dynamically adjustable parameters. Minicomput Syst (05) 13. Ma L, Song J (2000) Discussion on dynamic soft handoff algorithm based on transmission load. Sichuan Commun Technol (03) 14. Kuang Y, Meng Q, Yang G, Luo Z (2012) Hard handoff algorithm based on IEEE802.16e MAC layer. Comput Syst Appl (02)

Optimal Allocation of Electric Vehicle Investment Based on Coupling Decision of Investment Return and User Utility Haiyan Zeng, Yan Chen, Wei Li, Yu Wang, and Qiang Fu

Abstract Traditional methods focus on the investment cost and income of charging station, ignoring the influence of charging user selection decision on the planning decision of investors. In this paper, a two-level optimization model of electric vehicle charging station considering the coupling decision of charging station investment income and charging user utility is proposed. According to the types and travel characteristics of urban electric vehicles, the charging power demand of electric vehicles in the planning area is calculated. The upper objective function is the investment income of charging station, and the lower objective function is charging user satisfaction. The upper and lower level models are coupled by user selection decision variables, and the KKT condition is used to decouple the bilevel programming model. Considering the fast search ability of particle swarm optimization and the global search advantage of variable neighborhood search algorithm, the hybrid variable neighborhood particle swarm optimization algorithm is used to solve the decoupling model. Finally, the effectiveness and feasibility of the model and algorithm are verified by simulation results. Keywords Bi level optimization model · Investment return · User utility · Particle swarm optimization algorithm variable neighborhood search

H. Zeng (B) · W. Li State Grid Wuhan Electric Power Supply Company, Wuhan 430077, China e-mail: [email protected] W. Li e-mail: [email protected] Y. Chen · Y. Wang · Q. Fu State Grid Wuhan Economic Research Institute, Wuhan 430077, China e-mail: [email protected] Y. Wang e-mail: [email protected] Q. Fu e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_65

585

586

H. Zeng et al.

1 Introduction Countries all over the world have reached a consensus on strengthening the development and utilization of renewable energy. In the past five years, as a green vehicle that can make full use of renewable energy to achieve energy saving and environmental protection, electric vehicles have been rapidly used Europe [1, 2]. America and Japan, and is expected to achieve large-scale application in the future. Under the enterprise led mode (such as Tesla, BYD, BAIC and other large automobile manufacturing enterprises), investors pay more attention to the investment income and market comprehensive competitiveness of electric vehicle charging station. How to optimize the configuration of has become one issues of enterprise investors [3–5]. The public charging station in the city should be built on the premise of meeting the construction conditions. This situation is mainly applicable to the new urban areas, demonstration areas and suburbs with sufficient land and less restrictions; Moreover, combined with the intensive construction of public parking lots, transportation hubs, railway stations, park and ride facilities, the supporting service areas where conditions permit can also provide charging facilities. This is the leading direction of the current urban public charging station layout mode breakthrough, but it can only be implemented after full demonstration. In line with the State Grid strategy, Qingdao is developing charging facilities in the intercity Expressway comprehensive service area [6]. Considering the layout of public fast charging stations at the main expressways and expressway nodes, it is suggested to arrange them at the entrances and exits of Longqing expressway, Qinglan expressway, Qingyin Expressway and Shenhai expressway. The average service distance is 50 km, which can basically meet the charging demand of electric vehicles, and build a safe, standardized, ecological and environmental protection modern charging station [7, 8].

2 Analysis of Electric Vehicle Charging Demand 2.1 Probability Distribution of Daily Driving Distance of Electric Vehicles The taxi is complicated in driving route, with large mileage and the parking place is not fixed. It is suggested that the rapid charging should be conducted mainly through public charging station or special charging station in the city [9, 10]. When the vehicle is resting at night, the special charging station is used for routine AC charging. In the case of road in need of charging in daytime, the fast charging of public charging station is used for power supplement. Statistical analysis of nhts, distance of electric buses and electric taxis meets the normal distribution, as shown in formula (1).

Optimal Allocation of Electric Vehicle Investment Based …

  1 (s − μ1 )2 f 1 (s) = √ esp − 2σ12 σ1 2π

587

(1)

Private car meets the lognormal distribution, as shown in formula (2).   1 (ln s − μ2 )2 f 2 (s) = √ esp − 2σ12 σ2 2π

(2)

2.2 Bi Level Programming Model of Electric Vehicle Charging Station Bilevel programming problem, also known as, includes programming problems, a programming problem with constraints of lower level problems. Enterprise led mode refers to the mode of electric vehicle charging station invested and operated by electric vehicle development and production enterprises or other social enterprises. The premise for investors to build a station is to control the investment cost of charging station in a reasonable range, so as to achieve a better input– output ratio. After the charging station is put into operation, it has a competitive relationship with the neighboring stations, so it can improve the charging service quality and enhance the comprehensive competitiveness by meeting the personalized needs of users [11]. The information ownership, urban network network in the planning level year, considering the total investment budget, quantity, maximum charging capacity and voltage safety of charging stations, the upper level planning model is established with the maximum annual revenue of charging station as the objective function (assuming that the user’s time-consuming cost is borne by investors). C = max(C1 − C2 − C3 − C4 )

(3)

Tnvestment income of the new charging station. Construction and operation cost of new charging station includes two parts: annual construction [12–14]. Construction cost includes fixed cost and equivalent investment cost; the annual operation cost includes equipment maintenance cost, depreciation cost and personnel salary, etc. The constraint condition of the maximum charging power allowed to be connected to the power grid is. N  i=1

Pi ≤ Pmax

(4)

588

H. Zeng et al.

3 Planning of Regional Charging Station Under the condition that the annual total investment income and the annual construction and operation cost of the charging station are similar, it is more advantageous and adaptive for investors to build a new charging station [15]. For example, charging users in the planning area are easier to reach the charging station, which saves the time consumption cost of users, especially electric taxi users; the configuration capacity of each charging station is reduced, which is convenient to meet the expansion demand of charging load growth in the future [16, 17]. This section discusses and analyzes the following two scenarios: Scenario 1

Scenario 2

the investment income of charging station is added to the existing constraints as constraints, and the maximum utility value of charging users is taken as the objective function to establish a single-layer; the utility value of charging users is added to the existing constraints as constraints, maximum return is taken as the objective function to establish a single-layer planning model of charging station.

The load level of distribution network varies with time, and the operation constraints of distribution network at different times should be different. In the previous simulation analysis, the load level difference of the failure rate is set as scenario 1, that is, PMX is a fixed value; considering the load level difference, it is set as scenario 2, and PMX is a piecewise function. In this paper, 1D is divided into peak load period (10:00–12:59, 19:00–20:59), waist load period (07:00–09:59, 13:00–18:59, 21:002:59) and valley load period (23:00–06:59). 1.

2.

Waist load period. The load level of distribution network fluctuates greatly, so it can accept appropriate amount of electric vehicles to connect to the power grid, but not a large number of them. Distribution network and allow a small number of electric vehicles to be connected. Valley and lotus period. The load level of the distribution network is low, can be connected to the power grid, that is to say, the maximum charging power can be appropriately increased.

With the gradual increase of the penetration rate of electric is increasing. The built charging stations cannot meet the actual charging requirements, so it is necessary to re plan the planning scheme. Assuming that the proportion of electric buses, electric taxis and electric private cars are increased to 0.55%, 0.95% and 5.0% respectively, the maximum expected daily charging power is 25.2 mw, and other model parameters are the same as above. To sum up, in the intelligent planning process of electric vehicle charging station, the factors that need to be considered include geographical factors, power factors, vehicle distribution factors, etc. through the comprehensive analysis of all factors, the final established standards can meet the requirements. In the specific planning process, through the consideration of the general location of the charging station, the accurate analysis of the surrounding vehicle distribution and vehicle operation, the final results can have higher accuracy [18].

Optimal Allocation of Electric Vehicle Investment Based …

589

4 Conclusion On In this paper, the investment income and charging user utility of new are applied to the optimal configuration model of electric vehicle charging station by social investors. The conclusions are as follows: (1) a comprehensive bilevel programming model for electric vehicle charging station is established, which considers the coupling decision-making effect between the upper level investor income and the lower level user utility, The example also fully shows that model takes into account the interests investors and the personalized needs of charging users, which provides a new idea for planners to optimize the configuration of electric vehicle charging stations under the enterprise led mode. 1.

2.

It is analyzed that the difference of daily load level, the penetration rate of electric vehicles and the fixed cost of significant planning results to a certain extent, which also provides an important reference for investors planning and constructing charging stations under the enterprise led mode. The VNS-PSO Hybrid Algorithm with convergence degree can effectively avoid the premature convergence problem of particles, increase the population diversity, and significantly improve the optimization ability of particles and the convergence speed of the algorithm.

After local elastic charging control strategy of regional distribution system, the diversified interaction mechanism of charging station investors and the establishment of multi-stage dynamic programming model are the key research contents in the next stage of this paper. The vigorous development of new energy vehicle market is inseparable from the charging design of supporting construction. This paper analyzes the reasons for the problems existing in the charging facilities construction of new energy vehicle charging system, and provides some ideas and methods for the construction of electric vehicle charging station in the future, so as to promote the popularization of electric vehicles and promote the sustainable development of energy.

References 1. Wen W (2019) Research on location selection of public fast charging facilities for electric vehicles in Beijing. Beijing Jiaotong University 2. Han Z, Hui H (2020) Research on layout and planning construction of electric vehicle charging piles in Suqian. Educ Forum (06):82–83 3. Lu J (2020) Analysis on charging demand of new energy vehicles on expressways considering consumer preferences. Value Eng 39(01):58–61 4. Fan W, Ma J, Li Y et al (2019) Intelligent planning of electric vehicle charging station. Inner Mongolia Electric Power Technol 37(3):12–17 5. Xu F, Tan Y, Yang H, Teng Y, Zhang X, Yin Q (2017) Optimal layout of centralized charging station considering interests of different roles. High Voltage Technol (04) 6. Ge S, Li R, Han J, Liu H, Li T, Lian H (2016) Charging station planning considering random probability behavior characteristics of electric taxi. Power Syst Autom (04)

590

H. Zeng et al.

7. Zhang D, Jiang J, Zhang W, Wang X, Huang Y (2015) Optimal configuration of electric taxi charging pile. Acta Electrotechnics Sin (18) 8. Huang X, Yang Z, Chen J, Jiang L, Cao Y (2015) Optimization planning of electric vehicle charging station based on LCC and quantum genetic algorithm. Power Syst Autom (17) 9. Yang B, Chen W, Wen MH, Chen X (2014) Probabilistic load modeling of electric vehicle charging station. Power Syst Autom (16) 10. Suo L, Tang W, Bai M, Zhang L (2014) Site selection and capacity planning of centralized charging station in distribution network considering peak load cutting and valley filling. Chin J Electr Eng (07) 11. Tang X, Liu J, Liu Y, Feng H, Xie L, Ma W (2012) Electric vehicle charging station planning based on computational geometry method. Power Syst Autom (08) 12. Gao C, Zhang L, Xue F, Liu H (2012) Research on power grid planning considering location and capacity sharing of centralized charging station. Chin J Electr Eng (07) 13. Liu Z, Wen F, Xue Y, Xin J (2012) Optimal location and capacity of electric vehicle charging station. Power Syst Autom (03) 14. Tian L, Shi S, Jia Z (2010) Statistical modeling method of electric vehicle charging power demand. Power Grid Technol (11) 15. Luo W, Zhou H, Yu L, Li J (2018) Research on electric vehicle charging station planning considering multiple demands. New Industrialization (05) 16. Zhang J, Li Y (2019) Discussion on structure and power supply of electric vehicle charging station. Comput Prod Circ (04) 17. Shang B, Yang C, Wang C (2018) Research on the construction and development of electric vehicle charging station based on prediction model—taking the United States and Ireland as examples. Jiangsu Sci Technol Inf (15) 18. Liu F (2015) Optimal planning of electric vehicle charging station layout based on genetic algorithm. Electric Power Sci Eng (08)

Enterprise Brand Marketing Communication Based on Computer Technology Yishu Liu

Abstract Nowadays, CT (computer technology) is closely related to people’s life and has a profound impact on people’s work and life. Many industries can’t work without the support of CT. If they lose the computer, many industries will lose the ability of normal operation. Many enterprises now use CT in their brand marketing communication. In order to explore the effect of CT applied to enterprise brand marketing, we selected two enterprises y and enterprise as the experimental research object. Enterprise y applied CT in its brand marketing, while enterprise m still used the traditional brand Marketing methods. Finally, the experimental study shows that both the popularity and turnover of enterprise y are higher than that of enterprise m. The annual turnover of enterprise y is 6.043 million yuan, while that of enterprise M is 4.619 million yuan, which is 1.424 million yuan less than that of enterprisey. Keywords Computer technology · Corporate brand · Marketing communication · Analysis and research

1 Introduction With the advent of the Internet, great changes have taken place in the way we get information from the outside world. In this context, marketing methods and means have also changed. In this new situation, if enterprises want to get better development, they must keep pace with the times, use emerging technologies to change the current new business model, and bring greater economic benefits to enterprises [1, 2]. In the past, many traditional enterprises did not apply CT in their development process. Now, due to the continuous change of the times, all kinds of emerging technologies emerge in endlessly. Enterprises must reform and develop in all aspects, and use Y. Liu (B) Business School, Xiamen Institute of Technology, Xiamen 361000, Fujian, China e-mail: [email protected] Chinese Graduate School (CGS), Panyapiwat Institute of Management, Nonthaburi 11120, Thailand © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_66

591

592

Y. Liu

the current emerging technologies to help enterprises develop. Only in this way can enterprises continue to stand in the tide of the times and move forward [3, 4]. Now Internet technology and new media technology are very developed, under the influence of all walks of life, the means of disseminating information and brand promotion have also changed greatly [5, 6]. Many enterprises use CT in marketing communication of enterprise brand, which has brought great influence and change to the marketing strategy of traditional enterprises. The relevant personnel of enterprises can use CT to effectively collect the consumption orientation in the market, so as to help the marketing planners of enterprises make better decisions and make better marketing strategies. More effective ways of communication should be adopted. The development of CT makes enterprises more and more aware of brand communication strategy. This paper first analyzes the influence of CT on traditional brand communication, and then summarizes the characteristics of brand marketing communication of enterprises in this era. On this basis, it studies brand marketing strategy, hoping to provide entrepreneurs with corresponding reference [7, 8]. Now this era, is the best time for the development of CT, due to the widespread popularity of the Internet and the rapid development of economy, to the development of CT provides a very good environment, CT has now penetrated into all walks of life, especially the enterprise brand marketing this piece, now enterprise related personnel to carry out a brand planning and management when promoting, we should use CT, and this way has a wide audience and high communication efficiency. Now it is favored by many enterprises. This paper is also in this background, in order to explore the influence of CT in brand marketing and communication, and specially launched the experimental investigation [9, 10].

2 Method 2.1 CT Computer technology covers a wide range, as long as the technology used in the computer field and the technical means of design belong to CT, it can be divided into many aspects, but there are four main technologies, the first is computer system technology, the second is computer component technology, the third is computer assembly technology and computer device technology. It has many functions, including computing, storage, network, media, and the function of modifying data. The development of CT has also brought a profound impact on the improvement of many disciplines and industrial technology. Its theoretical basis includes many aspects, such as higher mathematics, the calculation of linear algebra, and the technical means of information processing these are the theoretical basis for the development and operation of CT. Modern communication, electronic engineering and machinery factory are closely related to CT. My theoretical research on mathematics is also a very important theoretical basis of CT. Because CT can effectively

Enterprise Brand Marketing Communication Based …

593

improve people’s work efficiency and bring great convenience to people’s life, its application is also very wide.

2.2 Corporate Brand Enterprise brand generally takes the name of the enterprise as the brand name. Enterprise brand represents an image of the enterprise. A good enterprise brand image will bring huge benefits to the enterprise. So many enterprises have invested a lot of money and manpower in brand building, including brand marketing and promotion. Just like those brands that we can hear in detail in our life, their companies spend a lot of money on brand promotion every year. The brand of an enterprise can connect the various products of the enterprise. Even if there are great differences between some products produced by the enterprise, the enterprise can unify them through the brand and establish an agreed image. Sometimes the brand of an enterprise not only represents the products produced by the enterprise, but also represents a kind of production and management concept and a kind of enterprise culture. Sometimes it even represents the attitude of the enterprise towards the clients and the values of the whole enterprise. Enterprise brand is conducive to the integration of various resources and products for cross regional production. Sometimes, a good enterprise brand can also give consumers a quality assurance. When consumers are uncertain about the quality of goods in the market and don’t know how to choose, enterprise brand plays a very important role at this time. This is also why many enterprises are tirelessly committed to building their own corporate brand, and put so much effort on the marketing and communication of the brand. The development of an excellent enterprise is inseparable from a brand with good reputation, which is not only the image of a brand, but also represents the image of a company, the development concept and personality of a company so a good corporate brand is very important.

2.3 Marketing Communication Generally, if an enterprise wants to make its reputation in the market, it must carry out marketing communication. Through marketing communication, the company can let consumers know the brand well. Therefore, for enterprises and consumers, marketing communication is the information transmission medium between them. Enterprises constantly publicize and remind consumers through various means of marketing communication, so as to achieve a relatively good effect of information transmission and leave an impression on consumers imperceptibly, so as to improve consumers’ loyalty to the enterprise brand, thus accumulating customer resources invisibly and bringing certain benefits to the enterprise, which is also the ultimate goal of enterprise marketing. When an enterprise formulates the content of marketing communication, it must grasp the key points, and then focus on the publicity of these

594

Y. Liu

key points, so as to achieve a good publicity effect. Moreover, when an enterprise carries out marketing communication, it must pay attention to assisting consumers to respond to the publicity and to like or dislike it, so as to provide consumers with good publicity experience and leave a good impression.

2.4 Probability Formula and Mathematical Expectation Formula When we calculate the experimental data, in order to maintain the accuracy and objectivity of the experimental data to a certain extent, we often use some probability theory formula and mathematical expectation formula to calculate the experimental data, and speculate and evaluate some objects. The following is the formula algorithm involved in our experiment: λk k!

(1)

xk pk

(2)

P(X = k) = e−λ E(X ) =

+∞  k=1

+∞ E(X ) = x f (x)d x

(3)

−∞

3 Experiment 3.1 Research Objects In order to explore the influence of CT on enterprise brand marketing communication, we select two enterprises y and m as the second experimental research objects, both of which produce the same kind of products. In this way, we selected 300 brands of M enterprises as the marketing target, and then we hope to know more about their brand awareness.

Enterprise Brand Marketing Communication Based …

595

3.2 Experimental Research Steps We conducted a one-year survey on the popularity of the two enterprises, and then made statistics on the turnover of the two enterprises in this year, and then compared and analyzed the specific situation of the turnover of the two enterprises.

4 Discussion 4.1 Consumers’ Understanding of the Two Brands We randomly selected 300 consumers in the market as the survey objects to ask them how much they know about the two brands, and then divided them into four categories: very familiar, familiar, not very familiar and completely unfamiliar. The detailed findings are as follows: If we carefully look at Table 1 and Fig. 1, we can see that consumers in the market have different understanding of the two brands. Among them, 98 consumers are very familiar with the brand of enterprise y, and 145 consumers are familiar with it. The total number of the two is 243, accounting for 81% of the total number of Table 1 Consumers’ understanding of the two brands

Enterprise Y

Enterprise M

Very familiar

98

56

Conversant

145

113

Not very familiar

40

92

Totally unfamiliar

17

39

Enterprise Y 145

160

Enterprise M

140 120 100

113 98

92

80 60

56 40

40

17

20 0

39

Very familiar

conversant

Not very familiar Totally unfamiliar

Fig. 1 Consumers’ understanding of the two brands

596

Y. Liu

respondents. However, 40 consumers are not very familiar with the brand, and 17 consumers have not heard about it. These data show the popularity of enterprise y in the market. Most people have heard about the brand of enterprise M. From the above chart, we can see that 56 consumers know the brand of enterprise M well, 113 consumers know it well, 92 consumers are not familiar with it, and 39 consumers have not heard about it at all. Among them, 169 consumers know it well, accounting for 56.3% of the total survey. From the data comparison of the above two enterprises, it is obvious that the popularity of enterprise y is higher than that of enterprise M in the market.

4.2 Annual Turnover of the Two Enterprises We made statistical analysis on the turnover of the two enterprises in one year, then divided the turnover into four groups by quarter, and then drew the detailed data into charts. The results are shown in Table 2 and Fig. 2: Table 2 One year turnover of the two enterprises

Turnover (10,000 yuan) Enterprise Y

Enterprise M

Group one

121.3

98.7

Group two

135.6

103.5

Group three

157.8

120.8

Group four

189.6

138.9

Enterprise Y

Enterprise M

200.0

189.6

180.0 157.8

160.0 135.6

140.0 121.3

138.9

120.0 120.8 100.0 98.7

103.5

Group one

Group two

80.0

Fig. 2 One year turnover of the two enterprises

Group three

Group four

Enterprise Brand Marketing Communication Based …

597

The data in Table 2 and Fig. 2 show the turnover of these two groups of enterprises. We can see that the turnover of enterprise Y in the four quarters is: 1.213 million yuan in the first quarter, 1.356 million yuan in the second quarter, 1.578 million yuan in the third quarter and 1.896 million yuan in the fourth quarter; while the turnover of enterprise M in the four quarters is: 987,000 yuan in the first quarter and 1,035,000 yuan in the second quarter It was 1.208 million yuan in the third quarter and 1.389 million yuan in the fourth quarter. We can see from Fig. 2 that although the turnover of these two enterprises is rising with the progress of time, the difference between them is that the turnover of enterprise y has a larger growth rate, while the turnover of enterprise M has a slower growth rate, and the difference between the turnover of enterprise M and that of enterprise y is relatively large. It can be said that the turnover of enterprise y is higher than that of enterprise y in each quarter. In the fourth quarter, the turnover of enterprise y was 507,000 yuan higher than that of enterprise M. This shows that the performance of enterprise M is far less than that of enterprise y. The relevant senior management of enterprise M should think about the solution and strive to raise the performance level of its own enterprise.

5 Conclusion In a word, if many traditional enterprises want to get a place in the development of the times, they must keep pace with the times, and their working methods should keep up with the changes of the new situation and improve constantly. Nowadays, CT has been greatly developed, and many advanced enterprises have adopted computer means to carry out brand marketing and communication, which is not a good practice It is also supported by the experimental results of this paper, which shows that the application of CT to enterprise brand promotion is useful, and this kind of marketing communication mode is more efficient.

References 1. Yang G (2018) Analysis on brand marketing communication strategy of traditional enterprises in the new media era. News Commun 000(012):42–43 2. Li J, Zheng L (2019) innovative research on brand marketing communication strategy of traditional enterprises in the new media environment. Brand 000(014):38–39 3. Guo Q (2020) Strategy research on silk brand communication under the new media environment. Jin Media (Acad Edn) 028(001):89–90 4. Zheng J (2020) Research on brand communication strategy of ceramic art in new media environment. Brand Res 000(002):33–34 5. Chang L (2017) Research on the development of augmented reality technology in brand marketing communication. Art Work 000(004):82–85 6. Yuan N, Zhou Y (2019) Application of visual marketing in brand marketing under new media environment. Art Des Theor Edn 2(03):26–27

598

Y. Liu

7. Yu H (2018) Research on application of network public opinion analysis in enterprise management under big data environment. Mod Comput (Prof Edn) 632(32):64–68 8. Tong Y (2018) Research on countermeasures of enterprise brand operation in the new media era. Popular Lit Art 000(008):249–250 9. Zou Y (2017) Brand marketing in the social media environment—taking “escaping from Beijing, Shanghai and Guangzhou” as an example. Peony 24(172):108–109 10. Han Y (2018) Research on microblog interactive marketing strategy—taking UNIQLO brand as an example. Scenic Spots No.353 (10):180–180

Improving Traditional Environmental Infrastructure with Park Strategy Assisted by Artificial Intelligence Yi Chi, Qiannan Liang, and Zheng Lu

Abstract Artificial intelligence technology has been widely used in various fields, including early survey means support and late service of environmental infrastructure construction. In order to improve a series of problems caused by the traditional environmental infrastructure, artificial intelligence technology is used as the basic research means to make it evolve into environment-friendly facilities. The case analysis and Optimization Strategy Research of “park type” environmental infrastructure are carried out. By using the research methods of field research and multidisciplinary research, this paper summarizes the design strategies of artificial intelligence intervention in “park type” environmental infrastructure projects. It is proposed that the design of “park style” environmental infrastructure should follow the park style strategy of improving “secondary pollution” by landscape element design, improving “avoidance phenomenon” by immersive experience, realizing “environment friendliness” by water ecosystem, and realizing “ecological sustainability” by resource circulation. In the process, it focuses on the six elements of topography, plants, water body, pavement, buildings and landscape facilities to deepen the improvement of nodes and enhance the optimization effect and humanistic quality of “park style”. Keywords Artificial intelligence · Environmental infrastructure · Park Styl · Landscape · Architecture · Sustainable

1 Introduction “Environmental infrastructure” is an environmental protection facility built to protect the environment and improve the environmental quality [1], such as garbage treatment plant, sewage treatment plant and sludge treatment plant [2]. It is the guarantee for the improvement of urban and rural ecological environment and the fight against pollution [3]. With the continuous improvement of China’s urbanization development, people’s awareness of environmental protection is also gradually improved, Y. Chi · Q. Liang · Z. Lu (B) School of Arts and Media, China University of Geosciences (Wuhan), Wuhan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_67

599

600

Y. Chi et al.

such as waste treatment plant, sewage treatment plant and sludge treatment plant and other traditional environmental infrastructure problems caused a lot of attention [4]. The government’s efforts to optimize and improve the environmental infrastructure are also increasing, now the environmental infrastructure has a strong topic and social attention [5]. In order to meet the needs of economic development and population growth in the process of urbanization, it is also necessary to build a green environmental infrastructure system to provide a more livable and flexible ecological environment for urban and rural residents [6]. Most of the traditional environmental infrastructure is accompanied by secondary pollution problems such as noise and odor, and the large scale of land use often leads to the effect of avoiding neighbors, which becomes the “disgusting” facilities in the city [7]. In order to solve these existing problems, saving land area, improving pollution, energy-saving, efficient and sustainable “park style” transformation provides optimization demonstration for the improvement of traditional environmental infrastructure.

2 Overview of Traditional Environmental Infrastructure 2.1 Cause Secondary Pollution The traditional environmental infrastructure, such as waste treatment plant and sewage treatment plant, will produce a lot of noise pollution and odor pollution in the purification process of sewage, garbage and other treated substances [7], and become a new pollution source, affecting the urban development and the life of surrounding residents, as shown in Table 1. Table 1 Pollutants and main pollutants from municipal waste incineration Pollution producing links

Waste gas

Waste water

Waste residue

Noise

Transport

Stench

Storage

Stench

/

Littering

Traffic noise

Leachate

/

/

Burn

Dust, NOx, acid gas, dioxin, etc

/

/

Fans, pumps, etc

Flue gas treatment

Dust, NOx, acid gas, dioxin, etc

/

Ash

/

Waste water treatment

/

SSOrganic matter, salt, SS

/

/

Improving Traditional Environmental Infrastructure with Park …

601

2.2 Trigger the “Movement to Avoid Neighbors” Residents are worried that the construction of environmental infrastructure close to their home will have an impact on the environmental quality nearby, and even affect the health and quality of life of themselves and their families, resulting in the devaluation of the value of real assets. Therefore, they usually oppose the construction of environmental infrastructure near their home [8]. For security reasons, environmental infrastructure generally adopts closed management, which hinders people’s understanding of environmental infrastructure. And the current environmental infrastructure noise and odor problems have not been completely solved, such a vicious circle, make residents more resistant to the construction of environmental infrastructure [9].

3 Case Analysis of Park Strategy Application Hefei Qingxi water treatment plant, the first all underground sewage treatment plant in Anhui Province. After completion [10]. Qingxi water treatment plant adopts the design of full buried garden. The underground is divided into two floors, the first floor is the operation floor, and the second floor is the process treatment floor. On the ground, there are ancillary buildings, landscape greening and public leisure square with the theme of water culture [11].

3.1 Topographical Elements As an underground water treatment plant, Qingxi water treatment plant uses land intensively, occupies a small area and has prominent advantages.

3.2 Plant Elements Local tree species should be selected as far as possible to ensure the growth effect of plants and reduce the cost of later maintenance. In terms of plant configuration, the group configuration method is used to create a plant landscape with scattered levels and dense density. The plant species are rich, so that there are flowers in four seasons and scenery in four seasons [12] (Fig. 1).

602

Y. Chi et al.

Fig. 1 Analysis of vegetation configuration mode of Qingxi water plant

3.3 Water Elements In order to implement the concept of sponge City, a number of sponges are set up in the park to effectively precipitate and purify rainwater, which has good rainwater absorption and storage capacity and is not easy to accumulate water (Fig. 2).

3.4 Pavement Elements The ground pavement follows the principle of ecological and environmental protection, adopts more environmental protection materials, combines with the concept of sponge City, and creates a unique pavement method, which not only creates a good landscape, but also achieves the purpose of ecological and environmental protection [13].

Improving Traditional Environmental Infrastructure with Park …

603

Fig. 2 Large-scale sample of sponge body waterscape reservoir

Fig. 3 Analysis of pavement of Qingxi water plant

Permeable asphalt pavement is used in the main vehicle roads and fitness and entertainment areas in the park. On the one hand, it has drainage and noise reduction, on the other hand (Fig. 3).

3.5 Building Elements The relationship between ground buildings and surrounding environment is handled skillfully by planting seedlings and semi buried techniques [14]. As the highest structure in the whole park, the towering exhaust tower has undoubtedly become the

604

Y. Chi et al.

Fig. 4 Analysis of structures of Qingxi water plant

visual focus of the whole park. Through decoration of the outer part of the exhaust tower, it becomes a beautiful scenic line in the park [15] (Fig. 4).

3.6 Landscape Facilities Elements The above ground Park fully excavates the industrial characteristics of the water treatment plant and the connotation and elements of water culture, and adds the cultural flavor of the park by using the forms of sculptures, landscape walls, signs and other ring sketches, combined with distinctive plants (Fig. 5).

3.7 Results and Discussion In general, Qingxi water treatment plant has achieved the construction goal of “underground factory, aboveground Park”. Through reasonable land use integration, the combination of environmental infrastructure and urban landscape has become the first precedent in Anhui Province, which has played an exemplary role. The construction and operation of garden factory form a close combination with the surrounding environment, which shortens the distance from the surrounding environment and avoids the inevitable NIMBY effect of traditional environmental infrastructure.

Improving Traditional Environmental Infrastructure with Park …

605

Fig. 5 Analysis of landscape facilities of Qingxi water plant

4 Summary of Design Strategy of Park Type Environmental Infrastructure 4.1 Improving “Secondary Pollution” with Landscape Elements In the construction of “park type” environmental infrastructure, the design and selection of plants must be targeted, and plants with the functions of eliminating odor, reducing noise and purifying water quality should be selected for planting [2]. The production equipment is placed underground to improve the noise, the plant barrier is used to block the noise, the sound of water flow is used to counteract the noise, and the permeable pavement is used to absorb the noise to achieve noise reduction [16]. Large area hard pavement is avoided, and permeable brick or grass-embedded pavement with good permeability and air permeability is used to reduce the pressure of drainage and flood control in the park, which can effectively prevent the public waters To eliminate the problem of water accumulation [17]. The constructed wetland is used to purify the reclaimed water from the sewage treatment plant to improve the water quality.

606

Y. Chi et al.

4.2 Using Immersive Experience to Improve the Phenomenon of “avoiding Neighbors” Let the masses go into the environmental infrastructure, explore the mystery of pollution treatment, intuitively feel the process of waste treatment, and enhance the intuitive and positive understanding of environmental infrastructure with immersive experience, which can eliminate concerns and worries [18].

4.3 Water Ecosystem Realizes “Environment Friendly” “Park type environmental infrastructure should highlight environmental benefits, economic benefits and social benefits at the same time. In order to build a sponge Park, effectively replenish groundwater and water in the park, so as to achieve water resource recycling and realize “environment-friendly” (Fig. 6).

Fig. 6 Analysis of compound function of Qingxi water plant

Improving Traditional Environmental Infrastructure with Park …

607

5 Conclusion The development process of environmental infrastructure at home and abroad is relatively long, and different periods of development create different needs for environmental infrastructure. With the rapid development of environmental infrastructure, in order to achieve friendly environmental infrastructure, from high energy consumption to low energy consumption. In this process, the development of environmental infrastructure tends to be interdisciplinary. The environmental industry needs more and more assistance from the landscape and architectural design industry. The landscape construction of environmental infrastructure site has become a new type of design project and research direction. At present, this research still has a large research space and deep practical value, waiting for us to further explore. I hope this paper can provide some ideas and views to promote the transformation and optimization of environmental infrastructure and “park like” wall breaking.

References 1. Chang T How to face the “garbage disposal revolution”. China Environment News, 2020-0318(003) 2. Wang XT (2017) Study on the model of urban sewage treatment. Private Technol 05:221 3. Chen R (2019) Landscape design of sewage treatment plant from the perspective of city—A case study of Hongqiao sewage treatment plant. Chin Foreign Archit 03:141–143 4. Xu C (2019) Odor control measures and environmental impact assessment of sewage treatment plant. Low Carbon World 9(08):22–23 5. An L (2016) Construction and application of urban environmental protection infrastructure. Innov Appl Sci Technol (16):169 6. Panagopoulos T (2019) Special Issue: Landscape urbanism and green infrastructure 8 (7):112 7. Tan X, Tang L, Guo D (2006) Advantage analysis and prospect of underground sewage treatment plant. J Undergr Space Eng (S2):1313–1319+1345 8. Xu L, Sun S, Li Y, Wang K (2017) Discussion and case analysis on landscape design of underground sewage treatment plant. Water Supply Drainage 53(01):9–14 9. Wang B (2017) Landscape design of sewage treatment plant based on ecological perspective. Tianjin Construction Technology Co., Ltd 27(04):92–94 10. Li L (2016) Urban environmental protection ceramic permeable brick sidewalk. Brick Tile World 08:39–41 11. Wang Y, Xie Z (2018) Hefei Qingxi water treatment plant opens “underground era” of sewage treatment in Anhui Province. Architecture 22:34–35 12. Yao F (2017) Landscape design of Science Park under the guidance of science and technology in the future. J Beijing Agric Univ 32(03):94–98 13. Lin Y (2016) Application of functional landscape concept in sustainable landscape planning. Build Mater Decoration 38:63–64 14. Que H (2016) Current situation analysis and promotion suggestions of green construction of construction engineering. Jiangxi Build Mater 14:78 15. Wu J (2020) Developing the city’s style and molding the essence of landscape—taking the landscape design of Science Park in Shenyang as an example. Art Des (Theory) 2(05):50–52 16. He H, Zhang M, Yu K, Gao Y, Liu J (2020) Construction of complex network of green infrastructure in smart city under spatial differentiation of landscape. Comput Commun 154:380–389

608

Y. Chi et al.

17. Wang X, Zhang D (2020) Plant landscape planning and design of sewage treatment plant. Urban Housing 27(03):100–104 18. Burner THD (1984) Landscape planning: the need totrain specialists. Landscape Plann 11(1):73–79

New Path of Using Computer Induction and Integration Technology to Govern the Comprehensive Management of Tourism Market Wei Ruan and Yujie Yang

Abstract With the latest development of national economy, tourism is entering a golden age of development. As a sunrise industry, tourism has developed many industries and consumer goods industries to optimize the economic structure of many countries and regions, reflect the image of the region and improve people’s quality of life. The purpose of this paper is to explore a new method of using computing and integration technology to comprehensively manage the tourism market. The research method and technical route of this paper are determined according to the research background and the analysis of the importance of the topic, combined with the computer guidance and integration technology, referring to the theoretical framework, to analyze and study the tourism capacity management and landscape protection and development. All respondents were very cautious about the commercial use of old buildings, accounting for only 32.60%. In addition, the development and utilization of ancestral hall, ancestral hall and other public buildings is also very low, and the deterioration and utilization of intangible cultural heritage should reach the peak of 64.40%. Keywords Computer technology · Integrated tourism market management · Reliability analysis · Management innovation

1 Introduction 1.1 Background and Significance At present, the tourism industry is showing rapid development. With the continuous growth of the industrial scale, the rapid development of the new tourism industry, the profound institutional reforms, the continuous improvement of the industrial planning system, the acceleration of large-scale projects, and the continuous expansion W. Ruan (B) · Y. Yang Xianning Vocational Technical College, Xianning 437100, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_68

609

610

W. Ruan and Y. Yang

of public facilities [1]. The tourism industry has improved, and the order is gradually standardized. In the practice of tourism development, some valuable experiences and practices have been collected, which proves the role of the State Key Laboratory in the reform and innovation of the tourism industry [2]. In general, there are still some shortcomings in the construction of tourism service facilities, the current status and level of tourism development, and the expansion and management of the tourism market. By using computer integration technology to manage the comprehensive management of the tourism market, tourism companies have broad prospects for development. Compared with the traditional business model of travel companies, the use of computerization and integrated technology to comprehensively manage the travel market will help tourists find news and more information quickly. It provides faster information retrieval capabilities and better management methods [3]. Actively promoting the “Internet+” movement has spawned a series of e-commerce websites for the tourism industry. Tourists have more flexibility and initiative to understand in tourist attractions, use effective dynamic route planning pages as the travel website itself, and use computerization and integration technology to fully managed. The tourism market has a variety of tourism resources. By combining economic and convenient methods, we maximize a win–win situation, thereby reducing costs and expanding the market [4, 5].

1.2 Related Work Ecotourism management requires a long-term plan. Environmental protection must be considered in the modern tourism model. Eco-tourism is a traditional course and game route. It is not only a cultural communication and city brand [6]. Ecotourism should not be a blind, unscientific plan and development. The path of sacrificing medium and long-term interests in the past obviously violates the sustainable development strategy. The ecological environment is the basis for modern people’s survival. For future consumers, a full understanding of high spiritual needs needs to be considered [7]. Wu believes that “current eco-tourism management also focuses on development and promotion, but technological innovation and actual management have not yet been carried out [8]. The development of eco-tourism system is still in its infancy, and natural ecological management models are emerging in developed countries with Western European experience. In order to improve human ecology, establish a scientific ecological detection index system and a humanized scientific and market-oriented standardized management system [2, 9]. On this basis, we conducted a “research on the new path of using computer induction and integration technology to govern the comprehensive management of the tourism market.” There is no doubt that the use of computerization and integrated technology to manage the importance of integrated management of the tourism market. How to

New Path of Using Computer Induction and Integration Technology …

611

apply it as a computer application technology that can significantly improve management quality and efficiency is very important. Therefore, most information management workers actively change their minds, deepen their understanding of computer application technology, fully apply it to actual information management work, and fully integrate information management work with computer application technology. It can fully improve the quality and efficiency of information management, and can effectively promote the long-term healthy development of the company and the sustainable development of the industry.

1.3 Main Content By learning computer induction and integration technology, and analyzing the development history of integrated tourism management, on the basis of consulting a large number of literature materials, this paper conducts the following research: The first chapter mainly introduces the development and status quo of comprehensive tourism management in this article, as well as the research purpose, significance and related work of this article. The second chapter introduces the new path research method of using computer induction and integration technology to govern the comprehensive management of the tourism market. The third chapter introduces the use of reliability analysis and validity analysis to conduct in-depth research on the new path of this article. The fourth chapter introduces the interviewee’s analysis of the results of the questionnaire survey on the tolerable retention of elements, and details the data and analysis. The fifth chapter summarizes the specific work of this thesis on the comprehensive tourism management research, and prospects for the next step. The innovation of this paper is that the comprehensive evaluation system based on analytic hierarchy process, reliability analysis and validity analysis is a new path for selecting tourist attractions, which can help tourists find the best tourist attractions, or choose from tourists to attractions the relative importance of the influencing factors is evaluated to obtain information about their needs and preferences, which can provide a reference for the next step in tourism decision-making and marketing. The use of computer induction and integration technology to manage the comprehensive management of the tourism market can bring various tourism resources in the most economical and convenient way Combine them to achieve a win–win situation of reducing costs and expanding the market.

612

W. Ruan and Y. Yang

2 Methods on the New Path of Comprehensive Management of the Tourism Market Using Computer Induction and Integration 2.1 AHP Use the Analytic Hierarchy process (AHP) to get the weight of distance, time cost and satisfaction. In the 1970s, when the American operations researcher Say was a research subject for the US Department of Defense, he proposed this multi-plan decision-making analytic hierarchy model, which decomposed several factors related to decision-making into target layer and criterion layer. Project level, and then further qualitative and quantitative analysis. The main steps: The first step: establish a hierarchical structure; Establish the target layer, the criterion layer and the scheme layer, and obtain the hierarchical structure diagram; Target level: Choose suitable tourist attractions as the top element according to the preferences of tourists; Criterion level: It is necessary to reasonably analyze the relationship between the elements of each criterion level to see whether they belong to the same level relationship or the subordination relationship. Those belonging to the same level relationship are at the same criterion level, and those belonging to the subordination relationship must establish a lower level of criterion; Solution level: The solution to the problem is taken as the bottom factor. Step 2: Construct the judgment matrix and assign values. Construction of the judgment matrix: The first element of the judgment matrix takes the element with the downward subordination relationship, compares the two, and then obtains the required importance   scale according to the level of importance. Let the judgment matrix be A = ai j n×n , The judgment matrix has this property: aii = 1; a ji =

1 ; ai j > 0 ai j

(1)

2.2 Reliability Analysis and Validity Analysis Reliable analysis is an effective analysis method used to measure the stability and reliability of the comprehensive evaluation system. Empirical research in the social sciences uses internal consistency to express the reliability of tests. A common internal consistency measurement method established by Cronbach in 195l is the Cronbach alpha coefficient method. In this paper, the reliability factor is represented

New Path of Using Computer Induction and Integration Technology …

613

by the reverse α factor. The size of the clone reverse alpha factor measured by SPSS20.0 software evaluates the internal reliability level of the measurement table. Validity is the degree of validity of a test measurement, which is related to the accuracy and usefulness of the test. Validity is the most important requirement of scientific measurement. In this article, we will use KMO test and bottle sphericity test for verification. The Cronbag coefficient is mainly used to measure the internal consistency of the scale. First, calculate the correlation coefficient matrix for each evaluation point, calculate the average value of the correlation coefficient, and then calculate the Krombach α coefficient. Its mathematical definition is as follows: α=

kr 1 + (k − 1)r

(2)

In this equation, k represents the number of evaluation elements, r represents the average value of the correlation coefficients of k elements, and the kronda α coefficient is 0–1. If the Cron back α factor is higher than this, I believe the internal reliability of Kurobeha 0.9 scale is very reliable. For Cronbach’s alpha coefficient, which is between 0.7 and 0.9, the internal reliability of the scale is very reliable. If the scale is between 0.5 and 0.7, the scale is more reliable. If the Cronback α factor is between 0.4 and 0.5, the scale is reliable. For Cronbach’s α coefficient between 0.3 and 0.4, the ratio is almost unbelievable. Kronabaha’s Alpha factor is less than 0.3, and the ratio is not reliable.

3 Experimental Reliability Analysis Data and Questionnaire Survey Data Analysis 3.1 Reliability Analysis This paper uses SPSS20.0 statistical software for statistical analysis. On the basis of valid questionnaire data entry, the reliability of the overall questionnaire and the three key elements of the questionnaire spatial form, ancient architecture and traditional culture Cronbach’s alpha coefficient values are shown in Table 1, it shows that the Table 1 Reliability analysis results

Content

Number of items Cronbach’s α coefficient

Overall reliability

55

0.844

Space form

11

0.523

Ancient building

18

0.669

Traditional culture 26

0.856

614 Table 2 KM0 and Bartlett’s test

W. Ruan and Y. Yang Kaiser-Meyer-0lkin metric of sampling adequacy

0.752

Bartlett sphericity test approximate chi-square

2294.324

df

66

Sig

0.000

formal questionnaire in this article has high credibility and can be studied in the next step.

3.2 Validity Analysis The three key elements of spatial form, ancient architecture and traditional culture in the questionnaire and their refined 12 items are tested, and the KMO value is 0.752, and the significance coefficient sig of Bartlett’s sphericity test is 0.000, which meets the requirements of factor analysis as shown in Table 2. It can be seen from Tables 1 and 2 that tourists are very willing to see Zhuge Village that maintains its original spatial form. At the same time, they are more willing to enjoy the roads with slightly improved streets and traditional crops.

4 Experimental Data Results Based on reliability and confirmatory tests, a statistical analysis of the management standards of landscape protection areas was carried out, and the following results were obtained. According to the actual protection status and the development of the tourism industry, the standard test of each protection element can be divided into three parts: acceptable degree of change, scope of use and degree of maintenance.

4.1 Degree of Change in Spatial Form and Traditional Culture The spatial form part mainly studies the interviewee’s perception of the overall image from a visual perspective, and is divided into 3 paths; the traditional culture part mainly explores from the perspective of traditional crops, as shown in Fig. 1. In general, all interviewees are most eager for the retention of clan culture, 55.60%; the proportion of indigenous people and the retention of traditional Chinese medicine culture is also relatively high; but the level of ancient architecture is more tolerant, 38%.

New Path of Using Computer Induction and Integration Technology …

615

40.00%

Percentage of respdnfents agree

35.00% 30.00% 25.00% 20.00% 15.00% 10.00% 5.00% 0.00%

Degree of change in village area

Change in pond area

The degree of road surface change

Voter category Overall

Residents

Expert

Tourist

Fig. 1 Diagram of tolerable change of related elements

4.2 Utilization Degree of Ancient Buildings and Traditional Culture The allowed protection elements are divided into four altitudes, including ancient buildings and traditional culture. They are divided into the degree of development and use of the main halls and halls, the degree of residence, the degree of commercial use, and the degree of excavation and use of intangible cultural heritage. Part of the ancient building is divided into three routes, and the interviewees’ views on the use of elements related to the village of Zug were examined, mainly in the use of different buildings. Part of traditional culture is the pursuit of intangible cultural heritage, especially in mining and mining. As shown in Fig. 2. In general, all the interviewees are very cautious about the commercial use of the old buildings in Zhuge Village, only 32.60%. Public buildings such as buildings and auditoriums are also relatively less developed and used, which shows that people of all types prefer to see the original main building. 64.40% of all interviewees hope to use it for the excavation and development of intangible cultural heritage. For local residents, this is the most cautious group for the commercial use of old buildings and the development and use of public buildings such as temples and ancestral halls. The excavation and development of intangible cultural heritage have special expectations of up to 70%. It can be seen that local residents attach great importance to intangible cultural heritage. It is usually interesting that the selectivity of residential buildings in

616

W. Ruan and Y. Yang 50.00%

Percentage of respdnfents argee

45.00% 40.00% 35.00% 30.00% 25.00% 20.00% 15.00% 10.00% 5.00% 0.00%

Degree of development and utilization of public buildings like ancestral halls and halls

Residential building

Commercial utilization

Voter category Overall

Residents

Expert

Tourist

Fig. 2 Tolerable utilization of relevant elements in Zhuge Village

this group is not as high as 43.40%. This shows that although it is important to protect local residents, they do not want to achieve this goal by living in old houses. The pursuit of a more modern lifestyle is the common choice of the indigenous people in the old city.

5 Conclusions This article analyzes and solves the problems in tourism management, and proposes innovative methods of tourism management in the new era. This paper uses computer induction and integration technology to manage the comprehensive management of the tourism market, paving the way for meeting the current tourism characteristics and experience needs of the tourism market. After mining, analyzing and processing a large amount of information, it will provide relevant travel recommendations and the actual needs of users, and use online travel information to create to meet the actual needs of tourists, which will improve the quality of services. The network terminal can be used to promote the provision of information about tourism resources to the audience, overcome the limitations of time and space, and update and promote the development of the tourism industry.

New Path of Using Computer Induction and Integration Technology …

617

References 1. Jacelon CS, Gibbs MA, Ridgway JV (2016) Computer technology for self-management: a scoping review. J Clin Nurs 25(9–10):1179 2. Hervas-Oliver JL, Ripoll-Sempere F, Moll CB (2016) Does management innovation pay-off in SMEs? Empirical evidence for Spanish SMEs. Small Bus Econ 47(2):507–533 3. Rakhimova AE, Yashina ME, Mukhamadiarova AF et al (2016) The development of sociocultural competence with the help of computer technology. Interchange 48(1):1–16 4. Wang CP, Li C, Liu ST (2016) A multidimensional environmental value orientation approach to forest recreation area tourism market segmentation. Forests 7(5):92 5. Shuv-Ami A (2016) A new market brand equity model (MBE). EuroMed J Bus 11(3):322–346 6. Zhang L, Xing L, Liu A et al (2019) Multivalued decision diagrams-based trust level analysis for social networks. IEEE Access (99):1–1 7. Takagi D, Shimada T et al (2019) A spatial regression analysis on the effect of neighborhoodlevel trust on cooperative behaviors: comparison with a multilevel regression analysis. Front Psychol 10:2799–2799 8. Wu X (2018) Study on trust model for multi-users in cloud computing. Int J Netw Secur 20(4):674–682 9. Kra´snicka T, Głód W, Wronka-Po´spiech M (2016) Management innovation and its measurement. Soc Sci Electron Publishing 12(2):95–122

A CP-ABE Scheme for Multi-user Queries in IoT Fanglin An, Yin Zhang, Yi Yue, and Jun Ye

Abstract As the penetration rate of Internet smart devices continues to increase, technologies such as smart homes, smart cities, and smart grids have been integrated into people’s daily lives. However, in this case, a large amount of information and infrastructure are connected to the public Internet, which makes data facing many security threats and challenges. In this article, I discussed the need for fine-grained multi-user access control queries about smart devices in the Internet of Things. The inherent distributed nature of the Internet of Things environment requires support for multi-authorized ciphertext-based encryption (CP-ABE) to achieve fine-grained Access control. Therefore, for the use of data in the Internet of Things environment, this paper proposes a secure and fine-grained user access control scheme, which is a multi-user access control scheme that supports multi-authorization CP-ABE. Finally, through formal and informal security analysis, it is proved that the scheme is security against several potential attacks required in the IoT environment. In addition, this paper also proves that the proposed scheme provides basic functions and has a lower computational cost than existing schemes. Keywords IoT · Multi-user queries · CP-ABE · Access control

1 Introduction IoT data can be used to record the working status of IoT devices, and the working status of IoT devices often includes IoT industry secrets or personal secrets, such as the working status of factory equipment in smart manufacturing [1], medical equipment [2], sensors in traffic information networks [3], motion feature sensors in body area networks [4], detection sensors in smart homes [5] and other places are contain sensitive industrial data or personal data. Therefore, it is necessary to protect the privacy of the IoT data to achieve the purpose of not revealing the secrets contained in the IoT data during data search. F. An · Y. Zhang · Y. Yue · J. Ye (B) School of Cyberspace Security, Hainan University, Haikou, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_69

619

620

F. An et al.

It becomes more necessary to design a multi-user data range query scheme that supports data privacy protection and permission access control. Therefore, designing an encryption scheme that supports multi-user data range query has become a new challenge in the IoT environment.

2 Related Work In 2007, Bethencour et al. [6] used a monotonic tree structure as the access structure, and proposed the specific structure of the CP-ABE scheme for the first time. The scheme embeds the access structure in the ciphertext and the key contains descriptive attributes. This structure has more flexible access control features, which has attracted wide attention from scholars. Based on the CP-ABE scheme, its security, efficiency and other aspects have been thoroughly studied. From a security perspective, since the original CP-ABE scheme is to prove its security under the general group model, Cheung and Newport [7] proposed the CP-ABE scheme, which can be proved security under the standard model, enhances the security of the scheme. However, because this access strategy only supports the logical connective “disjunction”, it is not fully flexible, and it also has a large computational overhead for ciphertext and key generation. In order to improve its operating efficiency, Nishide et al. [8] and Emura et al. [9] respectively implemented CP-ABE schemes with high efficiency and strategy hiding performance. At the same time, Goyal et al. [10] and Liang et al. [11] both adopted a bounded tree structure. Goyal et al. [10] proposed a bounded CP-ABE scheme under the standard model, and used the “universal access tree” to propose a KP-ABE scheme. The scheme is transformed into the general method of CP-ABE scheme. Liang et al. [11] improved the bounded CP-ABE scheme by shortening the length of the public key, secret key and ciphertext, which effectively improved the efficiency of encryption and decryption algorithms. In addition to the tree access structure, Waters [12] uses a linear secret sharing matrix to implement the access structure, and its performance is equivalent to the CP-ABE scheme. Lewko et al. [13] used the coding technology of Waters et al. [12] to propose an ABE scheme that realizes adaptive (non-selective) security. Compared with Waters’s scheme [13], it reduces Actual efficiency. In recent years, in order to further improve efficiency and consider the anti-quantum attack characteristics of tree ciphers, some scholars have also proposed the CP-ABE scheme that does not require bilinear pairing operations [14], it is constructed based on lattice ciphers, and its security proof is also more robust. Jiang et al. [15] discussed the “key delegation abuse” problem in the ciphertext policy attribute encryption (CP-ABE) system, and introduced a new mechanism to enhance the CP-ABE scheme, which provides key delegation abuse protection, and then constructed a traceable CP-ABE program that meets the new security requirements. Zhang et al. [16] used hidden access policies to protect user privacy and constructed a CP-ABE scheme with efficient decryption, it gave us a lot of inspiration, indicating that there are ways to improve decryption efficiency. Sowjanya et al. [17] a ciphertext-policy attribute encryption (CP-ABE)-based wireless human body

A CP-ABE Scheme for Multi-user Queries in IoT

621

local area network security framework based on elliptic curve cryptosystems. The framework does not require bilinear pairing operations. The proposed CP-ABE is the elliptic curve decision-making is security under the Diffie-Hellman assumption and has the characteristics of user/attribute revocation. Meng et al. [18] used bilinear Diffie-Hellman (DBDH) to construct a dual access strategy (one open, the other hidden) CP-ABE keyword search. The security of the scheme is very good, but the computational cost Compared with the previous scheme, it is on the high side. In order to solve the problem of multi-user query in the Internet of Things, this paper proposes a secure and fine-grained user access control scheme, which is a multi-user access control scheme that supports multi-authorization CP-ABE. Finally, through formal and informal security analysis, it is proved that the scheme is security against several potential attacks required in the IoT. In addition, this paper also proves that the proposed scheme provides basic functions and has a lower computational cost than existing schemes.

3 System and Security Model 3.1 System Model In this section, we introduce the multi-user query scenario under the IOT architecture shown in Fig. 1. Under this IoT architecture, multiple smart devices together form a smart environment. In this article, we refer to IoT devices as data owners, and

Fig. 1 System model

622

F. An et al.

data users as authorized users. In the initialization phase, the system announces all parameters and keys. The key distributed by the center to the data owner and authorized users is in a secure channel, and the data owner uses the key to encrypt the data and keywords and upload them to the cloud server. Authorized users generate trapdoors based on keywords and keys, upload them to the cloud server for query, and the cloud server runs the query algorithm according to the trapdoor. If there are files, the data ciphertext is returned to the authorized user, and the authorized user uses the decryption algorithm decrypt the plaintext information.

3.2 Security Model In this paper, the Dolev-yao threat model [19] is used, in which adversary A can completely control the communication medium. Therefore, A’s ability is not only to intercept or modify or delete the message. In addition, suppose A attempts to recover sensitive information from stolen information through a lost device. In addition, Canetti R adversary model [20] is also suitable for the CP-ABE scheme, where A has all the capabilities of the [19] adversary, and he can tamper with the private key and session state. This needs to ensure that the leakage of temporary secrets or communication keys should pose little threat to security. Wazid et al. [21] proposed that the exposure of information stored in a single IoT device should not affect the security of any other entity in the IoT.

4 The Proposed Scheme The following describes the CP-ABE-based access control scheme, which consists of four phase: setup, encryption, query, and decryption:

4.1 Setup Phase Cloud server public system parameters:   P = G 1 , G 2 , G T , p, e : (G 1 , G 2 ) → G T , H1 : {0, 1} → Z p , H2 : {0, 1} → {0, 1} ; The data distribution center generates key {α, βmn , K 1 , K 2 } for the data owner, n  n and generates a polynomial: f (x, P) = (x + i)1−bi = i=0 f i x i for the access i=1

structure P = b1 · · · bn , where f i is a coefficient of x i , and f i is also sent to the data owner;

A CP-ABE Scheme for Multi-user Queries in IoT

623

According to the attribute structure Ak = a1k · · · an k , ∀k ∈ [1, n] of the authon  Ak = a1 · · · an , the rized user, the data distribution center calculates A = n 

k=1

, selects the random number ru ∈ Z p , construction function: f (x, A) = (x +i) i=1   calculates: su = K 1−1 · ( f x, A)−1 − K 2 ru , and sends the key ku = {βmn , ru , su } to the authorized user; The data distribution center constructs a polynomial for the data access structure n n   (x + i)ai −bi = Fi x i , and the attributes of authorized users: F(x, A, P) = 1−aik

i=1

i=0

Where Fi is the coefficient of x i , and Fi is also sent to authorized users; The data owner calculates the public key based on the secret key: i i i h i = h α , u i = h K 1 α , vi = h K 2 α .

4.2 Encryption Phase For data plaintext M and keywords W , calculate: n  f u i i = h K 1 f (α,P)rm , rm = H1 (P, M, W ), Rm = (g α )rm , K 1m = K 2m =

n  i=0

i=0

fi

vi = h

K 2 f (α,P)rm

, Cm = H2 (e(g, h)rm ) ⊕ M, C W = H3 (βmn ) ⊕ W .

Finally, the ciphertext data C = {P, Rm , K 1m , K 2m , Cm , C W } is sent to the cloud server.

4.3 Query Phase The authorized user generates a trapdoor T r = H3 (βmn ) ⊕ W from the keyword W and the key βmn and sends it to the cloud server, and the cloud server returns the query result: if the data does not exist, it returns ⊥; otherwise, it returns the data ciphertext: C = {P, Rm , K 1m , K 2m , Cm , C W }.

4.4 Decryption Stage The authorized user executes the decryption algorithm and calculates:

624

F. An et al.

 D = e Rm ,

n−|P| 

(h i−1 )

Fi

= e(g, h)rm F(α)−rm F0 , U = e(g su , K 1m ) =

i=1

e(g, h) K 1 f (α,P)rm su , V = e(gru , K 2m ) = e(g, h) K 2 f (α,P)rm ru , M  = Cm ⊕ −1 H2 ( U · V · D −1 ) F0 .

5 Security Analysis Theorem 1: The attacker cannot search for any documents outside the attribute range by keywords. Proof: Since the attacker cannot obtain the authorization key and calculate the value of the trapdoor function, the data query in the ciphertext state cannot be performed correctly to the cloud server. The attacker cannot perform keyword search on any document that is not within the attribute range. Theorem 2: The attacker cannot decrypt other data based on the known attribute key. Proof: Suppose an attacker who owns a user’s device key wants to try to generate a new key for other data. Even if he knows the value of the old authorization key, since he cannot obtain the attribute key that needs to be granted each time from the authorization key, the scope of each authorization attribute is the owner generated by the control and decision of the data, and the attacker cannot Reach his goal.

6 Performance and Comparative Study The solution proposed in this paper will complete a large number of calculation tasks by the key center in the initialization phase, so the user side and the device side have extremely low computational overhead, both of which are constant computational complexity, which is O(1).

7 Conclusion In order to solve the problem of multi-user data sharing in the IoT, this article proposes a CP-ABE scheme that security query and access control in Internet of Things data, which effectively solves the security issues and computing overhead issues. The instance objects in this article include cloud servers, data owners (IoT devices) and authorized users. The data owner uses the access structure and key to encrypt the data and keywords and upload them to the cloud server. Authorized users generate trapdoors for multiple files related to their attributes for security retrieval. The security analysis shows that the scheme is security.

A CP-ABE Scheme for Multi-user Queries in IoT

625

Acknowledgements This work is partially supported by Hainan Provincial Natural Science Foundation of China (620RC563), the Science Project of Hainan University (KYQD(ZR)20021).

References 1. Phuyal S, Bista D, Bista R (2020) Challenges, opportunities and future directions of smart manufacturing: a state of art review. Sustain Futures 2:100023 2. Yueksel B, Kuepcue A, Oezkasap O (2017) Research issues for privacy and security of electronic health services. Future Gener Comput Syst 68(Mar):1–13 3. Zanella A, Bui N, Castellani A et al (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32 4. AlJanabi S, AlShourbaji I, Shojafar M et al (2016) Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt Inf J 113–122 5. Mocrii D, Chen Y, Musilek P (2018) Iotbased smart homes: A review of system architecture, software, communications, privacy and security. Internet of Things 1–2:81–98 6. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE, 321–334 7. Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM conference on computer and communications security, pp 456–465 8. Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access structures. In: International conference on applied cryptography and network security. Springer, Berlin, Heidelberg, pp 111–129 9. Emura K, Miyaji A, Nomura A et al (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: International conference on information security practice and experience. Springer, Berlin, Heidelberg, pp 13–23 10. Goyal V, Jain A, Pandey O et al (2008) Bounded ciphertext policy attribute based encryption. In: International colloquium on automata, languages, and programming. Springer, Berlin, Heidelberg, pp 579–591 11. Liang X, Cao Z, Lin H et al (2009) Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the 4th international symposium on information, computer, and communications security, pp 343–352 12. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 53–70 13. Lewko A, Okamoto T, Sahai A et al (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 62–91 14. Zhang J, Zhang Z (2011) A ciphertext policy attribute-based encryption scheme without pairings. In: International conference on information security and cryptology. Springer, Berlin, Heidelberg, pp 324–340 15. Jiang Y, Susilo W, Mu Y et al (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Futur Gener Comput Syst 78:720–729 16. Zhang L, Hu G, Mu Y et al (2019) Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access 7:33202–33213 17. Sowjanya K, Dasgupta M (2020) A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC. J Inf Secur Appl 54:102559 18. Meng F, Cheng L, Wang M (2021) Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city. EURASIP J Wirel Commun Netw 2021(1):1–22

626

F. An et al.

19. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual international cryptology conference. Springer, Berlin, Heidelberg, pp 388–397 20. Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 453–474 21. Wazid M, Das AK, Odelu V et al (2017) Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Dependable Secure Comput 17(2):391–406

A Vertical Federation Framework Based on Representation Learning Yin Zhang, Fanglin An, and Jun Ye

Abstract Vertical federated learning aims to use different attribute sets of the same user to jointly build a model without disclosing its original data or model parameters. Facing the challenges brought by massive data in the Internet of Things, based on representation learning, advanced features are accurately and efficiently extracted to prepare for downstream tasks. At the same time, when implementing federated learning in the Internet of Things environment, it is necessary to consider the computing power of a large number of edge devices. In real life, more non-Euclidean data is used. For non-Euclidean data, we use graph neural networks as encoders to obtain better high-level feature vectors with fewer parameters. We propose a new vertical federated learning framework based on representation learning, combined with graph neural networks, to build a better model in the massive non-Euclidean data of the Internet of Things, while protecting the data privacy of each data owner. Keywords Vertical federation learning · Representation learning · Internet of things · Graph neural networks

1 Introduction Vertical federated learning is a paradigm of Federated Learning (FL), which aims to build a model by using different attribute sets of the same user to build a federated learning model based on distributed data sets. In the process of model training, model-related information can be exchanged among data owners (participants), but the original data will not be transmitted across devices. This exchange will not expose any protected privacy part of the data on each data owner. The trained federated learning model can be placed in each participant of the federated learning system, or shared among multiple parties, as shown in Fig. 1. In the environment of the Internet of things, there are a lot of unlabeled data in edge devices. At present, the mainstream Y. Zhang · F. An · J. Ye (B) School of Cyberspace Security, Hainan University, Haikou, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_70

627

628

Y. Zhang et al.

Fig. 1 Vertical federal learning model

method of machine learning still relies on the supervised learning of manually labeled labels, which will bring some problems to vertical federated learning: • The data itself can provide much more information than fixed labels. At present, there are supervised learning methods that require a large amount of tag data as support, and the effect of the trained model is sometimes not ideal. When the model of the federated client is aggregated in the central server, it cannot achieve the expected results; • Through the labeled data set, the supervised training model can only master the specific features of the fixed task, so the feature representation of supervised learning cannot be easily transferred to other tasks. When performing vertical federated learning, the client that can model independently cannot help the client that cannot model independently to build the final model. While keeping private data on the local device, learning a general representation model for various downstream tasks from scattered and unlabeled data, that is, federated unsupervised representation learning is still an open problem [1]. Contrastive learning is a typical discriminative self-supervised learning, learning feature representation from unlabeled data, which can help each client in federated learning to accurately and efficiently extract advanced features to prepare for downstream tasks. In addition, in real life, not all data is organized and structured data, but more unprocessed graph structure data. Graph Learning (GL) aims to learn from graphs by using various graph models. Valuable information is mined from the data [2]. The graph neural network expands the processing capabilities of deep learning for nonEuclidean data and provides a method for extracting features from irregular data. This can provide federated learning with the ability to process graph structure data

A Vertical Federation Framework Based on Representation Learning

629

in the Internet of Things environment, greatly expanding the scope of application of federated learning. The work of this paper is as follows: 1.

2.

We use contrastive learning to process the unlabeled data in the Internet of things and cooperates with other clients in the vertical federated learning to complete the model training task on the premise that the data does not go out of the local; We use graph neural networks to deal with the non-Euclidean data in the Internet of things, which not only reduces the amount of computation but also expands the application scope of vertical Federation learning.

2 Related Work Federal learning. As early as 2016, Google proposed the concept of a federated learning [3]. Shokri et al. [4] proposed a collaborative deep learning method in which participants independently train the model and only share a subset of parameter updates. Smith et al. [5] proposed a multi-task federated learning system that allows multiple participants to complete different machine learning tasks by sharing knowledge and protecting privacy. Recently, another security model that considers malicious users has also been proposed [6], which brings new security challenges to federated learning. Federal unsupervised learning. Some concurrent works also focus on federated learning from unlabeled data [7, 8]. Recently, Wang et al. [9] point two key properties, closeness and uniformity, related to the contrastive loss. However, these works did not consider non-normative data, which is not conducive to expanding the scope of application of federated learning.

3 Preliminary Knowledge 3.1 Vertical Federated Learning In vertical federated learning, when the users of the two data sets overlap more and the user characteristics overlap less, we split the data set according to the vertical direction (that is, the feature dimension), and extract the part of data with the same users but not the same user features for training. This method is called vertical federated learning. Under this federal learning system, the identity and status of each participant are the same. Federated learning helps everyone establish a "common benefit" strategy, which is why this method is called federated learning. For such a vertical federated learning system: X i = X j , Yi = Y j , Ii = I j ∀Di , D j , i = j

(1)

630

Y. Zhang et al.

In the formula, X represents the feature space; Y represents the label space; I is the sample ID space; D represents the data set owned by different participants [10]. The purpose of vertical federated learning is to collaboratively establish a shared machine learning model by using all the features collected by the participants.

3.2 Unsupervised Contrastive Learning Contrastive learning is a type of self-supervised learning, that is, it does not rely on labeled data but learns knowledge from unlabeled images. It is a typical contrastive self-supervised learning, compared with generative self-supervised learning, the task of contrastive learning is less difficult. This kind of method is to learn the feature representation of the sample by comparing the data with the positive sample and the negative sample in the feature space. The main difficulty of the contrastive learning method is how to construct positive and negative samples. Contrastive learning general formula: For any data x, the goal of contrastive learning is to learn an encoder f such that:       scor e f (x), f x +  scor e f (x), f x −

(2)

Where x + is a positive sample that is similar to x, x − is a negative sample that is not similar to x, and the scor e is a measurement function to measure the similarity between samples.

3.3 Graph Neural Networks The graph neural networks (GNN) mainly provides graph embedding, a technology that can be used for graph representation learning, introduces traditional graph analysis, expands the processing capabilities of deep learning for non-Euclidean data, and provides a method of extracting features from irregular data, it is widely used in social networks, recommendation systems, etc. GNN is a neural network that runs directly on graph structure data. The typical application of GNN is node classification. In the node classification problem, the feature of each node v is represented by xv and is associated with the label tv . Given a partially labeled graph G, the goal is to use these labeled nodes to predict the labels of unlabeled nodes. The network uses a d-dimensional vector (state) h v to represent each node, which contains its neighborhood information.   h v = f xv , xco[v] , h ne[v] , xne[v]

(3)

Among them, xco[v] represents the feature of the edge connected to v, h ne[v] represents the embedding feature of the adjacent node of v, and xne[v] represents the feature

A Vertical Federation Framework Based on Representation Learning

631

of the adjacent node of v. The function f is a transfer function that projects these inputs into a d-dimensional space.

4 Vertical Federation Scheme Based on Representation Learning In this section, we will analyze the two current challenges of vertical federated learning, and briefly describe the solutions proposed to solve these two problems. Challenge 1. According to the features extracted from unlabeled data, the client in vertical federated learning cannot help to complete the final model. One of the reasons for this problem is that the features extracted by the client are mapped into the feature space, which cannot well represent the essential characteristics of different samples, so it cannot achieve good results in downstream tasks. We use the method of contrastive learning [11]. For a sample X , we randomly select two kinds of enhancement operations from the set T : t1 − T and t2 − T , respectively acting on the original sample to form two enhanced new samples X 1 , X 2 . In the process of model training, any other sample in the same batch can be used as X 1 and X 2 . After determining the positive cases and negative cases, what we should do in contrastive learning is to make the positive cases as close as possible and the negative cases as far as possible. In this way, the features extracted by the client are mapped to the feature space for clear expression, and the extraction is as close to the essential features of the sample as possible. Process 1 Contrastive Learning , 2 Output 1 , 2 Input , 1 1. start process ) -> Obtain 2. Select( 3. Select( ) -> Obtain 4. randomly select( ) -> Obtain 5. Enhance( )-> Obtain 1 , 2 6. return 1 , 2 -> end process

1

,

2

Challenge 2. In the face of non-Euclidean data, the client in vertical federated learning cannot process the data smoothly, resulting in poor model training effects. One of the clients k ∈ K uses the local data set to train the GNN model, obtains the model parameters Wk , the node embedding Hk , and the prediction result Pk of the current sample X ; the central server receives the W1 , W2 , W3 , . . . , W K −2 , W K −1 , W K sent by each client, and after the aggregation algorithm of the server, gets Wglobal and distribute it to all clients; after each client gets the global model Wglobal again, updates

632

Y. Zhang et al.

its own local model to get Wlocal ; repeat this process until the model converges, and let the client that can be modeled independently in the vertical federated learning assist the client that cannot be modeled independently to build the final model. Process 2 Graph Neural Networks Output Input 1. start process 2. for each round do 3. Train( ) -> Obtain 4. Upload() -> Obtain 5. Aggregation() -> Obtain 6. Update()-> Obtain 7. return -> end process

5 Conclusion To solve the two challenges faced by vertical federated learning (problems caused by unlabeled data and non-Euclidean data), we propose a vertical federated learning framework based on representation learning, combined with graph neural networks, in In the massive non-Euclidean data of the Internet of Things, a better model is built on the premise of protecting the data privacy of each data owner. Acknowledgements The National Natural Science Foundation of China (62162020).

References 1. Zhang F, Kuang K, You Z et al (2020) Federated unsupervised representation learning. arXiv preprint arXiv:2010.08982 2. Chen C, Hu W, Xu Z et al (2021) FedGL: federated graph learning framework with global self-supervision. arXiv preprint arXiv:2105.03170 3. Brendan McMahan H, Moore E, Ramage D et al (2016) Communication-efficient learning of deep networks from decentralized data. arXiv. arXiv: 1602.05629 4. Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1310–1321 5. Smith V, Chiang CK, Sanjabi M et al. Federated multi-task learning. Adv Neural Inf Process Syst 4424–4434 6. Hitaj B, Ateniese G, Perez-Cruz F (2017) Deep models under the GAN: information leakage from collaborative deep learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp 603–618 7. Jin Y, Wei X, Liu Y et al (2020) Towards utilizing unlabeled data in federated learning: a survey and prospective. arXiv preprint arXiv:2002.11545

A Vertical Federation Framework Based on Representation Learning

633

8. van Berlo B, Saeed A, Ozcelebi T (2020) Towards federated unsupervised representation learning. In: Proceedings of the third ACM international workshop on edge systems, analytics and networking, pp 31–36 9. Wang T, Isola P (2020) Understanding contrastive representation learning through alignment and uniformity on the hyper sphere. In: International conference on machine learning. PMLR, pp 9929–9939 10. Yang Q, Liu Y, Chen T et al (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10(2):1–19 11. Chen T, Kornblith S, Norouzi M et al (2020) A simple framework for contrastive learning of visual representations. In: International conference on machine learning. PMLR, pp 1597–1607

Industry and Education for Data Usage in Smart City

Systematic Practice of Composition Courses Based on the Computer-Aided Technology Yisheng Zhang

Abstract The main purpose of composition teaching is to study the various morphological relations between two-dimensional and three-dimensional, so as to explore the possibility of design form. In the past, this course mostly takes the form of theoretical explanation, hand-drawing and manual construction as the teaching direction, but when the computer is widely used in the education system, it receives the opportunity of teaching transformation. This paper mainly discusses the teaching direction of the combination of modern composition and computer, with the combination of plane, color, and three-dimensional composition with computer as the exposition and application research point of this paper. Taking the significance of composition teaching as the starting point, this paper analyzes the plane composition and computer, computeraided color composition, computer-constructed three-dimensional composition, and combines teaching innovation as the main discussion direction of the paper. It is hoped that through the teaching exploration of the computer-aided composition course, the composition teaching can be combined with the computer, so as to provide more learning methods for the students of related majors. Keyword Composition · Computer · Plane composition · Color composition · Three-dimensional composition · Teaching innovation

1 Meaning and Expression of Composition 1.1 Creative Thinking and Systematization Composition, which means construction, deconstruction, reconstruction, and combination, is to combine all the required elements in accordance with the principles of beauty to form a brand-new and beautiful image suitable for the needs [1]. Computeraided design is a relatively convenient way of expressing design ideas by using Y. Zhang (B) Sichuan Agricultural University, Chengdu 611130, Sichuan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_71

637

638

Y. Zhang

computer graphics processing technology to display people’s ideas and expected forms through the screen, and using forms such as printing, output and modeling. Computer-aided design teaching has long been promoted in the second half of the last century, and it has a wide application, deep involvement and great influence, and its scope covers almost all areas in which modeling and vision can be applied. As far as the major of visual design is concerned, such as environmental design, landscape architecture, interior design, visual communication, three-dimensional sculpture and so on. The use of computers can help teachers and students to think rationally, promote creative thinking to develop in a systematic and diversified direction, and improve the ability to analyze and process all kinds of logical information. The use of computer-aided composition or design teaching can improve the accuracy, intuition, convenience and easy to modify, save, copy and other advantages of drawing [2] and then improve the actual effect of teaching.

1.2 The Characteristics of the Correspondence Between the Composition Form and the Computer Graphics The combination of composition design teaching and computer-aided design is to embody modern high-tech, display convenient functions, and create design products that improve the quality of life and realize the better life. Both the form of composition and computer graphics design are the products of industrialization and informatization of human society, and there are many related factors between them. In terms of the relationship between the two, when the computer is used for auxiliary expression, the design of the composition form has a mutual connection point. The repetitiveness and high accuracy of the composition form are the most obvious advantages of computer graphics processing. However, as a performance tool, the computer’s processing of graphics is based on the needs of people, and the form of the composition itself determines the choice of computer hardware and software. In design teaching, composition, as the learning process of form creativity, has increasingly highlighted its existence value and necessity. It is only the composition course that is the basis of form creativity, and it is still worth studying to improve its teaching materials and teaching methods. At this point, the combination of computer and composition teaching is a good teaching direction. But in any case, the computer cannot completely replace the hand-drawn training of the composition, it is feasible as an alternative to part of the form of creativity. The use of computer-aided composition courses can improve the design efficiency of learning plane composition, break through the limitations of color composition, and overcome the difficulties of threedimensional composition, allowing students to use computers as a tool for developing composition courses and design creativity, and further reflect the value of teaching innovation. Its impact is valuable and far-reaching.

Systematic Practice of Composition Courses Based …

639

2 Combination of Plane Composition and Computer 2.1 Transmission of Ideas Innovation is advocated in the current design education, so there have been a lot of changes and reforms in education, but the core idea transmission has not changed, and it will not change in the future. To this end, what needs to be changed is the way and method of transmission. Professor Wang Wuxie once said: design is a purposeful creation. Design is different from painting or sculpture, the latter two are the presentation of the artist’s insight, the former is to meet the practical needs of human beings. An image design must be seen by the viewer in a suitable environment and must convey an idea [3–5]. Therefore, as the breakthrough of teaching direction of the combination of modern composition teaching and computer, the transmission of its ideas determines its teaching form and content. The points, lines, surfaces, form principles, expressive characteristics, basic elements and other contents studied in the plane composition can be combined with the computer to form teaching methods and forms of expression. And this teaching method and form of expression should also be conveyed around ideas as the educational orientation of composition.

2.2 Quantitative Change Produces Qualitative Change In the traditional teaching of plane composition, hand-drawing is used for twodimensional image form training, and the basic shapes such as points, lines, and surfaces are drawn in many manifestations using the permutation and combination effects of repetition, skeletons, gradients, emission, contrast, and deformation etc., but the aforementioned arrangement and expression effect will have certain limitations in space or time, and there will be a limit of hand-drawn drawing, and some ideas cannot be carried out completely. At this point, the computer can come in handy. For the choice of computer software in teaching, such as Adobe illustrator, CorelDRAW and other vector graphics editing software commonly used by students majoring in design, this kind of software can be used to arrange the form of plane composition and make special effects. Using this kind of vector graphics editing software to assist the teaching of plane composition is not only fast and accurate, but as long as it can be matched with a hand-drawn screen or a digital drawing board, it can also design a graphical effect that is difficult to achieve with traditional hand-drawn forms, which greatly reduces the learning pressure caused by the limitations of teaching space and time, and allows students to use the convenience provided by computers. With the special instructions of the program software, repeated design training is carried out to achieve the improvement of the learning effect and make the quantitative change produce qualitative changes.

640

Y. Zhang

2.3 Teaching Practice of Vector Graphics Editing Software Vector graphics editing software is an intuitive graphic design application that can bring pleasant teaching experience to teachers and students majoring in design. Vector graphics editing software programs are specially designed to meet the needs of professional graphics today. Whether it is advertising, printing, publishing, symbol making, engraving or manufacturing, vector graphics editing software can provide relevant tools to enable teaching or design work to establish accurate and creative vector graphics, as well as professional layout. Specifically, in the process of combining plane composition design teaching with computer, vector graphics editing software can be responsible for the following teaching practice: (1)

(2)

(3)

(4)

Objects and drawing The object elements in the drawing in the plane composition, such as graphics, images, shapes, straight lines, curves, symbols or indicators, can be drawn by software programs, and you can also customize art patterns, logos, posters, flyers, advertising signboards, etc., as well as various shapes and sizes. The combination of vector graphics and dot-matrix plot Vector graphics are images generated from mathematical explanatory formulas. The function of the mathematical explanatory formulas is to determine the position, length and direction of drawing lines; A dot-matrix plot is an image composed of graph element lattice points or lattice points. The computer software program can carry out the mixed arrangement design of the two, and carry out the design teaching practice of the plane composition. Text editing Input the text that needs to be designed in the software program, convert various glyphs through the program, and then use the corresponding program tools such as magnification, reduction, rotation, disassembly, bonding and so on to process the visual effects of the text. Or use a graphic editor to create words to achieve the corresponding teaching practice. Visual texture and texture effect Vector graphics editing software can add a certain visual texture to images through image transfer, overlay, gradation and other forms. Through the computer software program, it is also possible to simulate the form, method and main points of the texture composition in the plane composition, and reflect the texture effect design in the plane composition teaching.

3 Computer-Aided Color Composition 3.1 Adjust the Teaching Mode of Color Composition Color composition teaching is a connected class of three major compositions: plane, color, and three-dimensional. It has the sense of form of plane composition and the

Systematic Practice of Composition Courses Based …

641

modeling ability of three-dimensional composition, and is an important part of the composition elements. It is complementary to plane and three-dimensional, but it also becomes a knowledge system alone. In today’s color teaching, computers have become the main force of teaching practice. Various teaching methods combined with computers have been widely used by teachers and students. Modern students basically have computer-related products, such as computers, mobile phones, hand-painted electronic screens, etc., they can easily capture various teaching resources. Therefore, in such a teaching environment, the traditional teaching model of teachers standing on the stage, assigning homework or mid-term and final exams after telling the theory, is now out of date. Therefore, the primary focus of color composition teaching is to improve and adjust the reform of teaching models and methods. The implementation of this focus comes from the organic combination of advanced computer technology and hand-drawn technology.

3.2 Analysis of the Advantages and Disadvantages of Traditional Hand-Painting and Computer Use in Color Composition The traditional color composition is the training of the sense of color in hand-painting. This training uses color tools such as watercolor, gouache, markers and other color tools to paint in the form of color. Students rely on their own ideas to complete the learning task, and the training direction of students is the integration of heart and hand, ideas and practice can be directly combined and consistent as far as possible. The advantage of this teaching practice method is that it enables students to properly use paper, brushes, paints, rulers, etc. within a certain time and space to carry out color composition teaching exercises, the resulting color composition work can also directly reflect the visual effect. But the disadvantages are: relatively long timeconsuming, more teaching and practice space required, greater cost of pigments and materials and subsequent environmental pollution, relatively few colors that can be modulated, and relatively single form of expression in the short term. In the end, it is easy to reduce the efficiency of learning, and the professional ability cannot be developed in many aspects. In order to solve the above-mentioned problems and improve the learning efficiency, the computer has gradually increased the proportion of the application of teaching methods in the teaching of modern color composition. As the carrier of digital image processing tools, computer provides the functions related to visual image design, such as storage, processing, capture and so on. It helps the teaching of color composition to establish a practical way different from traditional teaching and a broad space for design application and development. The advantages of using computer in color composition teaching are: relatively rich color information, accurate graphic effect, relatively fast speed of information capture or consulting, and fast processing speed of work required by learning goals. The disadvantages are: basic hand-drawing skills of students will be reduced, long-term

642

Y. Zhang

staring at the computer screen will cause eye damage, and design works will be too rigid due to the form of computer software. Finally, due to the convenience of network information, it is relatively easy to obtain information. In a fluke mentality, plagiarism tends to grow.

3.3 Teaching Practice of Image Processing Software Color composition is one of the important elements of composition course learning. Therefore, in the teaching practice of using the combination of computer and color composition, the effect produced can help students learn the processing effect and sense of coordination of color composition. Whether it is hand-painting or computer software program processing, it is a bad choice to place too much emphasis on either aspect. In the teaching of color composition, traditional hand-painted exercises are like the basic skills training of pointing the toes and clenching the buttocks in martial arts, and learners must carry out a lot of exercises and reach the corresponding height. However, in the middle and second half of learning, students should add the use of computers appropriately. As long as they can skillfully use computer software programs, they can show their creativity and imagination under the guidance of teachers, make full use of its related functions to create a design effect that is difficult to be achieved by hand-drawing, which not only increases the ability of learning, but also improves the teaching efficiency of teachers. The following takes Adobe Photoshop as an example to illustrate the teaching practice of using computer software programs to carry out image processing software in the color composition course: (1)

(2)

(3)

Hue circle and color solid In the color composition, we can use the color sample, color plate and vector mask of the computer software program to systematically and intuitively understand all kinds of gradients and adjustments related to the hue ring and color solid in the recognition and training of hue ring and color solid. Practice of lightness and chroma Input the image into the computer software program, using the brightness, contrast, curve, exposure and other functions of the image function. By modifying the corresponding parameters, students can practice the brightness and saturation in the color composition teaching, which is also an indispensable part of color composition teaching. Visual effect In computer software programs, the filter function can use distortion, style, texture, brushstrokes, blur, sharpness, noise, and other methods for image processing. Students only need to modify the relevant parameters in the aforementioned functions to make the input image produce changes in visual elements and color composition.

Systematic Practice of Composition Courses Based …

643

4 Use Computer to Construct the Teaching Plan of Three-Dimensional Composition 4.1 Teaching Practice of Three-Dimensional Software At present, with the improvement of the economic environment, the popularity of computers has become wider and wider, and the combination of computers and teaching has been widely used in various majors. Many teachers already have good teaching experience in three-dimensional composition teaching. With the development of virtual three-dimensional science and technology, the virtual space on the screen can basically achieve a realistic effect that is close to simulation, just like the scene of interstellar war can be made by computer simulation in movie special effects. Looking at it now, the three-dimensional software program technology of the computer has more practical significance for the teaching of threedimensional composition. Therefore, three-dimensional teaching projects, such as their logic and elements of composition, elements, materials and processes, materialized thinking, and the principles of formal beauty [6–10], can all use computer software programs or related manufacturing machines (3D printers, engraving machines, VRM virtual realistic technology) for teaching practice. There are many 3D software used for the teaching practice of computer-aided three-dimensional composition, the common ones are 3D MAX, AutoCAD, MAYA, Softimage, Houdini, Lightwave, Rhion, etc. The following teaching practice directions of three-dimensional software related to three-dimensional composition are taken as examples to illustrate the teaching practice of the three-dimensional composition course using computer software programs: (1)

(2)

Concept realization From the manuscript, the first draft of the design to the conceptual realization of the simulation product, or just a very simple design idea, the surface, elevation, section and modeling instructions provided by 3D can accurately make all the industrial models used for rendering vision, 3D animation, engineering construction drawings and production. Virtual realistic technology At present, the computer software program can completely make the simulation scene, and the spatial lighting effect of the simulated three-dimensional image is very good. With the support of natural luminosity and lighting luminosity in 3D software, students can create very accurate images and lighting effects of indoor and outdoor architectural scenes. Therefore, it can provide fast simulation effect for three-dimensional composition and even future design work, such as product design, environmental design and architectural space rendering. In addition, in the teaching of three-dimensional composition, whether the virtual scene and objects can be completely combined or not is closely related to the modeling technology, so the research of modeling technology is of great significance.

644

Y. Zhang

(3)

Data and accuracy As long as students can skillfully use the tools in three-dimensional software programs, students who take the three-dimensional composition course can build any shape that can be mastered, and in the case of accurate input of real data, students can use the rapid prototyping of computers to build, analyze and manufacture objects with a sense of design, as large as the scale of the square and as small as the scale required by the ring.

4.2 Feasibility of the Application of Computer in Three-Dimensional Composition The single use of computer combined with three-dimensional composition teaching will also have some shortcomings, and the reason is that the simulated and virtual three-dimensional composition constructed by students using computers may not be materialized in the actual space environment. Because there are some problems, such as the stability and rationality of the center of gravity design of the simulated object, the agreement of the conditional relationship between the objects, the texture of the material cannot be shown in the virtual space, and the physical relationship between load-bearing and pressure, it is impossible to simulate the design by computer alone. Take the Bird’s Nest Stadium of the Beijing Olympic Sports Center as an example, the stadium uses computers to design various architectural functions, but after the computer completes the design work, the design team still uses the form of reduced data to make the actual model of the Bird’s Nest Stadium, to actually analyze the feasibility and visual effects of the design, so that the design work can approach perfection. Therefore, the computer can not completely replace the threedimensional composition teaching, but it can increase the space of teaching and the possibility of the realization of students’ independent creation. Contemporary human life is basically inseparable from the design products related to three-dimensional composition, outdoor environmental design, indoor furniture and space, a variety of electronic products, and even water cups, each of which belongs to the scope of design related to three-dimensional composition. Therefore, the three-dimensional composition teaching combined with the learning of computer software programs can enable students to quickly establish the perception of space objects of various scales, better integrate it into practical application, and provide more efficient services for all aspects of people’s lives.

Systematic Practice of Composition Courses Based …

645

5 Teaching Innovation of the Composition Course 5.1 Executive Efficiency and Understanding Ability In modern composition teaching, the teaching method of the combination of design thinking and computer happens to be one of the teaching innovation and reform advocated by universities. Computer-aided teaching helps to improve the execution efficiency of work and increase students’ understanding ability, and it can also inspire students to think about the breadth and depth of visual design. The use of computers for the work operations of the three main compositions of plane, color, and threedimensionality can free students from the shackles of space and materials in actual operations, and can properly guide students’ creativity and conversion ability, so that students can have a better understanding of the composition courses and improve the efficiency of the later design work.

5.2 Science Technology and Design After the baptism of the times, the concept of visual art produced by composition and design teaching has entered a cross-domain era of new exploration and multiangles. Today, with the promotion of convenience and innovative consciousness, the teaching exploration of computer-aided courses begins to be established through artificial subjective consciousness. The three main composition elements of plane, color and solid in composition teaching have entered the design teaching system for more than a hundred years from the inheritance of the composition teaching of Bauhaus. However, with the continuous progress of mankind, science and technology has also improved. At the same time, with the mutual integration of science and technology and design disciplines, the integration of computers into the composition teaching has become a necessary basic method. The ultimate educational purpose of composition course is also to enable students to have the main application tools for design practice in later courses and even future employment.

6 Conclusion Now we live in a computer-based information society, a variety of electronic technologies and network messages are affecting people’s way of life, but also changing the way of design and performance content. The composition has appeared since the beginning of the last century, experienced modernism, the post-modern design movement in the 1980s, and in the more than 20 years of this century, it has experienced the development of computer technology, although there has always been talk that it will be replaced, but the results show that the functional features produced by the

646

Y. Zhang

composition and the design features of serving the broad masses of society have not been changed. In today’s society, computers and network information are not simply objects of life services, they are the most effective tools for realizing design ideals and improving the quality of life. The design of the composition curriculum and composition form is already produced by the concept of group cooperation, requiring art, music, space, and technology. And these require the participation of computers more or less. At present, no matter what kind of designer, the composition is no longer simply understood as the way of design. When using the concept of composition, designers need the computer as a bridge to transform and realize the design thinking. In the rapid development of computer technology, it only adjusts and reinforces the existing appearance, so that the three main composition elements of plane, color and three-dimensional which make up the aided design become more diverse and in-depth. The design nature of computer-aided composition has not changed. Therefore, the author has more reason to think that it is necessary to add computer as an assistant in the composition course, and the cooperation between composition and computer is not only the compulsory way of designing courses, but also the only way to a better world. This article is “Discipline Construction of Sichuan Agricultural University”.

References 1. Yuan Y (2021) Application analysis of color composition in computer plane design. Sci Volkswagen (2):115–116 2. Gao H (2019) Composition of industrial design professional computer-aided design capability. Digit Des (8):18 3. Luan L (2019) Application of computer technology in art creation-review application of computer art. Chin Sci Technol Paper 14(10):1171 4. Xu W (2019) Can the content intelligently generated by computer software constitute a work. Youth Rep (16):71 5. Bao J (2018) Research on computer-aided color composition. Fine Arts Educ Stud (13):169 6. Yu G (2017) Plane composition. Tsinghua University Press, Beijing, p 3 7. Wang W (2015) Principles of graphic design. Hsiung-Shih Art Book Co., Ltd., Taipei, p 6 8. Chen Z (2014) Three-dimensional composition. Tsinghua University Press, Beijing, p 134 9. Chen Z (2014) Three-dimensional composition. Tsinghua University Press, Beijing, p 23 10. Deng G (2013) Computer art composition application. Chongqing University Press, Chongqing, p 2

An Empirical Study on Influencing Factors of R&D Investment of Technology-Intensive Private Enterprises in the Age of Informatization Weili Zhen, Zhaobohan Zhang, Yuli Yao, and Yuxi He

Abstract Encouraging innovation and avoiding restrictive regulations on research and development (R&D) that impede technological and economic development is a part of China’s evolving informatization strategies. This paper creates “the innovation chain theory with R&D investment as the core” model which is verified by the Structural Equation Modeling. Additionally, the influencing factors increasing R&D investment for technology-intensive private enterprises are discovered, and related suggestions are provided to enterprises and the government. Theoretically, this research has contributed to the micro perspective of the innovation chain theory. Practically, it can improve the independent innovation and technological capabilities of technology-intensive private enterprises. Keywords Technology-intensive private enterprises · Research and development · Innovation chain · Investments · Informatization strategy

1 Introduction Sichuan Province is located in the western region of China, whose innovation capability and innovation resources are relatively lower than the coastal areas. It has lower R&D expenditure and R&D intensity in its industrial enterprises above the scale [1] compared with similar GDP ranking provinces. Besides, insufficiency in innovation and low future development potential have become major problems. Although previous studies have clarified the current situation and influencing factors of R&D investment in technology-intensive private enterprises and provided policy recommendations, they treat the innovation process as a “black box” [2], which makes it difficult for enterprises to optimize their R&D and innovation activities. W. Zhen · Z. Zhang · Y. Yao Business School, Sichuan University, Eastern First Ring Rd, Chengdu, Sichuan, China Y. He (B) Pittsburgh Institute, Sichuan University, Chuanda Rd. Shuangliu, Chengdu, Sichuan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 M. Atiquzzaman et al. (eds.), 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City, Lecture Notes on Data Engineering and Communications Technologies 103, https://doi.org/10.1007/978-981-16-7469-3_72

647

648

W. Zhen et al.

Secondly, the innovation chain is an important tool for analyzing the internal structure of enterprises’ innovation activities [3, 4]. However, few studies have investigated the innovation R&D activities of private enterprises from the perspective of the innovation chain theory. Thirdly, the intersection of technology-intensive industries and private enterprises is also a research gap. Therefore, the current research opens the “black box” of innovation by applying the innovation chain theory in the analysis of the internal and external factors that affect their R&D investment. Afterward, this paper provides corresponding suggestions and countermeasures for the enterprise and the government.

2 Theoretical Basis and Research Hypothesis 2.1 The Innovation Chain Theory From the perspective of the Innovation Chain Theory, Zhen et al. divide the innovation chain into the elements integration stage, the R&D creation stage, the commercialization stage, and the social utility stage [5]. The elements integration stage aims at developing a scientific research system by categorizing and integrating innovation elements such as personnel, capital and policy. In the R&D and creation stage, relevant scientific organizations transfer innovation elements into knowledge achievements like papers, and patents by conducting technological research. The commercialization stage further incorporates the results from the R&D creation stage to create valuable commodities through the market, thus generating economic benefits. In the social utility stage, the companies put mature scientific research technology or products into the market for economic and social returns. Meanwhile, the four stages can be summarized into two phases, the knowledge condensation phase and the market transformation phase [6].

2.2 “The Innovation Chain with R&D Investment as the Core” Model Based on the theoretical model of “innovation chain” above, this paper constructs “innovation chain with R&D investment as the core” model in Fig. 1.

2.2.1

The Elements Integration Stage

The influencing factors of the elements integration stage can be split into internal and external. Internal Factors mainly include government policies which guide enterprises to increase R&D investment [7] and the market environment with broad

An Empirical Study on Influencing Factors of R&D Investment …

649

Fig. 1 “The innovation chain with R&D investment as the core” model

prospects that promote R&D investment to a certain extent [8]. External influencing factors include three indexes. Corporate governance includes share concentration which directly motivates shareholders to support R&D activities and the corporate board as a decision-maker of R&D activities. Corporate financial capability can be observed through three indexes: (1) the total assets. A larger corporate scale determines enterprise technological innovation investment [4]; (2) the leverage ratio (LEV). Enterprises with a high leverage ratio are usually forced to reduce R&D investment; (3) the annual income. R&D activities require a good business condition and high sales revenue.

2.2.2

The R&D Creation Stage

Influencing factors of this stage can be explored from an external and internal perspective. Government subsidies are an important external factor that can influence the whole process of R&D investment. Internal factors can be analyzed from three aspects: (1) The larger the number of research patents is, the higher the technological starting point is for R&D activities. (2) Universities and research institutions play a role as catalysts in R&D production and technological R&D. (3) High-quality and diversified R&D personnel can promote better results for enterprises’ R&D activities.

2.2.3

The Commercialization Stage

The influencing factors of this stage can be analyzed from macro, meso and micro levels. At the macro level, government subsidies influence the whole “innovation chain” including the commercialization stage. Preferential tax policies are a boost for enterprises to invest more in R&D [9]. From the meso level, the enterprise,

650

W. Zhen et al.

stakeholders, suppliers and customers are forming an enterprise’s “market power” which determines the success of the commercialization stage. At the micro-level, high marketing ability can encourage enterprises to increase R&D investment. An enterprise with strong competitiveness will increase its spending in advantageous areas. In summary, there are four hypotheses in this paper: H 01 H 11 H 12 H 02

Elements integration, commercialization, and R&D creation have a negative effect on an enterprise’s R&D investment. Elements integration, commercialization and R&D creation have a positive effect on an enterprise’s R&D investment. Elements integration has a positive effect on R&D creation; R&D creation has a positive effect on commercialization. Elements integration has a negative effect on R&D creation; R&D creation has a negative effect on commercialization.

3 Research Design This paper applied Structural Equation Modeling to construct a structural equation with elements integration, R&D creation and commercialization as exogenous hidden variables and R&D investment as endogenous hidden variables.

3.1 Samples and Data Sources According to the criteria of the National Bureau of Statistics and the definition from the OECD, and considering the actual situation of Sichuan Province, this study referred to the private enterprises registered in Sichuan Province, with R&D investment intensity greater than 3%, and belonging to high technology private enterprises of the National Bureau of Statistics as technology-intensive private enterprises in Sichuan Province. This study selected 28 enterprises listed before 2015 that meet the above criteria and uses the annual reports of these enterprises from 2015 to 2019 for analysis.

3.2 Definitions of the Variables Table 1 shows specific indexes of the hidden and observable variables in this study.

Commercialization

R&D creation

O pening T otal Asset

a8 Government policies (Preferential tax policies)

a7 Government policies (Government subsidies)

O pening T otal Asset

Gover nment Subsidies o f the Pr evious Y ear

Gover nment Subsidies o f the Curr ent Y ear +

N et Pr o f it *(25% -15% ) O pening T otal Asset





Ln (T he N umber o f R&D Employees) T he N umber o f Patents

a6 Enterprise technological capability













(continued)

Gover nment Subsidies o f the Pr evious Y ear ∗ 0.85

Gover nment Subsidies o f the Curr ent Y ear +

T he N umber o f R&D Employees T otal N umber o f Employees





O perating I ncome

O pening T otal Asset

Gover nment Subsidies o f the Pr evious Y ear ∗ 0.85

a5 R&D personnel investment

a4 Proportion of R&D personnel

a3 Government policies (Government subsidies)

a2 Enterprise financial capability

a1 Government policies (Government subsidies)

Elements integration

Exogenous hidden variables



Gover nment Subsidies o f the Curr ent Y ear +

Ln(Annual R&D E penditur e)

a13 R&D investment ⎛

R&D E x penditur e O perating income

a12 R&D investment intensity

R&D investment

Endogenous hidden variables

Measurement methods

Observable variable index

Hidden variables

Table 1 Variable scale of structural equation model

An Empirical Study on Influencing Factors of R&D Investment … 651

Hidden variables

Table 1 (continued)

a11 Market competitiveness

a10 Marketing capacity (Proportion of sales staff)

a9 Marketing capacity (Proportion of sales cost)

Observable variable index

O perating pr o f it O perating Cost

T he N umber o f Sales Sta f f T otal N umber o f Employees

Sales Cost T otal Cost

Measurement methods

652 W. Zhen et al.

An Empirical Study on Influencing Factors of R&D Investment …

653

3.3 Results By using the structural equation software AMOS, this research obtained the data in Table 2 and Fig. 2. As is shown, none of the p-values exceeds 0.05, except for the pvalue (0.055) of commercialization on R&D investment, which is slightly greater than the level of significance (0.05). This proves that the Structural Equation Modeling in this paper is successful. Figure 3 reveals the results of structural equation analysis. Based on the AMOS analysis, the Structural Equation Modeling of the influencing factors of R&D investment based on the “innovation chain” is successful. Conclusions are listed as follows: (1)

Elements integration, R&D creation and commercialization all have positive effects on R&D investment. The positive coefficients indicate that the positive

Table 2 Structural equation index Estimate

S.E

C.R

P

R&D Creation